Résultats de recherche de titre
Articles 1 à 20 sur 75
The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.John Lisle reveals the untold story of the OSS Research and Development Branch—The Dirty Tricks Department—and its role in World…
War II.In the summer of 1942, Stanley Lovell, a renowned industrial chemist, received a mysterious order to report to an unfamiliar building in Washington, D.C. When he arrived, he was led to a barren room where he waited to meet the man who had summoned him. After a disconcerting amount of time, William “Wild Bill” Donovan, the head of the Office of Strategic Services (OSS), walked in the door. “You know your Sherlock Holmes, of course,” Donovan said as an introduction. “Professor Moriarty is the man I want for my staff…I think you’re it.”Following this life-changing encounter, Lovell became the head of a secret group of scientists who developed dirty tricks for the OSS, the precursor to the CIA. Their inventions included Bat Bombs, suicide pills, fighting knives, silent pistols, and camouflaged explosives. Moreover, they forged documents for undercover agents, plotted the assassination of foreign leaders, and performed truth drug experiments on unsuspecting subjects.Based on extensive archival research and personal interviews, The Dirty Tricks Department tells the story of these scheming scientists, explores the moral dilemmas that they faced, and reveals their dark legacy of directly inspiring the most infamous program in CIA history: MKULTRA.Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
Par David V. Gioe, Margaret W. Smith. 2024
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book…
focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war–peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare. This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.Cashing Out: The Flight of Nazi Treasure, 1945–1948
Par Neill Lochery. 2023
When Nazis looked to flee Europe with stolen art, gems, and gold in tow, certain &“neutral&” countries were all too…
willing to assist them. By the end of January 1945, it was clear to Germany that the war was lost. The Third Reich was in freefall, and its leaders, apart from those clustered around Hitler in his Berlin bunker, sought to abscond before they were besieged. But they wanted to take their wealth with them. Their escape routes were diverse: Sweden and Switzerland boasted proximity, banking, and industrial closeness, while Spain and Portugal offered an inviting Atlantic coastline and shipping routes to South America. And in various ways, each of these so-called neutral nations welcomed the Nazi escapees, along with the clandestine wealth they carried. Cashing Out tells the riveting history of the race to intercept the stolen assets before they disappeared, and before the will to punish Germany was replaced by the political considerations of the fast-approaching Cold War. Bestselling author Neill Lochery here brilliantly recounts the flight of the Nazi-looted riches—the last great escape of World War II—and the Allied quest for justice.Ethical Hacking (Law, Technology and Media)
Par Alana Maurushat. 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral…
and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.A Woman of No Importance: The Untold Story of Virginia Hall, WWII's Most Dangerous Spy
Par Sonia Purnell. 2019
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An…
astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLERIn September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance.By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity.'A cracking story about an extraordinarily brave woman' TELEGRAPH'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMESWINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHYA former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake…
news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies
Par Barry Meier. 2021
A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world – the booming…
business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them. For decades, private eyes from Allan Pinkerton, who formed the first detective agency in the U.S., to Jules Kroll, who transformed the investigations business by giving it a corporate veneer, private spies were content to stand in the shadows. Now, that is all changing. High-profile stories grabbing recent headlines – the Steele Dossier, Black Cube, the Theranos scandal, Harvey Weinstein’s attacks on his accusers – all share a common thread, the involvement of private spies. Today, operatives-for-hire are influencing presidential elections, the news media, government policies and the fortunes of companies.. They are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails, and decide what we see on social media. Private spying has never been cheaper and the business has never been more lucrative—just as its power has never been more pervasive. Spooked is a fast-paced, disturbing and, at times, hilarious tour through the shadowlands of private spying and its inhabitants, a grab-bag collection of ex-intelligence operatives, former journalists and lost souls. In this hidden world, information is currency, double-crosses are commonplace, and hacking can be standard procedure. Drawing on his journalistic expertise and unique access to sources, Barry Meier uncovers the secrets private spies want to keep hidden.Inside British Intelligence: 100 Years of MI5 and MI6
Par Gordon Thomas. 2013
“Rollicking, readable new history of Britain’s famous spy organization.” —Los Angeles TimesA complete and up-to-date account of the two oldest…
and still the most powerful, secretive intelligence services in the world: MI5, the security service, and MI6, the secret intelligence service, which have been in existence for over a century. This is a story of spectacular triumphs, treachery, their frigid relationship, their untold work with the CIA, Mossad and the spy services of Europe, and their part in the fight against terror. It is also the story of two agencies led by men who are enigmatic, eccentric and controversial and who ruthlessly control their spies. From the unique partnership between Mossad and MI6, how MI5 and MI6 became a breeding ground for Soviet spies post-war, their exploitation of the collapse of the Soviet Union and their role in biological warfare, and including how both services monitor the spies of every nation based in London, it reads like fiction. But it’s not.Based on prodigious research and interviews with significant players Inside British Intelligence is packed with new and startling information.“An irresistible picture of an age of global terrorism, drug trafficking and economic warfare.” —Sunday Telegraph“ . . . a fascinating cast of moles and double agents, whistle-blowers and politicians. For the ambience of the closed world that inspired James Bond and George Smiley, this book is a winner.” —Publishers Weekly“A well-written page-turner.” —Kirkus Reviews“Thomas brings to the agencies histories a high level of expertise, a fluent style, accessible to lay reader and expert alike.” —BooklistBut I Trusted You: And Other True Cases (Ann Rule's Crime Files #14)
Par Ann Rule. 2009
In this chilling volume of New York Times bestselling author Ann Rule&’s Crime Files, discover unforgettable cases of a spouse,…
lover, family member or helpful stranger who is totally trusted—until it&’s too late.Whether driven to extreme violence by greed or jealousy, passion or rage, the calculating sociopaths in this true crime collection targeted those closest to them—unwitting victims whose last disbelieving words could well have been &“but I trusted you....&”Headlining this page-turning anthology is the case of middle-school counselor Chuck Leonard, found shot to death outside his Washington State home on an icy February morning. A complicated mix of family man and wild man, Chuck played hard and loved many...but who crossed the line by murdering him in cold blood? And why? The revelation is as stunning as the shattering crime itself, powerfully illuminating how those we think we know can ingeniously hide their destructive and homicidal designs.Along with other shocking cases, immaculately detailed and sharply analyzed by America&’s #1 true crime writer, this fourteenth Crime Files volume is essential reading for getting inside the mind of the hidden killers among us.But I Trusted You: And Other True Cases (Ann Rule's Crime Files #14)
Par Ann Rule. 2009
In this chilling volume of New York Times bestselling author Ann Rule&’s Crime Files, discover unforgettable cases of a spouse,…
lover, family member or helpful stranger who is totally trusted—until it&’s too late.Whether driven to extreme violence by greed or jealousy, passion or rage, the calculating sociopaths in this true crime collection targeted those closest to them—unwitting victims whose last disbelieving words could well have been &“but I trusted you....&”Headlining this page-turning anthology is the case of middle-school counselor Chuck Leonard, found shot to death outside his Washington State home on an icy February morning. A complicated mix of family man and wild man, Chuck played hard and loved many...but who crossed the line by murdering him in cold blood? And why? The revelation is as stunning as the shattering crime itself, powerfully illuminating how those we think we know can ingeniously hide their destructive and homicidal designs.Along with other shocking cases, immaculately detailed and sharply analyzed by America&’s #1 true crime writer, this fourteenth Crime Files volume is essential reading for getting inside the mind of the hidden killers among us.Beverly Hills Spy: The Double-Agent War Hero Who Helped Japan Attack Pearl Harbor
Par Ronald Drabkin. 1936
"A beguiling tale of espionage and double-dealing in the years leading up to World War II. ... Strap in for…
a narrative that demands a suspension of disbelief—and richly rewards it." —Kirkus Reviews (starred review); Best Books of February SelectionThe untold story of the World War I hero who became a fixture of high society in Golden Age Hollywood—all while acting as a double agent for the Japanese Empire as it prepared to attack Pearl HarborFrederick Rutland’s story is a rags-to-riches coup for the ages—a lower-class boy from England bootstraps his way up the ranks of the British military, becoming a World War I pilot, father of the modern aircraft carrier, cosmopolitan businessman, and Hollywood A-list insider. He oversaw this small empire from his mansion on the fabled Bird Streets of Beverly Hills. Snubbed for promotion in the Royal Air Force due to little more than jealousy and class politics, Rutland—to all appearances—continued to spin gold from straw, living an enviably lavish lifestyle that included butlers, wild parties, private clubs, and newsworthy living . . .. . . and it was all funded by the Japanese Empire.Beverly Hills Spy reveals the story of Rutland’s life of espionage on behalf of the Axis, selling secrets about fleet and aircraft design to the Japanese Imperial Navy that would be instrumental in its ability to attack Pearl Harbor, while collecting a salary ten times larger than the best-paid Japanese admirals. Based on recently declassified FBI files and until-now untranslated documents from Japanese intelligence, Ronald Drabkin brings the scope of this unforgettable tale into full focus for the first time. Rutland hides in plain sight, rubbing elbows with Amelia Earhart and hosting galas and fundraisers with superstars like Charlie Chaplin and Boris Karloff, while simultaneously passing information to Japan through spy networks across North and Central America. Countless opportunities to catch Rutland in the act are squandered by the FBI, British Intelligence, and US Naval Intelligence alike as he uses his cunning and charm to misdirect and cast shadows of doubt over his business dealings, allowing him to operate largely unfettered for years.In the end, whether he fully intends to or not, Rutland sets in motion world events that are so monumental, their consequences are still being felt today.Beverly Hills Spy is a masterpiece of research on spy craft, a shocking narrative about an unknown but pivotal figure in history, and brings new information to light that helps us understand how Pearl Harbor happened—and how it could have been prevented.In True Face: A Woman's Life in the CIA, Unmasked
Par Jonna Mendez. 2024
The bestselling coauthor of The Moscow Rules and Argo tells her riveting, courageous story of being a female spy at…
the height of the Cold War Jonna Hiestand Mendez began her CIA career as a &“contract wife&” performing secretarial duties for the CIA as a convenience to her husband, a young officer stationed in Europe. She needed his permission to open a bank account or shut off the gas to their apartment. Yet Mendez had a talent for espionage, too, and she soon took on bigger and more significant roles at the Agency. She parlayed her interest in photography into an operational role overseas, an unlikely area for a woman in the CIA. Often underestimated, occasionally undermined, she lived under cover and served tours of duty all over the globe, rising first to become an international spy and ultimately to Chief of Disguise at CIA&’s Office of Technical Service.In True Face recounts not only the drama of Mendez&’s high-stakes work—how this savvy operator parlayed her &“everywoman&” appeal into incredible subterfuge—but also the grit and good fortune it took for her to navigate a misogynistic world. This is the story of an incredible spy career and what it took to achieve it.The dramatic story of how the superpowers collected secrets and used intelligence to build an advantage during the Cold War,…
the longest and most dangerous confrontation of the twentieth century.The Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers maneuvering for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organizations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organizations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and ‘cloak and dagger’, the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.Before Bletchley Park: The Codebreakers of the First World War
Par Paul Gannon. 2022
The story of Bletchley Park’s codebreaking operations in the Second World War is now well known, but its counterparts in…
the First World War – Room 40 & MI1(b) – remain in the shadows, despite their involvement in and influence on most of the major events of that war. From the First Battle of the Marne, the shelling of Scarborough, the battles of Jutland and the Somme in 1916, to the battles on the Western Front in 1918, the German naval mutiny and the Zimmermann Telegram, this cast of characters – several of them as eccentric as anyone from Bletchley Park in the Second World War – secretly guided the outcome of the ‘Great War’ from the confines of a few smoke-filled rooms.Using hundreds of intercepted and decrypted German military, naval and diplomatic messages, bestselling author Paul Gannon reveals the fascinating story of British codebreaking operations. By drawing on many newly discovered archival documents that challenge misleading stories about Room 40 & MI1(b), he reveals a sophisticated machine in operation.The Last Cambridge Spy: John Cairncross, Bletchley Park Mole and Soviet Agent
Par Chris Smith. 2019
‘A riveting read.’ – Professor Richard Aldrich‘The Last Cambridge Spy is not just a fascinating, well-paced book about an interesting…
individual, but it also invites us to re-appraise the very idea of the “Cambridge spy ring”.’ – Sir Dermot TuringJohn Cairncross was among the most damaging spies of the twentieth century. A member of the infamous Cambridge Ring of Five, he leaked highly sensitive documents from Bletchley Park, MI6 and the Treasury to the Soviet Union – including the first atomic secrets and raw decrypts from Enigma and Tunny that influenced the outcome of the Battle of Kursk in 1943.In 2014, Cairncross appeared as a secondary, though key, character in the biopic of Alan Turing’s life, The Imitation Game. While the other members of the Cambridge Ring of Five have been the subject of extensive biographical study, Cairncross has largely been overlooked by both academic and popular writers. Despite clear interest, he has remained a mystery – until now.The Last Cambridge Spy is the first ever biography of John Cairncross, using recently released material to tell the story of his life and espionage.The Spy Beside the Sea: The Extraordinary Wartime Story of Dorothy O'Grady
Par Adrian Searle. 2012
Dorothy O’Grady is uniquely placed in the annals of espionage. She was the first Briton condemned to death under the…
Treachery Act of 1940 after she was frequently spotted on the outskirts of Sandown (a prohibited area on the Isle of Wight), insisting time and again that her dog had strayed. Had her appeal not saved her from the gallows, she would have been the only woman of any nationality to suffer death under the Act during the Second World War – indeed, the only woman to be executed in Britain for spying in the 20th century. Yet the full story of her extraordinary brush with notoriety and its enduring legacy has never been told, despite the fact that it has more than once dominated the front pages of the British press and inspired both a BBC radio drama and a novel. Now, with the benefit of access to previously classified documents, the truth underpinning the O’Grady legend can finally be revealed. Following her appeal she served nine years in prison for her wartime crimes – but was she really a spy in the employ of Germany? Or was O'Grady, as she insisted years later, a self-seeking tease who committed her apparent treachery ‘for a giggle’? Or was there some other motivation which drove her to wartime infamy in a case which reverberated around the world? In The Spy Beside the Sea, author and journalist Adrian Searle examines all the evidence to reach a disturbing conclusion.Dimensions of Counter-insurgency: Applying Experience to Practice
Par Tim Benbow and Rod Thornton. 2008
The once-neglected study of counter-insurgency operations has recently emerged as an area of central concern for Western governments and their…
military organizations. While counter-insurgency represents a hugely challenging form of contemporary warfare, there exists a considerable body of experience that offers assistance in the form of examples ofThe Ethics of National Security Intelligence Institutions: Theory and Applications (Studies in Intelligence)
Par Adam Henschke, Seumas Miller, Andrew Alexandra, Patrick F. Walsh, Roger Bradbury. 2024
This book explores the ethics of national security intelligence institutions operating in contemporary liberal democracies.Intelligence collection by agencies such as…
the CIA, MI6, and Mossad involves practices that are apparently inconsistent with the principles of ordinary morality – practices such as lying, spying, manipulation, and covert action. However, in the defence of national security, such practices may not only be morally permissible, but may also under some circumstances be morally obligatory. One approach to the ethics of national security intelligence activity has been to draw from the just war tradition (so-called ‘just intelligence theory’). This book identifies significant limitations of this approach and offers a new, institutionally based, teleological normative framework. In doing so, it revises some familiar principles designed for application to kinetic wars, such as necessity and proportionality, and invokes some additional ones, such as reciprocity and trust. It goes on to explore the applications of this framework and a revised set of principles for national security intelligence institutions and practices in contemporary and emerging political and technological settings.This book will be of much interest to students of intelligence studies, ethics, security studies and International Relations.