Skip to main content

Democracy and Ethics vs. Intelligence and Security: From WikiLeaks to Snowden

  • Chapter
  • First Online:
Democracy and an Open-Economy World Order

Abstract

From an academic point of view, the topic of this chapter is placed within the domain of Intelligence Studies which is a sub-field of International Relations and Strategic Studies. Although the domain of intelligence has been characterized in the past as a “missing” and an “underdeveloped and under-theorized” dimension (Andrew and Dilks 1984: 1; Jervis 2007: xix; Scott and Jackson 2004: 1), nowadays intelligence literature has mushroomed, its quality has been considerably improved and it is an established, dynamic and legitimate interdisciplinary field of scholarship (Gibbs 2007: 58; Konstantopoulos and Doga 2015; Rudner 2009: 111; Stafford 1988: 238).

The research for this essay has been partly supported by the University of Piraeus Research Center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For the development of Intelligence Studies, as well as their research methods, see selectively: Davies and Gustafson (2013), Johnson (2007a, b), Scott and Jackson (2004).

  2. 2.

    Notable exceptions are: Goldman (2006, 2010).

  3. 3.

    For the concept of security see: Baylis (2005), Buzan (1991a, b), Sheehan (2005).

  4. 4.

    Marina Caparini assumes that management and control is part of oversight, while Ian Leigh thinks that oversight is something looser than pure management.

  5. 5.

    Those reports can be addressed to the entire parliament or to a group of deputies representing the various political parties, or to the presidium and their publication can be allowed or prohibited.

  6. 6.

    For the role of ethics in international relations and strategy see: Frost (1996), Gismondi (2008), Hayden (2009), Johnson and Patterson (2015), Lucas (2015), Moellendorf and Widdows (2015), Rosenthal and Barry (2009), Walzer (1992).

  7. 7.

    Assange was granted political asylum from the government of Ecuador and is confined in its Embassy in London.

  8. 8.

    In August 2013, Manning received a 35 years prison sentence for violating the Espionage Act Barkley (2014): 36, West (2015): 199, 214. For his case see: Nicks (2012).

  9. 9.

    Etzioni (2015): 119, Landau (2013): 66.

  10. 10.

    MacAskill et al. (2013).

  11. 11.

    For more details about Snowden’s story, see: Greenwald (2014), Harding (2014).

  12. 12.

    NSA was listening to the conversations of over 35 world leaders Easley (2014).

  13. 13.

    For economic espionage in general see: Fialka (1997), Konstantopoulos (2010a, b), Luong (2007), Porteous (1998).

References

  • Andrew, C., & Dilks, D. (1984). The missing dimension: Governments and intelligence communities in the twentieth century. Urbana, IL: University of Illinois Press.

    Book  Google Scholar 

  • Barkley, J. A. (2014). Intelligence leaks: What is the role of the leak and the leaker in U.S. democracy? Thesis, Naval Postgraduate School, Monterey California.

    Google Scholar 

  • Bartlett, B. (2013, June 14). Is PRISM’s ‘big data’ about big money? The Fiscal Times. http://www.thefiscaltimes.com/Columns/2013/06/14/Is-PRISMs-Big-Data-about-Big-Money

  • Baylis, J. (2005). International and global security in the post-cold war era. In J. Baylis & S. Smith (Eds.), The globalization of world politics: An introduction to international relations. Oxford, NY: Oxford University Press.

    Google Scholar 

  • BBC News. (2014, January 26). NSA ‘engaged in industrial espionage’—Snowden. http://www.bbc.com/news/25907502

  • Betts, R. C. (2007). Enemies of intelligence: Knowledge and power in American national security. New York: Columbia University Press.

    Google Scholar 

  • Booth, K. (1979). Strategy and ethnocentrism. New York: Holmes, Meier Publishers.

    Google Scholar 

  • Born, H., Leigh, I. (2005). Making intelligence accountable: Legal standards and best practice for oversight of intelligence agencies. Oslo: Publishing House of the Parliament of Norway. http://www.dcaf.ch/Publications/Making-Intelligence-Accountable

  • Born, H., & Leigh, I. (2006). Democratic accountability of intelligence services. SIPRI Yearbook 2006, Security and conflicts.

    Google Scholar 

  • Brem, S. (2009). Special ethics for special services. A symposium on intelligence ethics. Intelligence and National Security, 24, 366–386.

    Article  Google Scholar 

  • Bruneau, T. C. (2001). Controlling intelligence in new democracies. International Journal of Intelligence and Counter Intelligence, 14, 323–341.

    Article  Google Scholar 

  • Bruneau, T. C., & Dombroski, K. R. (2006). Reforming intelligence: The challenge of control in new democracies. In T. C. Bruneau & C. D. Tollefson (Eds.), Who guards the guardians and how: Democratic civil-military relations. Austin: University of Texas Press.

    Google Scholar 

  • Bruneau, T. C., Dombroski, K. R. (2011). Reforming intelligence: The challenge of control in new democracies. http://www2.warwick.ac.uk/fac/soc/pais/people/aldrich/vigilant/bruneau.pdf

  • Buzan, B. (1991a). People, states and fear: An agenda for international security studies in the post-cold war era. London: Harvester Wheatsheaf.

    Google Scholar 

  • Buzan, B. (1991b). Is international security possible? In K. Booth (Ed.), New thinking about strategy and international security. London: Routledge.

    Google Scholar 

  • Caparini, M. (2007). Controlling and overseeing intelligence services in democratic states. In H. Born & M. Caparini (Eds.), Democratic control of intelligence services: Containing Rogue Elephants. Hampshire: Ashgate.

    Google Scholar 

  • Castronovo, R. (2013). State secrets: Ben Franklin and WikiLeaks. Critical Inquiry, 39, 425–450.

    Article  Google Scholar 

  • Chan, N. (2011). WikiLeaks: Counting the costs and consequences. https://www.timeshighereducation.com/news/wikileaks-counting-the-costs-and-consequences/415008.article

  • Cwele, S. C. (2007). Parliamentary intelligence oversight in practice: The qualities and roles of members and the chairperson of the committee. In Review committee on the intelligence and security services (CTIVD). Nijmegen: Faculty of Law Radboud University.

    Google Scholar 

  • Davies, P. H. J., & Gustafson, K. C. (2013). Intelligence elsewhere: Spies and espionage outside the Anglosphere. Washington, DC: Georgetown University Press.

    Google Scholar 

  • DCAF Backgrounder. (2006, March). Parliamentary oversight of intelligence services. Geneva: Centre for the Democratic Control of Armed Forces.

    Google Scholar 

  • Donahue, P. (2014, January 26). Snowden says “no doubt” NSA engages in industrial spying. Bloomberg Businessweek. http://www.bloomberg.com/news/articles/2014-01-27/snowden-says-no-doubt-nsa-engages-in-industrial-spying

  • Easley, L. E. (2014). Spying on allies. Survival, 56, 141–156.

    Article  Google Scholar 

  • Eijkman, Q., & Weggemans, D. (2013). Open source intelligence and privacy dilemmas: Is it time to reassess state accountability? Security and Human Rights, 23, 285–296.

    Article  Google Scholar 

  • Erskine, T. (2004). As rays of light to the human soul? Moral agents and intelligence gathering. Intelligence and National Security, 19, 359–381.

    Article  Google Scholar 

  • Etzioni, A. (2015). NSA: National security vs. individual rights. Intelligence and National Security, 30, 100–136.

    Article  Google Scholar 

  • Farson, S., & Whitaker, R. (2007). Democratic deficit be damned: The executive use of legislators to scrutinize national security in Canada. In L. K. Johnson (Ed.), Strategic intelligence: Intelligence and the quest of security: Understanding the hidden side of government (Vol. 1). Westport, CT: Praeger Security International.

    Google Scholar 

  • Fialka, J. J. (1997). War by other means: Economic espionage in America. London: W.W. Norton.

    Google Scholar 

  • Frost, M. (1996). Ethics in international relations: A constitutive theory. Cambridge, NY: Cambridge University Press.

    Book  Google Scholar 

  • Gibbs, T. (2007). Studying intelligence: A British perspective. In L. K. Johnson (Ed.), Strategic intelligence and the quest for security: Understanding the hidden side of government (Vol. 1). Westport, CT: Praeger Security International.

    Google Scholar 

  • Gill, P. (2007). Evaluating intelligence oversight committees: The UK intelligence and security committee and the ‘war on terror’. Intelligence and National Security, 22, 14–37.

    Article  Google Scholar 

  • Gill, P. (2009). The intelligence and security committee and the challenge of security networks. Review of International Studies, 35(4), 929–941.

    Article  Google Scholar 

  • Gismondi, M. D. (2008). Ethics, liberalism and realism in international relations. London: Routledge.

    Google Scholar 

  • Godson, R. (2001). Dirty tricks or trump cards: U.S. covert action, counterintelligence. New Brunswick: Transaction Publishers.

    Google Scholar 

  • Goldman, J. (2006). Ethics of spying: A reader for the intelligence professional. Lanham: The Scarecrow Press.

    Google Scholar 

  • Goldman, J. (2009). Ethics phobia and the US intelligence community: Just say ‘no’. Intelligence and National Security, 24, 366–386.

    Article  Google Scholar 

  • Goldman, J. (2010). Ethics of spying: A reader for the intelligence professional (Vol. 2). Lanham: The Scarecrow Press.

    Google Scholar 

  • Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA and the U.S. surveillance state. London: Penguin Books.

    Google Scholar 

  • Harding, L. (2014). The Snowden files: The inside story of the world’s most wanted man. New York: Vintage Books.

    Google Scholar 

  • Hayden, P. (2009). The Ashgate research companion to ethics and international relations. Surrey: Ashgate.

    Google Scholar 

  • Hayden, M. V. (2016). Playing to the edge: American intelligence in the age of terror. New York: Penguin Press.

    Google Scholar 

  • Hecking, C. (2013, July 23). German firms fear industrial espionage after Snowden leaks. Spiegel. http://www.spiegel.de/international/germany/german-firms-fear-industrial-espionage-after-snowden-leaks-a-912624.html

  • Herman, M. (2004). Ethics and intelligence after September 2001. Intelligence and National Security, 19, 342–358.

    Article  Google Scholar 

  • IISS. (2011). WikiLeaks: The price of sharing data. Strategic Comments, 17, 1–3.

    Google Scholar 

  • Jervis, R. (2007). Foreword: Intelligence, civil-intelligence relations, and democracy. In T. C. Bruneau & S. C. Boraz (Eds.), Reforming intelligence: Obstacles to democratic control and effectiveness. Austin: University of Texas Press.

    Google Scholar 

  • Johnson, L. K. (2007a). Strategic intelligence and the quest for security. Westport, CT: Praeger Security International.

    Google Scholar 

  • Johnson, L. K. (2007b). Handbook of intelligence studies. London: Routledge.

    Google Scholar 

  • Johnson, L. K. (2008). Ostriches, cheerleaders, skeptics, and guardians: Role selection by congressional intelligence overseers. SAIS Review, 28, 93–108.

    Google Scholar 

  • Johnson, L. K. (2009). Ethical intelligence: A contradiction in terms? Intelligence and National Security, 24, 366–386.

    Article  Google Scholar 

  • Johnson, L. K. (2014). An INS special forum: Implications of the Snowden leaks. Intelligence and National Security, 29(6), 793–810.

    Article  Google Scholar 

  • Johnson, L. K. (2015). A conversation with James R. Clapper, Jr., the director of national intelligence in the United States. Intelligence and National Security, 30, 1–25.

    Article  Google Scholar 

  • Johnson, J. T., & Patterson, E. D. (2015). The Ashgate research companion to military ethics. Surrey: Ashgate.

    Google Scholar 

  • Jones, A. (2016, April 2). IMF predicts Greek default will coincide with EU referendum, claims WikiLeaks. Independent. http://www.independent.co.uk/news/world/europe/imf-predicts-greek-default-will-coincide-with-eu-referendum-claims-wikileaks-a6964676.html

  • Kent, S. (1949). Strategic intelligence for American world policy. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Kirschbaum, E. (2014, January 26). Snowden says NSA engages in industrial espionage. TV, Reuters. http://www.reuters.com/article/us-security-snowden-germany-idUSBREA0P0DE20140126

  • Konstantopoulos, I. L. (2010b). Europe–USA relations: The phenomenon of economic espionage among allies. In Y. A. Stivachtis (Ed.), The new Europe: Politics, economics, and foreign relations. Athens: Athens Institute for Education and Research.

    Google Scholar 

  • Konstantopoulos, I. L. (2010a). Macroeconomic espionage: Incentives and disincentives (RIEAS, Research Paper, No. 143).

    Google Scholar 

  • Konstantopoulos, I. L., & Doga, A. M. (2015). The (r)evolution of intelligence as an academic discipline: Challenges and constraints. Journal of Mediterranean and Balkan Intelligence, 5(1).

    Google Scholar 

  • Krause, L., & Nye, J. S. (1975). Reflections on the economics and politics of international economic organizations. International Organization, 29, 323–342.

    Article  Google Scholar 

  • Landau, S. (2013). Making sense from Snowden: What’s significant in the NSA surveillance revelations. IEEE Security and Privacy, 11, 66–75.

    Google Scholar 

  • Lathrop, C. E. (2004). The literary spy: The ultimate source for quotations on espionage, intelligence. New Haven: Yale University Press.

    Google Scholar 

  • Leigh, I. (2005). More closely watching the spies: Three decades of experiences. In H. Born, L. K. Johnson, & I. Leigh (Eds.), Who’s watching the spies: Establishing intelligence service accountability. Washington, DC: Potomac Books.

    Google Scholar 

  • Lowenthal, M. (2003). Intelligence: From secrets to policy (2nd ed.). Washington, DC: CQ Press.

    Google Scholar 

  • Lucas, G. (2015). Routledge handbook of military ethics. London: Routledge.

    Google Scholar 

  • Luong, M. A. (2007). Global economic espionage: An ancient art, now a science. In L. K. Johnson (Ed.), Strategic intelligence and the quest for security, vol 2: The intelligence cycle: The flow of secret information from overseas to the highest councils of government. Westport, CT: Praeger Security International.

    Google Scholar 

  • MacAskill, E., Borger, J., Hopkins, N., & Ball, J. (2013, June). GCHQ taps fibre-optic cables for secret access to world’s communications. The Guardian. http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

  • Matei, F. C., & Bruneau, T. (2011). Intelligence reform in new democracies: Factors supporting or arresting progress. Democratization, 18, 602–630.

    Article  Google Scholar 

  • Moellendorf, D., & Widdows, H. (Eds.). (2015). The Routledge handbook of global ethics. London: Routledge.

    Google Scholar 

  • Morrison, J. N. L. (2007). Political supervision of intelligence services in the United Kingdom. In S. Tsang (Ed.), Intelligence and human rights in the era of global terrorism. Westport, CT: Praeger Security International.

    Google Scholar 

  • New Europe. (2015). WikiLeaks: NSA performed economic espionage in France. https://neurope.eu/article/wikileaks-nsa-performed-economic-espionage-in-france/

  • Nicks, D. (2012). Private Bradley Manning, WikiLeaks, and the biggest exposure of official secrets in American history. Chicago: Chicago Review Press.

    Google Scholar 

  • Omand, D., & Phythian, M. (2013). Ethics and intelligence: A debate. International Journal of Intelligence and Counter Intelligence, 26, 38–63.

    Article  Google Scholar 

  • Ott, M. C. (2003). Partisanship and the decline of intelligence oversight. International Journal of Intelligence and Counter Intelligence, 16, 69–94.

    Article  Google Scholar 

  • Paganini, P. (2015, July 03). Wikileaks: NSA spying on top German officials for economic reasons. Security Affairs. http://securityaffairs.co/wordpress/38273/intelligence/nsa-spying-german-officials.html

  • Page, M., & Spence, J. E. (2011). Open secrets questionably arrived at: The impact of WikiLeaks on diplomacy. Defence Studies, 11, 234–243.

    Article  Google Scholar 

  • Platias, A. G., & Koliopoulos, C. (2010). Thucydides on strategy: Athenian and Spartan grand strategies in the Peloponnesian war and their relevance today. New York: Columbia University Press.

    Google Scholar 

  • Porteous, S. D. (1998). Economic and commercial interests and intelligence services. In E. H. Potter (Ed.), Economic intelligence and national security. Ottawa: Carleton University Press.

    Google Scholar 

  • Quinlan, M. (2007). Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security, 22, 1–13.

    Article  Google Scholar 

  • Risen, J., & Poitras, L. (2014, Feburary 15). Spying by N.S.A. ally entangled U.S. law firm. The New York Times. http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html?_r=0

  • Roberts, A. (2011). The WikiLeaks illusion. Wilson Quarterly, 35, 16–21.

    Google Scholar 

  • Rosenthal, J. H., & Barry, C. (2009). Ethics and international affairs: A reader (3rd ed.). Washington, DC: Georgetown University Press.

    Google Scholar 

  • Rudner, M. (2009). Intelligence studies in higher education: Capacity-building to meet societal demand. International Journal of Intelligence and Counter Intelligence, 22, 110–130.

    Article  Google Scholar 

  • Scott, L., & Jackson, P. (2004). Journeys in shadows. In L. V. Scott & P. D. Jackson (Eds.), Understanding intelligence in the twenty-first century: Journeys in shadows. London: Routledge.

    Google Scholar 

  • Sheehan, M. (2005). International security: An analytical survey. Boulder: Lynne Rienner Publishers.

    Google Scholar 

  • Shelton, A. M. (2011). Framing the oxymoron: A new paradigm for intelligence ethics. Intelligence and National Security, 26, 23–45.

    Article  Google Scholar 

  • Shpiro, S. (2009). Intelligence ethics in Israel: Why do we need intelligence ethics? Intelligence and National Security, 24, 366–386.

    Article  Google Scholar 

  • Shulsky, A. N., & Schmitt, G. J. (2002). Silent warfare: Understanding the world of intelligence (3rd ed.). Washington, DC: Potomac Books.

    Google Scholar 

  • Sifri, M. L. (2011). WikiLeaks and the age of transparency. New York: OR Books.

    Google Scholar 

  • Smith, M. J. (1986). Realist thought from Weber to Kissinger. Baton Rouge: Louisiana State University Press.

    Google Scholar 

  • Snow, B. (2009). Intelligence community ‘mission ethics’. Intelligence and National Security, 24, 366–386.

    Article  Google Scholar 

  • Springer, S., Chi, H., Crampton, J., McConell, F., Cupples, J., Glynn, K., Warf, B., & Attewell, W. (2012). Leaky geopolitics: The ruptures and transgressions of WikiLeaks. Geopolitics, 17, 681–711.

    Article  Google Scholar 

  • Stafford, T. T. (1988). Assessing current intelligence studies. International Journal of Intelligence and Counter Intelligence, 2, 217–244.

    Article  Google Scholar 

  • Steinmetz, K. F. (2012). WikiLeaks and realpolitik. Journal of Theoretical and Philosophical Criminology, 4, 14–52.

    Google Scholar 

  • Strategic Policy Issues. (2014). Security and privacy in the cyber-domain. Strategic Survey, 114, 31–64.

    Article  Google Scholar 

  • Thompson, T. J. (2014). Toward an updated understanding of espionage motivation. International Journal of Intelligence and Counter Intelligence, 27, 58–72.

    Article  Google Scholar 

  • Turner, M. A. (2005). Why secret intelligence fails. Dulles, VA: Potomac Books.

    Google Scholar 

  • Walzer, M. (1992). Just and unjust wars: A moral argument with historical illustrations. New York: Basic Books.

    Google Scholar 

  • Warner, M. (2002). Wanted: A definition of ‘intelligence’. Studies in Intelligence, 46, 15–22.

    Google Scholar 

  • Warner, M. (2013). Fragile and provocative: Notes on secrecy and intelligence. Intelligence and National Security, 27, 223–240.

    Article  Google Scholar 

  • Washington’s Blog. (2013). NSA busted conducting industrial espionage in France, Mexico, Brazil, China and all around the world. http://www.washingtonsblog.com/2013/10/nsa-busted-conducting-industrial-espionage-in-france-mexico-brazil-and-other-countries.html

  • West, N. (2015). Historical dictionary of international intelligence. Lanham: Rowman, Littlefield.

    Google Scholar 

  • WikiLeaks, & Assange, J. (2015). The WikiLeaks files: The world according to US empire. London: Verso.

    Google Scholar 

  • Wills, A., & Vermeulen, M. (2011). Parliamentary oversight of security and intelligence agencies in the European Union, study. Directorate General for Internal Policies, Policy Department C. Citizens’ Rights and Constitutional Affairs (PE 453.207).

    Google Scholar 

  • Xinbo, W. (2014). Agenda for a new great power relationship. The Washington Quarterly, 37, 65–78.

    Article  Google Scholar 

  • Zamora, M. F. (2014). Intelligence failures: Matters of homeland and national security. Journal of Homeland and National Security Perspectives, 1, 49–65.

    Google Scholar 

Download references

Acknowledgments

I would like to thank Professor Athanassios G. Platias and Assistant Professor Andrew N. Liaropoulos, both at the University of Piraeus, as well as Dr. Markos Troulis, Postdoctoral Researcher at the University of Piraeus and Miss Alexandra Doga, PhD Candidate at Panteion University, for their insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ioannis L. Konstantopoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Konstantopoulos, I.L. (2017). Democracy and Ethics vs. Intelligence and Security: From WikiLeaks to Snowden. In: Bitros, G., Kyriazis, N. (eds) Democracy and an Open-Economy World Order. Springer, Cham. https://doi.org/10.1007/978-3-319-52168-8_1

Download citation

Publish with us

Policies and ethics