Skip to main content

Abstract

The impact of Edward Snowden’s leaks underscore profound unresolved ethical and policy issues relating to post 9/11 electronically enabled intelligence collection in liberal democracies. In this chapter, six different ‘impacts’ are used as a frame to assess the future of whistle blowers post Snowden and the role technology will play in both the hindering and/or facilitating the leaking of security intelligence collection. In other words, from a policy perspective, what role will technology play in facilitating or restraining ‘future Snowdens’ in revealing state secrets?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A full original version of the USA Patriot Act which has been amended and extended several times during the Bush Administration can be found in, ODNI (2009). Intelligence Community Legal Reference Book. Office of General Counsel, ODNI Washington DC, 451–489.

  2. 2.

    ASIO or the Australian Security Intelligence Organisation is Australia’s domestic intelligence service similar in many ways to the UK’s MI5. The AFP or Australian Federal Police is Australia’s national police force with the responsibility of investigating serious national and international crimes.

Bibliography

  • 9/11 Commission (2004) The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: 9/11 Commission.

    Google Scholar 

  • Aid, Matthew (2015) ‘Prometheus Embattled. A Post 9/11 Report Card on the National Security Agency’ in Loch Johnson (ed.) Essentials of Strategic Intelligence, Santa Barbara: Praeger Security International Textbook, pp. 417–446.

    Google Scholar 

  • Cassidy, John (2013) ‘Why Edward Snowden is a Hero’, The New Yorker, 10 June. http://www.newyorker.com/news/john-cassidy/why-edward-snowden-is-a-hero

  • Clarke, Robert A et al (2013) ‘Liberty and Security in a Changing World’. Report and Recommendations of the President’s Review Group on Intelligence and Communications Technologies, Washington, DC.

    Google Scholar 

  • Council of Foreign Relations (2015) ‘USA Freedom Act of 2015,’ Council of Foreign Relations, 2 June. www.cfr.org/international/usa-freedom-act-2015/p36594

  • D’Isidoro, Daniel (2014) ‘Protecting Whistleblowers and Secrets in the Intelligence Community’, Harvard National Security Journal (online), 29 September.

    Google Scholar 

  • Dershowitz, Alan et al. (2015) ‘Warrantless Wiretaps’ in Loch Johnson and James Wirtz (eds.) Intelligence: The Secret World of Spies. An Anthology, fourth edition, Oxford: Oxford University Press.

    Google Scholar 

  • Ellsberg, David (2010) ‘Secrecy and National Security Whistleblowing,’ Social Research, 77, pp. 773–804.

    Google Scholar 

  • George, Roger and Rishikof, Harvey (2011) The National Security Enterprise, Washington, DC: Georgetown University Press.

    Google Scholar 

  • Gill, Peter and Phythian, Mark (2006) Intelligence in an Insecure World, Cambridge: Polity Press.

    Google Scholar 

  • Greenwald, Glenn (2014) No Place to Hide. Edward Snowden, the NSA and the Surveillance State, London: Hamish Hamilton.

    Google Scholar 

  • Johnson, Loch (2014) ‘An INS Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, 29(6), pp. 793–810.

    Article  Google Scholar 

  • Kagiaros, Dimitrios (2015) ‘Protecting National Security Whistleblowers in the Council of Europe: An Evaluation of Three Approaches on How to Balance National Security with Freedom of Expression’, The International Journal of Human Rights, 19(4), pp. 404–428.

    Article  Google Scholar 

  • Ludlow, Peter (2013) ‘The Banality of Systemic Evil’, New York Times, September 15. http://opinionator.blogs.nytimes.com/2013/09/15/the-banality-of-systemic-evil/?_r=0

  • Mazetti, Mark and Schmidt, (2013) ‘Michael Ex Worker at CIA Says He Leaked Data on Surveillance’, New York Times, June 9, A1.

    Google Scholar 

  • ODNI (2009) Intelligence Community Legal Reference Book Office of General Counsel. Washington DC: ODNI.

    Google Scholar 

  • Paquette, Laure (2013) ‘‘The Whistleblower as Underdog: What Protection Can Human Rights Offer in Massive Secret Surveillance?’, The International Journal of Human Rights, 17(7–8), pp. 796–809.

    Article  Google Scholar 

  • Perry, Rodney (2014) Intelligence Whistleblower Protections: In Brief, CRS Report RL43765, Congressional Research Service, October 2014.

    Google Scholar 

  • Podesta, John et al. (2015) Executive Office Report. Big Data: Seizing Opportunities, Preserving Values, Washington, DC: The White House, pp. 1–36.

    Google Scholar 

  • Richards, Julian (2012) ‘Intelligence Dilemma? Contemporary Counter-Terrorism in a Liberal Democracy’, Intelligence and National Security, 27(5), pp. 761–780.

    Article  Google Scholar 

  • Ries, Brian (2014) ‘Edward Snowden Is a # Patriot, Twitter Say’, Mashable Australia, May 30.

    Google Scholar 

  • Sangar, David (2014) ‘NSA Releases Email that It Says Undercuts Snowden’s Whistleblow Claims,’ The New York Times, May 30, A4.

    Google Scholar 

  • Seifert, James (2008) Data Mining and Homeland Security, CRS Report RL31798, Congressional Research Service, April 2008.

    Google Scholar 

  • Smith, Gerry (2013) ‘NSA Chief: Solution to Stopping the Next Snowden Is Replacing His Former Job with a Machine’, Huffington Post, 9 August.

    Google Scholar 

  • Toobin, Jeffrey (2013) ‘Edward Snowden is No Hero’, The New Yorker, 10 June. http://www.newyorker.com/news/daily-comment/edward-snowden-is-no-hero

  • Walsh, Patrick F (2011) Intelligence and Intelligence Analysis, Abingdon: Routledge.

    Google Scholar 

  • Walsh, Patrick F (2016) ‘Making Future Leaders in the US Intelligence Community: Challenges and Opportunities’, Intelligence and National Security, pp. 1–19

    Google Scholar 

  • Walsh, Patrick F and Miller Seumas 2016 ‘Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden’, Intelligence and National Security, 31(3) pp.345–368.

    Article  Google Scholar 

  • Warner, Michael (2015) ‘Technology and Intelligence’ in Loch Johnson and James Wirtz (eds.) Intelligence: The Secret World of Spies. An Anthology, fourth edition, Oxford: Oxford University Press, pp. 93–106.

    Google Scholar 

  • Williams, George (2011) ‘A Decade of Australian Anti-Terror Laws’, Melbourne University Law Review, 35, pp. 1137–1151.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick F. Walsh .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Walsh, P.F. (2017). Securing State Secrets. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_10

Download citation

Publish with us

Policies and ethics