Skip to main content
  • 2331 Accesses

Abstract

There is a debate to be had on whether or not intelligence can be carried out ethically and what this would look like. What activities should be involved, who should be targeted, what the balance between the harm to the individual versus protecting the wider political community should be and what obligations – if any – do intelligence actors have to those outside the state are all key ethical questions that need to be addressed. This chapter focuses on these issues, concluding that trust between the people, the government and its institutions is vital if the state wishes to continue. In particular, it addresses some of the key concerns that intelligence activity might give rise to as well as some of main ways of discussing whether or not we should or could find them justified. These tools represent the first step in establishing a clear set of ethical intelligence activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • Anderson, David (2015) A Question of Trust: Report of the Investigatory Powers Review Available at https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Print-Version.pdf Accessed 1/7/15.

  • Bellaby, Ross (2014) The Ethics of Intelligence: A New Framework, London: Routledge.

    Google Scholar 

  • Bennetto, Jason (2009) ‘Police and Racism: What Has Been Achieved 10 Years After the Stephen Lawrence Inquiry Report? London: Equality and Human Rights Commission Available at http://www.equalityhumanrights.com/sites/default/files/uploads/documents/policeandracism.pdf Accessed 1/7/2015.

  • Brown, Chris, Nardin, Terry and Rengger, Nicholas eds. (2002) International Relations in Political Thought, Cambridge: Cambridge University Press.

    Google Scholar 

  • Bufacchi, Vittorio and Arrigo, Jean Maria (2006) ‘Torture, Terrorism and the State: A Refutation of the Ticking-Bomb Argument’ Journal of Applied Philosophy, 23. 3, 2006. pp. 355–373.

    Google Scholar 

  • Clark, Ian (1988) Waging War: A Philosophical Introduction, Oxford: Clarendon.

    Google Scholar 

  • Costanzo, Mark and Gerrity, Ellen (2009) ‘The Effects and Effectiveness of Using Torture as an Interrogation Device: Using Research to Inform the Policy Debate’ Social Issues and Policy Review, 3. 1, 2009. pp. 179–210.

    Google Scholar 

  • Darwell, Stephen (2002) Deontology, Oxford: Blackwell.

    Google Scholar 

  • Davidson, Donald (1983) Nuclear Weapons and the American Churches, Colorado: Westview Press.

    Google Scholar 

  • Dershowitz, Alan (2002) Why Terrorism Works: Understanding the Threat, Responding to the Challenge, New Haven: Yale University Press.

    Google Scholar 

  • Dimock, Michael (2006) ‘Few See Adequate Limits on NSA Surveillance Program but More Approve than Disapprove’ Pew Research Center Available at http://www.people-press.org/2013/07/26/few-see-adequate-limits-on-nsa-surveillance-program/ Accessed 1/7/2015.

  • Dulles, Allen (2006) The Craft of Intelligence: America’s Legendary Spy Master on the Fundamentals of Intelligence Gathering in a Free World, Guildford: Lyons Press.

    Google Scholar 

  • Erskine, Toni (2004) ‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering’ Intelligence and National Security, 19. 2, 2004.

    Google Scholar 

  • Foucault, Michael (1979) Discipline and Punish: The Birth of the Prison, Harmondsworth: Penguin.

    Google Scholar 

  • Fried, Charles (1969) ‘Privacy: A Moral Analysis’ Yale Law Review, 77, 1969.

    Google Scholar 

  • Fried, Charles (1978) Right and Wrong, Harvard University Press.

    Google Scholar 

  • Gandy, Oscar (2003) ‘Data Mining and Surveillance in the Post 9/11 Environment’ In The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age edited by K. Bell and F. Webster, London: Pluto Press.

    Google Scholar 

  • Gross, Hyman (1971) ‘Privacy and Autonomy’ In Privacy: Nomos XIII Pennock, eds by J. R. and Chapman, J. W., New York: Atherton Press.

    Google Scholar 

  • Hausman, Daniel and McPhereson, Michael (1996) Economic Analysis and Moral Philosophy, Cambridge: Cambridge University Press.

    Google Scholar 

  • Herman, Michael (2001) Intelligence Services in the Information Age: Theory and Practice, Frank Class.

    Google Scholar 

  • Herman, Michael (2004) ‘Intelligence after September 2001’ Intelligence and National Security, 19. 2, 2004.

    Google Scholar 

  • Hopkins, Nick and Taylor, Matthew (2013) ‘David Blunkett Calls for Urgent Review of Laws Governing Security Services’ The Guardian Available at http://www.theguardian.com/world/2013/nov/04/david-blunkett-review-laws-security-services Accessed 1/7/2015.

  • Hopkins, Nick and Taylor, Matthew (2013b) ‘Cabinet Was Told Nothing about GCHQ Spying Programmes’ The Guardian Available at http://www.theguardian.com/uk-news/2013/oct/06/cabinet-gchq-surveillance-spying-huhne Accessed 1/7/2015.

  • Jones, Jennifer Morgan (2010) ‘Is Ethical Intelligence a Contradiction in Terms?’ In Ethics of Spying: A Reader for the Intelligence Professional Volume 2 edited by Goldman, J., Plymouth: Scarecrow Press.

    Google Scholar 

  • Kant, Immanuel (1998) Groundwork of the Metaphysics of Morals, translated and edited by Gregor, M., Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Keefe, Patrick Radden (2005) Chatter: Dispatches From The Secret World Of Global Eavesdropping, New York: Random House.

    Google Scholar 

  • Lackey, Douglas (1989) The Ethics of War and Peace, Prentice Hall International.

    Google Scholar 

  • Levin, Michael 1982 ‘The Case For Torture’ Newsweek June 7th

    Google Scholar 

  • Luban, David (2005) ‘Liberalism, Torture and the Ticking Bomb’ Virginia Law Review, 9. 6, 2005.

    Google Scholar 

  • Matthews, Richard (2012) ‘An Empirical Critique of “Interrogational” Torture’ Journal of Social Philosophy, 43. 4, 2012.

    Google Scholar 

  • McCahill, Michael (1998) ‘Beyond Foucault: Towards a Contemporary Theory of Surveillance’ In Surveillance, Closed-Circuit Television and Social Control edited by C. Norris, J. Moran and G. Armstrong, Aldershot: Ashgate.

    Google Scholar 

  • Mill, John Stuart (1998) Utilitarianism, edited by Crisp, R, Oxford: Oxford University Press.

    Google Scholar 

  • Nagel, Thomas (1979) Mortal Questions, Cambridge: Cambridge University Press.

    Google Scholar 

  • Olson, James (2006) Fair Play: The Moral Dilemmas of Spying, Washington, D.C.: Potomac Books Inc.

    Google Scholar 

  • Omand, David (2007) ‘Reflections on Secret Intelligence’ In The New Protective State: Government, Intelligence and Terrorism edited by Hennessy, P., London: Continuum.

    Google Scholar 

  • Quinlan, Michael (2000) ‘The Future of Covert Intelligence’ In Agents for Change: Intelligence Services in the 21st Century edited by Shukman, H., London: St Ermin’s Press.

    Google Scholar 

  • Quinlan, Michael (2007) ‘Just Intelligence: Prolegomena to an Ethical Theory’ Intelligence and National Security, 22. 1, 2007.

    Google Scholar 

  • Reiss, H. S. (1991) Kant: Political Writings, Cambridge: Cambridge University Press.

    Google Scholar 

  • Robb, John (2007) Brave New War: The Next Stage of Terrorism and the End of Globalization, Hoboken, NJ: John Wiley and Sons.

    Google Scholar 

  • Scanlon, Thomas (2000) ‘Intention and Permissibility’ Supplement to the Proceedings of the Aristotelian Society, 74. 1, 2000.

    Google Scholar 

  • Shane, Scott (2006) ‘An Exotic Tool for Espionage: Moral Compass’ New York Times 28th Jan 2006 A1.

    Google Scholar 

  • Thomson, Judith Jarvis (1986) Rights, Restitution and Risk, Harvard: Harvard University Press.

    Google Scholar 

  • Pfaff, Tony. and Tiel, Jeffery (2004) ‘The Ethics of Espionage’ Journal of Military Ethics, 3. 1, 2004.

    Google Scholar 

  • US Senate Select Committee on Intelligence (2014), ‘Forward by Senate Select Committee on Intelligence Chairman Dianne Feinstein’, Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program Available at http://www.intelligence.senate.gov/study2014/foreword.pdf Accessed 1/2/2015.

  • Wyden and Udall (2011) ‘How Can Congress Debate a Secret Law?’ The Huffington Post Available at http://www.huffingtonpost.com/sen-ron-wyden/how-can-congress-debate-a_b_866920.html Accessed 1/7/2015.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ross Bellaby .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Bellaby, R. (2017). The Ethics of Intelligence. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_22

Download citation

Publish with us

Policies and ethics