Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vpsfw Total loading time: 0 Render date: 2024-07-16T14:26:22.000Z Has data issue: false hasContentIssue false

10 - The Limits of Avowal: Secret Intelligence in an Age of Public Scrutiny

from PART 3 - INTELLIGENCE, POLITICS, AND OVERSIGHT

Published online by Cambridge University Press:  05 June 2012

Sir David Omand
Affiliation:
King's College, London
Gregory F. Treverton
Affiliation:
RAND Corporation, California
Wilhelm Agrell
Affiliation:
Lunds Universitet, Sweden
Get access

Summary

Compare these two quotations. First, testimony to the Congressional Oversight Committee from the Director of the Central Intelligence Agency (CIA): “We can't break the law.…You just can't go to that place.…I actually said fairly publicly to our workforce that, as director, I have to be certain that that which I'm asking a CIA officer to do is consistent with the Constitution, the laws and the international treaty obligations of the United States.…If I can't say that, I can't ask an officer to do it”. Second, as put to the British author Bickham Sweet-Escott on his recruitment into the British Wartime Special Operations Executive: “I can't tell you what sort of a job it would be. All I can say is that if you join us, you mustn't be afraid of forgery, and you mustn't be afraid of murder”. The first quotation is from 2007, the second from 1940. Almost 70 years and a revolution in intelligence work separate these two attitudes. A question hangs over the quotations: Can the acknowledged, democratically accountable, independently overseen, and publicly Web-visible government intelligence agencies that we now have, operating to a strict ethical code, be expected to be able to collect worthwhile secret intelligence and engage in effective secret action?

The question is not academic. Academic analysis, however, should help answer the opening question.

Type
Chapter
Information
National Intelligence Systems
Current Research and Future Prospects
, pp. 235 - 264
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Page, Bruce, Leitch, David, and Knightley, Philip, The Philby Conspiracy (New York: Doubleday, 1968), p. 135Google Scholar
Omand, Sir David, “Reflections on Secret Intelligence”, in Hennessy, Peter (ed.), The New Protective State (London: Continuum Books, 2007)Google Scholar
Aldrich, R. J., “Policing the Past: Official History, Secrecy and British Intelligence since 1945”, English Historical Review, CXIX, 483 (September 2004)Google Scholar
Walzer, Michael, Just and Unjust Wars (New York: Basic Books, 1977)Google Scholar
Reed, Charles and Ryall, David (eds.), The Price of Peace: Just War in the Twenty-First Century (Cambridge: Cambridge University Press, 2007)CrossRef
Smith, Rupert, The Utility of Force (London: Penguin Books, 2005)Google Scholar
Oborne, Peter, The Use and Abuse of Terror: The Construction of a False Narrative on the Domestic Terror Trail (London: Centre for Policy Studies, 2006)Google Scholar
Mueller, John, Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats and Why We Believe Them (New York: Free Press, 2006)Google Scholar
Bergen, Peter, “The Return of Al Qaida”, The New Republic, 29 January 2007Google Scholar
Donohue, Laura K., “Anglo-American Privacy and Surveillance”, The Journal of Criminal Law and Criminology, Northwestern University School of Law, 96, 3 (Spring 2006)Google Scholar
Heymann, Philip B. and Kayyem, Juliette N., Protecting Liberty in an Age of Terror, BCSIA Studies in International Security (Cambridge, MA: The MIT Press, 2005)Google Scholar
Krezmer, D., “Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?”, European Journal of International Law, 16, 2 (2005), 171–212CrossRefGoogle Scholar
Andrew, Christopher, Secret Service (London: Heinemann, 1985), p. 496Google Scholar
Grey, Stephen, Ghost Plane (London: Hurst, 2007)Google Scholar
Crumpton, Henry R., in Sims, Jennifer and Gerber, Burton (eds.), Transforming U.S. Intelligence (Washington: Georgetown University Press, 2005)Google Scholar
Turner, Admiral Stansfield, Secrecy and Democracy (London: Sidgwick and Jackson, 1986), p. 178Google Scholar
Curry, John, The Security Service 1908–1945 (London: PRO, 1999)Google Scholar
Morton, Desmond, Churchill's Man of Mystery (London: Routledge, 2007)Google Scholar
Tenet, George, At the Center of the Storm: My Years at the CIA (New York: Harper Press, 2007)Google Scholar
Black, Jeremy, The Politics of James Bond: From Fleming's Novels to the Big Screen (Westport, CT: Praeger, 2001), p xiiiGoogle Scholar
Szendy, Peter, Sur Ecoute, L'Esthetique de l'Espionnage (Paris: Editions de Minuit, 2007)Google Scholar
Winterbotham, F. W., The Ultra Secret: The Inside Story of Operation Ultra, Bletchley Park, and Enigma (London: Weidenfeld, 1974)Google Scholar
Masterman, J. C., The Double-Cross System (New Haven, CT, and London: Yale University Books, 1972)Google Scholar
Hinsley, F. H. et al., British Intelligence in the Second World War (HMSO, 1988–93)Google Scholar
Howard, Michael, British Intelligence in the Second World War, vol. 5, Strategic Deception (HMSO, 1990)Google Scholar
Sherry, Norman in The Life of Graham Greene, vol. 2 (London: Jonathan Cape, 1994)Google Scholar
Andrew, Christopher and Mitrokhin, Vasili, The Mitrokin Archive (London: Allen Lane, The Penguin Press, 1999)Google Scholar
Hennessy, Peter in Runciman, W. G. (ed.), Hutton and Butler: Lifting the Lid on the Workings of Power (Oxford: Oxford University Press, 2004)Google Scholar
Glees, Anthony, Davies, Philip H. J., and John Morrison, N. L., The Open Side of Secrecy (London: Social Affairs Unit, 2007)Google Scholar
Pythian, Mark, “The British Experience with Intelligence Accountability”, both in Intelligence and National Security, 22, 1 (February 2007)Google Scholar
Conrad, J. (1907). The Secret Agent (London: Penguin Books, 1994)Google Scholar
Machiavelli, , The Prince (London: Penguin Books, 1961)Google Scholar
Quinlan, Sir Michael, “Just Intelligence: Prologemena to an Ethical Theory”, Intelligence and National Security, 22, 1, February 2007CrossRefGoogle Scholar
Omand, Sir David, “Ethical Guidelines in Using Secret Intelligence for Public Security”, Cambridge Review of International Affairs, 19, 4, December 2006Google Scholar
Jones, R. V. in his Reflections on Intelligence (London: William Heinemann, 1989)Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×