Advertisement

On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions

  • Yvo DesmedtEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)

Abstract

After the Snowden leaks, it has become evident that a discussion is needed on how to reorganize the huge intelligence agencies so that they fit a Western thinking and to avoid that they are evolving into a clone of what the KGB and the Stasi used to be. Well before the Snowden leaks, the author had been thinking along this line.

On the 26th of October 2012, at the closed workshop on “Online Security & Civil Rights: a Fine Ethical Balance,” Hertfordshire, UK, the author put forward the idea that modern intelligence agencies should be split. The part which is involved today in mass surveillance, should work for the people and no longer for the government. That means that the intelligence agencies should spy on these working in the government and these working for lobbyists. The recipient of this information should be the public at large. The foundation of this idea comes from the Magna Carta and the US Bill of Rights that regard “We the People” as the trustworthy party and the government as potentially corrupt.

In this paper we present the above ideas put forward by the author at the aforementioned 2012 Hertfordshire workshop. We also reflect on these 2012 ideas in the context of the Snowden leaks.

Keywords

Intelligence Agency Fusion Center Online Security Closed Workshop Fukushima Nuclear Accident 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgment

The slides used at the aforementioned 2012 workshop thanked the organizers and “the anonymous people from intelligence agencies for privately expressing their concerns about the US Patriot Act, and researchers consulting for European Governments stating that what they are doing on the cyber topic violates their constitutions.”

The author also thanks Bruce Christianson for encouraging him to submit the position paper to the Security Protocols Workshop, Cambridge, and the many participants of both this workshop and the 2012 “Online Security & Civil Rights: a Fine Ethical Balance” workshop for their feedback.

References

  1. 1.
    Anonymous: Word of Mouth Democracy for the 99%: A Corporate Spiritual Democracy. CreateSpace Independent Publishing Platform, 26 September 2013Google Scholar
  2. 2.
    Bamford, J.: The Puzzle Palace. Penguin Books, New York (1985)Google Scholar
  3. 3.
    Black, E.: IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation. Three Rivers Press, New York (2001)Google Scholar
  4. 4.
    Brin, D.: The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?. Perseus Books, Cambridge (1999)Google Scholar
  5. 5.
  6. 6.
    Connolly, M.: Granite state could use more ‘blue sky’. Concord Monitor, 5 March 2012Google Scholar
  7. 7.
    Cooke, R.: Migraine and me. The Guardian, 9 May 2009. http://www.theguardian.com/lifeandstyle/2009/may/10/migraine
  8. 8.
    National Research Council: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. The National Academies Press, Washington, DC (2008)Google Scholar
  9. 9.
    Dunn, T.M.: Track crime on net or we’ll see more people die. The Sun, 3 December 2012Google Scholar
  10. 10.
    Evans, K.: Jeffrey Sachs rails against ex-fed chief Greenspan. The Wall Street Journal (2009)Google Scholar
  11. 11.
    Fear pays: Chertoff, ex-security officials slammed for cashing in on government experience. The Huffington Post, 23 November 2010. http://www.huffingtonpost.com/2010/11/23/fear_pays_chertoff_n_787711.html (updated 25 March 2011)
  12. 12.
    Fischetti, M.: The switch is on. Sci. Am. 298, 98–99 (2008)CrossRefGoogle Scholar
  13. 13.
    Goodman, P.S.: Taking hard new look at a Greenspan legacy. New York Times, 8 October 2008. http://www.nytimes.com/2008/10/09/business/economy/09greenspan.html
  14. 14.
    Hosein, G.: Threatening the open society: Comparing anti-terror policies and strategies in the U.S. and Europe. Comparative report. https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/ comparativeterrorreportdec2005.pdf. Privacy International, 13 December 2005 DOI: 10.1007/978-3-319-12400-1
  15. 15.
    Isely, L.: Alan Greenspan’s deregulation and inadequate regulation led to another bubble. The Nation, 7 February 2013. http://nationbuilders.thenation.com/profiles/blogs/alan-greenspan-s-deregulation-and-inadequate-regulation-led-to DOI: 10.1007/978-3-319-12400-1
  16. 16.
    Jaslow, R.: Europe bans airport scanners over cancer fears: How about U.S.? CBS News, 17 November 2011Google Scholar
  17. 17.
    Kahn, D.: The Codebreakers. MacMillan Publishing Co., New York (1967)Google Scholar
  18. 18.
    Kindy, K.: Ex-homeland security chief head said to abuse public trust by touting body scanners. The Washington Post, 1 January 2010. http://www.washingtonpost.com/wp-dyn/content/article/2009/12/31/AR2009123102821.html
  19. 19.
    Liptak, A.: Major ruling shields privacy of cellphones: Supreme court says phones can’t be searched without a warrant. New York Times, 25 June 2014. http://www.nytimes.com/2014/06/26/us/supreme-court-cellphones-search-privacy.html
  20. 20.
    Only 1% of Snowden files published - Guardian editor BBC News UK, 3 December 2013. http://www.bbc.com/news/uk-25205846
  21. 21.
    Osama bin Laden driver’s conviction quashed by US appeals court, 16 October 2012. http://www.theguardian.com/world/2012/oct/16/osama-bin-laden-driver-conviction-quashed
  22. 22.
    Patriot Act, bill summary & status 107th congress (2001–2002) h.r.3162. http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.3162:
  23. 23.
    Povoledo, E., Fountain, H.: Italy orders jail terms for 7 who didn’t warn of deadly earthquake. The New York Times, 22 October 2012Google Scholar
  24. 24.
    Schneier, B.: The myth of the ‘transparent society’, 6 March 2008. http://www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0306
  25. 25.
  26. 26.
    The ghettos (a teachers guide to the holocaust). http://fcit.usf.edu/holocaust/timeline/ghettos.htm
  27. 27.
    The official report of The Fukushima Nuclear Accident Independent Investigation Commission, executive summary (2012). http://warp.da.ndl.go.jp/info:ndljp/pid/3856371/naiic.go.jp/wp-content/uploads/2012/09/NAIIC_report_lo_res10.pdf
  28. 28.
    Tymoshenko convicted, sentenced to 7 years in prison, ordered to pay state \({\$}\)188 million. Kyiv Post, 11 October 2011. http://www.kyivpost.com/content/ukraine/tymoshenko-convicted-sentenced-to-7-years-in-priso-114528.html
  29. 29.
    U.S. senate report on fusion centers, committee on homeland security and governmental affairs (full text) October 2012. https://archive.org/stream/446657-fusion-centers/446657-fusion-centers_djvu.txt
  30. 30.
    Vandercoy, D.E.: The history of the second amendment. Valparaiso Univ. Law Rev. 28, 1007–1039 (1994)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.The University of Texas at DallasRichardsonUSA
  2. 2.University College LondonLondonUK

Personalised recommendations