Privatisation

Chapter

Abstract

The increased intelligence support required for the global war on terrorism has led to exponential growth in the private intelligence industry. The privatisation of intelligence has been particularly apparent in the USA, where public-private collaboration now permeates practically all parts of the national intelligence effort. This chapter seeks to understand what is the privatisation of intelligence, and why the USA has increasingly relied on the private sector to carry out core intelligence functions. An examination of the US case reveals the risks posed by the privatisation of intelligence and the need for governments to plan and control their reliance on the private sector.

Bibliography

  1. Alexander, Keith B. (2004) Statement before the Committee on Armed Services, subcommittee on Strategic Forces, Fiscal Year 2005 Joint Military Intelligence Program (JMIP) and Army tactical Intelligence and Related Activities (TIARA), Hearing, 108th Congress, 2nd sess., 7 April.Google Scholar
  2. Avant, Deborah (2005) The Market for Force. the Consequences of Privatizing Security, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  3. Baer, Robert (2007) ‘Just Who Does the CIA’s Work?’, Times, 20 April, viewed 23 June 2015, <http://www.time.com/time/nation/article/0,8599,1613011,00.html>.
  4. Bamford, James (2004) ‘This Spy for Rent’, New York Times, 13 June, A13.Google Scholar
  5. Cahlink, George (2004) ‘Security Agency Doubled Procurement Spending in Four Years’, Government Executive, 1 June, viewed 23 June 2015, <http://www.govexec.com/defense/2004/06/security-agency-doubled-procurement-spending-in-four-years/16825/>.
  6. Caldwell, Christopher M. (2010) ‘Privatized Information Gathering: Just War Theory and Morality’, International Journal of Intelligence Ethics, vol. 1, no. 2, pp. 32–45.Google Scholar
  7. Cauley, Leslie, (2006) ‘NSA Has Massive Database of Americans’ Phone Calls’, USA Today, 11 May, 1A.Google Scholar
  8. Central Intelligence Agency (2004) ‘Killed in Line of Duty’, 21 May, viewed 23 June 2015, https://www.cia.gov/news-information/press-releases-statements/press-release-archive-2004/pr05212004.html.
  9. Central Intelligence Agency (2005) Semiannual report to the Director of Central Intelligence, January-June.Google Scholar
  10. Chaffin, Joshua (2004) ‘Contract Interrogators Hired to Avoid Supervision’, Financial Times, 22 May, A9.Google Scholar
  11. Chesterman, Simon (2008) “‘We Can’t Spy…if We Can’t Buy!’: The Privatization of Intelligence and the Limits of Outsourcing ‘Inherently Governmental Functions’”, European Journal of International Law, vol. 19, no. 5, pp. 1055–1074.CrossRefGoogle Scholar
  12. Clinton, Bill, and Gore, Al (1992) Putting People First, New York: Basic Books.Google Scholar
  13. Department of Defense (2012) Inspector General, Defense Criminal Investigative Service, Pervasive Labor Mischarging by Contract Employees of the National Security Agency, 31 October.Google Scholar
  14. Elrington, C.R. (ed.) (1989) ‘Paddington: Paddington Green’, A History of the County of Middlesex: Volume 9: Hampstead, Paddington, pp. 185–190, viewed 23 June 2015, <http://www.british-history.ac.uk/report.aspx?compid=22663>.
  15. Everett, Terri (2007) Office of the Director of National Intelligence, Presentation, Conference organised by the DIA, Boulder, Colorado, 14 May, viewed 23 June 2015, <http://www.fas.org/irp/dni/everett.ppt>.
  16. Feigenbaum, Harvey, Henig, Jeffrey, and Hamnett, Chris (1998) Shrinking the State: The Political Underpinnings of Privatization, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  17. General Accounting Office (2000) Contingency Operations: Army Should Do More to Control Contract Cost in the Balkans, GAO/NSIAD-00-225, 29 September.Google Scholar
  18. Gore, Al (Undated) ‘Reinventing Government’, National Archives and Records Administration website, viewed 23 June 2015, <http://clinton4.nara.gov/WH/EOP/OVP/initiatives/reinventing_government.html>.
  19. Gorman, Siobhan ‘Computer Ills Hinder NSA; 2 Technology Programs, Weapons for the War on Terrorism, Have Proved Duds’, Baltimore Sun, 26 February, viewed 23 June 2015, <http://articles.baltimoresun.com/2006-02-26/news/0602260086_1_cryptologic-agency-technology-programs>.
  20. Government Accountability Office (2004) Intelsat Privatization and the Implementation of the ORBIT Act, GAO-04-891, 13 September.Google Scholar
  21. Government Accountability Office (2008) Defense Acquisitions: DOD’s Increased Reliance on Service Contractors Exacerbates Long-Standing Challenges: Statement of David M. Walker Comptroller General of the United States, Testimony before the Subcommittee on Defense, Committee on Appropriations, US House of Representatives, GAO-08-621T, 23 January.Google Scholar
  22. Hansen, Morten (2013) ‘Intelligence Contracting: On the Motivations, Interests, and Capabilities of Core Personnel Contractors in the US Intelligence Community’, Intelligence and National Security, vol. 29, no. 1, pp. 1–24.Google Scholar
  23. Harris, Shane (2005) ‘Intelligence Incorporated’, Government Executive, 15 May, p. 40.Google Scholar
  24. Hastedt, Glenn (2014) ‘An INS Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, vol. 29, no. 6, pp. 793–810.CrossRefGoogle Scholar
  25. Hersh, Seymour M. (2003) ‘Selective Intelligence. Donald Rumsfeld Has His Own Special Sources. are They Reliable?’, New Yorker, 12 May, pp. 44–50.Google Scholar
  26. Johnson, Loch K. (2015) ‘A Conversation with James R. Clapper, JR., the Director of National Intelligence in the United States’, Intelligence and National Security, vol. 30, no. 1, pp. 1–25.CrossRefGoogle Scholar
  27. Kalifa, Dominique (2000) Naissance De La Police Privée. Détectives Et Agences De Recherches En France. 1832-1842, Paris: Plon.Google Scholar
  28. Kravitz, Derek (2009) ‘CIA Officer Was a ‘Con Man,’ Prosecutor Say’, Washington Post, 25 February, viewed 23 June 2015, <http://voices.washingtonpost.com/washingtonpostinvestigations/2009/02/cia_foggo_favors_sentencing_th.html>.
  29. Laborie Iglesias, Mario (2012) La Privatización De La Seguridad. Las Empresas Militares Y De Seguridad Privadas En El Entorno Estratégico Actual, Madrid, Spain: Instituto Español de Estudios Estratégicos.Google Scholar
  30. Lewis, Jonathan E. (2002) Spy Capitalism. ITEK and the CIA, New Haven, CT: Yale University Press.CrossRefGoogle Scholar
  31. MacKay, James (1996) Allan Pinkerton: The Eye Who Never Slept, Edinburgh: Mainstream Publishing Company.Google Scholar
  32. Mayer, Jane (2006) ‘Outsourcing. the C.I.A.’S Travel Agent’, New Yorker, 30 October, pp. 34–36.Google Scholar
  33. Mayer, Jane (2009) ‘The Predator War’, New Yorker, 26 October, pp. 36–45.Google Scholar
  34. Michaels, John D. (2008) ‘All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror’, California Law Review, vol. 96, no. 4, pp. 901–966.Google Scholar
  35. Miller, Geoffrey D. (2004) US Senate, Armed Services Committee, Hearing, 108th Congress, 2nd sess., 19 May.Google Scholar
  36. Miller, Greg (2006) ‘Spy Agencies Outsourcing to Fill Key Jobs’, Los Angeles Times, 17 September, viewed 23 June 2015, <http://articles.latimes.com/2006/sep/17/nation/na-contractors17>.
  37. Mirren, Gidda ‘Edward Snowden and the NSA Files – Timeline’, Guardian, viewed 24 June 2015, <http://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline>.
  38. Morn, Frank (1982) The Eye that Never Sleeps: A History of the Pinkerton National Detective Agency, Bloomington, IN: Indiana University Press.Google Scholar
  39. Morton, James (2004) The First Detective: The Life and Revolutionary Times of Eugène-Francois Vidocq, Criminal, Spy and Private Eye, London: Ebury Press.Google Scholar
  40. New York Times (2015) ‘Will Anyone Pay for Abu Ghraib?’, New York Times, 5 February, p. 26.Google Scholar
  41. O’Harrow, Robert Jr. (2005) ‘In Age of Security, Firm Mines Wealth of Personal Data’, Washington Post, 20 January, A1.Google Scholar
  42. Ocqueteau, Frédéric (2012) Privatisation De La « Haute Police »: Comment En Explorer L’hypothèse ? Champ Pénal, vol. 9, viewed 23 June 2015, <http://champpenal.revues.org/8299>.
  43. Office of Management and Budget (2011) Office of Federal Procurement Policy, Performance of Inherently Governmental and Critical Functions, Policy Letter 11-01, Federal Register, vol. 76, no. 176, 12 September, pp. 56227–56242.Google Scholar
  44. Office of the Director of National Intelligence (2009) Intelligence Community Directive Number 612, Intelligence Community Core Contract Personnel, 30 October.Google Scholar
  45. Office of the Director of National Intelligence (2010a) Media Conference Call with Dr. Ronald P. Sanders, Intelligence Community Chief Human Capital Officer, 14 January.Google Scholar
  46. Office of the Director of National Intelligence (2010b) Key Facts About Contractors, viewed 23 June 2015, <https://www.fas.org/irp/news/2010/07/ic-contract.pdf>.
  47. Office of the Director of National Intelligence (2011) Office of the Inspector General, Evaluation of the Administration and Management of ODNI Core Contracts Supporting Critical Missions, 2011.Google Scholar
  48. Office of the Inspector General of the Intelligence Community (2011) Semiannual report to the Director of National Intelligence, 1 January 2011 to 30 June 2011.Google Scholar
  49. Palmer, Nick (2013) ‘Benefits, Challenges, and Pitfalls of Private Intelligence’, Salus Journal, vol. 1, no. 2, pp. 3–7.Google Scholar
  50. PBS (2010) Interview with Michael Hayden, Frontline, 19 August, viewed 23 June 2015, http://www.pbs.org/wgbh/pages/frontline/are-we-safer/interviews/michael-hayden.html.
  51. Pelton, Robert Young (2007) Licensed to Kill. Hired Guns in the War on Terror, New York: Three Rivers Press.Google Scholar
  52. Pocock, Christopher (2000) The U-2 Spyplane: Toward the Unknown, A New History of the Early, Year, Atglen, PA: Schiffer Military History.Google Scholar
  53. Priest, Dana, and Arkin, William M. (2011) Top Secret America. the Rise of the New American Security State, New York: Little, Brown and Company.Google Scholar
  54. Reagan, Ronald (1981) ‘Inaugural Address’, 20 January, Washington D.C., viewed 23 June 2015, <http://www.presidency.ucsb.edu/ws/index.php?pid=43130>.
  55. Richelson, Jeffrey T. (2012) ‘Commercial Satellite Imagery and National Security’, viewed 21 June 2015, <http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB404/>.
  56. Risen, James, and Lichtblau, Eric (2005) ‘Bush Let U.S. Spy on Callers without Courts’, New York Times, 16 December, A1.Google Scholar
  57. Roper, James E. (2010) ‘Using Private Corporations to Conduct Intelligence Activities for National Security Purposes: An Ethical Appraisal’, International Journal of Intelligence Ethics, vol. 1, no. 2, pp. 46–73.Google Scholar
  58. Sanders, Ronald (2007) Interview with Mr. Andrew Pourinski, ‘Ask the Chief Human Capital Officer’, Federal News Radio, 2 August.Google Scholar
  59. Sanders, Ronbald (2010) Office of the Director of National Intelligence, Media Conference Call, 14 January, viewed 23 June 2015, <http://www.dni.gov/files/documents/Newsroom/Speeches%20and%20Interviews/20100114_interview.pdf>.
  60. Savoie, Donald J. (1994) Thatcher, Reagan, Mulroney: In Search of a New Bureaucracy, Toronto: University of Toronto Press.Google Scholar
  61. Senate Select Committee on Intelligence (2007) Intelligence Authorization Act for Fiscal Year 2007, Report 110-2, 110th Congress, 2nd sess., 24 January.Google Scholar
  62. Senate Select Committee on Intelligence (2012) Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program, 13 December.Google Scholar
  63. Shorrock, Tim (2008) Spies for Hire the Secret World of Intelligence Outsourcing, New York: Simon and Schuster.Google Scholar
  64. Singer, Peter (2008) Corporate Warriors. the Rise of the Privatized Military Industry, New York: Cornell University Press.Google Scholar
  65. Steele, Robert D. (1993) ‘National Security and National Competitiveness’, Bulletin of American Society for Information Science, vol. 19, no. 3, pp. 20–22.Google Scholar
  66. Strachan-Morris, David (2009) ‘The Future of Civil-Military Intelligence Cooperation Based on Lessons Learned in Iraq’, Intelligence and National Security, vol. 24, no. 2, pp. 257–274.CrossRefGoogle Scholar
  67. Taguba, Antonio M. (2004) Article 15-6 Investigation of the 800th Military Police Brigade, March 12, 2004.Google Scholar
  68. Taylor, Matthew, and Travis, Alan (2014) ‘G4S Chief Predicts Mass Police Privatization’, Guardian, 20 June, viewed 23 June 2015, http://www.theguardian.com/uk/2012/jun/20/g4s-chief-mass-police-privatisation.
  69. Tingle, Michal Laurie (1988) ‘Privatization and the Reagan Administration: Ideology and Application’, Yale Law and Policy Review, vol. 6, no. 1, pp. 229–257.Google Scholar
  70. US Congress (2010) Pub. Law 111-259, Intelligence Authorization Act for FY 2010, 111th congress, 2nd sess., October 7, 2010, section 339.Google Scholar
  71. US House of Representatives (2014) Committee on Oversight and Government Reform, Contracting Out Security Clearance Investigations: The Role of USIS and Allegations of Systemic Fraud, 113th Congress, 11 February.Google Scholar
  72. Voelz, Glenn J. (2006) Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations, Washington D.C.: MNIC Press.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.National Security Studies InstituteThe University of Texas at El PasoEl PasoUSA

Personalised recommendations