Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to the FBI to the NCS (the National Clandestine Service)—and those are just to name a few of the ones in the U.S. Every developed nation has their own agencies that implement clandestine operations as a normal part of statecraft. This literature review examines the role that clandestine operations play in the U.S. today and what the risks of those operations can be.
The Complexity of Clandestine Operations among Multiple Agencies
A big part of clandestine operations is the collection of intelligence. The U.S. Intelligence Community is a complex, complicated amalgamation of agencies each with their own work, sphere of influence and foci. In the Overview of the United States Intelligence Community for the 111th Congress (2009), it is noted that the power bases are many and diverse: “the Director of the CIA is the National Human Intelligence (HUMINT) Manager and serves as the national authority for coordination, de-confliction, and evaluation of clandestine HUMINT operations across the IC, consistent with existing laws, Executive Orders, and interagency agreements” (2). The Overview of the United States Intelligence Community for the 111th Congress (2009) was written to give Congress a detailed picture of the various different agencies and organizations involved in the intelligence community, what their roles were and how they collected and disseminated information. The Overview a vast and complicated, loosely confederated community of agencies and organizations that all embark on their own independent clandestine operations at times—often in ways that are not supportive of a unified aim or of a particular administration’s policy, as Warner and McDonald (2005) point out in their research. The Overview of the United States Intelligence Community for the 111th Congress (2009) states, for instance, that “the National Clandestine Service (NCS) has responsibility for the clandestine collection (primarily HUMINT) of foreign intelligence that is not obtainable through other means. The NCS engages in counterintelligence activities by protecting classified U.S. activities and institutions from penetration by hostile foreign organizations and individuals” (2). Thus, as the Overview showed, there are both intelligence and counter-intelligence operations that fall under the umbrella of clandestine operations at times, and the agencies involved in managing these operations are not necessarily going to be working together or sharing intelligence or even pursuing the same ends simultaneously.
In their research on this issue, Warner and McDonald (2005) note that these various intelligence agencies can be politicized, meaning their actions may not always be aligned with the policies and platforms of the administrations under which they are operating. This was seen in the lead-up to the Iraq War when in the aftermath of 9/11 there was a push by an inner “cabal,” as Seymour Hersh (2003) called it in his research on the post-9/11 wars and the men responsible for initiating them. The “cabal” described by Hersh (2003) existed under the agency heading of Office of Special Plans (OSP), which engaged in a clandestine operation of its own to create the intelligence used to launch a full-scale invasion of Iraq. Just to give an example of the conflict that can arise among the various clandestine operations that might occur at any one moment under any one administration, the events leading up to the Iraq War provide a fertile ground for understanding: As Hersh (2003) shows, Bush’s policy advisors in the OSP were involved in their own clandestine operation, which focused on overruling the intelligence analysts at the CIA and shaping foreign policy till it met their own aims and objectives. The “cabal” at the OSP involved in this clandestine operation consisted of a group of pro-Israel and dual Israeli-American citizens such as Abram Shulsky,...
HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCEPROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT USCOUNTERINTELLIGENCE POLICIESA Master ThesisSubmitted to the FacultyofAmerican Public University SystembyAlexgardo OrriolaIn Partial Fulfillment of theRequirement for the DegreeofMaster of ArtsAugust 2020American Public University SystemCharles Town, WVviTheauthorhereby grantsthe American PublicUniversity System the right todisplay these contentsfor educational purposes.Theauthorassumestotalresponsibility formeetingthe requirementsset by UnitedStates copyrightlawfor the inclusionofany materialsthatare not the author�screation or in the public domain.� Copyright2020by Alexgardo OrriolaAll rights reserved.DEDICATIONI dedicate thisthesisto
CI FinalAbstractThis thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies and the private sector. It conducts an analysis of the formation of the counterintelligence program under Angleton, the use of CI within the Federal Bureau of Narcotics under Anslinger, and the use of CI in the Phoenix Program and the FBI�s COINTELPRO. This analysis is used to
Office Memo Sub: comment on John's claim as a whistle blower against PharmaCARE and the ethical and legal implications of the case As a member of Dewey, Chetum, and Howe you asked me to find out suitable ethical and legal implications that John's case could bring for the firm and for John himself. Detailed in the report are the issues regarding: The Ethical issues relating to marketing and advertising, intellectual property, and regulation
"Animals that are experiencing dwindling numbers could be cloned to prevent their extinction. Taiwanese scientists claimed to have made five clones of an endangered pig to save this species" (Anonymous). While some say man should not play God there are others like Edmund Erde who disagree and say that "playing God" is a phrase that is "muddle-headed" and "nonsensical" and should be deserted (Edmund Erde, p.594). For those who
Counterintelligence Thesis Proposal Abstract This proposal describes the need for an ethical standard in counterintelligence. It discusses how an analysis of the formation of the counterintelligence program under Angleton can provide insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s.
Iran-Contra Affair Historical Background of the Iran-Contra Affair Events Surrounding the Decision. Nicaraguan context. In the 1970s, dissatisfaction with a manipulative and corrupt government was escalating. All socio-economic classes were impacted and by 1978 the situation deteriorated into a short-lived civil war. Through violent opposition, the Marxist Sandinista guerillas achieved power in 1979. By September of 1980, the Sandinistas had suspended elections and taken control of the media. Leftist rebels in El Salvador
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now