You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book starts from the proposition that the field of intelligence lacks any systematic ethical review, and then develops a framework based on the notion of harm and the establishment of Just Intelligence Principles. As the professional practice of intelligence collection adapts to the changing environment of the twenty-first century, many academic experts and intelligence professionals have called for a coherent ethical framework that outlines exactly when, by what means and to what ends intelligence is justified. Recent controversies, including reports of abuse at Guantanamo Bay and Abu Ghraib, allegations of extraordinary rendition programmes and the ever-increasing pervasiveness of the...
Political hackers, like the Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes are intuitively good things to fight for. This book argues that when the state fails to protect people, hackers can intervene. It highlights the space for hackers to operate as legitimate actors; details what actions are justified towards what end; outlines mechanisms to aid ethically justified decisions; and directs the political community on how to react. Applying this framework to hacking operations including the Arab Spring, police brutality in the USA, and Nigerian and Ugandan homophobic legislation, it offers a unique contribution to hacking as a contemporary political activity.
Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes – targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people’s freedom of expression, autonomy and privacy – are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments’ announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity.
Highly publicized cases involving whistleblowers including Chelsea Manning, Edward Snowden, and WikiLeaks have brought whistleblowing to the public's attention in recent years. It has gained further attention in the "Me Too" era, as whistleblowers have exposed numerous cases of misconduct among powerful men in the entertainment industry and beyond. Whether whistleblowing is an inherently positive practice and how whistleblowers should be protected and compensated for their deeds are widely debated. Through diverse perspectives from authoritative voices, readers will gain an understanding of the practice of whistleblowing, the laws related to it, and its place in democratic society.
Presenting a thorough examination of intelligence activities in international law, Sophie Duroy provides theoretical and empirical justifications to support the cutting-edge claim that states’ compliance with international law in intelligence matters serves their national security interests. This book theorises the regulation of intelligence activities under international law, identifying three layers of regulation: a clear legal framework governing intelligence activities (legality); a capacity to enforce state responsibility (accountability); and the integration of legality and accountability into responsive regulation by the international legal order (compliance).
Discover the astonishing true story of Project Acoustic Kitty, a top-secret CIA experiment during the Cold War that sought to turn cats into undercover spies. This eBook delves deep into this bizarre and ambitious espionage mission's origins, technology, and unexpected challenges. Learn about the intersection of biology and intelligence, the ethical dilemmas faced, and the legacy left by one of the most unusual projects in espionage history. Perfect for readers fascinated by Cold War espionage, secret CIA operations, and strange historical experiments. Explore the untold story of feline spies and Cold War intrigue.
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the ‘intelligence cycleâ€...
This volume examines the ethical issues generated by recent developments in intelligence collection and offers a comprehensive analysis of the key legal, moral and social questions thereby raised. Intelligence officers, whether gatherers, analysts or some combination thereof, are operating in a sea of social, political, scientific and technological change. This book examines the new challenges faced by the intelligence community as a result of these changes. It looks not only at how governments employ spies as a tool of state and how the ultimate outcomes are judged by their societies, but also at the mind-set of the spy. In so doing, this volume casts a rare light on an often ignored dimens...
This collection, comprising key works by James J. Wirtz, explains how different threat perceptions can lead to strategic surprise attack, intelligence failure and the failure of deterrence. This volume adopts a strategist’s view of the issue of surprise and intelligence failure by placing these phenomena in the context of conflict between strong and weak actors in world affairs. A two-level theory explains the incentives and perceptions of both parties when significant imbalances of military power exist between potential combatants, and how this situation sets the stage for strategic surprise and intelligence failure to occur. The volume illustrates this theory by applying it to the Kargil...
This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in relation to terrorism, such as the definition of terrorism and the concept of collective responsibility, and consider specific ethical issues in counter-terrorism.