Skip to main content

On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions

  • Conference paper
  • First Online:
Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

  • 736 Accesses

Abstract

After the Snowden leaks, it has become evident that a discussion is needed on how to reorganize the huge intelligence agencies so that they fit a Western thinking and to avoid that they are evolving into a clone of what the KGB and the Stasi used to be. Well before the Snowden leaks, the author had been thinking along this line.

On the 26th of October 2012, at the closed workshop on “Online Security & Civil Rights: a Fine Ethical Balance,” Hertfordshire, UK, the author put forward the idea that modern intelligence agencies should be split. The part which is involved today in mass surveillance, should work for the people and no longer for the government. That means that the intelligence agencies should spy on these working in the government and these working for lobbyists. The recipient of this information should be the public at large. The foundation of this idea comes from the Magna Carta and the US Bill of Rights that regard “We the People” as the trustworthy party and the government as potentially corrupt.

In this paper we present the above ideas put forward by the author at the aforementioned 2012 Hertfordshire workshop. We also reflect on these 2012 ideas in the context of the Snowden leaks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The exact wording not having been recorded, the statement is based on the author’s and participants’ recollection.

  2. 2.

    A more appropriate use might have been “should be” considered. However, one of the SPW 2014 participants, originally from China, confirmed after the 2014 lecture that in her classes on Marxism, Marx viewed the government as being the trusted party. Whether the population of communist countries regard their government as trustworthy or not, is beside the point.

  3. 3.

    “Proponents of anarchism (known as “anarchists”) advocate stateless societies” (from Wikipedia). In this context a neo-anarchist could be regarded as a proponent advocating societies without proper regulations.

  4. 4.

    At the 2012 workshop, this statement was received in a very critically way. The author responded that the cited web page is at a Japanese governmental site.

  5. 5.

    The fact that IBM electromechanical sorting machines were used by the Nazis to identify these who were Jewish is well known [3].

  6. 6.

    In 2011 Prime Minister Yulia Tymoshenko was convicted for 7 years for her deal on Russian gas [28].

References

  1. Anonymous: Word of Mouth Democracy for the 99%: A Corporate Spiritual Democracy. CreateSpace Independent Publishing Platform, 26 September 2013

    Google Scholar 

  2. Bamford, J.: The Puzzle Palace. Penguin Books, New York (1985)

    Google Scholar 

  3. Black, E.: IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation. Three Rivers Press, New York (2001)

    Google Scholar 

  4. Brin, D.: The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?. Perseus Books, Cambridge (1999)

    Google Scholar 

  5. Carpets. http://www.lung.org/healthy-air/home/resources/carpets.html

  6. Connolly, M.: Granite state could use more ‘blue sky’. Concord Monitor, 5 March 2012

    Google Scholar 

  7. Cooke, R.: Migraine and me. The Guardian, 9 May 2009. http://www.theguardian.com/lifeandstyle/2009/may/10/migraine

  8. National Research Council: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. The National Academies Press, Washington, DC (2008)

    Google Scholar 

  9. Dunn, T.M.: Track crime on net or we’ll see more people die. The Sun, 3 December 2012

    Google Scholar 

  10. Evans, K.: Jeffrey Sachs rails against ex-fed chief Greenspan. The Wall Street Journal (2009)

    Google Scholar 

  11. Fear pays: Chertoff, ex-security officials slammed for cashing in on government experience. The Huffington Post, 23 November 2010. http://www.huffingtonpost.com/2010/11/23/fear_pays_chertoff_n_787711.html (updated 25 March 2011)

  12. Fischetti, M.: The switch is on. Sci. Am. 298, 98–99 (2008)

    Article  Google Scholar 

  13. Goodman, P.S.: Taking hard new look at a Greenspan legacy. New York Times, 8 October 2008. http://www.nytimes.com/2008/10/09/business/economy/09greenspan.html

  14. Hosein, G.: Threatening the open society: Comparing anti-terror policies and strategies in the U.S. and Europe. Comparative report. https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/ comparativeterrorreportdec2005.pdf. Privacy International, 13 December 2005 DOI:10.1007/978-3-319-12400-1

  15. Isely, L.: Alan Greenspan’s deregulation and inadequate regulation led to another bubble. The Nation, 7 February 2013. http://nationbuilders.thenation.com/profiles/blogs/alan-greenspan-s-deregulation-and-inadequate-regulation-led-to DOI:10.1007/978-3-319-12400-1

  16. Jaslow, R.: Europe bans airport scanners over cancer fears: How about U.S.? CBS News, 17 November 2011

    Google Scholar 

  17. Kahn, D.: The Codebreakers. MacMillan Publishing Co., New York (1967)

    Google Scholar 

  18. Kindy, K.: Ex-homeland security chief head said to abuse public trust by touting body scanners. The Washington Post, 1 January 2010. http://www.washingtonpost.com/wp-dyn/content/article/2009/12/31/AR2009123102821.html

  19. Liptak, A.: Major ruling shields privacy of cellphones: Supreme court says phones can’t be searched without a warrant. New York Times, 25 June 2014. http://www.nytimes.com/2014/06/26/us/supreme-court-cellphones-search-privacy.html

  20. Only 1% of Snowden files published - Guardian editor BBC News UK, 3 December 2013. http://www.bbc.com/news/uk-25205846

  21. Osama bin Laden driver’s conviction quashed by US appeals court, 16 October 2012. http://www.theguardian.com/world/2012/oct/16/osama-bin-laden-driver-conviction-quashed

  22. Patriot Act, bill summary & status 107th congress (2001–2002) h.r.3162. http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.3162:

  23. Povoledo, E., Fountain, H.: Italy orders jail terms for 7 who didn’t warn of deadly earthquake. The New York Times, 22 October 2012

    Google Scholar 

  24. Schneier, B.: The myth of the ‘transparent society’, 6 March 2008. http://www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0306

  25. State and major urban area fusion centers. http://www.dhs.gov/state-and-major-urban-area-fusion-centers DOI:10.1007/978-3-319-12400-1

  26. The ghettos (a teachers guide to the holocaust). http://fcit.usf.edu/holocaust/timeline/ghettos.htm

  27. The official report of The Fukushima Nuclear Accident Independent Investigation Commission, executive summary (2012). http://warp.da.ndl.go.jp/info:ndljp/pid/3856371/naiic.go.jp/wp-content/uploads/2012/09/NAIIC_report_lo_res10.pdf

  28. Tymoshenko convicted, sentenced to 7 years in prison, ordered to pay state \({\$}\)188 million. Kyiv Post, 11 October 2011. http://www.kyivpost.com/content/ukraine/tymoshenko-convicted-sentenced-to-7-years-in-priso-114528.html

  29. U.S. senate report on fusion centers, committee on homeland security and governmental affairs (full text) October 2012. https://archive.org/stream/446657-fusion-centers/446657-fusion-centers_djvu.txt

  30. Vandercoy, D.E.: The history of the second amendment. Valparaiso Univ. Law Rev. 28, 1007–1039 (1994)

    Google Scholar 

Download references

Acknowledgment

The slides used at the aforementioned 2012 workshop thanked the organizers and “the anonymous people from intelligence agencies for privately expressing their concerns about the US Patriot Act, and researchers consulting for European Governments stating that what they are doing on the cyber topic violates their constitutions.”

The author also thanks Bruce Christianson for encouraging him to submit the position paper to the Security Protocols Workshop, Cambridge, and the many participants of both this workshop and the 2012 “Online Security & Civil Rights: a Fine Ethical Balance” workshop for their feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yvo Desmedt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Desmedt, Y. (2014). On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics