Australian Law Reform Commission

Total Page:16

File Type:pdf, Size:1020Kb

Australian Law Reform Commission Keeping Secrets REPORT The Protection of Classified and Security Sensitive Information REPORT 98 May 2004 © Commonwealth of Australia 2004 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968, all other rights are reserved. Requests for further authorisation should be directed to the Commonwealth Copyright Administration, Intellectual Property Branch, Department of Communications, Information Technology and the Arts, GPO Box 2154, Canberra ACT 2601 or by email to [email protected]. ISBN 0-9750600-5-8 Commission Reference: ALRC 98 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 and reconstituted by the Australian Law Reform Commission Act 1996. The office of the ALRC is at Level 25, 135 King Street, Sydney NSW 2000, Australia. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by The SOS Printing Group (Australia) Pty Ltd The Hon Philip Ruddock MP Attorney-General of Australia Suite MF 21 Parliament House Canberra ACT 2600 31 May 2004 Dear Attorney-General, The Protection of Classified and Security Sensitive Information On 2 April 2003, the Commission received a reference from the then Attorney- General, the Hon Daryl Williams AM QC MP, pursuant to the Australian Law Reform Commission Act 1996, to undertake a review of the handling and protection of classified and security sensitive information in legal proceedings. Those terms of reference were amended by your letter of 24 March 2004, to extend the reporting date to 31 May 2004, in order to facilitate further community consultation. On behalf of the Members of the Commission involved in this reference, including Justice Susan Kenny, Justice Susan Kiefel and Justice Mark Weinberg, and in accordance with section 21 of the Australian Law Reform Commission Act 1996, we are pleased to present to you the final report in this reference: Keeping Secrets: The Protection of Classified and Security Sensitive Information (ALRC 98, 2004). Yours sincerely Professor David Weisbrot Ian Davis President Commissioner Brian Opeskin Professor Anne Finlay Commissioner Commissioner Contents Terms of Reference 5 Participants 7 Executive Summary 9 List of Recommendations 15 Part A. Defining Classified and Security Sensitive Information 1. The ALRC’s Inquiry 33 Background to the inquiry 33 Advisory Committee 36 Structure of Report 36 National Security Information (Criminal Proceedings) Bill 2004 38 2. Classifying Information 43 What is classified information? 43 What is security sensitive information? 47 National security information 48 Security and intelligence agencies 50 3. Open Government 65 Accountability of the Executive 65 Privacy 67 Freedom of information 69 Protection of whistleblowers 73 Part B. Handling Classified and Security Sensitive Information 4. Commonwealth Protective Security Manual 89 What is the Protective Security Manual? 91 Public access to the PSM 93 Classifying information in accordance with the PSM 96 Reclassifying and declassifying information 102 Monitoring agency compliance with the PSM 117 Enforcing the standards in the PSM 124 5. Prevention and Punishment of Unauthorised Disclosure 143 Prevention 144 Deterrence and Punishment 153 2 Keeping Secrets 6. Security Clearances 175 Introduction 175 How does a security clearance work? 175 Security clearance of lawyers 181 Security clearance of judges and magistrates 201 Security clearance of jurors 204 Court and tribunal staff 208 Part C. Classified and Security Sensitive Information in Court 7. Principles of Open Justice and Fair Trials 213 Introduction 213 The right to a fair hearing 215 The right to a public hearing 215 Procedural protections in criminal proceedings 227 The right to ‘equality of arms’ 235 Open justice and national security information 236 Abuse of process 241 Procedural protections in non-criminal proceedings 243 The right to a public judgment 246 Military courts and tribunals 254 8. Restricting Access to Courts and Tribunals 261 Introduction 261 Pre-trial procedures 262 Presenting evidence in open court 267 Blocking disclosure or admission of evidence 310 9. Closing Courts and Tribunals 335 Closing courts to the public 335 Closing tribunals to the public 347 Consultations and submissions 350 Media issues 362 Appeal mechanisms 366 Prosecution guidelines 369 Legal Services Directions 373 10. Denying a Party Access in Courts and Tribunals 377 Introduction 377 Secret evidence 377 Secret hearings 423 11. Recommendations for Reform—Courts and Tribunals 431 Basic recommendation: a National Security Information Procedures Act 432 Scope of the new Act 438 Pre-trial disclosure 444 Early notification 461 Contents 3 Notification to Attorney-General 461 The court’s powers generally 463 Undertakings and security clearances 466 Public interest immunity 466 Ancillary matters 467 Statements of reasons and transcripts 471 Ministerial statements and certificates 472 Technical assistance 473 Classification is not determinative 474 Closed courts and tribunals 476 Evidence supporting application to be given in open court 479 Appeals 480 Secret evidence 480 Secret hearings 496 A single court? 497 Summary of Recommendations 499 Appendix 1. List of Submissions 511 Appendix 2. Abbreviations and Acronyms 513 Appendix 3. Extracts from Statute 517 Appendix 4. R v Lappas 549 Table of Selected Legislation 559 Table of Selected Cases 565 Terms of Reference Review of measures designed to protect classified and security sensitive information in the course of investigations and proceedings I, DARYL WILLIAMS, Attorney-General of Australia, acting pursuant to section 20 of the Australian Law Reform Commission Act 1996 refer the following matter to the Australian Law Reform Commission for inquiry and report pursuant to s 20(1) of the Australian Law Reform Commission Act 1996: Measures to protect classified and security sensitive information in the course of investigations and proceedings. ‘Security sensitive information’ is information that has implications for Australia’s security but is not formally classified, for whatever reason. 1. The Commission shall consider, among other matters: a. The operation of existing mechanisms designed to prevent the unneces- sary disclosure of classified material or security sensitive material in the course of criminal or other official investigations and court or tribunal proceedings of any kind, including: • common law public interest immunity; • section 23V of the Crimes Act 1914 in relation to the provision of material to suspects and any other relevant provisions;1 • section 85B of the Crimes Act 1914 in relation to in camera proceed- ings;2 • the enforceability of Commonwealth protective security standards as set out in the Commonwealth Protective Security Manual; • other mechanisms available to investigators and the courts to limit the disclosure of classified or security sensitive material including redaction and excision of sensitive material from classified docu- ments; and • whether existing mechanisms adequately protect security sensitive information. 1 Section 23V is set out in Appendix 3. 2 Section 85B is set out in Appendix 3. 6 Keeping Secrets b. International practice with regard to the protection of classified or security sensitive information in the course of criminal or other official investigations and court or tribunal proceedings of any kind; c. Training, functions, duties and role of judges, judicial officers, tribunal members and lawyers in relation to the protection of classified and secu- rity sensitive information that is or may be presented to the court; d. Training, functions, duties and role of investigators in relation to the protection of classified and security sensitive information that is obtained or used in the course of any investigation or court or tribunal proceedings; and e. Any related matter. 2. The Commission shall consider the need for regulatory measures designed to protect classified information or security sensitive material in the course of criminal investigations and proceedings including: a. Assessing the practical implications of any recommendations for measures; and b. Assessing alternatives, including non-regulatory alternatives. 3. The Commission will consult widely with the public and key stakeholders. 4. The Commission is to report not later than 29 February 2004.3 Dated: 2 April 2003 Daryl Williams Attorney-General 3 By letter dated 24 March 2004, the Attorney-General, the Hon Phillip Ruddock MP, extended this reporting date to 31 May 2004. Participants Australian Law Reform Commission The Division of the ALRC constituted under the Australian Law Reform Commission Act 1996 (Cth) for the purposes of this inquiry comprises the following: Division Professor David Weisbrot Mr Ian Davis (Commissioner in charge) Professor Anne Finlay Mr Brian Opeskin Justice Susan Kenny (part-time Commissioner) Justice Susan Kiefel (part-time Commissioner) Justice Mark Weinberg (part-time Commissioner) Senior Legal Officers Carolyn Adams Isabella Cosenza Legal Officers Kate Connors Jonathan Dobinson Project Assistant Alayne Harland Legal Interns Adam D’Andretti Lauren Jamieson Katherine Jones Elly
Recommended publications
  • Building a Secure Workforce
    Federal Government Services Building a Secure Workforce Guard against insider threat Michael G. Gelles David L. Brant Brian Geffert Building a Secure Workforce Guard Against Insider Threat Table of Contents Introduction 1 Asset Loss and Insider Threat Defined 2 Other Potential Results of Asset Loss Caused by Insider Threats 3 Understanding the Insider Threat 4 Summary of Findings: Insider Threat 4 Risk Indicators and Characteristics 5 Competing Loyalties 5 Risk of Increased Computing and Networking 6 Risk of Public Information in Private Hands 6 Mitigating Asset Loss: A Series of Interventions and Action Plans 7 Establishing a Workforce Culture to Mitigate Risk 7 The Employee Assistance Program (EAP) a Tactical Mitigation Strategy 8 The Workforce as a Monitor: “Operationalizing” Security Awareness Training 8 Leveraging Human Resources as a Risk Mitigator 9 Risk Management Through Information Access Management 9 Case Reviews 10 Project Initiation 10 Establish a Baseline: The “As-Is State” 10 Case Sampling and Methodology for Review 10 Conduct a Gap Analysis and Profile the “To-Be State” 10 Recommendations for Future Study and Change 11 Appendix A 12 Enterprise Risk Framework and the Insider Threat 12 Risk Equation 13 Appendix B 14 Information Management Framework and the Insider Threat 14 References 16 Contacts 17 i Building a Secure Workforce Guard Against Insider Threat Introduction In today’s evolving and changing global environment, business in the public sector is increasingly more challenging. There is an ongoing need to adapt a more balanced and integrated approach to protecting information and other assets. As the world becomes a virtual community of competitors and predators, an organization’s assets are at greater risk than in the past, when the world was more localized, compartmentalized, and siloed.
    [Show full text]
  • National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012
    Description of document: National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012 Requested date: 25-May-2012 Released date: 29-September-2017 Posted date: 16-October-2017 Source of document: FOIA Request National Reconnaissance Office OCIO/Information Review and Release Group 14675 Lee Road Chantilly, VA 20151-1715 Fax: 703-227-9198 Online FOIA Request Form Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL RECONNAISSANCE OFFICE 14675 Lee Road Chantilly, VA 20151-1715 29 September 2017 REF: FOIA Case F12-0103 This is in response to your request dated 25 May 2012 and received in the National Reconnaissance Office (NRO) on 5 June 2012.
    [Show full text]
  • American Intelligence Journal Vol 34
    AMERICAN INTELLIGENCE JOURNAL THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS The Cyber Threat: The Future of Intelligence in a Wired World __NMIF__________________________ Vol. 34, No. 1, 2017 American THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Intelligence Journal Vol. 34, No. 1 2017 ISSN 0883-072X NMIF Board of Directors LTG (USA, Ret) Mary A. Legere, Chair Col (USAF, Ret) John Clark, President Col (USAF, Ret) William Arnold, Vice President Col (USAF, Ret) Michael Grebb, Treasurer Col (USAF, Ret) Carla Bass, Director LTC (USA, Ret) Steve Iwicki, Director Mr. Don Bolser, Director Dr. (Col, USAF, Ret) Eva S. Jenkins CDR (USNR, Ret) Calland Carnes, Director Capt (USNR, Ret) Stephanie Leung, Director Mr. Dennis DeMolet, Director Kel McClanahan, Esq., Director Lt Col (USAF, Ret) James Eden, Director Brad Moss, Esq., Director COL (USA, Ret) Michael Ferguson, Director Capt (USNR) Rick Myllenbeck, Director Col (USAF, Ret) Owen Greenblatt CDR (USNR) Louis Tucker, Director COL (USA, Ret) David Hale, Director COL (USA, Ret) Gerald York, Director Editor - COL (USA, Ret) William C. Spracher, Ed.D. Production Manager - Ms. Debra Hamby-Davis Brig Gen (USAF, Ret) Scott Bethel, Director Emeritus Dr. Forrest R. Frank, Director Emeritus MajGen (USMC, Ret) Michael Ennis, Director Emeritus LTG (USA, Ret) Patrick M. Hughes, Director Emeritus Col (USAF, Ret) William Huntington, Director Emeritus The American Intelligence Journal (AIJ) is published by the National Military Intelligence Foundation (NMIF), a non-profit, non-political foundation supporting American intelligence professionals and the U.S. Intelligence Community, primarily through educational means. NMIF believes in the power of the intelligence mission to inspire young people to join the intelligence profession as a career of service to the nation.
    [Show full text]
  • Espionage Vestigations
    Counterintelligence ESPIONAGE Division VESTIGATIONS Counterintelligence Training Center ESPIONAGE ESPIONAGE STATUTES 18 Usc 794Espionage Statute Transmittal National Defense Information Espion The act or age To an Agent of Foreign Power \Vith Intent to U.S orAid Foreign Power practice of pying or of Injure 50 Usc 783 -- Unauthorized Disclosure using spies obtain Filler Statute secret intell gence U.S Government Employee Who Knowingly Transmits Jiuraruti Olaaonr Classified Information To Foreign National BRIAN PATRICK REGAN NRc4 ANNA BELAN MONTESDlAc We are here today to tell the full story of Brian Patrick Regans Born 1957 singe never betrayal of his country We want you to see the magnitude married no children of the damage this man was willing to inflict Oldest of four siblings FBI on his country and fellow citizens usAnomey Paul McNtriy employees US Citizen Puerto Rican descent BS University of Virginia 1979 MS Johns Hopkins SAIS 1984 Worked at DOJ FOIPA 1979- 85 Hired by Defense Intelligence Agency DIA in 1985 of classified documents 20000 pages Buried in 19 locations in Virginia and Maryland ACLURM043308 FB1042208 -4 ROBERT HAN SSEN ROBERT HANSSEN FBI iruaj Robert Hanssen birAlaliovas A57 year old veteran FBI employee who received more than $1.4 million in cash jewels while spying for 17 and coat tpanaa 5octytth years for the KGB/SVR He pled Wa dh be lycoalty guilty to 15 counts of espionage- related charges Sentence life iZdmo1coldrngakiVm Vecjc aJrrad ytrioRtibvcrlv1 pJ codiiuaftev dntacs dodravor recovered at the Loon Pkdhoped
    [Show full text]
  • Evaluating Due Process Challenges to the Federal Death Penalty Act
    DePaul Law Review Volume 53 Issue 4 Summer 2004: Symposium - Race to Article 16 Execution Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act Joshua Herman Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation Joshua Herman, Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act, 53 DePaul L. Rev. 1777 (2004) Available at: https://via.library.depaul.edu/law-review/vol53/iss4/16 This Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. DEATH DENIES DUE PROCESS: EVALUATING DUE PROCESS CHALLENGES TO THE FEDERAL DEATH PENALTY ACT Who was it? A friend? A good man? Someone who sympathized? Someone who wanted to help? Was it one person only? Or was it mankind? Was help at hand? Were there arguments in his favor that had been overlooked? Of course there must be. Logic is doubtless unshakable, but it cannot withstand a man who wants to go on liv- ing. Where was the Judge whom he had never seen? Where was the high Court, to which he had never penetrated? He raised his hands and spread out all his fingers. 1 -Franz Kafka, The Trial INTRODUCTION In a three-month span in 2002, two district courts declared the Fed- eral Death Penalty Act (FDPA) unconstitutional. 2 United States v. Quinones3 and United States v.
    [Show full text]
  • Security Along the Border: the Insider Threat Building a Secure Workforce 2 Table of Contents
    Security along the Border: The Insider Threat Building a secure workforce 2 Table of contents 5 Introduction 6 Attempting to understand the insider threat 6 Summary findings: Insider threat 8 Asset loss and insider threat defined 10 Risk indicators and characteristics 10 Risk of increased computing and networking 10 Risk from changing workforce demographics 11 Risk of competing loyalties 12 Mitigating asset loss: a series of interventions and action plans 12 Develop an integrated approach to a secure workforce to mitigate assets loss 12 Develop the workforce as a security sensor and collector 13 Leverage human resources as a risk mitigaor 13 Use predictive analytics to assess workforce 15 Manage risk through cyber security and information access management 17 Why now? Building a secure workforce Guarding against insider threat on the border 3 Introduction People are an organization’s greatest resource, yet, at necessary equation for protecting against asset loss. The times, they pose a significant threat to its mission and third part of the equation, managing a secure workforce operations. For an organization executing a complex and and mitigating the threat posed by the vetted employee or politically visible mission, the potential loss of confidence the ‘insider’ is often the most critical variable. in public support at the hands of an employee undermines the agency’s ability to execute the mission, recruit staff, The ‘insider threat’ for border security is real and well and develop sustainable partnerships with other U.S. and documented. In a March 2010 Senate briefing, officials international agencies. The 58,000 employees of the from the U.S.
    [Show full text]
  • Changes in Espionage by Americans: 1947-2007
    Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig Northrop Grumman Technical Services Approved for Public Distribution: Distribution Unlimited Defense Personnel Security Research Center Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig, Northrop Grumman Technical Services Released By – James A. Riedel BACKGROUND HIGHLIGHTS Since 1987, the Defense Personnel This report documents changes and trends Security Research Center in American espionage since 1990. Its (PERSEREC) has maintained a subjects are American citizens. Unlike two database on espionage by American earlier reports in this series, individuals are citizens based largely on open compared across three groups based on sources, and has collected files on when they began espionage activities. The each of the 173 individuals in the three groups are defined as between 1947 database. Espionage by Americans and 1979, 1980 and 1989, and 1990 and is the worst outcome for the 2007. The subset of cases that began since personnel security system that 2000 is given additional study. Findings works to reduce the risk of insider include: since 1990 offenders are more threat. Although its main focus is likely to be naturalized citizens, and to have the personnel security system, foreign attachments, connections, and ties. PERSEREC monitors and analyzes Their espionage is more likely to be espionage by Americans in order to motivated by divided loyalties. Twice as improve understanding of this many American espionage offenders since betrayal of trust by a small minority 1990 have been civilians than members of of citizens. This report is the third in the military, fewer held Top Secret while a series of technical reports on more held Secret clearances, and 37% had espionage based on the PERSEREC no security clearance giving them access to Espionage Database, files of classified information.
    [Show full text]
  • A Guide to the Psychology of Espionage
    This draft article will appear Association of Former Intelligence Officers in a future edition of AFIO's Intelligencer Journal 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 703 790-0320 - www.afio.com - [email protected] A Guide to the Psychology of Espionage David L. Charney, M.D. and John A. Irvin Introduction People are fascinated by espionage. The sheer volume of fiction and non-fiction books and movies dedicated to the subject of spying attests to this, as well as private citizens’ enthusiasm for news reports on cases of espionage and their thirst for mere fragments of insight into those engaged in it. This is probably in no small part due to the fact that so much of what we consider espionage occurs in a world inaccessible to most people. Even for those who have years of service in the intelligence community, however, one question remains difficult to fully explain: Why spy? History shows that most countries have at one time or another made the decision to seek out secret information regarding other countries, groups, or even their own people through clandestine means…that is, to spy. Still, except for irrational behavior on the part of unaccountable dictators, the decision to spy is usually based on the consensus of a country’s political leadership regarding national security goals and how to achieve them. This consensus decision may be complex but still more or less discernable to outsiders. What is much more difficult to understand is why a particular individual would chose to engage in espionage. The psychology of espionage
    [Show full text]
  • College Voice Vol. 26 No. 15
    Connecticut College Digital Commons @ Connecticut College 2002-2003 Student Newspapers 2-21-2003 College Voice Vol. 26 No. 15 Connecticut College Follow this and additional works at: https://digitalcommons.conncoll.edu/ccnews_2002_2003 Recommended Citation Connecticut College, "College Voice Vol. 26 No. 15" (2003). 2002-2003. 13. https://digitalcommons.conncoll.edu/ccnews_2002_2003/13 This Newspaper is brought to you for free and open access by the Student Newspapers at Digital Commons @ Connecticut College. It has been accepted for inclusion in 2002-2003 by an authorized administrator of Digital Commons @ Connecticut College. For more information, please contact [email protected]. The views expressed in this paper are solely those of the author. • First Class U.S. Postage PAID Permit #35 New London, cr PUBLISHED WEEKLY BY THE STUDENTS OF CONNECTICUT COLLEGE VOLUME XXVI • NUMBER 15 FRIDAY, FEBRUARY 21, 2003 CONNECTICUT COUJJGE, NEW LONDON; CT INSIDE: College Community Reacts to Hate NEWS I-Pride and the Dean of the College received harassing emails from white supremacy groups. Clockwisefrom above, angry students assembled in Knowlton before storming President Painstein's House Sunday. Hundreds abandon the open forum Tuesday whik their peers remained to speak against apathy and racism. The College'sFirstAnnual Summit 011 Diversity generated constmctive proposals for thefuture (Rogers, Kreit, Faries). Students March On Fainstein's Throngs Pack Palmer for House Demanding Action College- Wide Open Forum A&E takes a look at this year's Oscar's race and hazards a few By JAMIE ROGERS By BRYAN SERINO predictions NEWS EDITOR AssocIATE NEWS EDITOR At 1:30 PM on Sunday, February 16 over This past Sunday over 150 Connecticut 150 students marched from Knowlton to 772 College students marched from Knowlton to Williams St, home of Norman Fainstein, President Fainstein's house in response to a President of the College to protest the most harassing and racially charged phone call a recent flurry of hate crimes on campus.
    [Show full text]
  • To Whom Does a Defense Industry Firm Owe a Duty When There Is an Opportunity to Pay a Bribe
    [draft for discussion purposes – please do not quote without permission] To Whom Does a Defense Industry Firm Owe a Duty When There is an Opportunity to Pay a Bribe Philip M. Nichols* Abstract The defense industry has a long history with bribery. Bribes paid by defense businesses had a central role in the Congressional Hearings that preceded enactment of the United States’ Foreign Corrupt Practices Act. Scarcely a year has gone by since then without revelations of bribes paid by a defense business somewhere in the world, and studies by Transparency International and the Organisation for Economic Cooperation and Development each suggest that bribery continues to plague the defense industry. The defense industry often counters that it works in a complex, multicultural environment in which personal payments to government officials are often expected. They also point to competition from weapons manufacturers that freely pay bribes. Bribery in the defense industry raises special concerns. For one thing, bribery tends to go hand in hand with diminished quality, which raises concerns about the safety of military personnel and others directly involved. For another, bribery tends to create an environment in which rules and regulations are ignored, which raises concerns about weapons flowing in contravention of rules intended to protect civilians and international order. The claims made by defense businesses and the concerns raised by bribery in the defense industry present a question: to whom does a defense business owe a duty when presented with an opportunity to pay a bribe? This paper concludes that because the market failures that allow bribery to flourish are the same market failures required for the defense industry to operate, and because defense industry firms benefit by operating in that imperfect market, they owe a duty to persons who would be harmed by the effects of bribery.
    [Show full text]
  • The Psychology of Espionage
    Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com, E-mail: [email protected] How do individual psychological factors impact the Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO collection and, especially, the analysis of intelligence? Perhaps the most intriguing question is why a person who has been placed in a position of trust would then betray that trust and engage in espionage? Why harm his or her country or group? Why expose one’s family to scandal… or worse? This is the issue of the so-called “insider spy.” GUIDE TO THE STUDY OF INTELLIGENCE Definitions For the purpose of this discussion, espionage will be defined in accordance with US Code Title 18 (Crimes and Criminal Procedure), Part I (Crimes), Chapter 37 (Espionage and Censorship), § 798 (Disclosure of classified The Psychology of Espionage information)1 as knowingly and willfully communicat- ing, furnishing, transmitting or otherwise making any classified information available to an unauthorized by David L. Charney, M.D. and John A. Irvin person, or publishing, or using it in any manner prej- udicial to the safety or interest of the United States or for the benefit of any foreign government to the Introduction detriment of the United States. This definition does not include classified intelligence collected on behalf eople are fascinated by espionage. The sheer of the United States and in accordance with US law. volume of fiction and non-fiction books and The word spy will refer to the “insider spy,” that movies dedicated to the subject of spying attests is, the individual who has been formally vetted, has P obtained appropriate security clearances, is placed to this, as well as private citizens’ enthusiasm for news reports on cases of espionage and their thirst for mere in a position of trust where he or she has access to fragments of insight into those engaged in it.
    [Show full text]
  • Insider Threat
    This extract and the original text it is taken from are both subject to ITGP copyright and may not be reproduced, in any form, without prior written consent from the publisher. Insider Threat A Guide to Understanding, Detecting, and Defending Against the Enemy from Within DR. JULIE E. MEHAN, PHD, CISSP, ISSPCS This extract and the original text it is taken from are both subject to ITGP copyright and may not be reproduced, in any form, without prior written consent from the publisher. Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader‘s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form, or by any means, with the prior permission in writing of the publisher or, in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency.
    [Show full text]