Instructors' Bios

Total Page:16

File Type:pdf, Size:1020Kb

Instructors' Bios Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design HARMONIZED THREAT RISK VULNERALBILITY ASSESSMENT (HTRVA) INSTRUCTORS’ BIOS Major (Ret’d) Alan Dickie, CD Al began his career with the Canadian Forces (CF) in 1974 with a reconnaissance unit and did a stint as a Nuclear Security Operator before transferring to the Military Intelligence Branch in 1982. He spent much of his career overseas, at the headquarters in West Germany and with the Attaché program in Beijing, China. Back in Canada he provided intelligence to the Task Force Commander during the Winnipeg flood of 1997 and in the aftermath of the ice storm of 1998. Since leaving the Regular Army Al has worked as a consultant with CF to provide intelligence training and process evaluation. He worked for several years as a crypto-analyst in the Counter-Terrorism Office of the Communications Security Establishment and as the leader of the CF Joint Imagery Centre’s Advanced Exploitation Section. He also remained active in the Army as a member of Ottawa’s Reserve Intelligence unit as the Training Officer, Sergeant-Major and, after being commissioned, the Commanding Officer. Al’s most recent work has been as the International Intelligence Training Coordinator on a part-time basis for the Canadian Army Headquarters while his full-time job is as the manager of the Intelligence Section at Natural Resources Canada. Major (Ret’d) Barry J. McLean Threat, Risk and Vulnerability Assessment Background Barry McLean has significant experience in the design, analysis and conduct of TRVAs applicable to nuclear power plants, electricity transmission facilities, electricity generation facilities, hydro electric generation facilities, control centres, marine container facilities, marine oil and gas facilities, liquefied natural gas facilities, oil and gas 3010 Minto Centre, 1125 Colonel By Drive Ottawa, Ontario, Canada K1S 5B6 Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design pipelines, marine cruise ship facilities, marine ferry facilities and personal protection programs: o Manager responsible for Transport Canada’s National Marine Security Assessment Program, which includes the development and implementation of a comprehensive Security Assessment methodology and development and delivery of a Security Assessment Course to Transportation Security Inspectors and Intelligence Analysts, including being the Course Officer and instructor. o As the Senior Nuclear Security Intelligence Officer with the Canadian Nuclear Safety Commission’s Nuclear Security Division, was responsible for the review and approval of high risk nuclear sites’ annually submitted threat and risk assessments, and was the chair of the joint government - nuclear licensee Threat and Risk Assessment Working Group. o Led and participated national marine security assessment teams for Transport Canada for significant events, including 2010 Olympics and G20 Summit. o Conducted numerous marine security assessments of ports and marine facilities as a Marine Security Inspector. o Developed and implemented a provincial-level TRVA methodology as part of a critical infrastructure protection program with Government of New Brunswick’s Security and Emergencies Directorate. This included the personal conduct of numerous TRVAs in the energy and government sectors. o As a member of NRCan’s Energy Infrastructure Protection Division, participated in a significant number of bi-lateral TRVAs in Canada and the United States as the Senior Advisor, Assault Planning. o As the Director, Business Continuity Programs, Government of Alberta, was responsible for the design and implementation of a comprehensive Business Continuity Program for departments, agencies and boards. o As a security consultant, designed and conducted TRVAs applicable to residences, offices and travel routes as part of Personal Protection and Kidnap and Ransom programs. o As a Senior Officer and assaulter in Canadian Forces’ Special Operations Forces, conducted numerous TRVAs in high risk environments in support of force protection, hostage rescue and personnel protection operations. 3010 Minto Centre, 1125 Colonel By Drive Ottawa, Ontario, Canada K1S 5B6 Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design Joey St. Jacques been employed with Hydro Ottawa for 27 years in various capacities. In his current role, he is responsible for physical security for the organization, which provides electrical distribution for the National Capital Region in and around Ottawa, Ontario, Canada. With 100 sites across the region, St. Jacques is responsible for security of office, service, fleet and substation assets. In addition to this high- profile role within the City of Ottawa, St. Jacques participates in various industry working groups within Canada and the U.S. that address physical and cyber security. St. Jacques has led seminars, delivered presentations and participated on a number of panel discussions at various security, facilities and utility conferences in Canada and the U.S. He serves on the following committees and boards: CEATI International, Infrastructure Protection Security Interest Group, Chair, Canada & U.S.; CEATI International, Cyber Security Task Force Working Group, Chair; 3 P’s Security & Business Continuity, City Of Ottawa, Co-Chair; National Energy Infrastructure Test Centre (SCADA), Advisory Board; Canadian Electric Association, Security and Infrastructure Protection Committee, Committee Member; Independent Electricity System Operator, Emergency Management Committee, Committee Member; National Strategy For Critical Infrastructure Protection, Energy and Utilities, Committee Member; CSIS Energy and Utilities Classified Briefings, Committee Member; RCMP Counter Terrorism Information, Officer Certificate. Ron Newman, CD Physical Security Consultant, Physical Security Section, Departmental Security Branch, RCMP TO FOLLOW 3010 Minto Centre, 1125 Colonel By Drive Ottawa, Ontario, Canada K1S 5B6 Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design Staff Sergeant Steve McDonagh: Currently the i/c of the RCMP CBDC (Canadian Bomb Data Centre) Worked for Square D Company Montreal 1974-1977 as an electrical draftsman Worked for Howe-Richardson Scale Company Montreal 1977-1982 as an electrical/electronic draftsman Graduated Dawson College Electrotechnology Program July 1981 Graduated Algonquin College Electronics Program –Diploma in Electronic Engineering Technology 1990 Certified Engineering Technologist (CET) designation received from OACETT (Ontario Association of Certified Engineering Technicians and Technologists) in 1997 Began work for the RCMP August 20th 1982 and has served in the following areas: -The RCMP VIP Section as a bodyguard / chauffeur -The RCMP AVAU (The Audio and Video Analysis Unit) -The RCMP CTI Unit (The Counter-Technical Intrusion Unit) -The RCMP Security Engineering Unit, now the Special Entry Unit) -The RCMP ED&TS (Explosives Disposal & Technology Section) now the CBRNE Operations Section since 1998 until the present. Sgt. Ted Broadhurst, M.Sc., PCIP, Federal Policing Criminal Operations, RCMP Mr. Broadhurst’s career within the field of critical infrastructure commenced with his education within the Manufacturing / Health sectors while completing a Master’s degree in the field of Biotechnology. This led to employment within the Government of Canada where he has attained a diverse breadth of experience and attributes specific to all Canadian Critical Infrastructure sectors, including the energy sector. He is a subject matter expert on criminal threat matters relating to critical infrastructure and has worked closely with Canada’s Security and Intelligence community in this regard with a focus on detection and analysis of potential and/or credible criminal threats to Canada’s critical infrastructure. This includes possessing a 3010 Minto Centre, 1125 Colonel By Drive Ottawa, Ontario, Canada K1S 5B6 Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design working and practical knowledge of physical security operations, risk- vulnerability-threat methodology/application, and information and technology protection. This core work within the critical infrastructure field has led to extensive associated skills related to emergency management and management of critical incidents and/or crisis situations leading to criminal investigations, intelligence, and analysis of complex criminal investigations including those involving terrorism. In his capacity he has also represented the Government of Canada in the development of inter-governmental memorandums to cabinet, and multi-national fora on weapons of mass destruction and counter proliferation. Timothy Allan O’Neil, Director, Oldcastle Security Consulting, Ottawa, Ontario Over 40 years of diverse service within the Government of Canada. Retired as peace officer, with extensive experience responding to emergency and crises situations; extensive experience developing and leading teams of senior investigators tasked with the investigation and analysis of complex criminal investigations including those involving terrorism; developing and leading multi-agency working groups to meet common objectives. Extensive experience: managing national law-enforcement programs; developing and exercising emergency response plans; drafting operational and administration policies and standard operating
Recommended publications
  • 'Global Intelligence Co-Operation Versus Accountability: New Facets
    This article was downloaded by: [Aldrich, Richard J.] On: 2 April 2009 Access details: Access Details: [subscription number 910154969] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713672628 Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem Richard J. Aldrich Online Publication Date: 01 February 2009 To cite this Article Aldrich, Richard J.(2009)'Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem',Intelligence and National Security,24:1,26 — 56 To link to this Article: DOI: 10.1080/02684520902756812 URL: http://dx.doi.org/10.1080/02684520902756812 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
    [Show full text]
  • Remnants of Al-Qaeda in Saudi Arabia: Current Assessment
    Remnants of al-Qaeda in Saudi Arabia: Current Assessment Washington, DC - November 9th, 2006 Center for Strategic and International Studies Nawaf Obaid Managing Director Counter-Terrorism in the Kingdom • Since May 2003, Saudi security forces have captured ~845 individuals with direct or indirect links to al-Qaeda. • Over 400 have attended “ideological re-education programs.” • 264 al-Qaeda commanders, logisticians, theologians, financiers and fighters have been captured or killed. • Of 26 members that comprised first “most wanted” list, all but one have been killed or captured and all five initial al-Qaeda cells have been identified, infiltrated and decimated. • Of 36 second-tier operatives comprising second “most wanted” list: • 20 had already fled the Kingdom when list was published • Of remaining 16, only 4 have not been killed or captured • This group carried out recent failed attack on Abqaiq • Over 25 major terrorist attacks have been foiled since May 2003. Saudi National Security Assessment Project 2 Counter-Terrorism in the Kingdom (cont.) • Four of the main routes used by terrorists to smuggle themselves, fighters, weapons and drugs have been identified. • Close surveillance had resulted in hundreds of interceptions on the Saudi-Yemeni border. • The largest of the al-Qaeda safe houses used for logistical support has been destroyed. As have three in Riyadh, two in Qassim, two in the Eastern Province, one in Najran and three in the Western Province (Makkah, Madinah and Jeddah). • Several arrests of fighters returning from Afghanistan and Pakistan have been made over the past several months. Important Note: They had no attack plan and no clear command structure, focused exclusively on avoiding Saudi security services.
    [Show full text]
  • Understanding and Intelligence Support to Joint Operations
    JDP 2-00 JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS Joint Doctrine Publication 2-00 (JDP 2-00) (3rd Edition), August 2011 is promulgated as directed by the Chiefs of Staff Assistant Chief of the Defence Staff (Development, Concepts and Doctrine) CONDITIONS OF RELEASE 1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments except as authorised by both the sponsor and the MOD where appropriate. 2. This information may be subject to privately owned rights. i 3rd Edition, Change 1 JDP 2-00 AUTHORISATION The Development, Concepts and Doctrine Centre (DCDC) is responsible for publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar publications. Readers wishing to quote JDPs as reference material in other work should confirm with the DCDC Doctrine Editor whether the particular publication and amendment state remains authoritative. Comments on factual accuracy or proposals for amendment are welcomed by the Doctrine Editor at: The Development, Concepts and Doctrine Centre Ministry of Defence Shrivenham SWINDON, Wiltshire, SN6 8RF Telephone number: 01793 314216/7 Military Network: 96161 4216/4217 Facsimile number: 01793 314232 Military Network: 96161 4232 E-mail: [email protected] DISTRIBUTION Distribution of JDPs is managed by the Forms and Publications Section, DSDA Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests for issue of this publication, or amendments to its distribution should be referred to the DSDA Operations Centre.
    [Show full text]
  • UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
    UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.
    [Show full text]
  • Guidelines on SPECIAL BRANCH WORK in the United Kingdom
    Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence to help protect the public from national security threats, especially terrorism and other extremist activity, and through this they play a valuable role in promoting community safety and cohesion. These revised Guidelines – which replace the Guidelines issued in 1994 – describe the current broad range of Special Branch roles and functions at national, regional and local levels. Although Special Branches continue to have important roles in the policing of extremist activity and in the provision of personal protection for VIPs and Royalty, counter terrorist work, in close co-operation with the Security Service (MI5), is currently the main focus of their activity. The current nature of the terrorist threat requires a flexible response and we are encouraged by the development of regional structures which will enhance this approach. In addition, the appointment of the National Co-ordinator of Special Branch will help ensure an even more effective joined-up approach. We are grateful for the professionalism and efficiency with which all Special Branch Officers carry out their duties and we hope that the revised Guidelines provide a useful tool in describing and putting into context the essential nature of Special Branch working. We commend them to you. The Rt Hon David Blunkett MP Cathy Jamieson MSP The Rt Hon Jane Kennedy MP Secretary of State for Minister for Justice Minister of State for the Home Department Northern Ireland GUIDELINES ON SPECIAL BRANCH WORK IN THE UNITED KINGDOM PURPOSE 1.
    [Show full text]
  • Swansea University Open Access Repository
    Cronfa - Swansea University Open Access Repository _____________________________________________________________ This is an author produced version of a paper published in: The Welsh History Review / Cylchgrawn Hanes Cymru Cronfa URL for this paper: http://cronfa.swan.ac.uk/Record/cronfa40530 _____________________________________________________________ Paper: Eirug, A. (2017). The Security Services in South Wales During the First World War. The Welsh History Review / Cylchgrawn Hanes Cymru, 28(4) http://dx.doi.org/10.16922/whr.28.4.7 _____________________________________________________________ This item is brought to you by Swansea University. Any person downloading material is agreeing to abide by the terms of the repository licence. Copies of full text items may be used or reproduced in any format or medium, without prior permission for personal research or study, educational or non-commercial purposes only. The copyright for any work remains with the original author unless otherwise specified. The full-text must not be sold in any format or medium without the formal permission of the copyright holder. Permission for multiple reproductions should be obtained from the original author. Authors are personally responsible for adhering to copyright and publisher restrictions when uploading content to the repository. http://www.swansea.ac.uk/library/researchsupport/ris-support/ 1 THE SECURITY SERVICES IN SOUTH WALES DURING THE FIRST WORLD WAR Aled Eirug Cardiff Abstract: This article reveals the activity of British intelligence agents in south Wales during the Great War, and their involvement in the surveillance of those considered to be ‘subversive’ elements within the peace and labour movements. Within the context of south Wales, it considers the significant shift of the prime concern for the security agencies during the War, from German counter-espionage to domestic counter- subversion.
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • Chairman's Introduction
    a. Chairman’s Introduction “The army does not determine its own structure, rules and methods of action … the organization of the army and the determination of its character – all these are within the sole capacity of civilian authorities: the Government, the Knesset and the voters.” (David Ben Gurion, Army and Defense, pages 141-142.) In the past decade, Israel’s intelligence services have faced three crucial challenges to their ability to detect the development of non-conventional warfare and ground-to-ground missiles in second and third tier countries. • In Iran, where they earned significant success by being among the first intelligence services to detect its efforts to develop a military nuclear industry already in the mid-Nineties. • In Iraq, where they had a certain lack of success in their efforts to establish elaborate Humint and Sigint systems that would be able to trace the existence and/or absence of its chemical and biological weapons systems and their missile capability in real time. • In Libya, where they failed to disclose the overall picture and woke up one fine morning to learn from foreign intelligence services of the real scope of that country’s efforts to obtain nuclear weapons that could threaten Israel’s very existence. With all due respect to innovative methods and brilliant operations – which took place in all the above three cases – these do not add up to the minimal achievement required in matters so essential to our national security. Thus, for example, the idea that a hostile Arab country like Libya, with a leader as unpredictable as Gaddafi, could have developed an elaborate nuclear industry without Israel’s intelligence services giving it the necessary early 5 warning to tackle the threat, or at least to prepare for it in good time, is simply intolerable.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • The British Intelligence Community in Singapore, 1946-1959: Local
    The British intelligence community in Singapore, 1946-1959: Local security, regional coordination and the Cold War in the Far East Alexander Nicholas Shaw Submitted in accordance with the requirements for the degree of PhD The University of Leeds, School of History January 2019 The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. The right of Alexander Nicholas Shaw to be identified as Author of this work has been asserted by Alexander Nicholas Shaw in accordance with the Copyright, Designs and Patents Act 1988. Acknowledgements I would like to thank all those who have supported me during this project. Firstly, to my funders, the White Rose College of the Arts and Humanities and the Arts and Humanities Research Council. Caryn Douglas and Clare Meadley have always been most encouraging and have never stinted in supplying sausage rolls. At Leeds, I am grateful to my supervisors Simon Ball, Adam Cathcart and, prior to his retirement, Martin Thornton. Emma Chippendale and Joanna Phillips have been invaluable guides in navigating the waters of PhD admin. In Durham, I am indebted to Francis Gotto from Palace Green Library and the Oriental Museum’s Craig Barclay and Rachel Barclay. I never expected to end up curating an exhibition of Asian art when I started researching British intelligence, but Rachel and Craig made that happen.
    [Show full text]
  • Russian Military Intelligence: Background and Issues for Congress
    Russian Military Intelligence: Background and Issues for Congress November 24, 2020 Congressional Research Service https://crsreports.congress.gov R46616 SUMMARY R46616 Russian Military Intelligence: Background and November 24, 2020 Issues for Congress Andrew S. Bowen Following Russia’s occupation of Ukraine’s Crimea region and invasion of eastern Ukraine in Analyst in Russian and 2014, many observers have linked Russia to additional malicious acts abroad. U.S. and European European Affairs officials and analysts have accused Russia of, among other things, interfering in U.S. elections in 2016; attempting a coup in Montenegro in 2016; conducting cyberattacks against the World Anti- Doping Agency and the Organization for the Prohibition of Chemical Weapons in 2016 and 2018, respectively; attempting to assassinate Russian intelligence defector Sergei Skripal in the United Kingdom in 2018; and offering “bounties” to Taliban-linked fighters to attack U.S. personnel in Afghanistan. Implicated in all these activities is Russia’s military intelligence agency, the Main Directorate of the General Staff (GU), also known as the GRU. The United States has indicted GRU officers and designated the GRU for sanctions in response to Russia’s invasion of Ukraine, cybercrimes, and election interference. The Department of Justice has indicted GRU officers for cyber-related offenses against the World Anti-Doping Agency and the Organization for the Prohibition of Chemical Weapons, NotPetya malware attacks in 2017, various cyberattacks against the 2018 Olympics, and interference in the 2016 U.S. elections. The GRU as an agency has been designated for sanctions under Executive Order 13694, as amended, and Section 224 of the Countering Russian Influence in Europe and Eurasia Act of 2017 (CRIEEA; P.L.
    [Show full text]
  • Ethics of Human Intelligence Operati'ons: ~F MICE and Men Donald A
    Ethics of Human Intelligence Operati'ons: ~f MICE and Men Donald A. Petkus . Recent debates on the ethics of espionage seem to center on questions of technical data collection and privacy rights, interrogation, covert intervention in foreign affairs (e.g., regime change), renditions, and conflicts of interest, but seldom .on the recruitment and management of agents. One issue that arises from the current espionage and ter­ rorism environment concerns standards for ethical decision making. For compelling reasons, members of the intelligence community must address the ethical issues Specific to human intelligence (HUMINT) . operatIOns. For those outside the intelligence community, the term "espionage ethics" may seem oxymoronic. With few exceptions, intelligence col­ lection overseas violates the target country's laws. Being expected to break a foreign country's laws and manipulate its citizens is part of the job for an intelligence officer, yet she or he is expected to scru­ pulously adhere to her or his own country's laws and professional standards. To some, the idea of espionage is itself distasteful. Prior to World War I, some of Great Britain's military attaches took the view that actual spying on the host country was ungentlemanly conduct for a "guest." For others, operational work with agents seemed to grate against their sensibilities, as in the case of an officer assigned to Ber­ lin just prior to World War I: With war now inevitable, Sir William Everett, the British military at­ tache in Berlin was asked by the Intelligence Branch to continue in secret service after leaving Germany. He declined, saying: "You will not have forgotten when we talked this matter over some months ago, that I mentioned how distasteful it would be to me when it no longer formed a necessary part of my duties.
    [Show full text]