The Ethics of Intelligence Collection Ross W. Bellaby

Total Page:16

File Type:pdf, Size:1020Kb

The Ethics of Intelligence Collection Ross W. Bellaby What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loans after expiry of a bar on access approved by Aberystwyth University. Signed ..................................................................... (Ross W. Bellaby) Date………………………………………………….. Summary As the professional practice of intelligence collection adapts to the changing environment of the twenty-first century, many academic experts and intelligence professionals have called for a coherent ethical framework that outlines exactly when, by what means and to what ends intelligence is justified. Recent controversies, including reports of abuse at Guantanamo Bay and Abu Ghraib, allegations of extraordinary rendition programmes and the ever-increasing pervasiveness of the ‘surveillance state’, have all raised concerns regarding the role of intelligence in society. As a result, there is increased debate regarding the question of whether or not intelligence collection can be carried out ethically. This thesis will tackle this question by creating an ethical framework specifically designed for intelligence that is capable of outlining under what circumstances, if any, different intelligence collection activities are ethically permissible. This thesis argues that there is a tension presented by intelligence collection between the damage that it can cause and the important, ethical role it can play in the political community. In order to deal with this tension the ethical framework proposed in this thesis is comprised of two parts. The first part is designed to recognise those features of intelligence that might be considered ethically unacceptable by highlighting the ‘harm’ it can cause. Once the harm is understood, the second part of the ethical framework establishes a set of Just Intelligence Principles that can outline if and when the harms caused are justified. These Just Intelligence Principles are developed by drawing upon the just war tradition and its criteria of just cause, legitimate authority, right intention, last resort, proportionality and discrimination. By placing the harm that intelligence can cause into context with the Just Intelligence Principles it is possible to limit the use of intelligence while recognising the important role it plays in protecting the political community. Once the ethical framework has been established in Chapter One it is then applied to a range of intelligence collection activities in Chapters Two, Three, Four and Five. This thesis will examine three of the most prominent collection disciplines in the field of intelligence studies: imagery intelligence, signals intelligence and human intelligence. By applying the ethical framework established in the beginning of the thesis to these three important intelligence collection disciplines, it is possible to better understand the ethical framework. The main argument of this thesis will be that the most appropriate ethical framework for intelligence collection is one which is able to recognise that intelligence collection does indeed cause harm, but that sometimes this harm is necessary in order to protect the political community. I Acknowledgements The first acknowledgments of this thesis must go to my outstanding supervisors, Professor Toni Erskine and Professor Peter Jackson. As a team they have proved to be one of the best, providing me with unending encouragement, enthusiasm for my project, interesting and engaging academic debate and the type of support that I could not have lived without. Their meticulous reading of my work, intellectual acuity and their support to develop and grow in my own way has not only helped this immediate piece of work but has given me confidence in my ability as a researcher and as a writer to take me far beyond what I have achieved here. Other members of the department that I would like to extend a special acknowledgement to include Professor Len Scott and Professor Martin Swinburn Alexander. Len has always been an important supporting force for me and my project during my years at Aberystwyth. From the initial days of developing my project all the way through to the end Len has been unceasing in his interest and support, something which has been a great source of strength to me. I must also extend my unending gratitude to Martin for his role in my life during my postgraduate years. While my PhD is the summation of my research here at Aberystwyth, it does not reflect the utter joy I have had as a tutor within the department and it is in this area that Martin has been my mentor and friend. Martin has not only shown to me what it means to be an outstanding lecturer and tutor, but also what it means to act as a role model for those we teach and who come to rely on us. If I become half the true academics that Len and Martin represent then I will be fortunate. To my friends and loved ones I cannot say enough. Lisa Denney and Matthew Fluck, thank you for being there for me through my PhD and for providing me with coffee and cake on a regular basis – we will always be Office No.1 no matter where we end up. To Andy, Halle and Aoileann, thank you for always making me laugh, showing me love and for chasing away Aberystwyth’s most persistent grey skies. To Chris, Alison, David, Tom and Pat, even though you are now far away, memories of you keep me warm. And to everyone else who I do not have space to mention – I thank you all for never asking me to explain my PhD, but always asking me how I am. Finally, I dedicate this piece of work to my family – Judith, Keith, Tamasine and Robbie. You have all been there for me over these many years and have only ever wanted me to be happy in anything that I do. You are my unending support, whose voice, humour and love has kept me going through all I have ever tried to do. We are the collective and we will never be broken. Your unconditional love and guidance has made me what I am today and I cannot thank you enough for that. Thank you, everyone. II Contents SUMMARY I ACKNOWLEDGEMENTS II CONTENTS III TABLE OF FIGURES VII LIST OF ABBREVIATIONS VIII INTRODUCTION 1 CHAPTER ONE: HARM, JUST WAR AND A LADDER OF ESCALATION 22 Section One: What’s the Harm? 23 Primum Non Nocere – Above All, Do No Harm 23 Vital Interests 26 Physical Integrity 26 Mental Integrity 27 Autonomy 28 Liberty 29 Human Dignity as Amour-Propre: A Sense of One’s Own Self-Worth 30 Privacy 32 Conclusion 34 Section Two: Just War and Just Intelligence 35 Just War Meets Just Intelligence 35 Just Cause 37 Legitimate Authority 38 Right Intentions 40 Last Resort 41 Proportionality 41 Discrimination 43 Conclusion 45 Section Three: Ladders and Levels 46 Ladder of Escalation 46 Measuring the Levels of Harm 47 Levels of Just Intelligence 49 Legitimate Authority: Oversight & Chain of Command 51 Proportionality: What to Include and Exclude 51 Discrimination: Who to Target? 52 Ladder of Harm and the Ladder of Just Intelligence 55 Conclusion 57 III CHAPTER TWO: “THE EYES HAVE IT” IMAGERY INTELLIGENCE 58 Section One: The Nature of Imagery Intelligence 59 Visual Images 59 Intention 59 Security Lens 60 Capturing the Image 61 Types of Imagery Intelligence 61 Imagery Intelligence and the International 62 Society and the Individual 64 Conclusion 65 Section Two: Harm and Imagery Intelligence 66 Privacy 66 Levels of Privacy 68 Social Control 70 Conclusion 72 Section Three: Illustrative Examples 73 Satellites & Spy-Planes 73 Closed Circuit Television Cameras 76 Intensive Surveillance 81 Intrusive Surveillance 84 Conclusion 86 Section Four: Just Imagery Intelligence 88 Surface Satellite and Spy-Plane Scans 88 CCTV 88 Intensive Surveillance 91 Intrusive Surveillance 93 Conclusion 96 CHAPTER THREE: THE INFORMATION NATION INFORMATION TRANSMISSION, COLLECTION AND STORAGE 97 Section One: Signals and Data Intelligence 98 Signals 98 Intention 99 Security Lens 99 Technology and Capturing the Information 100 Signals Intelligence: Communications 100 Data Intelligence: Data-Mining & Dataveillance 103 Conclusion 105 Section Two: Privacy and Personal Control 106 Privacy as Control 106 Authorship
Recommended publications
  • The Wilson Doctrine Pat Strickland
    BRIEFING PAPER Number 4258, 19 June 2015 By Cheryl Pilbeam The Wilson Doctrine Pat Strickland Inside: 1. Introduction 2. Historical background 3. The Wilson doctrine 4. Prison surveillance 5. Damian Green 6. The NSA files and metadata 7. Labour MPs: police monitoring www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary Number 4258, 19 June 2015 2 Contents Summary 3 1. Introduction 4 2. Historical background 4 3. The Wilson doctrine 5 3.1 Criticism of the Wilson doctrine 6 4. Prison surveillance 9 4.1 Alleged events at Woodhill prison 9 4.2 Recording of prisoner’s telephone calls – 2006-2012 10 5. Damian Green 12 6. The NSA files and metadata 13 6.1 Prism 13 6.2 Tempora and metadata 14 Legal challenges 14 7. Labour MPs: police monitoring 15 Cover page image copyright: Chamber-070 by UK Parliament image. Licensed under CC BY 2.0 / image cropped 3 The Wilson Doctrine Summary The convention that MPs’ communications should not be intercepted by police or security services is known as the ‘Wilson Doctrine’. It is named after the former Prime Minister Harold Wilson who established the rule in 1966. According to the Times on 18 November 1966, some MPs were concerned that the security services were tapping their telephones. In November 1966, in response to a number of parliamentary questions, Harold Wilson made a statement in the House of Commons saying that MPs phones would not be tapped. More recently, successive Interception of Communications Commissioners have recommended that the forty year convention which has banned the interception of MPs’ communications should be lifted, on the grounds that legislation governing interception has been introduced since 1966.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • April 19 Digest (Pdf)
    Dear all, Please see below for upcoming events, opportunities, and publications that may be of interest to you. TABLE OF CONTENTS 1. ‘Invisible Agents’ with Nadine Akkerman 2. ‘Breaking News! US Intelligence and the Press’ 3. ‘The scandalous case of John Vassall’ with Mark Dunton 4. Conference on ‘Women in Intelligence’ 5. Conference on ‘Emerging Trends: New Tools, Threats, and Thinking’ 6. Belgian Intelligence Studies Centre Conference 7. CfP: ‘The Bondian Cold War: The Transitional Legacies of a Cold War Icon’ 8. CfP: ‘Need to Know IX: Intelligence and major political change’ 9. Journal for Intelligence, Propaganda and Security Studies (Vol.12, No.1) 10. International Journal of Intelligence and CounterIntelligence (Vol.32, No.1) EVENTS 1.’Invisible Agents’ with Nadine Akkerman Hosted by Edinburgh Spy Week Friday 12 April Project Room, 50 George Square Edinburgh, UK Nadine Akkerman, winner of the 2019 Ammodo Science Award, will discuss her research into the role of women in the politics and espionage of the seventeenth century. For her best-selling book Invisible Agents, Nadine had to act as a modern-day spy, breaking cipher codes and studying invisible inks to unearth long-hidden plots and conspiracies. This compelling and ground-breaking contribution to the history of espionage details a series of case studies in which women - from playwright to postmistress, from lady-in-waiting to laundry woman - acted as spies, sourcing and passing on confidential information on account of political and religious convictions or to obtain money or power. Registration is available here 2. ‘Breaking News! US Intelligence and the Press’ Hosted by the Michael V.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • High Court Judgment Template
    Case No: CO/5160/2014 Neutral Citation Number: [2015] EWHC 2354 (Admin) IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 07/08/2015 Before: THE HONOURABLE MR JUSTICE CRANSTON - - - - - - - - - - - - - - - - - - - - - Between: THE COMMISSIONER OF THE POLICE OF THE Claimant METROPOLIS - and - SYED TALHA AHSAN Defendant - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mr Tom Little (instructed by the Metropolitan Police Legal Service) for the Claimant Mr Daniel Squires (instructed by Birnberg Peirce & Partners) for the Defendant Hearing dates: 24/07/2015 - - - - - - - - - - - - - - - - - - - - - Judgmen tMr Justice Cranston: Introduction: 1. This is an application by the Commissioner of Police of the Metropolis (“the Commissioner”) for an order to impose notification requirements for a period of 15 years on Syed Talha Ahsan (“Mr Ahsan”) under the Counter-Terrorism Act 2008 (“the 2008 Act”). In 2013, he was convicted in the United States of conspiracy to provide material assistance for terrorism through his involvement in a website. He has now returned to the United Kingdom. The notification order will require him for that period to attend police stations to provide, and update, information about his living arrangements and to provide details about his travel plans, for which permission can be refused. Breach of the requirements is punishable with imprisonment of up to 5 years. 2. Notification requirements have been imposed in many cases when persons have been convicted in the UK of terrorist-related offences. This is the first case in which a notification order has been contested in respect of a person convicted outside the UK of a corresponding foreign offence.
    [Show full text]
  • Dragon Magazine Within the Last Cherie Knull Tually Has Been with Us Since Last October, Year
    January 1981 Dragon 1 Dragon Vol. V, No. 7 Vol. V, No. 7 January 1981 Publisher. E. Gary Gygax Editor. Jake Jaquet Assistant editor. Kim Mohan Good-bye 1980, hello 1981. And hello to a tain aspects of role-playing and the benefits Editorial staff . Bryce Knorr couple of new (and pretty, I might add, if I derived therefrom. He and his wife, who is Marilyn Mays won’t get accused of sexism) faces here at the typist and a behind-the-scenes collab- Sales & Circulation . Debbie Chiusano Dragon Publishing. New, or at least rela- orator, have been responsible for more Corey Koebernick tively new, to our sales and circulation de- than a dozen short articles and stories pub- Office staff . Dawn Pekul partment is Debbie Chiusano—Debbie ac- lished in Dragon magazine within the last Cherie Knull tually has been with us since last October, year. Roger’s name is on the alchemist and Roger Raupp but this has been our first opportunity to astrologer NPC articles in this issue, and in Contributing editors . Roger Moore formally welcome her in print. The most Dragon issue #44 he became the first Ed Greenwood recent addition to our organization is author to have two creatures featured in Marilyn Mays, added just last month to our Dragon’s Bestiary in the same magazine. editorial staff. Let’s hear it for the new kids This month’s contributing artists: on the block! With the start of a new year, it seems appro- Morrissey Jeff Lanners priate to reflect a bit on the past year and Roger Raupp Kenneth Rahman We’re also happy to welcome two other look ahead a little to the future.
    [Show full text]
  • Top Ten Taglines
    Guantanamo: Detainee Accounts Table of Contents I. Transfer to Guantanamo.......................................................................................................... 1 II. Living conditions ..................................................................................................................... 5 III. Interrogation........................................................................................................................... 9 IV. Humilation and Degradation.............................................................................................. 13 V. Punishment............................................................................................................................. 15 VI. Beatings and other inappropriate use of force................................................................. 18 VII. Suicide Attempts................................................................................................................. 22 VIII. Release ................................................................................................................................ 22 IX. After-effects .......................................................................................................................... 23 Introduction The following is a compilation by Human Rights Watch of accounts by thirty-three former detainees at Guantanamo of their experiences there. Human Rights Watch interviewed sixteen of the detainees, reviewed press reports containing statements by former detainees interviewed
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Brighton 1974
    Established 1918 JOURNAL OF THE FIRE BRIGADES' UNION Fire SEPTEMBER 1974 VOL 2 No. 6 FIGHTER BRIGHTON 1974 A SOCIAL CONTRACT says TUC Let's Elect a Labour Government PAGE TWO FIREFIGHTER/SEPTEMBER 1974 Fire FIGHTER MONTHLY JOURNAL OF THE FIRE BRIGADES' UNION 59 FULHAM HIGH ST. LON DON SW6 GENERAL SECRETARY: T E R E N C E P A R R Y , OB E Union makes progress at NJC meeting PROGRESS was made on several issues at the last meeting holidays for the Fire Service will be receiving consideration of the National Joint Council, which was the Annual Gen­ by the Executive Council. eral Meeting, at the Fire Service Technical College, Moreton-in-Marsh. RETAINED MEMBERS ALLOWANCES The main points are reported below. • Retained members’ allowances with the exception of the retaining fee, are to be increased by 7 per cent dating from 1st April 1974. There is also for the first time to be EXTRA HOLIDAYS payment made to retained members for attendance at SOME PROGRESS was made on two extra-public holidays drills. This will be at the appropriate hourly rate and is for the Fire Service and payment for attendance at drills to also backdated to 1st April 1974. retained members. Other items are continuing to receive attention. The full details of the improvements in retained members’ conditions is explained by Roy Martindale on page 3. • From 1975 the Fire Service will be brought into line with the National Agreements on the number of Public Holi­ CONTROL ROOM STAFF days granted to the manual grades, and the Administra­ tive, Professional, Technical and Clerical Employees in • For Control Room Staff it now seems there is a firm Local Government, that is to say, in addition to the seven nomenclature agreed.
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]
  • Union Will Campaign to Free Former Student Imprisoned Under Terror
    The ye ar of physics Going underground New year nightlife Flying daggers Celebrating science in 2005, The Caving Club’s ex pedition Ringing in 2005 with some Felix Film takes in a page 7 to Slovenia, page 11 psy-trance, page 14 beautiful movie, page 16 The student newspaper of Imperial College ● Established 1949 ● Issue 1310 ● Thursday 6 January 2005 ● www.felixonline.co.uk The tsunami On Boxing Day, countries sur- rounding the Indian Ocean Union will campaign to free former were struck by one of the worst natural disasters in history. student imprisoned under terror laws There are six articles on the tragedy, including details of Imperial College’s response By Dave Edwards and how an early warning Editor system could have saved thousands of lives. Imperial College Union has uNEWS page 2 resolved to actively support u SCIENCE page 7 the ‘Free Babar Ahmad’ cam- paign. Library loss? Mr Ahmad, a former stu- The popular mechanical engi- dent and staff member at neering department library Imperial College, was arrest- and reading room may close ed in December 2003 under in the near future. The area the Terrorism Act [see Felix is seen as “a potential solu- issue 1279] and subsequently tion to a series of conflicting released without charge. He demands for space”. was rearrested in August this uNEWS page 4 year on allegations of involve- ment in acts of terrorism and Accountability is currently awaiting extradi- The Imperial College Union tion to the United States. His President and other offic- case is due to be reviewed in ers have been criticised for the near future.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]