2018 intelligence & cybersecurity conference · room# 230 safe and effective: a proposed method...

13
2018 Intelligence & Cybersecurity Conference Legally Immoral Activity: Testing the Limits of Intelligence Collection February 11-12, 2020 at The Citadel, Charleston, South Carolina 2020 Citadel Intelligence Ethics Conference

Upload: others

Post on 08-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2018 Intelligence & Cybersecurity

Conference

Legally Immoral Activity: Testing the Limits of

Intelligence Collection

February 11-12, 2020at The Citadel, Charleston, South Carolina

2020 Citadel Intelligence Ethics Conference

Page 2: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

Much has been given us, and much will rightfully be expected from us. We have duties to others and duties to ourselves; and we can shirk neither. We have become a great nation, forced by the fact of its greatness into relations with the other nations of the earth, and we must behave as beseems a people with such responsibilities. --Theodore Roosevelt

1

The Citadel Department of Intelligence and Security Studies

About The Citadel’s Department of Intelligence and Security Studies Reduced to its simplest terms, intelligence is knowledge and foreknowledge of the world around us—the prelude to decision and action by US policymakers.--Central Intelligence Agency

The 21st century is a time of transformative change, where governments and industries must understand and forecast current and future events in a way unprecedented in human history. The Citadel has dedicated itself to preparing public and private intelligence community professionals to meet the challenges of a changing and uncertain world. With its commitment to ethical leadership as well as excellence in the classroom, The Citadel is uniquely qualified to offer a curriculum in the emerging field of Intelligence and Security Studies. To accomplish these goals, we offer the following programs:

Core teaching faculty in Intelligence and Security Studies hold advanced degrees, have practical experience, and are active scholars. The program also has an extended set of practitioner teachers who provide real world experience for students.Student clubs, travel opportunities, access to guest speakers and conferences, and the unique Citadel atmosphere create the right educational environment to produce well-rounded, principled leaders at both the undergraduate and graduate level. For more information about our programs of study, please visit: http://www.citadel.edu/root/intelligence-and-security-studies-program

• Bachelor of Arts in Intelligence and Security Studies (Corps of Cadets, Day Students);

• Minor in Intelligence and Homeland Security (Corps of Cadets, Day Students);• Bachelor of Arts in Intelligence and Security Studies (Evening Undergraduate);• Master of Arts in Intelligence and Security Studies (Graduate, Online);• Graduate Certificate in Intelligence Analysis (Graduate, Online); and• Graduate Certificate in Homeland Security (Graduate, Online).

Page 3: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 2 3

Tuesday, February 11th

0730Buyer Auditorium: Registration

0830 to 0900Buyer Auditorium: Welcome – Introduction Break Sponsored by Verincona

0900 to 0945Room# 228 Ethics of Facial Recognition Software - Dana MotleyRoom# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl

1000 to 1045Room# 228 Democratic Proselytization of Terrorism - David OgboguRoom# 230 Should the United States Collect Intelligence on its Close Allies? – Shannon Brophy and Kaitlin Presnell

1100 to 1145Room# 228 Quantifying Risk as a Method of Reasoning Protecting Privacy at the Border - Ann M. Phillips and Diane M. Zorri Room# 230 In Harm’s Way: The Future of US Intelligence Collection – Joseph Fitsanakis1200 to 1345Buyer Auditorium LUNCH Sponsored by Bae Systems

1400 to 1445Room# 228 Who Shall Guard the Guardians? - Bruce M. MacKayRoom# 230 Accountability, Ethics and the Politics of Trust - Mary Manjikian

1500 to 1545Room# 228 Psychological Stressors and Elevated Risks for Ethical Violations Associated with Double-Life Professional Identities for Undercover Intelligence and Law Enforcement Professionals - Casey SkvorcRoom# 230 KGB Covert Operation “Retribution” and the Limitations of U.S. Intelligence During the Cold War: The Demjaniuk Affair - Olga Bertelsen

1600 to 1645Buyer Auditorium Research from Costal Carolina University - Richard J. Kilroy, Jr., Jonathan Smith, Edward Barone, Nathan Lake, Jonathan Trerise, and Lauren Keay-Golyakhovsky

1645 to 1800 BREAK

1800 to 1930Buyer Auditorium Disrupt, Discredit, and Divide: How the New FBI Damages Democracy - Mike German

Wednesday, February 12, 2020

0730Buyer Auditorium: Registration

0830 to 0900 BREAK Sponsored by International Journal of Intelligence and Counter Intelligence

0900 to 0945Buyer Auditorium Ethical Interrogation – Jeff Kimmons

1000 to 1045Room# 228 Technology and the Limits of Intelligence Collection - Anthony Pfaff Room# 230 Espionage and the First Amendment: The Case against Julian Assange – Gary Ross

Agenda

Page 4: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 4 5

1100 to 1145Room# 228 Ethics of Artificial Intelligence in Information Intelligence - Mark CareyRoom# 230 Freedom for the Wolf is death to the Lambs - Angela Gendron

1200 to 1300Buyer Auditorium LUNCH Sponsored by Bae Systems

1300 to 1445Room# 228 An Improved Theory of Morally Justified Intelligence Metadata Collection and Storage - Jonathan TreriseRoom# 230 The Blurry Blue Line: How American Law Enforcement Legalized Domestic Intelligence - Jeff Rogg

1500 to 1800 BREAK

1800 to 2030Buyer Auditorium Watergate Panel - Angelo Lano, Daniel Mahan, John Clynick, Paul Magallanes, John Mindermann Sponsored by Harry & Reba Huge Foundation

An Improved Theory of Morally Justified Intelligence Metadata Collection and Storage - Jonathan TreriseOne method of intelligence gathering is known as metadata collection and storage (MC&S), made famous by the 2013 revelations of Edward Snowden. Unfortunately, what is referred to by ‘metadata’ is not always clear and consistent. Some of Snowden’s revelations indicated deep intrusions of privacy. This has led many to think that MC&S is fundamentally problematic. However, MC&S can be permissible, if it is done in defense of non-liable people. To justify the collection of more specific, identifiable information, there must be more evidence of the target’s threat (or possibly also of the necessity of access to information the target possesses). Using a just war theoretic approach applied to the practice of intelligence requires showing how existing applications of just war theoretic principles to the practice of intelligence are problematic or limited in important ways. These applications have been insufficiently critical in two dimensions: first, they have been insufficiently critical about how just war theoretic principles apply to intelligence. Second, they have been insufficiently critical about the principles themselves.

Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. DahlAs governments and intelligence agencies develop new and increasingly intrusive tools for monitoring their citizens, new methods must be developed to determine whether those tools are appropriate. Where should the balance lie between security and liberty, and what limits should be placed on domestic intelligence collection? This presentation argues that domestic intelligence programs should follow a standard similar to that applied by the U.S. Food and Drug Administration in deciding whether drugs can be marketed: they need to be both safe and effective. Before they can be used to collect information on citizens, intelligence programs must be shown to be sufficiently safe for civil liberties to be acceptable in a democracy, and sufficiently effective that they can be expected to show a significant positive effect. These standards may seem like little more than common sense, but they are not criteria typically used in evaluating foreign intelligence operations, and adopting them would require a new way of thinking about and regulating of domestic intelligence programs.

In Harm’s Way: The Future of US Intelligence Collection

- Joseph FitsanakisAlmost from the moment of its inception, America’s modern intelligence-collection enterprise has displayed a strong and consistent bias in favor or technical means of

Agenda Presentations

Page 5: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 6 7

intelligence collection. The tendency of Americans to place their faith on technology, coupled with the superabundance of denied areas in the Soviet bloc during the Cold War, shaped the architecture of the US Intelligence Community (IC). The latter has remained highly technically oriented, even following the end of the Cold War. Today this structural bias can be seen in agencies like the National Security Agency, the National Reconnaissance Agency and the National Geospatial-Intelligence Agency, which dwarf their human intelligence (HUMINT) counterparts in size, funding, and even status. However, despite popular proclamations about “the era of cyber”, the golden days of America’s technical intelligence collection may be drawing to a close. The reason is that Washington’s state and non-state adversaries —and even some allies— have become acutely aware of the unmatched technical-collection capabilities of its intelligence enterprise. They therefore seek to defeat it by transforming their communications apparatus in a variety of asymmetrical ways. Some actors are consciously abandoning communications devices that we in advanced technological societies would consider “normal”, and are opting instead to use ‘old-school’ devices that cannot be traced by advanced digital-collection arsenals.

Ethical Interrogation - John “Jeff” KimmonsInterrogation remains an integral component of Human Intelligence (HUMINT), but as an art rather than a science requires a high level of training and disciplined use to ensure compliance with U.S. Law and Geneva Convention standards. In the wake of 2003 Detainee abuses at Abu Ghraib Detention Facility, Iraq, U.S. Army leaders conducted a root cause analysis of contributing factors and revised DoD-wide Interrogation doctrine to remove ambiguity regarding authorized practices and improve joint Military Intelligence and Military Police interaction. This resulted in major changes in how Army forces are organized to conduct, trained for, and conduct Interrogation operations worldwide across the full range of conflict and other missions. It also resulted in significant revision of Army (and DoD) Interrogation doctrine, which were incorporated into Field Manual 2-22.3 Human Intelligence Collection Operations (2006). The revised FM clearly defines allowable interrogation methods and practices (and proscribed practices) to enable production of operationally useful intelligence, while ensuring humane treatment for all Detainees regardless of status or circumstance. Discussion will include review of mission context, challenges and issues, and ethical considerations going forward.

Should the United States Collect Intelligence on its Close Allies?-Shannon Brophy and Kaitlin PresnellThe United States does not collect intelligence against all countries with the same

intensity. Members of the so-called Five Eyes alliance —Canada, the United Kingdom, Australia, and New Zealand— are believed to be excluded from America’s list of intelligence-collection targets, and allegedly so is the United Arab Emirates. Should this policy continue in today’s unpredictable and fast-changing geopolitical environment? The Five Eyes alliance has given the United States an unmatched level of integration with its allies by increasing intelligence sharing between its members. But does this mean the United States should still not collect intelligence on these close allies? Especially now that the UAE has allegedly been added to this short list, there are critics who claim that not collecting intelligence on these countries is creating a dangerous and possibly expanding knowledge gap —that America is missing out on critical pieces of intelligence. The United States does, however, collect on other “allies.” It has been caught spying on Germany’s Chancellor, Angela Merkel, on French companies who were allegedly supplying nuclear hardware to Iran, on the pro-Russian government of Austria (NATO member), on Turkey, and on Israel. There are arguably instances where intelligence collection on these allies has been critical —for example, intelligence on the 9/11 hijackers who planned their attacks while they were in Germany, or allegations that Turkey and Saudi Arabia may be backing elements within al-Qaeda or the Islamic State. Is the United States subverting its national security interests by not collecting on its close allies overseas, and now, allegedly, the UAE?

Quantifying Risk as a Method of Reasoning Protecting Privacy at the Border - Ann M. Phillips and Diane M. ZorriEvery month, thousands of travelers to and from the United States have their digital devices searched as they cross the border. These searches occur without warrants or even meeting the probable cause threshold; simply crossing the border provides the sole basis for this type of search. The Fourth Amendment of the United States Constitution is, however, designed to protect against unreasonable searches and seizures. Additionally, the First Amendment protects free speech, and the Fifth Amendment protects against compelled self-incrimination. While the U.S. border is not a Constitution-free zone, it does operate under well-established exceptions. Specifically, border agents are legally authorized to search all persons, possessions, and good entering the country; at this time, such searches are deemed “reasonable.” As the law stands today, border agents possess the authority to conduct such interrogations up to 100 miles inland from the border. Authorizing this type of action results in travelers in locations such as the entire state of Florida, as well as many major cities in the United States, being legally subject to warrantless searches of their phones, computers and digital devices. Given that millions of people cross into the U.S. every year, this means that countless searches of personal devices regularly occur. Although it is certainly reasonable for a sovereign country to desire to protect itself via inspections at the border, it is important to determine

Presentations

Page 6: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 8 9

what level of inspection is necessary to achieve that security. Research shows that the pace of technological advancement continues to outstrip legal guidance from either the legislature or the courts. The government’s duty to provide security should not, however, justify a suspension or other type of end-run of a citizen’s constitutional protections. Crossing the border should not, standing alone, allow the government to conduct digital dragnets of those people coming into the country.

The Democratic Proselytization of Terrorism - David OgboguShould Western Democratic states cease to encourage covert propaganda and surveillance methods that encourage terrorism and criminal activity? In the 21st century, cyberspace has become an anarchic cesspit consumed by defamatory and false information. Intelligence services are attempting to subvert and shape the perception of citizens around the world, in the absence of a sovereign liberal international arbiter that acts that can resolve disputes. Of late, intelligence services such as Britain’s Government Communications Headquarters (GCHQ), America’s Federal Bureau of Investigation (FBI), Russia’s GRU service and non-state groups such as CyberBerkut have been caught disseminating various forms of propaganda on the Internet. As a means of protecting democracy from hostile states and non-state groups, Western intelligence services have chosen to wield propaganda and surveillance measures. Leaked documents have revealed GCHQ’s propaganda aims of altering the outcome of online polls, setting up fake aliases to communicate with the world, and leaking confidential information to the press and blogs. The latter maneuver is ironically symmetrical with Russia’s alleged ploy of warping perception in America’s 2016 Presidential election. Moreover, the FBI’s fake terrorist propaganda website that was a part of a scheme to monitor and encourage US citizens to fight in Syria. Undercover FBI operatives left an email on the fake website in order to set up a form of communication. Consequently, the FBI gathered intelligence online by maintaining communication with those that initially were attracted to their fake terrorist website while simultaneously encouraging US citizens to engage in acts of terror in Syria.

Damn the Absolute - Richard HallThe conflict between “absolute security,” which entails compromising one’s civil liberties or rights, and “absolute civil liberties or rights,” which would give carte blanche to terrorists to operate thereby endangering public safety. My argument is that there should be neither absolute security nor absolute civil liberties but that each must be limited and make concessions to the other. Consequently, there will be an ongoing tension between the security of the state and the rights of individuals, a tension requiring compromise that is endemic to democratic polities. In making

my argument, I shall do the following: 1. draw distinctions between civil, natural, and human rights or liberties; 2. explain why the protection of rights or liberties of whatever type are important to the well-being of both states and their citizens; 3. establish a hierarchy of rights or liberties since not all are of equal standing with some being more fundamental than others; 4. determine what rights presumed terrorists have, if any.

Accountability, Ethics and the Politics of Trust - Mary ManjikianIn considering the ethics of intelligence collection, one key aspect to consider is the relationship between the President and the Intelligence Community. Noted scholar of trust Rosamaria Taddeo has famously defined trust as the ability to outsource a function or task to another, without feeling that one needs to supervise the carrying out of that task. In carrying out surveillance or collecting information, the President must trust the intelligence community in order to outsource the collection function to them, “trusting” that it will be carried out in accordance with his or her values, protocols and procedures. At the same time, in sharing information with the President and his National Security Staff, the intelligence community must trust the president – to safeguard classified information and not to politicize the information or utilize it in a partisan way. In this presentation, we apply Russell Hardin’s notion of trust as a gamble in which one balances the risks associated with outsourcing functions to another, against the benefits to be gained by this outsourcing. Hardin’s work allows us to conceptualize of the relationship between actor A and actor B as a strategic interaction in which each considers the other’s motives, competence and likelihood of defecting from the arrangement. This model is applied to considering strategic interactions between the President and the IC in 3 eras: The Reagan Era, the Kennedy Era and the Trump Era.

Psychological Stressors and Elevated Risks for Ethical Violations Associated with Double-Life Professional Identities for Undercover Intelligence and Law Enforcement Professionals Enforcement Professionals - Casey SkvorcLong term Undercover Officers (UCOs) infiltrate a target individual or group by falsely befriending members and secretly collecting evidence of clandestine activities. (Farkas, 1986). UCOs observe dishonesty and potentially immoral, illegal and unethicalactivities, and at times, must actively co-participate in them. For some, this can result in undermining their personal moral compass. Some UCOs report disorientation during and after their UC assignments are completed, as well as depression, PTSD, elevated suicidal ideation, anxiety, substance abuse, hypervigilance, guilt, and value

Presentations

Page 7: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 10 11

system changes. These psychological stressors have been associated with elevated risks for ethical violations committed during UC assignments. The proposed paper presentation will review links between psychological stressors experienced by UCO’s with double-life professional identities and elevated risks for ethical violations, based upon real-world case-studies.

KGB Covert Operation “Retribution” and the Limitations of U.S. Intelligence during the Cold War: The Demjaniuk Affair - Olga BertelsenThis presentation explores the sensational case of John Demjaniuk, a naturalized US citizen and an alleged Nazi collaborator, and examines the severe limitations of U.S. intelligence in gathering information and analyzing KGB covert operations, including the operation that targeted former Soviet citizens opposing the Soviet regime. More specifically, this study will analyze the objectives and the dynamics of the Soviet secret operation, code named “Vozmezdiie” (Retribution) that was conceived at the height of the Cold War in the late 1960s and designed to perpetuate in the West the image of Ukrainians as Nazi collaborators. This research will illuminate the role of the Soviet secret services and institutions in Ukraine in designing intelligence and counterintelligence operations conducted on American soil, and will investigate the objectives, dynamics, and reasons behind them. It will demonstrate that the processes of U.S. information gathering and counterintelligence that transcend geographical and political borders are complex and often lead to failures, associated with errors in legal prosecution and conducting fair trials, as it occurred in Demjaniuk’s case. This analysis, based on original archival research in the former KGB archive in Ukraine and recently declassified KGB documents, will equip readers with a nuanced understanding of the politicization of intelligence during the Cold War and the reasons behind thorny and disrupted relationships between the two largest diasporas in the U.S. in the 1960s-1980s, Jews and Ukrainians, which ultimately curtailed their shared efforts to alleviate the suffering of their counterparts under Soviet state violence. In addition, this presentation will assess to what degree Soviet secret operations of ideological subversion in North America were successful and why. The novelty of this study rests in its methodology and the thematic focus. It offers an alternative interpretation of the Demjaniuk case that challenges the extant master narrative. Very little has been written about the connection between this case, Soviet transnational covert operations, and U.S. intelligence. Those few works that briefly discuss this connection have been written in Ukrainian and published in Ukraine, a factor that limits discussions among broader scholarly audiences.

Ethics of Facial Recognition Software - Dana MotleyThe neighborhood of Englewood in downtown Chicago has been presented as having one of the worst collective crime and poverty demographics in the nation. Predominately African American, the neighborhood visually reflects the majority of struggling inner city areas around the country: streets are littered with glass, presentation, needles and other various garbage, open drug sales are encountered as children are walked to school and individuals proudly display gang colors as a designation of belonging. According to the City of Chicago Data Portal, the overall crime rate in Englewood is 256% higher than the national average. For every 100,000 people, there are 26.8 daily crimes that occur in Englewood. Social Justice News reports that “home to more than 34,000 people…the unemployment rate for West Englewood hovers around 37 percent, even as the city’s unemployment rate has recovered to 8.4 percent since the Great Recession.” The story is not unique. Visually however, few know what a neighborhood looks like with 37% unemployed. One out of every 4 men has nowhere to go for the day, nothing to do. Need based crime, or crimes for money is nothing new. However, there also elements of crime that creeps in out of pure boredom. Now imagine if points could be accumulated for a social class gaming system, that had benefits of “prizes” or rewards which could then be distributed to the average citizen in turn for good behavior?

Ethics of Artificial Intelligence in Information Intelligence - Mark CaryThe path of AI development to help orient the reader to the technology. After the background of AI is delivered, a colloquial between two entities is presented that will provide two core perspectives on AI. The participants discuss a few of the many ethical topics that intelligence officers must address with they are faced with the inevitable implementation of AI to assist in the collection and analysis of intelligence information. The intent of the discussion is not to list the many ethical issues that must be considered as the IC integrates AI into itself, rather it is offered as a casual nudge that AI will have a structural impact on how intelligence is gathered and analyzed and thus it brings new perspectives to traditional ethical issues, Finally, while it is somewhat helpful to understand the technology behind AI, since it is evolving at such an exponential rate, time spent learning its technical details will be a wasted in less than a year. Therefore, at this time, it doesn’t matter if AI is being run on CPUs, GPUs, or Neuromorphic processors that better mimic human neural networks, it is more important to understand how something that possess actual intelligence can enhance the efforts of an Intelligence Community and how to employ it in a manner consistent with the ethics of the society it is protecting.

Presentations

Page 8: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 12 13

Technology and the Limits of Intelligence Collection - Anthony PfaffEffective espionage requires intelligence officers to deceive, incite, and coerce in ways not acceptable for members of the general public. And the public these officers serve has on occasion objected morally to some of the activities conducted in their name. Public outrage over disclosures by Edward Snowden regarding both foreign and domestic intelligence activities suggests a need for clearer norms so that such activities serve the public’s interest while maintaining their moral commitments. This presentation will argue that consent is a central moral criterion on evaluating permissible targeting for intelligence collection. In general, the farther away one is from government secrets the fewer permissions there are regarding exploitation. However, as Snowden’s example suggests, technology is making available official, personal, and proprietary information that is useful across the range of state-on-state competition. This increased availability and utility of this information imposes incentives to violate boundaries consent would otherwise impose. This presentation will address the impact of these technologies and will suggest norms that account for the advantage such information in ways that do not violate norms regarding respect for persons.

Espionage and the First Amendment: The Case against Julian Assange

- Gary RossIn May 2019, a grand jury returned an 18-count criminal indictment against WikiLeaks founder Julian Assange. The charges include conspiring to obtain national defence information, obtaining and disclosing national defines information, and conspiring to gain unauthorized access to a government computer network. All but one of the counts allege violations of the Espionage Act, World War I-era legislation enacted to protect sensitive information and safeguard national security. Assange is currently serving a 50-week sentence in the United Kingdom for violating the conditions of his bail in an unrelated case. An extradition hearing is scheduled for February 2020 in response to a formal request submitted by the United States. This presentation examines Assange’s indictment and considers the probability, and desirability, of the government obtaining a successful conviction. Espionage Act statutes cited in the indictment are also analyzed to determine whether any of the charges violate protections guaranteed under the First Amendment to the U.S. Constitution. The question of Assange’s status as a journalist’ is also discussed.

Freedom for the Wolf is death to the Lambs - Angela GendronCivil liberties are a founding tenet of democracy, but at what cost? The question posed for this conference is pertinent given the recent rise of ‘illiberal and pseudo’

democracies which mix a degree of democracy with varying degrees of illiberalism. In Europe and North America, the term ‘democracy’ has hitherto been associated with a political system marked not only by free and fair elections but also by the rule of law, a separation of powers, and the protection of basic liberties of speech, assembly, religion and property. Constitutional liberalism’ encompasses both political and civil liberties. What differentiates democracies in the West from others around the world is the willingness of governments to accept limits on their own power under the rule of law and a commitment to protect individual autonomy and dignity against coercion from whatever source – state, church or society. In the words of Fareed Zakaria constitutional liberalism is distinguished “not by the mass plebiscite but the impartial judge.” Western democracies cannot afford to be complacent: Liberalism, either as a conception of political liberty, or as an economic doctrine, may have coincided with the rise of democracy but It has never been immutably or unambiguously linked to its practice. Political values in Western democracies name the distinct responsibilities they have to citizens which it is wrong to ignore or violate, but in the fight against both foreign and domestic terrorism civil liberties have been eroded in furtherance of collective security. This presentation focuses on the judicial aspects of Canadian legislation which criminalizes certain non-violet terrorist-related or associated activities deemed to be supportive of terrorism and which, in some cases, constitute acts preparatory to intended physical or cyber attacks. Criminal offences are applied to conduct described as “knowingly facilitating or supporting terrorist groups or acts of terrorism, whether in raising money, disseminating propaganda and recruitment materials over the internet, or attempting to travel abroad to participate in jihad.”

The Blurry Blue Line: How American Law Enforcement Legalized Domestic Intelligence - Jeff RoggIn 1865, the Treasury Department unilaterally created the Secret Service Division with the mission of investigating counterfeiting and other financial crimes against the United States. The first crop of Secret Service agents included men with criminal backgrounds who used questionable means to perform their work. By the first decade of the twentieth century, the Secret Service was performing intrusive domestic intelligence operations, to include allegedly surveilling members of Congress. The Secret Service also loaned its agents to other Executive departments, alarming Congress with its reach. In 1908, Congress investigated the Secret Service and weighed the need for a federal law enforcement service against general opposition to a domestic “spy system.” Among other issues, Congress questioned the morality of the special agents who performed this secret service work. As a result, Congress stipulated that the

Presentations

Page 9: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 14 15

Secret Service could no longer loan agents to other departments and had to restrict its activities to presidential security and anticounterfeiting.

Research on Ethics and Intelligence from Costal Carolina University

Chair: Richard J. Kilroy, Jr. Discussant: Jonathan Smith

Surveillance State or State of Security: Analyzing the Domestic Intelligence Surveillance Programs of the United States in the Post-9/11 Era - Edward Barone“Does domestic signals intelligence (SIGINT) collection performed by the United States undermine citizens’ democratic rights and privacy laws in its effort to ensure national security?” In it, I present the previously-written scholarship that is bifurcated between academia and journalism that justifies US-SIGINT collection on citizens, citing terrorism-prevention, and academia and journalism that rejects US-SIGINT collection on citizens, citing democratic rights and personal privacy infringement. Further, the paper addresses the question “Do Americans value their democratic and privacy rights as citizens more than they value the protection of national security?” The paper answers this question by marshaling macro-level public opinion survey data conducted by Gallup and the Pew Research Center in a time-series analysis dating from 2001-2019. Finally, conclusive thoughts are presented that exhibit where further intellectual discourse of the subject may be taken.

The Value of Undercover Operations and Surveillance in IntelligenceAn increased use of surveillance and/or undercover operations will be necessary going into the future, because of the uncontrollable nature of collected information in the digital age. The methodology for this paper involves presenting arguments by informed sources, using the specific case of Muslims in the United States, regarding surveillance and undercover operations in that community. Material was gathered through email interviews, a phone interview, documents, videos, and books. I will attempt to make the argument that intelligence and law enforcement professionals should be entrusted, that they have the requisite knowledge of what is correct procedure, without infringing on civil liberties. That trust in the system must be safeguarded within the population, in order for a consensus approval of appropriate undercover and surveillance techniques. An aspect of building that trust lies within the Muslim community. Therefore, it is very beneficial to include Muslim input to discussions and policy-making.

On ‘coercion’, extracting information from Prisoners of War, and the Laws of War - Nathan Lake and Jonathan TreriseThe laws of war prohibit the extraction of information by coercion from Prisoners of War (PoWs), and for good reason. Aside from the mutual benefit of a nation’s captured troops not being subject to duress, this prohibition makes post-war reconciliation more attainable. But we question the notion that humane treatment of PoWs necessarily means that no information may be extracted from them. The issue is the law’s vague understanding of ‘coercion’. We argue for a restricted notion of coercion, such that the extraction of information from PoWs can (and ought to) be non-coercive. Specifically, we argue that the spirit and intention of international law is to understand ‘coercion’ in a moralized—as opposed to a non-moralized—manner. We believe that doing so has many advantages, while still achieving the purpose of achieving and maintaining a just peace. One important benefit of using this moralized notion is that in doing so one decreases the risk of de-moralizing interrogators who in some cases have a moral duty to extract information. If information that would protect non-liable people can be extracted in a manner that doesn’t compromise something of a similar moral importance, then one has a duty to do so. Since, as we argue, information can be extracted without so sacrificing – since they are not coercing anyone under a proper moralized conception of coercion—one ought to try to extract the information. On the other hand, if we mistakenly suppose that interrogators are in a moral dilemma in which they have a duty both to and not to extract information from PoWs, we run the risk of de-moralizing them. To de-moralize an agent is to give them reason to care less about morality and its demands. While this is an issue of grave concern should it happen to anybody, it is especially problematic for interrogators whose job it is to extract information in a morally permissible way to defend the non-liable.

Presentations

Page 10: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 16 17

Olga Bertelsen is an Assistant Professor of Intelligence Studies at Embry-Riddle Aeronautical University in Prescott, Arizona. She was educated at the Medical State University in the Ukraine, Bloomsburg University of Pennsylvania, Penn State University, and the University of Nottingham (U.K.). She published widely on state violence in the USSR and the methods and traditions of the Soviet/Russian secret police.

Shannon Brophy is a senior student at Coastal Carolina University, majoring in Language and Intercultural Studies. She is a Counterintelligence Officer and head of the Middle East Desk of the Chanticleer Intelligence Brief, CCU’s elite pre-professional intelligence group. She is also a researcher with the CCU’s Gulf Security Project. Shannon spent much of the spring 2019 semester interning with the United States Department of State’s Regional Security Office at the United States Embassy in Muscat, Sultanate on Oman.

Mark Carey has been involved in cybersecurity and data networking for almost 20 years. He holds several security and network engineer certifications and he served in the military as a member of Special Forces. He is the author of two books on artificial intelligence architectures. He is currently enrolled in Intelligence and Security Studies Graduate program at The Citadel and an Adjunct Professor at the University of North Carolina Charlotte.

Erik J. Dahl is an Associate Professor of National Security Affairs at the Naval Postgraduate School in Monterey, California. He retired from the U.S. Navy in 2002 after serving 21 years as an intelligence officer, and received his Ph.D. from the Fletcher School of Tufts University. He is chair of the Intelligence Studies Section of the International Studies Association.

Joseph Fitsanakis is Associate Professor in the Intelligence and National Security Studies program at Coastal Carolina University, and Deputy Director of the European Intelligence Academy and Senior Editor at intelNews.org. He holds a BSocSc from University of Birmingham; and a M.S. and Ph.D. University of Edinburgh. He has written extensively in the areas of state-sponsored cyber-espionage and transnational criminal networks.

Mike German was an F.B.I. agent for 16 years (most recently in 2004), is now at New York University’s Brennan Center for Justice.

Angela Gendron is a Senior Fellow at the Canadian Centre for Security, Intelligence and Defence Studies at the Norman Paterson School of International Affairs,

Carleton University, Ottawa. Angela’s many articles have been published in leading intelligence and national security studies journals, including a pioneering study in 2005 on the ethics of intelligence collection. Her latest publication, which concerns the relationship between intelligence and the academy in Canada, appears in The Routledge Handbook of Universities, Security and Intelligence Studies, 2020.

Richard A. S. Hall is Professor of Philosophy at Fayetteville State University, in North Carolina. He holds the Ph.D. in philosophy from the University of Toronto. His publications include five books, The Ethical Foundations of Criminal Justice; The Neglected Northampton Texts of Jonathan Edwards: Edwards on Society and Politics; Josiah Royce’s Proposal How to Establish World Peace; White Calvinists Fighting Against Black Slavery; and The Justice of War: Its Foundations in Ethics and Natural Law; and chapters in The Contribution of Jonathan Edwards to American Culture and Society; Josiah Royce for the Twenty-First Century, and Middlebrow Wodehouse.

John F. (Jeff) Kimmons serves as Booz Allen Hamilton’s Senior Intelligence Executive. He joined the firm in 2011 after 36 years of Army and Joint MI service, to include service as Army G2, Commander US Army Intelligence and Security Command, CENTCOM J2 and JSOC J2. His final assignment was as Staff Director, Office of the Director of National Intelligence. LTG (Retired) Kimmons holds a B.A. from The Citadel, and an M.B.A. from the University of Oklahoma. He is a graduate of DIA’s Post Graduate Intelligence Program/National Intelligence University and the US Army War College.

Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University (USA). She previously served as a U.S. Foreign Service officer in The Netherlands, Russia, and Bulgaria and a Fulbright Scholar at Durham University’s Institute of Advanced Study. She holds an M.Phil from Oxford University and a Ph.D. from the University of Michigan.

Bruce MacKay holds the Directorate of Operations Chair at the National Intelligence University and has served as legal advisor to the Defense Human Intelligence Service, the counterintelligence staff, and the Central Measurement & Signatures Organization within the Defense Intelligence Agency. Mr. MacKay received his BA from the University of Maryland, and his Juris Doctor degree from Brigham Young University. David Ogbogu is a part-time Lecturer in International Relations at Middlesex University. He holds a PhD in Propaganda Surveillance & Cyberspace. His research interests include counter-intelligence operations, Operation Condor and Argentina’s “Dirty War”, British and U.S. propaganda and surveillance practices, and African Security. Currently he is a cyber analyst at Draktrace (an AI technology company.)

Contributors

Page 11: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 18 19

C. Anthony Pfaff is a retired Colonel in the U.S. Army and is currently a research professor for Strategy, the Military Profession and Ethic at the Strategic Studies Institute. He served as Director for Iraq on the National Security Council Staff, Defense Attaché in Baghdad, the Chief of International Military Affairs for US Army Central Command, and as the Defense Attaché in Kuwait. Dr. Pfaff has a bachelor’s degree from Washington and Lee University, a master’s degree in Philosophy from Stanford University, a master’s from the Industrial College of the Armed Forces; and a Doctorate in Philosophy from Georgetown University.

Ann Phillips is an Assistant Professor of Security Studies at Embry-Riddle Aeronautical University and conducts research regarding the Constitution and homeland security with particular emphasis on the Fourth, Fifth and Sixth Amendments. Prof. Phillips worked as an attorney with Florida’s Department of Legal Affairs, Office of the Attorney General and has been board certified in criminal appellate law for twenty years. She earned her undergraduate degree from the University of South Florida and her J.D. from the University of Florida.

Kaitlin Presnell is a senior student in the Intelligence and National Security Studies program at Coastal Carolina University, specializing in Yemen. She currently serves as Vice President of Finance and head of the Africa Desk in the Chanticleer Intelligence Brief, CCU’s elite pre-professional intelligence group. She is also Vice President of Women in Intelligence and National Security and served one of the organizers of the 2nd Annual Intelligence and National Security Conference.

Jeff Rogg is a doctoral candidate in history at The Ohio State University; his dissertation, The Spy and the State: The History and Theory of American Civil-Intelligence Relations, explains the creation and evolution of American intelligence. He holds a J.D. from Villanova University School of Law, an M.A. in Security Studies from Georgetown University, and a B.A. from Swarthmore College. He currently serves in the Massachusetts Army National Guard.

Gary Ross is a Professor at Daniel Morgan Graduate School of National Security in Washington, DC. During his 27-year career in federal law enforcement, he served as a Special Agent and Supervisory Special Agent, with the Department of Homeland Security, Office of the Director of National Intelligence, and Naval Criminal Investigative Service. He holds an MSSI from the National Intelligence University and a BA from Michigan State University.

Casey Skvorc is an Associate Professor of Intelligence and National Security at the American Public University. For the past 15 years, he has served as the Behavioral

Health Screening Official for the Select Agent and Biosafety Programs for the National Institutes of Health. He is a retired federal law enforcement officer, having served as an attorney and medical psychologist in the U.S. Department of Justice, with an extended assignment assisting the U.S. Secret Service with ground-breaking research initiative examining political assassins.

Jonathan Trerise is an associate professor of Philosophy and Religious Studies at Coastal Carolina University. His undergraduate degree in Philosophy is from Cal State Fullerton, and his M.A. and Ph.D. are from the University of Missouri-Columbia, where he wrote a dissertation on the moral foundations of intellectual property rights under the supervision of Peter Vallentyne. He researches primarily on applied ethics and political philosophy. Diane M. Zorri is an assistant professor of Security Studies at Embry-Riddle Aeronautical University and conducts research for Joint Special Operations University. Dr. Zorri served as an officer in the U.S. Air Force and worked in the defense industry. During the Iraq war, she worked in Baghdad, managing over 400 bilingual, bi-cultural advisors. Dr. Zorri is a graduate of the U.S. Air Force Academy, Naval Postgraduate School, and George Mason University.

Contributors

Page 12: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

2020 Citadel Intelligence Ethics Conference 2020 Citadel Intelligence Ethics Conference 20 21

Discover a career with purposeAt BAE Systems, we’re advancing next generation intelligence and security solutions. As a global defense, aerospace and security company, we take pride in our support of national security and those who serve.

Commitment where it counts.

jobs/baesystems.com/intel

0120-860

Diamond Sponsor

NOTES

Page 13: 2018 Intelligence & Cybersecurity Conference · Room# 230 Safe and Effective: A Proposed Method for Judging Domestic Surveillance Programs - Erik J. Dahl ... National Reconnaissance

A Special Thank you to our Sponsors:

www.citadel.edu/root/cybersecurity-programs