Quinlan 2007
Quinlan 2007
Just intelligence:
Prolegomena to an ethical
theory
Michael Quinlan
Published online: 15 Mar 2007.
Taylor & Francis makes every effort to ensure the accuracy of all
the information (the “Content”) contained in the publications on our
platform. However, Taylor & Francis, our agents, and our licensors
make no representations or warranties whatsoever as to the accuracy,
completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of
the authors, and are not the views of or endorsed by Taylor & Francis.
The accuracy of the Content should not be relied upon and should be
independently verified with primary sources of information. Taylor and
Francis shall not be liable for any losses, actions, claims, proceedings,
demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in
relation to or arising out of the use of the Content.
This article may be used for research, teaching, and private study
purposes. Any substantial or systematic reproduction, redistribution,
reselling, loan, sub-licensing, systematic supply, or distribution in any
form to anyone is expressly forbidden. Terms & Conditions of access
and use can be found at http://www.tandfonline.com/page/terms-and-
conditions
Downloaded by [University of Calgary] at 22:59 03 October 2014
CENTRE FOR INTELLIGENCE AND INTERNATIONAL
SECURITY STUDIES ANNUAL LECTURE, 2005
MICHAEL QUINLAN
Downloaded by [University of Calgary] at 22:59 03 October 2014
sustain the well-being of their people – a goal that remains in itself, especially
in relation to tolerably well-ordered polities, a proper ethical good; national
interest (to use a modern term) is not an amoral concept. One level of
discipline concerned the criteria that ought to be met if war was to be justly
undertaken – jus ad bellum. The other concerned the constraints and
prohibitions that ought to be observed in the conduct of war once entered
into – jus in bello.
It is unnecessary here to go into the detailed content of either set of criteria.
The point for the present discussion is that this seems a natural way to
approach the ethical analysis of any activity that poses, prima facie,
considerations in awkward tension, through purporting to require or allow
Downloaded by [University of Calgary] at 22:59 03 October 2014
statements rather than spell out exact limits to the action they would regard as
tolerable in extremis. And the underlying consideration seems if anything
even more cogent in respect of intelligence than of war.
All that noted, we can with reasonable confidence say a number of
descriptive things about intelligence work. First, much of it consists simply of
carefully collating and analysing material that is available to anyone with the
resources and inclination to gather it, especially in the modern world of
enormous information flows. No moral problem arises there. Second, within
the category of intelligence information that is not available more or less
openly, a great deal is collected by eavesdropping of one sort or another –
picking up communications not meant to be heard by outsiders, breaking
Downloaded by [University of Calgary] at 22:59 03 October 2014
codes that are intended to conceal content, and the like, including also
watching activities which the actor would have preferred to keep unobserved.
It is not obvious that this is in itself seriously wrong in moral terms; in
ordinary life it may often be a breach of courtesy or social convention, but
scarcely a grave evil. It may in some circumstances be imprudent to
eavesdrop – for example, while it might be highly interesting to install
listening devices in the offices of high functionaries of friendly countries, the
penalties of being found out doing so might well greatly outweigh the
advantages of knowing whatever might be learned. But that is essentially a
calculation about expediency, not moral value. Eavesdropping by intelligence
may nevertheless sometimes entail breaking the law, if not of the eaves-
dropper’s country then at least of the target country, and perhaps inter-
national law, as in Cold War penetration of territorial waters or airspace by
intelligence-gathering vehicles; and infringement of law is in itself prima
facie in need of special justification.
In addition, at least some eavesdropping is in itself, and almost irrespective
of the method employed, constrained by particular agreements voluntarily
entered into between states; and it may be that it would be in the general
interest to widen the ambit of such agreements.6 Whether or not there is such
a widening, any deliberate breach of such commitments must import moral as
well as prudential considerations; but it is then primarily the fact of breaching
agreement rather than the inherent nature of eavesdropping that would raise
the moral considerations.
But, third, it can be no secret that some of what is done in intelligence-
gathering, above all in the category commonly known as HUMINT (‘human
intelligence’) entails a good deal more than eavesdropping. This essay does
not address what is commonly called ‘covert action’ in the sense of physical
intervention to disrupt or prevent, not merely to discover, what an adversary
does; that raises other considerations. Even short of that, however, HUMINT
and other comparable intelligence business have to involve, just for example,
readiness to tell untruths about who and what one is. Conventional fictions
CIISS ANNUAL LECTURE, 2005 5
word, but that is not what will be being referred to.) Two categories provide
illustration. The first concerns terrorism. It would be absurd to disqualify
wholesale the use of mendacious deception to penetrate sinister organizations
like Al Qaeda now, or in Northern Ireland’s past the Provisional Irish
Republican Army or its ‘Loyalist’ counterparts, so as to enhance the chances
of preventing lethal violence. It by no means follows that absolutely anything
goes in achieving and sustaining such penetration, but wholesale prohibition
cannot be right. The other illustration is espionage against enemies in time of
war, as by the United Kingdom against Nazi Germany. That needs no
explanatory comment.
The foregoing paragraphs sketch a framework similar to that underlying
Downloaded by [University of Calgary] at 22:59 03 October 2014
jus ad intelligentiam – and then in the choice of methods for such gathering –
jus in intelligentia.
JUS AD INTELLIGENTIAM
one extreme of the spectrum might be getting solid warning of terrorist plans to
blow up Parliament; at the other, finding out what is the ‘bottom line’ of the
Ruritanian government in an impending negotiation about tariffs on trade in
cabbages. Clandestine intelligence-gathering would clearly be justified on the
former; but it seems hard, as a matter of proportionate judgement, to maintain
that it would be so on the latter. I consider later a subsidiary issue about whether
the moral situation is altered if we have grounds for believing that the
Ruritanians are themselves engaged in clandestine intelligence-gathering about
our own ‘bottom line’. That particular point aside, however, the question is
where along the spectrum the line of prohibition or limitation ought to be drawn.
For added complication, is it a single line or a series of lines, with a considerable
array of clandestine methods morally allowable at the top end of the threat
spectrum – that is, the end exemplified by major terrorism – but perhaps only a
more modest and restricted set at intermediate points? Many subject matters
may lie between the extremes. The development of military capability by states
whose long-term peaceful intentions towards us or our friends we believe we
cannot take wholly on trust? The faithful observance of arms control agreements
like the 1968 Nuclear Non-Proliferation Treaty or the 1972 Biological Weapons
Convention, or of mandatory Security Council resolutions? Savage internal
repression by tyrannical regimes? Narcotics traffic? International organized
crime of other sorts? Illegal immigration networks? Violent animal-rights
protest? Large-scale and deliberate breach of agreed rules on trade?
It is surely evident that dividing lines ought to be drawn somewhere along
the spectrum of iniquity to be countered and proper interest to be served; but
it is much harder to formulate clear and precise proposals for where or how to
draw them. A first approximation might suggest that we are entitled to use
clandestine means (still in the special sense of ‘clandestine’ explained earlier)
if other means do not seem likely to suffice – that remains an important
qualification, analogous to the just-war criterion of ‘last resort’ – in order to
collect information that we reasonably believe may help us to forestall,
counter or alleviate actions that would be seriously damaging to peaceful and
8 INTELLIGENCE AND NATIONAL SECURITY
constitutional order, or to the lives or the major human rights of our own
people or of others towards whom we accept significant responsibilities.
There is a great deal packed into that first approximation; and the
application of some of its elements would be highly judgemental – just how
damaging is ‘seriously damaging’, for example? Al Qaeda’s plans, yes; those
Ruritanian cabbages, surely no; but what about action that could inflict grave
economic damage leading to real hardship for our citizens, like attempts to
disrupt flows or distort prices in the international oil market? The economic
field cannot be totally excluded. It is inescapable that any general principle,
however skillfully shaped, will always leave a large middle ground within
which there have to be judgements made in all the particular circumstances,
Downloaded by [University of Calgary] at 22:59 03 October 2014
with ample room accordingly for disagreement and dispute, whether in good
faith or in bad, about on which side of the permissibility boundary particular
intelligence targets fall. That is in the nature of practical affairs amid the
manifold complexities of human life. Similar judgemental uncertainties often
beset the application of just-war concepts; but those concepts, honestly
applied, can nevertheless often lead to clear and important conclusions. That
can be equally true of just intelligence.
JUS IN INTELLIGENTIA
away from its natural meaning and from the definition in the 1984 UN
Convention Against Torture, to which the United States is a party, so as to
encompass only extreme actions at the top end of the term’s range as
normally understood. It is at least more honest to claim, as others in that
administration or supporting it have occasionally done, that torture may be
justified (subject perhaps to some procedural safeguards) if the end is
pressing and important enough. But though it is possible to imagine elaborate
and far-out scenarios in which the temptation might seem very cogent, that
claim ought to be firmly rejected for reasons both of ultimate moral principle
and of pragmatism (including the grave ‘slippery-slope’ danger). Even within
a more moderate ethical calculus, however, and quite aside from
considerations about the frequent unreliability of information gained under
torture and also about the damage which use of such methods entails to any
prospect of subsequent criminal prosecution, there are questions of definition,
as was seen in the 1970s when the United Kingdom government changed its
practices to conform with the finding of the European Court of Human Rights
against some of the methods which had occasionally been used in the
counter-terrorist campaign in Northern Ireland. It would be absurd to say that
interrogation, perhaps of people whose malignity is incontestable, must be
conducted entirely without pressure – in a comfortable armchair, as it were,
with a cup of tea and a biscuit every hour and no harsh expression or
frightening tone. Again, some general guideline is needed to anchor
judgement. The core of the formulation in the 1984 Convention (tighter
than United States domestic law appears to be) seems well framed for the
purpose – ‘the intentional infliction of severe physical or mental pain or
suffering to obtain information or a confession’.
There is, however, a yet further issue in this zone: the matter of what might
be called ‘torture at second hand’. Media accounts have exposed a practice
termed ‘extraordinary rendition’, meaning handing over terrorist suspects to
friendly countries whom there is reason to think less scrupulous than the
hander-over about the methods of interrogation used. That would seem
10 INTELLIGENCE AND NATIONAL SECURITY
a different matter. It is not easy to find a ready answer to this problem, which
is the more awkward in that it may sometimes in practice be precisely from
countries where the risk of brutal interrogation may be high that information
about terrorism is most needed.
There is some similarity here with the problem noted earlier, of how we
are to justify continuing to work, in our penetration of terrorist or other
criminal organizations, with individuals whom we know to be engaged in
evildoing. Once more, any purist demand for perfectly clean hands, both
directly and at one remove or more, is not easy to square with practical
realities – realities, moreover, which are becoming increasingly the normal
context of intelligence work as the prime working environment shifts away
from classical inter-state conflict.
We might consider now the ‘Everybody does it’ argument – the right of
retaliation, from another standpoint. If we have reason to believe that others
are collecting intelligence against us for purposes or by methods which we
ourselves would prefer to rule out, are we thereby dispensed from our own
obligations? The simple answer to this is ‘No’, or at least ‘Not entirely’. If the
obligations are founded not on basic moral principle but on particular
agreement or received international law, then indeed serious breach of the
bargain by other parties may properly remove or diminish their entitlement to
remain protected by the agreement or law. To take again an analogy from the
context of war, it is likely that some limited use of chemical weapons would
not always or in all circumstances have been contrary to moral principle on
the discriminate and proportionate use of military force, but under the 1925
Geneva Protocol states agreed to abstain from it entirely. Many of them,
however, attached a rider to the effect that if an adversary breached the
Protocol the right to retaliate was reserved. That was justifiable; but there
would still, in any such use, have been a moral duty to continue to abide by
the more basic ethical constraints – not to retaliate against non-combatants or
with a severity disproportionate to proper military objectives, whatever the
adversary might have done. Similarly, if there is an agreement with the
CIISS ANNUAL LECTURE, 2005 11
USING INTELLIGENCE
Downloaded by [University of Calgary] at 22:59 03 October 2014
The discussion so far has operated within the broad structural paradigm of
just-war reasoning. In at least one respect, however, intelligence calls for a
wider paradigm. Beyond the activity of collecting intelligence there lies that
of using it, and distinctive ethical questions can arise there too. This is not a
matter only of whether the intelligence product is culpably distorted (whether
by provider or recipient) to fit policy preference, or its limitations and
uncertainties brushed aside in order to justify or at least not impede decisions
desired on other grounds – issues such as those which the Butler Committee
and its counterpart in the United States examined over the 2003 invasion of
Iraq. Most of the moral questions in this area are general ones bearing upon
any use of evidence, not peculiar to that collected by secret intelligence
effort. But where, as is usually the case with secret intelligence, the evidence
is for good reason not made available openly for all hearers to probe and test,
a special moral responsibility lies upon intelligence authorities and their
customers not to claim wider knowledge or greater certainty than is genuinely
warranted – not to assert, for example, that evidence is ‘extensive, detailed
and authoritative’8 when its true quality is such that objective evaluation of
the same evidence by a broadly-composed committee of inquiry can lead its
chairman to conclude that it is in reality ‘very thin’.9
There are moral issues also about the use of secret intelligence when it is
brought to bear in ways that touch seriously upon the rights of individuals. It
would normally be wrong for public authorities to use to the disadvantage of
individuals information which those individuals had no opportunity to test or
rebut, and of which they might even be wholly unaware. Yet the product of
intelligence is occasionally used in such ways, for example to trigger
intrusion into normal privacy, to refuse or limit public employment through
processes like vetting, or more recently and controversially in decisions to
restrict liberty or withdraw right of residence. Moreover, such actions by
government may often rest upon judgements of probability, not upon proof of
the standard that court proceedings in criminal justice customarily require.
Given the entitlement of our societies to be protected as far as possible from
12 INTELLIGENCE AND NATIONAL SECURITY
grave risks, we cannot reasonably say that the product of intelligence must
absolutely never be so used where we perceive pressing danger from traitors
or terrorists, or as it was during the Cold War when Western countries
honestly believed that this was necessary in order to guard against grave
potential threat from the Soviet Union. Once more there is no escape from
weighing conflicting considerations, rather than resting on some neat and
comprehensive rule. The weighing must, however, have an ethical dimension
and take into account, alongside whatever are the proper benefits that we
believe can be secured in no other way, the limitations and uncertainties of
secret intelligence as well as the disagreeable (and ultimately even
corrupting) subtractions which its use in such circumstances entails from
Downloaded by [University of Calgary] at 22:59 03 October 2014
the customary and proper standards of open democratic societies, and in the
long term from the valuable wider respect in which such societies seek to be
held. The bar ought to be set high.
CONCLUSION
There are further aspects of the topic on which this essay has not attempted to
touch, such as the proper relationship of intelligence activity with one’s own
domestic law. (Should the duty of obedience to that law be regarded as
absolute, or as open to be qualified in extreme circumstances by
considerations of proportionality?) In brief, however, secret intelligence-
gathering is a valuable, sometimes even an indispensable, tool in the ability
of public authorities to fulfil their duties of protection towards those for
whose well-being they bear responsibility. Its effective conduct must
sometimes require that action be taken which ought in most contexts to be
regarded as morally wrong. In face of that tension we cannot say that
morality must simply be set aside; we have to identify some conceptual
structure for legitimating and disciplining the activity. An ethical framework
is needed in at least two parts: the first for delineating the purposes important
enough to justify some stepping outside normal ethical expectation, and the
second to limit how far that stepping outside may reach and what forms it
may take.
It would be absurd and offensive to suggest that intelligence pro-
fessionals in countries like those of the West do not already have ethical
concepts which they bring to bear on what they do. For reasons sketched
earlier, it would moreover be unrealistic to expect to frame an open and
explicit code in specific terms to govern the entire activity. There would,
however, be merit – not least for public confidence and support – in seeking
to develop a wider and more systematic understanding of principles than
seems yet to have been generally established and recognized on either side
of the Atlantic.
CIISS ANNUAL LECTURE, 2005 13
NOTES
This essay is developed from the author’s Annual Lecture to the Centre for Intelligence and
International Security Studies, Department of International Politics, University of Wales,
Aberystwyth, in November 2005.
1 Harold Shukman (ed.) Agents for Change (London: St. Ermin’s Press 2000) pp.61–71.
2 Duane R. Clarridge, quoted in the New York Times, 2 February 2006.
3 Admiral Stansfield Turner, Security and Democracy (Sedgwick & Jackson 1986).
4 For a brief overview see Michael Quinlan, ‘Justifying War’, Australian Journal of
International Affairs 58/1 (March 2004) pp.7–15.
5 Review of Intelligence on Weapons of Mass Destruction: Report of a Committee of Privy
Counsellors, HC 808 (HM Stationery Office 14 July 2004).
Downloaded by [University of Calgary] at 22:59 03 October 2014
6 See discussion by Michael Herman, ‘Ethics and Intelligence after September 2001’, in L. Scott
and P. Jackson (eds.) Understanding Intelligence in the Twenty-First Century (Routledge
2004) pp.187–92.
7 For a preliminary survey see Shukman (note 1) pp.62–65.
8 Prime Minister Blair on Iraqi possession of weapons of mass destruction, House of Commons
Official Report, 24 September 2002, col.3.
9 Lord Butler of Brockwell, House of Lords Official Report, 7 September 2004, col.463.