Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO13115 | Intelligence-Gathering in the Digital Age: Building Trust in PRISM?
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO13115 | Intelligence-Gathering in the Digital Age: Building Trust in PRISM?
    Damien D. Cheong

    24 June 2013

    download pdf

    Synopsis

    A recent poll suggests that the US Government’s controversial PRISM programme has some support among Americans. This raises the question of how governments can build trust among its citizenry for modern intelligence-gathering methods that are highly invasive by nature.

    Commentary

    PRISM IS a covert US Government intelligence-gathering programme designed to carry out surveillance of foreign suspects by analysing their private conversations and/or electronic exchanges made online. Allegedly, access to such data is made either directly through the main servers of the major companies or through a formal channel requesting the required data from such companies. The companies involved are all based in the US, and include Google, Facebook, Microsoft and Yahoo among others. The PRISM programme has reportedly been in operation since 2007.

    When news reports revealed two weeks ago that the above-mentioned companies as well as several countries were involved in the PRISM programme, critics were quick to lament the “killing [of] trust in web freedom. They claimed that such intelligence-gathering methods threatened individuals’ online privacy as well as raised serious questions about transparency and accountability.

    Invasive nature of modern intelligence-gathering

    The US government has admitted to the existence of PRISM, but has reassured the public that: (a) PRISM is used only when there is a “valid foreign intelligence purpose; (b) US citizens and individuals based in the US are not “intentionally targeted; (c) companies “supply information to the Government when they are lawfully required to do so; and (d) intelligence-gathering via PRISM is scrutinised by the Executive, Legislative and Judicial branches. As could be expected, critics and naysayers remain unconvinced.

    This raises three key questions: (a) should we expect contemporary intelligence-gathering techniques especially those conducted online to be more intrusive?; (b) can a balance ever be struck between privacy and national security concerns?; and (c) how can governments convince their citizens that such activities will not be misused?

    Intelligence-gathering post 9-11 has grown increasingly more complex due mainly to the changing nature of contemporary national security threats as well as the corresponding shift in focus from state to non-state actors.

    This has resulted not only in an increase in the number of consumers of intelligence but also to the variety and types of intelligence products that are in demand.

    As non-state actors are growing more sophisticated, intelligence agencies must likewise improve their tradecraft or better yet, stay ahead of their targets to be effective. A common medium of communication often used by non-state actors is the Internet and social media, and as such, intelligence-gathering has correspondingly shifted into this domain. The need for timely intelligence requires a quick and efficient method to sieve through voluminous Internet traffic and identify relevant data so that analysts can analyse and transform this into information. Hence, new techniques of gathering intelligence online, such as the PRISM programme, have been, and continue to be, developed.

    Around the world, intelligence agencies are planning and/or are in the process of improving their online surveillance capabilities. For instance, Der Spiegel reports that the German Foreign Intelligence Service (BND) will spend 100 million euro over the next five years to expand its online surveillance programme.

    It would be safe to assume that online intelligence-gathering techniques will continue to expand, and be highly intrusive.

    Balancing national security concerns

    The on-going debate on striking the right balance between privacy and security concerns is unlikely to result in any real breakthrough in the foreseeable future. During times of peace, the debate often skews towards increased protection of individual privacy, whereas in times of conflict/tension, increasing security at the cost of privacy is regarded more favourably. In any case, the reality, as US President Obama has pointed out, is that “it’s important to recognise that you can’t have 100 per cent security and also then have 100 per cent privacy and zero inconvenience.

    Given that online intelligence-gathering techniques are highly intrusive and will continue to raise concerns about privacy issues, it is imperative for the US government and indeed governments around the world to build and enhance their citizens’ trust in the system. This will help negate (although not eliminate) the aversion, cynicism and suspicion often associated with intelligence-gathering and intelligence agencies.

    In addition to having the necessary checks and balances in place within the system, such as the ability of a citizen to seek legal recourse in the event that his/her privacy has been unnecessarily breached, and the extensive scrutiny by the three branches of government (legislature, executive and judicial), it might be useful to apply the UK think-tank DEMOS’ six ethical principles of intelligence-gathering to guide such activities. These principles are:

    1. There must be sufficient, sustainable cause;
    2. There must be integrity of motive;
    3. The methods used must be proportionate and necessary;
    4. There must be right authority, validated by external oversight;
    5. Recourse to secret intelligence must be a last resort if more open sources can be used; and
    6. There must be a reasonable prospect of success.

    Seventh principle?

    In relation to the PRISM incident, a CNN/ORC poll conducted in the US last week showed that while 61% of  American respondents disapproved of how the Obama administration was carrying out surveillance of its citizens in general, 66% did support the government’s actions to gather and analyse online data obtained from IT companies provided it was done to “locate suspected terrorists.

    The spectre of 9-11 is a contributory factor to this outcome, but more importantly, the statistics seem to suggest that Americans will tolerate breaches of privacy for national security, and that they have sufficient trust in the system – an outcome that governments should aspire to achieve.

    The ethical principles mentioned above serve primarily as a guide, and operational realities must also be taken into account. For instance, many intelligence-gathering activities must remain secret as their revelation could jeopardise the individuals, organisations or states involved. Also, open source data may be incomplete and/or inaccurate and therefore must be complemented with closed source data to provide a clearer perspective.

    Perhaps in the interests of further transparency and accountability, a seventh principle should be added to the above-mentioned: the need to withhold information must be validated through independent review. Ultimately, intelligence serves to reduce uncertainty in decision-making, and is not meant to be used to victimise particular individuals or groups.

    About the Author

    Damien D. Cheong is a Research Fellow at the Centre of Excellence for National Security (CENS), a
    constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.

    Categories: RSIS Commentary Series / General

    Synopsis

    A recent poll suggests that the US Government’s controversial PRISM programme has some support among Americans. This raises the question of how governments can build trust among its citizenry for modern intelligence-gathering methods that are highly invasive by nature.

    Commentary

    PRISM IS a covert US Government intelligence-gathering programme designed to carry out surveillance of foreign suspects by analysing their private conversations and/or electronic exchanges made online. Allegedly, access to such data is made either directly through the main servers of the major companies or through a formal channel requesting the required data from such companies. The companies involved are all based in the US, and include Google, Facebook, Microsoft and Yahoo among others. The PRISM programme has reportedly been in operation since 2007.

    When news reports revealed two weeks ago that the above-mentioned companies as well as several countries were involved in the PRISM programme, critics were quick to lament the “killing [of] trust in web freedom. They claimed that such intelligence-gathering methods threatened individuals’ online privacy as well as raised serious questions about transparency and accountability.

    Invasive nature of modern intelligence-gathering

    The US government has admitted to the existence of PRISM, but has reassured the public that: (a) PRISM is used only when there is a “valid foreign intelligence purpose; (b) US citizens and individuals based in the US are not “intentionally targeted; (c) companies “supply information to the Government when they are lawfully required to do so; and (d) intelligence-gathering via PRISM is scrutinised by the Executive, Legislative and Judicial branches. As could be expected, critics and naysayers remain unconvinced.

    This raises three key questions: (a) should we expect contemporary intelligence-gathering techniques especially those conducted online to be more intrusive?; (b) can a balance ever be struck between privacy and national security concerns?; and (c) how can governments convince their citizens that such activities will not be misused?

    Intelligence-gathering post 9-11 has grown increasingly more complex due mainly to the changing nature of contemporary national security threats as well as the corresponding shift in focus from state to non-state actors.

    This has resulted not only in an increase in the number of consumers of intelligence but also to the variety and types of intelligence products that are in demand.

    As non-state actors are growing more sophisticated, intelligence agencies must likewise improve their tradecraft or better yet, stay ahead of their targets to be effective. A common medium of communication often used by non-state actors is the Internet and social media, and as such, intelligence-gathering has correspondingly shifted into this domain. The need for timely intelligence requires a quick and efficient method to sieve through voluminous Internet traffic and identify relevant data so that analysts can analyse and transform this into information. Hence, new techniques of gathering intelligence online, such as the PRISM programme, have been, and continue to be, developed.

    Around the world, intelligence agencies are planning and/or are in the process of improving their online surveillance capabilities. For instance, Der Spiegel reports that the German Foreign Intelligence Service (BND) will spend 100 million euro over the next five years to expand its online surveillance programme.

    It would be safe to assume that online intelligence-gathering techniques will continue to expand, and be highly intrusive.

    Balancing national security concerns

    The on-going debate on striking the right balance between privacy and security concerns is unlikely to result in any real breakthrough in the foreseeable future. During times of peace, the debate often skews towards increased protection of individual privacy, whereas in times of conflict/tension, increasing security at the cost of privacy is regarded more favourably. In any case, the reality, as US President Obama has pointed out, is that “it’s important to recognise that you can’t have 100 per cent security and also then have 100 per cent privacy and zero inconvenience.

    Given that online intelligence-gathering techniques are highly intrusive and will continue to raise concerns about privacy issues, it is imperative for the US government and indeed governments around the world to build and enhance their citizens’ trust in the system. This will help negate (although not eliminate) the aversion, cynicism and suspicion often associated with intelligence-gathering and intelligence agencies.

    In addition to having the necessary checks and balances in place within the system, such as the ability of a citizen to seek legal recourse in the event that his/her privacy has been unnecessarily breached, and the extensive scrutiny by the three branches of government (legislature, executive and judicial), it might be useful to apply the UK think-tank DEMOS’ six ethical principles of intelligence-gathering to guide such activities. These principles are:

    1. There must be sufficient, sustainable cause;
    2. There must be integrity of motive;
    3. The methods used must be proportionate and necessary;
    4. There must be right authority, validated by external oversight;
    5. Recourse to secret intelligence must be a last resort if more open sources can be used; and
    6. There must be a reasonable prospect of success.

    Seventh principle?

    In relation to the PRISM incident, a CNN/ORC poll conducted in the US last week showed that while 61% of  American respondents disapproved of how the Obama administration was carrying out surveillance of its citizens in general, 66% did support the government’s actions to gather and analyse online data obtained from IT companies provided it was done to “locate suspected terrorists.

    The spectre of 9-11 is a contributory factor to this outcome, but more importantly, the statistics seem to suggest that Americans will tolerate breaches of privacy for national security, and that they have sufficient trust in the system – an outcome that governments should aspire to achieve.

    The ethical principles mentioned above serve primarily as a guide, and operational realities must also be taken into account. For instance, many intelligence-gathering activities must remain secret as their revelation could jeopardise the individuals, organisations or states involved. Also, open source data may be incomplete and/or inaccurate and therefore must be complemented with closed source data to provide a clearer perspective.

    Perhaps in the interests of further transparency and accountability, a seventh principle should be added to the above-mentioned: the need to withhold information must be validated through independent review. Ultimately, intelligence serves to reduce uncertainty in decision-making, and is not meant to be used to victimise particular individuals or groups.

    About the Author

    Damien D. Cheong is a Research Fellow at the Centre of Excellence for National Security (CENS), a
    constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.

    Categories: RSIS Commentary Series / General

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info