Parliamentary Access to Classified Information

Total Page:16

File Type:pdf, Size:1020Kb

Parliamentary Access to Classified Information Parliamentary Access to Classified Information An analysis of the responses to the NATO Parliamentary Assembly – DCAF Survey on Legal Frameworks and Practices in NATO Member State Parliaments Author: Nazli Yildirim Schierkolk Editors: Ruxandra Popa, Philipp Fluri, Teodora Fuior November 2018, Geneva Acknowledgements: The author and the editors would like to thank the representatives of national parliaments who responded to the NATO PA–DCAF Survey on ‘Access to Classified Information for Parliamentarians’. Note The URLs cited in this document were valid at the time of publication. Neither DCAF nor the author can take responsibility for any subsequent changes to any or all of the URLs cited in this document. Table of Contents Foreword ..................................................................................................................................... Introduction .............................................................................................................................. 1 Background ............................................................................................................................................................................1 Methodology .........................................................................................................................................................................3 Structure ..................................................................................................................................................................................4 Chapter 1: Legal Frameworks on Information Classification ............................................. 5 1.1 Laws Regulating Information Classification .......................................................................................................5 1.2 Categories of Information to be Classified ...........................................................................................................6 1.3 Authority to Classify Information ........................................................................................................................ 10 1.4 Classification Levels ................................................................................................................................................. 12 1.5 Declassification Procedures ................................................................................................................................... 12 1.6 Free Access to Information of Public Interest .................................................................................................. 17 Chapter 2: Parliamentary Handling of Classified Information ......................................... 19 2.1 Parliamentarians’ Access to Classified Information ....................................................................................... 19 2.2 Existence of Laws, Policies, Mentalities Blocking Reasonable Parliamentary Access to Information ......................................................................................................................................................................... 24 2.3 Security Vetting of Parliamentarians ................................................................................................................... 25 2.4 Parliamentary Staff Access to Classified Information ................................................................................... 30 2.5 Measures Taken by Parliamentary Committees to Protect Classified Information .............................. 31 2.6 Sanctions for Unauthorized Disclosure of Classified Information ............................................................ 32 2.7 Capacity Building for Parliaments on Handling Classified Information ................................................. 34 Conclusion ............................................................................................................................... 36 Annexes ................................................................................................................................... 38 Annex I – NATO PA-DCAF survey questions ........................................................................................................ 38 Annex II – List of countries that responded to the survey ............................................................................. 39 Foreword The processes of classification and declassification of information, the laws, provisions, rules and regulations for initiating such processes, and the rules for granting access to such information to certain individuals, either ex officio or through processes of vetting, are not only of interest to the individual parliaments that have come to satisfactory results in regulating such processes: the parliaments of nations in transition towards democratic practices are equally, or even more so, in need of comparative data. Too often regulations from a preceding historical period impede the successful resolution of the issues outlined above. Existing classification systems may also be used to keep parliaments out of the information loop, to station executive-appointed classification specialists in parliaments, to limit access to classified information to representatives of the executive, or even to go as far as making access to different levels of classified information dependent on the rank of an individual within the executive. This timely volume thus not only gives access to comparative data, it is also a source of arguments for bringing one’s house in order and establishing proper parliamentary oversight in the realm of security and defence in newly democratic states. The Swiss Department for Defence, Civil Protection and Sport has long supported the cooperation of the NATO Parliamentary Assembly and the Geneva Centre for the Democratic Control of Armed Forces (DCAF) in the design and delivery of the Rose-Roth programme. The programme allows not only for the introduction of newly elected MPs to Euro-Atlantic parliamentary practices, values and institutions and for the organization of several annual interparliamentary Rose-Roth capacity-building and reflection seminars, but also for the publication of useful surveys, such as this. The editors would like to express their heartfelt thanks for Switzerland’s continued assistance. Brussels and Geneva, November 2018 The editors Introduction Background Democratic and civilian oversight of the security sector is now a well-established principle in democracies. The security sector refers to all structures, institutions and personnel responsible for security provision, management and oversight at the national and local levels. A range of state and non-state actors are involved in overseeing the security sector to ensure that security providers act in an accountable, transparent and effective manner within a framework of rule of law and respect for human rights. These actors include the executive, judicial authorities, parliaments, specialized statutory institutions (for instance ombuds institutions, supreme audit offices or national human rights institutions), as well as civil society organizations and the media. While each oversight actor fulfills a particular function in the oversight system, parliaments have a crucial role, having the ultimate ‘democratic legitimacy’ and the extensive oversight powers and competences that come with it. Although the mandate and scope of parliamentary oversight vary in each country, parliaments usually carry out five main functions with regard to security sector governance and oversight: (i) Legislative function: reviewing, amending, drafting and adopting legislation regulating the security sector, (ii) Budgetary function: scrutinizing, approving, rejecting or amending the budget, including security-sector-related budget items, (iii) Oversight function: monitoring the policies and activities of security sector agencies, (iv) Elective function: vetoing or approving top appointments within the security sector, (v) Representative function: providing a public forum for debate on security, and facilitating political consensus through dialog and transparency.1 In order to carry out these functions effectively, parliamentarians should have access to all information necessary to fulfill their oversight duties. By way of example, without unhindered access to and review of the files, including classified information, held by intelligence services, parliamentarians would not be able to assess whether the services are acting in line with laws and government policies. Over the last decades, the international community has increasingly emphasized the importance of access to information by oversight bodies. Following consultations with more than 500 experts across 70 countries, the Global Principles on National Security and the Right to Information (The Tshwane Principles) were launched in 2013. The Tshwane Principles established international normative standards on legal procedures for information 1 DCAF, SSR Backgrounder–Parliaments (DCAF: 2017) 1 classification, as well as access to and handling of classified information by oversight bodies, including parliaments. Since their launch, the Tshwane Principles have been endorsed by the Parliamentary Assembly of the Council of Europe as well as the European Parliament.2 More recently, the Council of Europe (CoE) Commissioner for Human Rights called on the member states of the CoE to: “Guarantee that all bodies responsible for overseeing security services have access
Recommended publications
  • Philipp Fluri and Eden Cole ∗
    DCAF’s Activities in Support of Effective and Democratically Transparent Defense Planning Philipp Fluri and Eden Cole ∗ The Geneva Centre for the Democratic Control of Armed Forces (DCAF) focuses on democratic oversight of and guidance for the defense and security sector. Increasing transparency and efficiency in defense planning and spending thus do not generally fall under DCAF’s purview in the strict sense, and are addressed only within the larger context of defense institution building. The defense budgetary process in a given state—from its formulation by the execu- tive, its enactment into law by the legislature, its implementation, and ultimately its au- diting and evaluation—is circumscribed by a number of parameters, and requires that the different actors have competencies in dealing with democratic processes and multi- ple constituencies that are never called upon under authoritarian systems. On the con- trary, the legislature in authoritarian states is often content to “render unto Caesar what is Caesar’s”—that is, to leave the responsibility for things military with the military and/or the security services, as such matters “cannot be understood by lay persons anyway.” In a similar vein, within their ministry itself the defense planners may decide to leave their task essentially in the hands of the “commissars” of the presidential appa- ratus, as this is the place where power is concentrated and monopolized in such sys- tems. As an important consequence, defense planning in transitional states is fraught with problems that are all too familiar: an executive which has first to learn about transparent planning cycles and gain self-confidence in the implementation thereof; a legislative power which needs to learn about guidance and oversight mechanisms; and national media and institutions of civil society which need to change their expectations from commenting on the successes of authoritarian leadership to the assumption of the responsibility for public oversight.
    [Show full text]
  • 03 (15. Februar 2017)
    2017/03 ISSN 1661-8211 | 117. Jahrgang | 15. Februar 2017 Redaktion und Herausgeberin: Schweizerische Nationalbibliothek NB, Hallwylstrasse 15, CH-3003 Bern Erscheinungsweise: halbmonatlich, am 15. und 30. jeden Monats Hinweise unter: http://ead.nb.admin.ch/web/sb-pdf/ ISSN 1661-8211 © Schweizerische Nationalbibliothek NB, CH-3003 Bern. Alle Rechte vorbehalten Inhaltsverzeichnis - Table des matières - Sommario - Cuntegn - Table of contents Inhaltsverzeichnis - Table des matières - 220 Bibel / Bible / Bibbia / Bibla / Bible....................................... 6 Sommario - Cuntegn - Table of contents 230 Christentum, christliche Theologie / Christianisme, théologie chrétienne / Cristianesimo, teologia cristiana / Cristianissem, teologia cristiana / Christianity and Christian theology..................6 000 Allgemeine Werke, Informatik, Informationswissenschaft / Informatique, information, 290 Andere Religionen / Autres religions / Altre religioni / Autras ouvrages de référence / Informatica, scienza religiuns / Other religions............................................................... 9 dell'informazione, generalità / Informatica, infurmaziun e referenzas generalas / Computers, information and general reference........................................................................................ 1 300 Sozialwissenschaften / Sciences sociales / Scienze sociali / Scienzas socialas / Social sciences.......................... 10 000 Allgemeine Werke, Wissen, Systeme / Généralités, savoir, systèmes / Generalità, sapere, sistemi / Generalitads,
    [Show full text]
  • Thematic Evaluation of European Commission Support to Justice and Security System Reform
    Thematic Evaluation of European Commission Support to Justice and Security System Reform Final Report Volume I – Main Report November 2011 Evaluation for the European Commission Framework contract for Multi-country thematic and regional/country-level strategy European Group for evaluation studies and synthesis in the area of external co- Evaluation EEIG Germany operation LOT 2: Multi-country evaluation studies on social/human development issues of EC external co-operation PARTICIP GmbH Germany Ref.: EuropeAid/122888/C/SER/Multi Request for Service: 2010/234349 Aide à la Décision Economique Belgium Thhematic Evaluation of European Commission Support to Justice and Security Italy System Reform Deutsches Institut für Entwicklungspolitik Germany European Centre for Development Policy Management Final Report Belgium Volume I – Main Report Overseas Development Institute, United Kingdom South Research November 2011 Belgium A consortium of EGEVAL II (Particip & ADE) –DRN-DIE– ECDPM-ODI c/o Particip GmbH, leading Thhis evaluation was carried out by company: Headquarters Merzhauser Str. 183 D - 79100 Freiburg / Germany Phone: +49-761-79074-0 Fax: +49-761-79074-90 [email protected] The evaluation has been managed by the Joint Evaluation Unit in DG DEVCO. The author accepts sole responsibility for this report, drawn up on behalf of the Commission of the European Union. The report does not necessarily reflect the views of the Commission. Thematic Evaluation of the European Commission Support to Justice and Security System Reform ADE - EGEVAL II Table of Contents LIST OF ACRONYMS EXECUTIVE SUMMARY 1. INTRODUCTION ................................................................................................... 1 1.1 OVERALL OBJECTIVE, MANDATE AND SCOPE OF THE EVALUATION .......................... 1 1.2 KEY PHASES OF THE EVALUATION .................................................................................
    [Show full text]
  • Building Integrity and Reducing Corruption in Defence
    Building Integrity and Reducing Corruption in Defence A Compendium of Best Practices The publication of this Compendium is supported by NATO and the Swiss Ministry of Defence Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices Geneva Centre for the Democratic Control of Armed Forces (DCAF) www.dcaf.ch The Geneva Centre for the Democratic Control of Armed Forces is one of the world’s leading institutions in the areas of security sector reform (SSR) and security sector governance (SSG). DCAF provides in-country advisory support and practical assistance programmes, develops and promotes appropriate democratic norms at the international and national levels, advocates good practices and makes policy recommendations to ensure effective democratic governance of the security sector. DCAF’s partners include governments, parliaments, civil society, international organisations and the range of security sector actors such as police, judiciary, intelligence agencies, border security services and the military. 2010 Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices Geneva, 2010 The following persons participated in the production of the Compendium of Best Practices in Building Integrity and Reducing Corruption in Defence Editorial Board Philipp Fluri (DCAF), Adrian Kendry (NATO), Simon Lunn (DCAF), Mark Pyman (TI-UK) Editor and Lead Author: Todor Tagarev (Bulgaria) Contributors Jean-Jacques de Dardel (Switzerland) – Foreword, Francois Melese (US) – Chapters 2 and 9, Adrian Kendry and Susan Pond (NATO) – Chapter 3, James Greene (US) – Chap- ters 5, 16 and 22, Mark Pyman (UK) – Chapter 8, Aditya Batara (Indonesia) – Chapter 11, George Lucas (US) – Chapter 12, Alxandre Kukhianidze, Tamuna Karosanidze, Nina Khatiskatsi and Alexander Scrivener (Georgia) – Chapter 13, Anne-Christine Wegener and Mark Pyman (TI-UK) – Chapter 14, Leonid Polyakov (Ukraine) and James Greene (US) – Chapter 17, Wim F.
    [Show full text]
  • The Future of EU Security Sector Assistance: Learning from Experience
    ecdpm’s Making policies work DISCUSSION PAPER No. 271 The future of EU security sector assistance: learning from experience By Matthias Deneckere, Ashley Neat and Volker Hauck May 2020 This paper reflects on the future of the EU’s role in working with foreign security actors. It does so in the context of debates on how to better equip EU external action to deal with conflict and instability, including through a European Peace Facility, while also operationalising the linkages between security and development. Our analysis looks at the support to security sector reform (SSR) as an instrument that resides at this nexus and faces various challenges at the strategic and operational level. Such challenges include balancing short- and long-term objectives, reconciling interests and values, ensuring context sensitivity and overcoming bureaucratic and cultural divisions between policy communities. Drawing on practices from the EU and three member states (Germany, France and the Netherlands) in the domain of security sector reform, the paper provides insights on how such challenges can be practically dealt with. First, it argues that a comprehensive SSR policy not only requires a spelled-out strategy, but also a continued dialogue process between security, peace and development communities at the strategic and policy level, involving experts and civil society actors. Second, SSR needs to build on localised approaches that are informed by political context analysis and build on existing reform processes or windows of opportunity to foster change through targeted interventions. Third, cooperation with security actors should consider the risks in doing harm or negatively impacting conflict dynamics. Practical tools exist to manage risks, but negative effects can never be completely controlled.
    [Show full text]
  • Parliamentary Oversight of Security and Intelligence Agencies in the European Union
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS PARLIAMENTARY OVERSIGHT OF SECURITY AND INTELLIGENCE AGENCIES IN THE EUROPEAN UNION STUDY Abstract This study evaluates the oversight of national security and intelligence agencies by parliaments and specialised non-parliamentary oversight bodies, with a view to identifying good practices that can inform the European Parliament’s approach to strengthening the oversight of Europol, Eurojust, Frontex and, to a lesser extent, Sitcen. The study puts forward a series of detailed recommendations (including in the field of access to classified information) that are formulated on the basis of in- depth assessments of: (1) the current functions and powers of these four bodies; (2) existing arrangements for the oversight of these bodies by the European Parliament, the Joint Supervisory Bodies and national parliaments; and (3) the legal and institutional frameworks for parliamentary and specialised oversight of security and intelligence agencies in EU Member States and other major democracies. PE 453.207 EN This document was requested by the European Parliament's Committee on Civil Liberties, Justice and Home Affairs. AUTHORS Aidan WILLS, Geneva Centre for the Democratic Control of Armed Forces (DCAF) Mathias VERMEULEN, European University Institute (EUI) Hans BORN, Project Leader, DCAF Martin SCHEININ, Project Leader, EUI Micha WIEBUSCH, Research Assistant, DCAF Ashley THORNTON, Language Consultant RESPONSIBLE ADMINISTRATOR Andreas HARTMANN Policy Department C: Citizens' Rights and Constitutional Affairs European Parliament B-1047 Bruxelles E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its newsletter please write to: [email protected] Manuscript completed in June 2011.
    [Show full text]
  • Cyprus Crisis (8)” of the Kissinger- Scowcroft West Wing Office Files at the Gerald R
    The original documents are located in Box 7, folder “Cyprus Crisis (8)” of the Kissinger- Scowcroft West Wing Office Files at the Gerald R. Ford Presidential Library. Copyright Notice The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Gerald Ford donated to the United States of America his copyrights in all of his unpublished writings in National Archives collections. Works prepared by U.S. Government employees as part of their official duties are in the public domain. The copyrights to materials written by other individuals or organizations are presumed to remain with them. If you think any of the information displayed in the PDF is subject to a valid copyright claim, please contact the Gerald R. Ford Presidential Library. Digitized from Box 7 of The Kissinger-Scowcroft West Wing Office Files at the Gerald R. Ford Presidential Library Gerald R. Ford Library 1000 Beat ~v.enue . Ann Arbor. Ml 48109-2114 · ·· www.fordlibrarymuseum.gov Withdrawal Sheet for Documents Declassified in Part This.-folder contains a document or documents declassified in part under the Remote Archive Capture (RAC) program. Procedures for Initiating a Mandatory Declassification Review (MDR) Request The still classified portions of these RAC documents are eligible for MDR. To file a request follow these steps: 1. Obtain the Presidential Libraries Mandatory Review Request Form (NA Form 14020). 2. Complete Sections I, II , and Ill of NA Form 14020. 3. In Section Ill, for each document requested, simply provide the Executive Standard Document Number (ESDN) in the Document Subject!Title or Correspondents column.
    [Show full text]
  • Gender Integration in Democracy, Human Rights, and Governance (DRG)
    Gender Integration in Democracy, Human Rights, and Governance (DRG) PROGRAMMING TOOLKIT JUNE 2016 Acknowledgements External consultant Alyson Kozma conducted the initial research and was the lead author of this toolkit. USAID’s Center of Excellence on Democracy, Human Rights, and Governance (DRG Center), specifically its Gender Working Group, comprised of members from the DRG Center’s leadership team and each of its nine divisions, supported the production of this toolkit. The following people contributed comments during an internal review of the publication: Adam Bushey (DRG), Colin Buckley (DRG), Cathy Cozzarelli (PPL), Julie Denham (DRG), Claire Ehmann (DRG), Mark Goldenbaum (DRG), Martin Hayes (DRG), Ajit Joshi (DRG), Bruce Kay (DRG), Mike Keshishian (DRG), Summer Lopez (DRG), Sharon Rogers (DRG), Lauren Seyfried (DRG), Andrew Solomon (DRG), Tamara Shaya (CMM), and Madeline Williams (DRG). The toolkit also draws on inputs from the DRG Cadre, including Foreign Service Officers and Foreign Service Nationals across missions, collected via electronic survey in 2013. This survey was designed to capture the DRG sub-sectoral priorities identified by the DRG Cadre as they relate to program cycle gender integration and program design. DISCLAIMER The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. C2 TABLE OF CONTENTS I. Glossary of Acronyms ..................................................................................................................................................................2
    [Show full text]
  • Intelligence Community Classification Guidance Findings and Recommendations Report
    UNCLASSIFIED The Office of the Director of National Intelligence Associate Director of National Intelligence and Chief Information Officer INTELLIGENCE COMMUNITY CLASSIFICATION GUIDANCE FINDINGS AND RECOMMENDATIONS REPORT January 2008 Prepared by The Director of National Intelligence and Chief Information Officer, Intelligence Community Technology Governance UNCLASSIFIED UNCLASSIFIED Table of Contents FOREWORD...............................................................................................................................IV EXECUTIVE SUMMARY..........................................................................................................V PURPOSE...................................................................................................................................... 6 BACKGROUND ........................................................................................................................... 6 Basis for Classifying Information.................................................................................................6 Levels of Classification ..................................................................................................................7 Relationship of Information Classification to Information Sharing .........................................8 Déjà Vu: Call for Change in Classification Practices................................................................9 METHODOLOGY ....................................................................................................................
    [Show full text]
  • Private Actors and Security Governance
    Private Actors and Security Governance Alan Bryden, and Marina Caparini (editors.) © 2006, LIT & DCAF Contents List of Graphs and Tables ix Preface xi Abbreviations xiii Part I: Introduction 1 Approaching the Privatisation of Security from 3 a Security Governance Perspective Alan Bryden Part II: The International Policy Context 2 Fragile Statehood, Armed Non-State Actors 23 and Security Governance Ulrich Schneckener 3 Private Sector, Public Security 41 Alyson Bailes 4 Insurgencies, Security Governance and 65 the International Community Albrecht Schnabel. 5 Reconstructing the Public Monopoly 87 of Legitimate Force Herbert Wulf Part III: Regional and National Perspectives 6 Bulgaria's Private Security Industry 109 Philip Gounev 7 The Commercialisation of Post-Soviet Private Security 129 Duncan Hiscock 8 Challenges of Security Privatisation in Iraq 149 David Isenberg 9 Implementing South Africa’s Regulation of 167 Foreign Military Assistance Act Raenette Taljaard Part IV: Challenges of Regulation 10 Regulating Military and Security Services 189 in the European Union Elke Krahmann 11 The United Nations and the Dilemma 213 of Outsourcing Peacekeeping Operations Victor-Yves Ghebali 12 Assessing the Relationship between Humanitarian 231 Actors and Private Security Companies Christopher Spearin 13 Private Security Actors, Donors and SSR 247 Peter Wilson Part V: Conclusion 14 Applying a Security Governance Perspective to 263 the Privatisation of Security Marina Caparini Annex International Organisations and the Governance of 285 Private Security
    [Show full text]
  • SECURITY PROCEDURES Committee on Armed Services U.S
    SECURITY PROCEDURES Committee on Armed Services U.S. House of Representatives 116th Congress (Effective January 24, 2019) In accordance with committee and House rules, the following procedures are established by the Committee on Armed Services to ensure protection of classified and other sensitive national security information in the possession of the committee. The following committee and House rules apply to classified information: COMMITTEE RULE 9(c) “… with the approval of the Chairman, each member of the Committee may designate by letter to the Chairman, one member of that member's personal staff, and an alternate, which may include fellows, with Top Secret security clearance to attend hearings of the Committee, or that member's subcommittee(s), panel(s), or task force(s) (excluding briefings or meetings held under the provisions of committee rule 9(a)), which have been closed under the provisions of rule 9(a) above for national security purposes for the taking of testimony. The attendance of such a staff member or fellow at such hearings is subject to the approval of the Committee, subcommittee, panel, or task force as dictated by national security requirements at that time. The attainment of any required security clearances is the responsibility of individual members of the Committee.” RULE 20. PROTECTION OF NATIONAL SECURITY AND OTHER INFORMATION (a) Except as provided in clause 2(g) of rule XI of the Rules of the House of Representatives, all national security information bearing a classification of Confidential or higher which has been received by the Committee or a subcommittee shall be deemed to have been received in executive session and shall be given appropriate safekeeping.
    [Show full text]
  • Amendment 32/2008 Coll. Czech Act N. 412 of 21 September 2005 on the Protection of Classified Information EN
    Amendment 32/2008 Coll. Czech Act N. 412 of 21 September 2005 on the Protection of Classified Information EN Act N. 412 of 21 September 2005 on the Protection of Classified Information Legal Disclaimer The following text is a translation of the original promulgated in the Czech language in the Collection of Laws. This translated version has been effected by the National Security Authority of the Czech Republic and it cannot be relied on as an authentic wording, nor does it cause any legal effects. Any liability of the author is hereby excluded. 1/67 Amendment 32/2008 Coll. Czech Act N. 412 of 21 September 2005 on the Protection of Classified Information EN Amendment: 119/2007 Coll. and the Czech National Bank7) shall be Amendment: 177/2007 Coll. considered to be the State bodies; Amendment: 296/2007 Coll. e) responsible person – Amendment: 32/2008 Coll., of 12 February 2008, 1. minister in the case of a ministry; effective as from 1 March 2008 2. competent heads in the cases of other central administrative bodies; The Parliament has passed by resolution the 3. in the case of an organizational State body Act of the Czech Republic hereunder: that was established by another organizational State body the responsible person in the organizational State body PART ONE carrying out the function of its promoter; BASIC PROVISIONS 4. in the case of other organizational State bodies their competent heads; Section 1 5. directors in the case of the Security Subject of legislation Intelligence Service and the Military Intelligence; This Act shall govern the principles for 6.
    [Show full text]