The Role of a Security Intelligence Service in a Democracy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Section 29 of the Internal Security Act
UCLA National Black Law Journal Title Detention and Torture without Trial: Section 29 of the Internal Security Act Permalink https://escholarship.org/uc/item/9n14b6wb Journal National Black Law Journal, 10(2) ISSN 0896-0194 Author Cassim, Mohamed Yusuf Publication Date 1987 Peer reviewed eScholarship.org Powered by the California Digital Library University of California COMMENT Detention and Torture Without Trial: Section 29 of the Internal Security Act Mohamed Yusuf Cassim* INTRODUCTION South Africa is a relatively sophisticated, fast developing young state, fac- ing the twin problems of a modem industrial revolution, and of the search for a just and practical modus vivendi for the various groups of people who make up her population. These problems are sharpened and complicated by the fact that virtually the entire world has become concerned about what happens in Southern Africa. The general thrust of world opinion has become increasingly critical of the policies presently pursued by the South African government and impatient for the changes which it sees as imperative and inevitable. The pace of change in the world, especially in the "dark continent" of Africa, has so quickened over the past few decades that, while at one level white South Af- rica appeared to have time on her side, it is now clear that under prevailing circumstances time is a precious and rapidly diminishing commodity. More- over, in this day, the problems of South Africa are unique. There is no easy answer for the South African situation-no ready blue print for success. No country in contemporary history has been confronted with quite the same situ- ation. -
When a Temporary State of Emergency Becomes Permanent France As a Case Study AUTHOR Jane Kilpatrick
NOVEMBER 2020 When a Temporary State of Emergency becomes Permanent France as a Case Study AUTHOR Jane Kilpatrick EDITORS Waqas Tufail, Niamh Ní Bhriain DESIGN Karen Paalman COVER PHOTO Wesley Marçal on Unsplash Published by Transnational Institute - www.tni.org Amsterdam, November 2020 Disclaimer: The content of this report represents the views of the Transnational Institute and the named authors and is their sole responsibility. The European Commission does not accept any responsibility for use that may be made of the information it contains. Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images are those pertaining to the copyright terms of the original source. https://www.tni.org/copyright Table of Contents Introduction 4 States of emergency 5 How is this provided for by law? 5 Which rights are absolute and cannot be derogated from? 5 Process: what steps need to be put in place when derogating from IHRL? 6 States of emergency in practice 6 Permanent States of Emergency and counter-terrorism 7 France 8 Before the November 2015 State of Emergency 8 Legislative changes in France 9 Impacts on fundamental rights 11 Freedom of movement, freedom of expression and freedom of assembly 12 The behaviour of police 14 Issues of necessity, proportionality, and -
Serious and Organised Crime Strategy
Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year. -
National Insider Threat Task Force Mission Fact Sheet
NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET _________________________________ Why was the NITTF established? The National Insider Threat Task Force (NITTF) was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect, and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance, and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the NITTF is co-chaired by the U.S. Attorney General and the Director of National Intelligence. They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 99 federal D/As that handle classified material. Currently, the following D/As have representatives on the NITTF: FBI, National Counterintelligence and Security Center (NCSC), Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), and Transportation Security Administration. The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The steering committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, Office of the Director of National Intelligence, NCSC, National Security Agency, DIA, the Program Manager—Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. -
Australian Criminal Intelligence Management (ACIM) Strategy 2017
Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 AUSTRALIAN CRIMINAL INTELLIGENCE MANAGEMENT STRATEGY 2017–20 INTELLIGENCE PARTNERSHIPS FOR A SAFER AUSTRALIA Attorney-General’s Department Australia New Zealand Policing Advisory Agency Australian Criminal Intelligence Commission Australian Federal Police ACT Policing Australian Securities and Investments Commission Australian Security Intelligence Organisation Australian Taxation Office Australian Transaction Reports and Analysis Centre Department of Immigration and Border Protection/Australian Border Force New South Wales Police Force New Zealand Police Northern Territory Police Queensland Police Service South Australia Police Tasmania Police Victoria Police Western Australia Police 1 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 CONTENTS FOREWORD 1 AUSTRALIAN CRIMINAL INTELLIGENCE LANDSCAPE 2 AUSTRALIAN CRIMINAL INTELLIGENCE MODEL 3 DEFINITION OF INTELLIGENCE 4 OVERSIGHT AND IMPLEMENTATION 5 WHAT WILL SUCCESS LOOK LIKE? 6 HOW WILL WE ACHIEVE SUCCESS? 7 CRITICAL SUCCESS FACTORS 10 HOW WILL WE MEASURE SUCCESS? 10 EVALUATION MODEL 11 MATURITY MODEL 12 CONCLUSION 14 REFERENCES 14 2 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 FOREWORD The United Nations Office on Drugs and Crime (UNODC) describes criminal intelligence as “... the lifeblood of the fight against transnational organized crime. It is the foundation for -
Track, Capture, Kill
Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya March 2017 www.privacyinternational.org 2 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Acknowledgements Privacy International acknowledges the many individuals and organisations with whom we spoke who cannot be named. This report is primarily based on interviews conducted by Privacy International and documentation provided in confidence to Privacy International. Privacy International is solely responsible for the content of this report. 3 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Contents Acronyms 5 Executive Summary 6 Introduction 7 Background 8 Extended Powers: But short on Detail 11 Spying First, then ‘making it proper’ 16 On Your Marks: Infiltrating Telecommunications Networks 19 Getting Ready: Sharing Intel and Preparing Ops 24 Closing in: Surveillance in Kill or Capture Operations 26 Elections and Accountability 32 Recommendations 36 Annex 1: Response from Safaricom 38 4 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Acronyms AP Administration Police ATPU Anti-Terrorism Police Unit BTS Base Transceiver Station CA/CCK Communications Authority, formerly Communications Commission of Kenya CDR Call Data Record CID/DCI Directorate of Criminal Investigations DMI Directorate of Military Intelligence, Kenya Defence Forces GSU General Services -
Can Parliamentary Oversight of Security and Intelligence Be Considered More Open Government Than Accountability?
CAN PARLIAMENTARY OVERSIGHT OF SECURITY AND INTELLIGENCE BE CONSIDERED MORE OPEN GOVERNMENT THAN ACCOUNTABILITY? Stephen Barber ABSTRACT The nature of openness in government continues to be explored by academics and pub- lic managers alike while accountability is a fact of life for all public services. One of the last bastions of ‘closed government’ relates to the ‘secret’ security and intelligence ser- vices. But even here there have been significant steps towards openness over more than two decades. In Britain the Intelligence and Security Committee (ISC) of Parliament is the statutory body charged with scrutinising the agencies and since 2013 is more ac- countable itself to Westminster. This was highlighted by the first open evidence sessions involving the heads of the agencies which coincided with the unofficial disclosure of secret information by way of the so-called ‘WikiLeaks world’. This article examines scrutiny as a route to openness. It makes the distinction between accountability and open government and argues that the ‘trusted’ status of the ISC in comparison to the more independent Parliamentary Select Committees weakens its ability to hold govern- ment to account but, combined with the claim to privileged information and the acqui- escence of the agencies, makes its existence much more aligned to the idea of open gov- ernment Keywords - Westminster Select Committees, Intelligence and Security Committee, MI5 and MI6, scrutiny of public agencies. INTRODUCTION When the three heads of Britain’s security and intelligence services, Sir Iain Lobban (Director of GCHQ), Andrew Parker (Director General of MI5) and Sir John Sawers (Chief of MI6), appeared in Westminster on 7 November 2013, a new marker was set for open government. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
CIA Best Practices in Counterinsurgency
CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the -
MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G
MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G. Fast 8 Tactical Intelligence Shortcomings in Iraq: Restructuring Deputy Commanding General Battalion Intelligence to Win Brigadier General Brian A. Keller by Major Bill Benson and Captain Sean Nowlan Deputy Commandant for Futures Jerry V. Proctor Director of Training Development 16 Measuring Anti-U.S. Sentiment and Conducting Media and Support Analysis in The Republic of Korea (ROK) Colonel Eileen M. Ahearn by Major Daniel S. Burgess Deputy Director/Dean of Training Development and Support 24 Army’s MI School Faces TRADOC Accreditation Russell W. Watson, Ph.D. by John J. Craig Chief, Doctrine Division Stephen B. Leeder 25 USAIC&FH Observations, Insights, and Lessons Learned Managing Editor (OIL) Process Sterilla A. Smith by Dee K. Barnett, Command Sergeant Major (Retired) Editor Elizabeth A. McGovern 27 Brigade Combat Team (BCT) Intelligence Operations Design Director SSG Sharon K. Nieto by Michael A. Brake Associate Design Director and Administration 29 North Korean Special Operations Forces: 1996 Kangnung Specialist Angiene L. Myers Submarine Infiltration Cover Photographs: by Major Harry P. Dies, Jr. Courtesy of the U.S. Army Cover Design: 35 Deconstructing The Theory of 4th Generation Warfare Specialist Angiene L. Myers by Del Stewart, Chief Warrant Officer Three (Retired) Purpose: The U.S. Army Intelli- gence Center and Fort Huachuca (USAIC&FH) publishes the Military DEPARTMENTS Intelligence Professional Bulle- tin quarterly under provisions of AR 2 Always Out Front 58 Language Action 25-30. MIPB disseminates mate- rial designed to enhance individu- 3 CSM Forum 60 Professional Reader als’ knowledge of past, current, and emerging concepts, doctrine, materi- 4 Technical Perspective 62 MIPB 2004 Index al, training, and professional develop- ments in the MI Corps. -
Council Decision (Cfsp)
L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW. -
Mass Surveillance
Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.