Copy and Redistribute the Material in Any Medium Or Format

Copy and Redistribute the Material in Any Medium Or Format

Attribution-NonCommercial-NoDerivs 2.0 KOREA You are free to : Share — copy and redistribute the material in any medium or format Under the follwing terms : Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. NonCommercial — You may not use the material for commercial purposes. NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material. You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation. This is a human-readable summary of (and not a substitute for) the license. Disclaimer 국제학석사학위논문 Digital Allies: Preserving National Security through Signals Intelligence Cooperation within the UKUSA Agreement 디지털 동맹국들: UKUSA 협정내에서 SIGINT 형태로서 국가안보의 수호 이진솔 국제학석하 2016 년 7 월 서울대학교 국제대학원 국제학과 국제협력전공 Master’s Thesis Digital Allies: Preserving National Security through Signals Intelligence Cooperation within the UKUSA Agreement 디지털 동맹국들: UKUSA 협정내에서 SIGINT 형태로서 국가안보의 수호 A Thesis Presented By Anna Jinsol Lee Graduate Program in International Cooperation For the degree of Master of International Studies July 2016 The Graduate School of International Studies Seoul National University Digital Allies: Preserving National Security through Signals Intelligence Cooperation within the UKUSA Agreement 디지털 동맹국들: UKUSA 협정내에서 SIGINT 형태로서 국가안보의 수호 지도교수 신성호 이 논문을 국제학석사학위논문으로 제출함 2016 년 7 월 서울대학교 국제대학원 국제협력 이진솔 이진솔의 국제학석사학위논문을 인준함 2016 년 7 월 위원장 이근 (인) 부위원장 김태균 (인) 위원 신성호 (인) THESIS ACCEPTANCE CERTIFICATE The undersigned, appointed by The Graduate School of International Studies Seoul National University Have examined a thesis entitled Digital Allies: Preserving National Security through Signals Intelligence Cooperation within the UKUSA Agreement Academic Advisor: Professor Seong-ho Sheen Presented by Anna Jinsol Lee, candidate for the degree of Master of International Studies, and hereby certify that the examined thesis is worthy of acceptance: Signature Committee Chair Lee, Geun Signature Committee Vice Chair Kim, Taekyoon Signature Thesis Advisor Sheen, Seong-ho Date: July 2016 The Graduate School of International Studies Agreement on Original Contents Provision Concerning my thesis, I agree that Seoul National University will provide it for the purpose of the following: 1. Matters Agreed Upon ① I agree on duplication of my thesis for the purpose of its preservation or online provision only if the contents are maintained as the original ones. ② I agree on digitizing my thesis and reproducing/distributing, for Internet or other communication networks, part of or the entirety of the thesis for free of charge. 2. Author’s Obligation I will immediately notify the Graduate School of Seoul National University of a request for suspension or cancellation of public use of my thesis once any changes in the agreement are needed (such as transfer of copyright to a third party or approval of publication of my thesis). 3. Obligations of Seoul National University ① Seoul National University will use the copyright protection tool (DRM) in case the university provides the thesis to external users. ② Seoul National University will take immediate follow-up actions once the author requests for a suspension or cancellation of public use of the thesis. Thesis Title: Digital Allies: Preserving National Security through Signals Intelligence Cooperation within the UKUSA Agreement. 디지털 동맹국들: UKUSA 협정내에서 SIGINT 형태로서 국가안보의 수호 Category of Degree: Master’s Thesis Department: Graduate School of International Studies Student ID: 2014-24248 Author: Anna Jinsol Lee Date of Submission: July 2016 © Copyrights by Anna Jinsol Lee 2016 All Rights Reserved Abstract The disclosure of the global surveillance practices of five democratic nations shook the world in June 2013. Though some were content with official justification as a matter of national security, many more were concerned with the implications these oversight abilities had on individual privacy and the possibility of a surveillance state. Using information released on the document disclosures from 2013 to 2015, the following thesis researches the impact mass surveillance practices and signals intelligence have had on the concept of national security and analyzes how democracies utilize signals intelligence data to fulfill their national security goals. This thesis focuses on the current national security strategies of the United States and United Kingdom, comparing each nation’s usage of signals intelligence, post-Snowden actions, and subsequent domestic response. Based off of these findings, this thesis analyzes and critiques the current strategy of mass surveillance practices as utilized by democratic states, proposes policies to promote better practices, and discusses the concept of individual privacy in the context of national security. Keywords: cybersecurity, Five Eyes, ICT, privacy, security, signals intelligence, surveillance, terrorism, UKUSA Agreement, United Kingdom, United States i Acronyms and Abbreviations ASD Australian Signals Directorate AVID Dutch General Intelligence and Security Service (Algemene Inlichtingen en Veiligheidsdienst) BND German Federal Intelligence Service (Bundesnachrichtendienst) BfV German Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz) CIA Central Intelligence Agency CISA Cyber Intelligence Sharing Act COMINT Communications Intelligence CSEC Communications Security Establishment of Canada DGSE French General Directorate for External Security (Direction Générale de la Sécurité Extérieure) DSD Australian Defence Signals Directorate FISA Foreign Intelligence Surveillance Act FOUO For Official Use Only FRA Swedish National Defence Radio Establishment (Försvarets radioanstalt) FVEY Five Eyes GCHQ British Government Communications Headquarters GCSB New Zealand Government Communications Security Bureau ICT Information and communications technology JSA Joint SIGINT Activity NOFORN No Foreign Nationals NSA United States National Security Agency OPSEC Operations Security ORCON Originator Controlled REL TO Related To (distribution permitted to following countries) SCS Special Collection Service SI Special Intelligence SIGDEV Signals intelligence development SIGINT Signals intelligence SUSLAG Special US Liaison Activity Germany TK TALENT KEYHOLE TS Top Secret U Unclassified UKUSA United Kingdom-United States of America Agreement ii Table of Contents Abstract ...................................................................................................................... i Acronyms and Abbreviations ................................................................................... ii Table of Contents ..................................................................................................... iii Tables and Figures .................................................................................................... v I. Introduction ........................................................................................................... 1 1. Argument Overview .......................................................................................... 9 2. Notes on Terminology ..................................................................................... 13 3. A Brief History of UKUSA Surveillance Cooperation ................................... 14 4. Chapter Outline .............................................................................................. 17 II. Analytical Approach .......................................................................................... 18 1. Theoretical Framework .................................................................................. 18 1-1. Security Theory ....................................................................................... 18 1-2. Applications in Cyberspace .................................................................... 21 2. Literature Review ........................................................................................... 26 3. Research Question and Methodology ............................................................. 29 III. The FVEY Surveillance Network ..................................................................... 31 1. The Five Eyes and Beyond ............................................................................. 31 2. Analyzing FVEY Surveillance Activity ........................................................... 34 2-1. Reading the Disclosed Documents ......................................................... 34 2-2. Data Collection and Reporting ............................................................... 38 3. The Security Priorities of the UKUSA Agreement and FVEY ........................ 41 IV. Case Studies in Disclosure and Aftermath ....................................................... 43 1. The United States of America ......................................................................... 43 1-1. National Security Strategy ...................................................................... 43 1-2. UKUSA SIGINT Utilization .................................................................... 46 1-3. Post-Disclosure Domestic Activity ......................................................... 50 2. The United Kingdom ......................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    123 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us