The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security.

Similar documents
DISEC: The Question of Collaboration between National Crime Agencies Cambridge Model United Nations 2018

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA)

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

Chair s Summary on the Seventh ASEM Conference on Counter-Terrorism Manila, Philippines June 2009

North Atlantic Treaty Organization (NATO): Yesterday Objectives, Today Strategies

NATO S ENLARGEMENT POLICY IN THE POST-COLD WAR ERA

Modern Terrorism and Counter-Terrorism Strategies

Security Education for the Prevention of Terrorism

Course Descriptions Political Science

Note verbale dated 10 December 2012 from the Permanent Mission of Israel to the United Nations addressed to the Chair of the Committee

Montessori Model United Nations MMUN 2012

Terrorism in Africa: Challenges and perspectives

United States Policy on Iraqi Aggression Resolution. October 1, House Joint Resolution 658

Speech on the 41th Munich Conference on Security Policy 02/12/2005

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

Combating Homegrown Terrorism. Written testimony of: Seamus Hughes Deputy Director, Program on Extremism The George Washington University

Political-Security Pillar of ASEAN

CHAPTER 20 NATIONAL SECURITY POLICYMAKING CHAPTER OUTLINE

Citizenship and Immigration Canada Background Note for the Agenda Item: Security Concerns

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

My other good colleague here tonight is Colonel Glen Dickenson who is the Garrison Commander of our installation here in Stuttgart.

Q & A: What is Additional Protocol I to the Geneva Conventions and Should the US Ratify It?

Democracy, Sovereignty and Security in Europe

CONVENTIONAL WARS: EMERGING PERSPECTIVE

ROMANIA - FOREIGN RELATIONS AND NATIONAL SECURITY

S/2004/276. Security Council. United Nations

The Political Adaptation of the Alliance

Ontario Model United Nations II. Disarmament and Security Council

NATO and the United States

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

Great Powers. Soviet leader Joseph Stalin, United States president Franklin D. Roosevelt, and British prime minister Winston

WHY THE CONFLICT IN UKRAINE IS A REAL WAR, AND HOW IT RELATES TO INTERNATIONAL LAW.

Rethinking Future Elements of National and International Power Seminar Series 21 May 2008 Dr. Elizabeth Sherwood-Randall

United States Foreign Policy

CRIMINOLOGY TODAY. AN INTEGRATIVE INTRODUCTION sixth edition. By FRANK SCHMALLEGER. Pearson Education, Inc.

Global Affairs (GLA) Global Affairs (GLA) Courses. Global Affairs (GLA)

CRS Report for Congress Received through the CRS Web

Strategic priority areas in the Foreign Service

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal

National Action Plan for the Implementation of United Nations Security Council Resolution 1540 (2004) MEXICO

Canada s NATO Mission: Realism and Recalibration. by Hugh Segal

Note verbale dated 25 June 2013 from the Permanent Mission of Luxembourg to the United Nations addressed to the Chair of the Committee

NATO AT 60: TIME FOR A NEW STRATEGIC CONCEPT

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

International Security Problems and Solutions by Patrick M. Morgan (Washington, D.C.: CQ Press, 2006)

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

Negotiating with Terrorists an Option Not to Be Forgone

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

Transatlantic Security Challenges The View from Washington. SOME THOUGHTS ON US and EUROPEAN SECURITY

International Seminar: Countering Nuclear and Radiological Terrorism. Small Hall, Russian State Duma September 27, 2007

CISS Analysis on. Obama s Foreign Policy: An Analysis. CISS Team

Overview of OSCE Counter-Terrorism Related Commitments

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

By James M. Goldgeier Senior Fellow for Transatlantic Relations, Council on Foreign Relations; Author, The Future of NATO

UNIT 4: POLITICAL ORGANIZATION OF SPACE

Preparing for NATO s 2014 Summit Under the Spell of the Ukraine Crisis

Professor T.V.Paul (Director of the McGill University Université de Montreal Centre for International Peace and Security Studies (CIPSS)

FSC CHAIRPERSON'S PROGRESS REPORT TO THE EIGHTEENTH MEETING OF THE MINISTERIAL COUNCIL

Workshop on implementation of resolution 1540 (2004) ASEAN Regional Forum 1, San Francisco, February 2007

CHAPTER 9 The United States and the Asia-Pacific: Challenges and Opportunities

American Legion Support for a U.S. Foreign Policy of "Democratic Activism"

Getting Started with the FOIA

RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The Future Security Environment in the Middle East

Summary of Policy Recommendations

United Nations General Assembly 1st

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director

Unjamming the FM(C)T

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

Student Handout: Unit 3 Lesson 3. The Cold War

Vienna, 25 and 26 June 2003

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

Can ASEAN Sell Its Nuclear Free Zone to the Nuclear Club?

Hong Kong Model United Nations Club

Secretary of State Saudabayev, Your Excellencies, ladies and gentlemen,

Our Leaders decided at the Kananaskis Summit to launch a new G8 Global Partnership against the Spread

STRATEGIC LOGIC OF NUCLEAR PROLIFERATION

Title of Presentation. Global Threat Brief President / CEO Global Guardian

A/56/190. General Assembly. United Nations. Human rights and terrorism. Report of the Secretary-General** Distr.: General 17 July 2001

Origins of the Cold War

THE CONGRESSIONAL COMMISSION ON THE STRATEGIC POSTURE OF THE UNITED STATES

Supporting Curriculum Development for the International Institute of Justice and the Rule of Law in Tunisia Sheraton Hotel, Brussels April 2013

U.S.- Gulf Cooperation Council Camp David Joint Statement

MAHARAJA AGRASEN COLLEGE UNIVERSITY OF DELHI. SUNIL SONDHI

Public Information Office

12. NATO enlargement

The first affirmation of the Center s Guideline ( on

Toward a More Realistic Brazilian Approach to the Global Threat Environment.

Chapter 8: The Use of Force

"Status and prospects of arms control, disarmament and non-proliferation from a German perspective"

Scott D. Sagan Stanford University Herzliya Conference, Herzliya, Israel,

Letter dated 22 November 2004 from the Permanent Representative of Israel to the United Nations addressed to the Chairman of the Committee

CRS Report for Congress Received through the CRS Web

Concept note. Open briefing of the Counter-Terrorism Committee on the nexus between international terrorism and transnational organized crime

Concept of Terrorism and its Implication. Introduction

BS/IM/R(2000)1 REPORT OF THE FOURTH MEETING OF THE MINISTERS OF INTERIOR OF THE BSEC MEMBER STATES. Poiana Braşov, Romania, April 2000

The Situation in Syria

EU-PAKISTA SUMMIT Brussels, 17 June 2009 JOI T STATEME T

Transcription:

ABOUT THE CIVILIAN INTELLIGENCE COMMITTEE (CIC) The Civilian Intelligence Committee (CIC) is the sole body that handles civilian intelligence issues at NATO. It reports directly to the North Atlantic Council and advises it on matters of espionage and terrorist or related threats, which may affect the Alliance. Each NATO member country is represented on the Committee by its security and intelligence services. It is chaired on an annual rotational basis by the nations. The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security. TOPIC A: Intelligence Sharing with Non-NATO members and Civilian Institutions The growing transnational character of security threats over the past decade has meant that both military and civilian intelligence agencies have had to adapt and broaden the scope of their intelligence sharing capabilities. In response to emerging security threats and the ongoing War on Terror, in recent years, some NATO Member States have engaged in intelligence sharing with some unlikely partners. Indeed, non-nato states such as Pakistan and Russia has

acted as an important mechanism to satisfy operational requirements and engage in effective counterterrorism activities. Furthermore, NATO Member States have also cooperated more closely with international organizations such as the Organization for Security and Cooperation in Europe (OSCE) and INTERPOL on issues concerning piracy, the Ukraine, disarmament, small arms, border management, and combating transnational threats. These relationships, however, are not always productive. For example, some NATO Member States have viewed intelligence sharing with Russia and Pakistan with particular suspicion, which has made cooperation on an organizational level more difficult in practice. Furthermore, Turkey has been vocal about their unwillingness for NATO to share intelligence with Israel, a prominent US ally and partner in a strategically significant region. The possibility exists for NATO to expand its intelligence sharing relationships to build more robust frameworks outside of the organization; however, the framework for cooperating with outside actors is subject to debate. As a delegate on the CIC, you will be asked to consider what kind(s) of cooperative framework(s) the CIC should construct to engage in intelligence gathering/sharing activities with non-nato states and organizations. Questions How should intelligence sharing be conducted with between NATO and non- NATO states and organizations? What criteria should be taken into account when engaging states outside of the organization? To what extent should information be available and/or limited?

Does NATO represent the best mechanism for sharing intelligence with outside actors? Further readings Countering terrorism. (2014, July 30). Retrieved from NATO: ww.nato.int/cps/en/natolive/topics_77646.htm?selectedlocale=en Drugs. (n.d.). Retrieved from NATO Review Magazine : http://www.nato.int/docu/review/topics/en/drugs.htm Hladon, S. L. (2012, April 18). Is there an appetite for information sharing in NATO. Retrieved from NATO: http://www.act.nato.int/article-2013-1-20 INTERPOL and NATO cooperation set to boost global efforts against maritime piracy. (2012, October 6). Retrieved from INTERPOL: http://www.interpol.int/en/news-and-media/news/2012/n20121006/ NATO. (n.d.). Intelligence/information Sharing in Combating Terrorism. Retrieved from NATO Library Homepage: http://www.natolibguides.info/intelligence Partnerships: a cooperative approach to security. (2014, October 16). Retrieved from NATO: http://www.nato.int/cps/en/natohq/topics_84336.htm? Smith, J. N. (2012). The criminal and the terrorist. Retrieved from Internet Journal of Criminology: http://www.internetjournalofcriminology.com/smithj_the_criminal_and_the_terroris t_ijc_july_2012.pdf TOPIC B: Strategies for Combating Decentralized Terrorism Changes that have resulted from the end of the Cold War and the rise of unipolarity in the international system have given rise to asymmetric warfare between state and nonstate actors. Following the Second World War and the proliferation of nuclear weapons, conventional warfare became decreasingly viable given the threat of Mutually Assured Destruction. Accordingly, asymmetric warfare has become an increasingly common form of conflict for advancing the political interests of groups with limited power bases. This is evident when examining terrorism, insofar as state sponsored terrorism became a useful tool for some countries to attain domestic or international objectives without directly implicating themselves in violence against a target state.

However, after the events of 9/11, pressure has mounted concerning states actively sponsoring and/or hosting terrorist organizations. Moreover, given the success of counterterrorism and intelligence gathering activities at interrupting and neutralizing large-scale terrorist organizations, terrorist cells have increasingly had to resort to decentralized models for conducting smaller scale attacks. This is noticeable when considering the recent attack in Canada, a thwarted beheading in Australia, and growing concerns from the United Kingdom with regard to lone wolf style attacks. In these cases, radicalized individuals/groups engage in smaller scale operations that are inherently more difficult to monitor and deflect. An unfortunate by-product of this decentralization and smaller scale attacks is that there is necessarily less communication required than in hierarchical organizations. The Internet and social media have also become major tools for organizations to disseminate their objectives to decentralized groups. Increasingly, large scale organizations such as ISIS have only required nominal contact with those who perpetrate acts under their banner. Given this challenge, it is the task of the CIC to discuss and share effective intelligence measures to combat these threats to NATO Member States in order to deter these types of attacks in the future. Questions What methods can intelligence agents do to share information in a timely manner, bearing in mind the different legal restrictions of each country? How can, and should, states provide intelligence of their own citizens suspected of terrorism, to other states? Can terrorist organizations be viewed in the same way as criminal organizations given their decentralized nature? If so, what can be learned from combating crime and how can it be applied to combating terrorism?

What effective means of deradicalization can be used by states to prevent their own citizens from becoming agents of transnational terrorist organizations? Given the changing nature of the terrorists source of resources, how can counter-terrorism be changed to address these new methods? Further Reading Brant Hamilton, Nathan, and David Gray. "Decentralized Terrorism: Ramifications for a Centralized International System." Global Security Studies 3, no. 2 (Spring 2012): 24-42. International Monetary Fund. Anti-Money Laundering/Combating the Financing of Terrorism - Topics. http://www.imf.org/external/np/leg/amlcft/eng/aml1.htm Rowlands, Dane, and Joshua Kilberg. "Organizational Structure and the Effects of Targeting Terrorist Leadership." Centre for Security and Defense Studies - Carleton University. April 2011. http://www3.carleton.ca/csds/docs/working_papers/rowlandskilbergwp09.pdf Shea, Jamie. "Lecture 3 - International terrorism: is it still a strategic threat?" NATO. December 22, 2009. http://www.nato.int/cps/en/natohq/opinions_84764.htm?selectedlocale=en TOPIC B: The Incorporation of Transnational Crime into CIC's Mandate As it is well documented, NATO was founded in the wake of the Second World War to serve three broad purposes: (1) deter Soviet expansionism, (2) forbid the revival of nationalist millenarianism in Europe, and (3) encourage European political integration. At its core, the organization is based on the principle of collective self-defense, wherein Member States pledge to treat an armed attack against one or more of NATO s members as an attack against all. Though at the time, the concept of an organization that could ensure collective security in the event of interstate conflict was particularly salient, changing international dynamics over the course of the 20 th century have since challenged the relevance of NATO s interstate security focus.

Though NATO has successfully reshaped its mandate in recent decades and expanded its range of security activities post-cold War, there remain pertinent questions about what types of security threats the organization should focus on and where they should set limits on their engagements. This is an especially pertinent question for committees like the CIC, as the mandate of the committee can extend quite broadly when addressing threats that may adversely impact the Alliance from an intelligence gathering and sharing context. Indeed, gathering and sharing intelligence related to terrorism since the attacks on September 11, 2001, have taken on multidisciplinary dimensions including security threats such as those posed by transnational crime have consistently remained absent from the committee s agenda. As a delegate on the CIC, you are charged with assessing the threat posed by transnational crime to NATO Member States and the relevance of incorporating these security threats into the CIC s mandate. Should the CIC expand its area of expertise? Or should Member States draw a line to avoid information overload? Questions: What is the role of NATO and how does the CIC compliment its functions? Is there a role for NATO in addressing security issues arising from transnational organization crime? Should the CIC expand its mandate to include gathering and sharing intelligence related to this type of criminal activity? If the CIC were to expand its mandate, how would this be integrated into the CIC? What would the role of NATO be in coordinating intelligence sharing? How could it be done? If the CIC does not expand its mandate, what mechanisms should Member States pursue to address this security threat? Should states pursue other means outside of the organization to address their concerns? How would expanding the committee s mandate impact other activities?

Further Reading Makarenko, Tamara, The Crime-Terror Continuum: Tracing the Interplay between Transnational Organized Crime and Terrorism, Global Crime 6, no. 1 (2004), available at: http://www.iracm.com/wpcontent/uploads/2013/01/makarenko-global-crime-5399.pdf O Malley, Pat and Steven Hutchinson, Actual and Potential Links between Terrorism and Criminality, Trends in Terrorism 5 (2006), available at: http://www.itac.gc.ca/pblctns/pdf/2006-5-eng.pdf Reinares, Fernando, Transnational organized crime as an increasing threat to the national security of democratic regimes: assessing political impacts and evaluating state responses, available at: http://www.nato.int/acad/fellow/97-99/reinares.pdf