Throughout history, governments have always dealt in secrets

advertisement
1
s
RUTGERS MODEL UNITED NATIONS
Delegation: Indonesia
Committee: Legal
Topic: International Intelligence Acquisition and Sharing
Delegates: Rohini Bhaumik and Matt Zonis
EAST BRUNSWICK HIGH SCHOOL
s
2
Sovereignty is vital to the United Nations. If all countries were not
sovereign within the organization, the Post World War Two world could have never had
a UN. In fact, all countries count on the United Nations protecting their sovereignty.
However when one country supersedes another’s sovereignty, serious issues rise,
especially when intelligence agencies are found obstructing upon power. Intelligence is a
sensitive issue with almost every country. This is heightened especially during times of
war. Since countries mistrust one another when an economic or political conflict arises,
sharing intelligence is vital to maintaining peace and security. Intelligence sharing must
be considered, because mistrust will not help solve the other problems of the world, and
only worsen times of tension. In order to convince other countries to accept this though,
the United Nations must keep in mind that each country is sovereign in the UN charter
(Indonesia, Intelligence and Security 1). So what solutions can the United Nations create
to maintain peace and security?
Intelligence forces around the globe collect classified information about
other countries. The SIS (Security Intelligence Service), the CIA (Central 1), and the
ASIS (Australian Secret Intelligence Service) are examples of such intelligence forces.
Given its nature, espionage is not a discussed issue; however it has always been an
integral part of many governments. But in today’s Information Age, access to classified
information is much easier. Even this can be an infringement upon a country’s
sovereignty. Intelligence forces and fast communication lead to much suspicion around
the world, especially in this day where nuclear warfare and terrorism are constant threats.
These advancements have made foreign intelligence-gathering a serious threat.
3
Indonesia has had encounters with {intelligence forces which overstep their
own sovereignty. In 1957, a CIA backed coup-d’etat was launched against the President
Sukarno. The violence in Indonesia occurred because of the CIA’s involvement. (The
CIA’s Involvement 1). Had the CIA not superceded Indonesia’s sovereignty, the serious
violence could have been avoided. However, Indonesia also has intelligence forces,
known to the world as the State Intelligence Coordinating Agency, or BAKIN (Indonesia,
Intelligence and Security 1). Thus, Indonesia recognizes the necessity of protecting
sovereignty and also maintaining the power of intelligence.
In a world in which knowledge is power, intelligence is just as important as armies
to help win wars and gain global control. The sharing of information is n ecessary for
countries to protect themselves against terrorist attacks. Having suffered from two major
attacks in Bali, Indonesia understands the vitality of transparency and wants to help
promote information sharing between nations. It is imperative that countries put aside
their differences to be united against terrorism. Indonesia proposes that an international
database of intelligence be created to easily be able to share information easily between
nations. In order to encourage the countries of the United Nations to acquiesce to a
database, the UN would stress the need for maintaining peace and security, and promote
that a countries best interests are in sharing intelligence. Mistrust of other countries must
be disbanded to prevent possible bloodshed. However, to be able to first acquire access to
the database, individual countries would first have to agree to certain terms regarding the
database. This would require that all countries with access to the database report all
information they have received to the database. Also countries would not be allowed to
share information other countries have submitted, with countries who have not agreed to
4
these terms. Also countries would not be allowed to post faulty information on purpose.
After these terms are agreed to, the leader or chief of intelligence of that country would
receive an access code to the database that only he and whoever he would tell would
know it as well. This would highly decrease the possibility of someone who does not
belong gaining access to the database since there would be only a limited amount of
people who knew how to get access to the database. If for some reason, there is leak of
information, to a country or origination that should not have access to this information, or
if the information imputed into the database were faulty, then the violating country would
receive harsh repercussions imposed on them. Specific people could be charged by the
ICC for obstructing the database. This is why high security is so important. If the
database is to be successful, the UN would have to use employees to constantly ID and
affirm countries access codes. Records of who, what, where and when are also
imperative.
A country that shares information with others who should not have that
information would be punished with a no tolerance policy. Since a mistake of this
magnitude can jeopardize another countries citizen, any country shown to give
information to someone who should not have this information shall be permanently
removed from the database. If a country were shown to input faulty information to the
database, that country would be put under “probation”. This would require a government
to first show a board of members from other countries their sources and require research
from the board to ensure that the information is true. After a certain amount of time, the
prohibition would be lifted. This punishment would insure that countries would be telling
5
the truth in the future and would not cause a government to follow faulty information that
could jeopardize their citizens or national security.
However during wartime, the United Nations would refrain from recommending
warring countries to post all their information about each other in the database. Since
during wartime it would be impossible to ask warring country to submit all sorts of
intelligence, all information sharing between allies would have to be done elsewhere.
After the conflict is over, the terms of the database would come back into effect for
whoever refrained from abiding by the guidelines of the database. Hopefully with an
open system of intelligence, the world will be able to fight terrorism better. If countries
do agree to the database idea, then it would become a major landmark in history in which
countries set aside their differences and help fight one common goal. If this idea comes to
fruition, it might be a step in helping to end the war on terror. This could also help
countries focus less on self-interest, and more on international peace and security. The
database will not only help individual countries, but it could be a major step in today’s
global village.
If any country is ever going to be able to protect itself from threats whether it is
from terror or from another country, intelligence is required to help stop it. This has
become increasingly dangerous and more important over the years since countries want
to know everything they can about protecting themselves while at the same time making
sure countries do not much about them. This also has become harder to accomplish since
the rise of intelligence agencies and technology make it easier for someone to blend into
another countries government making it harder to identify enemy spies. Also if enemy
countries spies are found inside someone country, the distrust and hatred between those
6
countries could rise into a war causing more problems. This is why gaining intelligence
without obstructing sovereignty is key. Less suspicion and more trust between countries
can help towards making it easier to openly share information. This would make it not
just easier to acquire information since you would not need to plant a spy but also it
would help form a strong bond between countries that could lead into more dealings
between the two nations in things such as trade. If things such as those can happen, the
world will end up being a safer place in which all to live.
7
Works Consulted
1.
Adamson, Adrian “ State of the World” Online. Internet. 10/23/06 Available
Internethttp://www.naiadonline.ca/book/01Glossary.htm
2.
ASIS “ The Role of the ASIS” Online. Internet. 10/24/06 Available
http://www.asis.gov.au/about.html
3.
Caraway, Melvin “ Global Intelligence Working Group” Online. Internet.
10/24/06 Available
http://it.ojp.gov/global/childTopic.jsp?topic_id=61&na
v_type=main
4.
Scott, Peter Dale “The United
States and the Overthrow of Sukarno” Online. Internet.
10/24/06 Available http://www.namebase.org/scott.html
5.
CIA “ Indonesia” Online. Internet. 10/24/06 Available
https://www.cia.gov/cia/publications/factbook/geos/id.
html
6.
CIA “ Information on the CIA” Online. Internet. 10/24/06 Available
https://www.cia.gov/cia/information/info.html
8
7. Dr Donovan, Michael “ International Cooperation on the frontline of Terrorism”
Online. Internet. 10/24/06 Available
http://www.cdi.org/terrorism/intell-sharing.cfm
8. Global Security “ Indonesia Intelligence and Security Agencies” Online. Internet.
10/24/06 Available
http://www.globalsecurity.org/intell/world/indonesia/i
ndex.html
9. Sidwell, Thomas E “The Indonesian Military: DWI Fungsi and Territorial
Operations” Online. Internet. 10/24/06 Available
http://www.fas.org/irp/world/indonesia/indo-fmso.htm
10.SIS “ The History of the Sis” Online. Internet. 10/24/06 Available
http://www.sis.gov.uk/output/Page47.html
11. The
Library of Congress “ A Country Study: Indonesia” Online. Internet. 10/24/06
Available http://lcweb2.loc.gov/frd/cs/idtoc.html
Download