1 s RUTGERS MODEL UNITED NATIONS Delegation: Indonesia Committee: Legal Topic: International Intelligence Acquisition and Sharing Delegates: Rohini Bhaumik and Matt Zonis EAST BRUNSWICK HIGH SCHOOL s 2 Sovereignty is vital to the United Nations. If all countries were not sovereign within the organization, the Post World War Two world could have never had a UN. In fact, all countries count on the United Nations protecting their sovereignty. However when one country supersedes another’s sovereignty, serious issues rise, especially when intelligence agencies are found obstructing upon power. Intelligence is a sensitive issue with almost every country. This is heightened especially during times of war. Since countries mistrust one another when an economic or political conflict arises, sharing intelligence is vital to maintaining peace and security. Intelligence sharing must be considered, because mistrust will not help solve the other problems of the world, and only worsen times of tension. In order to convince other countries to accept this though, the United Nations must keep in mind that each country is sovereign in the UN charter (Indonesia, Intelligence and Security 1). So what solutions can the United Nations create to maintain peace and security? Intelligence forces around the globe collect classified information about other countries. The SIS (Security Intelligence Service), the CIA (Central 1), and the ASIS (Australian Secret Intelligence Service) are examples of such intelligence forces. Given its nature, espionage is not a discussed issue; however it has always been an integral part of many governments. But in today’s Information Age, access to classified information is much easier. Even this can be an infringement upon a country’s sovereignty. Intelligence forces and fast communication lead to much suspicion around the world, especially in this day where nuclear warfare and terrorism are constant threats. These advancements have made foreign intelligence-gathering a serious threat. 3 Indonesia has had encounters with {intelligence forces which overstep their own sovereignty. In 1957, a CIA backed coup-d’etat was launched against the President Sukarno. The violence in Indonesia occurred because of the CIA’s involvement. (The CIA’s Involvement 1). Had the CIA not superceded Indonesia’s sovereignty, the serious violence could have been avoided. However, Indonesia also has intelligence forces, known to the world as the State Intelligence Coordinating Agency, or BAKIN (Indonesia, Intelligence and Security 1). Thus, Indonesia recognizes the necessity of protecting sovereignty and also maintaining the power of intelligence. In a world in which knowledge is power, intelligence is just as important as armies to help win wars and gain global control. The sharing of information is n ecessary for countries to protect themselves against terrorist attacks. Having suffered from two major attacks in Bali, Indonesia understands the vitality of transparency and wants to help promote information sharing between nations. It is imperative that countries put aside their differences to be united against terrorism. Indonesia proposes that an international database of intelligence be created to easily be able to share information easily between nations. In order to encourage the countries of the United Nations to acquiesce to a database, the UN would stress the need for maintaining peace and security, and promote that a countries best interests are in sharing intelligence. Mistrust of other countries must be disbanded to prevent possible bloodshed. However, to be able to first acquire access to the database, individual countries would first have to agree to certain terms regarding the database. This would require that all countries with access to the database report all information they have received to the database. Also countries would not be allowed to share information other countries have submitted, with countries who have not agreed to 4 these terms. Also countries would not be allowed to post faulty information on purpose. After these terms are agreed to, the leader or chief of intelligence of that country would receive an access code to the database that only he and whoever he would tell would know it as well. This would highly decrease the possibility of someone who does not belong gaining access to the database since there would be only a limited amount of people who knew how to get access to the database. If for some reason, there is leak of information, to a country or origination that should not have access to this information, or if the information imputed into the database were faulty, then the violating country would receive harsh repercussions imposed on them. Specific people could be charged by the ICC for obstructing the database. This is why high security is so important. If the database is to be successful, the UN would have to use employees to constantly ID and affirm countries access codes. Records of who, what, where and when are also imperative. A country that shares information with others who should not have that information would be punished with a no tolerance policy. Since a mistake of this magnitude can jeopardize another countries citizen, any country shown to give information to someone who should not have this information shall be permanently removed from the database. If a country were shown to input faulty information to the database, that country would be put under “probation”. This would require a government to first show a board of members from other countries their sources and require research from the board to ensure that the information is true. After a certain amount of time, the prohibition would be lifted. This punishment would insure that countries would be telling 5 the truth in the future and would not cause a government to follow faulty information that could jeopardize their citizens or national security. However during wartime, the United Nations would refrain from recommending warring countries to post all their information about each other in the database. Since during wartime it would be impossible to ask warring country to submit all sorts of intelligence, all information sharing between allies would have to be done elsewhere. After the conflict is over, the terms of the database would come back into effect for whoever refrained from abiding by the guidelines of the database. Hopefully with an open system of intelligence, the world will be able to fight terrorism better. If countries do agree to the database idea, then it would become a major landmark in history in which countries set aside their differences and help fight one common goal. If this idea comes to fruition, it might be a step in helping to end the war on terror. This could also help countries focus less on self-interest, and more on international peace and security. The database will not only help individual countries, but it could be a major step in today’s global village. If any country is ever going to be able to protect itself from threats whether it is from terror or from another country, intelligence is required to help stop it. This has become increasingly dangerous and more important over the years since countries want to know everything they can about protecting themselves while at the same time making sure countries do not much about them. This also has become harder to accomplish since the rise of intelligence agencies and technology make it easier for someone to blend into another countries government making it harder to identify enemy spies. Also if enemy countries spies are found inside someone country, the distrust and hatred between those 6 countries could rise into a war causing more problems. This is why gaining intelligence without obstructing sovereignty is key. Less suspicion and more trust between countries can help towards making it easier to openly share information. This would make it not just easier to acquire information since you would not need to plant a spy but also it would help form a strong bond between countries that could lead into more dealings between the two nations in things such as trade. If things such as those can happen, the world will end up being a safer place in which all to live. 7 Works Consulted 1. Adamson, Adrian “ State of the World” Online. Internet. 10/23/06 Available Internethttp://www.naiadonline.ca/book/01Glossary.htm 2. ASIS “ The Role of the ASIS” Online. Internet. 10/24/06 Available http://www.asis.gov.au/about.html 3. Caraway, Melvin “ Global Intelligence Working Group” Online. Internet. 10/24/06 Available http://it.ojp.gov/global/childTopic.jsp?topic_id=61&na v_type=main 4. Scott, Peter Dale “The United States and the Overthrow of Sukarno” Online. Internet. 10/24/06 Available http://www.namebase.org/scott.html 5. CIA “ Indonesia” Online. Internet. 10/24/06 Available https://www.cia.gov/cia/publications/factbook/geos/id. html 6. CIA “ Information on the CIA” Online. Internet. 10/24/06 Available https://www.cia.gov/cia/information/info.html 8 7. Dr Donovan, Michael “ International Cooperation on the frontline of Terrorism” Online. Internet. 10/24/06 Available http://www.cdi.org/terrorism/intell-sharing.cfm 8. Global Security “ Indonesia Intelligence and Security Agencies” Online. Internet. 10/24/06 Available http://www.globalsecurity.org/intell/world/indonesia/i ndex.html 9. Sidwell, Thomas E “The Indonesian Military: DWI Fungsi and Territorial Operations” Online. Internet. 10/24/06 Available http://www.fas.org/irp/world/indonesia/indo-fmso.htm 10.SIS “ The History of the Sis” Online. Internet. 10/24/06 Available http://www.sis.gov.uk/output/Page47.html 11. The Library of Congress “ A Country Study: Indonesia” Online. Internet. 10/24/06 Available http://lcweb2.loc.gov/frd/cs/idtoc.html