Sie sind auf Seite 1von 28

International Intelligence Agency

Content Page

Content Page 2

Welcoming Remarks Error! Bookmark not defined.

Explanation of the Council and Mandate 6

Introduction to the Topic 7

History of the Topic 8

Current Situation 25

Scope of Debate 16

Past Actions 18

Key Questions 26

Bibliography 277

2
Welcoming Remarks
[Beginning Transmission of Classified Information]
Code: CAESAR - 11
-Beginning Decryption-

Dear Directors,

Thank you for agreeing to convene upon our request. We are aware that
this committee is an unconventional one given the nature of your
profession. In fact, it is highly likely that some of your agencies were or
are still conducting operations against one another. However, given the
recent developments across the globe, we believe that it may be both in your
country and the international community’s best interest that we discuss
them.

It is possible that we may not be able to agree on a collective solution


to the problems, let alone acknowledging the problem, some of which could
have been initiated by yourself. Nevertheless, it is critical that at the
very least we consider such a possibility. We look forward to meeting you.

Best of luck,
Presidential Board of International Intelligence Agencies
Caleb, Elliot, Celine, Josh, Lukas, and Aliva

-Error, Decryption Malfunction-

Tq jzf xlylrp ez opnzop estd xpddlrp, T hzfwo wtvp jzf ez hpwnzxp jzf ez esp
gpcj qtcde Nctdtd Nzxxteepp zq Alclsjlyrly Yletzylw Xzopw Fytepo Yletzyd.
Hp szap esle esczfrs estd nzxxteepp, hp htww mp lmwp ez mpeepc piawzcp
xfwetawp ezatnd, zyp zq hstns td esp mprtyytyrd zq hsle hzfwo nslclnepctdp
esp plcwj 21de Npyefcj - Epcczctdx, hstns td zqepy ufde cpxlcvpo htes l
dtyrwp pgpye. Szhpgpc, estd td yze esp zywj ezatn hp szap ez nzgpc, qzc hp
lwdz szap ez piawzcp esp stoopy hzcwo zq pdatzylrp lyo szh te zapclepd ty esp
cplw hzcwo hspy nzxalcpo lrltyde azafwlc afmwtn txlrp zq “Ulxpd Mzyo” zc
“Xtddtzy Txazddtmwp.” Htes esle, hp htds jzf rzzo wfnv.
[End of Transmission]

3
Crisis Dais Introduction

Caleb Nathaniel Karim

An engineer and problem solver at heart, Caleb loves to explore various


systemic issues in many aspects of the world, be it technical, political or
societal. In this regard, he strives to find ways for people to better
understand the context behind every system or event. Essentially, it is to
understand the intrigue and inner workings behind every [REDACTED] file,
every blacked-out document, why some covert operations succeed while
others fail or even backfire. For PNMUN, Caleb hopes for delegates to be able
to enjoy the espionage world, while also getting a better understanding of
how intelligence agencies operate, from the mundane but essential task of
gathering and analyzing information to the more ‘flashy’ and risky section
of covert operations.

Elliot Kok Kin Fai

Elliot is a graduate from Raffles Institution and is currently serving


national service as a [CLASSIFIED] in Singapore. He started in the Singapore
MUN circuit back in March 2015 and will be participating in an
international MUN as a member of the dais for the PNMUN Crisis for the very
first time. He relishes in jazz music theory and compositions, as well as
creating puzzles hinged on ciphers and clues. Most importantly, he
welcomes prospective delegates to tackle the unfolding issues faced and
exercise teamwork to solve pertinent problems in PNMUN Crisis 2019.

Celine

An agent of peace and security taking undercover in international


economics, Celine often puts herself in crisis both her Model UN and her
life. As an undercover agent, she always reminds her partners to think three
steps ahead and SUPER TOP SECRET WORDS HEHE:). She expects agencies would
remain in disclosure of information flowing within the emergency meeting

4
Joshua Mahawira Aswinabawa

Josh is a seeker of thrilling experiences who loves to explore ideas from


places people would not normally look at. For him, the crisis committee of
a MUN conference serves as one place to fulfill his desire for such a thrill.
PNMUN this year discusses one topic that changed the world in the aspects
of politics, security, diplomacy, and doing dirty operations. Here, your
creativity, calculated planning, and awareness of conditions would be
tested - hopefully to their furthest limit. His hope is simply for the
delegates to enjoy the conferences and the dangers that the team had
prepared for agencies. He and the whole team wishes the best of luck for all
agencies.

Lukas Mikael

Lukas Mikael is a third-year undergraduate student of International


Relations from President University concentrating in Defence and
Strategic studies. His MUN journey began a year ago at PresMUN 2018 and
since then he has joined [CLASSIFIED] MUNs. Besides doing MUN and finishing
his college assignments, you are going to find him playing at the basketball
court or in his room watching Stranger Things. His ultimate note to all the
delegates the council would be “have fun and you are going to experience a
thrilling and exciting nature of crisis council itself.”

5
Explanation of the Council and Mandate

The International Intelligence Agencies committee was established in 1994


after the end of the Cold War, under the precaution of emerging
international terrors, with meetings conducted in total non-disclosure
and ciphers on the papers. These agencies have an obligation to provide
security risk mitigation, with years of experience in technical
surveillance countermeasure training and also to provide various
protection levels.

Individual Mandate

As a member of the council, each of you will be representing the foreign


intelligence agency of your country. As such, you will have direct control
over your respective agencies. However, there are also multiple other
intelligence agencies in your own countries, of which you can coordinate
with for your efforts in this committee.

Additionally, being the foreign intelligence agency director, you will be


able to advise your respective heads of governments on actions that can be
taken in order to advance your country’s national agenda. However, your
advice may not be taken up by your country’s leaders for various reasons.
Additionally, several covert operations may require the approval of your
government due to the nature of the action.

Council Mandate

With respect to the council, the committee acts as a hidden committee from
the public, and any mentions of the committee’s existence will be refuted or
not answered for political and security reasons.

The range of actions the committee is limited only to the potential actions
that can be taken by intelligence agencies. You may take joint or collective
directives or agreements, however, they can be blocked by your governments
for political reasons without a valid explanation.

6
Introduction to the Topic

Intelligence agencies around the world have kept tabs on national threats.
As such attacks are carried out with increasing sophistication, terror
groups and operative cells continually adapt their operations. They carry
out deadly attacks on civilians and city infrastructure to gain attention
and propagate the perverted ideologies that they affiliate with or advance
political agendas. As such, behind the scenes, there has been an everlasting
cat-and-mouse game between intelligence agencies around the world to
protect their people from further attacks whilst terrorist organizations
and foreign governments try to evade their sights to cause even more
widespread mayhem and destruction.

Intelligence agencies employ a plethora of tactics to counter, destroy,


manipulate and infiltrate their targets, gaining valuable information so
as to prevent and foil their plans. Due to the sensitivity and time-bounded
nature of information gathered, intelligence agencies have been known to
conduct covert operations that are legally questionable and remain tight-
lipped about their activities, even to their own governments.

How should you run your intelligence agencies to secure national peace,
contain terror threats, and protect your people remains entirely up to your
discretion. However, remember that as a national agency, your actions are
still under the purview of your government.

7
History of the Topic

From the dawn of time, intelligence has mattered. The knowledge of your
enemy’s location, the strength that your enemy possesses, the action that
your enemy intends to do is some of the few reasons why intelligence is
crucial. The history of intelligence is well preserved and can be
discovered throughout history. From ancient books such as Arthashastra
and Ping Fa (also known as “The Art of War”), the reliance of states and
military to intelligence confirms there was far more to war than just
battles.

While there are shreds of stories on how intelligence has developed from
time to time, the first development of a modern intelligence system can be
traced back to the first century BC during the reign of Julius Caesar. In the
beginning, it was Crassus ( a political patron of Julius Caesar and part of
the First Triumvirate) that established an intelligence network covering
the whole republic of Rome. Crassus designed a private intelligence
organization with a system that aims to warn him for any developments of a
growing potential adversary or any shift in the market forces that governed
the Republic's far-flung trade. Crassus whose position is essentially
crucial for Rome’s survival realizes the need for a surveillance system
where he can monitor and control the social situation of Rome. The system
was further developed by Julius Caesar, whose experience as a soldier
triggered him to developed Crassus’ system into the first real “national”
intelligence system. Julius Caesar realized the necessity of timely and
accurate information and the importance of fast and secure information to
keep his own plans secret. His tenure was colored by the notorious feature
of intelligence collection notably during his Gallic Wars campaign with
the most notable being the reconnaissance of Britain by his agent Gaius
Volusenus in 55 BC, just before Caesar’s landing in Kent. When Caesar was
murdered in 44 BC, the organization fall into the hand of Octavious and
later passed on to Caesar Augustus. Augustus later established an empire
network of communications which would later become the core of Rome’s
imperial secret service based on Crassus and Caesar’s system. This imperial
police and intelligence service designed to give an early warning of any
threats to the imperial throne, potential unrest, corruption or anything
that would disrupt the stability of the Roman Empire.

8
In war and politics, obtaining information has always been of crucial
importance. It is with surprise that even with what the intelligence able
to provide, intelligence is sometimes underestimated and even forgotten as
a crucial element. Clausewitz, a famous military theorist, and war general
in his masterwork "On War" even treats intelligence with something
amounting to disdain. His dismissive conclusion seems to be rooted in what
he believed was the "fog of war". An assumption for great military theorists,
that most of the military intelligence is questionable at its best and
frequently late or wrong. While his assumption may not be wrong, the true
war commander knows that the element of surprise is one of the cardinal
principles in war. The heavy emphasis on intelligence as a foreknowledge
and the function of intelligence to prevent potential adversaries is a
significant reason why intelligence is crucial to state security.

The Intelligence Cycle and Intelligence Management

Intelligence can be best described as information that has been


systematically processed and professionally analyzed. While there are lots
of definitions of intelligence, it can be simply defined as:

“Processed, accurate information, presented in sufficient time to


enable a decision-maker to take whatever action is required.”

One of the keys points that differ intelligence from any public information
is the cyclical process that made intelligence valuable. This cyclical
process that turns information to intelligence is also known as the
Intelligence Cycle.

9
Figure 1: Intelligence Cycle (Source: On Intelligence, 2017)

The idea of the intelligence cycle is to confront details of certain


information in order to help intelligence agencies to establish their plan
of action and enables intelligence professionals to deliver a high-quality
intelligence product. Not only that, but the intelligence cycle also
contributes to provides a comprehensive understanding of a more subtle
problem for every intelligence agency, that of capabilities and intentions.
Knowing the difference between intention and capabilities is important for
any intelligence agency not only for intelligence agencies to examine a
potential threat but also for battle management and targeting purposes at
all levels of conflicts. The failure in separating intention and
capabilities may contribute to the failure of intelligence in providing a

10
piece of concrete information or even in a worse scenario, where
intelligence agencies are unable to adapt in a condition where their
decision is crucial for the situation. While there is no clear parameter in
determining the difference between these two, the intelligence cycle makes
an effort to separate the two. Although it may not always be successful, the
intelligence cycle still provides a basic understanding of the situation
to any intelligence agency.

Intelligence Process

As alluded above, the intelligence cycle plays an important role in


determining how a piece of information would eventually provide insight.
The intelligence process is a five step procedure that consists of
Direction, Collection, Collation, Interpretation, and Dissemination.

1. Direction

Direction serves as the guideline for intelligence agencies or spy to


identify what kind and what form of information that they want to
pursue. In this process, all requirements for the details of the
intelligence must be set in order to get the exact and comprehensive
information that they are expecting.

2. Collection

Once all the requirements and priorities have been determined, the
next step would be collecting information. During this step, all
information that is being collected would be separated accordingly
to the respective categories.

3. Collation

After all the information has been collected, it will be processed,


decrypted, converted, translated and enlisted to a readable database.
Within this process, all the information would have to be evaluated,
assessed and weighed carefully by analysts.

11
4. Interpretation

The interpretation process is where the real process of turning


information to intelligence starts. In this process, agents have to
interpret all the given information and find the purpose or interest
of the information. Agents will have to find out who is involved and
what is their intention, and find out what does it mean for the
intelligence agency.

5. Dissemination

Also known as distribution (in this case is highly secretive pieces of


information), at this stage the processed, sensitive information must
be carefully handled and sent to relevant parties. Dissemination can
take on many forms, depending on the classification level of the
information. A few of the examples include a written brief, an urgent
signal, a routine intelligence summary, or in most urgent cases are a
verbal briefing to the leader of the country itself.

Cold War Nature and Intelligence Role

When the Cold War broke out in the late 40s, gathering information became a
top priority for all states involved. As Soviet expansionism and Western
containment clashed in numerous areas around the world, both sides adopted
the policy of being “one step ahead of your enemies”. The reliance of both
superpowers and their allies on intelligence was mainly influenced by the
fact that all states are attempting to prevent a full nuclear war that would
have resulted in a mutually assured destruction. Due to the nature of the
Cold War and the concept of proxy warfare that is being played out by the
two superpowers, intelligence gathering has become a vital tool for the
state in pushing their country’s agenda.

As information becomes increasingly important for both military officials


and policymakers, every intelligence agency strives to innovate and
revolutionize the intelligence field, especially on the technicalities of
gathering information. From the early 40s to the end of the Cold War, every
country emphasized the need for information as a guide for them to survive

12
in the international arena. As a result, there was a massive effort in the
development of surveillance technology throughout this period. From the
development of high altitude aircraft for reconnaissance purposes to the
launching of surveillance satellites to monitor ground activities, a new
age of intelligence has emerged. The prominent example of how the
development of technology contributes to the Cold War can be seen during
the Cuban Missile Crisis in 1962. On 14 October 1962, a U-2 flew over the
western side of Cuba and brought back 928 pictures proving and confirming
the existence of an SS-4 nuclear missile. Later on, the US Marine Corps,
Navy and Air Force made a decision to use RF-8A Crusader, with its 5 cameras
and RF-101 reconnaissance equipment, to confirm the existence of these
missiles. The mission brought back some of the most spectacular high-
quality images which was brought by the US as evidence during the United
Nations Security Council meeting. The crisis that occurred in 1962 is a
transitional point that changed the landscape of modern intelligence,
particularly from the deployment of agents on the ground to the use of more
technical solutions. In particular, photography showed that technical
intelligence could fill a vital intelligence gap that HUMINT may not be
able to close out.

The reliance of states on intelligence also resulted in every major power


that involved to maintain at least one institution that is dedicated to
intelligence gathering or espionage. Intelligence institutions such as
CIA, KGB, and MI6 are responsible not only for obtaining information but
also to disrupt and infiltrate their enemies to push their country’s agenda.
During this period, intelligence agencies were often found carrying out
numerous covert activities such as spreading propaganda, supporting and
financing the opposition party, creating social tensions or staging a coup.
Covert activities became an essential instrument for both superpowers in
executing their foreign policy, in an effort to not only secure their
national security but also to affirm their position in the global arena.
Several prominent cases can be observed. During the Fall of Allende regime
in 1973, the CIA had supported the Mujahideen in Afghanistan during the
Soviet-Afghan War in 1979, as well as the Iranian revolution in 1953 to help
Reza Shah into power. The CIA was also involved in the National

13
Reorganization Process in 1976 that overthrew the elected President Isabel
Peron in Argentina.

Intelligence Gathering Disciplines

As explained previously, the development of technology revolutionized


intelligence gathering and has an enormous impact on how states develop
and execute their foreign policy. Currently there are at least three
significant intelligence disciplines that are being utilized by
intelligence agencies that will be explained below.

1. HUMINT

Human Intelligence or HUMINT is an intelligence-gathering


discipline that uses humans as a source of information. It is the most
conventional concept of intelligence that typically consists of
interpersonal communication ranging from asset targeting,
debriefing, interrogating to profiling. Human intelligence, as the
name implies represents the most traditional form of intelligence
and the most subjective yet rewarding discipline compared to other
disciplines. While the development of gathering information has
vastly improved, the utilization of human intelligence in spying
remains at the heart of all intelligence agencies.

2. SIGINT
Signal Intelligence or SIGINT is an intelligence-gathering
discipline consisting of several sub-disciplines such as
communication intelligence (COMINT), electronic intelligence
(ELINT), Direction Finding, Signal Detection, cryptanalysis, and
Traffic Analysis. From monitoring a certain line of communication to
collecting information that is concerning, SIGINT has developed to
be one of the most important and precarious disciplines. Given the
increased usage of radio communication, SIGINT has become a critical
tool in acquiring information on the enemy. The source of SIGINT can
range from intercepting radio transmissions, to locating signal
sources.

14
3. IMINT
Imagery Intelligence or IMINT is an intelligence-gathering
discipline that mainly uses aerial photography and satellite to
collect information. During the Cold War, IMINT developed rapidly
due to the involvement of two superpowers that emphasized the need
for a large quantity of information. The development of technologies
within this discipline mainly triggered by the need for “force
multiplier”, an idea that certain factors such as information, in this
case, would contribute critically for the end result of any war. From
airborne reconnaissance to the development of satellite, the
development of IMINT provided a new challenge and landscape for
intelligence to deal with.

15
Scope of Debate

As the world enters the 21st Century, changes in the political landscape and
technological advancement results in multiple new challenges for the
intelligence community.

Clandestine Operations
With the collapse of the Soviet Union, the Cold War had officially ended,
marking a shift in foreign policy for many nations. After decades of rivalry
between two great superpowers, one side had emerged victorious, ending an
era where there are clear ‘sides’ to pick. As such, there are no longer clearly
defined threats such as ‘the Soviet Bloc’ to direct intelligence operations
towards.

This ‘lack of target’ also results in a question towards the use of


clandestine Operations. During the Cold War, through the ideological
battle between Communism and Capitalism, several countries often engaged
in covert operations in order to increase support for their ideology while
undermining the opponent. These can range from backroom arms supply deals
and covert intelligence gathering to misinformation, training rebels or
even outright coups in order to overthrow the incumbent government and
install one that is more friendly to one’s side. Many conflicts and
atrocities have arisen out of these actions, from the funding of the
Mujahideen in their fight against the Soviet Union in Afghanistan to
Operation Gold, a joint US-British intelligence operation to tap into the
landlines of the Soviet Union and Operation Condor, a CIA operation to
overthrow the democratically-elected Argentine government in order to
prevent the spread of communism in Latin America.

Given the change in international politics from one of competition between


two rivaling ideologies to a new international order, intelligence
agencies and governments are forced to reconsider the use of clandestine
operations as tools to achieve the state’s foreign policy effectively.

16
Rise of Non-State Actors
Though the threat from other foreign powers may be reduced, there has been
a noted increase in number of bombings and attacks by Non-State Actors,
groups or individuals that are not strongly affiliated to any one nation.
These attacks have varied levels of planning and support, ranging from mass
shootings to car bombs and even chemical attacks. While there may be
speculations of potential foreign powers secretly supporting some of these
groups, the majority of these individuals or organisations have so far been
found to have been formed without the support of governments. It is unclear
how Non-State Actors challenge national security, as there has been little
to no concerted effort in investigating them.

Evolving Process of Intelligence Gathering


Additionally, there was another potential challenge in entering the 21st
Century. With the United States National Science Foundation relinquishing
its exclusive control of the Internet infrastructure and rapid
commercialization of the World Wide Web, there is the possibility of a new
mode of communication and along with it a new method of information
gathering. As such, this new source of intelligence must be assessed, not
only for its reliability in information gathering but also whether it can
be used as an espionage tool or even a threat to national security.

17
Past Actions

Ranging from approximately 1980 to 2001; below is a list of terrorists’


activities throughout the countries with various attempts and impacts.

Involved Target Date and Place Casualties


Terrorist

Abu Nidal Israeli London, the The ambassador was


Organization (ANO) Ambassador to the United Kingdom injured.
UK, Shlomo Argov (3 June 1982)

Brief Details: ANO is a Palestinian nationalist-militant group. They were secular


and anti-western but not in particular related to leftism and Marxism. This
attack was carried by ANO operative an Iraqi intelligence officer. Ambassador
Argov was shot in the head yet managed to survive, even though he spent the rest
of his life disabled. This event later fueled the 1982 Lebanon War.

Ülkü Ocakları Alfortville Alfortville, Injured 13 people


(Grey Wolves) Armenian Genocide France (2 were seriously
Memorial (13 May 1984) wounded)

Brief Details: Grey Wolves is a Turkish far-right ultranationalist/neo-fascist


organization founded by Colonel Alparslan Turkes in the late 1960s. A hit-team
consisting of members of Grey Wolves and the Turkish National Intelligence
Organization were sent to bomb the memorial dedicated to the victims of the
Armenian Genocide.

Hezbollah Trans World Athens, Greece Several injured, a


Airlines (flight (14 June 1985) dozen held as
847) hostages, an
American Navy
Seaman murdered

Brief Details: Hezbollah is a Lebanon-based Shia Islamist political party and a


militant group founded in the early 1980s. Their paramilitary wing is considered
more powerful than the Lebanese Army and had been referred to as a state within a
state. The attack on Trans World Airlines was to demand the release of 700 Shi’ite
Muslims from Israeli custody. They also managed to smuggle two grenades and a
pistol from Athens airport security.

18
Liberation Tigers Sinhalese of Aluth North Central Killed 127
of Tamil Eelam Oya (Habanara) Province, Sri civilians
(LTTE) District Lanka
(17 April 1987)

Brief Details: LTTE is a political and militant group based in the northeastern
part of Sri Lanka, founded in 1975. Their goal is to have an independent country
for the Tamils within the region to ensure their rights that were marginalized.
Habanara Massacre was designed to murder Sinhalese people and is one of the
deadliest attacks done by the terrorist group. LTTE only sent a team of cadres
armed with automatic rifles and clubs.

El Sayyid Nosair An Isreali Rabbi New York, the 1 was assassinated


and politician, United States
Meir Kahane (5 November 1990)

Brief Details: El Sayyid Nosair was born in Port Said, Egypt, 16 November 1955. He
immigrated to the U.S. in 1981 and disliked the American culture which he
perceived as “moral corruption”. Nosair is considered to be the first Islamist
Jihadist to ever attacked the U.S. He successfully assassinated Rabbi Meir Kahane,
the founder of the Jewish Defense League in the U.S., by point-blank shooting him
during his speech in Manhattan hotel ballroom.

Liberation Tigers Palliyagodella Palliyagodella, 202 were killed and


of Tamil Eelam Village Sri Lanka 83 injured.
(LTTE) (15 October 1991)

Brief Details: LTTE attacked the mainly Muslim-populated Palliyagodella village


after tension grew between the Muslim community and the Tamil Tigers. Villagers
did ask the Sri Lankan government for protection and were given shotguns - which
was far from adequate against more than a hundred (some says thousands) of Tamil
Tigers’ armed cadres. LTTE bombed Mosques with grenades and murdered a third of
the villagers including children and pregnant women.

Al-Qaeda American Soldiers Gold Mohur Hotel, 2 were killed and 7


stationed in Aden, Yemen were injured
Yemen (29 December 1992)

Brief Details: Al-Qaeda is a multi-national militant Sunni Islamist founded in

19
Pakistan, 1988 during the Soviet-Afghan war by Osama bin Laden, Abdullah Azzam,
and other Arabian volunteers. This attack targeted the U.S. troops that were
heading to Somalia for Operation Restore Hope - and is considered as the first
attack against the United States. No troops were harmed, but tourists and hotel
workers were killed and injured during the attacks.

Ramzi Yousef and World Trade New York City, The 6 were killed and
Coalition Center United States over 1,000 were
(26 February 1993) injured

Brief Details: Ramzi Yousef was born in Kuwait, 27 April 1968 - a senior member of
Al-Qaeda who mastered electrical engineering from Swansea University, UK. He
detonated a car bomb underneath Tower One of the World Trade Center in New York
City, with the intention to blow the Tower One so it will fall and hit Tower Two
using his urea nitrate-hydrogen gas enhanced bomb. Despite failure from doing
so, he injured over 1,000 people and killed six. Afterward, he sent a letter to The
New York Times to declare his responsibility and his demands for the U.S. to cut
ties with Israel and not interfering with the business of Middle East countries.
He also threatened the U.S. that there will be more attacks should the demands are
not met.

Hamas Dizengoff Street Tel Aviv, Israel 22 were killed and


(19 October 1994) 56 were injured

Brief Details: Hamas is a Palestinian Sunni-Islamist fundamentalist military


organization founded in 1987. They uphold the Hamas Charter which aims to
establish an Islamic state in the West Bank and Gaza strip after liberating them
from Israel. This attack was orchestrated by Hamas Chief Yahya Ayyash and is
considered the first successful as well as one of the deadliest suicide bombing
attempt in Tel Aviv. The bomb was crafted using Egyptian landmine, TNTs, and nails
that Ayyash acquired from an Isreali organized criminal network.

Aum Shinrikyo Tokyo Subway Tokyo, Japan 13 were killed and


(20 March 1995) 6,000+ were injured

Brief Details: Aum Shinrikyo (Aleph) is a Japanese doomsday cult founded by Shoko
Asahara in 1984 who made his religion by combining teachigns from Indian
Buddhism, Tibetan Buddhism, Hinduism, Christian Book of Revelation, Yoga, and
writings of Nostradamus. They attacked three lines of Tokyo Subway during rush
hour through five coordinates attacks, resulting in 13 deaths and harmed around

20
1,000. This attack is considered as the deadliest terror in Japan by modern
definitions.

Timothy McVeigh Oklahoma City Oklahoma, The 168 were killed and
and Terry Nichols Bombing United States over 680 were
(19 April 1995) injured

Brief Details: Oklahoma city bombing was the deadliest domestic terror ever
occured in the United States. With Alfred P. Murray Building as the target,
Timothy McVeigh and Terry Nichols exploded a rental truck full of explosives
parked at the building. Timothy McVeigh was a Gulf War veteran who held a grudge
against the U.S. Federal Government regarding their decisions on Ruby Ridge
incident in 1992 and the Waco Siege in 1993. He met with Terry Nichols on a basic
training for the U.S. Army.

Chechen Republic Kizlyar - Dagestan, Russia Over 200 soldiers


of Ichkeria (CRI) Pervomayskoye (9-18 January and 26 civilians
Hostage Crisis 1996) were killed

Brief Details: CRI was founded in 1991 - a secessionist group that formed the
government of Chechen Republic. They were fighting against the Russian
government during the First Russian - Chechen War (1994 - 1996) with them as the
victor, and currently in the middle of another war against the Russian
Federation. Led by Salman Raduyev, CRI sent their guerillas to storm a military
airbase near Kizlyar, Dagestan, and ended up kidnapping thousands of civilians.

Lashkar-e-Taiba Wandhama Massacre Jammu & Kashmir, 23 were killed


(LeT) India
(25 January 1998)

Brief Details: LeT was founded in 1987 by Hafiz Saeed, Abdullah Azzam, and Zafar
Iqbal. Funded by Osama bin Laden, LeT is one of the largest and most active
Pakistan-based Islamist militant organisations in South Asia. Their goal is to
unify Jammu and Kashmir to become the part of Pakistan and to spread pan-Islamism
in South Asia. During the Wandhama massacre, gunmen dressed as Indian soldiers
were sent to kill men, women and children, and destroy a Hindu temple and a house
during the holiest night of the month of Ramzan; Shab-e-Qadar.

21
Al Ummah Coimbatore Coimbatore, India 58 were killed and
Bombings (14 February 1998) over 200 were
injured

Brief Details: Al Ummah is a terrorist group based in Tamil Nadu, India, founded
in 1993 by Syed Ahmed Basha and Jawahirullah in Coimbatore. During the
Coimbatore bombings, Al Ummah carried out 12 bomb attacks in 11 spots using time
bombs concealead in cars, motorbikes, bicycles, fruit carts, two-wheelers, and etc.
Some bombs were successfully defused by the National Security Guards and Tamil
Nadu Commando School. The main target for the attacks was the leader of Bharatiya
Janata Party, L.K. Advani.

Al-Qaeda & The Embassies of Nairobi, Kenya & 224 were killed and
Egyptian Islamic the United States Dar es Salaam, over 4,000 were
Jihad (EIJ) in Nairobi, Kenya, Tanzania injured
and Dar es Salaam, (7 August 1998)
Tanzania

Brief Details: EIJ is and Egyptian Islamist terrorist group, started to active
since the late 1970s and is closely related to the Al-Qaeda. Their goal is to build
an Islamic state by toppling down the Egyptian government. However, they later
operated to oppose the American and Israeli interests in Egypt and abroad.
Collaborated with Al-Qaeda, EIJ attacked the U.S. embassies in Tanzania and Kenya
by simultaneously detonating truck bombs. The triggering point for this attack
was to sought vengeance over the arrest and torture of EIJ members by the U.S.

Earth Liberation Agriculture Hall East Lansing, Nobody was harmed,


Front (ELF) of Michigan State Michigan but the loss caused
University (31 December 1999) by this attack was
over $500,000

Brief Details: ELF is an international eco-terrorist group founded in Brighton,


UK, in 1992. They oppose the destruction of the environment by causing economic
damages to businesses that ELF considers might do so. Highly linked to the
Animal Liberation Front (ALF), ELF is a self-funded leaderless organization that
operates individually through their cells; there is no hierarchy within their
organization. ELF set ablaze the office of Agriculture Hall at Michigan State
University in response to the decisions by the developing nations in Asia, Latin
America, and Africa to have genetically engineered potatoes instead of natural

22
crops - which was majorly funded by USAID.

Responding to the notoriety of the terrorists, nations had adapted their


international standards in order to address them.

Treaty Date Brief Explanation

1979 Hostages 17 December This treaty aims to prohibit and


Convention 1979 punish hostage-taking, a common
practice by terrorist
organisations.

1997 Terrorist Bombing 15 December This treaty aims to define and


Convention 1997 outlaw terrorist bombings. In
addition, the convention
encouraged international
collaborations in investigating
and preventing these attacks

1999 Terrorism 9 December This treaty aims to outlaw


Financing Convention 1999 financing of terrorist activities
and promote cooperation in
combating such activities.

A Case of UN Responding January UNSC Resolution 731 (1992), 748


to Terrorism 1992 - (1992), and 883 (1993) are a series
November of responses from the UN towards
1993 states that was considered
uncooperative to counter the acts
of terrorism. In this case, Libya
was called, assessed, and
sanctioned due to their actions
that did not match the principles
and guidelines of the
international community
especially based on Chapter VII of
the UN Charter.

23
24
Current Situation

At this point in time, there have been multiple terror attacks across the
globe-spanning multiple countries. While such attacks are not
unprecedented, there has been an increase in frequency of such attacks. At
this point of time the Board is still collating more information on them
and conducting preliminary analysis on whether these were conducted by
specific states or non-state actors. This analysis report will be provided
to you closer to the meeting.

25
Key Questions

How can the intelligence agencies work together to tackle the threat of
attacks by Non-State Actors, considering that there can be diverging
national agendas?

What are the problems that intelligence agencies will face when
transitioning into the digital age?

What are the benefits and disadvantages of information sharing among


intelligence agencies?

What are the possible measures that can be taken to allow information
sharing while safeguarding national security?

How will the developments in the intelligence community interact with


other parts of society?

26
Bibliography

Goodman, B. D. (1991). Strategic Intelligence for American National


Security. New Jersey: Princeton University Press.

Kornbluh, L. C. (1998). 1962: A National Security Archive Documents


Reader. New York: New Press.

Lewis, W. J. (1982). The Warsaw Pact: Arms, Doctrine, and Strategy.

McAuliffe, M. S. (1992). CIA Documents on the Cuban Missile Crisis


1962. Washington DC: Diane Pub Co.

Michael J. Sulick. (2015). Intelligence in the Cold War. Retrieved


from AFIO- Association of Former Intelligence:
https://www.afio.com/publications/SULICK_Michael_Guide_to_Intel
ligence_in_the_Cold_War_from_INTEL_WINTER2014-
15_Vol21_No1.pdf

Ralph B. Levering, V. O.-V. (2002). Debating the Origins of the Cold


War: American and Russian Perspectives (Debating Twentieth-Century
America). Rowman & Littlefield Publishers;.

West, N. (2012). Historical Dictionary of Signal Intelligence.


Plymouth: The Scarecow Press, Inc.

Wilson, J. H. (2017 ). The Intelligence Cycle. In J. H. Wilson, On


Intelligence (p. 55). London: Constable.

Lucas, Edward (2019). The Spycraft Revolution. Retrieved from the


Foreign Policy: https://foreignpolicy.com/2019/04/27/the-
spycraft-revolution-espionage-technology/

Pappas, A.A. (2007). The Intelligence Community: 2001-2015. Retrieved


from the Central Intelligence Agency:
https://www.cia.gov/library/center-for-the-study-of-
intelligence/csi-publications/csi-
studies/studies/vol46no1/article05.html

Rosenbach, E (2009). Intelligence Basics. Retrieved from the Harvard


Kennedy School Belfer Center for Science and International Affairs:
https://www.belfercenter.org/publication/intelligence-basics

Ackerman, R.K (2001). Intelligence At A Crossroads. Retrieved from


SIGNAL: https://www.afcea.org/content/intelligence-crossroads

27

Das könnte Ihnen auch gefallen