disarmament and international security -...
TRANSCRIPT
Hansen 1
Disarmament and International Security
Topic A: Contemporary Espionage
Chair: Ary Hansen
Moderator: Merve Ciplak Vice Chairs: Mathilde Adant, Christopher
Miller, Tara Raizada
April 10 – 13, 2014
Hansen 2
Contemporary Espionage
Classified documents released by former American intelligence analyst Edward Snowden
have exposed the surveillance by the United States and its National Security Agency (NSA) on allies
such as France, Germany, Brazil, Mexico, and Spain, as well as on offices of the European Union
(EU) in Washington, New York, and Brussels. Accusations against the US intelligence community
include tapping German Chancellor Angela Merkel’s personal cell phone and accessing 70 million
phone records of French citizens. Snowden also produced many documents pertaining to the British
NSA equivalent, Government Communications Headquarters (GCHQ), naming them an equally
egregious offender as the NSA with regards to invasive international electronic intelligence
gathering.
The alleged actions of the NSA have led to the breakdown of diplomatic relations between
the United States and its allies. American ambassadors have been called in to the governments of
these countries to answer for the NSA’s actions, and many deals between the United States and their
allies have fallen through, such as the transatlantic Terrorist Finance Tracking program, a joint US-
EU effort, which was recently voted into suspension by the European Parliament in light of these
revelations. The offense taken by the international community at the NSA’s reaction is due to what
they view as a breach of trust, since all the countries exposed by Snowden are considered allies with
the United States.
There exists an intelligence-sharing and anti-spying alliance between the Anglophone
countries of the United States, the United Kingdom, Canada, Australia, and New Zealand. Known
as the UKUSA Agreement, or colloquially as “Five Eyes,” it was originally drafted in 1946 as an
alliance between the two governments and their intelligence agencies - primarily the NSA and
Hansen 3
GCHQ, which are inextricably linked, but also the CIA and MI6. Now, this list includes the
Canadian Secret Intelligence Service, the Australian Secret Intelligence Service, and New Zealand’s
National Assessment Bureau. None of these countries may conduct espionage within the others’
borders. The global scope of the “Five Eyes” allows each country to focus on its geographic region
so as to avoid redundant intelligence gathering and jointly incurred costs; for example, Australia and
New Zealand constitute the Asian and Far East bastions of the organization. No other countries are
part of this agreement, but both France’s Directorate-General for External Security (DGSE) and
Germany’s Bundesnachrichtendienst (BND) have expressed a desire to join.
The North Atlantic Treaty Organization purportedly shares intelligence among its members,
though evidently this paradigm is not comprehensive; the Association of Southeast Asian Nations
also has measures for this capacity, as do the African Union, Organization for Security and Co-
operation in Europe, and European Union, though all with various levels of success. Notably, the
Arab League does not employ this tactic.
Debate should center on the creation of comprehensive, global resolutions regulating
international surveillance. Delegates will argue issues of privacy on an individual and state level, the
sharing of potentially high-risk information, mandated sharing of information, and the formation of
information-sharing organizations. Particularly interesting will be the debate between nations that
share information, international organizations that choose specifically not to, and nations that are
individually reluctant to share information. Resolutions should also address consequences for
espionage, unregulated surveillance, and the sharing of information that could pose international
security threats.
Hansen 4
Intelligence is defined by the MI5, the domestic counterintelligence and security agency of
the United Kingdom, as “information of all sorts gathered by a government or organization to guide
its decisions.” It can be summed up as the gathering, analysis, distribution and utilization of
information, with the goal of furthering its own ends, relative to other states, political groups or
movements. Intelligence is practiced by every state; it is distinct from espionage.
Espionage, however, is defined by the MI5 as “a process which involves human sources
(agents) or technical means to obtain information which is not normally publicly available.” It is thus
clandestine, per se, and most of the time reprehensible by the law. The practice of espionage by
states is something very common, though unclear in relation to international law.
In the ancient Chinese military treatise The Art of War, Sun Tzu wrote, “What enables the
enlightened rulers and good generals to conquer the enemy at every move and achieve extraordinary
success is foreknowledge. [It] must be obtained from people who have knowledge of the enemy's
situation.” Indeed, espionage is one of the main elements of international relations and wars:
“knowledge is power.” Its own nature makes it very difficult to regulate.
We will be focusing on the players of the public sector regarding espionage – that is, the
intelligence agencies and special police that take the offensive and engage in active espionage abroad.
Espionage has been carried out for centuries. Nations use espionage methods to gather
information about other states’ policies, and are fundamental to developing their own policies.
These techniques have been used against adversaries, but also against allies. As Lord Palmerston, a
British Congressman in the mid-nineteenth century, said, "We have no eternal allies and we have no
perpetual enemies. Our interests are eternal and perpetual, and those interests it is our duty to
follow." Indeed, no matter how close the bonds a state has with another, it can never be sure of its
allies. Moreover, even if some states have strong relations with one another, their policies can differ
Hansen 5
on some substantial points. It will therefore be useful to provide other governments with
information about their policies, as it will help others to develop their own policies and to be able to
balance and negotiate on the diplomatic stage. Information sharing can be useful in many aspects:
foreign policy, economic interests, or defense, for example. The self-interest of nations, as described,
is a central tenet of realism in international relations theory.
Mutual spying is common knowledge: everybody does it, and it is widely accepted, but it is
rare that it comes to light. Spying on allies usually isn't considered as a violation of the standard
practices of international relations. Between such close allies as the United States and Israel, for
example, mutual trust is idealistic, at best. The National Security Agency (NSA) keeps records on
Israel. The United States government wants to know of Israeli political changes before they occur,
for obvious reasons concerning their own foreign policy and the situation of stability in the Middle
East.
Timeline of Events
September 1960
Two NSA cryptologists, William Hamilton Martin and Bernon F. Mitchell, revealed the great extent
of the United States' espionage program, including on its allies. The two defected to the Soviet
Union, taking with them a trove of information about the United States’ espionage programs and
incursions into other countries’ airspace. A 1963 secret report from the NSA stated that, “Beyond
any doubt, no other event has had, or is likely to have in the future, a greater impact on the Agency's
security program.” The event is now known as the Martin and Mitchell defection.
1947-1991
Hansen 6
During the Cold War, the Western Bloc (the North Atlantic Treaty Organization, headed by the
United States) and the Eastern Bloc (the Warsaw Pact, headed by the Soviet Union), conducted
extensive espionage against one another. In this time, the Central Intelligence Agency (CIA) and the
Komitet gosudarstvennoy bezopasnosti (KGB, the main security force of the Soviet Union) became widely
known for their espionage activities.
April 2009
At the G20 summit in London, the British Government Communication Headquarters (GCHQ)
intercepted phone calls and monitored computer usage of G20 delegates. The British government
sanctioned these actions and the information was passed to British ministers. The actions were not
revealed until June 2013.
2010
Operation Aurora: Google detected an attack on their infrastructure, originating from China; twenty
other large companies were also targeted. Later on, the U.S. government was informed that the
attack was directed from the Chinese government level. The U.S. issued a diplomatic démarche. The
Chinese government responded that acts of hacking are criminal under Chinese law and that the
Chinese government was not responsible for the Google espionage acts.
June 2013
Edward Snowden reveals the existence of the Dropmire program of the NSA, a secret surveillance
program aimed at foreign States, including NATO allies, and its correspondent program Tempora
set up by the GCHQ.
September 2013
It is revealed that the Russian government spied on the delegates at the G20 summit in St.
Petersburg through goodies bags filled with USB drives and telephone chargers.
Hansen 7
September 2013
The partially state-owned Belgian telecom company Belgacom was victim of a cyber attack.
According to Snowden, the GCHQ was responsible.
October 2013
Australian embassies were used as a part of the U.S. surveillance program to spy on China.
October 2013
Russia accuses China of spying via imported irons and water-boiling kettles. The state-owned
channel Rossiya 24 alledged that Chinese imports of electric irons, kettles, and even mobile phones
and car dashboard cameras contained “spy chips” with microphones, being used for the most part
to spread viruses. The devices are supposedly capable of connecting to any computer within a 656
foot radius and from there connect to unprotected Wi-Fi networks and send out spam over
company networks.
Snowden’s recent revelations caused the level of controversy they did because he reported
on spying against allies. Barack Obama once said of Germany: "[we are] allies who will listen to each
other, who will learn from each other, who will, above all, trust each other." Trust has been broken
in “friend-on-friend” spying, like the NSA espionage reported by Snowden.
In order to discuss espionage, delegates must take a realistic approach. Espionage is
commonly accepted, although this does not make it legal. It becomes a matter of controversy when
it is discovered, though by its very nature it is often not. Additionally, political motivations play an
important role. Once citizens are informed, the political leaders cannot avoid the reality of the
situation and very often work to control the discourse surrounding it.
Hansen 8
Espionage also raises questions of personal privacy. Taping the personal phone
conversations of world leaders is considered diplomatic injury. There is a balance to be found
between security and privacy concerns. Further, espionage, as common as it may seem, constitutes a
break of the sovereignty of a country. The right of a country to control information, apart from its
right to seek out information, is an important diplomatic debate. The increasing power of the
intelligence agencies can also be a source of concerns. Without proper supervision, they may act
without the consent and support of the government, beyond all democratic control. Many believe
that limits have to be set on the political control of intelligence agencies in order to preserve the
wishes of a democracy.
The justification of the act is also of importance. Spying can seem justified in the case of
threat to the national security, for example. It is what justifies spying on “enemies.” However, in
many cases, there is no such national security issue. As Jean-Marc Ayrault, French Prime Minister,
said of the Snowden scandal: "[it is] incredible that an allied country like the United States at this
point goes as far as spying on private communications that have no strategic justification, no
justification on the basis of national defense."
There is a great difficulty in stating the legality of cyber espionage. No state actor has ever
tried to defend a case of cyber espionage using international law. Because it is so common, it is very
often overlooked. However, the general consensus is that cyber espionage breaches the sovereign
integrity of the states, and should thus be considered as an infraction. This can be thought of as
customary law, which the International Court of Justice defines as “evidence of a general practice
accepted as law.” The difficulty is that cyber intrusions do not offend the territorial integrity of
states.
Hansen 9
The problem is that espionage activities take place out of the public eye and out of the usual
arenas of international diplomacy. According to the International Law Association's Committee on
Formation of Customary International law, "a secret physical act is probably not an example of the objective
element. And if the act is discovered, it probably does not count as State practice unless the State tries to assert that its
conduct was legally justified." The notion of the rule of law presumes that the rule is public.
Existing conventions:
There is, to date, no convention on espionage. Conventions regulate the diplomatic relation between
states and human rights violations within states or across national borders. The Vienna Convention,
in 1961, established the inviolability of diplomatic agents, freedom of movement, and
communications. In 2001, the Budapest Convention on Cybercrime became the first attempt to
harmonize national laws in that matter, sharpen investigations, and increase international
cooperation. This agreement was drawn up by the Council of Europe. 41 states have ratified it and
11 have signed it, but not ratified it. In September 2011, China, Russia, Tajikistan, and Uzbekistan
submitted to the UN a draft International Code of Conduct for information security. In it, they
pledge not to use information technologies to carry out hostile tactics. In November 2013, Germany
and Brazil put forth an anti-spying UN resolution, reacting to the Snowden revelations. They
stipulate that "privacy is essential to democracy,” under the angle of human rights law. 21 countries are
likely to support this resolution.
Bloc Positions
United States, United Kingdom, Australia, New Zealand, and Canada: This extensive
surveillance is necessary for international security. A global war on terror is being fought, and as
Hansen 10
such all countries should put to use any resources they have to win it. The United States and its
allies, especially Canada, the United States, and Australia, are conducting necessary intelligence
collection in the international fight against terror. These countries recognize that they may have
overstepped their brief in tapping the personal phones of world leaders, as the primary threats in the
war on terror are non-state actors, but favor the approach of better safe than sorry. However,
economic espionage should be prohibited.
Ally countries against which state-on-state espionage has been committed: In
Europe, this includes France, Spain, Germany, Italy, Greece, and European Union offices. In
the Americas, this includes Mexico, Brazil, Colombia, and Chile. In Asia, this includes
Indonesia, Japan, South Korea, and India. Countries such as the United States, United Kingdom,
and Australia have violated our privacy by spying upon our heads of state when we are their allies,
harking back to the state-on-state espionage of the Cold War, except with an even more egregious
breach of trust. The chief threat in the War on Terror is non-state-affiliated groups, not states, and
certainly not these allied countries. These nations are upset with the intelligence collection
performed by the “Five Eyes” nations, especially the United States, Britain, and Australia, and desire
acknowledgment of and cessation of this wrongdoing, and possibly reparations of some kind as well.
Diplomatic relations between these nations (especially Germany, Brazil, and France) and the United
States are somewhat strained, though less so than they were when the news broke. Indonesia-
Australia relations are frayed, as are Canada-Brazil’s. Western European countries such as France
and Germany want to create a “Five Eyes”-like agreement with the United States to facilitate
intelligence sharing in the interests of international security, as well as to prevent further espionage
by the United States, as this would be prohibited under the agreement.
Hansen 11
China, Russia, former Soviet Union nations: Economic and information espionage
should be allowable, as cyberspace is the public domain. However, surveillance that the United
States has conducted against Hong Kong and Mainland China is an illegal act of espionage.
Additionally, information technology warfare should not be allowable. Russia, as the nation
sheltering Edward Snowden, will denounce the activities of the United States’ National Security
Agency and Britain’s Government Communications Headquarters as unlawful. Russia will also
endeavor to leverage its connection with Snowden. China and Russia would ostensibly like to
continue espionage against the United States and its allies.
Questions to Consider: This list is not exhaustive, but is meant to help you frame the topic as you
consider its implications and your country’s position.
1. Should international espionage be allowed? If so, to what extent?
2. Should intent make a difference in the legality of espionage?
3. How should nations approach information sharing?
4. The United Nations charter bans secret treaties. Can nations ally themselves for
information sharing purposes?
5. How does national security inform your nation’s standpoint?
6. How should espionage laws apply to cybercrime or multinational corporations?
7. Is committing espionage or reporting it the greater crime? How should the international
community approach each?
Hansen 12
Recommended Sources:
Vienna Convention on the Law of Treaties:
http://untreaty.un.org/ilc/texts/instruments/english/conventions/1_1_1969.pdf
Budapest Convention on Cybercrime:
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
Proposed international code of conduct for information security:
http://www.citizenlab.org/cybernorms/letter.pdf
Right to Privacy in the Digital Age from Human Rights Watch:
http://www.hrw.org/sites/default/files/related_material/UNGA_upload_0.pdf
Hansen 13
Bibliography:
"AMISOM and Partners Discuss Ways to Improve Intelligence Sharing." Sabahi Online. Sabahi
Online, 18 July 2013. Web. 14 Feb. 2014.
<http://sabahionline.com/en_GB/articles/hoa/articles/newsbriefs/2013/07/18/newsbrief-
08>.
"ASEAN Defense Chiefs Agree on Intelligence Sharing." The Jakarta Post. PT. Niskala Media
Tenggara, 31 Mar. 2011. Web. 14 Feb. 2014.
<http://www.thejakartapost.com/news/2011/03/31/asean-defense-chiefs-agree-
intelligence-sharing.html>.
Ball, James. "NSA Monitored Calls of 35 World Leaders after US Official Handed over
Contacts." The Guardian. Guardian News and Media, 25 Oct. 2013. Web. 14 Feb. 2014.
<http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls>.
"Brazil Summons Canadian Envoy over Spy Claims." BBC News. BBC, 10 July 2013. Web. 14
Feb. 2014. <http://www.bbc.co.uk/news/world-latin-america-24438355>.
Corera, Gordon. "Spying Scandal: Will the 'five Eyes' Club Open Up?" BBC News. BBC, 29
Oct. 2013. Web. 14 Feb. 2014. <http://www.bbc.co.uk/news/world-europe-24715168>.
Dasilva, Natalia. "MEPs Call for Suspension of EU-US Bank Data Deal in Response to NSA
Snooping." European Parliament News. European Parliament, 23 Oct. 2013. Web. 14
Feb. 2014. <http://www.europarl.europa.eu/news/en/news-
room/content/20131021IPR22725/html/MEPs-call-for-suspension-of-EU-US-bank-data-
deal-in-response-to-NSA-snooping>.
"Edward Snowden: Leaks That Exposed US Spy Programme." BBC News. BBC, 17 Jan. 2014.
Web. 14 Feb. 2014. <http://www.bbc.co.uk/news/world-us-canada-23123964>.
Hansen 14
Evans, Stephen. "Germany's Merkel Sends Intelligence Delegation to US." BBC News. BBC, 30
Oct. 2013. Web. 14 Feb. 2014. <http://www.bbc.co.uk/news/world-us-canada-
24740284>.
"Intelligence Sharing." NATO Multimedia Library. North Atlantic Treaty Organization, 29 Jan.
2014. Web. 14 Feb. 2014. <http://natolibguides.info/intelligence>.
Mahoney, Honor. "EU-funded Project to Prompt Intelligence-sharing." EUobserver.
EUobserver, 05 Mar. 2011. Web. 14 Feb. 2014.
<http://euobserver.com/innovation/32226>.
Martinez, Michael. "Allies Spy on Allies Because a Friend Today May Not Be One Tomorrow."
CNN. Cable News Network, 01 Jan. 1970. Web. 14 Feb. 2014.
<http://www.cnn.com/2013/10/30/us/spying-on-allies-everybody-does-it/>.
"Russia: Hidden Chips 'launch Spam Attacks from Irons'" BBC News. BBC, 28 Oct. 2013. Web.
14 Feb. 2014. <http://www.bbc.co.uk/news/blogs-news-from-elsewhere-24707337>.
Sanger, David E. "Differences on Cybertheft Complicate China Talks." The New York Times.
The New York Times, 10 July 2013. Web. 14 Feb. 2014.
<http://www.nytimes.com/2013/07/11/world/asia/differences-on-cybertheft-complicate-
china-talks.html?ref=technology&_r=1&>.
Urban, Mark. "Why Has NSA Failed to Keep Its Own Secrets?" BBC News. BBC, 28 Oct. 2013.
Web. 14 Feb. 2014. <http://www.bbc.co.uk/news/world-us-canada-24707558>.
Warner, Margaret. "An Exclusive Club: The Five Countries That Don’t Spy on Each Other."
PBS. PBS, 25 Oct. 2014. Web. 14 Feb. 2014. <http://www.pbs.org/newshour/rundown/an-
exclusive-club-the-five-countries-that-dont-spy-on-each-other/>.