THE PRIVATIZATION OF INTELLIGENCE:
CHALLENGES FOR THE MEDITERRANEAN AND BALKAN REGIONS
The ongoing revelations by private contractor, EDWARD SNOWDEN, have focused attention on the extensive scope of global intelligence gathering by the UNITED STATES (US).1 In particular, highlighting the vulnerabilities of digital data, raising concerns by civil libertarians in EUROPE and NORTH AMERICA on citizen privacy, and causing diplomatic rifts between states, examples being the US and GERMANY, and AUSTRALIA and INDONESIA.2
However, limited attention has been paid to the challenges of privatization intelligence, especially where this occurs on behalf of the state.3 While current media reports indicate the US is the most active state involved in privatized intelligence, followed by GREAT BRITAIN, it is also likely that other states are engaged in similar operations under the guise of private companies, through contractual arrangements, or by covert infiltration.4
This paper briefly reviews the challenges posed by the privatization of intelligence, before considering implications for national, regional and international security arrangements of states in the MEDITERRANEAN and BALKAN regions. The first section reviews issues in relation to intelligence privatization and changes in definition, types and concepts. The second and third sections consider these themes as they may be applied to states in the MEDITERRANEAN and BALKAN regions, respectively. In conclusion, the challenges of ensuring state security in the context of an increasingly privatized intelligence domain are noted.
THE PRIVATIZATION OF INTELLIGENCE
While intelligence-sharing between the state and private sector is not new, the SNOWDEN disclosures indicate that contemporary US and BRITISH data collection efforts are extensive, and reflect changed definitions and concepts of intelligence. During the post-Cold War era, the definition of intelligence was widely debated, where it had grown from a previous narrow understanding of national security, to applications for business and economics, often termed 2
‘market intelligence.’5 This enabled not just the transfer of intelligence applications and advantages to business, but economic security for the state, and new opportunities for retired security professionals.6
The concept of intelligence also changed, notably during the post-Cold War era, and gathering momentum after the events of September 11, 2001. Domestic and international security is now measured against multiple threats – from intrastate violence, criminal actors, terrorism, religious extremists and ‘lone wolves,’ in addition to interstate conflict. National security now encompasses not just intelligence agencies and military forces, but also state and private policing agencies.
HUMAN INTELLIGENCE GATHERING APPEARS TO HAVE DIMINISHED IN STATE PRIORITY,
while an increasing focus on signals intelligence and data collection reflects contemporary technological developments, digital media, and public access.
The ‘information revolution’ has meant that public access to digital and social media, coupled with targeted marketing and information collection by business – particularly, the commercial, financial and telecommunication sectors – has resulted in immense quantities of data being captured, stored, processed and analysed.7
From a state perspective, such data may be valuable for its contribution to the intelligence picture, a pre-emptive tool against possible or known threats. However, the collection and subsequent filtering processes through to analysis require particular skill sets and large numbers of personnel. For the US, resolution of these issues has apparently been addressed through contracting to private companies, in addition to appropriation of intelligence acquired by business, either through subtle pressure, court-issued warrants, or covert infiltration.
The implications of this push towards privatized intelligence collection and processing may be considered through two dimensions: security issues pertaining to national, regional and international goals; and thematic frames, of data, institutions and personnel. In this context, the following two sections briefly consider the catalysts and challenges posed by privatized intelligence for states in the Mediterranean and Balkan regions.
THE MEDITERRANEAN REGION
While recognized for its geostrategic importance, the 22 states bordering the MEDITERRANEAN Sea still lack a coherent regional framework to promote its potential role as an economic, cultural, religious and political ‘bridge’ between the EUROPEAN UNION, MIDDLE EAST and NORTH AFRICA.8 National security issues for the MEDITERRANEAN states share similar features. For example, domestic security issues affecting the southern MEDITERRANEAN states of GREECE, SPAIN and ITALY include unrestrained irregular migration from NORTH AFRICA, linked to increasing domestic civil unrest, unemployment, poverty and crime.9 The Arab Spring and resulting intrastate conflict has meant instability in government and civil reform for LIBYA, TUNISIA and EGYPT, while the SYRIAN civil war has also affected TURKEY and LEBANON.10
Key drivers that may affect the privatisation of intelligence for MEDITERRANEAN states include government austerity measures, lack of internal security expertise, state and private sector interest in natural resources and resultant commercial opportunities, irregular migration and regional conflict. The 2007 global financial crisis and consequent EUROPEAN austerity measures were reflected in decreased government services, wage reductions and high unemployment.11
Although limited information is available on the impact of these measures for intelligence services in the affected states (particularly GREECE and SPAIN) Nomikos notes that, in 2012, GREEK intelligence services still required modernization and personnel with ‘high level skills’ such as had occurred in other states.12 Rather than address these perceived deficits through internal processes, however, states may instead decide to contract specific services externally, for example, to companies with expertise in digital data retrieval and analysis. Despite outsourcing, states would still need to undertake due diligence checks for companies, and vetting arrangements for personnel to ensure security.13
CLAIMS ON NATURAL RESOURCES IN THE MED
A further catalyst in the privatization of intelligence for MEDITERRANEAN states may also be linked to claims on natural resources. Examples include the discovery of large, under-water, natural gas fields in the EASTERN MEDITERRANEAN, with ‘assertive statements of intent’ having been issued by GREECE, TURKEY, ISRAEL, CYPRUS, LEBANESE HIZBULLAH and PALESTINIAN HAMAS groups.14
The commercial profits generated from such resources could ensure state economic prosperity, but also require private security and intelligence services to protect infrastructure, in addition to generation of new, potentially valuable, datasets on operations and personnel.
Regional institutions have considered security measures to prevent irregular migration across the MEDITERRANEAN, from the MIDDLE EAST and NORTH AFRICA to EUROPE. The EUROPEAN UNION (EU) has established a border surveillance system (EUROSUR) that will eventually cover its 30 member states.15
In addition to cooperation between land-based security and police agencies, the surveillance system includes drones and satellite technology to track seaborne migrants, and enable intelligence-sharing between states.16 Significantly, GREAT BRITAIN is not involved in the program, and other EU states reportedly have refused BRITAIN’S request to provide EUROSUR- derived intelligence to the US.17 Another EU initiative to strengthen border security is its mission in LIBYA, EUBAM, approved in May 2013 to address irregular migration and mentor LIBYAN personnel on an international border management strategy.18 While security arrangements for EUROSUR do not identify whether private security or contracted personnel are involved in the operation, EUBAM is contracted to a BRITISH company, ARGUS SECURITY PROJECTS.19 Reports indicate that intelligence derived from EUBAM and its security operations may not just be useful for border management strategies, but also the commercial ambitions of individual EU member states.20
BRITISH ALLEGEDLY USED THEIR MILITARY BASE IN CYPRUS TO FACILITATE ACCESS INTO UNDERSEA FIBER OPTIC CABLES’ PASSING BY THE ISLAND
The data generated and collected by private companies in the region has also been subject to allegations of covert infiltration. For example, the BRITISH are alleged to have used their military base in CYPRUS to facilitate access into ’14 undersea fibre optic cables’ passing by the island, a communications highway between EUROPE, NORTH AFRICA and the MIDDLE EAST.21 The digital data collection is alleged to include ‘tens of millions’ of emails, telephone calls, instant messages, and other web-based traffic.’22
THE BALKAN REGION
Located in the south-eastern reaches of EUROPE, states in the BALKAN region have undergone significant security sector reform in the post-Cold War era, independence from the SOVIET UNION being achieved by some through a relatively peaceful process while, for others, after civil conflict.23 Security sector reform has occurred at varying levels of progress, with agencies required to reflect national, rather than SOVIET, interests. Further issues for intelligence sector reform have included introducing division between internal (domestic) and external (foreign) activity, legislative oversight and compliance, data security, privacy and human rights, changing the professional culture, and relationships with non-state actors.24
For most Balkan states, security sector reform has meant a change from previous SOVIET state surveillance to similar operations conducted instead by private sector agencies, with correlated allegations of corruption and criminal activity. One example is that of BULGARIA, where an estimated 9 per cent of the male population are reportedly employed in the private security sector.25 The involvement of private sector companies in intelligence collection and security services is problematic, with limited legislative oversight, data privacy or compliance with human rights.
THE BALKAN ALSO PRESENTS GEO-STRATEGIC IMPORTANCE AS THE GATEWAY BETWEEN OXIDANT AND ORIENT
As with some MEDITERRANEAN states, a primary issue appears to be the ‘shortage of experts outside the legacy intelligence services’ who are capable of managing reform, another potential driver towards privatized intelligence and the contracting of personnel with particular skill sets.26 The BALKAN region also presents geostrategic importance for its ‘major land routes between EUROPE and the MIDDLE EAST, and ecological resources,’ issues that would attract national, regional and international interests, and be the focus of intelligence collection – whether through contracted security agencies, or covert infiltration of private sector data.27
THE PRIVATIZATION OF INTELLIGENCE
The privatization of intelligence has most recently gained prominence through the Snowden revelations. The immense digital data collection and analysis process undertaken by the US and BRITISH agencies through appropriation of privately-generated intelligence is unlikely to be replicated to such a large extent by states in the MEDITERRANEAN and BALKAN regions, the latter being circumscribed by cost and skilled personnel. States in these regions are more likely to be targeted by foreign interests, which may include private sector companies contracted to collect intelligence.
However, similar catalysts for the outsourcing of intelligence activities may be noted for states across the regions. In the BALKAN states, increased numbers of private security agencies, and their correlated potential to acquire intelligence, may mean that state intelligence services become increasingly reliant upon these private data sources.
CORRUPTION AND CRIMINAL ACTIVITY UNDERTAKEN BY PRIVATE SECURITY COMPANIES - A KEY ISSUE FOR PRIVATIZATION OF INTEL IN THE BALKAN REGION
Specific issues in this regard are allegations of corruption and criminal activity undertaken by private security companies, with few checks and balances on the collection and use of privately sourced intelligence. For MEDITERRANEAN states, also, there appear to be concerns regarding the need to modernise state intelligence services. While private companies in these states appear not to be significantly involved in intelligence collection, state concerns regarding potential terrorist threats and undocumented migrants may result in the outsourcing of surveillance and data capture services.
Endnotes:
1 Ball, James. (22 August 2013). ‘Edward Snowden NSA Files: Secret Surveillance and Our Revelations So Far.’ The Guardian. [http://www.theguardian.com/world/2013/aug/21/edward- snowden-nsa-files-revelations] last accessed 1 September 2013.
2 Swaine, Jon. (16 August 2013). ‘NSA broke privacy laws thousands of times a year, according to documents leaked by Ed Snowden.’ The Telegraph. [http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10247824/NSA-broke-privacy- laws-thousands-of-times-a-year-according-to-documents-leaked-by-Ed-Snowden.html] last accessed 8 December 2013. ‘Watt, Nicholas and Rowena Watson. (24 October 2013). ‘Angela Merkel Phone-Bugging Claims Are Result of Snowden Leaks Says MP.’ The Guardian. [http://www.theguardian.com/world/2013/oct/24/angela-merkel-bugging-snowden-leaks-mp] last accessed 8 December 2013; Brissenden, Michael. (18 November 2013). ‘Australia Spied On Indonesian President Susilo Bambang Yudhoyono, Leaked Edward Snowden Documents Reveal.’ Australian Broadcasting Corporation. [http://www.abc.net.au/news/2013-11- 18/australia-spied-on-indonesian-president-leaked-documents-reveal/5098860] last accessed 8 December 2013. 3 Media and political focus has been on data protection and privacy; see, for example: Acohido, Byron. (15 October 2013). ‘How Edward Snowden Is Nudging Our Privacy Desires.’ USA Today. [http://www.usatoday.com/story/cybertruth/2013/10/15/how-edward-snowden-is- nudging-privacy-desires/2986259/] last accessed 8 December 2013; The Guardian. (2 December 2013). ‘How The Snowden Leak Is Changing The Tech Landscape.’ [http://www.theguardian.com/world/2013/dec/02/snowden-leak-tech-privacy-nsa-gchq- surveillance] last accessed 8 December 2013. Weinstein, Mark. (1 August 2013). ‘How The Fate of Your Privacy Rests In The Hands Of Snowden And Assange.’ Huffington Post. [http://www.huffingtonpost.com/mark-weinstein/how-the-fate-of-your-priv_b_3685538.html] last accessed 8 December 2013. European Parliament. (30 September 2013). 'NSA Inquiry: MEPs Hear US Privacy Experts, Whistleblowers and Snowden Statements.’ [http://www.europarl.europa.eu/news/en/news-room/content/20130930IPR21126/html/NSA- inquiry-MEPs-hear-US-privacy-experts-whistleblowers-and-Snowden-statement] last accessed 8 December 2013. 4 For example, see The Independent. (8 December 2013). ‘NSA 'in bed' with German intelligence says US whistleblower Edward Snowden - and GCHQ operates a 'full take' data monitoring system.’ [http://www.independent.co.uk/news/world/europe/nsa-in-bed-with- german-intelligence-says-us-whistleblower-edward-snowden--and-gchq-operates-a-full-take- data-monitoring-system-8693793.html] last accessed 8 December 2013.
Deibert, Ronald J. (2003). ‘Deep Probe: The Evolution of Network Intelligence.’ Intelligence and National Security. (18:4) 175-193; Treverton, Gregory F. (2003). Reshaping Intelligence for the Information Age. Cambridge: Cambridge University Press, p 436; Troy, Thomas F. (1991). ‘The “Correct” Definition of Intelligence.’ The International Journal of Intelligence and Counter-Intelligence. (5:4) 433-454. 6 Herring, Jan P. (1999). ‘Key Intelligence Topics: A Process To Identify and Define Intelligence Needs.’ Competitive Intelligence Review (10:2) 4-14; Hulnick, Arthur S. (1991). ‘Intelligence Co-operation in the Post-Cold War Era: A New Game Plan?’ International Journal of Intelligence and Counter-Intelligence (5:4) 455-465; Madsen, Wayne. (1993). ‘Intelligence Agency Threats to Computer Security.’ International Journal of Intelligence and Counter- Intelligence (6:4) 413-488; Steele, Robert David. (1995). ‘Private Enterprise Intelligence: Its Potential Contribution to National Security.’ Intelligence and National Security (10:4) 212-228; Todd, Paul & Jonathan Bloch. (2003). Global Intelligence: The World’s Secret Services Today. London: Zed Books; Unsinger, Peter Charles. (1999). ‘Meeting A Commercial Need For Intelligence: The International Maritime Bureau.’ The International Journal of Intelligence and Counter-Intelligence (12:1) 58-72; Wright, Jeffrey W. (1991). ‘Intelligence and Economic Security.’ The International Journal of Intelligence and Counter-Intelligence (5:2) 203-221. 7 Lewis, Paul. (5 December 2013). ‘Snowden Documents Show NSA Gathering 5 bn Cell Phone Records Daily.’ The Guardian. [http://www.theguardian.com/world/2013/dec/04/nsa- storing-cell-phone-records-daily-snowden] last accessed 8 December 2013. 8 Gaiser, Laris and Dejan Hribar. (2012). ‘Euro-Mediterrean Region: Resurged Geopolitical Importance.’ International Journal of Euro-Mediterranean Studies (5) 57-69. Šabi?, Zlatko and Ana Bojinovi?. (2007). ‘Mapping a Regional Institutional Architecture: The Case of the Mediterranean.’ Mediterranean Politics (12:3) 317-336. 9 Nomikos, John M. (1 August 2010). Illegal Immigration and Organised Crime in Greece. Research Institute For European and American Studies. Research Paper No 144. [http://www.rieas.gr/publications/1299-john-m-nomikos-illegal-immigration-and-organized- crime-in-greece-rieas-research-paper-no144-august-2010.html] last accessed 8 December 2013. 10 Anderson, Lisa. (2011). ‘Demystifying The Arab Spring: Parsing The Differences Between Tunisia, Egypt and Libya.’ Foreign Affairs (90:2) ; Filkins, Dexter. (20 November 2013). ‘Lebanon and the Long Reach of Syria’s Conflict.’ The New Yorker. [http://www.newyorker.com/online/blogs/comment/2013/11/suicide-bombing-iranian-embassy- beirut.html] last accessed 8 December 2013. 11 Kitsantonis, Nik. (17 July 2013). ‘Greece Approves New Austerity Measures.’ The New York Times. [http://www.nytimes.com/2013/07/18/world/europe/greece-approves-new-austerity- measures.html?_r=0] last accessed 8 December 2013; Tremlett, Giles. (1 January 2013). ‘Spain: The Pain of Austerity Deepens.’ The Guardian. [http://www.theguardian.com/world/2013/jan/01/spain-pain-austerity-deepens] last accessed 8 December 2013. 12 Nomikos, John M. (21 September 2012). Intelligence and National Security: The Case of Greece. International Relations and Security Network – ISN ETH Zurich. [http://www.isn.ethz.ch/Digital-Library/Articles/Detail/?id=152670] last accessed 8 December 2013. 13 See, for example,Watts, Larry L. (2004). ‘Intelligence Reform in Europe’s Emerging Democracies.’ Studies in Intelligence (48:1) 11-25.
International Institute of Security Studies. (15 May 2013). Gas finds complicate eastern Mediterranean security. Strategic Comments. Edition Number 15. 15 EUROSUR became operational on 2 December 2013. 16 EU Business. (4 December 2013). European Border Surveillance System (EUROSUR). [http://www.eubusiness.com/topics/immigration/eurosur] last accessed 8 December 2013. European Union. (2011) Proposal For A Regulation Of The European Parliament And Of The Council Establishing The European Border Surveillance System (EUROSUR). [http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52011PC0873:EN:NOT] last accessed 8 December 2013. 17 Palmer, Richard. (16 October 2013). ‘EU Tightens Its Grip on the Mediterranean.’ The Trumpet. [https://www.thetrumpet.com/article/11025.30429.0.0/world/military/eu-tightens-its- grip-on-the-mediterranean?preview] last accessed 8 December 2013. 18 European Union. (). EU Border Assistance Mission (EUBAM) in Libya. EU External Action, Common Security and Defence Policy. [http://www.eeas.europa.eu/csdp/missions_operations/eubam-libya/eubam_factsheet_en.pdf] last accessed 8 December 2013. 19 EU Observer. (5 November 2013). Security Glitch Risks Delaying EU Border Mission. [http://euobserver.com/foreign/121986] last accessed 8 December 2013. 20 Stephen, Chris. (17 October 2013). ‘Libya’s Security At Risk From Allies’ Lobbying.’ The Scotsman. [http://www.scotsman.com/news/world/libya-s-security-at-risk-from-allies-lobbying- 1-3145410] last accessed 8 December 2013. 21 Squires, Nick. (5 November 2013) ‘British Military Base Used to Spy on Middle East.’ The Telegraph. [http://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British- military-base-in-Cyprus-used-to-spy-on-Middle-East.html] last accessed 8 December 2013. 22 Hager, Nicky and Stefania Maurizi. (7 November 2013). Cyprus: The Home Of British/American Internet Surveillance In The Middle East. Cryptome. [http://cryptome.org/2013/11/cyprus-uk-us-spy.htm] last accessed 8 December 2013; Squires, Nick. (5 November 2013) ‘British Military Base Used to Spy on Middle East.’ The Telegraph. [http://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British-military-base-in- Cyprus-used-to-spy-on-Middle-East.html] last accessed 8 December 2013.
23 For the purpose of this review, specific regional states include Albania, Bosnia and Herzegovina, Bulgaria, Croatia, Kosovo, Macedonia, Montenegro, Romania, Serbia and Slovenia; the region also includes border states, Greece, Italy and Turkey. 24 Geneva Centre for the Democratic Control of Armed Forces. (March 2006). Intelligence Services. DCAF Backgrounder; also see DCAF Project on Strengthening Intelligence Oversight in the Western Balkans [http://www.dcaf.ch/Project/Strengthening-Intelligence-Oversight-in-the- Western-Balkans] last accessed 8 December 2013. 25 Gounev, Philip. (2006) ‘Bulgaria and Private Security.’ In Bryden, Alan and Marina Caparini (eds) Private Actors and Security Governance. Geneva Centre for the Democratic Control of Armed Forces, pp 109-128; South Eastern Europe Clearinghouse for the Control of Small Arms and Light Weapons. (August 2005). SALW and Private Security Companies in South Eastern Europe: A Cause or Effect of Insecurity? SEESAC, Serbia and Montenegro. 26 Watts, Larry L. (2004). ‘Intelligence Reform in Europe’s Emerging Democracies.’ Studies in Intelligence (48:1) 11-25. 27 Moustakis, Fotios. (2003). The Greek-Turkish Relationship and NATO. Frank Cass Publishers, Portland Oregon.
No comments:
Post a Comment