Information Systems for National Security in Thailand

Download Report

Transcript Information Systems for National Security in Thailand

Information Systems for National
Security in Thailand: Ethical Issues
and Policy Implications
Krisana Kitiyadisai
Department of Public Administration
Faculty of Political Science
Chulalongkorn University
Bangkok, Thailand
[email protected]
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
1
US National Security Response to 9/11
Department of Homeland Security
-- combat terrorism
‘Security: to include all efforts to deter, detect,
prevent and impede terrorist attack; mitigate
casulties, damages and disruption; reduce alarms;
rapidly respond, repair and recover’
 Counterintelligent Field Activity  data mining
 TALON/CORNERSTONE database
-- intercepts emails, anti-war protesters,
activist websites, police database, etc.

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
2
Intelligence Databases




August 2007, TALON/CORNERSTONE terminated
FBI  GUARDIAN database
Terrorist Screening Center (TSC) in 2003
-- by May 07, watch list of 750,000 records
In May 2004, General Accounting Office reports:
-- 122 federal data-mining projects
-- NSA eavesdropping activity
-- over 50 databases
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
3
Failures in Intelligent Community







Government had no centralised intelligence DB
No sharing of intelligence among agencies
Lack of cooperation between FBI & CIA
Failures in colllection, analysis, assessment,
dissemination and follow-up actions.
(Hijackers were on the CIA’s watch list)
Bureaucracy and turf wars
CIA being highly politicised
Limitation of data mining high false positives
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
4
Criticisms on Surveillance Databases




Public outcry  National Security Authority
(NSA) secret records of phone calls
--Intrusion on privacy and liberty
Watch list  mostly inaccurate and full of
misidentifications.
Passengers screening system travel delay,
pervasive search, detention, distress, financial
costs, lost privacy and liberty, deportation.
Mission creeps: data used for other purposes
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
5
Thai National Security Policy 2007-2011

Maintain the stability of internal security
--political conflicts and upheavals

Preventing new form of threats
--terrorism, international terrorism
--transnational crimes, espionage
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
6
Government Databases
Ministry of Interior Population database
- Police databases of criminal records,
- Immigration, visa application records
- Border Patrol Police databases
- Special crime squad, economic crime
 Ministry of Labour  legal and illegal
foreign labour, immigrants, refugees
 Intelligence databases for national security

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
7
Intelligence Community








National Security Council
National Intelligence Agency
Armed Forces Security Center
Ministries of Interior, Foreign Affairs, Commerce,
and Finance
Royal Thai Police
Directorate of Intelligence (Army), Naval
Intelligence Dept, Air Forces Intelligence
Bank of Thailand
Office of Narcotics Control Board
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
8
National Security Council: NSC
National security policy
 Advisor to the PM and Cabinet
 Coordinator –intelligence community
 Monitoring, assessing performance
 Develop policies on transnational crime
 Develop strategy for crisis management
and national preparedness

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
9
Intelligence Community Failures

Insurgency and violent attacks in the southern
provinces of Thailand increased

January 2004: military unit in Narativat robbed of
400 weapons, 4 soldiers killed

By February 2007: 2,088 people killed
3,920 injured
10 bomb attacks in Bangkok on New Year’s Eve
2006 (3 killed, 43 injured)

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
10
Intelligence Community Problems
NIA failed to act on intelligence of possible
attacks (PM pointed out in Parliament)
 Fail to detect a new generation of
insurgents
 Blacklist of suspected militants unreliable
 Turf wars among agencies, rivalry
 Mishandling of problems in the South
 Intelligence reports often misused to justify
previous decisions.

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
11
Information Systems for National Security
The NSC information systems and
network administrative purposes
 Both manual and computer based systems
 No online sharing among agencies
 Lack budget and skilled personnel
 No overall strategy for integrating
intelligence information systems
 Structural and bureaucratic impediments

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
12
Computer Crime Act
Enacted 16 June 2007
 Section 14  most controversial
“Enters information into a computer in such
a way that it will cause damages to the
security of the country or public order.”
“Enters information which is an offense of
national security or an offense related to
terrorism into the computer.”

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
13
Internal Security Bill




Set up Internal Security Operations Command to
handle ‘new form of threat’
Modeled on US Homeland Security
First draft was heavily attacked for the violation
of privacy rights and liberty enshrined in the
Constitution
Section 17 gives authority the power to take
control of electronic instruments for the
protection against danger to citizens’ lives,
bodies and properties.
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
14
Ethical Issues and debate
Tradeoffs between ‘security’ and ‘privacy’
 narrow concept of security
 Violation of personal privacy leads to
diminishing liberty and against democratic
values (democratic deficit)
 Creating a surveillance state; Big Brother
 Challenge to ‘fear mongering’
terrorist attacks quite rare

K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
15
Policy Implications



Question the whole paradigm of solving military
security problems with intelligence databases and
data mining.
Buddhism: the Four Noble Truths: the Middle Path
Apply Spiritual Computing/ happy technology
-- start/ stop -willing to open up, watch the fear
-- renunciation (letting go, relax) - prejudices
-- purification/ clarification (insights, space)
-- transformation/action (happy action)
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
16
Four Noble Truths
Dukkha : there is suffering
 Samudaya : the origin of suffering
 Nirohha : the cessation of suffering
-- giving up, letting go, renouncing,
freeing oneself, detaching from
 Magga : the path leading to the cessation
of suffering the noble eightfold path

(right understanding, intention, speech, action,
livelihood, effort, mindfulness and concentration)
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
17
Idealistic Buddhist security computing





Data gathering and retention minimum
- with loving kindness, compassion
Analysis of data correct with integrity
- the five precepts
Use of data respect human rights
- the middle way, Noble Eightfold Path
Intelligence agencies relationship harmonious
- the Noble Eightfold Path
Intelligence databases enable right
understanding of the situation or problem areas
- Buddhist teachings
K. Kitiyadisai, APCAP 2007, 2-4 Nov. Bangkok
18