New Zealand

Author(s):  
Christian Leuprecht

As the smallest and most centralized in the Five Eyes community, New Zealand’s intelligence and security community, and the system that holds it accountable, is an outlier. New Zealand’s proximity to Australia is reflected in parallels in intelligence accountability between the two Tasman allies. On the one hand, its relatively smaller size is reflected in certain unique attributes of intelligence accountability, such as its limited scope and access to sensitive material. On the other hand, its more modest size has been beneficial in driving innovation that has subsequently been adopted elsewhere, notably the double lock system for warrants. The chapter reviews the member organizations of the New Zealand’s National Intelligence Community, the particular strategic environment that has informed intelligence and accountability in New Zealand, its rather distinct national security threats, as well as New Zealand’s modest, centralized yet innovative intelligence accountability architecture: the Inspector General of Intelligence and Security, which has an Advisory Panel that is an attribute unique to New Zealand, the Intelligence and Security Committee of Parliament, and the Commissioner of Intelligence Warrants. New Zealand’s experience draws attention to economies of effort to be harnessed for scarce resources on the big collectors and assessor rather than other government clients that only receive intelligence. New Zealand also differs from other Five Eyes parliamentary intelligence committees in granting only limited access to sensitive operational matters or information. Mandatory regular review of legislation offers an opportunity to assess for efficacy and propose comprehensive improvements to innovate agencies and practices.

Author(s):  
Peddie Jonathan

The previous two chapters looked at the notion that the management of proceeds of crime and counter-terrorism have ceased to be independent legislative endeavours for governments, and increasingly form an inter-dependent set of measures together with other, international initiatives including the various international sanctions regimes. This chapter, and the ones that follow, look at the identification of illegal conduct, restraint, recovery of proceeds and close scrutiny and prosecution of perpetrators, and intelligence-led management of the threat to the UK’s economic and national security interests. On the one hand, terrorism amounts to criminal conduct to which the provisions of POCA 2002 apply as they do to the proceeds of any criminality, and there is clear interplay between the relevant regimes. Yet, on the other hand, the legislation considered in this chapter creates specific powers concerning those involved in terrorist acts, those who promote and facilitate it and the methods through which such individuals may be starved of financial means. The chapter looks at the Terrorism Act 2000; the Anti-Terrorism, Crime and Security Act 2001; and the Terrorism Asset Freezing etc Act 2010. It then considers the role of the wider UK enforcement and intelligence community. Finally, it takes a look at the Serious Crime Act 2007.


Author(s):  
Christian Leuprecht

Intelligence accountability in Australia balances compliance and bodies whose systematic focus is on efficacy and financial review with independent intelligence reviews, commissions, and inquiries that focus on efficacy. Australia differs insofar as it is not subject to a constitutionally or supranationally enshrined civil right regime. A diversity of mechanisms, ranging from parliamentary committees and executive bodies to periodic independent reviews, fashion an oversight system that drives innovation. From the three Royal Hope Commissions to regular inquiries into the National Intelligence Community, Australia’s independent in-depth periodic reviews, inquiries, and commissions have a track-record of shaping and spurring change and innovation in the scope and structure of accountability across its broader intelligence and security community. The Australian tradition of independent expert intelligence reviews, commissions, and inquiries offsets the lack of accountability bodies dedicated to reviewing for efficacy and innovation. The chapter reviews the member organizations of the Australia’s National Intelligence Community, the strategic environment that has informed intelligence and accountability in Australia, national security threats as seen by Australia, as well as Australia’s systematic approach to reviewing and innovating its intelligence accountability architecture. It consists of the Inspector General of Intelligence and Security, the Parliamentary Joint Committee on Intelligence and Security, and the Independent National Security Law Monitor. Although similar to the United States Office of the Director of National Intelligence and the United Kingdom’s Joint Intelligence Organization, Australia’s Office of National Intelligence is quite unique insofar as neither the US and UK equivalents nor comparable offices in Canada and the New Zealand have an analogous accountability function. These mechanisms balance existing independent review mechanisms with mandates to review legislation and compliance, propriety, administration.


Author(s):  
Oksana Gaiduchok ◽  
◽  
Oleksiy Stupnytskyi ◽  

In modern times, it is believed that by reducing the risk of military intervention, military security has lost its relevance, and economic security has become a priority of national interests. The principle of economic security is as follows: national interests are supported through an economic system that supports free exchange and ensures the upward mobility of the nation. The analysis of economic security is based on the concept of national interests. It is well known that the problem of national security and its components cannot be considered only from the standpoint of current interests; it is closely related to the possibilities of their implementation over a significant, long-term period. Each stage of realization of national interests of the country is characterized by its assessment of its geopolitical, geostrategic and geoeconomic conditions, security threats and the main carriers of these threats, the mechanism of realization of national interests (each of the stages has its own assessment of the main definitions and categories of security, the main vectors of geoeconomic policy). Economic security is the foundation and material basis of national security. A state is in a state of security if it protects its own national interests and is able to defend them through political, economic, socio-psychological, military and other actions. There is a close connection between economic security and the system of national and state interests, and it is through this category that the problems of economic potential and economic power of the state, geopolitical and geoeconomic positions of the country in the modern world are intertwined. At a time when regional forces are trying to expand markets, provide access to finance and the latest technology, economic security has become a necessary component of the ability of regional forces to expand their influence. The article is devoted to the study of economic security of Ukraine and its components using the model of quantitative assessment of economic security of Ukraine. Using the Fishburne method, a model is built that allows to obtain an integrated assessment of the level of economic security based on the synthesis of nine partial indicators.


2020 ◽  
Vol 9 (3) ◽  
pp. 111-119
Author(s):  
Yu.Yu. IERUSALIMSKY ◽  
◽  
A.B. RUDAKOV ◽  

The article is devoted to the study of such an important aspect of the activities of the World Russian People's Council (until 1995 it was called the World Russian Council) in the 90-s of the 20-th century as a discussion of national security issues and nuclear disarmament. At that time, a number of political and public figures actively called for the nuclear disarmament of Russia. Founded in 1993, the World Russian Council called for the Russian Federation to maintain a reasonable balance between reducing the arms race and fighting for the resumption of detente in international relations, on the one hand, and maintaining a powerful nuclear component of the armed forces of the country, on the other. The resolutions of the World Russian Council and the World Russian People's Council on the problems of the new concepts formation of foreign policy and national security of Russia in the context of NATO's eastward movement are analyzed in the article. It also shows the relationship between the provisions of the WRNS on security and nuclear weapons issues with Chapter VIII of the «Fundamentals of the Social Concept of the Russian Orthodox Church».


Author(s):  
Omer Tene

Israel is a democracy committed to the protection of human rights while at the same time trying to contain uniquely difficult national security concerns. One area where this tension is manifest is government access to communications data. On the one hand, subscriber privacy is a constitutional right protected by legislation and Supreme Court jurisprudence; on the other hand, communications data are a powerful tool in the hands of national security and law enforcement agencies. This chapter examines Israel’s attempt to balance these competing interests by empowering national security agencies while at the same time creating mechanisms of accountability. In particular, Israel utilizes the special independent status of the attorney general as a check on government power.


Author(s):  
James Meffan

This chapter discusses the history of multicultural and transnational novels in New Zealand. A novel set in New Zealand will have to deal with questions about cultural access rights on the one hand and cultural coverage on the other. The term ‘transnational novel’ gains its relevance from questions about cultural and national identity, questions that have particularly exercised nations formed from colonial history. The chapter considers novels that demonstrate and respond to perceived deficiencies in wider discourses of cultural and national identity by way of comparison between New Zealand and somewhere else. These include Amelia Batistich's Another Mountain, Another Song (1981), Albert Wendt's Sons for the Return Home (1973) and Black Rainbow (1992), James McNeish's Penelope's Island (1990), Stephanie Johnson's The Heart's Wild Surf (2003), and Lloyd Jones's Mister Pip (2006).


Author(s):  
Matthew M. Aid

This article discusses the National Security Agency under the Obama Administration. Upon his inauguration on January 20, 2009, Obama inherited from the Bush administration an intelligence community embroiled in political controversies. Of the sixteen agencies of the intelligence community, the National Security Agency (NSA) faced the greatest scrutiny from the new Obama administration and the Congress. NSA was the largest and the most powerful member of the U.S. intelligence community. Since its formation in 1952, NSA has managed and directed all U.S. government signals intelligence (SIGINT) collection. It is the collector and processor of communications intelligence (COMINT) and the primary processor of foreign instrumentation signals intelligence (FISINT). And since 1958, NSA has been the coordinator of the U.S. government's national electronics intelligence (ELINT) program. It has also the task of overseeing the security of the U.S. government's communications and data processing systems, and since the 1980s, NSA has managed the U.S. government's national operation security (OPSEC) program. In this article, the focus is on the challenges faced by the NSA during the Bush administration; the role played by the NSA during the wars in Afghanistan and Iraq; and the challenges faced by the Obama administration in confronting a series of thorny legal and policy issues relating to NSA's eavesdropping program.


Author(s):  
Sir Richard Dearlove

This article discusses the changing perceptions on national security and civic anxiety. During the Cold War and its aftermath, security was rather a simple and straightforward issue. The countries knew their enemies, where they are and the threats they presented. On the event that, the enemies's secrets were unknown, probing techniques were employed to determine the weaknesses of the enemy. This formulaic situation which seeped through in to the twenty-first century left little room for innovation. In fact, in some countries, security maintained at the Cold War levels despite criticisms that new and emerging national security threats should be addressed at a new level. Of the powerful nations, America maintained the role of a world policeman and adapted its national security priorities according to its perception of a new series of strategic threats; however these new security strategies were without a sense of urgency. However, the perception of global threats and national security radically changed in the event of the 9/11 attack. The sleeping national security priorities of America came to a full force which affected the national security priorities of other nations as well. In the twenty-first globalized world, no conflict remains a regional clash. The reverberations of the Russian military action in Georgia, the Israeli intervention in Gaza, and the results of the attacks in Mumbai resonates loudly and rapidly through the wider international security system. While today, nations continue to seek new methods for addressing new security threats, the paradox of the national security policy is that nation-states have lost their exclusive grip of their own security at a time when the private citizens are assailed by increased fears for their own security and demand a more enhanced safety from the state. Nation-states have been much safer from large-scale violence, however there exists a strong sense of anxiety about the lack of security in the face of multiplicity of threats. Nations have been largely dependent on international coordinated action to achieve their important national security objectives. National policies and security theory lack precision. In addition, the internationalization of national security has eroded the distinction between domestic and foreign security. These blurring lines suggest that the understanding of national security is still at the height of transformations.


2016 ◽  
Vol 5 (2) ◽  
pp. 131-144
Author(s):  
Sangita Choudhary

Evolution and rationale of management lies in making choices for building the most of resources that are limited in availability. Money is taken as the one amongst the most scarce resources. Therefore, decisions relating to money are taken with extreme caution. Investing is an activity that leads to sacrifice of current consumption of money to some future period with an intention of accumulating some economic value in the meanwhile. Investment in equity has its own specific characteristics. Since individuals differ from each other, retail perspective brings in more complexity to equity investment by adding the element of subjectivity to it. The purpose of this article is to identify variables and their inter-relationships that turn into selection or rejection of equity as an investment avenue by retail investors. It is an attempt to analyze various factors that contribute toward the decision of investing or not investing in equity. Sixteen factors using literature and expert opinion were identified. Interpretive structural modeling (ISM) is applied for developing a generally relevant framework that establishes relationship among these variables. Further, these variables are identified to be operational, strategic, and outcome variables. The developed framework can be used for optimizing the outcome variables for enhancing the investment efficiency.


Sign in / Sign up

Export Citation Format

Share Document