Home Random Page



Why the secret intelligence is used

The United Nations Institute against Total Identity Theft Spread Act


United Kingdom of Great Britain and Northern Ireland, London

December 16, 2020.


We live and work in, and are dependent on, a networked world. However, the complexity and interconnected nature of the Internet, and the ever‐evolving and sophisticated threat environment, put cybersecurity beyond the reach of any single entity: to secure our critical infrastructure, companies must work together, government must coordinate its efforts, and industry and government must collaborate.


The member states reaffirm their faith in the purposes and principles of the Charter of the United Nations and their desire to live in peace with all peoples and all governments. They are determined to safeguard the freedom, common heritage and civilization of their peoples, founded on the principles of democracy, individual liberty and the rule of law. They seek to promote stability and well-being in the whole world.
They are resolved to unite their efforts for collective defense and for the preservation of peace and security. They therefore agree to this United Nations Institute against Total Identity Theft Spread (UNITITS) Act.


In pursuing the role set out by the Act, the UNITITS corporate aims are to:

∑ frustrate cyberterrorism and identity theft actions;

∑ prevent damage to the world community from foreign espionage and other covert foreign state activity;

∑ frustrate procurement by proliferating countries of material, technology or expertise relating to weapons of mass destruction;

∑ watch out for new or re-emerging types of threat;

∑ protect Governmentsí sensitive information and assets;

∑ reduce serious crime through assistance to law enforcement agencies;

∑ assist the Secret Intelligence Service (SIS) of the member states in the discharge of their statutory functions;

∑ build Service capability and resilience.


Values of UNITITS

In order to protect national security and economic well-being, and to support the law enforcement agencies in preventing and detecting serious crime, we collect and disseminate intelligence, investigate and assess threats and work with others to counter them; advise on protection; and provide effective support for those tasks.


In working to fulfill our purpose, we are guided by a commitment to:

∑ legality;

∑ integrity;

∑ objectivity;

∑ a sense of proportion about our work; and

∑ respect and consideration for each other and for those with whom we work outside the organization.


Why the secret intelligence is used

Although publicly available information can be helpful for background purposes, the best way to discover the intentions and actions of organisations and individuals posing a threat to national security is to obtain secret intelligence about their activities. Over time, partners collate this information and seek to develop detailed knowledge of target organisations, their key personalities, infrastructure, intentions, plans, and capabilities.


If intelligence is worth recording states ensure that this is done accurately, clearly marking its origin and authenticity, and ensuring that it can be retrieved swiftly. If it is assessed that a particular threat needs to be investigated, then resources are deployed to obtain further intelligence. Assessments are continually adjusted in light of new intelligence or events. This whole process of assessment and investigation helps in making decisions about counter action and protective measures.

Date: 2015-12-24; view: 582

<== previous page | next page ==>
Auscultation of the Heart | Areas of cooperation
doclecture.net - lectures - 2014-2018 year. Copyright infringement or personal data (0.002 sec.)