Dear Delegates, Welcome to the Pentagon at the sixth annual Canada International Model United Nations Conference. This committee will have delegates representing different departments of the US Department of Defense (DoD) who will be working towards the common goal of protecting the United States of America and its citizens both at home and abroad. This committee will have one set topic, “Modern Surveillance and Counterintelligence Operations,” and will then move into a crisis. As this is an advanced committee dealing with extremely complicated matters, it is extremely important that delegates understand all content that is included in this backgrounder regarding their roles and the issues which will be discussed. A broader knowledge base on intelligence and a strong awareness of global security issues is also recommended for all delegates, however, not a requirement. We recommend that delegates read the entire backgrounder as well as doing additional research on their own to get a full and deep understandings of the topic so there is no confusion during debate. Without adequately understanding the intricacies and function of the issues which will arise and your job on the DoD team, it will be extremely difficult to represent and protect the best interest of your branch of the department. In addition to the information presented in this backgrounder, intelligence briefings will be emailed out to delegates prior to and during the conference. We expect all delegates to read these briefings in full and come ready to talk about any issue that is raised. This will be crucial to the success of you as a delegate, but also the committee as whole If you have any questions regarding positions, companies, topics or anything else in this backgrounder or regarding this committee, please email us and we will do our best to provide all necessary materials to answer any worries or concerns. Thank you for electing to serve under President Donald J. Trump to make the United States of America safer. On behalf of myself and my chair Kevin Nan, we look forward to meeting everyone in May so that we can Make American Great Again! Sincerely, Alexander McGuigan Director of the Pentagon | CAIMUN 2017 Important figures in the administration of the forty-fifth President of the United States of America, Mr. Donald J Trump. Position Name Party From Donald J Trump President R New York Mike Pence Vice President R Indiana Rex Tillerson Secretary of State R Texas Steve Mnuchin Treasury Secretary R New York Gen (ret.) James Mattis Secretary of Defense I Washington Jeff Sessions Secretary of Justice R Alabama Ryan Zinke Secretary of the Interior R Montana Wilbur Ross Secretary of Commerce R New Jersey Andrew Puzder Secretary of Labor R Ohio Tom Price Secretary of Health R Georgia Dr. Ben Carson Secretary of Housing R Michigan Elaine Chao Secretary of Transportation R Kentucky Gov. Rick Perry Secretary of Energy R Texas Betsy DeVos Secretary of Education R Michigan Gen (ret.) John F Kelly Secretary of Homeland Security I Massachusetts Nikki Haley Ambassador to the United Nations R South Carolina Position Name Party From Donald J Trump President R New York Mike Pence Vice President R Indiana Reince Priebus White House Chief of Staff R Wisconsi n Steve Bannon Counselor to the President R Virginia Kellyanne Conway Counselor to the President R New Jersey H. R. McMaster National Security Advisor R Rhode Island K. T. McFarland Deputy National Security Advisor R Wisconsi n Andrew Bremberg Domestic Policy R Tom Bossert Homeland Security R Press Secretary Sean Spicer R Virginia Public Liaison Omarosa Manigault R Ohio Don McGahn White House Counsel R New Jersey Speaker of the House: Paul Ryan (R-Wisconsin) Republican Seats: 241 (Majority) Majority Leader: Kevin McCarthy (R-California) Majority WHIP: Steve Scalise (R-Louisiana) Democratic Seats: 194 (Minority) Minority Leader: Nancy Pelosi (D-California) Minority WHIP: Steny Hoyer (D-Maryland) President of the United States Senate: Mike Pence (R-Indiana) President pro tempore: Orrin Hatch (R-Utah) Republican Seats: 52 (Majority) Majority Leader: Mitch McConnell (R-Kentucky) Majority WHIP: John Cornyn (R-Texas) Democratic Seats: 48 (Minority) Minority Leader: Chuck Schumer (D-New York) Minority WHIP: Dick Durbin (D-Illinois) The main responsibility for conducting human intelligence has been in the hands of the Central Intelligence Agency (CIA) for quite a long time.1 The agency has looked to recruit both Americans and foreign nationals in order to collect intelligence and run espionage operations throughout the world. The main objective of the program was to collect information and make it available to policy makers so that they could make decisions in order to protect the interests of the United States. This became increasingly relevant following the September 11th, 2001 terrorist attacks, which forced the CIA to significantly increase both manpower and 1 Richelson, J. T. (2015, July 7). The Pentagon’s Spies: The Evolution of Spy Units through Obama Administration. expenditure dedicated to operations related to tracking and capturing terrorist suspects including Osama Bin Laden. During the course of the Cold War, the Department of Defense had erected a similar program in order to increase intelligence on Soviet military and political activity of interest to American military officials. Following the capture of the U.S. embassy in Tehran and the subsequent apprehension of American hostages, the Army created the Field Operations Group (FOG) to gather intelligence in order to coordinate a possible rescue mission. After the operation failed, the Army put in place a plan to turn FOG into a permanent organization which would be renamed the United States Intelligence Support Activity (USAISA). The creation of USAISA was kept secret from the public and congress, however, leaks to the press eventually revealed details of the program. The program came under intense scrutiny when reports surfaced that an investigation of USAISA showed it to be out of control. Despite this, the program was allowed to continue until 1998. In 1989, the program was terminated with the understanding that a new program would take its place in the coming years. Following the termination of USAISA, the DoD was looking to centralize the management and operations of their intelligence gathering operations. The DHS was established in order to control all operations regarding the gather of intelligence by the DoD. This program was used in Haiti, Somalia, and Central Africa. By definition, counterintelligence are operations or actions designed to prevent spying, the gathering of intelligence, or sabotage by another actor who is generally a foreign nation. One of the largest and longest lasting counterintelligence operations run by the United States occurred during the cold war in order to prevent communism from spreading in the nation, or Soviet spies from gaining vital intelligence which could help them come out victorious. One of the largest organizations that was targeted during the Cold War was the United States Air Force (USAF). In order to prevent communist infiltration, they set up the US Air Force Office of Special Investigation (OSI) which was tasked with investigation matters of potential spying.2 OSI worked to detect and prevent intelligence collection by foreign actors, and trained personnel on how to go about dealing with relevant situations.3 During the Cold War, OSI was used in Korea, Vietnam, and Japan; in North America it was used for the ‘Alaska Project’ which was to prevent a possible Soviet invasion of the North Pole.4 2 Counterintelligence in the Cold War and Beyond. (2015, June 1). 3 Counterintelligence in the Cold War and Beyond. (2015, June 1). 4 Counterintelligence in the Cold War and Beyond. (2015, June 1). Moving forward, the U.S. faces challenges with regards to its collection of data and intelligence. A major cause of this is the lack of confidence expressed in the DoD to carry out these operations legally.5 Despite this, the need for intelligence gathering capability within the U.S. government has never been higher. With the rise of terrorism, rogue states and unconventional weaponry as well as war, the American government needs to ensure that it is able to handle any situation around the globe with the utmost care and attention. This information is an essential part of the success of the military and special operations teams around the globe, and the more detailed and accurate information which can be obtained, the increased likelihood of successful missions. Under the Obama administration, the expansion of intelligence gathering has allowed the government to be able to collect more information than ever before. Programs such as PRISM, which was the codename for a massive US spying operation conducted by the National Security Agency, have been used under the name of security and patriotism in some sense to try and rationalize the lack of constitutional approval of such actions. This information, however, has been valuable to intelligence agencies who have been able to better paint profiles of individuals who they believe might be involved in nefarious activities. The most common type of counterintelligence is physical intelligence, which can be very difficult and time consuming. Physically intelligence would involve sending spies into the field or running on the ground operation to gain intelligence for the United States government. Results can also be quite sparatic, meaning that a wide range of information can be discovered. This is one of the many reasons that cyberspace is becoming the new front for fighting the intelligence war. It is becoming more and more difficult to detect and prevent cyberattacks, with systems much easier to hack into than to foolproof. It is for this reason the US government is allocating large sums of money to boosting the firewall around cyber-networks. The online war is also creating a massive problem for keeping operations and operatives secure. The distribution of information has allowed other governments and even news agencies to compile a list of clandestine operatives and their personal information from agencies such as the CIA. With this information, other nations are able to better track the identities and movements of operatives, as well as understand what it may be they are looking for. This puts the lives of personnel at risk, something that it is of the utmost priority to deal with quickly for the US intelligence community. 5 Greenberg, M. R., & Haass, R. N. (n.d.). Making Intelligence Smarter. Part of the reason that this information becomes available is that it is leaked by employees of groups within the inner circle of the government. A contractor working for the state department, Edward Snowden was able to access and subsequently reveal large amounts of information which many feel put the American people’s security at risk. It is for this reason that intelligence agencies are looking for more ways to limit access to information for those who do not need it, and attempt to create a culture which helps to create information secure. The general consensus on the Republican side of the floor is to increase security programs as much as possible. Generally, the GOP would like to take all possible measures in order to protect the national and security interests of the country through almost any means necessary. This would mean an increasing in intelligence and military operations both in cyberspace and the real world. In addition, the testing of new programs would be something that would be pushed and approved by the Republican houses. For the most part, Democrats would like to try and preserve the rights of the individual when it comes to legislation. In this sense, they are largely against programs that will invade on the privacy of people, even if it does improve the security of the nation. This, however, was contradicted by President Barack Obama’s expansion of PRISM, the NSA program which collected data on mass from people around the world. Even with the large concerns surrounding privacy, even some Democrats have conceded the need to step up monitoring given the numerous risks which face the United States each day. 1. To what extent should the United States be working with allied nations and partner organizations [such as the North Atlantic Treaty Organization (NATO)] to share intelligence in an attempt at collectively dealing with global security threats? 2. What nation, organization, or global player is the largest threat to the national security of the United States of America? What level and type of threat does that group pose? 3. Is the responsibility of the United States to be “the world’s police”? To what extent does the U.S. have a responsibility to get involved in global conflict? 4. What new measures can the United States implement to decrease the risk of a potential cyber-attack? 5. What role should human intelligence and assets play in collecting information regarding national or global security? “Freedom is never more than one generation away from extinction. We didn't pass it to our children in the bloodstream. It must be fought for, protected, and handed on for them to do the same, or one day we will spend our sunset years telling our children and our children's children what it was once like in the United States where men were free.” - President Ronald Reagan Counterintelligence in the Cold War and Beyond. (2015, June 1). Retrieved December 21, 2016, from http://www.nationalmuseum.af.mil/Visit/MuseumExhibits/FactSheets/Display/tabid/509/Art icle/197643/counterintelligence-in-the-cold-war-and-beyond.aspx Greenberg, M. R., & Haass, R. N. (n.d.). Making Intelligence Smarter. Retrieved December 22, 2016, from https://fas.org/irp/cfr.html#summary Richelson, J. T. (2015, July 7). The Pentagon’s Spies: The Evolution of Spy Units through Obama Administration. Retrieved December 16, 2016, from http://www.globalresearch.ca/thepentagons-spies-the-evolution-of-spy-units-through-obama-administration/5460984 Thomas, S. (2009, January 9). The First State of the Union Address. Retrieved December 22, 2016, from http://ahp.gatech.edu/first_state_union_1790.html
© Copyright 2026 Paperzz