Contents
Executive summary 6
National security risks 6
Benefits of the United Kingdom 7
Greater security through integrated UK-wide security and intelligence agencies with global reach 8
Countering terrorism, espionage4 and the spread of weapons of mass destruction 8
Intelligence unplugged 8
The 'Five-Eyes' community and the rules of intelligence sharing 9
Intercept and communications data 9
Better protected through enhanced justice and policing capabilities and international partnerships to tackle serious and organised crime 9
Judicial co-operation and the arrest and detention of criminals 9
Major public order events and mutual-aid 9
Fighting serious and organised crime 10
Greater resilience through UK-wide cyber security, and other protective security arrangements 10
A common approach to cyber security 10
The Scottish security industry 10
Conclusion 11
Introduction 12
Why security matters in the debate about independence 12
The scope of this paper 12
Assessing the UK and Scottish security positions 13
Structure of the paper 14
Chapter 1: National security risks to the United Kingdom 16
Securing the United Kingdom 16
What are the national security risks to the United Kingdom? 16
International impact of these risks 18
What this means for Scotland 19
Chapter 2: Secret intelligence - the role and capabilities of the UK's security and intelligence agencies 22
Who are the UK's security and intelligence agencies? 23
Counter-terrorism operations 25
The security and intelligence agencies and international relationships 28
Central intelligence machinery and the operation of the Control Principle 29
The costs of establishing a security and intelligence capability 30
Interception and communications data 30
Conclusion 31
Chapter 3: Justice, policing, and combating serious and organised crime 32
Judicial and police co-operation 33
Serious and organised crime 36
NCA Intelligence Hub 40
Niche and specialist capabilities 40
International partnerships 41
Conclusion 42
Chapter 4: Cyber and protective security, and resilience 44
Cyber security 45
Security of government information 50
Incident management 50
Resilience and civil protection 51
Border security 52
Conclusion 53
Chapter 5: Conclusion 54
Annex A: International comparative data on the Nordic and Irish security and intelligence services 56
Annex B: National Crime Agency Specialist Capabilities 58
Bibliography 62
Boxes
Box 2A: A typical example of how the security and intelligence agencies work together on an operation 26
Box 2B: Operational and strategic co-ordination of counter-terrorism policing in the UK 27
Box 2C: Operation of the 'Control Principle' 29
Box 3A: Cross border search warrants 33
Box 3B: Operation of the European Arrest Warrant 34
Box 3C: Cross border hot pursuit in the EU 35
Box 3D: Drug baron fought extradition from Ireland for two years before being jailed in the UK for 18 years 35
Box 3E/Box 3D: Operation Laurel 37
Box 3F/Box 3E: Operation Knot 39
Box 4A: The threat from cyberspace 46
Box 4B: The UK cyber security strategy: Landscape review 47
Box 4C: The 2007 cyber attack on Estonia 48
Box 4D: The UK ranked No.1 in the Cyber Power Index 2012 48
Box 4E: Engagement with, and support for, the UK's security industry 49
Box 4F: What UK Government funded specialist capabilities deliver 51