SECRET STATE SECURITY COMMITTEE JOINT ACTION PLAN ZIMBABWE-REPUBLIC OF SOUTH AFRICA 2011/2012 SECRET SECRET OBJECTIVE: 1: TO EXCHANGE INFORMATION AND INTELLIGENCE ACTION STEP TARGET DATE RESPONSIBILITY 1. Cooperate and exchange 30 April 2012 CIO and SSA: Meetings to be held bi-annually information on Border Internal/ Domestic Intelligence. 31 October 2012 Illegal Migration (including information on informal border-crossings); Human Smuggling and Traf?cking, Drug Trafficking and goods smuggling; Corruption at border posts (identify corrupt officials and counter their activities); Identity cards theft and forgery of travel documents; Counterfeit drugs and medicines; To share approaches on the conduct of Threat and Risk Assessments. 2. Conduct eXperts meetings to share information, perspectives and expertise 29 February 2012 31 October 2012 CIO and SSA: Internal/Domestic Meetings to be held bi-annually SECRET Page 2 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY on the two countries' legal frameworks governing migration, human trafficking and smuggling. Conduct analysis exchange meetings on issues relating to bilateral, regional and international developments. 4. Cooperate and exchange information on International Terrorism Proliferation of WMD: - Monitor and share information (perspective and expertise) on counter terrorism; - terror financing - ?migr? communities and entities; extremist individuals - Conduct experts meetings to share information (perspectives and expertise) 30 April 2012 31 October 2012 31 March 2012 31 August 2012 CIO and External/Foreign CIO and SSA: CI SSA: Meetings to be held bi- annually. SSA to host the first meeting Engage in information sharing on regional and continental perspectives on activities of suspected terrorists, suspected networks and movement of terror cells. First workshop to be held in Pretoria. SECRET Page 3 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY on terrorism; 0 Monitor issues pertaining to proliferation of WMD. 5. Exchange information and 31 March 2012 CIO and SSA: Continue to engage and share cooperate on issues Economic information pertaining to Economic 31 August 2012 Intelligence Intelligence oSharing of information on Ongoing threats facing the two economies; - Precious metals and rare earth minerals - Financing systems, - Money laundering - Economic sabotage/under invoicing - Agriculture - Illicit Textile industry - Illicit tobacco industry Best practice visit by SSA to C10 on Economic Intelligence 31 March 2012 Possible training needs to be identified during both visits SECRET Page 4 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY 0 Best practice visit by C10 to the Financial Intelligence Centre (FIC) 30 April 2012 OBJECTIVE 2: TO MONITOR ACTIVITIES AIMED AT SUBVERTING CONSTITUTIONAL ORDER ACTION STEP I TARGET DATE RESPONSIBILITY 1. Monitor and exchange information on rogue N605 and other Institutions?. - The identification, profiling and assessment of NGOs engaged in subversive activities ta king into account the following: 31 March 2012 3 1 August 2012 CIO and SSA: Internal] Domestic CISSA definition of rogue NGOs to apply Further engage and share information. These include other non-state actors like Think Tanks. Non Pro?t 'l'rusls etc. SECRET Page 5 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY - Financing; - Regulation; - Nature of the pressure exerted; - Political agenda; and - Undue influencing of policy. sharing of using case Continuous expenences studies 2. Cooperate and exchange intelligence on Private Security/Intelligence Organisations (involved in Military and Intelligence activities) 0 Individuals and companies involved in mercenary activities, illicit weapons supply and military training; 3. To identify and neutralise activities of information 31 March 2012 31 August 2012 31 March 2012 CIO and SSA: CI CIO and SSA: CI Further engage and share information. Further engage and share information. SECRET Page 6 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY peddlers taking into 31 August 2012 account the following: Create a database on information peddlers; and 0 Development of a common approach on pro?ling 4. Monitor and exchange 31 March 2012 CIO and SSA: CI Further engage and share information on Media, information. including social networks 31 August 2012 Identify and profile subversive media. Page 7 of 14 SECRET SECRET OBJECTIVE: 3: TO CONDUCT JOINT OPERATIONS ACTION STEP TARGET DATE RESPONSIBILITY 1. Ratify and sign the Joint 31 January 2012 CIO and SSA: Operational Guidelines. Directors General 2. Implement Operational Continuous CIO and SSA: Plans (Project Hippo) for Internal/Domestic the following:- - Human Smuggling and Trafficking Cigarette Smuggling Develop and 31 March 2012 Internal/Domestic Implement Operational Plans to counter Poaching Page 8 of 14 SECRET SECRET OBJECTIVE 4: TO ENHANCE COOPERATION ON SPECIAL EVENTS ACTION STEP TARGET DATE RESPONSIBILITY COM 1. Exchange Intelligence and Ongoing until CIO and SSA: Identification of risks needs to information regarding February 2012 Internal/Domestic be based on threat and risk COP17 (COP17) assessment Assessments to be conducted in terms of: - Speci?c focus on border security at Ports of Entry and border lines; - Terror-related risks; 0 Monitoring of pressure groups and social media networks. Page 9 of 14 SECRET OBJECTIVE 5: SECRET TO ENHANCE COOPERATION THROUGH TRAINING AND DEVELOPMENT TARGET . I. .r - v. f3) ?4323?; 1. Implementation of mutual training needs. SSA Needs a Training in Counter-intelligence Management - Borderlnteliigence 0 Economic Intelligence Collection 1.2 CIO Needs a Advanced in Intelligence Investigations - Management Development Studies (Advanced Supervisory Effectiveness) 16-27 April 2012 13-24 February 2012 26 March?6 April 2012 9-20 July 2012 16-27 January 2012 CIO Academy CIO Academy CIO Academy and SSA IA SSA IA SSA IA Training will take place in Harare Harare Harare Training will take place in Pretoria SSA IA will facilitate training with relevant academic institutions in RSA. SECRET Page 10 of 14 SECRET Train the Trainer programme 16-27 January SSA IA Pretoria - Facilitation 2012 - Assessment and Moderation Evaluation and Analysis (Threat 1930 March CIO Academy and Pretoria Perception and forecasting) 2012 SSA IA Management on the Counter? 20-24 SSA IA Pretoria Proliferation of Weapons of 2012 Mass Destruction (WMD) Border Intelligence 12-22 MarCh SSA IA Pretoria 2012 Financial Intelligence 11-2?- June 2012 SSA IA Pretoria Illicit Mining - The identification and 31 March 2012 55A NC Clo to liaise with evaluation of minerals and SSA DB (any other institution Stones' SSA IA considered appropriate) on - Trends and methods used by smugglers to conceal special stones and minerals. - Fingerprinting of precious metals and stones such as diamonds, gold and platinum. - Training in the use of gold and diamond testers/detectors. Illicit Mining (Intelligence Perspectives) cost cutting measures, focus areas and course content. CIO to unpack the training needs. Training will focus on the role of intelligence pending allocation of resources to the full course. SECRET Page 11 of 14 SECRET OBJECTIVE: 6 TO ENHANCE TECHNOLOGICAL COOPERATION ACTION STEP TARGET DATE RESPONSIBILITY 1. Identification of areas of technological cooperation. Counterfeit document detection Basic Technical Surveillance Counter Measures (TSCM) Advance TSCM Night Vision Surveillance Counter Measures Tactical Operational Equipment June 20 12 6- 9 February 2012 26 - 31 March 2012 28 May 1 June 2012. 23 - 31 July 2012 CIO and SSA NC: Technical SSA SSA already prepared two Courses in Harare (SSA will facilitate all training to be conducted by NC and DB) Harare Pretoria Basic Induction Course for detection and concealment of clandestine devices. Visit to Suppliers SA Joint Training on Tactical Detection to be presented at OSL Pretoria SECRET Page 12 of 14 SECRET ACTION STEP TARGET DATE RESPONSIBILITY 2. Secure Communications: 26?31 March 2012 CIO Equipment ready and CIO Secure Communication link SSA NC to prepare room for the between the two Services; - Provision of secure room - Installations (Technological) installations 3. Conducting of research into Threats and Opportunities presented by social media networks August 2012 CIO and SSA NC To convene a Workshop to share assessments SECRET Page 13 of 14 SECRET JOINT ACTION PLAN: ZIMBABWE OF SOUTH AFRICA 2011/2012 SIGNED BY: SIGNED BY: DEPUTY DIRECTOR GENERAL CENTRAL INTELLIGENCE ORGANISATION STATE SECURITY AGENCY Date: Date: Page 14 of 14 SECRET CONFIDENTIAL REPORT OF THE MEETING OF THE JOINT INTELLIGENCE TASK TEAM OF THE STATE SECURITY COMMITTEE OF THE 6TH SESSION OF THE ZIMBABWE-SOUTH AFRICA JOINT PERMANENT COMMISSION ON DEFENCE AND SECURITY, ELEPHANT HILLS HOTEL, VICTORIA FALLS, ZIMBABWE 1. INTRODUCTION 1.1 The third meeting of the Joint Intelligence Task Team (JITT) Of the Zimbabwe?South Africa Joint Permanent Commission on Defence and Security was held at Elephant Hills Hotel, Victoria Falls, Zimbabwe from 29 to 30 October 2011. The Zimbabwean delegation was led by Director External Of the Central Intelligence Organisation who Chaired the meetin . The South African delegation was led by the General Manager at the State Security Agency (SSA), who co-Chaired the meeting. 2. OPENING REMARKS 2.1 In his 0 ening remarks, the Chairperson, - d, welcomed the South African delegation to Zimbabwe and particularly, to Victoria Falls. He highlighted that JlTl' provides the two Sister Services with the Opportunity to review progress on the implementation of the Joint Action Plan adopted at the last meeting held in November 2010 in Durban, South Africa. The Chairperson then underscored the role played by the Southern African Development Community (SADC) at continental gatherings, such as the African Union (AU) related meetings, where SADC, made meaningful and significant contributions. 2.2 In his reciprocal remarks, the Co?Chairperson, - expressed appreciation over the warm hospitality accorded his delegation. He urged the .1 CONFIDENTIAL 4.2 CONFIDENTIAL The meeting noted the need for the exchange of information on risks and threats associated with hosting a global event of such magnitude. These include, inter alia, possible terror attacks, border management challenges, transnational organised crimes and disruptive acts by non state actors. 4.3 The committee emphasized the need to monitor the 4.4 activities of pressure groups stationed in either country or those that might want to use regional countries as transit to South Africa. The report cited the three African caravans as having the potential for disruptive behaviour thus meriting the attention of intelligence Services. The meeting then expressed hope that South Africa will host a successful COP17 and that the conference will yield positive views on issues of climate change that would benefit Africa. REVIEW OF THE 2010/2011 JOINT ACTION PLAN The meeting noted, with appreciation, considerable progress made in the implementation of the 2010/2011 Joint Action Plan. These included: 0 Enhancing cooperation through development - Cooperation in respect to combating international terrorism and proliferation of Weapons of Mass Destruction 0 Monitoring activities constitutional order 0 Cooperating and exchanging information on border intelligence 0 Enhancing cooperation on the hosting of COP17 training and aimed at subverting 4 5.2 5.3 CONFIDENTIAL I Exchanging intelligence on bilateral, regional and international developments through analysis exchange meetings 0 Enhancing technological cooperation. The meeting noted the challenges faced in the implementation of the Joint Action Plan, such as the adoption of the Joint Operational Guidelines and the financial constraints in fulfilling some of the agreed objectives. The meeting resolved to the challenges in the new Joint Action Plan. address The meeting recommended some changes to the Joint Action Plan. These included the realigning of objectives and the provision of specific dates, wherever possible. The committee then agreed that, for purposes of clarity, the timeline of the Joint Action Plan should be the MT calendar. JITT SUB-COMMITTEES A new sub-committee namely, Domestic Intelligence, was established. The meeting broke into the following sub? committees 3) Counter Intelligence; b) Training; c) Technical; d) Domestic Intelligence; and e) Economic Intelligence THE 2011/2012 JOINT ACTION PLAN The Jl'lT reviewed the 2010/2011 Joint Action Plan, developed and adopted the 2011/2012 Plan. These included new training requirements and enhanced co- operation in the exchange of information on threats and opportunities of social media networks, illicit textile and 5 CONFIDENTIAL CONFIDENTIAL tobacco industries as well as best practice visits. The committee noted the need to develop and implement operational plans to counter poaching. 7.2 The meeting further agreed that respective Heads of 8. branches should meet regularly to discuss matters at their level. Hitherto, meetings were being held at lower levels without much participation at the level of Heads of branches. CONSIDERATION OF THE DRAFT AGENDA FOR THE STATE SECURITY COMMITTEE 8.1 The JITT proposed the following agenda items for the 9. 9.1 The co-Chairperson, State Security Committee: 1) Opening Remarks; 2) Adoption of the Agenda; 3) Presentation of Security Situation Briefs; 3) Zimbabwe b) South Africa 4) Presentation and Adoption of the 2010-2011 JITT Report 5) Presentation and Adoption of the 2011?2012 Joint Action Plan; 6) Any Other Business; 7) Closing Remarks CLOSING REMARKS expressed satisfaction that the meeting had deliberated on key issues pertaining to the Joint Action Plan. He underscored the need for continued engagement on issues of mutual cooperation and reiterated the challenges the region was facing. He thanked the Chairperson for successfully deliberations of the meeting. steering 6 CONFIDENTIAL CONFIDENTIAL 9.2 In his concluding remarks, the Chairperson, - thanked the South African delegation for the fruitful engagement and expressed hope that the two Services will work to implement the agreed work plans. He thanked both teams for displaying commitment to MT deliberations. 7 CONFIDENTIAL