COUNTERTERRORISM & HOMELAND SECURITY1With 60 percent of cargo being transported on passenger airplanes, cargo security is directly tied to passenger security, which is why the US hasbeen active in promoting the 100-percent mandate.2European Commission. (1 June, 2012). EU-US Security Agreement Allows Cheaper and Faster Air Cargo Operations. (press release). Retrieved from: http://europa.eu/rapid/pressReleasesAction.do?reference=IP/12/544&format=HTML&aged=0&language=EN&guiLanguage=en.3Agreements include Europol, Extradition, Mutual Legal Assistance, Container Security Initiative, Eurojust, TFTP and PNR. See: http://www.statewatch.org/Targeted-issues/EU-USA-dp-agreement/eu-usa-dp-info-exchange-agreement.htm4U.S. Travel Association. (August 2012). Economic Impact of Travel and Tourism. Retrieved from: http://www.ustravel.org/sites/default/files/page/2009/09/EconomicImpactofTravelandTourism2012Updates.pdf5U.S. Travel Association. (accessed 17 December, 2012). World Tourism: US Datasheet. (datasheet). Retrieved from: http://www.ustravel.org/sites/default/files/page/2009/09/World_US_Datasheet_09a.pdf6Marketwire. (11 October, 2010). US Citizens Cancel Travel Plans to Europe Following Govt. Safety Warnings. (press release). Retrieved from: http://www.marketwire.com/press-release/US-Citizens-Cancel-Travel-Plans-to-Europe-Following-Govt-Safety-Warnings-1332565.htm7International Trade Administration. (accessed 17 December, 2010). Top 10 International Markets: 2009 Visitation and Spending. US Department ofCommerce. Retrieved from: http://tinet.ita.doc.gov/pdf/2010-Top-10-Markets.pdf8International Trade Administration. (2011). 2011 Market Profiled: Europe. International Trade Administration. (datasheet). US Department of Commerce.Retrieved from: http://tinet.ita.doc.gov/outreachpages/download_data_table/2011_Europe_Market_Profile.pdf9Pawluk, P. (Ed.). (2011). The EU-US Security and Justice Agenda in Action. Paris: European Union Institute for Security Studies. p. 38.10Wetzling, T. (2011) What Role for What Rule of Law in EU-US Counterterrorism Cooperation? in Pawlak, P. (Ed.), The EU-US Security and Justice Agendain Action (p. 36). Paris: European Union Institute for Security Studies.11European Parliament. (11 September, 2012). European Parliament Resolution of 11 September 2012 on Alleged Transportation and IllegalDetention of Prisoners of European Countries by the CIA: Follow Up of the European Parliament TDIP Committee Report. (report no. 2012/2033 INI).Retrieved from: http://www.europarl.europa.eu/sides/getDoc.do?type=TA&language=EN&reference=P7-TA-2012-30912May, T. (15 October, 2012). Home Secretary Oral Statement on European Justice and Home Affairs powers. Retrieved from: http://www.homeoffice.gov.uk/media-centre/speeches/home-sec-eu-justice-statement13The Lisbon Treaty annex provides opt-outs for the UK and Ireland from freedom, security and justice agreements. Retrieved from: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:083:0201:0328:EN:PDF14“It’s better for Europe to have a common position because it makes no sense for European passengers to travel from London to Madrid and backand have different controls,” Spanish Transport Minister Jose Blanco Lopez (7 January, 2010), in “Spain Calls for Common EU Stance on Airport BodyScanners.” Deutsche Welle. Retrieved from: http://www.dw-world.de/dw/article/0,,5098288,00.html15Fulton, S.M. (20 March, 2012). EU Commissioner: US Should Catch Up with Europe on Data Privacy. Retrieved from: http://www.readwriteweb.com/cloud/2012/03/eu-commissioner-us-should-catc.php16Cañas, G. (1 October, 2012). “El imperio de la informacióHLCG) rthe Crtment of Justices Athe flight carrying a person of concern?n,” El Pais.Retrieved from: http://sociedad.elpais.com/sociedad/2012/09/30/actualidad/1349026374_446501.html17The EU welcomed US District Court Judge Katherine Forrest’s determination on May 15, 2012, that section 1021 was unconstitutional.18De Kerchove, G., Emmerson, B., and Søvndal, V. (19 March, 2012). Counter-Terrorism and Human Rights. European Voice. Retrieved from: http://www.europeanvoice.com/article/2012/march/counter-terrorism-and-human-rights/73907.aspx19The Visa Waiver Program, introduced in 1986 as a pilot program, was made permanent by Congress in 2000 and changed in 2007 to give countrieswho are partners with the US on the war on terrorism the ability to allow their citizens to travel to the United States without a visa for up to 90 days.Even though Congress, through the 9/11 Commission Act of 2007, expressed a sense that it would like to further extend visa-free travel to alliednations, VWP has become enmeshed in a matrix of conditions and benchmarks that make it difficult if not impossible to gain entry. That is becausea country’s eligibility is measured not only by good relations with the United States, but also by its nationals’ overstay rate, according to the act. Thecurrent rate of overstay for maintenance of VWP is 3 percent. According to State Department statistics, Poland has reduced its refusal rate from 13.5percent to 9.8 percent between 2009 and 2010. This would be low enough to enter VWP under the relaxed guidelines for DHS, but not low enoughunder the current 3 percent threshold. Attached to VWP is the Electronic System for Travel Authorization (ESTA), which Congress created to enhancethe security of VWP.20De Kerchove, G. (2011). Preface. In Pawlak, P. (Ed.), The EU-US Security and Justice Agenda in Action (p. 38). Paris: European Union Institute for SecurityStudies European Union.21The HLCG had previously agreed on common language emphasizing the need to make redress available to aggrieved passengers, but disagreementstill exists over the necessary scope of judicial redress.22European Council. (23 November, 2009). Reports by the High Level Contact Group (HLCG) on Information Sharing and Privacy and PersonalData Protection. (Report No. 15851/09). Retrieved from: http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/01_st15851_09_hlcgnov2009_/01_st15851_09_hlcgnov2009_en.pdf8 4Citations
23European Parliament Committee on Civil Liberties, Justice and Home Affairs. (2010). Future European Union (EU)- United States of AmericaInternational Agreement on the Protection of Personal Data When Transferred and Processed for the Purpose of Preventing, Investigating, Detecting,or Prosecuting Criminal Offences, including Terrorism, in the Framework of Police and Judicial Cooperation in Criminal Matters. (working document2). Retrieved from: http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dt/830/830120/830120en.pdf24Ibid.25Most recently, as demonstrated by the PNR case, Germany and Austria abstained from the council vote, and many members of the EuropeanParliament, including rapporteur Sophie in ‘t Veld (Netherlands – ALDE), did not support final passage due to privacy concerns.26Or longer if the ESTA application is part of an active investigation.CYBER SECURITY1Center for Strategic and International Studies (4 May, 2012). Significant Cyber Incidents Since 2006. Retrieved from: http://csis.org/files/publication/120504_Significant_Cyber_Incidents_Since_2006.pdf2Office of the National Counterintelligence Executive. (October 2011). Foreign Spies Stealing US Economic Secrets in Cyberspace. Report toCongress. p. i, pp. 1-11.3Klimburg, A. & Mrtl, P. (September 2011). Cyberspace and Governance—A Primer. (special issue). p. 5. Retrieved from Österreichisches Institutfür Internationale Politik website: http://www.oiip.ac.at/de/publikationen/policy-paper/publikationen-detail/browse/1/article/93/cyberspace-andgovernance-a-primer-1.html4Nye, J. (personal communication, 6 February, 2012).5United States Government Accountability Office. (July 2011). Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities. (GAOpublication No. 11-75). Retrieved from: http://www.gao.gov/new.items/d1175.pdf6Klimburg, A. & Tirmaa-Klaar, H. (April 2011). Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Actionwithin the EU (report). Brussels: EU Directorate General for External Policies Policy Department. p. 37See 2010 NATO Strategic Concept. Retrieved from: http://www.nato.int/cps/en/natolive/official_texts_68580.htm#cyber.8See Cyber Atlantic. Retrieved at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation/cyber-atlantic.9European Network and Information Security Agency. (3 November, 2011). First Joint EU-US Cyber Security Exercise Conducted Today, 3rd. Nov. 2011(press release). Retrieved from: http://www.enisa.europa.eu/media/press-releases/first-joint-eu-us-cyber-security-exercise-conducted-today-3rdnov.-2011.10Fahey, E. et al. & Pawlak, P. (Ed.).(December 2011). The EU-US Security and Justice Agenda in Action. (Chaillot papers). European Institute forInternational Security Studies. Retrieved from: http://www.iss.europa.eu/uploads/media/cp127_EU-US_security_justice_agenda.pdf11Klimburg & Tirmaa-Klaar (April 2011), p. 4.12Government of the United Kingdom. (2010). A Strong Britain in an Age of Uncertainty: The National Security Strategy. Retrieved from: http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy.13Palmer, M. (3 November, 2011). EU and US Conduct First Cybersecurity Test. The Financial Times. Retrieved from http://www.ft.com/intl/cms/s/2/18ef64b6-063a-11e1-a079-00144feabdc0.html#axzz22jZxsvBe14Klimburg & Tirmaa-Klaar (April 2011), p. 37.15A IP-Forsa poll taken in June 2012 showed that based on party leanings, pluralities or majorities of members of the SPD (47 percent to 45 percent),Greens (52 percent to 32 percent) and the Linke (70 percent to 16 percent) where opposed to the use of cyberweapons. Only a majority of the CDU/CSU were in favor (54 percent to 38 percent). Interestingly, a plurality of members of the Pirate Party were also supportive (45 percent to 42 percent).See Deutsche Gesellschaft fuer Auswaertige Politik e.V. (July/August 2012). Cyber War. Internationale Politik(4). p. 4.16Sees Speech by Uri Rosenthal, Minister of Foreign Affairs of the Netherlands, at the session on Economic Growth and Development of the LondonConference on Cyberspace (1 November, 2011). Retrieved from:17See 2010 NATO Strategic Concept. Retrieved from: http://www.nato.int/cps/en/natolive/official_texts_68580.htm#cyber18Government of the United States of America. (2003). National Strategy to Secure Cyberspace.. Retrieved from: http://www.us-cert.gov/reading_room/cyberspace_strategy.pdf19Council of the European Union. (Dec. 8, 2008). Council Directive 2008/114/EC of 8 December 2008 on the identification and designation ofEuropean critical infrastructures and the need to improve their protection. (council directive 2008/114/EC). Retrieved from: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:345:0075:0082:EN:PDF20Kalfin, I. (February 2012). Draft Report on critical information infrastructure protection—achievements and next steps: toward global cyber security.(report no. 2011/2284 INI). Brussels: Committee on Industry, Research and Energy. p. 4. Retrieved from: http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&reference=PE-474.017&format=PDF&language=EN&secondRef=01Citations 8 5
- Page 3:
Field Manual to EuropeIntroduction
- Page 6:
multilateral channels. Europeanshav
- Page 9 and 10:
JuneBritish presidency of UNSCJune
- Page 12 and 13:
US-EU Investment vs. Global Nationa
- Page 14 and 15:
economic conditions in the eurozone
- Page 17 and 18:
MEMO ONTHE EUROZONE CRISISThe State
- Page 19 and 20:
attitude toward moral hazard. Withw
- Page 21 and 22:
Greece: 2010 Bailout BreakdownGreec
- Page 23 and 24:
the deficit from 4.5 percent to thr
- Page 27 and 28:
NATO thus faces an uncertain future
- Page 29 and 30:
1. Consider NATO’s defensespendin
- Page 31 and 32:
of-area operations and worldwidepar
- Page 33 and 34: concurrent terrorist attack in Beng
- Page 35: 2. Strengthen regionalpartnerships
- Page 38 and 39: MEMO ONCOUNTERTERRORISM ANDHOMELAND
- Page 40 and 41: home affairs (JHA), particularly in
- Page 43 and 44: Status of EU Countries in the US Vi
- Page 45 and 46: offensive capability centered at NA
- Page 47 and 48: socialized, i.e. there is a tacit e
- Page 49 and 50: such technology, such as deep packe
- Page 51 and 52: MEMO ONENERGY & CLIMATE CHANGEThe S
- Page 54 and 55: identifying the agents most qualifi
- Page 56 and 57: MEMO ONTURKEYThe State of PlayTurke
- Page 58 and 59: as a rising regional and internatio
- Page 60 and 61: CASE STUDY: TURKEY’S ENERGY ROLE:
- Page 62 and 63: 22%12%Turkey’s Main Trading Partn
- Page 64 and 65: MEMO ONRUSSIAThe State of PlayIn Pr
- Page 66 and 67: EU-Russia security apparatus. Themo
- Page 68 and 69: greater market access for US busine
- Page 70 and 71: MEMO ONCHINAThe State of PlayIn 201
- Page 72 and 73: But China’s competitive meridian
- Page 74 and 75: in millions of USDUS-China Bilatera
- Page 76 and 77: 7 6Acknowledgements
- Page 78 and 79: CITATIONSINTRODUCTION1See “Confid
- Page 80 and 81: 20Castle, S. (17 September, 2011).
- Page 82 and 83: ARAB UPRISING1Koch, C. (summer 2011
- Page 86 and 87: 21Healey, J. (January 2012). Beyond
- Page 88 and 89: 20Berlemont, I. (25 July, 2012). Fr
- Page 90 and 91: 24Putin, V. (6 September, 2012). An
- Page 92: Bertelsmann Foundation1101 New York