10.07.2015 Views

BF-FieldManual-FEB13 -3.pdf - Bertelsmann Foundation

BF-FieldManual-FEB13 -3.pdf - Bertelsmann Foundation

BF-FieldManual-FEB13 -3.pdf - Bertelsmann Foundation

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

23European Parliament Committee on Civil Liberties, Justice and Home Affairs. (2010). Future European Union (EU)- United States of AmericaInternational Agreement on the Protection of Personal Data When Transferred and Processed for the Purpose of Preventing, Investigating, Detecting,or Prosecuting Criminal Offences, including Terrorism, in the Framework of Police and Judicial Cooperation in Criminal Matters. (working document2). Retrieved from: http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dt/830/830120/830120en.pdf24Ibid.25Most recently, as demonstrated by the PNR case, Germany and Austria abstained from the council vote, and many members of the EuropeanParliament, including rapporteur Sophie in ‘t Veld (Netherlands – ALDE), did not support final passage due to privacy concerns.26Or longer if the ESTA application is part of an active investigation.CYBER SECURITY1Center for Strategic and International Studies (4 May, 2012). Significant Cyber Incidents Since 2006. Retrieved from: http://csis.org/files/publication/120504_Significant_Cyber_Incidents_Since_2006.pdf2Office of the National Counterintelligence Executive. (October 2011). Foreign Spies Stealing US Economic Secrets in Cyberspace. Report toCongress. p. i, pp. 1-11.3Klimburg, A. & Mrtl, P. (September 2011). Cyberspace and Governance—A Primer. (special issue). p. 5. Retrieved from Österreichisches Institutfür Internationale Politik website: http://www.oiip.ac.at/de/publikationen/policy-paper/publikationen-detail/browse/1/article/93/cyberspace-andgovernance-a-primer-1.html4Nye, J. (personal communication, 6 February, 2012).5United States Government Accountability Office. (July 2011). Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities. (GAOpublication No. 11-75). Retrieved from: http://www.gao.gov/new.items/d1175.pdf6Klimburg, A. & Tirmaa-Klaar, H. (April 2011). Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Actionwithin the EU (report). Brussels: EU Directorate General for External Policies Policy Department. p. 37See 2010 NATO Strategic Concept. Retrieved from: http://www.nato.int/cps/en/natolive/official_texts_68580.htm#cyber.8See Cyber Atlantic. Retrieved at: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation/cyber-atlantic.9European Network and Information Security Agency. (3 November, 2011). First Joint EU-US Cyber Security Exercise Conducted Today, 3rd. Nov. 2011(press release). Retrieved from: http://www.enisa.europa.eu/media/press-releases/first-joint-eu-us-cyber-security-exercise-conducted-today-3rdnov.-2011.10Fahey, E. et al. & Pawlak, P. (Ed.).(December 2011). The EU-US Security and Justice Agenda in Action. (Chaillot papers). European Institute forInternational Security Studies. Retrieved from: http://www.iss.europa.eu/uploads/media/cp127_EU-US_security_justice_agenda.pdf11Klimburg & Tirmaa-Klaar (April 2011), p. 4.12Government of the United Kingdom. (2010). A Strong Britain in an Age of Uncertainty: The National Security Strategy. Retrieved from: http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy.13Palmer, M. (3 November, 2011). EU and US Conduct First Cybersecurity Test. The Financial Times. Retrieved from http://www.ft.com/intl/cms/s/2/18ef64b6-063a-11e1-a079-00144feabdc0.html#axzz22jZxsvBe14Klimburg & Tirmaa-Klaar (April 2011), p. 37.15A IP-Forsa poll taken in June 2012 showed that based on party leanings, pluralities or majorities of members of the SPD (47 percent to 45 percent),Greens (52 percent to 32 percent) and the Linke (70 percent to 16 percent) where opposed to the use of cyberweapons. Only a majority of the CDU/CSU were in favor (54 percent to 38 percent). Interestingly, a plurality of members of the Pirate Party were also supportive (45 percent to 42 percent).See Deutsche Gesellschaft fuer Auswaertige Politik e.V. (July/August 2012). Cyber War. Internationale Politik(4). p. 4.16Sees Speech by Uri Rosenthal, Minister of Foreign Affairs of the Netherlands, at the session on Economic Growth and Development of the LondonConference on Cyberspace (1 November, 2011). Retrieved from:17See 2010 NATO Strategic Concept. Retrieved from: http://www.nato.int/cps/en/natolive/official_texts_68580.htm#cyber18Government of the United States of America. (2003). National Strategy to Secure Cyberspace.. Retrieved from: http://www.us-cert.gov/reading_room/cyberspace_strategy.pdf19Council of the European Union. (Dec. 8, 2008). Council Directive 2008/114/EC of 8 December 2008 on the identification and designation ofEuropean critical infrastructures and the need to improve their protection. (council directive 2008/114/EC). Retrieved from: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:345:0075:0082:EN:PDF20Kalfin, I. (February 2012). Draft Report on critical information infrastructure protection—achievements and next steps: toward global cyber security.(report no. 2011/2284 INI). Brussels: Committee on Industry, Research and Energy. p. 4. Retrieved from: http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&reference=PE-474.017&format=PDF&language=EN&secondRef=01Citations 8 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!