Spring MUN United Nations Human Rights Council (UNHRC)

Size: px
Start display at page:

Download "Spring MUN United Nations Human Rights Council (UNHRC)"

Transcription

1 Spring MUN 2018 United Nations Human Rights Council (UNHRC)

2 Index Title Page Number Letter from Director 3 About the Committee 4 Statement of the 4 Problem History of the 5 Problem Current Situation 6 Major countries and 8 organizations involved UN RELEVANT 10 ACTIONS QARMA 11 Position Papers 11 Further Research 12 Note to the UNHRC 12 Bibliography 13 2

3 LETTER FROM THE DIRECTOR Dear Delegate, Welcome to the United Nations Human Rights Council at Spring MUN My name is Rutvi Shah and I will be serving as your director along with assistant director Muskaan Jain. I chose this topic because I believe that, the advancement of technology and its threat to possible human rights infringement, is a pressing issue in the 21 st century. We live in a world, where technology evolves faster than the time humans require to adjust with the changes. Surveillance, is a very debatable topic and while it has innumerous advantages, it also has an equal number of disadvantages. In such a scenario, who is to decide whether advancing technology is a boon or bane? What is the line that separates the use of technology from its misuse? Can we live in a world without technology? I believe, no! Then are we living in a world that s safe? I leave it up to you delegates to decide. Moving away from the MUN-Details, I am currently in the second year of the IB program and I particularly enjoy studying Economics and Chemistry (Weird Combination, I know!) I also enjoy travelling and visiting new places. As much as I love discovering new cities, New York has always been my most loved escape. Other than travelling, I am a TV addict and love listening to music (particularly Coldplay and the Chainsmokers!) However, my favourite stress buster is simply adequate sleep (Well, hours.) Good luck for your preparation and I hope to see you in February for a super exciting weekend filled with intense debate. Just remember to not be afraid and make sure to voice out your opinion in committee as one idea can make a major difference. Rutvi Shah Director United Nations Human Rights Council 3

4 ABOUT THE COMMITTEE The United Nations Human Rights Council (UNHRC) is an inter-governmental body within the United Nations system, consisting of 47 Member States. Each State is responsible for cooperation, promotion and protection of Human Rights. The aim of the council is to promote universality, interdependence, and indivisibility of Human Rights, inherent cooperation, to be a transparent intergovernmental process, and to be realistic. Their focus is not only on Member States but also on Non-Governmental Organizations (NGOs) and national Human Rights institutions. Topics dealt with mostly are specific Human Rights situations involving certain countries, however affecting a lot of Member States, and groups of certain people and individuals. Through utilizing a mechanism of Universal Periodic Review the council assesses all Human Right issues in all the Member States. The Advisory Committee is a panel of experts and advisors who give advice on regional issues. Moreover, the Complaint Procedure allows for individuals and organizations to bring forward specific Human Rights issues. The council also works with UN Special Procedures, which can be made to advise and publicly report specific Human Rights issues in certain countries. The evolution of the work of the UNHRC has matched the growth in interest in human rights from the United Nations since the General Assembly adopted the Universal Declaration of Human Rights on 10 December This codification of a common standard of achievement for all peoples and nations was the first time in history that human rights, those civil, political, economic, social, and cultural rights considered fundamental to member states, had been agreed upon and enumerated. Today, the International Bill of Human Rights includes the Universal Declaration, the International Covenant on Civil and Political Rights (and its two Optional Protocols), and the International Covenant on Economic, Social, and Cultural Rights. The council mainly focuses on human rights including the freedoms of association, assembly, expression, belief and religion, community- specific rights including those of women or the LGBT caucus, and the rights of racial and ethnic minorities. STATEMENT OF THE PROBLEM Technological developments have been exponentially advancing and creating breakthroughs in the way we think, communicate and learn. Although the term technological developments is rather broad, we will be focusing on technological development in the field of information technology in our committee this year.

5 The question of ethics is often raised with the use of technology. This is because while information systems offer new opportunities and advantages to businesses and scientific developments, they also introduce issues that can be a threat to the privacy and security of our society. The responsible global citizen is increasingly alarmed by the growing number of cases related to cybercrime and its repercussions on human rights infringements and national security. Today, the government s use of technology and the lack of transparency is one of the most talked about issues worldwide. Every day, more and more details are revealed about new and modified surveillance activities. How safe does this make the world we live in? Therefore, delegates, we invite you to join the UNHRC to discuss the ethicality of the use of technology. We look forward to new insights and fruitful solutions to this pressing global crisis. HISTORY OF THE PROBLEM Major developments in the field of information technology have been happening since 1957, when Russia launched Sputnik 1 into space. The technological race of the Cold War caused the United States to start developing the most resistant communications system. A program that would later provide public access to the World Wide Web, changing the field of 5

6 technology forever. The history of intelligence and surveillance can be traced back in the early stages of state organization. Countries and governments have always striven through more or less developed forms of intelligence to get access to and gather not publicly available, classified information through covert means. Surveillance and espionage have been credited with winning wars, forestalling revolutions, provoking them in certain cases, protecting the world from terrorist attacks and in general exercising a far-reaching influence on historical development. However, the biggest escalation in controversy can be found between 2010 and 2013, with the revelations made by WikiLeaks and Edward Snowden. These revealed the existence of massive surveillance programs that were being carried out by the US in collaboration with the UK, Canada, Australia and New Zealand, in what was called the Five Eyes initiative. The National Security Agency was dedicating human and technological resources to collect massive amounts of data not only from American citizens, but also from world leaders (such as Dilma Rousseff and Angela Merkel) and UN officials, and in the process, was obtaining information from other countries intelligence services overseas. However, the Five Eyes operation countries were not the only ones found guilty of using technology to invade other nations privacy: China is one of the countries, which is most often accused of hacking outside its borders (India, Taiwan), as well as the Democratic People s Republic of Korea, Pakistan and Cyprus. The UN General Assembly adopted resolution 68/167 in December 2013 on the right to privacy in the digital age, reaffirming the existence of this right and calling upon all states to respect the right and take measures to put an end to violations. Reports were made by the (A/HRC/31/64) in the 31st session of the Human Rights Council. In these reports it was highlighted that the obstacles faced to come up with an international official definition of privacy is the tightened restrictions on surveillance projects and backdoors. CURRENT SITUATION Advances in technological developments have drastically altered the rights of each individual to privacy. By amplifying the voices of human rights defenders and promoting democratic participation, technological developments have allowed for drastic improvements in political participation in parts of the world where governments use repression and violence to stop 6

7 political participation. Cyber Warfare In a world dominated by technological growth and advancement, attack on information systems has become a legitimate cause of concern for security. With the increasing importance of cyberspace, a number of risks have become concurrent which not only jeopardizes the benefits that cyberspace can offer but also pose a threat to the national security of a country. Cyber warfare may include attempts to access, damage, undermine and sabotage another nation or organization s information through metadata acquisition, computer viruses, and denial of service attacks. Espionage is seen as a major threat that must be redeemed. These treats are multi polar in nature and can be motivated from several directions and they may include nation states, nonstate actors, proxies, intelligence agencies. It must be noted that these attack may also be politically, socially or religiously motivated. The internet is also becoming a tool for military activities and cyber security has become more central to national and international security. More advanced methods of cryptography are being explored and enacted. Protection of data has become more important for international security than ever before. According to European cyber security expert Sandro Gaycken, offensive operations when seen from a long-term perspective, can potentially cripple economies, change political views, instigate conflicts among or within states and also equalize technological capacities of nations. With the betterment in telecommunications and information processing, hackers are also benefitting which makes it imperative to manage cyber-attack, and marshalling of an appropriate response to it. Cybercriminals route their communications through a variety of jurisdictions to avoid the detection of their crimes and identities. Cyber counterintelligence is important in keeping sensitive information safe and preventing subversion and sabotage. Another rising trend is the perpetuation of cyber- attacks by nationalist groups, such as when Israeli 10 hackers organised together to launch an attack against Palestine in October 2000 during a period of conflict. DOS attacks were launched on computers owned by Palestinian resistance organizations (Hamas) and Lebanese resistance organizations (Hezbullah). Anti-Israel hackers responded by crashing several Israeli web sites by flooding them with bogus traffic. In March 2013, South Korea s cyberspace came under a wave of cyber-attacks. Information systems of major broadcasting corporations and banks were hacked. According to an estimate, it cost South Korea 500m. The European Defence Agency (EDA) is progressing towards a more consistent level of cyber defence capability across the European Union. Terrorism The recent trend in numerous countries to survey their populations with the excuse of 7

8 preventing violence from terrorist groups has allowed governments worldwide to monitor the activity of their citizens online. The violation of digital rights has led to abuses in the physical world, such as arbitrary detention and forced disappearances. The legality behind these actions will depend from state to state. Practitioners have noted the importance of monitoring systems in order to be able to gain evidence of supposed abuses with regards to freedom of expression and rights to privacy. The tragic terrorist events in Paris and the accusations against the French intelligence have raised again the voices of concern for privacy advocates that these attacks might be used as an excuse for a further expansion of the already extensive surveillance powers enjoyed by intelligence agencies worldwide. At the same time, they have been invoked by many supporters of the need for a retooled intelligence enterprise that could connect the dots and keep us safe in the wake of the wildest phase of the war on terror. In the words of a former NSA executive: In order to find the needle in the haystack, you need access to the whole haystack. Role of the Media Another important aspect in the context of national security leaks is the role of the press in upholding individual rights and civil liberties. Individual journalists entangled in controversial leak stories have always defended their public duty to hold governments accountable for any violation of fundamental human rights and democratic processes and have striven in order to gain access to public records, meetings and court rooms and disclose the acquired information. There are many cases, however, where journalists have been accused of exploiting the treasure trove of information secured through their cooperation with whistle-blowers or otherwise for their own personal benefit rather than the common good. In the Snowden case, there have been many speculations regarding lucrative business deals with publishers and movie producers signed by some of the journalists Edward Snowden has partnered with. The media involvement of multibillionaires like the ebay founder Pierre Omidyar in launching a new media organization, First Look Media, dedicated to fearless and adversarial journalism and in funding the so called crypto insurgency aimed at the US intelligence apparatus is being viewed with increasing scepticism by many traditional advocates of press independence. Government Surveillance Recent scandals in the United States and the United Kingdom, in which vast amounts of data is collected on millions of citizens, demonstrate the need for governments to be open and transparent about the data that they are collecting and for what purpose. In a list compiled by Reporters without Borders, it is noted that the governments of numerous countries have 8

9 implemented censorship and surveillance online. From Vietnam and China to Russia, the United Kingdom and the United States, mass surveillance units have been used to find out vast arrays of information on citizens, with, or without the help of private companies such as Google, Apple and Microsoft. Tech corporations might very well be forced by governments to share information if legislation is passed against encryption. A good example of this is the case between the FBI and Apple in which Apple refused to unlock a phone which had been left by the San Bernadino shooter. This situation is likely to continue for a long time, as communication technologies continue to develop on a drastic scale. Governments will also be allowed to survey the actions of their citizens with increasing frequency and accuracy. This has made the need for legislation which limits or provides remedies to victims of internet espionage. MAJOR COUNTRIES AND ORGANISATIONS INVOLVED Almost every single country in the world operates a secretive arm of government consisting of intelligent agencies of varying degree of organization, staffing, sophistication and impact on world affairs. At an international scale and for the purposes of the current study, we will focus on the six biggest intelligence agencies. The end of the Cold War Era has not led to world peace and eradication of conflicts around the world. The world dominance of the USA is being challenged by the rise in power of new global players, economic competition is becoming fiercer in the context of a crisis-prone world economy, historical hostilities are being rekindled and extremist movements are on the surge worldwide. All the above reasons have kept the intelligence agencies of many countries more than busy and have furthered the expansion of communications interception and electronic espionage. The most important intelligence agencies and countries are the following: Intelligence Agency- CIA National Security Agency- NSA Country: USA The US Intelligence System constitutes an elaborate complex of some dozen separate independent or quasi-independent intelligence organizations, each with a specific role and a carefully defined area of expertise and responsibilities. The Central Intelligence Agency CIA continues to sit on the top of this complex, with its Director being the president s principal intelligence adviser, responsible for coordinating all the separate intelligence units. The biggest of the country s myriad intelligence organizations is the National Security Agency/Central Security Service ( NSA ),the USA s signals intelligence agency as well as the phone and internet interception specialist of the USA, which is also responsible for code 9

10 breaking.it has a strict focus on overseas, rather than domestic, surveillance. The role of the CIA, and more recently of the NSA, have been questioned on a number of occasions, following the disillusionment with the Vietnam War, the Watergate scandal, numerous accusations for illegitimate interventions and support to authoritarian regimes. As a result of extensive media disclosures and investigations by presidential commissions and congressional committees, new guidelines for secret operations were adopted and a new structure for executive and legislative supervision established. The controversy however remains and is becoming more intense in the information age, following the recent revelations. Government Communications Headquarters- GCHQ Country: United Kingdom GCHQ is UK s official security and intelligence organization, working in close cooperation with the British Government and subjected to Parliamentary and judicial control. GCHQ forms an integral part of the British intelligence heritage, which dates back to the two World Wars and the Cold War. CHQ is a secret organization and its very existence was not officially admitted until Foreign Intelligence Service- SVR Country: Russia SVR is carrying on Russia s formidable spying tradition, which dates back to the czarist-era Cheka and the once omnipotent KGB of the Soviet Union. Although its officially declared area of expertise is to counter terrorism and protect Russia s commercial interests, SVR is heavily involved in international espionage and consolidation of domestic political power. Ministry of State Security- MSS Country: China MSS is close in structure to the old Soviet KGB and is responsible for both domestic security and foreign espionage. The high tech industries and the military technology of the United States are the main focus of its overseas activities. MSS is also believed to be leading China s aggressive espionage efforts on cyberspace. Since 2007, the governments of the USA, Britain and Germany have been making continuous allegations against China for attempting to hack and hacking into their respective Departments of Defence databases. Chinese espionage is different from Western espionage, in that it does not rely solely on purposefully recruited and trained agents, but views every individual and every little piece of information as a potential intelligent asset, making it extremely difficult to detect the scope of its operations. Research and Analysis Wing- RAW 10

11 Country: India India s notoriously secretive agency was founded in 1985 as an indispensable arm of the Indian government s strategy against Pakistan. Since then it has developed to one of the strongest intelligent agencies, with its activities expanding to Pakistan, Sri Lanka, Nepal, Bangladesh, and elsewhere. Its main objective remains the destabilization of Pakistan and to this end it is particularly active in supporting independence movements in Bangladesh, whereas it has been also accused by Pakistani authorities for terrorist attacks in their country and for infiltration by U.S. and Chinese assets. UN RELEVANT ACTIONS General Assembly Resolution 68/167 on the Right to Privacy in the Digital Era. Resolution, initiated by Brazil and Germany following the Snowden revelations and voted unanimously by the 193 UN members in December 2013, expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights and calls on a curb of supernormal surveillance of communications. The General Assembly affirms that the rights held by people offline must also be protected online and calls upon all States to respect and protect the right to privacy in digital communication. It also calls on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasizes the need for States to ensure the full and effective implementation of their obligations under international human rights law. UN Group of Governmental Experts (GGE): Following the submission of two consensus reports in 2010 and 2013 a new UN Group of Governmental Experts (GGE) was authorized with an expanded mandate on issues related to the state use of information and communication technologies and their compatibility with international law. International Covenant on Civil and Political Rights Ratified to date by 167 States the Convention provides that no one shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home or correspondence, or to unlawful attacks on his or her honour and reputation. It further states that Everyone has the right to the protection of the law against such interference or attacks. 11

12 QARMA 1. What practical measures can member states take to ensure that the private rights of their citizens are protected whilst considering growing security concerns? 2. How can individuals ensure that their rights to privacy are protected against large scale government programs? 3. Is it possible for the UN to protect the right to privacy of individuals without encroaching upon national sovereignty? 4. How can the internet be kept free and open whilst considering individual privacy concerns? 5. How can governments protect their civilians without encroaching their privacy online? Position Papers Position Papers must be single-spaced; twelve point Times New Roman font and approximately words. Your name, country name, school and topic area should be in the upper right hand corner. Position Papers must be divided into three sections: 1. Your country s connection and involvement in the topic What is your country s stance where technology and surveillance is concerned? 2. Your country s policies in relation to the issue and current diplomatic arrangements. 3. What your country thinks is the best way to solve the problem (these should not be solutions from past conferences, agreements or resolutions but innovative and original solutions in accordance with your foreign policy and capabilities) The first two sections should make up approximately half (or slightly less) of your position papers with section three making up the other half of the paper. Although the paper is divided into three different sections, the paper must follow a logical and coherent progression with links between sections with citations or endnotes. Further Research The study-guide should lend you a basic understanding of the topic at hand but to be able to debate and critically analyze the situation, one requires a deeper and more thorough understanding of the topic. Whilst researching, it would important to keep in mind: 1. Your country s role in aiding this situation 2. Your country s foreign policy 12

13 3. Any and all Treaties, Agreements or Alliances that your country has accepted 4. Whether or not your country would face any economic or social repercussions if there were restrictions laid on technology. Note to the UNHRC I sincerely hope that you will enjoy the committee and preparation as much as we did, when writing this study guide. As you start researching for the MUN, be creative and open-minded. You will be crafting solutions for the long-term solutions to security issues regarding technology. Feel free to contact me with doubts or questions about the Topic, Spring MUN or Model UN in general and I will be more than happy to respond to you as soon as I can! See you in February! J Bibliography

14 14

PERSONAL INTRODUCTION

PERSONAL INTRODUCTION Forum: Issue: Student Officer: Position: Disarmament and International Security Committee National Security Leaks Nefeli Ioannou Co Chair PERSONAL INTRODUCTION Dear Delegates, My name is Nefeli Ioannou

More information

The Right to Privacy in the Digital Age: Meeting Report

The Right to Privacy in the Digital Age: Meeting Report The Right to Privacy in the Digital Age: Meeting Report In light of the recent revelations regarding mass surveillance, interception and data collection the Permanent Missions of Austria, Brazil, Germany,

More information

1 June Introduction

1 June Introduction Privacy International's submission in advance of the consideration of the periodic report of the United Kingdom, Human Rights Committee, 114 th Session, 29 June 24 July 2015 1. Introduction 1 June 2015

More information

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND Mandates of the Special Rapporteur on the promotion and protection

More information

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries? Statement to the Privacy & Civil Liberties Oversight Board Eric A. Posner University of Chicago Law School March 14, 2014 You have asked me for my views on U.S. data collection efforts under Section 702

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

INVESTIGATORY POWERS BILL EXPLANATORY NOTES INVESTIGATORY POWERS BILL EXPLANATORY NOTES What these notes do These Explanatory Notes relate to the Investigatory Powers Bill as brought from the House of Commons on 8. These Explanatory Notes have been

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

Student Worksheet Manning Case Challenges Definition of Whistleblower

Student Worksheet Manning Case Challenges Definition of Whistleblower Page 1 http://www.pbs.org/newshour/extra Student Worksheet Manning Case Challenges Definition of Whistleblower http://www.pbs.org/newshour/extra/2013/06/manning-case-challenges-definition-of-whistleblower/

More information

Spying on humanitarians: implications for organisations and beneficiaries

Spying on humanitarians: implications for organisations and beneficiaries Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies

More information

CONFERENCE BACKGROUND GUIDE

CONFERENCE BACKGROUND GUIDE MODEL UNITED NATIONS CHANGE THE WORLD E M I R A T E S CONFERENCE BACKGROUND GUIDE United Nations Security Council Cyber Terrorism Dear Delegates, Welcome to the 2018 Change The World Model United Nations

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Madam Chairman, Mr. Vice Chairman, Members of the Committee: It is a distinct honor

More information

Testimony of Peter P. Swire

Testimony of Peter P. Swire Testimony of Peter P. Swire Review Group on Intelligence and Communications Technology Before the HOUSE COMMITTEE ON THE JUDICIARY Hearing on: Examining Recommendations to Reform FISA Authorities February

More information

With the current terrorist threat facing European Union Member States, including the UK

With the current terrorist threat facing European Union Member States, including the UK Passenger Information Latest Update 26 th February 2015 Author David Lowe Liverpool John Moores University Introduction With the current terrorist threat facing European Union Member States, including

More information

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ 16th March 2014 The Rt. Hon Dominic Grieve QC MP, Attorney General, 20 Victoria Street London SW1H 0NF c.c. The Rt. Hon Theresa May, Home Secretary Dear Mr. Grieve, Plea for referral to police for investigation

More information

NSW Council for Civil Liberties Inc.

NSW Council for Civil Liberties Inc. NSW Council for Civil Liberties Inc. Postal address: PO BOX A1386 SYDNEY SOUTH NSW 1235 Office address: suite 203, 105 Pitt Street SYDNEY NSW 2000 Phone: 02 8090 2952 Fax: 02 8580 4633 Email: office@nswccl.org.au

More information

Globalization - theory and practices

Globalization - theory and practices Globalization - theory and practices Prof. Tomasz Bernat Microeconomics Department Institut of Economics tomasz.bernat@usz.edu.pl GLOBALIZATION - agenda Economic point of view Defining Globalization Components

More information

and fundamental freedoms while countering terrorism: Ten areas of best practice, Martin Scheinin A/HRC/16/51 (2010)

and fundamental freedoms while countering terrorism: Ten areas of best practice, Martin Scheinin A/HRC/16/51 (2010) 1. International human rights background 1.1 New Zealand s international obligations in relation to the civil rights affected by terrorism and counter terrorism activity are found in the International

More information

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

Transnational Radical Party (TRP) FILLING THE DEMOCRATIC DIGITAL DIVIDE Document WSIS/PC-2/CONTR/51-E 6 January 2003 English only Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE" A. Introduction 1. The main objective of the Second Preparatory Committee

More information

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD Sebastian SÂRBU, PhD Abstract: Security culture focuses on a broader scope: the ideas, customs and social behaviors, values of a group that influence the group and also society security at large. Therefore,

More information

Investigatory Powers Bill. How to make it fit-for-purpose

Investigatory Powers Bill. How to make it fit-for-purpose Investigatory Powers Bill How to make it fit-for-purpose Contents Introduction 1 The draft Bill fails in its mission to be clear and comprehensive 2 The operational case has not been made for all powers

More information

COUNCIL OF EUROPE AND THE INTERNET

COUNCIL OF EUROPE AND THE INTERNET COUNCIL OF EUROPE AND THE INTERNET Human rights, democracy and rule of law SAFEGUARDING HUMAN RIGHTS online The Internet is one of the progressive forces of our age: information and global communication

More information

National Report Japan

National Report Japan National Report Takeshi MATSUDA, Megumi OCHI, Tadashi IWASAKI (B) Jurisdictional issues (1)(a) How does your country locate the place of the commission of a crime in cyberspace? Article 1 of the ese Penal

More information

UN Human Rights Council Universal Periodic Review 30th session April-May 2018

UN Human Rights Council Universal Periodic Review 30th session April-May 2018 UN Human Rights Council Universal Periodic Review 30th session April-May 2018 Contribution by Reporters Without Borders (RSF), a non-governmental organization with special consultative status, on freedom

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND   TEL: / FAX: PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9543 / +41 22 917 9738 FAX: +41 22 917 9008 E-MAIL: registry@ohchr.org Mandate of the Special Rapporteur on the promotion and

More information

NSA s surveillance leak by Edward Snowden a utilitarian analysis. Jose Camero. 30 September 2015

NSA s surveillance leak by Edward Snowden a utilitarian analysis. Jose Camero. 30 September 2015 NSA s surveillance leak by Edward Snowden a utilitarian analysis Jose Camero 30 September 2015 Edward Joseph Snowden was born on the 21 st of June 1983 and in 2013 became the catalyst and centre of attention

More information

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger*

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* 20 July 2017 Here is a story about communications and power. Chapter 1 starts 12 years before IAMCR

More information

European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament,

European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament, European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament, having regard to its previous resolutions on Syria, having regard to the Foreign Affairs

More information

KEYNOTE STATEMENT Mr. Ivan Šimonović, Assistant Secretary General for Human Rights. human rights while countering terrorism ********

KEYNOTE STATEMENT Mr. Ivan Šimonović, Assistant Secretary General for Human Rights. human rights while countering terrorism ******** CTITF Working Group on Protecting Human Rights while Countering Terrorism Expert Symposium On Securing the Fundamental Principles of a Fair Trial for Persons Accused of Terrorist Offences Bangkok, Thailand

More information

Course Descriptions Political Science

Course Descriptions Political Science Course Descriptions Political Science PSCI 2010 (F) United States Government. This interdisciplinary course addresses such basic questions as: Who has power in the United States? How are decisions made?

More information

THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION

THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION Public AI Index: ACT 30/05/99 INTRODUCTION THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION 1. We the participants in the Human Rights Defenders

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 13.9.2017 COM(2017) 492 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Joint Press briefing by Foreign Secretary Shri Shivshankar Menon And U.S. Under Secretary of State for Political Affairs Mr.

Joint Press briefing by Foreign Secretary Shri Shivshankar Menon And U.S. Under Secretary of State for Political Affairs Mr. Joint Press briefing by Foreign Secretary Shri Shivshankar Menon And U.S. Under Secretary of State for Political Affairs Mr. Nicholas Burns 07/12/2006 OFFICIAL SPOKESPERSON (SHRI NAVTEJ SARNA): Good evening

More information

Submission to the Joint Committee on the draft Investigatory Powers Bill

Submission to the Joint Committee on the draft Investigatory Powers Bill 21 December 2015 Submission to the Joint Committee on the draft Investigatory Powers Bill 1. The UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression;

More information

The freedom of expression and the free flow of information on the Internet

The freedom of expression and the free flow of information on the Internet Policy statement The Digital Economy The freedom of expression and the free flow of information on the Internet Contents Business strongly supports the freedom of expression and free flow of information

More information

PRIVACY NOTES FROM NEW ZEALAND

PRIVACY NOTES FROM NEW ZEALAND PRIVACY NOTES FROM NEW ZEALAND PRESENTATION BY NEW ZEALAND S PRIVACY COMMISSIONER JOHN EDWARDS 5TH EUROPEAN DATA PROTECTION DAYS EURO FORUM BERLIN, GERMANY 4 MAY 2015 Introduction Good afternoon and thank

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

The evolution of human rights

The evolution of human rights The evolution of human rights Promises, promises Our leaders have made a huge number of commitments on our behalf! If every guarantee that they had signed up to were to be met, our lives would be peaceful,

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT

More information

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies By Jamie Fly, Laura Rosenberger, and David Salvo 2018 In 2014, Russian government operatives began attacking American democracy

More information

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE STATEMENT OF STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY

More information

REPORTS OF THE PROGRAMME

REPORTS OF THE PROGRAMME GROUP 1 EFFECTIVE ANTI-CORRUPTION MEASURES Chairperson Mr. KUSHIMOV Nurkhat (Kazakhstan) Co-Chairperson Mr. MARUYAMA Jun (Japan) Co-Chairperson Ms. DIOMANDE Nanan Assiata (Côte d Ivoire) Rapporteur Mr.

More information

American Government Chapter 6

American Government Chapter 6 American Government Chapter 6 Foreign Affairs The basic goal of American foreign policy is and always has been to safeguard the nation s security. American foreign policy today includes all that this Government

More information

CAMMUN 18 UNHRC The Question of Freedom of Journalists

CAMMUN 18 UNHRC The Question of Freedom of Journalists Study Guide Committee: United Nations Human Rights Council (UNHRC) Topic: The Question of Freedom of Journalists Introduction: The freedom of the press has always been a controversial and debated topic.

More information

Human Rights Defenders UN Consensus Resolution 2017 Final text as adopted in 3C on 20 November - 76 cosponsors listed

Human Rights Defenders UN Consensus Resolution 2017 Final text as adopted in 3C on 20 November - 76 cosponsors listed Human Rights Defenders UN Consensus Resolution 2017 Final text as adopted in 3C on 20 November - 76 cosponsors listed Albania, Andorra, Argentina, Armenia, Australia, Austria, Belgium, Brasil, Bulgaria,

More information

Appendix: Mission Statement of the Canadian Security Intelligence Service 1

Appendix: Mission Statement of the Canadian Security Intelligence Service 1 Hoover Press : Posner/Domestic Intel hposdi apx Mp_83_rev1_page 83 Appendix: Mission Statement of the Canadian Security Intelligence Service 1 The Canadian Security Intelligence Service (CSIS) was created

More information

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire 2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important

More information

Communications Security Establishment Commissioner. Annual Report

Communications Security Establishment Commissioner. Annual Report Communications Security Establishment Commissioner Annual Report 2001 2002 Office of the Communications Security Establishment Commissioner P.O. Box 1984 Station B Ottawa, Ontario K1P 5R5 Tel: (613) 992-3044

More information

Weekly Geopolitical Report

Weekly Geopolitical Report Weekly Geopolitical Report By Bill O Grady March 14, 2016 The Apple Problem On December 2, 2015, Syed Rizwan Farook and his wife, Tashfeen Malik, attacked a San Bernardino county facility, killing 14 people

More information

The Strategic Significance of the Internet Commons

The Strategic Significance of the Internet Commons The Strategic Significance of the Internet Commons What is a global common? Historically, it has been defined as a naturally occurring domain or area not governed by any single political jurisdiction or

More information

RIGHTS OF PEOPLES TO SELF-DETERMINATION. 61 st session of the General Assembly (September to December 2006, New York) 1. Overview

RIGHTS OF PEOPLES TO SELF-DETERMINATION. 61 st session of the General Assembly (September to December 2006, New York) 1. Overview RIGHTS OF PEOPLES TO SELF-DETERMINATION 61 st session of the General Assembly (September to December 2006, New York) 1. Overview The General Assembly considered the issue of self-determination through

More information

UNITED NATIONS HUMAN RIGHTS COUNCIL 13th Session of the Working Group on the Universal Periodic Review 21 May to 1 June 2012

UNITED NATIONS HUMAN RIGHTS COUNCIL 13th Session of the Working Group on the Universal Periodic Review 21 May to 1 June 2012 UNITED NATIONS HUMAN RIGHTS COUNCIL 13th Session of the Working Group on the Universal Periodic Review 21 May to 1 June 2012 INTERNATIONAL COMMISSION OF JURISTS (ICJ) SUBMISSION TO THE UNIVERSAL PERIODIC

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

In this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR:

In this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR: International Covenant on Civil and Political Rights: Key elements in the context of the LIBE Committee inquiry. Professor Martin Scheinin 14 October 2013 The Covenant was adopted and opened for signature,

More information

Resolution adopted by the Human Rights Council on 2 October /15. Human rights and preventing and countering violent extremism

Resolution adopted by the Human Rights Council on 2 October /15. Human rights and preventing and countering violent extremism United Nations General Assembly Distr.: General 12 October 2015 A/HRC/RES/30/15* Original: English Human Rights Council Thirtieth session Agenda item 3 Resolution adopted by the Human Rights Council on

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

Team Leader Global Counter Terrorism Forum (GCTF) Administrative Unit

Team Leader Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has a vacancy for: Team Leader Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 15 June 2015 Location: The Hague, the Netherlands

More information

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger

More information

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels.

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels. Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels. Session on exchange of views on Legal Affairs, Human Rights

More information

British Values in Art

British Values in Art British Values in Art Freedom to voice opinions during class feedback sessions. Votes on materials/techniques Debates/discussions of artists work through critical studies Student autonomy in their personal

More information

Special Session on CEDAW (OHCHR)

Special Session on CEDAW (OHCHR) INTRODUCTION Hello everyone! I am very excited to serve as your Head Chair for OHCHR this year at IGMUN. In addition to be the head chair, I am also the Under-Secretary General of Registration, so I ve

More information

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE United Nations Chiefs of Police Summit 20-21 June 2018 UNCOPS Background Note for Session 1 PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE United Nations peacekeeping today stands at a crossroads.

More information

Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Contact Persons Janet Anderson-Bidois Chief Legal Adviser New Zealand Human Rights Commission

More information

INTERNATIONAL HUMAN RIGHTS LouvainX online course [Louv2x] - prof. Olivier De Schutter

INTERNATIONAL HUMAN RIGHTS LouvainX online course [Louv2x] - prof. Olivier De Schutter INTERNATIONAL HUMAN RIGHTS LouvainX online course [Louv2x] - prof. Olivier De Schutter READING MATERIAL related to: section 8, sub-section 1, unit 4: The UN Charter-based system of human rights protection

More information

LEGAL BASIS OBJECTIVES ACHIEVEMENTS

LEGAL BASIS OBJECTIVES ACHIEVEMENTS PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing

More information

Declaration on Media Freedom in the Arab World

Declaration on Media Freedom in the Arab World Declaration on Media Freedom in the Arab World Preamble Reaffirming that freedom of expression, which includes media freedom, is a fundamental human right which finds protection in international and regional

More information

ANNEX DRAFT OVERARCHING FRAMEWORK OF ENGAGEMENT WITH NON-STATE ACTORS

ANNEX DRAFT OVERARCHING FRAMEWORK OF ENGAGEMENT WITH NON-STATE ACTORS Contributions of the Plurinational State of Bolivia Notes: In bold and underlined; new text proposed by Bolivia Strikethrough: deletions suggested by Bolivia Rationale ANNEX DRAFT OVERARCHING FRAMEWORK

More information

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire Working paper GTJMCE-2015-1 This working paper along with others in the same series can be found online at:

More information

The End of the Multi-fiber Arrangement on January 1, 2005

The End of the Multi-fiber Arrangement on January 1, 2005 On January 1 2005, the World Trade Organization agreement on textiles and clothing expired. All WTO members have unrestricted access to the American and European markets for their textiles exports. The

More information

United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK

United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK Introduction United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK UNSC DPRK 1 The face of warfare changed when the United States tested

More information

DEVELOPMENT OF INTERNATIONAL HUMAN RIGHTS INSTRUMENTS

DEVELOPMENT OF INTERNATIONAL HUMAN RIGHTS INSTRUMENTS DEVELOPMENT OF INTERNATIONAL HUMAN RIGHTS INSTRUMENTS Dr.V.Ramaraj * Introduction International human rights instruments are treaties and other international documents relevant to international human rights

More information

ASIA-PACIFIC REGIONALISM OVERTAKING OCEANIA REGIONALISM. Ron Crocombe Box 309, Rarotonga, COOK ISLANDS

ASIA-PACIFIC REGIONALISM OVERTAKING OCEANIA REGIONALISM. Ron Crocombe Box 309, Rarotonga, COOK ISLANDS ASIA-PACIFIC REGIONALISM OVERTAKING OCEANIA REGIONALISM Ron Crocombe Box 309, Rarotonga, COOK ISLANDS ronc@oyster.net.ck The concept of regional cooperation is new in the Pacific. In ancient times the

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden. Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson

More information

ISHR S SUMMARIES OF DOCUMENTS FOR THE RESUMED 6 TH SESSION OF THE COUNCIL, DECEMBER

ISHR S SUMMARIES OF DOCUMENTS FOR THE RESUMED 6 TH SESSION OF THE COUNCIL, DECEMBER ISHR S SUMMARIES OF DOCUMENTS FOR THE RESUMED 6 TH SESSION OF THE COUNCIL, 10-14 DECEMBER Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while

More information

The Policies of South KOREA's Counter Intelligence Agency on North Korea's ESPIONAGE Activities in South Korea

The Policies of South KOREA's Counter Intelligence Agency on North Korea's ESPIONAGE Activities in South Korea 2018 3(2) 30-35 Submission: 2018/11/10, Peer review: 2018/11/20, Accepted: 2018/11/25, Published: 2018/12/30 International journal of protection, security & investigation Publication state: Japan ISSN:

More information

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007 CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007 Professor Pauline C. Reich Waseda University School of Law Director, Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute Tokyo, Japan

More information

Introduction to the Cold War

Introduction to the Cold War Introduction to the Cold War What is the Cold War? The Cold War is the conflict that existed between the United States and Soviet Union from 1945 to 1991. It is called cold because the two sides never

More information

THE POLITICS OF SURVEILLANCE

THE POLITICS OF SURVEILLANCE THE POLITICS OF SURVEILLANCE Political opponents and activists are among those monitored in Latin America. Katitza Rodríguez charts the erosion of privacy in the region While most Latin American countries

More information

Comment. Draft National Policy on Mass Communication for Timor Leste

Comment. Draft National Policy on Mass Communication for Timor Leste Comment on the Draft National Policy on Mass Communication for Timor Leste ARTICLE 19 London September 2009 ARTICLE 19 Free Word Centre 60 Farringdon Road London EC1R 3GA United Kingdom Tel: +44 20 7324

More information

30/ Promoting reconciliation, accountability and human rights in Sri Lanka

30/ Promoting reconciliation, accountability and human rights in Sri Lanka United Nations General Assembly Distr.: Limited 29 September 2015 A/HRC/30/L.29 Original: English Human Rights Council Thirtieth session Agenda item 2 Annual report of the United Nations High Commissioner

More information

Cold War. What is it? Why does it develop? What does it take to win? How is it fought? What are the consequences?

Cold War. What is it? Why does it develop? What does it take to win? How is it fought? What are the consequences? The Cold War Cold War What is it? Why does it develop? What does it take to win? How is it fought? What are the consequences? Cold War What is it? Conflict, tension U.S. & allies mostly in western Europe

More information

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

United Nations General Assembly 1st

United Nations General Assembly 1st ASMUN CONFERENCE 2018 "New problems create new opportunities: 7.6 billion people together towards a better future" United Nations General Assembly 1st "Paving the way to a world without a nuclear threat"!

More information

15 th Council of Europe Conference of Ministers responsible for Sport

15 th Council of Europe Conference of Ministers responsible for Sport Council of Europe and Sport S Strasbourg, 16 October 2018 15 th Council of Europe Conference of Ministers responsible for Sport Tbilisi, Georgia 16 October 2018 FINAL RESOLUTIONS AND THE TBILISI DECLARATION

More information

Examiners Report June GCE Government and Politics 6GP03 3D

Examiners Report June GCE Government and Politics 6GP03 3D Examiners Report June 2011 GCE Government and Politics 6GP03 3D Edexcel is one of the leading examining and awarding bodies in the UK and throughout the world. We provide a wide range of qualifications

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill [AS AMENDED ON REPORT] CONTENTS PART 1 GENERAL PRIVACY PROTECTIONS Overview and general privacy duties 1 Overview of Act 2 General duties in relation to privacy Prohibitions against

More information

Internet Governance Forum Guadalajara, Mexico

Internet Governance Forum Guadalajara, Mexico Internet Governance Forum 2016 2016-12-05 Guadalajara, Mexico DC on Internet Rights and Principles Workshop Room 10 Day 2, IGF2016 This meeting marked seven years since of the Internet Rights and Principles

More information

PREAMBLE. The Human Rights Defenders World Summit 2018 Action Plan

PREAMBLE. The Human Rights Defenders World Summit 2018 Action Plan PREAMBLE We, the participants at the Human Rights Defenders World Summit 2018, held in Paris on the twentieth anniversary of the adoption of the UN Declaration on Human Rights Defenders (hereinafter HRD

More information

The Identity Project

The Identity Project The Identity Project www.papersplease.org Edward Hasbrouck v. U.S. Customs and Border Protection Privacy Act and FOIA (Freedom of Information Act) lawsuit for records of DHS surveillance of travelers filed

More information

Human Rights Implications of Intelligence Sharing

Human Rights Implications of Intelligence Sharing Briefing to National Intelligence Oversight Bodies Human Rights Implications of Intelligence Sharing September 2017 1 Introduction The effective oversight of secret surveillance is among the fundamental

More information

Solutions to the digital trade imbalance

Solutions to the digital trade imbalance Solutions to the digital trade imbalance Susan Ariel Aaronson discusses how governments use trade agreements and policies to address cross-border internet issues and to limit digital protectionism Cross-border

More information

60 th UIA CONGRESS Budapest / Hungary October 28 November 1, UIA Biotechnology Law Commission Sunday, October 30, 2016

60 th UIA CONGRESS Budapest / Hungary October 28 November 1, UIA Biotechnology Law Commission Sunday, October 30, 2016 60 th UIA CONGRESS Budapest / Hungary October 28 November 1, 2016 UIA Biotechnology Law Commission Sunday, October 30, 2016 Hacking Pacemakers and Beyond: Cybersecurity Issues in Healthcare Cyber Security

More information

Canada and Israel Strategic Partnership (22 January 2014)

Canada and Israel Strategic Partnership (22 January 2014) Canada and Israel Strategic Partnership (22 January 2014) http://www.international.gc.ca/name-anmo/canada_israel_mou-prot_ent_canada_israel.aspx?lang=eng Memorandum of Understanding: Canada and Israel

More information

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction 1 Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction Recalling the United Nations Convention against Transnational

More information