FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE

Size: px
Start display at page:

Download "FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE"

Transcription

1 Military Art and Science 259 FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE Ilina ARMENCHEVA Stefko SMOLENOV "G. S. Rakovski" National Defence College, Sofia, Bulgaria ABSTRACT In nova days ICT progress and the daily life dependency on Internet leads to emergence of many new challenges and threats in cyber space. They can escalate from simple hacker's breach to more serious attacks that take effect over the great number of cyber terrorism victims and even to the cyber war. These circumstances require developing effective policies focusing on how to cope with new challenges and who is responsible to tackle with them. In the efforts to build an efficient, integrated, legal and politically sustainable international cybersecurity system are engaged both nation states and international organization. The result of these combined efforts is illusory confidence that there is permanent cyber peace ensuring the interests of almost all subjects from individual citizens to nation states and national and international entities. KEYWORDS: cyber security, cyber conflict, cyber war, cyber peace Si vis pacem, para bellum Latin proverb 1. Introduction The information revolution and the rapid development of information and communication technologies (ICT) make premises for new threats in cyberspace, which is an ideal platform for new covert wars and conflicts. The lack of adequate regulation and the blurred formulations allow aggressors to take advantage of the anonymity and invisibility in cyberspace without any punishment. The idea of achieving cyber peace and its placement as a main guiding principle of peaceful co-existence in cyberspace in the first decade of the 21st century is not new. But having in mind the increased cyber threats in various spheres of public life as well as the possibility of causing damages that are too important for the public relations as a result of cybercrime and cyber conflicts, it is extremely urgent to seek opportunities for

2 260 Military Art and Science joint efforts of the whole international community to achieve so desired stability and security in the global cyberspace. The aim of this study is to re-raise the discussion on this highly topical issue by offering some ideas for the development of cooperation between different countries in order to limit the damage and to successfully counter possible attacks in the virtual environment. 2. Challenges in Cyberspace In the information age, all key sectors of the survival of mankind such as security, policy, management, business, finance, transport, infrastructure, post, telecommunications, medicine and science are closely dependent on ICT. This gives grounds to assert that the Internet increasingly acquires the characteristics of the central nervous system of human society and is inextricably linked with people's daily lives. Striking examples of this are the social networks that can rapidly affect the values, ideas and behavior of large social groups. Due to their global nature, virtually there is no influence on national governments and restrictions cannot be imposed within a definite country, except of course a complete ban on access to the Web. In practice, it gives unlimited possibilities for distribution of various ideologies and ideas related to democratic transformations of social relations and human rights. At the same time, new technologies and the Internet make easily accessible different impacts on critical infrastructure of individual countries (through the collection and use of confidential information related to national security and the deployment of information wars) and create opportunities for criminal activities and attacks against both the interests of various public organizations and those of individual citizens. In the era of nation-states before the emergence and development of the global society, power relations and political leadership were based mostly on economic and military superiority of the various entities at the national and international level. Government and international organizations have created and imposed legal, social norms and values, which regulated by laws and treaties, to the possible extent, the emerging armed conflicts. The basic principle has been linked to the inviolability of national borders and territorial integrity of the Contracting Parties. Aiming more successful realization of this principle, different countries have developed, and continue to present various military and economic capabilities to defense by land, air and sea. The information revolution and the emerging threats set different from the current requirements for countries. In order to fulfill its functions, and particularly those related to national security, is required a construction and development of new capabilities for control and protection of information and communications from attacks by criminal gangs or by attempts to penetrate the systems of critical national information infrastructure. Moreover, individuals, guided by different motives can cause large, asymmetrical of the used by now means, damage to critical infrastructure, which seriously challenge the power of institutions of large and small countries in their efforts to protect national security. Besides great physical potential and immediate financial losses, the very threat of possible future cyberattacks impunity breeds distrust and reluctance to work with the new technologies in society, which in turn leads to negative attitudes in the public opinion and questions the reliability of electronic, financial and medical resources and services. Even the loss of confidence itself can lead to enormous social and economic disruption. 3. Cyber Conflict and Cyber War Phenomenas In response to cyber conflicts in society may occur a number of negative consequences, such as legal regulations

3 Military Art and Science 261 restricting and even violating human rights, and may even provoke violence (both over individual groups and between the state institutions and civil society in its entirety). With the increased activity of malevolent entities and major attacks on critical information infrastructure in the last few years it becomes possible to outline and identify phenomena as cyber conflict and cyber war. Cyber war, compared with conventional wars, is rather inexpensive; it can be initiated from anywhere and does not require large amounts of troops and weapons, but only a computer and Internet access. The cyber conflicts and cyberwars in which they can grow are among the greatest challenges of today and tomorrow. Because of the nature and speed of destruction may be affected thousands of targets across the planet. The cyberwar phenomenon itself is not discussed widely and availably for comparison and in this case even the Cold War would prove an era of publicity and openness. Therefore, the investigation and detection of problems related to the use of cyberspace as a platform for keeping secrets strife is more than obsolete. In the scientific literature it is accepted that for the first time the concept of information war was used in the publication by Thomas Rhona back in 1976 [1]. Although the fact that the exact boundaries of the cyber war phenomenon have not yet been identified and are contested in research circles a more general working definition can be formulated as a war waged in cyberspace, using information and communication technologies in order to destruct ICT probable opponent [2]. According to the security expert of the US government Richard Clarke in his book Cyber Warfare [3], cyber war this is the action of a nation state intrusion into computers or networks of other national state in order to achieve the objectives of loss or destruction. The British magazine The Economist describes cyber war as a fifth field of the war, after land, sea, air and space [4]. Assuming that cyberspace is a conceptual and physical reality, the escalation of conflicts in it to higher levels, leads to serious losses in almost all spheres of public life and allows us to introduce the concept of cyber war. Information environment creates new possibilities for military impact. It changes in a very high degree the preparation as well as the actual conduct of modern war. New technologies have made it possible to increase the precision of weapons, to achieve an exceptional degree of complexity of military offensive and defensive systems, to use ultra-modern, including spacecraft means of intelligence, to improve significantly, to the utmost degree the coordination of warring parties on the battlefield. Information from a supportive, tactical, operational maximum resource has turned into a resource of strategic importance [5, 6]. Among the main objectives of fighting in the first phases of the war is already the achieving of information superiority: To win wars today, one must first win the information war. Today the ability to collect, share, process and store information is the most important determinant of military power [7]. The intensive introduction of new electronic technologies increases to utmost degree the combat capabilities of conventional armaments and especially of the military equipment. This is the original cause that today military experts consider ICT as an extremely effective weapon, which is also the priority target for destruction because of the same quality, and assess cyberspace as a convenient area for the deployment of military action, like land and sea, air and space. As noted by a former general in the Armed Forces of the United States These communication and information technologies that connect major economic, physical and social assets have been adopted and adapted by the military and paramilitary organizations,

4 262 Military Art and Science thus bringing about revolutionary changes in warfare altering the way for planning, organizing and conducting combat operations. These quality changes include and at the same time increase the opportunities for intelligence, surveillance and evaluation, and for command and control of forces. They help optimizing the transport of forces and means, ensuring the accuracy of navigation using intellectual-saturated highly precise weapons and using «The Network» as an environment, with the assistance of which and between the limits of which are conducted military operations [8]. New information technologies allow multiple increase speed in processing large amounts of data, which eases making complex operational decisions and essentially creates new tactical methods of armed struggle. They sharply increase the combat potential of electronic systems, which turns them into a new type of information weapons intended to defeat both the military and the civilian infrastructure of the enemy by damaging or destruction of its computer networks. Using the cyber environment, the opponent may deploy information weapons (e.g. tools for data collection and analytical processing, stations for radio-electronic combat, impulse and electromagnetic weapons, etc.) and use it in a defensive or offensive operation together with traditional weapons. According to some expert data the invisible weapon is capable to end the conflict before the start of physical combat, because the escalation of information confrontation could lead to disaster for one of the opposing sides. In this sense it can be claimed that the possession of a high technology information weapon provides outstanding benefits and if not today, then in the foreseeable future will successfully compete even with nuclear weapons. These two weapons will become a powerful factor for political pressure and threat. Information weapon gradually becomes one of the main components of the military potential of modern states and today many countries, especially the highly developed (the USA, China, the Russian Federation and many others) consistently and persistently prepare for keeping information wars. To this aim also not so technologically advanced countries as they strive to acquire options for keeping information wars. It is quite possible because the information weapon has certain characteristics that make its spread fast and difficult to control. It has relatively low prices and this makes it quite accessible to various malevolent entities. It can be developed, built, implemented and even used hidden to the general public from various aggressive regimes which raise it in rank of a too dangerous global problem. 4. From Cyber Conflict to Wishfull Ciber Peace Conditioned by information weapons threat to international peace and security requires from the international community express countermeasures and monitoring of threats to information security of the national and global infrastructure. The establishment of effective mechanisms of counteraction and control faces some objectively existing problems of conceptual nature. For example, the absence of an internationally accepted consensus on the defining the phenomena information weapon, information conflict and information war. Answers to these questions are of the competence of experts from various fields of international relations and require the conduct of long lasting and difficult negotiations, but these will be the first practical steps towards the neutralization of threats of conflict and war in this so sensitive area of human relationships. The following possible actions towards fulfilment of effective regulation in the information confrontation is to achieve international arrangements for the recognition of higher overall acceptable level of protection from conflict, according to the principle of minimum necessary

5 Military Art and Science 263 communications. With the adoption of the necessary legal documents would be prevented unnecessary destruction and suffering for the participating in the conflict parties. They would also serve as a guarantee for the non-participating third countries in the conflict. If the international community is serious about the creation of an effective regime to regulate occurred and escalated cyber conflicts, it shall determine normative acts performed by private entities having aggressive character in cyberspace (e.g. terrorist attacks). In this case there is an objective difficulty for the precise identification of the perpetrators concerning subsequent legal sanction. If the attack was carried out from the territory of a country that suffers, sanctioning actions can be borrowed from the best practices of international humanitarian law (IHL). There, in the case of illegal acts or inactions related to the violation of the norms of international humanitarian law by the citizens of a particular country, the guilty party is sanctioned according to the existing national legal regulations, and to these actions usually belong the terrorist acts. If the information attack is carried out by another, often a neutral country, the guilty parties can be extradited to the country subjected to attack or be brought to justice in the country where the attack took place. Of course, the choice of options depends on the possibility to create a balance in the relation objective desire of the international community to deal with this kind of crime the existence of relevant national legislation forming environment of zero tolerance in the international community to terroristic actions in the information space. In this context people should seek an opportunity to create international regulation in cyber conflicts where the international community has to establish and adopt rules and sanctions. This regulation should include a number of obligations on signatories and the control of various NGOs and their networks. Its creation could be based on the experience of different countries in their countering the attacks on their national critical information infrastructure. Currently, in many countries have already been adopted amendments to the Penal Code and laws on cybercrime. Serious challenge that hampers the establishment of an effective international legal system of conflict management in the information space is the fact that in most developed countries there is no common understanding of the nature of cybercrime, about what action and what behavior can be classified as cybercrime. Of course, there are other, essentially subjective circumstances that hamper international cooperation in the detection of crimes in cyberspace. It is generally known that highly technologically developed countries have a number of advantages in the information space and would not like to lose them in a highly competitive and dynamically developing information environment, particularly those which relate to the national security. About the existence of these subjective reasons speaks the fact that the created in 2001 by the Council of Europe Convention on Cybercrime (CoE) to harmonize the different positions and serve as the basis of international law for cybercrime, by 2010 is ratified only from 26 countries. It should be noted that in the Convention on Cybercrime of the Council of Europe there is no determined generally acceptable definition of cybercrime, which makes more difficult the counteract to this phenomenon. Currently still there is no accepted international convention, despite the presence of several international agreements on cyber security. One of the most serious problems is that there are not any international agreements on rules for the development, dissemination and use of cyber weapons, as well as agreements governing the use of malware for military purposes. Also there is not a legal framework to limit the intelligence agencies or the military to

6 264 Military Art and Science invest in the creation and testing of cyber weapons. All this, according to the head of the laboratory Kaspersky which discovered the virus Flame, can lead to some very serious security threats, namely [9]: the emergence of an extremely dangerous virus attacking critical infrastructure sites, which would spark a regional/global socio-economic/ecological disaster; the usage of a cyber weapon provoking classical kinetic conflict; staging/provocation by a cyberattack as a justification of a military attack on another country. The first step to avoid such scenarios should be integration of cyberspace in the already agreed rules of war and peace in the other areas. 5. Concept of Cyberpeace In the recent years the concept of cyber space has been increasingly discussed on world forums dedicated to cyber security [10]. The most striking use of the term cyber peace though not in its fullness dates back to 2007 when it was used in the Cyber peace initiative within the International Women s Peace Movement of Suzanne Mubarak (SMWIPM), which was conducted on the Declaration and the United Nations Program for world culture. The mission of this initiative was the expanding of rights and opportunities for young people of all nations to use the potential of ICT for safer Internet and stimulating the innovations. The term cyber peace had been met before, but vaguely and unsystematically in the research on issues related to peace. While the terms cyberwar and cyber defense are associated with offensive and defensive actions and operations by the method of retribution, the term cyber peace should express dynamic state in which all the participants in cyberspace exhibit peaceful behavior. In this context, the cyber peace has much broader concept than in the SMWIPM version and is creating a universal order in cyberspace. Seen from this angle, the term refers more to politics and has a political focus with orientation to the correct choice of action and behavior. Of course, as with the term cybersecurity here is still no single accepted firm definition of cyber peace. As a starting point could be used the general concept of peace as a prudent state of rest, absence of disorder, distortion and violence (not only direct violence with the use of force but also indirect restrictions). Moreover, in the understanding of peace are included legal and moral principles, possibilities and procedures to regulate conflicts and achieve stability. An overall experience to formulate the concept of peace and culture is seen in the Declaration and Program of Action on a Culture, affirming the values of peace [11] of the UN General Assembly from October This document describes a set of values, attitudes, traditions, requirements and prerequisites for peace. It establishes the path that helps achieving and maintaining peace. This document, citing the UN Charter and the Decree of the United Nations Educational, Scientific and Cultural Organizations, states that wars begin in the minds of the people and therefore the defense of peace must be constructed in the mind [12]. Important elements of peace and culture of peaceful behavior, are not only the refusal of the use of force and maintenance of non-violence. There is also included a set of values and behavior patterns, international law and order, positive and dynamic processes of participation and human rights (e.g. the principles of freedom, justice, democracy, tolerance, solidarity, cooperation, pluralism, cultural diversity, dialogue, understanding and mutual assistance in resolving conflicts). The biggest emphasis is placed on the ethical component of peace in the context of cyberspace respect and consideration of human freedoms (freedom of expression and opinion and information as well as

7 Military Art and Science 265 access to information). All these principles of course have an indicative nature. 6. Principles That Would Ensure Peace and Stability in Cyberspace Recently, the International Telecommunication Union (ITU) formulated five principles that would ensure peace and stability in cyberspace. They establish specific actions and obligations and have the following idea: 1. Each government should provide its citizens with access to communications. 2. Each government is committed to protect citizens in cyberspace. 3. Each country should undertake not hiding in their territory cyber terrorists/ criminals. 4. Each country should undertake not to be the first to make the cyber attack against other countries. 5. Each country should cooperate with other countries in the framework of international cooperation for peace in cyberspace. Together with the Union, the World Organization of Scientists also engages in discussion and supplementing the above list of universal UN principles. As a result of this activity, in 2009, the principles of cyber peace are described in a brief statement in which is stressed that ICT can be a tool for the benefit of people and building a cyber peace as well as a powerful tool for creating conflicts. These principles read as follows [13]: 1. All governments should recognize that international law guarantees people free access to information and ideas and these guarantees also apply to cyberspace. Restrictions should only be imposed as necessary and accompanying measure in order to provide legal expertise. 2. All countries should cooperate in order to create a common code of conduct in cyberspace and harmonize the legal framework worldwide (incl. rules of procedure for assistance and cooperation in the investigation, but operating under privacy and human rights). All governments, service providers and users, should support international efforts to ensure the rule of law in the field of cybercrime. 3. All users, service providers and governments should support their efforts to ensure the privacy of users in cyberspace. 4. Governments, organizations and the private sector, including the citizens themselves should implement and maintain comprehensive security programs based on best practices and standards in the use of IT to ensure privacy and security. 5. People that make software and hardware should strive to develop secure technologies resistant to vulnerabilities that allow for recovery to a sustainable state. 6. Governments should actively participate in the UN programs to ensure global cyber security, cyber peace and prevention from conflicts in cyberspace. These principles and particularly the latter, require the commitment of governments not to use the potential of IT for conflicts in cyberspace. As an extension of the initiatives concerning cyber peace, in 2011 was published the book In Search for cyber peace [14]. It offers a broad understanding of cyber peace as a founding principle of the creation of a universal order in cyberspace. The next year a new initiative is proposed by the UN Sustainable Peace for a Sustainable Future. Its aim is to promote the understanding that sustainable peace can be built and maintained only on the basis of sustainable development. 7. Conclusion Indeed, looking for cyber peace at this pace of ICT development and capacity for conducting hostilities and cyberwar, governments and NGOs should cooperate in responding and revealing the sources of such hostile acts in cyberspace. Each year, the international community observes September 21 st as the International Day of Peace. This date is adopted by the General Assembly and is devoted to

8 266 Military Art and Science strengthening the ideals of peace both within countries and between them [15]. Why this date not be regarded as a day of the cyber peace? Today, achieving cyber peace is still a serious challenge to the international community. However, the challenge also entails opportunities. Whether this opportunity will be realized is a question that has no answer till now. An important condition to build and maintain peace is to know the laws of cyber jungle well. The Latin proverb, whose authorship is attributed to Plato Si vis pacem, para bellum ( If you want peace prepare for war ) is current for the new security environment too, and may be supplemented If you want peace be ready for (cyber) war! REFERENCES 1..,, (,, 2014), St. Elliot, Analysis on Defense and Cyberwars, Infosec Island. blogview/5160-analysis-on-defense-and-cyber-warfare.html, (July 2010). 3. R.A. Clarke, Cyber War. (Harper Collins, 2010). 4. Economist, Cyberwar: War in the Fifth Domain, node/ ?story_id= &source=features_box1, ( ) 5. Congressional Research Service (CRS) Report, RL31787, Information Operations, Electronic Warfare and Cyberwar, (September 14, 2006) 6.,., (, 2014), Ibidem, Gen. J. Casciano, Threat Considerations and the Law of Armed Conflict, August E. Kaspersky, Flame,, /06/14/flame-that-changed-the-world/, (accessed ) 10. UN Chief Proposes int l Accord to Prevent Cyber War, (accessed 31 January 2010). 11. Declaration and Programme of Action on a Culture of Peace. 53/243, October Ibidem. 13., 2009, ,, 2011, WFS PDF-R.pdf. 15.,

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

Finland's response

Finland's response European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China s new strengths means it has

More information

FIFTH MEETING OF MINISTERS OF JUSTICE OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004

FIFTH MEETING OF MINISTERS OF JUSTICE OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004 FIFTH MEETING OF MINISTERS OF JUSTICE OEA/Ser.K/XXXIV.5 OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004 April 28-30, 2004 Original: Spanish Washington, D.C. CONCLUSIONS

More information

STATEMENT BY AMBASSADOR ROGELIO PFIRTER DIRECTOR-GENERAL OF THE

STATEMENT BY AMBASSADOR ROGELIO PFIRTER DIRECTOR-GENERAL OF THE ORGANISATION FOR THE PROHIBITION OF CHEMICAL WEAPONS Please check against delivery STATEMENT BY AMBASSADOR ROGELIO PFIRTER DIRECTOR-GENERAL OF THE ORGANISATION FOR THE PROHIBITION OF CHEMICAL WEAPONS THE

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

CONFERENCE BACKGROUND GUIDE

CONFERENCE BACKGROUND GUIDE MODEL UNITED NATIONS CHANGE THE WORLD E M I R A T E S CONFERENCE BACKGROUND GUIDE United Nations Security Council Cyber Terrorism Dear Delegates, Welcome to the 2018 Change The World Model United Nations

More information

Conventional Deterrence: An Interview with John J. Mearsheimer

Conventional Deterrence: An Interview with John J. Mearsheimer Conventional Deterrence: An Interview with John J. Mearsheimer Conducted 15 July 2018 SSQ: Your book Conventional Deterrence was published in 1984. What is your definition of conventional deterrence? JJM:

More information

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

Somali Police Force The Commissioner

Somali Police Force The Commissioner Somali Police Force The Commissioner This is my first Policing Action Plan as Commissioner of Somali Police Force (SPF) and it sets out my national policing priorities within the SPF Strategic Action Plan

More information

Code of Conduct for Police Officers

Code of Conduct for Police Officers Code of Conduct for Police Officers In the Name of God, Most Gracious, Most Merciful By The Ministry of Interior: To the spectrum of Bahraini society, both citizens and residents, and to the police officers

More information

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD Sebastian SÂRBU, PhD Abstract: Security culture focuses on a broader scope: the ideas, customs and social behaviors, values of a group that influence the group and also society security at large. Therefore,

More information

Report on 56th session of the United Nations General Assembly Second Committee

Report on 56th session of the United Nations General Assembly Second Committee Report on 56th session of the United Nations General Assembly Second Committee Panel on High-Level Panel on Globalization and the State 2 November 2001 A panel discussion on Globalization and the State

More information

G8 Declaration on Counter Terrorism

G8 Declaration on Counter Terrorism G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism

More information

Next- Generation National Security and Public Safety in Europe

Next- Generation National Security and Public Safety in Europe A N A L Y S T C O N N E C T I O N Alan Webber Research Director Next- Generation National Security and Public Safety in Europe June 2016 As the threats and risks from cyber criminals, terrorists, gangs,

More information

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing

More information

~ 1 ~ Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection;

~ 1 ~ Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection; ~ 1 ~ Draft Resolutions Section 4 Preamble The participants of the Preparatory Colloquium for Section IV held in Helsinki from 9 to 12 June 2013 propose the following resolutions to the XIX International

More information

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

Transnational Radical Party (TRP) FILLING THE DEMOCRATIC DIGITAL DIVIDE Document WSIS/PC-2/CONTR/51-E 6 January 2003 English only Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE" A. Introduction 1. The main objective of the Second Preparatory Committee

More information

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet Annex 1 TERMS OF REFERENCE Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet 1. INTRODUCTION Modern information and communication technologies

More information

Resolution adopted by the General Assembly on 14 December [on the report of the Sixth Committee (A/70/513)]

Resolution adopted by the General Assembly on 14 December [on the report of the Sixth Committee (A/70/513)] United Nations A/RES/70/120 General Assembly Distr.: General 18 December 2015 Seventieth session Agenda item 108 Resolution adopted by the General Assembly on 14 December 2015 [on the report of the Sixth

More information

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME Lecturer Adrian Cristian MOISE, PhD. Spiru Haret University of Bucharest (ROMANIA) adriancristian.moise.@gmail.com. Abstract The Council

More information

Adopted by the Security Council at its 7317th meeting, on 20 November 2014

Adopted by the Security Council at its 7317th meeting, on 20 November 2014 United Nations S/RES/2185 (2014) Security Council Distr.: General 20 November 2014 Resolution 2185 (2014) Adopted by the Security Council at its 7317th meeting, on 20 November 2014 The Security Council,

More information

Slovak priorities for the 70th Session of the UN General Assembly

Slovak priorities for the 70th Session of the UN General Assembly Slovak priorities for the 70th Session of the UN General Assembly During the 70 th Session of the UN General Assembly Slovakia will promote strengthening of the UN system to effectively respond to global

More information

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE Russia s aggression against

More information

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org AFRICAN DECLARATION on Internet Rights and Freedoms africaninternetrights.org PREAMBLE Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including

More information

DISEC: The Question of Collaboration between National Crime Agencies Cambridge Model United Nations 2018

DISEC: The Question of Collaboration between National Crime Agencies Cambridge Model United Nations 2018 Study Guide Committee: Disarmament and International Security Council (DISEC) Topic: The Question of Collaboration between National Crime Agencies Introduction: With rapid technological advancement and

More information

Adopted by the Security Council at its 6191st meeting, on 24 September 2009

Adopted by the Security Council at its 6191st meeting, on 24 September 2009 United Nations S/RES/1887 (2009) Security Council Distr.: General 24 September 2009 (E) *0952374* Resolution 1887 (2009) Adopted by the Security Council at its 6191st meeting, on 24 September 2009 The

More information

CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH

CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH New York, Tuesday October 20th-23rd 2015 DAY 1. PLENARY SESSION GENERAL STATEMENT

More information

The Tashkent Declaration of the Fifteenth Anniversary of the Shanghai Cooperation Organization

The Tashkent Declaration of the Fifteenth Anniversary of the Shanghai Cooperation Organization The Tashkent Declaration of the Fifteenth Anniversary of the Shanghai Cooperation Organization The Heads of State of the Shanghai Cooperation Organization on the outcomes of the meeting of the Council

More information

Challenges and Solutions for EU Battlegroup Deployment within the Existing Legal Framework

Challenges and Solutions for EU Battlegroup Deployment within the Existing Legal Framework Background notes Challenges and Solutions for EU Battlegroup Deployment within the Existing Legal Framework Prepared by Nora Vanaga, Researcher, PhDc. The Centre for Security and Strategic Research, The

More information

Resolution adopted by the General Assembly. [on the report of the Sixth Committee (A/64/453)] 64/118. Measures to eliminate international terrorism

Resolution adopted by the General Assembly. [on the report of the Sixth Committee (A/64/453)] 64/118. Measures to eliminate international terrorism United Nations General Assembly Distr.: General 15 January 2010 Sixty-fourth session Agenda item 106 Resolution adopted by the General Assembly [on the report of the Sixth Committee (A/64/453)] 64/118.

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The member states of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

European action. Counterfeit, legislation, crime, Moscow Declaration, multiscetoral, consensus

European action. Counterfeit, legislation, crime, Moscow Declaration, multiscetoral, consensus focus 2 European action against counterfeit medicines Author Dr Rolf Einbeck, Institute for Statistics and International Registrations, Holzkirchen, Germany einbeck@isir.de Key words Counterfeit, legislation,

More information

Militarization of Cities: The Urban Dimension of Contemporary Security.

Militarization of Cities: The Urban Dimension of Contemporary Security. Análisis GESI, 10/2013 Militarization of Cities: The Urban Dimension of Contemporary Security. Katarína Svitková 3 de noviembre de 2013 In addition to new dimensions and new referent objects in the field

More information

Research on the Strengthen Method of Ideological and Political Education in College Students by the Wechat Carrier

Research on the Strengthen Method of Ideological and Political Education in College Students by the Wechat Carrier 2017 International Conference on Information, Computer and Education Engineering (ICICEE 2017) ISBN: 978-1-60595-503-2 Research on the Strengthen Method of Ideological and Political Education in College

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM 1 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The Member States of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

O Bezpieczeństwie i Obronności

O Bezpieczeństwie i Obronności O Bezpieczeństwie i Obronności De Securitate et Defensione NR 2(1) 2015 Marlena DRYGIEL-BIELIŃSKA, SYSTEMIC APPROACH IN SECURITY ANALYZIS Security studies, as one of the social sciences, use a number of

More information

Resolution adopted by the General Assembly. [on the report of the Sixth Committee (A/62/455)] 62/71. Measures to eliminate international terrorism

Resolution adopted by the General Assembly. [on the report of the Sixth Committee (A/62/455)] 62/71. Measures to eliminate international terrorism United Nations A/RES/62/71 General Assembly Distr.: General 8 January 2008 Sixty-second session Agenda item 108 Resolution adopted by the General Assembly [on the report of the Sixth Committee (A/62/455)]

More information

CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017

CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017 CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017 1. The Fourth ASEAN Defence Ministers Meeting-Plus (4 th ADMM-Plus) was held on 24 October

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 4.12.2017 COM(2017) 728 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Reporting on the follow-up to the EU Strategy towards the Eradication

More information

STATES PARTIES TO THE CONVENTION 3 September 2004 ON THE PROHIBITION OF THE USE, STOCKPILING, PRODUCTION AND TRANSFER OF ANTI-PERSONNEL MINES

STATES PARTIES TO THE CONVENTION 3 September 2004 ON THE PROHIBITION OF THE USE, STOCKPILING, PRODUCTION AND TRANSFER OF ANTI-PERSONNEL MINES FIRST REVIEW CONFERENCE OF THE STATES PARTIES TO THE CONVENTION 3 September 2004 ON THE PROHIBITION OF THE USE, STOCKPILING, PRODUCTION AND TRANSFER OF ANTI-PERSONNEL MINES AND ON THEIR DESTRUCTION Original:

More information

Course Descriptions Political Science

Course Descriptions Political Science Course Descriptions Political Science PSCI 2010 (F) United States Government. This interdisciplinary course addresses such basic questions as: Who has power in the United States? How are decisions made?

More information

IRELAND S CONTRIBUTION TO THE NEW MULTI- ANNUAL FREEDOM, SECURITY AND JUSTICE WORK PROGRAMME. January 2009

IRELAND S CONTRIBUTION TO THE NEW MULTI- ANNUAL FREEDOM, SECURITY AND JUSTICE WORK PROGRAMME. January 2009 IRELAND S CONTRIBUTION TO THE NEW MULTI- ANNUAL FREEDOM, SECURITY AND JUSTICE WORK PROGRAMME January 2009 Contents: Introduction 1. Legislative Measures under the new Freedom, Security and Justice Work

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Downloaded on August 16, 2018 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Region African Union Subject Security Sub Subject Terrorism Type Conventions Reference Number Place of Adoption

More information

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives. Confronting Extremism and Terrorism Major General Dr. Kamal Ahmed Amer Chairman of the Committee for Defense and National Security, and the House of Representatives. Terrorism is one of the most significant

More information

Contribution of the International College of AFNIC to the WSIS July 2003

Contribution of the International College of AFNIC to the WSIS July 2003 Contribution of the International College of AFNIC to the WSIS July 2003 Which Internet Governance Model? This document is in two parts: - the rationale, - and an annex in table form presenting Internet

More information

UNESCO S CONTRIBUTION TO THE WORK OF THE UNITED NATIONS ON INTERNATIONAL MIGRATION

UNESCO S CONTRIBUTION TO THE WORK OF THE UNITED NATIONS ON INTERNATIONAL MIGRATION UN/POP/MIG-5CM/2006/03 9 November 2006 FIFTH COORDINATION MEETING ON INTERNATIONAL MIGRATION Population Division Department of Economic and Social Affairs United Nations Secretariat New York, 20-21 November

More information

Global Changes and Fundamental Development Trends in China in the Second Decade of the 21st Century

Global Changes and Fundamental Development Trends in China in the Second Decade of the 21st Century Global Changes and Fundamental Development Trends in China in the Second Decade of the 21st Century Zheng Bijian Former Executive Vice President Party School of the Central Committee of the CPC All honored

More information

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE United Nations Chiefs of Police Summit 20-21 June 2018 UNCOPS Background Note for Session 1 PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE United Nations peacekeeping today stands at a crossroads.

More information

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA)

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA) BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA) Note: We are sharing this information and analysis with you as someone with a special interest in Canada-EU relations. For further information,

More information

Letter dated 3 November 2004 from the Permanent Representative of Paraguay to the United Nations addressed to the Chairman of the Committee

Letter dated 3 November 2004 from the Permanent Representative of Paraguay to the United Nations addressed to the Chairman of the Committee United Nations Security Council Distr.: General 24 November 2004 S/AC.44/2004/(02)/67 Original: English Security Council Committee established pursuant to resolution 1540 (2004) Letter dated 3 November

More information

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL Legal tools for prosecution of threat network agents May 26 th, 2017 C I E D C O E This report can be downloaded from: BICES NATO CIED PORTAL BICES COE CIED PORTAL http://www.ciedcoe.org/documents/documents/

More information

Measures undertaken by the Government of Romania in order to disseminate and implement the international humanitarian law

Measures undertaken by the Government of Romania in order to disseminate and implement the international humanitarian law Measures undertaken by the Government of Romania in order to disseminate and implement the international humanitarian law Romania is party to most of the international humanitarian law treaties, including

More information

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas www.coe.int/cybercrime The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas Workshop on cybercrime legislation (Bogota, 3-5 Sep 2008) Alexander

More information

Hacking and the Law. John MacKenzie

Hacking and the Law. John MacKenzie Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors

More information

Statement by. President of the Republic of Latvia

Statement by. President of the Republic of Latvia Check against delivery Permanent Mission of Latvia to the United Nations 333 East 50th Street, New York, NY 10022 Telephone (1 212) 838-8877 Fax (1 212) 838-8920 E-mail: mission.un-ny@mfa.gov.lv Statement

More information

Testimony of Peter P. Swire

Testimony of Peter P. Swire Testimony of Peter P. Swire Review Group on Intelligence and Communications Technology Before the HOUSE COMMITTEE ON THE JUDICIARY Hearing on: Examining Recommendations to Reform FISA Authorities February

More information

Background on International Organizations

Background on International Organizations Background on International Organizations The United Nations (UN) The United Nations is an international organization founded in 1945. It is currently made up of 193 Member States. The mission and work

More information

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment THE CHALLENGE OF THE GRAY ZONE Presentation to the Strategic Multilayer Assessment Michael Mazarr February 2016 The argument: In an era of networks and nuclear weapons, constrained military operations

More information

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction 1 Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction Recalling the United Nations Convention against Transnational

More information

Background. Journalists. Committee to Protect Journalists

Background. Journalists. Committee to Protect Journalists CONCEPT NOTE UN Inter-Agency Meeting on the Safety of Journalist and the Issue of Impunity 13-14 September 2011, UNESCO HQ Paris, Room X-XIV, Bonvin Building Background Over the last ten years alone, more

More information

Italy Introduces New Measures to Simplify Dual-Use Export Transactions and Sets the Sanctions Related to Trade Embargoes and Proliferating Materials

Italy Introduces New Measures to Simplify Dual-Use Export Transactions and Sets the Sanctions Related to Trade Embargoes and Proliferating Materials January 2018 Follow @Paul_Hastings Italy Introduces New Measures to Simplify Dual-Use Export Transactions and Sets the Sanctions Related to Trade Embargoes and Proliferating Materials By Bruno Cova and

More information

The European Union Strategy for Combating Radicalisation and Recruitment to Terrorism

The European Union Strategy for Combating Radicalisation and Recruitment to Terrorism COUNCIL OF THE EUROPEAN UNION The European Union Strategy for Combating Radicalisation and Recruitment to Terrorism Justice and Home Affairs Council meeting, Brussels 1 December 2005 1. Terrorism is a

More information

NATO AT 60: TIME FOR A NEW STRATEGIC CONCEPT

NATO AT 60: TIME FOR A NEW STRATEGIC CONCEPT NATO AT 60: TIME FOR A NEW STRATEGIC CONCEPT With a new administration assuming office in the United States, this is the ideal moment to initiate work on a new Alliance Strategic Concept. I expect significant

More information

NOTE from : Governing Board of the European Police College Article 36 Committee/COREPER/Council Subject : CEPOL annual work programme for 2002

NOTE from : Governing Board of the European Police College Article 36 Committee/COREPER/Council Subject : CEPOL annual work programme for 2002 COUNCIL OF THE EUROPEAN UNION Brussels, 19 October 2001 (09.11) (OR. fr,en) 12871/01 ENFOPOL 114 NOTE from : Governing Board of the European Police College to : Article 36 Committee/COREPER/Council Subject

More information

On Combating Organized Crime. Law of the Republic of Belarus. No Z of 27 June, 2007 CHAPTER I GENERAL PROVISIONS

On Combating Organized Crime. Law of the Republic of Belarus. No Z of 27 June, 2007 CHAPTER I GENERAL PROVISIONS On Combating Organized Crime Law of the Republic of Belarus No. 244 -Z of 27 June, 2007 The present Law establishes legal basis of state policy of counteraction to organized crime on matters of protection

More information

Australia and Japan Cooperating for peace and stability Common Vision and Objectives

Australia and Japan Cooperating for peace and stability Common Vision and Objectives 4 th Australia-Japan Foreign and Defence Ministerial Consultations Australia and Japan Cooperating for peace and stability Common Vision and Objectives 1. The Australian Minister for Foreign Affairs, Senator

More information

New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space

New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space Jia Huang Graduates Team School of Humanities and Social Sciences National University of

More information

( 3 ) Report of the Group of Governmental Experts on Transparency and Confidence-Building Measures in Outer Space Activities

( 3 ) Report of the Group of Governmental Experts on Transparency and Confidence-Building Measures in Outer Space Activities ( 3 ) Report of the Group of Governmental Experts on Transparency and Confidence-Building Measures in Outer Space Activities Summary The present report contains the study on outer space transparency and

More information

31/ Effects of terrorism on the enjoyment of all human rights

31/ Effects of terrorism on the enjoyment of all human rights United Nations General Assembly Distr.: Limited 23 March 2016 A/HRC/31/L.13/Rev.1 Original: English Human Rights Council Thirty-first session Agenda item 3 Promotion and protection of all human rights,

More information

UNCLASSIFIED OPENING STATEMENT BY MICHAEL V. HAYDEN BEFORE THE SENATE SELECT COMMITTEE ON INTELLIGENCE MAY 18, 2006

UNCLASSIFIED OPENING STATEMENT BY MICHAEL V. HAYDEN BEFORE THE SENATE SELECT COMMITTEE ON INTELLIGENCE MAY 18, 2006 OPENING STATEMENT BY MICHAEL V. HAYDEN BEFORE THE SENATE SELECT COMMITTEE ON INTELLIGENCE MAY 18, 2006 Thank you, Chairman Roberts and members of the Committee. It is a privilege to be nominated by the

More information

Second Comprehensive Nuclear-Test-Ban Treaty Science Diplomacy Symposium. High Level Session. [Keynote Speech]

Second Comprehensive Nuclear-Test-Ban Treaty Science Diplomacy Symposium. High Level Session. [Keynote Speech] Second Comprehensive Nuclear-Test-Ban Treaty Science Diplomacy Symposium High Level Session [Keynote Speech] Ms Izumi Nakamitsu High Representative for Disarmament Affairs United Nations Vienna 25 May

More information

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009 Madam Chairman, Mr. Vice Chairman, Members of the Committee: It is a distinct honor

More information

AN GARDA SÍOCHÁNA POLICING PLAN 2014

AN GARDA SÍOCHÁNA POLICING PLAN 2014 AN GARDA SÍOCHÁNA POLICING PLAN 2014 Table of Contents An Garda Síochána s Mission, Vision and Values 2 s Foreword 3 Minister s Policing Priorities 4 Strategic Goals Goal One Securing Our Nation 6 Goal

More information

Speech on the 41th Munich Conference on Security Policy 02/12/2005

Speech on the 41th Munich Conference on Security Policy 02/12/2005 Home Welcome Press Conferences 2005 Speeches Photos 2004 2003 2002 2001 2000 1999 Organisation Chronology Speaker: Schröder, Gerhard Funktion: Federal Chancellor, Federal Republic of Germany Nation/Organisation:

More information

The EU in Geneva. The EU and the UN. EU committed to effective multilateralism. EU major contributor to the UN

The EU in Geneva. The EU and the UN. EU committed to effective multilateralism. EU major contributor to the UN The EU in Geneva The European Union works closely with the numerous United Nations bodies, as well as other organisations based in Geneva, to promote international peace, human rights and development.

More information

United States Policy on Iraqi Aggression Resolution. October 1, House Joint Resolution 658

United States Policy on Iraqi Aggression Resolution. October 1, House Joint Resolution 658 United States Policy on Iraqi Aggression Resolution October 1, 1990 House Joint Resolution 658 101st CONGRESS 2d Session JOINT RESOLUTION To support actions the President has taken with respect to Iraqi

More information

Report on towards BRICS Vision and Strategy and the BRICS Summit Fortaleza Declaration

Report on towards BRICS Vision and Strategy and the BRICS Summit Fortaleza Declaration Report on towards BRICS Vision and Strategy and the BRICS Summit Fortaleza Declaration Professor Olive Shisana, BA (SS), MA, Sc.D Chair of the South Africa BRICS Think Tank HSRC: 29 July 2014 Acknowledgements

More information

The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law

The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law Kate Jastram and Anne Quintin 1 VII. Geography and Neutrality The final panel session was chaired by Stephen

More information

Engage Education Foundation

Engage Education Foundation 2016 End of Year Lecture Exam For 2016-17 VCE Study design Engage Education Foundation Units 3 and 4 Global Politics Practice Exam Solutions Stop! Don t look at these solutions until you have attempted

More information

Trends of Regionalism in Asia and Their Implications on. China and the United States

Trends of Regionalism in Asia and Their Implications on. China and the United States Trends of Regionalism in Asia and Their Implications on China and the United States Prof. Jiemian Yang, Vice President Shanghai Institute for International Studies (Position Paper at the SIIS-Brookings

More information

STRATEGY FOR THE PREVENTION AND SUPPRESSION OF TERRORISM, MONEY LAUNDERING AND TERRORISM FINANCING

STRATEGY FOR THE PREVENTION AND SUPPRESSION OF TERRORISM, MONEY LAUNDERING AND TERRORISM FINANCING National Commission for the Implementation of the Strategy for the Prevention and Suppression of Terrorism, Money Laundering and Terrorism Financing STRATEGY FOR THE PREVENTION AND SUPPRESSION OF TERRORISM,

More information

Thank you Madam President,

Thank you Madam President, Speech by Madam Aiying Wu, Minister of Justice of the People s Republic of China, at the High-Level Segment of the 13 th UN Congress on Crime Prevention and Criminal Justice Thank you Madam President,

More information

LIMITE EN COUNCIL. Brussels, 14 November 2008 THE EUROPEAN UNION 15175/08 LIMITE JAI 597 ENFOPOL 209 COTER 78. "A" ITEM NOTE from : COREPER

LIMITE EN COUNCIL. Brussels, 14 November 2008 THE EUROPEAN UNION 15175/08 LIMITE JAI 597 ENFOPOL 209 COTER 78. A ITEM NOTE from : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 14 November 2008 15175/08 LIMITE JAI 597 ENFOPOL 209 COTER 78 "A" ITEM NOTE from : COREPER to : COUNCIL No. prev. docs. 14781/1/05 REV 1 JAI 452 ENFOPOL 164 COTER

More information

SCHNEIDER GROUP OOO POLICY OF THE COMPANY REGARDING TO THE PERSONAL DATA PROCESSING

SCHNEIDER GROUP OOO POLICY OF THE COMPANY REGARDING TO THE PERSONAL DATA PROCESSING SCHNEIDER GROUP OOO POLICY OF THE COMPANY REGARDING TO THE PERSONAL DATA PROCESSING CONTENTS: 1. GENERAL PROVISIONS... Ошибка! Закладка не определена. 2. PRINCIPLES AND CONDITIONS OF PERSONAL DATA PROCESSING...4

More information

UNESCO Work Plan on Safety of Journalists and the Issue of Impunity

UNESCO Work Plan on Safety of Journalists and the Issue of Impunity DRAFT UNESCO Work Plan on Safety of Journalists and the Issue of Impunity Contents: 1. Introduction 2. The UNESCO Work Plan 2.1 Objective, outputs and strategic themes 2.2 Action lines 2.3 Review 3. Background

More information

Overview of OSCE Counter-Terrorism Related Commitments

Overview of OSCE Counter-Terrorism Related Commitments Overview of OSCE Counter-Terrorism Related Commitments SEC.GAL/69/18 19 April 2018 ENGLISH only Updated: March 2018 Countering Violent Extremism and Radicalization that Lead to Terrorism Countering the

More information

Ontario Model United Nations II. Disarmament and Security Council

Ontario Model United Nations II. Disarmament and Security Council Ontario Model United Nations II Disarmament and Security Council Committee Summary The First Committee of the United Nations General Assembly deals with disarmament, global challenges and threats to peace

More information

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM 2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM Adopted in Manila, the Philippines on 20 September 2017 I. GENERAL / INTRODUCTION... 2 II. AREAS OF COOPERATION... 3 III. COOPERATION WITH DIALOGUE

More information

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Key focus for questions examining on Causes of conflicts among nations: You will need to explain how the different

More information

CHARTER OF DIGITAL FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION

CHARTER OF DIGITAL FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION CHARTER OF DIGITAL FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION 1 2 PREAMBLE WHEREAS acknowledgement of the innate dignity and of the equal and inalienable rights of all persons is the basis for freedom, justice

More information

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Samuel Žilinčík and Tomáš Lalkovič Goals The main goal of this study consists of three intermediate objectives. The main goal is to analyze

More information

Declaration on the Principles Guiding Relations Among the CICA Member States. Almaty, September 14, 1999

Declaration on the Principles Guiding Relations Among the CICA Member States. Almaty, September 14, 1999 Declaration on the Principles Guiding Relations Among the CICA Member States Almaty, September 14, 1999 The Member States of the Conference on Interaction and Confidence-Building Measures in Asia, Reaffirming

More information

Albanian National Strategy Countering Violent Extremism

Albanian National Strategy Countering Violent Extremism Unofficial Translation Albanian National Strategy Countering Violent Extremism Fostering a secure environment based on respect for fundamental freedoms and values The Albanian nation is founded on democratic

More information

DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE OUTLINE

DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE OUTLINE General Conference 30th Session, Paris 1999 30 C 30 C/31 16 August 1999 Original: English Item 7.6 of the provisional agenda DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL

More information

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/63/L.48 and Add.1)]

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/63/L.48 and Add.1)] United Nations A/RES/63/138 General Assembly Distr.: General 5 March 2009 Sixty-third session Agenda item 65 Resolution adopted by the General Assembly [without reference to a Main Committee (A/63/L.48

More information

Regional Cooperation against Terrorism. Lt. General Zhao Gang. Vice President. PLA National Defense University. China

Regional Cooperation against Terrorism. Lt. General Zhao Gang. Vice President. PLA National Defense University. China Prepared for the Iff 1 ARF Conference of Heads of Defence Universities/Colleges/InstUutions Regional Cooperation against Terrorism -The Responsibility of Defense Institutions in Education and Research

More information

Chapter 22 Social Change in the Global Community. Introduction to Sociology Spring 2010

Chapter 22 Social Change in the Global Community. Introduction to Sociology Spring 2010 Chapter 22 Social Change in the Global Community Introduction to Sociology Spring 2010 Discuss the evolutionary theory of social change Social change has been defined as significant alteration over time

More information