1.2 Cyber Security

Total Page:16

File Type:pdf, Size:1020Kb

1.2 Cyber Security A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm A NEW VIRTUAL BATTLEFIELD Regional Cooperation Council Secretariat Trg Bosne i Hercegovine 1/V How to prevent online radicalisation 71000 Sarajevo, Bosnia and Herzegovina in the cyber security realm of the T +387 33 561 700 F +387 33 561 701 E [email protected] Western Balkans rcc.int RegionalCooperationCouncil rccint RCCSec RegionalCooperationCouncil Financed by the European Union 1 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Good. Better. Regional. A NEW VIRTUAL BATTLEFIELD Title: A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm of the Western Balkans - How to prevent online Publisher: Regional Cooperation Council Trg Bosne i Hercegovine 1/V, 71000 Sarajevo Bosnia and Herzegovina Tel: +387 33 561 700; Fax: +387 33 561 701 radicalisation in the cyber E-mail: [email protected] Website: www.rcc.int Authors: Prof. Maura Conway security realm Sheelagh Brady Editor: Amer Kapetanovic, RCC Consulting editor: Zoran Popov, RCC Design & Layout: Šejla Dizdarević ISBN: 978-9926-402-11-2 December 2018 ©RCC2018 All rights reserved. The responsibility for the content, the views, interpretations and conditions expressed herein rests solely with the authors and can in no way be taken to reflect the views Sarajevo, December 2018. of the RCC or of its participants, partners, donors or of the European Union. 2 3 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Chapter 2 - Online Radicalization in the Western Balkans .................................................... 63 TABLE OF CONTENTS Executive Summary ...........................................................................................64 Findings and Recommendations ....................................................................64 Recommendations ....................................................................................65 Chapter 1 - Cyber Security in the Western Balkans .............................................................. 6 National-level recommendations ..........................................................65 Executive Summary ............................................................................................ 7 Regional-level recommendations .........................................................65 Findings and Recommendations ..................................................................... 7 Organisations Interviewed ...................................................................................67 Recommendations ..................................................................................... 8 List of Abbreviations ..........................................................................................68 National-level recommendations ........................................................... 8 1. Introduction .................................................................................................70 Regional-level recommendations .......................................................... 8 1.1 Objectives of the overall study and objective of this report .............................70 Organisations Interviewed ...................................................................................10 1.2 Information Operations .........................................................................71 List of Abbreviations ..........................................................................................11 1.3 Online extremism and radicalisation .........................................................72 1. Introduction .................................................................................................13 1.4 Methodology ......................................................................................73 1.1 Objective of the study ..........................................................................14 2. Prevalence of Online Extremism and Radicalisation in the WB6 .................................74 1.2 Cyber Security ....................................................................................17 2.1. Kosovo* ............................................................................................75 1.3 Information Operations .........................................................................19 2.2. Bosnia and Herzegovina ........................................................................76 1.4 Methodology ......................................................................................20 2.3. Albania ............................................................................................78 2. European Environment .................................................................................. 23 2.4. The Former Yugoslav Republic of Macedonia ...............................................79 2.1 Cyber Security Strategy of the European Union ........................................... 23 2.5. Serbia .............................................................................................79 2.2 EU Legislation .....................................................................................25 2.6. Montenegro ......................................................................................80 2.3 The Budapest Convention on Cybercrime ....................................................26 2.7. Summing-up ......................................................................................81 2.4 The Digital Agenda for Europe (DAE) .........................................................27 3. European and International Environments ...........................................................82 2.5 The European Union Agency for Network and Information Security .....................28 3.1. European policy documents and strategies .................................................82 2.6 Additional Programmes and Activities ........................................................29 3.2. EU Legislation ....................................................................................90 2.7 Funding ............................................................................................30 3.3. EU agencies and networks .....................................................................92 3. Cyber Security in the Western Balkans ................................................................32 3.4. Additional programmes and activities .......................................................93 3.1 Legislation, strategies, and policies ...........................................................32 3.5. Funding ...........................................................................................98 3.2 Regional Development Agenda .................................................................34 4. Online Radicalisation and Extremism in the Western Balkans ....................................99 3.3 Challenges to operational implementation ..................................................36 4.1. Legislation, strategies, and policies .........................................................99 4. Mini Economy Case Studies ..............................................................................42 4.2. Regional Activities ............................................................................ 103 4.1 Albania .............................................................................................42 4.3 Challenges to operational implementation ................................................ 106 4.2 Bosnia and Herzegovina .........................................................................44 5. Findings and Recommendations ...................................................................... 111 4.3 Kosovo* .............................................................................................47 Recommendations .................................................................................. 112 4.4 Montenegro .......................................................................................49 5.1 National-level recommendations ............................................................ 112 4.5 Serbia ..............................................................................................52 5.2 Regional-level recommendations ............................................................ 113 4.6 The Former Yugoslav Republic of Macedonia ................................................55 5. Findings and Recommendations ........................................................................58 5.1 National-level recommendations ..............................................................58 5.2 Regional-level recommendations ..............................................................60 * This designation throughout this document is without prejudice to positions on status, and is in line with UNSCR 1244/1999 and the ICJ Opinion on the Kosovo declaration of independence 4 5 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Chapter 1 CYBER SECURITY IN THE WESTERN BALKANS 7 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm in respect of staffing, technology, and training, proach to cyber security given their broad range which is negatively impacting investigations and of perspectives, experience, and vision. EXECUTIVE SUMMARY procedure; (iv) the lack of significant public-private Identify and develop Public-Private
Recommended publications
  • Downloads/Reports/2016/Pdf/BTI 2016 Kosova.Pdf
    Tourism governance in post-war transition: The case of Kosova REKA, Shqiperim Available from the Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/24197/ A Sheffield Hallam University thesis This thesis is protected by copyright which belongs to the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Please visit http://shura.shu.ac.uk/24197/ and http://shura.shu.ac.uk/information.html for further details about copyright and re-use permissions. "Tourism governance in post-war transition: the case of Kosova" Shqiperim Reka A thesis submitted in partial fulfilment of the requirements of Sheffield Hallam University for the degree of Doctor of Philosophy February 2017 Abstract The aim of this research study was to examine tourism governance in post-war transition with specific reference to the influence of political, economic and social factors, institutional arrangements, collaboration and power relations. Within this context, a crucial objective was to assess the role of mindset. Reviewing the literature in relation to the key concepts, it was discovered that research tends to focus on political and economic transition, whereas the social dimension, despite its importance, is largely neglected. Similarly, tourism governance has been overlooked in studies of tourism in post-war transition. Furthermore, the literature on tourism governance rarely takes the issue of mindset into account. To address these gaps in knowledge, a qualitative research approach was applied to study tourism governance in post-war transitional Kosova.
    [Show full text]
  • The First Illyrian War: a Study in Roman Imperialism
    The First Illyrian War: A Study in Roman Imperialism Catherine A. McPherson Department of History and Classical Studies McGill University, Montreal February, 2012 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Arts ©Catherine A. McPherson, 2012. Table of Contents Abstract ……………………………………………….……………............2 Abrégé……………………………………...………….……………………3 Acknowledgements………………………………….……………………...4 Introduction…………………………………………………………………5 Chapter One Sources and Approaches………………………………….………………...9 Chapter Two Illyria and the Illyrians ……………………………………………………25 Chapter Three North-Western Greece in the Later Third Century………………………..41 Chapter Four Rome and the Outbreak of War…………………………………..……….51 Chapter Five The Conclusion of the First Illyrian War……………….…………………77 Conclusion …………………………………………………...…….……102 Bibliography……………………………………………………………..104 2 Abstract This paper presents a detailed case study in early Roman imperialism in the Greek East: the First Illyrian War (229/8 B.C.), Rome’s first military engagement across the Adriatic. It places Roman decision-making and action within its proper context by emphasizing the role that Greek polities and Illyrian tribes played in both the outbreak and conclusion of the war. It argues that the primary motivation behind the Roman decision to declare war against the Ardiaei in 229 was to secure the very profitable trade routes linking Brundisium to the eastern shore of the Adriatic. It was in fact the failure of the major Greek powers to limit Ardiaean piracy that led directly to Roman intervention. In the earliest phase of trans-Adriatic engagement Rome was essentially uninterested in expansion or establishing a formal hegemony in the Greek East and maintained only very loose ties to the polities of the eastern Adriatic coast.
    [Show full text]
  • Cyber-Conflict Between the United States of America and Russia CSS
    CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber-conflict between the United States of America and Russia Zürich, June 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber-conflict between the United States of America and Russia Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: Cyber-conflict between the United States of America and Russia, June 2017, Center for Security Studies (CSS), ETH Zürich. 2 Cyber-conflict between the United States of America and Russia Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Tools and techniques 9 3.2 Targets 10 3.3 Attribution and actors 10 4 Effects 11 4.1 Social and internal political effects 11 4.2 Economic effects 13 4.3 Technological effects 13 4.4 International effects 13 5 Consequences 14 5.1 Improvement of cybersecurity 14 5.2 Raising awareness of propaganda and misinformation 15 5.3 Observation of the evolution of relations between the USA and Russia 15 5.4 Promotion of Confidence Building Measures 16 6 Annex 1 17 7 Glossary 18 8 Abbreviations 19 9 Bibliography 19 3 Cyber-conflict between the United States of America and Russia Executive Summary Effects Targets: US State institutions and a political The analysis found that the tensions between the party.
    [Show full text]
  • Albanian Catholic Bulletin Buletini Katholik Shqiptar
    ISSN 0272 -7250 ALBANIAN CATHOLIC BULLETIN PUBLISHED PERIODICALLY BY THE ALBANIAN CATHOLIC INFORMATION CENTER Vol.3, No. 1&2 P.O. BOX 1217, SANTA CLARA, CA 95053, U.S.A. 1982 BULETINI d^M. jpu. &CU& #*- <gP KATHOLIK Mother Teresa's message to all Albanians SHQIPTAR San Francisco, June 4, 1982 ALBANIAN CATHOLIC PUBLISHING COUNCIL: ZEF V. NEKAJ, JAK GARDIN, S.J., PJETER PAL VANI, NDOC KELMENDI, S.J., BAR­ BULLETIN BARA KAY (Assoc. Editor), PALOK PLAKU, RAYMOND FROST (Assoc. Editor), GJON SINISHTA (Editor), JULIO FERNANDEZ Volume III No.l&2 1982 (Secretary), and LEO GABRIEL NEAL, O.F.M., CONV. (President). In the past our Bulletin (and other material of information, in­ cluding the book "The Fulfilled Promise" about religious perse­ This issue has been prepared with the help of: STELLA PILGRIM, TENNANT C. cution in Albania) has been sent free to a considerable number WRIGHT, S.J., DAVE PREVITALE, JAMES of people, institutions and organizations in the U.S. and abroad. TORRENS, S.J., Sr. HENRY JOSEPH and Not affiliated with any Church or other religious or political or­ DANIEL GERMANN, S.J. ganization, we depend entirely on your donations and gifts. Please help us to continue this apostolate on behalf of the op­ pressed Albanians. STRANGERS ARE FRIENDS News, articles and photos of general interest, 100-1200 words WE HAVEN'T MET of length, on religious, cultural, historical and political topics about Albania and its people, may be submitted for considera­ tion. No payments are made for the published material. God knows Please enclose self-addressed envelope for return.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • The Impact of Albanian Transnational Migration to Greece on Socio
    The Impact of Albanian Transnational Migration to Greece on Socio- Economic Development in Fier, Albania: A Case Study By Marinela Semanjaku A Thesis Submitted to Saint Mary’s University, Halifax, Nova Scotia In Partial Fulfillment of the Requirements for the Degree of Master of Arts in International Development Studies August 2020, Halifax, Nova Scotia © Marinela Semanjaku, 2020 Approved: Dr. Evangelia Tastsoglou Supervisor Approved: Dr. Sandy Petrinioti Internal reader Approved: Dr. Cathy Conrad External Examiner Date: August 25, 2020 Dedication I would like to dedicate this work to my husband, Kostas, who has been a constant source of support, patience, love and encouragement during all the challenges of graduate school and life, and to my daughters Fedhra, and baby girl Elektra, who was born a couple of hours after I submitted the last revisions that the second reader had asked. They mean the world to me!! To my parents, Elisaveta and Leonidha, who have crossed the Atlantic Ocean multiple times in the last two years to support me with great care and unconditional love. They kept me going and this thesis would not have been possible without their devotion. ii Acknowledgement I wish to express my sincere gratitude to my supervisor, Professor Evangelia Tastsoglou. It is whole-heartedly appreciated that your thoughtful advice for my study proved absolutely essential for the success of this thesis. Thank you for your constant encouragement, support and insightful feedback, advice and comments on my thesis. I would like to thank my internal reader, Dr. Sandy Petrinioti, for all suggestions and comments on the development of my thesis work.
    [Show full text]
  • Illyrian Policy of Rome in the Late Republic and Early Principate
    ILLYRIAN POLICY OF ROME IN THE LATE REPUBLIC AND EARLY PRINCIPATE Danijel Dzino Thesis submitted for the degree of Doctor of Philosophy in the Department of Classics University of Adelaide August 2005 II Table of Contents TITLE PAGE I TABLE OF CONTENTS II ABSTRACT V DECLARATION VI ACKNOWLEDGMENTS VII LIST OF FIGURES VIII LIST OF PLATES AND MAPS IX 1. Introduction, approaches, review of sources and secondary literature 1.1 Introduction 1 1.2 Rome and Illyricum (a short story) 2 1.3 Methodology 6 1.4.1 Illyrian policy of Rome in the context of world-system analysis: Policy as an interaction between systems 9 1.4.2 The Illyrian policy of Rome in the context of world-system analysis: Working hypothesis 11 1.5 The stages in the Roman Illyrian relationship (the development of a political/constitutional framework) 16 1.6 Themes and approaches: Illyricum in Roman historiography 18 1.7.1 Literature review: primary sources 21 1.7.2 Literature review: modern works 26 2. Illyricum in Roman foreign policy: historical outline, theoretical approaches and geography 2.1 Introduction 30 2.2 Roman foreign policy: Who made it, how and why was it made, and where did it stop 30 2.3 The instruments of Roman foreign policy 36 2.4 The place of Illyricum in the Mediterranean political landscape 39 2.5 The geography and ethnography of pre-Roman Illyricum 43 III 2.5.1 The Greeks and Celts in Illyricum 44 2.5.2 The Illyrian peoples 47 3. The Illyrian policy of Rome 167 – 60 BC: Illyricum - the realm of bifocality 3.1 Introduction 55 3.2 Prelude: the making of bifocality 56 3.3 The South and Central Adriatic 60 3.4 The North Adriatic 65 3.5 Republican policy in Illyricum before Caesar: the assessment 71 4.
    [Show full text]
  • Threat Landscape Report – 1St Quarter 2018
    TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018.
    [Show full text]
  • With an English Translation
    THE LOEB CLASSICAL LIBRARY FOUNDED BY JAMES LOEB, LX,.D. EDITED BY fT. E. PAGE, C.H., LITT.D. E. CAPPS, PH.D., LL.D. tW. H. D. ROUSE, litt.d. A. POST, M.A. E. H. WARMINGTON, m.a., f.r.hist.soc. LIVY XIII BOOKS XLIII—XLV m^( LIYY WITH AN ENGLISH TRANSLATION IN FOURTEEN VOLUMES XIII BOOKS XLIII—XLV TRANSLATED BY ALFRED C. SCHLESINGER, Ph.D. ASSOCIATE PROFESSOR OP CLASSICS IN OBERLIN COLLEGE LONDON WILLIAM HEINEMANN LTD CAMBRIDGE, MASSACHUSETTS HARVARD UNIVERSITY PRESS MCMLI Printed in Great Britain V.I3 TRANSLATOR'S PREFACE A FULLER report of the text is given in this vohmie than in the immediately preceding volume. The attempt has been made to present all emendations subsequent to the editio pri?iceps ; but a few repeated misspellings of proper names and similarly obvious corrections are not reported. A few of the emenda- tions of the princeps have been included exempli gratia. The apparatus of Giarratano (Titi Livi Ah Urhe Condita Libri XLI-XLF, Rome, 1933) has been constantly consulted, but not always followed. The maps are intended to show the location of all places mentioned in the volume, if the location is known. Kiepert's Atlas Antiquus has been used in preparing these maps ; places not located by Kiepert have a question-mark following the name. Where the name is spelled by Kiepert in a way conspicuously different from the Livy text, the Kiepert spelling will be found in parentheses in the Index. The map of Rome is taken from O. Richter, Topograpkie der Stadt Rom, Miinchen, Beck, 1901 (Iwan MuUer, Handbuch, III, 3), by kind permission of the pub- lishers.
    [Show full text]
  • Albania During 2019-2020 Period
    Voluntary Review Report of the status of implementation of the GCM in Albania during 2019-2020 period I. Methodology 1.1. Scope of the Voluntary Review Report The Voluntary Review Report assesses the status of implementation of the GCM in Albania during 2019-2020 period. The review is focused on the status of implementation of the 23 GCM objectives, with particular focus on innovative policies and promising practices related to these objectives; measures and institutional changes; barriers and challenges; synergies with regional development; lessons learned and how these will be “translated” into recommendations. The Report is focused on the following topics: i) How the GCM vision, common understanding, shared responsibilities and unity of purpose regarding migration guide the work of the stakeholders; ii) How the guiding principles of the GCM (people-centered: international cooperation; national sovereignty; rule of law and due process; sustainable development; human rights; gender-responsiveness; child-sensitiveness; whole-of-government approach; and whole-of- society approach) are implemented; iii) How Albania has developed follow-up responses for the implementation of the GCM and the effort of country’s stakeholders to implement these responses. 1.2.Techniques The Report is prepared using the following techniques: i) Desk review for examining the efforts of the institutions and agencies of the Albanian Government in implementing GCM objectives; ii) Semi-structured interviews with some of the most relevant stakeholders; iii) The information collected through the above techniques is compared with the status of implementation of GCM objectives. 1.3.Limitations and obstacles Some of the limitations and obstacles during the preparation of the Report were: i) The structures responsible for migration issues are dispersed among several ministries.
    [Show full text]
  • (BGFIEND OPERATIONS) 0051.Pdf
    SECRET CONTROL U.S. Orme, at ft ONLY ()debar 1949 KIDIC44AliDUIA TOI Assistant Director for Special operations ?ROM$ Chiefs Foraign Division P 8U/1410T (Weems, wit/C.- _lon 16 and 17 September 1949 ro Albanian Operation ma following momorandum is based on notes taken by c_ . ] and _Din the course of a oonferenee wiwith C: at the NotaiiStatler on the morning and aftarnoon of 16 Ssptembar sad the nom ing of 17 September 1949. rhose attampulinz this sentsrsnoe inaluded C__ ,] Angletov C _For your assistanos in reading this menorandum, we are attaching joppy of this questionnaire which served as a basis for discussion. 1. In reply to tho question as to what had been told the Greeks with regard to the Albanian operationsC jatated that Anbassador Grady had advisod Foreign Minister Tsaldaris in general term of the formation of the Albanian Oasmaittoa, and that Mt. Burton Y. Berry and Mr. Reber G. Miner had also infonsod Permanent UndarSeorstary of Foreign Affairs Pipinelis. So far as .C. jknew. this was the only official word Joh had been given to the Oreeks. Onoffisialtyl j know of no information which had been passed to thaws and he lf had had no contacts with any Groeks on this subjeart. 64 was uncertain an towhatC- ]Xight or might not have indiostod to Greek contacts. e _jhad himself advised Gametal Van Float and General Jenkins of the operation. and General Van Met planned to brief his U.S 0MB, whom. arrival was expected shortly, and his Chief of Staff. General Tan Float had no contact with the Greeks in re.
    [Show full text]