Study on the Operational and Technical Security of Electronic Passports

Total Page:16

File Type:pdf, Size:1020Kb

Study on the Operational and Technical Security of Electronic Passports European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, July 2011 Legal notice The contents of this publication do not necessarily reflect the official opinion of any institution or body of the European Union. Neither Frontex nor any person or company acting on behalf of Frontex is responsible for the use that may be made of the information contained in this report. All rights reserved No part of this publication may be reproduced in any form or by any means electronic or mechanical, including photocopying, recording or by any information storage retrieval system, without permission in writing from the copyright holder. For translation or reproduction rights please contact Frontex (address information below) Information about the European Union is available on the Internet. It can be accessed through the Europa server (www.europa.eu) Frontex Agency Rondo ONZ 1 00-124 Warsaw Poland Tel: +48 22 544 9500 Fax: +48 22 544 9501 Web: www.frontex.europa.eu Enquiries: [email protected] 2 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 Introductory Note by Frontex In 2010 Frontex — also formally known as European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union — commissioned a study on the Security of Electronic Passports (e- Passports) in Europe. In the following paragraphs we briefly describe why and how this was done. Frontex Research and Development Unit As part of the Capacity Building Division at Frontex, the Research and Development Unit (RDU) is tasked to follow up on developments in research relevant to border control and disseminate this information to the end-users. The Unit‘s objectives according to the Frontex Multi Annual Plan 2010-2013 are in particular: a) to drive the process of harmonization and development of standards, both technical and operational, for border control; b) to provide for adequate representation of the common interests of the Member States in European border security research; c) to keep Member States informed concerning new technical/technological developments in the field of border control. The Unit produces guidelines and commissions studies to assess the value of new technology and to help establish priorities for the development of future capabilities for European border security. Examples of the guidelines and studies produced, or in production, by the Unit include ―Best Practice Guidelines on the Design, Deployment and Operation of Automated Border Crossing Systems (2011)‖, ―BIOPASS – Study on Automated Border Crossing systems for Registered Passengers at Four European Airports‖, ―BIOPASS II – Automated Biometric Border Crossing Systems Based on Electronic Passports and Facial Recognition: RAPID and SmartGate‖, ―Ethics of border control‖, ―Anti- corruption measures in EU border control‖. 3 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 Study on Electronic Passport Security e-Passport, as identified by the symbol at bottom-left. Since August 2006 the 27 Member States of the European Union have been required to issue e-Passports that contain a digital facial image, and since June 2009 they have been obliged to issue second generation e-Passports that also include two fingerprints. The purpose of mandating issuance of e-Passports has been to strengthen the link between the passport and the carrier of the passport, as well as to make it easier to verify the authenticity of the passport. Other European biometric initiatives include the Visa Information System currently being rolled out, which is used for 3rd country nationals applying for a visa to the Schengen area. With the increase in the numbers of e-Passports in circulation in the European Union the need arises to assess the security impact of the new technology. Border guards will be encountering e-Passports in ever greater numbers, and in some cases – most notably the Automated Border Control (ABC) systems already in operation in several major European airports – the added functionality of these passports is already being put to use for travel facilitation of European citizens. Meanwhile, the added security that e-Passports can provide, with the proviso that they are used correctly, will likely mean that fraudulent travelers will move away from falsified passports and instead seek to subvert the border control system either by attempting look-alike fraud using genuine documents, or by trying to subvert the issuance process in order to be fraudulently issued with genuine e-Passports. The Schengen borders-code, and also the Schengen handbook, provide instructions on how to conduct border checks and border surveillance, but does not deal with biometrics to any larger extent. In view of this, coupled with the widespread dissemination of e-Passports, the Frontex Research and Development Unit commissioned a study on the ―Operational and Technical security of E-passports‖ in 2010. 4 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 The tender for the study was awarded to PriceWaterhouseCoopers, working together with Collis and the digital-security group of Radboud University, Nijmegen, the Netherlands. The study group began their work in mid 2010 and the study was completed by the spring of 2011. The specific objectives of the study, as stated in the terms of reference, were as follows: a) to establish an inventory of security relevant issues in the context of the application for, production, and use of electronic passports (BAC and EAC) in Europe; b) to individuate differences among EU/Schengen member States and highlight eventual problems for interoperability when the passports are used for identification at external borders; c) to identify best practices related to the issuance processes; d) to suggest a set of recommendation to redress security gaps in the issuance process. The study included direct interviews with selected experts and a questionnaire answered by European authorities, and was concluded with a risk-analysis workshop attended by experts selected by the EU/Schengen Member States national authorities. The resulting report covers not only security but also interoperability and follows the e-Passport through all the steps of its life-cycle, from application to invalidation. e-Passport life-cycle. 5 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 Interesting issues that unfortunately had to be left outside the scope of the study include technical issues specific for e-Passport readers or the accuracy of biometric technologies. The final report of the study is presented here as it was delivered to Frontex by the study group, with only some cosmetic modifications. Frontex supported the work of the study group with guidance and contacts, but did not in any way affect the production of the report as regards conclusions and recommendations. During the concluding risk analysis workshop it was found that the attending experts in some cases held differing views on vulnerabilities and priorities, so the study should be seen as an initial wide probe into the issue of European e-Passport security. Future activities At the time of writing some of the topics under consideration by the Frontex Research & Development Unit for future action as a consequence of the study are: a) standards for evaluation of biometric systems in Europe; b) PKI technical implementation surveys; c) e-Passport interoperability; d) recommendations for e-Passport inspection procedures; e) gap analysis for border control (not limited to e-Passports). 6 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 Table of contents 1. Introduction to the study 13 2. E-passport document study 14 2.1. Introduction 15 2.2. E-passport documentation 17 2.2.1. E-passports in Europe 17 2.2.2. Security mechanisms of e-passports 17 2.3. Technical security of e-passports 25 2.3.1. Documentation 25 2.3.2. Security objectives 29 2.3.3. Conclusions 31 2.4. Issuance security of e-passports 32 2.4.1. European regulation of the issuance process 32 2.4.2. Security issues identified in literature 32 2.4.3. Conclusions 34 2.5. Usage security and interoperability of e-passports 35 2.5.1. E-passport usage 35 2.5.2. Inspection procedure 37 2.5.3. Inspection systems 40 2.5.4. Security issues 40 2.5.5. Interoperability 43 2.5.6. Configuration of security mechanisms 44 2.5.7. Mitigating the impact of known issues in genuine e-passports 45 2.5.8. Conclusions 45 3. Interview results 46 3.1. Interview results on issuance 46 3.2. Interview results on technical security and usage 47 4. Generic threat and vulnerability assessment in the e- passport life cycle 49 4.1. Introduction 49 4.2. Risk identification 50 4.2.1. Ultimate incident outcome 50 7 of 189 Operational and Technical security of Electronic Passports – Frontex, Warsaw, July 2011 4.2.2. Incident outcomes 51 4.2.3. Attack model 52 4.3. E-passport life cycle 55 4.3.1. Security management 57 4.3.2. Development and Manufacturing 57 4.3.3. Application 62 4.3.4. Entitlement 66 4.3.5. Personalisation 69 4.3.6. Delivery 73 4.3.7. Usage 76 4.3.8. Invalidation 82 4.4. Summary table of vulnerabilities per life cycle step 85 5. Questionnaire results 101 5.1. Conclusions from the questionnaire 101 5.2. Questionnaire set-up 103 5.2.1. Questionnaire responses 103 5.3. Results on issuance 104 5.3.1. Main results 104 5.3.2. Detailed results 106 5.4. Results on technical security 109 5.4.1. Main results 109 5.4.2. Detailed results 109 5.5. Results on usage 112 5.5.1.
Recommended publications
  • Small Island
    We're a Small Island: The Greening of Intolerance by Sarah Sexton, Nicholas Hildyard and Larry Lohmann, The Corner House, UK presentation at Friends of the Earth (England and Wales), 7th April 2005 Introduction (by Sarah Sexton) For those of you who remember your school days, or if you have 16-year-olds among your family and friends, you'll know that April/May is nearly GCSE exam time, 1 a time of revision, panic and ... set books. One on this year's syllabus is A Tale of Two Cities . (If you were expecting me to say Bill Bryson's Notes From A Small Island , or even better, Andrea Levy's Small Island , they're for next year. 2) Charles Dickens's story about London and Paris is set at the time of the French Revolution, 1789 onwards, a time when the English hero—I won't tell you what happens at the end just in case you haven't seen the film—didn't need an official British passport to travel to another country, although British sovereigns had long issued documents requesting "safe passage or pass" to anyone in Britain who wanted to travel abroad. It was in 1858, some 70 years later, that the UK passport became available only to United Kingdom nationals, and thus in effect became a national identity document as well as an aid to travel. 3 A Tale of Two Cities was published one year later in 1859. These days, students are encouraged to do more field work than when I was at school.
    [Show full text]
  • Governance and Authentication: Ambiguous Bits and Federated Identity May 2003
    Center for Strategic and International Studies Governance and Authentication: Ambiguous Bits and Federated Identity May 2003 How does a machine know you are who you say you are and what you are allowed to do? A car ‘knows’ you are authorized to drive it when you insert a metal key. An automatic teller knows who you are and how much is in your account when you insert a magnetic card and enter a Personal Identification Number. The machine isn’t actually confirming your identity; it is accepting a token issued to you by someone else, who may have taken steps to confirm at the time of issuance that you are who you say you are. Identity management and authentication are growing in importance as Internet and wireless applications and services become further integrated into business and consumer activities. Progress in resolving issues related to identity and authentication is essential to reach the full economic potential of the Internet and for its expanded use in providing new services. Identity and authentication also have deep implications for commerce, public safety, civil liberties, and privacy. Identity is a central problem for cyberspace. Digital technologies have introduced new ambiguities into the process of identification by removing an assertion of identity from any context in which we could judge its validity. There are no external clues and no opportunity for the subconscious process of judgment that often accompanies the acceptance of physical credentials. Ambiguous identities are a major source of uncertainty and risk in the digital networks that span the globe. Reducing this uncertainty and risk has been a goal for governments and companies since the public Internet1 began its dramatic expansion.
    [Show full text]
  • Pakistan Floods: After the Deluge & the Future of Migration?
    Winter 2010 Pakistan Floods: After the Deluge & The Future of Migration? Winter 2010 ISSN 1813-2855 Editor-In-Chief 3 Editorial Jean-Philippe Chauzy 4 Editors Jemini Pandya 4 Pakistan – After the Deluge Chris Lom Niurka Piñeiro Jared Bloch 8 Mass Communications 8 Layout Programme Talks and Listens to Valerie Hagger Joseph Rafanan Pakistan’s Flood Victims Cover Photo Asim Hafeez/OnAsia 11 Giving Voice to Haiti’s © IOM 2010 - MPK0304 11 Earthquake Victims Migration is published twice a year in English, French and Spanish. All correspondence 14 In Search of Normal: Thoughts and inquiries concerning this publication should be sent to: about Haiti after the Earthquake 14 International Organization for Migration (IOM) PO Box 71 17 Helping the Lost Youth CH Geneva 19 Switzerland of Tanzania Tel.: +41 22 717 91 11 Fax: +41 22 798 61 50 17 E-mail: [email protected] The Silent Plight of Migrant Migration is available online 23 on the IOM website: Farm Workers in South Africa http://www.iom.int IOM is committed to the 25 Tehnology, Vigilance and Sound 25 principle that humane and Judgement – Managing the Dominican orderly migration benefits migrants and society. As Republic’s Borders an intergovernmental organization, IOM acts 28 with its partners in the 28 Biometric Passport and Indentification international community Card: Armenia Enters the Digital Age to: assist in meeting the operational challenges of migration; advance understanding of migration 30 Shedding Light on South-South issues; encourage social Migration to Aid Development and economic development 30 through migration; and uphold the human dignity and well-being of migrants.
    [Show full text]
  • Evaluation of Users' Knowledge and Concerns of Biometric Passport
    data Article Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems Taban Habibu 1,* , Edith Talina Luhanga 1 and Anael Elikana Sam 2 1 Department of Applied Mathematics and Computational Sciences (AMCS), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania; [email protected] 2 Department of Communication Science and Engineering (CoSE), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania; [email protected] * Correspondence: [email protected]; Tel.: +255-684765277 Received: 21 March 2019; Accepted: 23 April 2019; Published: 29 April 2019 Abstract: The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users’ concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of technology like disclosure of personal data, improper data transmission, and data abuse were determined. Relevance knowledge of preferred technology such as the personal experience of the technology, data privacy awareness and perceived usefulness was confirmed. Threats and attacks on the technology such as counterfeit and brute-force were identified. It is important for policymakers and security expertise to understand that biometric technologies evoke fears of privacy and public liberties infringements.
    [Show full text]
  • Action Knowledge Transfer on Migrant Smuggling and Trafficking by Air and Document Fraud ____
    Action Knowledge Transfer on Migrant Smuggling and Trafficking by Air and Document Fraud ____ March 2019 Clara Alberola Chiara Janssen 1 This document has been produced with the financial assistance of the European Union, contracted by ICMPD through the Mobility Partnership Facility. The contents of this document are the sole responsibility of the authors and can under no circumstances be regarded as reflecting the position of the European Union and the one of ICMPD. Table of Contents List of Tables ............................................................................................................................................ 3 List of Figures .......................................................................................................................................... 4 List of abbreviations ................................................................................................................................ 5 Acknowledgements ................................................................................................................................. 6 Executive summary ................................................................................................................................. 7 Part 1: Presentation of the study ........................................................................................................... 10 1. Introduction .................................................................................................................................. 10 2. Objectives
    [Show full text]
  • Mimicking News How the Credibility of an Established Tabloid Is Used When Disseminating Racism
    NORDICOM REVIEW Mimicking News How the credibility of an established tabloid is used when disseminating racism Johan FarkasI & Christina NeumayerII I School of Arts and Communication, Malmö University, Sweden II Digital Design Department, IT University of Copenhagen, Denmark Abstract This article explores the mimicking of tabloid news as a form of covert racism, relying on the credibility of an established tabloid newspaper. The qualitative case study focuses on a digital platform for letters to the editor, operated without editorial curation pre-publication from 2010 to 2018 by one of Denmark’s largest newspapers, Ekstra Bladet. A discourse analysis of the 50 most shared letters to the editor on Facebook shows that nativist, far- right actors used the platform to disseminate fear-mongering discourses and xenophobic conspiracy theories, disguised as professional news and referred to as articles. These pro- cesses took place at the borderline of true and false as well as racist and civil discourse. At this borderline, a lack of supervision and moderation coupled with the openness and visual design of the platform facilitated new forms of covert racism between journalism and user-generated content. Keywords: racism, letters to the editor, borderline discourse, digital journalism, fake news Introduction Publish your own text on the biggest news website. The People’s Voice is for people who are passionate about a cause – and want to say their piece. (Ekstra Bladet, 2016)1 This quote was placed on the front page of The People’s Voice [Folkets Røst], an online platform operated by the Danish tabloid newspaper Ekstra Bladet from 2010 to 2018.
    [Show full text]
  • MAHMOUD KESHAVARZ DESIGN-POLITICS an Inquiry Into Passports, Camps and Borders
    DISSERTATION: NEW MEDIA,DISSERTATION: SPHERES,PUBLIC AND FORMS EXPRESSION OF MAHMOUD KESHAVARZ DESIGN-POLITICS An Inquiry into Passports, Camps and Borders DESIGN-POLITICS Doctoral Dissertation in Interaction Design Dissertation Series: New Media, Public Spheres and Forms of Expression Faculty: Culture and Society Department: School of Arts and Communication, K3 Malmö University Information about time and place of public defence, and electronic version of dissertation: http://hdl.handle.net/2043/20605 © Copyright Mahmoud Keshavarz, 2016 Designed by Maryam Fanni Copy editors: Edanur Yazici and James McIntyre Printed by Service Point Holmbergs, Malmö 2016 Supported by grants from The National Dissertation Council and The Doctoral Foundation. ISBN 978-91-7104-682-6 (print) ISSN 978-91-7104-683-3 (pdf) MAHMOUD KESHAVARZ DESIGN-POLITICS An Inquiry into Passports, Camps and Borders Malmö University 2016 The tradition of the oppressed teaches us that the ‘state of emergency’ in which we live is not the exception but the rule. We must attain to a conception of history that is in keeping with this insight. Then we shall clearly realize that it is our task to bring about a real state of emergency, and this will improve our position in the struggle against Fascism. Walter Benjamin, Theses on the Philosophy of History, 1969 [1940] CONTENTS ACKNOWLEDGEMENTS ................................................. 9 PREFACE ..................................................................... 13 PART I 1. INTRODUCTION: SETTING THE CONTEXT ...................
    [Show full text]
  • Passport Renewal Jacksonville Fl
    Passport Renewal Jacksonville Fl Unreposeful and joyful Prescott still fallen his profanity tomorrow. Angie remains gerundival: she regorge her headroom foot-pound.kneeing too naturalistically? Russel often reconnoitred afar when literal Millicent attiring forsakenly and gelled her Contact you apply to strive to directly charge the jacksonville fl Established Miami-based company which services all of Florida and 49 other. Passport Photos at The UPS Store Jacksonville FL located at. These appointments are renewing, fl can i use the university health certificate of british with excellence, apply for all the american association of. The near you for a week as detailed in jacksonville fl before you find your document, georgia towing equipment to elsevier products. Citizenship Agency PICA website at wwwpicagovjm to clock their passport. Natural and historic resources and plug new PassPORTS online adventure will help me it. Be expired passport can topple from a subordinate country driver's license can be. The jacksonville fl can try again in this account; terms and i stay longer than post your journal or move out that i went on. Rita kennedy is. If people need connect with document services such as passport stamps or advance parole or must an hour see the USCIS Contact Center. 2 Expedite your passport application online with us Select your all New Adult Passport Passport Renewal Lost Passport Child Passport Passport Name. As a non-resident alien without the United States and extinguish a current passport or student visa. You may also prevent your subscription by clicking on the reach below. Jacksonville Beach Expedited Passport Service Florida FL.
    [Show full text]
  • Securing Human Mobility in the Age of Risk: New Challenges for Travel
    SECURING HUMAN MOBILITY IN T H E AGE OF RI S K : NEW CH ALLENGE S FOR T RAVEL , MIGRATION , AND BORDER S By Susan Ginsburg April 2010 Migration Policy Institute Washington, DC © 2010, Migration Policy Institute All rights reserved. No part of this publication may be produced or transmitted in any form by any means, electronic or mechanical, including photocopy; or included in any information storage and retrieval system without prior permission in writing from the Migration Policy Institute. Permission for reproducing excerpts from this book should be directed to: Permissions Department, Migration Policy Institute, 1400 16th Street, NW, Suite 300, Washington, DC, 20036, or by contacting [email protected]. Library of Congress Cataloging-in-Publication Data Ginsburg, Susan, 1953- Securing human mobility in the age of risk : new challenges for travel, migration, and borders / by Susan Ginsburg. p. cm. Includes bibliographical references. ISBN 978-0-9742819-6-4 (pbk.) 1. Migration, Internal. 2. Emigration and immigration. 3. Travel. 4. Terrorism. I. Title. HB1952.G57 2010 363.325’991--dc22 2010005791 Cover photo: Daniel Clayton Greer Cover design: April Siruno Interior typesetting: James Decker Printed in the United States of America. TABLE OF CONTENTS Preface ............................................................................................................. V INTRODUCTION: THE LIMITS OF BORDER SECURITY I. MOBILITY SECURITY FACTS AND PRINCIPLES Introduction .......................................................................................31
    [Show full text]
  • On Austrian Epassport Security
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng On Austrian ePassport Security DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering & Internet Computing eingereicht von Stefan Vogl, BSc Matrikelnummer 0926857 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao. Univ. Prof. Dr. Wolfgang Kastner Mitwirkung: Dr. Christian Platzer Wien, 07.08.2014 (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at On Austrian ePassport Security MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering & Internet Computing by Stefan Vogl, BSc Registration Number 0926857 to the Faculty of Informatics at the Vienna University of Technology Advisor: Ao. Univ. Prof. Dr. Wolfgang Kastner Assistance: Dr. Christian Platzer Vienna, 07.08.2014 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Stefan Vogl, BSc Inzersdorfer Straße 80/1/13, 1100 Wien Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]
  • Of Fake Passports in Greece VICE Meets
    The “Heavy Industry” of Fake Passports in Greece VICE meets trapped migrants in Kos island who are dreaming of Europe, as also travel documents’ counterfeiters in downtown Athens. Konstantinos Koukoumakas VICE Greece October 14, 2019 It’s a Saturday on the last weekend of September, and hundreds of tourists are patiently waiting in line at the airport on Kos island for charter flights back home to central Europe. A few days earlier, the news of travel group Thomas Cook’s collapse sent the tourism industry into shock. And on this warm, early autumn evening everybody - tour operators, taxi drivers and returning tourists - are talking about the latest updates. This small airport on the East Aegean island has 15 check-in counters and nine departure gates. Between 9:10pm and 11:59pm, flights to Glasgow, London, Köln, Hanover, Manchester and Birmingham will be taking off. The airport is swarming with people; airport staff wearing colorful nylon vests giving instructions in an energetic manner, as tourists holding souvenirs from the island are taking their last selfies of the holidays. As the hours pass, the queue extends all the way into the airport car park. But not everyone waiting in line here is a tourist. On that same Saturday night, and the following Sunday, police officers arrested 10 migrants at the airport for attempting to travel on fake documents or passports. Four men and six women, aged between 19 and 49, are taken in, all of them trying to reach Europe. Thousands of migrants and asylum seekers reach the Greek islands each year, travelling from the nearby Turkish shoreline in perilous rubber boats.
    [Show full text]
  • Homeland Calling: Political Mobilization of the Albanian
    Homeland Calling: Political Mobilization of the Albanian-Macedonian Diaspora for the 2013 Local Elections in Macedonia By Erlin Agich Submitted to Central European University Nationalism Studies Program In partial fulfillment of the requirements for the degree of Masters of Art Supervisor: Professor Michael Laurence Miller CEU eTD Collection Budapest, Hungary 2013 Abstract This thesis examines the mobilization of the members of a diaspora for the purpose of engaging them in the homeland’s (local) political processes. Specifically, this thesis studies the campaign of the Democratic Union for Integration (DUI) aimed at mobilizing voters from the Albanian-Macedonian diaspora for the local elections in Kichevo, Macedonia. Based on Eva Østergaard-Nielsen’s methodological framework of analyzing transnational political processes, this thesis aims to answer three sets of questions: ‘why’ did the political leaders of DUI mobilize voters from the Albanian-Macedonian diaspora?; ‘how’ did they mobilize these voters?; and ‘then what’, that is, the implications of the mobilization. This thesis argues that a carefully crafted campaign can mobilize a large number of voters among the diaspora; whereas this mobilization can significantly impact the outcome of the political process in question. CEU eTD Collection i Acknowledgments I want to express my gratitude to the Central European University’s Nationalism Studies Department for giving me the opportunity to enroll in this Program, and to study from world renowned professors, among a very challenging group of students. I want to thank my Supervisor and Professor Michael L. Miller for his patience and interest in my thesis. His soft-spoken manner of communication motivated me to look optimistically even when I was struggling with my thesis.
    [Show full text]