Germany's Cybersecurity Architecture Translation of the 6Th German Edition

Total Page:16

File Type:pdf, Size:1020Kb

Germany's Cybersecurity Architecture Translation of the 6Th German Edition April 2021 · Rebecca Beigel & Dr. Sven Herpig Supported by Christina Rupp Germany's Cybersecurity Architecture Translation of the 6th German Edition Think Tank für die Gesellschaft im technologischen Wandel Impulse April 2021 Germany's Cybersecurity Architecture Table of Contens 1. Background 11 2. Visualization of Cybersecurity Architecture 13 3. Actors and Abbreviations 14 4. Explanation: Actors at EU level 27 Agentur der Europäischen Union für Cybersicherheit (European Union Agency for Cybersecurity, ENISA, official translation) 27 Agentur der Europäischen Union für justizielle Zusammenarbeit in Strafsachen (European Union Agency for Criminal Justice Cooperation, Eurojust, official translation) 27 Computer Emergency Response Team der Europäischen Kommission (Computer Emergency Response Team of the European Commission, CERT-EU, official translation) 28 Contractual Public-Private Partnership on Cybersecurity (cPPP) 28 Computer Security Incident Response Teams Netzwerk (Computer Security Incident Response Teams Network, CSIRTs Network, official translation) 29 Cyber Crisis Liaison Organisation Network (CyCLONe) 29 Cyber and Information Domain Coordination Centre (CIDCC) 30 Direktion Krisenbewältigung und Planung (Crisis Management and Planning Directorate, CMPD, official translation) 30 ENISA-Beratungsgruppe (ENISA Advisory Group, ENISA AG, official translation) 30 EU-Analyseeinheit für hybride Bedrohungen (EU Hybrid Fusion Cell, official translation) 31 Europäische Agentur für das Betriebsmanagement von IT-Großsystemen im Bereich Freiheit, Sicherheit und Recht (European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice, eu-LISA, official translation) 31 Europäische Gruppe für die Cybersicherheitszertifizierung (The European Cybersecurity Certification Group, ECCG, official translation) 32 Europäische Kommission (European Commission, EK, official translation) 32 Europäische Kooperation für Akkreditierung (European co-operation for Accreditation, EA, official translation) 33 Europäische Polizeiakademie (The European Union Agency for Law Enforcement Training, CEPOL, official translation) 33 Europäische Verteidigungsagentur (European Defence Agency, EVA, official translation) 34 Europäischer Auswärtiger Dienst (European External Action Service, EAD, official translation) 34 2 Impulse April 2021 Germany's Cybersecurity Architecture Europäische:r Datenschutzbeauftragte:r (European Data Protection Supervisor, EDSB, official translation) 35 Europäischer Rat (European Council, ER, official translation) 35 Europäisches Amt für Betrugsbekämpfung (European Anti-Fraud Office, OLAF, official translation) 35 Europäisches Polizeiamt (European Police Office, Europol, official translation) 36 Europäisches Sicherheits- und Verteidigungskolleg (European Security and Defence College, ESVK, official translation) 36 Europäisches Zentrum für Industrie, Technologie und Forschung im Bereich der Cybersicherheit (European Cybersecurity Industrial, Technology and Research Competence Centre, ECCC, official translation) 37 Europäisches Zentrum zur Bekämpfung der Cyber-Kriminalität (European Cybercrime Center, EC3, official translation) 37 European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE) 38 European Cybercrime Training and Education Group (ECTEG) 38 European Cyber Security Organisation (ECSO) 38 European Government CERTs group (EGC group) 39 European Judicial Network (EJN) 39 European Judicial Cybercrime Network (EJCN) 39 European Judicial Training Network (EJTN) 40 European Union Cybercrime Task Force (EUCTF) 40 Gemeinsame Forschungsstelle (Directorate-General Joint Research Centre, GD JRC, official translation) 40 Generaldirektion Forschung und Innovation (Directorate-General for Research and Innovation, GD RTD, official translation) 40 Generaldirektion Informatik (Directorate-General for Informatics, GD DIGIT, official translation) 41 Generaldirektion Kommunikationsnetze, Inhalte und Technologien (Directorate-General for Communications Networks, Content and Technologies, GD CONNECT, official translation) 41 Generaldirektion Migration und Inneres (Directorate-General for Migration and Home Affairs, GD HOME, official translation) 42 Gruppe der Interessenträger für die Cybersicherheitszertifizierung (Stakeholder Cybersecurity Certification Group, official translation) 42 Horizon 2020 42 Horizontal Working Party on Cyber Issues (HWP) 43 Institut der Europäischen Union für Sicherheitsstudien (European Union Institute for Security Studies, EUISS, official translation) 43 Intelligence Directorate des EU-Militärstabs (Intelligence Directorate of the European Union Military Staff, EUMS INT, official translation) 43 Inter-Service Group “Community Capacity in Crisis-Management” (ISG C3M) 44 3 Impulse April 2021 Germany's Cybersecurity Architecture Inter-Service Group “Countering Hybrid Threats” (ISG CHT) 44 Kontaktgruppe zum Schutz Kritischer Infrastrukturen (CIP Contact Group, SKI-Kontaktgruppe, official translation) 44 Kooperationsgruppe unter der NIS-Richtlinie (NIS Cooperation Group, official translation) 45 MeliCERTes 45 Militärausschuss der Europäischen Union (European Union Military Committee, EUMC, official translation) 46 NIS Public-Private Platform (NIS Platform) 46 Politisches und Sicherheitspolitisches Komitee (Political and Security Committee, PSK, official translation) 46 Rat der Europäischen Union (Council of the European Union, Council, official translation) 47 Reference Incident Classification Taxonomy Task Force (TF-CSIRT) 48 Senior Officials Group Information Systems Security (SOG-IS) 48 Ständige Strukturierte Zusammenarbeit (Permanent Structured Cooperation, PESCO, official translation) 48 Taxonomy Governance Group (TGG) 49 Zentrum für die Koordination von Notfallmaßnahmen (Emergency Response Coordination Centre, ERCC, official translation) 49 Zentrum für Informationsgewinnung und -analyse (EU Intelligence Analysis Centre, INTCEN, official translation) 49 5. Explanation: Actors at NATO level 51 Allied Command Operations (ACO) 51 Allied Command Transformation (ACT) 51 Cyber Defence Committee (CDC) 52 Emerging Security Challenges Division (ESCD) 52 Joint Intelligence and Security Division (JISD) 53 NATO Communications and Information Agency (NCIA) 53 NCI Academy 54 NATO Computer Incident Response Capability (NCIRC) 54 NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) 55 NATO Consultation, Control and Command Board (C3B) 55 NATO Cyber Defence Management Board (CDMB) 56 NATO Cyber Security Centre (NCSC) 56 NATO Cyberspace Operations Centre (CyOC) 56 NATO-Militärausschuss (NATO Military Committee, MC, official translation) 57 NATO School Oberammergau (NS-O) 57 NATO Security Committee (SC) 58 Nordatlantikrat (North Atlantic Council, NAC, official translation) 58 4 Impulse April 2021 Germany's Cybersecurity Architecture 6. Explanation: Actors at Federal Level 59 Agentur für Innovation in der Cybersicherheit (Agency for Innovation in Cybersecurity, Cyberagentur, own translation) 59 Agentur für Sprunginnovationen (Agency for Springboard Innovation, SprinD, official translation) 59 Allianz für Cyber-Sicherheit (Alliance for Cybersecurity, ACS, own translation) 60 Auswärtiges Amt (German Federal Foreign Office, AA, official translation) 60 Bundesamt für Ausrüstung, Informationstechnik und Nutzung der Bundeswehr (Federal Office of Bundeswehr Equipment, Information Technology, and In-Service Support, BAAINBw, official translation) 60 Bundesakademie für Sicherheitspolitik (Federal Academy for Security Policy, BAKS, official translation) 61 Bundesanstalt für Finanzdienstleistungsaufsicht (Federal Financial Supervisory Authority, BaFin, official translation) 61 Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (Federal Office of Civil Protection and Disaster Assistance, BBK, official translation) 61 Bundesanstalt für den Digitalfunk der Behörden und Organisationen mit Sicherheitsaufgaben (German Federal Agency for Public Safety Digital Radio, BDBOS, official translation) 62 Bundesamt für den Militärischen Abschirmdienst (Federal Office for Military Counter-Intelligence, BAMAD, official translation) 62 Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Information Security, BSI, official translation) 63 Bundesamt für Verfassungsschutz (Domestic Intelligence Service of the Federal Republic of Germany, BfV, official translation) 64 Bundesbeauftragte:r für den Datenschutz und die Informationsfreiheit (Federal Commissioner for Data Protection and Freedom of Information, BfDI, official translation) 64 Bundeskanzleramt (Federal Chancellery, BKAmt, official translation) 65 Bundeskartellamt (Federal Cartel Office, BKartA, official translation) 65 Bundeskriminalamt (Federal Criminal Police Office, BKA, official translation) 65 Bundesministerium der Justiz und für Verbraucherschutz (Federal Ministry of Justice and Consumer Protection, BMJV, official translation) 66 Bundesministerium der Verteidigung (Federal Ministry of Defence, BMVg, official translation) 66 Bundesministerium des Innern, für Bau und Heimat (Federal Ministry of the Interior, Building and Community, BMI, official translation) 67 Bundesministerium für Bildung und Forschung (Federal Ministry of Education and Research, BMBF, official translation) 67 Bundesministerium für Finanzen (Federal Ministry of Finance, BMF, official translation) 68 Bundesministerium für Gesundheit (Federal Ministry of Health, BMG, official translation) 68 5 Impulse April 2021 Germany's Cybersecurity Architecture
Recommended publications
  • Commander's Guide to German Society, Customs, and Protocol
    Headquarters Army in Europe United States Army, Europe, and Seventh Army Pamphlet 360-6* United States Army Installation Management Agency Europe Region Office Heidelberg, Germany 20 September 2005 Public Affairs Commanders Guide to German Society, Customs, and Protocol *This pamphlet supersedes USAREUR Pamphlet 360-6, 8 March 2000. For the CG, USAREUR/7A: E. PEARSON Colonel, GS Deputy Chief of Staff Official: GARY C. MILLER Regional Chief Information Officer - Europe Summary. This pamphlet should be used as a guide for commanders new to Germany. It provides basic information concerning German society and customs. Applicability. This pamphlet applies primarily to commanders serving their first tour in Germany. It also applies to public affairs officers and protocol officers. Forms. AE and higher-level forms are available through the Army in Europe Publishing System (AEPUBS). Records Management. Records created as a result of processes prescribed by this publication must be identified, maintained, and disposed of according to AR 25-400-2. Record titles and descriptions are available on the Army Records Information Management System website at https://www.arims.army.mil. Suggested Improvements. The proponent of this pamphlet is the Office of the Chief, Public Affairs, HQ USAREUR/7A (AEAPA-CI, DSN 370-6447). Users may suggest improvements to this pamphlet by sending DA Form 2028 to the Office of the Chief, Public Affairs, HQ USAREUR/7A (AEAPA-CI), Unit 29351, APO AE 09014-9351. Distribution. B (AEPUBS) (Germany only). 1 AE Pam 360-6 ● 20 Sep 05 CONTENTS Section I INTRODUCTION 1. Purpose 2. References 3. Explanation of Abbreviations 4. General Section II GETTING STARTED 5.
    [Show full text]
  • Top 17 Cases Version 4/27/2020, with Addendum
    2020 DNA Hit of the Year Top 17 Cases Version 4/27/2020, with Addendum * All addenda written by submitters. 1. Headless Outlaw’s Torso in Old Lava Tube Name of Submitter: Clark County Sheriff Bart May Location: Dubois, Idaho, U.S.A. Agency: Clark County Sheriff’s Office, Idaho Date of Crime: 1916 Date and Type of Hit: 2018-2019 (genetic genealogy to match with general family tree); 2018-2019 (familial match with living grandson to confirm family relationship) Executive Summary: 100-year-old unidentified human remains found in an old lava tube in 1979 leads to a cold case identification effort that lasts many years. However, his head was never located, baffling the FBI and other investigators for years. They could only establish that he was of European descent, with reddish-brown hair, and was about 40-years-old at the time of death. His arms, hand, and legs were found in 1991. Over the years, investigators enlisted the help of Idaho State University and its team of forensic genetic genealogists (anthropology students and staffers). This also included experts from the Smithsonian Institution and the FBI. Last year investigators further enlisted the help of the DNA Doe Project, hoping to use DNA and ancestral analysis to identify the man. Experts from Othram, a forensic DNA analysis company, analyzed samples taken from the remains, while a forensic genealogist from the DNA Doe Project worked with her colleagues to build a ‘genealogical tree’. The man’s DNA profile was then uploaded to various genetic genealogy DNA databases for relatives. This led to the man’s living 87-year-old grandson, whose sample was taken and tested to confirm a familial relationship.
    [Show full text]
  • Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program
    OMB No. 1121-0329 Approval Expires 11/30/2020 U.S. Department of Justice Office of Justice Programs Bureau of Justice Assistance The U.S. Department of Justice (DOJ), Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) is seeking applications for funding under the Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program. This program furthers the Department’s mission by supporting and assisting state, local, territorial, and tribal jurisdictions in enhancing their efforts to prevent, investigate, and respond to economic, high-technology, white collar, and internet crimes. Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program Applications Due: June 14, 2018 Eligibility Eligible applicants are limited to nonprofit or for-profit organizations (including tribal nonprofit and for-profit organizations) and institutions of higher education (including tribal institutions of higher education). Applicants must possess experience in providing training and technical assistance (TTA) on a national level to state, local, and tribal law enforcement officials, intelligence analysts, prosecutors, judges, staff who work in fusion centers, and other criminal justice entities who prevent, investigate, and respond to economic, high-technology, white collar, or internet crimes. In addition, applicants are required to have the capacity to deliver TTA nationally to include remote locations throughout the United States and its territories, as needed. The recipient and subrecipients (including any for-profit organization) must forgo any profit or management fee. BJA welcomes applications under which two or more entities would carry out the federal award; however, only one entity may be the applicant.
    [Show full text]
  • Open Government Germany – Second National Action Plan
    Second National Action Plan 2019 – 2021 Versatz 7,4 mm (3,7) Publication details Second National Action Plan (NAP) 2019 – 2021 in the Framework of Germany’s Participation in the Open Government Partnership (OGP) English translation Published by Federal Chancellery Willy-Brandt-Str. 1 10557 Berlin Germany www.open-government-deutschland.de Date of issue September 2019 Licence: Creative Commons Attribution 4.0 International (CC BY 4.0) Except where otherwise noted (illustrations and photos) Page 5: Federal Government / Steffen Kugler (Portrait) Page 8: CC BY Open Government Partnership Page 10: Federal Government / Sandra Steins Page 13: CC BY Open Government Partnership Page 28: CC BY Open Government Partnership Germany’s participation in the Open Government Partnership (OGP) Second National Action Plan 2019 – 2021 Foreword to the Second National Action Plan 4 1. Introduction 6 2. The political significance of open government in Germany 9 3. How open government is being implemented in Germany 10 3.1 Participation and engagement of civil society 10 3.2 Transparency and accountability 14 3.3 Collaboration and innovation 18 3.4 Preventing and fighting corruption 20 3.5 Digital transformation of state and society 22 3.6 Open government at the Land and municipal levels 24 4. How the OGP process works 26 5. The path from the first to the second NAP 29 6. The commitments at a glance 32 7. Detailed descriptions of the commitments 34 7.1 Regional Open Government Labs 34 7.2 Civil society dialogue on foreign policy 36 7.3 Youth participation in
    [Show full text]
  • Max Planck Institute for Foreign and International Criminal Law
    MAX PLANCK INSTITUTE FOR FOREIGN AND INTERNATIONAL CRIMINAL LAW COUNTERTERRORISM POLICIES IN GERMANY* HANS-JÖRG ALBRECHT Contents: 1. Introduction into Experiences with Terrorism and the Development of Counterterrorism Strategies in Germany................................................................... 2 1.1 Terrorist Phenomena in Germany........................................................................ 2 1.2 Responses to Terrorist Activities and Organizations between 1970 and 2000.... 5 2. After 9/11 Counterterrorism Strategies ...................................................................... 44 2.1 Introduction........................................................................................................ 44 2.2 Counterterrorism Policy after 9/11 .................................................................... 49 2.3 The Flow of Legislation after 9/11 .................................................................... 50 2.4 Dangerousness and incapacitation ..................................................................... 58 3. Summary........................................................................................................................ 61 3.1 Legislation issues............................................................................................... 61 3.2 Policies............................................................................................................... 61 Literature ..........................................................................................................................
    [Show full text]
  • 21650 Europol
    EUROPOL2006 ANNUAL REPORT EUROPOL2006 All rights reserved. No part of this publication may be reproduced or used in any form or by any means – graphic, electronic or mechanical, including photocopying, recording, taping or information storage and retrieval systems – without the permission of Europol. Photos: Gordon Below, Christian Lohse, ECB, Eurojust, European Commission, Europol and Ministry of Interior Germany. Special thanks to all law enforcement authorities of the EU Member States who contributed to this report. Europol Corporate Communications Postbox 90850 2509 LW The Hague Netherlands Tel. +31-70 302 50 00 Fax +31-70 345 58 96 E-mail: [email protected] Internet: www.europol.europa.eu © Europol, May 2007 2 Contents EUROPOL2006 1. Introduction 4 1.1 Priority crime areas in 2006 4 2. Serious crime and analysis 5 2.1 Organised crime groups 6 2.2 Drugs 7 2.3 Crimes against persons 8 2.4 Financial and property crime 11 2.5 Terrorism 13 2.6 Forgery of money and other means of payment 14 2.7 Analysis 15 2.8 General achievements 16 3. Information integrity, technology and management 17 3.1 Strategy 17 3.2 Information integrity 17 3.3 ICT infrastructure improvements 18 3.4 ICT systems improvements 18 3.5 Automated information exchange 19 3.6 Third party information exchange 20 3.7 Europol Knowledge Management Centre 21 3.8 Liaison bureaux logistics 21 4.1 Budget 22 4.2 Personnel 22 4. Corporate governance 22 4.3 Cooperation agreements 26 4.4 Public relations 28 4.5 Open sources, documentation and library 30 4.6 New Europol headquarters 30 4.7 Organisation chart 31 5.
    [Show full text]
  • T-CY Assessment Report: the Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime
    T-CY CYBERCRIME CONVENTION COMMITTEE COMITÉ DE LA CONVENTION CYBERCRIMINALITÉ T-CY(2013)17rev Strasbourg, France (Provisional) 3 December 2014 T-CY assessment report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime Adopted by the T-CY at its 12th Plenary (2-3 December 2014) www.coe.int/cybercrime Contents 1 Introduction ............................................................................................................................ 3 2 Assessment of frequency of mutual assistance and types of stored data ................................ 5 2.1 Types of data requested .................................................................................................................5 2.2 Frequency of requests ...................................................................................................................6 2.3 MLA versus police cooperation ........................................................................................................7 2.4 Spontaneous information ...............................................................................................................9 2.5 Tables on Questions 1.1 ± 1.4 ....................................................................................................... 11 3 Assessment of procedures and requirements for mutual assistance regarding accessing stored data .................................................................................................................................. 31 3.1 Requirements ............................................................................................................................
    [Show full text]
  • Guidelines for the Evaluation of Petroleum Reserves and Resources
    Guidelines for the Evaluation of Petroleum Reserves and Resources A Supplement to the SPE/WPC Petroleum Reserves Definitions and the SPE/WPC/AAPG Petroleum Resources Definitions WORLD PETROLEUM CONGRESSES Guidelines for the Evaluation of Petroleum Reserves and Resources A Supplement to the SPE/WPC Petroleum Reserves Definitions and the SPE/WPC/AAPG Petroleum Resources Definitions SOCIETY OF PETROLEUM ENGINEERS © Copyright 2001 Society of Petroleum Engineers All rights reserved. No portion of this book may be reproduced in any form or by any means, including electronic storage and retrieval systems, except by explicit, prior written permission of the publisher except for brief passages excerpted for review and critical purposes. Printed in the United States of America. ISBN 978-1-55563-105-5 05 06 07 08 09 10 11 12 13 / 9 8 7 6 5 4 3 2 Society of Petroleum Engineers 222 Palisades Creek Drive Richardson, TX 75080-2040 USA http://www.spe.org/web/store/index.shtml [email protected] 1.972.952.9393 Table of Contents Chapter 1—Introduction ..........................................................................................................1 Claude L. McMichael Chapter 2—Petroleum Resources Classification and Definitions........................................7 James G. Ross Chapter 3—Operational Issues .............................................................................................25 Claude L. McMichael and Allan Spencer Chapter 4—Current Economic Conditions...........................................................................35
    [Show full text]
  • Police Organization and Police Reform in Germany: the Case of North Rhine-Westphalia
    Police Organization and Police Reform in Germany: The Case of North Rhine-Westphalia Bernhard Frevel University of Applied Sciences of Public Administration in North Rhine-Westphalia Philipp Kuschewski German Police University Abstract The police in Germany is mainly a matter of the federal states, called „Länder”, and only the Federal Police (Bundespolizei) and Germany's Fed- eral Criminal Police Office (Bundeskriminalamt) have nationwide, though limited powers and are the responsibility of the German Federal Ministry of the Interior. Because of the important role of the Länder the focus in this article is on one state. North Rhine-Westphalia was chosen as it is the state with the largest number of habitants and of police officers. In the article three main topics are described and analyzed. The first part focuses on the police system and its reform in recent years. The second part shows some more aspects of the modernisation of the police since the 1980s, like the integration of women and ethnic minorities in the police, the different activities to enhance the status of police officers for example by better payment and better training. Also the shifts in the police programme, especially including community policing and crime prevention, are dis- cussed. In the third, the steering of the police will be looked at. In the early 1990s the New Public Management was implemented – but was confronted with great difficulties. The reform in 2007 changed the concept of steering and now favours measuring inputs and outputs instead of outcomes, and benchmarking between the 47 police authorities. Over all it will be shown that the police in North Rhine-Westphalia pro- ceeded with modernisation, civilisation, pluralisation and professionaliza- tion.
    [Show full text]
  • North American Electric Reliability Corporation Compliance Monitoring and Enforcement Program APPENDIX 4C to the RULES of PROCED
    116-390 Village Boulevard Princeton, New Jersey 08540-5721 North American Electric Reliability Corporation Compliance Monitoring and Enforcement Program APPENDIX 4C TO THE RULES OF PROCEDURE Effective: May 4, 2016 TABLE OF CONTENTS 1.0 INTRODUCTION............................................................................................................... 1 1.1 Definitions ................................................................................................................ 1 2.0 IDENTIFICATION OF ORGANIZATIONS RESPONSIBLE FOR COMPLYING WITH RELIABILITY STANDARDS .............................................................................. 1 3.0 COMPLIANCE MONITORING PROCESSES .............................................................. 2 3.1 Compliance Audits .................................................................................................. 3 3.2 Self-Certifications ................................................................................................... 9 3.3 Spot Checks ........................................................................................................... 10 3.4 Compliance Investigations ................................................................................... 11 3.5 Self-Reports ........................................................................................................... 14 3.5A Self-Logging ........................................................................................................... 15 3.6 Periodic Data Submittals .....................................................................................
    [Show full text]
  • Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus
    Loyola University Chicago Loyola eCommons Dissertations Theses and Dissertations 1993 Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus John Warren Thomas Loyola University Chicago Follow this and additional works at: https://ecommons.luc.edu/luc_diss Part of the Ancient History, Greek and Roman through Late Antiquity Commons Recommended Citation Thomas, John Warren, "Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus" (1993). Dissertations. 3288. https://ecommons.luc.edu/luc_diss/3288 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 1993 John Warren Thomas LOYOLA UNIVERSITY OF CHICAGO ROMAN CRIMINAL LAW AND LEGAL NARRATIVE IN THE NERONIAN BOOKS OF THE ANNALS OF TACITUS A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF CLASSICAL STUDIES BY JOHN WARREN THOMAS III CHICAGO, ILLINOIS MAY 1993 © Copyright by John W. Thomas III, 1993 All Rights Reserved To Kirsten Fortuna spondet multa multis, Praestat nemini. Vive in dies et horas, Nam proprium est nihil. CIL 1.1219 ACKNOWLEDGMENTS For the completion of this study I gratefully acknowledge the direction of Drs. James G. Keenan, John F. Makowski, and Fr. John P. Murphy S. J., whose criticism and advice have been invaluable.
    [Show full text]
  • Racism, Xenophobia and Ethnic Discrimination in Germany 2007
    ® RACISM, XENOPHOBIA AND ETHNIC DISCRIMINATION IN GERMANY 2007 european forum for migration studies (efms) Authors Nicole Bosch, Mario Peucker, Stefanie Reiter assisted by Dr. Klaus Michael Alenfelder and Barbara Schneider Bamberg, July 2008 Table of content Executive Summary ..........................................................................3 A. Legal issues .....................................................................8 A.1. Brief overview.................................................................................8 A.2. New legislative provisions...........................................................10 A.3 Statistical data and tables ...........................................................19 A.4. Case law........................................................................................21 A.5. Good practice ...............................................................................22 B. Racist violence and crime.............................................27 B.1. New criminal legislation...............................................................27 B.2. Complaints mechanisms: abuse of police power .....................27 B.3. Brief overview...............................................................................28 B.4 Official data and information.......................................................29 B.5. Unofficial data and information...................................................39 B.6. Good practice ...............................................................................45
    [Show full text]