Evaluatie Wet Op De Inlichtingen- En Veiligheidsdiensten 2002

Total Page:16

File Type:pdf, Size:1020Kb

Evaluatie Wet Op De Inlichtingen- En Veiligheidsdiensten 2002 Evaluatie Wet op de inlichtingen- en veiligheidsdiensten 2002 Naar een nieuwe balans tussen bevoegdheden en waarborgen. EEvaluatie Wet op de inlichtingen- en veiligheidsdiensten 2002 Naar een nieuwe balans tussen bevoegdheden en waarborgen VVoorwoord De Commissie evaluatie Wiv 2002 is in februari 2013 ingesteld om de Wet op de inlichtingen- en veiligheidsdiensten 2002 te evalueren. De commissie is zodanig samengesteld dat daarmee geborgd is dat de commissie als geheel deskundigheid en affiniteit bezit met betrekking tot het (wettelijk) kader waarbinnen veiligheidsdiensten, civiel en militair, in een democratische samenleving behoren te opereren. De brede samenstelling heeft ertoe geleid dat er steeds vruchtbaar overleg heeft plaatsgevonden in de commissievergaderingen, waarin de aandachtsgebieden mensenrechten, wetsevalu- atie en werkzaamheden van de van inlichtingen- en veiligheidsdiensten onderling goed gewogen konden worden besproken. De evaluatiecommissie spreekt haar waardering uit voor de medewerking van de betrokken ministeries en meer specifiek de AIVD en MIVD aan het voorzien van de commissie van de benodigde en gewenste informatie. De evaluatiecommissie heeft in dit onderzoek een breed palet aan deskundigen en verantwoordelijken bevraagd en heeft twee deelonderwerpen bij daarin gespecialiseerde organisaties uitbesteed. De evaluatie- commissie is deze organisaties en alle personen met wie zij heeft gesproken in het kader van dit onderzoek, zeer erkentelijk voor hun medewerking. Zonder hun inbreng had dit rapport niet tot stand kunnen komen. De evaluatiecommissie constateert dat de Wiv 2002 aanpassing behoeft. In dit rapport wordt uiteengezet waarom een aanpassing nodig is en op welke onderdelen van de wet. De commissie heeft daarbij voortdurend voor ogen gehad dat inlichtingen- en veilig- heidsdiensten alleen dan hun rol in een democratische samenleving goed kunnen vervullen als zij enerzijds over de juiste, noodzakelijke bevoegdheden beschikken en anderzijds die bevoegdheden goed in balans zijn met de waarborgen, die moeten gelden in een democratische samenleving. De evaluatiecommissie spreekt de hoop en verwach- ting uit dat de lezer hiermee tot de opvatting komt dat er een weloverwogen oordeel over de Wiv 2002 is gegeven. De commissie is niet zover willen gaan om in dit rapport concrete wetsvoorstellen te doen, maar wel geeft het rapport de kaders aan waaraan de wet naar haar mening zou moeten voldoen. C.W.M. Dessens, voorzitter IInhoudsopgave Lijst van afkortingen 6 Beschouwing 8 1 Aanleiding en doelstelling van het onderzoek 12 1.1 Aanleiding 13 1.2 Doelstelling 14 2 Onderzoeksverantwoording en indeling rapport 16 2.1 Onderzoeksverantwoording 17 2.2 Indeling rapport 20 3 De Wet op de inlichtingen- en veiligheidsdiensten 2002 – een balans tussen nationale veiligheid en rechtsstatelijke waarborgen? 22 3.1 Inleiding 23 3.2 Voorgeschiedenis en aanleiding voor de Wiv 2002 23 3.3 Opbouw en algemene kenmerken van de Wiv 2002 27 3.4 Doelstellingen van de Wiv 2002 27 3.5 Taken van de AIVD en de MIVD 29 3.6 Bevoegdheden van de diensten 35 3.7 Democratische en rechtsstatelijke waarborgen 39 3.8 Reikwijdte van de Wiv 41 3.9 Voorstellen tot wijziging van de Wiv 2002 42 3.10 Deelconclusies en aanbevelingen Wiv en waarborgen 44 4 Sturing en toezicht 46 4.1 Inleiding 47 4.2 Sturing 47 4.3 Deelconclusies en aanbevelingen over de sturing 56 4.4 Extern toezicht 57 4.5 Deelconclusies en aanbevelingen toezicht en waarborgen 68 4 5 Inzet van bijzondere bevoegdheden in de digitale wereld 70 5.1 Inleiding 71 5.2 Technologische ontwikkelingen 71 5.3 Conclusies en aanbevelingen over kabelgebonden interceptie 78 5.4 Cyber 85 5.5 Extern toezicht op de inzet van bijzondere bevoegdheden 89 5.6 Deelconclusies en aanbevelingen bijzondere bevoegdheden en waarborgen 106 6 Samenwerking 108 6.1 Inleiding 109 6.2 Samenwerking tussen de AIVD en MIVD 109 6.3 Samenwerking met buitenlandse diensten 117 6.4 Samenwerking met politie, Koninklijke Marechaussee, rijksbelastingdienst en IND 119 6.5 Samenwerking met het Openbaar Ministerie 125 6.6 Overige samenwerkingsvormen: samenwerking met de NCTV en de NCSC 128 6.7 Deelconclusies en aanbevelingen samenwerking 129 7 Overige waarborgen 132 7.1 Inleiding 133 7.2 Kennisneming van gegevens (inzagerecht) 134 7.3 Notificatie 142 7.4 Behandeling van klachten over de AIVD en de MIVD 145 7.5 Het gebruik van geheime stukken in gerechtelijke procedures 152 7.6 Vernietiging en archivering van gegevens 158 7.7 Deelconclusies en aanbevelingen overige waarborgen 164 8 Conclusies en aanbevelingen 166 8.1 Opdracht 167 8.2 Conclusies en aanbevelingen Wiv en waarborgen 168 8.3 Conclusies en aanbevelingen Sturing 169 8.4 Conclusies en aanbevelingen Toezicht 170 8.5 Conclusies en aanbevelingen Inzet van bijzondere bevoegdheden in de digitale wereld 171 8.6 Conclusies en aanbevelingen Samenwerking tussen de AIVD en MIVD 173 8.7 Conclusies en aanbevelingen Samenwerking tussen de diensten en andere organisaties 174 8.8 Conclusies en aanbevelingen Overige waarborgen 175 Bijlagen 1 Samenstelling Commissie en secretariaat 178 2 Instellingsregeling 180 3 Literatuurlijst 188 5 Lijst van afkortingen ABRS Afdeling Bestuursrechtspraak van de Raad van State AIVD Algemene Inlichtingen- en Veiligheidsdienst AMvB Algemene maatregel van bestuur AO Algemeen Overleg appl. nr. Application number (van een klacht bij het EHRM) Awb Algemene wet bestuursrecht BD Bijzondere Dienst BES Bonaire, Sint Eustatius en Saba BID Buitenlandse Inlichtingendienst BIM Wet op de Bijzondere Inlichtingenmethode (België) BSB Brigade Speciale Beveiligingsopdrachten BZ Buitenlandse Zaken BZK Binnenlandse Zaken en Koninkrijksrelaties BVD Binnenlandse Veiligheidsdienst CAOP Centrum Arbeidsverhoudingen Overheidspersoneel CBP College Bescherming Persoonsgegevens CDS Commandant der Strijdkrachten CIVD Commissie voor de Inlichtingen- en Veiligheidsdiensten (Tweede Kamer) CNCIS Commission Nationale de Controle des Interceptions de Sécurité (Frankrijk) CND Computer Network Defense CNE Computer Network Exploitation Coördinator IVD Coördinator van de Inlichtingen- en Veiligheidsdiensten CPG Centrum Parlementaire Geschiedenis CPN Communistische Partij van Nederland CT Infobox Contra Terrorisme Infobox CTIVD Commissie van Toezicht betreffende de Inlichtingen- en Veiligheidsdiensten CVIN Comité Verenigde Inlichtingendiensten Nederland CZW Constitutionele Zaken en Wetgeving (ministerie van BZK) DefCert Defensie Computer Emergency Response Team DIVR Defensie Inlichtingen- en Veiligheidsraad ECRM Europese Commissie voor de Rechten van de Mens EHRM Europese Hof voor de Rechten van de Mens EVRM Europees Verdrag tot bescherming van de rechten van de mens en de fundamentele vrijheden EU Europese Unie FIOD Fiscale Inlichtingen- en Opsporingsdienst 6 FIU Financial Intelligence Unit GovCert Computer Emergency Response Team HF High frequency ICT Informatie- en communicatietechnologie IDB Inlichtingendienst Buitenland IND Immigratie- en Naturalisatiedienst Inspectie OOV Inspectie Openbare Orde en Veiligheid IP Internet Protocol IPT Investigatory Powers Tribunal I&V-diensten Inlichtingen- en veiligheidsdiensten JSCU Joint Sigint Cyber Unit KB Koninklijk Besluit KLPD Korps Landelijke Politiediensten KMar Koninklijke Marechaussee LID Landelijke Inlichtingendienst LOvJ Landelijk Officier van Justitie MICIV Ministeriële Commissie voor de inlichtingen- en veiligheidsdiensten MID Militaire Inlichtingendienst MIVD Militaire Inlichtingen- en Veiligheidsdienst NAVO Noord-Atlantische Verdragsorganisatie NCSC Nationaal Cyber Security Centrum NCTV Nationaal Coördinator Terrorismebestrijding en Veiligheid NCTb Nationaal Coördinator Terrorismebestrijding NFI Nederlands Forensisch Instituut NSA National Security Agency NSO Nationale Sigint Organisatie OM Openbaar Ministerie para. paragraaf RFI Request for Information RID Regionale Inlichtingendienst RIV Raad voor de Inlichtingen- en Veiligheidsdiensten Sigint Signals Intelligence SG Secretaris-generaal SIOD Sociale Inlichtingen- en Opsporingsdienst Stb. Staatsblad Stcrt. Staatscourant TCG Team Caribisch Gebied UCP Unit Contraproliferatie VenJ Veiligheid en Justitie VN Verenigde Naties WiFi Wireless Fidelity Wiv 2002 Wet op de inlichtingen- en veiligheidsdiensten 2002 Wob Wet openbaarheid van bestuur 7 Beschouwing Inlichtingen- en veiligheidsdiensten (I&V-diensten) spelen een belangrijke rol in een democratische rechtsstaat. Enerzijds zijn deze diensten nodig om de democratische rechtsstaat te beschermen en de grondrechten van haar burgers te waarborgen. Anderzijds doen die diensten hun werk met gebruikmaking van bijzondere bevoegdhe- den, die inbreuk kunnen maken op diezelfde grondrechten van burgers. In het belang van de nationale veiligheid is het noodzakelijk dat diensten in het geheim kunnen opereren en vertrouwelijk informatie kunnen delen en verwerken. Wil een democratische samenle- ving blijvend vertrouwen kunnen hebben en houden in het werk van veiligheidsdiensten dan is het zaak een goede balans te vinden tussen de effectiviteit van hun operationele vermogen (de – bijzondere – bevoegdheden, geheimhouding, capaciteit) en het waarbor- gen van rechtsstatelijke garanties zoals grondrechtenbescherming, alsmede effectieve en in een democratische rechtsorde passende controle en toezicht op hun werk (zo groot mogelijke transparantie, adequate sturing en een stevig toezicht). Die balans en dat vertrouwen zijn geen gegeven: ze vergen voortdurende doordenking en herijking in een snel veranderende wereld. De ontwikkelingen in de wereld om ons heen De nationale
Recommended publications
  • From the Editor
    EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists.
    [Show full text]
  • Russian Meddling in Western Elections, 2016-2017: a Preliminary
    RUSSIAN MEDDLING IN WESTERN ELECTIONS, 2016-2017: A PRELIMINARY PROBE By Guillermo Lopez Sanchez A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Arts with a Major in International Studies May 2018 Committee Members: Dennis J. Dunn, Chair Ronald Angelo Johnson Sandhya Rao COPYRIGHT by Guillermo Lopez Sanchez 2018 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgement. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Guillermo Lopez Sanchez, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I express my gratitude to Dr. Dennis J. Dunn, Professor of History and Director of the Center for International Studies at Texas State University. His dedication, knowledge, and support since I began the Master of Arts with a major in International Studies were invaluable. In addition, my appreciation is extended to Dr. Ronald Angelo Johnson, Associate Professor in the Department of History; and Dr. Sandhya Rao, Professor in the Department of Mass Communication, for their outstanding advice and assistance. Collectively, they strengthened my resources, asked probing questions that helped me sharpen my focus, and provided valuable insights that benefitted my research. I also wish to express my appreciation to Jeremy Pena, Coordinator of Academic Programs at the Center for International Studies, for his administrative support.
    [Show full text]
  • Civil-Military Capacities for European Security
    Clingendael Report Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee Civil-Military Capacities for European Security Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. Image rights: Drone, Binary Code: © Shutterstock.com Search and Rescue squadron: © David Fowler / Shutterstock.com Design: Textcetera, The Hague Print: Gildeprint, Enschede Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Content Executive summary 7 Introduction 11 1 The external-internal security gap 13 2 Case study maritime security 25 3 Case study border security 39 4 Case study cyber security 53 5 Conclusions and recommendations 64 List of acronyms 70 5 Executive summary In the last two decades the European Union has created separated policies, institutions and capacities for external and internal security. In the meantime the world’s security environment has changed fundamentally. Today, it is no longer possible to make a clear distinction between security outside and within Europe. Conflicts elsewhere in the world often have direct spill-over effects, not primarily in terms of military threats but by challenges posed by illegal immigration, terrorism, international crime and illegal trade. Lampedusa has become a synonym for tragedy. Crises and instability in Africa, the Middle East and elsewhere in the world provide breeding grounds for extremism, weapons smuggling, drugs trafficking or kidnapping.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • Nationale Programme Zur Massenüberwachung Personenbezogener Daten in Den Eu-Mitgliedstaaten Und Ihre Vereinbarkeit Mit Dem Eu-Recht
    GENERALDIREKTION INTERNE POLITIKBEREICHE FACHABTEILUNG C: BÜRGERRECHTE UND KONSTITUTIONELLE ANGELEGENHEITEN BÜRGERLICHE FREIHEITEN, JUSTIZ UND INNERES NATIONALE PROGRAMME ZUR MASSENÜBERWACHUNG PERSONENBEZOGENER DATEN IN DEN EU-MITGLIEDSTAATEN UND IHRE VEREINBARKEIT MIT DEM EU-RECHT STUDIE Abriss Nach den Enthüllungen rund um PRISM und andere US-Überwachungsprogramme erfolgt mit der vorliegenden Studie eine Bewertung der Praxis der Überwachung in großem Ausmaß seitens einer Auswahl von EU-Mitgliedstaaten: Vereinigtes Königreich, Schweden, Frankreich, Deutschland und die Niederlande. Angesichts des großen Ausmaßes der untersuchten Überwachungspraxis muss man davon ausgehen, dass es sich im Vergleich zum traditionellen Sammeln geheimdienstlicher Daten um eine grundlegende Neuordnung der Überwachungspraxis handelt. Deshalb wird in der Studie die Ansicht vertreten, dass eine Analyse der europäischen Überwachungsprogramme nicht auf die Frage der Balance zwischen Datenschutz und nationaler Sicherheit beschränkt bleiben darf, sondern in den größeren Zusammenhang der kollektiven Freiheitsrechte und der Demokratie gestellt werden muss. Zu den Ergebnissen der Studie gehört, dass in vier von fünf der EU-Mitgliedstaaten, die für eine nähere Untersuchung ausgewählt worden sind, in irgendeiner Form ein Abfangen und Überwachen von Kommunikationsdaten in großem Ausmaß erfolgt. Ferner werden in der Studie Parallelen und Unterschiede zwischen diesen Programmen und den seitens der NSA durchgeführten Operationen ermittelt. Die Verfasser der Studie gelangen
    [Show full text]
  • Mass Surveillance of Personal Data by EU Member States and Its
    Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law Didier Bigo, Sergio Carrera, Nicholas Hernanz, Julien Jeandesboz, Joanna Parkin, Francesco Ragazzi and Amandine Scherrer No. 62 / November 2013 Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.
    [Show full text]
  • Cyber, Intelligence, and Security
    Cyber, Intelligence, and Security Volume 4 | No. 1 | March 2020 The Secret War of Cyber Influence Operations and How to Identify Them David Tayouri Iran’s Activity in Cyberspace: Identifying Patterns and Understanding the Strategy Gabi Siboni, Léa Abramski, and Gal Sapir Ambiguous Approach—All Shades of Gray Raša Lazovic� Cybersecurity and Information Security: Force Structure Modernizations in the Chinese People’s Liberation Army Miranda Bass Chinese investments in Sri Lanka: Implications for Israel Shlomi Yass Criminal Law as a Tool for Dealing with Online Violence among Youth Limor Ezioni National Cybersecurity Strategies in the Healthcare Industry of Israel and the Netherlands: A Comparative Overview Stefan Weenk Cyber, Intelligence, and Security Volume 4 | No. 1 | March 2020 Contents The Secret War of Cyber Influence Operations and How to Identify Them | 3 David Tayouri Iran’s Activity in Cyberspace: Identifying Patterns and Understanding the Strategy | 21 Gabi Siboni, Léa Abramski, and Gal Sapir Ambiguous Approach—All Shades of Gray | 41 Raša Lazovic� Cybersecurity and Information Security: Force Structure Modernizations in the Chinese People’s Liberation Army | 59 Miranda Bass Chinese investments in Sri Lanka: Implications for Israel | 75 Shlomi Yass Criminal Law as a Tool for Dealing with Online Violence among Youth | 95 Limor Ezioni National Cybersecurity Strategies in the Healthcare Industry of Israel and the Netherlands: A Comparative Overview | 107 Stefan Weenk The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published twice a year within the framework of the Cyber Security and Security Program at the Institute for National Security Studies.
    [Show full text]
  • Protecting Fundamental Rights in a Digital Age Proceedings, Outcome and Background Documents
    Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013 – 2014 Inquiry on electronic mass surveillance of EU citizens Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013-2014 1 2 Introduction by Claude Moraes MEP, Rapporteur of the Inquiry on electronic mass surveillance of EU citizens.................................................................................................................................................................5 European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs (2013/2188(INI))...................................................................................9 Explanatory statement (A7-0139/2014).............................................................................................................49 European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ privacy (2013/2682(RSP))........57 Working document on the US and EU Surveillance programmes and their impact on EU citizens fundamental rights by Claude Moraes...............................................................................................................65 Working document on the relation between the surveillance practices in the
    [Show full text]
  • Data Surveillance
    National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies THE NETHERLANDS Version of 25 September 2014 Art.1, Dutch knowledge centre on discrimination Jacky Nieuwboer DISCLAIMER: This document was commissioned under a specific contract as background material for the project on National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies. The information and views contained in the document do not necessarily reflect the views or the official position of the EU Agency for Fundamental Rights. The document is made publicly available for transparency and information purposes only and does not constitute legal advice or legal opinion. FRA would like to express its appreciation for the comments on the draft report provided by the Netherlands. SUMMARY Description of the surveillance framework in the Netherlands [1]. The two actors that are eligible to conduct mass surveillance are the General Intelligence and Security Service (Algemene Inlichtingen en Veiligheidsdienst, hereinafter: AIVD) and the Military Intelligence and Security Service (Militaire Inlichtingen en Veiligheidsdienst, hereinafter: MIVD). A joint effort of the AIVD and MIVD is the Joint Sigint Cyber Unit, established on 15 June 2014. Its predecessor is the National Signals Intelligence Organisation (Nationale Signals Intelligence Organisatie, NSO). The aim of the new Unit is to specifically combat cyber threats. 1 2There are currently no publicly disclosed programmes of mass cyber surveillance in the Netherlands, although there were many questions in Parliament after the Snowden revelations. However, the government denied all these questions, so that nothing new was actually revealed.3 [2]. The Act governing the AIVD and the MIVD is the Act on Intelligence and Security Services (Wet op de Inlichtingen en Veiligheidsdiensten, hereinafter: Wiv).4 Its main focus is on the powers of the services.
    [Show full text]
  • HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS Van Hooren, Jonas
    Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2019-12 THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS van Hooren, Jonas Monterey, CA; Naval Postgraduate School http://hdl.handle.net/10945/64086 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS by Jonas van Hooren December 2019 Thesis Advisor: Ryan Maness Co-Advisor: John D. Tullius Second Reader: Kalev I. Sepp Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK Form Approved OMB REPORT DOCUMENTATION PAGE No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave blank) December 2019 Master's thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS 6.
    [Show full text]
  • Trends in Cybersecurity 2017-2018
    Trends in Cybersecurity 2017-2018 Trends in Cybersecurity 2017-2018 1 2 Trends in Cybersecurity 2017-2018 Preface The world is connected. The internet has connected organizations and new organizational principles. people, organization and devices. The speed at which Organizational principles in which the focus is on the pur- these connections are made is enormous. Soon every- pose. Away from a system world. Back to a social envi- thing and everyone will be connected via the Internet. It is ronment in which trust, quality, time, attention and free- clear that far-reaching digitalization is going to change dom of choice are central. almost every aspect of society. Not only in the Netherlands but worldwide. Organizations and people will adapt... or How do you cope with these new developments? We not. hope this edition of Trends in Security will provide you with concrete tools. In all sectors, the upcoming digitization places societies for profound dilemmas, challenges and opportunities. Enjoy reading Technological development can open roads to more On behalf of Capgemini Nederland B.V. and Capgemini prosperity, health, well-being, security and sustainability - Consulting. but only if we ensure that new technologies, people and societies reinforce each other. Connected organizations, people and devices offer new opportunities, such as better services to customers and citizens through smart data sharing. Or more public safety through smart cameras connected to databases and automatic face recognition. We also see opportunities to anticipate risks in terms of safety and viability, for example by proactively monitoring social media. Increased connectivity of devices and systems also entails new vulnerabilities, such as insufficient control Erik Hoorweg Paul Visser over user identity, inadequate authorizations, non-regi- stration of equipment, lack of a secure update mecha- nism, or the use of standard passwords.
    [Show full text]
  • Cyberwar 27 Sep 2020
    Geostrategy and Geopolitics Department 1 49069 Osnabrueck Cyber war Methods and Practice 27 Sep 2020 Summary Cyberwar (Cyber war, Cyber Warfare) is the military confrontation with the means of information technology. This paper presents the current state and deals with the theoretical and practical problems. In practice, cyberwar is an integral part of military action, but cannot be completely separated from espionage, since the intrusion into and reconnaissance of target systems is essential for further action. After an overview of attack methods, attackers (Advanced Persistent Threats), spy tools, cyber weapons and cyber defense, a particular focus is on the attribution of cyber-attacks and the Smart Industry (Industry 4.0). Afterwards, the cyberwar strategies of the US, China, Russia and further leading actors will be discussed. Further chapters present Artificial Intelligence, Smart Industry, smart devices and biological applications. Cyber war 27 Sep 2020_English 1 apl. Prof. Dr. Dr. K. Saalbach Table of Contents 1. Fundamentals ....................................................................................................... 7 1.1 Introduction ............................................................................................................... 7 1.2 Background ............................................................................................................... 7 1.3 Cyberwar Definition ................................................................................................. 9 1.4 Cyberwar and Espionage
    [Show full text]