HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS Van Hooren, Jonas

Total Page:16

File Type:pdf, Size:1020Kb

HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS Van Hooren, Jonas Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2019-12 THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS van Hooren, Jonas Monterey, CA; Naval Postgraduate School http://hdl.handle.net/10945/64086 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS by Jonas van Hooren December 2019 Thesis Advisor: Ryan Maness Co-Advisor: John D. Tullius Second Reader: Kalev I. Sepp Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK Form Approved OMB REPORT DOCUMENTATION PAGE No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave blank) December 2019 Master's thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS 6. AUTHOR(S) Jonas van Hooren 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT Monterey, CA 93943-5000 NUMBER 9. SPONSORING / MONITORING AGENCY NAME(S) AND 10. SPONSORING / ADDRESS(ES) MONITORING AGENCY Dutch SOCOM, Den Haag, Netherlands 2511CR REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release. Distribution is unlimited. A 13. ABSTRACT (maximum 200 words) As a knowledge-based economy, the Netherlands is vulnerable to digital hybrid threats from state and non-state actors. The Dutch strategic military leadership sees the importance of improving its digital defense, but struggles with the right approach. This research, based on a heuristic method including literature reviews and interviews, provides an answer to the question, “How can Dutch Special Operations Forces (SOF) enhance the national cyber capabilities to counter the hybrid threats that the Netherlands currently faces?” by offering three options: 1) SOF can gain access to hard targets for cyber operations; 2) it can provide the means to get wetware, hardware, and software in or out the operation area; and 3) it can understand, deceive, and influence the cultural environment. Furthermore, the thesis provides the Dutch Ministry of Defense three potential integration options for SOF and cyber capabilities. The ministry can 1) delegate cyber-SOF teams to the operational commands; 2) embed SOF and cyber personnel in each other’s organizations; and 3) create a new cyber-enabled special operations unit. With the new Special Operations Command, the Defense Cyber Command, and the Joint SIGINT Cyber Unit, there are opportunities for SOF to support cyber operations and increase the digital security for the Netherlands and its NATO allies. 14. SUBJECT TERMS 15. NUMBER OF composite special operations command, cyber supporting operations, cyber terrorism, PAGES defense cyber command, ministry of defense, hackers, hacktivists, hybrid threat, hybrid 125 warfare, offensive cyber operations, information warfare, intelligence, irregular warfare, 16. PRICE CODE secret services, special operations command, special operations forces, strategic implications, technology, the Netherlands, unconventional warfare 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release. Distribution is unlimited. THE IMPERATIVE SYMBIOTIC RELATIONSHIP BETWEEN SOF AND CYBER: HOW DUTCH SPECIAL OPERATION FORCES CAN SUPPORT CYBER OPERATIONS Jonas van Hooren Major, Netherlands Marine Corps BEc, Nederlands Talen Instituut, 2008 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN DEFENSE ANALYSIS (IRREGULAR WARFARE) from the NAVAL POSTGRADUATE SCHOOL December 2019 Approved by: Ryan Maness Advisor John D. Tullius Co-Advisor Kalev I. Sepp Second Reader Kalev I. Sepp Chair, Department of Defense Analysis iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT As a knowledge-based economy, the Netherlands is vulnerable to digital hybrid threats from state and non-state actors. The Dutch strategic military leadership sees the importance of improving its digital defense, but struggles with the right approach. This research, based on a heuristic method including literature reviews and interviews, provides an answer to the question, “How can Dutch Special Operations Forces (SOF) enhance the national cyber capabilities to counter the hybrid threats that the Netherlands currently faces?” by offering three options: 1) SOF can gain access to hard targets for cyber operations; 2) it can provide the means to get wetware, hardware, and software in or out the operation area; and 3) it can understand, deceive, and influence the cultural environment. Furthermore, the thesis provides the Dutch Ministry of Defense three potential integration options for SOF and cyber capabilities. The ministry can 1) delegate cyber-SOF teams to the operational commands; 2) embed SOF and cyber personnel in each other’s organizations; and 3) create a new cyber-enabled special operations unit. With the new Special Operations Command, the Defense Cyber Command, and the Joint SIGINT Cyber Unit, there are opportunities for SOF to support cyber operations and increase the digital security for the Netherlands and its NATO allies. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION..................................................................................................1 A. PROLOGUE ...............................................................................................1 B. BACKGROUND TO THE PROBLEM ...................................................2 C. PURPOSE AND SCOPE ...........................................................................6 D. RESEARCH QUESTIONS .......................................................................7 E. CHAPTER OUTLINE...............................................................................8 II. LITERATURE REVIEW AND METHODOLOGY ..........................................9 A. LITERATURE REVIEW .........................................................................9 B. THE ROLES OF SOF AND CYBER IN EACH OTHER’S DOMAINS ................................................................................................13 C. SOF AND CYBER IN THE NETHERLANDS .....................................19 D. METHODOLOGY ..................................................................................24 III. CYBER CHALLENGES AND SOF CAPABILITIES IN THE NETHERLANDS .................................................................................................27 A. INTRODUCTION....................................................................................27 B. DEFINING THE CURRENT HYBRID THREATS FOR THE NETHERLANDS .....................................................................................27 C. ASSESSING THE DUTCH CYBER MEANS TO COUNTER THE HYBRID THREATS ......................................................................33 D. SOF’S POSSIBLE ROLES TO FILL THE CYBER GAPS ................36 1. Gain Access to Hard Targets for Cyber Operations ................38 2. Provide the Means to Get Wetware, Hardware, and Software in or out the Operation Area ......................................41 3. Understand, Deceive, and Influence the Cultural Environment .................................................................................43 IV. ANALYZING THE INTEGRATION OF DUTCH SOF AND CYBER ........47 A. INTRODUCTION....................................................................................47 B. INTEGRATION OPTIONS FOR DUTCH SOF AND CYBER .........47 1. Delegate Hybrid Cyber-SOF Teams to the Operational Commands ....................................................................................48 2. Embed SOF and Cyber Personnel..............................................50 3. Create a New Cyber-enabled Special Operations Unit ............52 C. DYNAMICS AND CONDITIONS CHALLENGING THE SOF CYBER INTEGRATION ........................................................................54 D. SOF AND CYBER PLANNING ON VARIOUS LEVELS..................58 vii V. CONCLUSION AND RECOMMENDATIONS ...............................................61 A. INTRODUCTION....................................................................................61
Recommended publications
  • From the Editor
    EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists.
    [Show full text]
  • Federal Court Between
    Court File No. T-735-20 FEDERAL COURT BETWEEN: CHRISTINE GENEROUX JOHN PEROCCHIO, and VINCENT R. R. PEROCCHIO Applicants and ATTORNEY GENERAL OF CANADA Respondent AFFIDAVIT OF MURRAY SMITH Table of Contents A. Background 3 B. The Firearms Reference Table 5 The Canadian Firearms Program (CFP): 5 The Specialized Firearms Support Services (SFSS): 5 The Firearms Reference Table (FRT): 5 Updates to the FRT in light of the Regulation 6 Notice to the public about the Regulation 7 C. Variants 8 The Nine Families 8 Variants 9 D. Bore diameter and muzzle energy limit 12 Measurement of bore diameter: 12 The parts of a firearm 13 The measurement of bore diameter for shotguns 15 The measurement of bore diameter for rifles 19 Muzzle Energy 21 E. Non-prohibited firearms currently available for hunting and shooting 25 Hunting 25 Sport shooting 27 F. Examples of firearms used in mass shooting events in Canada that are prohibited by the Regulation 29 2 I, Murray Smith, of Ottawa, Ontario, do affirm THAT: A. Background 1. I am a forensic scientist with 42 years of experience in relation to firearms. 2. I was employed by the Royal Canadian Mounted Police (“RCMP”) during the period of 1977 to 2020. I held many positions during that time, including the following: a. from 1989 to 2002,1 held the position of Chief Scientist responsible for the technical policy and quality assurance of the RCMP forensic firearms service, and the provision of technical advice to the government and police policy centres on firearms and other weapons; and b.
    [Show full text]
  • Fm 3-90.12/Mcwp 3-17.1 (Fm 90-13) Combined Arms Gap
    FM 3-90.12/MCWP 3-17.1 (FM 90-13) COMBINED ARMS GAP-CROSSING OPERATIONS July 2008 DISTRIBUTION RESTRICTION. Approved for public release; distribution unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online <www.us.army.mil> and the General Dennis J. Reimer Training and Doctrine Digital Library at <www.train.army.mil>. *FM 3-90.12/MCWP 3-17.1 (FM 90-13) Field Manual No. Headquarters 3-90.12/MCWP 3-17.1 (FM 90-13) Department of the Army Washington, DC, 1 July 2008 COMBINED ARMS GAP-CROSSING OPERATIONS Contents Page PREFACE ............................................................................................................vii INTRODUCTION....................................................................................................x Chapter 1 OPERATIONS IN SUPPORT OF GAP CROSSING ......................................... 1-1 Challenge to Maneuver ...................................................................................... 1-1 Integrating Assured Mobility ............................................................................... 1-2 Gap-Crossing Operations................................................................................... 1-4 Chapter 2 OVERVIEW OF GAP-CROSSING OPERATIONS............................................ 2-1 Gap Crossing as a Functional Area of Mobility Operations ............................... 2-1 Gap-Crossing Means ......................................................................................... 2-4 Gap-Crossing Fundamentals ............................................................................
    [Show full text]
  • Russian Meddling in Western Elections, 2016-2017: a Preliminary
    RUSSIAN MEDDLING IN WESTERN ELECTIONS, 2016-2017: A PRELIMINARY PROBE By Guillermo Lopez Sanchez A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Arts with a Major in International Studies May 2018 Committee Members: Dennis J. Dunn, Chair Ronald Angelo Johnson Sandhya Rao COPYRIGHT by Guillermo Lopez Sanchez 2018 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgement. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Guillermo Lopez Sanchez, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I express my gratitude to Dr. Dennis J. Dunn, Professor of History and Director of the Center for International Studies at Texas State University. His dedication, knowledge, and support since I began the Master of Arts with a major in International Studies were invaluable. In addition, my appreciation is extended to Dr. Ronald Angelo Johnson, Associate Professor in the Department of History; and Dr. Sandhya Rao, Professor in the Department of Mass Communication, for their outstanding advice and assistance. Collectively, they strengthened my resources, asked probing questions that helped me sharpen my focus, and provided valuable insights that benefitted my research. I also wish to express my appreciation to Jeremy Pena, Coordinator of Academic Programs at the Center for International Studies, for his administrative support.
    [Show full text]
  • Civil-Military Capacities for European Security
    Clingendael Report Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee Civil-Military Capacities for European Security Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. Image rights: Drone, Binary Code: © Shutterstock.com Search and Rescue squadron: © David Fowler / Shutterstock.com Design: Textcetera, The Hague Print: Gildeprint, Enschede Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Content Executive summary 7 Introduction 11 1 The external-internal security gap 13 2 Case study maritime security 25 3 Case study border security 39 4 Case study cyber security 53 5 Conclusions and recommendations 64 List of acronyms 70 5 Executive summary In the last two decades the European Union has created separated policies, institutions and capacities for external and internal security. In the meantime the world’s security environment has changed fundamentally. Today, it is no longer possible to make a clear distinction between security outside and within Europe. Conflicts elsewhere in the world often have direct spill-over effects, not primarily in terms of military threats but by challenges posed by illegal immigration, terrorism, international crime and illegal trade. Lampedusa has become a synonym for tragedy. Crises and instability in Africa, the Middle East and elsewhere in the world provide breeding grounds for extremism, weapons smuggling, drugs trafficking or kidnapping.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • Nationale Programme Zur Massenüberwachung Personenbezogener Daten in Den Eu-Mitgliedstaaten Und Ihre Vereinbarkeit Mit Dem Eu-Recht
    GENERALDIREKTION INTERNE POLITIKBEREICHE FACHABTEILUNG C: BÜRGERRECHTE UND KONSTITUTIONELLE ANGELEGENHEITEN BÜRGERLICHE FREIHEITEN, JUSTIZ UND INNERES NATIONALE PROGRAMME ZUR MASSENÜBERWACHUNG PERSONENBEZOGENER DATEN IN DEN EU-MITGLIEDSTAATEN UND IHRE VEREINBARKEIT MIT DEM EU-RECHT STUDIE Abriss Nach den Enthüllungen rund um PRISM und andere US-Überwachungsprogramme erfolgt mit der vorliegenden Studie eine Bewertung der Praxis der Überwachung in großem Ausmaß seitens einer Auswahl von EU-Mitgliedstaaten: Vereinigtes Königreich, Schweden, Frankreich, Deutschland und die Niederlande. Angesichts des großen Ausmaßes der untersuchten Überwachungspraxis muss man davon ausgehen, dass es sich im Vergleich zum traditionellen Sammeln geheimdienstlicher Daten um eine grundlegende Neuordnung der Überwachungspraxis handelt. Deshalb wird in der Studie die Ansicht vertreten, dass eine Analyse der europäischen Überwachungsprogramme nicht auf die Frage der Balance zwischen Datenschutz und nationaler Sicherheit beschränkt bleiben darf, sondern in den größeren Zusammenhang der kollektiven Freiheitsrechte und der Demokratie gestellt werden muss. Zu den Ergebnissen der Studie gehört, dass in vier von fünf der EU-Mitgliedstaaten, die für eine nähere Untersuchung ausgewählt worden sind, in irgendeiner Form ein Abfangen und Überwachen von Kommunikationsdaten in großem Ausmaß erfolgt. Ferner werden in der Studie Parallelen und Unterschiede zwischen diesen Programmen und den seitens der NSA durchgeführten Operationen ermittelt. Die Verfasser der Studie gelangen
    [Show full text]
  • Mp-Hfm-134-46
    Good Practices of End of Deployment Debriefing in the Royal Netherlands Navy Commander RNLN Marten Meijer PhD NATO Research and Technology Organization, Paris, France PO Box 25, F-92201 Neuilly Sur Seine, Cedex 01, France Tel ++ 33 1 55 61 22 60 Fax ++ 33 1 55 61 96 45 [email protected] Lieutenant RNLN Rodney de Vries BA Regional Office of the Defense Social Service, Utrecht, The Netherlands PO Box 90004, 3509 AA Utrecht, The Netherlands Tel ++ 31 30 236 6424 Fax ++ 31 30 293 7224 [email protected] ABSTRACT Practices in early psychological interventions after critical incidents have been the focus of research for several years now. In an article in The Lancet in 2002, it was concluded on the basis of seven international studies that individual single session debriefing does not lead to a decline in the incidence of Post Traumatic Stress Disorders (PTSD) among the victims of accidents or traumatic events. At the international level, it was recommended that the term ‘debriefing’ should be replaced by the term ‘early intervention’, and that a stop should be put to the debriefing of victims of shocking events. The debate about early interventions in the Netherlands Armed Forces continued in 2004 in the memorandum to the State Secretary for Defense from the former Inspector-General of the Armed Forces. The Ombudsman of the Canadian Armed Forces suggested in 2004 a policy on End of Deployment Debriefings in his memorandum on Third Location Decompression, in which redeploying troops stay together on the transit home in a safe place to share experiences and expectations.
    [Show full text]
  • The Royal Netherlands Navy's Perspective on Cooperation
    The Royal Netherlands Navy’s perspective on cooperation Address by Lieutenant General Rob Verkerk, Commander of the Royal Netherlands Navy Galle Dialogue 2016 Abstract The fairy tale of the Bremen Town Musicians by the Brothers Grimm teaches us that change and seeking new paths may bring you an unexpected and better future. Furthermore it teaches us that cooperation is more than the sum of all parts and will enable you to achieve things that are out of reach as an individual. For those reasons, the Royal Netherlands Navy advocates cooperation with international partners. The Netherlands government has defined three strategic security interests: defence of the Netherlands and Allied territory, the international rule of law and economic security. All three imply international cooperation and indeed the Royal Netherlands Navy hardly operates anymore without cooperating with a variety of (international) partners. To enable these international operations and maintaining the required operational readiness, the Royal Netherlands Navy seeks participation in international exercises, preferably with an integrated international staff; train as you fight, fight as you train. Also technological developments, increasing costs, and international developments have led to close cooperation with industry and knowledge centres. The Royal Netherlands Navy has ample experience in this cooperation, leading to delivering more effect for less money. Some two decades ago further steps were taken by integrating large parts of the Belgian and Netherlands navies, thus reducing overhead and generate a larger scale of forces under unified command while retaining sovereignty. This integration includes command, maintenance, education and training and sharing infrastructure. Scientific research has derived criteria that are useful to balance ambition and realism in international cooperation.
    [Show full text]
  • NAS Meridian Civilians of the Year
    Volume 58, Number 25 https://www.cnic.navy.mil/meridian ~ www.facebook.com/NASMeridian ~ Twitter: @nasmeridianms December 10, 2020 Dear Santa Letters written by children in NAS Meridian’s Childcare programs. See more on page 10 What’s Inside NAS Meridian Civilians of the Year ~ page 4 ~ Joint Chiefs discuss future defense budgets Keith Creel Will Pearson ~ page 6 ~ Senior Civilian of the Year Junior Civilian of the Year Fire & Emergency Services Fire & Emergency Services Operation Warp Speed Follow us on www.facebook.com/ Memorial service, award ceremonies NASMeridian and Twitter: @NASMeridianMS honor victims of Pensacola terrorist attack From Naval Education and Class Cameron Walters paid pay tribute to the eight Sailors, Capt. Edgardo Moreno, NASC’s ~ page 2 ~ Training Command Public the ultimate sacrifice in ser- Marines, government civilians, commanding officer, presented Affairs vice to their nation,” said Rear Naval Air Station Pensacola the Purple Heart Medals post- Navy to decommission USS Adm. Pete Garvin, commander, security forces and Escambia humously to the families of Bonhomme Richard Naval Aviation Schools Naval Education and Training County Sherriff’s Office depu- Watson, Haitham and Walters. Command (NASC) held a Command (NETC), the cer- ties who were injured. They all “In these times the war zone memorial service, as well as emony’s guest speaker. “As we exemplify honor, courage and is no longer limited to battle- wreath-laying and Purple lay this wreath for our three commitment.” fields, it all too often finds its ~ page 5 ~ Heart Medal ceremonies, at fallen shipmates, we honor Garvin commented on the way to bastions where it is least Naval Air Station (NAS) Pen- their bravery and their sacri- strong relationship between expected,” said Cmdr.
    [Show full text]
  • Mass Surveillance of Personal Data by EU Member States and Its
    Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law Didier Bigo, Sergio Carrera, Nicholas Hernanz, Julien Jeandesboz, Joanna Parkin, Francesco Ragazzi and Amandine Scherrer No. 62 / November 2013 Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.
    [Show full text]
  • Curaçao, Personnel Injured Through Use of a Smoke Grenade WP, 26 April 2006
    Curaçao, personnel injured through use of a smoke grenade WP, 26 April 2006 The Hague, May 2007 (project number M2006DE0426-01) The reports of the Dutch Safety Board are in the public domain. All reports are also available on the website of the Dutch Safety Board www.onderzoeksraad.nl 1 THE DUTCH SAFETY BOARD The Dutch Safety Board was set up to establish the causes or probable causes of individual incidents or categories of incidents in all sectors. The sole aim of the Board’s investigations is to prevent accidents or incidents from occurring in the future and to make recommendations based on its findings wherever appropriate. The organization comprises a Board of five permanent members and, in addition, has a number of permanent committees. Special guidance committees are formed for specific investigations. The Dutch Safety Board is assisted by a professional bureau consisting of investigators, secretarial reporters and support staff. Safety Board Defence Committee Chairman P. van Vollenhoven Chairman J.P. Visser Vice-chairman J.A. Hulsenbek Vice-chairman J.A. Hulsenbek A. van den Berg G.C. Gillissen F.J.H. Mertens J.S.J. Hillen J.P. Visser M. Schouten General M. Visser secretary: Project leader: G.L. de Wilde Visiting Anna van Saksenlaan 50 Postal Postbus 95404 address: 2593 HT The Hague address: 2509 CK The Hague Telephone: +31 (0)70 333 7000 Fax: +31 (0)70 333 7077 Internet: www.onderzoeksraad.nl 2 CONTENTS CONSIDERATION.............................................................................................................
    [Show full text]