Internet Privacy in the European Union and the United States

Total Page:16

File Type:pdf, Size:1020Kb

Internet Privacy in the European Union and the United States Internet Privacy in the European Union and the United States Three Essays on Privacy, the Internet, Politics, Implementation, Business Power, and Surveillance in the European Union and the United States Agustín Rossi Silvano Thesis submitted for assessment with a view to obtaining the degree of Doctor of Political and Social Sciences of the European University Institute Florence, 19 September 2016 European University Institute Department of Political and Social Sciences Internet Privacy in the European Union and the United States Three Essays on Privacy, the Internet, Politics, Implementation, Business Power, and Surveillance in the European Union and the United States Agustín Rossi Silvano Thesis submitted for assessment with a view to obtaining the degree of Doctor of Political and Social Sciences of the European University Institute Examining Board Prof. Sven Steinmo, European University Institute (Supervisor) Prof. Alexander Trechsel, European University Institute Prof. Henry Farrell, George Washington University Prof. Bastiaan Van Apeldoorn, Vrije Universiteit Amsterdam © Agustín Rossi Silvano, 2016 No part of this thesis may be copied, reproduced or transmitted without prior permission of the author Researcher declaration to accompany the submission of written work Department of Political and Social Sciences - Doctoral Programme I Agustín Rossi Silvano certify that I am the author of the work Internet Privacy in the European Union and the United States:Three Essays on Privacy, the Internet, Politics, Implementation, Business Power, and Surveillance in the European Union and the United States I have presented for examination for the Ph.D. at the European University Institute. I also certify that this is solely my own original work, other than where I have clearly indicated, in this declaration and in the thesis, that it is the work of others. I warrant that I have obtained all the permissions required for using any material from other copyrighted publications. I certify that this work complies with the Code of Ethics in Academic Research issued by the European University Institute (IUE 332/2/10 (CA 297). The copyright of this work rests with its author. Quotation from it is permitted, provided that full acknowledgement is made. This work may not be reproduced without my prior written consent. This authorisation does not, to the best of my knowledge, infringe the rights of any third party. I declare that this work consists of 62.504 words. Signature and date: Agustín Rossi Silvano, 4 March 2016 Table of Contents Abstract ............................................................................................................................. VI List of Abbreviations and Acronyms ............................................................................ VII List of Figures and Tables ............................................................................................... IX I. Introduction ..................................................................................................................... 1 The existing literature ...................................................................................................... 3 Presenting Internet privacy puzzles ................................................................................. 7 The cost of free services ................................................................................................... 8 Privacy and state-surveillance ........................................................................................ 10 This dissertation ............................................................................................................. 12 Article 1 (II Chapter): The Snowden effect. How the Global Surveillance Revelations strengthened the Data Protection Regulation in the European Parliament .................... 13 Article 2 (III Chapter) American Exceptionalism – Why does America not have a comprehensive privacy regime? ..................................................................................... 14 Article 3 (IV Chapter): Willing to govern? Privacy protection in Europe and the United States .............................................................................................................................. 15 Summary and Conclusions ............................................................................................. 16 II. Article 1: The Snowden effect. How the Global Surveillance Revelations strengthened the Data Protection Regulation in the European Parliament ............... 19 Introduction .................................................................................................................... 20 Literature Review ........................................................................................................... 23 Analytical framework: business power and issue salience ............................................ 28 The Analysis .................................................................................................................. 39 Conclusion ..................................................................................................................... 65 Annex I ........................................................................................................................... 68 III. Article 2: Why does America not have a comprehensive privacy regime? .......... 72 Introduction .................................................................................................................... 73 Liberal traditions accounts of the American privacy regime ......................................... 76 Policy paradigms ............................................................................................................ 78 The 1974 Privacy Act explained under the Liberal traditions argument and its limitations ....................................................................................................................... 81 First Paradigm: Privacy in the deregulatory shift .......................................................... 85 Second Paradigm: Privacy in the national security era ................................................ 105 Conclusion ................................................................................................................... 108 IV. Article 3 – Willing to govern? Privacy protection implementation in Europe and the United States ............................................................................................................. 111 Introduction .................................................................................................................. 112 Willing to govern?........................................................................................................ 115 An alternative explanation: the intelligence agencies are out of control ..................... 118 Implementation and policy design ............................................................................... 120 Analytical framework................................................................................................... 125 Analytical Narrative - Part 1: State Surveillance ......................................................... 128 I Analytical Narrative - Part 2: Consumer privacy ......................................................... 137 Conclusion ................................................................................................................... 141 V. Concluding remarks .................................................................................................. 144 Empirical contributions ................................................................................................ 144 Theoretical contributions ............................................................................................. 146 Blueprints for future research....................................................................................... 147 So what is next for Internet privacy? ........................................................................... 148 Bibliography and references .......................................................................................... 151 II III Acknowledgements Writing this dissertation has been an enormous pleasure and privilege. First and foremost, I am forever grateful to my supervisor and mentor, Sven Steinmo, for providing me with the intellectual and emotional support I needed to finish this project. Being accepted to the European University Institute (EUI) to work under the supervision of Sven has been a life changing experience. Thank you, European and Spanish tax payers for making the EUI possible. I also want to thank Henry Farrell for welcoming me at the George Washington University (GWU), Bastiaan Van Apeldoorn for being willing to read my research since my Master’s in Amsterdam, Alex Trechsel for being a wonderful second-reader and Head of Department, and Javier Astudillo for uncountable recommendation letters and constant encouragement. Likewise, thanks to the administration of the EUI and the SPS department for their responsiveness and patience, especially to Martina Selmi. I am also indebted to the Institute for European, Russian, and Eurasian Studies at GWU for giving me a place to work in the United States. During the research and writing process I have enjoyed the friendship, and intellectual challenge, of more people than I can name –some, however, have been outstanding. Surviving the first years of the PhD would
Recommended publications
  • Mutual Watching and Resistance to Mass Surveillance After Snowden
    Media and Communication (ISSN: 2183-2439) 2015, Volume 3, Issue 3, Pages 12-25 Doi: 10.17645/mac.v3i3.277 Article “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden Vian Bakir School of Creative Studies and Media, Bangor University, Bangor, LL57 2DG, UK; E-Mail: [email protected] Submitted: 9 April 2015 | In Revised Form: 16 July 2015 | Accepted: 4 August 2015 | Published: 20 October 2015 Abstract The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching) involving citizens, journalists, intelli- gence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations), they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Atten- tion to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly une- qual mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens). Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society).
    [Show full text]
  • New Ukusa Agree 10May55.Pdf
    ••• 1 / ! i -"----·-·-· TOP SECRET LSIB/J.U/55. lOih l~~ 1955~ caw No. • •• •lt . .... TO Tffii: UKUS.A. AGREEMKNT (TIIIIID EDITION) Please aO.d the follo·.ving liote ai'ter ;iaragre.ph 16 of tbe I · L~troduction to the UKUSA A?pendices (dated 1st June 1951): 1'0n 1st ldBy 1955 USCIE and ~IB agreed th.at a. general revision o£ the .A:~pendices 'Vo.A required. They furtner ag!"eed th.at. as a l"irzt steiJ tO\':B....rC such revision USCIB II ..,ould furnish LSIB, for cowment, detailed proposals v.:1ich are being -prepared by USCJ3. P~ndir,g agreement by both partie'5 on a general revision of the .A:ppendiccs, the Directon;, NSll. a.'ld GCHQ will: (a) determine ,jointly uny changes ·,\'11ich ~ be requi:rec_ in Appendices C, D, E, F, K, L,. and JI. and (b) implement. any suc:i c!'la!lgOS w'nicb they agn~ to be necessary. Although this interim auL.orization enables the Directors, rIBA a.r,d GCHQ, to change or interpret S"f>eCified A1Cpendices by !JlU~.l agreement, it does r.ot require USCIB O'r ISIB to appr"JYe such chP...nge:; o:r: interpret~ tions ?roviiled thcP.c- an: <:titoin tlt" spirit and intt:nt of curren'.;; liKUSA policy. IC ~/.I ~\··· Secretary, Sigint Board. eclassitied and approved for release by NSA on 04-08-2010 pursuant to E .0. 12958, as mended. ST5683LI TOP SECR.E'f , • '=' OGA" ... TOP SECRET EO L .. 4. (·d.)°. TO BE HANDLED IN ACCORDANCE WITH IRSIG .... ... ... ··-.. - .. ,__ ... --.... .,_ ''• ·-----Re'f•· TOP SECRET EmR.
    [Show full text]
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • De L'encyclopédie Des Nuisances À La Pensée Anti-Industrielle
    De l’Encyclopédie des Nuisances à la pensée anti-industrielle : retour sur la construction idéologique d’une utopie contemporaine. Aurélien Tourreilles To cite this version: Aurélien Tourreilles. De l’Encyclopédie des Nuisances à la pensée anti-industrielle : retour sur la construction idéologique d’une utopie contemporaine.. Science politique. Université de Bordeaux, 2019. Français. NNT : 2019BORD0005. tel-02146739 HAL Id: tel-02146739 https://tel.archives-ouvertes.fr/tel-02146739 Submitted on 4 Jun 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE PRÉSENTÉE POUR OBTENIR LE GRADE DE DOCTEUR DE L’UNIVERSITÉ DE BORDEAUX ÉCOLE DOCTORALE DE DROIT (E.D. 41) SPÉCIALITÉ SCIENCE POLITIQUE Par Aurélien TOURREILLES De l’Encyclopédie des Nuisances à la pensée anti-industrielle : retour sur la construction idéologique d’une utopie contemporaine Sous la direction de : Patrick TROUDE-CHASTENET Soutenue le 11 Janvier 2019 Membres du jury : M. LAMBERT Frédéric, Professeur à Université Rennes 1, Président du jury et rapporteur Mme OLLITRAULT Sylvie, Directrice de Recherche au CNRS-Sciences Po Rennes, rapporteur M. JARRIGE François, Maître de conférences à Université de Bourgogne, examinateur Mme BLANC-NOEL Nathalie, Maître de conférences à Université de Bordeaux, examinateur M.
    [Show full text]
  • Citizen Snowden
    International Journal of Communication 11(2017), 843–857 1932–8036/20170005 Citizen Snowden ENGIN ISIN1 Queen Mary University of London, UK EVELYN RUPPERT Goldsmiths University of London, UK What kind of citizenship has Snowden performed? Apparently, it is not American citizenship because American authorities attempted to try him for treason and he became a stateless fugitive. After requesting political asylum in 21 countries, he was eventually granted temporary asylum in Russia. Neither states nor international organizations recognized his act as an act of citizenship. Did Snowden perform a citizenship that is yet to come? Did he perform an international citizenship? The issue of rights usually recognized in the literature on the debate about Snowden’s act concerns its content such as the practices of states spying on their citizens. This article focuses on the act itself as making digital rights claims that do not yet exist in law. We argue that just as Snowden’s act disrupted surveillance practices that evermore traverse national borders, it also called for digital rights and responsibilities that traverse national legal orders. Keywords: citizenship, performativity, international politics, digital rights I believe in the principle declared at Nüremberg in 1945: “Individuals have international duties which transcend the national obligations of obedience. Therefore individual citizens have the duty to violate domestic laws to prevent crimes against peace and humanity from occurring.” —Edward Snowden, Moscow Declaration2 Engin Isin: [email protected] Evelyn Ruppert: [email protected] Date submitted: 2016–03–29 1 We would like to thank two anonymous reviewers for their two rounds of comments that were incredibly helpful for strengthening our argument.
    [Show full text]
  • En En ***I Report
    EUROPEAN PARLIAMENT 2009 - 2014 Plenary sitting A7-0034/2013 7.2.2013 ***I REPORT on the proposal for a directive of the European Parliament and of the Council on procurement by entities operating in the water, energy, transport and postal services sectors (COM(2011)0895 – C7-0007/2012– 2011/0439(COD)) Committee on the Internal Market and Consumer Protection Rapporteur: Marc Tarabella RR\926628EN.doc PE483.470v03-00 EN United in diversity EN PR_COD_1amCom Symbols for procedures * Consultation procedure *** Consent procedure ***I Ordinary legislative procedure (first reading) ***II Ordinary legislative procedure (second reading) ***III Ordinary legislative procedure (third reading) (The type of procedure depends on the legal basis proposed by the draft act.) Amendments to a draft act In amendments by Parliament, amendments to draft acts are highlighted in bold italics. Highlighting in normal italics is an indication for the relevant departments showing parts of the draft act which may require correction when the final text is prepared – for instance, obvious errors or omissions in a language version. Suggested corrections of this kind are subject to the agreement of the departments concerned. The heading for any amendment to an existing act that the draft act seeks to amend includes a third line identifying the existing act and a fourth line identifying the provision in that act that Parliament wishes to amend. Passages in an existing act that Parliament wishes to amend, but that the draft act has left unchanged, are highlighted in bold. Any deletions that Parliament wishes to make in such passages are indicated thus: [...]. PE483.470v03-00 2/296 RR\926628EN.doc EN CONTENTS Page DRAFT EUROPEAN PARLIAMENT LEGISLATIVE RESOLUTION................................
    [Show full text]
  • A Level Film Studies Candidate Style Answers
    Qualification Accredited A LEVEL Candidate Style Answers FILM STUDIES H410 For first teaching in 2017 H410/02 Critical approaches to film Version 1 www.ocr.org.uk/filmstudies A Level Film Studies Candidate Style Answers Contents Introduction 3 Section A Question 2: Level 5 answer 4 Commentary 6 Section A Question 2: Level 3 answer 7 Commentary 7 Section B Question 4: Level 5 answer 8 Commentary 10 Section B Question 4: Level 3 answer 11 Commentary 11 Section C Question 5: Level 5 answer 12 Commentary 14 Section C Question 5: Level 3 answer 15 Commentary 16 Section C Question 7: Level 5 answer 17 Commentary 19 Section C Question 7: Level 3 answer 20 Commentary 21 Section C Question 10: Level 5 answer 22 Commentary 24 Section C Question 10: Level 3 answer 25 Commentary 25 2 © OCR 2018 A Level Film Studies Candidate Style Answers Introduction Please note that this resource is provided for advice and guidance only and does not in any way constitute an indication of grade boundaries or endorsed answers. Whilst a senior examiner has provided a possible level for each Assessment Objective when marking these answers, in a live series the mark a response would get depends on the whole process of standardisation, which considers the big picture of the year’s scripts. Therefore the level awarded here should be considered to be only an estimation of what would be awarded. How levels and marks correspond to grade boundaries depends on the Awarding process that happens after all/most of the scripts are marked and depends on a number of factors, including candidate performance across the board.
    [Show full text]
  • Journey to the Academy Awards: an Investigation of Oscar-Shortlisted and Nominated Documentaries (2014-2016) PRELIMINARY KEY
    Journey to the Academy Awards: An Investigation of Oscar-Shortlisted and Nominated Documentaries (2014-2016) PRELIMINARY KEY FINDINGS By Caty Borum Chattoo, Co-Director, Center for Media & Social Impact American University School of Communication | Washington, D.C. February 2016 OVERVIEW For a documentary filmmaker, being recognized by the Academy of Motion Picture Arts & Sciences for an Oscar nomination in the Best Documentary Feature category is often the pinnacle moment in a career. Beyond the celebratory achievement, the acknowledgment can open up doors for funding and opportunities for next films and career opportunities. The formal recognition happens in three phases: It begins in December with the Academy’s announcement of a shortlist—15 films that advance to a formal nomination for the Academy’s Best Documentary Feature Award. Then, in mid-January, the final list of five official nominations is announced. Finally, at the end of February each year, the one winner is announced at the Academy Awards ceremony. Beyond a film’s narrative and technical prowess, the marketing campaigns that help a documentary make it to the shortlist and then the final nomination list are increasingly expensive and insular, from advertisements in entertainment trade outlets to lavish events to build buzz among Academy members and industry influencers. What does it take for a documentary film and its director and producer to make it to the top—the Oscars shortlist, the nomination and the win? Which film directors are recognized—in terms of race and gender?
    [Show full text]
  • Online Anonymity Islamic State and Surveillance
    online anonymity islamic state and surveillance Jamie Bartlett Alex Krasodomski-Jones March 2015 Open Access. Some rights reserved. As the publisher of this work, Demos wants to encourage the circulation of our work as widely as possible while retaining the copyright. We therefore have an open access policy which enables anyone to access our content online without charge. Anyone can download, save, perform or distribute this work in any format, including translation, without written permission. This is subject to the terms of the Demos licence found at the back of this publication. Its main conditions are: . Demos and the author(s) are credited . This summary and the address www.demos.co.uk are displayed . The text is not altered and is used in full . The work is not resold . A copy of the work or link to its use online is sent to Demos. You are welcome to ask for permission to use this work for purposes other than those covered by the licence. Demos gratefully acknowledges the work of Creative Commons in inspiring our approach to copyright. To find out more go to www.creativecommons.org Partners Credits Commissioned by? Published by Demos March 2015 © Demos. Some rights reserved. Third Floor Magdalen House 136 Tooley Street London SE1 2TU [email protected] www.demos.co.uk 2 INTRODUCTION This is a very short discussion paper about the way in which terrorist groups, and specifically Islamic State, use modern encryption systems to evade surveillance. It examines how the risks of online anonymity are weighed against its many social, personal and economic benefits.
    [Show full text]
  • Defense of Secret Agreements, 49 Ariz
    +(,1 2 1/,1( Citation: Ashley S. Deeks, A (Qualified) Defense of Secret Agreements, 49 Ariz. St. L.J. 713 (2017) Provided by: University of Virginia Law Library Content downloaded/printed from HeinOnline Fri Sep 7 12:26:15 2018 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at https://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text. -- To obtain permission to use this article beyond the scope of your HeinOnline license, please use: Copyright Information Use QR Code reader to send PDF to your smartphone or tablet device A (QUALIFIED) DEFENSE OF SECRET AGREEMENTS Ashley S. Deeks* IN TRO DU CTION ............................................................................................ 7 14 I. THE SECRET COMMITMENT LANDSCAPE ............................................... 720 A. U.S. Treaties and Executive Agreements ....................................... 721 B. U .S. Political Arrangem ents ........................................................... 725 1. Secret Political Arrangements in U.S. Law ............................. 725 2. Potency of Political Arrangements ........................................... 728 C. Secret Agreements in the Pre-Charter Era ..................................... 730 1. Key Historical Agreements and Their Critiques ...................... 730 a. Sem inal Secret Treaties ....................................... 730 b. Critiques of the Treaties .....................................
    [Show full text]
  • National Insecurity: the Impacts of Illegal Disclosures of Classified Information
    National Insecurity: The Impacts of Illegal Disclosures of Classified Information MARK D. YOUNG* There had never been anything like it. In today's terms, it was as if an NSA employee had publicly revealed the complete communications intelligence operations of the Agency for the past twelve years-all its techniques and major successes, its organizational structure and budget-and had, for good measure, included actual intercepts, decrypts, and translations of the communications not only of our adversaries but of our allies as well.' In the mid-summer of 2013, the British newspaper, The Guardian, published claims by a contractor for the National Security Agency (NSA), that millions of telephone records were being collected under an order from the Foreign Intelligence Surveillance Court. Throughout the summer and fall, additional disclosures about apparent surveillance operations seized headlines around the world. Accurately interpreting the meaning of the disclosures has been more complicated, but it is clear that there is great public interest in United States intelligence activities. *Mark D. Young is the Senior Vice President and Chief Strategy Officer of National Security Partners, LLC. Previously he served as the Executive Director for the Directorate of Plans and Policy at United States Cyber Command, the Special Counsel for Defense Intelligence for the House Permanent Select Committee on Intelligence, and as a senior leader at the National Security Agency. The views expressed in this article are those of the author and do not reflect the official policy or position of the U.S. government. This article is derived entirely from open source material and contains no classified information.
    [Show full text]
  • Europa-Union München Mitwirken Am Europa Der Bürger
    Europa-Union München Mitwirken am Europa der Bürger Union Europäischer Föderalisten - Union of European Federalists - Union des Fédéralistes Européens - Unione dei Federalisti Europei Bericht für das Jahr 2019 Veranstaltungen des Bezirksverbands München der Europa-Union Im Januar Inhaltliche Mitwirkung im Rahmen des ProEuropaNetzwerks München & Oberbayern (PEN) an der Vorbereitung des „Citizen Panels“ der Landeshaupt- stadt München und EUROCITIES sowie Teilnahme an der Diskussion im Kreisver- waltungsreferat. Ebenfalls im Rahmen des PEN: Mitwirkung am Bürgerdialog mit dem Bayeri- schen Staatsminister für Bundes- und Europaangelegenheiten Dr. Florian Herrmann im Prinz-Carl-Palais: Europa-Diskussion mit Schülern und Lehrlingen. Weitere Kooperationspartner waren die Vertretung des Europäischen Parlaments in München, die Landeszentrale für politische Bildungsarbeit, die Europäische Akademie Bayern, das Europe Direct Informationszentrum München und das Centrum für an- gewandte Politikforschung, LMU. Im Februar Podiumsdiskussion „Europa in Bayern – Bayern in Europa“ im ASZ Lehel in Kooperation mit der Europäischen Akademie Bayern, der Landeszentrale und dem Europe Direct Informationszentrum: Diskussion von Mitgliedern des Europaaus- schusses des Bayerischen Landtags mit Erstwählern. Im März Vortragsabend mit dem Bundesminister für Wirtschaft und Energie Peter Alt- maier, MdB (CDU) bei Giesecke+Devrient zum Thema „Deutschland und Euro- pa in einer Welt des Wandels“ . Es handelte sich um eine Kooperation mit der Aka- demie für Politische Bildung, der Europäischen Akademie Bayern, der Griechischen Akademie, den Jungen Europäischen Föderalisten und der Deutsch-Hellenischen Wirtschaftsvereinigung. Mitwirkung im Rahmen des PEN am „Bürgerdialog: Stammtisch Europa“ mit den Stadträten Sonja Haider (ÖDP) und Thomas Ranft (FDP) und zudem an dem „Bür- gerdialog: Stammtisch Europa“ mit Maria Noichl, MdEP (SPD) und Prof. Klaus Buchner, MdEP (ÖDP), jeweils im Gasteig und in Kooperation mit Europe Direct.
    [Show full text]