III Seminário Idn Jovem

Total Page:16

File Type:pdf, Size:1020Kb

III Seminário Idn Jovem 30 º n III SEMINÁRIO IDN JOVEM ANDRÉ COUTINHO MENDES, CAROLINA BRÁS NOVO, JOANA ARAÚJO LOPES, JOÃO LYLE MARTINS LUCE, MÁRCIO FERREIRA GUIMARÃES, PEDRO MIGUEL CONSTANTINO, MARIA SOFIA MacEDO, CAROLINA BARATA, FREDERICO RIBEIRO BENVINDA, SORAIA MARQUES CARVALHO, ANA CLÁUDIA CAMPOS, ANNA MOMOTOVA, NATÁLIA RODRIGUES, CLAUDIA SOARES DE ALMEIDA, RUI FLORÊNCIO ISSN 1647-9068 00030 Instituto Instituto da Defesa Nacional 9 7 7 1 6 4 7 9 0 6 0 0 0 da Defesa Nacional nº30 III Seminário IDN Jovem Comentadores Prof. Doutor Bruno Ferreira Costa Prof. Doutora Liliana Reis Ferreira Prof. Doutor Samuel de Paiva Pires Prof. Doutor António Marques Prof. Doutor Donizete Rodrigues Prof. Doutora Maria João Simões Papers Ameaças Transnacionais Política Externa Segurança Energética e Economia Migrações e Direitos Humanos Informação e Segurança do Ciberespaço Covilhã 5 e 6 de Abril de 2018 Instituto da Defesa Nacional Os Cadernos do IDN resultam do trabalho de investigação residente e não residente promovido pelo Instituto da Defesa Nacional. Os temas abordados contribuem para o enriquecimento do debate sobre questões nacionais e internacionais. As perspetivas são da responsabilidade dos autores não refletindo uma posição institucional do Instituto da Defesa Nacional sobre as mesmas. Diretor Vitor Rodrigues Viana Coordenador Editorial Alexandre Carriço Núcleo de Edições Capa António Baranita Nuno Fonseca/nfdesign Propriedade, Edição e Design Gráfico Instituto da Defesa Nacional Calçada das Necessidades, 5, 1399-017 Lisboa Tel.: 21 392 46 00 Fax.: 21 392 46 58 E-mail: [email protected] www.idn.gov.pt Composição, Impressão e Distribuição EUROPRESS – Indústria Gráfica Rua João Saraiva, 10-A – 1700-249 Lisboa – Portugal Tel.: 218 494 141/43 Fax.: 218 492 061 E-mail: [email protected] www.europress.pt ISSN 1647-9068 ISBN: 978-972-27-1994-0 Depósito Legal 344513/12 © Instituto da Defesa Nacional, 2018 2 III SEMINÁRIO IDN JOVEM Preâmbulo A segurança e a defesa estão intrinsecamente ligadas aos valores da liberdade e do bem-estar. A preservação destes valores, indissociáveis do modo de vida das sociedades democráticas, deve encontrar nos jovens o seu garante futuro e o seu principal ativo. As Universidades, como plataforma geradora de conhecimento, reflexão crítica e responsáveis pela transmissão de conceitos e práticas de cidadania às gerações futuras, nas mais diversas áreas de atividade, contam com o Instituto da Defesa Nacional (IDN) como um parceiro ativo para a consecução desse objetivo. Depois do sucesso das primeira e segunda edições do Seminário “IDN Jovem” (novembro de 2016 e abril de 2017), o Instituto da Defesa Nacional, numa organização conjunta com diversos Núcleos de Estudantes de Ciência Política e de Relações Interna- cionais de Universidades Portuguesas, promoveu na Universidade da Beira Interior, na Covilhã, entre 5 e 6 de abril de 2018, o terceiro “Seminário IDN Jovem”. Neste evento científico, para além das palestras de três Keynote Speakers, o evento contou com apresen- tações de 19 papers elaborados pelos estudantes de faculdades das regiões de Braga, Coim- bra, Covilhã, Lisboa e Porto, que se enquadraram nos seguintes grupos temáticos: Amea- ças Transnacionais; Política Externa; Segurança Energética e Economia; Migrações e Direitos Humanos, e Informação e Segurança no Ciberespaço. A sessão de abertura do III “Seminário IDN Jovem” contou com a presença de Sua Excelência O Ministro da Defesa Nacional, Professor Doutor José Alberto de Azeredo Lopes, que proferiu uma intervenção subordinada ao tema “Diplomacia e Defesa”. O principal objetivo deste “Seminário IDN Jovem” foi, uma vez mais, o de propor- cionar aos estudantes de licenciatura, pós-graduação, mestrado e doutoramento, um espaço de apresentação pública das suas reflexões e debates científicos sobre temáticas relacionadas com a segurança e defesa, cujo aprofundamento resulta nos artigos agora publicados no presente número dos Cadernos do IDN. Este é um compromisso que o Instituto da Defesa Nacional se orgulha de manter com os estudantes do ensino superior, aproximando-os das temáticas de segurança e defesa e potenciando os seus contributos e reflexões na promoção de um debate alargado e participado pelas novas gerações. Vítor Rodrigues Viana IDN CADERNOS 3 4 III SEMINÁRIO IDN JOVEM Índice Preâmbulo 3 Vítor Rodrigues Viana PAINEL 1 – AMEAÇAS Transnacionais Human Terrain System: a Ascensão e Queda da Informação Sociocultural no Esforço de Contrainsurgência – o Caso do Afeganistão 29 André Coutinho Mendes O Salafismo-Jihadismo e uma Nova Forma de Terrorismo: o Estado Islâmico 47 Carolina Brás Novo O Terrorismo, os Mass Media e a Securitização 59 Joana Araújo Lopes PAINEL 2 – POLÍTICA EXTERNA Russia and the Middle East: Revisiting the History and Propaganda in Kremlin-Assad Relations 91 João Lyle Martins Luce Terrorismo: Reflexões Acerca dos Instrumentos Jurídico-Políticos da UE 105 Márcio Ferreira Guimarães European Union vs Russia: the Pictures in our Heads 123 Pedro Miguel Constantino As Pretensões Geoestratégicas da Federação Russa: um Jogo de Soma Zero 139 Maria Sofia Macedo Estratégia Internacional das Grandes Potências: o Conceito Estratégico Nacional da China 163 Carolina Barata O Mar em Zófimo Consiglieri Pedroso: a Sucessão de Hegemonias e a Permanência do Impacto Português 183 Frederico Ribeiro Benvinda IDN CADERNOS 5 António Maria de Bettencourt Rodrigues: os Pan-movements, a Grande Guerra e a Europa 197 Soraia Marques Carvalho PAINEL 3 – SEGURANÇA ENERGÉTICA E ECONOMIA Segurança Energética Europeia: o Corredor de Gás Meridional e o Projeto EastMed 215 Ana Cláudia Campos Impacto do Energiewende Alemão na Europa: o Papel do Nord Stream 2 na Segurança Energética Europeia 237 Anna Momotova PAINEL 4 – MIGRAÇÕES E DIREITOS HUMANOS Migrações Influenciadas pelas Alterações Climáticas: a Problemática da Lacuna Jurídica no Direito Internacional 257 Natália Rodrigues PAINEL 5 – INFORMAÇÃO E SEGURANÇA NO CiberespaÇO A Problemática da Cibersegurança: o Caso da Estratégia Nacional de Segurança no Ciberespaço 271 Cláudia Soares de Almeida Apanhados na Rede: Programa de Vigilância da NSA após o 11 de Setembro 289 Rui Florêncio 6 III SEMINÁRIO IDN JOVEM Instituto da Defesa Nacional III Seminário IDN Jovem Instituto da Defesa Nacional e Universidade da Beira Interior Covilhã, 5 e 6 de Abril de 2018 Papers Ameaças Transnacionais Política Externa Segurança Energética e Economia Migrações e Direitos Humanos Informação e Segurança do Ciberespaço IDN CADERNOS 7 Papers do “III Seminário IDN Jovem” Quinta-feira, 05 de abril de 2018 1 – Ameaças Transnacionais Comentador: Professor Doutor (14H15 – 15H45) Bruno Ferreira Costa “Human Terrain System: a ascensão e a queda da André Manuel Cordeiro Coutinho informação sócio-cultural no esforço de Mendes contra-insurgência – o caso do Afeganistão” “O Salafismo-Jihadismo e uma Nova Forma de Carolina Martins Brás Novo Terrorismo: o Estado Islâmico” “O (in)Sucesso do Terrorismo Depende de ti” Joana Araújo Lopes Comentadores: Professora Doutora 2 – Política Externa Liliana Reis Ferreira (16H00 – 17H30) Professor Doutor Samuel de Paiva Pires “Russia and the Middle East: revisiting the history and João Lyle Martins Luce propaganda in Kremlin-Assad relations” “A Ação Externa da União Face ao Terrorismo” Márcio Jorge Ferreira Guimarães “European Union vs Russia: the pictures in our heads” Pedro Miguel Moreira Constantino “As Pretensões Geoestratégicas da Federação Russa: Maria Sofia Cardoso Borges de um jogo de soma zero” Macedo “Estratégia Internacional das Grandes Potências: o Carolina Antunes Barata Pires Vilela conceito estratégico nacional da China” “O Mar em Zófimo Consiglieri Pedroso: a sucessão de Frederico de Sousa Ribeiro Benvinda hegemonias e a permanência do impacto português” “António Maria de Bettencourt Rodrigues: Soraia Milene Marques Carvalho os pan-movements, a Grande Guerra e a Europa” 8 III SEMINÁRIO IDN JOVEM Quarta-feira, 06 de abril de 2018 3 – Segurança Energética e Economia Comentador: Professor Doutor (11H00 – 12H30) António Marques “Segurança Energética Europeia: o corredor de gás Ana Cláudia Figueiredo Sousa meridional e o projeto EastMed” Campos “Impacto do Energiewende Alemão na Europa: papel do Anna Momotova Nord Stream 2 na segurança energética europeia” 4 – Migrações e Direitos Humanos Comentador: Professor Doutor (11H00 – 11H30) Donizete Rodrigues “Migrações Induzidas pelas Alterações Climáticas: uma ameaça à segurança ou uma oportunidade de Natália Rodrigues Alves desenvolvimento?” 5 – Informação e Segurança no Ciberespaço Comentador: Professora Doutora (11H30 - 12H30) Maria João Simões “A Problemática da Cibersegurança: o caso português” Cláudia Marisa Soares de Almeida “Apanhados na Rede: programa de vigilância da NSA Rui Filipe de Oliveira Florêncio em democracia” III Seminário IDN Jovem IDN CAInstitutoDERNOS 9 da Defesa Nacional Papers do “III Seminário IDN Jovem” 10 III SEMINÁRIO IDN JOVEM Sessão 1: Ameaças Transnacionais André Manuel Cordeiro Coutinho Mendes, Mestrando em Estratégia, Instituto Superior de Ciências Sociais e Políticas da Universidade de Lisboa (ISCSP-UL). Human Terrain System: a ascensão e a queda da informação sócio- -cultural no esforço de contra-insurgência – o caso do Afeganistão RESUMO O Human Terrain System foi criado em 2005 para colmatar as dificuldades sócio-culturais existentes no seio de um problema de contra-insurgência, nos teatros de operações do Ira- que e do Afeganistão. Neste estudo, procura-se analisar este programa nos seus variados parâmetros, as suas vicissitudes e o impacto
Recommended publications
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • The National Security Agency: Missions, Authorities, Oversight and Partnerships
    9 August 2013 National Security Agency The National Security Agency: Missions, Authorities, Oversight and Partnerships ³7KDW¶VZK\LQWKH\HDUVWRFRPHZHZLOOKDYHWRNHHSZRUNLQJKDUGWRVWULNHWKHDSSURSULDWH balance between our need for security and preserving those freedoms that make us who we are. That means reviewing the authorities of law enforcement, so we can intercept new types of communication, but also build in privacy protections to prevent abuse´ --President Obama, May 23, 2013 In his May 2013 address at the National Defense University, the President made clear that we, as a Government, need to review the surveillance authorities used by our law enforcement and intelligence community professionals so that we can collect information needed to keep us safe and ensure that we are undertaking the right kinds of privacy protections to prevent abuse. In the wake of recent unauthorized disclosures about some of our key intelligence collection programs, President Obama has directed that as much information as possible be made public, while mindful of the need to protect sources, methods and national security. Acting under that guidance, the Administration has provided enhanced transparency on, and engaged in robust public discussion about, key intelligence collection programs undertaken by the National Security Agency (NSA). This is important not only to foster the kind of debate the President has called for, but to correct inaccuracies that have appeared in the media and elsewhere. This document is a step in that process, and is aimed at providing a VXFFLQFWGHVFULSWLRQRI16$¶V mission, authorities, oversight and partnerships. Prologue After the al-4D¶LGDDWWDFNVRQWKH:RUOG7UDGH&HQWHUDQGWKH3HQWDJRQWKH&RPPLVVLRQ found that the U.S. Government had failed to identify and connect the many ³dots´ of information that would have uncovered the planning and preparation for those attacks.
    [Show full text]
  • SSO Corporate Portfolio Overview
    SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 What is SSO's Corporate Portfolio? What data can we collect? Where do I go for more help? Agenda 2 What is SSO's Corporate Portfolio? What is SSO Corporate access collection? (TS//SI//NF) Access and collection of telecommunications on cable, switch network, and/or routers made possible by the partnerships involving NSA and commercial telecommunications companies. 3 Brief discussion of global telecommunications infrastructure. How access points in the US can collect on communications from "bad guy" countries (least cost routing, etc.) 4 Unique Aspects Access to massive amounts of data Controlled by variety of legal authorities Most accesses are controlled by partner Tasking delays (TS//SI//NF) Key Points: 1) SSO provides more than 80% of collection for NSA. SSO's Corporate Portfolio represents a large portion of this collection. 2) Because of the partners and access points, the Corporate Portfolio is governed by several different legal authorities (Transit, FAA, FISA, E012333), some of which are extremely time-intensive. 3) Because of partner relations and legal authorities, SSO Corporate sites are often controlled by the partner, who filters the communications before sending to NSA. 4) Because we go through partners and do not typically have direct access to the systems, it can take some time for OCTAVE/UTT/Cadence tasking to be updated at site (anywhere from weekly for some BLARNEY accesses to a few hours for STORMBREW). 5 Explanation of how we can collect on a call between (hypothetically) Iran and Brazil using Transit Authority.
    [Show full text]
  • By Gil Carlson
    No longer is there a separation between Earthly technology, other worldly technology, science fiction stories of our past, hopes and aspirations of the future, our dimension and dimensions that were once inaccessible, dreams and nightmares… for it is now all the same! By Gil Carlson (C) Copyright 2016 Gil Carlson Wicked Wolf Press Email: [email protected] To discover the rest of the books in this Blue Planet Project Series: www.blue-planet-project.com/ -1- Air Hopper Robot Grasshopper…7 Aqua Sciences Water from Atmospheric Moisture…8 Avatar Program…9 Biometrics-At-A-Distance…9 Chembot Squishy SquishBot Robots…10 Cormorant Submarine/Sea Launched MPUAV…11 Cortical Modem…12 Cyborg Insect Comm System Planned by DARPA…13 Cyborg Insects with Nuclear-Powered Transponders…14 EATR - Energetically Autonomous Tactical Robot…15 EXACTO Smart Bullet from DARPA…16 Excalibur Program…17 Force Application and Launch (FALCON)…17 Fast Lightweight Autonomy Drones…18 Fast Lightweight Autonomous (FLA) indoor drone…19 Gandalf Project…20 Gremlin Swarm Bots…21 Handheld Fusion Reactors…22 Harnessing Infrastructure for Building Reconnaissance (HIBR) project…24 HELLADS: Lightweight Laser Cannon…25 ICARUS Project…26 InfoChemistry and Self-Folding Origami…27 Iron Curtain Active Protection System…28 ISIS Integrated Is Structure…29 Katana Mono-Wing Rotorcraft Nano Air Vehicle…30 LANdroid WiFi Robots…31 Lava Missiles…32 Legged Squad Support System Monster BigDog Robot…32 LS3 Robot Pack Animal…34 Luke’s Binoculars - A Cognitive Technology Threat Warning…34 Materials
    [Show full text]
  • SSO FAIRVIEW Overview
    TOP SECRET//SI/OC//NOFORN SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN AGENDA • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING DATA WE COLLECTED • (U) FAIRVIEW WAY AHEAD AND WHAT IT MEANS FOR YOU • (U) QUESTIONS TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN International Cables (TS//SI//NF) (TS//SI//NF) TOP SECRET//SI/OC//NOFORN Brief discussion of global telecommunications infrastructure. How access points in the US can collect on communications from “bad guy” countries (least cost routing, etc.) TOP SECRET//SI/OC//NOFORN WHERE SSO IS ACCESSING YOUR TARGET (TS//SI//NF) SSO TARGET UNILATERAL PROGRAMS CABLE MAIL, VOIP, TAP CLOUD SERVICES CORP PARTNER RAM-A RAM-I/X RAM-T RAM-M DGO SSO WINDSTOP BLARNEY SSO CORP MYSTIC AND PRISM FAIRVIEW STORMBREW OAKSTAR TOPI PINWALE XKEYSCORE TURMOIL (TS//SI//NF) TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN FAIRVIEW DEFINED • (TS//SI//NF) Large SSO Program involves NSA and Corporate Partner (Transit, FAA and FISA) • (TS//SI//REL FVEY) Cooperative effort associated witH mid- point collection (cable, switch, router) • (TS//SI//NF) THe partner operates in tHe U.S., but Has access to information tHat transits tHe nation and tHrougH its corporate relationships provide unique accesses to otHer telecoms and ISPs (TS//SI//NF) 5 (TS//SI//NF) TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN Unique Aspects (C) Access to massive amounts of data (C) Controlled by variety of legal authorities (C) Most accesses are controlled by partner (C) Tasking delays TOP SECRET//SI/OC//NOFORN (TS//SI//NF) Key Points: 1) SSO provides more than 80% of collection for NSA.
    [Show full text]
  • Mass Surveillance Part 1 - Risks and Opportunities Raised by the Current Generation of Network Services and Applications
    Science and Technology Options Assessment (STOA) Mass Surveillance Part 1 - Risks and opportunities raised by the current generation of network services and applications ANNEX EPRS | European Parliamentary Research Service Scientific Foresight (STOA) Unit PE 527.409 EN Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Annex IP/G/STOA/FWC-2013-1 - LOT 9 – Safety and security technologies December 2014 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance – Risks, Opportunities and Mitigation Strategies Part 1” was carried out by TECNALIA Research and Investigation. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero José Javier Larrañeta Ibañez Stefan Schuster (Editor) STOA RESEARCH ADMINISTRATOR Peter Ide-Kostic Scientific Foresight Unit Directorate for Impact Assessment and European Added Value Directorate-General for Parliamentary Research Services European Parliament, Rue Wiertz 60, B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSION Original: EN ABOUT THE PUBLISHER To contact STOA or to subscribe to its newsletter please write to: [email protected] This document is available on the Internet at: http://www.ep.europa.eu/stoa/ Manuscript completed in November, 2014 Brussels, © European Union, 2014 DISCLAIMER The content of this document is the sole responsibility of the author and any opinions expressed therein do not necessarily represent the official position of the European Parliament. It is addressed to the Members and staff of the EP for their parliamentary work.
    [Show full text]
  • Biblioteca Digital
    Universidad de Buenos Aires Facultades de Ciencias Económicas, Ciencias Exactas y Naturales e Ingeniería Carrera de Especialización en Seguridad Informática Trabajo Final “Vigilancia masiva y manipulación de la opinión pública” Autor: Ing. Juan Ignacio Schab Tutor: Dr. Pedro Hecht Año de presentación: 2020 Cohorte 2018 Declaración Jurada del origen de los contenidos Por medio de la presente, el autor manifiesta conocer y aceptar el Reglamento de Trabajos Finales vigente y se hace responsable que la totalidad de los contenidos del presente documento son originales y de su creación exclusiva, o bien pertenecen a terceros u otras fuentes, que han sido adecuadamente referenciados y cuya inclusión no infringe la legislación Nacional e Internacional de Propiedad Intelectual. Ing. Juan Ignacio Schab DNI 37.338.256 Resumen Dos escándalos de gran repercusión internacional han contribuido para probar la real dimensión de los dos temas que dan título al presente trabajo. El primero de ellos fue la revelación de miles de documentos clasificados de agencias de inteligencia, principalmente estadounidenses, realizada por Edward Snowden, ex contratista de la CIA y la NSA, en el año 2013, la cual dio detalles de la extendida y profunda vigilancia masiva a escala global, la cual destruye el derecho a la privacidad y limita las libertades individuales. El otro hecho fue la participación de la empresa Cambridge Analytica en procesos electorales de distintos países del mundo, especialmente en las elecciones presidenciales de Estados Unidos en 2016 y en el referéndum para la salida de Gran Bretaña de la Unión Europea en el mismo año, revelada por ex trabajadores de la misma y por investigaciones de medios de comunicación, el cual permitió dar detalles sobre la capacidad de manipulación de la opinión pública principalmente a través de redes sociales.
    [Show full text]
  • Cyber Espionage
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Wirtschaftsinformatik eingereicht von Oleg Denisov Matrikelnummer 0725490 am Fachbereich Rechtswissenschaften der Technischen Universität Wien Betreuung: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Wien, 20.04.2014 (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Business Informatics by Oleg Denisov Registration Number 0725490 to the department of law at the Vienna University of Technology Advisor: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Vienna, 20.04.2014 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Oleg Denisov Geerzkamp 7, 22119 Hamburg Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]
  • Surveillance and International Standards Michael Karanicolas Published in London 2014 by Global Partners Digital
    Travel Guide to the Digital World: SURVEILLANCE AND INTERNATIONAL STANDARds Michael Karanicolas Published in London 2014 by Global Partners Digital This work is licensed under Creative Commons, Attribution-NonCommercial-ShareAlike Travel Guide to the Digital World: SURVEILLANCE AND INTERNATIONAL STANDARds Michael Karanicolas “If you look back on the forecasts of surveillance… it turns out that George Orwell was an optimist.” Mikko Hyppönen, Security Researcher How the NSA betrayed the world’s trust - time to act, October 2013 6 It is always advisable to do some research before you embark on a trip. A wise traveller will understand their destination before they depart, paying particular attention to any potential security concerns. It may seem strange to apply this advice to the internet, because most people reading this Guide will feel a sense of familiarity, even intimacy, with the online world. Yet, as the ongoing disclosures by Edward Snowden about surveillance from June 2013 have demonstrated, there is more to the online world than meets the eye. You may be alone in your home or office, but in the online world you most certainly are not. With each new disclosure, fears over the extent of government surveillance continue to mount, while senior officials claim that the leaks are undermining the ability of law enforcement and national security agencies to keep the digital world safe. In the face of this shifting landscape, it is important to try and understand how surveillance works online, and what privacy and anonymity really mean in a digital context. Understanding Surveillance and anonymity For many people, anonymity is an important value online as it provides them with a tremendous feeling of freedom.
    [Show full text]
  • No Oversight, No Limits, No Worries: a Primer on Presidential Spying and Executive Order 12,333 ______
    58 Harvard National Security Journal / Vol. 12 ARTICLE No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333 _________________________ Mark M. Jaycox* *Mark M. Jaycox, Policy Counsel, Google. Prior to this, the author served as the Civil Liberties Legislative Lead at the Electronic Frontier Foundation, where he specialized on consumer privacy issues, cybersecurity, electronic surveillance, and national security law. B.A., Reed College; J.D., UC Berkeley School of Law. The author would like to thank the Professor who oversaw the initial drafts of this paper at Berkeley, Jim Dempsey. He would also like to thank Lee Tien, Jonathan Mayer, Ashkan Soltani, Neema Singh Guliani, and many more for their critical insights, discussions, and debates on this topic. Copyright © 2021 by the President and Fellows of Harvard College and Mark M. Jaycox. 2021 / No Oversight, No Limits, No Worries 59 Abstract Executive Order 12,333 ("EO 12333") is a 1980s Executive Order signed by President Ronald Reagan that, among other things, establishes an overarching policy framework for the Executive Branch's spying powers. Although electronic surveillance programs authorized by EO 12333 generally target foreign intelligence from foreign targets, its permissive targeting standards allow for the substantial collection of Americans' communications containing little to no foreign intelligence value. This fact alone necessitates closer inspection. This Article conducts such an inspection by collecting and coalescing the various declassifications, disclosures, legislative investigations, and news reports concerning EO 12333 electronic surveillance programs in order to provide a better understanding of how the Executive Branch implements the order and the surveillance programs it authorizes.
    [Show full text]
  • Article the Pursuit of Full Spectrum Dominance: the Archives of The
    The Pursuit of Full Spectrum Dominance: The Article Archives of the NSA Johan Lau Munkholm University of Copenhagen, Denmark [email protected] Abstract This article explores the archives of the National Security Agency (NSA) and the inherent logic vested in the agency’s management of them. By drawing on Derrida’s conception of the archive and the compulsion to administer and complete it, this article suggests that the data collection practices, as well as the rhetoric, of the NSA indicate a specific logic of gathering and organizing data that presents a fantasy of perfect surveillance and pre-emptive intervention that stretches into the future to cancel emergent threats. To contextualize an understanding of the archival practices of the NSA within a wider conquest for complete security and US hegemony, this article outlines the US Department of Defense’s vision for full spectrum dominance, stressing that a show of force is exercised according to a logic of appropriate response that ranges from soft to hard power. As an organization that produces knowledge and risk factors based on data collection, the NSA is considered a central actor for understanding the US security regime’s increasing propensity for data-based surveillance that is fundamentally structured around the data center: a specific kind of archive. Introduction On May 30, 2000, the US Department of Defense (DoD) released the document “Joint Vision 2020” in which it established guidelines for the continuing transformation of the US Armed Forces. The DoD envisioned this transformation to be completed by 2020, by which time the military would have to be fully capable of responding to a new environment of threats already in the process of unfolding.
    [Show full text]