Virtual Attacks and the Problem of Responsibility: the Case of China and Russia

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Attacks and the Problem of Responsibility: the Case of China and Russia Virtual attacks and the problem of responsibility: the case of China and Russia Daniel Oppermann Virtual attacks are forming a new threat scenario for governments and other actors of global society. The first decade of the XXI century saw an intensification of cyberattacks on government networks which could not be traced back. However, due to political circumstances there were often actors suspected of being involved in cyberattacks. This case study is analyzing the methods and reasons of potential attackers in Russia and China which between 2004 and 2009 appeared in several cyber threat scenarios. Keywords: cybersecurity, cyberattack, China, Russia Ataques virtuais representam um novo cenário de ameaça para governos e outros atores da sociedade global. Durante a primeira década do século XXI houve uma intensificação de ataques cibernéticos de origem desconhecida contra redes governamentais. Porém, devido às circunstâncias políticas, muitas vezes havia atores suspeitos de estarem envolvidos em ataques virtuais. Essa pesquisa de caso está analisando os métodos e razões dos atacantes potenciais na Rússia e na China, os quais apareceram em vários cenários de ameaças cibernéticas entre 2004 e 2009. Palavras-chave: segurança cibernética, ataque cibernético, China, Rússia n January 2009 the US administration under then or what their intentions were. Nevertheless in some cases recently elected US President Obama released a cybersecurity experts succeed to trace back online attacks new US Agenda for Homeland Security underli- although they hardly had any legal possibilities against the ning growing attention to virtual attacks and cyber- possible attackers due to the borderless character of the security by announcing the position of a national Internet and the lack of appropriate policies or legal fra- cybersecurity advisor reporting directly to the President. meworks. In other cases political circumstances alluded IFour months later, in May 2009, Obama confirmed his to where attackers might have come from and what their plans during a speech in the White House, without ha- intentions were. ving appointed an advisor so far. When in September 2009 Melissa Hathaway resigned from her position as the The US are not the only victim of cyberattacks. Almost Acting Senior Director for Cyberspace for the National all states have suffered virtual attacks in the past ten years Security and Homeland Security Councils, speculations but so far only few resulted in serious concerns or have about the difficulties to find a qualified candidate to co- been made public. While some (and those are more rele- ordinate national cybersecurity issues in the US started vant for this article) have a political background, others are putting pressure on the US administration (Nakashima, more connected to criminal activites. As being among the 2009). In those first eight months of hesitation hundreds of strongest global economies with a well developed telecom- cyberattacks happened on governmental and private eco- munication infrastructure the US are having high interests nomy severs in the US and other countries. Most of them in protecting their networks from such hostile activities. were not covered in the media and many stayed unknown Therefore they have a crucial role in developing means of even to the institutions or companies being attacked. In protection against virtual attacks (and probably seeking most cases it was unclear where the attackers agitated from ways to launch attacks by themselves). Besides them also the European Union is addressing the problem and wa- tching global developments with concern, discussing cy- Daniel Oppermann é doutorando do Instituto de Relações bersecurity policies. Internacionais da Universidade de Brasília (IREL-UnB) e pesquisador do Observatório Político Sul-Americano Concerns over cybersecurity in the past five years have (OPSA) do Instituto de Estudos Sociais e Políticos na frequently included Russia and China, both fast growing Universidade Estadual do Rio de Janeiro (IESP-UERJ). Internet markets and several times being suspected of Carta Internacional Dezembro 2010 11 using their IT infrastructure to infiltrate other countries’ networks. This article will concentrate on the problem of Robert Stakes divides case studies into three categories: virtual attacks and the role the two countries had in this intrinsic, instrumental and collective case studies. This context between 2004 and 2009. Regarding Russia espe- way he tries to differentiate the motives of the researchers. cially the 2004 cyberattacks in Estonia and also the 2008 An intrinsic study aims at understanding the case itself. attacks on Georgia will be discussed. The Chinese case in- The case is the central aspect of the study. The objective is cludes GhostNet, an espionage network that was investiga- nor the development of theories neither the analysis of a ted by Canadian researchers in 2008/2009. phenomenon behind the case. An instrumental study tre- ats the case as an example for a theory or a political or so- The article is structured in six chapters. After this in- cial phenomenon. This phenomenon is the actual interest troduction, the second chapter is going to introduce the of the researcher. The case helps to explain it. The third research method applied and will present the research category is a collective case study. The researcher uses it questions. The third chapter concentrates on the general to investigate several cases that help to explain a certain phenomenon of cybersecurity. It includes the theoreti- phenomenon. Similar to Stakes, Robert Yin divides case cal basic knowledge regarding cybersecurity, cybercrime, studies into two categories: single-case studies and multi- cyberterror, and cyberwar. Furthermore it discusses di- ple-case studies (Yin, 2002, p. 45f). Both have the intent to fferent methods of cyberattacks. The forth and fifth chap- explain the phenomenon behind the case. ter are analysing the two cases of Russia and China and their function in recent cyberattacks on other countries. This present case study is designed as a multiple, ins- Following those two, the final conclusion will pick up the trumental case study (n=2) to analyze the social pheno- menon of virtual attacks on nation states and Almost all states have suffered virtual attacks in the the question of responsibility for such attacks. past ten years but so far only few resulted in serious The focus lies on virtual aggressions between 2004 and 2009 being traced back by the vic- concerns or have been made public. tims to China and Russia. The intention is to analyse information about virtual attacks as research questions again to develop final statements regar- a social phenomenon and about the possibilities to trace ding the problem underlying this article. them back to their origin. The leading research questions are: What are the main kinds of cyberthreats and virtual Research methodology attacks pointed against political and economical networks? How is it possible to trace virtual attacks back to the at- This article is going to analyse the current situation of tacker? Who is using virtual attacks against political and cybersecurity regarding nation states with a focus on vir- economical networks and with what kind of intention? tual attacks and the question who is responsible for them. What roles do Russia and China have concerning virtual A special focus is given on Russia and China which in the attacks on foreign networks? past five years have been accused several times by Western governments of undertaking virtual attacks on govern- The concept of cybersecurity mental institutions and private companies in different countries. The research method applied is the qualitati- Cybersecurity as a concepts has numerous different ve case study design. “A case study (...) is the analysis of dimensions. This chapter is going to categorize the diffe- an object: a country, a political system, an institution, an rent dimensions of cybersecurity being cybercrime, cyber- organization, or a problem in a certain context (...). In a terrorism, and cyberwarfare. After that different forms of comparative analyses different cases on the same topic are virtual attacks will be discussed in general as well as the used.”(Nohlen, 1994, p. 128, translated by the author). The question how they were conducted in the past years. case study design is among the most applied methods in political research. Its origin goes back to 1948 at Harvard In the context of online security, cybersecurity could be University (McNabb, 2004, p. 357). It helps to explain an a simple form of private protection against spam or other individual case and is also able to make a generalization malware distributed on the Internet. It could also mean (although quantitative methods are stronger for genera- protection of family members (for example children) from lization). It can be conducted with one or several cases. accessing unwanted web content. Furthermore it means “Through the study of cases, political scientists are able to protection from ordinary crime or fraud occuring on the learn about political events, agencies, parties and levels of internet like phishing, identity theft, credit card fraud and government and politics around the globe. Cases are also others (McQuade III, 2006, p. 63ff). These types of activi- written to serve as examples of approved management ties are categorized as cybercrime. Cybercrime as a pheno- practices.” (McNabb, 2004, p. 357). menon plays a minor role in this article. Although,
Recommended publications
  • Bronze Soldier April Crisis
    LEGAL INFORMATION CENTRE FOR HUMAN RIGHTS BRONZE SOLDIER APRIL CRISIS ISBN 978-9985-9542-7-0 TALLINN, 2007 BRONZE SOLDIER. April crisis сontentS PREFACE . 7 WAR OF THE MONUMENTS: A CHRONOLOGICAL REVIEW . 10 APRIL RIOTS IN TaLLINN: LEGAL ASPECTS . .24 Part I. LEGAL FRAMEWORK . 24 Part II. OVERVIEW OF APPLICATIONS AGAINST THE ACTIONS OF LAW ENFORCEMENT OFFICIALS . 29 AFTERWORD . 43 ANNEX I . 44 ANNEX II . .50 6 PREFACE There is no doubt that the April events concerning the Bronze Soldier will become a benchmark in the contemporary history of the state of Estonia. It is the bifurcation point, the point of division, separating ‘before’ and ‘after’. For Estonian society these events are even more important than joining NATO or European Union. Before April 2007 we lived in one country and now we are getting used to living in another one. Or were these merely illusions and as Eugeny Golikov wrote «the world has not changed, it has just partially revealed its face» («Tallinn», no. 2‑3, 2007)? Before April 26, 2007 we, the population of Estonia, believed that we lived in a democratic country, with proper separation of powers, with efficiently balanced executive and legislative powers, with independent courts, a free press, social control over government, in particular over the security agencies, and so on. After April 26 it turned out that not all this was true, or was not exactly true, or was even false. It turned out that some mechanisms, considered deeply rooted in the democratic society, had no effect and some procedures were easily abandoned. Just one example: by order of the Police Prefect, all public rallies and meetings in Tallinn were prohibited from April 30 till May 11, 2007 and it did not result in any protests or even questions, although this was a restriction of the constitutional right to express opinions, the right of peaceful assembly, rally and demonstration.
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • XXIX Days of Estonian Jurisprudents 15 Years of Legal Reforms in Estonia Tartu, 19–20 October 2006
    XXIX Days of Estonian Jurisprudents 15 Years of Legal Reforms in Estonia Tartu, 19–20 October 2006 JURIDICA INTERNATIONAL XI/2006 195 XXIX Days of Estonian Jurisprudents Thursday, 19 October 9.0010.00 Registration and morning coffee 10.00 Opening address by Rein Lang, Minister of Justice Morning plenary (Vanemuine Concert Hall) Chairs: Professor Kalle Merusk, Dean, Faculty of Law, University of Tartu; Chairman of the Estonian Academic Law Society Ingrid Siimann, Acting President of the Estonian Lawyers Union 10.1510.40 Ph.D. Jüri Raidla Start of Legal Reforms: from the War of Laws to the Constitution Attorney-at-law, Law Office Raidla & Partners 10.4011.05 Professor Jean-Pierre Massias The Role of Constitutional Law in Democratic Transition Process University of Auvergne (Clermont-Ferrand), Editor of the journal La Revue de Justice Constitutionnelle Est-Européenne 11.0511.30 Professor Paul Varul New Private Law Why This and What will Happen Next? Professor of Civil Law, University of Tartu; Editor-in-chief of the journals Juridica and Juridica International Afternoon plenary (Vanemuine Concert Hall) Chairs: Märt Rask, Chief Justice of the Supreme Court Priidu Pärna, Member of Presidency, Estonian Lawyers Union 12.0012.25 Professor Valentinas Mikelenas Civil Law and Civil Procedural Law Reforms in Lithuania Professor, University of Vilnius 12.2512.50 Dr.iur. Hannes Veinla Environmental Impact of Development Projects: Economy versus the Environment Docent of Environmental Law, University of Tartu 12.5013.15 Martin Hirvoja Updating Economic Crime Law in Estonia Foundations and Emphases Deputy Secretary General of Criminal Policy, Ministry of Justice 196 JURIDICA INTERNATIONAL XI/2006 XXIX Days of Estonian Jurisprudents First private law section Interpretation and Implementation Problems Related to the Law of Obligations (Vanemuine Concert Hall) Chairs: Professor Paul Varul, Professor of Civil Law, University of Tartu Aivar Pilv, Chairman, Estonian Bar Association 15.0015.20 Mag.iur.
    [Show full text]
  • The Missing Puzzle Piece in Translation Pedagogy: Adaptive and Elastic Competence
    Journal ofTrw The Missing Puzzle Piece in Translation Pedagogy: Adaptive and Elastic Competence Grace Qiao Zhang Curtin University, Australia Abstract The study of effective and innovative translation pedagogy has been drawing increasing attention in recent years, but the training of adaptive and elastic competence is somewhat overlooked. This study investigates the importance of strategic translation through the theoretical lens of Verschueren's (1998) Adaptation Theory. The analysis is based on a case study of the 2001 Sino-American Hainan airplane collision crisis, and in pru.ticular the pivotal role of different versions of the American "two sorries" letter in facilitating the resolution. It highlights the need to incorporate language adaptation and the interests of all parties in a translation. This study argues that translation is a negotiable and adaptable process, influenced by both overt and covert components, and that this process should be reflected in translation education by fostering the ability to get behind the text to cater to the interests of all interested patties: that is, to cultivate adaptive and elastic competence. The findings suggest that a realistic, balanced, and robust account of adaptation and elasticity is needed for effective translation education. 1. Introduction Tertiary translation and interpreting education focuses too much on academic and literary translation, and there are immediate needs for training in commercial translation (Schellekens 2004). There have_been ©Department of Translation, The Chinese University of Hong Kong, 2011. Published by The Chinese University Press, ISSN 1027-7978. Journal of Translation Studies 14 (1 & 2) (2011) Missing Puzzle Piece in Translation Pedagogy important developments that suggest a more effective and innovative person to person .
    [Show full text]
  • Nadzor in Zasebnost V Informacijski Družbi
    Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Znanstvena knjižnica Fakulteta za družbene vede Ljubljana, 2006 Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Izdajatelj: Univerza v Ljubljani, Fakulteta za družbene vede Kardeljeva ploščad 5, Ljubljana Zbirka: Znanstvena knjižnica 55 Urednik: dr. Niko Toš Uredniški odbor: dr. Vlado Benko, dr. Zdenko Roter, dr. Tomo Korošec, dr. Vlado Miheljak, dr. Niko Toš Recenzenta: dr. Slavko Splichal dr. Alenka Šelih Likovna oprema: Polona Mesec-Kurdija Lektura: Dora Mali CIP - Kataložni zapis o publikaciji Narodna in univerzitetna knjižnica, Ljubljana 342.721:004.738.5 004.738.5 KOVAČIČ, Matej, 1974- Nadzor in zasebnost v informacijski družbi [Elektronski vir] : filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu / Matej Kovačič. - Ljubljana : Fakulteta za družbene vede, 2006. - (Znanstvena knjižnica / Fakulteta za družbene vede ; 55) Način dostopa (URL): http://dk.fdv.uni-lj.si/eknjige/EK_Kovacic_2006_Nadzor.pdf . - Opis temelji na verziji z dne 19.12.2006 ISBN-10 961-235-261-5 ISBN-13 978-961-235-261-5 230725632 Knjigo je sofinancirala Agencija za raziskovalno dejavnost Republike Slovenije. Knjiga je izdana pod Creative Commons licenco: “Priznanje avtorstva-Nekomercialno-Deljenje pod enakimi pogoji 2.5 Slovenija”. Celotno pravno besedilo licence je dostopno na spletni strani: <http://creativecommons.org/licenses/by-nc-
    [Show full text]
  • Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism
    Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 3 Conference: Expanding the Frontiers of Intelligence Education Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 1-9 Recommended Citation Adkins, Gary. "Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism." Journal of Strategic Security 6, no. 3 Suppl. (2013): 1-9. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 3 Adkins: Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins Introduction The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has become a great asset to both businesses and private citizens. However, there is a dark side to the age we live in as it allows terrorist groups to communicate, plan, fund, recruit, and spread their message to the world. Given the relative anonymity the Internet provides, many law enforcement and security agencies investigations are hindered in not only locating would be terrorists but also in disrupting their operations.
    [Show full text]
  • H. Con. Res. 430
    109TH CONGRESS 2D SESSION H. CON. RES. 430 CONCURRENT RESOLUTION Whereas citizen-to-citizen exchanges offer unique opportuni- ties for learning from one another about commonly- shared solutions to problems, as well as different perspec- tives on forms of government and the aspirations other nations have for their citizens; Whereas the American Council of Young Political Leaders (hereinafter referred to as the ‘‘ACYPL’’) was incor- 2 porated on September 1, 1966, by young leaders to open lines of communication and increase cross cultural under- standing among future generations of political leadership; Whereas ACYPL prepares in-depth study tours for young leaders, aged between 25 and 40 years old, to give them much-needed international exposure early in their polit- ical careers; Whereas ACYPL targets young politicians likely to assume future positions of responsibility and leadership as Fed- eral and State legislators, mayors, city council members and other State and local elected officials, many of whom may not have previously traveled outside the United States; Whereas ACYPL programs are strictly bipartisan: American delegates are drawn equally from both major political parties and from all 50 States; ACYPL’s overseas delega- tions are chosen to represent the political and cultural di- versity of their home countries; Whereas every dollar ACYPL receives in Federal funding be- comes about another dollar and fifty cents through cost- share, in-kind contributions and outside fundraising, making this program one of the most cost effective
    [Show full text]
  • Malware to Crimeware
    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
    [Show full text]
  • High-Level Conference of the Ministries of Justice and of the Interior
    10 November 2006 High-level Conference of the Ministries of Justice and of the Interior “Improving European Co-operation in the Criminal Justice Field” Moscow (Russian Federation) Hotel Marriott 9 − 10 November 2006 (∗) PROVISIONAL LIST OF PARTICIPANTS ∗ States are listed in alphabetical order by their English names. Les Etats sont mentionnés par ordre alphabétique anglais. - 2 - MEMBER STATES ALBANIA Ministry of Justice Mr Aldo BUMÇI, Minister of Justice, TIRANA Mr Arben BRACE, Director, TIRANA Ministry of the Interior Mr Gjergj LEZHJA, Vice-Minister, TIRANA Mr Helidon BEKTESHI, Head of Sector, TIRANA ARMENIA Mr Davit HARUTYUNYAN, Minister of Justice, YEREVAN Mr Anatolih MATEVOSYAN, Deputy Minister of Justice, YEREVAN Mr Hovhannes VARYAN, Deputy Chief of Police, YEREVAN Mr Gevorg VOSKANYAN, Head of the International Co-operation Department of the Police, YEREVAN AUSTRIA Ms Karin GASTINGER, Minister of Justice, VIENNA Ms Barbara GOETH-FLEMMICH, Head of Department, VIENNA Mr Bernhard PUSTER, Member of the Ministers Cabinet, VIENNA Mr Fritz SCHERMANN, Austrian Embassy to the Russian Federation, MOSCOW Mr Michael SCHOEN, Ministry of Justice, VIENNA AZERBAIJAN Ministry of Justice Mr Fikrat MAMMADOV, Minister of Justice, BAKU Mr Adil ABILOV, Assistant Minister of Justice, BAKU Mr Azar JAFAROV, Director, General Department of Organisation and Supervision, BAKU Ministry of the Interior Mr. Ramil USUBOV, Minister of Interior, BAKU Mr. Valentin DJUMAZADE, Deputy Director of International Cooperation Department, BAKU Mr. Bagif SHARIFOV, Plenipotentiary Representative of the Ministry of Interior of Azerbaijan in the Russian Federation, MOSCOW Mr. Ruslan HAGIYEV, Director of the International Relations Department, General Prosecutors Office, BAKU Mr. Nizami SAFAROV, Director of the Department on Administrative and Military Law, Parliament Secretariat, BAKU BELGIUM Ministry of Justice M.
    [Show full text]
  • 3.2 Saatejuht Vs Toimetaja
    Tartu Ülikool Sotsiaal- ja haridusteaduskond Ajakirjanduse ja kommunikatsiooni instituut Eesti Televisiooni kultuurisaade "OP!" ja sõnateatri kajastamine "OP!"-is aastatel 1999-2011 Magistritöö (30 EAP) Maarja Aeltermann Juhendaja: Aune Unt MA Tartu 2011 Sisukord SISUKORD .............................................................................................................................................................. 2 SISSEJUHATUS ....................................................................................................................................................... 4 1. TÖÖ TEOREETILISED JA EMPIIRILISED LÄHTEKOHAD .......................................................................................... 6 1.1 TEOORIA ......................................................................................................................................................... 6 1.1.1. Kultuur ................................................................................................................................................ 6 1.1.2. Kultuuriajakirjandus ja konsumerism .................................................................................................... 8 1.1.3. Kultuur televisioonis ........................................................................................................................... 11 1.1.3.1. Kultuuriteemade valiku põhimõtted .............................................................................................................13 1.1.3.2. Saate formaat. .............................................................................................................................................14
    [Show full text]