CSS CYBER DEFENSE National Cybersecurity Strategies In

Total Page:16

File Type:pdf, Size:1020Kb

CSS CYBER DEFENSE National Cybersecurity Strategies In CSS CYBER DEFENSE National Cybersecurity Strategies in Comparison – Challenges for Switzerland Zurich, March 2019 Center for Security Studies (CSS), ETH Zürich Authors: Marie Baezner, Sean Cordey Additional research: Matteo Bonfanti, Robert Dewar, Jasper Frei and Fabien Merz Layout: Miriam Dahinden-Ganzoni © 2019 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch This research was ordered by the Federal IT Steering Unit (FITSU) Analysis prepared by Center for Security Studies (CSS), ETH Zürich ETH-CSS project- and quality management: Myriam Dunn Cavelty, Deputy Head for Research and Teaching; and Andreas Wenger, Director of the CSS. Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Cordey, Sean (2019): National Cybersecurity Strategies in Comparison – Challenges for Switzerland, March 2019, Center for Security Studies (CSS), ETH Zürich. Contents Synopsis 4 Contents 5 Cybersecurity strategies in comparison 7 Core documents and their development 8 Roles and Responsibilities 9 Relationships between the civilian and military domains 10 Cybersecurity in the armed forces 10 The role of intelligence services 11 Law enforcement 11 Main challenges 12 1) Integration (vertical) 12 2) Coordination (horizontal) 12 3) International cooperation 12 4) Crisis management 13 5) Situation analysis 13 6) Education, information and capacity-building 13 7) Public-private partnerships 13 8) Legislation and regulation 14 Conclusion and challenges for Switzerland 15 Annex 17 Country information Finland 17 Country information France 20 Country information Germany 23 Country information Israel 26 Country information Italy 28 Country information Netherlands 31 National Cybersecurity Strategies in Comparison – Challenges for Switzerland Synopsis tasked with cybersecurity matters, in particular the challenge of finding the right balance between Digital transformation, which is emerging as one of the centralization and reliance on existing competences; major challenges of future years, offers not only wide- ranging advantages, but also harbors new risks and en- • the promotion of international cooperation and the genders new vulnerabilities. A majority of states has be- establishment of international norms of conduct in gun to address these by developing national strategies an environment in which geopolitical fault lines have under the heading of ‘cybersecurity’. Switzerland pub- deepened; lished its second ‘National Strategy for the protection of Switzerland against cyber risks’ (NCS), which identifies • the creation of sound, resilient structures for crisis main challenges, traces responsibilities and outlines fu- management, including efficient crisis communica- ture action, in 2018. This study compares the cybersecu- tions, and the development of a strong ability to rity strategies adopted by Germany, Finland, France, Isra- respond to serious incidents which takes this commu- el, Italy and the Netherlands in order to place the Swiss nications aspect into account; approach within a broader international context and elic- it the most important future challenges through compar- • the development of an adequate situation analysis ison. and a precise analysis of threats, both of which must It focuses on key strategies, describing main actors resist exaggerated assessments of cyber threats and their tasks (in particular the distribution of tasks be- despite the difficulty of collecting reliable data; tween civilian and military authorities in the fields of ‘se- curity’, ’defense’ and ‘law enforcement’), and identifying • the building of capacities and the design of future the general challenges for organizing national cybersecu- education and training programmes to address rity policies. shortages of specialist cybersecurity staff; The cybersecurity strategies examined share a number of common conceptual elements. Six central as- • the development of a framework for cooperation with pects have in particular been found across all of the the private sector which promotes national security states in the study: a holistic approach which encom- without hampering innovation; and passes both national security and socioeconomic as- pects; links to broader national security strategies; a cen- • the harmonization of laws and efficient strategies for tral focus on developing defensive cyber capabilities; fighting cybercrime.. great appreciation of international cooperation; empha- sis on the necessity of cooperating with the private sec- Switzerland is also exposed to these challenges. If a small, tor; and finally the need for greater awareness, education wealthy state such as Switzerland wishes to secure its fu- and information. ture in a digital world, it should ensure that it invests ad- The most important differences between the ex- equately in cybersecurity without excessively expanding amined states lie in where cybersecurity is positioned the reach and role of government. This requires all parts within the context of government structures, and who of government to work towards the same overarching bears which responsibilities. This relates to the extent of goal. At the same time, capacity-building and the design centralization, the relationship between civilian and mili- of education and training programmes likely constitute tary forces, and the tasks of intelligence and law enforce- the most productive approach. ment services. These differences arise predominantly out of the states’ distinct political cultures and ways of orga- nizing their political systems. Given the global nature of cyber threats, compa- rable states are confronted with comparable challenges when developing, implementing and maintaining their cybersecurity strategies. We have identified eight chal- lenges: • the (vertical) integration of national cybersecurity with national security and/or an overall strategy for controlling national resources as efficiently as possible; • the (horizontal) coordination of different bodies 4 National Cybersecurity Strategies in Comparison – Challenges for Switzerland Introduction • Israel All over the world, countries endeavor to shape digital • Italy and transformation processes to obtain optimal benefit from this technologically controlled change for their societies. • the Netherlands However, the spread of digital technologies also entails risks. Their technical substructure is insecure due to tech- This comparison focuses mainly on: nical, economic and political factors, and prone to being exploited for criminal or political purposes. Spectacular, a) the nature and substance of core strategies; criminally motivated cybercrime and the strategic use of cyberspace have become an everyday reality in a world b) the roles and responsibilities of main actors and where the number of attractive targets is growing and cy- bodies (law enforcement, military, intelligence bercrime abilities and competences are becoming more services and civilian bodies), and and more sophisticated due to high demand. It is therefore imperative that the challenges of cy- c) the challenges these states are exposed to in terms of bersecurity be met if the digital transformation is to be cybersecurity. successful. As a result, most states are reviewing their cy- bersecurity strategies to ensure that they are better pre- This study is mainly based on primary sources, such as pared for the risks which are emerging in a more and publicly available national cybersecurity and cyber de- more closely networked and at the same time more and fense strategies, and secondary sources such as media ar- more politicized and militarized environment. The chal- ticles and scientific research. All of the documents relied lenges which need to be met are not exclusively technical on are publicly available. However, it is important to un- in nature: Largescale economic and political cyberespio- derstand the context and goals of these documents, nage, strategic interference campaigns and threats to which are subject to certain constraints: critical infrastructures of national significance are all is- sues relevant to security policy. • First, many national cybersecurity strategies in fact However, the precise role governments and ad- provide very little information about states’ actual ministrations play in cybersecurity must be elicited and levels of preparedness or relevant activities, in carefully defined through a political process. Critical in- particular as far as national security and defense are frastructures are mainly held by private actors. Cyber- concerned. Strategies are, above all, declarations of space can be viewed as a common good whose dynamics intent, which set and signal the future direction of and use are shaped by an entire ecosystem of state and the national cybersecurity agenda for a highly diverse non-state actors. There is no single solution able to re- internal/domestic and external/international solve all cybersecurity problems – given the numerous audience. Germany and France have sector-specific risks associated with digital technologies, the definition implementation plans (i.e. for IT in administration of responsibilities and the planning of resource alloca- and for the private sector), while the Dutch imple- tions are complex, demanding political tasks. mentation plan is still being drafted. Israel does not Switzerland published its second ‘National
Recommended publications
  • From the Editor
    EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists.
    [Show full text]
  • Action Plan Against Terrorism
    PREMIER MINISTRE ACTION PLAN AGAINST TERRORISM LutterEurope Menace Entraver Victimes Protéger Jihadisme Cribler r TechnologiesLutter ée Cr er Résilience Terroriste Menace Cribler tt tés aitre Réprimer Résilience Cibles nn Armes Co ili Lu r Comprendre Menace Identifier ée Europe Cibles ComprendreTechnologies aitre Armes nn Explosifs LutterCréer Cr Identifier Co Protéger Identifier Terroriste Entraver Cibles Victimes Coordonner Renforcer Europe Réprimer Réprimer Armes Vulnérab Protéger Contrôler Europe er Cibles r tt ée Créer Victimes Cibles Cr Résilience Réprimer Cibles Technologies ContrôlerLu ArmeCréer s Entraver Entraver er Victimes Victimes tés Cibles Protéger tt ili Europe Lu Menace Identifier Explosifs CriblerCoordonner Comprendre Europe Créer Cibles RadicalisationMenace erroristeenace Vulnérab TerroristeCibles Armes T M 13 July 2018 « Jihadism has not weakened over the last twenty or more years, it has simply moved to new places and taken on new forms. Responses to the threat it poses require mobilisation of all public policies: intelligence, security, justice and diplomacy. It is the State as a whole, and, in addition, all the national community’s living resources – its local authorities, political forces, enterprises and youth – which must mobilise around these challenges. » (Strategic Review of Defence and National Security. 2017). ACTION PLAN AGAINST TERRORISM Contents FRANCE’S SECURITY STRATEGY: TACKLING TERRORISM TOGETHER 5 1 Since 2016, France has continued to face up to a high terrorist threat 7 2 The action plan against
    [Show full text]
  • Wd 3 - 3000 - 016/17
    Wissenschaftliche Dienste Ausarbeitung Parlamentarische Kontrolle der Nachrichtendienste in ausgewählten Staaten Aktualisierung der Ausarbeitung WF III G - 12/06 vom 23. Januar 2006 © 2017 Deutscher Bundestag WD 3 - 3000 - 016/17 Wissenschaftliche Dienste Ausarbeitung Seite 2 WD 3 - 3000 - 016/17 Parlamentarische Kontrolle der Nachrichtendienste in ausgewählten Staaten Aktualisierung der Ausarbeitung WF III G - 12/06 vom 23. Januar 2006 Aktenzeichen: WD 3 - 3000 - 016/17 Abschluss der Arbeit: 12. Mai 2017 Fachbereich: WD 3: Verfassung und Verwaltung Die Wissenschaftlichen Dienste des Deutschen Bundestages unterstützen die Mitglieder des Deutschen Bundestages bei ihrer mandatsbezogenen Tätigkeit. Ihre Arbeiten geben nicht die Auffassung des Deutschen Bundestages, eines seiner Organe oder der Bundestagsverwaltung wieder. Vielmehr liegen sie in der fachlichen Verantwortung der Verfasserinnen und Verfasser sowie der Fachbereichsleitung. Arbeiten der Wissenschaftlichen Dienste geben nur den zum Zeitpunkt der Erstellung des Textes aktuellen Stand wieder und stellen eine individuelle Auftragsarbeit für einen Abgeordneten des Bundestages dar. Die Arbeiten können der Geheimschutzordnung des Bundestages unterliegende, geschützte oder andere nicht zur Veröffentlichung geeignete Informationen enthalten. Eine beabsichtigte Weitergabe oder Veröffentlichung ist vorab dem jeweiligen Fachbereich anzuzeigen und nur mit Angabe der Quelle zulässig. Der Fachbereich berät über die dabei zu berücksichtigenden Fragen. Wissenschaftliche Dienste Ausarbeitung Seite 3 WD 3 - 3000 - 016/17 Inhaltsverzeichnis 1. Einleitung 5 2. Dänemark 6 2.1. Überblick über die Nachrichtendienste 6 2.2. Kontrolle der Nachrichtendienste 6 2.2.1. Parlamentarische Kontrolle der Nachrichtendienste 6 2.2.2. Gremium für die Kontrolle der Nachrichtendienste 7 3. Frankreich 7 3.1. Überblick über die Nachrichtendienste 7 3.1.1. Dienst des Innenministeriums 8 3.1.2.
    [Show full text]
  • Russian Meddling in Western Elections, 2016-2017: a Preliminary
    RUSSIAN MEDDLING IN WESTERN ELECTIONS, 2016-2017: A PRELIMINARY PROBE By Guillermo Lopez Sanchez A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Arts with a Major in International Studies May 2018 Committee Members: Dennis J. Dunn, Chair Ronald Angelo Johnson Sandhya Rao COPYRIGHT by Guillermo Lopez Sanchez 2018 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgement. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Guillermo Lopez Sanchez, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I express my gratitude to Dr. Dennis J. Dunn, Professor of History and Director of the Center for International Studies at Texas State University. His dedication, knowledge, and support since I began the Master of Arts with a major in International Studies were invaluable. In addition, my appreciation is extended to Dr. Ronald Angelo Johnson, Associate Professor in the Department of History; and Dr. Sandhya Rao, Professor in the Department of Mass Communication, for their outstanding advice and assistance. Collectively, they strengthened my resources, asked probing questions that helped me sharpen my focus, and provided valuable insights that benefitted my research. I also wish to express my appreciation to Jeremy Pena, Coordinator of Academic Programs at the Center for International Studies, for his administrative support.
    [Show full text]
  • Surveillance by Intelligence Services: Services: Intelligence by Surveillance
    FREEDOMS FRA Surveillance by intelligence services – Volume II: field perspectives and legal update II: field perspectives – Volume services intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Volume II: field perspectives and legal update This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2017 FRA – print: ISBN 978-92-9491-766-9 doi:10.2811/15232 TK-04-17-696-EN-C FRA – web: ISBN 978-92-9491-765-2 doi:10.2811/792946 TK-04-17-696-EN-N © European Union Agency for Fundamental Rights, 2017 Reproduction is authorised provided the source is acknowledged. For any use or reproduction of photos or other material that is not under the European Union Agency for Fundamental Rights copyright, permission must be sought directly from the copyright holders. Printed by Imprimerie Centrale in Luxembourg Neither the European Union Agency for Fundamental Rights nor any person acting on behalf of the European Union Agency for Fundamental Rights is responsible for the use that might be made of the following information.
    [Show full text]
  • Civil-Military Capacities for European Security
    Clingendael Report Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee Civil-Military Capacities for European Security Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. Image rights: Drone, Binary Code: © Shutterstock.com Search and Rescue squadron: © David Fowler / Shutterstock.com Design: Textcetera, The Hague Print: Gildeprint, Enschede Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Content Executive summary 7 Introduction 11 1 The external-internal security gap 13 2 Case study maritime security 25 3 Case study border security 39 4 Case study cyber security 53 5 Conclusions and recommendations 64 List of acronyms 70 5 Executive summary In the last two decades the European Union has created separated policies, institutions and capacities for external and internal security. In the meantime the world’s security environment has changed fundamentally. Today, it is no longer possible to make a clear distinction between security outside and within Europe. Conflicts elsewhere in the world often have direct spill-over effects, not primarily in terms of military threats but by challenges posed by illegal immigration, terrorism, international crime and illegal trade. Lampedusa has become a synonym for tragedy. Crises and instability in Africa, the Middle East and elsewhere in the world provide breeding grounds for extremism, weapons smuggling, drugs trafficking or kidnapping.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • Proposed Graduation Requirements: Public Comments
    Proposed Graduation Requirements Public Comments EXHIBIT #1 Date Received: May 3, 2018 (Braun, Ipswich) I am very disappointed by the new proposed graduation requirements. I know the state is saying they are adding flexibility but what you are doing is allowing students to get out of important and worthwhile classes. I am telling you that if the highest level math class a student has to take is Algebra I, we are not preparing them for a successful future or career. Math teaches students how to think, reason, and problem solve. These skills are only in their beginning stages in Algebra I. They need higher level math to really develop these skills. With the big push for STEM, STEAM, and knowing these are the areas where jobs are available, we are taking a huge step in the wrong direction. You are asking students at around age 14 to decided if they are going to go on to higher education or not. If they decided to take the advanced career path as a freshman as a junior it is already to late to change your mind. This reminds me of a young man who was set on going back to the family farm, but halfway through his senior year decided he would go to a tech school because making it in farming is getting hard. Had he been on the career path he would be in big trouble right now. Luckily he took Algebra I, Geometry, and Algebra II and will have no problem at tech school. I am so surprised that the state wants to graduate unprepared students.
    [Show full text]
  • Nationale Programme Zur Massenüberwachung Personenbezogener Daten in Den Eu-Mitgliedstaaten Und Ihre Vereinbarkeit Mit Dem Eu-Recht
    GENERALDIREKTION INTERNE POLITIKBEREICHE FACHABTEILUNG C: BÜRGERRECHTE UND KONSTITUTIONELLE ANGELEGENHEITEN BÜRGERLICHE FREIHEITEN, JUSTIZ UND INNERES NATIONALE PROGRAMME ZUR MASSENÜBERWACHUNG PERSONENBEZOGENER DATEN IN DEN EU-MITGLIEDSTAATEN UND IHRE VEREINBARKEIT MIT DEM EU-RECHT STUDIE Abriss Nach den Enthüllungen rund um PRISM und andere US-Überwachungsprogramme erfolgt mit der vorliegenden Studie eine Bewertung der Praxis der Überwachung in großem Ausmaß seitens einer Auswahl von EU-Mitgliedstaaten: Vereinigtes Königreich, Schweden, Frankreich, Deutschland und die Niederlande. Angesichts des großen Ausmaßes der untersuchten Überwachungspraxis muss man davon ausgehen, dass es sich im Vergleich zum traditionellen Sammeln geheimdienstlicher Daten um eine grundlegende Neuordnung der Überwachungspraxis handelt. Deshalb wird in der Studie die Ansicht vertreten, dass eine Analyse der europäischen Überwachungsprogramme nicht auf die Frage der Balance zwischen Datenschutz und nationaler Sicherheit beschränkt bleiben darf, sondern in den größeren Zusammenhang der kollektiven Freiheitsrechte und der Demokratie gestellt werden muss. Zu den Ergebnissen der Studie gehört, dass in vier von fünf der EU-Mitgliedstaaten, die für eine nähere Untersuchung ausgewählt worden sind, in irgendeiner Form ein Abfangen und Überwachen von Kommunikationsdaten in großem Ausmaß erfolgt. Ferner werden in der Studie Parallelen und Unterschiede zwischen diesen Programmen und den seitens der NSA durchgeführten Operationen ermittelt. Die Verfasser der Studie gelangen
    [Show full text]
  • Tracfin 2019
    France’s Financial Intelligence Unit (FIU) TRACFIN 2019 Annual Report CONTENTS FOREWORD 5 A FEW DEFINITIONS 6 TRACFIN’S SOURCES OF INFORMATION 9 HIGHLIGHTS OF 2019: SIGNIFICANT GROWTH 10 REPORTING ACTIVITY OF REPORTING ENTITIES 11 FINANCIAL SECTOR REPORTING ENTITIES 13 FACT SHEET 1: CREDIT INSTITUTIONS AND ISSUING INSTITUTIONS 13 FACT SHEET 2: PAYMENT INSTITUTIONS 21 FACT SHEET 3: ELECTRONIC MONEY INSTITUTIONS 22 FACT SHEET 4: MONEY CHANGERS 23 FACT SHEET 5: CROWDFUNDING INTERMEDIARIES AND INVESTMENT ADVISERS 24 FACT SHEET 6: FINANCIAL MARKET PROFESSIONALS 26 FACT SHEET 7: DIGITAL ASSET SERVICE PROVIDERS (DASPS) 26 2 FACT SHEET 8: THE INSURANCE SECTOR 29 NON-FINANCIAL SECTOR REPORTING ENTITIES 32 FACT SHEET 9: NOTARIES 32 FACT SHEET 10: REAL ESTATE PROFESSIONALS 33 FACT SHEET 11: BAILIFFS 38 FACT SHEET 12: COURT-APPOINTED RECEIVERS AND TRUSTEES 38 FACT SHEET 13: COMMERCIAL REGISTERED OFFICE PROVIDERS 40 FACT SHEET 14: LAWYERS 40 FACT SHEET 15: AUDITORS AND CHARTERED ACCOUNTANTS 41 FACT SHEET 16: GAMING SECTOR PROFESSIONALS 42 FACT SHEET 17: THE ARTS SECTOR 48 OFFICIAL REPORTS 51 SYSTEMATIC INFORMATION DISCLOSURES (COSIS) 53 - ANNUAL REPORT 2019 REPORT - ANNUAL TRACFIN TRACFIN’S ACTIVITY IN 2019 59 HOW INFORMATION IS PROCESSED 60 INPUTTING INFORMATION 60 ANALYSING AND REDIRECTING INFORMATION 60 ENHANCING INFORMATION THROUGH OPERATIONAL ANALYSIS 60 TRACFIN’S DISCLOSURES TO ITS PARTNERS 62 COURTS 62 INTELLIGENCE COMMUNITY 74 TACKLING FRAUD 75 DIRECTORATE GENERAL OF CUSTOMS AND EXCISE (DGDDI) 82 COMBATING THE FINANCING OF TERRORISM (CFT)
    [Show full text]
  • Download Research Paper No. 67 (Translation)
    27 November 2018 RESEARCH PAPER INTELLIGENCE STUDIES IN FRANCE History, Structure and Proposals Jean-Vincent HOLEINDRE Professor of political science at the University of Paris II Panthéon-Assas, scientific director of the IRSEM Benjamin OUDET Doctoral candidate in political science, lecturer at the University of Poitiers and Sciences Po ABSTRACT Since the September 11 attacks, there has been a threefold legitimization of the intelligence field in France: due to the international context, through contemporary security challeng- es such as terrorism, organized crime, information manipulation; and the subsequent shift in public policies (leading in particular to the Intelligence Act of July 24th, 2015); and by the changing perception of a public affected by the terrorist threat. This context can encourage the development of intelligence studies, which has so far struggled to establish itself in France. The subject is indeed being considered in an increasing number of works in the humanities and social sciences, especially in history, law and political science. This paper reviews intel- ligence studies in France, without claiming to establish an exhaustive map of the field. It is – No. 67 organized into three sections: first, a brief history of intelligence studies through the compari- son of the Anglo-American world and France. Data on the structure of the field (publications, theses, research networks, internationalization) will then be presented. Finally, ten proposals are made for the development of intelligence studies, particularly in terms of teaching, clear- ances granted to researchers, and the creation of a specialized journal. We also advocate a rapprochement between academics and professionals, carried out with strict respect for the independence of the spheres and with concern for mutual understanding.
    [Show full text]
  • Mass Surveillance of Personal Data by EU Member States and Its
    Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law Didier Bigo, Sergio Carrera, Nicholas Hernanz, Julien Jeandesboz, Joanna Parkin, Francesco Ragazzi and Amandine Scherrer No. 62 / November 2013 Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.
    [Show full text]