The disclosure of controversial mass surveillance programmes by intelligence and national security agencies has evoked an international debate on the right of citizens to be protected from illegitimate or warrantless collection and analysis of their data and meta-data. This report aims at identifying what are the risks of data breaches for users of publicly available Internet services such as web browsing, email, social networks, cloud computing, or voice communications, via personal computers or mobile devices, and what are the possible impacts for the citizens and the European Information Society. In this context a clear distinction has to be made between data and meta-data. Also it must be differentiated between mass unwarranted and indiscriminate interception, and targeted lawful interception of Internet and telephony data for the purpose of law enforcement and crime investigation. While targeted lawful interception constitutes a necessary and legitimate instrument of intelligence and law enforcement agencies, mass surveillance is considered a threat to civil liberties such as the right to freedom of opinion and expression. These civil liberties are essential human rights in democratic societies and of particular importance for safeguarding independent journalism and political opposition.
The text of the CETA agreement is made public here exclusively for information purposes. The text presented in this document is the text at the end of the negotiations conducted by the European Commission. It will be subject to legal revision in order to verify the internal consistency and to ensure that the formulations of the negotiating results are legally sound. It will thereafter be transmitted to the Council of the European Union and to the European Parliament for ratification. The text presented in this document is not binding under international law and will only become so after the completion of the ratification process.
In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies. The study then presents a set of policy recommendations to the European Parliament.
Bank of International Settlements, European Central Bank, International Monetary Fund, Organisation for Economic Co-operation and Development, World Bank
The shadow banking system can broadly be described as credit intermediation involving entities and activities outside the regular banking system. Intermediating credit through non-bank channels can have important advantages and contributes to the financing of the real economy, but such channels can also become a source of systemic risk, especially when they are structured to perform bank-like functions (e.g. maturity transformation and leverage) and when their interconnectedness with the regular banking system is strong. Therefore, appropriate monitoring of shadow banking helps to mitigate the build-up of such systemic risks. The FSB set out its approach for monitoring the global shadow banking system in its report to the G20 in October 2011. This report presents the results of the third annual monitoring exercise following this approach, using end-2012 data. The report includes data from 25 jurisdictions and the euro area as a whole, bringing the coverage of the monitoring exercise to about 80% of global GDP and 90% of global financial system assets.
This study evaluates the oversight of national security and intelligence agencies by parliaments and specialised non-parliamentary oversight bodies, with a view to identifying good practices that can inform the European Parliament’s approach to strengthening the oversight of Europol, Eurojust, Frontex and, to a lesser extent, Sitcen. The study puts forward a series of detailed recommendations (including in the field of access to classified information) that are formulated on the basis of in-depth assessments of: (1) the current functions and powers of these four bodies; (2) existing arrangements for the oversight of these bodies by the European Parliament, the Joint Supervisory Bodies and national parliaments; and (3) the legal and institutional frameworks for parliamentary and specialised oversight of security and intelligence agencies in EU Member States and other major democracies.
A draft version of the EU Heads of Mission report on Jerusalem for 2012 was authored in January 2013 and reportedly leaked to a number of major news outlets by the organization Breaking the Silence.
This document contains detailed recommendations on how to implement the best practices identified in the Clean IT project. It will be developed further in the months ahead. After the end of the Clean IT project it will only be shared with organizations that have committed to implementing the best practices. It will be developed further with these organizations participating in the Clean IT permanent public-private dialogue platform.
Shadow banking, as one of the main sources of financial stability concerns, is the subject of much international debate. In broad terms, shadow banking refers to activities related to credit intermediation and liquidity and maturity transformation that take place outside the regulated banking system. This paper presents a first investigation of the size and the structure of shadow banking within the euro area, using the statistical data sources available to the ECB/Eurosystem.
The FSB has roughly estimated the size of the global shadow banking system at around € 46 trillion in 2010, having grown from € 21 trillion in 2002. This represents 25-30% of the total financial system and half the size of bank assets. In the United States, this proportion is even more significant, with an estimated figure of between 35% and 40%. However, according to the FSB estimates, the share of the assets of financial intermediaries other than banks located in Europe as a percentage of the global size of shadow banking system has strongly increased from 2005 to 2010, while the share of US located assets has decreased. On a global scale, the share of those assets held by European jurisdictions has increased from 10 to 13% for UK intermediaries, from 6 to 8% for NL intermediaries, from 4% to 5% for DE intermediaries and from 2% to 3% for ES intermediaries. FR and IT intermediaries maintained their previous shares in the global shadow banks assets of 6% and 2% respectively.
This study grew out of the 1997 STOA report, ‘An Appraisal of the Technologies of Political Control’ and takes that work further. Its focus is two fold:(i) to examine the bio-medical effects and the social & political impacts of currently available crowd control weapons in Europe; (ii) to analyse world wide trends and developments including the implications for Europe of a second generation of so called “non-lethal” weapons.
Three confidential draft copies of the European Financial Stability Facility’s guidelines on primary market purchases, secondary market interventions and precautionary programs dated October 19, 2011.
Since the fourth review, the situation in Greece has taken a turn for the worse, with the economy increasingly adjusting through recession and related wage-price channels, rather than through structural reform driven increases in productivity. The authorities have also struggled to meet their policy commitments against these headwinds. For the purpose of the debt sustainability assessment, a revised baseline has been specified, which takes into account the implications of these developments for future growth and for likely policy outcomes. It has been extended through 2030 to fully capture long term growth dynamics, and possible financing implications.
WikiLeaks Financial Blockade Complaint Against Visa and MasterCard concerning infringements of Articles 101 and 102 of the EU Treaty.
U.S. Confidential Anti-Counterfeiting Trade Agreement (ACTA) August 25, 2010 Draft.
EU Restricted, U.S. Confidential Anti-Counterfeiting Trade Agreement (ACTA) July 2010 Draft.
The existence of a global system for intercepting private and commercial communications (the ECHELON interception system)
A. whereas the existence of a global system for intercepting communications, operating by means of cooperation proportionate to their capabilities among the USA, the UK, Canada, Australia and New Zealand under the UKUSA Agreement, is no longer in doubt; whereas it seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail . . .
Restricted US-EU ACTA Copyright Treaty Civil Enforcement and Special Requirements Position Paper, February 12, 2010.
U.S.-Japan-EU-Mexico-Canada Confidential Anti-Counterfeiting Trade Agreement (ACTA) Draft Text, January 18, 2010. This is the 56-page full version of the “consolidated text” of the treaty.
EU G-MOSAIC Chile Earthquake Preliminary Damage Assessment Maps, March 3, 2010.
This briefing note covers Toussaint L´Ouverture, Port-au-Prince International Airport in Haiti and provides image analysis of the status, activity and facilities of the airfield with particular regard to any observed damage due to the recent earthquake. The note has been produced using a GeoEye multispectral image, dated 13 January 2010 which has been combined with open source collateral information. The information cut-off date of this briefing note is 22 January 2010.
Les données sur la solvabilité et la liquidité bancaires.
When a particular part of the population is especially important for a survey, oversampling that group can help the survey to provide better estimates. However, oversampling is not always easy or inexpensive. The ideal situation is one where information exists for the population that can help to discriminate the interesting sub-group and that information is available for sampling. Sometimes the information is weak for the intended purpose and sometimes there are restrictions on the use of information that make sampling difficult or impossible.
Like all large-scale programmes, the T2S programme consists of a huge number of activities that will have to be conducted in a “flexible order”, involving many different stakeholders and resulting in a series of deliverables that will lead to the successful launch of the T2S system, currently scheduled for Q2 2013.