A copy of the conference report for the 1963 Bilderberg Conference held in Cannes, France.
Documents
Bilderberg Archive
Bilderberg Meetings 1962 Conference Report Saltsjöbaden, Sweden
Bilderberg Archive
Bilderberg Meetings 1961 Conference Report Lac-Beauport, Canada
Bilderberg Archive
Bilderberg Meetings 1960 Conference Report Bürgenstock, Switzerland
Bilderberg Archive
Bilderberg Meetings 1957 Conference Report St. Simons Island, United States
Bilderberg Archive
Bilderberg Meetings 1957 Conference Report Fiuggi, Italy
Bilderberg Archive
Bilderberg Meetings 1959 Conference Report Yesilkoy, Turkey
Bilderberg Archive
Bilderberg Meetings 1958 Conference Report Buxton, United Kingdom
Bilderberg Archive
The Bilderberg Group by Dr J.H. Retinger August 1956
An eighteen-page introduction to the Bilderberg Group, its history and organizing principles written by Dr. Józef Hieronim Retinger, a polish political adviser and one of the founders of the European Movement for integration. Retinger is considered to be one of the most influential people in the creation of the Bilderberg Group and this document was provided to new attendees.
Bilderberg Archive
Bilderberg Meetings 1955 Conference Report Barbizon, France
Bilderberg Archive
Bilderberg Meetings 1955 Conference Report Garmisch-Partenkirchen, Germany
Bilderberg Archive
Bilderberg Meetings 1954 Conference Report Osterbeek, Netherlands
Bilderberg Participant Lists
2016 Bilderberg Meeting Participant List
The 64th Bilderberg meeting is set to take place from 9 – 12 June 2016 in Dresden, Germany. A total of around 130 participants from 20 countries have confirmed their attendance. As ever, a diverse group of political leaders and experts from industry, finance, academia and the media have been invited.
Department of Homeland Security
DHS Healthcare Bulletin on Ransomware Attacks Against Hospitals
The Department of Homeland Security National Cybersecurity and Communications Integration Center (NCCIC) has notified the Department of Health and Human Services (HHS) of an increase in ransomware incidents at some healthcare organizations in the U.S. This Bulletin provides Healthcare and Public Health (HPH) Partners with information regarding ransomware, mitigation strategies, as well as additional materials to reference located within the HSIN HPH Cyber Threat Library.
Federal Bureau of Investigation
FBI Bulletin: Criminals Hacking Law Firms to Steal Information for Insider Trading
A financially motivated cyber crime insider trading scheme targets international law firm information used to facilitate business ventures. The scheme involves a hacker compromising the law firm’s computer networks and monitoring them for material, non-public information (MNPI). This information, gained prior to a public announcement, is then used by a criminal with international stock market expertise to strategically place bids and generate a monetary profit.
European Union
EU Cybercrime Committee: Criminal Justice Access to Data in the Cloud for Foreign Providers
The purpose of the present background paper is to provide a snapshot of policies and practices of some major US service providers regarding their “voluntary” disclosure of information to law enforcement authorities in foreign jurisdictions, and thus to facilitate discussion of future options regarding criminal justice access to electronic evidence in the cloud.
Financial Crimes Enforcement Network
(U//LES) Financial Crimes Enforcement Network: Financing of ISIL Foreign Terrorist Fighters
The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to provide financial institutions with information on identifying and reporting transactions possibly associated with Foreign Terrorist Fighters (FTFs) who support the Islamic State of Iraq and the Levant (ISIL), al-Qa’ida, and their affiliates in Iraq and the Lev ant region. Financial institutions may use this information to enhance their Anti-Money Laundering (AML) risk-based strategies and monitoring systems. This advisory is not intended to call into question financial institutions’ maintenance of normal relationships with other financial institutions, or to be used as basis for engaging in wholesale or indiscriminate de-risking practices.
Federal Bureau of Investigation
FBI Cyber Division Bulletin: KeySweeper Wireless Keystroke Logger Disguised as USB Device Charger
KeySweeper is a covert device that resembles a functional Universal Serial Bus (USB) enabled device charger which conceals hardware capable of harvesting keystrokes from certain wireless keyboards. If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information. Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen.
Technical Details
Department of Defense, U.S. Northern Command
DoD-NORTHCOM Defense Support of Civil Authorities Republican National Convention 2016 Presentation
On order and in response to natural/manmade incidents, the Defense Coordinating Officer / Defense Coordinating Element (DCO/DCE) anticipates and conducts Defense Support of Civil Authorities (DSCA) operations coordinating Title 10 forces and resources in support of the Federal Primary Agency (PA) in order to minimize impacts to the American people, infrastructure and environment.
European Union
EU Communication: Restoring Trust in Transatlantic Data Flows
In June 2013, reports concerning large-scale intelligence collection programmes in the U.S. raised serious concerns at both EU and Member State level about the impact on the fundamental rights of Europeans of large-scale processing of personal data by both public authorities and private companies in the United States. In response, on 27 November 2013 the Commission issued a Communication on Rebuilding Trust in EU-U.S. Data Flows setting out an action plan to restore trust in data transfers for the benefit of the digital economy, the protection of European individuals’ rights, and the broader transatlantic relationship.
U.S. Special Operations Command
U.S. Special Operations Command White Paper: The Gray Zone
Gray zone security challenges, existing short of a formal state of war, present novel complications for U.S. policy and interests in the 21st century. We have well-developed vocabularies, doctrines and mental models to describe war and peace, but the numerous gray zone challenges in between defy easy categorization. For purposes of this paper, gray zone challenges are defined as competitive interactions among and within state and non-state actors that fall between the traditional war and peace duality. They are characterized by ambiguity about the nature of the conflict, opacity of the parties involved, or uncertainty about the relevant policy and legal frameworks.
Department of Defense, Joint Chiefs of Staff, U.S. Army
Joint Staff Strategic Assessment: Maneuver and Engagement in the Narrative Space
This paper was produced in support of the Strategic Multi-layer Assessment (SMA) of the Islamic State of Iraq and the Levant (ISIL) led by Joint Staff J39 in support of the Special Operations Command Central (SOCCENT). The paper leverages and melds the latest thinking of academic and operational subject matter experts in fields of organizational and social dynamics, network analysis, psychology, information operations and narrative development, social media analysis, and doctrine development related to aspects of maneuver and engagement in the narrative space.
Department of Homeland Security
DHS Infrastructure Report: Nuclear Reactors, Materials, and Waste Sector Cyberdependencies
The Department of Homeland Security Office of Cyber and Infrastructure Analysis (DHS OCIA) produces cyberdependency papers to address emerging risks to critical infrastructure and provide increased awareness of the threats, vulnerabilities, and consequences of those risks to the Homeland. This note informs infrastructure and cybersecurity analysts about the potential consequences of cyber-related incidents in the Nuclear Reactors, Materials, and Waste Sector and its resilience to such incidents. This note also clarifies how computer systems support infrastructure operations, how cybersecurity incidents compromise these operations, and the likely functional outcome of a compromise.