<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Recommendations and Courses of Action: How to Secure the Post-Covid Future</style></title><secondary-title><style face="normal" font="default" size="100%">Transatlantic Security: Securing the Post Covid Future</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Federal Ministry of Defense</style></publisher><pub-location><style face="normal" font="default" size="100%">Vienna, Austria</style></pub-location><pages><style face="normal" font="default" size="100%">18-41</style></pages><isbn><style face="normal" font="default" size="100%">978-3-903121-93-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The recommendations contained in this report are the outcome of an online virtual transatlantic security brainstorming event designed to look at securing the future post COVID-19, flag issues and develop recommendations for policymakers. Leading think tanks and defense educational institutions hosted the discussions on six main topics, featuring 2,750 registered representatives from government, international organizations, academia, and the private sector. This number included over 160 VIP&amp;rsquo;s, many at the ministerial and ambassadorial level.&lt;/p&gt;&lt;p&gt;Key recommendations:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The transatlantic community should initiate an in-depth leadership discussion (using G7, NATO and US-EU formats) on leveraging and strengthening historically established strategic advantages.&lt;/li&gt;&lt;li&gt;Achieving &amp;ldquo;strategic complementarity&amp;rdquo; between NATO and the European Union is a strategically desirable goal. Both NATO and the EU should initiate comprehensive reviews of the US-Europe strategic dialogue on all topics from trade to security with the goal of reaffirming and enhancing transatlantic solidarity.&lt;/li&gt;&lt;li&gt;NATO and the EU should establish task forces to examine balancing allocation of resources devoted to traditional external threats with those devoted to emerging global threats.&lt;/li&gt;&lt;li&gt;NATO and the EU should establish and formalize mechanisms to examine and develop comprehensive response strategies to Chinese global efforts to expand influence. Beijing&amp;rsquo;s European policy during the pandemic provides strong evidence that the EU-China 2020 Strategic Agenda for Cooperation should be seriously overhauled. It is important scrutinize Chinese geo-economics through a security prism, with resulting guidance to the EU Members and aspirants on a unified strategy for their relations with China. A similar approach guiding relations with Russia is also warranted.&lt;/li&gt;&lt;li&gt;The timing of catastrophic events is often not predictable &amp;ndash; but effective responses to such events have much in common. NATO and the EU should formalize mechanisms to develop and robustly coordinate all hazards response capabilities to catastrophic events with the pandemic experience as a driving force. Important here is to ensure supply chain continuity. Resilient, dependable and diverse supply chains, involving trusted allies and partners, are essential for effective national and regional responses to pandemic-like threats.&lt;/li&gt;&lt;li&gt;The EU should create a Strategic Communications Task Force dedicated to countering hostile competitor campaigns designed to undermine EU public opinion; e.g. Chinese, Russian, Iranian, Islamist, and others.&lt;/li&gt;&lt;li&gt;Artificial Intelligence (AI) has much to offer in enhancing readiness and response to pandemic-type events, but often not without potentially far reaching implications for individual freedoms and civil liberty. Creating EU or NATO task forces or advisory/study groups charged with enhancing compatibility of legal and ethical frameworks with the use of AI in military applications is an option worth considering.&lt;/li&gt;&lt;/ul&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Comprehensive Approach to Cyber Security –Trends,  Challenges and the Way Forward</style></title><secondary-title><style face="normal" font="default" size="100%">The Dangerous Landscape</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><pages><style face="normal" font="default" size="100%">47-61</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Growing dependence on information technology (IT) and increasing intercon-nection of critical (information) infrastructures have made a secure cyberspace vital to the functioning of a modern state. Consequently, cyber threats or “cyber terrorism” remain one of the crucial concerns to be addressed by decision makers - not just political decision makers, but those from industry and civil society as well. This chapter will showcase how dependency on cyberspace is increasing and outline cyber security threats not only to governments and industry but also to the individual Internet user. Specific challenges to cyber security will be highlighted and concrete options offered on how such challenges can best be addressed by implementing an OSCE-type comprehensive approach to cyber security.</style></abstract><section><style face="normal" font="default" size="100%">4</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Enhancing Diplomatic Effectiveness: A Common-Sense Risk Management Approach to Counter-terrorism</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">99-107</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Combating Extremist Ideologies: Measuring Effectiveness-Considerations for Public Diplomacy</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">64-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Terrorism and National Security: Issues and Trends</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Congressional Research Service</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, D.C.</style></pub-location><pages><style face="normal" font="default" size="100%">15</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Raphael Perl</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Combating Terrorism: The Challenge of Measuring Effectiveness</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">CRS Report RL33160</style></number><publisher><style face="normal" font="default" size="100%">Washington, D.C.: Congressional Research Service</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>