Germany's Responses to Large Scale Malicious Cyber Incidents and Opportunities for AUS-GER future cooperation
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
ANALYSIS Germany’s Responses to Large Scale Malicious Cyber Incidents and Opportunities for AUS-GER future cooperation Julia Schuetze, Project Manager Stiftung Neue Verantwortung, Berlin November 2019 About the Author Julia Schuetze is the Project Manager for to SNV, she worked at Wikimedia Deutsch- International Cyber Security Policy at land e.V. and has researched at the Berk- Stiftung Neue Verantwortung e.V. Her re- man Klein Center at Harvard University. search focus is on joint responses to mali- She holds the Euromaster Transatlantic cious cyber activities, specifically on cyber Track degree from University of Bath with diplomacy of the European Union with the stops at UW Seattle and HU Berlin. Her United States and Japan as part of the EU bachelor thesis at the University of Stirling, Cyber Direct project. She is a Cybersecurity ‘Germany’s cyber security awareness pro- Policy Fellow at New America Foundation. gramme: Lessons from the US’, was tutored She has organized several workshops and by the German Federal Office for Informa- events with cybersecurity experts from the tion Security (BSI). She was also an intern U.S., EU, Japan and Germany in Washington at the Washington DC office of the Kon- D.C., Berlin and Tokyo to enhance interna- rad-Adenauer-Foundation in 2014. tional cooperation on cybersecurity. Prior PAGE 22 THE PERISCOPE SERIES / VOLUME 3 / 2020
Large scale malicious cyber incidents have been on the rise. Classi- fied as such are malicious activities with “significant impact1” that seek to undermine political integrity, national security and eco- nomic competitiveness, with the eventual risk of conflict. Germany’s Federal Office for Information to respond to large scale malicious cyber Security (BSI) brings out a report about activities, such as NotPetya. Most govern- the state of IT-security every year. In 20192 ments focus on the one hand on address- it presented a threat situation affecting ing the vulnerabilities and aim to increase Germany, highlighting the increased risk resilience and cybersecurity, so those inci- of such large scale malicious activities dents cannot cause that much damage. On that mirror two of the most consequen- the other hand, governments are trying dif- tial cyber incidents of 2017 WannaCry ferent strategies to influence the behavior and NotPetya. Take NotPetya, a Ransom- of threat actors to punish them or prevent ware attack 3 that exploited a widespread them from executing such incidents in the vulnerability in Microsoft affecting coun- first place. The discussion on responses to tries around the world and caused huge malicious cyber activities spans the whole financial damage globally4 and impacted field of cybersecurity policy and becomes Germany and Australia5. Since then, as more and more part of the traditional se- BSI highlights in its 2019 report, more vul- curity and foreign policy debates. This is nerabilities were discovered, such as in a because governments use a whole range widely used chip hardware6. Ransomware of different policy instruments (military, attacks are still on the rise, a new form regulatory, financial, technical, organiza- called Emotet has already affected German tional and diplomatic) to respond to mali- businesses and cities, halting services and cious cyber activities. Countries cannot do production7. Moreover, digitalisation and this in silos. Especially threats and vulnera- digital dependability increase the effects of bilities that cause large scale incidents, like large scale attacks and widespread vulner- NotPetya are global and therefore affect abilities. The effects are made worse due the cybersecurity of many countries. Ac- to the automation of attacks and therefore cordingly, the global cybersecurity environ- they could spread even more quickly glob- ment can be strengthened or weakened ally and create massive economic dam- by actions taken by other governments. It age; or in case of autonomous driving or can be weakened, for example if govern- attacks on medical devices, risk the health ments are using cyberspace as a means to of people8. Moreover, the wider use of AI achieve strategic geopolitical goals, such as as a technology also bears new risks as damaging another country through a cyber AI can be hacked and has its own unique attack as was found to be the case with vulnerabilities9. NotPeyta10. This can weaken cybersecurity Recognizing this threat landscape, gov- globally, since the vulnerabilities that are ernments have found different answers exploited for such an attack are in soft- and hardware that is used worldwide and thus Analysis / Julia Schuetze PAGE 23
makes other actors vulnerable. Moreover, Germany’s domestic architecture11 as well if attacks are not targeted or executed as as the operational and foreign policy re- a targeted attack, the attack can spread sponses taken individually and jointly with quickly on its own, as was the case in Not- other countries. Looking at this closer im- Petya, soon affecting many businesses proves the understanding of what Ger- and public services in other countries. The many’s approach to cybersecurity is and global cybersecurity environment can how- its measures taken in case of a large scale ever also be strengthened through interna- cyber incident. It will moreover show some tional cooperation. For example, countries divergences to Australian responses but can assist each other in becoming resil- also opportunities for future cooperation ient by sharing information about a threat with Australia. quickly, working across borders with busi- nesses on closing vulnerabilities that could Germany’s responses to large scale be exploited for an attack. Those are just malicious cyber activities a few of the examples why it is important to think about the cybersecurity challenge Germany takes a whole of government ap- with an international perspective. proach. This means that almost every fed- eral governmental actor has some role in Most countries therefore have by now set Germany’s cybersecurity architecture12. up a cybersecurity strategy that includes The Federal Office for Information Security their international engagements and (BSI), responsible for Germany’s IT-Secu- guides actions taken for cybersecurity or in rity, specifically aims to complement this cyberspace (see Australia, USA, Japan). approach with a whole-of-society approach Understanding Germany’s responses to as a form of governance that engages the large-scale malicious activities allows us private sector, civil society, communities to identify how Germany could work to- and individuals through different actions, gether with Australia as the strategic goals such as information platforms or insti- governments pursue as well as the policy tutional dialogues. In the BSI’s case, this instruments that they are using can offer approach was chosen to strengthen resil- opportunities and challenges for cooper- ience and increase it-security for society ation affecting bilateral and multilateral and businesses more broadly. relations with other governments and in- When looking at the German government’s ternational organisations. responses to large scale malicious cyber The difference in the Australian and Ger- activities, such as NotPetya in 2017, the man government responses to malicious main government agency at the centre of cyber activities can be best highlighted in Germany’s cybersecurity architecture, the the NotPetya incident that triggered many Federal Office for Information Security different political and especially foreign (BSI) is first and foremost responsible policy responses. Although both coun- for the prevention and operational re- tries were affected, their foreign policy re- sponse of such large scale incidents. To sponses differed. This paper will examine prevent large scale malicious cyber activi- Germany’s responses (and how it does ties the German government focuses on the not respond) in comparison to other coun- protection of critical infrastructure as well tries when it comes to large scale attacks as government agencies’ IT. This resulted like NotPetya. The focus of the analysis is in a regulatory response by implementing PAGE 24 THE PERISCOPE SERIES / VOLUME 3 / 2020
the IT Security Legislation13 which demands as the federal police, the intelligence ser- a certain set of standards and reporting vices, the armed forces -- mainly aiming to mechanisms by critical infrastructure ensure a whole-of-government approach providers. In order to facilitate a close in operational response. Hence if a cyber and trustworthy relationship with its core threat occurs it is the place where the op- stakeholder groups, such as businesses erational response among different gov- and governmental agencies, the BSI uses ernmental bodies is coordinated. Any an institutionalized dialogue in the form information about the incident would be of a public private partnership, the Alliance accumulated there and every government for Cybersecurity (AfCS/ACS). The AfCS is a body represented would take appropriate network to share information on threats steps, such as investigation, information and protection mechanisms. In the case of gathering, technical assistance. This also NotPetya, BSI shared warnings and infor- occurred during the NotPetya incident16. mation on how to handle such an incident Germany works with international part- publicly as well as targeted by the AfCS14. ners on prevention of large scale incidents. It also does this preventatively as can be For example since NotPetya the German seen in a recent example when the BSI sent BSI has published together with its coun- out a warning about the hardware chip vul- terpart in France, the National Cybersecu- nerability to all members of the Alliance rity Agency of France (ANSSI), a common for Cybersecurity and gave instructions for situational picture that aims to inform protection15. Ideally, this is to prevent the the public but also helps the two coun- success of a large scale malicious activity tries be better prepared and learn from that could use this vulnerability. each other. It goes way beyond just infor- Another important element of Germany’s mation sharing. Such joint technical analy- response structure is the National IT Sit- sis can build a common understanding of uation Center (LZ) situated in BSI that threats and may be used by policymakers is tasked to create an analysis of the as a tool to inform their political analysis of threat environment for Germany and the situation and ultimately the responses evaluate cyber incidents for state and taken jointly. In their own words, the press private sector entities 24/7. In a situa- statement reads as follows: “Both agencies tion where an incident occurs experts at LZ agree that the threat situation concerning react and distribute their analysis accord- Ransomware is still alarming” and further ingly. In case of a large scale malicious ac- it states “the impact, however is different in tivity, the LZ can become a crisis center. BSI France and Germany, especially regarding may also gather and distribute information global WannaCry and NotPetya ransom- via their Computer Emergency Response ware campaigns in 2017. These different ex- Teams or Mobile Incident Response periences regarding the consequences of Team that in some very special cases may the same attacks in the two countries em- also provide technical assistance on the phasize the need to cooperate even closer, ground. For NotPetya and other larger in- e.g. sharing information and jointly analys- cidents, another institution becomes very ing cyber threats.”17 Hence joint technical important for mitigating and reacting to analysis is used in response to large scale the incident - the Cyber Defense Center incidents with the aim to prevent and learn (NCAZ/ Cyber-AZ). It is housed by BSI but from other governments. includes other government agencies, such Analysis / Julia Schuetze PAGE 25
Due to the rise of cyber incidents despite the development of norms, the European Union has established a set of response mechanisms, including most prominently the so-called EU Cyber Diplomacy Toolbox which Germany supported through the Council decision adopted in June 2017. Looking specifically at Germany’s foreign the protection of privacy. With a view to de- policy responses, its engagement and dip- veloping norms of state behaviour and con- lomatic efforts on cybersecurity, is centred fidence and security building measures for traditionally around developing norms to cyberspace, they will work closely together increase the stability of cyberspace, free- in international forums, particularly in the dom of expression and building capacity UN Group of Governmental Experts.”19 in other countries. For this, the German Hence, the foreign office’s work has thus Federal Foreign Office (AA) created an In- far mostly concentrated on prevention of ternational Cyber Policy Coordination Staff large scale cyber incidents through norms in 201118. The AA is also involved in the in coordination with other countries. German Cybersecurity Council that gov- Due to the rise of cyber incidents despite erns Germanys’ strategy. Notably, the AA is the development of norms, the European not part of the Cyber Defense Center (Cy- Union has established a set of response ber-AZ) and thus has no part in the oper- mechanisms, including most prominently ational response in a large scale incident, the so-called EU Cyber Diplomacy Toolbox like NotPetya. It rather aims to prevent a which Germany supported through the large scale incident and increase the Council decision adopted in June 201720. stability of cyberspace, by engaging in in- The EU Cyber Diplomacy Toolbox includes ternational fora for norm building, such measures suitable for an immediate re- as United National Group of Govern- sponse to incidents as well as elements mental Experts (UNGGE) and the Open to encourage cooperation, facilitate the Ended Working Group on Cyber Norms mitigation of immediate and long-term (OEWG). This foreign policy response is threats, and influence the behavior of po- done jointly with other countries, for exam- tential aggressors in the long term. These ple since 2012 in strategic cooperation with measures range from diplomatic and po- Australia noted in the Berlin-Canberra Dec- litical to economic actions to prevent, de- laration of Intent on a Strategic Partner- tect or react to malicious cyber activities, ship where it states in Article 11: “Australia including those that do not rise to the level and Germany underline the importance of of internationally ‘wrongful acts’ but are the Internet’s security, its freedom and its considered as ‘unfriendly acts’. This tool- potential for development, and share the box includes foreign policy tools including view that there should be an appropriate restrictive measures. Importantly, all those balance between cyber security and access responses can only be implemented if all to information, freedom of expression and member states agree. With reference to PAGE 26 THE PERISCOPE SERIES / VOLUME 3 / 2020
NotPetya, the Council passed the follow- 2018 at the Australian Cyber Security Cen- ing conclusion21 that Germany supported. tre (ACSC) Conference in Canberra22. The The conclusion reads: “The EU firmly con- governments of the US, the UK, Denmark, demns the malicious use of information Lithuania, Estonia, Canada, and Austra- and communications technologies (ICTs), lia called out Russia in official statements. including in Wannacry and NotPetya, which Official statements of support came from have caused significant damage and eco- New Zealand, Norway, Latvia, Sweden, and nomic loss in the EU and beyond. Such Finland. “That had followed also an ad- incidents are destabilizing cyberspace as ditional coordinated calling-out of DPRK well as the physical world since they can [North Korea] as responsible for the Wan- be easily misperceived and could trigger naCry incident,” Feakin said23. Germany did cascading events”. not join this coordinated attribution effort Because getting all member states to agree and there was also no official attribution by is not the easiest task, countries have also the German government individually done chosen bilateral and multilateral coordi- before or after the coordinated attribution. nated or joint responses. Joint responses The German government was criticized in can be defined as an action that two or a news article for this as Handelsblatt had more countries take together in order to learned that the White House had shared prevent, detect or react to malicious cyber confidential insights into the attack’s or- activities including diplomatic instruments. igins with German intelligence. A German A joint response to a specific threat or vul- government spokesman said the admin- nerability or major incident includes the istration confined its statements on intel- implementation of policy instruments. ligence matters to the “responsible secret Here, beyond the European Union - level bodies of the German Bundestag” 24. response to NotPetya, there are more and The German government has so far not more responses by ‘coalitions of the willing been on the forefront of attribution. The and capable’ in reaction to major incidents only public attribution after a cyber inci- where countries that agree to take further dent was done by the Minister of Foreign join together. Germany has so far not taken Affairs in a press statement about the ex- joint or coordinated bi- or multilateral re- pulsion of Russian diplomats due to Scripal sponses in reaction to a major incident be- incident, an effort led by the United King- yond supporting the EU Council’s decision. dom. Here the Minister of Foreign Affairs Examples of a coordinated response by added that the expulsion was also done a coalition of the willing and capable was due to the cyber incident that affected the seen, most prominently after NotPetya, foreign office in 2018, saying that it was where Australia led a coordinated attribu- most likely Russian actors that were re- tion effort. In February 2018, within days of sponsible for the incident 25. This was not a each other, seven nations including Austra- large scale cyber incident like NotPetya but lia attributed the NotPetya cyber attacks to a targeted attack infiltrating the foreign of- Russia. It was no coincidence, according to fice. Public attribution to Russia had also Australia’s Ambassador for Cyber Affairs, been done frequently by the former Head Dr Tobias Feakin that ”[NotPetya] repre- of Germany’s Domestic Intelligence26. How- sented the largest coordinated attribution ever, it can be disputed whether this is an of its kind to date,” Feakin he said in April actual public attribution by the German Analysis / Julia Schuetze PAGE 27
government as it was only communicated response which are also done together through media channels by himself and fol- with other countries, like the join technical lowed up by or embedded in embedded in analysis that BSI and ANSSI put out, using other political actions or in a foreign policy other responses that are more political are approach towards Russia in an official Ger- underdeveloped. This is even more confus- man government statement. ing in light of current debates on the use of offensive cyber means for defensive pur- Conclusion: Germany’s responses to poses, so-called active cyber defense, and large scale malicious cyber incidents attribution in Germany28. Without a clear international strategy that installs Germa- Thus when it comes to foreign policy coop- ny’s approach to cybersecurity and spe- eration in reaction to a large scale incident, cific cybersecurity goals within its broader Germany is not cooperating openly or using foreign and security policy goals, it would the same response as Australia which has make the implementation and signalling of attributed frequently and is heading an in- use of those instruments very unpredict- ternational deterrence strategy right now. able for like-minded governments and bad The German government, through its re- actors alike. sponses focuses mostly on prevention of large - scale cyber incidents and therefore Opportunities for AUS-GER future its cooperation with other countries ap- cooperation pears to be centred on that, too. Germa- ny’s foreign policy approach is still focusing Taking into account the current state of on norms-building. Cyber incidents are not Germany’s responses to large scale inci- yet addressed as part of a broader foreign dents, there are three opportunities that policy or security policy towards a coun- emerge for further cooperation among try, for example with Russia. Germany has Australia and Germany. not yet published a cyber diplomacy strat- 1. Firstly, Germany and Australia should egy that would include or signal the use of continue the dialogue on responses diplomatic instruments as a response to as it would help the understanding cyber incidents. In case of non-existence of options that are available to Ger- of such a strategy, this may explain why many and Australia and will increase Germany is not using diplomatic instru- the awareness about under what condi- ments, such as attribution, sanctions and tions Germany may respond on EU level more in response to a large scale incident. or on its own or potentially join a coali- Therefore, Germany is not joining bilateral tion of countries. This could help to co- or multilateral cooperation to respond yet, ordinate responses in the future. like the coordinated attribution effort led by Australia. Strategically this could prove 2. Secondly, Germany and Australia could difficult in a world where cyber incidents focus on threat analysis to prevent are increasingly becoming part of broader large scale cyber incidents. Here both geopolitical conflicts and are used as just could learn from each other. starting another tool by some countries to under- with a common concern and common mine other countries’ economies, national goal can assist in identifying options of security and political integrity27. Unlike closer cooperation. A specific common Germany’s well-developed operational concern is for example threats to critical PAGE 28 THE PERISCOPE SERIES / VOLUME 3 / 2020
infrastructure, and more specifically telecommunications in the context of threats from cyberspace that could halt international security. Germany and the successful implementation of en- Australia are members of both groups. ergy transition that both countries have Then multi-stakeholder initiatives, such in common. In Australia, renewable en- as the Global Commission on the Sta- ergy is growing at a per capita rate ten bility of Cyberspace (GCSC) recently times faster than the world average. launched its final report, which offers The next fastest country is Germany29. a cyber stability framework, principles, The assumption made by the German norms of behaviour, and recommenda- government that energy transition tions for the international community “means that access to them is less likely and wider ecosystem. Further there is to lead to conflicts30 ” and further that “it the Paris Call for trust and security in will also be more difficult for states to cyberspace that was signed by Germany use energy sources to exert pressure” and Australia. What is necessary now, should be discussed again taking into is an initiative that oversees the imple- account the unique vulnerabilities that mentation of norms worldwide and renewable energy systems have31 and identifies actions to ensure norm imple- that in general energy infrastructures mentation. As both countries support are becoming increasingly the target the multistakeholder approach to inter- of cyber attacks32. Since Germany and net governance, a pledge to support a Australia have an interest in a successful global digital cooperation architecture energy transition, a common goal could as a way to support norm implemen- be to address the cybersecurity impli- tation could aid bringing stakeholders cations in this context and analyse spe- together. The High-level Panel on Dig- cifically threats to energy transition and ital Cooperation was convened by the evaluate what responses may be useful UN Secretary-General to advance pro- to mitigate them. posals to strengthen cooperation in the 3. Thirdly, Germany and Australia should digital space. Three ways of achieving start working together not just on this goal were proposed in the report norm development but on norm im- and are now being further developed plementation and aim to support and discussed worldwide. All have global governance cooperation plat- strengths and weaknesses as a German forms to achieve the implementa- multi-stakeholder group has identified tion of norms. Many norms have been/ in a workshop in October 201933. The are being developed in different fora. Australian government put out a pub- For example the UN established two lic statement commenting on the rec- intergovernmental processes on cy- ommendations34. A beneficial next step bersecurity – the Open Ended Working for norm implementation could be to Group (OEWG) on developments in the use those two discussions, one on digi- field of information and telecommuni- tal cooperation architecture and one on cations in the context of international norms for cyberspace and identify what security, and the sixth Group of Gov- sort of architecture Australia and Ger- ernmental Experts (GGE) on develop- many would pledge to support to imple- ments in the field of information and ment norms or develop norms further. Analysis / Julia Schuetze PAGE 29
Endnotes 1 EU definition that governs the implementation 17 BSI (2018) ANSSI and BSI present their first of EU Cyber Diplomacy toolbox that Germany “Common situational picture” passed in Council with all other member states. 18 Federal Foreign Office (2019) International Council of the European Union (2019) Cyber-at- cyber policy tacks: Council is now able to impose sanctions 19 Australian Government Department of Foreign 2 BSI (2019) Die Lage der IT-Sicherheit in Deutsch- Affairs and Trade (2012) Berlin-Canberra Decla- land 2019 ration of Intent on a Strategic Partnership 3 Greenberg (2018) The Untold Story of Not- 20 European Council (2017) Cyber attacks: EU Petya, the Most Devastating Cyberattack in ready to respond with a range of measures, History including sanctions 4 Greenberg (2018) The Untold Story of NotPetya, 21 Council of the European Union (2018) Council the Most Devastating Cyberattack in History conclusions on malicious cyber activities 5 BSI (2017) Update: Cyber-Angriffswelle Petya 22 Stilgherrian (2018) Blaming Russia for NotPetya – Bedrohung größer als bekannt or Scherchel was coordinated diplomatic action (2017) BSI-Warnung: Nach wie vor hohe Gefahr durch NotPetya-Backdoor in MeDoc or Minister 23 Stilgherrian (2018) Blaming Russia for NotPetya for Law Enforcement and Cyber Security (2018) was coordinated diplomatic action Australian Government attribution of the ‘Not- 24 Koch (2018) Germany is just fine with the NotPe- Petya’ cyber incident to Russia tya cyberattack but its allies aren’t 6 Reichert (2019) Hardware vulnerability by- 25 Auswärtiges Amt (2018) Bundesregierung zum passes Spectre and Meltdown patches Fall Skripal 7 Westernhagen (2019) Trojaner-Befall: Neue 26 Reuters (2018) German intelligence sees Russia Emotet-Welle legt Neustädter Stadtverwaltung behind hack of energy firms: media report or lahm Russia ‘was behind German parliament hack’ or 8 BSI (2019) Die Lage der IT-Sicherheit in Deutsch- Reuters (2017) Germany challenges Russia over land 2019 alleged cyberattacks 9 Herpig (2019) Attack surface of machine 27 See for example: Center For Strategic Interna- learning tional Studies (2019) Significant Cyber Incidents and Tallait (2019) Disrupt and restraint: The 10 Russia used NotPetya incident to and then it evolution of cyber conflict and the implications spread for collective security 11 Herpig and Bredenbock (2019) Cybersicher- 28 Herpig (2019) Aktive Cyber-Abwehr: Innenmin- heitspolitik in Deutschland. Akteure, Auf- ister schaltet bei IT-Sicherheit schrittweise von gaben und Zuständigkeiten. Im Fokus: Das Verteidigung auf Angriff Cyber-Abwehrzentrum 29 https://theconversation.com/australia-is-the- 12 See Germany’s cybersecurity architecture here: runaway-global-leader-in-building-new-renew- https://www.stiftung-nv.de/sites/default/files/ able-energy-123694 cybersicherheitspolitik_in_deutschland.pdf 30 Maas (2019) Speech by Foreign Minister Heiko 13 Bundesanzeiger (2015) IT-Sicherheitsgesetz Maas at the opening of the Berlin Energy Transi- 14 BSI (2018) Die Lage der IT-Sicherheit in Deutsch- tion Dialogue land 2018 31 Stamper et al (2017) Distributed Energy Sys- 15 BSI (2019) Windows-Schwachstelle: BSI warnt tems: Security Implications of the Grid of the vor möglichen wurmartigen Angriffen Future und Idaho National Laboratory (2016) Cyber Threat and Vulnerability Analysis of the 16 BSI (2018) Die Lage der IT-Sicherheit in Deutsch- U.S. Electric Sector land 2018 PAGE 30 THE PERISCOPE SERIES / VOLUME 3 / 2020
32 See: Sanger und Perlroth (2019) U.S. Escalates Online Attacks on Russia’s Power Grid, E-ISAC (2016) Analysis of the Cyber Attack on the Ukrainian Power Grid and Cimpanu (2019) Ran- somware incident leaves some Johannesburg residents without electricity 33 Heumann, Göhlich, Schuetze (2019) Work- shop Documentation UN High-Level Report – discussing Architectures for global digital Cooperation 34 Australian Government Department of Foreign Affairs and Trade (2019) IGF Consultation: Re- port of the UN Secretary-General’s High-level Panel on Digital Cooperation Analysis / Julia Schuetze PAGE 31
Copyright © Konrad Adenauer Stiftung (Australia) Limited, April 2020 Editor Katja Theodorakis Publisher Konrad Adenauer Stiftung (Australia) Limited Regional Programme Australia and the Pacific 11/3 Sydney Avenue Barton, ACT 2600 Australia Tel: +61 2 6154 9322 www.kas.de/australia Disclaimer All rights reserved. No part of this publication may be reprinted or repro- duced or utilised in any form or by any electronic, mechanical or other means, now known or hereafter invented, including photocopying or re- cording, or in any information storage or retrieval system, without permis- sion from the publisher. The opinions expressed in this publication rests exclusively with the au- thors and their interpretations do not necessarily reflect the views or the policy of the Konrad Adenauer Stiftung. Design, Layout and Typeset Swell Design Group Paper ecoStar+ is an environmentally responsible paper. The fibre source is FSC Recycled certified. ecoStar+ is manufactured from 100% post consumer re- cycled paper in a process chlorine free environment under the ISO 14001 environmental management system. PAGE 56 THE PERISCOPE SERIES / VOLUME 3 / 2020
You can also read