Dubai Customs WCO IT Conference Dubai, United Arab Emirates. Coordinated Border Management Road Map
|
|
- Loraine Thornton
- 6 years ago
- Views:
Transcription
1 Dubai Customs 2013 WCO IT Conference Dubai, United Arab Emirates Coordinated Border Management Road Map
2 Agenda Introduction The 4 Cs Of Boarder Management WCO SAFE Framework Compliance Boarder Management Capabilities Results & Positive Impact Conclusion
3 INTRODUCTION
4 Our Mission Society Protection + Compliance Enforcement Economic Development + Trade Facilitation
5 Bio Hazards Our Challenges Drug Dual Use Items Weapons
6 Counterfeiting and Smuggling Pharmaceutical Industry US $200 Billion Electronics Industry US $169 Billion Software Industry US $63 Billion Oil Industry US $54 Billion Light Weapons (Yearly) US $1 Billion Source: ( The Council Of Foreign Relations, 2012
7 Drugs Abuse Drugs and Illegal Substance The number of drug users across the globe is about 27 million, which is 0.6% of the world adult population aged 16 to 65 years Approximately US $ billion (0.3% - 0.4% of global GDP) would be needed to cover all costs related to drug treatment worldwide in 2012 Global productivity loss due to substance use was approximately 0.4% of global GDP The use illegal drugs resulted in approximately 0.9% deaths across the globe in 2010 among the people age 15 to 64 Hepatitis C infection among injecting drug users in 2010 was 46.7% Source: World Drug Report, 2012 United Nations Office on Drugs & Crime, 2012
8 The nationality of the victims detected between 2007 and 2010 was reported for more than 1,600 victims by 18 countries in Africa and the Middle East. Human Trafficking
9 THE 4 CS OF BOARDER MANAGEMENT
10 The Four Cs Of Coordinated Boarder Management Communicate Cooperate Coordinate Collaborate Goal Identify Boarder Regulatory Agencies Share Information & Resources Close Interagency Interaction Common Risk Management Accountability People Assign Liaison Officers Share Knowledge Cross Training Delegate Responsibility Process Set up Bilateral & Multi Lateral Meetings Align Business Process Optimize Business Process One Stop Boarder Post Technology Identify Available Resources Share Solutions & Systems System-to- System Integration Single Window & Decision Support Systems
11 Boarder Partners Local Police Immigration Ministry of Interiors Food Control Authority Anti Drugs Authority Anti Crime Authority Ministry of Health & Environment Import/Export Control Authority Coastal Guard Authority International Customs Administrations RILO (Regional Intelligence Liaison Offices) Program Global Shield Customs Enforcement Network (CEN) Green Customs Operation Pangea
12 WCO SAFE FRAMEWORK COMPLIANCE
13 WCO SAFE Framework Compliance (1) Harmonize the advance electronic cargo information requirements WCO Data Model & UN Standards Government-to-Government Business-to-Government Cargo Handers Imports, Exports & Brokers (2) Employee consistent Risk Management approach to address security Threats Risk Management Practice Intelligence Cycle Reconciliation Initiatives
14 WCO SAFE Framework Compliance (3) Meet minimal supply chain security standards and best practices Client Accreditation Program Information Security (ISMS ISO 27001) Information Encryption Transmission (Digital Certificate) (4) Safety and Security of shipments using non intrusive detection equipment Implemented Mega Port Initiative Installed Image and Radio Active detection system
15 Non Intrusive Detection Equipment JEBEL ALI TERMINAL 2 JEBEL ALI GATE 3
16 BOARDER MANAGEMENT CAPABILITIES
17 Boarder Management Capability People Process Technology
18 People Capability Integrity Enforcement Trade Affairs Behavioral Skills Enforcement Restricted & Prohibited Goods Customs Policies & Procedures Intelligence Case Management Tariff & Trade Affairs Rules of Origin Harmonized System Customs Valuation Supply Chain GCC Customs Law ATA Carnet International Agreements Behavioral Skills & Integrity Customer Service Communication Skills Code of Conduct Sense of Security Body Language Time Management
19 Process Capability Risk Management Intelligence Cycle Collect Monitor Identify Treat Analyses Disseminate Collate Evaluate Analyze
20 Technology Capability Information Based Risk Management Business Intelligence Advance Analytics Risk Engine Information Reconciliation Predictive Modeling
21 Business Intelligence Hits By Profile Types Hits By Category Types Hits By Rate Types Hits By Security Rate Types
22 Real-time Business Intelligence Real Time
23 Advance Analytics
24 Compliance Enforcement Dubai Customs Operating Model Risk Mitigation Inspection Legal Audit Investigation Tariff Valuation Origin Risk Engine Declaration Management Trade Facilitation Specific Range Mitigate Risky? Random Release Information Sources Risk Profile Risk Profile Creation Intelligence Cycle Information Sources
25 Information Reconciliation Manifest Details Mismatch between Wight, Description, Quantity, Container Declaration Ensure Cargo Cleared Gate Pass Discharge List Carrier List Gate Exit Load List Ensure Claims Authenticity Claim Refund
26 RESULTS & POSITIVE IMPACT
27 Examples of Seizures African Ivory Tramadol Captagon Pieces: 215 worth 15 Million Dirhams concealed in 40 cartons of beans Pieces: 8,640,000 worth around 100 Million Dirhams concealed in 108 cartons Pieces: 500,000 worth 25 Million Dirhams concealed in fabric rolls
28 Seizure Probability Number of Seizures Increase Protection and Compliance 0,6 0,5 0,4 0,3 0,2 0,1 0 Increase Risk Profile Effectiveness by 50% 274% Increase in number of Risk Engine Seizures % Risk Profile effectiveness target exceeded by 274% resulting in increase of positive hits probability Number of Seizures increased by 355% during the period
29 Feb Apr Jun Aug Oct Dec Feb Apr Jun Aug Oct Dec % of interventions Processing Time (sec.) Enhance Trade Facilitation Reduce Intervention Rate 25% 20% 15% 10% 5% Reduce Assessment Time 7,00 6,00 5,00 4,00 3,00 2,00 1,00 0,00 0% Average Seconds Target Intervention rate has reduced to 13% resulting in increase of auto cleared transactions Each declaration gets Risk Assessed in less than 1 second.
30 Results & Positive Impact 100% Declaration Risk Assessment
31 Results & Positive Impact 97% Auto Clearance
32 Results & Positive Impact 87% Compliant Transactions
33 Results & Positive Impact 262% Post Clearance Audit Findings
34 Results & Positive Impact 244% Valuation Cases
35 Results & Positive Impact 323% Prohibited Goods Seizures
36 Results & Positive Impact 335% Counterfeit Goods Seizures
37 Results & Positive Impact 283% Country Of Origin Seizures
38 2012 WCO Columbus Mission Report Dubai Customs Has an impressive range of IT Systems which can be rightly regarded as World Class in which other Customs Administrations around the world could learn from.
39 Dubai Government Excellence Program Awards 2011 Best IT Project Award Business-to-Government 2012 Best IT Project Award Mirsal Risk Engine Trade Facilitation Compliance Enforcement
40 CONCLUSION
41 Expanding The Virtual Boarder Global Boarder Regional Boarder Local Boarder An Export transaction from any country is an Import transaction in another Customs-to Customs Advanced Information Transmission Advance Risk Mitigation and Expand the Boarder
42 Bio Hazards Our Challenges Drug Dual Use Items Weapons
43 Bio Hazards Our Goal Drug Dual Use Items Weapons Thank You
44 Thank You
The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative
The Export Control and Related Border Security (EXBS) Program in ASEAN And ASEAN Single Window (ASW) Initiative United States Department of State International Security and Nonproliferation Bureau Office
More informationCustoms in the 21st Century
2009/SCCP/SWWG/WKSP4/006 Customs in the 21st Century Submitted by: WCO Single Window Working Group Capacity Building Workshop 4 Singapore 6-8 April 2009 Customs in the 21 st Century Coordinated Border
More informationDepartment of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise
Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness
More informationUNSCR 1540 Compliance From Policy to Implementation
Maritime Security Council L UNSCR 1540 Compliance From Policy to Implementation Committee on Hemispheric Security February 18, 2010 Talking Points Presentation Objective MSC Overview OAS Imperatives/Goals
More informationILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects
ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through
More informationFor Official Use Only
Born of Necessity Federal agencies with authority governing the safety of products imported into the United States acknowledge the need to share information about the safety of those products In response
More informationWhy C-TPAT? An Overview
Why C-TPAT? An Overview U.S. Customs Service Focus Prior to 9/11/01 Trade compliance Business Anti-Smuggling Coalition (BASC) Drug intervention Limited cargo security Security functions were uncoordinated
More informationContents. International collaboration and networking. 1. Example 2. Formal networks 3. Informal networks
International collaboration and networking Name E-waste training workshop Date, Location, Country Contents 1. Example 2. Formal networks 3. Informal networks 2 1 Case: Mixture of expired chemicals 29 containers
More informationDepartment of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise
Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness
More informationThe Global Security Threat How are Customs responding
The Global Security Threat How are Customs responding Ana Hinojosa Director-Compliance & Facilitation World Customs Organization Global Security Conference: Punta Cana Resolution 3 Years on Punta Cana
More informationHorizon 2020 Secure Societies WP 2017 Border Security and External Security (BES)
Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES) DG Migration and Home Affairs Paolo Salieri Border Security and External Security Development of technologies, capabilities
More informationMINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA
MINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA GEORGIA Location: South Caucasus Area: 69 700 km 2 Population: 3 729 500 (2015 census) GDP per capita: 3676 USD Prevailing religion:
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationRÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité
RÉPUBLIQUE D HAÏTI Liberté Egalité - Fraternité HAITI PORT SECURITY AND SAFETY: A SUCCESSFUL EXPERIENCE SCOPE OF THE PRESENTATION I- INTRODUCTION: IMPORTANCE OF MARITIME TRADE II- STATE OF GLOBAL PORT
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationAutomated Commercial Environment (ACE)/ International Trade Data System (ITDS) Program Overview and Technical Aspects
Automated Commercial Environment (ACE)/ International Trade Data System (ITDS) Program Overview and Technical Aspects Presented to the World Customs Organization (WCO) May 11, 2011 Linda Jacksta Executive
More informationWORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017
WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 2 WCO - CONTEXT 1952 - Customs Cooperation Council was established & in 1994 - Council adopted working name World
More informationBeyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness
Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of
More informationIllicit Goods and Global Health Programme
Illicit Goods and Global Health Programme CEOC Congress, 29 May 2017, Lyon INTERPOL - A WORLDWIDE ORGANIZATION PRESENCE WORLDWIDE GOVERNANCE COMMAND AND COORDINATION CENTER NOTICES INTERPOL s CRIMINAL
More informationQUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt
Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November
More informationEU Research for Secure Societies
EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationEU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)
EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) Manuela Cabral Directorate General for Taxation and Customs Union Head of Risk management and Security, Unit B 2 Brussels,
More informationIssue I. Airport Communication Project
Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office
More informationCanada s Weapons Threat Reduction Program
Canada s Weapons Threat Reduction Program Chris Grout Project Leader Nuclear and Radiological Security Weapons Threat Reduction Program Division Global Affairs Canada April 23, 2018 Weapons Threat Reduction
More informationGlobally Networked Customs Context, Concept, Rationale and Benefits - Indian Customs Perspective
CENTRAL BOARD OF EXCISE & CUSTOMS Customs Leaders Partnership Dialogue between Asia Pacific Region and the Americas Caribbean Region Globally Networked Customs Context, Concept, Rationale and Benefits
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationEUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER
EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER Mark R. Miller Regional Vice President, COTECNA Inspection S.A. Vice Chairman, European Organisation for Security Coordinator, EOS Supply
More informationSecurity and Fleet Manager
Security and Fleet Manager Location: [Europe & the Middle East] [Jordan] Town/City: Amman Category: Security Job Type: Open-ended, Full-time Position Title: Security and Fleet Manager PURPOSE OF POSITION:
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationUnderstanding how MRA works and realizing the benefits for both Customs and Trade
Understanding how MRA works and realizing the benefits for both Customs and Trade CTPAT Program Overview CTPAT is a voluntary public-private sector partnership program to strengthen the security of international
More informationZubair A Rehman Bin Saeed
Zubair A Rehman Bin Saeed https://pk.linkedin.com/in/zubairabdulrehmanbinsaeed 0304-6090990 / 0324-500559 Pakistan Safety Security & Loss Prevention Management Protecting People Assets & Property I am
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationMODEL CERTIFICATE FOR FISH AND FISHERY PRODUCTS CAC/GL
CAC/GL 48-2004 Page 1 of 6 INTRODUCTION MODEL CERTIFICATE FOR FISH AND FISHERY PRODUCTS CAC/GL 48-2004 Certification is one method that can be utilized by regulatory agencies of importing and exporting
More informationThe International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF)
The International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF) Perspectives on ILAC & IAF Multilateral Mutual Recognition Arrangements Peter Unger, ILAC Chair
More informationWhat's New in CTPAT. Logo and Abbreviation Current Membership Trusted Trader Best Practices Minimum Security Criteria Outreach/Training
What s New Our Mission Detect and prevent terrorists and terrorist weapons from entering the United States, while facilitating the orderly and efficient flow of legitimate trade and people at and through
More informationGLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius
GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,
More informationFood Safety and Inspection Service:
USDA-FSIS-OIEA Compliance and Investigations Division (CID) Mark W. Crowe Director Washington, D.C. 2 FSIS Program Areas Office of the Administrator Office of Field Operations Office Policy and Program
More informationThe Beyond the Border Action Plan
The Beyond the Border Action Plan 1 Beyond the Border: A Shared Vision For Perimeter Security and Economic Competitiveness Part 1: Addressing Threats Early Part 2: Trade Facilitation, Economic Growth,
More informationWorld Customs Organization Moving Toward New Era of Combating Environmental Crime
World Customs Organization Moving Toward New Era of Combating Environmental Crime 7 th International Conference on Environmental Crime Lyon, France 13-17 September 2010 Dear Colleagues, Ladies and gentlemen,
More informationIMEI Counterfeit Update
IMEI Counterfeit Update Presented by Mohamed Abbes, MENA Public Policy Director, GSMA mabbes@gsma.com 23 April 2018, ITU Study Group 11 Regional Workshop for Africa 2 www.gsma.com/services /gsma-imei/
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationACCAB. Accreditation Commission For Conformity Assessment Bodies
ACCAB Accreditation Commission For Conformity Assessment Bodies ACCAB Platinum Plus Accreditation For Certification Bodies, Inspection Bodies, Testing & Calibration Laboratories and Medical Laboratories
More informationUNODC - WCO CONTAINER CONTROL PROGRAMME
UNODC - WCO CONTAINER CONTROL PROGRAMME Global Annual Container Movements (million TEUs) 450 400 350 300 250 200 150 100 50 0 1996 2000 2012 Less than 2 % inspected 2006: 420 mill. containers Container
More informationUNODC. International Cooperation and Assistance in Cybercrime Matters
UNODC International Cooperation and Assistance in Cybercrime Matters UNODC Approach To integrate cybercrime and electronic evidence related issues in broader UNODC mandates of Supporting Member States
More informationOIE Sub-Regional Training Seminar on Veterinary Legislation Botswana National Veterinary Laboratory, Sebele, Gaborone (Botswana)
Dr. Patrick Bastiaensen OIE Sub-Regional Representation Southern Africa Dr. Marie Edan OIE Regional Activities Department Performance of Veterinary Services Outcomes of PVS missions conducted in SADC Member
More informationIf you have any questions regarding this survey, please contact Marcell Reid at or Thank you for your support!
ABBVIE GLOBAL SUPPLIER SUSTAINBILITY PROGRAM Annual Supplier Sustainability As an important supplier to AbbVie, we would like to document and assess your company s activities and progress regarding sustainability
More informationWorking Together to Combat Global Transnational Organized Counterfeiting
Working Together to Combat Global Transnational Organized Counterfeiting John Newton IPR Programme Manager INTERPOL Crossing Borders and Sectors: Exploring Robust Anti-Counterfeiting Solutions ANSI Conference
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationStatement by the President of the European Council. The Hague Nuclear Security Summit. Let me begin by thanking Prime Minister Rutte and the Dutch
Statement by the President of the European Council The Hague Nuclear Security Summit Let me begin by thanking Prime Minister Rutte and the Dutch Government for hosting the third Nuclear Security Summit
More informationBenefits of Open Cross Border Data Flows
/SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24
More informationEU P2P: Export Control Programme on Dual-Use Goods
Funded by the European Union EU CBRN Risk Mitigation Centres of Excellence EU Outreach Programme 2015-2017 on Export Control of Dual-Use Goods EU P2P: Export Control Programme on Dual-Use Goods OVERVIEW
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationThe U.S. Government s Role in Standards and Conformity Assessment
The U.S. Government s Role in Standards and Conformity Assessment ASTM International-Russian Federation on Technical Regulating and Metrology Coordinated Program Mary Saunders Chief, Standards Services
More informationISO Information Security Management Systems Implementation Road Map
www.uaeiso.com ISO 27001 Information Security Management Systems Implementation Road Map 10 Step Approach to ISO 27001 Certification Awareness Training Information Security Policy and Objectives Finalization
More informationHARMONIZATION OF NUCLEAR SAFEGUARDS INFRASTRUCTURE DEVELOPMENT
HARMONIZATION OF NUCLEAR SAFEGUARDS INFRASTRUCTURE DEVELOPMENT MATTHEW VAN SICKLE INTERNATIONAL NUCLEAR SAFEGUARDS AND ENGAGEMENT PROGRAM Vienna, Austria Department of Energy/ February 11, 2010 National
More informationRegulatory Measures on Organic Product Certification Management
Regulatory Measures on Organic Product Certification Management NO. 155 MANUSCRIPT OF STATE GENERAL ADMINISTRATION OF QUALITY SUPERVISION, INSPECTION AND QUARANTINE Chapter I: General Provisions Article
More informationStandardization for DRR: Opportunities or barriers?
Standardization for DRR: Opportunities or barriers? 4 June, 2018 Stefan Tangen, stefan.tangen@msb.se Swedish Civil Contingencies Agency (MSB) IFAFRI ISO/TC 292 Security and resilience Example on cargo
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationFACTS FIGURES TÜV SÜD AG
2014 FACTS FIGURES TÜV SÜD AG TÜV SÜD AT A GLANCE 1866 Founded in Mannheim. More than 22,000 Employees worldwide. Around 800 Locations on all continents. SHAREHOLDERS OF TÜV SÜD AG IN % 74.9 TÜV SÜD E.V.
More informationMalaysia s journey towards National Single Window for trade facilitation. Eva Chan Djava Factory Sdn Bhd, Malaysia
Malaysia s journey towards National Single Window for trade facilitation Eva Chan Djava Factory Sdn Bhd, Malaysia Inception of Malaysia NSW In 1995, the Malaysian Government adopted a pragmatic approach
More informationKey United Nations counter-terrorism references & architecture: Impact on customs.
Key United Nations counter-terrorism references & architecture: Impact on customs. Counter-Terrorism Committee Executive Directorate (CTED) United Nations Brussels, 2-4 October 2018 United Nations counter-terrorism
More informationCOUNTRY PROFILE. Estonia
COUNTRY PROFILE Estonia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationTHE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationINTERPOL s Investigative Support to the Fight against NPS
INTERPOL s Investigative Support to the Fight against NPS Presented at the SICH Project Final 114th Session of INCB 20 November 2015 Daoming ZHANG INTERPOL General Secretariat Basic Observations The market
More informationCOUNTRY PROFILE. Ireland
COUNTRY PROFILE Ireland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 18 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationINTERPOL For official use only. Fighting with friends
Fighting with friends Transnational Cybercrime Volume of crime Restriction in information sharing Emerging technology & ease of criminal use Legislative harmony So, what does do Analysis and on-site assistance
More informationCOUNTRY PROFILE. Croatia
COUNTRY PROFILE Croatia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationEXPERT GROUP MEETING ON CYBERCRIME
EXPERT GROUP MEETING ON CYBERCRIME VIENNA, 17-21 JANUARY 2011 Presentation by Ayo Olukanni Charge D affaires ai Embassy/Permanent Mission of Nigeria, Vienna Nigeria and the fight against Cybercrime Establishment
More informationGerman Research Strategy in the Area of Civil Security Research
8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security
More informationOverview of Customs-Trade Partnership Against Terrorism (C-TPAT)
Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our
More informationCOUNTRY PROFILE. Qatar
COUNTRY PROFILE Qatar Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTER-TERRORISM. Future-oriented policing projects
COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol
More informationCountermeasures against Mobile spam
8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry
More informationPRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.
PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy
More informationRadio Research and Development Institute (NIIR) Moscow, Russian Federation
Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with
More informationCOUNTRY PROFILE. Italy
COUNTRY PROFILE Italy Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationSupply Chain Security Since 9/11
Supply Chain Security Since 9/11 2011 TRB SUMMIT 24 AUGUST 2011 SETH M.M. STODDER, Palindrome Strategies, LLC Agenda Introduction Supply Chain Security Since 9/11 Pre-9/11 View Post-9/11 Actions Where
More informationDEFINITIONS AND REFERENCES
DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,
More informationThe UNISDR Private Sector Alliance for Disaster Resilient Societies
The UNISDR Private Sector Alliance for Disaster Resilient Societies Sandra Amlang United Nations Office for Disaster Risk Reduction (UNISDR) Regional Office- the Americas. 24 August 2017 Increase in Frequency
More informationWHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector
WHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector OUR MAILERS YOUR MAIL From the people who move it to the customers who use it. PROTECTING YOUR BUSINESS
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More information2010/SOM3/CTI/WKSP/015rev1 Authorized Economic Operator Pilot Programme of Hong Kong, China
2010/SOM3/CTI/WKSP/015rev1 Authorized Economic Operator Pilot Programme of Hong Kong, China Submitted by: Hong Kong, China Ease of Doing Business Workshop on Trading Across Borders Sendai, Japan 18-19
More informationITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles
ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context
More informationOpen briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons
[Draft concept note] Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons United Nations Headquarters, New York, Wednesday, 17 May 2017 I. Introduction 1. Security
More informationOpening Speech. The 8 th International Roundtable on Automotive Recycling 2014 Kushiro, Japan. ( 1 st 4 th Oct 2014 ) Presented by : Mr.
The 8 th International Roundtable on Automotive Recycling 2014 Kushiro, Japan Opening Speech ( 1 st 4 th Oct 2014 ) Presented by : Mr. Gwee President of MAARA The 8 th International Roundtable on Automotive
More informationSerious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime
Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Background Established under the Serious Organised Crime and Police Act 2005 NDPB
More informationTRANSFORMING CUSTOMS THROUGH TECHNOLOGY
SUCCESS STORY Ultra Solutions for Public Sector www.ultra.mk TRANSFORMING CUSTOMS THROUGH TECHNOLOGY Single Window for Licenses for Import, Export and Transit of Goods and Tariff Quotas in the Republic
More informationInformation technology Security techniques Information security controls for the energy utility industry
INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques
More informationExport Control Reform Presentation
Export Control Reform Presentation Todd E. Willis Division Chief, Dual-Use Licensing Defense Technology Security Administration U.S. Department of Defense Agenda Overview of Defense Technology Security
More informationhealthy built environment HBE provides services and products to ensure a healthy built environment
healthy built environment HBE provides services and products to ensure a healthy built environment HBE stands for Healthy Built Environment We are one of the leading health, safety and compliance consultancies,
More informationQBPC s Mission and Objectives
QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the
More informationCritical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016
Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security
More informationPROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security
DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program
More information