2011 International Law Enforcement IP Crime Conference. Operational Round Table 1. Transforming Regional Success into Global Action
|
|
- Cody Kennedy
- 5 years ago
- Views:
Transcription
1 2011 International Law Enforcement IP Crime Conference Operational Round Table 1 Transforming Regional Success into Global Action
2 Operational Round Table 1 Findings from Workshops: Customs and Police Combating Illicit Internet Activities Integrated Prosecution Strategies E-Commerce
3 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Customs and Police We should Help develop the commitment and engagement of stakeholders build up of training and advance information is essential. Bring in multi layered partnerships to share intelligence, specialties, expertise and resources. Tackle supply chains at numerous points Engage in the legislative process to make laws fit for purpose
4 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Combating Illicit Internet Activities Global approach Greater cooperation and information sharing among all stakeholders Greater focus on domain name take down and access blocking Intelligence based targeting of internet based syndicates Greater attention on the payment process Greater use of the internet as an awareness tool Enhance sharing of public awareness material
5 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Integrated Prosecution Strategies Training and Capacity Building / Share experiences Develop Regional and International Initiatives Harmonization and Strengthening of Legislation Public Education and Awareness Lobbying of Policymakers Public - Private Sector Collaboration Multi-lateral Agreements on Enforcement (E.g., MLAT, Cybercrime Convention) and enhanced informal information sharing Important to have easy access to information on what other countries/officials cando in a specific case in order to prevent preparing and asking for actions that cannot be performed.
6 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Integrated Prosecution Strategies POC Expertise in IP and Technology make known to LE / Victims (E.g. 24/7 list) Early contact between operationalpolice/prosecutors Develop a strategy early on to reduce surprise / problem and increase success Greater interagency cooperation nationally Formal follow up red tape Consider initiating preliminary investigation based on information given by requesting country to permit use of domestic resources, greater flexibility and informal information sharing and follow up with formal request for evidence through MLAT request. Long term law enforcement relationships to promote cooperation and timeliness
7 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce Brand/rightsholders must be a trustworthy victim They must be supportive of law enforcement And not make side deals with infringers There is significant risk of counterfeits entering the Government supply chain Rights holders should take steps to educate procurement officials about the specific steps and procedures they can employ.
8 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce Cyberlockershave emerged as a means for individuals (uploaders) can earn $ as well as criminals. It is critical to educate law enforcement officers in the latest technology, so they can address threats such as Cyberlockers.
9 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce The chances of all aspects of an illegal site being located in one country is low Servers, uploader/user, registrant, account 4 elements Therefore, an 87.5% chance of a non domestic element. Global cooperation is critical. Different sanctions from one country to another must be overcome.
10 2011 International Law Enforcement IP Crime Conference Operational Round Table 2 Transforming Regional Success into Global Action
11 Operational Round Table 2 Findings from Workshops: Practical Partnerships Capacity Building Illicit Trade IP Crime Training
12 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Practical Partnerships Regional projects which recognize police work, setting objectives for the IPR programs and establishing performance indicator. Establish ministerial level networks which maintain dialogue with industry, identify single point of contact for the industry, public and police on IPR issues. Identify twining projects, sister city partners. Targeted awareness raising campaigns / cooperation between public and private sector.
13 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Practical Partnerships (con t) Sustainability. Continuing support from private sector to law enforcement to influence policy makers. Enhanced two way communication between public and private sector. Continue the discussion on shippers responsibility. Payment of storage and destruction. Explore the possibilities of cooperate with universities and law schools to educate stakeholders on IP issues. Make sure that agreements etc. between the stakeholders also reaches the local level.
14 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Capacity Building Rights Holder engagement Legislation or regulation that provides meaningful penalties Good exchange of information (intelligence & best practices) Dedicated Government Resources to IP Enforcement Coordination between Government Agencies & Rights Holders Learn from both good & bad experiences Good Communication Reach a balance between Rights Holders Needs (i.e., enforcement action) & Governments' abilities (i.e., budget & personnel)
15 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Scale and Characteristics Trend: Legal production down/illicit trade up Illicit tobacco estimated to be 6-10% of global trade South African Government loss R2.9 billion; tobacco industry R540 million Clear involvement of transnational organized criminals Opportunities for intervention vary according to industry sector (diamonds at source; tobacco at source and supply chain) Illicit trading prevalent in all regions Corruption a significant factor in all regions
16 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Integrated intervention strategies Same criminals; IP crime strategies work for illicit trade Dedicated investigation/project teams Comprehensive integrated multidisciplinary approach according to local jurisdiction/practice Whole range of civil/criminal investigation techniques required Embrace technology e.g. Tobacco use of digital tax stamps (ECTS); precious metals integrate observations and data
17 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Maximizing opportunities: diverse criminal jurisdictions Institutional and government corruption requires innovative approach Multi-jurisdictional cooperation and coordination Exploit opportunities presented by global interconnectivity Initiate proceedings for related and other offences in another jurisdictions Take out component parts of conspiracy at every opportunity Use INTERPOL international arrest warrants (Red Notices)
18 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: IP Crime Training Coordination of all IPR training. Database for all IPR training material. Training needs analysis / flexible approach.
19 2011 International Law Enforcement IP Crime Conference Operational Round Table 3 Transforming Regional Success into Global Action
20 Operational Round Table 3 Findings from Workshops: Proactive Integrated Analysis Managing Global Operations Shared Collective Expertise Protecting Trade Secrets
21 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Proactive Integrated Analysis Public/Private partnership to develop data sharing models that are more reciprocal. Private sector can and should influence policy leaders in countries to give law enforcement capacity to enforce against IP theft. Conflicting privacy and data protection laws need to be addressed to better allow sharing of information, and interpreted to allow for proactive sharing of intelligence. Best practices should be shared and adopted
22 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Managing Global Operations Set objectives / aim high Communication / clear Local expertise Understanding legal issues in operating countries / involve legal experts from those countries Understand cultural aspect globally / corruption issues Working within legal frameworks of countries Proper use of L.O. officers in countries..interpol, Europol, etc Importance of measurement of success / feedback for future operations
23 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Shared Collective Expertise Better cooperation between the different agencies (Ex. Police and Customs) Better cooperation between law enforcement and right holders Better IP training for law enforcement Corruption in some regions makes IP investigations difficult Right holders need to register their IP in some countries, so that law enforcement can prosecute Right holders need to nominate a representative/agent in developing countries, so that they do not have to travel to these countries every time a new investigation is initiated A centralized data base with all concluded IP prosecutions, that right holders and law enforcement from different regions can access Better sharing of information between different regions Improve publicity/media coverage for IP investigations/prosecutions
24 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Protecting Trade Secrets Trade Secret definition Brand Holders must take reasonable measures to protect their trade secrets Brandholdermeasures NDA is not the only means of protection, sensitivity of materials Investigative Alternatives to Theft of Trade Secret Crime always another offense to pursue Who do you pursue the target or the recipient Civil vs. Criminal processes of discovery Not having a TOTS law on the books can preclude extradition Educating industry and IP crime units in TOTS investigative process and impact, tangential crimes Preparing investigative units with tools, expectations and concerns when working with industry
25 2011 International Law Enforcement IP Crime Conference Plenary Session 17 Round Table Feedback Session Transforming Regional Success into Global Action
26 Operational Round Table 1 Findings from Workshops: Customs and Police Combating Illicit Internet Activities Integrated Prosecution Strategies E-Commerce
27 Operational Round Table 1 Conclusions: Customs and Police Help develop the commitment and engagement of stakeholders build up of training and advance information is essential. -Ayudaa los propietariosde lasmarcasen la capacitacióny el intercambio de información. Engage in the legislative process to make laws fit for purpose -Avanzaren el procesolegislativoparaquese haganleyes más eficaces.
28 Operational Round Table 1 Conclusions: Combating Illicit Internet Activities Greater cooperation and information sharing among all stakeholders -Aumento de la cooperación y del intercambio de información con los propietariosde lasmarcasy proveedoresde servicios. Greater focus on domain name take down and access blocking -Dar importanciaal nombrede dominioy bloqueode páginas web ilícitas.
29 Operational Round Table 1 Conclusions: Integrated Prosecution Strategies Training and Capacity Building / Share experiences / Points of contact - Formación y capacidad de desarrollo/ compartir experiencias/ puntos de contacto Long term law enforcement relationship to promote cooperation and timeliness - Relaciones entre las agencias para promover la cooperación
30 Operational Round Table 1 Conclusions: E-Commerce Brand/rightsholders and Goverments should engage e-comerce companies, such as ISPs and payment processors. - Propietarios de las marcas, agencias y el Gobierno deberían impulsarel trabajoconjunto. There is significant risk of counterfeits entering the Government supply chain - Existe un riesgo importante de que las falsificaciones entren en las líneas de contratación del Gobierno.
31 Conclusions: Operational Round Table 1 Must use complimentary laws to supplement cases ej: fraud and conspiracy laws. - Fomentar el uso de leyes complementarias como por ejemplo el fraude y la revelación de secretos.
32 Operational Round Table 2 Findings from Workshops: Practical Partnerships Capacity Building Illicit Trade IP Crime Training
33 Operational Round Table 2 Workshop: Practical Partnerships Regional projects which recognize police work, setting objectives for the IPR programs and establishing performance indicator. Targeted awareness raising campaigns / cooperation between public and private sector. Continuing support from private sector to law enforcement to influence policy makers. con t
34 Operational Round Table 2 Workshop: Practical Partnerships Continue the discussion on shippers responsibility regarding shippers liability in knowing your customer Liability for storage and destruction costs
35 Operational Round Table 2 Workshop: Capacity Building Good exchange of information (intelligence & best practices) Dedicated Government Resources to IP Enforcement Good Communication including with media
36 Operational Round Table 2 Workshop: Illicit Trade Same criminals; IP crime strategies work for illicit trade / Take out component parts of conspiracy at every opportunity Dedicated investigation/project teams Exploit opportunities presented by global interconnectivity
37 Operational Round Table 2 Workshop: IP Crime Training Coordination of all IPR training. Referral Database for all IPR training material. Training needs analysis / flexible approach.
38 Operational Round Table 3 Findings from Workshops: Proactive Integrated Analysis Managing Global Operations Shared Collective Expertise Protecting Trade Secrets
39 Operational Round Table 3 Workshop: Proactive Integrated Analysis Private sector can and should influence policy leaders in countries to give law enforcement capacity to enforce against IP theft. Conflicting privacy and data protection laws need to be addressed to better allow sharing of information, and interpreted to allow for proactive sharing of intelligence. Best practices should be shared and adopted.
40 Operational Round Table 3 Workshop: Managing Global Operations Communication / Provide all relevant information to concerned parties. Understanding legal issues in operating countries / involve legal experts from those countries. Understand cultural aspect globally.
41 Operational Round Table 3 Workshop: Shared Collective Expertise Better IP training for law enforcement. Corruption in some regions makes IP investigations difficult. Improve publicity/media coverage for IP investigations/prosecutions.
42 Operational Round Table 3 Workshop: Protecting Trade Secrets Brand Holders must take reasonable measures to protect their trade secrets. Brandholdermeasures NDA is not the only means of protection, sensitivity of materials. Investigative Alternatives to Theft of Trade Secret Crime always another offense to pursue. Preparing investigative units with tools, expectations and concerns when working with industry.
15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationITU Model Cybercrime Law: Project Overview
ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International
More informationEXPERT GROUP MEETING ON CYBERCRIME
EXPERT GROUP MEETING ON CYBERCRIME VIENNA, 17-21 JANUARY 2011 Presentation by Ayo Olukanni Charge D affaires ai Embassy/Permanent Mission of Nigeria, Vienna Nigeria and the fight against Cybercrime Establishment
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationPolicy recommendations. Technology fraud and online exploitation
Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationInternational IP Crime Investigators College An INTERPOL Initiative in Cooperation with UL IIPCIC. Course Catalog
International IP Crime Investigators College An INTERPOL Initiative in Cooperation with UL IIPCIC Course Catalog 2019 1 Welcome to IIPCIC The International Intellectual Property (IP) Crime Investigators
More informationILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects
ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through
More informationUNODC. International Cooperation and Assistance in Cybercrime Matters
UNODC International Cooperation and Assistance in Cybercrime Matters UNODC Approach To integrate cybercrime and electronic evidence related issues in broader UNODC mandates of Supporting Member States
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationInternational Cooperation in Cybercrime Investigations
International Cooperation in Cybercrime Investigations Joel Schwarz Computer Crime & Intellectual Property Section Criminal Division, US Department of Justice Joel.schwarz@usdoj.gov Criminal Investigations
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form CROATIA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationG8 Lyon-Roma Group High Tech Crime Subgroup
G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies
More informationQBPC s Mission and Objectives
QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the
More information13268/16 EB/dk 1 DGD 1C
Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationThe Global Fund to Prevent Violence against Children
The Global Fund to Prevent Violence against Children There are children out there, vulnerable children, who are counting on us to get this right. Every single child is precious. Every child deserves a
More informationCYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012
CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,
More informationGlobal Wildlife Cybercrime Action Plan1
Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationChild Online Protection in Child Pornography Namibia
Child Online Protection in Child Pornography Namibia Regulation in Namibia UNICEF Namibia Presented by: Jolanda van Westering Outline Introduction Typology of online abuse and exploitation Scale and response
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationVirtual Currencies and The Commonwealth. 1 June 2016
1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity
More informationWorking Together to Combat Global Transnational Organized Counterfeiting
Working Together to Combat Global Transnational Organized Counterfeiting John Newton IPR Programme Manager INTERPOL Crossing Borders and Sectors: Exploring Robust Anti-Counterfeiting Solutions ANSI Conference
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationAssistant Secretary-General Michèle Coninsx Executive Director, CTED
High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationASEAN s Cyber Confidence Building Measures
ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationOUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY
OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI
More informationTRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING
TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationGLOBAL CYBERSECURITY INDEX 2016
GLOBAL CYBERSECURITY INDEX 2016 Objective The Global Cybersecurity Index (GCI) measures each nation state s level of cybersecurity commitment in five main areas: Legal Technical Organizational Capacity
More informationINTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach
INTERPOL s Role and Efforts in Combating Cybercrime Dr. Madan M. Oberoi Director Cyber Innovation and Outreach What does INTERPOL do? VISION Connecting police for a safer world MISSION Preventing and
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationPRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology
PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber
More informationHuman Trafficking & Modern Day Slavery Northumbria Police Action Plan
Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationHuman Trafficking & Modern Day Slavery Northumbria Police Action Plan
Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare. Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development
More informationIssue I. Airport Communication Project
Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationCONCLUSIONS AND RECOMMENDATIONS
Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationInternational Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde
International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL Mr Olusola Oguntunde EU OFFICE IPSG LYON RB SAN SALVADOR RB BUENOS AIRES UN OFFICE RB ABIDJAN RB YAOUNDE AU
More informationIllicit Goods and Global Health Programme
Illicit Goods and Global Health Programme CEOC Congress, 29 May 2017, Lyon INTERPOL - A WORLDWIDE ORGANIZATION PRESENCE WORLDWIDE GOVERNANCE COMMAND AND COORDINATION CENTER NOTICES INTERPOL s CRIMINAL
More informationLegal Foundation and Enforcement: Promoting Cybersecurity
Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer
More informationIntelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism
Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism ECAD 24 th Mayors Conference Kaunas, 12 June 2017 OSCE and Transnational
More informationESSA Q INTEGRITY REPORT
ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,
More informationCybercrime and e-evidence: challenges and solutions.
Cybercrime@Octopus Ministry of Communications Workshop on Cybercrime and Cybersecurity for selected Members of Parliament (KAIPTC, Accra, Ghana, 25 October 2018) Cybercrime and e-evidence: challenges and
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationThe role of municipal government in preventing crime and building community safety
NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country
More information12002/1/18 REV 1 PhL/at 1 ECOMP. 3 B
Council of the European Union Brussels, 24 September 2018 (OR. en) 12002/1/18 REV 1 UD 192 PI 120 NOTE From: To: General Secretariat of the Council Delegations No. prev. doc.: ST 10644/2/18 REV 2 Subject:
More informationQUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt
Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November
More information8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement
8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement 1. As Ministers responsible for transportation in the APEC region, we met in Tokyo, Japan, on September
More informationSussex Police Business Crime Strategy
Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationUNODC/CCPCJ/EG.4/2017/CRP.1
3 April 2017 English only Expert Group to Conduct a Comprehensive Study on Cybercrime Vienna, 10-13 April 2017 Information on the implementation of Crime Commission resolution 22/8 Note by the Secretariat
More informationCYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA
CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA NATIONAL STRATEGY IN MANAGEMENT OF CYBER SECURITY Comprehensive law and policies Effective monitoring tools Awareness
More informationProject III Public/private cooperation
Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationBRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access
More informationCyber Intel within European Cybercrime Center Ops
@EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationThis report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ).
REPORT TO THE 38 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS - MOROCCO, OCTOBER 2016 ON THE 5 th ANNUAL INTERNATIONAL ENFORCEMENT COOPERATION MEETING HELD IN MANCHESTER, UK,
More informationCombating Pharmacrime AGENDA
Combating Pharmacrime A Knowledge Building Conference on Counterfeit Medicines 26-28 A Co-hosted event by EUROPOL & EU Observatory on IP Infringements (PSI) AGENDA T he specific purpose of the event is
More informationCOUNTER-TERRORISM. Future-oriented policing projects
COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance,
More informationRESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection
RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationCONNECT ARAB STATES SUMMIT
CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with
More informationPROJECT RESULTS Summary
Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised
More informationIndonesia Cyber Security Market
Indonesia Cyber Security Market EXECUTIVE SUMMARY: Indonesia offers abundant demand for cyber security exports. Defense spending is modest, totaling $8 billion, but is expected to increase. Increase in
More informationThe WEEE chain of events. Key findings and recommendations Legal Framework. Vittoria Luda di Cortemiglia UNICRI
The WEEE chain of events Key findings and recommendations Legal Framework Vittoria Luda di Cortemiglia UNICRI EU Forum of Judges for the Environment Bolzano, 30 October 2015 The CWIT consortium Two year
More informationMEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV
MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime
More informationProject CyberSouth Cooperation on cybercrime in the Southern Neighbourhood
Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCouncil of the European Union Brussels, 23 November 2016 (OR. en)
Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationWORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017
WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 2 WCO - CONTEXT 1952 - Customs Cooperation Council was established & in 1994 - Council adopted working name World
More information