2011 International Law Enforcement IP Crime Conference. Operational Round Table 1. Transforming Regional Success into Global Action

Size: px
Start display at page:

Download "2011 International Law Enforcement IP Crime Conference. Operational Round Table 1. Transforming Regional Success into Global Action"

Transcription

1 2011 International Law Enforcement IP Crime Conference Operational Round Table 1 Transforming Regional Success into Global Action

2 Operational Round Table 1 Findings from Workshops: Customs and Police Combating Illicit Internet Activities Integrated Prosecution Strategies E-Commerce

3 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Customs and Police We should Help develop the commitment and engagement of stakeholders build up of training and advance information is essential. Bring in multi layered partnerships to share intelligence, specialties, expertise and resources. Tackle supply chains at numerous points Engage in the legislative process to make laws fit for purpose

4 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Combating Illicit Internet Activities Global approach Greater cooperation and information sharing among all stakeholders Greater focus on domain name take down and access blocking Intelligence based targeting of internet based syndicates Greater attention on the payment process Greater use of the internet as an awareness tool Enhance sharing of public awareness material

5 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Integrated Prosecution Strategies Training and Capacity Building / Share experiences Develop Regional and International Initiatives Harmonization and Strengthening of Legislation Public Education and Awareness Lobbying of Policymakers Public - Private Sector Collaboration Multi-lateral Agreements on Enforcement (E.g., MLAT, Cybercrime Convention) and enhanced informal information sharing Important to have easy access to information on what other countries/officials cando in a specific case in order to prevent preparing and asking for actions that cannot be performed.

6 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Integrated Prosecution Strategies POC Expertise in IP and Technology make known to LE / Victims (E.g. 24/7 list) Early contact between operationalpolice/prosecutors Develop a strategy early on to reduce surprise / problem and increase success Greater interagency cooperation nationally Formal follow up red tape Consider initiating preliminary investigation based on information given by requesting country to permit use of domestic resources, greater flexibility and informal information sharing and follow up with formal request for evidence through MLAT request. Long term law enforcement relationships to promote cooperation and timeliness

7 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce Brand/rightsholders must be a trustworthy victim They must be supportive of law enforcement And not make side deals with infringers There is significant risk of counterfeits entering the Government supply chain Rights holders should take steps to educate procurement officials about the specific steps and procedures they can employ.

8 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce Cyberlockershave emerged as a means for individuals (uploaders) can earn $ as well as criminals. It is critical to educate law enforcement officers in the latest technology, so they can address threats such as Cyberlockers.

9 Operational Round Table 1 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: E-Commerce The chances of all aspects of an illegal site being located in one country is low Servers, uploader/user, registrant, account 4 elements Therefore, an 87.5% chance of a non domestic element. Global cooperation is critical. Different sanctions from one country to another must be overcome.

10 2011 International Law Enforcement IP Crime Conference Operational Round Table 2 Transforming Regional Success into Global Action

11 Operational Round Table 2 Findings from Workshops: Practical Partnerships Capacity Building Illicit Trade IP Crime Training

12 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Practical Partnerships Regional projects which recognize police work, setting objectives for the IPR programs and establishing performance indicator. Establish ministerial level networks which maintain dialogue with industry, identify single point of contact for the industry, public and police on IPR issues. Identify twining projects, sister city partners. Targeted awareness raising campaigns / cooperation between public and private sector.

13 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Practical Partnerships (con t) Sustainability. Continuing support from private sector to law enforcement to influence policy makers. Enhanced two way communication between public and private sector. Continue the discussion on shippers responsibility. Payment of storage and destruction. Explore the possibilities of cooperate with universities and law schools to educate stakeholders on IP issues. Make sure that agreements etc. between the stakeholders also reaches the local level.

14 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Capacity Building Rights Holder engagement Legislation or regulation that provides meaningful penalties Good exchange of information (intelligence & best practices) Dedicated Government Resources to IP Enforcement Coordination between Government Agencies & Rights Holders Learn from both good & bad experiences Good Communication Reach a balance between Rights Holders Needs (i.e., enforcement action) & Governments' abilities (i.e., budget & personnel)

15 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Scale and Characteristics Trend: Legal production down/illicit trade up Illicit tobacco estimated to be 6-10% of global trade South African Government loss R2.9 billion; tobacco industry R540 million Clear involvement of transnational organized criminals Opportunities for intervention vary according to industry sector (diamonds at source; tobacco at source and supply chain) Illicit trading prevalent in all regions Corruption a significant factor in all regions

16 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Integrated intervention strategies Same criminals; IP crime strategies work for illicit trade Dedicated investigation/project teams Comprehensive integrated multidisciplinary approach according to local jurisdiction/practice Whole range of civil/criminal investigation techniques required Embrace technology e.g. Tobacco use of digital tax stamps (ECTS); precious metals integrate observations and data

17 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Illicit Trade Maximizing opportunities: diverse criminal jurisdictions Institutional and government corruption requires innovative approach Multi-jurisdictional cooperation and coordination Exploit opportunities presented by global interconnectivity Initiate proceedings for related and other offences in another jurisdictions Take out component parts of conspiracy at every opportunity Use INTERPOL international arrest warrants (Red Notices)

18 Operational Round Table 2 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: IP Crime Training Coordination of all IPR training. Database for all IPR training material. Training needs analysis / flexible approach.

19 2011 International Law Enforcement IP Crime Conference Operational Round Table 3 Transforming Regional Success into Global Action

20 Operational Round Table 3 Findings from Workshops: Proactive Integrated Analysis Managing Global Operations Shared Collective Expertise Protecting Trade Secrets

21 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Proactive Integrated Analysis Public/Private partnership to develop data sharing models that are more reciprocal. Private sector can and should influence policy leaders in countries to give law enforcement capacity to enforce against IP theft. Conflicting privacy and data protection laws need to be addressed to better allow sharing of information, and interpreted to allow for proactive sharing of intelligence. Best practices should be shared and adopted

22 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Managing Global Operations Set objectives / aim high Communication / clear Local expertise Understanding legal issues in operating countries / involve legal experts from those countries Understand cultural aspect globally / corruption issues Working within legal frameworks of countries Proper use of L.O. officers in countries..interpol, Europol, etc Importance of measurement of success / feedback for future operations

23 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Shared Collective Expertise Better cooperation between the different agencies (Ex. Police and Customs) Better cooperation between law enforcement and right holders Better IP training for law enforcement Corruption in some regions makes IP investigations difficult Right holders need to register their IP in some countries, so that law enforcement can prosecute Right holders need to nominate a representative/agent in developing countries, so that they do not have to travel to these countries every time a new investigation is initiated A centralized data base with all concluded IP prosecutions, that right holders and law enforcement from different regions can access Better sharing of information between different regions Improve publicity/media coverage for IP investigations/prosecutions

24 Operational Round Table 3 discuss with group and identify top 2 or 3 (from each workshop) with *. Workshop: Protecting Trade Secrets Trade Secret definition Brand Holders must take reasonable measures to protect their trade secrets Brandholdermeasures NDA is not the only means of protection, sensitivity of materials Investigative Alternatives to Theft of Trade Secret Crime always another offense to pursue Who do you pursue the target or the recipient Civil vs. Criminal processes of discovery Not having a TOTS law on the books can preclude extradition Educating industry and IP crime units in TOTS investigative process and impact, tangential crimes Preparing investigative units with tools, expectations and concerns when working with industry

25 2011 International Law Enforcement IP Crime Conference Plenary Session 17 Round Table Feedback Session Transforming Regional Success into Global Action

26 Operational Round Table 1 Findings from Workshops: Customs and Police Combating Illicit Internet Activities Integrated Prosecution Strategies E-Commerce

27 Operational Round Table 1 Conclusions: Customs and Police Help develop the commitment and engagement of stakeholders build up of training and advance information is essential. -Ayudaa los propietariosde lasmarcasen la capacitacióny el intercambio de información. Engage in the legislative process to make laws fit for purpose -Avanzaren el procesolegislativoparaquese haganleyes más eficaces.

28 Operational Round Table 1 Conclusions: Combating Illicit Internet Activities Greater cooperation and information sharing among all stakeholders -Aumento de la cooperación y del intercambio de información con los propietariosde lasmarcasy proveedoresde servicios. Greater focus on domain name take down and access blocking -Dar importanciaal nombrede dominioy bloqueode páginas web ilícitas.

29 Operational Round Table 1 Conclusions: Integrated Prosecution Strategies Training and Capacity Building / Share experiences / Points of contact - Formación y capacidad de desarrollo/ compartir experiencias/ puntos de contacto Long term law enforcement relationship to promote cooperation and timeliness - Relaciones entre las agencias para promover la cooperación

30 Operational Round Table 1 Conclusions: E-Commerce Brand/rightsholders and Goverments should engage e-comerce companies, such as ISPs and payment processors. - Propietarios de las marcas, agencias y el Gobierno deberían impulsarel trabajoconjunto. There is significant risk of counterfeits entering the Government supply chain - Existe un riesgo importante de que las falsificaciones entren en las líneas de contratación del Gobierno.

31 Conclusions: Operational Round Table 1 Must use complimentary laws to supplement cases ej: fraud and conspiracy laws. - Fomentar el uso de leyes complementarias como por ejemplo el fraude y la revelación de secretos.

32 Operational Round Table 2 Findings from Workshops: Practical Partnerships Capacity Building Illicit Trade IP Crime Training

33 Operational Round Table 2 Workshop: Practical Partnerships Regional projects which recognize police work, setting objectives for the IPR programs and establishing performance indicator. Targeted awareness raising campaigns / cooperation between public and private sector. Continuing support from private sector to law enforcement to influence policy makers. con t

34 Operational Round Table 2 Workshop: Practical Partnerships Continue the discussion on shippers responsibility regarding shippers liability in knowing your customer Liability for storage and destruction costs

35 Operational Round Table 2 Workshop: Capacity Building Good exchange of information (intelligence & best practices) Dedicated Government Resources to IP Enforcement Good Communication including with media

36 Operational Round Table 2 Workshop: Illicit Trade Same criminals; IP crime strategies work for illicit trade / Take out component parts of conspiracy at every opportunity Dedicated investigation/project teams Exploit opportunities presented by global interconnectivity

37 Operational Round Table 2 Workshop: IP Crime Training Coordination of all IPR training. Referral Database for all IPR training material. Training needs analysis / flexible approach.

38 Operational Round Table 3 Findings from Workshops: Proactive Integrated Analysis Managing Global Operations Shared Collective Expertise Protecting Trade Secrets

39 Operational Round Table 3 Workshop: Proactive Integrated Analysis Private sector can and should influence policy leaders in countries to give law enforcement capacity to enforce against IP theft. Conflicting privacy and data protection laws need to be addressed to better allow sharing of information, and interpreted to allow for proactive sharing of intelligence. Best practices should be shared and adopted.

40 Operational Round Table 3 Workshop: Managing Global Operations Communication / Provide all relevant information to concerned parties. Understanding legal issues in operating countries / involve legal experts from those countries. Understand cultural aspect globally.

41 Operational Round Table 3 Workshop: Shared Collective Expertise Better IP training for law enforcement. Corruption in some regions makes IP investigations difficult. Improve publicity/media coverage for IP investigations/prosecutions.

42 Operational Round Table 3 Workshop: Protecting Trade Secrets Brand Holders must take reasonable measures to protect their trade secrets. Brandholdermeasures NDA is not the only means of protection, sensitivity of materials. Investigative Alternatives to Theft of Trade Secret Crime always another offense to pursue. Preparing investigative units with tools, expectations and concerns when working with industry.

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Scope of the Member State mechanism

Scope of the Member State mechanism FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

EXPERT GROUP MEETING ON CYBERCRIME

EXPERT GROUP MEETING ON CYBERCRIME EXPERT GROUP MEETING ON CYBERCRIME VIENNA, 17-21 JANUARY 2011 Presentation by Ayo Olukanni Charge D affaires ai Embassy/Permanent Mission of Nigeria, Vienna Nigeria and the fight against Cybercrime Establishment

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Policy recommendations. Technology fraud and online exploitation

Policy recommendations. Technology fraud and online exploitation Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

International IP Crime Investigators College An INTERPOL Initiative in Cooperation with UL IIPCIC. Course Catalog

International IP Crime Investigators College An INTERPOL Initiative in Cooperation with UL IIPCIC. Course Catalog International IP Crime Investigators College An INTERPOL Initiative in Cooperation with UL IIPCIC Course Catalog 2019 1 Welcome to IIPCIC The International Intellectual Property (IP) Crime Investigators

More information

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through

More information

UNODC. International Cooperation and Assistance in Cybercrime Matters

UNODC. International Cooperation and Assistance in Cybercrime Matters UNODC International Cooperation and Assistance in Cybercrime Matters UNODC Approach To integrate cybercrime and electronic evidence related issues in broader UNODC mandates of Supporting Member States

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

International Cooperation in Cybercrime Investigations

International Cooperation in Cybercrime Investigations International Cooperation in Cybercrime Investigations Joel Schwarz Computer Crime & Intellectual Property Section Criminal Division, US Department of Justice Joel.schwarz@usdoj.gov Criminal Investigations

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form CROATIA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

QBPC s Mission and Objectives

QBPC s Mission and Objectives QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the

More information

13268/16 EB/dk 1 DGD 1C

13268/16 EB/dk 1 DGD 1C Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

The Global Fund to Prevent Violence against Children

The Global Fund to Prevent Violence against Children The Global Fund to Prevent Violence against Children There are children out there, vulnerable children, who are counting on us to get this right. Every single child is precious. Every child deserves a

More information

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012 CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,

More information

Global Wildlife Cybercrime Action Plan1

Global Wildlife Cybercrime Action Plan1 Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

Child Online Protection in Child Pornography Namibia

Child Online Protection in Child Pornography Namibia Child Online Protection in Child Pornography Namibia Regulation in Namibia UNICEF Namibia Presented by: Jolanda van Westering Outline Introduction Typology of online abuse and exploitation Scale and response

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

Virtual Currencies and The Commonwealth. 1 June 2016

Virtual Currencies and The Commonwealth. 1 June 2016 1 Virtual Currencies and The Commonwealth 1 June 2016 The Commonwealth Cybercrime Initiative Mission CCI aims to provide coherent, comprehensive and sustainable assistance to member states to build capacity

More information

Working Together to Combat Global Transnational Organized Counterfeiting

Working Together to Combat Global Transnational Organized Counterfeiting Working Together to Combat Global Transnational Organized Counterfeiting John Newton IPR Programme Manager INTERPOL Crossing Borders and Sectors: Exploring Robust Anti-Counterfeiting Solutions ANSI Conference

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Assistant Secretary-General Michèle Coninsx Executive Director, CTED High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

ASEAN s Cyber Confidence Building Measures

ASEAN s Cyber Confidence Building Measures ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI

More information

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

GLOBAL CYBERSECURITY INDEX 2016

GLOBAL CYBERSECURITY INDEX 2016 GLOBAL CYBERSECURITY INDEX 2016 Objective The Global Cybersecurity Index (GCI) measures each nation state s level of cybersecurity commitment in five main areas: Legal Technical Organizational Capacity

More information

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach INTERPOL s Role and Efforts in Combating Cybercrime Dr. Madan M. Oberoi Director Cyber Innovation and Outreach What does INTERPOL do? VISION Connecting police for a safer world MISSION Preventing and

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber

More information

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare. Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

CONCLUSIONS AND RECOMMENDATIONS

CONCLUSIONS AND RECOMMENDATIONS Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL Mr Olusola Oguntunde EU OFFICE IPSG LYON RB SAN SALVADOR RB BUENOS AIRES UN OFFICE RB ABIDJAN RB YAOUNDE AU

More information

Illicit Goods and Global Health Programme

Illicit Goods and Global Health Programme Illicit Goods and Global Health Programme CEOC Congress, 29 May 2017, Lyon INTERPOL - A WORLDWIDE ORGANIZATION PRESENCE WORLDWIDE GOVERNANCE COMMAND AND COORDINATION CENTER NOTICES INTERPOL s CRIMINAL

More information

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal Foundation and Enforcement: Promoting Cybersecurity Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer

More information

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism ECAD 24 th Mayors Conference Kaunas, 12 June 2017 OSCE and Transnational

More information

ESSA Q INTEGRITY REPORT

ESSA Q INTEGRITY REPORT ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,

More information

Cybercrime and e-evidence: challenges and solutions.

Cybercrime and e-evidence: challenges and solutions. Cybercrime@Octopus Ministry of Communications Workshop on Cybercrime and Cybersecurity for selected Members of Parliament (KAIPTC, Accra, Ghana, 25 October 2018) Cybercrime and e-evidence: challenges and

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

The role of municipal government in preventing crime and building community safety

The role of municipal government in preventing crime and building community safety NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country

More information

12002/1/18 REV 1 PhL/at 1 ECOMP. 3 B

12002/1/18 REV 1 PhL/at 1 ECOMP. 3 B Council of the European Union Brussels, 24 September 2018 (OR. en) 12002/1/18 REV 1 UD 192 PI 120 NOTE From: To: General Secretariat of the Council Delegations No. prev. doc.: ST 10644/2/18 REV 2 Subject:

More information

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November

More information

8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement

8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement 8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement 1. As Ministers responsible for transportation in the APEC region, we met in Tokyo, Japan, on September

More information

Sussex Police Business Crime Strategy

Sussex Police Business Crime Strategy Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

UNODC/CCPCJ/EG.4/2017/CRP.1

UNODC/CCPCJ/EG.4/2017/CRP.1 3 April 2017 English only Expert Group to Conduct a Comprehensive Study on Cybercrime Vienna, 10-13 April 2017 Information on the implementation of Crime Commission resolution 22/8 Note by the Secretariat

More information

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA NATIONAL STRATEGY IN MANAGEMENT OF CYBER SECURITY Comprehensive law and policies Effective monitoring tools Awareness

More information

Project III Public/private cooperation

Project III Public/private cooperation Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

This report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ).

This report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ). REPORT TO THE 38 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS - MOROCCO, OCTOBER 2016 ON THE 5 th ANNUAL INTERNATIONAL ENFORCEMENT COOPERATION MEETING HELD IN MANCHESTER, UK,

More information

Combating Pharmacrime AGENDA

Combating Pharmacrime AGENDA Combating Pharmacrime A Knowledge Building Conference on Counterfeit Medicines 26-28 A Co-hosted event by EUROPOL & EU Observatory on IP Infringements (PSI) AGENDA T he specific purpose of the event is

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1 Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance,

More information

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

CONNECT ARAB STATES SUMMIT

CONNECT ARAB STATES SUMMIT CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with

More information

PROJECT RESULTS Summary

PROJECT RESULTS Summary Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised

More information

Indonesia Cyber Security Market

Indonesia Cyber Security Market Indonesia Cyber Security Market EXECUTIVE SUMMARY: Indonesia offers abundant demand for cyber security exports. Defense spending is modest, totaling $8 billion, but is expected to increase. Increase in

More information

The WEEE chain of events. Key findings and recommendations Legal Framework. Vittoria Luda di Cortemiglia UNICRI

The WEEE chain of events. Key findings and recommendations Legal Framework. Vittoria Luda di Cortemiglia UNICRI The WEEE chain of events Key findings and recommendations Legal Framework Vittoria Luda di Cortemiglia UNICRI EU Forum of Judges for the Environment Bolzano, 30 October 2015 The CWIT consortium Two year

More information

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime

More information

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Council of the European Union Brussels, 23 November 2016 (OR. en)

Council of the European Union Brussels, 23 November 2016 (OR. en) Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017

WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 2 WCO - CONTEXT 1952 - Customs Cooperation Council was established & in 1994 - Council adopted working name World

More information