Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons

Size: px
Start display at page:

Download "Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons"

Transcription

1 [Draft concept note] Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons United Nations Headquarters, New York, Wednesday, 17 May 2017 I. Introduction 1. Security Council resolution 1373 (2001) requires States to refrain from providing any form of support to entities or persons involved in terrorist acts, including by eliminating the supply of weapons to terrorists. However, because of the constantly evolving nature of the operational terrorist environment, denying terrorists access to weapons is a complex and multifaceted challenge. First, illicit trafficking in weapons is often associated with, and facilitated by, other forms of organized crime, including terrorism. Second, weapons may fall into the hands of terrorists because of poorly secured stockpiles and weak border controls (especially in post-conflict countries such as Libya). The activities of foreign terrorist fighters (FTFs) further increase the probability that weapons and ammunition will cross borders. Third, because their production takes place outside Government control, Improvised Explosive Devices (IEDs) are difficult to control. Attacks carried out with IEDs continue to increase and continue to kill thousands every year. Fourth, weapons including their parts, components and ammunition are increasingly accessible online and traded on a variety of platforms, including Darknet marketplaces. Lastly, the diversion of weaponry is a significant problem in many parts of the world. Access to diverted weapons and ammunition considerably enhances the military capacity of terrorist and other armed groups. Diversion may occur as a result of uncontrolled transfer, unauthorized retransfer, theft from poorly secured stockpiles, handouts to armed groups, or barter involving natural resources. It is therefore essential to strengthen Member States capacities to prevent terrorists from accessing and using weapons. 2. The Council has repeatedly stressed the importance of preventing terrorists access to weapons, including in its resolution 1373 (2001), in which it decides that States shall eliminate the supply of weapons to terrorists, and in its resolution 2220 (2015), in which it encourages the Counter-Terrorism Committee and the Counter-Terrorism Committee Executive Directorate (CTED), within their existing mandates and in close cooperation with all relevant United Nations counter-terrorism bodies, to focus on Member States capacities and needs to address the threats posed by accessibility of weapons used by terrorists as well as to counter the supply and trafficking of weapons to terrorists and requests CTED to report within the existing reporting framework to the Counter-Terrorism Committee on gaps in such capacities and to provide concrete plans to facilitate technical assistance for strengthening Member States capacities and to provide recommendations for actions to enhance response to such threats. In its resolution 2195 (2014), the Council stresses the importance of addressing the link between cross-border crime, including trafficking of arms, and terrorism, and the role of CTED in assessing gaps and facilitating technical assistance. 3. The United Nations Office for Disarmament Affairs (UNODA) promotes arms regulation and control and supports national efforts to improve the management and security of weapons and ammunition stockpiles. In line with resolution 2220 (2015), UNODA plays a leading role in support of the implementation of the Programme of Action on small arms and 1

2 light weapons, which are the weapons of choice in contemporary conflicts. Further, UNODA, through its Regional Centre in Africa (UNREC), in cooperation with the Counter-Terrorism Centre and within the framework of the United Nations Counter-Terrorism Implementation Task Force (CTITF), has been implementing a project for capacity building of States in the Lake Chad Basin to address the illicit proliferation and diversion of small arms, light weapons and their ammunition to non-state armed groups, including terrorist groups. The project provided support to Cameroon, Chad, Niger and Nigeria in the coordination of crossborder controls of small arms and light weapons in the sub-region in practical disarmament and arms control, in particular officers part of the Multinational Joint Task Force (MNJTF) set up to address the threat of Boko Haram in the Lake Chad Basin. 4. In its resolution 2322 (2016), the Council expresses concern that terrorists benefit from transnational organized crime in some regions, including from the trafficking of arms. It calls on States to continue information-sharing, through appropriate channels and arrangements, and consistent with international and domestic law, on individuals and entities implicated in terrorist activities, in particular their supply of weapons and sources of material support. Security Council resolution 2341 (2017), on the protection of critical infrastructure, including military surplus and storage areas for weapons and explosives, also recognizes that protection efforts entail multiple streams of efforts, such as planning; public information and warning; operational coordination; intelligence and information sharing; interdiction and disruption; screening, search and detection; access control; and identity verification. 5. In its efforts to assist Member States to prevent terrorists from acquiring weapons, CTED has engaged in a number of initiatives together with its partners, including the development of the International Criminal Police Organization (INTERPOL) Illicit Arms Records and Tracing Management System (iarms); the development of the International Small Arms Control Standards (ISACS) within the Coordinating Action on Small Arms (CASA) framework; the development of the International Ammunition Technical Guidelines (IATG) and the corresponding knowledge-management platform, UN SaferGuard; the development of the Central Africa Counter-Terrorism and Small Arms and Light Weapons Strategy, with Member States and the United Nations Counter-Terrorism Centre (UNCCT); ongoing dialogue with the United Nations Mine Action Service (UNMAS); and cooperation with international and regional organizations (e.g., African Centre for Studies and Research on Terrorism (ACSRT), Group of Five of the Sahel (G5 Sahel) and Economic Community of Central African States (ECCAS)) in countering the supply and trafficking of weapons to terrorists. In addition to including these elements in its country assessment visits, as required by the relevant Council resolutions, CTED is also currently updating the Committee s Technical Guide to the implementation of the relevant Council resolutions. CTED also chairs the CTITF Working Group on Border Management and Law Enforcement Relating to Counter-Terrorism, which focuses on system-wide efforts to promote the related objectives of the United Nations Global Counter-Terrorism Strategy and the relevant Council resolutions. 6. In its Global Counter-Terrorism Strategy, INTERPOL notes that several recent active-shooter terrorist attacks involved the use of Small Arms and Light Weapons (SALW) that originated in former and/or current conflict zones and were illicitly trafficked across borders. Terrorists have increasingly turned to improvised explosive devices (IEDs) to attack innocent civilians and damage critical infrastructure. INTERPOL assists Member States to identify, track and intercept illicitly trafficked weapons and other materials used by terrorists. INTERPOL will also expand access to iarms in regions targeted by its Strategy and promote the system s full interconnectivity and compatibility with national and/or 2

3 regional screening systems. This will facilitate allow real-time sharing of firearms intelligence through national and regional databases. INTERPOL also aims to establish further partnerships with the private sector to connect iarms to manufacturers databases. 7. CTED and UNMAS have strengthened their dialogue on, inter alia, the need to improve mitigation measures to prevent terrorists and terrorist organizations from obtaining, handling, storing, using or seeking access to all types of explosives, whether military, civilian or improvised, as well as to raw materials and components that can be used to manufacture IEDs or unconventional weapons. UNMAS is the United Nations coordinator for the mitigation of explosive hazards (mines, explosive remnants of war (ERW), cluster munitions, and improvised explosive devices). It provides technical and policy advice and expertise to national authorities as well as other United Nations entities to promote effective mitigation responses and to raise awareness. 8. The report of the Secretary-General on countering the threat posed by improvised explosive devices (A/71/187) notes the marked increase in the unlawful use of IEDs, particularly by non-state armed groups and rogue individuals. Such attacks deliberately target concentrations of civilians to achieve maximum lethality, terror and societal disruption. They currently occur globally at a rate of hundreds per month. The report recognizes that in order effectively to address the issue of IEDs at the national level, it is essential to have effective legislation, regulation and procedures in place. Close coordination among Government departments and entities involved in addressing the issue of IEDs is also important. The report notes the need to prevent commercially available precursor materials and military munitions stockpiles from being utilized in the development of IEDs. Internationally, coordination and information-sharing by Member States, international and regional organizations, and the commercial sector should be strengthened. The Security Council has also encouraged States to share information, establish partnerships, and develop national strategies and capabilities to counter IEDs. This topic is addressed within the framework of the Committee s assessment visits, including the visits to Afghanistan and Iraq. 9. The United Nations and other international organizations play an important role in assisting States to counter the growing threat posed by IEDs. UNODA has established an information hub on IEDs, pursuant to the request of the General Assembly in resolution 71/72. In an effort to secure global supply chains and enhance public safety, WCO partnered with INTERPOL and the United Nations Office on Drugs and Crime (UNODC) to launch Programme Global Shield, which aims to prevent the smuggling and illicit diversion of precursor chemicals that could be used to build IEDs. The programme enables customs administrations of more than 90 States to share information on 14 precursor chemicals used to construct IEDs. 10. The Internet is increasingly exploited for terrorist purposes, including through the use of online marketplaces to sell and acquire weapons and their components. CTED has strengthened its efforts in this field, including within the framework of a project implemented jointly with the Swiss non-governmental organization ICT4Peace, with the support of information and communications technology (ICT) industry leaders, and a project entitled, Tech Against Terrorism, which seeks to bring together public and private partners in the development of a normative self-regulation framework that will guide responses to terrorist use of the Internet in compliance with international law standards. CTED will continue to assist States to enhance measures to eliminate online access to weapons by terrorists. 3

4 11. In its resolution 2220 (2015), the Security Council encourages the Committee and CTED, in close cooperation with all relevant United Nations counter-terrorism bodies, to focus on Member States capacities and needs to address the threats posed by accessibility of weapons to terrorists and requests CTED to report to the Committee on gaps in such capacities; provide concrete plans to facilitate technical assistance for strengthening Member States capacities; and provide recommendations for actions to enhance responses to such threats. In this regard, the proposed open briefing would (i) assess the evolution of the threat posed by terrorists acquisition of weapons and discuss ways to strengthen prevention of such illegal activities; (ii) update Member States on the most significant gaps and challenges in protecting military surplus, implementing proper storage, and accountability; update Member States on the increasing use of IEDs and associated components (iii) highlight new risks and trends deriving from international arms trafficking through the Internet and across borders, including the consequences of terrorist and criminal access to, and use of, deactivated and reactivated weapons acquired from collectors, including online; highlight as well the need to implement proper international arms control standards and to fully utilize the related tools and resources developed by the United Nations, INTERPOL and the World Customs Organization (WCO). II. Objectives and topics 12. The open briefing would enable the Committee to analyse and discuss present and emerging threats, trends and developments relating to preventing terrorists from acquiring weapons, in accordance with resolutions 1373 (2001), 1624 (2005), 2178 (2014), 2195 (2014), 2220 (2015), 2322 (2016) and 2341 (2017), as well as to identify gaps in Member States efforts to implement measures to eliminate the supply of weapons to terrorists. The Committee could consider identifying priority areas of work in this area, with respect in particular to the implementation of the relevant Security Council resolutions. 13. The presentations and discussions would focus on three topics: 1. Addressing the evolution of the threat posed by terrorists acquisition of weapons and how to strengthen prevention of such illegal activities; 2. Updating Member States on the most significant gaps and challenges in protecting military surplus, implementing proper storage, and accountability, as well as on the increasing use of IEDs and associated components 3. Highlighting new risks and trends in international arms trafficking through the Internet and across borders (including the consequences of terrorist and criminal access to, and use of, deactivated and reactivated weapons acquired from collectors, including online), as well as the need to implement proper international arms control standards and use existing tools and resources. III. Format, date and venue 14. CTED proposes that a half-day open briefing be held at United Nations Headquarters, New York, on Wednesday, 17 May 2017, in Conference Room 4, from 3 p.m. to 6 p.m. The briefing would include a panel of experts representing relevant international organizations. It would consist of an opening session; three thematic sessions, focusing on the above topics; interactive discussion; and a closing session. The briefing would be open to the wider membership, as well as to other relevant United Nations entities and international and regional organizations. Each session would provide an opportunity for interactive discussion, 4

5 allowing Member States of different regions to share their experiences in preventing terrorists from acquiring weapons. (A draft agenda is attached.) IV. Outcome 15. The outcomes would include a Chair s summary of the presentations and discussions, to be posted on the Committee s website. 16. CTED will continue to work with Member States and relevant partners in stressing the need to refrain from providing any form of support to entities or persons involved in terrorist acts, including by eliminating the supply of weapons to terrorists, including via online channels, in accordance with resolution 1373 (2001) and other relevant resolutions, and will continue to report within the framework of its activities to the Security Council, in accordance with Council resolution 2220 (2015) and other relevant resolutions, acting within its existing mandates and in close cooperation with all relevant United Nations counterterrorism bodies, on States capacities and needs in addressing the threats posed by terrorist access to weapons and countering the supply and trafficking of such weapons to terrorists. 5

Key United Nations counter-terrorism references & architecture: Impact on customs.

Key United Nations counter-terrorism references & architecture: Impact on customs. Key United Nations counter-terrorism references & architecture: Impact on customs. Counter-Terrorism Committee Executive Directorate (CTED) United Nations Brussels, 2-4 October 2018 United Nations counter-terrorism

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Thirteenth Symposium on the ICAO Traveller Identification Programme

Thirteenth Symposium on the ICAO Traveller Identification Programme Thirteenth Symposium on the ICAO Traveller Identification Programme Counter-Terrorism Committee Executive Directorate (CTED) United Nations ICAO Headquarters, Montreal, 24-26 October 2017 Briefly about

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Assistant Secretary-General Michèle Coninsx Executive Director, CTED High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations

More information

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS February 2018 A HISTORY OF COOPERATION 1997: Cooperation agreement between INTERPOL and the UN Many decades of collaboration was formalized in an agreement

More information

Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism

Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Meeting of the United Nations Security Council Counter-Terrorism Committee Mr. Chairman, Excellencies,

More information

The Global Security Threat How are Customs responding

The Global Security Threat How are Customs responding The Global Security Threat How are Customs responding Ana Hinojosa Director-Compliance & Facilitation World Customs Organization Global Security Conference: Punta Cana Resolution 3 Years on Punta Cana

More information

ISACS AT: Template Lesson Plan

ISACS AT: Template Lesson Plan ISACS AT: Template Lesson Plan International Small Arms Control Standards Assessment Tool United Nations Institute for Disarmament Research (UNIDIR) 2015 1 ABOUT THIS PROJECT 1. BACKGROUND The International

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism ECAD 24 th Mayors Conference Kaunas, 12 June 2017 OSCE and Transnational

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation. Draft Agenda

Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation. Draft Agenda Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation Technical sessions of the Counter-Terrorism Committee Executive Directorate (CTED), in cooperation with the International

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security Counter-Terrorism Committee Executive Directorate (CTED) United Nations Montreal, 21 May

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)] United Nations A/RES/56/195 General Assembly Distr.: General 21 January 2002 Fifty-sixth session Agenda item 98 (b) Resolution adopted by the General Assembly [on the report of the Second Committee (A/56/561/Add.2)]

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

Canada s Weapons Threat Reduction Program

Canada s Weapons Threat Reduction Program Canada s Weapons Threat Reduction Program Chris Grout Project Leader Nuclear and Radiological Security Weapons Threat Reduction Program Division Global Affairs Canada April 23, 2018 Weapons Threat Reduction

More information

Scope of the Member State mechanism

Scope of the Member State mechanism FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction BACKGROUND PAPER Sub-Regional Platform on Disaster Risk Reduction Niamey, Niger 11-14 November 2013 1 BACKGROUND The ECOWAS Policy on Disaster Risk Reduction adopted by West African Heads of State and

More information

The APEC Model. Global Partnership through Regional Initiatives

The APEC Model. Global Partnership through Regional Initiatives The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Introduction This background note outlines, in a non-exhaustive manner,

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

Action Plan to enhance preparedness against CBRN security risks

Action Plan to enhance preparedness against CBRN security risks Action Plan to enhance preparedness against CBRN security risks 8 March 2018 Wiktor WOJTAS European Commission DG 2017 Counterterrorism Package - a number of measures to support Member States in fighting

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November

More information

Developments in the field of information and

Developments in the field of information and United Nations General Assembly Distr.: General 3 July 2001 English Original: English/Spanish A/56/164 Fifty-sixth session Item 81 of the preliminary list* Developments in the field of information and

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI

More information

Departamento de Asia y Pacífico

Departamento de Asia y Pacífico Departamento de Asia y Pacífico Shanghai Cooperation Organization Joint Communiqué of Meeting of the Council of the Heads of the Member States of the Shanghai Cooperation Organisation 2010-6-11 Tenth Meeting

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) Washington, D.C. 24 February 2014 Original: Spanish

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) Washington, D.C. 24 February 2014 Original: Spanish INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWENTY-FOURTH REGULAR SESSION OEA/Ser.L/X.2.14 February 20, 2014 CICTE/doc.5/14 Washington, D.C. 24 February 2014 Original: Spanish REPORT OF THE CHAIR

More information

The UN Register on Objects Launched into Outer Space TCBMs and Notification Procedures

The UN Register on Objects Launched into Outer Space TCBMs and Notification Procedures 5th Manfred Lachs Conference, Montreal The UN Register on Objects Launched into Outer Space TCBMs and Notification Procedures Niklas Hedman United Nations Office for Outer Space Affairs United Nations

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Current international space security (sustainability) activities and initiatives

Current international space security (sustainability) activities and initiatives Current international space security (sustainability) activities and initiatives Peter Martinez National Research Foundation/SAAO South Africa Outline Space infrastructure Space Security and Space Sustainability

More information

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)] United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Preparatory process of the second High-level United Nations Conference on South-South Cooperation

Preparatory process of the second High-level United Nations Conference on South-South Cooperation United Nations A/72/711 General Assembly Distr.: General 29 January 2018 Original: English Seventy-second session Agenda item 24 (b) Operational activities for development: South-South cooperation for

More information

Global Wildlife Cybercrime Action Plan1

Global Wildlife Cybercrime Action Plan1 Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS Dr. Katherine W. Getao, EBS ICT Secretary Ministry of ICT, Kenya CONTENT Historical Context Processes Successes Challenges

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)] United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.

More information

ESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9

ESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9 ESRIF & Working Group Innovation WG 9 Alois J. Sieber Chairman ESRIF WG # 9 Content of this presentation Background ESRIF Security a definition WG INNOVATION Structure Findings (examples) Challenges Evolution

More information

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)] United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main

More information

Counter-Terrorism Working Group Proposed Workplan for 2017

Counter-Terrorism Working Group Proposed Workplan for 2017 2017/SOM1/SCE-COW/002 Agenda Item: 7 Counter-Terrorism Working Group Proposed Workplan for 2017 Purpose: Consideration Submitted by: CTWG Chair Forum Doc. No.: 2017/SOM1/CTWG/004 SOM Steering Committee

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Internet Governance: Today and Tomorrow

Internet Governance: Today and Tomorrow Internet Governance: Today and Tomorrow Philip Smith Internet Society Board of Trustees APNIC 28 Beijing August 25, 2009 The Internet Society Founded in 1992 by Internet pioneers International non-profit

More information

CONCLUSIONS AND RECOMMENDATIONS

CONCLUSIONS AND RECOMMENDATIONS Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243), General appreciation of the issues of information security The

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017

WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 WORLD CUSTOMS ORGANIZATION (WCO) ENVIRONMENTAL PROGRAMME KNOWLEDGE ACADEMY 22 JUNE 2017 2 WCO - CONTEXT 1952 - Customs Cooperation Council was established & in 1994 - Council adopted working name World

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the The Organized and Serious Crime Programme (GPTOC) focuses on assisting states with the implementation of the core elements of the Organized Crime convention. This includes judicial and law enforcement

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting General Conference GC(60)/RES/10 Date: September 2016 General Distribution Original: English Sixtieth regular session Item 14 of the agenda (GC(60)/20) Nuclear Security Resolution adopted on 30 September

More information

Engaging space tools for development on Earth contribution of space technology and applications to the post-2015 Development Agenda

Engaging space tools for development on Earth contribution of space technology and applications to the post-2015 Development Agenda A/AC.105/2014/CRP.9 16 June 2014 English only Committee on the Peaceful Uses of Outer Space Fifty-seventh session Vienna, 11-20 June 2014 Item 13 of the provisional agenda * Use of space technology in

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)] United Nations A/RES/60/195 General Assembly Distr.: General 2 March 2006 Sixtieth session Agenda item 52 (c) Resolution adopted by the General Assembly [on the report of the Second Committee (A/60/488/Add.3)]

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Global Security Advisor

Global Security Advisor Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

THE PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 6-8 November 2006 Paris, France

THE PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 6-8 November 2006 Paris, France THE PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 6-8 November 2006 Paris, France «Promoting the building of a people-centred, development-oriented and inclusive information

More information

UNOOSA Supporting Member States in the Implementation of TCBMs in Outer Space Activities Niklas Hedman

UNOOSA Supporting Member States in the Implementation of TCBMs in Outer Space Activities Niklas Hedman 10th United Nations Workshop on Space Law 5-8 September, Vienna UNOOSA Supporting Member States in the Implementation of TCBMs in Outer Space Activities Niklas Hedman United Nations Office for Outer Space

More information

RESOLUTION 47 (Rev. Buenos Aires, 2017)

RESOLUTION 47 (Rev. Buenos Aires, 2017) Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing

More information

Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit

Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit We, members of the Eminent Persons Group established to advise the President of the, Lee Myung-bak, on the 2012 Seoul

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)] United Nations A/RES/65/141 General Assembly Distr.: General 2 February 2011 Sixty-fifth session Agenda item 17 Resolution adopted by the General Assembly [on the report of the Second Committee (A/65/433)]

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES)

Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES) Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES) DG Migration and Home Affairs Paolo Salieri Border Security and External Security Development of technologies, capabilities

More information