THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Similar documents
UNODC tackling cybercrime in support of a safe and secure AP-IS

ASEAN s Cyber Confidence Building Measures

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

PROJECT RESULTS Summary

Thailand Initiatives and Challenges in Cyber Terrorism

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

10025/16 MP/mj 1 DG D 2B

Donor Countries Security. Date

15412/16 RR/dk 1 DGD 1C

UNODC. International Cooperation and Assistance in Cybercrime Matters

COUNTER-TERRORISM. Future-oriented policing projects

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

CYBERCRIME RESPONDERS TRAININGS

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

Key United Nations counter-terrorism references & architecture: Impact on customs.

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Guiding principles on the Global Alliance against child sexual abuse online

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) Washington, D.C. 24 February 2014 Original: Spanish

EXPERT GROUP MEETING ON CYBERCRIME

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

The APEC Model. Global Partnership through Regional Initiatives

2016 APEC COUNTER-TERRORISM ACTION PLAN

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

Virtual Currencies and The Commonwealth. 1 June 2016

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

Promoting Global Cybersecurity

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Garry Mukelabai Communications Authority Zambia

FBI Role in Overseas Investigations

10007/16 MP/mj 1 DG D 2B

Max Security Solutions

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT)

Republic of Indonesia. ARF Defense Officials Dialogue Seoul, April 2009

Council of the European Union Brussels, 23 November 2016 (OR. en)

Scope of the Member State mechanism

2016 APEC COUNTER-TERRORISM ACTION PLAN

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT

Inter-American Port Security Cooperation Plan

Department of Homeland Security

Detect Fraud & Financial Crime

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Issue I. Airport Communication Project

Canada s Weapons Threat Reduction Program

Counter-Terrorism Working Group Proposed Workplan for 2017

A Framework for Managing Crime and Fraud

ESSA Q INTEGRITY REPORT

How AlienVault ICS SIEM Supports Compliance with CFATS

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

THE STRATEGIC POLICING REQUIREMENT. July 2012

Marina Mishar Atomic Energy Licensing Board Malaysia

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

ITU Model Cybercrime Law: Project Overview

Council of the European Union Brussels, 28 February 2019 (OR. en)

China and International Governance of Cybercrime

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

PROVIDING INVESTIGATIVE SOLUTIONS

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Present Situation of Cyber Terrorism in China and Its Legal Countermeasures

UNODC/CCPCJ/EG.4/2017/CRP.1

OPERATIONALIZATION OF COORDINATED BORDER MANAGEMENT. Presenter: Joel Osinta. Presenter Title: Head of Joint Operations Centers. (JOCs) in Kenya.

PIPELINE SECURITY An Overview of TSA Programs

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

Project III Public/private cooperation

INTERPOL CBRNE PROGRAMME. Reducing Nuclear Threats: A Comprehensive Approach

Overview on the Project achievements

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Council of the European Union Brussels, 14 July 2017 (OR. en)

Thirteenth Symposium on the ICAO Traveller Identification Programme

PIONEER TRAINING INSTITUTE

International Criminal Police Organisation INTERPOL s CBRNE Terrorism Prevention Programme

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

MINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA

INTRODUCTION. A main question for ISS: why are there so few prosecutions? Copyright Institute for Security Studies 20 November

COMPUTER FORENSICS (CFRS)

IMPACT OF DRUGS AND SECURITY IN THE CARIBBEAN

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate

ITU Regional Cybersecurity Forum for Asia-Pacific

DECISION 09/2016/GB OF THE GOVERNING BOARD OF THE EUROPEAN POLICE COLLEGE ADOPTING THE LIST OF ACTIVITIES 2017

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Report on the activities of the Independent Integrity Unit, November 2016 to September 2017

The Office of Infrastructure Protection

Police Technical Approach to Cyber Threats

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

European Commissions' role in Managing financial development instruments

Transcription:

ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) Document No. 4 Agenda 4

ASEAN Regional Forum Intersessional Support Group Meeting on Confidence Building Measures (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER- TERRORISM (SEARCCT) Voluntary Briefing by Malaysia The Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) in Malaysia was officially launched on 1 st July 2003 by the Honourable Datuk Seri Syed Hamid Albar, Minister of Foreign Affairs, Malaysia. The activities of SEARCCT would primarily focus on five key areas i.e. Pre- Terrorism Event Situation-preventive in nature e.g. Anti-Money Laundering and Combating Terrorist Financing, Train the Trainers Concept - Continuous training to upgrade the skill of the Enforcement Agencies in countering terrorism, Public Awareness/Education Programme related to terrorism and counter - terrorism through training courses/seminar/workshop/conference, Border Control /Security and its Management and Post-Terrorism Event Situation and its Management. The Centre has circulated the proposed subjects that would be covered (Appendix 1) to the ASEAN countries and other interested countries. Comments and input, if any on the activities to be implemented by the Centre would be welcomed.

Appendix 1 PROPOSED SUBJECTS FOR TRAINING COURSES / SEMINAR / WORKSHOP / CONFERENCE BY SEARCCT 1. Causes and Origins of Terrorism 2. Modus Operand! of Terrorist Groups 3. Combating Terrorism 4. Cyber Terrorism 5. Anti-Money Laundering & Combating Terrorist Financing i) Counter Financing of Terrorism (CFT) Guidance to Financial Intelligence Unit (FIU) on CFT Guidance to Financial Sector on CFT Technical assistance needed in the area of formulation and implementation of combating terrorist financing strategy Training needed for the financial sector in relation to CFT in general. ii) Financial Intelligence Unit Analyst case training Policy development Technical assistance required in training of the FIU staff in financial and suspicious transaction report (STR) analysis and Technical assistance required in training of the FIU staff in policy development. iii) Financial Sector Training of Insurance Supervisors Training of Securities Industry Supervisors / regulators Training of Bankers Training of Insurance Market Participants Development of E-Learning Software Training needed in detecting suspicious transactions particularly in relation to terrorist financing & Assistance needed in the development of an E-Learning training software for the financial institutions.

iv) Law Enforcement Training of Prosecutors, Judges Asset Forfeiture - Prosecutions Asset Forfeiture - Financial Investigators; Asset Management Financial Investigative Techniques Law Enforcement Officials Mutual Assistance Proceedings Technical -assistance needed in the areas specific to Investigation Techniques - Training for Prosecutors and Judges. Assistance are needed in the following areas: Investigative Methodologies Planning Investigations Evidence Gathering Covert Investigations Forensic Accounting Financial System Awareness Asset Tracing Confiscated Asset Management Technical assistance needed in implementing mutual assistance arrangements. v) International Cooperation Asset Sharing fc 6. Training Courses on Identification on Chemical Substances that could be used as Explosives 7. Criminalization of Terrorist Acts 8. Harmonization of Regional Anti-Terrorism Laws 9. International Legal Cooperation In Combating Terrorism Through Extradition and Mutual Assistance In Criminal Matters 10. Public Awareness Campaign / Education Programme related to terrorism and counter-terrorism especially to Public, Banks, Insurance Companies, Authorities in charge of Water Supply, Electricity, Fuels Installations. Aviation & Ports (Entry and Exit Points), Hotel Industry, Shopping Complexes, Commercial Buildings, Convention Centres etc. so * *

that they be more knowledgable and vigilance on terrorism related subjects. 11. Aviation Security Course 12. Sea-Surveillance Technique - ASEAN Workshop on "Sea Piracy and Armed Robbery at Sea" 13. Security Intelligence Training in security support for major public events Training in data analysis techniques (to help identify unusual patterns in large sets of data, such as telephone traffic or computer logs). This training might be useful for information gathering and collection of database of SEARCCT as to updating the Database related to terrorism and counter-terrorism i.e. profiling of persons, their affiliation, funding, incidences, operations etc. 14. Border Control / Security, Immigration Matters and Its Management - Border Integrity i) It involves training in document fraud examination, detection and examination of fraudulent documents; ii) Professional standards and conduct training for frontline immigration personnel; iii) Advance Passenger Information (API) system program ; 1-2 day program introducing API and describing the benefits of introducing unique national API system; iv) Document Security and Biometric Measures; v) Enforcement of Immigration Laws & Enforcement Against Illegal Smuggling (peoples, goods etc.) Activities Related to Terrorism. 15. Disaster Scene Management i) Disaster Victim Identification (DVI) training, Identification and Handling of remains and Forensic Investigations / Considerations by making use of crime scene to investigate e.g. on the people killed in the recent Bali bombing; ii) Management of Chemical, Biological & Nuclear (CBN) attacks with the involvement of medical team, police, military, navy, fire brigade, media etc.;

iii) iv) Bio-Hazard and Chemical - Hazard Management; Radioactive Materials Management; v) Post-Blast Investigation. Malaysian Delegation to the ARF ISO on CBMs Beijing 20 November 2003