South-East Asia Region Capacity-Building Working Group (SEA WG)
|
|
- Rolf Ford
- 8 years ago
- Views:
Transcription
1 South-East Asia Region Capacity-Building Working Group (SEA WG) Third Meeting of the South-East Asia Capacity Building Working November 2013 Yogyakarta, Indonesia Summary The third meeting of the Global Counter-Terrorism Forum (GCTF) South-East Asia Capacity Building Working Group (SEA WG) was held on November 2013 in Yogyakarta, Indonesia. It brought together more than 70 policy makers and practitioners from 9 (nine) SEA countries, 15 GCTF and non-gctf member countries, and 4 (four) regional and international organisations, as well as leading experts from universities and think tanks, to share their insights, expertise and practical experiences on the theme for this meeting: Modern Counter-Terrorism Policing: Challenges and Responses. The meeting was opened by the Director-General (DG) for Multilateral Affairs, Ministry of Foreign Affairs of the Republic of Indonesia and the Australian Ambassador for Counter- Terrorism, in their capacity as the Co-Chairs of the GCTF SEA WG. On his opening remarks, the DG for Multilateral Affairs touched upon the new challenges in countering terrorism through the misuse of technology by groups of terrorists, and therefore the meeting aims to identify the new challenges and the steps to be taken to address those challenges. Furthermore, he also mentioned Indonesia s proposal to establish the new thematic working group as the mandate of the GCTF SEA WG will not be extended. Finally, he extended his appreciation for the support that has been rendered to Indonesia s proposal from GCTF members. Australia s Ambassador for Counter-Terrorism pointed out that strengthening legal frameworks and national institutions, developing counterterrorism policing responses, and engaging the community are effective ways to counter violent extremism. He went on to describe recent work of the GCTF, in particular the SEA WG, after the 2nd GCTF SEA WG Meeting in Manila, November The meeting examined a number of topics, including counterterrorism legal frameworks and policing structures; the impacts of online and social media on effective counterterrorism policing; police strategies for countering violent extremism; and police counterterrorism training and international cooperation.
2 - 2 - Session One National Counter-Terrorism Legal Frameworks and Policing Structures The purpose of session one was to share experiences on the impacts of CT legal frameworks, institutions, policing structures, governance, and operations. The session also explored the evolving terrorist threat in SEA, and in particular the role of small cells. Mr. Anacleto Rei A. Lacanilao from the Law Enforcement and Security Integration Office, Office of the Executive Secretary, Office of the President, Philippines, provided an overview of the Philippines legal and operational CT frameworks, notably the Human Security Act 2007 which criminalises acts of terrorism and provides a whole-of-government national CT framework. Mr. Lacanilao also discussed how the Philippines had made a number of developments in its CT-related capabilities, including the introduction of e-passports containing a biometric chip and attempts to prevent the proliferation of dual-use chemical goods to non-state actors. He noted that most current terrorist threats in the Philippines emanated from individuals and small groups, rather than from larger cross-national organisations, and said that the modus operandi of these actors could vary widely depending on factors such as local politics, local cultural practices, and local religious ideology. The fact that these individuals and groups were widely dispersed meant that they were harder to track, and consequently it was important to encourage whole-of-society engagement. Assistant Commissioner Neil Gaughan from the Australian Federal Police then spoke on the approaches of national institutions in coordinating CT responses. Focusing on the Australian context, Assistant Commissioner Gaughan said that the Australian Government had adopted a CT strategy based on a crisis management framework which involved preparedness, prevention, response, and recovery. He stressed that the key emphasis is placed on preventing terrorist attacks before they occur. He spoke of difficulties encountered by traditional law enforcement (LE) in dealing with the increasing exploitation of the Internet by violent extremists, increasing use of encryption on smart devices, and the emergence of social media platforms such as Facebook, Twitter and Foursquare. He noted that national legislation was often too rigid to enable proper enforcement in this space and international cooperation was vital in responding to these new challenges. The third speaker of the session was Dr. Petrus R. Golose, Director of Operations, National Counter-Terrorism Agency, Indonesia. Dr Golose focused on the evolving terrorist threat in SEA, including the role of small cells. He noted that the new generation of terrorists use the Internet for communication and self-radicalisation. He mentioned that in recent years there had been a number of shifts in the profile of terrorist groups and individuals within Indonesia. For example, the majority of targets in recent years have been local law enforcement institutions, domestic civilians, government officials and houses of worship. Furthermore, the standard terrorist profile has evolved to include the full socio-economic spectrum, including uneducated and lower-class individuals, along with educated (often highly-educated) and middle-class individuals. Terrorist groups have become smaller and less unified, but also more highly dispersed and mobile. The change of the approach of the new generation of terrorists creates more challenges for LE officials to control and to detect their movement. The challenges also encompass the dangers of recruitment and radicalisation in prisons that house convicted terrorists, and issues relating to the release of terrorist inmates. Finally, Dr. Golose spoke about
3 - 3 - Indonesia s CT strategy domain which includes capacity building for LE officials, deradicalisation and counter-radicalisation programmes. The session concluded with discussions on the role of international institutions and structures, the interaction of traditional criminal law and CT legislation, and how to measure the success of national architectures. Session Two Online/Social Media Challenges In session two, experts in the field of online social media CT efforts shared their views on the subject of regional online and social media challenges and responses in the context of effective CT policing. Ms. Sulastri Osman from the Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Singapore, began by highlighting the increasingly blurred line between online and offline terrorist activities. Her presentation emphasised that cyberspace remained a largely ungoverned space, and that policymakers need to be careful in striking the right balance between openness and security. Ms. Osman made a number of recommendations for policy makers in this sphere. In particular, she highlighted the need to enhance the response capacity of LE, to strengthen online CT policing, and to create new laws to address online incitement. Ms. Osman also highlighted the importance of establishing credible online counter-narratives and of providing education on the dangers of online terrorist activities. She urged LE and policy makers to use the online space in the same way that terrorists do. Mr. Solahudin Hartman from the Indonesian Strategic Policy Institute spoke of the increasing prominence that jihadist propaganda was attaining in the online space. He pointed out that the Internet has a number of advantages over traditional sources of communication it crosses geographic boundaries, can reach wide audiences, and is efficient and economical. In addition, online communications can be highly encrypted with relative ease to better avoid government restrictions, including censorship laws. Like Ms. Osman in the previous session, Mr. Hartman noted that national laws were often relatively ineffective in dealing with online terrorist threats and activities. Subsequent discussion focused on how to strike an appropriate balance between security and freedom of information. Participants suggested several measures to strengthen the efforts in countering terrorism in online media, such as enhancing the capacity of LE officials online, developing robust CT policing online and offline, outlining the law to address the issue of incitement, developing counter-narratives against the radicals, and extending the grassroots education on the danger of online terrorist activities. Session Three Counter-Terrorism Police Responses to Current Challenges The presenters in this session discussed the various types of responses available to LE in combating terrorism, including the importance of upholding the rule of law (ROL) and community outreach.
4 - 4 - Associate Professor Greg Fealy from the Australian National University outlined the current and evolving challenges for CT policing in upholding the ROL. He spoke about the dilemma faced by CT police in determining whether or not to apply lethal force during CT operations, and in managing the balance between protecting communities and avoiding counterproductive measures that could be exploited by extremists to undermine community support for CT police cooperation. He said that terrorist suspects often deliberately draws police into situations where the use of firearms becomes necessary, and noted that this might be a deliberate ploy by terrorists to undermine the credibility of police in the community. Taking Indonesia as a case study, Associate Professor Fealy talked in particular about issues relating to the release and reintegration of prisoners into society. He highlighted that a significant number of convicted terrorists were due to be released from Indonesian jails over the next few years. Superintendent Mark McIntyre from the Australian Federal Police spoke on the importance of proactively engaging civil society through community outreach in order to counter violent extremism (CVE). He pointed out that Australia took a strong approach to prevention and that CVE through community engagement was an integral component of Australia s national CT strategy. He described how Australian Federal Police community liaison officers worked with communities to address disengagement and to enhance social cohesion, often through running activities and events such as the Australian Federal Police Unity Cup (a football competition), community dinners and an International Women s Day. He concluded his presentation by emphasising that the future of CVE strategy lay in building leadership and resilience in at risk youth a successful CVE strategy that is underpinned by an effective community engagement strategy. Senior Sergeant Dr. Joe Ilardi from Victoria Police also presented on CVE through community outreach, although from the state-level perspective. Dr. Ilardi articulated the three key strategies behind the core policy of CVE: (1) to lessen the appeal of extremist ideologies; (2) to support disengagement; and (3) to promote social cohesion and inclusion. Specific initiatives undertaken by Victoria Police included Imam engagement with prisoners, organizing various Islamic awareness series in prisons, and the facilitation of a National Imams Consultative Forum. Dr. Ilardi left open for discussion the question of whether, in certain circumstances, police involvement in the CVE space might be counterproductive. Superintendent Muhamad Zarkasih from the Indonesian National Police Special Detachment 88 discussed on Indonesia s two-pronged strategy on countering terrorism through hard and soft power approaches. Unlike the hard approach, the soft approach to CT focuses on preventive rather than reactive measures, addressing the local drivers of radicalisation in the potential perpetrator, and focusing on issues of deradicalisation, particularly in the prison system. The strategies aim to win the heart and mind of the terrorists and his/her family by providing job skills training, and encouraging them to read and discuss books containing non-radical materials, and developing a prison monitoring program. Session Four The Way Forward for Counter-Terrorism Policing This session addressed the way forward for CT policing, with particular emphasis on the importance of modern CT police training and international cooperation.
5 - 5 - Commissioner Gede Suardana from the Jakarta Centre for Law Enforcement Cooperation (JCLEC), Indonesia, spoke on overcoming current and evolving challenges for CT policing by professionalising police training. Commissioner Suardana talked in detail on the role, functions, and composition of JCLEC. He noted that JCLEC s mission was to provide front line training and to increase the professionalism of LE. JCLEC s training program is divided into subjects on, among other things, forensics, management, intelligence and investigation. Commissioner Suardana said that JCLEC has been an overwhelming success, with more than 14,000 trainees from 68 countries trained to date. It was regarded as a best practice model for the region. Superintendent Glyn Lewis from INTERPOL spoke on overcoming current and evolving challenges for CT policing through international cooperation. He commenced his presentation by setting out the services and activities provided by INTERPOL in the SEA region, which included training, investigative support, the provision of specialised databases, analytical activities and the provision of secure communication channels. Superintendent Lewis highlighted that INTERPOL was constructing a Global Complex in Innovation in Singapore, which was due to commence operations in October Within the complex would be a coordination centre which would serve as a centre for capacity-building in the region. Superintendent Lewis noted that the current priorities for INTERPOL in the region included the strengthening of regional borders and the issue of the transportation of foreign terrorist fighters into Syria. A lively discussion followed, with a number of countries and delegations including Europol and the International Law Enforcement Academy Bangkok sharing their insights and experiences on the topics of police training and international cooperation. During this session, Kyrgyzstan and Afghanistan separately outlined the challenges of terrorism facing their respective countries and the CT policing efforts to overcome the terrorist threats. Future Meetings As proposed by Indonesia during the Fourth GCTF Coordinating Committee Meeting in New York, September 2013, and pursuant to Indonesia s letter dated 25 October 2013, that has been circulated among the GCTF members with no objections from other GCTF members, the mandate of the GCTF SEA WG will not be extended. A new thematic working group under the GCTF will be established, the focus of which will be provided to members in a proposal in due course.
Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism
Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization
More informationA Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit
The International Centre for Counter-Terrorism (ICCT) has a vacancy for: A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 1 August 2015
More informationDetention and Reintegration Working Group
Detention and Reintegration Working Group Workshop on Education, Life Skill Courses and Vocational Training for Incarcerated Violent Extremist Offenders 7-8 October 2015 Nairobi, Kenya Overview Co-Chairs
More informationI Conference Summary
Executive Summary Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices & Lessons Learned 6-9 December 2011, The Hague Contents I Conference Summary... 2 Background
More informationDelegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.
Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation
More informationPolicy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit
The International Centre for Counter-Terrorism (ICCT) has three vacancies for: Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 17 August
More informationUnited Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering
More informationFirst Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing
Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing 14-15 May 2014 Marrakech, Morocco Summary Hosted by
More informationDelegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.
Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational cooperation
More informationCTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
More informationCountering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington
Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Chair s Summary Overview Community-Oriented Policing (COP)
More informationForeign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report
Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report Summary of Main Findings January 2015 EUROJUST LIMITED The distribution of this document is strictly
More informationOrganization for Security and Co-operation in Europe
Organization for Security and Co-operation in Europe The Review of the United Nations Global Counter-Terrorism Strategy 12-13 June 2014, New York Remarks by Mr. Thomas Wuchte, Head on Anti-terrorism Issues
More informationDetention and Reintegration Working Group and Sahel Region Capacity-Building Working Group
Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group Workshop on Prison and Security Issues and Implementation of the GCTF Rome Memorandum on the Rehabilitation of
More informationChairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
More informationHedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities
Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationSecurity Council. United Nations S/2008/434
United Nations S/2008/434 Security Council Distr.: General 3 July 2008 Original: English Special report of the Secretary-General pursuant to Security Council resolution 1806 (2008) on the United Nations
More informationCouncil of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)
Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) DS 1035/15 LIMITE MEETING DOCUMENT From: EU Counter-Terrorism Coordinator To: Delegations Subject: EU CTC input for
More informationEPP ANTI-TERRORISM PACT
EPP ANTI-TERRORISM PACT 1 The EPP Group views terrorism as a global threat that needs to be tackled on local, national, European, regional and global levels. To strengthen our citizen s security, to defend
More informationForeign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon
Foreign Terrorist Fighters (FTF) Initiative The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Introduction The threat posed by Foreign Terrorist Fighters
More informationThe Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.
Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationEU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
More informationNational Security impacted by Global Change
National Security impacted by Global Change NATIONAL SECURITY SCIENCE & TECHNOLOGY To provide a national focus for science and technology to enhance Australia s national security capabilities Dr Richard
More information2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?
The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council
More informationFighting Terrorism at its Source
The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION
More informationLIMITE EN. Background
Background Following the Paris shooting on 7 January 2015, there have been a number of developments that have recently led to the creation of the European Counter-Terrorism Centre (ECTC) and the Internet
More informationGeneral Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
More informationManifesto for Education Empowering Educators and Schools
Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationAdvanced Summer Programme
Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 24-28 August 2015 *PROGRAMME Monday 24 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks 08.45 09.00
More informationASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationCouncil of the European Union Brussels, 2 March 2015 (OR. en)
Council of the European Union Brussels, 2 March 2015 (OR. en) 6606/15 LIMITE JAI 114 PESC 213 COSI 28 COPS 55 ENFOPOL 52 COTER 41 SIRIS 13 FRONT 48 COPEN 63 DROIPEN 21 NOTE From: To: Subject: Presidency
More informationPolicy Instruments & (Side)-Effects
Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationGuide to Australia s National Security Capability
Guide to Australia s National Security Capability Contents Introduction... 3 Part 1: Australia s national security framework... 5 Part 2: Australia s approach to national security capability planning...
More informationEuropol Public Information VACANCY NOTICE
The Hague, 3 February 2016 File nº: Europol/2016/TA/AD9/237 VACANCY NOTICE Name of the post: Reporting to: Business Manager IRU - EU Internet Referral Unit - within the Operations Department (OD) AD9 Head
More informationUN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials
UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials Dana Perkins, PhD 1540 Committee Expert Biological Weapons Convention
More informationCybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police
Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the
More informationPrevent Preempt Protect
Prevent Preempt Protect The Swedish counter-terrorism strategy Government Communication 2014/15:146 Government Communication 2014/15:146 Prevent, preempt and protect the Swedish counter-terrorism strategy
More informationUNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013
UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies
More informationAssessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
More informationTreviso, Italy, 16-18 September 2015. Recommendations for a regional strategy
Meeting with religious leaders and faith based organisations from the European region on their role in preventing incitement to violence that could lead to atrocity crimes Treviso, Italy, 16-18 September
More informationASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
More informationIntroduction. Special Conference. The Exploitation Of Media By Terrorist Groups
Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider
More informationDECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR POLICE-RELATED ACTIVITIES
PC.DEC/1049 Organization for Security and Co-operation in Europe Permanent Council Original: ENGLISH 922nd Plenary Meeting PC Journal No. 922, Agenda item 6 DECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR
More informationHow To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationEnsuring WHO s capacity to prepare for and respond to future large-scale and sustained outbreaks and emergencies
EXECUTIVE BOARD Special session on Ebola Provisional agenda item 3 EBSS/3/3 EXECUTIVE BOARD 136th session 9 January 2015 Provisional agenda item 9.4 Ensuring WHO s capacity to prepare for and respond to
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationAnkara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism
Ankara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism Introduction This good practices document addresses the role of government institutions, agencies, and
More information8674/15 MC/pf 1 DGD 1B
Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16
More informationAssessment of the terror threat to Denmark
28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 12 December 2006 16694/06 PESC 1278 CONOP 74 CODUN 38
COUNCIL OF THE EUROPEAN UNION Brussels, 12 December 2006 16694/06 PESC 1278 CONOP 74 CODUN 38 COVER NOTE from : General Secretariat to : Delegations Subject : EU Strategy against the proliferation of WMD:
More informationPlaying Our Part in Responding to National Threats
Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with
More informationGuidelines on SPECIAL BRANCH WORK in the United Kingdom
Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence
More informationTHE OECD/DAC HANDBOOK ON SSR: SUPPORTING SECURITY AND JUSTICE
THE OECD/DAC HANDBOOK ON SSR: SUPPORTING SECURITY AND JUSTICE Enhancing International Co-operation on Conflict, Peace and Security The OECD/DAC (Development Assistance Committee) Network on Conflict, Peace
More informationEU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationHighlights of Developments in ARF Cooperation on Counter-Terrorism and Transnational Crime
Highlights of Developments in ARF Cooperation on Counter-Terrorism and Transnational Crime Introduction 1. The ASEAN Regional Forum Inter-Sessional Meeting on Counter-Terrorism and Transnational Crime
More informationImplementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper
Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper Background The UN Global Counter-Terrorism Strategy, unanimously adopted in September 2006 by the UN General
More informationAdvanced Summer Programme on Countering Terrorism: Legal Challenges and Dilemmas
Photo: Reuters/Yaser Al-Khodor Advanced Summer Programme on Countering Terrorism: Legal Challenges and Dilemmas 24-28 August 2015 The Hague Organised by the T.M.C. Asser Instituut & International Centre
More informationCyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
More informationCommonwealth Organised Crime Strategic Framework: Overview
Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart
More informationTraining Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationWhile interagency education and training have long been staples of the intelligence and
Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are
More information5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
More informationDraft Follow-On Action Agenda. The White House Summit to Counter Violent Extremism Ministerial Meeting February 19, 2015.
Draft Follow-On Action Agenda The White House Summit to Counter Violent Extremism Ministerial Meeting February 19, 2015 April 2015 Action Agenda Item 1: Promoting Local Research and Information-Sharing
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges
EUROPEAN COMMISSION Brussels, 20.7.2010 COM(2010)386 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL The EU Counter-Terrorism Policy: main achievements and future challenges
More informationMigration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationCouncil of the European Union Brussels, 18 September 2015 (OR. en)
Council of the European Union Brussels, 18 September 2015 (OR. en) 12139/15 LIMITE JAI 669 CFSP/PESC 536 COSI 110 COPS 279 ENFOPOL 255 COTER 120 SIRIS 60 FRONT 191 CATS 84 EDUC 252 NOTE From: To: Subject:
More informationAMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism
AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism Expanding Counterterrorism Partnerships: U.S. Efforts to Tackle the Evolving Terrorist Threat Washington Institute for Near East Policy 1828 L
More informationU.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
More informationOSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes. Paris, France June 16, 2004
PC.DEL/507/04 16 June 2004 ENGLISH only OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes Paris, France June 16, 2004 Public and Private
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationPreventing violent extremism. Winning hearts and minds
Preventing violent extremism Winning hearts and minds www.communities.gov.uk community, opportunity, prosperity April 2007 Preventing violent extremism Winning hearts and minds April 2007 Department for
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationDECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM
MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON
More informationNational Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationVALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION
VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,
More informationI. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED
SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the
More informationThe Danish Prison and Probation Service
The Danish Prison and Probation Service De-radicalisation Background Over the past ten years Denmark has seen a new group of criminals previously not encountered in Danish institutions. We now have a group
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More informationU.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
More informationPurpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
More informationNSS 2014 UK NATIONAL PROGRESS REPORT. March 2014
NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism
More informationMadrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings
Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September
More informationTRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016
TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically
More informationPresidency conclusions on establishing a strategy to combat the manipulation of sport results
COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More informationEuropol Unclassified Basic Protection Level VACANCY NOTICE
The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area
More information