1 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009
2 Presentation Contents An assessment of the Georgian view of cybercrime and current capability to investigate The necessity for creation of the cyber crime unit How to create a specialized cyber crime unit Recommendations
3 An assessment of the Georgian view of cybercrime and current capability to investigate
4 An assessment of the Georgian view of cybercrime and current capability to investigate Since the attacks on government systems that took place immediately before the invasion by Russia in 2008, Georgia has identified the combating of cybercrime and cyber attacks as a priority. These attacks involved denial of service attacks on government networks that in turn impacted on the ability of the Georgian authorities to communicate with its population and its ability to protect itself and conduct its everyday business. Since these incidents Georgia started to pay more attention to the cybercrime phenomenon, security of computer systems and protection of critical national infrastructure. An inter-ministry working group was created to define a general policy for preventing and combating cybercrime. This working group does not have specific tasks or fixed deadlines. The working group is an important first step for the awareness level and understanding of the phenomenon of cybercrime, but no significant progress will be achieved without setting clear and specific objectives to be reached within this framework.
5 An assessment of the Georgian view of cybercrime and current capability to investigate The identified risks and computer threats should be considered on the global level that may impact on Georgia. The fact that currently the status of the cybercrime in Georgia can be only reflected by the computer attack of 2008, doesn t necessarily mean that other criminal activities are absent or cannot start in the future. The surrounding countries from the former Soviet Union are mainly affected by on line criminal activities which can and undoubtedly will extend to Georgia as the availability of technology in business and the general population increases. As regard to the private sector, ITC companies, banks, ISP s and others responsible for the CNI of Georgia, there are no known partnership associations created to engage in debate that can result in projects for prevention and education. Public/private partnerships have proved very successful in other jurisdictions and entities working in isolation and without discussion are less likely to succeed.
6 An assessment of the Georgian view of cybercrime and current capability to investigate Currently, in Georgia there is no specialised structure within the Ministry of Internal Affairs for investigating the types of cybercrime identified in this report. In addition there are no specialised police officers in this field. Moreover, there are no prosecutors assigned to work with this kind of investigations and no training courses are offered on this subject. Until now, with the exception of the computer attack of 2008, according to the known and reported situation there are only a small number of complaints related to threats sent through the Internet. The national legislation criminalises certain activities but it doesn t entirely cover the area of illegal activities in the field of cybercrime, nor does it comprise the necessary procedures for research and investigation of digital evidence.
7 An assessment of the Georgian view of cybercrime and current capability to investigate There are no specialized police units to perform specific activities of computer forensics and there are no working procedures to follow when dealing with digital evidence. The training and awareness level for judges is rather limited, not only with regard to cybercrime but to the impact of new technologies and their use for crimes. Georgia does not have any specific procedural laws or regulations dealing with the collection, handling, examination, analysis or presentation of digital evidence in criminal proceedings, nor does it have any safeguards to protect the rights of individuals in respect of this very specific type of evidence.
8 An assessment of the Georgian view of cybercrime and current capability to investigate
9 The necessity for creation of the cyber crime unit The computer attack suffered in 2008 shows that certain societies, are not adequately prepared to fight these threats Critical National Infrastructure protection is essential for countries to be able to function As numbers of users of communication systems increases with the development of the infrastructure, the threats will also increase. The increasing importance of cybercrime in the world To provide citizens with the confidence that there is a capability to deal with cybercrime issues and digital forensics at national level Financial institutions use computer systems on large scale Technical and operational methods and the availability of advanced technical devices are in continually changing and improving. The activities in the field of cybercrime have a strong cross-border nature The traces left by cyber-criminals remain for only relatively short periods Knowledge of international standards for data retention and preservation are essential
10 The necessity for creation of the cyber crime unit Prevention and combating cybercrime is and must be a priority, taking into account the following features: creation and assurance of a safe business environment both for ITC activity and for others who use computer systems for their businesses; ensuring the trust of the population and the legal entities in the Internet as a safe means of communication and method of conducting business activities and using electronic means of payment; ensuring safety for children s use of the Internet; protection of critical infrastructure; establishing a public-private partnership and efficient international cooperation structures aimed primarily at supporting the operational segment activities The investigation and interpretation of digital evidence requires the specialisation of law enforcement agents and staff and the use of specialised tools and software
11 How to create a specialized cyber crime unit
12 How to create a specialized cyber crime unit
13 How to create a specialized cyber crime unit
15 Completion of the national legal framework and harmonization with the European standards Although the legal issues are being dealt with in another report, it is important to highlight those legal issues that directly impact on the ability to provide practical countermeasures against cybercrime in all its forms. The existence of adequate legislation is essential for fighting cybercrime. The Council of Europe Cybercrime Convention is a positive example of international legal instrument helping many countries in designing their national legislation in the area of cybercrime. In fact it is the only international legal instrument to fight cybercrime.
16 Completion of the national legal framework and harmonization with the European standards The legislation must be looked from several angles: the acts that should be criminalised (in this area of crimes new ways of committing crimes or new types of crimes appear all the time); the procedures for investigating and researching these crimes (computer search, access to computer systems, etc.), the definition of the international cooperation framework (the point of contact 24/7, spontaneous exchange of data and information, sending and responding to the mutual assistance requests, extradition, etc.)
17 Development of a national strategy for the security of computer systems The computer attack against Georgia that took place last year proves the fragility of computer systems at governmental level as well as at civil institutions or business level. It is considered necessary to draft a national strategy to define the security of computer systems, the critical infrastructure, the institution with responsibilities in this field and a joint working method for these institutions for preventing and taking the first measures in case that computer attacks occur. The creation of a response centre for incidents CERT will be helpful for a better evaluation of the threats against computer systems, for reporting these events, for collaboration of institutions and for reacting in case that computer attack occur. A part of this national strategy should refer to the modernization and specialization of police structures for preventing and combating this phenomenon.
19 Development of a national strategy for the security of computer systems Even if computer threats are not too diverse in Georgia and the impact of new IT&C technology in committing cybercrimes is not too high, it is just a matter of time for them to affect Georgia, too. The occurrence of certain types of computer frauds or Internet child pornography in other geographical areas more remote or close to Georgia, does not mean that they cannot occur soon in Georgia. It is useful to know and prevent this events, learning from others mistakes and experience in order to fight the crimes more efficiently whenever they occur. The already existing working group for analysing and assessing the risks in the field of computer systems security and for drafting the general policy should present such report, together with an action plan comprising the responsible institutions and each institution s tasks.
20 Creation of a specialized unit for cybercrime investigation According to the organization and functioning of the Ministry of Internal Affairs of Georgia, a specialized unit for computer crimes could be created within the Criminal Police Department having as main tasks the investigation of the actions in the field of cybercrime and the assistance provided to other police structures for performing investigations. The unit should be created at central level and developed step by step in accordance to the financial resources and the operational environment in Georgia. The unit should be initially formed by 4 or 5 police officers to deal with the investigation of cybercrime activities and with issues related to the research and investigation of computer systems for the purpose of identification and collection of digital evidence.
21 Creation of a specialized unit for cybercrime investigation Among the investigation competences of this unit, we recommend to include the following: computer frauds, frauds with electronic means of payment, computer attacks and child abuse through computer systems. The personnel to be hired in this unit should be formed of experienced police officers for performing police investigations, who have computer skills and speak a foreign language spoken on international level. The selection might be done according to the human and financial resources from the existing policemen in the Ministry or even from the graduates of universities specialized in computers and communications.
22 Development of instruments and procedures needed for investigating and researching these crimes The novelty and the technical nature of the investigation of cybercrimes require internal working procedures to be developed and implemented in such situations. These procedures must be based on the legislation in force for the criminal offences facts and the associated technical procedures (computer search, etc.). They should also take into account the internal regulations for performing investigations at the level of police structures in Georgia. The procedures must regulate the steps to be followed by different types of investigations, the necessary stages for a safe collection of digital evidence, the steps to be followed for investigating certain types of digital evidence, etc. The procedures must also deal with the admissibility of evidence in criminal proceedings and the measures to be taken to ensure that all data collected is retained and presented in a form acceptable to the judicial system of Georgia.
23 Development of instruments and procedures needed for investigating and researching these crimes These procedures should be drafted by experts of the new cybercrime structure, after establishing the unit, based on training courses they will attend and on their experience as policemen. The procedures should be also approved by prosecutors. Cybercrime prevention is also important, and the new unit should develop a crime prevention strategy that will incorporate public awareness activities as well as education programmes for schools and other organisations dealing with safe use of the Internet. It is important that the public is aware of the existence of a cybercrime unit that can help in cases and this can be achieved by advertising its investigative capacity and a place to which cybercrime may be reported. A procedure for accepting reports of cybercrime should be established by for example the creation of a website, telephone line and address dedicated to reporting such crimes.
24 Development of instruments and procedures needed for investigating and researching these crimes The creation of contacts and collaboration protocols with other informative competent structures from other departments of the Ministry of Internal Affairs is very important for ensuring an efficient information exchange is essential. There must be created a database in the context of creation of the unit and the reporting and investigation of cybercrimes. In order to provide some support in this context the following documents are identified as being of particular use. The European Commission published a document outlining good practice for the seizure and handling of digital evidence entitled Seizure of e- evidence. It remains the only international guide covering this area and should be seen as a good base for developing procedures to deal with digital evidence. Interpol has been developing an IT Crime Manual which is available to all Interpol Member Countries.
25 Provision of a training programme and equipping the new unit Any specialised unit that is created will only be as successful as the knowledge, skills and education of the people who will staff the unit. In the area of cybercrime, the level of training required to become an effective operative is lengthy, continuing and sometimes expensive. Staff of the unit will have varying requirements for training depending on their roles within the organisation, for example a digital forensics technician will require different training than an investigator responsible for cyber attacks on the Georgian CNI. There are however some similarities in the training and it is appropriate for each to have an understanding of the others work. At the introductory stage, it is appropriate for all unit staff to receive basic training on digital forensics and network investigations. Once the unit is established it will be necessary to identify a training path for each member of staff that will support the needs of the unit.
26 Provision of a training programme and equipping the new unit It is recommended that a learning portfolio be created for each member of staff that will enable a full record of an individual s learning and training to be maintained. One of the main reasons for this is to provide evidence to the judicial system of an individual s capability in this area of work. It is vital that each member of staff follows a programme of continuing professional development (CPD) once their core training has been completed. The changes in technological advance are so great that it is not possible to assume that someone trained in year one is still competent in year 3, if they have not followed a CPD programme. This may take the form of additional training, attendance at relevant conferences and workshops and exchange visits with other similar units in other jurisdictions. These initial training courses should be organised for the personnel right after the selection and even in a partnership with private companies, financial institutions and law enforcement agencies from abroad. There are training courses developed by various police structures and it is better to use them at this training stage rather than try to develop new courses.
27 Training Schematic Specialist Forensic Investigators Technical Content Forensic Investigator Crime Investigator First Responder Student Numbers
28 Advanced Network Investigators XRY and Xact FTK Advanced Internet Forensic Cryptography Advanced Linux WinHex FTK Internet Forensics Advanced NTFS Basic Linux Access Data FTK Networks Forensics Advanced Windows7 Core Skills Network Investigators Encase Foundation Forensics Core Skills IT Forensic Examiners Covert Forensics Child Protection Investigations Internet Investigations Economic Crime Investigations Crime Reduction Staff Divisional Detectives Intelligence Analysts All First Responders Line Managers Senior Investigators Reporting Staff High Tech Crime Awareness for all New Recruits
29 Provision of a training programme and equipping the new unit The equipping of the new unit is essential and must be done with minimum costs and gradually, depending on the needs. This will include: adequate space for the new created structure; secure storage for exhibits sufficiently powerful computers for workers; overt and covert Internet connections; necessary software and devices for forensically processing computer systems and other devices; applications needed for performing computer investigations, etc. The above list is only indicative and a specific outline of the requirements can be provided once the structure of the unit is identified.
30 Development of cooperation relations with private sector and creation of proper mechanisms for international cooperation The development of a partnership with the private sector is important from several points of view, such as knowing and building trusted relationships with the ITC companies, the Internet providers, the banking environment, etc. Such partnerships are helpful for better prevention and for educating citizens and clients of such companies in order for them to know and to be aware of the danger of the cybercrime as well as putting into place preventive measures to protect their assets. Greater communication with private sector entities generates a mutual trust which leads to encouraging the notification and reports of these cybercrimes by citizens or above-mentioned institutions. The knowledge and experience of these companies may help and contribute to the training and equipping of the personnel.
31 Development of cooperation relations with private sector and creation of proper mechanisms for international cooperation For better international relations and awareness of the importance of international cooperation issues we recommend the establishment of the 24/7 contact point, in order to provide exchange of information in emergency situations in the area of cybercrime. This contact point should operate within the new created police structure and provide the exchange of data and information based on the national legislation in force, in emergency situations. It represents an important tool to receive requests from abroad and send requests to other countries and it should not be looked as a cooperation institution of its own, but as a functional unit, available 24 hours a day. These recommendations are the initial response to the challenges faced and will need refining once a decision is made to create a specialised unit. The final recommendations will very much depend on the structure of a unit, the staffing levels and importantly the funding available for implementation.
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert firstname.lastname@example.org Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
CyberCrime@IPA EU/COE Joint Project on Regional Cooperation against Cybercrime www.coe.int/cybercrime Data Protection and Cybercrime Division Directorate General of Human Rights and Rule of Law Strasbourg,
TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference  Version  Discussion paper Europol Public Information 1 Introduction In preparation
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PUBLIC HEARING Combating sexual abuse, sexual exploitation of children and child pornography Committee on Civil Liberties, Justice and Home Affairs 28-29
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
CALL FOR EVIDENCE ON THE GOVERNMENT S REVIEW OF THE BALANCE OF COMPETENCES BETWEEN THE UNITED KINGDOM AND THE EUROPEAN UNION Police and Criminal Justice LEGAL ANNEX Section 1: Development of the EU s competence
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
Optional Protocol on the sale of children, child prostitution and child pornography... (for full text of Optional Protocol, see Appendix 2, page 670 and for reporting guidelines, see Appendix 3, page 692)
New Hampshire Cyber Crime Initiative Overview Briefing NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor Background: Cyber Crime Many traditional crimes now have a cyber component
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried
The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area
Law of Georgia on Combating Human Trafficking (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Article 1. Scope of Regulation This Law determines the organizational
Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES [As finalized by the ASEAN Ad-Hoc Working Group on Trafficking in Persons, 25 June 2007, Vientiane, Lao PDR; and endorsed
COUNCIL OF THE EUROPEAN UNION Brussels, 30 May 2007 10089/07 ADD 1 CRIMORG 102 ADDENDUM TO COVER NOTE from: Secretary-General of the European Commission, signed by Mr Jordi AYET PUIGARNAU, Director date
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
Anti-Corruption Network for Eastern Europe and Central Asia Istanbul Anti-Corruption Action Plan Second Round of Monitoring Georgia Progress Report Report is presented by Georgia at the 10 th Monitoring
Operational indicators of trafficking in human beings Results from a Delphi survey implemented by the ILO and the European Commission First published in March 2009 Revised version of September 2009 What
Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international
Basel Committee on Banking Supervision Sharing of financial records between jurisdictions in connection with the fight against terrorist financing April 2002 Sharing of financial records between jurisdictions
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
www.coe.int/tcy Strasbourg, version 4 May 2016 T-CY(2015)16 Cybercrime Convention Committee (T-CY) T-CY Guidance Note #10 (DRAFT) Production orders for subscriber information (Article 18 Budapest Convention)
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: email@example.com Australia
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
Conclusions of the Conference "Together against hate speech and hate crime" The conclusions on the conference against hate speech and hate crime, held in Madrid on the 27th of November 2014 and organised
Supply Chain Security Training Needs for Law Enforcement Agencies Presented by Dr. Juha Hintsa, CBRA 1st CORE SUPPLY CHAIN FORUM, Transport & Logistics Fair September 24, 2015, Antwerp. HICL2015 Authors:
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
PARLIAMENTS UNITED in combating sexual violence against children Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign Tanja Kleinsorge Head of the
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest firstname.lastname@example.org Abstract Nowadays, the boundary between virtual
Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
www.coe.int/oneinfive 28 April 2012 Council of Europe campaign to stop sexual violence against children 1. Getting the picture: Sexual violence is a complex, sensitive and alarmingly widespread problem
The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
Madame Chair, First of all, let me thank the IOM and ILO for organizing this side event together with the Permanent Mission of Italy. We agreed enthusiastically to be co-host of this event, knowing that
INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan
Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University email@example.com Table of Contents Introduction: Motivation and Background
DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country
THE COMPANY Independent consulting firm, ONRISC specialises in Risk Management and the security of Information Systems Computer security experts, its founding partners bring their experience and complementary
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Co-Chairs' Summary of the ARF Seminar on Cyber Terrorism Jeju Island, Republic of Korea 13-15 October 2004 1. As agreed by the Foreign Ministers at the 11 th ASEAN Regional Forum (ARF) FMM, the "ARF Seminar
Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM
The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,