National Security impacted by Global Change

Size: px
Start display at page:

Download "National Security impacted by Global Change"

Transcription

1 National Security impacted by Global Change NATIONAL SECURITY SCIENCE & TECHNOLOGY To provide a national focus for science and technology to enhance Australia s national security capabilities Dr Richard Davis National Security Science & Technology Branch Office of National Security Department of the Prime Minister and Cabinet

2 Key Themes

3 National Security Context 3

4

5 Two key reform documents

6 National Security Adviser Defence policy and operations, intelligence coordination and the NSST Branch Including border security, counterterrorism, emergency management, infrastructure security, NCTC Secretariat Provision of international policy advice, as well as ceremonial and hospitality coordination Strategic advice on particular international policy issues

7 The NSST Branch

8 National Security Science and Innovation Strategy

9 Key themes for development of the Strategy

10 Triple Helix model Aim to maximise benefit and leverage from the three sectors collaborating Scope for enhanced contribution to public policy debate and analysis 10

11 Research Support for Counter-Terrorism

12 Key Drivers 12

13 National Security Statement (selected excerpts...) improving the coordination of national security policy with reform of the structure of national security decision making through establishing for the first time a National Security Adviser; Implementing the recommendations of the Smith Report..this includes the initiatives I have announced on organised crime, border securityand science and innovation Australia must also apply a risk-basedapproach to assessing, prioritising and resourcing our national security policy across the defence, diplomatic, intelligence and wider national security community. Effective mitigation of terrorist attacks involves the combination of an appropriate security response with broader strategies to enhance social cohesion and resilience and lessen the appeal of radical ideology. incorporating the implications of climate change and energy security into the formal national security decision making framework. 13

14 Practical steps Expanding the community Expanded SCNS, HPCG, NICC Coordinated national security evaluation & budget Creation of Exec Coord(SES2) Enhanced information sharing Creation of NS CIO (SES2) Education & training National security college

15 Global Risks /10 Economic indicators in top quadrant Societal indictors 3/5 in top quadrant Pandemic Chronic disease Liability regimes (litigation & community risk) 12/14 top issues were Economic or Societal. Others were: Global governance gaps Critical Information Infrastructure breakdown 15

16 Annual Threat Assessment (US Director of National Intelligence*) 1. Global Financial crisis 2. Violent Extremism 3. Geo-strategic assessments 4. Cyber security 5. Environment security Including climate change *Annual Threat Assessment of the Intelligence community, Denis Blair, Feb

17 Human & Social factors 17

18 Radicalisation 21 of 30 people charged with terrorism in Australia are Australian born. Overall 40 Australian citizens or permanent residents are confirmed, assessed or suspectedto have received terrorist training in Afghanistan or Pakistan. Significant focus of research and community outreach in Australia 18

19 Radicalisation (Countering Violent Extremism) Understanding the drivers and paths to violent extremism Understanding the factors which assist with counter-extremism and de-radicalisation The role of the internet and other communications media The role of communities 19

20 Social Resilience Capacity of a population to prepare for and respond effectively to large-scale crises Acute v chronic Local v virtual/distributed (diaspora) Known v unknown Role of federal, state & local government & agencies Key enablers Education, training Knowledge & communications Resources & support 20

21 Psycho-social response to CBRN The Unknown Dread The uncontrollable Management: Knowledge Information & learning resources Dealing with dread Control & Action Professor Beverly Raphael, UWS 21

22 Augmenting Phenotype By creating devices: Combat armour Exoskeletons Night Vision Goggles Sensors Mobility Lethality Enhancing Genotype By genetically: Growing a metallic skin Identifying genes that improve vision at night Increasing muscular and cardiovascular performance Improving cognitive function Silicon / biological interfaces 21 st Century technology race : enhance genotype vs augment phenotype (from DSTO)

23 Modelling & Simulation 23

24 Modelling & Simulation Current M&S support to government decision making, includes: Economic modelling (Treasury) Climate change (CSIRO support to Garnautreview) Pandemic modelling (DOHA) CIP modelling CIPMA (AGD) Broadening the application SIAA Emergency Management SIG Socio-economic interplay with enviro-security factors 24

25 CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Attorney General s Department

26 1. Overview of CIP in Australia Critical Infrastructure is defined as those physical facilities, supply chains, information technologies and communication networks which if destroyed, degraded or rendered unavailable for an extended period would significantly impact on the social or economic wellbeing of the nation or affect Australia s ability to conduct national defence and ensure national security

27 2. CIPMA Overview SYSTEM MODELLING DECISION SUPPORT INFORMATION & DATA ELECTRICITY GAS ECONOMIC SOCIAL INVESTMENT BUSINESS CONTINUITY SECURITY RESILIENCE LIQUID FUELS COMMUNICATIONS BROADCASTING BANKING & FINANCE WATER Acknowledged gap in modelling social factors

28 Conclusions New national security arrangements are encouraging broader participation and cooperation Inclusion of climate change, economic impact, resource/energy security Human/social factors critical for understanding overall system Specific interest in radicalisation & resilience Modelling & simulation scope for greater analytical support to public policy 28

29

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, email=office@jpcert.or.jp, o=japan Computer

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

AGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011

AGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011 MEETING: RSSB Board Meeting DATE: 08 May 2014 SUBJECT: Cyber security SPONSORS: Anson Jack and Gareth Llewellyn AUTHORS: Tom Lee and Peter Gibbons 1. Purpose 1.1 This paper has been prepared jointly by

More information

Commonwealth Organised Crime Strategic Framework: Overview

Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 11.12.2013 JOIN(2013) 30 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

More information

The Strategic Policing Requirement. March 2015

The Strategic Policing Requirement. March 2015 The Strategic Policing Requirement March 2015 Contents Foreword by the Home Secretary 3 1. Introduction 4 2. National threats 7 3. Policing response: 5Cs 9-14 4. Capacity and contribution 9 5. Capability

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

Implementation Plan: Development of an asset and financial planning management. Australian Capital Territory

Implementation Plan: Development of an asset and financial planning management. Australian Capital Territory Implementation Plan: Development of an asset and financial planning management framework for TAMS Australian Capital Territory NATIONAL PARTNERSHIP AGREEMENT TO SUPPORT LOCAL GOVERNMENT AND REGIONAL DEVELOPMENT

More information

National Security Overview - Australia

National Security Overview - Australia Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit s terms

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

STRATEGIC SCIENCE AND RESEARCH PRIORITIES

STRATEGIC SCIENCE AND RESEARCH PRIORITIES STRATEGIC SCIENCE AND RESEARCH PRIORITIES At the inaugural meeting of the Commonwealth Science Council, members strongly supported the need and value of establishing science and research priorities, at

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

I Conference Summary

I Conference Summary Executive Summary Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices & Lessons Learned 6-9 December 2011, The Hague Contents I Conference Summary... 2 Background

More information

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation

More information

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION Section 1: Agency overview and resources 1.1 STRATEGIC DIRECTION STATEMENT The mission of the Australian Security Intelligence Organisation (ASIO) is to identify

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

South-East Asia Region Capacity-Building Working Group (SEA WG)

South-East Asia Region Capacity-Building Working Group (SEA WG) South-East Asia Region Capacity-Building Working Group (SEA WG) Third Meeting of the South-East Asia Capacity Building Working 18-19 November 2013 Yogyakarta, Indonesia Summary The third meeting of the

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

Submission on the draft National Primary Health Care Strategic Framework October 2012

Submission on the draft National Primary Health Care Strategic Framework October 2012 Submission on the draft National Primary Health Care Strategic Framework October 2012 Council of Social Service of NSW (NCOSS) 66 Albion Street, Surry Hills 2010 Ph: 02 9211 2599 Fax: 9281 1968 email:

More information

Good Security. Good Business

Good Security. Good Business Good Security Good Business Good Security Good Business Attorney-General s foreword Small business plays a crucial role, not only in our nation s economy but in Australian society. We often make decisions

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges EUROPEAN COMMISSION Brussels, 20.7.2010 COM(2010)386 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL The EU Counter-Terrorism Policy: main achievements and future challenges

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Continuity Management Policy Policy Holder: Authoriser: Caroline Gover, Head of Business Continuity Caroline Thomson, Chief Operating Officer Reviewed on: Feb 08 Reviewed on: Feb 08 Next Review

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Australia s counter-terrorism laws

Australia s counter-terrorism laws Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

NATIONAL COUNTER-TERRORISM PLAN

NATIONAL COUNTER-TERRORISM PLAN NATIONAL COUNTER-TERRORISM PLAN 3RD EDITION 2012 NATIONAL COUNTER-TERRORISM COMMITTEE ISBN: 978-1-922032-07-2 Commonwealth of Australia 2012 All material presented in this publication is provided under

More information

FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. soren.jagerhok@foi.se

FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. soren.jagerhok@foi.se FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism soren.jagerhok@foi.se Sammanställning FCT ID -deadline: Tänkt EUcontribution TRL Action 160825 Topic -mål -typ SEC-06-FCT- Developing

More information

A guide to the Defence Trade Controls Amendment Bill 2015

A guide to the Defence Trade Controls Amendment Bill 2015 A guide to the Defence Trade Controls Amendment Bill 2015 Introduction This guide has been produced to support public consultation on the Defence Trade Controls Amendment Bill 2015 (the Amendment Bill).

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

How To Get A Security Degree In Australia

How To Get A Security Degree In Australia Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Guide to Australia s National Security Capability

Guide to Australia s National Security Capability Guide to Australia s National Security Capability Contents Introduction... 3 Part 1: Australia s national security framework... 5 Part 2: Australia s approach to national security capability planning...

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

How To Write A Book On Risk Management

How To Write A Book On Risk Management National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

RISK MANAGEMENT SERVICES

RISK MANAGEMENT SERVICES RISK MANAGEMENT SERVICES WORLD-CLASS REAL ESTATE EXPERTISE WORLD-CLASS RISK MANAGEMENT EXPERTISE C&W has more than 1 billion square feet of properties under management in 60 countries around the world.

More information

StroNg ANd Secure A Strategy for Australia s National Security

StroNg ANd Secure A Strategy for Australia s National Security StroNg ANd Secure A Strategy for Australia s National Security From a foundation of strength to a secure future VISION A unified national security system that anticipates threats, protects the nation and

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting Towards new mission-oriented RTI policy and new rationales for programming and priority-setting Insights from the case of security K. Matthias Weber (AIT) E. Anders Eriksson (FOI) EU-SPRI Conference Helsinki,

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015 Attachment G.18 SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change 03 July, 2015 Table of contents 1 Executive summary... 3 2 SA Power Networks Original Proposal... 11 2.1 Summary...

More information

How To Manage Risk On A Scada System

How To Manage Risk On A Scada System Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document

More information

PRIMARY HEALTH CARE POLICY

PRIMARY HEALTH CARE POLICY PRIMARY HEALTH CARE POLICY The Public Health Association of Australia recognises that: 1. Universal access to primary health care based on need and not on the ability to pay, is a fundamental human right.

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

National Counter-Terrorism PLAN

National Counter-Terrorism PLAN National Counter-Terrorism PLAN Second Edition September 2005 Plus amendments relating to National Counter-Terrorism Alert System introduced on 1 October 2008 National Counter-Terrorism PLAN Second Edition

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

How To Improve Safety In Lancashire

How To Improve Safety In Lancashire Business Case for Area Base Grant Appendix B Theme: Safer Lancashire Board Improvement Initiative Being Proposed Lancashire Constabulary has conducted a review of Automatic Number Plate Recognition (ANPR)

More information

Crisis Management. IT Governance Summit 2015 Golden Tulip-Kumasi 08-09 October 2015

Crisis Management. IT Governance Summit 2015 Golden Tulip-Kumasi 08-09 October 2015 Crisis Management IT Governance Summit 2015 Golden Tulip-Kumasi 08-09 October 2015 Daniel Gyampo (EMBA,CRISC,CISA, CGEIT pass) Group Manager, Information Systems Audit, Ecobank Contents Disaster / Crisis

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Version 11.0 October 2013 Contents Introduction... 4 Government Security Responsibilities... 4 Role of the Centre... 5 Policy Context... 7 Critical National Infrastructure

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Border technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division

Border technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division Border technology strategy Chair: Mike Milford, First Assistant Secretary, Major Capability Division Session outline Using technology to improve how we manage the flow of people and goods and identify

More information

Fighting Terrorism at its Source

Fighting Terrorism at its Source The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

6 February 2015 Submission to the Department of the Treasury

6 February 2015 Submission to the Department of the Treasury 6 February 2015 Submission to the Department of the Treasury 2015-16 Commonwealth Budget Reconciliation Australia is the national organisation promoting reconciliation between the broader Australian community

More information

NOT PROTECTIVELY MARKED Agenda Item: 8

NOT PROTECTIVELY MARKED Agenda Item: 8 NOT PROTECTIVELY MARKED Agenda Item: 8 TO: FROM: Business Co-ordination Board Chief Constable DATE: 22 May 2013 THE NATIONAL POLICING REQUIREMENT 1. Purpose of Paper This paper provides an overview of

More information

BLUEPRINT FOR INTEGRATION

BLUEPRINT FOR INTEGRATION BLUEPRINT FOR INTEGRATION Commonwealth of Australia 2014 With the exception of the Commonwealth Coat of Arms, all material presented in this publication is provided under a Creative Commons Attribution

More information

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services ACT Auditor-General s Office Performance Audit Report Whole-of-Government Information and Communication Technology Security Management and Services Report No. 2 / 2012 PA 09/03 The Speaker ACT Legislative

More information

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex. Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent

More information

Australian Citizenship

Australian Citizenship Australian Citizenship Your Right, Your Responsibility 1 Commonwealth of Australia 2014 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia licence

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

A Speech by. His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations. to the

A Speech by. His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations. to the A Speech by His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations to the 59 th Session of the UN General Assembly New York, 30 September 2004 (check

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan A guide for business operators in South Australia www.statedevelopment.sa.gov.au/smallbusiness Table of Contents 01 Introduction... 4 02 Developing your plan... 6 03 Work section...

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

Guidelines on SPECIAL BRANCH WORK in the United Kingdom Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence

More information

PART C EMERGENCY MANAGEMENT ARRANGEMENTS

PART C EMERGENCY MANAGEMENT ARRANGEMENTS PART C EMERGENCY MANAGEMENT ARRANGEMENTS Photo courtesy of Barry Davies Importance to the Community Protecting and reassuring the community in circumstances of an emergency that threatens the peace, stability

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

The National Security Strategy of the United Kingdom: Update 2009. Security for the Next Generation

The National Security Strategy of the United Kingdom: Update 2009. Security for the Next Generation The National Security Strategy of the United Kingdom: Update 2009 Security for the Next Generation June 2009 The National Security Strategy of the United Kingdom: Update 2009 Security for the Next Generation

More information

Criteria for adopting International Standards and Risk Assessments

Criteria for adopting International Standards and Risk Assessments Criteria for adopting International Standards and Risk Assessments February 2016 Criteria for Accepting International Standards and Risk Assessments 1 Table of Contents 1 About the Department... 3 2 The

More information

Dirk Helbing (ETH Zurich) A New Approach to Sustainability Calling for Novel Science, Technology and Arts

Dirk Helbing (ETH Zurich) A New Approach to Sustainability Calling for Novel Science, Technology and Arts Dirk Helbing (ETH Zurich) A New Approach to Sustainability Calling for Novel Science, Technology and Arts Dirk Helbing (ETH Zurich) Economics 2.0: Towards A Self- Regulating, Participatory Market Society

More information

Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper

Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper Background The UN Global Counter-Terrorism Strategy, unanimously adopted in September 2006 by the UN General

More information

PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH

PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH TARGETED CONSULTATION DRAFT National Health and Medical Research Council PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH Developed by NHMRC s Prevention and Community Health

More information

PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008

PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008 PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY May 2008 This report is published under the OECD Secretariat's responsibility and was prepared by

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

Integration of Financial Investigation into Counter Terrorism Strategy

Integration of Financial Investigation into Counter Terrorism Strategy Integration of Financial Investigation into Counter Terrorism Strategy Arabinda Acharya and Gunawan Husin* The 10 August 2006 foiled bombing plot in the UK once again reinforces the importance of financial

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

How To Protect The Railway From Attack

How To Protect The Railway From Attack FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) DS 1035/15 LIMITE MEETING DOCUMENT From: EU Counter-Terrorism Coordinator To: Delegations Subject: EU CTC input for

More information

CONTEST: The United Kingdom s Strategy for Countering Terrorism

CONTEST: The United Kingdom s Strategy for Countering Terrorism CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new

More information

1 FOCUS Foresight Security Scenarios

1 FOCUS Foresight Security Scenarios New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military

More information

NATIONAL FRAMEWORK FOR RURAL AND REMOTE EDUCATION

NATIONAL FRAMEWORK FOR RURAL AND REMOTE EDUCATION NATIONAL FRAMEWORK FOR RURAL AND REMOTE EDUCATION DEVELOPED BY THE MCEETYA TASK FORCE ON RURAL AND REMOTE EDUCATION, TRAINING, EMPLOYMENT AND CHILDREN S SERVICES 1 CONTENTS Introduction... 3 Purpose...

More information