Cybercrime: Improving international cooperation

Size: px
Start display at page:

Download "Cybercrime: Improving international cooperation"

Transcription

1 The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference [765004] Version [2] Discussion paper Europol Public Information

2 1 Introduction In preparation for the Global Conference on Cybersecurity (GCCS) 2015, the organisers invited Europol to draft a discussion paper as input for the dedicated parallel session on Cybercrime, Improving international cooperation. As a key instrument of the European Union to support its Member States efforts in preventing and combating serious and organised crime and terrorism, Europol has had the opportunity to gain significant experience in international law enforcement cooperation. Moreover, in January 2013 the European Cybercrime Centre (EC3) was established within Europol, which also offered the organisation a front-row seat to look at the possibilities and impediments for cross-border cooperation in the particular domain of cybercrime. This paper aims to present the essential factors that Europol considers of relevance to the ability to cooperate effectively across borders. These factors have been divided over the chapters Operational Cooperation and Strategic Cooperation, depending on the kind of cooperation they predominantly affect. A third chapter is dedicated to considerations on Partnerships. The first version of this paper offered the basis for discussions among participants of the GCCS 2015 along with the introductions of the speakers. In the current version the discussions have been used to draft the final chapter where critical success factors for the improvement of international cooperation have been introduced. Under the leadership of those that contributed to this paper, concrete steps will be prepared and taken to turn the content into concrete action. This should have a tangible impact on cooperation in order to prevent and fight the various forms of cybercrime even more successfully together in the future. A report on these actions and their results will be presented at the next Global Conference on Cyber Space. Europol Public Information 2 / 12

3 2 Operational Cooperation On the positive side, cybercrime stimulates international cooperation more than most other types of crime. It is highly disrespectful to national jurisdictions and physical borders and can multiply criminal activities worldwide in a matter of seconds. It presents unprecedented challenges to law enforcement communities around the world. In particular, it makes them highly dependent on each other in dealing with these crimes and the criminals that commit them. Apart from having a common interest, it helps to also have common grounds to work together efficiently and successfully. The points on which common grounds would be beneficial are discussed in the following paragraphs. 2.1 Legal framework At the heart of operational law enforcement cooperation is the exchange of personal data on suspects of crime, with a view to collecting evidence and getting the suspects convicted. The extradition of suspects and convicted criminals is also key. These elements of cooperation require a legal basis covering the criminal offences within domestic law and the possibilities and conditions for judicial cooperation between the states involved. There are several treaties, conventions and other international arrangements that provide a legal basis for judicial cross-border cooperation. Some of these deal with cooperation in general; others are specifically dedicated to cybercrime. The Budapest Convention is a good example of the latter. It is intended to extend judicial and law enforcement cooperation against cybercrime as broadly as possible on a global level. Most beneficial for cross-border cooperation is the mutual recognition of investigative processes and in particular, if evidence has been lawfully collected in one country, that it can be used in court in another country. This is of particular value to the use of special investigative techniques. At a more regional level, there are, particularly within the EU, multiple examples of harmonisation of legislation, also with regard to cybercrime. The European Arrest Warrant is worth mentioning as well as the possibility to establish Joint Investigation Teams; an instrument that removes most barriers in the exchange of information between the countries participating in the investigation. Europol Public Information 3 / 12

4 Although helpful to achieve swift cooperation in practice, the alignment of legal systems is not a precondition for successful cross-border cooperation. Similar legal systems can for instance be found among the Member States of the Commonwealth but also the Nordic countries. Iceland, Norway, Sweden, Denmark and Finland share a judicial system that even allows them to use each other s liaison officers posted abroad. Still, differences between legal systems can be overcome and are by no means a reason or excuse for cooperation against cybercrime not to work. 2.2 Standards for data processing Apart from having a legal basis for the exchange of information, international cooperation also benefits from the alignment of standards. There are many aspects of data processing that can be standardised. A non-exhaustive set of examples is presented below. Quite important is the alignment, or an agreement on equivalence, of the levels of confidentiality. If information is for instance qualified as restricted or as secret, the treatment of such data usually comes with a set of protective measures that is deemed appropriate for the level concerned. This applies to the information processing tools, the physical location in which data can be processed and to the duly authorised officers involved in the processing. If data is exchanged between countries, similar arrangements should apply for the security conditions under which the data can be processed. Furthermore, it is necessary to agree on what constitutes personal data. Provided that a legal framework is in place and such data can be shared, then it is still important to know between cooperation partners exactly what is considered personal data, because this affects the way the information can and should be handled. As an example, IPaddresses are considered personal data in some countries, while other jurisdictions do not consider them as such. Other types of standardisation relate to reliability. In most evaluation systems the reliability consists of two parts: the reliability of the source and the reliability of the information. The use of these factors helps to make informed decisions. Data which stems from an unreliable source and which has not been confirmed should be weighted differently than information from a reliable source that also has been corroborated. Also worth considering is to establish agreed standards for the handling of data. The willingness to share information with foreign partners increases if the owner of the information can impose certain conditions and rely on its partners to adhere to these conditions. A good example of this is the sharing of information for police use only, meaning that the information cannot be used as evidence in judicial procedures. This Europol Public Information 4 / 12

5 can be because the owner does not want the data to be known to the defence or to avoid the investigation from being jeopardised in any other way. In a relatively early stage is the agreement on digital forensic standards. This will become increasingly important for cybercrime, because it will allow information collected and processed in one country to be used as evidence in court in another country. Following on from the points above on standards for data processing, cross-border cooperation also benefits from shared or interoperable ICT tools. Having common data processing solutions in place can facilitate the secure and swift exchange of information between partners, as well as the further processing for cross-matching and analysis. 2.3 Information exchange and shared intelligence products The cornerstone of law enforcement cooperation is the exchange of information. Having a shared picture of crimes is the basis for decision making on how forces can be joined. This applies at a strategic level as well as on operational matters. Important for sharing information in addition to the conditions outlined above is to have a common understanding of what the information will be used for and how it will support joint decision making. It is therefore worth defining the objectives of the information sharing and the specification of information products that will be delivered. These can be strategic threat assessments, operational analysis reports, cross-matches, thematic assessments, trend analysis reports and several others. These information products can then be used to decide on concrete cross-border cooperation between the partners, such as joint actions or investigations. But even if countries do their own investigations, then it is still useful to benefit from each other s information and to de-conflict their activities to avoid duplication of efforts and potential interference in one another s ongoing operations. 2.4 Coordination When investigations involve more countries it is essential to foresee a coordination mechanism, ensuring that the activities of the partners concerned are aligned. This applies to the planning of activities, but also to the content. Sharing information throughout the process is vital for the coordination of activities and to make sure the right action is taken at the right time. Also when it comes to making arrests, conducting searches and seizing assets, cross-border alignment can significantly enhance the eventual results. The same applies to the interviewing of suspects and the analysis of data on seized ICT tools and infrastructure. Europol Public Information 5 / 12

6 A distinction can be made between operational police coordination of actions and judicial coordination in regard to the collection of evidence in different jurisdictions. Both are equally important to the success of the cooperation. 2.5 Other factors influencing operational cooperation After the long list of topics above that can be aligned and assimilated, there comes a point where differences have to be acknowledged and accepted. In international cooperation there will always be differences. These can be cultural, linguistic, procedural, tactical or many other kinds. To effectively overcome these differences a combination of three elements is required: mutual respect, trust and willingness to cooperate. These factors are more important than any of the other points. There are numerous examples where no cooperation is achieved even within one country, or even within one police force, if there is no willingness or trust. Legal obligations to cooperate or share intelligence are neglected if police officers do not trust each other or sense competition with their fellow officers. On the other hand, there are also many examples where none of the preconditions for cooperation were in place, but where respect, trust and willingness among the international partners enabled the achievement of joint successes. Europol Public Information 6 / 12

7 3 Strategic Cooperation Whereas operational cooperation is often subject to political sensitivity and willingness, there are still many additional opportunities for international cooperation that are politically more neutral and certainly worth exploring to complement or compensate the operational dimension. 3.1 Alignment at policy level Without the need to exchange operational information or initiate joint investigations, countries can decide to jointly address cybercrime or specific topics related to cybercrime at policy level. This can be achieved for instance by introducing new legislation or other regulatory measures. An example is the abuse of virtual currencies, like Bitcoin, for criminal transactions and money laundering. Introducing policy measures in various jurisdictions in line with the respective regulatory frameworks reduces the opportunities for criminals to benefit from unregulated matters. The policy measures do not necessarily have to be the same. Even diversity in the kind of measures taken reduces the number of safe havens available for cashing out criminal profits. Such policy alignment could even become more targeted if partners can agree. For instance, using again the example of the abuse of virtual currencies, countries could agree that each would target with priority the criminal use of Darkcoin, which is notorious for maximising the anonymity of its users. At a more general level, countries could also agree to prioritise the investigation and prosecution of specific crime types, such as online child sexual exploitation or the deployment of remote access Trojans. Each country could pursue such prioritisation individually under domestic legislation and as such contribute to the shared objective without the need for international operational cooperation. (Obviously, the effect of operational cooperation between countries would be stronger in view of the international nature of cybercrime and the dispersed actors and evidence.) 3.2 Prevention and awareness Considering the ease at which cybercrimes can be replicated across borders, victims of similar crimes are likely to be found in multiple countries. The proactive sharing of information on new threats and modus operandi to citizens and businesses can educate them on how to better protect themselves and as such minimise the impact of cybercrime. The sharing of such data between countries does not necessarily involve the exchange of any personal data to be effective. Europol Public Information 7 / 12

8 Also, it is possible to develop joint campaigns to inform the general public about cyber threats. Important economies of scale can be made in this regard. Yet the effect of such communication is strongest if it also respects local cultures and reality. It should therefore come from entities that are trusted and close, and should be broadcast in the local language. 3.3 Training & capacity building One of the biggest challenges for law enforcement is for its workforce to keep up with training needs to prevent and combat cybercrime effectively. This challenge is fuelled by the expanding nature of cybercrime affecting increasingly more aspects of policing, and by the continuous, high-speed evolution of technology. The expanding nature requires that police officers across law enforcement organisations need to be educated on the cyber elements that are of relevance to their work and on the technical capabilities that digital forensics can offer. The high-speed evolution calls for permanent updating of training material and sharing of latest information and best practices among practitioners. The demands this combination brings in terms of resourcing heavily impacts small and large countries alike. As such, it constitutes a perfect area for cross-border cooperation in order to maximise efficiencies. Moreover, any weaknesses in cybercrime fighting capacities among law enforcement across the world automatically create opportunities for criminals that can operate from or through such areas where enforcement is limited. The assimilation of training and sharing of expertise and best practices also enhances the possibilities for swift operational cooperation between countries. 3.4 Research & Development Another challenge for law enforcement is to have the appropriate tools. The creation, testing and validation of new digital forensic analysis tools requires a lot of time, and keeping pace with technological developments can be really difficult. Also the quantities of data to be processed are rapidly increasing. This applies to the number of seizures of digital evidence and to the volumes of data per seizure. Obviously, these factors urge countries to join forces in developing processing tools for digital forensic investigations. Having shared development programmes not only increases the efficiency in delivering tools, but also facilitates the exchange and acceptance of evidence produced with those tools by partners abroad. Europol Public Information 8 / 12

9 4 Partnership Addressing the previously presented conditions will definitely stimulate international cooperation. An additional opportunity to promote in particular structural cooperation, whether operational or strategic, is to conclude partnerships. In the paragraphs below the main categories of partnerships are introduced. 4.1 Law enforcement cooperation International cooperation between law enforcement services is indispensable to prevent and fight cybercrime successfully. Building partnerships among them seems simple and obvious. Yet already within the law enforcement domain there are many different partners that can be considered. At the top of the list is of course cooperation between cybercrime divisions. But then there are those of multiple services, depending on the law enforcement architecture of countries. Cyber divisions can be found in regular police services, customs organisations and military police organisations. But there are also some specialised branches such as fraud teams or online child sexual exploitation divisions. Equally worth mentioning are judicial authorities and the specialised structures those have created to focus on cybercrime. Apart from the identification of the right partners abroad, it is also important to consider the kind of cooperation. The partnership can aim at establishing bi-lateral or multi-lateral cooperation. Bi-lateral cooperation is often established between two countries or organisations. For multi-lateral cooperation specific institutions are often established. Interpol is probably the best known multi-lateral partnership between police forces, and its newly established IGCI (INTERPOL Global Complex for Innovation) in Singapore is focused specifically on cooperation against cybercrime. But cooperation structures are also established at regional level. Europol, Ameripol and Aseanapol are structures for police cooperation, whereas Eurojust serves as a good example of international judicial coordination. The content of the partnerships depends on the aims and intentions of the participants. In police cooperation, both bi-lateral and multi-lateral cooperation can be strengthened by the posting of liaison officers. A successful pilot was recently concluded with the colocation of cyber liaison officers in the Joint Cybercrime Action Taskforce (J-CAT). This team has been established as an operational investigative branch attached to the European Cybercrime Centre at Europol with representatives of several EU Member States and some other countries spread over another three continents. The success of this cooperation is positively influenced by the fact that most of the conditions for Europol Public Information 9 / 12

10 operational cooperation as listed above, were already fulfilled between the partners to this initiative. 4.2 Multi-disciplinary partnerships The interconnectivity between sectors in society and the facilitation of that by the Internet also calls for a broad, inclusive approach in dealing with the threats of cybercrime. The ICT industry, social media companies, Internet security firms, the banking sector, industrial manufacturers, CERTs, the telecom sector, including Internet service providers, research institutes and academia, all have a role to play. Law enforcement has become heavily dependent on various sectors. This applies to getting information, expertise, resources, support and more. Botnets can be taken down without police involvement. Legal action by the private sector is taken against the misuse of Internet services. The enforcement landscape and the attribution of roles among the actors have shifted remarkably. At the same time, a multitude of international multi-disciplinary partnerships has already emerged: National Cyber-Forensics & Training Alliance; European Cybercrime Training & Education Group; European Financial Coalition against commercial sexual exploitation of children online; and many, many more. Joining partnerships and signing up for a meaningful cause has become relatively easy. Of course what matters is contributing. 4.3 Sector-specific cooperation In addition to the multi-disciplinary partnerships it is worth law enforcement considering engaging with certain sectors in a targeted way, to allow for dedicated attention to the specifics of such a sector. These could be the vulnerabilities and threats affecting a branch or the possibilities to engage private sector partners in the law enforcement response to certain crimes. Good examples are the opportunities offered by targeted cooperation with the financial sector, the telecom industry, social media, Internet security and CERTs. Each sector can offer a wealth of information; actively contribute to prevention programmes and awareness campaigns and advise on priorities for law enforcement action. Compared to the participation in multi-disciplinary partnerships, which is also important in its own way, the sector-specific approach allows for slightly closer and more trustful cooperation and can therefore deliver even more valuable results. As such, this approach is particularly suitable for more sensitive cooperation. Europol Public Information 10 / 12

11 5 Critical success factors Improving international cooperation is far easier in theory than in practice. To increase the chances of success this chapter offers a number of factors to consider when planning concrete steps for improvement. Innovative. Yes, but not necessarily. If there are existing solutions that work, there is no need to take risks with experiments. However, given the diversity and complexity of cybercrime challenges, thinking out of the box may well help to develop a new approach that does address problems that appeared insurmountable in the past. Scalable. Initiatives taken to improve cooperation must be suitable at several levels. They need to work in the bigger scheme of things and tie in with other, overarching factors of cooperation and at the same time, they need to work at micro-level in the everyday practice of concrete operations. This also applies to the approach towards crimes. Cases should not be looked at in isolation. Instead, they should be seen in the broader scope of the problem to be addressed most effectively. This calls for a thematic orientation, which can only flourish if the bigger picture can be visualised and addressed, requiring extensive data sharing and successful partnerships. Problem-specific. Even though cybercrime is fairly generic, the conditions for prevention and combating may well differ significantly from one environment to another. Instead of looking for a global one-size-fits-all solution, attention must be given to local conditions to resolve issues successfully. A good example of this is capacity building. Huge efforts are needed across the world to get the required know-how, skills, tools and manpower in place to deal with cybercrime. But what needs to be done in Europe may differ a lot from what needs to be done in the Middle-East, North America or Africa. Brave. The fight against cybercrime will not be won by easy, quick wins. Solutions that are more likely to succeed require courage and perseverance. Worth mentioning in this respect are partnerships that push actors out of their comfort zone. Cooperation between law enforcement and national intelligence services or the military is a good example, especially considering that even more natural partnerships such as those between police and prosecutors may sometimes already cause discomfort. Forward-looking. Improvements in international cooperation should predominantly focus on the challenges of tomorrow, rather than on the realities of today. First of all, because it usually takes time to implement new cooperation frameworks. Secondly, Europol Public Information 11 / 12

12 because it allows the changes needed for the international cooperation to go hand-inhand with the adjustments aimed at addressing future challenges. This is not only more efficient, but also enables better integration of the international cooperation into new work processes. Multi-faceted. Since dealing with cybercrime involves many aspects, the international cooperation should equally take into account the multiple dimensions of handling cybercrime effectively, including protection, investigation, prevention and capacity building. The international framework should support a multi-actor eco system in which the relevant stakeholders have and can take up their role without competition or redundant overlapping with others. This applies to law enforcement, prosecution, CERTs, the Internet security industry, ISPs, the financial sector, critical infrastructure owners, academia, the military, the media and many others. Many individual sectors have their own international networks and the dynamics of these need to be understood, respected and considered. International by design. In view of the cross-jurisdictional reality of the Internet, the international dimension should be at the heart of any approach to dealing with cybercrime and cyber security. As such, the aspects related to international cooperation can be considered by default and from the outset and not merely as additional complexities to be addressed as part of the implementation of solutions that were already decided. Europol Public Information 12 / 12

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

More information

Service and anonymisation.

Service and anonymisation. THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 9 EXECUTIVE SUMMARY The Internet Organised Crime Threat Assessment (iocta) informs decision makers at strategic, policy and tactical levels about

More information

Council of the European Union Brussels, 24 November 2014 (OR. en)

Council of the European Union Brussels, 24 November 2014 (OR. en) Council of the European Union Brussels, 24 November 2014 (OR. en) 15701/1/14 REV 1 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11153/2/14 REV 2 Subject: JAI 897 DAPIX 175

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 27.3.2013 COM(2013) 172 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Eurojust. The European Union s Judicial Cooperation Unit

Eurojust. The European Union s Judicial Cooperation Unit Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES [As finalized by the ASEAN Ad-Hoc Working Group on Trafficking in Persons, 25 June 2007, Vientiane, Lao PDR; and endorsed

More information

Commonwealth Organised Crime Strategic Framework: Overview

Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart

More information

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners Eurojust s Multi-annual Strategic Plan 2012-2014 Operational work Centre of expertise Partners Organisational developments Introduction Eurojust is entering a crucial phase of development as it approaches

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international

More information

Council of the European Union Brussels, 5 March 2015 (OR. en)

Council of the European Union Brussels, 5 March 2015 (OR. en) Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report

Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report Summary of Main Findings January 2015 EUROJUST LIMITED The distribution of this document is strictly

More information

Financial Services and Technology Forum 10 July 2013. TOPIC: Cyber Security

Financial Services and Technology Forum 10 July 2013. TOPIC: Cyber Security Financial Services and Technology Forum 10 July 2013 Panellists: TOPIC: Cyber Security MEP Christian Engström (Greens, Sweden) Emmanuel Cabau, DG CONNECT, European Commission Cathrin Bauer-Bulst, DG HOME,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PUBLIC HEARING Combating sexual abuse, sexual exploitation of children and child pornography Committee on Civil Liberties, Justice and Home Affairs 28-29

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

TITLE III JUSTICE, FREEDOM AND SECURITY

TITLE III JUSTICE, FREEDOM AND SECURITY TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach

More information

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters CALL FOR EVIDENCE ON THE GOVERNMENT S REVIEW OF THE BALANCE OF COMPETENCES BETWEEN THE UNITED KINGDOM AND THE EUROPEAN UNION Police and Criminal Justice LEGAL ANNEX Section 1: Development of the EU s competence

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Assise de la Justice Brussels, 21 & 22 November 2013. Presentation by Maura McGowan QC Chairman of the Bar Council of England and Wales

Assise de la Justice Brussels, 21 & 22 November 2013. Presentation by Maura McGowan QC Chairman of the Bar Council of England and Wales Assise de la Justice Brussels, 21 & 22 November 2013 Presentation by Maura McGowan QC Chairman of the Bar Council of England and Wales Day 2 Towards a More Integrated European Area of Justice Based on

More information

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

(DRAFT)( 2 ) MOTION FOR A RESOLUTION 05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

The European Security Strategy Austrian Perspective

The European Security Strategy Austrian Perspective Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and

More information

Data for the Public Good. The Government Statistical Service Data Strategy

Data for the Public Good. The Government Statistical Service Data Strategy Data for the Public Good The Government Statistical Service Data Strategy November 2013 1 Foreword by the National Statistician When I launched Building the Community - The Strategy for the Government

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

Presidency conclusions on establishing a strategy to combat the manipulation of sport results COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27

More information

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the

More information

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Sweden 17 October 2007 INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Discussion paper on the essentials of a European information network in 2014 I. The

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

Jackpot! Money Laundering Through Online Gambling

Jackpot! Money Laundering Through Online Gambling Jackpot! Money Laundering Through Online Gambling McAfee Labs Executive Summary Jackpot! Money Laundering Through Online Gambling McAfee Labs Executive Summary 1 Introduction Jackpot! Money Laundering

More information

Report of the Strategic Meeting on Cybercrime

Report of the Strategic Meeting on Cybercrime Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Royal Canadian Mounted Police Cybercrime Strategy

Royal Canadian Mounted Police Cybercrime Strategy Royal Canadian Mounted Police Cybercrime Strategy 2015 HER MAJESTY THE QUEEN IN RIGHT OF CANADA as represented by the Royal Canadian Mounted Police. Cat. no.: PS64-128/2015E-PDF ISBN: 978-0-660-03030-2

More information

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy

More information

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

COMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER

COMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 11.11.2009 COM(2009) 624 final GREEN PAPER on obtaining evidence in criminal matters from one Member State to another and securing its admissibility

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

Address. By Jürgen Stock Candidate for Secretary General. 83 rd INTERPOL General Assembly Monaco, 7 November 2014

Address. By Jürgen Stock Candidate for Secretary General. 83 rd INTERPOL General Assembly Monaco, 7 November 2014 By Jürgen Stock Candidate for Secretary General 83 rd INTERPOL General Assembly Monaco, 7 November 2014 Page 1/5 7 Nov 2014 Your Excellencies; Madame la Presidente; Distinguished Members of the Executive

More information

Basel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing

Basel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing Basel Committee on Banking Supervision Sharing of financial records between jurisdictions in connection with the fight against terrorist financing April 2002 Sharing of financial records between jurisdictions

More information

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 20.9.2011 COM(2011) 573 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Commission. This publication (communication) reflects

More information

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME 1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Europol Unclassified Basic Protection Level VACANCY NOTICE

Europol Unclassified Basic Protection Level VACANCY NOTICE The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area

More information

Committee of Ministers - The promotion of Internet and online media services a...

Committee of Ministers - The promotion of Internet and online media services a... Page 1 of 5 Ministers Deputies CM Documents CM/AS(2010)Rec1882 final 18 June 2010 The promotion of Internet and online media services appropriate for minors Parliamentary Assembly Recommendation 1882 (2009)

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

Conference of the States Parties to the United Nations Convention against Corruption

Conference of the States Parties to the United Nations Convention against Corruption United Nations CAC/COSP/2015/L.7/Rev.2 Conference of the States Parties to the United Nations Convention against Corruption Distr.: Limited 5 November 2015 Original: English Sixth session St. Petersburg,

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016

CEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016 CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Case study on asset tracing

Case study on asset tracing Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million

More information

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet

More information

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group Good Governance. EU Work Plan for Sport EU Work Plan for Sport 2011-2014 Expert Group "Good Governance Deliverable 1 Input on the EU's role in fighting match-fixing J u n e 2012 2 1. INTRODUCTION The EU Work Plan for Sport identifies integrity

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 7.2.2013 JOIN(2013) 1 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL,

More information

PROJECT FICHE 3.2.1.2

PROJECT FICHE 3.2.1.2 PROJECT FICHE 3.2.1.2 TO ACTION PROGRAMME 2005 FOR THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Title Combating money laundering (phase II) Total cost EC contribution: 1.5 million (approx) Aid Method Project

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

Peace and Justice in Cyberspace

Peace and Justice in Cyberspace Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

More information

Payment Card Fraud in the European Union Perspective of Law Enforcement Agencies

Payment Card Fraud in the European Union Perspective of Law Enforcement Agencies images: Fotolia Situation Report - Payment Card Fraud 2012 Public Version Situation Report Payment Card Fraud in the European Union Perspective of Law Enforcement Agencies This Europol product analyses

More information

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA AHG/Decl.2 (XXXII) 32 nd OAU Summit DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA The features of the Plan of Action elaborated herewith comprise five sections

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Europol External Strategy. Business Case: Cooperation with Georgia

Europol External Strategy. Business Case: Cooperation with Georgia A EX 3 The Hague, 4 April 2012 File no. 2641-127 Edoc # 595554v8 Europol External Strategy Business Case: Cooperation with Georgia 1. Aim The purpose of this Business Case is to provide additional information

More information

ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things

ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE Preamble The United States of America and the European Police Office (Europol): considering that it is within their common

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Ordinary Legislative Procedure

Ordinary Legislative Procedure Annex 4 LIST OF THE ARTICLES COMING UNDER ORDINARY LEGISLATIVE PROCEDURE The Treaty of Lisbon plans for extension of the so-called "codecision" procedure, which is now called "ordinary legislative procedure",

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

National Cyber Security Strategy 2

National Cyber Security Strategy 2 National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport Titel brochure hier invullen 1 2 National Cyber Security Strategy (NCSS) 2 From awareness

More information

CYSPA launch event - Turkey

CYSPA launch event - Turkey CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June

More information

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation. The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Financial Crimes Enforcement Network

Financial Crimes Enforcement Network Fiscal Years 2008 2012 Financial Crimes Enforcement Network Table of Contents Message from the Director 1 Introduction 3 The Bank Secrecy Act 4 The Nation s Financial Intelligence Unit 5 Mission Statement

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information