Capacity building on cybercrime: The example of GLACY and GLACY+

Size: px
Start display at page:

Download "Capacity building on cybercrime: The example of GLACY and GLACY+"

Transcription

1 GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Global Forum on Cyber Expertise, Washington DC, 1-2 June 2016 Capacity building on cybercrime: The example of GLACY and GLACY+ Manuel DE ALMEIDA PEREIRA Project Manager Cybercrime Programme Office of the Council of Europe (C-PROC) Council of Europe Nayia BARMPALIOU Programme Manager, Cybersecurity and Organised Crime DG International Cooperation and Development, European Commission

2 Action on cybercrime: The approach of the Council of Europe 2 Follow up and assessments: Cybercrime Convention Committee (T-CY) 1 Common standards: Budapest Convention on Cybercrime and relates standards Protecting you and your rights in cyberspace Note: Capacity building is part of a consistent and dynamic approach 3 Capacity building: C-PROC Technical cooperation programmes 2 2

3 Reach of the Budapest Convention / reach of capacity building 130+ Indicative Budapest Convention Ratified/acceded: 49 Signed: 6 Invited to accede: 11 = Other States with laws/draft laws largely in line with Budapest Convention = 20 Further States drawing on Budapest Convention for legislation = 45+ map only

4 About the Budapest Convention on Cybercrime Opened for signature in Budapest, Hungary, in 2001 By 1 June 2016: 49 Parties (European, Australia, Canada, Dominican Republic, Israel, Japan, Mauritius, Panama, Sri Lanka, USA) 6 Signatories (European, South Africa) 11 States invited to accede (Argentina, Chile, Colombia, Costa Rica, Mexico, Morocco, Paraguay, Peru, Philippines, Senegal, Tonga) = 66 States 4 4

5 5 5 Budapest Convention: scope Criminalising conduct Illegal access Illegal interception Data interference System interference Misuse of devices Fraud and forgery Child pornography IPR-offences Procedural tools + + Harmonisation Expedited preservation Search and seizure Interception of computer data International cooperation Extradition MLA Spontaneous information Expedited preservation MLA for accessing computer data MLA for interception 24/7 points of contact

6 Budapest Convention: The role of the Cybercrime Convention Committee (T-CY) Established under Article 46 Budapest Convention Membership (May 2016): 49 Members (State Parties) 17 Observer States 12 organisations (African Union Commission, Commonwealth Secretariat, ENISA, European Union, Eurojust, Europol, INTERPOL, ITU, OAS, OECD, OSCE, UNODC) (Committee of Parties to the Budapest Convention) Functions: Assessments of the implementation of the Convention by the Parties Guidance Notes Draft legal instruments Two plenaries/year as well as Bureau and working group meetings An effective follow up mechanism The T-CY appears to be the main inter-governmental body on cybercrime matters internationally 6 6

7 7 7 Capacity building: The role of C-PROC 2013: Need to enhance capacities at the Council of Europe for capacity building on cybercrime and electronic evidence Decision by Committee of Ministers (October 2013) to establish a dedicated Programme Office in Bucharest, Romania Operational as from April 2014 Currently 18 staff Task: Support to countries worldwide to strengthen criminal justice capacities on cybercrime and electronic evidence

8 8 8 European Union Council of Europe partnership EU CoE partnership on global capacity building against cybercrime Since 2010 in Western Balkans and Turkey Since 2011 in Eastern Partnership countries 2013: External cyber capacity building a strategic block of the EU Cybersecurity Strategy: Scaling up Global 2015: European Agenda on Security: Cybercrime an internal and external priority 2015: Agenda 2030: Linking cyber capacity building to EU s Development commitments

9 C-PROC Projects (Status May 2016) GLACY EU/COE Joint Project Global Action on Cybercrime GLACY+ EU/COE Joint Project Global Action on Cybercrime II EU/COE Eastern Partnership III EU/COE Eastern Partnership iproceeds EU/COE Joint Project: Targeting crime proceeds on the Internet (voluntary contribution funded) 9 9

10 GLACY Global Action on Cybercrime Action globale sur la cybercriminalité GLACY EU/COE Joint Project on Global Action on Cybercrime To enable criminal justice authorities to engage in international cooperation on cybercrime and electronic evidence on the basis of the Budapest Convention on Cybercrime Duration 36 months (Nov 2013 Oct 2016) Budget Funding EUR 3.35 million European Union (Instrument for Stability, IfS) and Council of Europe Geo scope Countries prepared to implement the Budapest Convention Parties, Signatories or Invitees. GLACY Priority countries Mauritius Senegal Tonga Morocco South Africa Philippines Sri Lanka

11 GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Strategies and engagement of decision-makers Harmonisation of legislation Components/ Expected Results Judicial training Law enforcement capacities International cooperation Information sharing Assessment of progress

12 GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Sequencing of activities

13 GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Examples of recent activities: March 2016 MAURITIUS 31 March 1 April March 3 April 2016 SENEGAL SRI LANKA April 2016 SOUTH AFRICA 9-11 May 2016 Dakar, SENEGAL Examples of forthcoming activities: International workshop on adaptation and update of the electronic evidence guide through the development of Standard Operating Procedures, with participation of all GLACY countries Advisory mission on cybercrime reporting systems, combined with workshop on reporting systems and interagency cooperation Training of trainers/ Introductory Course on Cybercrime and Electronic Evidence for the judiciary International workshop on judicial training curricula integration, with participation of all GLACY countries International Workshop on "International Cooperation on Cybercrime and Electronic Evidence within ECOWAS/West Africa region" 30 June 1 July 2016 TONGA Advisory mission on cybercrime reporting systems, combined with workshop on reporting systems and interagency cooperation June 2016 PHILIPPINES Digital data forensics and live data forensics for LE and CERT July 2016 MOROCCO International workshop on effectiveness of legislation on cybercrime and electronic evidence measured through statistics 62 activities in 2015

14 New capacity building programme GLACY+ GLACY+ EU/COE Joint Project on Global Action on Cybercrime Extended GLACY+ is to extend the experience of the GLACY project, which supports seven priority countries in Africa and the Asia-Pacific region. These countries may serve as hubs to share their experience within their respective regions. Moreover, countries of Latin America and the Caribbean as well as others in Africa may now also benefit from project support. Duration 48 months (Mar 2016 Feb 2020) Budget Funding GLACY+ Hub or priority countries EUR 10 million European Union (Instrument contributing to Stability and Peace) and Council of Europe Mauritius Senegal Tonga Dom. Republic Morocco South Africa Ghana Philippines Sri Lanka

15 GLACY+ Global Action on Cybercrime Extended Action Globale sur la Cybercriminalité Élargie To strengthen the capacities of States worldwide to apply legislation on cybercrime and electronic evidence and enhance their abilities for effective international cooperation in this area. CYBERCRIME AND CYBERSECURITY POLICIES AND STRATEGIES To promote consistent cybercrime and cybersecurity policies and strategies. POLICE AUTHORITIES AND INVESTIGATIONS To strengthen the capacity of police authorities to investigate cybercrime and engage in effective police-to-police cooperation with each other as well as with cybercrime units in Europe and other regions. CRIMINAL JUSTICE AND INTERNATIONAL COOPERATION To enable criminal justice authorities to apply legislation and prosecute and adjudicate cases of cybercrime and electronic evidence and engage in international cooperation.

16 Capacity building on cybercrime: lessons learnt Factors of success: Capacity building backed up by common standards (example: Budapest Convention) and follow up mechanism (example: Cybercrime Convention Committee of the Parties) Political commitment to implement standards (Example: signature or formal request for accession to Budapest Convention) as a prerequisite for full range of support) Rule of law conditions: strengthening legislation, including safeguards for procedural powers, as starting point Sequencing of activities: Initial situation reports committing decision makers and counterpart organisations implementing activities assessing progress made feeding results back into policies Country project teams Example GLACY: cooperation with 7 x 5 institutions Capacities for capacity building C-PROC

17 Capacity building on cybercrime: lessons learnt A capacity building methodology Structured for institutional development and reform Ownership and bottom-up approach: inter-agency national project teams working towards meeting strategic objectives Sustainability: working with Judicial and Law Enforcement Academies, integrating cybercrime in their curricula Rights-based approach: throughout design and implementation Community of sharing: replicable and scalable material developed: manuals, informing also the broader cyber community (T-CY, Octopus) Trans-regional approach: an outlier - partnerships, crossfertilisation, ripple effect

18 GLACY: Manuals and Studies STUDY REPORTS AND MANUALS All reports will be finalized by end of September 2016 Legal framework on Child Protection 0% Legal framework on Data Protection Cybercrime Statistics 10% 10% Study Report on Cybercrime Reporting Systems 50% Standard Operating Procedures 95% Guide for 24/7 points of contact Manual on International Cooperation 75% 75% Legal Framework on ISP Liability 100% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

19 GFCE 2016 Annual meeting June 2016 THANK YOU Q&A Manuel DE ALMEIDA PEREIRA Phone:

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Cybercrime & Cybersecurity

Cybercrime & Cybersecurity Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

The Sahel and Indian Ocean Commission Judicial Platforms

The Sahel and Indian Ocean Commission Judicial Platforms Ulrich Garms, UNODC TPB (Terrorism Prevention Branch) The Sahel and Indian Ocean Commission Judicial Platforms Platform of Penal Judicial Cooperation of the Sahel Countries (PCJP-Sahel) Member States:

More information

24/7 High Tech Crime Network

24/7 High Tech Crime Network 24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact

More information

Combating Tax Evasion through Transparency and Exchange of Information

Combating Tax Evasion through Transparency and Exchange of Information Combating Tax Evasion through Transparency and Exchange of Information BSEC 23 November 2012 Simon Knott Global Forum Secretariat OECD What s at stake NO LEVEL PLAYING FIELD tax fraud and evasion lack

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

J O I N T D E C L A R A T I O N

J O I N T D E C L A R A T I O N REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Breakout Session B: Cyber Security and Cybercrime Trends in Africa Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop

More information

CoE/EU Eastern Partnership Programmatic Co-operation Framework (PCF) 2015 2017. Theme II Ensuring Justice

CoE/EU Eastern Partnership Programmatic Co-operation Framework (PCF) 2015 2017. Theme II Ensuring Justice CoE/EU Eastern Partnership Programmatic Co-operation Framework (PCF) 2015 2017 Theme II Ensuring Justice Thematic programme II.1.: Strengthening the independence and efficiency of justice Title of the

More information

DATE: 1 APRIL 2014. Introduction

DATE: 1 APRIL 2014. Introduction INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE:

More information

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

Appendix 1: Full Country Rankings

Appendix 1: Full Country Rankings Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Support period and budget frame, expenditures to date:

Support period and budget frame, expenditures to date: 1) Project Leaf - Law Enforcement Assistance for Forests 2) Project summary: Project Leaf (Law Enforcement Assistance for Forests) is a consortium forests and climate initiative on combating illegal logging

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

Camden Asset Recovery Inter-Agency Network (CARIN)

Camden Asset Recovery Inter-Agency Network (CARIN) Camden Asset Recovery Inter-Agency Network (CARIN) The History, Statement of Intent, Membership and Functioning of CARIN MANUAL CARIN MANUAL Secretariat, Camden Asset Recovery Inter-Agency Network (CARIN)

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners

Eurojust s Multi-annual. Strategic Plan 2012-2014. Organisational developments. Centre of expertise. Operational work. Partners Eurojust s Multi-annual Strategic Plan 2012-2014 Operational work Centre of expertise Partners Organisational developments Introduction Eurojust is entering a crucial phase of development as it approaches

More information

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité

GLACY Global Action on Cybercrime Action globale sur la cybercriminalité GLACY Global Action on Cybercrime Action globale sur la cybercriminalité Cybercrime reporting mechanisms Good practice study Agenda : Introduction to the draft study Activity under Result 6 of GLACY :

More information

The EU approach to Cybersecurity and Cybercrime

The EU approach to Cybersecurity and Cybercrime The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security

More information

T-CY Guidance Note #10 (DRAFT)

T-CY Guidance Note #10 (DRAFT) www.coe.int/tcy Strasbourg, version 4 May 2016 T-CY(2015)16 Cybercrime Convention Committee (T-CY) T-CY Guidance Note #10 (DRAFT) Production orders for subscriber information (Article 18 Budapest Convention)

More information

Regional Workshop on the Implementation of Rio Principle 10 in the Caribbean Region

Regional Workshop on the Implementation of Rio Principle 10 in the Caribbean Region Regional Workshop on the Implementation of Rio Principle 10 in the Caribbean Region Background Trinidad and Tobago, September 2013 UNEP UNITAR - ECLAC- WRI Preliminary Programme Strengthening effective

More information

UNHCR, United Nations High Commissioner for Refugees

UNHCR, United Nations High Commissioner for Refugees Belgium 22 Jul 1953 r 08 Apr 1969 a Belize 27 Jun 1990 a 27 Jun 1990 a Benin 04 Apr 1962 s 06 Jul 1970 a Bolivia 09 Feb 1982 a 09 Feb 1982 a Bosnia and Herzegovina 01 Sep 1993 s 01 Sep 1993 s Botswana

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

ADVOC. the international network of independent law firms

ADVOC. the international network of independent law firms ADVOC the international network of independent law firms About ADVOC ADVOC is an international network of independent law firms, sharing international expertise in jurisdictions across the globe Our member

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement How the G8 24/7 Network Operates THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement The G8 24/7 points of contact are provided for investigations involving electronic evidence that require urgent

More information

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014 NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism

More information

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing 20 October 2010 Original: English Conference of the Parties to the United Nations Convention against Transnational Organized Crime Fifth session Vienna, 18-22 October 2010 Agenda item 6 * International

More information

Peace and Justice in Cyberspace

Peace and Justice in Cyberspace Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

More information

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION

More information

Cybercrime: Improving international cooperation

Cybercrime: Improving international cooperation The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference [765004] Version [2] Discussion paper Europol Public Information 1 Introduction In preparation

More information

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity

More information

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME 1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL

More information

Individuals, Societies, Cultures and Health

Individuals, Societies, Cultures and Health www.cost.esf.org European Cooperation in Science and Technology ISCH Individuals, Societies, Cultures and Health By Dr Marc Caball Chairman, ISCH October 2010 The COST mission Strengthen Europe in scientific

More information

THE ICSID CASELOAD STATISTICS (ISSUE 2015-1)

THE ICSID CASELOAD STATISTICS (ISSUE 2015-1) THE ICSID CASELOAD STATISTICS (ISSUE 05-) The ICSID Caseload Statistics (Issue 05-) This issue of the ICSID Caseload Statistics updates the profile of the ICSID caseload, historically and for the calendar

More information

Report of the Strategic Meeting on Cybercrime

Report of the Strategic Meeting on Cybercrime Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

COMMITTEE ON HEMISPHERIC SECURITY (CHS) ORGANIZATION OF AMERICAN STATES (OAS) Washington D.C., 17 February 2011

COMMITTEE ON HEMISPHERIC SECURITY (CHS) ORGANIZATION OF AMERICAN STATES (OAS) Washington D.C., 17 February 2011 COMMITTEE ON HEMISPHERIC SECURITY (CHS) ORGANIZATION OF AMERICAN STATES (OAS) Washington D.C., 17 February 2011 Statement by Mr. Ambassador Baso Sangqu (South Africa) Chairman of the Committee established

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

Law enforcement in the clouds - challenges

Law enforcement in the clouds - challenges Octopus Conference 2010 Outlook session on security and privacy in the clouds Law enforcement in the clouds - challenges Strasbourg, 25 March 2010 Alexander Seger Council of Europe, Strasbourg, France

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy

More information

I. World trade developments

I. World trade developments I. World trade developments The value of world merchandise exports increased by 20 per cent in 2011 while exports of commercial services grew by 11 per cent. Key developments in 2011: a snapshot Trade

More information

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries Torbjörn Fredriksson (torbjorn.fredriksson@unctad.org) Chief, ICT Analysis Section, UNCTAD Commonwealth Cybersecurity

More information

Strasbourg, 21 April 2011 CDPC-BU (2011) 3 cdpc-bu/docs 2011/cdpc-bu (2011) 1 - e EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC)

Strasbourg, 21 April 2011 CDPC-BU (2011) 3 cdpc-bu/docs 2011/cdpc-bu (2011) 1 - e EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Strasbourg, 21 April 2011 CDPC-BU (2011) 3 cdpc-bu/docs 2011/cdpc-bu (2011) 1 - e EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Bureau Meeting (CDPC-BU) Prague, 19-20 April 2011 9.30 am Ministry of Justice

More information

States Parties to the 1951 Convention relating to the Status of Refugees and the 1967 Protocol

States Parties to the 1951 Convention relating to the Status of Refugees and the 1967 Protocol States Parties to the 1951 Convention relating to the Status of Refugees and the 1967 Protocol Date of entry into force: 22 April 1954 (Convention) 4 October 1967 (Protocol) As of 1 October 2008 Total

More information

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Commission. This publication (communication) reflects

More information

THE ICSID CASELOAD STATISTICS (ISSUE 2016 1)

THE ICSID CASELOAD STATISTICS (ISSUE 2016 1) THE ICSID CASELOAD STATISTICS (ISSUE 06 ) The ICSID Caseload Statistics (Issue 06 ) This issue of the ICSID Caseload Statistics updates the profile of the ICSID caseload, historically and for the calendar

More information

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology

More information

Electronic signature, authentication, identity management & UNCITRAL

Electronic signature, authentication, identity management & UNCITRAL United Nations Commission on International Trade Law Electronic signature, authentication, identity management & Jae Sung LEE Secretariat Legal Officer, International Trade Law Division Office of Legal

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

List of tables. I. World Trade Developments

List of tables. I. World Trade Developments List of tables I. World Trade Developments 1. Overview Table I.1 Growth in the volume of world merchandise exports and production, 2010-2014 39 Table I.2 Growth in the volume of world merchandise trade

More information

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Commonwealth Cybersecurity Forum BT Centre, London 22-24 April 2015 Dr Martin Koyabe Head of Research & Consultancy

More information

OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)

OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE) OAS CYBER SECURITY INITIATIVE Global Forum on Cyber Expertise (GFCE) CONTENTS 2 3 9 12 OAS Regional Cyber Security Framework What we offer to our Member States How we do our work ANNEX -A- OAS CYBER SECURITY

More information

Working Party on General Matters including Evaluations (GENVAL) Seventh round of mutual evaluations - Questionnaire

Working Party on General Matters including Evaluations (GENVAL) Seventh round of mutual evaluations - Questionnaire COUNCIL OF THE EUROPEAN UNION Brussels, 3 February 2014 5335/1/14 REV 1 LIMITE GENVAL 3 CYBER 3 NOTE From : To : Subject : Presidency Working Party on General Matters including Evaluations (GENVAL) Seventh

More information

The Importance of Credit Bureaus in Lending Decisions

The Importance of Credit Bureaus in Lending Decisions The Importance of Credit Bureaus in Lending Decisions Lessons Learned from International Experience Peer Stein, Principal Investment Officer August 24, 2004 Challenges for the Financial Industry Historically:

More information

Key Trends in Outsourced Contact Centers. 12 Congreso Andino, April 2015 Peter Ryan, Principal Analyst

Key Trends in Outsourced Contact Centers. 12 Congreso Andino, April 2015 Peter Ryan, Principal Analyst Key Trends in Outsourced Contact Centers 12 Congreso Andino, April 2015 Peter Ryan, Principal Analyst Outline of Presentation Introduction Key trends in outsourced contact centers Market growth Pricing

More information

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS 8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL

More information

U.S. Government Law Enforcement Training Programs in the Americas

U.S. Government Law Enforcement Training Programs in the Americas U.S. Government Law Enforcement Training Programs in the Americas The United States Government provides training to law enforcement and judicial personnel globally. The U.S. Departments of State and Justice

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

Computer Facilitated Crimes Against Children International Law Enforcement Training

Computer Facilitated Crimes Against Children International Law Enforcement Training Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

EU support for climate training in LDCs: some examples

EU support for climate training in LDCs: some examples EU support for climate training in LDCs: some examples Tony Carritt, EU Art 6 Focal Point First Article 6 Dialogue Bonn, 10-11 June 2013 EU support in context EU is leading provider of official development

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Social determinants of health

Social determinants of health EXECUTIVE BOARD EB132/14 132nd session 23 November 2012 Provisional agenda item 7.3 Social determinants of health Report by the Secretariat 1. In May 2012, the Health Assembly in resolution WHA65.8 on

More information

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE Strasbourg, 29 November 2006 CCPE (2006) 05 Rev final CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE as approved by the Committee of Ministers

More information

AGREEMENT ON PORT STATE MEASURES TO PREVENT, DETER AND ELIMINATE ILLEGAL, UNREPORTED AND UNREGULATED FISHING

AGREEMENT ON PORT STATE MEASURES TO PREVENT, DETER AND ELIMINATE ILLEGAL, UNREPORTED AND UNREGULATED FISHING AGREEMENT ON PORT STATE MEASURES TO PREVENT, DETER AND ELIMINATE ILLEGAL, UNREPORTED AND UNREGULATED FISHING The Agreement on Port State Measures to Prevent, Deter and Eliminate Illegal, Unreported and

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

U.S. Trade Overview, 2013

U.S. Trade Overview, 2013 U.S. Trade Overview, 213 Stephanie Han & Natalie Soroka Trade and Economic Analysis Industry and Analysis Department of Commerce International Trade Administration October 214 Trade: A Vital Part of the

More information

Meeting of Commonwealth Law Ministers and Senior Officials

Meeting of Commonwealth Law Ministers and Senior Officials Meeting of Commonwealth Law Ministers and Senior Officials Gaborone, Botswana: 5 8 May 2014 Agenda Item 3(i) LMM (14)14 REPORT OF THE COMMONWEALTH WORKING GROUP OF EXPERTS ON CYBERCRIME Background Paper

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Twelfth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations

More information

WORKSHOP REPORT ON EFFECTIVE CYBERCRIME LEGISLATION IN EASTERN AFRICA DAR ES SALAAM, TANZANIA, 22-24 AUGUST

WORKSHOP REPORT ON EFFECTIVE CYBERCRIME LEGISLATION IN EASTERN AFRICA DAR ES SALAAM, TANZANIA, 22-24 AUGUST WORKSHOP REPORT ON EFFECTIVE CYBERCRIME LEGISLATION IN EASTERN AFRICA DAR ES SALAAM, TANZANIA, 22-24 AUGUST 2013 Written by Patrick Mwaita and Maureen Owor (ACCP) Executive summary Cyber criminals in East

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

Wealth Accounting and Valuation of Ecosystem Services (WAVES): a Global Partnership. Natural Capital Accounting for Sustainable Development

Wealth Accounting and Valuation of Ecosystem Services (WAVES): a Global Partnership. Natural Capital Accounting for Sustainable Development Wealth Accounting and Valuation of Ecosystem Services (WAVES): a Global Partnership Natural Capital Accounting for Sustainable Development WAVES Implementation and Funding Partnership Core Implementing

More information

Vienna, 21 March 1986

Vienna, 21 March 1986 .. NOT YET IN FORCE 3. VIENNA CONVENTION ON THE LAW OF TREATIES BETWEEN STATES AND INTERNATIONAL ORGANIZATIONS OR BETWEEN INTERNATIONAL ORGANIZATIONS Vienna, 21 March 1986 see article 85 which reads as

More information

Accounting Education a World Wide Benchmark Prof. J.P.J. (Hans) Verkruijsse PhD RE RA

Accounting Education a World Wide Benchmark Prof. J.P.J. (Hans) Verkruijsse PhD RE RA Accounting Education a World Wide Benchmark Prof. J.P.J. (Hans) Verkruijsse PhD RE RA Objective of accounting education Building a sound financial future and restoring the trust The qualification, education,

More information

2. Cyber legislation harmonization process in Central Africa

2. Cyber legislation harmonization process in Central Africa Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation

More information