In recent years, Denmark and the West in general have experienced an increase in the terrorist threat.

Size: px
Start display at page:

Download "In recent years, Denmark and the West in general have experienced an increase in the terrorist threat."

Transcription

1 In recent years, Denmark and the West in general have experienced an increase in the terrorist threat. As regards Denmark, this threat became specific last summer when the Danish Embassy in Islamabad was hit by a terrorist attack. On 02 June, a white Toyota Corolla going very fast drove up to the Embassy where it jammed the brakes and was subsequently brought to explosion approximately 5 meters from the Embassy entrance. In this suicide attack, both locally employed officers from the Embassy as well as visitors were killed by the powerful car bomb. Immediately following this attack, several officers from the Danish Security and Intelligence Service travelled to Pakistan to assist in the investigation. Shortly after, one more officer followed. The task of this employee was of a very specific nature - to improve security for the Danish officers at the Embassy, both in relation to the physical protection of the Embassy buildings and the personal security of the embassy staff. In September 2008, this particular officer was killed during a violent and cowardly terrorist attack against the Islamabad Marriott Hotel. To us in the Danish Security and Intelligence Service, his death constitutes a most tangible reminder of the situation that Denmark and a number of other countries are facing right now. We, on our part, say that today there is a general terrorist threat against Denmark which is strengthened by militant extremist groups' increased focus on Denmark and Danish interests as a target of a terrorist act. Not least the cartoons of the Prophet that were published in a Danish newspaper in 2005 have resulted in an increased focus being brought on Denmark and Danish interests as a terrorist target among leading militant extremists abroad. A reprint of these cartoons in February 2008 has increased this focus even more and this means that among these militant extremists there is a desire to carry out terrorist attacks specifically aimed at Denmark, Danish nationals and Danish interests outside Denmark. Most recently, the leader of al-qaida, Usama bin Laden, condemned these cartoons in March In September last year, al-qaida also published a long video that dealt with the cartoons and the suicide attack, for instance, against the Danish Embassy in Pakistan on 02 June Especially the reprint of the cartoons of the Prophet is used by al-qaida, both ideologically and for propaganda purposes. Statements from leading al-qaida members underline that al-qaida has a strategic focus on Denmark and contributes to maintaining militant extremists' focus on Denmark and Danish interests. The terrorist threat mainly comes from networks, groups and individuals who adhere to various forms of militant Islamist ideology. For instance, this applies to al-qaida related groups and networks in Denmark and abroad. Experience from recent years has shown that a considerable and increasing part of the militant extremists are young men born and raised in the West. They are the ones that we call "home-grown terrorists".

2 These persons are not necessarily deeply rooted in a specific conflict area but rather see themselves as part of a worldwide Muslim community which is being attacked. The so-called home-grown terrorists often form part of networks that provide a social function to each of its members, and the radicalisation processes often take place within such networks. Networks of home-grown extremists are usually characterised by being loosely structured and composed of young individuals, typically between 16 and 25 years old who are born or raised in Denmark. Some of these individuals are in contact with militant groups or persons abroad. To this should be added that there are examples that persons from Denmark have travelled to conflict areas worldwide where they have participated in militant training or actual combats against international military presence and local authorities. What worries the Danish Security and Intelligence Service and our partners is, naturally, that there is a risk that these persons return to Denmark and use their skills in connection with terrorist related activities in Denmark. In addition, we can see that there are persons and networks in Denmark who contribute to the financing of terrorist groups and terrorist activities abroad and who are involved in the recruitment of young Muslim men who are sent to Iran and Afghanistan to participate in acts of terrorism in these countries. To an increasing extent, the Internet is used by terrorist groups and terrorist networks for communication purposes, training, logistic support and operational planning and preparation. There is no doubt that the capacity to carry out a terrorist attack with relatively simple means is present in Denmark and that certain circles possess a will to carry out a terrorist attack. This is for instance underlined by several terrorist cases in recent years where various persons have been sentenced to long terms of imprisonment for terrorist activities. Even though police and security authorities are working round the clock to uncover, unravel and prevent terrorist attacks, these might take place without prior intelligence indications being present, that is without warning. This can be learnt for instance from the Madrid attacks in 2004 and the London attacks in As a modus, the terrorists typically use homemade bombs to carry out their attacks. However, the most recent development seems to indicate that larger bombs with a substantial blast effect are increasingly used. This means that also relatively protected targets could risk being attacked. We saw this, for instance, in connection with the terrorist attack against the Islamabad Marriott Hotel in September last year. Terrorists have also used other modi in relation to terrorist attacks, including hand weapons and abductions. We see that terrorist groups are constantly seeking to learn from previous attacks and to develop new and surprising types of attacks that are difficult to predict. That was the case of the Mumbai terrorist attack in November We can see that terrorists often target public transportation. This is due, not least, to the fact that this is an easily accessible target where a lot of people are gathered. Furthermore, attacks against public transportation and traffic hubs have a psychological effect on the public since these are

3 locations where large segments of the population come regularly and therefore may see themselves as potential victims. We have also seen examples of simple attacks against targets with an obvious symbolic or political value. Outside Denmark's frontiers, in certain areas, there is a considerable and recognised terrorist threat against Danish nationals and Danish interests, not least in areas where persons or interests can be immediately identified as Danish. In particular, this is the case in regions where al-qaida and al- Qaida related groups have gained a foothold, for instance in North Africa, the Middle East, Pakistan and Afghanistan and as we, accordingly, saw manifesting itself in proper acts of terrorism as with the case of the attack against the Danish Embassy in Islamabad in June last year. In my view, terrorist related abductions are a phenomenon that we should pay even more attention to. Several abduction cases within the last year have shown that there is a considerable risk of abductions taking place in various regions all over the world. In particularly, this is the case in Afghanistan and Pakistan and certain places in the Middle East and North and Africa. It is our assessment that targeted abductions, of Danish nationals also, could be initiated by militant extremist groups, not only following the cartoons of the Prophet but also in order to gain prestige and recognition within the al-qaida leadership. And to repeat what I said in my introduction - a Dane is a Dane or a Dutch is a Dutch, no matter if he is employed with the Ministry of Foreign Affairs or a private company. Although the terrorist threat to Denmark and several other countries is the most serious one at present, there are various other forms of threats that companies and authorities should decide how to act upon. These are e.g. espionage, including industrial espionage, and organized crime. This multiple threat environment is not just something that the police must handle. It also involves threats that the companies must give careful consideration to when they organise their security. The objective of the Danish Security and Intelligence Service is to monitor, prevent and counter undertakings and acts which are presumed to present a threat to the independence and safety of the lawful order of the Danish society. This means that the Danish Security and Intelligence Service is constantly accomplishing operations directed to identifying and preventing specific terrorist threats in Denmark and abroad. In addition to intensive efforts in respect of investigation and intelligence, in my view, there is a number of necessary tasks to be carried out if we are to handle the terrorist threat that we are facing. First of all, it is essential to realise that the prevention of security related threats is not a task that police and security authorities can solve on their own. Therefore, it is an important objective of the Danish Security and Intelligence Service to involve the whole society in order to protect the values that our society is built upon. Likewise, through advice, it is important to contribute to the establishment of an efficient and robust preparedness that can stand up to the threats that we are confronted with. Furthermore, it is important that we do everything we can to prevent the radicalisation that makes young people adhere to violent means and become ready to carry out acts of terrorism.

4 Consequently, we are working specifically to develop and implement concrete initiatives to prevent radicalisation in Denmark. The most important element in our effort within this field is our attempt to make all relevant authorities, players and organisations participate in this effort. As part of our efforts to activate all sectors of society in our efforts against radicalisation, we have, therefore, set up a special dialogue group through which we attempt to strengthen and expand our dialogue with representatives of ethnic minorities and religious representatives. The necessary condition for entering into a dialogue with the Danish Security and Intelligence Service is not that we agree on everything. We believe that is important that we should also have a dialogue with some of those who represent more controversial views. It is obvious, though, that there is a limit to those with whom we have a dialogue; this limit is drawn at people who adhere to violent and military extremism. In recent years, communication has been placed on the agenda as an important element in the fight against terrorism; terrorists do no only fight a violent battle. Largely, they also fight a battle of words through which they try to put forward a distinct view of the world and a conflict of interests between western societies and Muslims. We can see that terrorists attempt to justify and legitimate their acts by using a religious way of talking. For this reason, it is very important that we understand that we are also in the middle of a propaganda war that makes demands as to how we communicate and that militant Islamists handle this task extremely professionally. You may see this for yourself by watching the video that al-qaida published following the terrorist attack against the Danish Embassy in Islamabad. The video lasts for an hour and, believe me; it has not been produced in a cave up in the mountains; It is the result of a highly professional communicative effort that al-qaida has approached efficiently and with surpassing skills. Therefore, it is important that we all communicate precisely when it comes to terrorism. It is important that we do NOT play the terrorists' game. We should NOT start using the terms that the terrorists would like us to use. Moreover, it is important that we do NOT communicate in a way that, in reality, confirms the religious legitimacy and the view of the world that the terrorists are seeking to put forward. This is exactly why the Danish Security and Intelligence Service, just this week, held a conference on this subject, a conference where both Danish and international experts contributed to the debates. In other words, communication does have a significant impact on the current threat and therefore plays a key role in the battle for the hearts and minds in our effort to undermine terrorist networks. And we must bear in mind that this battle is being fought in a globalized media environment where the way we talk about terrorism in for instance Denmark or Switzerland is likely to go around the world in a matter of minutes. Apart from communicating precisely, it is also important to the Danish Security and Intelligence Service that we constantly try to adapt our work methods and the way we handle the threat to the threat picture at any given time.

5 The threat picture we are currently facing means that we - to a much greater extent - have to relate to a threat aimed at Danish embassies, Danish companies and Danish citizens abroad. The consequence is that we, to a much higher degree, must be prepared for working abroad and for co-operating with foreign authorities in order to protect Danish interests. That is why the Danish Security and Intelligence Service has decided to strengthen its operational capacity abroad and why an international security team is established now. The international security team will consist of staff members who - for shorter or longer periods - can be deployed as security advisers to Danish diplomatic representations, for example if the threat against a Danish embassy increases suddenly and significantly. In this connection the job of the deployed staff members is to increase the security related to the threat that has occurred - partly through specific security and investigational measures and partly through a co-operation with the local authorities. Along with the establishment of the international security team we also intend to expand our security advising to Danish authorities and Danish companies to also include security related issues abroad. The security advising will, in particular, concern physical security, information security and staff security. The expansion of our security advising to Danish authorities and companies is to supplement the already existing security advising. Since 2003, the Danish Security and Intelligence Service has had several contact groups, and in 2008 we further streamlined this concept so that today the Danish Security and Intelligence Service runs one transverse dialogue group. The very fact that we have gathered the public and private actors in one transverse dialogue group is an expression of how the Danish Security and Intelligence Service does not distinguish between public and private when it comes to the security related threats we face today. The purpose of this forum is to increase the overall resistance of society against security related threats, including terrorism, the spreading of weapons of mass destruction, extremism and espionage. In this forum various companies and authorities receive generally oriented advice, and the goal is to encourage a transverse security culture among the various actors. This does not mean that the Danish Security and Intelligence Service can and must advise all companies and authorities. We are, first and foremost, an intelligence service. However, we do try to offer specific advice in order to reduce the vulnerability of the critical national infrastructure when it comes to terrorism and espionage. What we as an intelligence service are able to offer is to create a framework which the companies and authorities can use in their security related work. This also means that we do not regard the intelligence service as a competitor to the many private security companies that already offer valuable advice. I will now turn to the more general security related implications of the terrorist threat when it comes to private companies and organisations. And finally, I will dare make an attempt at some more general recommendations regarding crisis handling even if I know that this is an area where one has to be at one's best to teach this expert assembly anything.

6 And this makes me repeat what I said at the beginning: terrorist attacks do not distinguish between governmental and private casualties! The overall objective of terrorists is, among others, to destabilize the legal order of society and create fear and distrust in the governments and the law makers of the western countries and the decision makers, thus trying to force through certain actions or even clear the way for a political and religious change of system. Precisely because terrorists typically focus on this issue, it is often the misunderstanding that terrorism solely concerns government institutions and public authorities. But terrorism - and not least a terrorist attack -has a huge impact on large parts of society and which can result in a number of serious derived effects - also for private companies and organizations. A terrorist attack against, for example, the bus or train traffic will cause a panic which could easily spread to other parts of the transport sector. A terrorist attack that hits the energy sector might cause completely immeasurable consumer reactions which will put a long row of other industries under various forms of pressure. An attack against the financial sector might potentially make the consumers loose faith in the stock market - again with many consequences for the companies. Add to this the risk of industrial espionage which is not just a threat against state safety but may also have major consequences for the earnings and, ultimately, the survival of the companies. On top of all this one must also take into account the effect of the political reactions following a terror attack - these may very easily result in major consequences for the private sector. Therefore, it is important that the companies cerate a robust emergency response plan which is able to act efficiently and swiftly in case a crisis situation occurs, both for the sake of the companies themselves and also - as I said earlier - because a security aware and robust private sector is a very important part of society's overall resistance. Both when it comes to preventing terrorist acts and when the aftermath of a terrorist attack is to be handled efficiently. Add to this that an efficient emergency response plan does, of course, not only deal with terrorism, espionage and extremism. Today, companies face a broad spectrum of threats ranging all the way from climate changes and natural disasters to the kidnapping of employees with the purpose of blackmailing these companies. My recommendation is, therefore, that the companies - and the company leaders in particular - must take the planning of an emergency response even more seriously. Of course, I know that I do not have to mention it to this competent assembly, and that is also why I stress that it is the responsibility of the company leaders to lift this task. In order to establish an efficient emergency response plan, it is absolutely central that this task is solidly rooted in the top management, that the management is committed to and favours the preparation and exercises, and that the management leads the way with a good example. Because while a deliberate security culture must come from the top of the organisation, it is often the employees who must make it happen. And the employees will pick up on it immediately if the management is sending signals which can be interpreted as if security issues are not to be taken seriously. It is, therefore, important that a point is made of emergency response plans and security

7 measures that agreed policies and rules are enforced, and that any breach of these will have consequences. It is also crucial that the emergency response plans that are drawn up are both simple and robust. And it is also important that they are based on daily routines. We are impelled to make detailed emergency response plans because they create the illusion that we - as a company or organization - are able to plan for everything. But this is unrealistic. And when an emergency situation then occurs, the detailed crisis plan will seem impossible to get an overall view of. This will limit independent thinking and vital improvisation which are so important when it really counts. One of the most frequently used clichés is "Practice makes perfect". But as is the case with many other clichés, it has become so popular simply because it is true. And that practice makes perfect is especially true when it comes to crisis management. The emergency response plans should be tested and carried out as exercises - not just once in a while but on a regular basis so that they are firmly fixed in the heads of the employees and, at best, become instinctive reactions. Exercises often seem abstract to the employees. It is, therefore, important to implement the emergency response plans in connection with real but minor crises even though they were originally intended to be a worst case scenario. Thus, the company is better prepared during major crises. As you know crises often develop in an unpredictable manner and they may become very prolonged. That is why an important part of the emergency response plan must be the establishment of an "emergency crisis staff" which means that the crisis staff can be replaced along the road so that those who are to make the decisions, do not get tired out. As important as it is to have a good emergency response plan it is equally important to prevent internal threats against the security of the company. When companies and authorities are to hire new employees they, first and foremost, look for the applicant who is best qualified for the job. In such a situation there are all too many who do not take the security aspect into consideration. Still, it is a sound investment to think about security when hiring employees who are to have access to research results, business strategies, security and emergency response plans or other forms of sensitive or confidential material, for example, at an airport or within the chemical or medical industry. Mapping out the background of the applicant will reduce the risk of letting individuals into the organization who may illegally attempt to gather and pass on information which can be used for terror or espionage purposes. Among other things, this can be done by taking a closer look at the credibility of the applicant and by focusing on the applicant's integrity and personal stress limit during the actual job interview. I also want to mention the risk of contributing towards the spreading of products or knowledge that can be used in connection with chemical, biological, nuclear and radiological weapons.

8 At least 20 countries have developed or are suspected of attempting to develop weapons of mass destruction. These countries are mainly concentrated in the Middle East, North Africa and South and South East Asia. These countries see the possession of weapons of mass destruction as essential to their national security interests. Therefore, the companies must be especially aware when they are in contact with partners in countries that are suspected of attempting to develop weapons of mass destruction. This is particularly the case when looking at the export of products that can be used within both a civilian and a military context - the so-called dual-use products. Attempts will often be made to buy such products indirectly via front companies and middlemen in order to cover up who the actual user of the products is. And it is not just countries but also terrorist networks that may be active within this area. In order to limit the risk of becoming an accessory to the spreading of products that can be used for weapons of mass destruction, it is essential that companies and research institutes have an actual export control policy. That means a clear internal distribution of responsibility, fixed procedures for the handling of export control cases and awareness when it comes to countries that are sensitive in relation to export control. Security, as you all know, costs money. And there is a constant need to ensure efficiency. Therefore I call for "intelligent security" as another cornerstone of building efficient emergency response plans. They must be based on real-time threat assessments and thorough analyses of vulnerability. Generally speaking, we cannot protect everything all the time, so we need to know which of our vulnerabilities are critical and likely to be targeted. Furthermore, our emergency response plans must be flexible and adjustable, not only in order to be quickly adaptable to changes in current threat levels, but also to be cost-efficient. I have made a point today of stressing the importance of acknowledging especially the relevance of the terrorist threat to private companies. But I would like to make one final point by emphasizing that threats against private companies can also pose serious threats to national security. That is particularly true when we talk about industrial espionage where for instance the theft of advanced technology may cause a shift in the balance of power between nations.

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

EUROBAROMETER 72 PUBLIC OPINION IN THE EUROPEAN UNION

EUROBAROMETER 72 PUBLIC OPINION IN THE EUROPEAN UNION Standard Eurobarometer European Commission EUROBAROMETER 72 PUBLIC OPINION IN THE EUROPEAN UNION AUTUMN 2009 NATIONAL REPORT Standard Eurobarometer 72 / Autumn 2009 TNS Opinion & Social June 17, 2003 EXECUTIVE

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework. United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering

More information

Manifesto for Education Empowering Educators and Schools

Manifesto for Education Empowering Educators and Schools Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments

More information

CONTEST: The United Kingdom s Strategy for Countering Terrorism

CONTEST: The United Kingdom s Strategy for Countering Terrorism CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new

More information

Building Partnerships, Staying Safe. The health sector contribution to HM Government s Prevent strategy: guidance for healthcare workers

Building Partnerships, Staying Safe. The health sector contribution to HM Government s Prevent strategy: guidance for healthcare workers Building Partnerships, Staying Safe The health sector contribution to HM Government s Prevent strategy: guidance for healthcare workers DH INFOrmaTION reader BOX Policy HR/Workforce Management Planning/

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Security Council. United Nations S/2008/434

Security Council. United Nations S/2008/434 United Nations S/2008/434 Security Council Distr.: General 3 July 2008 Original: English Special report of the Secretary-General pursuant to Security Council resolution 1806 (2008) on the United Nations

More information

Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets

Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets Federal Department of Finance FDF State Secretariat for International Financial Matters SIF Multilateral Affairs Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets

More information

Ensuring protection European Union Guidelines on Human Rights Defenders

Ensuring protection European Union Guidelines on Human Rights Defenders Ensuring protection European Union Guidelines on Human Rights Defenders I. PURPOSE 1. Support for human rights defenders is already a long-established element of the European Union's human rights external

More information

Identification of a problem, e.g., an outbreak Surveilance Intervention Effect

Identification of a problem, e.g., an outbreak Surveilance Intervention Effect EPIDEMIOLOGY EPIDEMIOLOGY Epidemiology is a cornerstone of the control of infectious diseases. Statens Serum Institut s epidemiological activities cover a wide field, from surveillance of diseases and

More information

The European Security Strategy Austrian Perspective

The European Security Strategy Austrian Perspective Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and

More information

EUROPEAN UNION COMMON POSITION ON UNGASS 2016

EUROPEAN UNION COMMON POSITION ON UNGASS 2016 EUROPEAN UNION COMMON POSITION ON UNGASS 2016 UNGASS 2016 is a key opportunity for the international community to take stock of the achievements of the international drug control system to date, to elaborate

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

cprax Internet Marketing

cprax Internet Marketing cprax Internet Marketing cprax Internet Marketing (800) 937-2059 www.cprax.com Table of Contents Introduction... 3 What is Digital Marketing Exactly?... 3 7 Digital Marketing Success Strategies... 4 Top

More information

Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006

Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 The views expressed in this paper are those of the author(s) only, and the presence of them, or of links

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media

More information

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

Guidelines on SPECIAL BRANCH WORK in the United Kingdom Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence

More information

Minor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group.

Minor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group. Development of the German Federal Criminal Police Office Check the Web project, which was originally launched to monitor the Internet, into a referral unit for unpleasant content Minor Interpellation tabled

More information

Svenska Handelsbanken AB FI Ref. 13-1783 through Chair of Board Service no. 1. Finansinspektionen's decision (to be issued on 19 May 2015 at 08.

Svenska Handelsbanken AB FI Ref. 13-1783 through Chair of Board Service no. 1. Finansinspektionen's decision (to be issued on 19 May 2015 at 08. 18 May 2015 DECISION Svenska Handelsbanken AB FI Ref. 13-1783 through Chair of Board Service no. 1 106 70 STOCKHOLM Remark and administrative fine Finansinspektionen's decision (to be issued on 19 May

More information

The Danish Prison and Probation Service

The Danish Prison and Probation Service The Danish Prison and Probation Service De-radicalisation Background Over the past ten years Denmark has seen a new group of criminals previously not encountered in Danish institutions. We now have a group

More information

Talking to our children about Violence and Terrorism: Living in Anxious times

Talking to our children about Violence and Terrorism: Living in Anxious times Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

A Speech by. His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations. to the

A Speech by. His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations. to the A Speech by His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations to the 59 th Session of the UN General Assembly New York, 30 September 2004 (check

More information

The Need for Strategic Planning for Project Management

The Need for Strategic Planning for Project Management 1 The Need for Strategic Planning for Project Management INTRODUCTION For more than 40 years, American companies have been using the principles of project management to get work accomplished. Yet, for

More information

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Business Continuity Management Systems. Protecting for tomorrow by building resilience today Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power

More information

Terrorist or freedom fighter or..?

Terrorist or freedom fighter or..? Learning outcomes Students will practice arguing and understanding views which are not necessarily their own Students will gain an understanding of how history can judge events in a different way from

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business

More information

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013 Report to the Public Accounts Committee on mitigation of cyber attacks October 2013 REPORT ON MITIGATION OF CYBER ATTACKS Table of contents I. Introduction and conclusion... 1 II. How government bodies

More information

Fundamentals Explained

Fundamentals Explained Fundamentals Explained Purpose, values and method of Scouting Item Code FS140099 July 13 Edition no 2 (103297) 0845 300 1818 Fundamentals Explained This document contains detailed information on Fundamentals

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

THE CATHOLIC UNIVERSITY OF AMERICA Center for Global Education Washington, D.C. 20064 202-319-5618 Fax: 202-319-6673

THE CATHOLIC UNIVERSITY OF AMERICA Center for Global Education Washington, D.C. 20064 202-319-5618 Fax: 202-319-6673 THE CATHOLIC UNIVERSITY OF AMERICA Center for Global Education Washington, D.C. 20064 202-319-5618 Fax: 202-319-6673 CUA Overseas Crisis Management Protocol as of December 5, 2011 Crises are always a potential

More information

Poland s experience in trade and solutions of export promotion

Poland s experience in trade and solutions of export promotion Poland s experience in trade and solutions of export promotion Patryk Toporowski, Polish Institute of International Affairs (PISM) Poland since the accession to the EU noted and acceleration in the economic

More information

How To Help The War On Terror

How To Help The War On Terror NATO s Weapons of Mass Destruction Forensics Conference by Arne Thomas WgCdr Jonathan Archer Executive Summary NATO s Comprehensive Strategic Level Policy for Preventing the Proliferation of Weapons of

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

Management Information & KPIs: How and why to use information effectively in the Financial Services sector. Research White Paper

Management Information & KPIs: How and why to use information effectively in the Financial Services sector. Research White Paper Management Information & KPIs: How and why to use information effectively in the Financial Services sector Research White Paper Index 1 3 4 5 6 7 8 9 10 Introduction The commercial importance of Management

More information

Changes in modus operandi of Islamic State terrorist attacks

Changes in modus operandi of Islamic State terrorist attacks Europol Public Information Changes in modus operandi of Islamic State terrorist attacks Review held by experts from Member States and Europol on 29 November and 1 December 2015 The Hague, 18 January 2016

More information

THE IMPACT OF THE DANISH LAW ON CSR REPORTING. A study by DanWatch - November 2011

THE IMPACT OF THE DANISH LAW ON CSR REPORTING. A study by DanWatch - November 2011 THE IMPACT OF THE DANISH LAW ON CSR REPORTING A study by DanWatch - November 2011 Table of contents 1. Summary and key findings 2. Background 3. Part A: To what extent have the companies covered by the

More information

Has globalisation made us more catastrophe-prone?

Has globalisation made us more catastrophe-prone? 1 South Evaluation Africa sheet The 5 Rainbow Nation 1 After you have tested your skills in the mock exam on pages 110 111 in your textbook, fill in the self-assessment evaluation sheet below. If you think

More information

Supporting Young Individuals with Ideas: a Case Study of a Swedish Entrepreneurship Programme

Supporting Young Individuals with Ideas: a Case Study of a Swedish Entrepreneurship Programme Multi-Year Expert Meeting on Enterprise Development Policies and Capacity-building in Science, Technology and Innovation (STI) (Fourth session) Geneva, 16-18 January 2012 Supporting Young Individuals with

More information

Ensuring the Protection Aid Workers: Why a Special Mandate Holder is Necessary

Ensuring the Protection Aid Workers: Why a Special Mandate Holder is Necessary www.protectaidworkers.org Florian Seriex / ACF Jordanie Ensuring the Protection Aid Workers: Why a Special Mandate Holder is Necessary Discussion Paper Strengthening the protection of aid workers goes

More information

MARITIME CRIME AND THE EFFECTS ON GROWTH AND DEVELOPMENT IN THE AFRICAN REGION SEMINAR REPORT

MARITIME CRIME AND THE EFFECTS ON GROWTH AND DEVELOPMENT IN THE AFRICAN REGION SEMINAR REPORT MARITIME CRIME AND THE EFFECTS ON GROWTH AND DEVELOPMENT IN THE AFRICAN REGION SEMINAR REPORT SUMMARY On October 7 th 2014, more than 90 maritime security experts from the public and private sectors met

More information

FREEDOM OF INFORMATION REQUEST

FREEDOM OF INFORMATION REQUEST FREEDOM OF INFORMATION REQUEST Request Number: F 2011 01978 Keyword: Crime Subject: Cameras Request and Answer: Question There appears to be a load of new cameras appearing outside police stations and

More information

Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice

Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress

More information

Action plan to prevent problem gaming and problem gambling

Action plan to prevent problem gaming and problem gambling Action plan Action plan to prevent problem gaming and problem gambling (2009-2011) Action plan Action plan to prevent problem gaming and problem gambling (2009-2011) Preface The range and the accessibility

More information

Building Public Trust: Ethics Measures in OECD Countries

Building Public Trust: Ethics Measures in OECD Countries Building Public Trust: Ethics Measures in OECD Countries Annex 1998 Recommendation of the OECD Council on Improving Ethical Conduct in the Public Service, 36 Including Principles for Managing Ethics in

More information

epp european people s party

epp european people s party Protecting refugees - securing the EU s external borders - sting up action against irregular migration Adopted by the EPP Summit 23 September 2015 01 Protecting refugees - securing the EU s external borders

More information

THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT

THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT THE CHALLENGE The aviation system, essential to the U.S. economy, its quality of life, and national security, is in a sustained period of economic growth. As the system grows, so do the opportunities for

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325 Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil

More information

High Schools That Work: How Improving High Schools Can Use Data to Guide Their Progress

High Schools That Work: How Improving High Schools Can Use Data to Guide Their Progress High Schools That Work: How Improving High Schools Can Use Data to Guide Their Progress In our book, The Power of Focus, we encourage all governmental, nonprofit, and for-profit groups that are working

More information

To use the Muslim concept of Jihad to understand Muslim attitudes to war.

To use the Muslim concept of Jihad to understand Muslim attitudes to war. To use the Muslim concept of Jihad to understand Muslim attitudes to war. Grade C All will be able to describe the meaning of greater and lesser JIHAD. Grade B Most will be able to explain why the concept

More information

100 Ways To Improve Your Sales Success. Some Great Tips To Boost Your Sales

100 Ways To Improve Your Sales Success. Some Great Tips To Boost Your Sales 100 Ways To Improve Your Sales Success Some Great Tips To Boost Your Sales 100 Ways To Improve Your Sales Success By Sean Mcpheat, Managing Director Of The Sales Training Consultancy What makes a successful

More information

Danish Emergency Management Agency. Crisis Management in Denmark

Danish Emergency Management Agency. Crisis Management in Denmark Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45

More information

Ten Steps for Preventing a terrorist Attack

Ten Steps for Preventing a terrorist Attack WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

More information

Business @ the Speed of Thought

Business @ the Speed of Thought Bill Gates About the author Bill Gates wrote his first software program when he was thirteen years old. Two points about the experience seem clear. First, the ability to control something huge at a time

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

INTERNATIONAL CONFERENCE SUSTAINABLE DISARMAMENT FOR SUSTAINABLE DEVELOPMENT THE BRUSSELS CALL FOR ACTION. 13 October 1998, Brussels, Belgium

INTERNATIONAL CONFERENCE SUSTAINABLE DISARMAMENT FOR SUSTAINABLE DEVELOPMENT THE BRUSSELS CALL FOR ACTION. 13 October 1998, Brussels, Belgium INTERNATIONAL CONFERENCE SUSTAINABLE DISARMAMENT FOR SUSTAINABLE DEVELOPMENT THE BRUSSELS CALL FOR ACTION 13 October 1998, Brussels, Belgium The international Conference on Sustainable Disarmament for

More information

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate UN Human Rights Council UNITED KINGDOM 2014-2016 candidate The UK is a passionate, committed and effective defender of human rights. We are seeking election to the UN Human Rights Council for the term

More information

How to audit your business strategy

How to audit your business strategy How to audit your business strategy Andrew Carey Why conduct a business strategy audit? Nearly all the major initiatives undertaken by corporate executives today are called strategic. With everything having

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Tuomioja commenced the event by welcoming Mogherini and presenting the theme of the day: Europe and the construction of peace.

Tuomioja commenced the event by welcoming Mogherini and presenting the theme of the day: Europe and the construction of peace. EU as a peacebuilder? 5.3.2015 Eurooppasali, Helsinki Tuomioja commenced the event by welcoming Mogherini and presenting the theme of the day: Europe and the construction of peace. Scepticism about the

More information

Australian Citizenship

Australian Citizenship Australian Citizenship Your Right, Your Responsibility 1 Commonwealth of Australia 2014 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia licence

More information

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

CHAPTER 13: International Law, Norms, and Human Rights

CHAPTER 13: International Law, Norms, and Human Rights CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?

More information

CASES FORWARDED WITH REGARD TO CORRUPTION

CASES FORWARDED WITH REGARD TO CORRUPTION BELGIAN FINANCIAL INTELLIGENCE PROCESSING UNIT CTIF-CFI Avenue de la Toison d Or - Gulden Vlieslaan 55/1-1060 Brussels - BELGIUM Tel.: + 32 (0)2 533 72 11 Fax: + 32 (0)2 533 72 00 E-mail: info@ctif-cfi.be

More information

How to Start a Film Commission

How to Start a Film Commission How to Start a Film Commission Starting a film commission is not really any different than starting any new business. You will need to so some research, develop a plan of action, and find people who are

More information

The White House CVE Summit

The White House CVE Summit The White House CVE Summit February 17-20/2015 Washington DC 1. CVE Roundtable with Vice- President Biden + three American cities (17 th feb.) 2. Meeting with Homeland Security & IA (18 th feb.) Presentation:

More information

Youth Crime: Causes and Remedies

Youth Crime: Causes and Remedies MPRA Munich Personal RePEc Archive Youth Crime: Causes and Remedies Muhammad Ali June 2008 Online at http://mpra.ub.uni-muenchen.de/17223/ MPRA Paper No. 17223, posted 11. September 2009 06:31 UTC Essay

More information

Adopted by the Security Council at its 5430th meeting, on 28 April 2006

Adopted by the Security Council at its 5430th meeting, on 28 April 2006 United Nations S/RES/1674 (2006) Security Council Distr.: General 28 April 2006 Resolution 1674 (2006) Adopted by the Security Council at its 5430th meeting, on 28 April 2006 The Security Council, Reaffirming

More information

E-Government Chair Research Project The use of social media for effective public engagement. Case Study - NZ Transport Agency: Drugged drivers

E-Government Chair Research Project The use of social media for effective public engagement. Case Study - NZ Transport Agency: Drugged drivers E-Government Chair Research Project The use of social media for effective public engagement Case Study - NZ Transport Agency: Drugged drivers Author: Summary New Zealand Transport Agency (NZTA) uses a

More information

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such

More information

Governance issues for boards to consider in 2016 March 2016

Governance issues for boards to consider in 2016 March 2016 Governance issues for boards to consider in 2016 March 2016 1 Contents Page Introduction 3 Cyber security 3 Emerging technologies 3 Board skills, composition and diversity 4 Shareholder activism 4 Corporate

More information

ESSA Q3 2015 INTEGRITY REPORT

ESSA Q3 2015 INTEGRITY REPORT ESSA Q3 2015 INTEGRITY REPORT EDITORIAL Working in partnership with our stakeholders has always been at the core of ESSA s approach to protecting the integrity of sport, consumers and regulated betting

More information

GLOBALIZATION INTERNATIONAL BUSINESS

GLOBALIZATION INTERNATIONAL BUSINESS GLOBALIZATION INTERNATIONAL BUSINESS OBJECTIVES To define globalization and international business and how they affect each other To understand why companies engage in international business and why international

More information

This Report Brought To You By:

This Report Brought To You By: This Report Brought To You By: Gregory Movsesyan SoftXML - Target your market audience Visit Us At: http://www.softxml.com 1 Legal Notice While attempts have been made to verify information provided in

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Syria: Civil-military relations during civil war

Syria: Civil-military relations during civil war Military Studies Magazine Syria: Civil-military relations during civil war by major Lars Cramer-Larsen Royal Danish Defence College & professor Bertel Heurlin University of Copenhagen Photo: Colourbox

More information

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING The crucial role of young women and men in advancing intercultural dialogue and understanding is increasingly recognized within the global development agenda.

More information

TOWARDS PREVENTING VIOLENT RADICALISATION

TOWARDS PREVENTING VIOLENT RADICALISATION TOWARDS PREVENTING VIOLENT RADICALISATION PRACTICE GUIDELINES WORKING WITH VIOLENT EXTREMISTS With support from the Prevention of and Fight against Crime Programme of the European Union, European Commission

More information

COMMITTEE ON CULTURE, SCIENCE AND EDUCATION

COMMITTEE ON CULTURE, SCIENCE AND EDUCATION Updated 24 June 2009 COMMITTEE ON CULTURE, SCIENCE AND EDUCATION Hearing on Islam, Islamism and Islamophobia in Europe Rapporteur: Mr Mogens Jensen, Denmark, Socialist Group Copenhagen, Tuesday, 8 September

More information

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance This article was written by Thiagarajan Natarajan, Senior Underwriter Specialty Lines

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper

Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper Background The UN Global Counter-Terrorism Strategy, unanimously adopted in September 2006 by the UN General

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

Filing a Form I-360 Self-Petition under the Violence Against Women Act

Filing a Form I-360 Self-Petition under the Violence Against Women Act Filing a Form I-360 Self-Petition under the Violence Against Women Act Prepared by: Northwest Immigrant Rights Project http://www.nwirp.org 615 Second Avenue, Suite 400 Seattle, Washington 98104 (206)

More information

REPUBLIC OF PORTUGAL. MINISTRY OF PUBLIC WORKS, TRANSPORT AND COMMUNICATIONS The Minister's Office

REPUBLIC OF PORTUGAL. MINISTRY OF PUBLIC WORKS, TRANSPORT AND COMMUNICATIONS The Minister's Office ADDRESS GIVEN BY THE MINISTER FOR PUBLIC WORKS,TRANSPORT AND COMMUNICATIONS Mr Mário Lino at the Conference on The EU Internal Market for Postal Services Creating it Together Brussels, 24 June 2008, 11.20

More information

SECURITY / INTELLIGENCE / CONSULTING

SECURITY / INTELLIGENCE / CONSULTING SECURITY / INTELLIGENCE / CONSULTING Hayes Group International (HGI) is a global security and intelligence consulting and advisory firm specializing in emerging and frontier markets. Focused on development

More information

Does NATO s Article V Genuinely Protect Its Members?

Does NATO s Article V Genuinely Protect Its Members? Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

More information

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

Mass Gatherings Medical Strategies for Weapons of Mass Destruction Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information