First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing

Size: px
Start display at page:

Download "First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing"

Transcription

1 Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing May 2014 Marrakech, Morocco Summary Hosted by the Netherlands and Morocco, this meeting brought together more than 80 law enforcement, border security, and information sharing practitioners and policy makers from 19 GCTF members, the UN, INTERPOL, and Hedayah, to develop recommendations for addressing the complex challenge of Foreign Terrorist Fighters (FTF) individuals who leave their home countries to participate in conflicts abroad and join terrorist organizations, acquiring skills and an ideological commitment that could be used in acts of terrorism in their home countries or elsewhere. The first of two expert meetings designed to build upon the opening meeting of the initiative in The Hague on February 2014, this meeting focused on the legal and administrative responses to recruitment and facilitation, travel and fighting, and return to country of origin. (The second expert meeting, to be held in Abu Dhabi in June 2014, will focus on detecting and intervening against violent extremism leading to FTF activity, as well the rehabilitation and reintegration aspects of return.) The initiative will produce a set of non-binding recommendations for addressing the FTF phenomenon that is expected to be adopted at the GCTF high-level meeting in New York in September To provide the basis for expert discussions, several delegations briefed on aspects of their response to FTF recruitment, travel, and return. The Netherlands presented its analytical framework for assessing the risk of FTF returnees. Spain described a law-enforcement operation in cooperation with Morocco against an FTF facilitation network. France briefed on its recently adopted action plan to deal with the FTF phenomenon. The UK described its approach to detecting and responding through prosecution if warranted to FTF returnees. Key cross-cutting themes from the meeting include the following: For information sharing, quality and timeliness are key. Although the quantity of information shared is important, participants emphasized that getting the right information to the right authorities in time for them to act is critical. Moreover, there was general agreement on the need for more sharing of threat analysis on FTFs. The Internet is a powerful tool both for FTF recruiters and for states seeking to prevent and interdict FTFs. Participants agreed the Internet is feeding the FTF phenomenon, especially, but not exclusively, in Syria. But they noted that the extensive

2 - 2 - use by extremist groups of open social media platforms provides an opportunity for states to lawfully gather information and intelligence about FTFs. Successful action against FTFs before they depart and/or when they return requires both an appropriate legal and administrative framework and pragmatism by prosecutors and other relevant officials. Given the difficulty of obtaining admissible evidence of terrorist acts from the battlefield, it was noted that states need laws criminalizing preparatory acts, and should also consider making travel abroad to participate in a conflict a crime, as some states have already done. Investigators and prosecutors also need to be inventive in lawfully employing all tools available to secure evidence. It was noted that many states are using administrative powers to curb FTF travel as well. Border security and control are central to dealing with the FTF phenomenon. FTFs may be most vulnerable to interdiction during international travel, when they must as a matter of course come into contact with law enforcement, including border officials who often have powerful search authorities. Participants agreed that enhanced information sharing and training of border officials would help states take better advantage of this FTF vulnerability. Summary The following is a thematic summary of the workshop. It is not intended to be a transcript of the proceedings. Opening Remarks Morocco and the Netherlands opened by noting that the FTF phenomenon is a global challenge requiring a comprehensive and strategic response that transcends any particular conflict zone. They said that the GCTF offers a trusted platform for countries to share information and good practices in an effort to craft such a response. Session 1: General Reflections/Case Studies by Delegations on the FTF Phenomenon The Netherlands opened with a returnee case study to illustrate the complexity of the FTF challenge and illustrate the benefits of using a comprehensive analytic framework for assessing risk and determining an appropriate response. The Dutch case study, using a composite returnee from the Syrian conflict based on a number of actual returnees, illustrated how a CT analysis unit can draw from a wide range of sources to build a detailed profile of individual returnees, as well as the returnee population. These profiles, which include, inter alia, an individual s radicalization history, activity in conflict zones, and social support network at home, help determine the intervention strategy for a given returnee. A number of delegations offered general reflections that highlighted several key features of the FTF challenge and response. Turkey, Russia, Jordan, and China emphasized the importance of sharing information and risk assessments about returnees with other states. INTERPOL and Canada noted the value of analysis that enables states to intervene before would-be FTFs travel to conflict zones, which some countries, including Canada, may do in accordance with their

3 - 3 - national laws. The United States and Qatar were among the states emphasizing the need for a legal framework to enable prosecution of high-risk returnees. The United States added that having an effective process for designating terrorist organizations can mitigate the challenge of obtaining evidence from conflict zones by requiring evidence only of support to a designated terrorist group including participating in training rather than of participation in an actual terrorist act. The UK said placing returnees in risk bands has helped it develop standardized responses, and suggested that states may benefit from harmonizing their risk assessments and responses to returnees. Indonesia noted the difficulty of detecting FTF departures and returns due to challenges in controlling its long maritime borders. It also cited the challenge of fake passports. Saudi Arabia said it has found success placing returnees in its national rehabilitation and reintegration center. Session 2: Recruitment and Facilitation Participants identified a number of challenges to identifying and interdicting recruitment and facilitation networks for FTFs, notably the emergence of hybrid models of recruitment and facilitation driven by the Internet. Traditional recruitment and facilitation networks operated by established terrorist organizations targeting specific communities persist in some settings, and pure Internet-only self-radicalization may occur. However, in between these two extremes are hybrid models that take advantage of the Internet s scale and anonymity while retaining some elements of the traditional model, such as ethnic or linguistic affinity. FTF video clips from Syria are one aspect of this phenomenon; how-to guides for avoiding detection while traveling to Syria to join a fighting group are another. These tools present not only challenges, but opportunities for authorities, who can use FTFs activity on the Internet to gather both intelligence about travel patterns and evidence for eventual prosecution. The following preliminary recommendations emerged from the discussions: Reach out to communities to develop awareness of the FTF threat and build resilience to extremist messages. Members of communities targeted for recruitment may not be aware of Internet-based or in-person recruitment of FTFs. Community awareness briefings and table-top exercises enable the communities themselves to develop effective responses to FTF recruitment, and help establish the trust needed for community members to share information about FTFs with authorities. Incorporating culturally sensitive specialists, such as psychologists and social-service providers, into community engagement is another good practice. 1 Gather and fuse detailed information from law enforcement, communities, and social media to detect recruitment and facilitation. States can obtain information about known and suspected FTFs from time-tested law enforcement techniques such the use of wiretaps and confidential informants, and also from lawful monitoring of social media platforms and interviews with family and community members. States should share this information with local authorities, other national agencies, and bilateral and multilateral partners in order to aid in the identification and interdiction of recruitment 1 See the GCTF Good Practices for Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism for more on community outreach.

4 - 4 - and facilitation networks. In many cases, this is simply a matter of making better use of existing information-sharing platforms. Pool resources and collaborate with the private sector to curb online recruitment of FTFs. States that have the legal authorities and resources to monitor online FTF recruitment and facilitation should pool their resources and share analysis through trusted mechanisms such as Europol. Moreover, states should collaborate with reputable Internet companies to take action against websites and social-media users who violate the companies terms of service by engaging in criminal behavior. Session 3: Travel and Fighting Participants identified a number of challenges to identifying and interdicting FTFs while they travel to conflict zones, take part in training and fighting, and return from conflict zones to their countries of origin or travel to third countries. Because a high proportion of FTFs are not known to authorities before they travel, it may be difficult to detect when they enter the international travel system and to provide other states sufficient warning to interdict them en route. For those FTFs entering conflict zones by land from neighboring states, additional challenges may arise from the presence of large refugee populations, the remoteness of some land borders, and the lack of effective border control in the conflict zone. The following preliminary recommendations emerged from the discussions: Exploit airports as a chokepoint for FTF travel. States should make better use of existing information systems, such as INTERPOL s databases and the EU s Schengen Information System (SIS), and should deploy new tools if necessary to share advanced passenger information (API) and passenger name records (PNR) in time for other transit states to take action against suspected FTFs. Moreover, states should develop and refine air travel watchlists to account for the particular characteristics of FTF travel. Further, states should consider using sophisticated and specialized tools such as behavioral analysis and travel-pattern analysis to identify FTF travelers and their likely routes. States can also partner more effectively with private-sector entities at airports, including private security companies. Finally, as there is evidence countering violent extremism (CVE) messaging is effective at the point of travel, states should consider using CVE messaging at airports. Use all available tools to prevent the misuse of travel documents for FTF travel. States should use all available tools including administrative and judicial action where appropriate and greater sharing of information about dual citizens to deny suspected FTFs the ability to travel to conflict zones. At the same time, states should take all possible steps to mitigate the use of stolen or forged passports, including by making greater use of INTERPOL s lost and stolen passport database, and by implementing international standards for the use of biometric information. Build the capacity of states neighboring conflict zones to prevent FTF travel across land borders. So-called neighbor states face the most acute challenge in controlling FTF travel, and several Turkey and Jordan, for example have taken extensive measures to stem the flow of FTFs across land borders. In addition to high-technology measures such as networked cameras and aerial surveillance, states can apply many

5 - 5 - effective low-technology approaches, such as varying patrol times and taking advantage of the knowledge of local communities about routes used by FTFs and other illicit actors. Finally, the ability of neighbor states to interdict FTFs depends upon the timely sharing of information about FTF travel by origin and transit states. Sessions 4 and 5: Remarks by Conference Chairperson The meeting co-chairs recapped the Day One discussions, grouping comments and recommendations under four general rubrics: (1) information sharing; (2) the role of the Internet; (3) the need for a legal and administrative framework; and (4) border security and control. Session 6: Return Participants identified a number of challenges to detecting FTFs when they return from conflict zones and either prosecuting them, referring them to prevention, disengagement, and rehabilitation programs, or a combination of the two. [Note: The content and structure of prevention, disengagement, and rehabilitation programs for FTF returnees will be discussed in greater detail at the second expert meeting of the FTF Initiative in June 2014 in Abu Dhabi.] The following preliminary recommendations emerged from the discussions: Use as wide as possible a range of information sources to anticipate and detect returns. FTFs often plan their returns in advance, discuss them in open social media platforms, and make arrangements for their own reintegration such as airport pickups, medical appointments, and jobs. Thus, states should lawfully use a wide range of information sources including social media, family, friends, and acquaintances, socialservices providers, and private-sector employers to anticipate and detect returns. International databases and information systems, such as INTERPOL s system of notices and diffusions, also may provide information useful in anticipating and detecting return. Finally, greater sharing of information by third countries about deportations of suspected FTFs may help states of origin detect unidentified returnees. Build and use evidence-based, individual-level risk assessment frameworks for returnees. Robust risk assessment based on a variety of factors including an individual s behavior while in a conflict zone and the reason for return, which may be readily available from social media, and social influences upon return, which may be obtained from interviews with family and friends enables authorities to build tailored responses ranging from prosecution to monitoring to referral to a prevention program. Risk assessment can also help authorities ensure responses are commensurate with the threat and do not further radicalize returnees or members of their communities. Strengthen investigations and prosecutions of returnees, when applicable, through improved information sharing and evidence gathering. In general, the evidence needed to prosecute FTFs for appropriate crimes will reside in more than one country, necessitating recourse to mutual legal assistance (MLA), which can be greatly enhanced through informal cooperation among investigators and prosecutors for instance, by giving another country advanced notice that an MLA request is forthcoming so that time-

6 - 6 - sensitive evidence can be preserved. 2 Deploying liaison investigators and prosecutors to foreign embassies is also a good practice for improving information sharing, and can also be used to strengthen the capacity of third-country partners to properly gather evidence admissible in a domestic prosecution, as the UK has done in partnership with Kenya. Many states also have special search authorities at their borders, which may be used lawfully to gather not only evidence about suspected FTFs but also intelligence about FTF recruiters and facilitators. Finally, where applicable, the investigation of FTFs under authorities designed for suspected terrorists can enhance evidence gathering and increase the likelihood of successful prosecution. Prepare and exercise responses to the kinds of terrorist acts for which FTF returnees may have special skills. Some returnees may have received training in the use of man-portable air-defense systems (MANPADS), improvised explosive devices (IED), and high-capacity automatic firearms. Response and consequence-management plans and exercises should therefore specifically address ground-based attacks on aviation, roadside bombs, and marauding firearm attacks. Sessions 7: Wrap up and Recommendations Specifically Related to FTFs including Practical Follow-ups by Co-chairs The co-chairs summarized the Day Two discussions under the same broad rubrics of information sharing, the Internet, legal and administrative framework, and border security and control. They noted that the next expert meeting of the FTF Initiative would develop complementary recommendations on CVE-related responses to the FTF phenomenon, focusing on the FTF s formation of the intent to travel to a conflict zone (i.e., radicalization) and the reintegration of the FTF into the country of origin. Finally, the co-chairs said the recommendations developed in the two expert meetings would be coordinated among members and presented for adoption at the next high-level meeting of the GCTF in New York in September See Good Practice 9 of the GCTF Rabat Memorandum on Good Practices for Effective Counterterrorism Practice in the Criminal Justice Sector for more on formal and informal international cooperation.

Foreign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon

Foreign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Foreign Terrorist Fighters (FTF) Initiative The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Introduction The threat posed by Foreign Terrorist Fighters

More information

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has a vacancy for: A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 1 August 2015

More information

Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit

Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has three vacancies for: Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 17 August

More information

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper Council of the European Union Brussels, 24 November 2014 (OR. en) 15715/14 LIMITE JAI 902 PESC 1201 COSI 117 COPS 308 ENFOPOL 373 COTER 82 SIRIS 79 FRONT 242 NOTE From: To: Subject: EU Counter-Terrorism

More information

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga BACKGROUND Riga, 27 January, 2015 Informal JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga The Informal Meeting of Ministers for JUSTICE and HOME AFFAIRS (JHA) will be chaired

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

I Conference Summary

I Conference Summary Executive Summary Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices & Lessons Learned 6-9 December 2011, The Hague Contents I Conference Summary... 2 Background

More information

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006) Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex. Council of the European Union Brussels, 18 November 2015 (OR. en) 14298/15 LIMITE JAI 888 COSI 149 COTER 149 COPS 356 ENFOPOL 356 ENFOCUSTOM 118 ASIM 150 CATS 116 NOTE From: To: Subject: Presidency Permanent

More information

Council of the European Union Brussels, 2 March 2015 (OR. en)

Council of the European Union Brussels, 2 March 2015 (OR. en) Council of the European Union Brussels, 2 March 2015 (OR. en) 6606/15 LIMITE JAI 114 PESC 213 COSI 28 COPS 55 ENFOPOL 52 COTER 41 SIRIS 13 FRONT 48 COPEN 63 DROIPEN 21 NOTE From: To: Subject: Presidency

More information

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) DS 1035/15 LIMITE MEETING DOCUMENT From: EU Counter-Terrorism Coordinator To: Delegations Subject: EU CTC input for

More information

Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report

Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report Foreign Fighters: Eurojust s Views on the Phenomenon and the Criminal Justice Response Updated Report Summary of Main Findings January 2015 EUROJUST LIMITED The distribution of this document is strictly

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

TESTIMONY. Kelli Ann Burriesci. Deputy Assistant Secretary for Screening Coordination. Office of Policy U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE

TESTIMONY. Kelli Ann Burriesci. Deputy Assistant Secretary for Screening Coordination. Office of Policy U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE TESTIMONY OF Kelli Ann Burriesci Deputy Assistant Secretary for Screening Coordination Office of Policy U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM:

More information

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality Interparliamentary committee meeting European Parliament National Parliaments Smart Borders Package: European Challenges, National Experiences, the way ahead 23-24 February 2015 Smart Borders and Law Enforcement

More information

Detention and Reintegration Working Group

Detention and Reintegration Working Group Detention and Reintegration Working Group Workshop on Education, Life Skill Courses and Vocational Training for Incarcerated Violent Extremist Offenders 7-8 October 2015 Nairobi, Kenya Overview Co-Chairs

More information

Council of the European Union Brussels, 24 November 2014 (OR. en)

Council of the European Union Brussels, 24 November 2014 (OR. en) Council of the European Union Brussels, 24 November 2014 (OR. en) 16002/14 LIMITE JAI 940 PESC 1233 COSI 138 COPS 314 ENFOPOL 409 COTER 87 SIRIS 81 FRONT 255 NOTE From: To: Subject: EU Counter-Terrorism

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,

More information

Advanced Summer Programme

Advanced Summer Programme Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 24-28 August 2015 *PROGRAMME Monday 24 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks 08.45 09.00

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Chair s Summary Overview Community-Oriented Policing (COP)

More information

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization

More information

How the Visa Waiver Program is Keeping America Safe

How the Visa Waiver Program is Keeping America Safe November 2014 Introduction Thirty years ago, visitors who wanted to come to the United States applied for a visa at the nearest U.S. embassy or consulate. The embassy performed whatever checks it deemed

More information

Council of the European Union Brussels, 5 April 2016 (OR. en)

Council of the European Union Brussels, 5 April 2016 (OR. en) Council of the European Union Brussels, 5 April 2016 (OR. en) 7412/16 LIMITE JAI 241 SIRIS 55 ENFOPOL 83 COTER 31 COMIX 244 NOTE From: To: Subject: Presidency Delegations Observations of the Presidency

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

G20 ANTI-CORRUPTION WORKING GROUP PROGRESS REPORT 2013

G20 ANTI-CORRUPTION WORKING GROUP PROGRESS REPORT 2013 G20 ANTI-CORRUPTION WORKING GROUP PROGRESS REPORT 2013 September, 2013 G20 Anti-Corruption Working Group Progress Report 2013 ANTI-CORRUPTION WORKING GROUP PROGRESS Introduction 1. The renewal of the G20

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

Delegations will find attached the above Declaration, as adopted by the High-Level Conference held in Luxembourg on 8 October 2015.

Delegations will find attached the above Declaration, as adopted by the High-Level Conference held in Luxembourg on 8 October 2015. Council of the European Union Brussels, 9 October 2015 (OR. en) 12876/15 JAI 735 ASIM 113 RELEX 793 COWEB 103 ELARG 50 MAMA 157 NOTE From: To: Subject: General Secretariat of the Council Delegations High-Level

More information

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol. Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational cooperation

More information

Draft Follow-On Action Agenda. The White House Summit to Counter Violent Extremism Ministerial Meeting February 19, 2015.

Draft Follow-On Action Agenda. The White House Summit to Counter Violent Extremism Ministerial Meeting February 19, 2015. Draft Follow-On Action Agenda The White House Summit to Counter Violent Extremism Ministerial Meeting February 19, 2015 April 2015 Action Agenda Item 1: Promoting Local Research and Information-Sharing

More information

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September

More information

Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group

Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group Workshop on Prison and Security Issues and Implementation of the GCTF Rome Memorandum on the Rehabilitation of

More information

This action is funded by the European Union

This action is funded by the European Union This action is funded by the European Union ANNEX I of the Commission Implementing Decision on the Annual Action Programme 2015 for the Instrument contributing to Stability and Peace - Global and trans-regional

More information

South-East Asia Region Capacity-Building Working Group (SEA WG)

South-East Asia Region Capacity-Building Working Group (SEA WG) South-East Asia Region Capacity-Building Working Group (SEA WG) Third Meeting of the South-East Asia Capacity Building Working 18-19 November 2013 Yogyakarta, Indonesia Summary The third meeting of the

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

Preservation for a Safer World

Preservation for a Safer World Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World

More information

TITLE III JUSTICE, FREEDOM AND SECURITY

TITLE III JUSTICE, FREEDOM AND SECURITY TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach

More information

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES [As finalized by the ASEAN Ad-Hoc Working Group on Trafficking in Persons, 25 June 2007, Vientiane, Lao PDR; and endorsed

More information

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS )LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%

More information

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today. Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies

More information

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

Delegations will find attached the conclusions adopted by the European Council at the above meeting. European Council Brussels, 16 October 2015 (OR. en) EUCO 26/15 CO EUR 10 CONCL 4 COVER NOTE From: General Secretariat of the Council To: Delegations Subject: European Council meeting (15 October 2015)

More information

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

INTERPOL. Executive Summary

INTERPOL. Executive Summary INTERPOL BEST PRACTICES IN COMBATING TERRORISM Executive Summary In order to successfully fight terrorism, and other transnational crimes, organizations need to have information, and they need to share

More information

Organization for Security and Co-operation in Europe

Organization for Security and Co-operation in Europe Organization for Security and Co-operation in Europe The Review of the United Nations Global Counter-Terrorism Strategy 12-13 June 2014, New York Remarks by Mr. Thomas Wuchte, Head on Anti-terrorism Issues

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Strasbourg, 15.12.2015 COM(2015) 671 final 2015/0310 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the European Border and Coast Guard and repealing

More information

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international

More information

TRANSLATION PROVIDED BY THE FRENCH DELEGATION

TRANSLATION PROVIDED BY THE FRENCH DELEGATION Council of the European Union Brussels, 1 September 2015 (OR. fr) 11594/15 NOTE From: To: French delegation Delegations Subject: "Paris Declaration" of 29 August 2015 JAI 622 COSI 102 COPS 262 ENFOPOL

More information

EPP ANTI-TERRORISM PACT

EPP ANTI-TERRORISM PACT EPP ANTI-TERRORISM PACT 1 The EPP Group views terrorism as a global threat that needs to be tackled on local, national, European, regional and global levels. To strengthen our citizen s security, to defend

More information

IN THE WAR ON TERRORISM

IN THE WAR ON TERRORISM THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...

More information

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY Executive Board Hundred and ninety-seventh session 197 EX/46 PARIS, 7 October 2015 Original: English Item 46 of the provisional agenda UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT

More information

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS 8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Council of the European Union Brussels, 18 September 2015 (OR. en)

Council of the European Union Brussels, 18 September 2015 (OR. en) Council of the European Union Brussels, 18 September 2015 (OR. en) 12139/15 LIMITE JAI 669 CFSP/PESC 536 COSI 110 COPS 279 ENFOPOL 255 COTER 120 SIRIS 60 FRONT 191 CATS 84 EDUC 252 NOTE From: To: Subject:

More information

2013 Global Initiative to Combat Nuclear Terrorism Plenary Meeting Joint Co-Chair Statement

2013 Global Initiative to Combat Nuclear Terrorism Plenary Meeting Joint Co-Chair Statement 2013 Global Initiative to Combat Nuclear Terrorism Plenary Meeting Joint Co-Chair Statement Partner nations and official observers in the Global Initiative to Combat Nuclear Terrorism (GICNT) gathered

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges EUROPEAN COMMISSION Brussels, 20.7.2010 COM(2010)386 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL The EU Counter-Terrorism Policy: main achievements and future challenges

More information

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations

More information

Eurojust. The European Union s Judicial Cooperation Unit

Eurojust. The European Union s Judicial Cooperation Unit Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES

More information

The Department of the Treasury established the Financial Crimes

The Department of the Treasury established the Financial Crimes Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to

More information

Chairman s Summary 1 OPENING SESSION

Chairman s Summary 1 OPENING SESSION Federal Department of Foreign Affairs FDFA Conference between the Members of the Global Counterterrorism Forum and the United Nations as well as Other International, Regional and Sub-regional Organizations

More information

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to

More information

Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism

Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism Background This non-binding good practices document 1 focuses on the ways in which education can be used as a resource

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014 NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism

More information

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism Expanding Counterterrorism Partnerships: U.S. Efforts to Tackle the Evolving Terrorist Threat Washington Institute for Near East Policy 1828 L

More information

64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and

64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,

More information

Manifesto for Education Empowering Educators and Schools

Manifesto for Education Empowering Educators and Schools Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

Resolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)]

Resolution adopted by the General Assembly on 8 September 2006. [without reference to a Main Committee (A/60/L.62)] United Nations A/RES/60/288 General Assembly Distr.: General 20 September 2006 Sixtieth session Agenda items 46 and 120 Resolution adopted by the General Assembly on 8 September 2006 [without reference

More information

Council of the European Union Brussels, 30 June 2015 (OR. en)

Council of the European Union Brussels, 30 June 2015 (OR. en) Council of the European Union Brussels, 30 June 2015 (OR. en) 10387/15 LIMITE ASIM 44 JAI 512 COAFR 200 RELEX 528 COPS 199 MAMA 81 DEVGEN 115 NOTE From: General Secretariat of the Council To: Permanent

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY

ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY A. The Dialogue Within the broader dialogue and cooperation framework between the EU and its Member States and Turkey in Justice and Home Affairs matters,

More information

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 14, 2015 Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement President Obama and Heads of Delegations of the Gulf

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

As of 18 April 2012. Framework of Regional Collaboration, 2012. Preamble

As of 18 April 2012. Framework of Regional Collaboration, 2012. Preamble As of 18 April 2012 Framework of Regional Collaboration, 2012 Preamble Recognizing that Asia, with 60 percent of the world s people and 30 percent of the world s international migrants, of whom women constitute

More information

12318/15 GdK/lwp 1 CAB LIMITE EN

12318/15 GdK/lwp 1 CAB LIMITE EN Council of the European Union Brussels, 5 October 2015 (OR. en) 12318/15 NOTE From: To: EU Counter-Terrorism Coordinator Council No. prev. doc.: 12139/15 + COR 1 12551/15 Subject: LIMITE JAI 686 CFSP/PESC

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information

13971/14 GdK/kve 1 CAB LIMITE EN

13971/14 GdK/kve 1 CAB LIMITE EN Council of the European Union Brussels, 10 October 2014 (OR. en) 13971/14 LIMITE JAI 743 ATO 66 ECOFIN 887 DATAPROTECT 134 TRANS 464 TELECOM 172 RELEX 808 COMAG 84 PESC 1012 COAFR 276 COTER 67 COASI 124

More information

The role of financial intelligence units in counter-terrorism terrorism investigations

The role of financial intelligence units in counter-terrorism terrorism investigations The role of financial intelligence units in counter-terrorism terrorism investigations Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 12 September 2012 What is an FIU?

More information

14244/15 EB/dk 1 DGD 1C LIMITE EN

14244/15 EB/dk 1 DGD 1C LIMITE EN Council of the European Union Brussels, 23 November 2015 (OR. en) 14244/15 LIMITE COSI 148 ENFOPOL 355 NOTE From: To: Subject: Europol Standing Committee on Operational Cooperation on Internal Security

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

Advanced Summer Programme on Countering Terrorism: Legal Challenges and Dilemmas

Advanced Summer Programme on Countering Terrorism: Legal Challenges and Dilemmas Photo: Reuters/Yaser Al-Khodor Advanced Summer Programme on Countering Terrorism: Legal Challenges and Dilemmas 24-28 August 2015 The Hague Organised by the T.M.C. Asser Instituut & International Centre

More information