ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness
|
|
- Lucas Elwin Daniels
- 8 years ago
- Views:
Transcription
1 ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February :00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE Strategic/Criminological Room MTC02.11 Legal Technical Room MTC :00 11:00 11:00 11:30 11:30 13:00 13:00 14:00 14:00 14:30 Introducing the online child predators LINC KU Leuven & University of Tilburg First responders e- learning CRIDS-ICRI- Belgian Computer Crime Units (FCCU RCCUs) COFFEE BREAK Investigating online: best practices and legal reflections Institute for Criminal Law LUNCH BREAK Introduction to the Belgian Cyber Security Guide Microsoft - ICRI Physical attacks against security devices CryptoGroup- UCL IPv6 training -FCCU 14:30 15:45 Online behaviour of Minors LINC Tilburg University A priori and a posteriori legal means to fight against cybercrime CRIDS - FCCU Web Security Training 15:45 16:15 COFFEE BREAK 16:15 17:15 17:15 18: :00 Introduction to Cryptography CryptoGroup Digital Evidence Gathering IGO-IFJ Guided Tour of Leuven Recent Web Security Technology Web-based device Fingerprinting 19:00 21:30 NETWORKING DINNER
2 Pre-Congress B-CCENTRE Workshop 3 February 2015 Detailed programme 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE 10:00 11:00 Introducing the online child predators Professor dr. Stefan Bogaerts, LINC KU Leuven & University of Tilburg In this workshop, we first examine differences between identified and unidentified child molesters and child porno downloaders from a clinical perspective: do they differ from each other? Second, these findings will be extended to the global worldwide problem of online predators; preliminary research tools will be explained of how to discourage and deter online predators. Finally, we discuss a social network tool that can help police investigators in the detection of sex offenders. This tool can also be applied to online sexual abuse. Physical attacks against security devices Dr. François Koeune, CryptoGroup - UCL Besides dedicated talks on specific topics, UCL organised two series of trainings for B- CCENTRE: one introducing cryptography for a non-technical audience, the other devoted to physical attacks and the threat they represent. This talk will discuss the physical attacks training, the target of which was to provide participants (required to have a good background in cryptography and security) with a perspective on physical attacks, the practical threat they represent, the possible countermeasures, etc. The training provided a theoretical introduction to physical attacks, then presented various potential application contexts, such as the Keeloq contactless car keys, or cloud-based virtualization, each time discussing the practicability of the attacks and the most recent findings about it. We will describe our experience in organising the training, the lessons we learned and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. 11:00 11:30 COFFEE BREAK 11:30 13:00 First responders e-learning Franck Dumortier and Cathérine Forget, CRIDS Unamur, Ann Mennens,
3 B-CCENTRE - ICRI- KU Leuven, Belgian Computer Crime Units (FCCU RCCUs) Based on the e-learning tool developed by the French 2CENTRE (UTT), work was initiated for creating a localised version for Belgium. After knowledge transfer on the tool to be used, a customised version is being created by a working group of police officers and academics from different regions in the country. Approach and methodology used, work in progress and first results will be presented. Investigating online: best practices and legal reflections Professor Frank Verbruggen & Kristel De Schepper, Institute for Criminal Law KU Leuven This workshop will focus on possibilities law enforcement has and the difficulties it faces when investigating online. Should law enforcement be able to resort to hacking as an investigative measure? A matter of concern for those intent on regulating this, will be the inevitable issue of jurisdiction. Two issues will be addressed more in particular, on the basis of the Belgian experience: 1) can a state invoke its territorial jurisdiction to obtain cooperation with its law enforcement services from foreign-based private entities? 2) where does one locate searches conducted by law enforcement in cyberspace to judge who has jurisdiction and who lacks it? IPv6 training Professor Danny Hughes & Rafaël Bachiller, KU Leuven IPv6 will become increasingly prevalent in the coming years. Forensic Investigators will need to be aware of the changes in IPv6, and the security issues surrounding those changes. This workshop will introduce the training developed (theory and lab sessions) in the frame of the B-CCENTRE project and will focus on explaining IPv6 routing and log file analysis. 13:00 14:00 LUNCH BREAK 14:00 14:30 Introduction to the Belgian Cyber Security Guide Bruno Schröder, Microsoft, Ann Mennens, B-CCENTRE ICRI KU Leuven 14:30 15:45 Online behaviour of Minors Professor dr. Stefan Bogaerts & Drs. Janneke Schilder, LINC KU Leuven & University of Tilburg Does a school intervention works? That's the question! There is a big difference between consciousness/awareness and its conversion into actual behaviour. In the first part, we will discuss the impact of a school-based intervention on online risk awareness and behaviour of primary school children (grades 4 and 6) at two measurements. In the second part, we investigate the role of parents (parental control
4 and parental supervision). In the third part, we study Privacy, Risk, Information Protection and Social Network Site Using Behaviour among three groups of Flemish university students. A priori and a posteriori legal means to fight against cybercrime Franck Dumortier and Cathérine Forget, CRIDS Unamur & FCCU The 2006/24/EC Data Retention Directive imposed on telecom operators to retain the "metadata" of citizens for a minimum of 6 months and at most 24 months. This directive was invalidated by the Court of Justice of the European Union on 8th April The aim of this session is to discuss the possible consequences of this decision on the Belgian legislation transposing the Directive. If the blanket massive data collection measures were originally justified by the EU Parliament to fight against serious crime and terrorism, do they still have their place at the time of the resurgence of crime on Internet - for example, child pornography, arms sales online, drug trafficking - facilitated by new means of anonymity such as VPN or TOR. Besides the difficulty of a priori retention of personal data entailed by this phenomenon, it raises the question of the adequacy of the legal framework relating to ex-post particular methods of research, including observation and infiltration into the "virtual" world. Web Security Dr. Philippe De Ryck, KU Leuven In this talk, we will give an overview of B-CCENTRE's training day on Web Security, held last March. We briefly sketch the different topics and lab sessions that were covered in the training. By elaborating on a small selection of topics, we illustrate what the participants have learned from this course, and why such training events are important. 15:45 16:15 COFFEE BREAK 16:15 18:00 Introduction to Cryptography Dr. François Koeune, CryptoGroup - UCL This talk will discuss the introduction to cryptography training, the target of which was to provide participants (who were not required to have any specific background knowledge) with a global view of what cryptography does and how it can be used to circumvent various threats on the internet. In this talk, we will describe our experience in organizing the training, the lessons we learned and second edition, and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. Digital Evidence Gathering IGO-IFJ, Jan Kerkhofs, Federal Magistrate and Philippe Van Linthout, Investigating Judge
5 A three day seminar is organised on a yearly basis by the Institute for Juridical Training (IGO-IFJ) to provide magistrates an in-depth introduction to matters related to cybercrime and the legal challenges related to it. During this session, experienced trainers will provide an insight in the course set up and will introduce different modules and their content in an interactive manner to the audience. 16:15 17:15 Recent Web Security Technology Dr. Lieven Desmet, KU Leuven In this talk, various new web security mechanisms (such as CSP, HSTS and XFO) will be introduced and explained. These mechanisms have recently been proposed within various web standardization activities and by browser vendors, and allow the website owner to have more control over the client-side security of his web application. All these security mechanisms have a similar deployment pattern: security policies are defined by the website owner, and are enforced by security controls within the browser environment. 17:15 18:00 Web-based Device Fingerprinting Tom Van Goethem and Thomas Vissers, KU Leuven Presentation of the state of the art in web fingerprinting, and our findings on how this is used in practical contexts 16:30 18:00 Registration open for ICSS :00 19:00 Guided tour of Leuven 19:00 21:30 NETWORKING DINNER at Restaurant Ter Eyken and Restaurant Mykene.
B-CCENTRE ACTIVITIES REPORT
B-CCENTRE ACTIVITIES REPORT 2011-2014 With the financial support from the Prevention of and Fight against Crime Programme of the European Union European Commission Directorate-General Home Affairs The
More informationCRIMINOLOGICAL RESEARCH REPORT
CRIMINOLOGICAL RESEARCH REPORT With the financial support from the Prevention of and Fight against Crime Programme of the European Union European Commission Directorate-General Home Affairs 2011 2014 Research
More informationGlobal Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationLegal English terminology in a national and European context 8-11 December 2015. Programme
EU Project European Judicial Training for Court Staff and Bailiffs Legal English terminology in a national and European context 8-11 December 2015 * * * * Seminar Venue : EIPA Luxembourg European Centre
More informationLegal English terminology in a National and European context 8-11 December 2015. Programme
EU project European Judicial Training for Court Staff and Bailiffs Legal English terminology in a National and European context 8-11 December 2015 * * * * Seminar Venue: EIPA Luxembourg European Centre
More informationProgramme Specification
MSc Criminology with Forensic Psychology Programme Specification 1. Programme title Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University
More information5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
More informationINTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS
INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan
More informationCyber Security and Digital Forensics Training Platform
Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement
More informationCouncil Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
More informationPROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS
PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS Action Grants 2012 within the Framework Partnership Agreements Deadline 1: 10 August
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More information2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.
1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the
More information24/7 High Tech Crime Network
24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationInsiders Guide to EU Affairs
in partnership with Insiders Guide to EU Affairs 4 th - 7 th November 2014 Programme Level: Beginner For consultants, diplomats or advisors dealing with European affairs, public or government affairs or
More informationEuropol Unclassified Basic Protection Level VACANCY NOTICE
The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationForensics Europe Expo 2015 Conference Programme
Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved
More informationForensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
More informationDepartment of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police
Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission
More informationCCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
More informationReport of the Strategic Meeting on Cybercrime
Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data
More informationOptional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
More informationCOUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
More informationPrivacy in the Digital Age of Encryption and Anonymity Online
The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol
More informationOperational indicators of trafficking in human beings
Operational indicators of trafficking in human beings Results from a Delphi survey implemented by the ILO and the European Commission First published in March 2009 Revised version of September 2009 What
More informationCyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
More informationAdam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender
Adam Walsh Child Protection and Safety Act Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Signed into law by George W. Bush on July 27, 2006 Creates a
More informationETSC Fact Sheet. Drink Driving in Belgium. Current Belgian legislation on drink-driving 8
ETSC Fact Sheet BELGIUM BE JANUARY 2011 Drink Driving in Belgium Belgium has moved from 145 deaths per million population in 2001 to 89 in 2009 but saw a slight increase in the number of people killed
More informationEuropol Public Information. Business Manager Corporate Communications
The Hague, 03 August 2015 Reg. nº: Europol/2015/CA/IV/037 VACANCY NOTICE Name of the Post: Reporting to: Open Sources Officer within the Open Sources Team in the Governance Department at Europol (Contract
More informationMaking European Criminal Justice work Assessments and Perspectives one year after the Lisbon Treaty
ICLN 9 th Annual Conference 2010 Making European Criminal Justice work Assessments and Perspectives one year after the Lisbon Treaty Tuesday 7 th December 2010, Koninklijke Schouwburg, The Hague, Netherlands
More informationSpeaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police
Home Team Behavioural Sciences Centre (HTBSC) Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology Guests: Penelope, Jane HTBSC Director: Dr A Majeed B A Khander, concurrently Deputy Director
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationThe Massachusetts Strategic Plan for Cyber Crime
The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,
More informationHow To Become A Member Of Europol
The Hague, 08 September 2015 Reg. nº: Europol/2015/TA/AD7/219 VACANCY NOTICE Name of the Post: Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area Reporting to: Senior Specialist
More informationThis innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.
The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing
More informationService and anonymisation.
THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 9 EXECUTIVE SUMMARY The Internet Organised Crime Threat Assessment (iocta) informs decision makers at strategic, policy and tactical levels about
More informationEurojust. The European Union s Judicial Cooperation Unit
Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES
More informationFirst Pacific Islands Capacity Building Workshop on Child Online Protection
First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationLegal Aspects of the MonIKA-Project - Privacy meets Cybersecurity
Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationMSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010
MSc Forensic Psychology Programme Specification Faculty of Education, Law and Social Sciences May 2010 Programme Specification: MSc Forensic Psychology NOTE: This specification provides a concise summary
More informationTRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016
TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationCyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
More informationFACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration
FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration 2. NAME OF DEGREE Master of Arts (Criminal Justice Administration)
More informationI trust the Committees' submission will be of assistance to the inquiry.
THE LAW SOCIETY OF NEW SOUTH WALES Our Ref: rbg 685771 6 March 2013 The Director General Purpose Standing Committee No. 2 Parliament House Macquarie Street Sydney NSW 2000 Dear Director, Inquiry into Druq
More informationEDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics
EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation
More information1.1 Full name: Social Work Practitioner Youth Justice
CPD sample profile 1.1 Full name: Social Work Practitioner Youth Justice 1.2 Profession: Social Worker 1.3 Registration number: SWXXXX 2. Summary of recent work / practice I work as a front line social
More informationManaging the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice
Seminar Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice Maastricht (NL), 29 June - 3 July 2015 European Institute of Public Administration Institut européen
More informationAustralian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting
Submission No. 56 0s) 2012 Received j0 1 Law Reform Committee Australian Government Attorney-General's Department Criminal Justice Division Parliament of Victoria Law Reform Committee Inquiry into Sexting
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More informationMigration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
More informationProgramme Specification and Curriculum Map for MA Criminology with Forensic Psychology
Programme Specification and Curriculum Map for MA Criminology with Forensic Psychology 1. Programme title MSC Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching
More informationCyber Crime and Digital Forensics in Japan
Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background
More informationCyber crime: Police Roles and Responsibilities Within a Collaborative Framework
Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned
More informationSchool of Psychology. Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time
Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time Doctorate Programme for Psychology Trainees (ForenPsyD) employed in a forensic setting Four years part-time The core philosophy
More informationFACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
More informationWhat now? Data Retention Scenarios After the ECJ Ruling
What now? Data Retention Scenarios After the ECJ Ruling Alessandro Guarino StudioAG a.guarino@studioag.eu Abstract In its first part the paper recalls the history of data retention legislation in the European
More informationTilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen
Tilburg University U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen Published in: International Data Privacy Law Document version: Preprint (usually an
More information10128/16 LB/dk 1 DGD 1C
Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:
More informationASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
More informationAPPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationThe University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
More informationMr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.
Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies
More informationCourse Content Summary ITN 267 Legal Topics in Network Security (3 Credits)
Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth
More informationSo why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a
Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,
More informationMSc. Criminology with Forensic Psychology. Programme Specification. 1. Programme title MSC Criminology with Forensic Psychology
MSc. Criminology with Forensic Psychology Programme Specification 1. Programme title MSC Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex
More informationPublic-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA
Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationThe Parliament of Romania has adopted the present law. CHAPTER 1 General Provisions
LAW No. 508 of 2004 on the Creation, Organization and Operation of the Directorate for Investigating Organized Crime and Terrorism, within the Public Ministry The Parliament of Romania has adopted the
More informationCourse Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
More informationClassification scheme Criminal law and criminology (STR)
Classification scheme Criminal law and criminology (STR) A Reference material A10 Reference works/bibliographies A20 Loose-leaf works Netherlands A21 Idem foreign countries A22 Idem international and comparative
More informationVictim services commissioning intentions
Victim services commissioning intentions 1. Introduction Police and Crime Commissioners are responsible for commissioning emotional and practical support services for victims of crime in their local area
More informationCRIMINAL JUSTICE. Major in Criminal Justice. Faculty
CRIMINAL JUSTICE The Criminal program provides students with a comprehensive understanding of the criminal justice system, which consists of public and private police, courts and corrections. The course
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationEuropol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011
Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,
More informationCo-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European
Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Commission. This publication (communication) reflects
More informationInquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014
Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 AUSTRALIAN HUMAN RIGHTS COMMISSION SUBMISSION TO THE PARLIAMENTARY JOINT COMMITTEE ON INTELLIGENCE AND
More informationKnowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
More informationSpeech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Organized by American Chamber of Commerce in Cyprus, 30 October
More information8674/15 MC/pf 1 DGD 1B
Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16
More informationIt is the policy of the National Conference of State Legislatures to advance and defend a
COMMITTEE: POLICY: TYPE: LAW AND CRIMINAL JUSTICE CRIMINAL JUSTICE CONSENT It is the policy of the National Conference of State Legislatures to advance and defend a balanced, dynamic criminal justice partnership
More informationAs part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
More informationPsychology, Social Work and Human Sciences
School of, Social Work and Human Sciences UG PG Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies, based at our Brentford site
More informationIssue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009.
Arizona State Senate Issue Brief November 23, 2009 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members
More informationWAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union
WAPIS PROGRAMME West African Police Information System This Programme is funded by the European Union WAPIS PROGRAMME Contents 1. Origin 4 2. What is WAPIS? 5 2.1 Overall objectives 6 2.2 Main stakeholders
More informationMSc Forensic Psychology
MSc Forensic Programme Specification Faculty of Business, Law and Social Sciences May 2015 Programme Specification MSc Forensic NOTE: This specification provides a concise summary of the main features
More informationMinister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
More informationEthical Hacking & Cyber Security Workshop
Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: info@i3indya.com
More informationDiablo Valley College Catalog 2014-2015
ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,
More informationLinux and Law Enforcement
Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University Joshua@cybercrimetech.com http://forensics.sch.ac.kr
More informationNational Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
More informationUnited Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA
United Nations Study on Violence against Children Response to the questionnaire received from the Government of the Republic of GUYANA 1 MINISTRY OF LABOUR, HUMAN SERVICES & SOCIAL SECURITY RESPONSE TO
More information