ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness

Size: px
Start display at page:

Download "ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness"

Transcription

1 ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February :00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE Strategic/Criminological Room MTC02.11 Legal Technical Room MTC :00 11:00 11:00 11:30 11:30 13:00 13:00 14:00 14:00 14:30 Introducing the online child predators LINC KU Leuven & University of Tilburg First responders e- learning CRIDS-ICRI- Belgian Computer Crime Units (FCCU RCCUs) COFFEE BREAK Investigating online: best practices and legal reflections Institute for Criminal Law LUNCH BREAK Introduction to the Belgian Cyber Security Guide Microsoft - ICRI Physical attacks against security devices CryptoGroup- UCL IPv6 training -FCCU 14:30 15:45 Online behaviour of Minors LINC Tilburg University A priori and a posteriori legal means to fight against cybercrime CRIDS - FCCU Web Security Training 15:45 16:15 COFFEE BREAK 16:15 17:15 17:15 18: :00 Introduction to Cryptography CryptoGroup Digital Evidence Gathering IGO-IFJ Guided Tour of Leuven Recent Web Security Technology Web-based device Fingerprinting 19:00 21:30 NETWORKING DINNER

2 Pre-Congress B-CCENTRE Workshop 3 February 2015 Detailed programme 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction: overview of B-CCENTRE activities Ann Mennens, Manager B-CCENTRE 10:00 11:00 Introducing the online child predators Professor dr. Stefan Bogaerts, LINC KU Leuven & University of Tilburg In this workshop, we first examine differences between identified and unidentified child molesters and child porno downloaders from a clinical perspective: do they differ from each other? Second, these findings will be extended to the global worldwide problem of online predators; preliminary research tools will be explained of how to discourage and deter online predators. Finally, we discuss a social network tool that can help police investigators in the detection of sex offenders. This tool can also be applied to online sexual abuse. Physical attacks against security devices Dr. François Koeune, CryptoGroup - UCL Besides dedicated talks on specific topics, UCL organised two series of trainings for B- CCENTRE: one introducing cryptography for a non-technical audience, the other devoted to physical attacks and the threat they represent. This talk will discuss the physical attacks training, the target of which was to provide participants (required to have a good background in cryptography and security) with a perspective on physical attacks, the practical threat they represent, the possible countermeasures, etc. The training provided a theoretical introduction to physical attacks, then presented various potential application contexts, such as the Keeloq contactless car keys, or cloud-based virtualization, each time discussing the practicability of the attacks and the most recent findings about it. We will describe our experience in organising the training, the lessons we learned and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. 11:00 11:30 COFFEE BREAK 11:30 13:00 First responders e-learning Franck Dumortier and Cathérine Forget, CRIDS Unamur, Ann Mennens,

3 B-CCENTRE - ICRI- KU Leuven, Belgian Computer Crime Units (FCCU RCCUs) Based on the e-learning tool developed by the French 2CENTRE (UTT), work was initiated for creating a localised version for Belgium. After knowledge transfer on the tool to be used, a customised version is being created by a working group of police officers and academics from different regions in the country. Approach and methodology used, work in progress and first results will be presented. Investigating online: best practices and legal reflections Professor Frank Verbruggen & Kristel De Schepper, Institute for Criminal Law KU Leuven This workshop will focus on possibilities law enforcement has and the difficulties it faces when investigating online. Should law enforcement be able to resort to hacking as an investigative measure? A matter of concern for those intent on regulating this, will be the inevitable issue of jurisdiction. Two issues will be addressed more in particular, on the basis of the Belgian experience: 1) can a state invoke its territorial jurisdiction to obtain cooperation with its law enforcement services from foreign-based private entities? 2) where does one locate searches conducted by law enforcement in cyberspace to judge who has jurisdiction and who lacks it? IPv6 training Professor Danny Hughes & Rafaël Bachiller, KU Leuven IPv6 will become increasingly prevalent in the coming years. Forensic Investigators will need to be aware of the changes in IPv6, and the security issues surrounding those changes. This workshop will introduce the training developed (theory and lab sessions) in the frame of the B-CCENTRE project and will focus on explaining IPv6 routing and log file analysis. 13:00 14:00 LUNCH BREAK 14:00 14:30 Introduction to the Belgian Cyber Security Guide Bruno Schröder, Microsoft, Ann Mennens, B-CCENTRE ICRI KU Leuven 14:30 15:45 Online behaviour of Minors Professor dr. Stefan Bogaerts & Drs. Janneke Schilder, LINC KU Leuven & University of Tilburg Does a school intervention works? That's the question! There is a big difference between consciousness/awareness and its conversion into actual behaviour. In the first part, we will discuss the impact of a school-based intervention on online risk awareness and behaviour of primary school children (grades 4 and 6) at two measurements. In the second part, we investigate the role of parents (parental control

4 and parental supervision). In the third part, we study Privacy, Risk, Information Protection and Social Network Site Using Behaviour among three groups of Flemish university students. A priori and a posteriori legal means to fight against cybercrime Franck Dumortier and Cathérine Forget, CRIDS Unamur & FCCU The 2006/24/EC Data Retention Directive imposed on telecom operators to retain the "metadata" of citizens for a minimum of 6 months and at most 24 months. This directive was invalidated by the Court of Justice of the European Union on 8th April The aim of this session is to discuss the possible consequences of this decision on the Belgian legislation transposing the Directive. If the blanket massive data collection measures were originally justified by the EU Parliament to fight against serious crime and terrorism, do they still have their place at the time of the resurgence of crime on Internet - for example, child pornography, arms sales online, drug trafficking - facilitated by new means of anonymity such as VPN or TOR. Besides the difficulty of a priori retention of personal data entailed by this phenomenon, it raises the question of the adequacy of the legal framework relating to ex-post particular methods of research, including observation and infiltration into the "virtual" world. Web Security Dr. Philippe De Ryck, KU Leuven In this talk, we will give an overview of B-CCENTRE's training day on Web Security, held last March. We briefly sketch the different topics and lab sessions that were covered in the training. By elaborating on a small selection of topics, we illustrate what the participants have learned from this course, and why such training events are important. 15:45 16:15 COFFEE BREAK 16:15 18:00 Introduction to Cryptography Dr. François Koeune, CryptoGroup - UCL This talk will discuss the introduction to cryptography training, the target of which was to provide participants (who were not required to have any specific background knowledge) with a global view of what cryptography does and how it can be used to circumvent various threats on the internet. In this talk, we will describe our experience in organizing the training, the lessons we learned and second edition, and the general feedback we received. We will then provide a taste of what the training actually looked like by lecturing a part of it. Digital Evidence Gathering IGO-IFJ, Jan Kerkhofs, Federal Magistrate and Philippe Van Linthout, Investigating Judge

5 A three day seminar is organised on a yearly basis by the Institute for Juridical Training (IGO-IFJ) to provide magistrates an in-depth introduction to matters related to cybercrime and the legal challenges related to it. During this session, experienced trainers will provide an insight in the course set up and will introduce different modules and their content in an interactive manner to the audience. 16:15 17:15 Recent Web Security Technology Dr. Lieven Desmet, KU Leuven In this talk, various new web security mechanisms (such as CSP, HSTS and XFO) will be introduced and explained. These mechanisms have recently been proposed within various web standardization activities and by browser vendors, and allow the website owner to have more control over the client-side security of his web application. All these security mechanisms have a similar deployment pattern: security policies are defined by the website owner, and are enforced by security controls within the browser environment. 17:15 18:00 Web-based Device Fingerprinting Tom Van Goethem and Thomas Vissers, KU Leuven Presentation of the state of the art in web fingerprinting, and our findings on how this is used in practical contexts 16:30 18:00 Registration open for ICSS :00 19:00 Guided tour of Leuven 19:00 21:30 NETWORKING DINNER at Restaurant Ter Eyken and Restaurant Mykene.

B-CCENTRE ACTIVITIES REPORT

B-CCENTRE ACTIVITIES REPORT B-CCENTRE ACTIVITIES REPORT 2011-2014 With the financial support from the Prevention of and Fight against Crime Programme of the European Union European Commission Directorate-General Home Affairs The

More information

CRIMINOLOGICAL RESEARCH REPORT

CRIMINOLOGICAL RESEARCH REPORT CRIMINOLOGICAL RESEARCH REPORT With the financial support from the Prevention of and Fight against Crime Programme of the European Union European Commission Directorate-General Home Affairs 2011 2014 Research

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Legal English terminology in a national and European context 8-11 December 2015. Programme

Legal English terminology in a national and European context 8-11 December 2015. Programme EU Project European Judicial Training for Court Staff and Bailiffs Legal English terminology in a national and European context 8-11 December 2015 * * * * Seminar Venue : EIPA Luxembourg European Centre

More information

Legal English terminology in a National and European context 8-11 December 2015. Programme

Legal English terminology in a National and European context 8-11 December 2015. Programme EU project European Judicial Training for Court Staff and Bailiffs Legal English terminology in a National and European context 8-11 December 2015 * * * * Seminar Venue: EIPA Luxembourg European Centre

More information

Programme Specification

Programme Specification MSc Criminology with Forensic Psychology Programme Specification 1. Programme title Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan

More information

Cyber Security and Digital Forensics Training Platform

Cyber Security and Digital Forensics Training Platform Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement

More information

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

More information

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

PROGRAMME PREVENTION OF AND FIGHT AGAINST CRIME 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS Action Grants 2012 within the Framework Partnership Agreements Deadline 1: 10 August

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

24/7 High Tech Crime Network

24/7 High Tech Crime Network 24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Insiders Guide to EU Affairs

Insiders Guide to EU Affairs in partnership with Insiders Guide to EU Affairs 4 th - 7 th November 2014 Programme Level: Beginner For consultants, diplomats or advisors dealing with European affairs, public or government affairs or

More information

Europol Unclassified Basic Protection Level VACANCY NOTICE

Europol Unclassified Basic Protection Level VACANCY NOTICE The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Forensics Europe Expo 2015 Conference Programme

Forensics Europe Expo 2015 Conference Programme Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved

More information

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Forensics in Nuclear Security. by the Netherlands Forensic Institute Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

Report of the Strategic Meeting on Cybercrime

Report of the Strategic Meeting on Cybercrime Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data

More information

Optional Protocol on the sale of children, child prostitution and child pornography

Optional Protocol on the sale of children, child prostitution and child pornography United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol

More information

Operational indicators of trafficking in human beings

Operational indicators of trafficking in human beings Operational indicators of trafficking in human beings Results from a Delphi survey implemented by the ILO and the European Commission First published in March 2009 Revised version of September 2009 What

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Adam Walsh Child Protection and Safety Act Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Signed into law by George W. Bush on July 27, 2006 Creates a

More information

ETSC Fact Sheet. Drink Driving in Belgium. Current Belgian legislation on drink-driving 8

ETSC Fact Sheet. Drink Driving in Belgium. Current Belgian legislation on drink-driving 8 ETSC Fact Sheet BELGIUM BE JANUARY 2011 Drink Driving in Belgium Belgium has moved from 145 deaths per million population in 2001 to 89 in 2009 but saw a slight increase in the number of people killed

More information

Europol Public Information. Business Manager Corporate Communications

Europol Public Information. Business Manager Corporate Communications The Hague, 03 August 2015 Reg. nº: Europol/2015/CA/IV/037 VACANCY NOTICE Name of the Post: Reporting to: Open Sources Officer within the Open Sources Team in the Governance Department at Europol (Contract

More information

Making European Criminal Justice work Assessments and Perspectives one year after the Lisbon Treaty

Making European Criminal Justice work Assessments and Perspectives one year after the Lisbon Treaty ICLN 9 th Annual Conference 2010 Making European Criminal Justice work Assessments and Perspectives one year after the Lisbon Treaty Tuesday 7 th December 2010, Koninklijke Schouwburg, The Hague, Netherlands

More information

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police Home Team Behavioural Sciences Centre (HTBSC) Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology Guests: Penelope, Jane HTBSC Director: Dr A Majeed B A Khander, concurrently Deputy Director

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

The Massachusetts Strategic Plan for Cyber Crime

The Massachusetts Strategic Plan for Cyber Crime The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,

More information

How To Become A Member Of Europol

How To Become A Member Of Europol The Hague, 08 September 2015 Reg. nº: Europol/2015/TA/AD7/219 VACANCY NOTICE Name of the Post: Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area Reporting to: Senior Specialist

More information

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation. The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing

More information

Service and anonymisation.

Service and anonymisation. THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2014 9 EXECUTIVE SUMMARY The Internet Organised Crime Threat Assessment (iocta) informs decision makers at strategic, policy and tactical levels about

More information

Eurojust. The European Union s Judicial Cooperation Unit

Eurojust. The European Union s Judicial Cooperation Unit Eurojust The European Union s Judicial Cooperation Unit EUROJUST: AN ADDED VALUE IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM Michèle Coninsx President EUROJUST EUROJUST 28 EU PROSECUTORS/JUDGES

More information

First Pacific Islands Capacity Building Workshop on Child Online Protection

First Pacific Islands Capacity Building Workshop on Child Online Protection First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

MSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010

MSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010 MSc Forensic Psychology Programme Specification Faculty of Education, Law and Social Sciences May 2010 Programme Specification: MSc Forensic Psychology NOTE: This specification provides a concise summary

More information

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016 TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration

FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration 2. NAME OF DEGREE Master of Arts (Criminal Justice Administration)

More information

I trust the Committees' submission will be of assistance to the inquiry.

I trust the Committees' submission will be of assistance to the inquiry. THE LAW SOCIETY OF NEW SOUTH WALES Our Ref: rbg 685771 6 March 2013 The Director General Purpose Standing Committee No. 2 Parliament House Macquarie Street Sydney NSW 2000 Dear Director, Inquiry into Druq

More information

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation

More information

1.1 Full name: Social Work Practitioner Youth Justice

1.1 Full name: Social Work Practitioner Youth Justice CPD sample profile 1.1 Full name: Social Work Practitioner Youth Justice 1.2 Profession: Social Worker 1.3 Registration number: SWXXXX 2. Summary of recent work / practice I work as a front line social

More information

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice Seminar Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice Maastricht (NL), 29 June - 3 July 2015 European Institute of Public Administration Institut européen

More information

Australian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting

Australian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting Submission No. 56 0s) 2012 Received j0 1 Law Reform Committee Australian Government Attorney-General's Department Criminal Justice Division Parliament of Victoria Law Reform Committee Inquiry into Sexting

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

Programme Specification and Curriculum Map for MA Criminology with Forensic Psychology

Programme Specification and Curriculum Map for MA Criminology with Forensic Psychology Programme Specification and Curriculum Map for MA Criminology with Forensic Psychology 1. Programme title MSC Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching

More information

Cyber Crime and Digital Forensics in Japan

Cyber Crime and Digital Forensics in Japan Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background

More information

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework

Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned

More information

School of Psychology. Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time

School of Psychology. Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time Forensic Psychology Practice Doctorate (ForenPsyD) Three years full-time Doctorate Programme for Psychology Trainees (ForenPsyD) employed in a forensic setting Four years part-time The core philosophy

More information

FACT SHEET: PROJECT SAFE CHILDHOOD

FACT SHEET: PROJECT SAFE CHILDHOOD FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving

More information

What now? Data Retention Scenarios After the ECJ Ruling

What now? Data Retention Scenarios After the ECJ Ruling What now? Data Retention Scenarios After the ECJ Ruling Alessandro Guarino StudioAG a.guarino@studioag.eu Abstract In its first part the paper recalls the history of data retention legislation in the European

More information

Tilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen

Tilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen Tilburg University U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen Published in: International Data Privacy Law Document version: Preprint (usually an

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research

More information

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today. Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies

More information

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth

More information

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,

More information

MSc. Criminology with Forensic Psychology. Programme Specification. 1. Programme title MSC Criminology with Forensic Psychology

MSc. Criminology with Forensic Psychology. Programme Specification. 1. Programme title MSC Criminology with Forensic Psychology MSc. Criminology with Forensic Psychology Programme Specification 1. Programme title MSC Criminology with Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex

More information

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

The Parliament of Romania has adopted the present law. CHAPTER 1 General Provisions

The Parliament of Romania has adopted the present law. CHAPTER 1 General Provisions LAW No. 508 of 2004 on the Creation, Organization and Operation of the Directorate for Investigating Organized Crime and Terrorism, within the Public Ministry The Parliament of Romania has adopted the

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Classification scheme Criminal law and criminology (STR)

Classification scheme Criminal law and criminology (STR) Classification scheme Criminal law and criminology (STR) A Reference material A10 Reference works/bibliographies A20 Loose-leaf works Netherlands A21 Idem foreign countries A22 Idem international and comparative

More information

Victim services commissioning intentions

Victim services commissioning intentions Victim services commissioning intentions 1. Introduction Police and Crime Commissioners are responsible for commissioning emotional and practical support services for victims of crime in their local area

More information

CRIMINAL JUSTICE. Major in Criminal Justice. Faculty

CRIMINAL JUSTICE. Major in Criminal Justice. Faculty CRIMINAL JUSTICE The Criminal program provides students with a comprehensive understanding of the criminal justice system, which consists of public and private police, courts and corrections. The course

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011 Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,

More information

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European

Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Co-funded by the Prevention of and Fight against Crime Programme of the European Union. This project has been funded with support from the European Commission. This publication (communication) reflects

More information

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 AUSTRALIAN HUMAN RIGHTS COMMISSION SUBMISSION TO THE PARLIAMENTARY JOINT COMMITTEE ON INTELLIGENCE AND

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Organized by American Chamber of Commerce in Cyprus, 30 October

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

It is the policy of the National Conference of State Legislatures to advance and defend a

It is the policy of the National Conference of State Legislatures to advance and defend a COMMITTEE: POLICY: TYPE: LAW AND CRIMINAL JUSTICE CRIMINAL JUSTICE CONSENT It is the policy of the National Conference of State Legislatures to advance and defend a balanced, dynamic criminal justice partnership

More information

As part of their course on law and/or sociology in this module, participants will be able to:

As part of their course on law and/or sociology in this module, participants will be able to: Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart

More information

Psychology, Social Work and Human Sciences

Psychology, Social Work and Human Sciences School of, Social Work and Human Sciences UG PG Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies, based at our Brentford site

More information

Issue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009.

Issue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009. Arizona State Senate Issue Brief November 23, 2009 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members

More information

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union WAPIS PROGRAMME West African Police Information System This Programme is funded by the European Union WAPIS PROGRAMME Contents 1. Origin 4 2. What is WAPIS? 5 2.1 Overall objectives 6 2.2 Main stakeholders

More information

MSc Forensic Psychology

MSc Forensic Psychology MSc Forensic Programme Specification Faculty of Business, Law and Social Sciences May 2015 Programme Specification MSc Forensic NOTE: This specification provides a concise summary of the main features

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

Ethical Hacking & Cyber Security Workshop

Ethical Hacking & Cyber Security Workshop Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: info@i3indya.com

More information

Diablo Valley College Catalog 2014-2015

Diablo Valley College Catalog 2014-2015 ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,

More information

Linux and Law Enforcement

Linux and Law Enforcement Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University Joshua@cybercrimetech.com http://forensics.sch.ac.kr

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA United Nations Study on Violence against Children Response to the questionnaire received from the Government of the Republic of GUYANA 1 MINISTRY OF LABOUR, HUMAN SERVICES & SOCIAL SECURITY RESPONSE TO

More information