CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
|
|
- Mervyn Nicholson
- 8 years ago
- Views:
Transcription
1 COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 The responses provided below focus on the use of the United States federal criminal law enforcement authorities as the key to combating misuse of the Internet for criminal and terrorist purposes. Therefore, the responses do not seek to address every action the United States might take at the national level with regard to cybercrime or cyberterrorism, but rather those actions and policies that are most commonly employed by federal prosecutors and law enforcement agencies. Furthermore, the United States has attempted to provide responses from national experience that can be readily adopted by other states through full implementation of the Council of Europe s Convention on Cybercrime. A. National Policy 1. Is there a national policy regarding the analysis, detection, prosecution and prevention of cybercrime in general and the misuse of cyberspace for terrorist purposes in particular? If yes, please briefly describe it. In 2003, the President of the United States signed the National Strategy to Secure Cyberspace. The National Strategy s strategic objectives are to (1) prevent cyber attacks against America s critical infrastructures; (2) reduce national vulnerability to cyber attacks; and (3) minimise damage and recovery time from cyber attacks that do occur. As explained in the National Strategy, the United States Department of Justice and the Federal Bureau of Investigation lead the national effort to investigate and prosecute cybercrime. The United States has enacted criminal laws that allow for the investigation and prosecution of a wide range of cybercrimes, whether committed by individuals, organised criminal groups, institutions, or terrorists. Law enforcement agencies at the federal, state and local levels investigate cybercrimes and other criminal offences that target or involve computers and computer networks. The United States works closely with other nations to counter cybercrime, through institutions such as the 24/7 emergency contact network, multilateral treaties such as the Convention on Cybercrime, and bilateral mutual legal assistance and extradition treaties. The United States is a strong proponent of the Convention on Cybercrime and urges all Council of Europe member states and other interested parties who have not done so to implement it as a key step to combat transnational cybercrime and misuse of cyberspace for terrorist purposes. For further information please see the Country profiles on counter-terrorism capacity at Pour plus de renseignements, veuillez consulter les Profils nationaux sur la capacité de lutte contre le terrorisme:
2 2 B. Legal Framework 2. Does your national legislation criminalise the misuse of cyberspace for terrorist purposes, and a. are these offences specifically defined with regard to the terrorist nature or technical means of committing the crime, or b. is the misuse covered by other, non-specific criminal offences? How are these offences defined and which sanctions (criminal, administrative, civil) are attached? a. The United States has enacted its cybercrime laws to focus on the acts committed (such as hacking, distributed denial of service attacks, furthering a fraud through the use of a computer), rather than the identity of the perpetrator. Although U.S. cybercrime laws take into account potential results from terrorist acts, those laws do not require proof of terrorist intent. b. The United States has enacted specific criminal offences related to terrorism (such as providing material support to terrorists or financing terrorism), but cybercrimes are investigated and prosecuted as described in the answer to question 2.a. The United States has enacted criminal laws that allow for the investigation and prosecution of a wide range of cybercrimes, whether committed by individuals, organised criminal groups, institutions or terrorists. The United States has also enacted criminal laws that allow for the investigation and prosecution of certain criminal offences related to terrorism (such as providing material support to terrorists or financing terrorism). Furthermore, under U.S. law, the same set of facts may give rise to multiple charges, provided that each charge alleges some different element. Thus a person who commits a cybercrime for the purpose of, for example, providing material support to a terrorist organisation may be guilty of multiple offences arising out of the same conduct. Individuals convicted of violating the key United States federal cybercrime statute, Title 18 U.S. Code, Section 1030 (Fraud and related activity in connection with computers), may, depending on the circumstances, be sentenced to imprisonment for a term of years (or for life, if the offender knowingly or recklessly caused or attempted to cause death for certain violations), ordered to serve a term of supervised release, ordered to pay restitution to victims, and/or ordered to pay a fine. In addition, criminal and civil asset forfeiture statutes may be used to seize and forfeit to the government proceeds and property used in, or derived from, the criminal activity. Individuals convicted of violating terrorism criminal statutes enumerated in Title 18 U.S. Code, Chapter 113B, are subject to similar criminal penalties. U.S. law provides for increased criminal penalties for certain terrorism-related offences. Some violations of Title 18 U.S. Code, Section 1030 (Fraud and related activity in connection with computers), are included within the enumerated list of "federal crimes of terrorism," contained in Title 18 U.S. Code, Section 2332b (Acts of terrorism transcending national boundaries). 3. Do you plan to introduce new legislation to counter terrorist misuse of cyberspace? What are the basic concepts of these legislative initiatives? There are no indications that the executive branch of the U.S. government plans to propose any such legislation. It should be noted, however, that any legislation enacted on this topic would have to be consistent with the freedom of speech protections contained in the First Amendment of the U.S. Constitution. 4. What are the existing national practices in the field of detecting, monitoring and closing down websites used for terrorist purposes? In the United States, federal, state and local law enforcement agencies may, during the course of a criminal investigation and consistent with U.S. law, read and gather information from publiclyavailable websites that promote violations of U.S. law, such as violent crimes, money laundering or
3 3 material support for terrorists. Similarly, the United States Government will, consistent with U.S. law, read and review publicly-available websites that promote violence or terrorism against United States citizens. 5. Does your national legislation provide criteria for establishing jurisdiction over such offences? What are those criteria? The cybercrime offences contained in Title 18 of the United States code can, depending on the offence, have both domestic and extra-territorial application. Both domestically and extraterritorially, this jurisdiction is very broad and based on factors such as whether the offence affects interstate or foreign commerce, the identity of the victim or intended victim, and where the offence is committed. Under Title 18 of the United States Code, Section 1030 (Fraud and related activity in connection with computers), jurisdiction is generally based on whether the affected computer is a "protected computer" as defined in Section 1030(e)(2). Examples of a "protected computer" include a computer which is used in interstate or foreign commerce, a computer exclusively for the use of a financial institution or the United States Government or a computer used by a non-u.s. bank or non-u.s. government agency. 6. Does your national legal system establish ancillary offences related to the misuse of cyberspace? Under United States criminal law, individuals may be convicted of a criminal offence, including a cybercrime or terrorism offence, if they commit the offence themselves, or if they aid, abet, counsel, command, induce or procure another to commit the offence. An individual may also be convicted of attempting to commit, or conspiring to commit, a cybercrime offence. In addition, criminal liability based on attempt and conspiracy applies to most terrorism offences. 7. What kind of national procedures do you have for submitting an application on the activities of Internet-providers and/or hosting companies, to deprive a user from a domain name or to cancel his/her/its registration or licence? Under United States criminal law, any property used to commit a criminal offence, or derived from the proceeds of criminal activity, may be subject to criminal and civil seizure and forfeiture. In certain circumstances, a domain name could be subject to criminal forfeiture. For example, in one criminal prosecution brought by the United States Department of Justice, the domain name for a notorious international, online criminal marketplace was criminally forfeited to the United States government. 8. What non-legislative measures do your have in your country to prevent and counter terrorist misuse of cyberspace, including self-regulatory measures? The United States Government sponsors a number of education and awareness programmes designed to counter cybercrime in general, regardless of the identity or intentions of the perpetrators. For example, the Federal Bureau of Investigation website provides information and resources related to protecting computers from the effects of cybercrime: In addition, the United States Government sponsors numerous training programmes, domestically and internationally, focused on preventing, countering, investigating and prosecuting cybercrime and protecting individuals from a wide range of cyber threats. The United States Government actively participates in international organisations that address the issues of cybercrime and cyberterrorism, including the G8, the Council of Europe, the Organization for Security and Co-operation in Europe, the Organization of American States, and numerous others.
4 4 C. International co-operation 9. Please describe the general framework for international co-operation regarding the misuse of cyberspace for terrorist purposes. The United States is strongly committed to promoting international co-operation in the battle against cybercrime, and firmly believes there is already an adequate international framework for co-operation and mutual legal assistance on the issues of cybercrime and cyberterrorism. The existing international framework includes, inter alia: (1) bilateral mutual legal assistance and extradition treaties; (2) international treaties such as the Convention on Cybercrime; (3) multilateral organisations such as the Council of Europe and the United Nations; and (4) law enforcement contact networks such as the 24/7 emergency contact network. The United States supports the recognition of the Convention on Cybercrime as the one international standard for fighting cybercrime. The United States believes that the investigative and international co-operation tools set forth in the Convention on Cybercrime are precisely the tools needed to identify and prosecute criminals and terrorists for their misuse of, and attacks on, computers and computer networks. 10. What are the existing practices and experiences with regard to international cooperation, in particular in relation to the procedures described in question 4? The international co-operation framework and mechanisms described in the answer to question 9 can be employed to deal with a wide range of criminal or terrorist conduct. As to international co-operation relating to detecting, monitoring, and closing down websites used for terrorist purposes (question 4), the United States does receive foreign requests for such assistance. It processes them in the same way as other requests (prioritizing them according to urgency, etc). D. Institutional Framework 11. Please list the institutions that are competent to countering terrorist misuse of cyberspace. The Federal Bureau of Investigation and the United States Secret Service are the two principal U.S. law enforcement agencies responsible for investigating cybercrime. The Federal Bureau of Investigation has primary responsibility for investigating terrorism crimes that occur in or affect the United States. Two of the top three priorities for the FBI are protecting the United States from terrorist attack and protecting the United States against cyber-based attacks and high-technology crimes. The United States Department of Justice has responsibility for prosecuting both cybercrimes (e.g. hacking and distributed denial of service attacks) and terrorism crimes (e.g. providing material support to terrorists). The United States Department of Homeland Security has responsibility for safeguarding the United States critical infrastructure, including the telecommunications infrastructure and the Internet. 12. Are there any partnerships between the public and private sectors (Internet-service providers, hosting companies, etc.) to counter terrorist misuse of cyberspace? The United States Department of Justice, the Federal Bureau of Investigation, the U.S. Secret Service and the Department of Homeland Security have many formal and informal relationships with public and private sector entities, some of which address the misuse of cyberspace.
5 5 E. Statistical Information 13. Please provide relevant statistics on offences relating to the misuse of cyberspace for terrorist purposes (including possibly: cases recorded, investigated, brought to court, convictions, victims etc.). The United States does not collect statistics according to these categories. 14. Where possible, please describe briefly the profile of offenders typically involved in the misuse of cyberspace for terrorist purposes (professional background, gender, age, nationality), and possible typical organisational characteristics, including trans-national links and links to other forms of organised crime. The United States does not collect statistics according to these categories.
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationThe final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES CZECH REPUBLIC July 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationTITLE I FORMER VICE PRESIDENT PROTECTION ACT
122 STAT. 3560 PUBLIC LAW 110 326 SEPT. 26, 2008 Sept. 26, 2008 [H.R. 5938] Former Vice President Protection Act of 2008. 18 USC 1 note. Public Law 110 326 110th Congress An Act To amend title 18, United
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationMigration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
More informationCOUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
More informationHow To Implement International Terrorism Agreements
STATEMENT OF BRAD WIEGMANN DEPUTY ASSISTANT ATTORNEY GENERAL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY UNITED STATES HOUSE OF REPRESENTATIVES
More informationH. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.
F:\SLS\SLS_.XML 0TH CONGRESS D SESSION H. R. To amend titles and, United States Code, to strengthen the protection of intellectual property, and for other purposes. IN THE HOUSE OF REPRESENTATIVES M. introduced
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES SWITZERLAND October 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More informationLEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
More informationBangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress
More informationOptional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
More informationUpdated Administration Proposal: Law Enforcement Provisions
Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber
More informationRegional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.
Anti-Corruption Network for Transition Economies OECD Directorate for Financial, Fiscal and Enterprise Affairs 2, rue André Pascal F-75775 Paris Cedex 16 (France) phone: (+33-1) 45249106, fax: (+33-1)
More informationSCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
More informationCRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPSC/SWE/CO/1 Distr.: General 23 January 2012 Original: English Committee on the Rights of the Child Fifty-eighth session 19 September 7 October
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationCRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES
CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES [As finalized by the ASEAN Ad-Hoc Working Group on Trafficking in Persons, 25 June 2007, Vientiane, Lao PDR; and endorsed
More informationTITLE III JUSTICE, FREEDOM AND SECURITY
TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationAPPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe
More informationCAC/COSP/IRG/2015/CRP.11
28 May 2015 English only Implementation Review Group Sixth session Vienna, 1-5 June 2015 Item 2 of the provisional agenda Review of implementation of the United Nations Convention against Corruption Executive
More informationFEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More information(CHRI) CHECKS OF INDIVIDUALS CONDUCTING BUSINESS IN THE AREA OF INSURANCE AND; 2.)
MR. CHAIRMAN, I AM PLEASED TO APPEAR TODAY ON BEHALF OF THE FBI AND SHARE WITH YOUR SUBCOMMITTEES THE FBI'S PERSPECTIVE ON CRIMINAL HISTORY RECORD INFORMATION CHECKS ON INDIVIDUALS CONDUCTING BUSINESS
More informationAs part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
More informationFederal Act on the Implementation of International Sanctions
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on the Implementation of International Sanctions
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationSwitzerland International Extradition Treaty with the United States
Switzerland International Extradition Treaty with the United States November 14, 1990, Date-Signed September 10, 1997, Date-In-Force 104TH CONGRESS SENATE LETTER OF TRANSMITTAL THE WHITE HOUSE, June 9,
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More information64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,
More informationTrends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
More informationMEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998
INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant
More information18 USC 1030. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 47 - FRAUD AND FALSE STATEMENTS 1030. Fraud and related activity in connection with computers (a) Whoever (1) having knowingly accessed
More informationCybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
More informationTHE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement
More informationEU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
More informationCORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity
FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the
More informationADVANCE UNEDITED VERSION
Committee against Torture Forty-fifth session 1-19 November 2010 List of issues prior to the submission of the second periodic report of Qatar (CAT/C/QAT/2) 1 ADVANCE UNEDITED VERSION Specific information
More informationVictims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats. Dr.
Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats Dr. Michael Kilchling "The Member States of the Council of Europe and the
More informationAn Overview of the U.S. Foreign Corrupt Practices Act of 1977. Frankfurt, 18 March 2013 Christophe Guibert de Bruet
An Overview of the U.S. Foreign Corrupt Practices Act of 1977 Frankfurt, 18 March 2013 Christophe Guibert de Bruet OVERVIEW 1) History of the FCPA 2) Relevant Provisions 3) Enforcement and Recent Trends
More informationU.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
More informationAustralia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia
More informationFEDE DOMESTIC VIOLENCE STATUTES AND ELEMENTS FOR FEDERAL PROSECUTION
FEDE DERAL DOMESTIC VIOLENCE STATUTES AND ELEMENTS FOR FEDERAL PROSECUTION OFFICE OF THE UNITED STATES ATTORNEY DISTRICT OF MAINE SEPTEMBER 2010 INDEX Introduction.. The Violence Against Women Act.. Firearm
More informationFAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More informationNumber 17 of 2015. Criminal Justice (Terrorist Offences) (Amendment) Act 2015
Number 17 of 2015 Criminal Justice (Terrorist Offences) (Amendment) Act 2015 Number 17 of 2015 CRIMINAL JUSTICE (TERRORIST OFFENCES) (AMENDMENT) ACT 2015 Section 1. Definition 2. Regulations CONTENTS
More informationThe President s Task Force on Identity Theft and The FTC s Role in Identity Theft
The President s Task Force on Identity Theft and The FTC s Role in Identity Theft Joanna P. Crane Federal Trade Commission The views expressed are those of the speaker and not necessarily those of the
More informationCrimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
More informationCriminal Justice System Commonly Used Terms & Definitions
Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:
More informationThe criminal and civil justice systems in England and Wales
The criminal and civil justice systems in England and Wales Introduction Important differences exist between UK civil and criminal proceedings that have implications for fraud investigations, including
More informationAdvance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time.
PROTOCOL TO PREVENT, SUPPRESS AND PUNISH TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN, SUPPLEMENTING THE UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Advance copy of the authentic
More information5. The Model Strategies and Practical Measures are aimed at providing de jure and de
MODEL STRATEGIES AND PRACTICAL MEASURES ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN IN THE FIELD OF CRIME PREVENTION AND CRIMINAL JUSTICE 1. The multifaceted nature of violence against women suggests
More informationChairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
More informationPROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL
REPUBLIC OF SOUTH AFRICA PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL (As introduced in the National Assembly as a section 75
More informationAustralia s counter-terrorism laws
Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist
More informationHow To Protect Women From Domestic Violence
U.S. Department of Justice Executive Office for United States Attorneys Office of the Director RFK Main Justice Building, Room 2263 950 Pennsylvania Avenue, NW Washington, DC 20530 (202) 252-1000 MEMORANDUM-
More informationState Laws Legalizing Marijuana Do Not Make Marijuana Legal Under
State Laws Legalizing Marijuana Do Not Make Marijuana Legal Under Federal Law David G. Evans, Esq. Over the last several years, a few states have passed legislation or have fostered ballot initiatives
More informationFINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationSTORAGE NAME: h0151.wfm DATE: October 1, 1999 HOUSE OF REPRESENTATIVES COMMITTEE ON CRIME AND PUNISHMENT ANALYSIS BILL #: HB 151
HOUSE OF REPRESENTATIVES COMMITTEE ON CRIME AND PUNISHMENT ANALYSIS BILL #: HB 151 RELATING TO: SPONSOR(S): TIED BILL(S): Driving Under the Influence Rep. Dockery None ORIGINATING COMMITTEE(S)/COMMITTEE(S)
More informationCyberterrorism: Addressing the Challenges for Establishing an International Legal Framework
Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal
More informationFinal (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK
Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international
More informationChapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime?
Chapter 3 SECTION OPENER / CLOSER: INSERT BOOK COVER ART Section 3.1 Chapter 3 What Criminal Is a Crime? Law Section 3.1 Section 3.2 Particular Crimes Why It s Important Learning the essence of criminal
More informationCompensation. International framework Marjan Wijers
Compensation International framework Marjan Wijers Why? Legal basis International human rights law ECrtHR, Rantsev vs Russia and Cyprus (2010): trafficking falls within the scope of Art. 4 ECHR without
More informationAPG ANNUAL MEETING 2006 JURISDICTION REPORT: NEW ZEALAND. 1. Steps taken since July 2005 to implement the international AML/CFT standards
APG ANNUAL MEETING 2006 JURISDICTION REPORT: NEW ZEALAND 1. Steps taken since July 2005 to implement the international AML/CFT standards (a) Policy/Co-ordination developments (eg enhancement of national
More informationDECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM
MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationFlorida Senate - 2016 Bill No. CS for SB 1044 Ì808816>Î808816
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Proposed Committee Substitute by the Committee on Fiscal Policy (Appropriations Subcommittee on Criminal and Civil Justice) A bill
More informationGlobal Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
More informationTo do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
More informationModern Slavery Act 2015
Modern Slavery Act 2015 CHAPTER 30 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 14.25 Modern Slavery Act 2015 CHAPTER 30 CONTENTS PART 1
More informationAustralian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting
Submission No. 56 0s) 2012 Received j0 1 Law Reform Committee Australian Government Attorney-General's Department Criminal Justice Division Parliament of Victoria Law Reform Committee Inquiry into Sexting
More informationAnti-Money Laundering Measures in the Cayman Islands
Anti-Money Laundering Measures in the Cayman Islands Foreword This memorandum has been prepared for the assistance of those who are considering the law of the Cayman Islands (sometimes referred to as Cayman
More informationLegal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign
PARLIAMENTS UNITED in combating sexual violence against children Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign Tanja Kleinsorge Head of the
More informationCriminal Justice Courses
Criminal Justice Courses Course ID Course Title Credits CJ-100 Introduction to Criminal Justice and Administration 3 CJ-110 Criminal Law 3 CJ-120 Introduction to Law and the Court Systems 3 PSY-100 Essentials
More informationThe Department of the Treasury established the Financial Crimes
Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationThe FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
More informationLegal Studies. Total marks 100
2014 HIGHER SCHOOL CERTIFICATE EXAMINATION Legal Studies Total marks 100 Section I Pages 2 6 20 marks Attempt Questions 1 20 Allow about 30 minutes for this section General Instructions Reading time 5
More informationAncillary Enforcement of Online Gambling Laws
Ancillary Enforcement of Online Gambling Laws For: ABA Emerging Issues in Online Gaming Law Conference By: Lawrence G. Walters Weston, Garrou, Walters & Mooney www.gameattorneys.com Introduction Most online
More informationQatari Law NO. (15)OF YEAR 2011 On Combating Trafficking in Human Beings
Qatari Law NO. (15)OF YEAR 2011 On Combating Trafficking in Human Beings Chapter One-Definitions Article (1) In the implementation of the provisions of this law, the following words shall have the respective
More information2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?
The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council
More informationCRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?
THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationCriminal Liability of Companies Survey. South Africa Bowman Gilfillan
Criminal Liability of Companies Survey South Africa Bowman Gilfillan CONTACT INFORMATION: Dave Loxton Bowman Gilfillan 165 West Street, Sandton Johannesburg, South Africa Tel: 27.11.669.9525 / Fax: 27.11.699.9001
More informationOfficial Journal of the European Union. AGREEMENT on extradition between the European Union and the United States of America
19.7.2003 L 181/27 AGREEMT on extradition between the European Union and the United States of America Preamble CONTTS Article 1 Article 2 Article 3 Article 4 Article 5 Article 6 Article 7 Article 8 Article
More informationCybercrime: Improving international cooperation
The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference [765004] Version [2] Discussion paper Europol Public Information 1 Introduction In preparation
More informationCRIMINAL LAW IMPLICATIONS OF INTERNATIONAL BUSINESS TRANSACTIONS
CRIMINAL LAW IMPLICATIONS OF INTERNATIONAL BUSINESS TRANSACTIONS JULIAN HERMIDA Published in the Comparative Law of International Business Yearbook, Kluwer Law International, The Hague, London and Boston,
More informationCONVENTION ON COMBATING BRIBERY OF FOREIGN PUBLIC OFFICIALS IN INTERNATIONAL BUSINESS TRANSACTIONS. and Related Documents
CONVENTION ON COMBATING BRIBERY OF FOREIGN PUBLIC OFFICIALS IN INTERNATIONAL BUSINESS TRANSACTIONS and Related Documents OECD 2011 Applications for permission to reproduce or translate all or part of this
More informationLaw No. 80 for 2002 Promulgating the Anti-Money Laundering Law And its Amendments ١
Law No. 80 for 2002 Promulgating the Anti-Money Laundering Law And its Amendments ١ In the Name of the People, The President of the Republic, The People's Assembly has passed the following Law, and we
More informationTitle 34-A: CORRECTIONS
Title 34-A: CORRECTIONS Chapter 5: PROBATION AND PAROLE Table of Contents Subchapter 1. GENERAL PROVISIONS... 3 Section 5001. DEFINITIONS... 3 Section 5002. PARDONS BY THE GOVERNOR... 4 Section 5003. PROHIBITED
More informationOutcome of Desk Review Review of Georgia
Mechanism for the Review of the Implementation United Nations Convention against Corruption Outcome of Desk Review Review of Georgia Reviewing countries: Cyprus and Hungary Year II - Phase I 1 P a g e
More informationInternational Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION
International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the
More informationAsset Tracing. PC.DEL/790/12/Rev.1 4 September 2012. Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV
Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV Jean-Bernard Schmid State Prosecutor, Geneva PC.DEL/790/12/Rev.1 4 September 2012 ENGLISH only Asset Tracing
More informationFederal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
More information