Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence

Size: px
Start display at page:

Download "Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence"

Transcription

1 Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence City of Bogota, Colombia, September 26-30, 2011 DURATION: 5 days CLASS TIME: 34 hours LOCATION: (Police) Officials Social Center (Centro Social de Oficiales), National Police of Colombia, City of Bogota. 1. COURSE SUMMARY 1.1 DOCTRINAL FRAMEWORK Determined to develop the Police Management Pillar contained within the Commitment to Public Security in the Americas (2008), the National Police of Colombia together with the Organization of American States will convene a training course entitled Management of Police Intelligence. This activity forms part of the Inter-American Police Training Program and will take place from September 26 to September 30, 2011 in the City of Bogota. Management of Police Intelligence hopes to imbue participants with the necessary skills for the management and administration of police intelligence units. An emphasis will be placed upon the transfer of knowledge in the field of police intelligence doctrine, producing intelligence, developing technical operations, risk management, amongst others. 1.2 OBJECTIVE Participants will be taken step-by-step through the model and experience of the National Police of Colombia s Intelligence Service. Additionally, each participant will present his/her country s

2 experience and know-how relating to police intelligence models with a view to enrich and addvalue to the themes discussed. 1.3 JUSTIFICATION Organized crime presents a challenge to the region s authorities and particularly police institutions which are charged with the responsibility of designing strategies to reduce the impact of criminality and advance the process of providing citizen security. A key priority for governments, this work translates into the strengthening and professionalization of police corps to forge more dynamic cooperation mechanisms. Said mechanisms aim to assist investigations, share operational experiences and exchange information relating to combating the different faces of crime. The National Police of Colombia and the Organization of American States have come together to offer a training course for intelligence service operatives belonging to OAS Member States police forces. The Course s objective is to generate greater regional integration through the sharing of experiences and the strengthening of cooperation mechanisms. 2. COURSE STRUCTURE MANAGEMENT OF POLICE INTELLIGENCE FIELD AREA MODULE DURATION (HOURS) I - DOCTRINE FOR POLICE INTELLIGENCE 2 POLICE TRAINING POLICE INTELLIGENCE II INTERNATIONAL COOPERATION MECHANISMS 2 III STRATEGIC COUNTER-INTELLIGENCE 2 IV PRODUCTION OF INTELLIGENCE 10 V PROSPECTIVE INTELLIGENCE 2 VI INFORMATION SECURITY 8 VII INTELLIGENCE FOR TECHNICAL OPERATIONS 8 COURSE DURATION (TOTAL/HOURS) ACADEMIC FRAMEWORK The Program takes place over five working days, with a total of 34 class hours during which participants will receive training in the field of police intelligence as per the modules listed above.

3 2.2 METHODOLOGICAL FRAMEWORK Through the provision of round-table discussions together with spaces for private study, it is hoped that the Course will help participants gain knowledge as well as understand and reflect upon the issues at hand. The course is active with participants required to take part in the learning process to acquire knowledge and enhance their ability to objectively undertake analysis with a view to strengthening institutional principles in the field of police intelligence. The methodological framework is designed so that participants orientate their thoughts and actions in an intelligent manner facilitating application of the content disseminated. 3. KNOWLEDGE ACQUSITION TABLE KNOWLEDGE ACQUSITION TABLE KNOW KNOW HOW TO BE Processes belonging to police intelligence services Techniques for the collection, production and dissemination of intelligence information. Development of interpersonal relations based on human values and ethics Basic techniques for the management of information security Techniques for intellectual and investigative work Doctrine and philosophy of Follow-up on the processes and procedures belonging to police intelligence services Harness strategic and operational thinking Adapt to different mediums Collect Information Be coherent in thoughts, feelings and actions Collect information and produce and disseminate intelligence Communicate effectively, both with individuals and Responsible and Committed Honest Objective Able to work as part of a team Respectful Loyal Sociable Inquisitive Safe

4 the Office of Police Intelligence Manuals and Rules which regulate the police intelligence service groups Apply the necessary information security protocols 4. COURSE SYALLABUS 4.1 MODULE I: DOCTRINE FOR POLICE INTELLIGENCE 2 HOURS OVERALL OBJECTIVE Define and distinguish between the basic principles on which the Police Intelligence Service is based THEMES AND SUB-THEMES 1. Historical Overview of Police Intelligence 2. Structure 3. Organization of the Police Intelligence Service 4. Fostering an Atmosphere for Responsible Behavior 5. Membership of the National/International Intelligence Community 6. Membership of the Police Intelligence Council (as the National Police of Colombia s role as lead-organization of the body) 7. Regional Intelligence Units 8. Intelligence in different police districts/precincts 9. Directorates of Police Intelligence 10. Role of Police Intelligence Service 11. Role of Intelligence Service in general 12. Police Intelligence Service and Judicial Police 13. Basic Principles pertaining to the Police Intelligence Service 14. Principles 15. Vision and Mission of the Service 16. Quality Assurance Policy 17. Objectives of Quality Assurance 18. Strategic Objectives 19. Strategies to ensure consolidation of the Police Intelligence Service 20. Possible Future Scenarios for the Police Intelligence Service 4.2 MODULE II: MECHANISMS FOR INTERNATIONAL COOPERATION 2 HOURS

5 4.2.1 OVERALL OBJECTIVE Understand the different international cooperation mechanisms in order to strengthen the fight against transnational crime THEMES AND SUB-THEMES 1. Globalization of Information 2. Integration into the International System 3. International Relations from the perspective of Police Intelligence 4.3 MODULE III: STRATEGIC COUNTER-INTELLIGENCE 2 HOURS OVERALL OBJECTIVE Comprehend the principal characteristics of counter-intelligence with a view to developing police operations in the Americas: identifying risks, vulnerabilities and threats which (in certain circumstances) could affect operational security THEMES AND SUB-THEMES 1. General Principles pertaining to the field of Counter-Intelligence 2. Variables of Strategic Interest pertaining to Counter-Intelligence in Colombia (National Strategy for the Protection of the State and its Institutions: ENPEI) 3. Behavioral Analysis and General Framework of Police Corruption 4. Detecting Corruption 5. Low-level and Common Corruption 6. Analysis of Police Corruption through the Theory of Robert Klitgaard 7. Internal and External Causes of Police Corruption 8. Relevance of Public Security vis-à-vis protecting the Nation 9. Risk Management 4.4 MODULE IV: PRODUCTION OF INTELLIGENCE 10 HOURS OVERALL OBJECTIVE Each participant will learn and be able to make use of the information process in an integral manner. Said process is a key element in the intelligence cycle, producing knowledge across the extent of the various intelligence products THEMES AND SUB-THEMES 1. Administration of Information 2. The Information Community

6 3. Ways of Managing Intelligence originating from open sources 4. Ways of Managing Intelligence originating from closed sources 5. Administration of Integral Information systems 6. IT Tools 7. Treatment of Information 8. Organization of Information 9. Classification of Information 10. Preliminary Evaluation of Information 11. Registration of Information 12. Evaluation of Information 13. Reliability of Source 14. Credibility of Information 15. Information Analysis 16. Four Theories: (16.1) Decision-making Theory, (16.2) Perception-orientated Theory, (16.3) Theory of Rationality, (16.4) Motive-based Theory 17. Factors to consider when analyzing intelligence 18. Methods and Techniques of Analysis 19. Strategic Analysis vs. Operational Analysis 20. Analysis of Strategic Intelligence in Decision-making 21. Components of Strategic Analysis 22. Strategic Police Intelligence 23. Contextualization and Application of Strategic Intelligence Analysis 4.5 MODULE V: PROSPECTIVE INTELLIGENCE 2 HOURS OVERALL OBJECTIVE Orientation of candidates towards various future scenarios with a view to permitting them to take calculated decisions based on current information available THEMES AND SUB-THEMES 1. What is Prospective Intelligence? 2. Relationship between Prospective Intelligence and its Epistemological Field of Application 3. Prospective Intelligence from an Intelligence Service point-of-view 4. Strategic Challenges pertaining to Prospective Intelligence 4.6 MODULE VI: INFORMATION SECURITY 8 HOURS OVERALL OBJECTIVE The participant will be able to conceptualize and apply fundamental information security principles, putting them continually into action in accordance with relevant protocols whilst

7 using the necessary technological tools to generate an information security culture, as per the relevant institutional requirements THEMES AND SUB-THEMES BASIC PRINCIPLES OF INFORMATION SECURITY 1. Security 2. Basic Terminology pertaining to the field of Security 3. Risks 4. Prevention 5. Hints/Clues 6. Threats 7. Danger 8. Incidents 9. Crises 10. Vulnerability TYPES OF SECURITY 1. Public Security 2. National Security 3. Societal Security 4. Juridical/Institutional Security 5. Civil Security 6. Private Security 7. Territorial Security 8. Collective Security 9. Integral Security 10. Information Security 11. Information Security as understood the National Police of Colombia s Intelligence Office (DIPOL) BASIC CONCEPTS PERTAINING TO INFORMATION SECURITY 1. Confidentiality 2. Integrity 3. Secrecy 4. Permanence 5. Access to Information INFORMATION SECURITY 1. Who accesses networks without authorization?

8 2. Individuals within an organization 3. Individuals outside an organization SECURITY POLICIES 1. Those responsible for security 2. Why is a security policy required? 3. Creating a security policy CRYPTOGRAPHY 1. Definition 2. Relevant Technology 3. Properties related to Codifying Techniques 4. Systems made for Cryptography/Crypto-analysis 5. Methods for Codifying 6. Substitution Ciphers 7. Transposition Ciphers 8. Spartan Scitala Cipher 9. Polybius Cipher 10. Ciphering the Indecipherable Cipher 11. Steganography 12. Authorities providing Certification FIREWALLS 1. What do firewalls do? 2. What are the different types of firewalls? 3. How do firewalls provide security? PROXY SERVERS 1. Host and Proxy Servers 2. Which is the most secure? 3. Hackers, Crackers and other information system criminals 4. Common Hacking techniques INFORMATION SECURITY 1. Definitions INFORMATION CLASSIFICATION LEVELS 1. Strategic Information

9 2. Criminal Information SYSTEMS AND EQUIPMENT USED FOR COMPUTATION 1. Recommendations for the use of computation systems and equipment INTELLIGENCE DATA PROTECTION CENTERS 1. Creation 2. Structure 3. Functions of Intelligence Data Protection Centers 4. Groups 5. Information Reception and Dissemination Unit 6. Doctrine and Overall Control of Information Unit 7. Culture 8. Security and Control of Information Unit 9. Educational Protocol No. 020/ DIPOL - PLANE 10. Information Security Protocol (PSI-DIPOL) 11. Reference Documents and Rules 12. Security Rules for the Protection of Information 13. Security Rules for IT Systems 14. Security Rules for Operatives 15. Violations of Information Security Protocol (PSI-DIPOL) 16. IT Systems Security Violations 17. Operative Security Violations 18. Application of the Information Security Protocol (PSI-DIPOL) as a response to information security violations 4.7 MODULE VII: INTELLIGENCE FOR TECHNICAL OPERATIONS 8 HOURS OVERALL OBJECTIVE The participant will be able to apply technical operations knowledge learnt with a view to developing know-how and skills so that he/she may act professionally to prevent activities undertaken by terrorists, drug traffickers and common- and organized criminal groups THEMES AND SUB-THEMES 1. Technical Intelligence Operations 2. Basic Operations 3. Specialized Operations 4. Operational Police Intelligence Models 5. Differences between Conventional Operations and Intelligence-led Operations 6. Structure and Function of Technical Operations

10 7. A Casuistry-based approach to Police Intelligence 8. Applied Strategic Methodologies TOTAL PAGES: 10 (TEN)

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies

More information

CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC

CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC 124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership

More information

Criminal Justice Courses

Criminal Justice Courses Criminal Justice Courses Course ID Course Title Credits CJ-100 Introduction to Criminal Justice and Administration 3 CJ-110 Criminal Law 3 CJ-120 Introduction to Law and the Court Systems 3 PSY-100 Essentials

More information

BORDER SECURITY AND MANAGEMENT CONCEPT

BORDER SECURITY AND MANAGEMENT CONCEPT MC.DOC/2/05 Organization for Security and Co-operation in Europe Ministerial Council Ljubljana 2005 Original: ENGLISH Second day of the Thirteenth Meeting MC(13) Journal No. 2, Agenda item 8 BORDER SECURITY

More information

Good practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons

Good practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons Distr.: General 9 December 2009 Original: English Working Group on Trafficking in Persons Vienna, 27-29 January 2010 Item 6 of the provisional agenda * Good practices and tools for use in case management,

More information

STRATEGIC PLAN 2013/2014 TO 2015/2016

STRATEGIC PLAN 2013/2014 TO 2015/2016 STRATEGIC PLAN 2013/2014 TO 2015/2016 1. WCO Strategic Plan Introduction 1. The purpose of this document is to present the WCO Strategic Plan that was approved by the Council in June 2013 for the years

More information

Adopted by the Security Council at its 5430th meeting, on 28 April 2006

Adopted by the Security Council at its 5430th meeting, on 28 April 2006 United Nations S/RES/1674 (2006) Security Council Distr.: General 28 April 2006 Resolution 1674 (2006) Adopted by the Security Council at its 5430th meeting, on 28 April 2006 The Security Council, Reaffirming

More information

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Twelfth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations

More information

TEMPE POLICE DEPARTMENT CALENDAR YEAR 2012-2014 STRATEGIC PLAN

TEMPE POLICE DEPARTMENT CALENDAR YEAR 2012-2014 STRATEGIC PLAN TEMPE POLICE DEPARTMENT What s Inside Strategic Plan Framework..2 Strategic Goals... 3 Goal 1: Fight Crime......4 Goal 2: Community Involvement..5 Goal 3: Support Employees... 6 Goal 4: Innovation & Technology.7

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas. CEED S PRELIMINARY REPORT TO THE SOUTH AMERICAN DEFENSE COUNCIL ON THE TERMS OF REFERENCE FOR THE CONCEPTS OF SECURITY AND DEFENSE IN THE SOUTH AMERICAN REGION The Centre for Strategic Defense Studies

More information

APPROVE A BUDGET THAT WOULD ALLOW FULL IMPLEMENTATION OF THE NATIONAL ANTI- DRUG PLAN PUBLICATION DATE: JANUARY 2003

APPROVE A BUDGET THAT WOULD ALLOW FULL IMPLEMENTATION OF THE NATIONAL ANTI- DRUG PLAN PUBLICATION DATE: JANUARY 2003 RECOMMENDATION 1: APPROVE A BUDGET THAT WOULD ALLOW FULL IMPLEMENTATION OF THE NATIONAL ANTI- DRUG PLAN Nicaragua reports that it negotiated a loan with the Inter-American Development Bank (IDB), to be

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

15 December 2015. Crime Prevention and Anti-Fraud Policy

15 December 2015. Crime Prevention and Anti-Fraud Policy 15 December 2015 Crime Prevention and Anti-Fraud Policy Content 1. Purpose 3 2. Scope 3 3. Action Principles 3 4. Control, Evaluation, and Revision 4 Look after the Environment. Print in black and white,

More information

Human Resource Management

Human Resource Management Human Resource Management Module 18 Participate in this seminar to learn more about the board of education s role as an employer. Module 18 workshop and resource materials include these important topics:

More information

ASSOCIATION OF CARIBBEAN STATES (ACS) 19th MEETING OF THE SPECIAL COMMITTEE FOR DISASTER RISK REDUCTION. Bogotá, Colombia, August 2-3 2011

ASSOCIATION OF CARIBBEAN STATES (ACS) 19th MEETING OF THE SPECIAL COMMITTEE FOR DISASTER RISK REDUCTION. Bogotá, Colombia, August 2-3 2011 ACS/2011/DRR.19/WP.002 Original: English Last update: 26 July 2011 ASSOCIATION OF CARIBBEAN STATES (ACS) 19th MEETING OF THE SPECIAL COMMITTEE FOR DISASTER RISK REDUCTION Bogotá, Colombia, August 2-3 2011

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies

Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies Prepared by The Global Justice Information Sharing Initiative Intelligence Working Group

More information

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group Good Governance. EU Work Plan for Sport EU Work Plan for Sport 2011-2014 Expert Group "Good Governance Deliverable 1 Input on the EU's role in fighting match-fixing J u n e 2012 2 1. INTRODUCTION The EU Work Plan for Sport identifies integrity

More information

Elaboration of the Declaration on Universal Norms on Bioethics : Third Outline of a Text

Elaboration of the Declaration on Universal Norms on Bioethics : Third Outline of a Text United Nations Educational, Scientific and Cultural Organisation Organisation des Nations Unies pour l éducation, la science et la culture International Bioethics Committee (IBC) Distribution: limited

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

The Department of the Treasury established the Financial Crimes

The Department of the Treasury established the Financial Crimes Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

PORTLAND POLICE BUREAU CRIMINAL INTELLIGENCE UNIT STANDARD OPERATING PROCEDURE

PORTLAND POLICE BUREAU CRIMINAL INTELLIGENCE UNIT STANDARD OPERATING PROCEDURE PORTLAND POLICE BUREAU CRIMINAL INTELLIGENCE UNIT STANDARD OPERATING PROCEDURE SOP CIU #23 Effective: July 22, 2011 Review: July 22, 2012 SUBJECT: Criminal Intelligence Unit JTTF Standard Operating Procedure.

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State

More information

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview Each graduate certificate program consists of five courses which are delivered entirely online in sequential

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

Presidency conclusions on establishing a strategy to combat the manipulation of sport results COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27

More information

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE Strasbourg, 29 November 2006 CCPE (2006) 05 Rev final CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE as approved by the Committee of Ministers

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,

More information

Law of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions

Law of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Law of Georgia on Combating Human Trafficking (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Article 1. Scope of Regulation This Law determines the organizational

More information

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

TARGET MEASUREMENT STATUS As of 31 Aug 99. As of 1 Feb 98

TARGET MEASUREMENT STATUS As of 31 Aug 99. As of 1 Feb 98 9.1. The Governments of Mexico and the U.S. will work to ensure ratification by the congresses of the two nations of the Inter-American Convention Against Corruption, adopted in May 1996 by the OAS. Mexico

More information

University of Turku HUMAN RESOURCES POLICY

University of Turku HUMAN RESOURCES POLICY University of Turku HUMAN RESOURCES POLICY Publisher Turun yliopisto Layout Mirja Sarlin Suomen Yliopistopaino Oy Uniprint 2012 University of Turku HUMAN RESOURCES POLICY Approved by the Board 28 March

More information

CA Practical Experience Requirements

CA Practical Experience Requirements CA Practical Experience Requirements 2010 Mission for the CICA Our mission is to foster public confidence in the CA profession by acting in the public interest and helping our members excel. Vision Statement

More information

Europol Unclassified Basic Protection Level VACANCY NOTICE

Europol Unclassified Basic Protection Level VACANCY NOTICE The Hague, 16 March 2015 Reg. nº: Europol/2015/TA/AD6/185 VACANCY NOTICE Name of the post: Specialist in Computer Forensics and Malware Analysis within the European Cyber Crime Centre (EC3) Business Area

More information

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution. OPP CITY SCHOOLS ASSISTANT PRINCIPAL, ELEMENTARY SCHOOL JOB DESCRIPTION QUALIFICATIONS: (1) Master s degree from an accredited educational institution. (2) Certification in Educational Leadership, School

More information

Reaffirming Bearing in mind Recognizing

Reaffirming Bearing in mind Recognizing AFRICAN UNION MEMORANDUM OF UNDERSTANDING ON COOPERATION IN THE AREA OF PEACE AND SECURITY BETWEEN THE AFRICAN UNION, THE REGIONAL ECONOMIC COMMUNITIES AND THE COORDINATING MECHANISMS OF THE REGIONAL STANDBY

More information

TITLE III JUSTICE, FREEDOM AND SECURITY

TITLE III JUSTICE, FREEDOM AND SECURITY TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

General Corporate Social Responsibility Policy 20/10/15

General Corporate Social Responsibility Policy 20/10/15 General Corporate Social Responsibility Policy 20/10/15 CONTENT GENERAL CORPORATE SOCIAL RESPONSIBILITY POLICY 3 OBJECTIVES 3 1. Objectives of the General Corporate Social Responsibility Policy 3 PRINCIPLES

More information

Crime Prevention and Anti- Fraud Policy of Gamesa Corporación Tecnológica, S.A. (March 23, 2011)

Crime Prevention and Anti- Fraud Policy of Gamesa Corporación Tecnológica, S.A. (March 23, 2011) Crime Prevention and Anti- Fraud Policy of Gamesa Corporación Tecnológica, S.A. (March 23, 2011) I. PURPOSE The Board of Directors of Gamesa Corporación Tecnológica, S.A. (the Company or Gamesa) has been

More information

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL

GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL Chairman Mr. Francis Gichure Kariuki (Kenya) Co-Chairman Mr. Koichiro Hino (Japan) Rapporteur Mr. Ali

More information

Impact and Knowledge Exchange Strategy 2013-2016 Delivering Impact from Research Excellence

Impact and Knowledge Exchange Strategy 2013-2016 Delivering Impact from Research Excellence 1. Background Impact and Knowledge Exchange Strategy 2013-2016 Delivering Impact from Research Excellence Impact is the demonstrable contribution that excellent research (basic, user-inspired and applied)

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS

ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS ABIDJAN, COTE D IVOIRE, 13TH MAY, 2014 Mr. Tony Luka Elumelu, Principal Program Officer Migration Objective of the

More information

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional

More information

DECREE THE GOVERNMENT

DECREE THE GOVERNMENT THE GOVERNMENT No. 103/2006/ND - CP THE SOCIALIST REPUBLIC OF VIETNAM Independence Freedom Happiness ------------------------------ DECREE Hanoi, September 22, 2006 Making detailed provisions and providing

More information

College of Occupational Therapists Specialist Section Independent Practice. Code of Business Practice

College of Occupational Therapists Specialist Section Independent Practice. Code of Business Practice College of Occupational Therapists Specialist Section Independent Practice Code of Business Practice Published by the College of Occupational Therapists 106-114 Borough High Street, Southwark, London SE1

More information

Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University

Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University The purpose of the doctoral program in Educational Leadership is to

More information

The Standards of Good Practice for Education Abroad The Forum on Education Abroad May 2007

The Standards of Good Practice for Education Abroad The Forum on Education Abroad May 2007 The Standards of Good Practice for Education Abroad The Forum on Education Abroad May 2007 DEFINITION OF TERMS Education Abroad Program (or Program) In-classroom and out-of-classroom related activities

More information

How To Become A Criminal Justice Professional

How To Become A Criminal Justice Professional Mission The mission of the Curry College Master of Arts in (MACJ) program is to provide students with the intellectual and pragmatic skills needed to become effective leaders, reflective practitioners,

More information

International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION

International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the

More information

IOE Learning and Teaching Strategy 2014-2017

IOE Learning and Teaching Strategy 2014-2017 Institute of Education University of London IOE Learning and Teaching Strategy 2014-2017 1. IOE Strategic Plan: vision and mission Our vision for 2017: The IOE will be a powerful champion of excellence

More information

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters CALL FOR EVIDENCE ON THE GOVERNMENT S REVIEW OF THE BALANCE OF COMPETENCES BETWEEN THE UNITED KINGDOM AND THE EUROPEAN UNION Police and Criminal Justice LEGAL ANNEX Section 1: Development of the EU s competence

More information

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency CEAS ANALYSIS of the Law on Amendments of the Law on the Security Intelligence Agency Belgrade, July 2014. CEAS is supported by the Rockefeller Brother s Fund The views and analysis in this report do not

More information

Declaration of the Ministerial Conference of the Khartoum Process

Declaration of the Ministerial Conference of the Khartoum Process Declaration of the Ministerial Conference of the Khartoum Process (EU-Horn of Africa Migration Route Initiative) Rome, 28 th November 2014 We, Ministers of the following countries: Austria, Belgium, Bulgaria,

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

United Nations Educational, Scientific and Cultural Organisation Organisation des Nations Unies pour l éducation, la science et la culture

United Nations Educational, Scientific and Cultural Organisation Organisation des Nations Unies pour l éducation, la science et la culture United Nations Educational, Scientific and Cultural Organisation Organisation des Nations Unies pour l éducation, la science et la culture International Bioethics Committee (IBC) Distribution: limited

More information

GaPSC Teacher Leadership Program Standards

GaPSC Teacher Leadership Program Standards GaPSC Teacher Leadership Program Standards Purpose: Georgia has identified a need to improve P-12 students academic performance as measured by various assessments. One method to ensure improved student

More information

Guide on Developing a HRM Plan

Guide on Developing a HRM Plan Guide on Developing a HRM Plan Civil Service Branch June 1996 Table of Contents Introduction What is a HRM Plan? Critical Success Factors for Developing the HRM Plan A Shift in Mindset The HRM Plan in

More information

Financial Crimes Enforcement Network

Financial Crimes Enforcement Network Fiscal Years 2008 2012 Financial Crimes Enforcement Network Table of Contents Message from the Director 1 Introduction 3 The Bank Secrecy Act 4 The Nation s Financial Intelligence Unit 5 Mission Statement

More information

Academic Program Assessment Plan Certificate: Homeland Security Studies

Academic Program Assessment Plan Certificate: Homeland Security Studies Academic Program Assessment Plan Certificate: Homeland Security Studies Department of History and Political Science College of Humanities and Social Sciences Colorado State University-Pueblo Plan appended

More information

provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:

provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions: REPORT of the Financial Monitoring Service under the Central Bank of the Republic of Azerbaijan on execution of The 2007-2011 Action Plan for implementation of the National Strategy for Combatting Corruption

More information

CROATIAN PARLIAMENT 1364

CROATIAN PARLIAMENT 1364 CROATIAN PARLIAMENT 1364 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON PERSONAL DATA PROTECTION I hereby promulgate the Act on

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 17 December 2003 (OR. en) 14994/03. Interinstitutional File: 2002/0043 (CNS) MIGR 101

COUNCIL OF THE EUROPEAN UNION. Brussels, 17 December 2003 (OR. en) 14994/03. Interinstitutional File: 2002/0043 (CNS) MIGR 101 COUNCIL OF THE EUROPEAN UNION Brussels, 17 December 2003 (OR. en) Interinstitutional File: 2002/0043 (CNS) 14994/03 MIGR 101 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Directive on the residence

More information

Intelligence Training Standards

Intelligence Training Standards Minimum Criminal Intelligence Training for Law Enforcement and Other Criminal Justice Agencies in the United States Findings and Recommendations October 2007 Version 2 About Global The U.S. Department

More information

Criminal Justice Technology Credential: Associate in Applied Science Degree in Criminal Justice Technology (A55180)

Criminal Justice Technology Credential: Associate in Applied Science Degree in Criminal Justice Technology (A55180) Criminal Justice Technology Credential: Associate in Applied Science Degree in Criminal Justice Technology (A55180) Career Pathway Options: Associate in Applied Science in Criminal Justice Technology Program

More information

www.thalesgroup.com Business Ethics Conduct Guide Best Practices Guide in information management

www.thalesgroup.com Business Ethics Conduct Guide Best Practices Guide in information management www.thalesgroup.com Business Ethics Conduct Guide Best Practices Guide in information management 2 Contents PrEface...3 Protection and disclosure of information...5 Thales classification... 7 Acquiring

More information

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services NYA International B Effective risk management begins with a comprehensive understanding of the threat and an organisation s vulnerability, and the application of appropriate mitigation measures. Operating

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Business impact levels Approved November 2014 Amended April 2015 Version 2.1 Commonwealth of Australia 2013 All material presented in this publication is provided

More information

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text

More information

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended

More information

Optional Protocol on the sale of children, child prostitution and child pornography

Optional Protocol on the sale of children, child prostitution and child pornography United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol

More information

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY

More information

COUNSELING PRACTICUM HANDBOOK

COUNSELING PRACTICUM HANDBOOK COUNSELING PRACTICUM HANDBOOK Educational Leadership and Counseling Whitlowe R. Green College of Education Prairie View A&M University P.O. Box 519; MS 2430 Prairie View, TX 77446-0519 936-261- 3645 936-261-

More information

Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108

Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Student Full Name: Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Auburn University is an equal opportunity

More information

Security Accreditation, Management and Monitoring - Getting the Balance Right!

Security Accreditation, Management and Monitoring - Getting the Balance Right! Security Accreditation, Management and Monitoring - Getting the Balance Right! Author Peter J Fischer, Asset Security Manager, Government Communications Headquarters, Cheltenham, UK Tel: +44-1242-221491,

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture)

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture) Globalization of Security Threat Groups (CJSA 2371) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on

More information

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Sweden 17 October 2007 INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP) Discussion paper on the essentials of a European information network in 2014 I. The

More information

Maryland Branch Campus

Maryland Branch Campus Maryland Branch Campus Bachelor of Arts in Social Sciences Criminal Justice BACHELOR DEGREE BACHELOR OF ARTS IN SOCIAL SCIENCES (BA) Major in Criminal Justice 126 Credits Offered at the Capital Area Campus

More information

Small Arms. International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons

Small Arms. International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons Small Arms REVIEW CONFERENCE 2006 United Nations A/CONF.192/15 International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons Adopted

More information