Information - Services. CIO Bundeskriminalamt Germany
|
|
- Philomena Carter
- 8 years ago
- Views:
Transcription
1 Information - Services Dr Gunther Guzielski Dr. Gunther Guzielski CIO Bundeskriminalamt Germany
2 Nomadic Usage of telecommunication A phone call between a German accused and a UK-call partner results in two requests for assistance in official matters and a rather complex case European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 2
3 Information analysis Surveillance of an accused with known phone number Phone partner in UK investigation of his phone number relates to a VoIP provider and usage of a temporary IP-address IP-address area is used by a Norwegian mobile phone provider Investigation in Norway shows that this IP-address was temporary used by an Internet t connection within an UMTS connection This UMTS connection was established for a Norwegian cell phone numer, via roaming in Germany in a given broadcaster cell-id European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 3
4 Modelling the Identity of a Person Human identity oath witness/ institution identification action birth certificate memory/document /database identity card/ passport/ drivers license Fingerprint-/ Image-/ iris-/dna-db DN A fingerprin t plastic card teeth biometric mark handwriting voice body, face, birthmark European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 4 iri s
5 Information Analysis complete Event Role Product Location Institution Surveillance of an accused with known phone number Phone partner in UK investigation of his phone number relates to a VoIP provider and usage of a temporary IP-address IP-address area is used by a Norwegian mobile phone provider Investigation in Norway shows that this IP-address was temporary used by an Internet t connection within an UMTS connection This UMTS connection was established for a Norwegian cell phone numer, via roaming in Germany in a given broadcaster cell-id European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 5
6 Modelling the Business Process Akteur-3 <<Richter>> Antrag 5 Akteur-2 <<Telekommunikations-anbieter>> Aufforderung Akteur-2 <<Staatsanwalt>> Verkehrsdaten zukünftig Ausleitung Beschluss Anregung Beschluss Kopie TKÜ-System 13 Bearbeitung Antrag AIF O/S Akteur-1 <<Ermittler>> Akteur-4 <<Telekommunikations-anbieter>> 9 Schaltung Beschluss Kopie Auskunft AIF Akteur-3 <<TKÜ-Service>> European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 6
7 Modelling the Case European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 7
8 Modelling the Data conceptional business data model includes events to take time dimension into account Taxonomies for independent d entities i Person, Institution, Object and Thing Ontology with dependent entities like Ownership, Product, Role, Presence, Place and Location European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 8
9 Data Model Person Person-Institution, Role hosts Institution mit Relationship Person-Object, Presence in is involved in Unit belongs to participates in Person-Thing, Ownership by is used at Event happens at Institution-Object, Location is happens with at zu Link is Institution-Sache, Produkt contains Thing belongs to Thing-Object, Place in in Object contains is part of Part Element European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 9
10 Knowledge documented in Models Akteur-3 <<Richter>> Antrag oath birth certificate identity card/ passport/ drivers license witness/ institution memory/docu ment/databas e Fingerprint-/ Image-/ iris-/dna-db D N A finger print Human identity identification action plastic card teeth biometric mark i r i s handwriting voice body, face, birthmark Akteur-2 <<Telekommunikations-anbieter>> Beschluss Kopie 9 12 Verkehrsdaten zukünftig TKÜ-System 10 O/S Schaltung Ausleitung Bearbeitung Aufforderung Beschluss 14 Beschluss Kopie Akteur-1 <<Ermittler>> Anregung Akteur-2 <<Staatsanwalt>> t Antrag AIF Akteur-4 <<Telekommunikations-anbieter>> 2 Auskunft AIF Person Akteur-3 <<TKÜ-Service>> Person-Institution, Role hosts Institution mit Relationship Person-Object, Presence in participates in is involved in Unit belongs to Person-Thing, Ownership by is used at Event happens at Institution-Object, Location is happens with at zu Link is Institution-Sache, Produkt contains Thing belongs to Part in Thing-Object, Place Object in contains Element European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 10 is part of
11 From Models to Services See Next presentation! European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 11
12 Questions? European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 12
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More informationInviting New Players to the Multimedia M-Commerce Arena
Inviting New Players to the Multimedia M-Commerce Arena An approach to enhance the current M-Commerce business model with regard to emerging DVB-T networks Oslo, 2004-09-17 Stefan Figge T-Mobile Chair
More informationWeber Human Services Identity Theft Prevention Policy
Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure
More informationUNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy
UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE
More informationAppalachian State University Identity Theft Prevention Program Procedures
Appalachian State University Identity Theft Prevention Program Procedures Program Overview I. PURPOSE The purpose of the Program is to: Identify, detect and respond to Red Flags; Prevent and mitigate Identity
More informationSection 1028 - Fraud and related activity in connection with identification documents and information
TITLE 18 > PART I > CHAPTER 47 > Sec. 1028. IDENTITY THEFT Section 1028 - Fraud and related activity in connection with identification documents and information (a) (4) (5) (6) Whoever, in a circumstance
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationIdentity Theft Prevention Program
The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention
More informationLake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Concordia Board of Regents May 2009 A Resolution Adopting the Identity Theft Prevention Program WHEREAS, The Federal Trade Commission, under Part 681 of Title 16 in the
More informationStatewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
More informationCriminal Law Consolidation (Identity Theft) Amendment Act 2003
No 60 of 2003 assented to 11.12.2003 South Australia Criminal Law Consolidation (Identity Theft) Amendment Act 2003 An Act to amend the Criminal Law Consolidation Act 1935 and to make a related amendment
More informationPersonal National Identification System National Population Registry Mexico
Personal National Identification System National Population Registry Mexico January 21st, 2010 1 Operational Diagram Identity Card 1. Birth Certificate 2. Enrollment process 3. Secure Channel 4. Data Bases
More informationCUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4
1. What is Customer Verification CUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4 Customer Verification is a process whereby customers of CIPRO will be verified by an outside service provider
More informationCitizen s Charter (Services of the Embassy)
Citizen s Charter (Services of the Embassy) S. No. Services Documents Required Fees Mode of Payment 1. Visa Duly filled in Visa Application Cash or One passport size photograph deposit in Passport with
More informationAPPLICATION FOR ENLISTMENT IN THE JAMAICA POLICE SERVICE (JCF, ISCF, DC)
APPLICATION FOR ENLISTMENT IN THE JAMAICA POLICE SERVICE (JCF, ISCF, DC) Passport size Photograph The JCF Recruitment Policy aims to recruit suitable and qualified individuals to become a part of the Organization.
More informationVirginia Commonwealth University Information Security Standard
Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,
More informationRHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009
RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if
More informationCOUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM
COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM In Accordance with the Fair and Accurate Credit Transactions Act of 2003 And 16 CFR 681.1 and 16 CFR
More informationDiscover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),
More informationHow to Provide Seamless Services in Fragmented NGA Networks The Open Access Concept of VATM
How to Provide Seamless Services in Fragmented NGA Networks The Open Access Concept of VATM Verband der Anbieter von Telekommunikations- und Mehrwertdiensten e. V. 2 The VATM is the largest competitive
More informationBiometric Template Protection & Usage
Protection & Usage September 23, 2002 Colin Soutar, CTO Bioscrypt Inc. Consortium Conference (BC2002) Company Overview Definition of Terms User Identifier Protection Conclusions 2 Mytec Technologies Inc.
More informationJudicial Council of Georgia
Form 1 Judicial Council of Georgia CERTIFIED PROCESS SERVER APPLICATION 1. Name (Last Name) (First Name) (Middle Initial) 2. Address City State ZIP 3. Work Telephone ( ) 4. Alternate Telephone ( ) 5. of
More informationRegulations concerning measures to combat money laundering and the financing of terrorism, etc.
Regulations concerning measures to combat money laundering and the financing of terrorism, etc. Translation as of April 2009. This translation is for information purposes only. Legal authenticity remains
More informationOverview of the U.S.-Mexico High Level Consultative Commission Cross-Border Communications Long-Term Solution. June 2007
Overview of the U.S.-Mexico High Level Consultative Commission Cross-Border Communications Long-Term Solution June 2007 Background U.S.-Mexico High Level Consultative Commission on Telecommunications (HLCC)
More informationFAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
More informationDeveloping a Federal Vision for Identity Management
Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009 Height DNA Biometric Name Date of Birth SSN
More informationAn OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón
June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always
More informationN Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication Outline Background on Authentication General Network
More informationPolice Education. Dept. of. Police and Security Management. Prof. Dr. Wolfgang Kühnel wolfgang.kuehnel(at)hwr-berlin.de
Police Education Dept. of. Police and Security Management Prof. Dr. Wolfgang Kühnel wolfgang.kuehnel(at)hwr-berlin.de 1 Police Education in Germany Tasks of German Police Agencies The Bachelor and Master
More informationFrench Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
More informationGuidance on biometric technologies in schools. Becta guidance on biometric technologies in schools
Guidance on biometric technologies in schools Becta guidance on biometric technologies in schools Version 1, July 2007 http://www.becta.org.uk page 1 of 10 Contents 1 Introduction what this guidance is
More informationFlorida Agricultural & Mechanical University Board of Trustees Policy
Florida Agricultural & Mechanical University Board of Trustees Policy Board of Trustees Policy Number: Date of Adoption/Revision: September 13, 2007/ April 9, 2009 Subject Authority Applicability Telecommunications
More informationCHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE
More informationVMobile White Label Program
VMobile White Label Program BlackBerryVoIP Solution Table of Contents VMobile: Who we are Why mobile VoIP? Vmobile WLP: What is it? Vmobile WLP: Who can benefit? Vmobile WLP: Which problem it solves? VMobile:
More informationUCLA Policy 313: Prevention of Identity Theft
UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationCrimes Amendment (Fraud and Forgery) Bill 2009
New South Wales Crimes Amendment (Fraud and Forgery) Bill 2009 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule 2 Consequential and other
More informationSecurity of Identity Management. Professor Brian Collins
Security of Identity Management Professor Brian Collins Headline issues Purpose of ID management and ID security Practical process and technology issues Enrolment processes Identity verification Limitations
More informationAssignment Discovery Online Curriculum. Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8. Subject Area: Forensic Science, Chemistry
Assignment Discovery Online Curriculum Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8 Subject Area: Forensic Science, Chemistry Duration: Two or three class periods Objectives: Students
More informationMoving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers
Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Sponsored by Nok Nok Labs, Inc. Independently conducted by Ponemon Institute LLC Publication
More informationLawful Interception in German VoIP Networks
Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz hscholz@raisdorf.net http://www.wormulon.net/ Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks
More informationEDEN PRAIRIE POLICE DEPARTMENT PROCEDURE PACKET. (Revised January 2016) Reporting Check & Financial Transaction Card Fraud
EDEN PRAIRIE POLICE DEPARTMENT PROCEDURE PACKET (Revised January 2016) Reporting Check & Financial Transaction Card Fraud Check Acceptance Procedure N.S.F. Checks and Account Closed Checks Proper Identification:
More informationPROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT
Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits
More informationUNCLASS BASTION-LEATHERNECK (BL) JOINT BADGING POLICY - TERMS AND DEFINITIONS. SER TERM DEFINITION 1 Joint Badging Office (JBO)
BASTION-LEATHERNECK (BL) JOINT BADGING POLICY - TERMS AND DEFINITIONS SER TERM DEFINITION 1 Joint Badging Office (JBO) The JBO is responsible for badging and accountability of all contractors and DoD personnel,
More informationAn affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge.
Affidavit An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge. The commissioner then signs as confirmation that the oath or affirmation
More informationEvidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb
More informationThe treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework
Comments on the Commission Consultation Document on The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework submitted by the Austrian Regulatory Authority for Broadcasting
More informationSan Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX
San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police
More informationChecklist for Jamaican citizens applying for Schengen visa - Required documents
Checklist for Jamaican citizens applying for Schengen visa - Required documents Name: Date of birth: Citizenship: When meeting in person at the visa office at the time of your appointment, apart from the
More informationMOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
More informationA Case Study: Vodacom Group and Redknee
A Case Study: Vodacom Group and Redknee Driving Growth in the Roaming Market and Improving the Customer Experience Summary > How Redknee enabled Vodacom to address the increasing market competition and
More informationMOBILE TECHNOLOGIES AND DISTANCE EDUCATION
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance
More informationFacts about the new identity card
Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader
More informationAccreditation information on Pope Benedict XVI s visit to Germany
08.08.2011 112 PRESS RELEASES OF THE GERMAN BISHOPS CONFERENCE Accreditation information on Pope Benedict XVI s visit to Germany Pope Benedict XVI will pay a visit to Germany from 22 until 25 September
More informationGLOBAL SECURITY ASIA 2007
GLOBAL SECURITY ASIA 2007 Technology Seminar/Workshop Advanced Surveillance & Forensic Audio/Video Show Dates: Tue 27 th Thu 29 th March 2007 Venue: Hall 2, Singapore Expo. www.singapore-expo.com.sg www.globalsecasia.com
More informationengin Business Plans Updated 14 th October 2010
s VoIP s Single Line Phone s Starter 20 50.00 $50.00 Included Calls N/A 100 local or national calls 450 local or national calls 27c per 20c per Engin to Voice Box may be required. Minimum 512 kpbs broadband
More informationUK Emergency Calls ESW 14 April 2011. British Telecommunications plc
UK Emergency Calls ESW 14 April 2011 UK Emergency Service UK Population 61.4 million citizens [England(84%), Northern Ireland (3%), Scotland(8%) and Wales (5%)] UK Area - 22.6 million hectares UK 112 organisation
More informationNomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014
Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014 The fastest selling gadget in history 2 billion people have smartphones with internet and touchscreen 4 billion by 2020
More informationPRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS
PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS Identification technology has progressed from just being fingerprint matching
More informationDRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
More informationSOUTH AFRICAN POLICE SERVICE
SAPS 0 SOUTH AFRICAN POLICE SERVICE APPLICATION FOR MULTIPLE IMPORT OR EXPORT PERMIT/ PERMANENT IMPORT OR EXPORT PERMIT/TEMPORARY IMPORT OR EXPORT PERMIT/IN-TRANSIT PERMIT FOR PERSONAL USE (Individuals
More informationENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms
Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5
More informationCOLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
More informationIntroduction to VOIP Telephony
1 April 2011 Introduction to VOIP Telephony What is VoIP VoIP refers to a way to carry phone calls over an IP data network, whether on the Internet or your own internal network. A primary attraction of
More informationPROTECTION ORDER APPLICATION FORM
PROTECTION ORDER APPLICATION FORM This document has been translated with a view to facilitating the understanding of its contents, but it may only be completed in Spanish. PROTECTION ORDER APPLICATION
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationIdentity Protection and You. Customer Update
Identity Protection and You Customer Update 1 The Problem: ID Theft In the time it takes to read this first sentence there will be four (4) new victims of identity theft in the United States. As many as
More informationDISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY
11/29/2012 PURPOSE DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY This policy is intended to minimize the District of Columbia Government s costs for landline and cell phone equipment
More informationCrimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99
New South Wales Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule
More informationOhio Statewide Search Instructions
Ohio Statewide Search Instructions Summary The state of Ohio requires fingerprints to be obtained in order to submit a statewide criminal background check for processing. There are two sets of instructions
More informationRealScan-S. Fingerprint Scanner RealScan-S
Fingerprint Scanner RealScan-S Outline A fingerprint scanner used by the police or prosecution for collecting a suspect s rolled fingerprints or acquiring a person s flat fingerprints for identification.
More informationDisruptive events in telecom market. Challenges and possible response. Proposed approach by NEC Corporation Ziua Telecomunicatiilor
Disruptive events in telecom market Challenges and possible response Proposed approach by NEC Corporation Ziua Telecomunicatiilor Bucharest, May, 20 th, 2014 NEC Confidential MARKET CONTEXT Page 2 NEC
More informationData Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460
Data Security Updated April, 2006 CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Background As technology has evolved and become vital for businesses, a growing number of public
More information2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.
1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the
More informationproviding the full spectrum of your investigative needs
providing the full spectrum of your investigative needs Morris Chase International provides a professional and sensibly priced service across the full spectrum of your investigative requirements, both
More informationFT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division
FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers
More informationElectronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
More informationCHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
More informationVMobile Enterprise Program
VMobile Enterprise Program BlackBerryVoIP Solution Table of Contents VMobile: Who we are Why mobile VoIP? At a glance VMobile: BB App Overview VMobile: BB App Features VMobile: Compatibility VMobile: How
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationLEGISLATIVE BILL 348
LEGISLATIVE BILL 348 Approved by the Governor May 13, Introduced by Krist, 10. A BILL FOR AN ACT relating to financial institutions; to amend section 8-101, Reissue Revised Statutes of Nebraska, and sections
More informationApplying for a Passport
Please do not forget to make an appointment! Payment with credit cards (Visa, MasterCard) is accepted. Cheques cannot be used to pay the Embassy's fees. Applying for a Passport Find information about 1.
More informationHigh Speed and Voice over I.P September 1, 2005
If your property is setup with high-speed Internet access, you can incur big savings on your outgoing calls by using Voice over I.P. services to replace your local telephone and/or long distance service.
More informationVeda: Fraud Focus Group Forum
Veda: Fraud Focus Group Forum Identity Crime Trends, Risks and Solutions Dr Russell G Smith Principal Criminologist Outline Identity crime concepts The scope of identity crime Identity crime taxonomies
More informationConvergence of Mobile Communications and Broadcasting: A long term perspective
Convergence of Mobile Communications and Broadcasting: A long term perspective J. Elsner, N. Grove, D. Burgkhardt, F. Jondral, A. Picot INFRADAY 2009, Berlin, 10.10.2009 Communications Engineering Lab
More informationCONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
More informationInformation for our international students who would like to start working in Germany. Interview with Holger Esen, bsu Bremen
Information for our international students who would like to start working in Germany Interview with Holger Esen, bsu Bremen The bsu is unique on a nationwide scale: It is a joint institute of University
More informationWhite Label Mobile AG, Liechtenstein
How it Works Activate your SIM card! Registration Together with your SIM card you have got the link for activation. Kindly enter this in order to register yourself as a user and to http://pilot-call.com/?q=en/activate
More informationBFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer
BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center Executive Officer 1 Purpose of Briefing To present the selection and acquisition process for biometric devices at the BFC. 2 Briefing
More informationMOBILE PHONE POLICY. Policy. Effective: 1 July2015
MOBILE PHONE POLICY Policy Effective: 1 July2015 To be reviewed: January 2018 To help the public service spend wisely TABLE OF CONTENTS Introduction...1 Scope of the Policy...1 Responsibility for Implementation
More informationWe Must Comply with International Requirements! Introducing Biometric ID Cards in France
We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?
More informationUse and Change of Names
Use and Change of Names 16 August 2016 Issued by International and Immigration Policy Group Home Office Contents Introduction... 3 Policy Rationale... 3 What is the requirement of the policy?... 3 What
More informationProtection of Freedoms Bill
EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 146 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Theresa May has made the following statement
More informationHitachi to Expand Finger Vein Authentication System Business on a Global Basis
FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for
More informationCitizen s perceptions on digital identity
Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are
More information