The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :
|
|
- August Young
- 8 years ago
- Views:
Transcription
1 COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January A. National policy 1. Is there a national policy regarding the analysis, detection, prosecution and prevention of cybercrime in general and the misuse of cyberspace for terrorist purposes in particular? If yes, please briefly describe it. Widely publicized cyber-attacks and, to some expert opinions, cyber war - conducted against Georgia in 2008 put the protection of the critical infrastructure high on agenda of the Government of Georgia. Rapidly growing dependence of the critical infrastructure and government services on the IT increases vulnerability to cybercrime-related incidents. Accordingly, adequate protection of critical infrastructure from cyber threats is one of the priorities of the Government of Georgia. Voicing these concerns, the National Security Council hosted series of meetings of the special working group comprised of different Government agencies to develop the national Cyber Security Strategy of Georgia throughout 2011, as a part of the National Security Review. Strategy and its implementation Action Plan, presented to the public for discussion in March 2012, is a further testament of the high awareness of the Government of Georgia of information security challenges. The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in : Research and analysis: Study of other states' best practices and sharing experience; Research into criteria and standards for identifying objects of critical information systems; Resiliency analysis of critical information systems; Feasibility study for launching the project on establishment of the regional center for cyber security education and research. New legislative framework: Initiating legislative acts on information security; Developing regulatory framework for identifying critical information systems and actions necessary for ensuring cyber security; Ensuring legal basis for Computer Emergency Response Team operations; Identifying, by legal act, an agency or agencies whose competence includes determination of information security policies and undertaking coordinating functions; Developing cyber security disaster recovery plans and procedures. Institutional coordination for ensuring cyber security: Further development of the Computer Emergency Response Team (CERT.GOV.GE); Further development of already established 24/7 high-tech crime (cybercrime) international contact point as required by the CoE 2001 Convention against Cybercrime (Budapest Convention); Designation of the expert support team/unit in cybercrime cases; Establishing format and modalities for public-private cooperation. Public awareness and education: Establishment of public awareness and educational programs on cyber security; Further training of staff and technical personnel of critical information system For further information please see the Country profiles on counter-terrorism capacity at Pour plus de renseignements, veuillez consulter les Profils nationaux sur la capacité de lutte contre le terrorisme:
2 2 subjects and other interested organizations in international and local standards of information security; Specialized training of cybercrime experts in handling electronic evidence (cyber forensics); Supporting scientific and research projects in cyber security; Creation of the research lab. International cooperation: Strengthening relations in cyber security field with international organizations working in cyber security (OECD, EU, OSCE, NATO, UN, ITU) as well as relevant national authorities; Active participation in international activities related to cyber security and supporting relevant initiatives on a regional scale; Initiating bilateral and multilateral cooperation with national CERTs in the area of cyber security.. В. Legal framework 2. Does your national legislation criminalize the misuse of cyberspace for terrorist purposes, and a. are these offences specifically defined with regard to terrorist nature or technical means of committing the crime or b. is the misuse covered by other, non-specific criminal offences? How are these offences defined and which sanctions (criminal, administrative, civil) are attached? The Criminal Code of Georgia (hereinafter referred as CCG) penalizes a specific offence of cyberterrorism (Article 3241) which has been criminalized since 25 July The terrorist purposes are indicated directly in the text of the Article ( committed for the purpose to intimidate population or/and to put influence on a governmental agency ). The sanctions for this crime are divided into two parts taking into account gravity of the damage caused by cyber terroristic crime. Namely, paragraph I of the article 3241 envisages imprisonment from 10 up to 15 years while the sanction under paragraph II can be years and even life imprisonment. 3. Do you plan to introduce new legislation to counter terrorist misuse of cyberspace? What are the basic concepts of these legislative initiatives? Georgia will adopt New Cyber Security Strategy that will be the main document defining state policy and establishing basic guiding principles in cyber security field. It should be mentioned that Strategy considers cyber space protection equally important as inviolability of land, air and maritime boundaries. Under the Cyber Security Strategy some new legislative acts and bylaws will be adopted. In accordance with newly enacted law On Informational Security, President of Georgia will issue ordinance under which full list of critical informational infrastructure will be specified. 4. What are the existing national practices in the field of detecting, monitoring and closing down websites used for illicit, in particular, terrorist purposes and what kind of national procedures allow the blocking of access to web sites or pages considered illicit? No such practices are available in Georgia. 5. What are the existing national practices in the field of interception of, or infiltration to, the electronic correspondence (e.g. , forum, instantaneous message service, voice over IP-skype, etc). Article 138 of the Code of Criminal Procedure (CCP) provides that prosecution is authorized to intercept content data of electronic correspondence. As a general rule prosecution needs a court order for content data interception but in urgent cases it can be carried out without court order.
3 3 Nevertheless, within 24 hours prosecution is obliged to present reasoning for exigent interception to the relevant court that will confirm or reject prosecutor s motion within another 24 hours. 6. Does your national legislation provide criteria for establishing jurisdiction over the misuse of cyberspace for terrorist purposes? What are those criteria? Georgian criminal code establishes jurisdiction over the misuse of cyberspace for terrorist purposes based on general principles laid down in articles 4-5 of the CCG. The principles can be summarized as follows: Territorial Jurisdiction: According to this principle Georgia can exercise jurisdiction over the offences commenced, continued, suspended or completed on Georgian territory. Active Personality Jurisdiction: Under this principle Georgia is eligible to establish jurisdiction on the crimes committed abroad by its citizens. Passive Personality Jurisdiction: A foreigner can be criminally liable if he/she commits a crime against the citizen of Georgia residing abroad. Protective Jurisdiction: A foreigner will be criminally liable for committing grave and especially grave crime against the interests of Georgia. 7. Does your national legal system establish additional offences related to attempts at, or complicity in, the commission of the misuse of cyberspace for terrorist purposes (ancillary offences)? Article 19 as well as article 25 of the Criminal code of Georgia (CCG) envisages criminal liability for attempting at and complicity in the all crimes provided by the CCG. Hence, these articles are fully applicable to the crimes of the misuse of cyberspace for terrorist purposes. 8. What kind of national procedures do you have for submitting an application on the activities of Internet-providers and/or hosting companies or other entities, to deprive a user from a domain name or to cancel his/her/its registration or licence? Unfortunately, no provisions that address such competences or cases can be found in Georgian legislation. 9. What non-legislative measures do you have in your country to prevent and counter terrorist misuse of cyberspace, including self-regulatory measures? There are no direct regulations against terrorist misuse; however, there are several preventionbased possibilities that address illicit use of cyberspace in general, theoretically covering terrorist misuse as well. The largest part of regulations and measures related to prevention comes from the recently enacted Law of Georgia on Information Security, which contains a separate Chapter on cybersecurity. The central actor in preventing and monitoring the Georgian cyberspace is CERT Georgia, whose legally defined responsibilities include prevention of cyber incidents irrespective of their criminal or non-criminal nature. However, the Law also vests critical infrastructure subjects with their own responsibilities related to prevention, namely, the responsibility to appoint cyber security specialist who has to be available 24/7, obligation to report all cyber incidents (irrespective of nature or damages) to CERT Georgia, as well as options to undertake penetration testing of information systems and to install and manage network sensor (a part of the countrywide network sensor system managed by CERT Georgia).
4 4 Regarding self-regulation, one has to mention Cyber Security Forum of Georgia, which was launched with the support of the Data Exchange Agency in September Being an informal discussion and coordination mechanism, the Forum brings together leading IT experts in the Georgian market both from public and private sector to coordinate and network with each other those measures, initiatives and activities that aim to enhance security of Georgian cyberspace. There is no specific cyber-terrorism related mandate of the Forum, however, better and more coordinated protection of cyberspace minimizes those risks as well. С. International co-operation 10. Please describe your country s general framework for international co-operation regarding the misuse of cyberspace for terrorist purposes. Since October 2012 Georgia is the party of CoE Cybercrime Convention under which specialized Cyber Crime Unit was established within the Central Criminal Police Department of Ministry of Internal Affairs of Georgia (hereinafter referred as MoIA) that performs functions of the 24/7 International Contact Point as well. Furthermore, Georgia is a party to the 13 UN antiterrorism international conventions, as well as CoE Convention on the Suppression of Terrorism and its amending Protocol. Within the frames of universal (UN conventions), regional (CoE conventions), sub-regional (GUAM, BSEC) and bilateral international instruments (with Armenia, Austria, Azerbaijan, Belarus, Bulgaria, Egypt, Estonia, France, Hungary, Italy, Kazakhstan, Latvia, Malta, Moldova, Poland, Romania, Turkey, Ukraine, UK, USA and Uzbekistan) or on the basis of reciprocity, the Ministry of Internal Affairs of Georgia closely cooperates with the respective agencies of partner countries to tackle international terrorism. Moreover, Georgia actively cooperates with international organizations within the framework of certain cybercrime projects. (Cybercrime Project with Estonia, partnership with UK and USA). 11. What are the existing practices and experiences with regard to international cooperation, in particular in relation to the procedures described in question 4? No such practice is available. D. Institutional framework 12. Please list the institutions that are competent for countering terrorist misuse of cyberspace. MoIA Central Criminal Police Department constitutes the central body that investigates cybercrime cases and serves as a 24/7 International Contact Point. National Data Exchange Agency is the main institution responsible for cyber security in the country. Agency has its own CERT that constantly monitors internet traffic and rapidly responds to all computer incidents. MoIA Forensic-Criminalistics Main Division provides forensic service in cybercrime affairs. Furthermore, Forensic Division participates in search and seizure of cybercrime evidences. MoIA National Central Bureau of INTERPOL coordinates international cooperation for arresting perpetrators of cybercrime wanted by Georgia.
5 5 13. In order to counter terrorist misuse of cyberspace are there any partnerships between the public and private sectors or legal obligations for operators of electronic communication (Internet-service providers. hosting companies, etc.) as well as persons providing the public with access to systems which allow on-line communication via access to the network (cyber cafe, WiFi hotspot)? There is a Memorandum of Understanding between the Law Enforcement Agencies and Internet Service Providers on the Principles of Cybercrime Cooperation. The Memorandum has been concluded in January 2010 with active involvement of the Council of Europe Cybercrime in Georgia Project and provides a formal framework for exchange of information between law enforcement authorities and ISPs on all aspects related to the misuse of cyberspace. The parties undertake an obligation to exchange data on regular and new threats of the misuse of cyberspace, to recognize importance of trainings, to appoint relevant contact point for day-to-day cooperation, to provide information in reasonable time, to respect confidentiality and other matters. The Memorandum is not only a formal engagement but is rather a reflection of successful cooperation between the investigation and the ISPs in a manner that is not prejudicial to the development of the Internet business in Georgia. 14. Are there any hotlines regulated by the public or private sectors permitting denouncement of those web sites which could be of a terrorist character / nature? There is police special hotline in Georgia through which it is available to denounce information on alleged crimes, including websites of a terrorist character. In this case, call will be addressed to Specialized Unit of MoIA Central Criminal Police Department that will initiate criminal-intelligence procedure against the website of alleged terroristic nature. Police special hotline number in Georgia is 112 that is available for 24/7 from all mobile/telephone operators located in Georgia. Е. Statistical information 15. Please provide relevant statistics on offences relating to the misuse of cyberspace for terrorist purposes (including possibly: cases recorded, investigated, brought to court, convictions, victims etc.). No such statistics are available in Georgia. 16. Where possible, please describe briefly the profile of offenders typically involved in the misuse of cyberspace for terrorist purposes (professional background, gender, age, nationality), and possible typical organisational characteristics, including trans-national links and links to other forms of organized crime. No such profiles are available in Georgia.
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES CZECH REPUBLIC July 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES SWITZERLAND October 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
More informationSCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
More informationRegional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.
Anti-Corruption Network for Transition Economies OECD Directorate for Financial, Fiscal and Enterprise Affairs 2, rue André Pascal F-75775 Paris Cedex 16 (France) phone: (+33-1) 45249106, fax: (+33-1)
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationGuidelines for Applicants: Advanced Training Course
Emerging Security Challenges Division Guidelines for Applicants: Advanced Training Course Introduction The NATO (SPS) seeks to enhance cooperation and dialogue with all partners through civil science and
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationGlobal Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
More informationMigration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
More informationCOUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
More informationprovisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:
REPORT of the Financial Monitoring Service under the Central Bank of the Republic of Azerbaijan on execution of The 2007-2011 Action Plan for implementation of the National Strategy for Combatting Corruption
More informationAPPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationOptional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
More information2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?
The Netherlands contribution to this consultation builds on the papers and input that have already been shared by the Netherlands with all Member States and the European Commission as part of the Council
More informationCONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE)
Strasbourg, 27 February 2015 CCPE (2015)1 CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) Questionnaire for the preparation of the Opinion No. 10 of the CCPE on the relationship between prosecutors
More informationLaw of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions
Law of Georgia on Combating Human Trafficking (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Article 1. Scope of Regulation This Law determines the organizational
More informationChairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationLaw enforcement in the clouds - challenges
Octopus Conference 2010 Outlook session on security and privacy in the clouds Law enforcement in the clouds - challenges Strasbourg, 25 March 2010 Alexander Seger Council of Europe, Strasbourg, France
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationThe EU approach to Cybersecurity and Cybercrime
The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security
More informationIcelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
More informationCompensation. International framework Marjan Wijers
Compensation International framework Marjan Wijers Why? Legal basis International human rights law ECrtHR, Rantsev vs Russia and Cyprus (2010): trafficking falls within the scope of Art. 4 ECHR without
More informationGOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form HUNGARY Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationDECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM
MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON
More informationBangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress
More informationTurkish Juvenile Justice System
Turkish Juvenile Justice System Dr. Gonca Gülfem BOZDAĞ Ministry of Justice Head of Department, DG for International Law and Foreign Relations gonca.gulfem.yilmaz@adalet.gov.tr Presentation Outline 1/2
More informationVictims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats. Dr.
Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats Dr. Michael Kilchling "The Member States of the Council of Europe and the
More informationCyberterrorism: Addressing the Challenges for Establishing an International Legal Framework
Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationCombating Tax Evasion through Transparency and Exchange of Information
Combating Tax Evasion through Transparency and Exchange of Information BSEC 23 November 2012 Simon Knott Global Forum Secretariat OECD What s at stake NO LEVEL PLAYING FIELD tax fraud and evasion lack
More informationADVANCE UNEDITED VERSION
Committee against Torture Forty-fifth session 1-19 November 2010 List of issues prior to the submission of the second periodic report of Qatar (CAT/C/QAT/2) 1 ADVANCE UNEDITED VERSION Specific information
More informationCrimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
More informationNSS 2014 UK NATIONAL PROGRESS REPORT. March 2014
NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationCRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPSC/SWE/CO/1 Distr.: General 23 January 2012 Original: English Committee on the Rights of the Child Fifty-eighth session 19 September 7 October
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationMadrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings
Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September
More informationSecurities markets regulators in transition
Securities markets regulators in transition Below is a list of the securities regulators, in the EBRD region with summaries of their objectives and competencies (plus links to the website): [Note: If you
More informationDECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA
AHG/Decl.2 (XXXII) 32 nd OAU Summit DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA The features of the Plan of Action elaborated herewith comprise five sections
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationCRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC
124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationACT. Of.2014. On Cyber Security and Change of Related Acts (Act on Cyber Security)
ACT Of.2014 On Cyber Security and Change of Related Acts (Act on Cyber Security) The Parliament has resolved on the following Act of the Czech Republic: PART ONE Cyber Security Chapter I General provisions
More informationThe Parliament of Romania has adopted the present law. CHAPTER 1 General Provisions
LAW No. 508 of 2004 on the Creation, Organization and Operation of the Directorate for Investigating Organized Crime and Terrorism, within the Public Ministry The Parliament of Romania has adopted the
More information64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationTITLE III JUSTICE, FREEDOM AND SECURITY
TITLE III JUSTICE, FREEDOM AND SECURITY Article 14 The rule of law and respect for human rights and fundamental freedoms In their cooperation on justice, freedom and security, the Parties shall attach
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More informationCYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationPeace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
More informationLEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationCybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
More informationGood practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons
Distr.: General 9 December 2009 Original: English Working Group on Trafficking in Persons Vienna, 27-29 January 2010 Item 6 of the provisional agenda * Good practices and tools for use in case management,
More informationThe Act imposes foreign exchange restrictions, i.e. performance of certain actions requires a relevant foreign exchange permit.
RESPONSIBILITIES OF THE NATIONAL BANK OF POLAND RESULTING FROM THE FOREIGN EXCHANGE ACT 1. FOREIGN EXCHANGE PROVISIONS Foreign exchange regulations, which constitute part of the financial legislation,
More informationDeclaration of the Ministerial Conference of the Khartoum Process
Declaration of the Ministerial Conference of the Khartoum Process (EU-Horn of Africa Migration Route Initiative) Rome, 28 th November 2014 We, Ministers of the following countries: Austria, Belgium, Bulgaria,
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationGraduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation
Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France
More informationFSC.EMI/93/12 13 April 2012. ENGLISH only
FSC.EMI/93/12 13 April 2012 ENGLISH only FSC.EMI/93/12 13 April 2012 ENGLISH only Republic of Moldova Information Exchange on the Code of Conduct on Political-Military Aspects of Security 2012 1. Appropriate
More informationFederal Act on the Implementation of International Sanctions
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on the Implementation of International Sanctions
More informationControlling arms brokers operating from abroad: Challenges and policy options for EU states. Holger Anders, researcher 3 August 2009
Note d Analyse Controlling arms brokers operating from abroad: Challenges and policy options for EU states 1 Abstract Holger Anders, researcher 3 August 2009 A lack of controls on arms brokers operating
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationFAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationPROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS
PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PUBLIC HEARING Combating sexual abuse, sexual exploitation of children and child pornography Committee on Civil Liberties, Justice and Home Affairs 28-29
More informationEU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
More informationTRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July 2015 31 December 2016
TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME 1 July 2015 31 December 2016 Based on the Salzburg Forum Vision 2020, the Salzburg Forum will continue to strategically
More informationOutcome of Desk Review Review of Georgia
Mechanism for the Review of the Implementation United Nations Convention against Corruption Outcome of Desk Review Review of Georgia Reviewing countries: Cyprus and Hungary Year II - Phase I 1 P a g e
More informationOPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY
[ ENGLISH TEXT TEXTE ANGLAIS ] OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY The States Parties to the present Protocol,
More informationJ O I N T D E C L A R A T I O N
REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting
More informationCRI(2004)37 ECRI GENERAL POLICY RECOMMENDATION NO. 9 ON THE FIGHT AGAINST ANTISEMITISM ADOPTED ON 25 JUNE 2004
CRI(2004)37 ECRI GENERAL POLICY RECOMMENDATION NO. 9 ON THE FIGHT AGAINST ANTISEMITISM ADOPTED ON 25 JUNE 2004 Strasbourg, 9 September 2004 Published by the European Commission against Racism and Intolerance
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More informationMONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY
More informationCybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices
Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM
More informationInformation and Observations on the Scope and Application of Universal Jurisdiction. Resolution 65/33 of the General Assembly
United Nations General Assembly Sixty-seventh Session Sixth Committee Information and Observations on the Scope and Application of Universal Jurisdiction Resolution 65/33 of the General Assembly pursuant
More informationFit and proper person form
Fit and proper person form Last updated: 9 March 2015 About this form To hold any maritime document(s), you are required to be a fit and proper person. This applies at all times while the documents are
More informationCamden Asset Recovery Inter-Agency Network (CARIN)
Camden Asset Recovery Inter-Agency Network (CARIN) The History, Statement of Intent, Membership and Functioning of CARIN MANUAL CARIN MANUAL Secretariat, Camden Asset Recovery Inter-Agency Network (CARIN)
More informationASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
More informationBuilding up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More informationCAC/COSP/IRG/2015/CRP.11
28 May 2015 English only Implementation Review Group Sixth session Vienna, 1-5 June 2015 Item 2 of the provisional agenda Review of implementation of the United Nations Convention against Corruption Executive
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationHacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows
Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber
More information