Computer Facilitated Crimes Against Children International Law Enforcement Training

Size: px
Start display at page:

Download "Computer Facilitated Crimes Against Children International Law Enforcement Training"

Transcription

1 Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the world with the tools and techniques needed to investigate Internet related child exploitation cases. Training Overview The International Centre for Missing & Exploited Children (ICMEC) launched the international training initiative on Computer Facilitated Crimes Against Children in December 2003 at Interpol Headquarters in Lyon, France. This training program was created to provide basic investigative tools, techniques, and resources to law enforcement officers, prosecutors, and other specialists in the area of crimes against children from all over the world. A total of 3,219 students from 113 countries participated at 36 trainings worldwide. Training was free to participants, and scholarships were granted on an as needed basis to cover travel expenses. Although this particular series now has ended, ICMEC continues to explore avenues for interaction and collaboration with the people and organizations that benefited from training. Training Curriculum A curriculum was developed focusing on the victimization of children and international case studies. Instructors from Australia, India, Italy, the United Kingdom, and the United States emphasized training techniques for forensic examiners, online investigators, and prosecutors that have aided in the investigation and resolution of Internet related crimes against children. The four day seminar, which ICMEC conducted in conjunction with Microsoft and Interpol, included the following modules: Computer Facilitated Exploitation of Children; Conducting the Online Child Abuse Investigation; Managing the Law Enforcement Response to Computer Facilitated Crimes Against Children; Technical Aspects of the Investigation; and Tools and Techniques for the Prosecutor. Computer Facilitated Exploitation of Children dynamics and problems encountered in sexual abuse investigations; types of sexual abuse cases; offender typology and its application to the investigation; and types of computer facilitated crimes committed against children. 1

2 Conducting the Online Child Abuse Investigation evolution of online crimes; seduction techniques; child abuse victim issues and disclosure; interviewing the online child abuse victim; evidence and corroborating the online crime; identification of additional victims; identifying the characteristics of the online child abuser; and child molester collections. Managing the Law Enforcement Response to Computer Facilitation Crimes Against Children challenges and issues arising from the management of complex investigations, both national and international; law enforcement techniques and forensic examination issues; need for speedy assessment and the identification and prioritization of investigations and actions; human rights, data protection, and national laws; implications of harmonized legislation, extradition attitudes, and consequences of intelligence exchange; and implications of global principles for continuity of evidence and computer forensics, Mutual Legal Assistance Treaties (MLAT), and dual criminality considerations. Technical Aspects of the Investigation fundamentals of not only the technologies used to exploit children, but also how these same technologies can be used to successfully investigate crimes committed against children; case examples and studies from a technical perspective; how the Internet works (i.e., use of IP addresses and communications using TCP/IP); tools and techniques (i.e., trace and identify the source of Internet traffic, operating systems utilities, NetScan tools, Neotrace, Visualroute, and Languard Network Analyzer); and evidence collection and analysis (i.e., crimes scene awareness, search warrant planning and execution, proper methods of collecting and safeguarding digital evidence). Resources and Guest Speakers During this block of instruction: subject matter experts from industry (i.e., credit card companies, ISPs, technology companies) addressed how to best utilize their services in an investigation; and participants learned about local and regional safety and prevention programs and agencies. Success Stories Through speaking with in country training coordinators and surveying articles of interest in various media outlets, we have learned of several successes. Overall, the training program has provided a valuable forum for exchanging ideas and experiences. Information sharing between and among trainers and participants has also assisted in creating global linkages between law enforcement agencies. Over the 2

3 course of the training, participants are not only exposed to the magnitude of Internet related crimes against children, but they are also given the necessary tools to investigate and prosecute offenders. The trainings have been a great success and will continue to provide more tools to law enforcement across the world to help keep children safer. Argentina The Crimes Against Children Division of the Argentinean Federal Police is composed of prosecutors and law enforcement officers throughout Argentina. Its primary focus is on finding missing children and investigating claims of child abuse, including online crimes against children. The Division works very close with ICMEC, and is part of the Global Missing Children s Network. Representatives from the Division have participated at several of the ICMEC trainings, including the following: Brasilia, Brazil (April 2004) Buenos Aires, Argentina (August 2005; hosted by the Division) Panama City, Panama (May 2007) Lima, Peru (November 2007). Following the training in Argentina, the Federal Police conducted a 15 month investigation into a child abuse ring, led by Jorge Corsi, a psychologist practicing in the area of family violence. The ring operated out of at cybercafés in the Recoleta and Barrio Norte districts of Buenos Aires. Corsi and others would invite children (between the ages of 14 and 16) to view pornographic websites and would then ask the children to join them at secret parties. At these parties, moving and still images involving the sexual abuse and exploitation of these children were recorded and uploaded to various Internet sites. The children were paid with clothes, video games, and digital cameras. The abusers ranged from 30 to 40 years of age. On 24 July 2008, Corsi and three other suspects were arrested on charges of child abuse and molestation. Australia The training in Wellington, New Zealand in November 2005 was attended by 96 law enforcement officers. A law enforcement officer from the Western Australia Police was so impressed by the training that when she returned to Australia, she set out to establish a specific department to deal with Internet crimes against children. Prior to the training, the Western Australia Police already had a child protection squad dealing with sexual and physical abuse of children. A law was passed to allow law enforcement to investigate offenses for procuring children under the age of 16 and to proactively investigate online enticement. A team of investigators was put in place at the end of 2005 with the help of an IT expert. Work began in April Since that time, 30 individuals have been arrested within the territory of Western Australia alone. The team is also involved with protection issues and participates in forums for parents and expos within their territory. They await the passage of a law that would allow them to investigate peer to peer and newsgroup offenses. 3

4 Hong Kong The November 2004 Hong Kong training has assisted law enforcement officers from Hong Kong to better understand crimes against children. While there have not been many cases in Hong Kong since the training, the officers have the skills necessary to investigate such cases as they arise. Law enforcement has established sophisticated forensic and technology crime investigation units that can support any kind of investigation. Law enforcement from Hong Kong continues to attend the training course in other locations around the world. India Sebastian Edassery is an Inspector and Head of the IT and Cyber Crime Training Division of the Central Bureau of Investigation (CBI) Academy in New Delhi. He is responsible for the effective implementation of training policy for Investigating Officers, Supervisory Officers, and law enforcement officers from CBI and state police units throughout India. ICMEC sponsored Sebastian to attend (as a student) the training held in Dalian, China in The training was organized by ICMEC and the Chinese Ministry of Interior. Following his participation at the training in China, Sebastian was instrumental in organizing a similar training in New Delhi in conjunction with the CBI Academy, which took place in January Microsoft India immediately identified Sebastian s expertise and invited him to participate at several advanced hands on trainings throughout India and the region that were aimed at training the trainers. Following the training in New Delhi, Sebastian incorporated a curriculum into the new officers training course throughout India focusing on crimes against children. In April 2007, ICMEC organized a training in Doha Qatar at which Sebastian was invited to participate as an instructor. Similarly, in July 2008 Sebastian participated as an instructor at the training held in Cairo, Egypt. Jordan Since the June 2005 training in Amman, Jordanian law enforcement has been very active in increasing their capacity to address computer facilitated crimes against children. Jordanian law enforcement has also been working closely with Save the Children Denmark to build awareness of family protection issues. They have held numerous workshops and roundtables with NGOs, Internet Service Providers, and Internet café owners to help educate the public. Through the workshops, law enforcement has built a strategic working group and plan of action not only for Jordan but also for neighboring countries. The Jordanian government is working to create new laws pertaining to crimes against children. Cooperation and coordination with Interpol and INHOPE (to create a hotline) has also increased. Jordan law enforcement has sent numerous officers to the training program and is trying to establish their own course in the future. New Zealand The Wellington training in November 2005 produced greater awareness of computer facilitated crimes against children, thereby enabling an increased understanding of and willingness to respond to both international and locally generated investigations. Recently the New Zealand Police, the Department of Internal Affairs, and New Zealand Customs finalized two national operations where related search warrants and enquires were carried out across the country, resulting in a large number of arrests and 4

5 charges. Child victims were rescued and identified and one young girl was saved before she was about to be abused. Russia In September 2005, Russian law enforcement attended the training in Moscow and acquired an understanding of the process of investigating crimes against children. In February 2007, a Russian court sentenced 4 individuals to 4 to 10 years in prison after being found guilty of slavery and production of child pornography. A fifth person was found guilty of raping a minor and received a 12 year sentence. South Africa In 2004, South Africa set up a child pornography hotline for the public and in 2005, the South African Film and Publication Board (FPB) and the Ministry of the Interior sponsored a National Conference Against Child Pornography. The conference resulted in the creation of an action plan to build awareness in libraries and schools of the growing issue of child pornography. The Minister of the Interior created a Ministerial Task Team to advise him on how to combat crimes against children. FPB has assisted in many working groups and conferences, including Microsoft s one day Internet Safety conference in April The South African Police Service has participated in child pornography sting operations targeting specific areas of South Africa. In May 2006, they arrested 6 individuals in the Cape region for possession of child pornography. Spain The April 2005 training in Madrid was coordinated by the National Central Bureau (NCB) of Interpol. The NCB has a dedicated department that handles crimes against children investigations and works closely with the State Police. Over the past two years, Spain has conducted several large child pornography investigations resulting in many arrests. In June 2006, 21 people were arrested in countrywide raid on child pornography producers and distributors. In November 2006, an additional 13 people were arrested as a result of a child pornography video involving a 4 year old child posted on the Internet. Already in 2007, Spanish law enforcement has investigated 70 suspects who are sharing and posting images/videos of children as young as 9 years old. Operation Xuxa, which began in November 2005, continues to arrest suspects today. Turkey In March 2006, the training seminar was held in Istanbul, Turkey. Three participants Turkish lawenforcement officers were actively investigating an international child sexual exploitation ring prior to attending the training. During the course, the officers learned several investigative techniques including how to conduct online investigations as well as the most effective methods of handling evidence. Due to the effectiveness of the training, the officers were able to conduct surveillance on three possible locations and gather electronic communications from the suspects. Shortly after the conclusion of the training seminar, the officers took action. Several suspects were arrested. The case is still pending as it works its way through the Turkish legal system. Subsequently, Inspector Aydin, the lead investigator, received the 2006 International Law Enforcement Award presented at the Dallas Crimes Against Child Conference in Dallas, Texas. Following the training, a law enforcement participant took it upon himself to create an in house training program in order to continue to educate law enforcement officers on crimes against children. The training program has been very well received in Turkey. The same law enforcement officer was sponsored by 5

6 ICMEC to attend a one month training at Interpol headquarters in France to learn how to identify child victims in child pornography images. About the International Centre for Missing & Exploited Children (ICMEC) ICMEC is leading a global movement to protect children from sexual exploitation and abduction. With a growing presence in North America, Asia, Latin America, and Europe, ICMEC advocates for model legislation to protect children, promotes the creation of national centers based on a public private partnership model, leads a global financial coalition to eradicate commercial child pornography, and provides training and technology tools to law enforcement around the world. 6

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation. The purpose of FIIP The FIIP Project is a partnership of European law enforcements child protection teams and university academics with expertise in this field. The partnership is working together, developing

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form HUNGARY Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Fact sheet 2 Overview of the Extradition Process

Fact sheet 2 Overview of the Extradition Process Fact sheet 2 Overview of the Extradition Process This fact sheet is information, not legal advice This fact sheet provides general information only. It does not give legal advice on the operation of the

More information

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006) Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers

More information

Law of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions

Law of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Law of Georgia on Combating Human Trafficking (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions Article 1. Scope of Regulation This Law determines the organizational

More information

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement

THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement How the G8 24/7 Network Operates THE G8 24/7 NETWORK OF CONTACT POINTS Protocol Statement The G8 24/7 points of contact are provided for investigations involving electronic evidence that require urgent

More information

National Resources for Sex Trafficking

National Resources for Sex Trafficking National Resources for Sex Trafficking Dear John Campaign Atlanta, Georgia Website: https://www.youtube.com/watch?v=frsbo6g21hu The Dear John Campaign is a public education program in Atlanta, Georgia

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

Implementation of Legislation: Monitoring and Overseeing Government Action

Implementation of Legislation: Monitoring and Overseeing Government Action Implementation of Legislation: Monitoring and Overseeing Government Action Session 5 Rosalyn Park, The Advocates for Human Rights Why Monitor? What Can You Monitor? Government activities, protocols, and

More information

Watchdog International Ltd

Watchdog International Ltd Watchdog International Ltd Child On-line Protection in the Pacific Islands Industry Involvement September 2014 September 2014 Filtering 1 Presentation Overview Introduction The Industry Industry COP Initiatives

More information

FACT SHEET: PROJECT SAFE CHILDHOOD

FACT SHEET: PROJECT SAFE CHILDHOOD FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving

More information

Regulatory Practices. Australia, New Zealand, UK, Germany, US, Canada and France

Regulatory Practices. Australia, New Zealand, UK, Germany, US, Canada and France Regulatory Practices in Australia, New Zealand, UK, Germany, US, Canada and France (Updated on 19 November 2008) Australia The Australian National Classification Scheme is established by the Classification

More information

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION

More information

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate

More information

LAW ENFORCEMENT YOUTH PARTICIPATION CETS. Gabrielle Shaw Head of International and Relations Child Exploitation and Online Protection Centre

LAW ENFORCEMENT YOUTH PARTICIPATION CETS. Gabrielle Shaw Head of International and Relations Child Exploitation and Online Protection Centre LAW ENFORCEMENT YOUTH PARTICIPATION CETS Gabrielle Shaw Head of International and Relations Child Exploitation and Online Protection Centre What does CEOP do? LAW ENFORCEMENT What is the Virtual Global

More information

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between

More information

Victim/Witness Security and Protection

Victim/Witness Security and Protection REFERENCE GUIDE ON PROTECTING THE RIGHTS OF CHILD VICTIMS OF TRAFFICKING IN EUROPE Chapter 13 Victim/Witness Security and Protection 13.1 General principles Child victims who agree to testify should be

More information

We pride ourselves on delivering a timely, professional and effective witness protection service

We pride ourselves on delivering a timely, professional and effective witness protection service Protecting witnesses The CMC is committed to providing an effective witness protection service. We have maintained a 100 per cent success rate in keeping witnesses safe. We pride ourselves on delivering

More information

Institute for International Criminal Investigations. Dear Colleagues,

Institute for International Criminal Investigations. Dear Colleagues, Institute for International Criminal Investigations Dear Colleagues, The purpose of this call for nominations is to cordially invite you to nominate experts for the Justice Rapid Response (JRR) training

More information

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA United Nations Study on Violence against Children Response to the questionnaire received from the Government of the Republic of GUYANA 1 MINISTRY OF LABOUR, HUMAN SERVICES & SOCIAL SECURITY RESPONSE TO

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

P. O. Box 1520 Columbia, South Carolina 29202. Effective date of implementation: January 1, 2005. Domestic Violence

P. O. Box 1520 Columbia, South Carolina 29202. Effective date of implementation: January 1, 2005. Domestic Violence SOUTH CAROLINA DEPARTMENT OF SOCIAL SERVICES P. O. Box 1520 Columbia, South Carolina 29202 STANDARDS OF CARE FOR BATTERERS TREATMENT Effective date of implementation: January 1, 2005 Domestic Violence

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software

More information

Children Used by Adults to Commit Crime. Guidelines for Role-players in the Criminal Justice System

Children Used by Adults to Commit Crime. Guidelines for Role-players in the Criminal Justice System Children Used by Adults to Commit Crime Guidelines for Role-players in the Criminal Justice System Children Used by Adults to Commit Crime: Guidelines for Role-players in the Criminal Justice System Prepared

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Washington State Domestic Violence Fatality Review Project

Washington State Domestic Violence Fatality Review Project Washington State Domestic Violence Fatality Review Project This form to be filled out for each contact with the criminal justice system prior to the fatality. For this incident... the suspect is the domestic

More information

Internet Watch Foundation

Internet Watch Foundation Internet Watch Foundation Presented by Kristof Claesen 9 th European Forum on the rights of the child 4 June 2015 1 Copyright 2014 Internet Watch Foundation. All Rights Reserved. Introduction Violence

More information

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM Overview of the U Visa In October 2000, Congress passed the Victims of Trafficking and Violence Protection Act (the Act). As part of this Act,

More information

Overview of the OECD work on transfer pricing

Overview of the OECD work on transfer pricing Overview of the OECD work on transfer pricing Written contribution to the Conference Alternative Methods of Taxation of Multinationals (13-14 June 2012, Helsinki, Finland) by Marlies de Ruiter, Head of

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information Requests January - June, Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and

More information

Our action is coordinated by a team led by the Prime Minister s Office - Department for Equal Opportunities. It consists of the Ministries of Justice

Our action is coordinated by a team led by the Prime Minister s Office - Department for Equal Opportunities. It consists of the Ministries of Justice Madame Chair, First of all, let me thank the IOM and ILO for organizing this side event together with the Permanent Mission of Italy. We agreed enthusiastically to be co-host of this event, knowing that

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

WASHINGTON AND LEE UNIVERSITY SCHOOL OF LAW Sydney Lewis Hall Lexington, VA 24450

WASHINGTON AND LEE UNIVERSITY SCHOOL OF LAW Sydney Lewis Hall Lexington, VA 24450 WASHINGTON AND LEE UNIVERSITY SCHOOL OF LAW Sydney Lewis Hall Lexington, VA 24450 POST-GRADUATE FELLOWSHIPS WITH WASHINGTON AND LEE UNIVERSITY SCHOOL OF LAW - TRANSNATIONAL LAW INSTITUTE The Washington

More information

Fraud in Your International Business

Fraud in Your International Business Fraud in Your International Business Presentation to International Trade Association Of Greater Chicago By Jeff Cramer, Chicago Office Head and Managing Director March 2012 Agenda Introduction Kroll Overview

More information

TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW

TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW FEBRUARY 24, 2010 THANK YOU SENATOR DURBIN AND MEMBERS OF THE COMMITTEE FOR INVITING ME

More information

THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM:

THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM: CAPACITY BUILDING SEMINAR ON: THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM: Holiday Hotel Sihanoukville, Kingdom of Cambodia April 22 & 23, 2010 Organized by: With Funding Support From:

More information

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update

More information

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West

More information

PI VOCATIONAL SCHOOL POLICE ACADEMY

PI VOCATIONAL SCHOOL POLICE ACADEMY PI VOCATIONAL SCHOOL POLICE ACADEMY The Police academy is located in Danilovgrad, Montenegro. It is the only Law Enforcement Educational institution in Montenegro. It was established by the Decision of

More information

National Strategy Conference on Combating Child Exploitation

National Strategy Conference on Combating Child Exploitation National Strategy Conference on Combating Child Exploitation Partners in Protection & Prevention A Joint Conference of Project Safe Childhood & the ICAC Program May 17-20, 2011 San Jose Convention Center

More information

Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee

Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee FOR IMMEDIATE RELEASE: Contact: James Hallinan September 24, 2015 (505) 660-2216 Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee Albuquerque, NM Today,

More information

Operational indicators of trafficking in human beings

Operational indicators of trafficking in human beings Operational indicators of trafficking in human beings Results from a Delphi survey implemented by the ILO and the European Commission First published in March 2009 Revised version of September 2009 What

More information

BOLIVIA. Bolivia. Prevalence and Sectoral Distribution of the Worst Forms of Child Labor

BOLIVIA. Bolivia. Prevalence and Sectoral Distribution of the Worst Forms of Child Labor Bolivia BOLIVIA The Government of Bolivia has strengthened its legal and policy framework to address the worst forms of child labor, particularly in the sugar cane sector. However, hazardous child labor

More information

Domestic Violence Laws and the Illinois Domestic Violence Act

Domestic Violence Laws and the Illinois Domestic Violence Act CHAPTER 8 Domestic Violence Laws and the Illinois Domestic Violence Act Although clergy and other spiritual leaders may not be directly involved in the legal procedures described below, it is important

More information

GLOBAL ALLIANCE AGAINST CHILD SEXUAL ABUSE ONLINE

GLOBAL ALLIANCE AGAINST CHILD SEXUAL ABUSE ONLINE GLOBAL ALLIANCE AGAINST CHILD SEXUAL ABUSE ONLINE United States Policy target No. 1: Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support and protection

More information

Foreign Corrupt Practices Act (FCPA)/Bribery Act Integrity Due-Diligence & Investigations

Foreign Corrupt Practices Act (FCPA)/Bribery Act Integrity Due-Diligence & Investigations Foreign Corrupt Practices Act (FCPA)/Bribery Act Integrity Due-Diligence & Investigations Clarity in a complex world www.mintzgroup.com How We Work: Because the reputations of companies and individuals

More information

Missing Persons and Sex Crime Investigations

Missing Persons and Sex Crime Investigations Special Commission on Missing Persons and Sex Crime Investigations Executive Summary Teresa Metcalf Beasley Mary Bounds Megan O Bryan March 30, 2010 Executive Summary Background Information On December

More information

Program C: Criminal Law and Medicaid Fraud

Program C: Criminal Law and Medicaid Fraud Printed: //003 4:54 PM Program C: Criminal Law and Medicaid Fraud Unless otherwise indicated, all objectives are to be accomplished during or by the end of FY 003-004. Objectives may be key or supporting

More information

HP Priority Services - Overview

HP Priority Services - Overview HP Priority Services - Overview Premium enterprise-level global support for your entire Install base. May 2016 1 Overview Priority Services: Premium enterprise-level global support for your entire Install

More information

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3 CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION INSTRUCTOR: OFFICE HOURS: Semester Hours Credit: 3 I. Introduction A. This course covers the fundamentals of criminal investigations

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES

CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES Global GfK survey February 2015 1 Global GfK survey: Consumers activities with mobile phones in stores 1. Methodology 2. Global results 3. Country results

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

24/7 High Tech Crime Network

24/7 High Tech Crime Network 24/7 High Tech Crime Network Albert Rees Computer Crime & Intellectual Property Section Criminal Division, U.S. Department of Justice 24/7 Network The G-8 24/7 Network for Data Preservation Points of contact

More information

REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ)

REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ) 917 REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ) (See also General Regulations and Regulations for First Degree Curricula) Definitions BCJ 1 In these Regulations, and in the Syllabuses

More information

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces

More information

FORMULATING AN EFFECTIVE ANTI-CORRUPTION STRATEGY THE EXPERIENCE OF HONG KONG ICAC

FORMULATING AN EFFECTIVE ANTI-CORRUPTION STRATEGY THE EXPERIENCE OF HONG KONG ICAC FORMULATING AN EFFECTIVE ANTI-CORRUPTION STRATEGY THE EXPERIENCE OF HONG KONG ICAC By Mr Tony KWOK Man-wai* I. SHORT HISTORY AND THE ACHIEVEMENTS OF THE ICAC Let me explain briefly about the Hong Kong

More information

Andrejs Berzins 15 Wendover Avenue Ottawa, Ontario, Canada, K1S 4Z5 613-737-3298 berzinsa@yahoo.com

Andrejs Berzins 15 Wendover Avenue Ottawa, Ontario, Canada, K1S 4Z5 613-737-3298 berzinsa@yahoo.com Andrejs Berzins 15 Wendover Avenue Ottawa, Ontario, Canada, K1S 4Z5 613-737-3298 berzinsa@yahoo.com Education: 1968 Bachelor of Arts, McGill University, Montreal, Quebec, Canada 1971 Bachelor of Laws,

More information

Reporting the crime to the police

Reporting the crime to the police Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight

More information

International Assistance to Criminal Justice Reforms in China: An Observation since 1995

International Assistance to Criminal Justice Reforms in China: An Observation since 1995 The International Centre for Criminal Law Reform and Criminal Justice Policy International Assistance to Criminal Justice Reforms in China: An Observation since 1995 Vincent Yang, Ph.D. Professor of Law

More information

Australian Domestic & Family Violence CLEARINGHOUSE Key issues in the establishment of specialist domestic/family violence courts in Australia

Australian Domestic & Family Violence CLEARINGHOUSE Key issues in the establishment of specialist domestic/family violence courts in Australia Australian Domestic & Family Violence CLEARINGHOUSE Key issues in the establishment of specialist domestic/family violence courts in Australia Presented by Julie Stewart, Senior Research Officer, Australian

More information

IE Business School s. www.ie.edu/mbas

IE Business School s. www.ie.edu/mbas IE Business School s s www.ie.edu/mbas WHY AN MBA AT IE BUSINESS SCHOOL? Recognized as one of the world s top business schools by international rankings, IE Business School offers a number of renowned

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:mmartin8@uccs.edu Current Position: Instructor University of Colorado Colorado

More information

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000

More information

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing 20 October 2010 Original: English Conference of the Parties to the United Nations Convention against Transnational Organized Crime Fifth session Vienna, 18-22 October 2010 Agenda item 6 * International

More information

22nd INTERPOL Americas Regional Conference

22nd INTERPOL Americas Regional Conference OPENING REMARKS by Ronald K. Noble INTERPOL Secretary General 22nd INTERPOL Americas Regional Conference 1 July 2013 Willemstad, Curaçao The Honorable Nelson Navarro, Minister of Justice of Curaçao, INTERPOL

More information

The Massachusetts Strategic Plan for Cyber Crime

The Massachusetts Strategic Plan for Cyber Crime The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,

More information

First Pacific Islands Capacity Building Workshop on Child Online Protection

First Pacific Islands Capacity Building Workshop on Child Online Protection First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Frequently Asked Questions - FAQ s

Frequently Asked Questions - FAQ s Frequently Asked Questions - FAQ s For information on how to report a crime CLICK HERE For information on contact details for Garda Stations CLICK HERE FAQ s (Sourced from Crime Victims Helpline) 1. What

More information

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015 `STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 3.24

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 3.24 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 3.24 Issued Date: 12-18-14 Effective Date: 12-18-14 Updated Date: SUBJECT: HUMAN TRAFFICKING PLEAC 4.5.1b,d 1. POLICY A. Human trafficking is a multi-billion dollar

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

WYOMING ATTORNEY GENERAL S OFFICE FY12 ANNUAL REPORT

WYOMING ATTORNEY GENERAL S OFFICE FY12 ANNUAL REPORT WYOMING ATTORNEY GENERAL S OFFICE FY12 ANNUAL REPORT General Information Gregory A. Phillips, Attorney General Agency Contact Peter K. Michael, Chief Deputy Attorney General 123 State Capitol Cheyenne,

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

End-to-End Cyber Risk Management Solutions from AIG

End-to-End Cyber Risk Management Solutions from AIG End-to-End Cyber Risk Management Solutions from AIG In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge

More information

IOSCO s Education and Training Programs

IOSCO s Education and Training Programs IOSCO s Education and Training Programs IOSCO s Education and Training Program has become a powerful vehicle for advancing the organization s regulatory goals and building the regulatory capacity of its

More information

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Criminal Investigations 7/4/2014 REFERENCE RE-EVALUATION DATE CALEA

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function

More information

Senate Bill No. 38 Committee on Transportation and Homeland Security

Senate Bill No. 38 Committee on Transportation and Homeland Security Senate Bill No. 38 Committee on Transportation and Homeland Security CHAPTER... AN ACT relating to criminal records; creating the Records and Technology Division of the Department of Public Safety; enumerating

More information

Combating Tax Evasion through Transparency and Exchange of Information

Combating Tax Evasion through Transparency and Exchange of Information Combating Tax Evasion through Transparency and Exchange of Information BSEC 23 November 2012 Simon Knott Global Forum Secretariat OECD What s at stake NO LEVEL PLAYING FIELD tax fraud and evasion lack

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information

Armenia MODERATE ADVANCEMENT

Armenia MODERATE ADVANCEMENT In 2013, Armenia made a moderate advancement in efforts to eliminate the worst forms of child labor. The Government adopted a National Plan of Action Against Trafficking in Persons for years 2013 2015,

More information

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in

More information

FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration

FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK. 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration FACULTY OF SOCIAL ADMINISTRATION DEPARTMENT OF SOCIAL WORK 1. NAME OF CURRICULUM Master s Degree Program in Criminal Justice Administration 2. NAME OF DEGREE Master of Arts (Criminal Justice Administration)

More information

II Plenary Conference of the Drugs and Alcohol Women Network Project Speech for UNICRI Conference June 20, 2012 Rome, Italy

II Plenary Conference of the Drugs and Alcohol Women Network Project Speech for UNICRI Conference June 20, 2012 Rome, Italy II Plenary Conference of the Drugs and Alcohol Women Network Project Speech for UNICRI Conference June 20, 2012 Rome, Italy Good Afternoon. My name is Theadora Shihadeh. I work in the Bureau of International

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has a vacancy for: A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 1 August 2015

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information January 1 - June 30, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and

More information