New Pirates, Old Solutions: An 18 th Century Approach to Cybercrime

Size: px
Start display at page:

Download "New Pirates, Old Solutions: An 18 th Century Approach to Cybercrime"

Transcription

1 Independent Student Journal: International Relations 2018 Vol 1 pp New Pirates, Old Solutions: An 18 th Century Approach to Cybercrime AUTHOR Filip Norén ABSTRACT Various authors on cybersecurity have compared cyberspace to the high seas and suggested that states should contract privateers, in the form of private corporations or individuals, in order to bolster their defensive and offensive capabilities in cyberspace. This conceptual paper explores the high seas-cyberspace analogy and evaluates the extent to which it can strategically inform the battle against cybercrime. It is argued that the historical battle against piracy, characterized by its emphasis on legal frameworks, the removal of market support structures, and states use of privateers, offers limited lessons with regard to cybercrime. The analogy suggests that strategies against cybercrime should stress the usefulness of existing legal structures and earmark additional resources for them, while also prioritizing the establishing of specialized cybercrime courts and the hiring of former cybercriminals. Moreover, the comparison between piracy and cybercrime suggests that cybercrime should be treated as a socio-economic problem, while the historical use of privateers can be reimagined as cyber-privateering to potentially construct a new model of cyberdeterrence. Correspondence Address Filip Norén, MSc Student, University of Leiden, Netherlands. n.f.noren@umail.leidenuniv.nl INTRODUCTION A t a glance, the high seas and the Internet seem to have little in common, perhaps except the fact that the Internet works through undersea cables. However, they share significantly more since both domains are vast and partially ungoverned, yet critical for trade and communication. Many cybersecurity issues come with a high seas counterpart. Singer and Friedman, in their book Cybersecurity and Cyberwar: What Everyone Needs to Know, suggest that the way in which piracy and privateering were managed historically provides an instructive parallel to explore for cybersecurity today (2014, p. 178). This paper uses Singer and Friedman s mention as its foundation, exploring in the first section various aspects of the analogy. Most literature that uses it focuses on privateering as a means to bridge public-private divides, whereas this paper targets piracy and cybercrime. In the second section, the measures that were key in ending the so-called Golden Age of Piracy will be examined through a limited historical investigation. In the third section, the two preceding sections are tied together to identify strategic aspects in which the present-day battle against cybercrime can be bolstered by insights from the fight against piracy. As such, this is a conceptual paper that explores the extent to which the successful battle against piracy on the high seas might be translated into the 21 st century to combat cybercrime. THE HIGH SEAS-CYBERSPACE ANALOGY Pirates and Privateers - Then and Now It is customary by now for authors on cybersecurity to bring up increased engagement with, and by, the private sector as a solution to cyberinsecurity (Singer and Friedman, 2014). 1 In 1 Regardless of an author s specific purpose, be it financial cybercrime, cyberwarfare, cyberdefense, and so on, they tend to recommend better leveraging of private sector knowledge for public gain. See, for 59

2 Independent Student Journal 2018: International Relations doing so, they are typically concerned with avoiding a Wild West of cyberattacks, a scenario that is colorfully captured in the free-forall that sometimes characterized the Golden Age of Piracy (Garrett, 2013). Given the centrality to the analogy of private actors, it is necessary to delineate what privateers were in the historical, seaborne sense. Privateers commonly were private actors using their own resources and ships to attack merchant shipping and relied on letters of marque and reprisal for doing so (Spearin, 2014, p. 99). Other scholars define privateering simply as state-sanctioned piracy (Boot, 2009, p. 96). Indeed, as we will see in section two, privateering did not differ from piracy in the substantive nature of the conduct, but only in the attendant formalities (Kontorovich, 2004, p. 214). Singer and Friedman point to the similarities between privateers and patriotic hackers (Singer and Friedman, p. 177; see also pp ). Both groups are licensed, explicitly or tacitly 2, to act on behalf of the state without being a formal part of it. Privateers can also be analogous to private cybersecurity actors contracted by state agencies, such as America s National Security Agency (NSA), to bolster cyber (military) forces. In other words, cyber-privateers collectively represent both state-sanctioned pirates and patriotic hackers. Like privateers at sea, much of the value of cyber-privateers rests with the difficulty of successful attribution, the identification of the source or organizer behind an attack. The port blockades that pirates and privateers operated effectively correspond to DDoS attacks. 3 Similarly, acts of theft and hijacking essentially correspond to today s data breaches affecting corporations and individuals. Lastly, both the privateers and pirates of old and today s cyber criminals attack economic infrastructure and military assets (Singer and example, Zarate (2015), Mazanec and Thayer (2015), and Hoffman and Levite (2017). 2 ) While there is little evidence that the Russian government carried out the 2008 electronic attacks on Georgia, researchers put more faith in the notion that the Kremlin discreetly encouraged malicious actions by seeding instructions on Russian hacker and nationalist forums (Deibert et al., 2012, p. 16). 3 Distributed Denial of Service (DDoS) attacks are coordinated attacks using large numbers of compromised machines. Their main purpose is to overload websites and servers such that victims cannot provide services to legitimate users. See Hoque, Kashyap and Bhattacharyya (2017). Friedman, 2014, p.177). For instance, hackers hijacked online client operations at Banrisul, a major Brazilian bank, in 2017, stealing clients credentials (Lynch, 2017). By contrast, direct attacks by state actors on economic and military assets are not covered by the analogy herein. An example for comparison is the 2007 Operation Orchard, during which Israeli state forces cyberneutralized Syria s air defenses while fighter jets decimated a Syrian nuclear facility (Makovsky, 2017). The Cyber-Privateering Debate Aside from Singer and Friedman, the concept of privateers in cyberspace is the subject of a limited literature. The term cyber-privateering may have originated with a 2015 report on how the US government could empower financial institutions in the private sector and even private individuals to pursue economic warfare on its behalf (Zarate, p.24). In the US, some suggest that the solution to the problem of cyberattacks can be found in Article I, Section VIII of the Constitution: the Congressional power to grant letters of marque and reprisal (Garrett, 2013; Zarate, 2015; Mazanec and Thayer, 2015; Egloff, 2017). While these authors mainly envision a cyber-privateering regime that bestows private actors with more powerful means of defending themselves in collaboration with governments, others argue that they should be allowed to offer and employ offensive capabilities, including those that governments are currently lacking (CCHS, 2016). Offensive cyber capabilities are often considered the most extreme on a sliding scale of active cyber defense, or ACD, measures (Hoffman and Levite, 2017). 4 Combining rhetoric of more active measures and the high seas-cyberspace analogy, Jeremy and Ariel Rabkin argue that the analogy s merit lies in the grey zone between tension and war: Cyber conflict should be open as naval war has been to hostile measures short of war, to attacks on enemy commerce, to contributions from private auxiliaries (2013, p. 197). 5 4 Rosenzweig (2014) constructs a useful typology concerning the effects of, and the degree to which, measures affect external networks. 5 This is how Russia and China exploit the concept of grey areas of conflict, as they do not see the typically Western, binary understanding of conflict as either a state of peace or a state of war. See, for instance, Neither War nor Peace: The Uses of Constructive Ambiguity, The Economist (2018). 60

3 Noren New Pirates, Old Solutions A particular topic related to the cyberprivateering debate that has received scholarly attention lately is cyberdeterrence. Some, such as Zarate, argue that more systematic use of private actors working in concert with the government would create a new level of cyberdeterrence (2015, p.25). Private actors possess a majority of the knowledge needed to dependably identify attackers and move from attribution to retribution. The latter corresponds to the more extreme measures within the above-mentioned ACD spectrum. However, Singer and Friedman join others in pointing out that the difficulty in attribution of cyberattacks is a central reason that prevents the direct application of deterrence theory in cyberspace (2014, pp ; Mazanec and Thayer, 2015). Others have raised the concern that cyberdeterrence may not work as well as nuclear deterrence (Libicki, 2009). Overall, there is a lack of empirical evidence on the prevalence of ACDs and the effectiveness of cyberdeterrence (Hoffman and Levite, 2017). 6 In sum, scholars have employed the high seascyberspace analogy to describe an ecosystem in which states are in need of added capabilities as they interact to varying extents as allies and enemies with private actors. This paper, by contrast, maintains a narrower focus on the usefulness of the high seas-cyberspace analogy at the strategic level against (mainly non-state) cybercriminals. HOW PIRATES WERE DEFEATED ON THE HIGH SEAS Outlined below in their respective sections are the boundaries of the so-called Golden Age of Piracy as discussed in the literature and two major themes of anti-piracy measures: the shutting down of markets and support structures, and the commissioning of privateers to directly target pirates as a complement to state navies. The Golden Age of Piracy from an Academic Perspective The concept of a Golden Age of Piracy is contested by historians in terms of its boundaries in time and space, yet it is useful in understanding the ecosystem in which pirates and privateers were most active. The first systematic use of the term appears to be from 1897, when historian John Fiske held that it may be said to have 6 To the extent that such evidence exists, it is probably to be found in the grey literature. extended from about 1650 to about 1720 (1897, p. 338). While Fiske refers to the greater West Indies and the US Eastern Seaboard, Konstam and Cordingly limit their definition to the Caribbean...from 1714 until 1722, so the true Golden Age cannot even be called a 'golden decade.'" (2005, p. 98). Tellingly, several scholars have revised their definitions at least twice (cf. Rediker, 1981; 2004; Cordingly, 1994; Konstam and Cordingly, 2005). For the purposes of this paper, it is sufficient to note a convergence around Fiske s boundaries as they reappear in more recent works (Botting, 1978; Cordingly, 1994; Rediker, 2004). 7 Since Britain was the major geopolitical power of this era, most examples and references will be made to it, although other powers feature as well. Shutting down markets and support structures The first key theme of counter-piracy success in the past was the shutting down of safe havens by cleaning up markets and removing support structures. The first component of this strategy was the clean-up of incompetent or corrupt officials from positions of power. Two British examples are Governor Nicholas Trott of the Bahamas, deposed in 1696, and Governor Benjamin Fletcher of New York, removed the following year (Boot, p. 98). Another tool was the recruiting of former troublemakers to secure competent leadership. The revolving door between the public and private domains is not a recent phenomenon, in spite of the contemporary woes (Stephenson, 2014). The case of Sir Henry Morgan serves as an example; his activities as a privateer led to his arrest by the British Crown, yet this experience also saw him knighted and sent to Port Royal, Jamaica, as Lt. Governor. 8 He helped the city shed its status as a sanctuary for pirates and their trade, defending it against raids by pirates and French privateers. Similarly, despite the strict legal regime of the Netherlands during the Golden Age, numerous Dutch seamen 7 Rediker s most recent, and most complex, definition of the Golden Age of Piracy consists of three temporal subdivisions, or generations : the buccaneers of , the Indian Ocean pirates of the 1690s, and the pirates of (2004, p. 8). 8 A non-british example: The French privateer Jean Bart was so effective in attacking Dutch shipping in the late seventeenth century that King Louis XIV ennobled him and gave him a captain's commission in the French navy (Boot, p. 98). 61

4 Independent Student Journal 2018: International Relations charged with piracy were rehabilitated to serve the state (Lunsford, 2005, p. 141). The second component in the clean-up of power and trading structures was to more firmly establish the rule of law. Authors belonging to a certain strand in the study of history or international law ascribe the decline of piracy to the use of universal jurisdiction for prosecuting pirates (Bassiouni, 2001; Jarvis, 2006). Courts and commentators have misinterpreted jurisdiction [over piracy] as based upon universality because of rhetoric that branded pirates as the enemy of mankind (Garrod, 2014, p. 202). Rather, pirates were the enemies of the State that labelled them as such (Ibid.). Benton clarifies that even when the discourse labelling pirates as the enemies of all mankind emerged in full voice, the mechanisms for controlling piracy under the law remained those of municipal law (Benton, 2011, p. 239). 9 Rather than universal jurisdiction, the critical legal reform was to geographically extend the reach of municipal law to piracy-infested areas. In 1700, Britain s Parliament provided for Vice- Admiralty courts consisting of seven commissioners, typically naval officers as opposed to regular judges. These courts helped speed up prosecutions by convening far afield (Boot, p. 99). Numerous European maritime powers followed suit, implementing decentralization models that enabled their antipiracy campaigns (Ritchie, 1986; Benton, 2011, p.232). 10 As they did so, these powers called upon the principle of universal jurisdiction over piracy as a tool for advancing political interests or imperial expansion, not in its (dubious) legal sense (Kempe, 2010, p. 371; also, see Garrod, 2014). At the receiving end of this invigorated legal regime, it is necessary to acknowledge a more sinister account of history. Rediker surveys primary sources to show how the Atlantic Empires, led by Britain, organized an international campaign of terror to eradicate piracy, using the gallows in highly public displays of power (2004, p. 10). While the maltreatment that sailors suffered at the murderous hands of captains of contemporary ships probably contributed to their decisions to become pirates (Ritchie, 1986; Rediker, 2004, p. 17), Rediker excessively victimizes the pirates as revolutionaries in legitimate pursuit of an egalitarian community. Rather than primarily 9 See also Kontorovich (2004). 10 For a more detailed account, see Benton (2009). being casualties of social class and the mercantilist state, pirates suffered a heavy-handed response because the nascent international (colonial) system depended increasingly on transoceanic trade. 11 The 173 peace treaty at Utrecht caused thousands of unemployed sailors to look for work as pirates. 12 Albeit despicable in humanitarian terms, the crackdown corresponds to the perceived level of threat that pirates posed to core state interests. Enlisting Privateers to Support State Navies The growing dependence among European maritime powers on protected shipping routes to distant parts of their overseas empires resulted in the increased use of, and regulation of, privateers. For instance, the Dutch developed a sophisticated regulatory system for privateers that severely punished violators (Lunsford, 2005). Similarly, the British practiced judicial specialization for privateers, much like in the case of pirates, by setting up specialized prize courts for captured booty (Richard, 2010). The seriousness of this effort was perhaps felt more than anyone by Captain Kidd, who was hanged after seizing vessels in violation of his privateer commission (Ibid.). As the practice of privateering matured, states increased their use of privateers for the specific task of pirate-hunting. For instance, the Bahamas was a pirate rendezvous in 1718, despite being a British colony. Woodes Rogers, a British privateer, was commissioned to reinstate government control, successfully expelling the pirates and fending off the Spanish Navy (Woodard, 2007). In another instance of the revolving door, Rogers was subsequently appointed Governor of the Bahamas and proceeded to disperse many a Caribbean pirate by, in turn, commissioning privateers (Ibid., pp ). However, the role of privateers in ending the Golden Age of Piracy is often downplayed by authors arguing that states could not develop international norms against piracy and suppress it until privateering was delegitimized (Thomson, 11 Rediker (2004) has illuminating accounts on the particular role of the slave trade in transatlantic commerce as well as in piracy, both of which lie outside the scope of the present argument. 12 The scale of the unemployment among sailors was extensive. For instance, the British Royal Navy reduced its number of sailors by over 36,000 over a period of two years (Rediker, 2004, p. 23). 62

5 Noren New Pirates, Old Solutions 1994, p. 140). Golden Age Piracy ended a century before privateering was abandoned in the 1856 Paris Declaration Respecting Maritime Law, at least in the West. 13 In the words of Richard, piracy suppression had less to do with delegitimizing privateering and more to do with establishing the rule of law (2010, pp ). Towards this end, privateers were not alone, but rather complemented regular state navies; together they effectively hunted down pirates (Ibid.). 14 APPLYING 18 TH CENTURY LESSONS TO 21 ST CENTURY PROBLEMS As previously outlined, most authors employ the high seas-cyberspace analogy to argue for issuing letters of marque in order for private entities to defend themselves against cyberthreats. This section aims to apply the strategic lessons from the fight against piracy to the cybercriminal realm such that governments and corporations alike can achieve greater deterrence and chances of prosecution. While authors have created various typologies of cybercrime, there is no universal definition (Chang and Grabosky, 2014). The definition used here is criminal offences specifically related to computers and telecommunications, or crimes that have taken place within cyberspace (Ibid., pp ). Shutting down cyber safe havens Akin to Golden Age pirates, cybercriminals rely on cryptomarkets to trade technical tools or services needed for cyber attacks, as well as products derived from the loot. 15 The ubiquitous example is the Silk Road, the largest Dark Web market until it was dismantled in 2013, offering cybercrime-as-a-service, credentials, stolen 13 Piracy did reemerge in the early nineteenth century as a result of privateers, notionally supporting independence movements, going rogue The pirate crews, however, were not limited to privateersmen. Former naval personnel, sailors, fishermen, slaves, and criminals all joined pirate companies Peter Earle (2006), The Pirate Wars, (St. Martin's Griffin), p. 211, quoted in Richard, 2010, p As also argued in more detail by Cordingly (1995, p. 222). 15 The term cryptomarket originated as a colloquial online term, but has also been adopted by academia and refers to an online forum where goods and services are exchanged between parties who use digital encryption to conceal their identities (Martin, 2013, p. 356). Not all transactions on cryptomarkets are illegal. identities, as well as drugs and weapons, etc. 16 Whereas piracy was relatively limited, although with far-reaching political-economic consequences, it is difficult to estimate the extent of cryptomarkets. Pirates themselves estimated that the all-time peak in their global number was 2,400 aboard 30 ships in 1716 (Rediker, 2004, p. 29). A 2014 study suggests the Silk Road was just the tip of the iceberg (Martin, 2013), while a 2016 study using a near-identical definition of cryptomarkets found that about 20 cryptomarkets [were] active (Broséus et al., p. 11). The issue is that it is difficult to estimate how much trading is done on the Deep Web. It is probably substantial, but the impact is softened since access is limited for all but the highly skilled. 17 In addition to markets, cybercriminals rely on disreputable Internet Service Providers, or ISPs, for access to basic Internet infrastructure. 18 The term bulletproof hosting (BPH) captures how these providers enable their customers dubious or illicit activities, sometimes due to incompetence or ethical stances, but mainly for profit. To illustrate the impact of BPH, consider the Rustock botnet. 19 At its peak, it was blamed for about 60 percent of the spam sent daily (Bright, 2011). Its takedown, called Operation b107, was led by Microsoft and involved US federal law enforcement agencies, cybersecurity company FireEye, and the Dutch and Chinese governments (Ibid.). The importance of reducing the number of BPH providers is impossible to overstate as many cybercriminals would not be able to operate without them (Goncharov, 2015). That is because they constitute hideouts, much like physical ports 16 For a detailed, biography-style account of the Silk Road creator, which illustrates the judicial and law enforcement obstacles and dynamics to shutting down a cybercrime marketplace, see Bilton (2017). 17 The Dark Web is a relatively easy-to-access platform containing thousands of websites that hide their IP address through anonymity tools like Tor and I2P. The Deep Web is much larger, more technically demanding, and includes all web spaces that cannot be reached by regular search engines. 18 These providers offering typically include domain hosting, content hosting, or the means to run bot networks. They take highly lenient approaches to the type and legality of content and services that their customers operate. See 19 A botnet is nothing more than a string of connected computers coordinated together to perform a task (Norton.com, n.d.). The problems start when users machines are hijacked as part of botnets for nefarious purposes. 63

6 Independent Student Journal 2018: International Relations did for Caribbean pirates before they were brought under imperial control. The historical analogy, as seen in Section 3.2, suggests that governments should impose stricter regulatory control over cryptomarkets and hosting structures, while also recruiting former cybercriminals. It also suggests executing substantial numbers of cybercriminals. 20 Naturally, we can dismiss the latter as morally outdated, not to mention operationally difficult. Regarding stricter regulatory control, the Silk Road and Rustock takedowns exemplify how technical capability in law enforcement is less problematic than commonly imagined (Hayes et al., 2015). 21 Contrary to claims that law enforcement agencies are going dark in the face of technology, law enforcement has much better and more effective surveillance capabilities now than it did [in the Internet s youth] (Abelson et al., 2015, p. 71). In cybercrime, governments problems remain close to those of traditional crime, revolving around clashing national and international jurisdictions, hiring elite cyber forensics investigators, and being able to afford enough of them, according to Europol and Eurojust staff (Hayes et al., 2015). The historic overseas extension of legal regimes such that prosecution could take place where piracy took place cannot be readily applied in cyberspace. Local laws at the national level are already the primary tools for enforcing the rule of law against cybercrime. 22 However, the analogy suggest that the specialization of courts must be accelerated. Like the piracy courts of old, regular judges or juries could be replaced with persons holding deeper knowledge in cybersecurity and cybercrime, who are better suited to evaluate evidence About ten percent of all Golden Age pirates were hanged. See Boot, p Arguments to the effect that law enforcement must be given encryption backdoors by law are commonly motivated by mass intelligence gathering and surveillance rather than cybercrime per se. See Hayes et al. (2015). 22 Not necessarily under the correct laws, however. Data from the UK Ministry of Justice show that far more people have been sentenced for cyber offences under the Fraud Act than under the Computer Misuse Act 1990 (CMA) between 2007 and See McGuire and Dowling (2013). 23 Ideas to this effect have been put into practice in drugs courts and have been suggested by commentators using other sources of inspiration than piracy. While federal efforts are lagging behind, some US States have Regarding jurisdictional issues in the international battle against cybercrime, the analogy is less instructive. Britain secured its position as the premier naval power at this time, unilaterally exerting state power as the piracy threat to trade started to outweigh the risk of conflict with (mainly) France, Spain and the Netherlands (Rediker, 2004). In cybercrime, some geopolitical dimensions apply given that BPH operators often choose political hotspots as shields against takedowns. For instance, most BPH operations on the Dark Web operate from Russia, Ukraine or Moldova (Mahjoub and Passwaters, 2017). 24 For jurisdictional reasons, courts cannot touch such operations in unilateral moves similar to historical anti-piracy moves by the British. Also, operators commonly place different customers in different countries according to the type of content they offer (Mahjoub, 2017). These key challenges for governments in combating cybercrime operations can perhaps only be addressed with greater international cooperation, not legal specialization. Hence the piracy analogy fails to explain how a state can create incentives for another to mitigate cybercriminal operations in its territory. 25 The revolving door that propelled privateers Woodes Rogers and Sir Henry Morgan to governorships in the Caribbean translates into the hiring of cybersecurity professionals and even cybercriminals for high-ranking government jobs as investigators and administrators. Associated problems include cultural clashes with government bureaucracy, background checks that take years, and relatively low pay (Peterson, introduced specialized cyber prosecution units, see Pisaric (2017). Malaysia is another example (Habibu, 2016). 24 BPH providers also flourish in ostensibly cleaner jurisdictions. In terms of spam operations originating in their territories, the US and the UK combine to host as many as Russia and China combined because of loose laws, or loose enforcement thereof. See Spamhaus.org. 25 Zarate (2015) proposes drawing inspiration from counterterrorism and anti-money-laundering efforts of the Financial Action Task Force in the cyber realm. If a cyber norms framework was created around the international financial system, ostracizing or barring States that fail to quash domestic actors launching cyberattacks on that system, those norms may be followed. That is because States and bankers would ultimately be guided by self-interest rather than highminded appeals to the law of armed conflict (Zarate, 2015, p. 4). 64

7 Noren New Pirates, Old Solutions 2015). 26 The persuasive power of the privilege of public service is questionable (Ibid.). Nevertheless, the analogy suggests that the urgency and amount of resources afforded to these recruitment efforts should increase significantly. In sum, the high seas-cyberspace analogy is instructive for issues of court specialization, manpower, and the salience of regular municipal law. It fails to contribute to jurisdictional issues, including how to investigate and prosecute more effectively given that the physical infrastructure of the Internet always lies within the national jurisdiction of some country. Expanding State Capabilities The dynamic of sailor unemployment and use of privateers by states in the Golden Age is illuminating for the cyber realm in several ways. Consider the overrepresentation of Russians in cybercrime. According to Galeotti, Russians account for 35 percent of global cybercrime revenue, but only one percent of the global ICT economy (2011). He attributes this to the fact that a disproportionate number of Russians have world class math and computers skills, yet not the kind of jobs to use them legitimately (Ibid.). 27 There is some empirical evidence to support a correlation between weak economic development and escalating levels of cybercrime (Kshetri, 2010; Ojedokun and Eraye, 2012; Odekshola and Adeta, 2013). 28 Ilievski and Bernik synthesize the 26 To further illustrate, consider the words of ex- Director of the FBI, James Comey: I have to hire a great workforce to compete with those cyber criminals, and some of those kids want to smoke weed on the way to the interview," he said, adding that the agency was "grappling with the question" of its evolving talent pool (Peterson, 2015). 27 Recalling how loyal pirates at sea could be nudged by monarchs into attacking enemy targets, the Kremlin often subtly invites patriotic hackers to supply surge capacity for cyber operations, including the 2007 DDoS attacks on the Estonian governments and the 2008 dito in Georgia (Galeotti, 2017). 28 Nigerian university students identified the lack of economic opportunity as a man driver of cybercrime (Odekshola and Adeta, 2013). Young Nigerians with computing expertise who engage in cyber fraud are collectively known as Yahoo-yahoo Boys and they typically support themselves on profits from fraud (Ojedokun and Eraye, 2012). The combination of unemployment and expertise among many Russians and East Europeans in the late 1990s led many into cybercrime, using their countries as bases of operations (Kshetri, 2010). results of research on the connection between cybercrime and social-economic factors, finding three empirical studies that establish statistically significant correlations between social-economic characteristics, including unemployment, GDP per capita, and education, and perpetration of cybercrime, such as phishing and fraud (2016). As such, there is reason to believe that the historical case in which states provided fruitful employment for seamen can be instructive in the sense that expanding state cyber forces could reduce cybercrime. If political or practical realities should preclude an expansion in states cyber forces, the Golden Age reliance by governments on privateers to supplement their capabilities can still inform the battle against cybercrime. After crafting detailed contracts - akin to letters of marque - specifying the enemy assets to be targeted, cybersecurity contractors could be permitted to attack or disrupt the (hostile) activities of another state, or actors believed to act as proxies of another state. Importantly, the contracted private companies already hold a majority of the cyber expertise available. As opposed to the current ad hoc publicprivate organizational model, a more institutionalized cyber-privateering model has several substantial implications. First, it helps align various interests against cybercrime. By empowering private organizations to defend themselves against state and non-state cyber attackers to a greater degree, they help the state in protecting intellectual property and data privacy to the benefit of citizens broadly. Second, cyberprivateering projects state power to adversaries, boosting deterrence on account of the private sector s superior cyber capabilities. While Zarate expresses hope that a doctrine of cyber deterrence may emerge in the context of the cyber-privateering model (2015, p. 26), one must also consider the perils. Consider, for instance, a cyber-privateer firm that responds offensively to data breaches, but goes off script and starts attacking lawfully operated ISPs abroad, reminiscent of Captain Kidd s last adventure. Such an instance poses critical political as well as regulatory risks to states, with outcomes that are difficult to survey. Again, since all physical components of the Internet s infrastructure lie within national jurisdictions, an offensive operation by a cyber-privateer can have highly complex consequences as it likely would include servers across the globe (Libicki, 2009; 65

8 Independent Student Journal 2018: International Relations Mazanec & Thayer, 2015). Lastly, a complicating factor is how cyberdeterrence might be less effective than military deterrence. Whereas pirates (and privateers) faced retribution that often took the form of imprisonment or execution, cybercriminals are physically and legally protected to a greater degree. Arguably, for cyberprivateering to have a deterrent effect, it must be coupled with the legal specialization and strengthened human skills outline above. In sum, the high seas-cyberspace analogy suggests that cybercrime should be treated as a socio-economic problem to a greater extent and indicates that increased hiring into state cyber forces may reduce cybercrime. Meanwhile, a cyber-privateering model promises to unlock cyber capabilities in pursuit of state interests, although its deterrent effect is unclear. CONCLUSION Cyberspace develops exponentially in terms of data and speed, while governments move at a glacial pace, if that, as Singer and Friedman accurately put it (p. 198). Given that the international community still does not fully understand high seas piracy, exemplified by recent experiences in the Gulf of Aden, it has arguably made significant progress regarding cybercrime. The Silk Road cryptomarket and the Rustock botnet, among many similar takedowns, illustrate that legal-technical and public-private cooperation, not to mention grand-scale international cooperation, are possible and do occur. The extent to which the cyber-piracy analogy can contribute strategically to greater numbers of such achievements is not clear-cut, however. The high seas-cyberspace analogy does have some illuminous value to guide the future of cybersecurity. This is particularly true in understanding the salience of incentive structures that connect cybercrime, regulation, and private sector agency. Equally, the comparison is conceptually useful in understanding the limited reach of government power through law enforcement agencies. However, the comparison is not as powerful as Friedman and Singer appear to indicate in their 2014 book, which inspired the present inquiry. The cyber-piracy analogy does little to offer new tools of coercion to be used against states that willfully harbor cybercriminals, such as Russia s patriotic hackers - the equivalent of loyal pirates. Whereas Britain was in a position to impose its will and gradually defeat widespread piracy practices (mainly in the Caribbean), no state has such geopolitical power or legal reach on the Internet. Likewise, the analogy fails to identify new incentive structures that can encourage states to impose their own existing laws to the detriment of domestic cybercriminals. Nevertheless, the high seas-cyberspace analogy highlights a number of strategic areas where current public and private efforts against cybercrmine must be expanded and reinforced. First, the Golden Age of Piracy suggests that the emphasis on enabling structures should be reinforced. The removal of cryptomarkets and bulletproof hosting services can be aided to an extent by the specialization of courts and the training of cyberforensics investigators and prosecutors, although the problem of physical jurisdictions remains. As such, the constraints on governments are often shared with age-old battle against analog crime. Second, the creation of organized cyber-privateering through a modernday letter of marque is a complementary way of acquiring the human expertise needed. It may emulate a deterrent effect upon cybercriminals reminiscent of that of seaborne privateers upon pirates. Third, the analogy points to the need to treat cybercrime as a socio-economic problem. States can reduce the incentives for cybercrime by offering more fruitful employment for cybersavvy individuals. Ultimately, it is noteworthy that the Council of Europe s Convention on Cybercrime, or the Budapest Convention as it is commonly known, arguably constitutes international cooperation in cybercrime prevention at a level to which 18 th century counter-piracy cooperation never came close. Although the Convention is toothless in practice (Chang and Grabosky, 2014), this demonstrates a willingness to seek state-level dialogue. If combined with the revitalization of existing strategies against cybercrime, as suggested by the comparison between piracy and cybercrime, there emerges a promising formula for the battle against cybercrime. BIBLIOGRAPHY Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Specter, M. and Weitzner, D. (2015). Keys under doormats: mandating insecurity by requiring government 66

9 Noren New Pirates, Old Solutions access to all data and communications. Journal of Cybersecurity, 1(1), pp Bassiouni, M. (2001). Universal Jurisdiction for International Crimes: Historical Perspectives and Contemporary Practice. Virginia Journal of International Law, 42(1), pp Benton, L. (2009). A Search for Sovereignty. Cambridge: Cambridge University Press. Benton, L. (2011). Toward a New Legal History of Piracy: Maritime Legalities and the Myth of Universal Jurisdiction. International Journal of Maritime History, XXIII(1), pp Bilton, N. (2017). American Kingpin: The Epic Hunt for the Criminal MasterMind Behind the Silk Road. London: Portfolio. Bright, P. (2011). How Operation b107 decapitated the Rustock botnet. [online] Ars Technica. Available at: technology/2011/03/how-operation-b107- decapitated-the-rustock-botnet/ [Accessed 4 Apr. 2018]. Boot, M. (2009). Pirates, Then And Now: How Piracy Was Defeated In The Past And Can Be Again. Foreign Affairs, 88(4), pp Botting, D. (1978). The Pirates. Amsterdam: Time-Life Books. Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. and Décary-Hétu, D. (2016). Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Science International, 264, pp CCHS (2016). Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats. Washington, D.C.: Center for Cyber & Homeland Security. Chang, L. and Grabosky, P. (2014). Cybercrime and Establishing a Secure Cyberworld. In: M. Gill, ed., The Handbook of Security, 2nd ed. Basingstoke: Palgrave Macmillan. Cordingly, D. (1995). Under the Black Flag: The Romance and the Reality of Life Among the Pirates. New York City, NY: Random House. Deibert, R., Rohozinski, R. and Crete-Nishihata, M. (2012). Cyclones in cyberspace: Information shaping and denial in the 2008 Russia Georgia war. Security Dialogue, 43(1), pp Egloff, F. (2017). Cybersecurity and the Age of Privateering. In: G. Perkovich and A. Levite, ed., Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press: Washington, D.C., pp Fiske, J. (1897). Old Virginia and her neighbours. 7th ed. Boston: Houghton, Mifflin and Company. Galeotti, M. (2011). Why are Russians excellent cybercriminals?. The Moscow News. Retrieved from ls/ / Galeotti, M. (2017). Crimintern: How the Kremlin Uses Russia's Criminal Networks in Europe. London: European Council on Foreign Relations. Garrett, B. (2013). Taming the Wild Wild Web: Twenty-First Century Prize Law and Privateers as a Solution to Combating Cyber- Attacks. University of Cincinnati Law Review, [online] 81(2), pp Garrod, M. (2014). Piracy, the Protection of Vital State Interests and the False Foundations of Universal Jurisdiction in International Law. Diplomacy & Statecraft, 25(2), pp Goncharov, M. (2015). Criminal Hideouts for Lease: Bulletproof Hosting Services. TrendLabs Research Papers. Tokyo: Trend Micro. Habibu, S. (2016). Special court for cyber crimes. [online] Thestar.com.my. Available at: 6/09/02/special-court-for-cyber-crimestechsavvy-judges-being-trained-to-handleoffences-from-spying-to-bank/ [Accessed 4 Apr. 2018]. Hayes, B., Jeandesboz, J., Ragazzi, F., Simon, S. and Mitsilegas, V. (2015). The law enforcement challenges of cybercrime. Luxembourg: European Parliament Publications Office. Hoffman, W. and Levite, A. (2017). Private Sector Cyber Defense: Can Active Measures Help Stabilize Cyberspace?. [online] Washington, D.C.: Carnegie Endowment for International Peace. Available at: fense_int_final_full.pdf [Accessed 4 Mar. 2018]. Hoque, N., Kashyap, H. and Bhattacharyya, D. (2017). Real-time DDoS attack detection using FPGA. Computer Communications, 110, pp Ilievski, A., and Bernik, I. (2016). Socio- Economic Aspects of Cybercrime. Innovative 67

10 Independent Student Journal 2018: International Relations Issues and Approaches in Social Sciences, 9(3), Jarvis, R. (2006). Maritime Piracy in the Modern World. Insights on Law & Society, 6(3). Kempe, M. (2010). Even in the remotest corners of the world : globalized piracy and international law, Journal of Global History, 5(03), pp Konstam, A. and Cordingly, D. (2005). The History of Pirates. London: Mercury Books. Kontorovich, E. (2004). The Piracy Analogy: Modern Universal Jurisdiction's Hollow Foundation. Harvard International Law Journal, 45(1). Kshetri, N. (2010). Diffusion and Effects of Cyber-Crime on Developing Economies. Third World Quarterly, 31(7), Libicki, M. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation. Lunsford, V. (2005). Piracy and privateering in the golden age Netherlands. New York: Palgrave Macmillan. Lynch, V. (2017). Banrisul: SSL Certificates Used In Major Bank Hack. [online] Hashed Out. Available at: [Accessed 4 Mar. 2018]. Mahjoub, D. (2017). Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers. Mahjoub, D. and Passwaters, J. (2017). BPH exposed RBN never left, they just adapted and evolved. Did you?. Makovsky, D. (2017). The Silent Strike. [online] The New Yorker. Available at: 9/17/the-silent-strike [Accessed 1 Feb. 2018]. Martin, J. (2013). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology & Criminal Justice, 14(3), pp Mazanec, B. and Thayer, B. (2015). Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan. McGuire, M. and Dowling, S. (2013). Cyber crime: A review of the evidence. London: United Kingdom Home Office. Neither War nor Peace: The Uses of Constructive Ambiguity. (2018). The Economist. [online] Available at: neither-war-nor-peace [Accessed 4 Mar. 2018]. Ojedokun, U., and Eraye, M. (2012). Socioeconomic Lifestyles of the Yahoo-Boys: A Study of Perceptions of University Students in Nigeria. International Journal of Cyber Criminology, 6(2), Okeshola, F., and Adeta, A. (2013). The Nature, Causes, and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research. 3(9), On the cyber-frontier. (2018). The Economist. [online] Available at: songwriter-and-internet-utopian-was- 70-obituary-john-perry-barlow-died-february- 7th [Accessed 4 Apr. 2018]. Perry Barlow, J. (1996). A Declaration of the Independence of Cyberspace. [online] Electronic Frontier Foundation. Available at: [Accessed 4 Apr. 2018]. Peterson, A. (2015). How the government tries to recruit hackers on their own turf. [online] washingtonpost.com. Available at: [Accessed 6 Apr. 2018]. Pisaric, M. (2017). Specialization of Criminal Justice Authorities in Dealing with Cybercrime. Journal of Criminal Justice and Security, 17(2), pp Rabkin, J. and Rabkin, A. (2013). Navigating Conflicts in Cyberspace: Legal Lessons from the History of War at Sea. Chicago Journal of International Law, 14(1), pp Rediker, M. (1981). "Under the Banner of King Death": The Social World of Anglo-American Pirates, 1716 to The William and Mary Quarterly, 38(2), p.203. Rediker, M. (2004). Villains of All Nations: Atlantic Pirates in the Golden Age. London: Verso. Richard, T. (2010). Reconsidering the Letter of Marque: Utilizing Private Security Providers Against Piracy. Public Contract Law Journal, 39(3), pp Ritchie, R. (1986). Captain Kidd and the War against the Pirates. Cambridge, MA.: Harvard University Press. Rosenzweig, P. (2014). International Law and Private Actor Active Cyber Defensive 68

11 Noren New Pirates, Old Solutions Measures. Stanford Journal of International Law, 50(1). Stephenson, M. (2014). Corruption and the Revolving Door: Recent Discussions and Further Reflections. [Blog] The Global Anticorruption Blog. Available at: 28/corruption-and-the-revolving-door-recentdiscussions-and-further-reflections/ [Accessed 5 Mar. 2018]. Spearin, C. (2014). Promising Privateers? Understanding The Constraints Of Contemporary Private Security At Sea. Naval War College Review, 67(2), pp Singer, P. and Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press. Thomson, J. (1994). Mercenaries, Pirates, and Sovereigns. Princeton: Princeton University Press. What is A Botnet?. Norton.com. Retrieved 5 April 2018 from Woodard, C. (2007). The Republic of Pirates: Being the True and Surprising Story of the Caribbean Pirates and the Man Who Brought Them Down. Harcourt Trade. Zarate, J. (2015). The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response. Washington, D.C.: Foundation for Defense of Democracies 69

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China s new strengths means it has

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

The Strategic Significance of the Internet Commons

The Strategic Significance of the Internet Commons The Strategic Significance of the Internet Commons What is a global common? Historically, it has been defined as a naturally occurring domain or area not governed by any single political jurisdiction or

More information

PERTH COUNTER-PIRACY CONFERENCE JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING

PERTH COUNTER-PIRACY CONFERENCE JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING PERTH COUNTER-PIRACY CONFERENCE 15-17 JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING [This is a personal, informal report of our meeting which I offer for consideration by the Australian Government

More information

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 13.9.2017 COM(2017) 489 final 2017/0226 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on combating fraud and counterfeiting of non-cash means

More information

Following the Money to Combat Terrorism, Crime and Corruption

Following the Money to Combat Terrorism, Crime and Corruption Following the Money to Combat Terrorism, Crime and Corruption ACAMS Houston Chapter April 19, 2017 Celina B. Realuyo Professor of Practice William J. Perry Center for Hemispheric Defense Studies, National

More information

Revealing the true cost of financial crime Focus on the Middle East and North Africa

Revealing the true cost of financial crime Focus on the Middle East and North Africa Revealing the true cost of financial crime Focus on the Middle East and North Africa What s hiding in the shadows? In March 2018, Thomson Reuters commissioned a global survey to better understand the true

More information

Global View Assessments Winter 2016

Global View Assessments Winter 2016 Russia: Complicating Matters in the Fight against the Islamic State Key Judgment: As Russia furthers its involvement in the Syrian civil war, there is a strong possibility that loyalist troops backed by

More information

British imperial expansion and the transformation of violence at sea, : introduction

British imperial expansion and the transformation of violence at sea, : introduction British imperial expansion and the transformation of violence at sea, 1600 1850: introduction Article Published Version Blakemore, R. J. (2013) British imperial expansion and the transformation of violence

More information

Finland's response

Finland's response European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation

More information

Results of regional projects under the Council of Europe/European Union Partnership for Good Governance 1

Results of regional projects under the Council of Europe/European Union Partnership for Good Governance 1 Results of regional projects under the Council of Europe/European Union Partnership for Good Governance 1 What is the Partnership for Good Governance? In April 2014, the European Union and the Council

More information

Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon

Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon Introduction The 9/11 incident and the bombing at Bali on 12 October 2002 shook the world community and sharpened it with the

More information

Next- Generation National Security and Public Safety in Europe

Next- Generation National Security and Public Safety in Europe A N A L Y S T C O N N E C T I O N Alan Webber Research Director Next- Generation National Security and Public Safety in Europe June 2016 As the threats and risks from cyber criminals, terrorists, gangs,

More information

JOINT STATEMENT OF THE ASEAN-AUSTRALIA SPECIAL SUMMIT: THE SYDNEY DECLARATION. Sydney, Australia, 18 March 2018

JOINT STATEMENT OF THE ASEAN-AUSTRALIA SPECIAL SUMMIT: THE SYDNEY DECLARATION. Sydney, Australia, 18 March 2018 JOINT STATEMENT OF THE ASEAN-AUSTRALIA SPECIAL SUMMIT: THE SYDNEY DECLARATION Sydney, Australia, 18 March 2018 1. We, the Heads of State/Government of the Member States of the Association of Southeast

More information

Canada and Israel Strategic Partnership (22 January 2014)

Canada and Israel Strategic Partnership (22 January 2014) Canada and Israel Strategic Partnership (22 January 2014) http://www.international.gc.ca/name-anmo/canada_israel_mou-prot_ent_canada_israel.aspx?lang=eng Memorandum of Understanding: Canada and Israel

More information

Intelligence brief 19 March 2014

Intelligence brief 19 March 2014 Intelligence brief 19 March 2014 Maritime insecurity in the Gulf of Guinea Summary 1. Maritime insecurity incorporates a range of criminal activities, including piracy, smuggling and illegal fishing. 2.

More information

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union Russia: Reasserting Power in Regions of the Former Soviet Union Since the collapse of the Soviet Union in 1991 Russia has struggled to regain power in Eurasia. Russia is reasserting its power in regions

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS

More information

Third Session ROYAL MOROCCAN NAVY: NEW PERSPECTIVES FOR BETTER MARITIME SECURITY AWARENESS" Captain Abdelkrim MAALOUF

Third Session ROYAL MOROCCAN NAVY: NEW PERSPECTIVES FOR BETTER MARITIME SECURITY AWARENESS Captain Abdelkrim MAALOUF ROYAL MOROCCAN NAVY: NEW PERSPECTIVES FOR BETTER MARITIME SECURITY AWARENESS" Captain Abdelkrim MAALOUF Head of Division at Royal Moroccan Navy HQ Admiral, distinguished audience, It is an honor and a

More information

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA)

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA) BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA) Note: We are sharing this information and analysis with you as someone with a special interest in Canada-EU relations. For further information,

More information

Closed for Repairs? Rebuilding the Transatlantic Bridge. by Richard Cohen

Closed for Repairs? Rebuilding the Transatlantic Bridge. by Richard Cohen Closed for Repairs? Rebuilding the Transatlantic Bridge by Richard Cohen A POLICY August, PAPER 2017 NATO SERIES CLOSED FOR REPAIRS? REBUILDING THE TRANSATLANTIC BRIDGE By Richard Cohen August, 2017 Prepared

More information

Council of the European Union Brussels, 14 September 2017 (OR. en)

Council of the European Union Brussels, 14 September 2017 (OR. en) Council of the European Union Brussels, 14 September 2017 (OR. en) Interinstitutional File: 2017/0226 (COD) 12181/17 PROPOSAL From: date of receipt: 13 September 2017 To: No. Cion doc.: Subject: DROIPEN

More information

Annex. Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Annex. Twelfth United Nations Congress on Crime Prevention and Criminal Justice Annex General Assembly resolution 65/230 Twelfth United Nations Congress on Crime Prevention and Criminal Justice The General Assembly, Emphasizing the responsibility assumed by the United Nations in the

More information

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND? EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND? Given the complexity and diversity of the security environment in NATO s South, the Alliance must adopt a multi-dimensional approach

More information

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Twelfth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/CONF.213/L.6/Rev.2 Twelfth United Nations Congress on Crime Prevention and Criminal Justice Salvador, Brazil, 12-19 April 2010 Distr.: Limited 18 April 2010 Original: English Agenda items

More information

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Lecturer Adrian Cristian MOISE, PhD. Postdoctoral researcher, Titu Maiorescu

More information

Council of the European Union Brussels, 23 January 2015 (OR. fr)

Council of the European Union Brussels, 23 January 2015 (OR. fr) Council of the European Union Brussels, 23 January 2015 (OR. fr) 5507/15 LIMITE JAI 41 PESC 66 COSI 9 COPS 12 ENFOPOL 21 COTER 14 SIRIS 8 FRONT 23 DROIPEN 6 EUROJUST 11 NOTE From: To: Subject: French delegation

More information

G7 Foreign Ministers Declaration on Maritime Security Lübeck, 15 April 2015

G7 Foreign Ministers Declaration on Maritime Security Lübeck, 15 April 2015 G7 Foreign Ministers Declaration on Maritime Security Lübeck, 15 April 2015 The maritime domain is a cornerstone of the livelihood of humanity, habitat, resources and transport routes for up to 90 per

More information

Social Studies Content Expectations

Social Studies Content Expectations The fifth grade social studies content expectations mark a departure from the social studies approach taken in previous grades. Building upon the geography, civics and government, and economics concepts

More information

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies By Jamie Fly, Laura Rosenberger, and David Salvo 2018 In 2014, Russian government operatives began attacking American democracy

More information

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013 www.coe.int/tcy Strasbourg, 5 November 2013 T-CY (2013)30 Cybercrime Convention Committee (T-CY) Ad-hoc Subgroup on Transborder Access and Jurisdiction Report of the Transborder Group for 2013 Report prepared

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Third Committee (A/65/457)]

Resolution adopted by the General Assembly on 21 December [on the report of the Third Committee (A/65/457)] United Nations General Assembly Distr.: General 1 April 2011 Sixty-fifth session Agenda item 105 Resolution adopted by the General Assembly on 21 December 2010 [on the report of the Third Committee (A/65/457)]

More information

TURKEY Check Against Delivery. Statement by H.E. Sebahattin ÖZTÜRK Minister of Interior / Republic of Turkey

TURKEY Check Against Delivery. Statement by H.E. Sebahattin ÖZTÜRK Minister of Interior / Republic of Turkey TURKEY Check Against Delivery Statement by H.E. Sebahattin ÖZTÜRK Minister of Interior / Republic of Turkey Thirteenth United Nations Congress on Crime Prevention and Criminal Justice Doha (Qatar) 12-19

More information

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives. Confronting Extremism and Terrorism Major General Dr. Kamal Ahmed Amer Chairman of the Committee for Defense and National Security, and the House of Representatives. Terrorism is one of the most significant

More information

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration TRANSNATIONAL CRIME An International Law Enforcement Collaboration Understanding Transnational organized crime involves the planning and execution of illicit business ventures by groups or networks of

More information

Speech by Minister of Defense Inada at IRSEM (The Institute for Strategic Research)

Speech by Minister of Defense Inada at IRSEM (The Institute for Strategic Research) Speech by Minister of Defense Inada at IRSEM (The Institute for Strategic Research) Volatile Global Security Environment and Japan-Europe Defense Cooperation January 6, 2017 [Introduction] I would like

More information

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Samuel Žilinčík and Tomáš Lalkovič Goals The main goal of this study consists of three intermediate objectives. The main goal is to analyze

More information

Pirates. Peter T. Leeson

Pirates. Peter T. Leeson Rev Austrian Econ (2010) 23:315 319 DOI 10.1007/s11138-010-0116-2 Pirates Peter T. Leeson Published online: 23 June 2010 # Springer Science+Business Media, LLC 2010 Abstract In my recent book, The Invisible

More information

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2. Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2. Disclaimer Notice 3. Copyright Notice Introduction Associated

More information

S/2001/1326. Security Council. United Nations

S/2001/1326. Security Council. United Nations United Nations Security Council Distr.: General 18 January 2002 English Original: French S/2001/1326 Letter dated 28 December 2001 from the Chairman of the Security Council Committee established pursuant

More information

PC.DEL/764/08 15 September ENGLISH only

PC.DEL/764/08 15 September ENGLISH only PC.DEL/764/08 15 September 2008 ENGLISH only Statement by the United States Opening Session OSCE Follow-up Public-Private Partnership Conference: Partnership of State Authorities, Civil Society and the

More information

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction 1 Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction Recalling the United Nations Convention against Transnational

More information

CAC/COSP/IRG/2011/CRP.4

CAC/COSP/IRG/2011/CRP.4 27 May 2011 English only Implementation Review Group Second session Vienna, 30 May-3 June 2011 Item 2 of the provisional agenda Executive summary: Spain Legal system According to the Spanish Constitution

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information

Contemporary maritime pressures and their implications for naval force structure planning

Contemporary maritime pressures and their implications for naval force structure planning University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 Contemporary maritime pressures and their implications for

More information

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD Sebastian SÂRBU, PhD Abstract: Security culture focuses on a broader scope: the ideas, customs and social behaviors, values of a group that influence the group and also society security at large. Therefore,

More information

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union

More information

ASEAN Regional Forum. Work Plan for Counter Terrorism. and Transnational Crime

ASEAN Regional Forum. Work Plan for Counter Terrorism. and Transnational Crime ASEAN Regional Forum Work Plan for Counter Terrorism and Transnational Crime 2015-2017 Table of Contents Context... 2 Objective... 3 Framework... 4 Leadership, Management and Funding Structure... 5 Relationship

More information

Conférence Benelux Cybersecurity Maastricht, 5 avril 2011 Intervention de Monsieur le Ministre François Biltgen

Conférence Benelux Cybersecurity Maastricht, 5 avril 2011 Intervention de Monsieur le Ministre François Biltgen Conférence Benelux Cybersecurity Maastricht, 5 avril 2011 Intervention de Monsieur le Ministre François Biltgen Dear Ivo (Opstelten), Dear Stefaan (De Clerck), Dear Secretary-General Laarhoven, Dear colleagues.

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

S/2001/1309. Security Council. United Nations

S/2001/1309. Security Council. United Nations United Nations Security Council Distr.: General 31 December 2001 English Original: French S/2001/1309 Letter dated 27 December 2001 from the Chairman of the Security Council Committee established pursuant

More information

Title of Presentation. Global Threat Brief President / CEO Global Guardian

Title of Presentation. Global Threat Brief President / CEO Global Guardian Title of Presentation Global Threat Brief President / CEO Global Guardian Introduction / Background Dale Buckner, President and CEO of Global Guardian 24-year US Army Veteran, Colonel (Retired) Special

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing

More information

SUMMARY REPORT OF THE NINTH ASEAN REGIONAL FORUM SECURITY POLICY CONFERENCE PHNOM PENH, CAMBODIA, 25 MAY 2012

SUMMARY REPORT OF THE NINTH ASEAN REGIONAL FORUM SECURITY POLICY CONFERENCE PHNOM PENH, CAMBODIA, 25 MAY 2012 SUMMARY REPORT OF THE NINTH ASEAN REGIONAL FORUM SECURITY POLICY CONFERENCE PHNOM PENH, CAMBODIA, 25 MAY 2012 1. The Ninth ARF Security Policy Conference (ASPC) was held in Phnom Penh, Cambodia on 25 May

More information

EU-India relations post-lisbon: cooperation in a changing world New Delhi, 23 June 2010

EU-India relations post-lisbon: cooperation in a changing world New Delhi, 23 June 2010 EU-India relations post-lisbon: cooperation in a changing world New Delhi, 23 June 2010 I am delighted to be here today in New Delhi. This is my fourth visit to India, and each time I come I see more and

More information

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes? Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes? Benoît Dupont Structure of the presentation Conceptualizing cybercrime

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 4.12.2017 COM(2017) 728 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Reporting on the follow-up to the EU Strategy towards the Eradication

More information

JOINT INVESTIGATION TEAMS: BASIC IDEAS, RELEVANT LEGAL INSTRUMENTS AND FIRST EXPERIENCES IN EUROPE

JOINT INVESTIGATION TEAMS: BASIC IDEAS, RELEVANT LEGAL INSTRUMENTS AND FIRST EXPERIENCES IN EUROPE JOINT INVESTIGATION TEAMS: BASIC IDEAS, RELEVANT LEGAL INSTRUMENTS AND FIRST EXPERIENCES IN EUROPE Jürgen Kapplinghaus* I. INTRODUCTION Tackling organized cross-border crime more efficiently and aiming

More information

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 2018 Peacebuilding Commission Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 1 Index Introduction... 3 Definition of key-terms... 4 General Overview...

More information

THE FEDERALIST ERA, : FOREIGN POLICY

THE FEDERALIST ERA, : FOREIGN POLICY THE FEDERALIST ERA, 1789-1801: FOREIGN POLICY I. Impact of the French Revolution A. popular overthrow of French monarchy and aristocracy, beginning in July 1789 1. France proclaimed itself a republic (similar

More information

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger*

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* 20 July 2017 Here is a story about communications and power. Chapter 1 starts 12 years before IAMCR

More information

National Report Japan

National Report Japan National Report Takeshi MATSUDA, Megumi OCHI, Tadashi IWASAKI (B) Jurisdictional issues (1)(a) How does your country locate the place of the commission of a crime in cyberspace? Article 1 of the ese Penal

More information

Hearing on the U.S. Rebalance to Asia

Hearing on the U.S. Rebalance to Asia March 30, 2016 Prepared statement by Sheila A. Smith Senior Fellow for Japan Studies, Council on Foreign Relations Before the U.S.-China Economic and Security Review Commission Hearing on the U.S. Rebalance

More information

The EU fight against piracy in the Horn of Africa

The EU fight against piracy in the Horn of Africa The EU fight against piracy in the Horn of Africa Speaking Notes: Actions under the Common Security and Defence Policy (CSDP) and the comprehensive approach Brussels, 28 March 2012 Thorsten Bargfrede Crisis

More information

Black smoke once again looms on the Iraqi horizon as a Middle Eastern

Black smoke once again looms on the Iraqi horizon as a Middle Eastern ASPJ Africa & Francophonie - 1 st Quarter 2016 Countering Convergence Central Authorities and the Global Network to Combat Transnational Crime and Terrorism Dan Stigall * Black smoke once again looms on

More information

The Opium Wars and their Impact

The Opium Wars and their Impact The Opium Wars and their Impact In 1839 the Qing Emperor of China, rejecting proposals to legalise and tax opium, appointed viceroy Lin Zexu to solve the problem by completely banning the opium trade.

More information

Thirteenth United Nations Congress on Crime Prevention and Criminal Justice

Thirteenth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/CONF.222/1 Thirteenth United Nations Congress on Crime Prevention and Criminal Justice Doha, 12-19 April 2015 Distr.: General 8 January 2015 Original: English Annotated provisional agenda

More information

Journal of Conflict Transformation & Security

Journal of Conflict Transformation & Security Louise Shelley Human Trafficking: A Global Perspective Cambridge and New York: Cambridge University Press, 2010, ISBN: 9780521130875, 356p. Over the last two centuries, human trafficking has grown at an

More information

OSO Political Science 2014.xlsx

OSO Political Science 2014.xlsx Oxford University Press - Oxford Scholarship Online Oxford University Press - Oxford Scholarship Online Abortion Politics, Women's Movements, and the Democratic State Nov-03 2001 Y 9780199242665 http://www.oxfordscholarship.com/view/10.1093/0199242666.001.0001/acprof-9780199242665

More information

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005.

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005. REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE Podgorica, July 2005. The S A R Z A D J Z O N A K ON THE STATE BORDER SURVEILLANCE

More information

Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes

Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes Forum: United Nations Office of Drugs and Crime Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes Student Officer: Yin Lett Win Position:

More information

CONFERENCE BACKGROUND GUIDE

CONFERENCE BACKGROUND GUIDE MODEL UNITED NATIONS CHANGE THE WORLD E M I R A T E S CONFERENCE BACKGROUND GUIDE United Nations Security Council Cyber Terrorism Dear Delegates, Welcome to the 2018 Change The World Model United Nations

More information

The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law

The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law Kate Jastram and Anne Quintin 1 VII. Geography and Neutrality The final panel session was chaired by Stephen

More information

WHY WE ARE REVIEWING THE ACT

WHY WE ARE REVIEWING THE ACT WHY WE ARE REVIEWING THE ACT In this section we summarise Customs current role and why we believe new legislation is needed to enable us to respond and adapt effectively to new technologies, business practices

More information

COUNCIL OF EUROPE AND THE INTERNET

COUNCIL OF EUROPE AND THE INTERNET COUNCIL OF EUROPE AND THE INTERNET Human rights, democracy and rule of law SAFEGUARDING HUMAN RIGHTS online The Internet is one of the progressive forces of our age: information and global communication

More information

Hacking and the Law. John MacKenzie

Hacking and the Law. John MacKenzie Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors

More information

FIFTH MEETING OF MINISTERS OF JUSTICE OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004

FIFTH MEETING OF MINISTERS OF JUSTICE OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004 FIFTH MEETING OF MINISTERS OF JUSTICE OEA/Ser.K/XXXIV.5 OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004 April 28-30, 2004 Original: Spanish Washington, D.C. CONCLUSIONS

More information

Question 1: The Distribution of Authority in Cyberspace

Question 1: The Distribution of Authority in Cyberspace Question 1: The Distribution of Authority in Cyberspace 1 MIT Student Cyberpolitics in IR Professor Choucri December 10, 2015 Today, 3.3 billion Internet users about 45% of the world s population sent

More information

CHINA IN THE WORLD PODCAST. Host: Paul Haenle Guest: Wang Yizhou

CHINA IN THE WORLD PODCAST. Host: Paul Haenle Guest: Wang Yizhou CHINA IN THE WORLD PODCAST Host: Paul Haenle Guest: Wang Yizhou Episode 3: China s Evolving Foreign Policy, Part I November 19, 2013 You're listening to the Carnegie Tsinghua "China in the World" podcast,

More information

M. Taylor Fravel Statement of Research (September 2011)

M. Taylor Fravel Statement of Research (September 2011) M. Taylor Fravel Statement of Research (September 2011) I study international security with an empirical focus on China. By focusing on China, my work seeks to explain the foreign policy and security behavior

More information

Addis Abeba International Conference. Italian Experience and Framework on Asset Recovery in Fighting and Cracking Down Organized Crime and Corruption

Addis Abeba International Conference. Italian Experience and Framework on Asset Recovery in Fighting and Cracking Down Organized Crime and Corruption Addis Abeba International Conference Italian Experience and Framework on Asset Recovery in Fighting and Cracking Down Organized Crime and Corruption DEFINITION AND PECULIARITIES OF ASSET RECOVERY Asset

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The member states of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

Joint Statement of the 22 nd EU-ASEAN Ministerial Meeting Brussels, Belgium, 21 January 2019

Joint Statement of the 22 nd EU-ASEAN Ministerial Meeting Brussels, Belgium, 21 January 2019 Joint Statement of the 22 nd EU-ASEAN Ministerial Meeting Brussels, Belgium, 21 January 2019 We, the Foreign Ministers of Member States of the European Union and the High Representative of the Union for

More information

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996) David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev. 1367 (1996) Global computer-based communications cut across territorial borders, creating a new realm

More information

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Key focus for questions examining on Causes of conflicts among nations: You will need to explain how the different

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM 1 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The Member States of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

New Brunswick s International Strategy. Department of Intergovernmental Affairs

New Brunswick s International Strategy. Department of Intergovernmental Affairs New Brunswick s International Strategy Department of Intergovernmental Affairs Message from the Premier As Premier and Minister of Intergovernmental Affairs, I am pleased to present to you New Brunswick

More information

TST Issue Brief: Global Governance 1. a) The role of the UN and its entities in global governance for sustainable development

TST Issue Brief: Global Governance 1. a) The role of the UN and its entities in global governance for sustainable development TST Issue Brief: Global Governance 1 International arrangements for collective decision making have not kept pace with the magnitude and depth of global change. The increasing interdependence of the global

More information

Trafficking in Persons. The USAID Strategy for Response

Trafficking in Persons. The USAID Strategy for Response Trafficking in persons is not only an abuse of the human rights of its victims, but also an affront to all our humanity. Trafficking in Persons The USAID Strategy for Response I. The Problem The trafficking

More information

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9 The Stable Seas Maritime Security Index is a first-of-its-kind effort to measure and map a range of threats to maritime governance and the capacity of nations to counter these threats. By bringing diverse

More information

Small Arms. Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects

Small Arms. Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects Small Arms REVIEW CONFERENCE 2006 United Nations A/CONF.192/15 Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects I. Preamble 1. We,

More information

(OJ L 164, , p. 3)

(OJ L 164, , p. 3) 2002F0475 EN 09.12.2008 001.001 1 This document is meant purely as a documentation tool and the institutions do not assume any liability for its contents B COUNCIL FRAMEWORK DECISION of 13 June 2002 on

More information

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004. COUNCIL OF THE EUROPEAN UNION Brussels, 29 March 2004 7906/04 JAI 100 ECOFIN 107 TRANS 145 RELEX 123 ECO 73 PESC 208 COTER 20 COSDP 142 NOTE from : Subject : the General Secretariat Declaration on combating

More information

Draft Accra Declaration

Draft Accra Declaration Draft Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held

More information

Protecting Human Rights and National Security in the New Era of Data Nationalism

Protecting Human Rights and National Security in the New Era of Data Nationalism Protecting Human Rights and National Security in the New Era of Data Nationalism In this research program, I seek to study the new era of data nationalism, the increasingly common actions by nations to

More information

Trends in transnational crime routes

Trends in transnational crime routes An estimated 3,600 organized crime groups are active within the European Union. 1 These underground networks are becoming increasingly internationalized and professionalized. They thrive on advancements

More information

Collaboration Amidst Complexity: Enhancing Jointness in Canada s Defence Instrument. by Doug Dempster

Collaboration Amidst Complexity: Enhancing Jointness in Canada s Defence Instrument. by Doug Dempster by Doug Dempster A POLICY July, PAPER 2016 2016 POLICY REVIEW SERIES Collaboration Amidst Complexity: Enhancing by Doug Dempster CGAI Fellow This essay is one in a series commissioned by Canadian Global

More information

Panel 2: National Data Governance in a Global Economy

Panel 2: National Data Governance in a Global Economy Global Digital Futures Policy Forum 2016: Issues Brief Panel 2: National Data Governance in a Global Economy By Anupam Chander Introduction Global data flows are the lifeblood of the global economy today

More information

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org AFRICAN DECLARATION on Internet Rights and Freedoms africaninternetrights.org PREAMBLE Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including

More information