1C 2E. Identity screening for safer travel. Identity screening for safer travel JULY 2017 JULY 2017 SEAT

Similar documents
STRATEGY FOR COUNTERING MIGRANT SMUGGLING A GLOBAL LAW ENFORCEMENT RESPONSE

Control Process. Border. Fernando Moya Castro

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM

ABC and Integrated Border management

(Legislative acts) REGULATIONS REGULATION (EU) 2017/458 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 15 March 2017

DGD 1 EUROPEAN UNION. Brussels, 22 February 2017 (OR. en) 2015/0307 (COD) PE-CONS 55/16 FRONT 484 VISA 393 SIRIS 169 COMIX 815 CODEC 1854

8 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

PUBLIC. Brussels, 28 March 2011 (29.03) (OR. fr) COUNCIL OF THE EUROPEAN UNION. 8230/11 Interinstitutional File: 2011/0023 (COD) LIMITE

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

Managing Australia s Border. Terry Wall National Manager Passenger Targeting

First Session Ninth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 9 of 2008

Office of Inspector General

Approximately eight months after the terrorist

IOM International Organization for Migration OIM Organizaţia Internaţională pentru Migraţie

(Havana, Cuba, 21 July 2017)

A guide to the Regional Movement Alert System

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

STATEMENT JAMES W. ZIGLAR COMMISSIONER IMMIGRATION AND NATURALIZATION SERVICE BEFORE THE

5843/19 MP/dk 1 JAI.1 LIMITE EN

WAPIS PROGRAMME WEST AFRICAN POLICE INFORMATION SYSTEM. This Programme is funded by the European Union

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

e-borders: Friends of Presidency Group meeting Brussels

10 TH ANNUAL HEADS OF NCB CONFERENCE

GAO. HOMELAND SECURITY DHS Has Taken Actions to Strengthen Border Security Programs and Operations, but Challenges Remain

Global Identity Verification & Migration Mobility Control

Practical Guidelines: Sharing Information with Law Enforcement

IMMIGRATION (ADVANCE PASSENGER INFORMATION) REGULATIONS, 2017 ARRANGEMENT OF REGULATIONS. 3. Duty to provide advance passenger information.

DHS Biometrics Strategic Framework

Conference of the Parties to the United Nations Convention against Transnational Organized Crime

Council of the European Union Brussels, 23 January 2015 (OR. fr)

PROPOSED AMENDMENT 25 TO ANNEX 9. (Presented by the Secretariat) EXECUTIVE SUMMARY

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

H. R To amend the Immigration and Nationality Act to provide enhanced security measures for the visa waiver program, and for other purposes.

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

HERMES API/PNR PRODUCT FOR PASSENGER SCREENING EASY TO IMPLEMENT, CONFIGURE & OPERATE

FACILITATION IN AVIATION

S/2002/1045. Security Council. United Nations

GAO REGISTERED SEX OFFENDERS. Sharing More Information Will Enable Federal Agencies to Improve Notifications of Sex Offenders International Travel

APEC Third Senior Officials Meeting (SOM 3) and Related Meetings Committee on Trade and Investment: Business Mobility Group

CRS Report for Congress

THE PASSENGER JOURNEY: New requirements for border control

6310/1/16 REV 1 BM/cr 1 DG D 1 A

Disaster Victim Identification - A Canadian Perspective by Tony McCulloch

GAO. VISA SECURITY Additional Actions Needed to Strengthen Overstay Enforcement and Address Risks in the Visa Process

Chairman Feinstein, Ranking Member Kyl, distinguished members of the Subcommittee:

Stopping illegal imports of animal products into Great Britain

Copyright Publisher Disclaimer Disclaimer

United States Government Accountability Office GAO. Report to Congressional Requesters, House of Representatives. January 2007

Introduction of Immigration Liaison Officer Projects

Submission to. Ministry of Business, Innovation & Employment. on the. Consultation on an Electronic Travel Authority

STATEMENT JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE

49 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

12027/16 FR,EB/dk 1 DGD 1C LIMITE EN

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Programmes and Projects - Facilitation (FAL) 5.2 Report on Facilitation Best Practices/Establishment of a Database Project FAL BEST PRACTICES

BEST PRACTICES WORKSHOP ON TRAVEL DOCUMENT SECURITY ORGANIZED BY THE OAS/CICTE AND ICAO SAN SALVADOR, EL SALVADOR JUNE 9-11, 2008

Improving America's Security, Strengthening Transatlantic Relations: An Update on the Expansion of the Visa Waiver Program

Frequently Asked Questions

Policy Framework for the Regional Biometric Data Exchange Solution

Use of Interpol Data at US Borders

PE-CONS 71/1/15 REV 1 EN

PROTECTING CULTURAL HERITAGE

CORPORATE HEADQUARTERS

COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT. Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND THE COUNCIL

DEPARTMENT OF HOMELAND SECURITY BUREAU OF CUSTOMS AND BORDER PROTECTION. 8 CFR PARTS 212, 214, 231 and 233 (CBP DEC ) RIN 1515-AD36

Ministerial Meeting of the Non-Aligned Movement Coordinating Bureau Tehran, Islamic Republic of Iran (23 26 July 2015) Delegates' Guide

INTERNATIONAL CONVENTION FOR THE SUPPRESSION OF THE FINANCING OF TERRORISM

International Convention for the Suppression of the Financing of T...

THE ROLE OF IDENTITY MANAGEMENT IN FACILITATION AND ENHANCING BORDER SECURITY

Advanced Passenger Information: Sharing Data for Effective Border Control that Support Tourism Growth in the Asia-Pacific

New Process for Expanded Visa Free Travel to U.S.

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process

RESOLUTION ADOPTED BY THE GENERAL ASSEMBLY. 54/109. International Convention for the Suppression of the Financing of Terrorism

Fact Sheet: Electronic System for Travel Authorization (ESTA)

BRIEFING PAPER No Deal, No Data? The Future of UK EU Law Enforcement Information Sharing. Alexander Babuta

Security and Intelligence in US-Mexico Relations 1. Luis Herrera-Lasso M. 2

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005

INTERPOL CBRNE OPERATIONS

Terms & Conditions for Heathrow ID Pass Scheme (the Terms )

Appendix II Draft comprehensive convention against international terrorism

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES

Achieving Interoperability

Frequently Asked Questions Western Hemisphere Travel Initiative Publication of the Air Final Rule

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

BEFORE THE DEPARTMENT OF HOMELAND SECURITY WASHINGTON, D.C.

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

Council of the European Union Brussels, 8 February 2016 (OR. en)

Frequently Asked Questions: Electronic System for Travel Authorization (ESTA)

Recommended Practice 1701 l

Burma Immigration (Emergency Provisions) Act, 1947

Verify and Authenticate Identities before Issuing a Driver s License or State Identification Card.

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.

DEPARTMENT OF HOMELAND SECURITY CUSTOMS AND BORDER PROTECTION. 8 CFR Part 212 RIN 1651-AA97 USCBP

IMMIGRATION CONTROL. Immigration Bureau,Ministry of Justice,JAPAN

INTERPOL s Rules on the Processing of Data

Special Report - House FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012

The digital traveler. Automating border management solutions to facilitate travel and enhance security

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

Erling Hoeve & Rignald Gressmann

Transcription:

NAME OF PASSENGER FLIGHT DATE SEAT NAME OF PASSENGER NAME OF PASSENGER FLIGHT DATE SEAT NAME OF PASSENGER FLIGHT DATE FLIGHT DATE JULY 2017 JULY 2017 Identity screening for safer travel Identity screening for safer travel SEAT SEAT 1C 2E

Through I-Checkit, accredited private sector partners can draw on INTERPOL s policing capabilities, helping to detect identity fraud and building a stronger security infrastructure for the travel industry. The value of identity documents 4 Protecting the travel industry 5 Partnering with the private sector 6 Success story 2017 8 How does I-Checkit work? 10 Benefits 12 How to connect? 13 Legal framework 14 A sustainable financial model 15

THE VALUE OF IDENTITY DOCUMENTS The fraudulent use of identity and travel documents presents a threat to the security of countries and their citizens, the economy and global trade, as it facilitates a wide range of crimes. Fake or altered passports have become key elements in the arsenal of terrorists and other criminals seeking to hide their identities to move across borders, transfer funds and carry out their illicit activities. With this in mind, there is a clear need for law enforcement, governments and businesses to know whether their citizens and customers are who they claim to be. 4

PROTECTING THE TRAVEL INDUSTRY Estimates by the International Air Transport Association (IATA) indicate that 7.2 billion passengers will travel in 2035 a near doubling of the 3.8 billion air travelers in 2016. 7.2 Unprecedented growth in passenger travel has made enhanced cross-sector cooperation essential, as both national authorities and the private sector strive to protect the security of their people, interests and operations. I-Checkit encourages cooperation between the public and private sectors by facilitating information exchange to help detect identity fraud, and stop criminals from using stolen or lost travel documents. Passengers with criminal intentions pose the greatest threat to operations. However, travelers innocently attempting to use documents previously reported stolen or lost also represent a risk to the travel industry, as they are equally responsible for causing delayed departures and incurring repatriation costs. 3.8 billion 2016 2035 5

PARTNERING WITH THE PRIVATE SECTOR Prior to I-Checkit, only law enforcement officials could query travel documents of individuals travelling internationally against INTERPOL s Stolen and Lost Travel Documents database. I-Checkit allows trusted partners to submit travel documents for screening as early as check-in against INTERPOL s Stolen and Lost Travel Document (SLTD) database. For the travel sector specifically, this identification takes place before passengers arrive at the airport, port or border. Now, and only through I-Checkit, accredited private sector partners can benefit from three of INTERPOL s key capabilities to assist them in protecting their operations. SLTD DATABASE INTERPOL s SLTD database holds information on nearly 75 million travel documents reported stolen or lost by 175 countries. This database enables INTERPOL National Central Bureaus (NCBs) and other authorized entities, such as immigration and border control officers, to check the validity of a suspect travel document in seconds. Development is currently underway to extend screening to include INTERPOL Red Notices, or alerts for internationally wanted persons. 6

INTERPOL S GLOBAL NETWORK Each of our 192 member countries maintains an NCB, staffed by national law enforcement officers. The NCB forms the link with INTERPOL s global network, enabling member countries to work together on cross-border investigations. Lyon INTERNATIONAL OPERATIONS CENTRE The Command and Coordination Centre (CCC) is the operations room at INTERPOL and the first point of contact for a member country seeking INTERPOL s immediate intervention to support international police action. Buenos Aires Singapore Based in three strategic locations, the CCC operates 24 hours a day, 365 days a year and provides a rapid and integrated reaction to alerts generated by I-Checkit, linking police from around the world for effective follow-up. SLTD FIGURES SLTD FIGURES SLTD FIGURES SLTD FIGURES SLTD FIGURES Records in 2007 13,921,191 Records at July 2017 Searches performed in 2016 1,748,696,275 74,836,254 Number of hits in 2016 159,087 7

COUNTRIES INVOLVED China Laos Malaysia SUCCESS STORY 2017 I-CHECKIT HIT ON A CHINESE PASSPORT REPORTED STOLEN 8 TIMELINE 01/05 13:36 GMT Online check-in Passenger provided details of his travel document. A hit was generated. 01/05 13:49 GMT Hit alert coordination Airline security, INTERPOL NCBs and INTERPOL CCC worked together to investigate the hit. 04/0 Seco Passe trave check of his in po

PASSPORT A passenger was attempting to use a Chinese passport reported as stolen Outcome: He was sent back to China by the Laotian immigration police. Two additional passengers were detained on suspicion of document fraud. 04/05 Travel denied Passengers were intercepted in possession of the passports and detained by airport authorities. 5 04/05 08:50 GMT ndary check nger arrived at airport and his l document was physically ed. The hit was confirmed. Two travel companions were found ssession of falsified documents. Flight departed On time and without incident. 9

HOW DOES I-CHECKIT WORK? I-Checkit acts as an additional layer to existing security protocols, without compromising on-time performance. Our experience has shown that fake or stolen document holders can be detected and intercepted without delaying departures. I-Checkit is a simple, integrated solution which checks the validity of travel documents, before passengers even arrive at the airport. By screening three key pieces of data travel document number, country of issuance and type the document is checked against INTERPOL s SLTD database. If the identity document matches a record in the SLTD database, a hit notification is generated, which is then transmitted to: the INTERPOL CCC the relevant INTERPOL NCBs if applicable, the designated point of contact for the airline. Follow-up on a positive hit typically involves a secondary inspection at the gate prior to boarding to determine whether the subject is the genuine bearer of the reported stolen, lost or revoked travel document. 10

PASSENGER ONLINE CHECK-IN INTERPOL SECURE CLOUD SLTD AIRLINE SECURITY SECURITY SCREENED DATA Document Number Document Type Issuing Country TRANSMITTED DATA Document Number Document Type Issuing Country + Passenger itinerary INVOLVED NCBS INTERPOL CCC I-CHECKIT IN NUMBERS I-CHECKIT IN NUMBERS SLTD FIGURES I-CHECKIT IN NUMBERS I-CHECKIT IN NUMBERS Average processing time per screening 30 milliseconds Records screened in 2016 35.8 million Hit / screening ratio 1:33,800 184 participating countries 3 hits per day 11

BENEFITS A partnership with INTERPOL, the world s largest police organization, strengthens existing security protocols, protects airline operations and reassures customers. When passengers attempting to travel on invalid identity documents are intercepted before they board, both airlines and law enforcement authorities benefit. For airlines specifically, I-Checkit may bring: Increased security of flight operations; Optimized flight operations, as disruptions by undocumented or illegal travellers are limited; A mitigation of risks associated in repatriation costs, immigration fines and airport fees; A complement to insurance policies in order to reduce premiums; Increased brand trust and loyalty. 12

HOW TO CONNECT? INTERPOL s dedicated I-Checkit team works with carriers to ensure seamless implementation. Using web-based services and integrated with existing IT systems, implementing I-Checkit does not require additional equipment, minimizing technology costs. FOUR STAGES OF IMPLEMENTATION 1. PREPARATION PHASE administrative procedures mobilization of adequate resources endorsement from impacted stakeholders 3. TRIAL REVIEW 2. THREE-MONTH TRIAL solution is tested in the real environment 4. FULL ROLL-OUT 13

LEGAL FRAMEWORK The I-Checkit service is subject to a comprehensive legal framework which rests on: INTERPOL s Constitution; Ð Ð Ð Ð Ð Ð INTERPOL s Rules on the Processing of Data; Ð INTERPOL s Financial Regulations; Ð National and international law; Ð Specific agreements with private companies; Ð International standards for data protection. KEEPING DATA SECURE Extensive testing has proven I-Checkit to be as secure as INTERPOL s global police communications system, I-24/7. Private sector partners cannot search or modify information held in the SLTD database, likewise, INTERPOL does not have access to the accredited partner s databases. 14

A SUSTAINABLE FINANCIAL MODEL As a not-for-profit organization, INTERPOL aims to provide policing capabilities that benefit the international community. I-Checkit is therefore based on a cost recovery model. Private entities are charged an annual subscription fee which covers: Enhancements of INTERPOL s secure databases; Improved data quality and alert response; Capacity building and professional network development; Intelligence reporting to police, government and industry; Operational and material support to highly impacted NCBs. 15

INTERPOL General Secretariat I-Checkit 200 Quai Charles de Gaulle 69006 Lyon, France Tel: +33 4 72 44 70 00 Fax: +33 4 72 44 71 63 Email: I-Checkit@interpol.int WWW.INTERPOL.INT INTERPOL_HQ @INTERPOL_HQ INTERPOLHQ INTERPOLHQ