Financial Analysis Cases 2014-2020

Total Page:16

File Type:pdf, Size:1020Kb

Financial Analysis Cases 2014-2020 Egmont Group of Financial Intelligence Units BEST EGMONT CASES Financial Analysis Cases 2014–2020 No part of this publication may be reproduced by any process without prior written permission from the Egmont Group Secretariat. Applications for permission to reproduce any or all parts of this publication should be made to: THE EGMONT GROUP SECRETARIAT Tel: 1 647-349-4116 E-mail: [email protected] Website: www.egmontgroup.org Copyright © 2021 by the Egmont Group of Financial Intelligence Units TABLE OF CONTENTS Remarks by the Chair of the Egmont Group �������������������������������������������������3 Introduction �������������������������������������������������������������������������������������������������������������4 ACKNOWLEDGEMENTS �������������������������������������������������������������������������������������������������������������������������������������������������� 6 The Role of Financial Analysis in the BECAs ������������������������������������������������8 BRIBERY AND CORRUPTION ������������������������������������������������������������������������������������������������������������������������������������� 10 1 Judges Stealing from Court-Protected Coffers (Brunei Darussalam, AMBD) �������������������������������� 12 2 Exposing the Politically Exposed (Peru, FIU-Peru)���������������������������������������������������������������������������������� 15 3 The Pork Barrel Scheme (Philippines, AMLC) ������������������������������������������������������������������������������������������20 4 State Contracts for Construction Objects of Federal Importance Scheme (Russia, Rosfinmonitoring) ����������������������������������������������������������������������������������������������������������������������������������������������23 CYBERCRIME AND CRYPTOCURRENCY ���������������������������������������������������������������������������������������������������������������28 5 Unprecedented Global Multibillion Cryptocurrency Euro Fraud (Kosovo, FIU-Kosovo) ����������������30 6 Cyber Attack Through a SWIFT Heist (Nepal, FIU-Nepal) ��������������������������������������������������������������������34 7 Global Money Laundering Related to Virtual Assets (Poland, FIU-Poland) ������������������������������������37 8 Effective Collaboration in Business Email Compromise (BEC) Scheme (South Africa, FIC) ������ 41 DRUG TRAFFICKING ������������������������������������������������������������������������������������������������������������������������������������������������������46 9 Cloaking Drug Trafficking and Money Laundering in State Contracts in Fuel Transportation (Bolivia, FIU-Bolivia) ������������������������������������������������������������������������������������������������������������48 10 Internet Pharmacies Distributing Illegal Drugs Worldwide (India, FIUIND) ������������������������������������� 51 11 Organized Crime Group Operating from Jail: The Methamphetamine Business Transactions (New Zealand, NZPFIU) ������������������������������������������������������������������������������������������������������������������������������������������������� 54 12 Serbian Drug Trafficking Ring Tries to Harvest Legitimacy (Serbia, FIUSerbia) ����������������������������58 FRAUD AND EMBEZZLEMENT ����������������������������������������������������������������������������������������������������������������������������������� 61 13 Fraud by Abusing Foreign Trade Operations (Columbia, UIAF) ���������������������������������������������������������63 14 Amesta — Embezzlement of Public Funds (Italy, UIF) ���������������������������������������������������������������������������66 15 Keeping Fraud in the Family (Monaco, SICCFIN) ������������������������������������������������������������������������������������68 16 Playing a Shell Game with Cross-Border Electronic Transactions (Namibia, FIC) ������������������������70 Best Egmont Cases Financial Analysis Cases 2014–2020 1 SMUGGLING AND GAMBLING �����������������������������������������������������������������������������������������������������������������������������������73 17 Disrupting Tobacco Smuggling in Australia (Australia, AUSTRAC) ����������������������������������������������������75 18 Gambling with Counterfeit Cards and Counterfeit Customers (Belarus, FIU-Belarus) ����������������80 TRADE-BASED MONEY LAUNDERING AND THIRD-PARTY MONEY LAUNDERING ����������������������������83 19 Unravelling an International Money Laundering Scheme Tied to Cyberfraud (Bahrain, FID) ���86 20 Revealing the Many Facets of Cross-Border Money Laundering Scheme Through Diamond Trading (Israel, IMPA) ���������������������������������������������������������������������������������������������������������������������� 91 21 Dissecting a Fake Export/Import Money Laundering Scheme (Korea, KoFIU) ������������������������������95 22 Dismantling International Illicit Finance Networks Through Mexico–U.S. Cooperation (Mexico and the United States, FIU-Mexico and FinCEN) ��������������������������������������������������������������������99 TERRORISM, ORGANIZED CRIME AND HUMAN TRAFFICKING ���������������������������������������������������������������108 23 Successful Dismantling of a Human Trafficking and Money Laundering Organization (Argentina, UIF-AR) ������������������������������������������������������������������������������������������������������������������������������������������ 111 24 Following the Trail of Animal Trafficking to Take Down an International Criminal Organization (Côte d’Ivoire, CENTIF CI)���������������������������������������������������������������������������������������������������� 114 25 The Use of Money Remittance Systems and Non-Profit Organizations to Finance Terrorism (Indonesia, PPATK) ������������������������������������������������������������������������������������������������������������������������117 26 Following the Money in a Human Trafficking Case (Senegal, CENTIF) �����������������������������������������122 What Makes a Good Case ����������������������������������������������������������������������������125 2 Best Egmont Cases Financial Analysis Cases 2014–2020 Remarks by the Chair of the Egmont Group This latest edition of the Best Egmont Case Award has been in the making for a long time now — I am certain it is worth the wait� The BECA is a treasured initiative as it provides FIUs With the publication of the 2014–2020 BECA book, with the opportunity to contribute to the money laun- readers will observe the evolution of money laun- dering and terrorist financing case database and share dering and terrorist financing typologies and predicate their knowledge, expertise, and experiences within offences through the 26 cases from different juris- the global AML/CFT community. Although 2020 was dictions around the globe. It brings a lot of learning a challenging year due to the COVID-19 pandemic, the opportunities to our community: it’s a compilation of BECA competition proceeded with great success. I am real cases that FIU’s have worked on and where the proud to say that no less than 117 cases were submit- cooperation amongst ourselves has been crucial ted for the period 2014–2020. The Project Team had to come to results. As such it gives the most perfect the difficult task to review all submissions and selected description of what the Egmont Group of FIU’s is the 26 best Egmont cases across 7 targeted categories all about. of predicate offences and associated ML typologies. I extend my sincere thanks to all the FIUs that The high quality of the submitted cases will make the have contributed to the Best Egmont Case Award selection of the winner a very challenging task for the (BECA) over the past decade. I also congratulate the delegates and therefore, I am sure the BECA compe- Technical Assistance and Training Working Group tition will be one of the high points of the upcoming on the 2014–2020 Best Egmont Case Award book’s Egmont Group Plenary again. successful publication. Mrs. Hennie Verbeek-Kusters Chair, Egmont Group of FIUs Head of FIU-the Netherlands Best Egmont Cases Financial Analysis Cases 2014–2020 3 Introduction The Best Egmont Case Award (BECA) annual competition was developed in 2011 by the Training Working Group — now called the Technical Assistance and Training Working Group (TATWG)� The BECA initiative is designed to encourage Egmont members to contribute to the Egmont Group’s money laundering and terrorist financing case database to benefit Financial Intelligence Units (FIUs) and stakeholders in anti-money laundering/combatting the financing of terrorism (AML/CFT)� The BECAs provide a valuable opportunity for FIUs to share their knowledge, expertise and experiences within the global AML/CFT community� The competition process starts with a call letter from Philip Hunkin, a former BECA Champion, envisaged the BECA Champion to invite all Egmont member that BECA case submissions could become valuable FIUs to submit their best cases. To encourage active case studies that could be used as AML/CFT training participation from the FIU members and enrich the materials. He proposed highlighting the best of BECA database, there is no limit on how many cases the BECAs in a publication. With the support of the an FIU member can submit. In addition, the FIUs may Egmont Group Secretariat, the first BECA Book was submit cases solely about their own efforts, and they published in 2015, which contained 22 of the best may collaborate to submit cases as a combined effort. case submissions between 2011 and 2013, and has Therefore,
Recommended publications
  • Customs Act (Republic of Korea)
    Customs Act (Republic of Korea) By Ministry of Legislation INTRODUCTION Details of Enactment and Amendment ● Enactment: The Customs Act was enacted in 1949, and after being amended over more than 35 occasions, wholly amended in the year of 2000, and then partly amended in the year of 2002. This Act provides not only the regulatory details on the imposition and collection of customs, but also the matters concerning the overall customs administrative details, such as the taxpayer's right and procedure for filing objections, bonded area, clearance procedures, and punishment of customs criminals, etc. ● Amendment: The recent amendments of the Customs Act have been made in the year of 1998, 1999, 2000 and 2002, and such amendments are meant to improve the bond systems in order to induce foreign investments, to simplify the appeal procedures against the imposition of customs, and to strengthen the guarantee of duty payer's right by enacting the Charter of Duty Payer's Rights. The grounds for TSG (Transitional Safeguard) against China are newly established according to the joining of China in WTO, the e-delivery system and the system of designation of e-document brokerage operator are newly introduced to implement e-government, and the requirements for the return of travelers' personal effects excessively carried in are strengthened to restrict indiscreet shipping-in of personal effects. Main Contents ● The customs are imposed in principle based on the time of import declaration, but their tax rates are separately stipulated in the Tariff Schedule: Provided, That the simple customs are imposed on personal effect, mail, and consignment.
    [Show full text]
  • Informe 2013 Bacrim
    Las BACRIM despue s de 2013: ¿prono stico reservado? BERNARDO PÉREZ SALAZAR CARLOS MONTOYA CELY A mediados de 2012, el ministro de defensa, Juan Carlos Pinzón, dio un parte de tranquilidad frente a las bandas criminales –bacrim–, señalando que en 934 municipios del país “no hay presencia de bandas criminales”.1 No aclaró el alcance de la expresión “no hay presencia” ni la definición de “banda criminal”. Tampoco refirió cómo llegó a la mentada cifra de municipios. En todo caso la declaración contrastó visiblemente con el parte que a principios del 2011 habían entregado las autoridades de la Policía Nacional, con el general Oscar Naranjo a la cabeza, al indicar que las vendettas y los ajustes de cuentas entre narcos representarían el 47% de los 15.400 homicidios registrados en 2010. Dadas las violentas disputas territoriales que se registraban en aquel entonces por el control del “microtráfico” en sectores urbanos de Medellín entre alias “Sebastián” y “Valenciano”, así como por rutas de narcotráfico en Córdoba entre “Paisas” (aliados a los Rastrojos) y “Aguilas Negras“ (aliados de los Urabeños), no es de extrañar que una nota informativa cubriendo la noticia se hubiese titulado: “Las bacrim cometen la mitad de los asesinatos en Colombia”.2 Declaraciones sobre el tema del entonces ministro del Interior, Germán Vargas Lleras, entregadas también en enero de 2011, no fueron menos inquietantes, y se resumieron en el titular “Las bacrim ya actúan en 24 departamentos colombianos”, lo que propició que algunos analistas refirieran la presencia de
    [Show full text]
  • Pork Barrel” Scandal
    Philippines’ Commission on Audit (CoA) Key to Unearthing “Pork Barrel” Scandal October 2016 INTRODUCTION The “pork barrel system” of lump sum grants to members of the Philippines Congress to fund a list of community- based or small-scale infrastructure projects that would be implemented by local public agencies was revived during President Corazon Aquino’s administration. The system operated under a series of programs, most recently through the Priority Development Assistance Fund (PDAF). How did the PDAF work in its most recent form? During congressional budget deliberations, a list of development projects was included in the General Appropriations Act (GAA) as eligible for funding under the PDAF. A lump sum was appropriated for the projects to be implemented by various agencies. Up until 2013, each Senator was allocated PHP 200 million (about US$4.4 million), while each member of the House of Representatives was allocated PHP 70 million (about US$1.5 million). In practice, the implementing agencies (IAs) served as conduits that diverted the funds to several bogus NGOs. The NGOs were offered as fronts for “ghost projects” by a businesswoman in exchange for kickbacks to members of Congress and government officials. This case became known as the pork barrel scam. Two unrelated investigations in 2012, one by the National Bureau of Investigations (NBI) and the other by the Commission of Audit (CoA), shed light on the misuse of PDAF by members of Congress, government officials, and NGOs. The NBI conducted an investigation on the illegal detention of Benhur Luy by his employer, businesswoman Janet Napoles, at the same time that CoA was conducting its own audit of the use of the PDAF resources for the years 2007-2009.1 Approved by the previous CoA chairperson, this audit started in 2010 and took over three years from planning and execution to release of the report.
    [Show full text]
  • The Changing Face of Colombian Organized Crime
    PERSPECTIVAS 9/2014 The Changing Face of Colombian Organized Crime Jeremy McDermott ■ Colombian organized crime, that once ran, unchallenged, the world’s co- caine trade, today appears to be little more than a supplier to the Mexican cartels. Yet in the last ten years Colombian organized crime has undergone a profound metamorphosis. There are profound differences between the Medellin and Cali cartels and today’s BACRIM. ■ The diminishing returns in moving cocaine to the US and the Mexican domi- nation of this market have led to a rapid adaptation by Colombian groups that have diversified their criminal portfolios to make up the shortfall in cocaine earnings, and are exploiting new markets and diversifying routes to non-US destinations. The development of domestic consumption of co- caine and its derivatives in some Latin American countries has prompted Colombian organized crime to establish permanent presence and structures abroad. ■ This changes in the dynamics of organized crime in Colombia also changed the structure of the groups involved in it. Today the fundamental unit of the criminal networks that form the BACRIM is the “oficina de cobro”, usually a financially self-sufficient node, part of a network that functions like a franchise. In this new scenario, cooperation and negotiation are preferred to violence, which is bad for business. ■ Colombian organized crime has proven itself not only resilient but extremely quick to adapt to changing conditions. The likelihood is that Colombian organized crime will continue the diversification
    [Show full text]
  • Treasury Targets Colombians Linked to Oficina De Envigado Crime Boss Under Kingpin Act | U.S
    3/19/2020 Treasury Targets Colombians Linked to Oficina de Envigado Crime Boss Under Kingpin Act | U.S. Department of the Treasury Treasury Targets Colombians Linked to Oficina de Envigado Crime Boss Under Kingpin Act February 14, 2018 Action Targets Individuals Working to Undermine Law Enforcement Investigations Washington – The U.S. Department of the Treasury's Oice of Foreign Assets Control (OFAC) today designated longtime Colombian criminal Javier Garcia Rojas (alias "Maracuya") and two other Colombian nationals as Specially Designated Narcotics Traickers (SDNTs) pursuant to the Foreign Narcotics Kingpin Designation Act (Kingpin Act) for their links to previously designated SDNTs Jose Bayron Piedrahita Ceballos and the Colombian criminal group La Oficina de Envigado (La Oficina). OFAC also designated four Colombian companies owned, controlled, or directed by the individuals designated today. As a result of today's action, U.S. persons are generally prohibited from engaging in transactions or otherwise dealing with these individuals and companies, and any assets they may have under U.S. jurisdiction are blocked. "Treasury is targeting Colombian nationals, including Javier Garcia Rojas, under the Kingpin Act for their attempts to undermine joint U.S.-Colombian investigations into the criminal activities of La Oficina and Jose Bayron Piedrahita Ceballos," said Sigal Mandelker, Treasury Under Secretary for Terrorism and Financial Intelligence. "We are intent on disrupting the narcotics traicking and illicit activities of organized crime groups like La Oficina, and work closely with our partners in the DEA, FBI, and U.S. Customs and Border Enforcement to dismantle their corrupt networks." Today's designation is OFAC's eighth action targeting individuals and entities associated with La Oficina, which was designated pursuant to the Kingpin Act on June 26, 2014.
    [Show full text]
  • Social Media in Asia
    Social Media in Asia Social Media in Asia: Changing Paradigms of Communication Edited by Azman Azwan Azmawati and Rachel E. Khan Social Media in Asia: Changing Paradigms of Communication Edited by Azman Azwan Azmawati and Rachel E. Khan This book first published 2016 Cambridge Scholars Publishing Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2016 by Asian Congress for Media and Communication All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-9692-6 ISBN (13): 978-1-4438-9692-4 This book is a peer-reviewed, academic publication of the Asian Congress for Media and Communication, an international, not-for-profit, professional organization of mass communication and languages academe. Website: <www.asianmediacongress.org> Email: <[email protected]> CONTENTS Chapter One ................................................................................................. 1 Introduction Rachel E. Khan Chapter Two ................................................................................................ 8 In Search of Theoretical Foundations for Social Media Rachel E. Khan Chapter Three ...........................................................................................
    [Show full text]
  • Asset Recovery Handbook
    Asset Recovery Handbook eveloping countries lose billions each year through bribery, misappropriation of funds, Dand other corrupt practices. Much of the proceeds of this corruption find “safe haven” in the world’s financial centers. These criminal flows are a drain on social services and economic development programs, contributing to the impoverishment of the world’s poorest countries. Many developing countries have already sought to recover stolen assets. A number of successful high-profile cases with creative international cooperation has demonstrated Asset Recovery Handbook that asset recovery is possible. However, it is highly complex, involving coordination and collaboration with domestic agencies and ministries in multiple jurisdictions, as well as the A Guide for Practitioners, Second Edition capacity to trace and secure assets and pursue various legal options—whether criminal confiscation, non-conviction based confiscation, civil actions, or other alternatives. A Guide for Practitioners, This process can be overwhelming for even the most experienced practitioners. It is exception- ally difficult for those working in the context of failed states, widespread corruption, or limited Jean-Pierre Brun resources. With this in mind, the Stolen Asset Recovery (StAR) Initiative has developed and Anastasia Sotiropoulou updated this Asset Recovery Handbook: A Guide for Practitioners to assist those grappling with Larissa Gray the strategic, organizational, investigative, and legal challenges of recovering stolen assets. Clive Scott A practitioner-led project, the Handbook provides common approaches to recovering stolen assets located in foreign jurisdictions, identifies the challenges that practitioners are likely to Kevin M. Stephenson encounter, and introduces good practices. It includes examples of tools that can be used by Second Edition practitioners, such as sample intelligence reports, applications for court orders, and mutual legal assistance requests.
    [Show full text]
  • 10Th Anniversary of the Asset Recovery Network of the Financial Action Task Force of Latin America - RRAG September 2020
    10th Anniversary of the Asset Recovery Network of the Financial Action Task Force of Latin America - RRAG September 2020 10th Anniversary of the Asset Recovery Network of the Financial Action Task Force of Latin America - RRAG GAFILAT is grateful for the technical assistance provided by the German Development Cooperation, implemented by the Deutsche Gesellschaft für Iternationale Zusammenarbeit (GIZ) for the elaboration of this document, with the additional support of Ms. Andrea Garzón. The contents of this publication are the sole responsibility of the Financial Action Task Force of Latin America (GAFILAT). Copyright © GAFILAT. All rights reserved. Reproduction or translation of this publication is prohibited without prior written permission. Requests for permission to reproduce or translate this publication in whole or in part should be addressed to Florida 939 - 10º A - C1005AAS - Buenos Aires, Argentina – Telephone (+54-11) 5252-9292; e-mail: [email protected]. 1 X años de la RRAG Por eso hay que lograr Que contenga los reclamos Hoy estamos celebrando De quien nos hace el pedido El décimo aniversario De lo contrario les digo De una red, que intercambiando No parece funcionar. Información sobre activos Es preciso contestar Va creciendo en el camino Todo lo que se nos pide Que todos vamos forjando. Que nada se nos olvide Y en un tiempo prudencial. En los primeros momentos Surgió como alternativa Algo que es distintivo De fuente de información Y que merece respaldo Pero el tiempo y la razón Es reunir cada año La fueron robusteciendo A los puntos de contacto Y hoy además va creciendo Para analizar aciertos En sus puntos de contacto Las experiencias, los retos Que más que en el intercambio Que se alcanzan en la red De información policial También para que después La red sirve de canal Al final de cada encuentro Para el contacto diario.
    [Show full text]
  • An Analysis of the Nature of Groups Engaged in Cyber Crime
    International Journal of Cyber Criminology Vol 8 Issue 1 January - June 2014 Copyright © 2014 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2014, Vol 8 (1): 1–20. This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime Roderic Broadhurst,1 Peter Grabosky,2 Mamoun Alazab3 & Steve Chon4 ANU Cybercrime Observatory, Australian National University, Australia Abstract This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cyber crime and different forms of criminal organization are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organizational structures are involved in cyber crime. Enterprise or profit-oriented activities, and especially cyber crime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command. Keywords: Cybercrime, Organized Crime, Crime Groups; Internet Crime; Cyber Offenders; Online Offenders, State Crime.
    [Show full text]
  • December 2013 Feature Article: the Year of Surviving Dangerously: Highlights from We Live Security 2013
    December 2013 Feature Article: The Year of Surviving Dangerously: Highlights from We Live Security 2013 Table of Contents The Year of Surviving Dangerously: Highlights from We Live Security 2013 .............................................................3 2013: a Scammer’s Eye View ................................................................................................................................... 11 ESET Corporate News .............................................................................................................................................. 18 The Top Ten Threats ................................................................................................................................................ 18 Top Ten Threats at a Glance (graph) ....................................................................................................................... 21 About ESET .............................................................................................................................................................. 22 Additional Resources ............................................................................................................................................... 22 This month we decided to present a retrospective of all 2013, pertained to Java vulnerability CVE-2013-0422 being added to a so we develop and delve into the most prominent threats that couple of popular exploit packs, thus making it more accessible each month had. Also published an article that specifically
    [Show full text]
  • Technical Report RHUL–MA–2014– 2 01 September 2014
    Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre Salvatore Camillo Zammataro Technical Report RHUL–MA–2014– 2 01 September 2014 Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, United Kingdom www.ma.rhul.ac.uk/tech Salvatore Camillo “Toto” Zammataro Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre MSc Information Security Project Report Supervisor: Dr John Austen Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. 1 EXECUTIVE SUMMARY For social, technological and political reasons electronic transactions are now the most used payment method in Europe. As such, fraudsters have been focusing on On-Line transactions to gain money through Phishing and Crimeware. These kind of frauds generates losses for EU citizen of an estimated value of 250M€/year. Banks and Law Enforcement Agencies are engaged in the prevention, detection and prosecution of this crime. Some limit of actual legislation (i.e. Data Protection, International Treaties on cyber-crime, Fraud prosecution laws), low speed of communication between Banks and LEAs, and the fraudster’s speed in taking advantage of weaknesses of the system leave the space for improvement. To improve the countermeasures that Banks and LEAs have deployed, this paper suggests the adoption of an InfoSharing Service between national banking system and Law Enforcement Agencies. This service uses a “hub-and-spoke” framework, where LEA is the hub and banks are the spokes. Target of the service is to shorten the time needed to communicate from Banking Fraud Managers to LEAs, and to share the relevant information on fraudster accounts in the whole banking industry.
    [Show full text]
  • WP.1 ITC LOP.Pdf
    List of participants 82nd session of (WP.1) Start Date: Monday, March 08, 2021 End Date: Friday, March 12, 2021 Governments (UNECE Bodies) - ECE Member States Austria Mr. Christian KAINZMEIER Legal Adviser Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology Belgium Mr. Karel HOFMAN Advisor Service réglementation routière SPF Mobilité et Transports Bulgaria Mrs. Marta PETROVA Director of Directorate of Strategies, Analysis and Evaluation State Agency Road Safety Canada Ms. Valerie HARASEMCHUK Research Analyst Transport Canada Mr. Andrew PHILLIPS Manager, Connected and Automated Vehicle Safety Programs Transport Canada Denmark Mr. Mads HEDEGAARD Legal advisor The Danish Road Directorate Estonia Mr. Tiit POLL Chief Specialist Examination Department, Traffic Division Estonian Transport Administration Finland Dr. Kimmo KIISKI (HoD) Senior Transport Adviser Ministry of Transport and Communications Mr. Mikko KARHUNEN Senior engineer Ministry of Transport and Communications Mrs. Kirsi MIETTINEN Senior Adviser for Legislative Affairs Ministry of Transport and Communications Ms. Monika MUTANEN Senior Officer Ministry of Transport and Communications (Finland) Mr. Tuomas ÖSTERMAN Expert on Road Signs and markings Finnish Transport Infrastructure Agency France Mr. Joël VALMAIN Conseiller Technique "Europe International" Délégation interministérielle à la sécurité routière Ministère de l'intérieur Mme Marine MOLINA Technical expert Ministry of the Interior Germany Mrs. Martina OCHEL-BRINKSCHRÖDER Deputy Head of Divison German Federal Ministry of Transport and Digital Infrastructure 2 Thursday, March 18, 2021 Dr. Birgit Ulrike RUDOLPH Assistant Head of Division DG 24 Federal Ministry of Transport and Digital Infrastructure Greece Ms. Despoina DIMOSTHENIADOU administrative officer (engineer) Directorate of Road Traffic and Safety Ministry of Infrastructure & Transport Ireland Ms. Deirdre HORKAN In-house counsel Road Safety Authority Israel Mr.
    [Show full text]