COVER STORY Stopping Foreign Terrorist Fighters – Can API and PNR Play a Part? Strategic Partner

Total Page:16

File Type:pdf, Size:1020Kb

COVER STORY Stopping Foreign Terrorist Fighters – Can API and PNR Play a Part? Strategic Partner Official Magazine of MAY / JUNE 2018 www.worldsecurity-index.com FEATURE: FEATURE: FEATURE: An Integrated Approach The Predator’s View: The World’s Biggest Marketplace Used in Nuclear Security Imperative for Critical Selling Internet Paralysing can be Adapted for Infrastructure Resilience DDOS Attacks Taken Down Protecting Critical National PAGE 14 PAGE 19 Infrastructure PAGE 9 COVER STORY STOPPING FOREIGN TERRORIST FIGHTERS – CAN API AND PNR PLAY A PART? Strategic Partner: In Partnership with: 17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, Kuching, Sarawak, Malaysia www.cip-asia.com ONE-DAY SPECIALIZED TRAINING COURSE brought to you by: further details at Developing resilient infrastructure www.cip-asia.com for a secure future Expert Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, securing Asia. Philippines – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece Kuching, Sarawak, Malaysia on 17th-19th July 2018. – Sameer Sharma, Senior Advisor, BDT/International Telecommunication Union Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, – Sim Ko Sin, Vice President, ICT, Sarawak Energy, creating uncertainty and insecurity on critical national infrastructure. Malaysia – Munies Pillai, Director, Global E2C Pte Ltd and Climate change has also seen more extreme weather patterns, creating additional Senior Vice President of the Chartered International hazardous, unseasonal and unpredictable conditions and a severe strain on Institute of Security And Crisis Management infrastructure. – Senior Representative, Metropolitan Electricity The conference will look at developing existing national or international legal and Authority, Thailand technical frameworks, integrating good risk management, strategic planning and – Albert Chai, Managing Director, CISCO Systems implementation. Malaysia – Fazlan Abdullah, Head, Government Engagement, Register online at www.cip-asia.com/onlinereg International & Government Engagement Division, CyberSecurity Malaysia – Benjamin Ang, Senior Fellow & Head – Cyber, Leading the discussion on securing critical infrastructure Centre of Excellence for National Security (CENS) across ASEAN – Henry Ee, Chairman for Asia Chapter, Business Continuity Institute – Kenneth Chen, Managing Director, ASEAN, Gold Sponsor: Supported by: Media Partners: Symantec Asia Pacific, Singapore – JP Dunning, Principal Security Consultant, APAC Lead for Foundstone Services, McAfee, Australia – Ian Yip, Chief Technology Officer, Asia Pacific, McAfee, Australia Supporting Organisations: – Ir. V.R.Harindran, Sr. Custodian, I&C, Mechanical & Process Section, Group Technical Solutions, PETRONAS For full conference programme visit www.cip-asia.com CIPRA2018 A4 Ad Reg May18.indd 1 22/05/2018 14:36:29 CONTENTS Strategic Partner: In Partnership with: 17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, CONTENTS Kuching, Sarawak, Malaysia WORLD SECURITY REPORT www.cip-asia.com 5 Stopping Foreign Terrorist Fighters – can ONE-DAY API and PNR play a part? SPECIALIZED TRAINING COURSE Andrew Priestley takes a look at the impact API and PNR could brought to you by: have in identifying and stopping of foreign terrorist figters. further details at 9 An Integrated Approach Used in Nuclear Developing resilient infrastructure www.cip-asia.com Security can be Adapted for Protecting CNI Expert Speakers include: How the nuclear industry uses an approach to threat that for a secure future articulates the Design Basis Threat (DBT). – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia » p.5 14 The Predator’s View Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal The Imperative for Critical Infrastructure Resilience. Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany 18 ASSOCIATION NEWS The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, News and updates from the International Association of CIP securing Asia. Philippines Professionals. – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece 19 World’s Biggest Marketplace Selling DDOS Kuching, Sarawak, Malaysia on 17th-19th July 2018. – Sameer Sharma, Senior Advisor, BDT/International Telecommunication Union Attacks Taken Down Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, – Sim Ko Sin, Vice President, ICT, Sarawak Energy, creating uncertainty and insecurity on critical national infrastructure. Malaysia With over 136 000 registered users and 4 million attacks, – Munies Pillai, Director, Global E2C Pte Ltd and Webstresser.org was considered the world’s biggest marketplace Climate change has also seen more extreme weather patterns, creating additional Senior Vice President of the Chartered International » p.12 » p.9 to hire DDoS Services. hazardous, unseasonal and unpredictable conditions and a severe strain on Institute of Security And Crisis Management infrastructure. – Senior Representative, Metropolitan Electricity 21 Security Technology, Protocols and People The conference will look at developing existing national or international legal and Authority, Thailand technical frameworks, integrating good risk management, strategic planning and – Albert Chai, Managing Director, CISCO Systems in Sync through Training implementation. Malaysia – Fazlan Abdullah, Head, Government Engagement, Today’s security plans include a wide variety of technology and Register online at www.cip-asia.com/onlinereg International & Government Engagement Division, techniques and require multiple levels of skill and knowledge for CyberSecurity Malaysia – Benjamin Ang, Senior Fellow & Head – Cyber, peak performance. Leading the discussion on securing critical infrastructure Centre of Excellence for National Security (CENS) across ASEAN – Henry Ee, Chairman for Asia Chapter, Business 23 AGENCY NEWs Continuity Institute – Kenneth Chen, Managing Director, ASEAN, Gold Sponsor: Media Partners: Supported by: A review of the latest news, views, stories, challenges and issues Symantec Asia Pacific, Singapore from enforcement agencies. – JP Dunning, Principal Security Consultant, APAC Lead for Foundstone Services, McAfee, Australia – Ian Yip, Chief Technology Officer, Asia Pacific, 26 industry news McAfee, Australia » p.17 Supporting Organisations: – Ir. V.R.Harindran, Sr. Custodian, I&C, Mechanical Latest news, views and innovations from the industry. & Process Section, Group Technical Solutions, PETRONAS For full conference programme visit www.cip-asia.com www.worldsecurity-index.com World Security Report - 3 CIPRA2018 A4 Ad Reg May18.indd 1 22/05/2018 14:36:29 www.worldsecurity-index.com Editorial: DO WE EVER LEARN LESSONS Tony Kingham E: [email protected] FROM THE PAST? Contributing Editorial: Neil Walker E: [email protected] During the 90’s and 00’s, in the post-cold war Design, Marketing & Production: Neil Walker world, politicians busied themselves talking about E: [email protected] the ‘new world order’, and consequently spending less and less on defence and security, cashing in Subscriptions: on the so-called ‘peace dividend’. Tony Kingham E: [email protected] Then 9/11 caused shockwaves around the world and was responded to with the ‘war on terror’. Indeed, it was in response to 9/11 that we World Security Report is a bi-monthly ourselves launched our own online news media electronic, fully accessible e-news service distributed to over 130,000 www.WorldSecurity-index.com in 2002. organisations globally. It tracks the full But throughout that period, I would continue to range of problems and threats faced bore anyone who would listen with warnings that by today’s governments, armed and security forces and civilian services and whilst terrorism was a dangerous menace that had looks at how they are dealing with them. to be confronted, the really big worries were still the old worries,
Recommended publications
  • Rm7bll Yearly Smuggling
    Headline Ahmad Zahid M'sia loses RM7bil yearly due to smuggling activities at borders MediaTitle New Sabah Times English (KK) Date 18 Sep 2015 Language English Circulation 17,182 Readership 51,546 Section Home Color Black/white Page No 5 ArticleSize 245 cm² AdValue RM 524 PR Value RM 1,572 Ahmad lahid: M'sla loses RM7bll yearly due to smuggling activities at borders SINTOK: Deputy Prime "Min­ Home Minister, stressed that no a year due to the porous national ister Datuk Seri Ahmad Zahid new allocation or posts would be borders, including losses oh sub­ Hamidi yesterday announced created via the upgrading, but he sidised goods. that the Smuggling Prevention promised to reward the agency's He said goods worth RM38 Unit (UPP) would be upgraded officers and staff who exhibited million were seized from January into a Border Security Agency. excellent performance. to August this year by the UPP, He said the new entity ift­ "Believe me that when up by more than 100 per cent volving three core agencies, seizures of goods, smuggling of from RM18 million in 2014 and namely, the Royal Malaysian Po­ persons and human trafficking RM17 million in 2013. lice, Immigration Department can be reduced, there will be In this regard, Ahmad Zahid and Royal Malaysian Customs some reward which I will give as said collaboration among the en­ Department would also involve forcement agencies must be incentive. This is my promise. several other enforcement agen­ strengthened, including translat­ cies, as value added. "Change the approach, don't ing the National Blue Ocean ask first, but give first...no need "The policy paper on the pro­ to wait for a reward to motivate Strategy to avoid narrow think­ posal has been prepared and will ing.
    [Show full text]
  • Business PAGE 9 Vol 6, Issue 1
    U.S. Customsrontline and Border Protection H Vol 6, Issue 1 CBP gets America Back to Business PAGE 9 Vol 6, Issue 1 CONTENTS H COVER STORY 9 Business Unusual When Mother Nature strikes or other major events disrupt normal border operations, CBP’s business recovery program keeps traffic flowing and protects the U.S. economy. 9 H FEATURES 18 Riding Shotgun in the Arizona Skies Specially trained Border Patrol agents and CBP officers accompany Air and Marine pilots as supplemental air crew members. 22 Transformation at Land Border Ports of Entry 18 CBP’s land border ports of entry now benefit from improved technologies and resource optimization. 22 H DEPARTMENTS H ON THE COVER 2 CBP In Photos 36 CBP History The Ambassador Bridge, connecting Detroit with Windsor, Canada, is North 4 Around the Agency 40 Border Busts America’s busiest commercial international border crossing. During fiscal year 2012, 28 In Focus 42 Resources an average of $136 million of cargo CBP In The Spotlight crossed the bridge into the U.S. each 34 day or $5.7 million of cargo each hour. Cover photo by Lisa Przybyla CELEBRATING THE CAREER OF DAVID V. AGUILAR 2 H CBP IN PHOTOS H ACTING COMMISSIONER RETIRES AFTER 34 YEARS OF DISTINGUISHED SERVICE Frontline VOL 6, ISSUE 1 SECRETARY OF HOMELAND SECURITY Janet Napolitano ACTING COMMISSIONER, U.S. CUSTOMS AND BORDER PROTECTION THOMAS S. WINKOWSKI ASSISTANT COMMISSIONER, OFFICE OF PUBLIC AFFAIRS Melanie Roe EDITOR Laurel Smith MANAGING EDITOR Jason McCammack CONTRIBUTING EDITORS Susan Holliday Marcy Mason PRODUCTION MANAGER Tracie Parker PHOTOGRAPHERS James R.
    [Show full text]
  • Border Security
    BORDER SECURITY REPORT VOLUME 14 FOR THE World’s border prOTECTION, MANAGEMENT AND SECURITY INDUSTRY MAY / JUNE 2019 POLICY-MAKERS AND PRACTITIONERS COVER STORY BREXIT WILL PUSH UK BORDERS TO THE BRINK… UNLESS WE GET SMARTER WITH data SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS Border Threat Detection A global review of the South Asia: Case of Least Latest news, views and – The Path to Artificial latest news and challenges Connected Borders p.18 innovations from the Intelligence p.14 from border agencies and industry. p.30 agencies at the border. p.20 2 COMMENT contacts Every Cloud Has a Silver Lining Editorial: They say every cloud has a silver lining, when it comes to the movement of Tony Kingham but you would be hard pushed to goods, big questions remain. Such as; E: [email protected] convince anyone in the UK that the how does technology really help with Assistant Editor: Brexit cloud has one right now. Political the import and export of agricultural Neil Walker deadlock in parliament means we are goods and foodstuffs, which of course E: [email protected] no closer to a deal and the recent poor need inspections if regulations don’t showing by the established parties match. And no matter how much Design, Marketing & Production: in the European elections is likely to the UK spends on technology and Neil Walker result in a harder line from any future whatever systems it puts in place, to E: [email protected] Conservative Prime Minister, making a work effectively that technology and Subscriptions: hard Brexit much more likely.
    [Show full text]
  • Border Wars the Arms Dealers Profiting from Europe’S Refugee Tragedy
    BORDER WARS THE ARMS DEALERS PROFITING FROM EUROPE’S REFUGEE TRAGEDY Mark Akkerman Stop Wapenhandel www.stopwapenhandel.org Border wars | 1 AUTHOR: Mark Akkerman EDITORS: Nick Buxton and Wendela de Vries DESIGN: Evan Clayburg PRINTER: Jubels Published by Transnational Institute – www.TNI.org and Stop Wapenhandel – www.StopWapenhandel.org Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images should be based on the copyright terms of the original source. http://www.tni.org/copyright ACKNOWLEDGEMENTS Thanks to Corporate European Observatory for some of the information on arms company lobbying. Border wars: The arms players profiting from Europe’s refugee crisis | 2 CONTENTS Executive Summary 1 Introduction: the EU war on immigration 3 Fueling the refugee tragedy: EU arms exports 6 EU response to migration: militarising the borders 9 – ‘Fighting illegal immigration’ – EUNAVFOR MED – Armed forces at the borders – NATO assistance – Border fences and drones – From Frontex to a European Border and Coast Guard Agency – Externalizing EU borders – Deal with Turkey – Selling militarisation as a humanitarian effort Lobbying for business 17 – Lobby organisations – Frontex and industry – Security fairs as meeting points EU funding for border security and border control 25 – Funding for (candidate) member states – Funding third countries’ border security – EU Research & Technology funding – Frontex funding for research – Future prospects for security research Which companies profit from border security? 34 – Global border security market – Frontex contracts – Major profiting companies – Detention and deportation Conclusion 43 EXECUTIVE SUMMARY The refugee crisis facing Europe has caused consternation in the corridors of power, and heated debate on Europe’s streets.
    [Show full text]
  • Connected Policing Framework White Paper Transforming Policing Through Technology
    A Microsoft Government Connected Policing Framework White Paper Transforming Policing Through Technology Published for the APCO-APA 2008 International Policing and Summer Conference The Microsoft Connected Policing Framework The Microsoft® Connected Policing Framework is the result of work between Microsoft, specialist partners and many public safety, law enforcement and judicial organizations to build solutions, technologies and services that assist in integrated and collaborative policing to combat crime and assist with citizen safety. We reuse this collective “Know-How” to share and reuse international best practices in areas such as combating cyber crime with innovative intelligence and investigation solution architectures. IMPROVED OUTCOMES FOR CITIZEN SAFETY AND SECURITY INFORMATION CHANNELS ITERATIVE FIRE POLICE JUSTICE INTELLIGENCE INTERNAL SERVICES SECURITY CYCLE EMERGENCY RESPONSE ER CASE & RECORDS MANAGEMENT INTEGRATED JUSTICE PLAN PARTNER SOLUTIONS PARTNER INTELLIGENCE & INVESTIGATION TRANSPORT & BORDER CONTROL CRITICAL INFRASTRUCTURE PROTECTION E-POLICING (CSP, PORTAL & CRM) PROCESS APPLICATION PLATFORM BLUEPRINTS GUIDES ORGANIZATIONAL PRODUCTIVITY REFERENCES REUSABLE IP INFRASTRUCTURE CORE INFRASTRUCTURE e.g. MIF PROGRESS PRIVACY ACCESSIBILITY USABILITY SECURITY/ID STANDARDS INTEROP POLICY CITIZENSHIP INITIATIVES (CETS & DART) REVIEW Contents Introduction 4 1.0 Public Safety 5 1.1 Emergency and disaster response 5 1.2 Crime and DisorderReduction Strategies 9 1.3 E-policing 10 1.4 Microsoft Citizen Service Platform 13 2.0
    [Show full text]
  • The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone
    The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman Dissertation submitted in partial FulFillment oF the requirements For the degree oF Doctor of Philosophy in the Graduate School of Duke University 2016 ABSTRACT The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman An abstract oF a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor oF Philosophy in the Graduate School oF Duke University 2016 Copyright by Sophie Smith 2016 Abstract The Hole in the Fence examines the design and efFects oF the contemporary border security regime. Since 1994, the growth oF military-style policing in the lands between the US and Mexico has radically reshaped the path oF illicit transnational migration. Newly erected walls, surveillance technology, and the stationing oF an army oF Federal agents in the border territory do not serve to seal oFF the national boundary. Border security rather works by pushing undocumented migration traFFic away From urban areas and out into protracted journeys on foot through the southwest wilderness, heightening the risks associated with entering the US without papers. Those attempting the perilous wilderness crossing now routinely Find themselves without access to water, Food, or rescue; thousands of people without papers have since perished in the vast deserts and rugged brushlands oF the US southwest.
    [Show full text]
  • Approaching Border Security from a Complexity Theory and Systems Perspective
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2012-12 Border cracks: approaching border security from a complexity theory and systems perspective Schwan, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/27901 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE by Michael J. Schwan December 2012 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: Harold A. Trinkunas Approved for public release; distribution is unlimited Reissued 21 Mar 2013 to correct advisor’s name on cover page. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2012 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE 6.
    [Show full text]
  • SC70 Doc. 69.2
    Original language: English SC70 Doc. 69.2 CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA ____________________ Seventieth meeting of the Standing Committee Rosa Khutor, Sochi (Russian Federation), 1-5 October 2018 Reports of regional representatives ASIA 1. This document has been submitted by Kuwait. 2. General information: Regional Representative: Chain, Indonesia, Kuwait Alternate Regional Representative: Japan, Nepal, Republic of Korea Number of Parties in the Region: 38 Parties providing information for this Report: Afghanistan, Bahrain, China, Indonesia, Iraq, Japan, Kuwait, Lao People's Democratic Republic, Malaysia, Philippines, Saudi Arabia, Singapore, Syrian Arab Republic, United Arab Emirates, and Yem en 3. Introduction: This report summarized the activities of Parties between 69th Standing Committee Meeting (November 2017, Rosa Khutor) and 70th Standing Committee Meeting (October 2018, Rosa Khutor, Sochi). 4. Activities within each party 4.1 Afghanistan: 1.Participation in CITES meeting None 2.Cooperation with the parties and other None 3.Implimentation of CITES, including conservation, legislation and law enforcement activities a.Wild Animal Protection and hunting regulation law Afghanistan developed Wild Animal Protection and hunting regulation law, this law is currently drafted, on September, 2018 Afghanistan conducted more from three coordination meeting with relevant organization, asspacilly Ministry of agriculture irrigation and water regarding specification of National Environmental SC70 Doc. 69.2 – p. 1 Protection Agency (NEPA) and Ministry of Agriculture irrigation and livestock (MAIL) role in the implementation of this law to finalize as soon as possible. After adoption of this law, Afghanistan will be able to regulate wild animal illegal hunting, trapping and preventing the extinction of endangered species b.
    [Show full text]
  • The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019
    The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019 19 Letter from Second Place: the Editor "Historical Elisabeth Mirrorism" Siegel Trinh Truong First Place: "Importing Arms, Exporting the Revolution" 38 Rosa Shapiro- Third Place: Thompson "A Transcript from Nature" 54 Oriana Tang Crossword Contest 56 Honorable Mention: "Developing 72 Socially Honorable Conscious Mention: Curricula "Reverse for Somali Cap-and- Schools" Trade for Refugees" Noora Reffat Jordan Farenhem 1 EDITOR-IN-CHIEF Putt Punyagupta Andrew Song Elisabeth Siegel Staff Zhen Tu Will Waddingham MANAGING EDITORS Jake Mezey GRAPHIC DESIGN Qusay Omran Elisabeth Siegel Lauren Song ASST. MANAGING EDITOR Mary Orsak Max Krupnick Numi Katz Leila Iskandarani OUTREACH COORDINATORS STAFF Juanita Garcia Coco Chai Tyler Jager Chase Finney Leila Iskandarani SENIOR EDITORS Tasnim Islam Max Krupnick Henry Suckow-Ziemer Alayna Lee Muriel Wang Joon Lee Jack McCordick EDITORS Mary Orsak Katrina Starbird Jorge Familiar-Avalos Juanita Garcia Ariana Habibi CONTRIBUTORS Tyler Jager Jordan Farenhem Numi Katz Noora Reffat Brandon Lu Rosa Shapiro-Thompson Deena Mousa Oriana Tang Minahil Nawaz Trinh Truong Sam Pekats ACHESON PRIZE JUDGING PANEL Ana de la O Torres, Associate Professor of Political Science Isaiah Wilson (Colonal, U.S. Army, ret.), Senior Lecturer at the Jackson Institute for Global Affairs Clare Lockhart, Director and co-Founder of the Institute for State Effectiveness & Senior Fellow at the Jackson Institute for Global Affairs Julia Adams, Professor of Sociology and International and Area Studies & Head of Grace Hopper College 2 Dear Reader, You might notice that we look a little different. Welcome to the brand new YRIS redesign, arriving just in time for my favorite issue of the year: the Acheson Prize Issue.
    [Show full text]
  • The Customs Excise and Preventive Service and Cross Border Crimes Management: a Case Study of the Eastern Frontier of Ghana
    THE CUSTOMS EXCISE AND PREVENTIVE SERVICE AND CROSS BORDER CRIMES MANAGEMENT: A CASE STUDY OF THE EASTERN FRONTIER OF GHANA by Francis Azure Junior BA (Hons.), M.A Int. Affairs A Thesis submitted to the Institute of Distance Learning, Kwame Nkrumah University of Science and Technology In partial fulfillment of the requirements for the degree of COMMONWEALTH EXECUTIVE MASTER OF BUSINESS ADMINISTRATION Institute of Distance Learning 30TH MAY, 2009 CERTIFICATION I hereby declare that this submission is my own work towards the CEMBA and that, to the best of my knowledge, it contains no material previously published by another person nor material which has been accepted for the award of any other degree of the university, excepted where due acknowledgement has been made in the text. Francis Azure Jnr. …………………….. …………………… Student # 20065838 Signature Date Certified By Ben Honyenuga (Mr.) …………………… …………………… Supervisor Signature Date Certified By ………………………… …………………… …………………… Head of Dept. Name Signature Date ABSTRACT Ghana can boast of a vast sub-regional market of about 220 million people sharing cultural linkages across borders and having similar tastes. In order to benefit from such a huge market, the intensification of trade between Ghana and her neighbours is essential. At the community level, this commitment is seen in the persistent efforts by member states to ensure free movement of persons, goods and services across national borders. In Ghana, the institution responsible for the implementation of free movement and trade facilitation is the Customs Excise and Preventive Service (CEPS). Over the years, cross border criminal activities have become a hindrance to free movement and trade. This is especially so along the Eastern Frontier of Ghana, which stretches from the border with Togo at Aflao to the fringes of northern Volta at Tinjase.
    [Show full text]
  • Transgovernmental Networks As a Tool to Combat Terrorism
    TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Global Affairs written under the direction of Dr. Norman Samuels Ph.D: Professor and Provost Emeritus and approved by Newark, New Jersey January 2010 ABSTRACT OF THE DISSERTATION TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE Dissertation Director: Dr. Norman Samuels Ph.D.: Professor and Provost Emeritus Globalization has led to a shift in the perceived threat to security from states to trans- border issues such as financial collapse, global warming, pandemics and threats from a variety of non-state actors. As a result of the terrorist attacks on New York, Bali, Madrid, London and Mumbai; international terrorism has become one of the most highly visible of these new threats. One mechanism of global governance employed to combat this threat is the use of transgovernmental networks comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts. These networks are the foundation of a strategy of confronting “networks of terror with networks against terror.” This research seeks to understand how these networks operate to achieve their mission. The literature relating to transgovernmental networks and transnational advocacy networks (TANs) suggests that these two network types share numerous characteristics. These similarities led to the development of the hypothesis that transgovernmental networks operate to accomplish their missions in much the same way as TANs operate.
    [Show full text]
  • Malaysia 2020 Tobacco Industry Interference Index
    MALAYSIA 2020 TOBACCO INDUSTRY INTERFERENCE INDEX Background and Introduction Over the past four years, Malaysia has not made any progress in implementing Article 5.3 guidelines of the WHO Framework Convention on Tobacco Control (FCTC) and is faring poorly in protecting public health policies from interference from the tobacco industry (TI). The findings of this annual TI Interference Index show there is a further deterioration in Malaysia. British American Tobacco (BAT) Malaysia, Japan Tobacco International (JTI) and Philip Morris Malaysia control 97 percent of the cigarette market.1 BAT is the dominant tobacco company controlling about 58 percent of the cigarette market share. In 2017, BAT shut down its cigarette manufacturing facility in Petaling Jaya, citing increasing contraband cigarettes in Malaysia and a challenging business environment as its reasons. However just one year later, in October 2018, BAT opened a new manufacturing facility in Johor stating it can leverage on the proximity for better management of materials, machinery parts as well as resources. Malaysia still provides an attractive investment environment for the tobacco business. In 2019, BAT claimed it will lay off about 20 percent of its workforce in Malaysia, citing among its reasons tax-led price increase which led to high illicit cigarette trade.2 This report uses the questionnaire developed by the Southeast Asia Tobacco Control Alliance based on the Article 5.3 Guidelines. Information used in this report is obtained from the public domain. A scoring system is applied to make the assessment. The score ranges from 0 - 5, where 5 indicates highest level of industry interference, and 1 is low or no interference.
    [Show full text]