T-CY Assessment Report: the Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime

Total Page:16

File Type:pdf, Size:1020Kb

T-CY Assessment Report: the Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime T-CY CYBERCRIME CONVENTION COMMITTEE COMITÉ DE LA CONVENTION CYBERCRIMINALITÉ T-CY(2013)17rev Strasbourg, France (Provisional) 3 December 2014 T-CY assessment report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime Adopted by the T-CY at its 12th Plenary (2-3 December 2014) www.coe.int/cybercrime Contents 1 Introduction ............................................................................................................................ 3 2 Assessment of frequency of mutual assistance and types of stored data ................................ 5 2.1 Types of data requested .................................................................................................................5 2.2 Frequency of requests ...................................................................................................................6 2.3 MLA versus police cooperation ........................................................................................................7 2.4 Spontaneous information ...............................................................................................................9 2.5 Tables on Questions 1.1 ± 1.4 ....................................................................................................... 11 3 Assessment of procedures and requirements for mutual assistance regarding accessing stored data .................................................................................................................................. 31 3.1 Requirements ............................................................................................................................. 31 3.2 Grounds for refusal ..................................................................................................................... 33 3.3 Language of the request .............................................................................................................. 35 3.4 Procedure for sending/receiving requests ........................................................................................ 37 3.5 Problems encountered ................................................................................................................. 38 3.6 Tables on questions 2.1 ± 2.5 ....................................................................................................... 40 4 Assessment of channels and means of cooperation ............................................................... 83 4.1 Authorities, channels and means of cooperation............................................................................... 83 4.2 Urgent requests/expedited responses ............................................................................................. 85 4.3 Role of 24/7 point of contact ......................................................................................................... 86 4.4 Direct contact to obtain data from physical or legal persons in foreign jurisdictions ............................... 88 4.5 Coordination in complex international cases .................................................................................... 89 4.6 Tables on questions 3.1 ± 3.4 ....................................................................................................... 90 5 Conclusions and recommendations ..................................................................................... 123 5.1 Conclusions .............................................................................................................................. 123 5.2 Recommendations ..................................................................................................................... 125 5.3 Follow up ................................................................................................................................. 128 6 Appendices .......................................................................................................................... 129 6.1 Listing of solutions proposed to make mutual assistance more efficient ............................................. 129 6.2 Compilation of relevant domestic legislation .................................................................................. 135 6.3 Extracts of the Budapest Convention on Cybercrime ....................................................................... 200 Contact Alexander Seger Executive Secretary of the Cybercrime Convention Committee (T-CY) Tel +33-3-9021-4506 Directorate General of Human Rights and Rule of Law Fax +33-3-9021-5650 Council of Europe, Strasbourg, France Email: [email protected] 2 1 Introduction Expeditious mutual legal assistance (MLA) is one of the most important conditions for effective measures against cybercrime and other offences involving electronic evidence given the transnational and volatile nature of electronic evidence. In practice, however, mutual legal assistance procedures are considered too complex, lengthy and resource intensive, and thus too inefficient. The Cybercrime Convention Committee (T-CY), at its 8th Plenary Session (5-6 December 2012), therefore, decided to assess in 2013 the efficiency of some of the international cooperation provisions of Chapter III of the Budapest Convention on Cybercrime. At its 10th Plenary (2-3 December 2013) it decided to extend this assessment to 2014. The Budapest Convention on Cybercrime is a criminal justice treaty. Chapter III on international FRRSHUDWLRQ UHIHUV WR FRRSHUDWLRQ ³IRU WKH SXUSRVH RI LQYHVWLJDWLRQV RU SURFHHGLQJV FRQFHUQLQJ criminal offences related to computer systems and data, or for the collection of evidence in HOHFWURQLFIRUPRIDFULPLQDORIIHQFH´1 The T-CY decided to focus the assessment in particular on Article 31 which SURYLGHVIRU³mutual DVVLVWDQFHUHJDUGLQJDFFHVVLQJRIVWRUHGFRPSXWHUGDWD´RQDQH[SHGLWHGEDVLV Article 31 ± Mutual assistance regarding accessing of stored computer data 1 A Party may request another Party to search or similarly access, seize or similarly secure, and disclose data stored by means of a computer system located within the territory of the requested Party, including data that has been preserved pursuant to Article 29. « 3 The request shall be responded to on an expedited basis where: a there are grounds to believe that relevant data is particularly vulnerable to loss or modification; or b the instruments, arrangements and laws referred to in paragraph 2 otherwise provide for expedited co-operation. The purpose of the present $VVHVVPHQW LV WR LGHQWLI\ VROXWLRQV DOORZLQJ IRU PRUH ³H[SHGLWHG´ mutual assistance and to render international cooperation in general more efficient. Article 31 is assessed in the context of the broader international cooperation regime, that is, in connection with Articles 23, 25, 26, 27, 28 and 35 Budapest Convention. A questionnaire prepared by the Bureau of the T-CY was circulated to Parties and Observers on 18 February 2013 with a deadline of 10 April 2013. The 9th Plenary of the T-CY (4-5 June 2013) held a first round of discussions based on the compilation of replies received (see table of replies received), a second round at the 10th Plenary on 2-3 December 2013 and a third round at the 11th Plenary on 17-18 June. Additional replies or comments were received following discussions in these Plenaries. The present report was adopted by the 12th Plenary of the T-CY on 2-3 December 2014. 1 See Articles 23 and 25.1 Convention on Cybercrime. The report is based on replies to the questionnaire and other comments and inputs received between April 2013 and November 2014 from the following States: 1. Albania 2. Armenia 3. Australia 4. Austria 5. Azerbaijan 6. Belgium 7. Bosnia and Herzegovina 8. Bulgaria 9. Costa Rica 10. Croatia 11. Cyprus 12. Dominican Republic 13. Estonia 14. Finland 15. France 16. Georgia 17. Germany 18. Hungary 19. Iceland 20. Italy 21. Japan 22. Latvia 23. Lithuania 24. Malta 25. Mauritius 26. Republic of Moldova 27. Montenegro 28. Netherlands 29. Norway 30. Philippines 31. Portugal 32. Romania 33. Serbia 34. Slovakia 35. Slovenia 36. Spain 37. Switzerland 38. ³7KHIRUPHU<XJRVODY5HSXEOLFRI0DFHGRQLD´ 39. Turkey 40. Ukraine 41. United Kingdom 42. United States of America 4 2 Assessment of frequency of mutual assistance and types of stored data 2.1 Types of data requested Within the framework of international cooperation, the following types of information are requested from foreign authorities: Subscriber information2 has been singled out in most replies as being the most often sought type of data. This includes information to identify the user of an IP address (or conversely, information on the IP address used by a specific person) or the owner of an email, social network or VOIP account as well as related technical information on the location, equipment used etc. Requests often comprise information on means of payment or billing data. This is followed by requests for traffic data, in particular for IP or mobile phone log files. Content data seems to be sought less often. Requests may be for content from emails, social networking accounts and chat messages or similar, or for illegal contents such as child abuse materials. With respect to the underlying offences: Fraud and other financial crimes are referred to in almost all replies. These include all variations, ranging from credit card fraud, online payment fraud, auction fraud, phishing and other types of computer-related forgery and fraud related to traditional crimes such as breach of trust, bribery, tax evasion, money laundering and similar.
Recommended publications
  • Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program
    OMB No. 1121-0329 Approval Expires 11/30/2020 U.S. Department of Justice Office of Justice Programs Bureau of Justice Assistance The U.S. Department of Justice (DOJ), Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) is seeking applications for funding under the Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program. This program furthers the Department’s mission by supporting and assisting state, local, territorial, and tribal jurisdictions in enhancing their efforts to prevent, investigate, and respond to economic, high-technology, white collar, and internet crimes. Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program Applications Due: June 14, 2018 Eligibility Eligible applicants are limited to nonprofit or for-profit organizations (including tribal nonprofit and for-profit organizations) and institutions of higher education (including tribal institutions of higher education). Applicants must possess experience in providing training and technical assistance (TTA) on a national level to state, local, and tribal law enforcement officials, intelligence analysts, prosecutors, judges, staff who work in fusion centers, and other criminal justice entities who prevent, investigate, and respond to economic, high-technology, white collar, or internet crimes. In addition, applicants are required to have the capacity to deliver TTA nationally to include remote locations throughout the United States and its territories, as needed. The recipient and subrecipients (including any for-profit organization) must forgo any profit or management fee. BJA welcomes applications under which two or more entities would carry out the federal award; however, only one entity may be the applicant.
    [Show full text]
  • O&M Volume 1
    OFFICE OF THE SECRETARY OF DEFENSE Fiscal Year (FY) 2020 President's Budget March 2019 Volume 1 Part 2 of 2 Justification for FY 2020 United States Court for the Armed Forces Cooperative Threat Reduction Program Defense Acquisition Workforce Development Fund Overseas Humanitarian, Disaster and Civic Aid Office of the Inspector General Support for International Sporting Competitions Overseas Contingency Operations (OCO) Operation and Maintenance, Defense-Wide (This page intentionally left blank) Office of the Secretary of Defense Other Defense-Wide Base Programs Overseas Contingency Operations Fiscal Year (FY) 2020 President’s Budget TABLE OF CONTENTS Other Defense-Wide Baseline Programs CAAF United States Court for the Armed Forces .................................................3 CTR Cooperative Threat Reduction Program ....................................................13 DAWDF Department of Defense Acquisition Workforce Development Fund ............................67 OHDACA Overseas Humanitarian, Disaster, and Civic Aid ..........................................81 OIG Office of Inspector General .............................................................93 SISC Support for International Sporting Competitions ........................................127 Overseas Contingency Operations Requests OCO Summary by Operation/Funding Category .........................................................135 O-1 O-1 Line Item Summary ..................................................................137 DCAA Defense Contract Audit Agency ..........................................................139
    [Show full text]
  • Guidelines for the Evaluation of Petroleum Reserves and Resources
    Guidelines for the Evaluation of Petroleum Reserves and Resources A Supplement to the SPE/WPC Petroleum Reserves Definitions and the SPE/WPC/AAPG Petroleum Resources Definitions WORLD PETROLEUM CONGRESSES Guidelines for the Evaluation of Petroleum Reserves and Resources A Supplement to the SPE/WPC Petroleum Reserves Definitions and the SPE/WPC/AAPG Petroleum Resources Definitions SOCIETY OF PETROLEUM ENGINEERS © Copyright 2001 Society of Petroleum Engineers All rights reserved. No portion of this book may be reproduced in any form or by any means, including electronic storage and retrieval systems, except by explicit, prior written permission of the publisher except for brief passages excerpted for review and critical purposes. Printed in the United States of America. ISBN 978-1-55563-105-5 05 06 07 08 09 10 11 12 13 / 9 8 7 6 5 4 3 2 Society of Petroleum Engineers 222 Palisades Creek Drive Richardson, TX 75080-2040 USA http://www.spe.org/web/store/index.shtml [email protected] 1.972.952.9393 Table of Contents Chapter 1—Introduction ..........................................................................................................1 Claude L. McMichael Chapter 2—Petroleum Resources Classification and Definitions........................................7 James G. Ross Chapter 3—Operational Issues .............................................................................................25 Claude L. McMichael and Allan Spencer Chapter 4—Current Economic Conditions...........................................................................35
    [Show full text]
  • North American Electric Reliability Corporation Compliance Monitoring and Enforcement Program APPENDIX 4C to the RULES of PROCED
    116-390 Village Boulevard Princeton, New Jersey 08540-5721 North American Electric Reliability Corporation Compliance Monitoring and Enforcement Program APPENDIX 4C TO THE RULES OF PROCEDURE Effective: May 4, 2016 TABLE OF CONTENTS 1.0 INTRODUCTION............................................................................................................... 1 1.1 Definitions ................................................................................................................ 1 2.0 IDENTIFICATION OF ORGANIZATIONS RESPONSIBLE FOR COMPLYING WITH RELIABILITY STANDARDS .............................................................................. 1 3.0 COMPLIANCE MONITORING PROCESSES .............................................................. 2 3.1 Compliance Audits .................................................................................................. 3 3.2 Self-Certifications ................................................................................................... 9 3.3 Spot Checks ........................................................................................................... 10 3.4 Compliance Investigations ................................................................................... 11 3.5 Self-Reports ........................................................................................................... 14 3.5A Self-Logging ........................................................................................................... 15 3.6 Periodic Data Submittals .....................................................................................
    [Show full text]
  • Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus
    Loyola University Chicago Loyola eCommons Dissertations Theses and Dissertations 1993 Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus John Warren Thomas Loyola University Chicago Follow this and additional works at: https://ecommons.luc.edu/luc_diss Part of the Ancient History, Greek and Roman through Late Antiquity Commons Recommended Citation Thomas, John Warren, "Roman Criminal Law and Legal Narrative in the Neronian Books of the Annals of Tacitus" (1993). Dissertations. 3288. https://ecommons.luc.edu/luc_diss/3288 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 1993 John Warren Thomas LOYOLA UNIVERSITY OF CHICAGO ROMAN CRIMINAL LAW AND LEGAL NARRATIVE IN THE NERONIAN BOOKS OF THE ANNALS OF TACITUS A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF CLASSICAL STUDIES BY JOHN WARREN THOMAS III CHICAGO, ILLINOIS MAY 1993 © Copyright by John W. Thomas III, 1993 All Rights Reserved To Kirsten Fortuna spondet multa multis, Praestat nemini. Vive in dies et horas, Nam proprium est nihil. CIL 1.1219 ACKNOWLEDGMENTS For the completion of this study I gratefully acknowledge the direction of Drs. James G. Keenan, John F. Makowski, and Fr. John P. Murphy S. J., whose criticism and advice have been invaluable.
    [Show full text]
  • Mathemaku No. 4C
    Mathemaku No. 4c chestnuts park ) autumn zzle 0 2 > o 74470 R78fl4 ~ New Orleans Review Summer 1995 Volume 21, Number 2 Editor Associate Editors Ralph Adamo Sophia Stone Cover: poem, "Mathemaku 4c," by Bob Grumman. Michelle Fredette Art Editor Douglas MacCash New Orleans Review is published quarterly by Loyola University, New Orleans, Louisiana 70118, United States. Copyright© 1995 by Loyola Book Review Editor Copy Editor University. Mary A. McCay T.R. Mooney New Orleans Review accepts submissions of poetry, short fiction, essays, and black and white art work or photography. Translations are also welcome but must be accompanied by the work in its original language. All submis­ Typographer sions must be accompanied by a self-addressed stamped envelope. Al­ John T. Phan though reasonable care is taken, NOR assumes no responsibility for the loss of unsolicited material. Send submissions to: New Orleans Review, Box 195, Loyola University, New Orleans, Louisiana 70118. Advisory/Contributing Editors John Biguenet Subscription rates: Individuals: $}8.00 Bruce Henricksen Institutions: $21.00 William Lavender Foreign: $32.00 Peggy McCormack Back Issues: $9.00 apiece Marcus Smith Contents listed in the PMLA Bibliography and the Index of American Periodical Verse. Founding Editor US ISSN 0028-6400 Miller Williams New Orleans Review is distributed by: Ingram Periodicals-1226 Heil Quaker Blvd., LaVergne, TN 37086-7000 •1-800-627-6247 DeBoer-113 East Centre St., Nutley, NJ 07110 •1-201-667-9300 Thanks to Julia McSherry, Maria Marcello, Lisa Rose, Mary Degnan, and Susan Barker Adamo. Loyola University is a charter member of the Association of Jesuit University Presses (AJUP).
    [Show full text]
  • Issues of War Trauma and Working with Refugees. a Compilation of Resources
    DOCUMENT RESUME ED 406 497 UD 031 660 AUTHOR Somach, Susan D., Comp. TITLE Issues of War Trauma and Working with Refugees. A Compilation of Resources. INSTITUTION Center for Applied Linguistics, Washington, DC. Refugee Service Center. PUB DATE 95 NOTE 167p. PUB TYPE Collected Works General (020) Reports Evaluative /Feasibility (142) EDRS PRICE MF01/PC07 Plus Postage. DESCRIPTORS Adults; *Child Development; *Children; Childrens Rights; Coping; Delivery Systems; English (Second Language); Foreign Countries; *Immigrants; Posttraumatic Stress Disorder; *Refugees; Second Language Learning; *War; World Problems IDENTIFIERS Cambodia; Holocaust; *Traumas; Yugoslavia ABSTRACT The Center for Applied Linguistics has compiled these resources on the subjects of war trauma and working with refugees to guide refugee service providers and classroom teachers. The materials include background information about trauma and posttraumatic stress disorder and specific information about problems of refugees and victims of war trauma. The selections in the compilation are designated Appendixes. The United Nations, through its High Commissioner for Refugees and its statement on the rights of the child (Appendix A) has recognized the problems children, especially those from Bosnia, face. Two appendixes (B and C) discuss trauma, posttraumatic stress disorder, and refugees. Two selections focus on children and trauma and consider general developmental issues and coping with grief and the aftermath of disaster. "War Trauma and Refugee Children" contains a description of a film about the effects of torture on children, a discussion of traumatic human rights abuse, and a two-part article on the effects of massive trauma on Cambodian children. "Children of Holocaust Survivors" contains two articles on the symptoms and treatment of child survivors of the Holocaust.
    [Show full text]
  • Fiscal Year 2012 Annual Report
    United States Secret Service Fiscal Year 2012 Annual Report U.S. Department of Homeland Security www.secretservice.gov United States Secret Service “WORTHY OF TRUST AND CONFIDENCE” “WORTHY OF TRUST AND CONFIDENCE” United States Secret Service “Worthy of Trust and Confidence” FISCAL YEAR 2012 ANNUAL REPORT U.S. Department of Homeland Security United States Secret Service JUSTICE§DUTY§COURAGE§HONESTY§LOYALTY MESSAGE FROM THE DIRECTOR In March, I had the honor of being sworn in as the 23rd Director of the United States Secret Service. I am humbled by the trust and confidence placed in me by the President and Secretary of Homeland Security to lead the men and women of this great agency. What I have learned in my career with the Secret Service is that our employees are our greatest asset. We are the best at what we do, thanks to the hard work and commitment our employees bring to our unique dual mission each day. Throughout our 148-year history, our core values have guided this organization and are dem- onstrated on a daily basis through the professional conduct of the Secret Service workforce. I believe that by embracing these values, our diversity and our history, and using them as a foundation, each of our employees can do their part to build a stronger agency and continue our successes. What follows in the pages of this Fiscal Year 2012 Annual Report are our successes from October 2011 through September 2012. These achievements are a direct reflection on the dedication of our entire workforce. It is on behalf of these mission-driven men and women that I present this report.
    [Show full text]
  • Setting up System of Assisted Voluntary Return and Reintegration in Armenia
    Setting up System of Assisted Voluntary Return and Reintegration in Armenia Needs and Gaps Assessment Report The opinions expressed in this report are those of the authors and do not necessarily reflect the views of the International Organization for Migration (IOM). The designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of IOM concerning the legal status of any country, territory, city or area, or of its authorities, or concerning its frontiers or boundaries. IOM and the authors do not accept any liability for any loss or damage which may arise from the reliance on information contained in this report. IOM is committed to the principle that humane and orderly migration benefits migrants and society. As an intergovernmental organization, IOM acts with its partners in the international community to: assist in meeting the operational challenges of migration; advance understanding of migration issues; encourage social and economic development through migration; and uphold the human dignity and well-being of migrants. This publication was made possible through support provided by Norwegian Ministry of Foreign Affairs, under the terms of "Enhancing Migrants' Rights and Good Governance in Armenia and Georgia" (EMERGE) project. The opinions expressed herein are those of the author and do not necessarily reflect the views of IOM and Norwegian Ministry of Foreign Affairs. Publisher: International Organization for Migration 14 Petros Adamyan Street, 1st floor • UN House • Yerevan 0010 • Armenia Tel: (+374 10) 58 56 92 Fax: (+374 10) 54 33 65 http://www.iom.int All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of the publisher.
    [Show full text]
  • O&M Volume 1
    OFFICE OF THE SECRETARY OF DEFENSE Fiscal Year (FY) 2019 President's Budget February 2018 Volume 1 Part 2 of 2 Justification for FY 2019 United States Court for the Armed Forces Cooperative Threat Reduction Program Defense Acquisition Workforce Development Fund Overseas Humanitarian, Disaster and Civic Aid Office of the Inspector General Support for International Sporting Competitions Overseas Contingency Operations (OCO) Operation and Maintenance, Defense-Wide (This page intentionally left blank) Office of the Under Secretary of Defense-Comptroller Other Defense-Wide Base Programs Overseas Contingency Operations Fiscal Year (FY) 2019 President’s Budget TABLE OF CONTENTS Other Defense-Wide Baseline Programs CAAF United States Court for the Armed Forces ..............................................1115 CTR Cooperative Threat Reduction Program ..................................................1127 DAWDF Department of Defense Acquisition Workforce Development Fund ..........................1183 OHDACA Overseas Humanitarian, Disaster, and Civic Aid ........................................1199 OIG Office of Inspector General ...........................................................1213 SISC Support for International Sporting Competitions .......................................1265 Overseas Contingency Operations Requests O-1 O-1 Line Item Summary .................................................................1273 DCAA Defense Contract Audit Agency .........................................................1275 DCMA Defense Contract Management
    [Show full text]
  • Between Organised Crime and Terrorism: Illicit Firearms Actors And
    237 Between organised crime and terrorism: ITALY Illicit firearms actors and market dynamics in Italy Francesco Strazzari and Francesca Zampagni The illicit trade in firearms has been a key area of international concern since the late 1990s,1 when large amounts of illicit firearms entered the European Union (EU) illicit firearms market after the end of the Cold War from stockpiles in neighbour- ing regions, especially the states of the former Yugoslavia. Moreover, since 2001 the threat of jihadist terrorism has been high on the EU agenda and with it the potential problem of arms trafficking to supply terrorist groups based in the EU.In a November 2012 speech Cecilia Malmström, the then-EU commissioner for home affairs, stated that the number of illicit firearms circulating in the EU exceeds the number of reg- istered hunters and sports shooters, which total approximately 10 million.2 More recently, the flaring up of armed conflicts close to the EU’s borders, for example in Ukraine, the Middle East and North Africa, has raised concerns about the emer- gence of new sources of illicit firearms to supply the European market. Italy was chosen as the subject of an in-depth study on illicit gun markets for several reasons. Firstly, the country plays a prominent role in the production of firearms in the EU and is considered a top global exporter of small arms and light weapons. According to TradeMap data, the volume of Italian firearms exports is increasing, with a value of US$806 million in 2016.3 Secondly, Italy hosts a wide spectrum of organised criminal groups that have been a serious cause of concern to the authori- ties for some time.
    [Show full text]
  • Country Reports on Terrorism 2010
    10 United States Department of State Office of the Coordinator for Counterterrorism Released August 2011 Country Reports on Terrorism 2010 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the “Act”), which requires the Department of State to provide Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2010 TABLE OF CONTENTS CHAPTER 1. STRATEGIC AssEssMENT..............................................................9 CHAPTER 2. COUNTRY REPORTS ...................................................................12 AFRICA OVERVIEW ..........................................................................12 Trans-Sahara Counterterrorism Partnership The Partnership for East African Regional Counterterrorism Burkina Faso Burundi Comoros Democratic Republic of the Congo Djibouti Eritrea Ethiopia Kenya Mali Mauritania Niger Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda EAST AsIA AND PACIFIC OVERVIEW........................................................30 Australia Cambodia China • Hong Kong • Macau Indonesia Democratic People’s Republic of Korea (North Korea) Japan Malaysia New Zealand Philippines Singapore Thailand EUROPE OVERVIEW .........................................................................47 Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Cyprus Denmark France Georgia Germany Greece Ireland Italy Kosovo The Netherlands Norway Russia Serbia Spain Sweden Turkey Ukraine
    [Show full text]