The Customs Excise and Preventive Service and Cross Border Crimes Management: a Case Study of the Eastern Frontier of Ghana

Total Page:16

File Type:pdf, Size:1020Kb

The Customs Excise and Preventive Service and Cross Border Crimes Management: a Case Study of the Eastern Frontier of Ghana THE CUSTOMS EXCISE AND PREVENTIVE SERVICE AND CROSS BORDER CRIMES MANAGEMENT: A CASE STUDY OF THE EASTERN FRONTIER OF GHANA by Francis Azure Junior BA (Hons.), M.A Int. Affairs A Thesis submitted to the Institute of Distance Learning, Kwame Nkrumah University of Science and Technology In partial fulfillment of the requirements for the degree of COMMONWEALTH EXECUTIVE MASTER OF BUSINESS ADMINISTRATION Institute of Distance Learning 30TH MAY, 2009 CERTIFICATION I hereby declare that this submission is my own work towards the CEMBA and that, to the best of my knowledge, it contains no material previously published by another person nor material which has been accepted for the award of any other degree of the university, excepted where due acknowledgement has been made in the text. Francis Azure Jnr. …………………….. …………………… Student # 20065838 Signature Date Certified By Ben Honyenuga (Mr.) …………………… …………………… Supervisor Signature Date Certified By ………………………… …………………… …………………… Head of Dept. Name Signature Date ABSTRACT Ghana can boast of a vast sub-regional market of about 220 million people sharing cultural linkages across borders and having similar tastes. In order to benefit from such a huge market, the intensification of trade between Ghana and her neighbours is essential. At the community level, this commitment is seen in the persistent efforts by member states to ensure free movement of persons, goods and services across national borders. In Ghana, the institution responsible for the implementation of free movement and trade facilitation is the Customs Excise and Preventive Service (CEPS). Over the years, cross border criminal activities have become a hindrance to free movement and trade. This is especially so along the Eastern Frontier of Ghana, which stretches from the border with Togo at Aflao to the fringes of northern Volta at Tinjase. The porous border here however, continuous to engender cross border crime and instability in the country owing to the lack of appropriate mechanisms for monitoring illegal cross border activities. Consequently, violent Cross border criminal activities such as Drug trafficking, Arms trafficking, Human trafficking, Armed robbery and Vehicle theft as well as non-violent ones like Textile smuggling, Vehicle smuggling, Fuel/Cocoa smuggling, Cyber fraud, Money Laundering and Counterfeit/Piracy are on the rise in this area in spite of the efforts of CEPS a frontline agency in managing these activities. Open-ended interviews with Heads of border security agencies such as CEPS, Ghana Immigration Service (GIS) the Bureau of National Investigations (BNI), Police Service and the National Security Ministry working in this area revealed the enormity of the problem. The negative socio-political and economic impact of cross border criminal activities in Ghana call for effective mechanisms to manage them. Hence, adopting sub-regional and complementary national control strategies will help to reduce the impact of cross border crimes. Effective options lie in a concerted effort at the sub-regional level between governmental and non-governmental agencies to combat cross border crimes. Appropriate national legislative and regulatory actions, to upgrade skills in investigative and enforcement techniques, and addressing corruption within government security agencies in order to avoid complicit acts by government and security agencies. DEDICATION I dedicate this work to my lovely wife Monica for her relentless support. TABLE OF CONTENTS Pages Certification … … … … … … … … … … … …. … ii Abstract … … … … … … … … … … … … … … … iii Dedication … … … … … … … … … … … … … … v Table of Contents … … … … … … … … … … … … vi Abbreviations … … … … … … … … … … … … … xi Acknowledgement … … … … … … … … … … … … xiii CHAPTER ONE INTRODUCTION 1.1 Overview of the Study … … … … … … … … … … … 1 1.2 Problem Statement … … … … … … … … … … … … 2 1.3 Objectives of the Study … … … … … … … … … … … 4 1.4 Significance of the Research … … … … … … … … … … 5 1.5 Scope of Study … … … … … … … … … … … … … 5 1.6 Hypothesis … … … … … … … … … … … … … … 6 1.7 Methodology … … … … … … … … … … … … … 6 1.8 Organization of Study … … … … … … … … … … … 7 1.9 Limitation of Study … … … … … … … … … … … … 7 1.10 Definitions … … … … … … … … … … … … … … 7 CHAPTER TWO LITERATURE REVIEW 2.1 Theoretical Framework … … … … … … … … … … 14 2.1.1 Functionalism … … … … … … … … … … … … 14 2.1.2 Neo-Functionalism … … … … … … … … … … … 15 2.2 International Integration … … … … … … … … … … 19 2.3 Crime Theories … … … … … … … … … … … … … 21 2.4 A Brief History of CEPS … … … … … … … … … … 23 2.4.1 Organizational Structure … … … … … … … … … … 26 2.4.2 Organogram … … … … … … … … … … … … … 27 CHAPTER THREE RESEARCH METHODOLOGY 3.1 Research Design … … … … … … … … … … … … 28 3.2 Study Area … … … … … … … … … … … … … 28 3.3 Sampling Procedure … … … … … … … … … … … 29 3.4 Data Collection Procedure … … … … … … … … … … 29 3.5 Data Analysis Method … … … … … … … … … … … 30 CHAPTER FOUR FINDINGS, ANALYSIS AND INTERPRETATION INTRODUCTION 4.1 Findings … … … … … … … … … … … … … … 32 4.1.1 Vehicle Theft … … … … … … … … … … … … … 32 4.1.2 Vehicle Tax Evasion … … … … … … … … … … … 36 4.1.4 Textile Smuggling … … … … … … … … … … … … 39 4.1.5 Armed Robbery … … … … … … … … … … … … 40 4.1.6 Cocoa / Fuel Smuggling … … … … … … … … … … 41 4.1.7 Arms Trafficking … … … … … … … … … … … … 42 4.1.8 Human Trafficking … … … … … … … … … … … 43 4.1.9 Narcotics … … … … … … … … … … … … … 43 4.1.10 Internet Fraud/Money Laundering … … … … … … … 44 4.1.11Counterfeiting/Piracy … … … … … … … … … … 45 4.2. Analysis and Interpretation … … … … … … … … … 47 4.2.1 Reasons for Increase in Cross Border Crimes … … … … … 51 4.2.2 Porous Border … … … … … … … … … … … … 51 4.2.3 Ease of Movement … … … … … … … … … … … 52 4.3.5 Differences in Tariffs between Ghana and Her Neighbours … … 53 4.3.6 Ghana’s Proximity to Nigeria … … … … … … … … … 54 4.3.7 Ghanaian Hospitality … … … … … … … … … … … 56 4.3.8 Lack of Inter- Agency Collaboration … … … … … … … 57 4.4.0 Impact of Cross Border Crimes in Ghana … … … … … … 57 4.4.1 Economic Impact … … … … … … … … … … … 58 4.4.2 Social Impact … … … … … … … … … … … … 60 4.4.3 Political Impact … … … … … … … … … … … … 61 4.4.4 Relations With Neighbours … … … … … … … … … 62 CHAPTER FIVE SUMMARY, CONCLUSION AND RECOMMENDATIONS 5.1 Summary … … … … … … … … … … … … … 64 5.2 Conclusion … … … … … … … … … … … … 66 5.3 Hypothesis Testing … … … … … … … … … … … 66 5.4 Recommendations … … … … … … … … … … … 68 5.3 Appendix I … … … … … … … … … … … … … 69 5.4 Appendix II … … … … … … … … … … … … … 70 5.5 Appendix III … … … … … … … … … … … … … 71 ABBREVIATION ACP Assistant Commissioner of Police BNI Bureau of National Investigations CID Criminal Investigations Department CEPS Customs Excise and Preventive Service COMESA Common Market for Eastern and Southern Africa CPCJC Crime Prevention and Criminal Justice Centre ECOWAS Economic Community of West African States ERW Explosive Remnants of War FDI Foreign Direct Investment GCMS Ghana Customs Management System GCNet Ghana Community Network GIPC Ghana Investment Promotion Centre IRS Internal Revenue Service INTERPOL International Police KIA Kotoka International Airport NRCD National Redemption Council Decree PNDC Provisional National Defence Council SACU Southern African Customs Union SAD Single Administrative Document SADC Southern African Development Corporation SUV Sports Utility Vehicle UEMOA Union Economique Monetaire Occidental d’Afrique UNCICP United Nations Centre for International Crime Prevention UNODC United Nations Office on Drugs and Crime VAT Value Added Tax WTO World Trade Organization ACKNOWLEDGEMENT My profound appreciation goes to the Omnipotent, Omnipresent and Omniscient God for helping me complete this task. I am also deeply indebted to my supervisor, Mr. Ben Hoenyenuga, for his encouragement, comments and expert assistance throughout this study. Many thanks go to my classmates especially Yawson, Victor, Robert, Asare, Nana and Emmanuel. Nonetheless, I must state that any errors that persist in this study are entirely my own. CHAPTER ONE INTRODUCTION 1.1 OVERVIEW OF THE STUDY The Customs Excise and Preventive Service (CEPS) was established in 1939 as the Customs and Excise Department of the Gold Coast. It was tasked with the responsibility of collecting and accounting for government revenue through indirect taxes from ports, harbours and approved points of entry (History of CEPS 1999). CEPS has since become a major source of revenue generation in the country, collecting between 50% - 60% of internally generated revenue for government. (www.cepsghana.org accessed 13th January, 2009). In addition, CEPS performs non-revenue functions involving the enforcement of laws regarding facilitation of international trade, imports and export restrictions, exchange control, public safety and other interests of state on behalf of public institutions such as the Standard Board, Food and Drugs Board, Plant Quarantine and the Value Added Tax Service (VAT). In recent times and in line with Government policy on trade especially the need to strengthen intra – regional trade, CEPS has had to marry its traditional role of revenue collection with trade facilitation. This addition is traceable to government’s desire to implement Article 2(2) and Article 27 of the Economic Community of West African States (ECOWAS) protocol on free movement of persons, goods and services. It is worthy to note that, the idea of Economic integration as envisioned by the founding fathers of ECOWAS
Recommended publications
  • Rm7bll Yearly Smuggling
    Headline Ahmad Zahid M'sia loses RM7bil yearly due to smuggling activities at borders MediaTitle New Sabah Times English (KK) Date 18 Sep 2015 Language English Circulation 17,182 Readership 51,546 Section Home Color Black/white Page No 5 ArticleSize 245 cm² AdValue RM 524 PR Value RM 1,572 Ahmad lahid: M'sla loses RM7bll yearly due to smuggling activities at borders SINTOK: Deputy Prime "Min­ Home Minister, stressed that no a year due to the porous national ister Datuk Seri Ahmad Zahid new allocation or posts would be borders, including losses oh sub­ Hamidi yesterday announced created via the upgrading, but he sidised goods. that the Smuggling Prevention promised to reward the agency's He said goods worth RM38 Unit (UPP) would be upgraded officers and staff who exhibited million were seized from January into a Border Security Agency. excellent performance. to August this year by the UPP, He said the new entity ift­ "Believe me that when up by more than 100 per cent volving three core agencies, seizures of goods, smuggling of from RM18 million in 2014 and namely, the Royal Malaysian Po­ persons and human trafficking RM17 million in 2013. lice, Immigration Department can be reduced, there will be In this regard, Ahmad Zahid and Royal Malaysian Customs some reward which I will give as said collaboration among the en­ Department would also involve forcement agencies must be incentive. This is my promise. several other enforcement agen­ strengthened, including translat­ cies, as value added. "Change the approach, don't ing the National Blue Ocean ask first, but give first...no need "The policy paper on the pro­ to wait for a reward to motivate Strategy to avoid narrow think­ posal has been prepared and will ing.
    [Show full text]
  • Business PAGE 9 Vol 6, Issue 1
    U.S. Customsrontline and Border Protection H Vol 6, Issue 1 CBP gets America Back to Business PAGE 9 Vol 6, Issue 1 CONTENTS H COVER STORY 9 Business Unusual When Mother Nature strikes or other major events disrupt normal border operations, CBP’s business recovery program keeps traffic flowing and protects the U.S. economy. 9 H FEATURES 18 Riding Shotgun in the Arizona Skies Specially trained Border Patrol agents and CBP officers accompany Air and Marine pilots as supplemental air crew members. 22 Transformation at Land Border Ports of Entry 18 CBP’s land border ports of entry now benefit from improved technologies and resource optimization. 22 H DEPARTMENTS H ON THE COVER 2 CBP In Photos 36 CBP History The Ambassador Bridge, connecting Detroit with Windsor, Canada, is North 4 Around the Agency 40 Border Busts America’s busiest commercial international border crossing. During fiscal year 2012, 28 In Focus 42 Resources an average of $136 million of cargo CBP In The Spotlight crossed the bridge into the U.S. each 34 day or $5.7 million of cargo each hour. Cover photo by Lisa Przybyla CELEBRATING THE CAREER OF DAVID V. AGUILAR 2 H CBP IN PHOTOS H ACTING COMMISSIONER RETIRES AFTER 34 YEARS OF DISTINGUISHED SERVICE Frontline VOL 6, ISSUE 1 SECRETARY OF HOMELAND SECURITY Janet Napolitano ACTING COMMISSIONER, U.S. CUSTOMS AND BORDER PROTECTION THOMAS S. WINKOWSKI ASSISTANT COMMISSIONER, OFFICE OF PUBLIC AFFAIRS Melanie Roe EDITOR Laurel Smith MANAGING EDITOR Jason McCammack CONTRIBUTING EDITORS Susan Holliday Marcy Mason PRODUCTION MANAGER Tracie Parker PHOTOGRAPHERS James R.
    [Show full text]
  • Border Security
    BORDER SECURITY REPORT VOLUME 14 FOR THE World’s border prOTECTION, MANAGEMENT AND SECURITY INDUSTRY MAY / JUNE 2019 POLICY-MAKERS AND PRACTITIONERS COVER STORY BREXIT WILL PUSH UK BORDERS TO THE BRINK… UNLESS WE GET SMARTER WITH data SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS Border Threat Detection A global review of the South Asia: Case of Least Latest news, views and – The Path to Artificial latest news and challenges Connected Borders p.18 innovations from the Intelligence p.14 from border agencies and industry. p.30 agencies at the border. p.20 2 COMMENT contacts Every Cloud Has a Silver Lining Editorial: They say every cloud has a silver lining, when it comes to the movement of Tony Kingham but you would be hard pushed to goods, big questions remain. Such as; E: [email protected] convince anyone in the UK that the how does technology really help with Assistant Editor: Brexit cloud has one right now. Political the import and export of agricultural Neil Walker deadlock in parliament means we are goods and foodstuffs, which of course E: [email protected] no closer to a deal and the recent poor need inspections if regulations don’t showing by the established parties match. And no matter how much Design, Marketing & Production: in the European elections is likely to the UK spends on technology and Neil Walker result in a harder line from any future whatever systems it puts in place, to E: [email protected] Conservative Prime Minister, making a work effectively that technology and Subscriptions: hard Brexit much more likely.
    [Show full text]
  • Border Wars the Arms Dealers Profiting from Europe’S Refugee Tragedy
    BORDER WARS THE ARMS DEALERS PROFITING FROM EUROPE’S REFUGEE TRAGEDY Mark Akkerman Stop Wapenhandel www.stopwapenhandel.org Border wars | 1 AUTHOR: Mark Akkerman EDITORS: Nick Buxton and Wendela de Vries DESIGN: Evan Clayburg PRINTER: Jubels Published by Transnational Institute – www.TNI.org and Stop Wapenhandel – www.StopWapenhandel.org Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images should be based on the copyright terms of the original source. http://www.tni.org/copyright ACKNOWLEDGEMENTS Thanks to Corporate European Observatory for some of the information on arms company lobbying. Border wars: The arms players profiting from Europe’s refugee crisis | 2 CONTENTS Executive Summary 1 Introduction: the EU war on immigration 3 Fueling the refugee tragedy: EU arms exports 6 EU response to migration: militarising the borders 9 – ‘Fighting illegal immigration’ – EUNAVFOR MED – Armed forces at the borders – NATO assistance – Border fences and drones – From Frontex to a European Border and Coast Guard Agency – Externalizing EU borders – Deal with Turkey – Selling militarisation as a humanitarian effort Lobbying for business 17 – Lobby organisations – Frontex and industry – Security fairs as meeting points EU funding for border security and border control 25 – Funding for (candidate) member states – Funding third countries’ border security – EU Research & Technology funding – Frontex funding for research – Future prospects for security research Which companies profit from border security? 34 – Global border security market – Frontex contracts – Major profiting companies – Detention and deportation Conclusion 43 EXECUTIVE SUMMARY The refugee crisis facing Europe has caused consternation in the corridors of power, and heated debate on Europe’s streets.
    [Show full text]
  • Connected Policing Framework White Paper Transforming Policing Through Technology
    A Microsoft Government Connected Policing Framework White Paper Transforming Policing Through Technology Published for the APCO-APA 2008 International Policing and Summer Conference The Microsoft Connected Policing Framework The Microsoft® Connected Policing Framework is the result of work between Microsoft, specialist partners and many public safety, law enforcement and judicial organizations to build solutions, technologies and services that assist in integrated and collaborative policing to combat crime and assist with citizen safety. We reuse this collective “Know-How” to share and reuse international best practices in areas such as combating cyber crime with innovative intelligence and investigation solution architectures. IMPROVED OUTCOMES FOR CITIZEN SAFETY AND SECURITY INFORMATION CHANNELS ITERATIVE FIRE POLICE JUSTICE INTELLIGENCE INTERNAL SERVICES SECURITY CYCLE EMERGENCY RESPONSE ER CASE & RECORDS MANAGEMENT INTEGRATED JUSTICE PLAN PARTNER SOLUTIONS PARTNER INTELLIGENCE & INVESTIGATION TRANSPORT & BORDER CONTROL CRITICAL INFRASTRUCTURE PROTECTION E-POLICING (CSP, PORTAL & CRM) PROCESS APPLICATION PLATFORM BLUEPRINTS GUIDES ORGANIZATIONAL PRODUCTIVITY REFERENCES REUSABLE IP INFRASTRUCTURE CORE INFRASTRUCTURE e.g. MIF PROGRESS PRIVACY ACCESSIBILITY USABILITY SECURITY/ID STANDARDS INTEROP POLICY CITIZENSHIP INITIATIVES (CETS & DART) REVIEW Contents Introduction 4 1.0 Public Safety 5 1.1 Emergency and disaster response 5 1.2 Crime and DisorderReduction Strategies 9 1.3 E-policing 10 1.4 Microsoft Citizen Service Platform 13 2.0
    [Show full text]
  • The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone
    The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman Dissertation submitted in partial FulFillment oF the requirements For the degree oF Doctor of Philosophy in the Graduate School of Duke University 2016 ABSTRACT The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman An abstract oF a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor oF Philosophy in the Graduate School oF Duke University 2016 Copyright by Sophie Smith 2016 Abstract The Hole in the Fence examines the design and efFects oF the contemporary border security regime. Since 1994, the growth oF military-style policing in the lands between the US and Mexico has radically reshaped the path oF illicit transnational migration. Newly erected walls, surveillance technology, and the stationing oF an army oF Federal agents in the border territory do not serve to seal oFF the national boundary. Border security rather works by pushing undocumented migration traFFic away From urban areas and out into protracted journeys on foot through the southwest wilderness, heightening the risks associated with entering the US without papers. Those attempting the perilous wilderness crossing now routinely Find themselves without access to water, Food, or rescue; thousands of people without papers have since perished in the vast deserts and rugged brushlands oF the US southwest.
    [Show full text]
  • Approaching Border Security from a Complexity Theory and Systems Perspective
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2012-12 Border cracks: approaching border security from a complexity theory and systems perspective Schwan, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/27901 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE by Michael J. Schwan December 2012 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: Harold A. Trinkunas Approved for public release; distribution is unlimited Reissued 21 Mar 2013 to correct advisor’s name on cover page. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2012 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE 6.
    [Show full text]
  • SC70 Doc. 69.2
    Original language: English SC70 Doc. 69.2 CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA ____________________ Seventieth meeting of the Standing Committee Rosa Khutor, Sochi (Russian Federation), 1-5 October 2018 Reports of regional representatives ASIA 1. This document has been submitted by Kuwait. 2. General information: Regional Representative: Chain, Indonesia, Kuwait Alternate Regional Representative: Japan, Nepal, Republic of Korea Number of Parties in the Region: 38 Parties providing information for this Report: Afghanistan, Bahrain, China, Indonesia, Iraq, Japan, Kuwait, Lao People's Democratic Republic, Malaysia, Philippines, Saudi Arabia, Singapore, Syrian Arab Republic, United Arab Emirates, and Yem en 3. Introduction: This report summarized the activities of Parties between 69th Standing Committee Meeting (November 2017, Rosa Khutor) and 70th Standing Committee Meeting (October 2018, Rosa Khutor, Sochi). 4. Activities within each party 4.1 Afghanistan: 1.Participation in CITES meeting None 2.Cooperation with the parties and other None 3.Implimentation of CITES, including conservation, legislation and law enforcement activities a.Wild Animal Protection and hunting regulation law Afghanistan developed Wild Animal Protection and hunting regulation law, this law is currently drafted, on September, 2018 Afghanistan conducted more from three coordination meeting with relevant organization, asspacilly Ministry of agriculture irrigation and water regarding specification of National Environmental SC70 Doc. 69.2 – p. 1 Protection Agency (NEPA) and Ministry of Agriculture irrigation and livestock (MAIL) role in the implementation of this law to finalize as soon as possible. After adoption of this law, Afghanistan will be able to regulate wild animal illegal hunting, trapping and preventing the extinction of endangered species b.
    [Show full text]
  • COVER STORY Stopping Foreign Terrorist Fighters – Can API and PNR Play a Part? Strategic Partner
    Official Magazine of MAY / JUNE 2018 www.worldsecurity-index.com FEATURE: FEATURE: FEATURE: An Integrated Approach The Predator’s View: The World’s Biggest Marketplace Used in Nuclear Security Imperative for Critical Selling Internet Paralysing can be Adapted for Infrastructure Resilience DDOS Attacks Taken Down Protecting Critical National PAGE 14 PAGE 19 Infrastructure PAGE 9 COVER STORY STOPPING FOREIGN TERRORIST FIGHTERS – CAN API AND PNR PLAY A PART? Strategic Partner: In Partnership with: 17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, Kuching, Sarawak, Malaysia www.cip-asia.com ONE-DAY SPECIALIZED TRAINING COURSE brought to you by: further details at Developing resilient infrastructure www.cip-asia.com for a secure future Expert Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, securing Asia. Philippines – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece Kuching, Sarawak, Malaysia on 17th-19th July 2018.
    [Show full text]
  • The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019
    The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019 19 Letter from Second Place: the Editor "Historical Elisabeth Mirrorism" Siegel Trinh Truong First Place: "Importing Arms, Exporting the Revolution" 38 Rosa Shapiro- Third Place: Thompson "A Transcript from Nature" 54 Oriana Tang Crossword Contest 56 Honorable Mention: "Developing 72 Socially Honorable Conscious Mention: Curricula "Reverse for Somali Cap-and- Schools" Trade for Refugees" Noora Reffat Jordan Farenhem 1 EDITOR-IN-CHIEF Putt Punyagupta Andrew Song Elisabeth Siegel Staff Zhen Tu Will Waddingham MANAGING EDITORS Jake Mezey GRAPHIC DESIGN Qusay Omran Elisabeth Siegel Lauren Song ASST. MANAGING EDITOR Mary Orsak Max Krupnick Numi Katz Leila Iskandarani OUTREACH COORDINATORS STAFF Juanita Garcia Coco Chai Tyler Jager Chase Finney Leila Iskandarani SENIOR EDITORS Tasnim Islam Max Krupnick Henry Suckow-Ziemer Alayna Lee Muriel Wang Joon Lee Jack McCordick EDITORS Mary Orsak Katrina Starbird Jorge Familiar-Avalos Juanita Garcia Ariana Habibi CONTRIBUTORS Tyler Jager Jordan Farenhem Numi Katz Noora Reffat Brandon Lu Rosa Shapiro-Thompson Deena Mousa Oriana Tang Minahil Nawaz Trinh Truong Sam Pekats ACHESON PRIZE JUDGING PANEL Ana de la O Torres, Associate Professor of Political Science Isaiah Wilson (Colonal, U.S. Army, ret.), Senior Lecturer at the Jackson Institute for Global Affairs Clare Lockhart, Director and co-Founder of the Institute for State Effectiveness & Senior Fellow at the Jackson Institute for Global Affairs Julia Adams, Professor of Sociology and International and Area Studies & Head of Grace Hopper College 2 Dear Reader, You might notice that we look a little different. Welcome to the brand new YRIS redesign, arriving just in time for my favorite issue of the year: the Acheson Prize Issue.
    [Show full text]
  • Transgovernmental Networks As a Tool to Combat Terrorism
    TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Global Affairs written under the direction of Dr. Norman Samuels Ph.D: Professor and Provost Emeritus and approved by Newark, New Jersey January 2010 ABSTRACT OF THE DISSERTATION TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE Dissertation Director: Dr. Norman Samuels Ph.D.: Professor and Provost Emeritus Globalization has led to a shift in the perceived threat to security from states to trans- border issues such as financial collapse, global warming, pandemics and threats from a variety of non-state actors. As a result of the terrorist attacks on New York, Bali, Madrid, London and Mumbai; international terrorism has become one of the most highly visible of these new threats. One mechanism of global governance employed to combat this threat is the use of transgovernmental networks comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts. These networks are the foundation of a strategy of confronting “networks of terror with networks against terror.” This research seeks to understand how these networks operate to achieve their mission. The literature relating to transgovernmental networks and transnational advocacy networks (TANs) suggests that these two network types share numerous characteristics. These similarities led to the development of the hypothesis that transgovernmental networks operate to accomplish their missions in much the same way as TANs operate.
    [Show full text]
  • Malaysia 2020 Tobacco Industry Interference Index
    MALAYSIA 2020 TOBACCO INDUSTRY INTERFERENCE INDEX Background and Introduction Over the past four years, Malaysia has not made any progress in implementing Article 5.3 guidelines of the WHO Framework Convention on Tobacco Control (FCTC) and is faring poorly in protecting public health policies from interference from the tobacco industry (TI). The findings of this annual TI Interference Index show there is a further deterioration in Malaysia. British American Tobacco (BAT) Malaysia, Japan Tobacco International (JTI) and Philip Morris Malaysia control 97 percent of the cigarette market.1 BAT is the dominant tobacco company controlling about 58 percent of the cigarette market share. In 2017, BAT shut down its cigarette manufacturing facility in Petaling Jaya, citing increasing contraband cigarettes in Malaysia and a challenging business environment as its reasons. However just one year later, in October 2018, BAT opened a new manufacturing facility in Johor stating it can leverage on the proximity for better management of materials, machinery parts as well as resources. Malaysia still provides an attractive investment environment for the tobacco business. In 2019, BAT claimed it will lay off about 20 percent of its workforce in Malaysia, citing among its reasons tax-led price increase which led to high illicit cigarette trade.2 This report uses the questionnaire developed by the Southeast Asia Tobacco Control Alliance based on the Article 5.3 Guidelines. Information used in this report is obtained from the public domain. A scoring system is applied to make the assessment. The score ranges from 0 - 5, where 5 indicates highest level of industry interference, and 1 is low or no interference.
    [Show full text]