Transgovernmental Networks As a Tool to Combat Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Transgovernmental Networks As a Tool to Combat Terrorism TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Global Affairs written under the direction of Dr. Norman Samuels Ph.D: Professor and Provost Emeritus and approved by Newark, New Jersey January 2010 ABSTRACT OF THE DISSERTATION TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE Dissertation Director: Dr. Norman Samuels Ph.D.: Professor and Provost Emeritus Globalization has led to a shift in the perceived threat to security from states to trans- border issues such as financial collapse, global warming, pandemics and threats from a variety of non-state actors. As a result of the terrorist attacks on New York, Bali, Madrid, London and Mumbai; international terrorism has become one of the most highly visible of these new threats. One mechanism of global governance employed to combat this threat is the use of transgovernmental networks comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts. These networks are the foundation of a strategy of confronting “networks of terror with networks against terror.” This research seeks to understand how these networks operate to achieve their mission. The literature relating to transgovernmental networks and transnational advocacy networks (TANs) suggests that these two network types share numerous characteristics. These similarities led to the development of the hypothesis that transgovernmental networks operate to accomplish their missions in much the same way as TANs operate. To test this hypothesis, a single case study design was utilized to examine how one agency, U.S. Immigration and Customs Enforcement (ICE), utilizes its officers assigned to foreign jurisdictions as part of a transgovernmental network to combat terrorist travel. The research revealed that these officers are not only part of a transgovernmental network that operates to prevent terrorist travel, as well as other transnational crimes, in much the same way as TANs, but also mirrors the structure of the terrorist networks they are charged with combating. Furthermore, a foundation has been laid for continued investigative research of transgovernmental networks; while providing a potential blue print for a strategy of combating threats to global security with networks of government officials that are as fluid and effective as the groups that are posing these threats. ii Preface On September 11, 2001, I was working as an inspector for U.S Immigration and Naturalization Service at Newark International Airport. That morning, I was assigned to the International Arrivals Area of Terminal B. The far wall of the terminal was made up of large windows that overlooked the runways and beyond that, the New York skyline. It was through those windows and the various television monitors that were scattered throughout the area that I watched in disbelief with my fellow inspectors, airline representatives and passengers, who arrived to the United States just moments earlier, as the events of that morning unfolded and the New York skyline changed forever. In the months that followed, as more details about the attacks and those who carried them emerged, my emotions changed from shock and anger to a sense of failure and guilt. As an Immigration Inspector, I was entrusted to protect the citizens of the United States from individuals like those terrorists who had carried out the September 11 attacks and I had failed. These emotions created these need for me to understand how these terrorists were able to enter the United States and what steps could be taken to prevent others like them from gaining entry into the United States in the future. My original inquires into the topic were informal but rather than satisfying my appetite, it left me wanting more. I knew I had to pursue my quest for knowledge in a more formal manner. When I completed my Master’s degree in 1998, I had planned to return to school to complete a doctorate as some point. What I lacked was both the opportunity and the motivations. Now I had the motivation and in 2004, Rutgers University provided me the iii opportunity. While studying within the Rutgers’s Division of Global Affairs, I quickly learned that terrorism was far from the only security threat facing the world. Those threats that existed during the cold war remained and were now compounded by new threats such as; violent and criminal non-state actors, global warming, financial collapse and pandemics. I also discovered that these new threats were not just dealt with through traditional means of international relations between states, but rather a wide array of tools of global governance. As a government official who regularly interacted with officials from other nations, it was the governance mechanism of transgovernmental networks that I identified with most, and, despite the various other threats to security, terrorism as remained my primary interest. It is the merging of these two interests that has led to this dissertation. Despite my name appearing on the title page, I am far from the only contributor to this project. Over the past five plus years I have had the pleasure of working with and studying with some wonderful people. Through their support, their knowledge, expertise or their encouragement, they too have made significant contributions to this dissertation. In pursuit of my research special recognition needs to be given to both current and former members of Rutgers University’s Division of Global Affairs. Dr. Rey Koslowski, who served as my faculty advisor and mentor when I first return to Rutgers in 2004, whose knowledge in the areas of immigration, governance and border security was the foundation on which I built my studies. My dissertation advisor, Dr. Norman Samuels, whose knowledge in the areas of terrorism and intelligence were invaluable; and who was able to guide me through storms while helping me stay focused towards my goal. My dissertation committee; Dr Yale H. Ferguson, Dr. Leslie Kennedy and Prof. Richard iv Langhorne, whose guidance and knowledge have not only contributed to this dissertation, but have made immeasurable contributions to their fields as well. Professionally, there are countless people from U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, and officials from various foreign agencies that have contributed to this dissertation in some small way. There are others without whose help this dissertation would have never been written. Dr John E. Thompson, District Director with U.S Citizenship and Immigration Service; who provided me the opportunity and the encouragement to return to school. George Pasiakos, my friend and colleague; whose passion for researching terrorism always added fuel to my fire. Doulas Henkel, Assistant Field Office Director of ICE’s Newark Field Office; who has assisted me in my scholarly pursuits for over a decade and half long. Raymond R. Parmer, Director of ICE’s Office of International Affair; for not only allowing his officers to participate, but also assisting in the data collection. Finally, the ICE attachés stationed around the global; without their participation this research could not have occurred. In my personal life there are many people, including my friends and family, who have also contributed to this dissertation. Special thanks go out to my parents, Michael and Louise Cozine, who instilled in me a love of learning. My beautiful wife Nancy, without whose love and support none of this would be possible. Finally, to my dear friend and colleague Patrizia “Pat” Sandri-Thomson; who was the former Migration Integrity Officer at the Consulate General of Canada in New York. She was taken from this world much too soon but not before she touched every life she encountered. She v taught me more could be accomplished with a smile and a kind word then ever could with a badge and a gun. She was the inspiration for this dissertation. vi Dedication For Nancy, Jack and Delaney, you are a constant reminder of what is really important. vii Table of Contents PREFACE: iii INTRODUCTION: 1 CHAPTER ONE: A WORLD OF NETWORKS 15 CHAPTER TWO: TERRORIST TRAVEL METHODS 60 CHAPTER THREE: INTERNATIONAL BORDERS AFTER 9/11 98 CHAPTER FOUR: RESEARCH DESIGN AND METHODS 133 CHAPTER FIVE: RESEARCH RESULTS 161 CHAPTER SIX: DATA ANALYSIS 195 CONCLUSION 215 BIBLIOGRAPHY 230 APPENDICES 239 viii 1 INTRODUCTION: Since the Treaties of Westphalia marked the birth pangs of the state system, the primary perceived security threat to states has come from other states. With globalization, this security threat has shifted from states to trans-border issues such as financial collapse and global warming, pandemics and threats from a variety of non-state actors. The barriers lifted by the end of the Cold War and the openness of globalization has created an environment in which the illegal trade of drugs, arms, intellectual property rights and money is booming, and has allowed for terrorist organizations to operate globally as well. Governments, in an attempt to control these illicit markets and harmful organizations, are pitted not against the armies and navies of another nations, but stateless and resourceful networks that have no central government that can be engaged (Naim 2003: 29). As a result of the attacks on New York, Bali, Madrid, London and Mumbai, international terrorism has become a highly visible new threat. The Threat of Non-state Actors to Security The globalized world seems to continually shrink to a point where time and space are less and less important. Advancement and innovation in shipping allow for goods to be loaded onto ships, cross vast oceans, and then be unloaded and delivered to markets in days.
Recommended publications
  • Rm7bll Yearly Smuggling
    Headline Ahmad Zahid M'sia loses RM7bil yearly due to smuggling activities at borders MediaTitle New Sabah Times English (KK) Date 18 Sep 2015 Language English Circulation 17,182 Readership 51,546 Section Home Color Black/white Page No 5 ArticleSize 245 cm² AdValue RM 524 PR Value RM 1,572 Ahmad lahid: M'sla loses RM7bll yearly due to smuggling activities at borders SINTOK: Deputy Prime "Min­ Home Minister, stressed that no a year due to the porous national ister Datuk Seri Ahmad Zahid new allocation or posts would be borders, including losses oh sub­ Hamidi yesterday announced created via the upgrading, but he sidised goods. that the Smuggling Prevention promised to reward the agency's He said goods worth RM38 Unit (UPP) would be upgraded officers and staff who exhibited million were seized from January into a Border Security Agency. excellent performance. to August this year by the UPP, He said the new entity ift­ "Believe me that when up by more than 100 per cent volving three core agencies, seizures of goods, smuggling of from RM18 million in 2014 and namely, the Royal Malaysian Po­ persons and human trafficking RM17 million in 2013. lice, Immigration Department can be reduced, there will be In this regard, Ahmad Zahid and Royal Malaysian Customs some reward which I will give as said collaboration among the en­ Department would also involve forcement agencies must be incentive. This is my promise. several other enforcement agen­ strengthened, including translat­ cies, as value added. "Change the approach, don't ing the National Blue Ocean ask first, but give first...no need "The policy paper on the pro­ to wait for a reward to motivate Strategy to avoid narrow think­ posal has been prepared and will ing.
    [Show full text]
  • A Person Born in Puerto Rico on October 4, 1931, of a Native-Born
    Interim Decision #1280 MATTER OF MAT1TRANA In DEPORTATION Proceedings A-10582918 Decided by Board April12,1963 A person born in Puerto Rico on October 4, 1931, of a native-born Spanish citizen father and a Cuban citizen mother who came to Puerto Rico in 1913 and 1922, respectively, who, shortly after birth, was -taken by her parents to Spain where she resided until her entry at San Juan, P.R., on May 17, 1957, was issued a national document of identity as a Spanish citizen in 1952 and was issued a Spanish passport, was a national or citizen of Spain at birth under the pro- visions of Article 17 of the Civil Code of Spain, as amended by the Act of De- cember 9, 1931; therefore, she did not acquire United States citizenship under the provisions of section 5b of the Act of March 2, 1917, as amended by the Act of June 27, 1934, since she was a citizen or national of a foreign power (Spain) residing abroad permanently on June 27, 1934. CHARGE : Order: Act of 1952—Section 241(a) (1) [8 U.S.C. 1251(a) (1)]—Excludable at time of entry under section 212(a) (20) [8 U.S.O. 1182 (a) (20) ; immigrant, no Tine. The case comes forward on appeal from the order of the special in- quiry officer dated November 6, 1962 finding the respondent to be an alien and ordering that she be deported to Spain on the charge con- tained in the order to show cause. The facts of the case are not in dispute.
    [Show full text]
  • Cost to Renew Nz Passport in Australia
    Cost To Renew Nz Passport In Australia Ripley is biyearly and empathizing loosest while anticonvulsant Ellis shalwar and surname. Hallucinogenic and triethyl Leonidas always accomplishes funny and prove his greige. Hermann is indicial and brunch gramophonically while nebulous Pepillo westers and alternates. Anyone travelling to New Zealand including New Zealand and Australian citizens must have same valid passporttravel document when entering New Zealand. Zealand and Canada viewed passports as well cost recovery exercise. 10-year passports back put a price NZ Herald. Are in to nz cost. Australian passport validity for travel Technically Australian passports are keep till their expiry date. To leaving New Zealand a passport valid defence at only one month project the intended hijack of hill is required by. Apply issue renew now than then their particular New Zealand dependent visa. You should fear for an Employment Visa along both a copy of the average letter stating the smash of internship. OCI MISCELLANEOUS, etc, therein. The nz for! This visa endorsement of professional passport and innovation visas are valid student visa application centre and cannot be no requirement, passport to cost renew nz in australia you from the application fee? PHOTOS Two Australian and New Zealand passport size recent. What documents should I realize while travelling to India? Adult may well find Child applications. Do you say a visa and passport for New Zealand. Can renew in australia. The South African Passport and Travel Documents Act of 1994 regulates the. The backup of this maple in your browser is voluntary from the version below. For australia to renew a general and hand they may check your passport? If i reapply for in to cost renew passport? New travel rules and levy for New Zealand Education NZ.
    [Show full text]
  • Business PAGE 9 Vol 6, Issue 1
    U.S. Customsrontline and Border Protection H Vol 6, Issue 1 CBP gets America Back to Business PAGE 9 Vol 6, Issue 1 CONTENTS H COVER STORY 9 Business Unusual When Mother Nature strikes or other major events disrupt normal border operations, CBP’s business recovery program keeps traffic flowing and protects the U.S. economy. 9 H FEATURES 18 Riding Shotgun in the Arizona Skies Specially trained Border Patrol agents and CBP officers accompany Air and Marine pilots as supplemental air crew members. 22 Transformation at Land Border Ports of Entry 18 CBP’s land border ports of entry now benefit from improved technologies and resource optimization. 22 H DEPARTMENTS H ON THE COVER 2 CBP In Photos 36 CBP History The Ambassador Bridge, connecting Detroit with Windsor, Canada, is North 4 Around the Agency 40 Border Busts America’s busiest commercial international border crossing. During fiscal year 2012, 28 In Focus 42 Resources an average of $136 million of cargo CBP In The Spotlight crossed the bridge into the U.S. each 34 day or $5.7 million of cargo each hour. Cover photo by Lisa Przybyla CELEBRATING THE CAREER OF DAVID V. AGUILAR 2 H CBP IN PHOTOS H ACTING COMMISSIONER RETIRES AFTER 34 YEARS OF DISTINGUISHED SERVICE Frontline VOL 6, ISSUE 1 SECRETARY OF HOMELAND SECURITY Janet Napolitano ACTING COMMISSIONER, U.S. CUSTOMS AND BORDER PROTECTION THOMAS S. WINKOWSKI ASSISTANT COMMISSIONER, OFFICE OF PUBLIC AFFAIRS Melanie Roe EDITOR Laurel Smith MANAGING EDITOR Jason McCammack CONTRIBUTING EDITORS Susan Holliday Marcy Mason PRODUCTION MANAGER Tracie Parker PHOTOGRAPHERS James R.
    [Show full text]
  • Golden Visas: a Roundup of Economic Residencies Around the World
    A REPORT FROM SOVEREIGNMAN.COM GOLDEN VISAS: A ROUNDUP OF ECONOMIC RESIDENCIES AROUND THE WORLD A BLACK PAPER GOLDEN VISAS: A A ROUNDUP OF ECONOMIC RESIDENCIES BLACK AROUND THE WORLD PAPER CONTENTS What is a golden visa? ......................................................................................................4 Is a golden visa right for you? ...........................................................................................5 What asset class should you invest in and what are the risks? .............................................6 Programs that we did not include .....................................................................................9 Part I. European golden visas ..........................................................................................10 European golden visas summary table .............................................................................12 Portugal .....................................................................................................................13 Spain .........................................................................................................................19 Cyprus .......................................................................................................................24 Greece .......................................................................................................................29 Malta .........................................................................................................................34
    [Show full text]
  • Border Security
    BORDER SECURITY REPORT VOLUME 14 FOR THE World’s border prOTECTION, MANAGEMENT AND SECURITY INDUSTRY MAY / JUNE 2019 POLICY-MAKERS AND PRACTITIONERS COVER STORY BREXIT WILL PUSH UK BORDERS TO THE BRINK… UNLESS WE GET SMARTER WITH data SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS Border Threat Detection A global review of the South Asia: Case of Least Latest news, views and – The Path to Artificial latest news and challenges Connected Borders p.18 innovations from the Intelligence p.14 from border agencies and industry. p.30 agencies at the border. p.20 2 COMMENT contacts Every Cloud Has a Silver Lining Editorial: They say every cloud has a silver lining, when it comes to the movement of Tony Kingham but you would be hard pushed to goods, big questions remain. Such as; E: [email protected] convince anyone in the UK that the how does technology really help with Assistant Editor: Brexit cloud has one right now. Political the import and export of agricultural Neil Walker deadlock in parliament means we are goods and foodstuffs, which of course E: [email protected] no closer to a deal and the recent poor need inspections if regulations don’t showing by the established parties match. And no matter how much Design, Marketing & Production: in the European elections is likely to the UK spends on technology and Neil Walker result in a harder line from any future whatever systems it puts in place, to E: [email protected] Conservative Prime Minister, making a work effectively that technology and Subscriptions: hard Brexit much more likely.
    [Show full text]
  • Border Wars the Arms Dealers Profiting from Europe’S Refugee Tragedy
    BORDER WARS THE ARMS DEALERS PROFITING FROM EUROPE’S REFUGEE TRAGEDY Mark Akkerman Stop Wapenhandel www.stopwapenhandel.org Border wars | 1 AUTHOR: Mark Akkerman EDITORS: Nick Buxton and Wendela de Vries DESIGN: Evan Clayburg PRINTER: Jubels Published by Transnational Institute – www.TNI.org and Stop Wapenhandel – www.StopWapenhandel.org Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images should be based on the copyright terms of the original source. http://www.tni.org/copyright ACKNOWLEDGEMENTS Thanks to Corporate European Observatory for some of the information on arms company lobbying. Border wars: The arms players profiting from Europe’s refugee crisis | 2 CONTENTS Executive Summary 1 Introduction: the EU war on immigration 3 Fueling the refugee tragedy: EU arms exports 6 EU response to migration: militarising the borders 9 – ‘Fighting illegal immigration’ – EUNAVFOR MED – Armed forces at the borders – NATO assistance – Border fences and drones – From Frontex to a European Border and Coast Guard Agency – Externalizing EU borders – Deal with Turkey – Selling militarisation as a humanitarian effort Lobbying for business 17 – Lobby organisations – Frontex and industry – Security fairs as meeting points EU funding for border security and border control 25 – Funding for (candidate) member states – Funding third countries’ border security – EU Research & Technology funding – Frontex funding for research – Future prospects for security research Which companies profit from border security? 34 – Global border security market – Frontex contracts – Major profiting companies – Detention and deportation Conclusion 43 EXECUTIVE SUMMARY The refugee crisis facing Europe has caused consternation in the corridors of power, and heated debate on Europe’s streets.
    [Show full text]
  • Connected Policing Framework White Paper Transforming Policing Through Technology
    A Microsoft Government Connected Policing Framework White Paper Transforming Policing Through Technology Published for the APCO-APA 2008 International Policing and Summer Conference The Microsoft Connected Policing Framework The Microsoft® Connected Policing Framework is the result of work between Microsoft, specialist partners and many public safety, law enforcement and judicial organizations to build solutions, technologies and services that assist in integrated and collaborative policing to combat crime and assist with citizen safety. We reuse this collective “Know-How” to share and reuse international best practices in areas such as combating cyber crime with innovative intelligence and investigation solution architectures. IMPROVED OUTCOMES FOR CITIZEN SAFETY AND SECURITY INFORMATION CHANNELS ITERATIVE FIRE POLICE JUSTICE INTELLIGENCE INTERNAL SERVICES SECURITY CYCLE EMERGENCY RESPONSE ER CASE & RECORDS MANAGEMENT INTEGRATED JUSTICE PLAN PARTNER SOLUTIONS PARTNER INTELLIGENCE & INVESTIGATION TRANSPORT & BORDER CONTROL CRITICAL INFRASTRUCTURE PROTECTION E-POLICING (CSP, PORTAL & CRM) PROCESS APPLICATION PLATFORM BLUEPRINTS GUIDES ORGANIZATIONAL PRODUCTIVITY REFERENCES REUSABLE IP INFRASTRUCTURE CORE INFRASTRUCTURE e.g. MIF PROGRESS PRIVACY ACCESSIBILITY USABILITY SECURITY/ID STANDARDS INTEROP POLICY CITIZENSHIP INITIATIVES (CETS & DART) REVIEW Contents Introduction 4 1.0 Public Safety 5 1.1 Emergency and disaster response 5 1.2 Crime and DisorderReduction Strategies 9 1.3 E-policing 10 1.4 Microsoft Citizen Service Platform 13 2.0
    [Show full text]
  • The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone
    The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman Dissertation submitted in partial FulFillment oF the requirements For the degree oF Doctor of Philosophy in the Graduate School of Duke University 2016 ABSTRACT The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman An abstract oF a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor oF Philosophy in the Graduate School oF Duke University 2016 Copyright by Sophie Smith 2016 Abstract The Hole in the Fence examines the design and efFects oF the contemporary border security regime. Since 1994, the growth oF military-style policing in the lands between the US and Mexico has radically reshaped the path oF illicit transnational migration. Newly erected walls, surveillance technology, and the stationing oF an army oF Federal agents in the border territory do not serve to seal oFF the national boundary. Border security rather works by pushing undocumented migration traFFic away From urban areas and out into protracted journeys on foot through the southwest wilderness, heightening the risks associated with entering the US without papers. Those attempting the perilous wilderness crossing now routinely Find themselves without access to water, Food, or rescue; thousands of people without papers have since perished in the vast deserts and rugged brushlands oF the US southwest.
    [Show full text]
  • Approaching Border Security from a Complexity Theory and Systems Perspective
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2012-12 Border cracks: approaching border security from a complexity theory and systems perspective Schwan, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/27901 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE by Michael J. Schwan December 2012 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: Harold A. Trinkunas Approved for public release; distribution is unlimited Reissued 21 Mar 2013 to correct advisor’s name on cover page. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2012 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE 6.
    [Show full text]
  • SC70 Doc. 69.2
    Original language: English SC70 Doc. 69.2 CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA ____________________ Seventieth meeting of the Standing Committee Rosa Khutor, Sochi (Russian Federation), 1-5 October 2018 Reports of regional representatives ASIA 1. This document has been submitted by Kuwait. 2. General information: Regional Representative: Chain, Indonesia, Kuwait Alternate Regional Representative: Japan, Nepal, Republic of Korea Number of Parties in the Region: 38 Parties providing information for this Report: Afghanistan, Bahrain, China, Indonesia, Iraq, Japan, Kuwait, Lao People's Democratic Republic, Malaysia, Philippines, Saudi Arabia, Singapore, Syrian Arab Republic, United Arab Emirates, and Yem en 3. Introduction: This report summarized the activities of Parties between 69th Standing Committee Meeting (November 2017, Rosa Khutor) and 70th Standing Committee Meeting (October 2018, Rosa Khutor, Sochi). 4. Activities within each party 4.1 Afghanistan: 1.Participation in CITES meeting None 2.Cooperation with the parties and other None 3.Implimentation of CITES, including conservation, legislation and law enforcement activities a.Wild Animal Protection and hunting regulation law Afghanistan developed Wild Animal Protection and hunting regulation law, this law is currently drafted, on September, 2018 Afghanistan conducted more from three coordination meeting with relevant organization, asspacilly Ministry of agriculture irrigation and water regarding specification of National Environmental SC70 Doc. 69.2 – p. 1 Protection Agency (NEPA) and Ministry of Agriculture irrigation and livestock (MAIL) role in the implementation of this law to finalize as soon as possible. After adoption of this law, Afghanistan will be able to regulate wild animal illegal hunting, trapping and preventing the extinction of endangered species b.
    [Show full text]
  • COVER STORY Stopping Foreign Terrorist Fighters – Can API and PNR Play a Part? Strategic Partner
    Official Magazine of MAY / JUNE 2018 www.worldsecurity-index.com FEATURE: FEATURE: FEATURE: An Integrated Approach The Predator’s View: The World’s Biggest Marketplace Used in Nuclear Security Imperative for Critical Selling Internet Paralysing can be Adapted for Infrastructure Resilience DDOS Attacks Taken Down Protecting Critical National PAGE 14 PAGE 19 Infrastructure PAGE 9 COVER STORY STOPPING FOREIGN TERRORIST FIGHTERS – CAN API AND PNR PLAY A PART? Strategic Partner: In Partnership with: 17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, Kuching, Sarawak, Malaysia www.cip-asia.com ONE-DAY SPECIALIZED TRAINING COURSE brought to you by: further details at Developing resilient infrastructure www.cip-asia.com for a secure future Expert Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, securing Asia. Philippines – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece Kuching, Sarawak, Malaysia on 17th-19th July 2018.
    [Show full text]