Fourth International Meeting of High Level Officials Responsible for Security, Vladivostok, 2013

SCRF chief meets with Serbia leaders

13:50 20/06/2013

MOSCOW, June 20 (Itar-Tass) – Nikolai Patrushev, Secretary of the Security Council of the Russian Federation (SCRF), and the leadership of Serbia have discussed trade-and-economic relations between the two countries and international security problems of current concern, including the situation in Syria, Afghanistan, and ABM development-related matters.

The SCRF press service reports that Patrushev, leading a Russian inter-agency delegation, on Wednesday met with Serbian President Tomislav Nikolic, Ivica Dacic, Premier and Minister of the Interior, as well as Aleksandar Vucic, First Vice-Premier and Minister of Defence.

"At Wednesday’s talks, the sides discussed the state of and prospects for Russia-Serbia relations, and exchanged views on the most topical international and regional security problems, including the situation in Syria, Afghanistan, and ABM-related matters. Special emphasis was laid on the development of trade-and-economic relations, specifically large-scale financial and infrastructure projects being implemented through the OAO RZD (railways) and Sberbank (savings)," an SCRF press service official pointed out.

Those present at the meeting also considered prospects for interaction in the fields of fuel and power, military and technical military cooperation, ways to step up work and information exchanges through law enforcement agencies and special services.

"Serbian Head of Government Ivica Dacic accepted with gratitude an invitation extended by the SCRF Secretary to attend the 4th international meeting of high officials who are in charge of security affairs; the international meeting is due to be held in July 2013 in Vladivostok," the press service official added.

 

Yury Fedotov

Director General/Executive Director

Remarks by UNODC Executive Director Yury Fedotov at the International Meeting of High-Level Officials Responsible

for Security Matters

Vladivostok, 3 July 2013

 

Excellencies, Ladies and Gentlemen

Money laundering and illicit financial flows are global problems of an astounding scale.

According to research by UNODC, these flows amounted to 1.6 trillion US dollars in 2009.

That is 2.7% of the global GDP.

Money laundering makes crime possible and profitable. It is critical to the operation of virtually every form of transnational and organized crime.

Let us take, for example, a recent case in the headlines. Liberty Reserve is an online cash transfer business. It has been accused of laundering 6 billion US dollars over seven years of operation.

The case is ongoing, and I do not wish to comment on the particulars. But it is striking to note the range of illicit activities that the US prosecutors say were supported by this digital financial infrastructure.

Drug trafficking. Child pornography. Cybercrime. Credit card theft. Investment fraud.

Such crimes exploit our globalized economy. Money laundering enables the criminals to bring the proceeds out into the open.

By layering illicit funds through complex mechanisms, criminals can disguise their origins, enabling them to openly enjoy the benefits of their ill-gotten assets.

These funds can then be used to finance terrorist activities and to commit further acts of crime.

Such acts can fuel conflicts and instability, and are a hindrance to development. They impact on a country’s good governance, and hurt the reputations of financial systems.

Understanding the scale and nature of these illicit financial flows is therefore critical to shutting down organized crime groups and traffickers.

However, this is no easy task. Money laundering often involves a series of multiple, complex transactions. Criminals use sophisticated means, online and offline, to hide their tracks.

Effective legislation on anti-money laundering and countering the financing of terrorism is needed. That way the integrity of financial institutions can be protected, illicit financial flows can be investigated, and the criminals prosecuted and permanently deprived of the proceeds of their crimes.

Anti-money laundering is a key component of UNODC’s mandate under the UN conventions on drugs, organized crime, corruption and the financing of terrorism.

The UN General Assembly, in several resolutions, has specifically tasked UNODC with delivering technical assistance in this area to Member States. This assistance is aimed at strengthening capacity to combat money laundering and the financing of terrorism in accordance with UN instruments and international standards.

This includes support for the development of effective and comprehensive national legal and regulatory frameworks. It also includes support for the institutions and practitioners needed to implement them.

In this regard, UNODC works with law enforcement agencies, Financial Intelligence Units and prosecutors.

Specific training courses and capacity building are offered through UNODC’s Vienna headquarters and UNODC field offices around the world. Initiatives focus, for example, on cash couriers and financial analysis for Financial Intelligence Units, as well as financial investigations and prosecution techniques.

Through this comprehensive approach, UNODC is helping to support national systems that can detect, seize and confiscate illicit proceeds.

We also work to promote coordination between these systems regionally and internationally. We must ensure that there are no weak points or gaps that can be exploited by criminals.

The nexus of drugs, crime, corruption and terrorism is complex and insidious. It affects every country and every economy.

There is therefore a clear need to strengthen international cooperation to combat money laundering if we are to address these threats.

Thank you.

Speech by Shri Shivshankar Menon, National Security Advisor, India

July 04, 2013

Your Excellencies, Distinguished Guests, Ladies and Gentlemen.
I wish to begin by thanking you, Mr. Patrushev, and the Russian government for your initiative in arranging this important international meeting, which has now established itself in the calendar as a meeting that we all look forward to, for your hospitality, and for the importance and topicality of the discussions.
I will say a few words on cyber security.
Cyberspace is today the fifth domain of human activity, in addition to land, sea, air and outer space. During the last two decades, the Internet has grown exponentially in its reach and scope. Equally, our dependence upon cyberspace for social, economic, governance, and security functions has also grown exponentially. Unfettered access to information through a global inter-connected Internet empowers individuals and governments, and it poses new challenges to the privacy of individuals and to the capability of Governments and administrators of cyberspace tasked to prevent its misuse.
Our task is complicated by the unique characteristics of cyberspace. These include, as we are reminded every day: its borderless nature, both geographically and functionally; anonymity and the difficulty of attribution; the fact that for the present the advantage is with offense rather than defence; and, the relatively anarchic nature of this domain.
Let us consider each of these briefly.
Borderlessness
The anonymity and inter-connectivity of cyberspace are exploited by criminals, terrorists and even States to carry out identity theft and financial fraud, conduct espionage, disrupt critical infrastructures, facilitate terrorist activities, steal corporate information, and plant malicious software (malware) and Trojans which can be exploited in different ways.
Anonymity
Because of the anonymity and the difficulty in attribution, securing cyberspace against misuse by either State or non-State actors is a multi-dimensional challenge that requires concerted efforts on the part of all stakeholders. Cyber security involves securing our national Information Communication Networks and Critical Information Infrastructure, combating cyber crime and protection from cyber attacks. It involves threat monitoring, assessment, mitigation, risk management, forensics, hardening of systems and capacity building in terms of both technical as well as human resources. All these require technical advances to make it possible for us to be able to redefine anonymity so as to separate legitimate from other uses of cyberspace.
Offense and Defence
We have seen that there is an inextricable link between cyber crime, trans-national organized crime and cyber terrorism. Active actors range from ordinary individuals to cyber criminals, extremists, terrorists, social, and political groups. We have also seen that launching destructive cyber attacks costs little, but defending against such attacks is becoming increasingly expensive and complex. The increasing use of "cloud computing” models, and third party network based servers which form the "cloud”, has introduced new policy challenges such as defining jurisdictional boundaries for law enforcement, protecting privacy and civil liberties according to national laws, and liability in the event of a breach of security.
Anarchy: International and Governance Aspects
Different countries have different approaches to this issue, based on their national experience and perceived interests. We are each learning as we go. Fortunately we now see the beginnings of a common realization of the need to ensure security of cyberspace and to institutionalize safeguards for individuals and society against its misuse.
Given the inter-dependencies that are a characteristic of cyber space, the international community needs to make concerted efforts to secure cyberspace, which is a common resource. Many issues relating to cyber security have trans-national components and these challenges cannot be addressed by individual nations or in isolation. There is a self evident need for cooperation to exchange experiences and to share best practices for protection of information infrastructures.
There is a need to develop a common understanding on norms of State behavior in cyberspace. India would prefer norms derived from existing international legal frameworks relevant to the use of ICT. As a member of United Nations Group of Experts, India has worked with Russia and with other countries on the Group’s Report, which will be submitted to the UN General Assembly.
India supports democratic and representative Internet governance. International institutions that are invested with authority to manage or regulate the Internet need to be broad-based and internationalized if they are to make meaningful decisions on what is today a global commons.
India’s Experience
India is one of the major IT destinations in the world. We have the third largest number of Internet users after the USA and China. India has a Gen Y population, between the ages of 15 to 29 years, of approximately 310 million adept at using the Internet and social media networks. There are over 700 million mobile phones and about 670,000 km of optical fibre laid across the country. We add over 7 million new mobile phone connections every month. Such phenomenal growth in access to information and connectivity has added to our vulnerabilities.
The Government of India has recently approved a National Cyber Security Policy and a Framework to address cyber security concerns. This Framework envisages a multi-layered approach to ensure defence in depth and a clear delineation of functional responsibilities amongst stakeholders, while stressing coordination and sharing of real-time information. It also seeks to strengthen our assurance and certification framework to address supply-chain vulnerabilities, hardening networks, and promoting Research and Development in cyber security with an emphasis on capacity-building.
In July 2012 we established a Joint Working Group with representatives of Government departments and the private sector. The Report of this Joint Working Group contains a detailed roadmap for public-private partnership on cyber security, which includes the setting up of institutional frameworks, capacity building in the area of cyber security, development of cyber security standards and assurance mechanisms and augmentation of testing and certification facilities for IT products. This Joint Working Group is a standing body and has generated considerable enthusiasm in the private sector.
Conclusion
In ensuring cyber security, we have to be careful that the free flow and access to information is not hindered or compromised. There should be no doubt about our commitment to preserving the democratic nature of cyberspace which is one of its most enduring features. India is stoutly committed to freedom of expression, which includes freedom of expression in cyberspace. At the same time, we have to be concerned with securing our cyberspace for trusted e-commerce, security of data and protection of Critical Information Infrastructure. We have to guard against malicious activities of those who may seek to undermine our economies or disrupt social harmony. The imperatives of national security have thus to be balanced with protecting the privacy of individuals.
We in India look forward to working with the international community in finding this balance and in the task of keeping cyberspace secure and safe for all our citizens and societies.

http://www.mea.gov.in/Speeches-Statements.htm?dtl/21907/Speech+by+Shri+Shivshankar+Menon+National+Security+Advisor+at+Fourth+International+Meeting+of+High+Level+Officials+Responsible+for+Security+Vladivostok

Advertisements

About this entry