Spanish National Strategy against Organized and Serious Crime 2019-2023Vicente Corral
This new text revises and updates the previous strategy, whose validity framework extended from 2011 to 2014, and adapts to changes in certain criminal, technological, social and international aspects from an integral perspective. The new text will be the frame of reference for the State Security Forces and other public bodies to prevent and fight against the criminal phenomena that cause serious damage to society.
Spanish National Strategy against Organized and Serious Crime 2019-2023Vicente Corral
This new text revises and updates the previous strategy, whose validity framework extended from 2011 to 2014, and adapts to changes in certain criminal, technological, social and international aspects from an integral perspective. The new text will be the frame of reference for the State Security Forces and other public bodies to prevent and fight against the criminal phenomena that cause serious damage to society.
Proposal for a Regulation establishing the interoperability of EU informatio...Thierry Debels
The lack of interoperability between EU information systems impedes the work of authorised users (border guards, law enforcement officers, immigration officers, visa officials or judicial authorities). The fragmented architecture of data management for security, border and migration management, where information is stored separately in unconnected systems, can also lead to blind spots with implications for the EU's internal security. External border controls on persons are not as effective as they should be, to enable effective management of migration and to contribute to internal security. This is evidenced by the ongoing irregular border crossings into the EU, and an evolving threat to internal security as demonstrated by a series of terrorist attacks.
LOPD - Spanish ethical and legal issues in the context of an international IC...Natalia Monllor
Proposal of personal data management made in the context of an european project (from the AAL Joint Programme) where our main task was to develop a spanish pilot site to test some Ambient Assisted Technologies in a real elderly people.
Is it legal or illegal to use american cloud services in Europe?
Patricia Ayojedi presentation about the controversial between USA an Europe regarding cloud business.
Investigating The Swiss Justice System From Detectives Of SwitzerlandDetectivfrei
Federal and cantonal courts are both part of the Detektei Schweiz dual judicial system. The Federal Supreme Court, the highest court in the land, interprets federal legislation and ensures that it is consistently applied nationwide. The cantonal courts are responsible for resolving civil and criminal cases within their jurisdiction and enforcing cantonal statutes.
General comments regarding the document sent to the European Coordinator by the Spanish authorities: Comments in relation to our position on the, in our opinion, incomplete transposition of the European Directive 36/2011. In addition, it will make mention of the lack of data and the confusion of thereof.
Protecting rights at the canadian borderMy Consultant
The Canada Border Services Agency (subsequently referred to as “the agency”) is allowed to examine goods for customs purposes per paragraph 99(1)(a) of the Customs Act (R.S.C., 1985, c. 1 (2nd Supp.)). For the time being, the agency interprets the term “goods” to include digital devices and media. Even though a threshold for grounds to inspect devices is not determined, the current policy does not authorize routine examinations.
Summer School “The EU area of freedom, security and justice”, July 1-3, 2017
Jean Monnet Centre of Excellence, University of Macedonia, Thessaloniki, Greece
The Jean Monnet Centre of Excellence, in collaboration with the Jean Monnet Chair of the Democritus University of Thrace organize a summer school entitled “The EU area of freedom, security and justice”, that will take place in July 1-3, at the Conference Room of the University of Macedonia.
Obstacles to Investigators Using Electronic Information Technology in the Pro...AJHSSR Journal
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
Sitel, ETI A/S, “Lawful” interception in Spain and EuropeClaudio C.
Cuando se habla de interpretación legal o ilegal de comunicaciones (escucha activa) la mayoría de las veces, no es una cuestión de tecnología o si es por parte de gobierno o agentes de la ley o algo casero cuando si no de usar la evidencia en un juicio o en un tribunal. El problema es la falta de capacitación de todas las partes involucradas y la manía de dar todo por bueno por falta de comprensión de la tecnología que se utilizó para llevar a cabo la tarea, tecnología que no es magia sino algo inventado y bien documentado por los humanos. Al final, es seguridad a través de la oscuridad o inseguridad debido a la ignorancia. Esta charla explicará los métodos y tecnologías de intercepción legales e ilegales y proporcionará una lista de herramientas y pautas de auditoría para comprender mejor lo siguiente:
• Necesidad legal y proporcionalidad
• Prestación de asistencia razonable por parte de las operadoras
• Capacidades de intercepción existentes
• Intrusión colateral
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
Proposal for a Regulation establishing the interoperability of EU informatio...Thierry Debels
The lack of interoperability between EU information systems impedes the work of authorised users (border guards, law enforcement officers, immigration officers, visa officials or judicial authorities). The fragmented architecture of data management for security, border and migration management, where information is stored separately in unconnected systems, can also lead to blind spots with implications for the EU's internal security. External border controls on persons are not as effective as they should be, to enable effective management of migration and to contribute to internal security. This is evidenced by the ongoing irregular border crossings into the EU, and an evolving threat to internal security as demonstrated by a series of terrorist attacks.
LOPD - Spanish ethical and legal issues in the context of an international IC...Natalia Monllor
Proposal of personal data management made in the context of an european project (from the AAL Joint Programme) where our main task was to develop a spanish pilot site to test some Ambient Assisted Technologies in a real elderly people.
Is it legal or illegal to use american cloud services in Europe?
Patricia Ayojedi presentation about the controversial between USA an Europe regarding cloud business.
Investigating The Swiss Justice System From Detectives Of SwitzerlandDetectivfrei
Federal and cantonal courts are both part of the Detektei Schweiz dual judicial system. The Federal Supreme Court, the highest court in the land, interprets federal legislation and ensures that it is consistently applied nationwide. The cantonal courts are responsible for resolving civil and criminal cases within their jurisdiction and enforcing cantonal statutes.
General comments regarding the document sent to the European Coordinator by the Spanish authorities: Comments in relation to our position on the, in our opinion, incomplete transposition of the European Directive 36/2011. In addition, it will make mention of the lack of data and the confusion of thereof.
Protecting rights at the canadian borderMy Consultant
The Canada Border Services Agency (subsequently referred to as “the agency”) is allowed to examine goods for customs purposes per paragraph 99(1)(a) of the Customs Act (R.S.C., 1985, c. 1 (2nd Supp.)). For the time being, the agency interprets the term “goods” to include digital devices and media. Even though a threshold for grounds to inspect devices is not determined, the current policy does not authorize routine examinations.
Summer School “The EU area of freedom, security and justice”, July 1-3, 2017
Jean Monnet Centre of Excellence, University of Macedonia, Thessaloniki, Greece
The Jean Monnet Centre of Excellence, in collaboration with the Jean Monnet Chair of the Democritus University of Thrace organize a summer school entitled “The EU area of freedom, security and justice”, that will take place in July 1-3, at the Conference Room of the University of Macedonia.
Obstacles to Investigators Using Electronic Information Technology in the Pro...AJHSSR Journal
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
Sitel, ETI A/S, “Lawful” interception in Spain and EuropeClaudio C.
Cuando se habla de interpretación legal o ilegal de comunicaciones (escucha activa) la mayoría de las veces, no es una cuestión de tecnología o si es por parte de gobierno o agentes de la ley o algo casero cuando si no de usar la evidencia en un juicio o en un tribunal. El problema es la falta de capacitación de todas las partes involucradas y la manía de dar todo por bueno por falta de comprensión de la tecnología que se utilizó para llevar a cabo la tarea, tecnología que no es magia sino algo inventado y bien documentado por los humanos. Al final, es seguridad a través de la oscuridad o inseguridad debido a la ignorancia. Esta charla explicará los métodos y tecnologías de intercepción legales e ilegales y proporcionará una lista de herramientas y pautas de auditoría para comprender mejor lo siguiente:
• Necesidad legal y proporcionalidad
• Prestación de asistencia razonable por parte de las operadoras
• Capacidades de intercepción existentes
• Intrusión colateral
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
Test-Driven Developments are Inefficient; Behavior-Driven Developments are a ...Abdelkrim Boujraf
In summary, we have presented here a method for efficiently testing large parts of web-based software by using elements of code generation to generate automatable tests, and by using BDD concepts to model tests for non-generated screens and non-generated business actions. Further, we have described a method for context-based unit
testing that, when combined with generated code and tests, yields an acceptable trade-off between development efficiency and time spent on testing
ALT-F1.BE : The Accelerator (Google Cloud Platform)Abdelkrim Boujraf
The Accelerator is an IT infrastructure able to collect and analyze a massive amount of public data on the WWW.
The Accelerator leverages the untapped potential of web data with the first solution designed for diverse sectors,
completely scalable, available on-premise, and cloud-provider agnostic.
Google has released a robust Platform-as-a-Service called Google App Engine. It allows start-ups, firms or individuals to experience the scalable infrastructure Google uses to run its applications (e.g. Gmail, Google Docs, Google search engine).
The platform is named Google App Engine; it gives access to many programming languages, libraries, services and tools that facilitate the development of scalable and reliable applications on the Cloud.
ALT-F1 Google AppEngine-cloud-computing-v2.00
What you need to know about an IT experience - 2012-11-29 - universite-lilleAbdelkrim Boujraf
What you need to know about an IT experience - Talk given at the "Université de Lille 1 Sciences et Technologies USTL, 59650 Villeneuve-d'Ascq" (http://www.univ-lille1.fr)
Alt f1-rpt-2012-11-29 universite-lille
ALT-F1: Visualize Quantify Optimize Facility layout and planning using GE Bri...Abdelkrim Boujraf
Result of the GE Brilliant Manufacturing Hackathon: https://brilliantmanufacturing.devpost.com
We used Predix, Predix-UI, ALT-F1 Resources and AMIA Systems solutions: SIMOGGA Planner and SIMOGGA Layout Design
http://www.alt-f1.be
http://www.amia-systems.com
https://www.ge.com/digital/brilliant-manufacturing
The competition is fierce worldwide, companies compete with each other and the management focuses on the cost production while trying to keeping its energy footprint low.
SIMOGGA Solutions are built to Visualize, Quantify and Optimize the shop floor layout, the MRO processes as well the Warehouses.
We want to help companies keep the local employment produce, maintain & recycle locally
v0.06
Reduce CO2 Emission of the Civial Aviation - GE Digital - Predix.io - v3.03Abdelkrim Boujraf
OptimAviation Artificial Intelligence proposes to Aircraft #21 to slow down to let aircraft #13 land first.
POSITIVE IMPACT
Both aircrafts #13 and #21 consume less fuel
The airline industry complies with international treaties forcing the parties to reduce greenhouse emission
CONSEQUENCE
A rise of CO2 emission
High kerosene consumption
further info: www.alt-f1.be
StratEx, PMO EASILY & AFFORDABLY (SaaS and On-premise)Abdelkrim Boujraf
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions.
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions.
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
AMIA Systems help plant managers to visualize, quantify and optimize the layout of their production site, MRO site or Warehouse using SIMOGGA.
AMIA Systems works for several industries such as transportation, maritime, automotive, aerospace and defense: i.e. DAF Trucks (Automotive), Twin Disc (Machinery), TD Williamson (Oil & Energy), SNCB/NMBS (transportation), Sonaca (Aviation & Aerospace), NLMK (Mining & Metals), Tale Me (Textiles), FN Herstal (Defense & Space)
StratEx is a PMO solution that enables your teams to control, collaborate and deliver projects using your own processes and enforcing your conventions
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
StratEx is fully web-enabled and runs on any browser, tablet or mobile device
StratEx runs in the public cloud, in your private cloud or even on premise in your own data-center
StratEx embodies proven methods, based on experience from dozens of successful small and large scale projects performed by and for public or private companies
Business challenges
Built by ALT-F1, StratEx embodies proven methods, based on experience from dozens of successful small and large-scale projects performed by/for public or private companies.
Keys to success
Easy to use
On-Premise and SaaS application
Support RUP, ITIL, TOGAF and your custom method
Generates Word and PDF reports
Methodology, Simplicity and Management Consulting improve your productivity
Integration with MS Office Online
StratEx is a SaaS application allowing programme and project managers to manage their projects in cooperation with partners. StratEx supports you from the Request for Offer to the final delivery by facilitating the exchange of information and generating most of the reports that you are interested in.
1. Migration and
Home Affairs
The Schengen Information System
21 December 2016
The Schengen Information System (SIS) is an EU information system to share information for law enforcement,
border and migration management. It contains alerts on wanted or missing persons and objects such as vehicles,
firearms, and identification documents that have been lost or stolen or may have been used to carry out a crime.
Since its creation over 15 years ago the SIS database has proven to be an incredibly useful tool for police, border
guards and customs officers - who all need to have access to high quality information about the persons or objects
they are checking, with clear instructions about what needs to be done in case of a hit with SIS. The system is at
the very heart of Schengen cooperation and plays a crucial role in facilitating the free movement of people within
the Schengen area.
The Commission is now proposing to extend and improve the use of this database by enriching the data it contains
with new alert categories, ensuring an even more efficient information exchange between Member States and with
EU Agencies such as Europol, Eurojust and the European Border and Coast Guard, improving the end-to-end security
of the system and strengthening data protection safeguards.
WHAT IS SIS USED FOR?
The main purpose of SIS is to help preserve internal security and improve border and migration management in
the Schengen area by locating wanted persons and stolen objects and taking the necessary measures.
Three areas of competence:
Border and migration management:
SIS enables border guards and migration
authorities to enter and consult alerts on
third-country nationals for the purpose
of verifying their right to enter or stay in
the Schengen Area.
Security cooperation: SIS supports police and judicial
cooperation by allowing Member States’ authorities to create
and consult alerts on missing persons and on persons or
objects related to criminal offences.
SIS
ALERT
SIS
Registration card
Vehicle control:
Vehicle registration authorities have
access to SIS. They can access alerts on
stolen vehicles, number plates and vehicle
registration documents in order to check the
legal status of vehicles presented to them
for registration.
Newalertcategoriessuchasalertsonunknownwantedpersons
will enable the use of fingerprints found at a crime scene to
identify and find people. Law enforcement officers will also for
the first time be able to issue preventive alerts for children in
cases when there is a high risk of parental abduction.Immigration authorities will now be
required to enter return decisions and
entry bans issued to irregular migrants
into the database, increasing their EU-
wide visibility.
NEW
NEW
2. WHAT TYPE OF ALERTS CAN BE ISSUED?
WHAT KIND OF DATA IS ENTERED INTO SIS?
Information on why the person or
object is sought
NEW
Instructions on the action to be taken when
the person or object has been found
instruction
• Data for identifying the person or object that is
the subject of the alert
• When available, photographs and fingerprints
• Links between alerts (e.g. between an alert on a
person and a vehicle)
• Use of facial images for biometric identification
• DNA profiles for missing persons who need to be
placed under protection, and especially for missing
children (Note: only possible in the absence of photo-
graphs or fingerprints suitable for identification)
Persons in order to assist
with a judicial procedure
Persons wanted
for arrest
WANTED
Missing
persons
MISSING
Persons and objects
for discreet or
specific checks
Persons and
objects for
inquiry checks
Wanted Unknown Person
alerts on the basis of
fingerprints
left at crime scenes
WANTED
Preventive alerts to signal children
at risk of parental abduction
(under strict conditions)
Falsified
documents
EXISTING ALERTS
NEW ALERTSSIS
ALERT
Refusal of entry
or stay of third-
country nationals
Return decisions
Travel document
Registration card
Objects for seizure or use as
evidence in criminal procedures
Driving License
WHICH AUTHORITIES CAN ENTER AND SEARCH ALERTS IN SIS?
Eurojust European Border
and Coast Guard Agency
can continue to
access the system to
carry out queries on
the alert categories
it needs to access
for its work.
The new Agency and its teams will have
accesstoallalertcategoriesinSIS,whichwill
allow them to do their job more effectively
in carrying out returns of irregular migrants
and managing the future European Travel
Information and Authorisation System.
will receive access to all alert categories in SIS,
including on data on missing persons, return
alerts, and third-country nationals whose entry
or stay is refused in the Schengen area and will
be included in the exchange of supplementary
information in relation to SIS alerts that have
been issued within the context of serious
organised crime and terrorism.
Europol NEWNEW
• National border control authorities,
• Police authorities,
• Customs authorities,
• Judicial authorities,
• Visa and immigration authorities
• Vehicle, NEW boat and aircraft registration authorities
Exclusively accessible to the authorised users within competent national
authorities.
3. IN WHICH COUNTRIES IS SIS IN OPERATION?
EU Member States that are part of the Schengen Area
Associated Countries that are part of the Schengen
Area (Switzerland, Norway, Liechtenstein and Iceland)
Special conditions exist for EU Member States that are not part of the Schengen Area (Bulgaria, Romania, and
the United Kingdom). SIS is not yet operational in Croatia, Cyprus and Ireland, but work is underway to fulfil the
technical and legal conditions for them to connect to SIS.
HOW IS DATA PROTECTION ENSURED?
SIS has strict requirements on data quality and data protection. The basic principle is that the country
entering an alert is responsible for its content, and that alerts are only kept for the time required to fulfil the
purpose for which they were issued (e.g. an arrest).
If data about a person are stored, that person has the right to request access to this data and make sure
that it is accurate and lawfully entered. If this is not the case, the person has the right to request
correction or deletion.
Both levels cooperate to ensure
coordinated end-to-end supervision.
supervise the
application of the
data protection rules
National
Data Protection Au
thorities
European
Data Protection S
upervisor
monitors the application of
the data protection rules
for the central system
Additional safeguards are introduced to ensure that the collection, processing and access to data
is limited to what is strictly necessary and operationally required, in full respect of EU legislation and
fundamental rights, including the right to effective remedies. Access is restricted only to those who
have an operational need to process it.
NEW