#INTERPOLWorld

Privacy Policy

  1. INTRODUCTION
    INTERPOL World (“IW”) is committed to data protection and privacy of the data you provides. This website’s Privacy Policy (“Policy”) will outline the type of information that is collected, how it is used and the secured ways in which it is protected. Please read this Policy carefully.

    By using any of IW’s registered website, you are agreeing to be bound by this Policy in respect of the information collected about you via the website. You acknowledge and agree (on your own accord and duly authorised on behalf of any third party whose details you provided) that the processing (including disclosure) of information is necessary or desirable for the provision of relevant services and the rights and obligations owed to you or a third party.

    The references made to information “relating to you” or “about you” include references made to information about your employees, representatives, agents, directors, officers, or relevant parties whose details you have provided, and those of your affiliates and subsidiaries and sub-contractors and any third party whose details you have provided to IW.

    We may update this Policy from time to time to take into account changing requirements and we request that you refer back to this Policy frequently to review any revisions. If you have any queries about the Policy, please get in touch with us at [email protected].

  2. COLLECTION OF INFORMATION
    We collect information from you when you register on our website to

    • book a stand,
    • download a brochure,
    • subscribe to our mailing list or
    • To register for an event.

      The information is collected by IW and its partners through the website for the purpose as stipulated in the USE OF INFORMATION.

      When registering on our website, as appropriate, you may be asked to submit your name, job title, company, mailing address, contact numbers, email address or credit card information. Such information is only collected when voluntarily given. You may, however, continue to visit our website anonymously.

  3. USE OF INFORMATION
    Any of the information we collect from you may be used in one or more of the following ways:

    • To personalise and enhance your experience-your information helps us to better respond to your individual needs.
    • To improve our website-we continually strive to improve our offerings based on the information and feedback we receive from you.
    • To improve customer service-your information helps us to more effectively respond to your customer service requests and support needs.
    • To process your applications
    • To administer a contest, promotion, survey or other features of the website
    • To send periodic updates about IW via emails-The email address you provide may be used to send you information and updates on IW’s exhibitions, conferences, seminars or events. If at any time you would like to unsubscribe from receiving future emails on the particular IW’s events, you may do so via the unsubscribe instructions at the bottom of each email or writing in to [email protected].

      We may also contact you via other channels of communication for which you have provided, including email, telephone and post, for the purpose of getting your feedback.

      On occasion, we may use third-party agents and service providers to assist us in the use of your data as outlined above.

  4. LOG DATA
    We collect information that your browser sends whenever you visit our Service (“Log Data”). This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages and other statistics.
  5. RETENTION AND DESTRUCTION OF INFORMATION
    The information collected from you will be kept for the sole purpose of sending you information to facilitate your query. If required, your information will be destroyed at your request to [email protected].
  6. SECURITY
    We implement a variety of security measures to maintain the security of the information submitted. Your information will not be sold or given to any other company for any reason whatsoever, without your consent, other than the express purpose of delivering the product or service requested.
  7. COOKIES & GOOGLE ANALYTICS
    All IW website use Google Analytics, a web analytics service provided by Google, Inc. Google Analytics uses “cookies”, which are text files placed on your computer to help the website analyze how users use the website. You may refuse the use of cookies by selecting the appropriate settings on your browser, however, please note that if you do this, you may not be able to use the full functionality of the website.
  8. THIRD-PARTY LINKS
    Some of the pages on our website may include links to external website. We are not responsible for the privacy policies and practices of these external website. We strongly recommend that you read the privacy policy of each website you visit, and contact its owner if you have any concerns or questions.
  9. UPDATING OF INFORMATION
    We aim to keep our information about you as accurate as possible. If you would like to update or withdraw your details, please contact us at [email protected].
  10. CHANGES TO OUR PRIVACY POLICY
    Privacy Policy has been updated as of the modification date below.

 

Privacy Policy modification date:
13 June 2018


EC-Council Group

International Council of E-Commerce Consultants, also known as EC-Council, one of the world’s largest cybersecurity technical certification body. ECC operates in 145 countries globally and is the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cybersecurity mindset of countless organizations worldwide.


Haptic

HAPTIC R&D CONSULTING is a consulting of global technology and engineering company providing innovative tech solutions and commercializes them.

On HAPTIC.ro platform you’ll find the most updated Market Research Reports and Products from various industries.

Tech news and Events/Expo/Conferences updates.

For more info please visit our website www.haptic.ro or contact us: [email protected]


MediaBUZZ

As the first ‘pure’ digital publisher in Asia Pacific, MediaBUZZ covers the digital age in the region since 2004. Its publication Asian eMarketing has been designed to empower marketers in the vibrant, ever-changing digital marketing environment. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy and thriving business success. Visit http://www.mediabuzz.com.sg

 


Asian Professional Security Association (APSA)

The Asian Professional Security Association (APSA) is the leading professional association of security practitioners in the Asian region and in India. APSA represents Professionals, Companies and Organizations involved in consulting and providing products and services pertaining to all sectors of the protection industry. APSA is dedicated to increasing the effectiveness and productivity of security practices by developing educational programs and materials that address broad security concerns. It Provides to its Corporate, Individual members and the business community at large with complete access to full range of programs and materials, APSA leads the way for advanced and improved security performance for products and services and works closely with the Government and Chambers of Commerce to ensure that the views and concerns of its members.

 


CIISCM

CIISCM focuses on providing Security Professionals recognition through membership designations and accreditation of elite Security Training Programs. Convergence of Head of Security at Roundtable Forums, Conferences, Seminars and Networking Sessions encouraging new wave leadership Exchange are the focal points of the institute.

As an independent organization, the Institute provides unbiased accreditation for training courses across the globe. The Institute is also dedicated to promoting the role of security and crisis professionals, and as such will continue to advocate for our members through lobbying efforts with governments, industry bodies and human resource professionals to improve recognition of our members’ services and qualities.

This synergized platform has outreach strength of well over 7000 security professionals worldwide to indulge, partake, discuss debate and expound on current risk issues and challenges.


Data Security Council of India (DSCI)

Data Security Council of India (DSCI) is a premier industry body on data protection in India, setup by NASSCOM®, committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. DSCI brings together governments and their agencies, industry sectors including IT-BPM, BFSI, Telecom, industry associations, data protection authorities and think tanks for public advocacy, thought leadership, capacity building and outreach initiatives.


FindBiometrics

FindBiometrics is the leading industry resource for all information on biometrics identification and identity verification systems and solutions. We have the latest daily news from the global biometric and identity management business community, a comprehensive vendor list, informative articles, interviews, exclusive videos, links to biometric associations and a calendar of events.


MySecurity Marketplace

MySecurity Marketplace is a dedicated marketplace connecting industry and enterprise professionals to the latest events, education, technology and media platforms across a global security domain


Australian Security Magazine

The Australian Security Magazine is the country’s leading government and corporate security magazine. It is published bi-monthly and is distributed to many of the biggest decision makers in the security industry. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all security professionals.


Asia Pacific Security Magazine

My Security Media rapidly expanded into the Asia Pacific Region with its sister publication – the Asia Pacific Security Magazine. It is published bi-monthly – on the alternate month to the Australian Security Magazine – and its content complements the Australian Security Magazine with a strong focus on events. It is available online to read by all and upon every issue release a direct link is sent to a database of subscribers who are industry decision makers.


Australian Cyber Security Magazine

The Australian Cyber Security Magazine was launched in agreement with the Australian Information Security Association (AISA) to be focused on AISA’s 3,000 members, nationally and forms part of AISA’s national cyber security awareness and membership communication platform. It is published and distributed to many of the biggest decision makers in the cyber security industry. It has become a sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all cyber security professionals.


Chief IT

Technology channel partner ecosystem with a natural focus on Big Data, Internet of Things and fast emerging technologies


Drastic News

Dedicated channels for all things Drones, Robotics, Autonomous Systems, Technology, Intelligence and Communications.


Digital Forensics Magazine

Digital Forensics Magazine is a quarterly magazine from the world of digital forensics; it is the leading magazine with a global audience. The content features peer reviewed, journal quality research, in an easy to read magazine format covering comprehensive technical features, product and book reviews, the latest news, what’s happening legally and in depth “from the lab” feature articles.


MalaysiaSAFE

MalaysiaSAFE is in its sixth year of publication and proudly maintains its position as the only security and fire safety products magazine in Malaysia. Our stated mission is to educate end-users about the latest technologies, trends and best practices in security and fire safety, so as to create a safer environment throughout Malaysia. For more info, visit www.malaysiasafe.com


Cyber Security Review

Cyber Security Review is designed to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide. CSR assists in sharing knowledge, skills and expertise of the international cyber security community, and helps to identify the emerging threats and facilitate the development of coherent policies and robust capabilities. Please visit: www.cybersecurity-review.com


Critical Infrastructure Protection Review

Critical Infrastructure Protection Review is the go-to destination for the latest news, insights and expert knowledge, and designed to assist governments, public and private sectors in improving security and resilience of vital critical infrastructures, strengthening their preparedness to withstand and recover from the physical and cyber attacks. Please visit www.criticalinfrastructureprotectionreview.com


RoboticsTomorrow.com

RoboticsTomorrow.com is an Online Trade Magazine featuring Products, Companies, News, Articles and Events for the Industrial Automation, Robotics and Unmanned Vehicle industries. With an emphasis on the state of the art and on the horizon technologies that have strong prospects of commercialization, our philosophy is to create an outlet where the industry can share information and report on itself.


SourceSecurity.com

SourceSecurity.com is the world’s leading security industry publication, with an audience of over 180,000 visits monthly. Securityinformed.com is specifically dedicated to the US and Americas security market. In addition to its unique and unrivalled comparative database of security products comprising over 18,000 products, including CCTV cameras, IP cameras, access control systems, intruder alarms and integrated security systems, content includes news & analysis, latest applications, and a directory of security companies and events. The site also features in-depth coverage of products and applications in vertical markets such as airport & ports, retail and industrial & commercial security. Dedicated areas for IP security and biometric security recognize the emergence and growth of these technologies, while experts from the industry contribute their valuable insights on business and technology trends. With its depth and breadth of content, SourceSecurity.com is the definitive resource for the security industry.


The Tele Data

THE TELE DATA is an Informatic Centric Website focused mainly on the telecommunications & IT Industry Online. It is a B2B Platform mainly focus on latest telecommunication & IT News, Press Release, Industry related updates, Events, and Conferences. With The Tele Data, you can get all information that happens in the Telecommunication & IT Industry.


Smart Insights

Smart Insights, by Intelling: a blog about the Secure Transactions industry.

Smart Insights covers the smart card and secure transactions industry, its businesses, its technologies, its markets as well as its technology suppliers. Smart Insights covers all the major trends in the industry, it encompasses worldwide business, standardization bodies …

Smart Insights is brought to you by Intelling, the secure transactions industry expert. Intelling proposes services in communication, strategy, marketing and market intelligence, with a strong focus on all markets relating to the secure transactions industry.

More information at www.smartinsights.net and www.intelling.com


SecuringIndustry.com

Anti-counterfeiting and supply chain security news from SecuringIndustry.com

SecuringIndustry.com is a free-to-access information service that covers the issues surrounding supply chain and brand security. Our aim is to provide practical advice and intelligence to help manufacturers define and pursue their own strategies for tackling crime including counterfeiting, product diversion, adulteration and theft.


Cloud Security Alliance

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.


Association of Information Security Professionals

The Association of Information Security Professionals (AISP) was registered with the assistance of the Singapore Computer Society (SCS) and the strong support of the Infocomm Development Authority of Singapore (iDA) in February 2008. It was officially launched on 17 April 2008 by Dr Vivian Balakrishnan, Minister for Community Development, Youth and Sports.

AISP aims to be the pillar for Information Security Professional & Profession in Cyber by:


Defsec Media

Defsec Media publishes the premier business magazines Line of Defence, New Zealand Security and Fire NZ – publications for the New Zealand defence, security and fire protection sectors. Defsec also publishes the Border Management magazine and website – a platform of specialist news and analysis for the international border management sector.


Developing Telecoms

Developing Telecoms is the web portal for mobile and telecoms in emerging markets worldwide. We keep visitors up-to-date with opportunities, technologies, products and services that are transforming communications and empowering communities. Our influential audience covers the decision making chain from ministers and c-level executives to senior technical, marketing and operational managers, researchers, advisers, consultants and integrators. With 16,000 monthly visitors and 26,000 weekly newsletter subscribers Developing Telecoms is the most widely referenced and trusted global information source about telecoms in emerging markets used by operators, service providers, governments and large enterprises throughout Africa, Asia, Central and Eastern Europe, Latin America and the Middle East.


GeoConnexion International

GeoConnexion International is the leading business-to-business monthly for users of spatial professionals across the globe. It covers applications of GIS, GPS and remote sensing within industry sectors, such as telecoms, emergency services, public safety, government, utilities and retailing.
 
View the magazines: https://www.geoconnexion.com/publications/
Sign Up for free GeoConnexion Newsletter: http://www.geoconnexion.com
Email: [email protected]


SecurityLink India

SecurityLink INDIA is a niche monthly magazine on Security (Physical & Electronic, Cyber, & Homeland Security), Fire and Safety, and is the leading magazine in its genre in India.

We aim to enhance public awareness through knowledge sharing and leveraging the strengths of the Security & Fire Safety Industries to create a safe and crime-free environment.

SecurityLink India is distributed in digital (online flip) version as well, to a large database. The e-newsportal www.securitylinkindia.com carries more than what is covered in the print. The portal has global reach and has an average monthly traffic of nearly 100 thousands.

SecurityLink India is the best reach to the Indian market.


IEEE

IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. There are more than 430,000 IEEE members in over 160 countries around the world. IEEE members are engineers, scientists, and allied professionals whose technical interests are rooted in electrical and computer sciences, engineering, and related disciplines. Through its global membership, IEEE is a leading authority on areas ranging from aerospace systems, computers and telecommunications to biomedical engineering, electric power and consumer electronics.

IEEE sponsors more than 1,800 annual conferences and events worldwide, curating cutting-edge content for all of the technical fields of interest within IEEE. Often the central source for standardization in a broad range of emerging technologies, the IEEE Standards Association has a portfolio of over 1,300 standards and more than 600 standards under development. This includes the prominent IEEE 802® standards for local, metropolitan, and other area networks, including Ethernet and Wireless LAN (commonly referred to as Wi-Fi®).


Japan Network Security Association (JNSA)

JNSA (Japan Network Security Association) is a non-profit organization dedicated to enlightening the importance of network security to Japanese society, setting up a place to solve emerging various security issues, and furthermore, supporting for Japanese companies wishing to enter overseas markets.


The MULTOS Consortium

MULTOS is the most robust, industry-backed, smart device operating system delivering high-security and innovation. Over 1 billion MULTOS devices have been shipped to 50 countries and 3500 businesses, including national governments, banks, and corporates. Applications include digital identity, biometrics, and embedded devices. For further information, visit www.multos.com


BioMetricUpdate.com

BiometricUpdate.com is the leading news property that publishes shareable breaking news, analysis, and research about the global biometrics market. We provide the most original reporting and market research in the sector, vis-a-vis the Web and an exclusive daily newsletter, that focuses on global developments in biometrics technology, including: fingerprint identification, voice, iris, and facial recognition, civil and criminal ID and video surveillance. Our news coverage places special emphasis on national security, privacy and regulatory issues, along with examining the latest applications and advances in biometrics. Our global audience of 600k+ readers includes original equipment manufacturers, service providers, governments, law enforcement agencies, corporate buyers and industry professionals.


Police Aviation News

Police Aviation News the International circulation on-line news organ for the airborne emergency services sector. 25-30 page magazine free download each month from two websites www.policeaviationnews.com and www.policeaviationnews.info 2-year archive for research purposes on each site.


The Asian Banker

The Asian Banker is a leading provider of strategic intelligence and builder of platforms on the financial services industry, established since 1996. The company offers a unique combination of the skills of researchers and writers to develop a keen perspective on strategic issues and drivers in the industry through four key division entities: editorial, research, forums and training. Visit The Asian Banker’s homepage at www.theasianbanker.com.


Europol

Europol is the European Union’s law enforcement agency. Our main goal is to achieve a safer Europe for the benefit of all the EU citizens.

Headquartered in The Hague, the Netherlands, we support the 28 EU Member States in their fight against terrorism, cybercrime and other serious and organised forms of crime. We also work with many non-EU partner states and international organisations.

Large-scale criminal and terrorist networks pose a significant threat to the internal security of the EU and to the safety and livelihood of its people. The biggest security threats come from:

The networks behind the crimes in each of these areas are quick to seize new opportunities, and they are resilient in the face of traditional law enforcement measures.


South Asia Defence & Strategic Review

South Asia Defence & Strategic Review (defstrat.com), a leading magazine in the region, aims at promoting objective analysis and information flow on Geostrategy, Military Affairs and Military Technology. Our events go beyond the traditional experience to enhance knowledge and networking opportunities. Our combination of publications, seminars and workshops provide unrivaled learning and opportunities in the field of defence and strategy.


ASIS International Singapore

Founded in 1955, ASIS International is a global community of 35,000 security practitioners from virtually every industry in the public and private sectors, and organizations of all sizes. ASIS International (Singapore Chapter) is part of ASIS International’s Region 13B which also includes Philippines, Thailand, Malaysia, and Indonesia. There are over 300 ASIS members assigned to the Singapore Chapter, which actively promotes the certification of security professionals through the Certified Protection Professional (“CPP”) and Physical Security Professional (“PSP”) programmes.

For more information about ASIS, please visit ASIS’ website at http://www.asisonline.org or the Singapore Chapter’s website at http://www.asis-singapore.org.sg.


Biometrics Institute

The Biometrics Institute is an independent membership organisation with offices in Sydney, Australia and London, UK. It provides an impartial international forum for biometric users and promotes the responsible and ethical use of biometrics. It has developed Privacy Guidelines for its members and has several expert and sector groups who produce best-practice guiding information. It holds four biometrics conferences per year plus several training courses and networking functions.

To date the Institute has over 240 member organisations from around the world, representing nearly 1000 individuals.
Email: [email protected]
Web: www.biometricsinstitute.org


CPO Magazine

CPO Magazine (or Chief Privacy Officer Magazine) delivers news, insights and resources to help data privacy, protection and cyber security leaders make sense of the evolving landscape to better protect their organizations and customers.


China IP

As the professional media in the IP industry, China IP has multimedia platforms, such as Chinese and English magazines, website, Weibo and WeChat official account. In the past 14 years since its establishment, the company has been committed to building a comprehensive IP media platform, striving to realize the efficient dissemination of the concept and value of IP worldwide,reporting developments of Chinese IP industry and serving IP professionals in enterprises.


TelcoProfessionals

TelcoProfessionals(TP) is an interactive, content rich, blog- and video-centric online community, and business exchange, developed exclusively for the Telecom and Media
industry. We are dedicated to individuals working in the industry globally, as a place they can find and help each other get ahead. TP includes a full Telecom & Media events
listing, blogs from Thought Leaders, videos of the people shaping the industry’s future. TP allows you to network directly with over 110,000 like-minded unique viewers from
206 countries. To enhance your professional profile and network for future business opportunities, or to visit our jobs portal, join us today on www.telcoprofessionals.com.


Ministry of Home Affairs

MHA (collectively known as the Home Team) works in close partnership with the community to keep Singapore safe and secure. Our Home Team officers work round the clock to keep our country and people safe amidst an increasingly complex security environment. The Home Team is constantly innovating to respond to security challenges and to strengthen partnerships with the community.

Find out more at www.MHA.gov.sg


Supply Chain Safety & Security Association

Supply Chain Safety & Security Association (SCSA) was founded by a group of professionals from supply chain management, security management and information technology management in April 2002. We aim to address the awareness towards emerging security threats on the supply chain industry, such as counterfeit and dangerous goods.


CLocate

Clocate.com is a leading international directory for worldwide conferences and exhibitions. Clocate.com is equipped with a unique and comprehensive search that helps you find easily any event in any category or location. Each event includes detailed information, like, description, dates, location, map, prices, link to the official event’s website and more…

If you search for a conference or exhibition in areas such as Industry and manufacturing, Health and medicine, Technology and IT, Business and finance, sciences, education, services (banking, insurance, tourism, Hospitality and more), government, environment, life style and arts, you’ll find it in Clocate.com.


Authentic Solution Providers’ Association (ASPA)

Authentication Solution Providers’ Association (ASPA) is a self-regulated, non-profit organization of authentication solution providers. Formed in 1998 with the objective to fight fakes products in various sectors, it is one of its kind association in the world primarily focused on the adoption and advancement of authentication technologies and solutions for Brand, Revenue and Document Protection. ASPA members protect over 15,000 brands worldwide through the identification of genuine products and documents. ASPA is creating awareness to fight fake / duplicate & counterfeit products which are harmful to consumer, industry, economy and society at large. ASPA works closely with global & regional authorities such as International Hologram Manufacturers Association (IHMA), International Tax Stamp Association, Counterfeit Intelligence Bureau (CIB – Interpol), FICCI CASCADE, CII and others.

Regulating Big Data
What are the privacy and protection implications to public safety and security?

The collection, processing and analysis of data is increasingly transitioning from governments to private organizations. These organizations focus on developing strategies for revenue generation through the use and ownership of the data. Industry is self-regulating and defining the rules regarding information sharing and access. This has driven many regions to consider forms of regulation through improved controls. The endeavour has been challenged by big data corporations and elements of the community as attacks on the fundamental rights of the privacy of the individual. So how should governments and law enforcement work with big data, ensuring privacy and protection of individuals, and at the same time allowing for timely sharing of information that will prevent or disrupt events that affects public safety and security?

Drones
How to stop drone intrusion in three easy steps?

Drone activity has increased exponentially as drones became more easily accessible and affordable. Events in Gatwick have highlighted the potential disruptive nature of drones, jeopardizing public safety and airway security. With more drones operating every day, there have been some creative and sometimes dangerous attempts to disable drones. This co-creation lab will look at the options of prevention and disruption of drone intrusions to ensure that the public safety and security is maintained.

Partnerships
How do police build collaborative partnerships to achieve better preventative outcomes for public safety?

Public private partnerships: how can they be developed and nurtured into the future in pursuit of mutually beneficial public safety and security outcomes, in an environment of trust and transparency? What currently works well and what needs to change to allow for partnerships to be engrained into all agencies that work together? What partnerships need to be developed for the future as we drive to preserve public safety and security?

Protecting Children
On line safety and security of our children – How can we prevent and disrupt crimes against children in the virtual world?

Children are particularly vulnerable to the exploitation of online predators because they rely heavily on networking websites for social interaction. The openness of the internet coupled with the digital divide between children and caregivers can leave children exposed to online harm. What tools, services and applications are currently available that can aid law enforcement in identifying children at risk, preventing and disrupting crimes against children and ensure that children are safe from exploitation and abuse?

Artificial Intelligence (AI)
Can AI provide savings and improve outcomes in public safety and security?

AI based applications (smart applications) have demonstrated benefit in the rapid assessment of large quantities of data. From a policing perspective there are savings in the number of people it takes to evaluate and assess the relevance of information using these enhanced systems. It poses the question, can a computer replace the intuitive mind of a police investigator effectively to improve public safety and security outcomes? What capabilities exist and do we have the confidence to trust that they will not get this wrong? Examples of the use of AI in law enforcement are emerging rapidly in the use and analysis of large data sets to quickly identify relevant and timely avenues of inquiry. But what is the future of AI application, and could our current activities grow into something more extensive?

The Connected Car
Threats and opportunities of unmanned, semi-autonomous and autonomous systems – What are the implications for modern society?

Arguably the most significant benefit to automated vehicles is the potential for safer transportation. When machines can eliminate human error, the ability to control the flow of traffic is greatly increased.
With growing private investment in this market we have to consider the extent of information that is captured, where is it stored and who has access to this information? What are the vulnerabilities in the system that can be exploited by criminals? Who is to take responsibility for accidents caused by self-driving technology?

ISIL/Daesh 2.0
Further development and the sharing of identifiers including biometrics – Are we jointly prepared for returning foreign terrorist fighters (FTF)?

Biometric identifiers allow police across the world to improve the global detection of travelling FTF and other individuals linked to terrorism. The unique identifiable attributes provided by biometrics facilitate the match of available terrorist profiles to potential suspects in the field in a timely and effective manner. How can the currently implemented sharing strategies be improved to prepare us for ISIL 2.0?

Data Fusion
Integration of organizational data with private and public data sources, social media and open source information – What can be achieved?

Policing has undergone profound changes in the recent years, and the evolution of public-private partnerships is among the most significant of these changes. What can be achieved with current capabilities to link data sets across our communities? With the ultimate aim of providing the right information to the right person in time to make a well informed decision, is investigative analytics achievable in our current environment? How is this executed while ensuring that the privacy of individuals is maintained?

Future Capabilities and Cultures
How do police build future capabilities and cultures within their organizations?

Although the principles of policing remain a constant, the world in which the police operate is undergoing dramatic shifts. Adaptive and agile, law enforcement is introducing positive cultures and inclusive leadership, but also increasingly perceiving innovation as a value, and absorbing variety of new technological options. So how can contemporary organisation take advantage of these paradigm shifts and position themselves to change their practices and processes effectively in an evolving environment?

Counterfeits
How can we use blockchain technology to better detect and track counterfeits?

From handbags to electronics to pharmaceuticals and even identification documents the counterfeit industry worldwide is estimated to be a 1.2 trillion dollar business and it is set to grow even further. The estimated death toll from fake pharmaceuticals and food and beverages is now believed to be one million people worldwide. Blockchain is an innovative technology that will allow industry and law enforcement to work together to enforce Supply Chain security by tracking every movement of products from manufacture, transport and finally into the hands of consumers. Several large companies have started to develop Blockchain technology with the goal to integrate it with border authorities. The introduction of this technology will increase the protection of the supply chain from the infiltration of counterfeit goods. The focus of this co-creation lab is to look at where we are now and how blockchain or some other technology may be used to ensure public safety and security from counterfeit products.

3D/4D Printing
Do we realize the impact of the safety and security landscape?

3D printing is slowly but surely creeping into the mainstream and with its endless potential, it got people excited. Today, 4D printing is emerging as a further extension of additive manufacturing that has real commercial applications. Will the ability to print anything in our home be the end of manufacturing and supply chain activities? How will our community monitor and mitigate the risks associated with the printing of weapons and materials that could breach copyright? What impact may this have with respect to public safety and security?

Training Delivery for the Future
How can mobile applications improve the access and quality of training now and in the future?

Mobile phone applications are integral part of everyday life, including multitude of learning apps available at the click of a button. The implications for international law enforcement education are clear: easier access to training material, wider audience and better prepared officers. However, differences in technological capabilities at the international level present challenges to an effective implementation of a global law enforcement education app. What solutions are there that can facilitate training for international law enforcement?

Border Security
What are the future of controls that improve the reliability of the control of an individual, the safety of travel between countries and eliminates the threats of domestic attacks?

Secure and optimized border management is a complex operational process, requiring border agencies having a complete picture of their border operations in real-time. The advancement of technology and capabilities created remarkable opportunities for the fusion and integration of information with international airlines and shipping companies at borders. What is the future of border agencies? How do we improve control measures in smart countries?

Deepfakes
How can police prove that what people see actually did happen to ensure the integrity of a judicial process?

Deepfakes are claimed to be the newest way false information is spread, and has been receiving some media coverage around election manipulation and the use of innocent persons being portrayed in revenge porn. But they also pose significant threat to integrity of collected evidence such as cctv and body camera feeds. It has been claimed that seeing is believing but what happens when you can not only add or delete images but also manipulate them to portray an event that did not occur? Are currently used digital signatures enough for police who have to produce acceptable evidence in court? How can we identify or authenticate video and audio recordings to ensure that they are not deepfakes?

Community Participation
How can we improve community participation in creating a safe and secure environment in jointly tackling complex challenges of the future?

How can the community be better engaged in the public safety and security roles and functions? We have seen the rolling out of applications that facilitate the reporting and the mechanisms to share video, geolocation data, and personal information of an event, alerting emergency services depending on the incident. Vandalism, cyber bullying, attempted burglary or theft: many applications enable citizens to create their own criminal investigation file and submit it to the law enforcement. What are the other ways technology is aiding community participation? What will be the next generation of community-oriented solutions and what challenges lie ahead?

5G Network
What are the opportunities and the challenges of the 5G mobile network?

With higher data rates, reduced latency and increased device connectivity 5G will effectively remove speed, responsiveness, and capacity as constraints on wireless innovation. The connectivity is enabling the new generations of IoT in autonomous vehicles, smart homes and cities but as the countries prepare for 5G, what many still do not understand is how it all works and what opportunities it will bring. So how can law enforcement, security and emergency services capitalize of the 5G network to ensure public safety and security of their communities?

Financial Crime
Tackling organized crime; is all about the money – How can we improve the outcomes through sharing data from banks and financial institutions?

Financial institutions globally hold extensive information surrounding fraud and the movement of suspicious financial transactions. When it comes to identifying and investigating transnational crime syndicates, financial intelligence has extensive utility to law enforcement and security agencies, the same way as information held by policing agencies are invaluable to the banking sector. With the emergence of cryptocurrency and cyber related organised crime, it is about time to revisit perceptions of anti-money laundering and the joint responsibility of disrupting and mitigating the risk of transnational and organised crime.

Partnership with Big Data
How should this be structured and developed for the future?

Timely access to information enable law enforcement to make informed decisions and act to prevent, disrupt or respond to a crime. But it is becoming more and more challenging, with the potential to become more of an issue as more organizations join the virtual information eco system. This lab will discuss accountabilities or data ownership and the issue of prompt sharing of information for the greater good, and seek solutions to build stronger, trusting and enduring partnerships that will mitigate the risk of not knowing what others do, that can save our citizens lives.

Marine Crime
Technologies to detect marine pollution crime – What can be done?

With 8 million items of marine litter entering the oceans every day, marine pollution crime poses significant threats to human, environmental and economic security, negatively impacting sustainable development. The recent INTERPOL global operation codenamed 30 Days at Sea, with 58 participating countries and over 800 marine pollution violations reported worldwide, highlighted the key role played by technologies in detecting offshore marine pollution offences. Such technologies include drones, AIS and satellite imagery, side looking airborne radar (SLAR), electro-optical infrared cameras (EO/IR), infrared/ultraviolet line scanner (IR/UV), night vision cameras, sulphur sensors, vessels tracking software and applications. This operation allowed INTERPOL to identify not only countries with significant expertise in the application of these technologies to marine pollution enforcement, but also the high demand of these technologies and the related “know how” from several developing countries. INTERPOL World provides a unique opportunity to bridge the gap between the offer and the demand, linking the law enforcement community and the private and scientific sectors.

Virtual and Augmented Reality
What are the applications in policing and are there any potential for its abuse?

The use of virtual and augmented reality is no longer a science fiction or a tool for gamers. The industry is actively applying VR to solve real world problems and challenges, and policing is one of the sectors benefiting from it through capability development to crime scene analysis. What exactly is available to law enforcement, security and the emergency service and how could it be used in the public safety and security environments to fully realize VR’s potential?

Smart Cities
Is law enforcement a thing of the past? What is the future of law enforcement with the emergence of smart and safe city technology?

Smart technology can make cities safer and ultimately more livable. Smart Cities offer a wide range of possibilities how city services – including policing – could be delivered. On the other hand new technologies pose critical risk to security, creating new vulnerabilities that often remain underestimated. What is going to happen to law enforcement of the future, when the combined data, connectivity of devices will provide potential for “no human needed” approach? What functions of law enforcement will become obsolete and which ones will be enhanced in a smart city?

Darknet
How will darknet of future be like?

The darknet, often referred to as the dark web, is the place where people offer unscrupulous solutions, where neither the perpetrator nor the implementer of the service will wish to be identified, but also a place where entities store and sell resources containing nothing even remotely sinister. What is the future of this censorship-free world – will it become more digitally opaque or far more mainstream? And is law enforcement equipped to deal with its evolution?

DNA & Biotechnology
Biotechnology, gene editing and the advancement in DNA technology – What are the applications in policing and is there any potential for abuse?

As we overlay more and more data on genetic information, we move from evidence to intelligence and DNA can be highly persuasive. How do we manage genetic predictions in a law enforcement intelligence framework? How do we manage expectations of police, lawyers and the courts as this moves into operational use, and avoid wasting investigative resources on false leads? How can we train and engage with external expert genealogists and geneticists, and what can we learn from their experience with adoptions or paternity cases? Will this technology ultimately lead the world’s policing agencies towards predicting the ‘criminal gene’?

Predictive Capabilities
How can predictive capabilities change our perspective, and responses to public safety and security issues?

Integrated public safety solutions: incident analysis and mapping software helps law enforcement agencies visualize threat real time. Predictive software is supposed to help achieve clear and unambiguous communications, and provide tools to adapt to rapidly changing situations. How to turn data into reliable solutions? What are the boundaries with this capability?

Machine-Based Decision Making
Ethics of machine-based decision making – What decisions are we comfortable for a machine to make?

Superior to human decision in terms of speed and accuracy, increasing use of AI in decision making sparked a debate about the degree of trust we put in technologies. This lab will discuss the relationship between technology and police autonomy: what decisions will be made by machines and how can we ensure that these decisions do not circumvent the safety and security of individuals? What is the potential for algorithms to make incorrect decisions about individuals? How new technology and techniques lead to unexpected conundrums, and how ethical and societal debate must catch up?

Blockchain
Blockchain innovation for National Security: Opportunity, Threat and Evidence?

The innovation potential of Blockchain is infinite given its immutability and resilient characteristics. At the same time, we are all aware that Bitcoin, the first successful Blockchain application, has been used by criminals to fuel several illicit market places. How can law enforcement benefit of the opportunity, fights against the threat and use the digital evidence in case this technology facilitates crimes?

Illicit Wildlife Trade
Cyber enabled illicit wildlife trade:
How is internet and anonymous networks used in facilitating illicit marketplaces?

A current law enforcement challenge and problem – we need your help to solve it. The internet is the world’s biggest marketplace, open all hours for buyers and sellers to exchange goods. Largely unregulated, anonymous and virtually unlimited in reach. It offers endless opportunities for criminal activity, including the illegal trade in protected wildlife. This is the problem, what needs to be done to tackle this challenge?

Geolocation of Individuals
Finding, tracking and monitoring individuals that present a risk to our communities in the real and virtual worlds, and can these systems be integrated?

Digital surveillance: geolocation of users from a multitude of devices and applications became our every -day reality. As with any technology, geolocation has a double-edged nature: it can aid and transform law enforcement but also put us in danger by revealing private information. To what extent can scientists and companies who collect such information anticipate future uses and make them clear to participants and customers? How can safety and security sector benefit from new geolocation tools without infringing privacy rules and regulations?

Cyber Disruptors & Drivers of Change
What perspectives are there for 2030?

Cyberspace presents challenges that all governments and organizations must plan for. How can we work together to identify the indicators of a possible disruption and counter future attacks? How will the advances and convergence of emerging technologies shape a new era for law enforcement, where human and machine are tightly coupled together for various activities? How should our cyber framework and workforce competencies change to deal with these challenges?

Internet of Things (IoT)
Internet of Things or internet of threat: What do smart devices provide and will it be an opportunity or a threat?

In our homes, business and communities, IoT is becoming commonplace within a society eagerly adopting the next generation of connected devices. Is IoT development opening up new vulnerabilities in the virtual ecosystem due to a lack of cyber security controls in the design of these products? What needs to be done to ensure that public awareness of the risks is well understood?

Horizon Scanning
Safety and security organizations – What will the future bring us?

What lies ahead for public safety and security industry? Let’s talk about the future and highlight the possibilities.

Privacy
Privacy of the future – Will there be any?

In a world of advancing technology, a culture of privacy by design needs to be considered. How can the standards that we collectively desire be incorporated into future policing capabilities? What values are we willing to give up for public safety and security? Will we continue to have rights over the use of our personal information? How will our rights to privacy be challenged in the future?

Brain/Computer Interfaces
What are the applications for public safety and security organizations?

We are seeing more integration and technology within health field to support people with a disability. Will we ever integrate a human into the world wide web, so that we can think of a search and it will be undertaken. What are the issues of people becoming part of the virtual ecosystem?

Architectural Processes and Internal Innovation for Policing
What are the architectural roles and processes required to enable agile responses and how to quantify the benefits deliver by INTERPOL’s policing capabilities?

INTERPOL needs to remain a responsive actor to change, able to identify and respond to changes in the crime and law enforcement environment, in order to continuously meet member countries’ needs. In this lab, we will discuss the architectural roles and processes required to enable agile responses and how to quantify the benefits deliver by INTERPOL’s policing capabilities.


PEN-CP
Pan-European Network of Customs Practitioners

The Pan-European Network of Customs Practitioners (PEN-CP) is a Horizon 2020 funded EU-project, coordinated by the Cross-border Research Association.

The goal of PEN-CP is to create a sustainable environment that connects European Customs Administrations with innovators and solution providers in the context of three key topics: Customs risk management & big data; Detection technologies; and Laboratory equipment.

Website: https://www.pen-cp.net


Singapore Cryptocurrency and Blockchain Industry Association (ACCESS)

Singapore Cryptocurrency and Blockchain Industry Association (ACCESS) was founded in 2014. ACCESS envisions Singapore as a premier global hub for businesses driven by digital currencies and blockchain technologies. The organization believes in the transformative potential of cryptocurrencies and blockchain, and with responsible use and proper regulatory support, ACCESS sees digital currency applications and distributed ledgers benefitting everyone. The group aims to foster an open and clear dialogue between the country’s cryptocurrency and blockchain businesses and the larger society, educate the public about the benefits of the new technology, and to provide a united public voice and platform for the Singapore cryptocurrency and blockchain community.


International Compliance Association

The International Compliance Association (ICA) is a professional membership and awarding body open to compliance professionals at all stages of their career. As part of our ongoing commitment to setting the standard, we provide a wealth of knowledge, tools, resources and practical support.

We are the leading provider of professional, certificated qualifications in anti-money laundering; governance, risk and compliance and financial crime prevention. An internationally recognised organisation, our qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester.

Our global community has members across 130 countries. Being a member demonstrates a commitment to the highest standards of practice and conduct, enhances your professional reputation and employability and significantly protects and improves the performance of your organisation.

Recognition. Community. Knowledge. The benchmark of excellence.