Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism

Similar documents
Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Commonwealth Cyber Declaration

Global Wildlife Cybercrime Action Plan1

Global cybersecurity and international standards

Inter-American Port Security Cooperation Plan

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

COUNTER-TERRORISM. Future-oriented policing projects

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

15412/16 RR/dk 1 DGD 1C

National Counterterrorism Center

Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Global Security Advisor

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Sussex Police Business Crime Strategy

Policing our Roads Together

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Advanced IT Risk, Security management and Cybercrime Prevention

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

THE STRATEGIC POLICING REQUIREMENT. July 2012

Professional Training Course - Cybercrime Investigation Body of Knowledge -

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

Department of Homeland Security Updates

CENTER FOR SECURITY STUDIES

Strategic Security Analyst

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Key United Nations counter-terrorism references & architecture: Impact on customs.

The National Network of Fusion Center: Where We Have Been and Where We are Going

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field

ASEAN s Cyber Confidence Building Measures

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

Security Director - VisionFund International

OAS Cybersecurity Capacity Building Efforts

STRATEGIC PLAN. USF Emergency Management

Bradford J. Willke. 19 September 2007

Strategic and operational threat analysis at Europol's EC3

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

June 5, 2018 Independence, Ohio

Security and resilience in Information Society: the European approach

Donor Countries Security. Date

13967/16 MK/mj 1 DG D 2B

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Cybersecurity for ALL

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Issue I. Airport Communication Project

Package of initiatives on Cybersecurity

Overview of the Cybersecurity Framework

G7 Bar Associations and Councils

PIPELINE SECURITY An Overview of TSA Programs

Society, the economy and the state depend on information and communications technology (ICT).

TURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN

Valérie Andrianavaly European Commission DG INFSO-A3

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

10025/16 MP/mj 1 DG D 2B

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

NATIONAL INFORMATION SHARING STRATEGY

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Counter-Terrorism Working Group Proposed Workplan for 2017

Designing Robustness and Resilience in Digital Investigation Laboratories

Critical Information Infrastructure Protection Law

10007/16 MP/mj 1 DG D 2B

POSITION DESCRIPTION

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Virtual Currencies and The Commonwealth. 1 June 2016

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region

Thirteenth Symposium on the ICAO Traveller Identification Programme

Community-Based Water Resiliency

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

International cyber strategy for Norway

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Cybersecurity Strategy of the Republic of Cyprus

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

1. To provide an update on the development of the SPA Assurance Map.

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Physical Security Reliability Standard Implementation

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Hyogo Framework for Action:

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Sharing Knowledge for Green Growth

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting

Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System

Transcription:

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism ECAD 24 th Mayors Conference Kaunas, 12 June 2017

OSCE and Transnational Threats OSCE the largest regional security organization in the world Participating States (ps) Partners for Co-operation (PfC) 2

OSCE and Transnational Threats Forum for dialogue and a platform for action: - early warning, conflict prevention, crisis management and postconflict rehabilitation; Three dimensions of security: - Politico-military dimension; - Economic and environmental dimension; - Human dimension. 3

Which threats does the OSCE deal with? Terrorism Organized Crime Illicit Drugs and Chemical Precursors Trafficking in Human Beings Trafficking of Weapons Cybercrime Cyber security threats 4

Guidance on police development and reform Operationalization through desimination, awareness-raising workshops and trainings 5

Key Elements and Characteristics of ILP Systematic gathering and analysis of data and information; Strategic and operational intelligence products; Basis for improved and informed decision-making; Prioritization of activities; Allocation of resources. Top-down managerial and decision-making approach. 6

Key Elements and Characteristics of ILP Strategic intelligence products Threat assessment reports; Situation reports; Network analysis reports; Risk assessment reports; Early warning notifications. Operational intelligence products Profile analysis reports; Link analysis reports; Events analysis reports; Timeline analysis reports. 7

Key Elements and Characteristics of ILP ILP Decision Making Mechanisms Strategic Tasking and Co-ordination Meetings Strategic planning and setting strategic priorities and objectives; Resource allocation to implement strategic choices. Operational Tasking and Co-ordination Meetings Converting strategic plans into action plans, and matching requirements, priorities and resources; Evaluating new or updated operational intelligence reports and making decisions on new investigations or operational activities; Identifying information and intelligence gaps and tasking crime intelligence departments/units to fill these gaps; Monitoring existing operational progress. 8

Key Elements and Characteristics of ILP ILP Criminal Intelligence Mechanisms National Criminal Intelligence Departments Developing and implementing an annual national criminal intelligence plan; Drafting and presenting the national threat assessments; Providing criminal intelligence support to the regional level; Acting as the national point of contact to foreign law enforcement authorities. Regional Criminal Intelligence Departments Developing and implementing annual regional criminal intelligence plans; Collecting intelligence at the regional level, sharing it with local and national criminal intelligence mechanisms; Providing support to regional crime prevention; Supporting investigations and operations against regional and cross-border crime. Local Criminal Intelligence Units Collecting intelligence at the local level, sharing it with regional and/or national criminal intelligence departments for further processing; Conducting analysis and risk assessments for local events; Providing analytical support to local crime prevention. 9

Key elements and Characteristics of ILP Key Success Factors for ILP Clear legislative framework for ILP; Organizational structures for strategic direction, operational co-operation as well as decision-making; Interoperability and interconnectivity of IT systems; Knowledge and skills of police staff to properly share and process information; Collaborative culture of intelligence sharing; Political support and high-level governmental and managerial commitment; Careful tasking and prioritization of operational activities; Intelligence databases and processes and intelligence sharing should be subject to monitoring and control of an independent external control authority; Managers and analysts receiving information from law enforcement officers must give feedback. 10

ILP and Community Policing Key Characteristics of Community Policing Collective problem solving, crime prevention and building of trust between the police and the communities; Multi-stakeholder approach; Better and more reliable communications with and from the public; Open and uncovered gathering of potentially useful community information and intelligence is and should be a by-product of effective community policing, never its primary objective; Potential for community policing efforts to serve as a gateway of locally based information to prevent and target all forms of crime, including violent extremism and terrorism; ILP can help community officers to identify, prioritize and address issues of public concern more effectively. 11

ILP, Community Policing and VERLT Terrorism and violent extremism and radicalization that lead to terrorism (VERLT) are threats to community security, not just state security. Communities are therefore also stakeholders and partners in counterterrorism; Countering terrorism and VERLT requires a multidisciplinary and coordinated approach, with a broad range of public authorities involved; Community engagement in the context of VERLT needs to build on functioning police-community relations and community support, which cannot be assumed, it must be won; 12

ILP, Community Policing and VERLT ILP can provide all police officers with a clear vision of their role in countering terrorism and VERLT; Concerns of spying and targeting communities by the police can be largely alleviated when VERLT is explained and understood in the context of safeguarding communities; Community policing officers must be trained on signs and signals of VERLT and terrorism planning, and how to forward the information in line with national ILP procedures and human rights standards. 13

Promotion of the new OSCE Guidebook on Intelligence-Led Policing 14

Thank you for your attention! Thorsten Stodiek Deputy Head of Strategic Police Matters Unit Transnational Threats Department OSCE Secretariat 15