STRATEGIC POLICING REQUIREMENT

Size: px
Start display at page:

Download "STRATEGIC POLICING REQUIREMENT"

Transcription

1 STRATEGIC POLICING REQUIREMENT Briefing to the Police and Crime Panel Assistant Chief Constable James Vaughan

2 WHAT IS IT? Issued by Home Secretary as part of her statutory duty Outlines national threats and national policing capabilities required to counter them Focused on strategic policing needs to achieve this Structured in two parts Threats and Response Linked to National Policing Requirement (Police Owned)

3 PART A WHAT ARE THE THREATS? INTERNATIONAL TERRORISM OTHER CIVIL EMERGENCIES ORGANISED CRIME PUBLIC ORDER CYBER CRIME

4 PART B RESPONSE TO THE THREAT CAPACITY & CONTRIBUTION - outcomes expected CAPABILITY achieving the outcomes CONSISTENCY - delivered across all forces & other blue light services and national agencies CONNECTIVITY - joined up policing

5 TERRORISM Dorset SB is local footprint of wider national CT network since 2005 CTIU and CTU ACPO Counter Terrorism Co-ordination Centre (ACTCC) National tasking and co-ordination processes.

6 CIVIL EMERGENCIES The Civil Contingencies Act Disaster Planning and Civil defence Now Broader Definition - War or attack by a foreign power - Terrorism which poses a threat of serious damage to the security of the United Kingdom - Events which threaten serious damage to human welfare in a place in the United Kingdom - Events which threaten serious damage to the environment of a place in the United Kingdom.

7 LOCAL RESILIENCE FORUM Constituted in each Police Force area Broadened number of local bodies Category 1 Responders - Core responders with duty to share info and cooperate. - Police, Ambulance, Fire and rescue, Local authorities etc Category 2 Responders - Cooperating Responders - Utilities, Network Rail etc Military not categorised

8 B`MTH, POOLE & DORSET LRF County wide LRF co-ordinator appointed Olympics key to raising standards CLIO - management system Tablet Computers for virtual SCG s The Future - Maintain impetus following Games - OPCD - Loss of skilled staff

9 ORGANISED CRIME Single team for Major and Organised Crime Similar tactics 6-8 murders a year 10 year 100% success rate for homicide Force punches above its weight tackling Organised Crime

10 ORGANISED CRIME National strategy introduced in 2011 Local to global: reducing the risk to organised crime Stem the opportunities for organised crime to take root Strengthen enforcement action against organised criminals Safeguard communities, businesses and the state

11 ORGANISED CRIME Organised Crime Group Mapping - National coordination - 21 OCGs in Dorset (4 Red, 9 Amber, 8 green) - 21 OCG members arrested April to June 2012 Integrated Operating Model - Co-ordinated response across agencies against all individuals & OCGs - Assigned lead for each individual / OCG, highlighting response - Applied at local, regional, single-agency and national levels - Minimise bureaucracy and be consistently applied to all agencies - Contribute to the integrated operational response, enabling action against all known organised criminals.

12 OTHER RESOURCES Regional Organised Crime Unit Zephyr National Crime Agency (4 Command Areas) - Organised Crime Command - Economic Crime Command - Border Command - CEOP - Central intelligence function for all

13 PUBLIC ORDER Regional and national requirements (London riots 2011, Dale Farm evictions etc) - 3 PSU s - Response times of 1st = 2 hrs / 2 nd = 4 hrs / 3 rd = 8 hrs trained officers in Force - All Volunteers - National fitness test yearly - 10 Public Order Vans required

14 PUBLIC ORDER - ISSUES Ability to meet mobilisation requirements? - Timeliness and backfilling abstractions NPIA assessment compliant to new modules 7 of 10 vans old and require replacing Future EPT role

15 CBRN [Chemical Biological Radiological Nuclear] Police National CBRN Centre Ryton - Training programmes / National Standards - Overarching planning Force requirements - 3 CBRN PSU s 1 x Inspector, 3 x Sergeants and 21 x Constables (3 drivers) - 68 CBRN PSU volunteers - 8 CBRN search trained officers - 3 Crime Scene Investigator s - 14 Firearms trained CBRN officers - 2 Disaster Victim Identification (DVI) staff - All allocated personal issue kit

16 CYBER CRIME New description of criminal offences using technology Definition Actions by criminals, hacktivist, terrorist or state actors, or the discovery of vulnerabilities that could be exploited by such actors, within cyberspace that could result in damage (or the threat of damage) to information, infrastructure or services, or the theft of sensitive information, which would cause harm to organisations or individual

17 CYBER CRIME - Context Size and scale of the problem - Digital devices, internet Non geographic (who deals) - Availability of evidence from other countries Anonymity Speed of offending and transactions Technology advances No requirement on businesses to retain data

18 CYBER CRIME Force Response Hi Tech Crime Unit (HTCU) - 12 Week waiting list - 60% of workload ID & recovery of indecent images - 20% of workload Grooming & Other Sexual Offences - 10% of workload Drug related offences - 10% of workload Fraud & Other offences Telephony SPOC Unit - Telephony and internet retrieval of data Covert Internet Investigators - Regional capability

19 FIREARMS Firearms Strategic Threat and Risk Assessment Force requirement - 2 Double Crewed ARV s 24/7 365 days a year - On call Tactical Firearms Team Regional and National Mobilisation Plans - Double crewed Armed Response Vehicle (ARV) immediately - 6 Authorised Firearms Officers (AFO s) & Bronze Commander within 4 hours.

20 FIREARMS - Training 6 lane 50m indoor firing range Military ranges beyond 50m - Rifle officers No tactical training area - utilise military and council property Computerised judgemental training system (FATS).

21 FIREARMS - Future Rare to use high threat tactics (not used in SW region) Costly planning and training necessary? Regional response? Rifle Officers regional response Collaboration Force boundaries East and West Chief Inspector Post Greater responsibility

22 OPERATIONAL EXAMPLE - Operation POD July 2012 Murder Reece Menzies - London OCG Context - Olympics, 4 murders, 2 landslides, corporate manslaughter and 3 child deaths in 2 weeks Investigative Response - (9 A & S Officers) SW Region protocol CSI response - Wiltshire on standby Surveillance - 5 forces / agencies (Zephyr, CTIU) in addition to MetPol Specialist Covert Tactics - Wiltshire Firearms - Contingencies Hampshire and TVP for MAST

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

NOT PROTECTIVELY MARKED Agenda Item: 8

NOT PROTECTIVELY MARKED Agenda Item: 8 NOT PROTECTIVELY MARKED Agenda Item: 8 TO: FROM: Business Co-ordination Board Chief Constable DATE: 22 May 2013 THE NATIONAL POLICING REQUIREMENT 1. Purpose of Paper This paper provides an overview of

More information

AGENDA ITEM: 5E STRATEGIC POLICING REQUIREMENT (SPR)

AGENDA ITEM: 5E STRATEGIC POLICING REQUIREMENT (SPR) REPORT TO: STRATEGIC SCRUTINY MEETING DATE: Monday 23 December 2013 AGENDA ITEM: 5E STRATEGIC POLICING REQUIREMENT (SPR) SUBJECT: SPR Update Background The Strategic Policing Requirement (SPR) outlines

More information

The Strategic Policing Requirement. March 2015

The Strategic Policing Requirement. March 2015 The Strategic Policing Requirement March 2015 Contents Foreword by the Home Secretary 3 1. Introduction 4 2. National threats 7 3. Policing response: 5Cs 9-14 4. Capacity and contribution 9 5. Capability

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

Protective Marking: Overview:

Protective Marking: Overview: 1 Office of the Police Crime Commissioner Briefing Paper TITLE: Strategic Policing Requirement DATE: 1 st October 2015 AUTHORS: Vanessa Jardine, Russ Jackson, John O Hare, Anthony Mole Protective Marking:

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Cyber Crime ACC Crime

Cyber Crime ACC Crime AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board

More information

How do we Police Cyber Crime?

How do we Police Cyber Crime? How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Programme Director s Update February 2009

Programme Director s Update February 2009 East Midlands Regional Collaboration Programme 1. Current projects Programme Director s Update February 2009 The current position against planned milestones for the high priority projects is given at Appendix

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

Delivery Plan 2014 15

Delivery Plan 2014 15 Delivery Plan 2014 15 Foreword Recorded crime levels have fallen considerably over the last five years but we have also seen changes to the patterns of crime. The delivery plan demonstrates our commitment

More information

The Strategic Policing Requirement

The Strategic Policing Requirement The Strategic Policing Requirement An inspection of how police forces in England and Wales deal with threats of a large-scale cyber incident (including criminal attack) HMIC 2014 ISBN: 978-1-78246-402-0

More information

Major Incident Procedures. What businesses and the voluntary sector need to know

Major Incident Procedures. What businesses and the voluntary sector need to know Major Incident Procedures What businesses and the voluntary sector need to know Introduction This guide is designed to increase the understanding of the roles and responsibilities of the emergency services

More information

Thank you for your request for information regarding ACPO UAS Steering Group which has now been considered.

Thank you for your request for information regarding ACPO UAS Steering Group which has now been considered. c/o PO BOX 481 Fareham Hampshire PO14 9FS Tel: 02380 674255 Email: acpo.request@foi.pnn.police.uk 29/08/2013 Dear Mr Jones FREEDOM OF INFORMATION REQUEST REFERENCE NUMBER: 000113/13 Thank you for your

More information

Justice Sub-Committee on Policing. Armed police officers. Letter from HM Inspector of Constabulary in Scotland to the Convener

Justice Sub-Committee on Policing. Armed police officers. Letter from HM Inspector of Constabulary in Scotland to the Convener Justice Sub-Committee on Policing Armed police officers Letter from HM Inspector of Constabulary in Scotland to the Convener Terms of Reference for HMICS Assurance Review Police Scotland Standing Firearms

More information

IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services (VRQ)

IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services (VRQ) IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services (VRQ) Introduction The IFE Level 3 Certificate for Operational Supervisory Managers in Fire and Rescue Services

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

Guidelines on SPECIAL BRANCH WORK in the United Kingdom Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence

More information

Disaster Victim Identification (DVI) Policy Version 2.0 Summary

Disaster Victim Identification (DVI) Policy Version 2.0 Summary Freedom of Information Act Publication Scheme Protective Marking Not Protectively Marked Publication Scheme Y/N Yes Title Disaster Victim Identification (DVI) Policy Version 2.0 Summary This policy provides

More information

The Role of Police in Dealing With Vulnerable People

The Role of Police in Dealing With Vulnerable People PEEL: Police effectiveness 2015 (Vulnerability) An inspection of Lincolnshire Police December 2015 HMIC 2015 ISBN: 978-1-911194-28-6 www.justiceinspectorates.gov.uk/hmic Contents Vulnerability in numbers...

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

WILTSHIRE POLICE FORCE POLICY

WILTSHIRE POLICE FORCE POLICY Template v4 WILTSHIRE POLICE FORCE POLICY BUSINESS CONTINUITY MANAGEMENT SYSTEMS (BCMS) Effective from: July 2013 Version: 2.0 Next Review Date: July 2015 POLICY STATEMENT Wiltshire Police has a statutory

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED Thames Valley Police Authority 2009-10 Annual Delivery Plan Q4 Report Page 1 of 15 Contents Part 1 Performance against Force strategic objectives, measures and targets Force Performance Summary for 2009-10

More information

Police use of Firearms

Police use of Firearms CODE OF PRACTICE ON Police use of Firearms and Less Lethal Weapons Contents 1. Introduction 1.1 Purpose of the code 1 1.2 Statutory basis of the code 1 1.3 Weapons covered by this code 2 1.4 Armed support

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

Supply Chain Security Training Needs for Law Enforcement Agencies

Supply Chain Security Training Needs for Law Enforcement Agencies Supply Chain Security Training Needs for Law Enforcement Agencies Presented by Dr. Juha Hintsa, CBRA 1st CORE SUPPLY CHAIN FORUM, Transport & Logistics Fair September 24, 2015, Antwerp. HICL2015 Authors:

More information

MOPAC C:? Programme for 2014/15 for the re-building of the MPS cyber capability to deliver a transformational

MOPAC C:? Programme for 2014/15 for the re-building of the MPS cyber capability to deliver a transformational Title: Funding Application 2014/15 Cyber Crime Unit JEQUE5T FOR DMPC DECISION - DMPCD 2014 41 DMPCDv3 June 2012 1 F / Signature Date The aboyçjçest has my approval. Authority. Any such interests are recorded

More information

BUSINESS CONTINUITY MANAGEMENT REPORT (2014/15)

BUSINESS CONTINUITY MANAGEMENT REPORT (2014/15) For Information Public/Non Public* Public Report to: Joint Audit & Scrutiny Panel Date of Meeting: Thursday 12 February 2015 Report of: DCC Report Author: Paul White, Strategic Support Officer (Risk &

More information

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

PROGRAMME PREVENTION OF AND FIGHT AGAINST CRIME 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS Action Grants 2012 within the Framework Partnership Agreements Deadline 1: 10 August

More information

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need 1 The Alliance Value Proposition Alliance Value Proposition The threat posed today Terrorist threats

More information

Chapter 11 Wales. Revision to Emergency Preparedness

Chapter 11 Wales. Revision to Emergency Preparedness Chapter 11 Wales Revision to Emergency Preparedness Civil Contingencies Act Enhancement Programme October 2011 V3: Last updated 09/12/2010 PAGE 1 Chapter 11 (Wales) of Emergency Preparedness, Revised Version

More information

University Emergency Management Plan

University Emergency Management Plan University Emergency Management Plan This plan has been designed to be consistent with the format of the Emergency Action Plans held by the departments and buildings of the University. This will enable

More information

Investigations Support

Investigations Support Investigations Support for Fraud and Financial Crimes This document explains how CIFAS information can: support your investigations into any crime type - not just fraud disrupt Organised Criminal Groups

More information

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) Subject and version number of document: Serial Number: Business Continuity Management Policy

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Road Traffic Collisions File Retention Procedure

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Road Traffic Collisions File Retention Procedure FORCE PROCEDURES Road Traffic Collisions File Retention Procedure Procedure Reference Number: 2007.36 Procedure Author: DI C J Warren Procedure Review Date: April 2012 At the time of ratifying this procedure,

More information

How To Manage A Fire Risk

How To Manage A Fire Risk Greater Manchester Fire and Rescue Service Integrated Risk Modelling 2013/14 Contents Contents... 1 Introduction... 2 Our Legal Responsibilities... 2 Integrated Risk Management... 3 Integrated Risk Assessment

More information

Bridge Parish Council Community Emergency Plan

Bridge Parish Council Community Emergency Plan BRIDGE Parish Council Caring for the village Bridge Parish Council Community Emergency Plan IF YOU ARE IN IMMEDIATE DANGER CALL 999 October 2014 All enquiries relating to this document should be sent to:

More information

OFFICIAL. Operational Case for the Retention of Internet Connection Records

OFFICIAL. Operational Case for the Retention of Internet Connection Records Operational Case for the Retention of Internet Connection Records 1 Contents Chapter Page 1 Key Facts 3-5 2 What is an ICR? 6 3 The Value of ICRs 7 4 Why is there a problem? 8 5 How does this problem relate

More information

United Kingdom Human Trafficking Centre

United Kingdom Human Trafficking Centre Serious Organised Crime Agency United Kingdom Human Trafficking Centre Vince DEAN - Tactical Advisor vincent.dean@soca.x.gsi.gov.uk 0044 121 345 5520 Presentation Content Brief Overview of the UKHTC Operation

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

National Contact Management Strategy

National Contact Management Strategy National Contact Management Strategy 2012 NCMS 2012 NOT PROTECTIVELY MARKED 4 National Contact Management Strategy (NCMS) This document has been produced by the Association of Chief Police Officers (ACPO)

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

AVON AND SOMERSET POLICE AND CRIME COMMISSIONER RESPONSE COPACC THEMATIC: INNOVATION PART ONE: SUMMARY

AVON AND SOMERSET POLICE AND CRIME COMMISSIONER RESPONSE COPACC THEMATIC: INNOVATION PART ONE: SUMMARY AVON AND SOMERSET POLICE AND CRIME COMMISSIONER S OFFICE COPACC SUBMISSION: INNOVATION AVON AND SOMERSET POLICE AND CRIME COMMISSIONER RESPONSE COPACC THEMATIC: INNOVATION Submitted: Friday 30 th May 2014

More information

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO) Service Level Agreement between the Association of Chief Police Officers (ACPO) and the Internet Watch Foundation (IWF) 1 Sections 1. Parties to the Agreement 2. Introduction 3. Purpose of the Agreement

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy Not Protectively Marked Item 6 Appendix B DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Management Policy The Dorset & Wiltshire Fire and Rescue Authority () is the combined fire and rescue authority for

More information

The National Crime Agency A plan for the creation of a national crime-fighting capability

The National Crime Agency A plan for the creation of a national crime-fighting capability The National Crime Agency A plan for the creation of a national crime-fighting capability The National Crime Agency A plan for the creation of a national crime-fighting capability Presented to Parliament

More information

How To Improve Safety In Lancashire

How To Improve Safety In Lancashire Business Case for Area Base Grant Appendix B Theme: Safer Lancashire Board Improvement Initiative Being Proposed Lancashire Constabulary has conducted a review of Automatic Number Plate Recognition (ANPR)

More information

Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014

Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition

More information

Business Continuity Management Framework

Business Continuity Management Framework Business Continuity Management Framework Date of Issue: November 2013 Review Date: November 2014 Written by: Jackie Orchard Risk & Business Continuity Manager Authorised by: Signed off by: DCC Francis

More information

Working Together HMIC 2013. www.hmic.gov.uk

Working Together HMIC 2013. www.hmic.gov.uk Working Together A review of the arrangements for collaboration between the five East Midlands police forces, commissioned by the police and crime commissioners for the region HMIC 2013 www.hmic.gov.uk

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Emergency management in Cardiff. A practical guide

Emergency management in Cardiff. A practical guide Emergency management in Cardiff A practical guide Emergency management in Cardiff Introduction It is very unlikely that any of us will ever be caught up in an emergency or disaster, but by being informed

More information

POLICY. Yes. Crime Scene Attendance POLICY REFERENCE NUMBER

POLICY. Yes. Crime Scene Attendance POLICY REFERENCE NUMBER T PROTECTIVELY MARKED POLICY Security Classification Disclosable under Freedom of Information Act 2000 Yes T PROTECTIVELY MARKED POLICY TITLE Crime Scene Attendance POLICY REFERENCE NUMBER A003 Version

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT

Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT OCTOBER 2011 October 2011 CONTENTS EXECUTIVE SUMMARY... 1 BACKGROUND... 3 MISSION STATEMENTS... 4 MAJOR LAW ENFORCEMENT FUNCTIONS...

More information

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by:

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by: The Director Cyber Safety Policy and Programs Department of Communications GPO Box 2154 CANBERRA ACT 2601 Dear Director, Re: Discussion Paper on Enhancing Online Safety for Children NAPCAN (National Association

More information

LUTON BOROUGH COUNCIL. Taxi and Private Hire Licensing. Convictions and Fitness Policy

LUTON BOROUGH COUNCIL. Taxi and Private Hire Licensing. Convictions and Fitness Policy 1 Introduction LUTON BOROUGH COUNCIL Taxi and Private Hire Licensing Convictions and Fitness Policy 1.1. The purpose of this Policy is to provide guidance on the criteria used by the Council when determining

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

Draft Investigatory Powers Bill

Draft Investigatory Powers Bill Draft Investigatory Powers Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty November 1 Cm 912 Crown copyright 1 This publication is licensed under

More information

Working with Local Criminal Justice Boards

Working with Local Criminal Justice Boards Working with Local Criminal Justice Boards Guidance for youth offending teams Youth Justice Board for England and Wales 2005 www.youth-justice-board.gov.uk Youth Justice Board for England and Wales Contents

More information

Homeland Security for Schools: Threat Status Alert Worksheet

Homeland Security for Schools: Threat Status Alert Worksheet for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.

More information

EXPLANATORY MEMORANDUM & REGULATORY IMPACT ASSESSMENT FRAMEWORK

EXPLANATORY MEMORANDUM & REGULATORY IMPACT ASSESSMENT FRAMEWORK EXPLANATORY MEMORANDUM & REGULATORY IMPACT ASSESSMENT FRAMEWORK PART 1 - EXPLANATORY MEMORANDUM to the Fire and Rescue Services (Emergencies) (Wales) Order 2007 This Explanatory Memorandum has been prepared

More information

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101

More information

Pol 24/15 Appendix 2. National Policing Fraud Protect Strategy

Pol 24/15 Appendix 2. National Policing Fraud Protect Strategy National Policing Fraud Protect Strategy Draft prepared by the National Police Coordinator for Economic Crime V2.1 February 2015 1 PROTECTING THE COMMUNITY FROM FRAUD Introduction: This is the draft National

More information

Commonwealth Organised Crime Strategic Framework: Overview

Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart

More information

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security 3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are

More information

This PDF file contains interactive links to help you navigate the document quickly.

This PDF file contains interactive links to help you navigate the document quickly. National Policing Improvement Agency PRACTICE IMPROVEMENT This PDF file contains interactive links to help you navigate the document quickly. Clicking on any of the items in the main list of Contents will

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Hopkinsville Community College, Main Campus. The Michael Minger Act Report for 2010 Activity Reported for Calendar Year 2009

Hopkinsville Community College, Main Campus. The Michael Minger Act Report for 2010 Activity Reported for Calendar Year 2009 Hopkinsville Community College, Main Campus The Michael Minger Act Report for 2010 Activity Reported for Calendar Year 2009 Section 1: Campus Security Authority List campus security authority personnel

More information

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft COJUMA s Legal Considerations for Defense Support to Civil Authorities U.S. Southern Command 28 Miami, Florida Miami, Florida Draft Table of Contents Legal Considerations for Defense Support to Civil Authorities.....10

More information

Briefing 43. The Corporate Manslaughter and Corporate Homicide Act 2007. NHS Employers. Background. Key points

Briefing 43. The Corporate Manslaughter and Corporate Homicide Act 2007. NHS Employers. Background. Key points March 2008 Briefing 43 The Corporate Manslaughter and Corporate Homicide Act 2007 (CMCHA) comes into effect on 6 April 2008. The Act aims to ensure that organisations are held to account when a death has

More information

International cooperation between law enforcement authorities

International cooperation between law enforcement authorities Project against Economic Crime (PECK) International cooperation between law enforcement authorities Iliya Pulov International Operational Cooperation Directorate (IOCD), Ministry of Interior BULGARIA 23

More information

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range Tactical Range Facility Criminal Sgt. Major James Massey Range 11 Classes Offered Officer Safety & Field Tactics Officer Safety & Field Tactics in a Terrorism Environment Officer Safety & Field Tactics

More information

Asset Management Strategy

Asset Management Strategy Greater Manchester Fire and Rescue Service Asset Management Strategy 2013-2015 Appendix 1 Document Version Control Document Version Date Written by 0.1 June 2012 Andrea Heffernan 0.2 December 2012 Andrea

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

The Prevent duty. Departmental advice for schools and childcare providers

The Prevent duty. Departmental advice for schools and childcare providers The Prevent duty Departmental advice for schools and childcare providers June 2015 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice for? 3 Main points 3 Introduction

More information

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone Of Citadels And Sentinels: State Strategies For Contesting Cyber-terror Tim Legrand and Jeff Malone 4 key issues and challenges 1. A cyber architecture designed for efficiency, not security 2. Private

More information

Making every child matter... everywhere. Preparing a European response to combat the commercial distribution of child abuse images

Making every child matter... everywhere. Preparing a European response to combat the commercial distribution of child abuse images Making every child matter... everywhere An indecent profit Preparing a European response to combat the commercial distribution of child abuse images A two-day conference Tuesday 3 March - Wednesday 4 March

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Major Incidents. A Guide for Local Businesses. Somerset Local Authorities Civil Contingencies Partnership

Major Incidents. A Guide for Local Businesses. Somerset Local Authorities Civil Contingencies Partnership Major Incidents A Guide for Local Businesses Somerset Local Authorities Civil Contingencies Partnership March 2006 Introduction This guide is designed to increase local businesses understanding of the

More information

CONTEST: The United Kingdom s Strategy for Countering Terrorism

CONTEST: The United Kingdom s Strategy for Countering Terrorism CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

Crime and Policing newsletter: March 2013

Crime and Policing newsletter: March 2013 Page 1 of 5 Home Office Part of: Crime and Policing newsletter: March 2013 Crime and Policing newsletter: March 2013 Published 2 April 2013 The March edition of the newsletter. HMIC review On 12 March

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Health Scrutiny Committee 20 November 2012 Subject: Substance Misuse Partnership Report of: Director of Community and Children s Services Summary

Health Scrutiny Committee 20 November 2012 Subject: Substance Misuse Partnership Report of: Director of Community and Children s Services Summary Committee(s): Date(s): Health Scrutiny Committee 20 November 2012 Subject: Substance Misuse Partnership Report of: Director of Community and Children s Services Summary Public For Information On 12 November

More information

CCMT Sponsor ACC Neighbourhood Policing & Partnerships Department/Area Headquarters Section/Sector Neighbourhood Policing & Partnerships

CCMT Sponsor ACC Neighbourhood Policing & Partnerships Department/Area Headquarters Section/Sector Neighbourhood Policing & Partnerships Policy Title Ride-Along/Walk-Along CCMT Sponsor ACC Neighbourhood Policing & Partnerships Department/Area Headquarters Section/Sector Neighbourhood Policing & Partnerships CONTENTS: 1.0 Rationale 2.0 Intention

More information

united states Department of state Bureau of Diplomatic Security Diplomatic Security

united states Department of state Bureau of Diplomatic Security Diplomatic Security united states Department of state Bureau of Diplomatic Security Diplomatic Security REGIONAL SECURITY OFFICE 1 Introduction... 1 Law Enforcement and Security Services... 3 U.S. Embassy, Personnel, and

More information

The Asian Event Dedicated to Homeland and Civil Security

The Asian Event Dedicated to Homeland and Civil Security The Asian Event Dedicated to Homeland and Civil Security In a market with strong needs in security matters, Asia Pacific Homeland Security responds to the expectations of governments, urban local administrations,

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information