Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group
|
|
- Mary Quinn
- 8 years ago
- Views:
Transcription
1 Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group Workshop on Prison and Security Issues and Implementation of the GCTF Rome Memorandum on the Rehabilitation of Violent Extremist Offenders Good Practices November 2014 Abuja, Nigeria Overview Summary On November 2014, Nigeria hosted a Global Counterterrorism Forum (GCTF) workshop, in cooperation with the United States, on prison and security issues and implementation of the GCTF Rome Memorandum on Good Practices for the Rehabilitation and Reintegration of Violent Extremist Offenders (Rome Memorandum). The workshop, which was organized under the auspices of the GCTF s Criminal Justice and Rule of Law and Detention and Reintegration Working Groups, brought together prison, law enforcement, and counterterrorism (CT) officials, as well as investigators, academics, consultants, and other practitioners from GCTF members, Sahel region countries, the United Nations (UN), and non-governmental organizations (NGOs). Discussion focused on how effective implementation of Good Practices 1-6 in the Rome Memorandum can support internal and external prison security, which serve as the foundation for effective rehabilitation and reintegration programs. Participants reviewed several case studies to identify practical, human rights-compliant methods for implementing thorough prison security procedures that will enable successful intake, assessment, and classification programs; sound segregation, integration, and communication control measures; and valuable prison intelligence programs. Key cross-cutting themes that emerged from the workshop included the following: The importance of establishing a comprehensive prison security program that can enable effective rehabilitation and reintegration programs. Participants stressed that corrections officials and prison staff should employ basic, sound, correctional practices that establish a safe and secure prison environment, which protects against internal and external threats, and provide good care and custody to inmates. This will facilitate the development and implementation of effective rehabilitation and reintegration programs. Comprehensive intake, assessment, and classification procedures for inmates support a secure prison environment and enable operation of effective rehabilitation and reintegration programs. Panelists stressed that assessment of inmates should begin the moment they enter the penal system and should be a continuous process throughout the lifecycle of the inmate s detention. Intake, assessment, and classification procedures should be methodical, scientific, and standardized, and the results should be shared with prison guards, and corrections, law enforcement, and intelligence officials, and
2 - 2 - rehabilitation staff. The process should also inform key decisions about prison security programs, individual rehabilitation programs, and the development and implementation of prison intelligence programs. Panelists emphasized the importance of special procedures for terrorist inmates in particular, as they represent a unique group within the broader general inmate population who require individual evaluation, special care, and special custody arrangements. Prison security programs should consist of redundant, mutually supportive procedures that enable a controlled environment. In order to operate safe and effective rehabilitation and reintegration programs, corrections officials and prison staff should implement redundant security procedures. These could include physical security safeguards, procedural security mechanisms, and dynamic security processes, such as inmate engagement and intelligence programs. Security policies and procedures should also include contingency plans and corrections officials and prison staff should undergo continuous training with regular audits on response and implementation. Application of segregation, integration, and communication control mechanisms should consider a prison s capacity and the specific needs of its inmate population. It is important for corrections officials to individually assess their prison; its facilities; the capacity, resource, and training of its staff; and various factors including local culture and legislation when making determinations about the most efficient control mechanisms. The needs of various inmate populations may differ according to local circumstances and prison demographics. Participants emphasized that a one-size-fits-all approach for control mechanisms cannot support effective prison security or meaningful rehabilitation and reintegration programs. Drawing from different case studies, participants discussed how different segregation and integration models have each been used as effective control mechanisms for terrorist inmates in various situations. The value and challenge of operating effective prison intelligence programs. Effective prison intelligence programs support good prison security, help inform rehabilitative services, and support intake, assessment, and classification procedures. However, due to the unique and controlled environment in which they operate, prison intelligence programs also face unique challenges, including separation of intelligence sources from one another to ensure the veracity of information and operating in segregated versus integrated inmate environments. To ensure legitimacy and overall effectiveness, prison intelligence programs should be implemented with accompanying legal and policy frameworks and operated in compliance with human rights and in a manner that supports engagement with inmates and prison rapport. Summary The following is a thematic summary of the workshop. It is not intended to be a transcript of the proceedings. Opening Remarks Acting Controller General (CG) of the Nigerian Prison Service (NPS), Aminu Sule, and U.S. Ambassador to Nigeria, James Entwistle, welcomed participants to the workshop. Acting CG Sule
3 - 3 - noted that prisons play an important and unique role in rehabilitating and reintegrating offenders. He underscored Nigeria s commitment to the GCTF and to the continued implementation of the Rome Memorandum, noting that this workshop was part of several Nigerian initiatives designed to disrupt acts of violent extremism and rehabilitate offenders. He also noted that Nigeria and its prison service face mounting challenges posed by growing and increasingly complex prison populations, limitations in operational capacity, and the persistence of threats from violent extremists, including Boko Haram. Acting CG Sule highlighted the need for continued international cooperation and capacity building as effective methods for countering these dangerous trends. Ambassador Entwistle noted that successful and effective implementation of the Rome Memorandum is a major undertaking requiring strong cooperation across governments; an extensive outreach strategy to the most vulnerable segments of the population; and collaboration with civil society organizations and community and traditional leaders. In order for these efforts to succeed, they must be predicated on the basic principles of sound correctional practice upon which effective rehabilitation and reintegration programs can be built. Session 1: Security Enabling Rehabilitation Panelists from the NPS and the United Nations Interregional Crime and Justice Research Institute (UNICRI) discussed how good prison security facilitates and enables the therapeutic environment necessary for an effective rehabilitation program. They reinforced that without good prison security management, follow-on rehabilitation and reintegration programs cannot succeed. They emphasized that in order to ensure security programs are capable of supporting rehabilitation, corrections officials should define the security mission for their guards and staff and articulate how it supports broader rehabilitation goals. This not only supports the development of a welltrained, invested staff that provides good care and custody, and who respect the detainee and their rights, but it also enables staff to engage more effectively with prisoners, build rapport, and address problems in a timely manner all of which help reinforce and support rehabilitation programs and provide for a more secure environment. Participants also discussed the need to strike the proper balance between security and rehabilitation programs, which requires slow and measured progress sustained by feedback and data collection. In their overview of the Nigerian deradicalization and rehabilitation program, which is currently under development and expansion, the NPS described the intake, assessment, classification, and segregation programs that will inform prison security programs, underscoring that they are critical to ensuring that prison staff can provide a safe, secure, and rehabilitative environment. These types of assessment programs offer the best opportunity to mitigate the tension between security and rehabilitation programs. The panelists were also careful to point out that developing these types of structures constitutes a long and laborious process that requires sustained government support and political will. Session 2: Developing an Effective Security Program Representatives from the European Union Technical Assistance to Nigeria s Evolving Security Challenges (EUTANS) mission and the U.S. Department of Justice s International Criminal Investigative Training Assistance Program (ICITAP) offered insights on how to develop and implement an effective prison security program. EUTANS discussed three types of security that
4 - 4 - should be employed in prisons: (1) physical; (2) procedural; and (3) dynamic. These elements support prison staff s ability to deter, detect, and disrupt inmate misconduct and disturbances within a prison so that a controlled environment can be established and effective rehabilitation programs can be implemented. To ensure that a controlled environment can be maintained in the face of unexpected events, such as fires, riots, or external attacks on the prison, EUTANS recommended that corrections officials establish incident management plans that clearly specify roles and responsibilities for prison staff. These plans should include various contingency strategies and staff should undergo continuous training to ensure they can react quickly, efficiently, and in a coordinated manner. EUTANS also encouraged prisons to have a security committee responsible for auditing and testing the security of the institution and the responses of its staff. ICITAP echoed earlier comments that safe, effective, and smoothly-operated rehabilitation programs have their roots in the basic principles of sound correctional practice and good security programs, noting that the UN Standard Minimum Rules for the Treatment of Prisoners provides an effective baseline guide for inmate management procedures. With regard to terrorist inmates, ICITAP noted that additional procedures are often required. To safeguard the security and good order of the prison and to support broader national CT goals, such as terrorist network mapping and intelligence collection, security programs for terrorist inmates should include segregation procedures, direct supervision by highly-trained and professional staff, and careful deconfliction between security and rehabilitation programs. Several participants asked about good practices for responding to large-scale prison escapes. Panelists reiterated their points regarding the importance of a well-trained staff and an effective prison intelligence program, but also stressed the need for good communication and strong coordination between the various security services, noting that a proactive approach rather than a reactive one offered the best opportunity for ensuring prison safety and security. Session 3: Effective Intake, Assessment, and Classification Programs Panelists from the International Centre on Counter-Terrorism The Hague (ICCT) and the Sacramento County, California jail system discussed the importance of an effective intake, assessment, and classification program that can help corrections officials tailor their security and rehabilitation programs. Both noted that prison staff cannot effectively rehabilitate an inmate or help them in a significant way if they do not have a firm understanding of the person s background, vulnerabilities, needs, and individual motivation, a point that was reiterated by several other panelists and participants throughout the course of the workshop. ICCT reemphasized earlier comments that terrorist inmates and violent extremist offenders are unique from inmates in the general prison population and must be approached differently. Understanding those differences and responding accordingly hinges on the intake, assessment, and classification process, and should begin when a prison first has contact with an inmate. Absent this evaluative process, it is difficult for corrections officials to provide the rehabilitative services inmates require or the safe and secure environment that enables such programs. The panelist from the Sacramento County (California, USA) Jail system emphasized that intake, assessment, and classification procedures should operate as an interdependent process in which one phase informs the other. This process should also be organized and overseen by an expert so that it can be operated in a methodical, scientific, and standardized way. To that end, both panelists challenged the idea that intake, assessment, and classification is an initial or static
5 - 5 - process that occurs only upon an inmate s entry to the prison. To the contrary, they underscored that the most effective programs are continuous throughout detention of the inmate and serve as the basis for the inmate s rehabilitation program, providing the necessary data to design a tailored plan. Participants pointed out that comprehensive risk assessments must not only precede the design of any tailored security programs for a prison, they should be conducted at various stages within the prison, from the level of the individual inmate up through the general prison population. Session 4: Segregation, Integration, and Communication Control Measures Officials from Morocco s Prison Administration and the Sacramento County Jail system shared their different experiences with segregation, integration, and communication control measures. They highlighted the need for individual assessment that is dependent on local circumstances. Morocco recalled its experience with the 2003 Casablanca bombings, following which terrorist inmates were segregated into a single facility. Increasing challenges associated with offender management, increased radicalization stemming from the symbol of a single terrorist detention facility, and security concerns about a threat of a single prison escape led Morocco to reevaluate its control measures and instead elect for an integrated system in which terrorist inmates are dispersed throughout the general prison population. Through this system, Morocco has been able to move terrorist inmates closer to their families, which has supported community engagement and rehabilitation efforts, as well as more effectively control extremists communications with outside parties and remove them from areas where they previously held influence. The official from the Sacramento County jail system offered an alternative method, noting that California primarily opts to segregate extremist or high-threat inmates, using minimum, medium, and maximum sub-divisions as part of its classification schema. In order to support effective operation of this system, however, the official stressed that there should be a designated classification unit with primary control over the prison s housing unit. This allows them to manage a fluid process, conduct continual reevaluations, and make adjustments to ensure the continued safe operation of the prison. The official also pointed out the challenges associated with such a system, as improper or hasty segregation poses serious risks that can denigrate the security of the prison, complicate efforts to prevent or intercept communications between inmates, and inhibit the effectiveness of other rehabilitative programs. Both panelists stressed the need for corrections officials to evaluate the capacity, resources, and training of their prison staff, as well as factors such as the local culture and the culture of the prison, physical facilities, national laws, and established policies and procedures when evaluating an inmate and before making decisions about whether to segregate or integrate them vis-à-vis the general prison population. Regional representatives asked for insights on how to best institute control measures in light of limited capacity and resources. Several low-cost good practices were discussed, including an emphasis on training to ensure staff has strong bedrock correctional skills, a basic understanding of intake, assessment, and classification, and the ability to recognize the warning signs of potential radicalization. Leveraging available community-based organizations and increasing communication and cooperation between security officials were also highlighted as good practices. Session 5: The Foundations for an Effective Rehabilitation Program and Training for Prison Staff
6 - 6 - Panelists from the International Centre for Political Violence and Terrorism Research in Singapore (ICPVTR) and ICITAP noted the importance of training prison staff on the foundational elements of an effective rehabilitation program. The need to define the focus of the program, and the importance of a broad set of measurement tools as part of an ongoing intake, assessment, and classification program that informs prison staff training and a rehabilitation program, were recurring themes of the session. ICPVTR noted that corrections officials should be clear about the goals of their rehabilitation program and specify whether the desired outcome for the inmate is deradicalization or disengagement. Each supports broader reintegration goals, but the specific steps for either can vary according to host of individually assessed factors. Both the holistic approach to rehabilitation and specific strategies used to engage a particular inmate also depend on evaluation of the inmate and the desired end goals of the program. Programs involving religious counseling, psychiatric evaluation, vocational training, recreational or sports activities, and creative arts, combined with appropriate community engagement, were all cited as possible methods for supporting successful deradicalization or disengagement program. In order to ensure maximum effectiveness, ICPVTR reiterated earlier comments about the need to deconflict security programs with rehabilitation programs. For terrorist inmates, ICITAP called for a proactive model of inmate management which can account for the challenges posed by this unique population. The proactive model segregates terrorist inmates from the general prison population and ensures they are monitored by highly trained prison staff, who are in turn closely supervised. The panelist advocated for a direct supervision model of inmates in order to ensure the security and safe operation of the prison, but also to ensure that staff are able to monitor and report on institutional matters. Following these reports, information collected by prison staff should be shared with corrections and law enforcement officials, intelligence analysts, and rehabilitation staff, and should inform continuous intake, assessment, and classification procedures being operated by prison staff. Additionally, as part of this proactive model, any accompanying rehabilitation program should be designed and implemented in close consultation with experts due to the fact that terrorist inmates will often actively resist government efforts to rehabilitate them. Session 6: Effective Prison Intelligence Programs An official from the New South Wales (NSW) Corrective Service in Australia and an expert from the New York-based Soufan Group, a strategic security intelligence firm, discussed implementation of intelligence programs inside prisons. The NSW Corrective Service shared its experience with developing risk assessment tools that have been implemented in NSW prisons. These include routinized vetting procedures and collection of inmate data that is shared with corrections and law enforcement officials and intelligence agencies. The NSW Corrective Service also provided an account of their experience with developing the legislative and policy frameworks to authorize and enable the implementation of its risk assessment and collection programs in prisons, noting that this is a commonly overlooked but nonetheless important element of instituting an effective prison intelligence program. The NSW Corrective Service discussed the Australian Radicalisation Extremism Awareness Program (REAP), which is designed to educate corrections officials and prison staff on the indicators associated with radicalization so they can better use information to support their risk assessment and reporting operations. The Soufan Group representative offered perspectives on inmate-level intelligence collection programs, outlining a series of low-cost, non-resource intensive steps that can be taken to support
7 - 7 - broader intelligence goals and rehabilitation programs. Echoing other panelists comments on the importance of intake, assessment, and classification, the Soufan Group representative stressed that as soon as a person is detained, initial assessment needs to begin. To enable this effectively, law enforcement or security forces should request that an intelligence officer or corrections official accompany them on operations to detain suspects so that effective, human rights-compliant interrogation can begin as soon as an individual is in custody. Thereafter, demonstrating professionalism, asking slow and measured questions, exhibiting kindness, and treating the inmate with humanity are critical to establishing rapport. It was also noted that such actions not only yield higher quality intelligence more quickly, but also support long-term rehabilitation efforts. The importance of being truthful with inmates was also highlighted, as lying undermines trust and can compromise the effectiveness of the intelligence program. Finally, the Soufan Group representative pointed out that the process of radicalization takes years, and that corrections officials and prison staff should be prepared for an equally long process for successful rehabilitation to occur. Understanding an inmate s motivations is therefore crucial to supporting that process and to building a counter narrative that can be employed both in and outside of a prison setting. Several participants asked guidelines for how or when intelligence information should be shared with security officials outside of the prison setting. A discussion about the need to share information across government and at various levels ensued, with several participants highlighting that sharing intelligence information gathered inside a prison is an effective way for prison officials to build rapport with other elements of the government. Participants agreed that intelligence information must make its way into the hands of those who need it, but that national legislation governing the use of intelligence and how it can be shared must be observed and considered on a case-by-case basis. Wrap-Up, Way Ahead and Closing Remarks Several themes arose from the discussion, including the importance of establishing a strong security environment that can enable rehabilitation efforts; the need for continual intake, assessment, and classification procedures; and the value of an effective prison intelligence program, particularly its ability to inform provide useful, actionable information to corrections and law enforcement officials and rehabilitation staff. The need for governments to conduct their own evaluations regarding segregation and integration and to consider which method will be most effective given available resources, staff abilities, and local context was also highlighted. Participants agreed that efforts to build capacity at the local level, beginning with prison level staff and corrections officials, through increased training and communication between security partners were key, non-resource intensive steps that could be taken now to begin addressing immediate threats and gaps particularly those identified by Senegal and Chad. Nigeria noted that it would continue to develop its intake, assessment, and classification procedures in conjunction with its broader work to expand the NPS deradicalization and rehabilitation program, bearing in mind the comments experts had offered during the workshop. There was general consensus that although there are enduring challenges associated with developing and implementing prison security and rehabilitation programs, workshops such as this are imperative to finding creative ways to work together to address challenges and move forward.
I Conference Summary
Executive Summary Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices & Lessons Learned 6-9 December 2011, The Hague Contents I Conference Summary... 2 Background
More informationDetention and Reintegration Working Group
Detention and Reintegration Working Group Workshop on Education, Life Skill Courses and Vocational Training for Incarcerated Violent Extremist Offenders 7-8 October 2015 Nairobi, Kenya Overview Co-Chairs
More informationRome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders
Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to
More informationRome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders
Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to
More informationGood Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism
Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization
More informationCountering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington
Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Chair s Summary Overview Community-Oriented Policing (COP)
More informationVALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION
VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,
More informationA Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit
The International Centre for Counter-Terrorism (ICCT) has a vacancy for: A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 1 August 2015
More informationEUROPEAN UNION COMMON POSITION ON UNGASS 2016
EUROPEAN UNION COMMON POSITION ON UNGASS 2016 UNGASS 2016 is a key opportunity for the international community to take stock of the achievements of the international drug control system to date, to elaborate
More informationPolicy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit
The International Centre for Counter-Terrorism (ICCT) has three vacancies for: Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 17 August
More informationHedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities
Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation
More informationTraining Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
More informationAbu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism
Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism Background This non-binding good practices document 1 focuses on the ways in which education can be used as a resource
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationSouth-East Asia Region Capacity-Building Working Group (SEA WG)
South-East Asia Region Capacity-Building Working Group (SEA WG) Third Meeting of the South-East Asia Capacity Building Working 18-19 November 2013 Yogyakarta, Indonesia Summary The third meeting of the
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More informationREHABILITATION SERVICES PROVIDED BY THE CORRECTIONAL SERVICES DEPARTMENT. Executive Summary
REHABILITATION SERVICES PROVIDED BY THE CORRECTIONAL SERVICES DEPARTMENT Executive Summary 1. The mission of the Correctional Services Department (CSD) is to protect the public and reduce crime by providing
More informationFirst Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing
Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing 14-15 May 2014 Marrakech, Morocco Summary Hosted by
More informationCRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
More informationCorrective Services NSW Offender Classification & Case Management Policy & Procedures Manual 3.1 CORRECTIVE SERVICES NSW (CSNSW)
Corrective Services NSW Offender Classification & Case Management Policy & Procedures Manual 3.1 CORRECTIVE SERVICES NSW (CSNSW) CASE MANAGEMENT POLICY TABLE OF CONTENTS 3.1 CORRECTIVE SERVICES NSW (CSNSW)...
More informationStatement by. Michael A. Corriero Executive Director New York Center for Juvenile Justice. to the
Statement by Michael A. Corriero Executive Director New York Center for Juvenile Justice to the New York Advisory Committee to the U.S. Commission on Civil Rights July 0, 20 My name is Michael Corriero.
More informationDepartment of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
More informationNational Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
More information64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,
More informationBest Practices in Mental Health at Corrections Facilities
POLICY BRIEF November 2011 Best Practices in Mental Health at Corrections Facilities Sahil Jain Introduction Police, court personnel, and correctional staff interact with, stabilize, and treat more persons
More informationBUILDING ON THE GCTF s ROME MEMORANDUM: Additional Guidance on the Role of Psychologists/Psychology in Rehabilitation and Reintegration Programs
BUILDING ON THE GCTF s ROME MEMORANDUM: Additional Guidance on the Role of Psychologists/Psychology in Rehabilitation and Reintegration Programs Note: This document will be submitted to the GCTF and to
More informationTerrorists in Prison Evaluation of the Dutch terrorism wing
SUMMARY Terrorists in Prison Evaluation of the Dutch terrorism wing Tinka M. Veldhuis, Msc. Prof. Dr. Ernestine H. Gordijn Prof. Dr. Siegwart M. Lindenberg Dr. René Veenstra University of Groningen Faculty
More informationManifesto for Education Empowering Educators and Schools
Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments
More informationUNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013
UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies
More informationAmbassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004
Statement to the 60 th Session of the UN Commission on Human Rights Ambassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004
More informationSecurity Risk Assessment Tool
Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationMeeting Summary. Key themes that emerged during the seminar include:
Countering Violent Extremism (CVE) Working Group CVE through Communications Work Stream Practical Seminar on Monitoring and Evaluation Techniques for CVE Communication Programs 10-11 February 2013 Abu
More informationObjective Prison Classification, The cornerstone to good prison security
Montecito # 38, WTC Piso 10, Oficina 18 Col. Nápoles México, 03810, D.F. Tel: (55) 9000 80 04 Objective Prison Classification, The cornerstone to good prison security Classification systems help minimize
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationIt s time to shift gears on criminal justice VOTER
It s time to shift gears on criminal justice VOTER TOOLKIT 2014 Who are the most powerful elected officials most voters have never voted for? ANSWER: Your District Attorney & Sheriff THE POWER OF THE DISTRICT
More informationTENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Wm. R. Snodgrass TN Tower, 25 th Floor Nashville, TN 37243 (615) 532-7825 homelandsecurity@tn.gov Page 1 TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY Current as of June 1, 2013 LAW ENFORCEMENT
More informationMeeting the Challenges Posed by High Risk Offenders
Meeting the Challenges Posed by High Risk Offenders Types of High Risk Offenders High Risk offenders can be classified into four categories. These include the most violent, disruptive hardened criminals
More informationForeign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon
Foreign Terrorist Fighters (FTF) Initiative The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Introduction The threat posed by Foreign Terrorist Fighters
More informationOrganization for Security and Co-operation in Europe
Organization for Security and Co-operation in Europe The Review of the United Nations Global Counter-Terrorism Strategy 12-13 June 2014, New York Remarks by Mr. Thomas Wuchte, Head on Anti-terrorism Issues
More informationAMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism
AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism Expanding Counterterrorism Partnerships: U.S. Efforts to Tackle the Evolving Terrorist Threat Washington Institute for Near East Policy 1828 L
More informationTENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,
More informationTOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND
All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR
More informationCommunity Policing. Defined
Community Policing Defined The Primary Elements of Community Policing Nonprof its / Service Providers Using the Crime Triangle Community policing is a philosophy that promotes organizational strategies
More informationMadrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings
Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September
More informationIMPROVING YOUTH OUTCOMES
IMPROVING YOUTH OUTCOMES Illinois Department of Juvenile Justice 2015 Operating Plan Summary candice jones Director the honorable bruce rauner Governor Mission The mission of the Illinois Department of
More informationDenver Police Department Law Enforcement Advocate Program. Scanning: When a developmentally delayed youth was involved in a police shooting in 2003,
Denver Police Department Law Enforcement Advocate Program Summary Scanning: When a developmentally delayed youth was involved in a police shooting in 2003, the incident increased neighborhood distrust
More information2012 Party Platforms On Criminal Justice Policy
2012 Party Platforms On Criminal Justice Policy September 2012 1 2012 PARTY PLATFORMS ON CRIMINAL JUSTICE POLICY THE SENTENCING PROJECT The Washington Post recently reported that the gulf between Republicans
More informationTwelfth United Nations Congress on Crime Prevention and Criminal Justice
United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations
More informationEU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
More informationThe Need to Share: The U.S. Intelligence Community and Law Enforcement
The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need
More informationECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye
ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa dbarakamfitiye@issafrica.org 0 www.issafrica.org OUTLINE Historical Overview
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationA public protection order is a court order that will allow the detention of very high risk individuals at a secure facility within prison precincts.
Q+A - Public Safety (Public Protection Orders) Bill What are public protection orders (PPO)? A public protection order is a court order that will allow the detention of very high risk individuals at a
More informationCriminal Justice Upper Division Restricted Electives Undergraduate Courses
Criminal Justice Upper Division Restricted Electives Undergraduate Courses CCJ 3058 Origins of Criminal Justice 3(3, 0) PR: CCJ3024 or C.I. Study of criminal justice system evolution. Focus on developments
More informationChairman s Summary 1 OPENING SESSION
Federal Department of Foreign Affairs FDFA Conference between the Members of the Global Counterterrorism Forum and the United Nations as well as Other International, Regional and Sub-regional Organizations
More informationThe Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel
U.S. Department of Justice Criminal Division Fraud Section Washington, D.C. 20530 The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel Bribery of foreign officials to gain or
More informationCOMPACTCommunityPartnershipAction
COMPACTCommunityPartnershipAction PROGRAM AND GRANTS INFORMATION THE MULTICULTURAL NSW COMPACT COMPACT stands for Community, in Partnership, taking Action to safeguard Australia s peaceful and harmonious
More informationSecurity Management Systems (SEMS) for Air Transport Operators. Executive Summary
Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early
More informationHouse Energy and Commerce Subcommittee on Communications, Technology, and the Internet
House Energy and Commerce Subcommittee on Communications, Technology, and the Internet Hearing on H.R. 1084, the Commercial Advertisement Loudness Mitigation (CALM) Act; H.R. 1133, the Family Telephone
More informationCO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
More informationThe Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
More informationUNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY
Executive Board Hundred and ninety-seventh session 197 EX/46 PARIS, 7 October 2015 Original: English Item 46 of the provisional agenda UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT
More informationSTATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
More informationEvaluation of counterterrorism policy
SUMMARY Evaluation of counterterrorism policy Policy evaluation is booming. Evaluation research is taking place in diverse policy areas. With regard to the counter-terrorism policy (CT) of the Netherlands
More informationResolving & Managing Regional and Global Conflicts: The Role of Information Technology
DELIVERED AT THE 11TH INTERNATIONAL CONFERENCE OF THE NIGERIA COMPUTER SOCIETY (NCS) HELD AT THE ROYAL PARK HOTEL, ILOKO-IJESA, THE STATE OF OSUN, NIGERIA (24-26 JULY, 2013) Resolving & Managing Regional
More informationWhy you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
More information2006-2007 Santa Barbara County Civil Grand Jury A NEW NORTH COUNTY JAIL? A Need That Will Not Go Away!
A NEW NORTH COUNTY JAIL? A Need That Will Not Go Away! For approximately a generation, the need for a new North County Jail has been recognized. At the least, there have been costs and dangers associated
More informationThe Human Rights Law Centre is an independent, non-profit, non-government organisation which protects and promotes human rights.
Ruth Barson Human Rights Law Centre Ltd Level 17, 461 Bourke Street Melbourne VIC 3000 T: + 61 3 8636 4450 F: + 61 3 8636 4455 E: ruth.barson@hrlc.org.au W: www.hrlc.org.au The Human Rights Law Centre
More informationJanuary IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
More informationPOLICY AND PROCEDURE NO.710 Juvenile Arrests Date Issued August 17, 2004
POLICY AND PROCEDURE NO.710 Juvenile Arrests Date Issued August 17, 2004 Date Effective August 17, 2004 Revision No. No. of pages 7 GENERAL CONSIDERATIONS AND GUIDELINES: The Worcester Police Department
More informationFive-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
More informationNOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM
NOTICE OF PRIVACY PRACTICES Effective Date: April 14, 2003 UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN
More informationHANDOUT 1: Purpose and Principles of Sentencing in Canada
HANDOUT 1: Purpose and Principles of Sentencing in Canada Principles of Sentencing The Criminal Code of Canada outlines the principles and purpose of sentencing in s. 718. These principles are placed in
More informationPHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence
More informationPrince William County Police Department Enforcement of Federal Immigration Law
Prince William County Government Prince William County Police Department Enforcement of Federal Immigration Law December 2006 Presentation Overview Background Federal Delegation of Immigration Enforcement
More informationCYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
More informationMoving Towards a Federal Criminal Justice System By Timothy P. Cadigan and Bernadette Pelissier
Moving Towards a Federal Criminal Justice System By Timothy P. Cadigan and Bernadette Pelissier The recent literature has been replete with discussions of the need to move the disparate agencies of the
More informationUNODC World Drug Report 2016:
UNODC World Drug Report 2016: Launch in Geneva on 23 June 2016 Briefing to the Member States and Civil Society Organizations Remarks by Aldo Lale-Demoz, Deputy Executive Director, UNODC UNODC is honoured
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationUmar Patek: The Test of a Prison System
Umar Patek: The Test of a Prison System An Analysis By: Chris Rottenberg Research Associate with the Osgood Center There have been many heated debates on whether or not a terrorist should, or even could,
More informationNGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security
3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are
More informationREDUCING STATEWIDE RECIDIVISM: CHECKLIST FOR STATE REENTRY COORDINATORS
STATE REENTRY COORDINATORS are uniquely positioned to ensure that the policies and practices that go into a recidivism-reduction initiative are being implemented effectively, both in corrections settings
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationTESTIMONY BY CABELL C. CROPPER MAY 22, 2003
PRESIDENT James Kane Executive Delaware Criminal Justice Council VICE PRESIDENT Raymond T. Slaughter Division of Criminal Justice Colorado Department of Public Safety IMMEDIATE PAST PRESIDENT Mark C. Thompson
More information7034:12/83 AMERICAN BAPTIST POLICY STATEMENT ON CRIMINAL JUSTICE
7034:12/83 AMERICAN BAPTIST POLICY STATEMENT ON CRIMINAL JUSTICE The proper purpose of a criminal justice system is to protect society and individuals, including victims and offenders from seriously harmful
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationSUBMISSION TO THE SENTENCING ADVISORY COMMITTEE: SUSPENDED SENTENCES
SUBMISSION TO THE SENTENCING ADVISORY COMMITTEE: SUSPENDED SENTENCES December 2007 Belinda Lo William Crawford Fitzroy Legal Service 124 Johnston Street FITZROY 3065 Phone: (03) 9419 3744 Fax: (03) 9416
More informationFrom Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016
How Data Analytics Add Value to Security Risk Management Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016 Who we are Global leading positions in consumer and industrial businesses Consumer Businesses
More informationThe Danish Prison and Probation Service
The Danish Prison and Probation Service De-radicalisation Background Over the past ten years Denmark has seen a new group of criminals previously not encountered in Danish institutions. We now have a group
More informationFighting Terrorism at its Source
The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION
More informationAnkara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism
Ankara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism Introduction This good practices document addresses the role of government institutions, agencies, and
More informationEconomic and Social Council
UNITED NATIONS E Economic and Social Council Distr. GENERAL E/CN.4/2006/98/Add.2 24 March 2006 ENGLISH ONLY COMMISSION ON HUMAN RIGHTS Sixty-second session Item 17 of the provisional agenda PROMOTION AND
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More information8674/15 MC/pf 1 DGD 1B
Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16
More informationErbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325
Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil
More informationPurpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
More informationBusiness Continuity Management
Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers
More information