Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group

Size: px
Start display at page:

Download "Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group"

Transcription

1 Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group Workshop on Prison and Security Issues and Implementation of the GCTF Rome Memorandum on the Rehabilitation of Violent Extremist Offenders Good Practices November 2014 Abuja, Nigeria Overview Summary On November 2014, Nigeria hosted a Global Counterterrorism Forum (GCTF) workshop, in cooperation with the United States, on prison and security issues and implementation of the GCTF Rome Memorandum on Good Practices for the Rehabilitation and Reintegration of Violent Extremist Offenders (Rome Memorandum). The workshop, which was organized under the auspices of the GCTF s Criminal Justice and Rule of Law and Detention and Reintegration Working Groups, brought together prison, law enforcement, and counterterrorism (CT) officials, as well as investigators, academics, consultants, and other practitioners from GCTF members, Sahel region countries, the United Nations (UN), and non-governmental organizations (NGOs). Discussion focused on how effective implementation of Good Practices 1-6 in the Rome Memorandum can support internal and external prison security, which serve as the foundation for effective rehabilitation and reintegration programs. Participants reviewed several case studies to identify practical, human rights-compliant methods for implementing thorough prison security procedures that will enable successful intake, assessment, and classification programs; sound segregation, integration, and communication control measures; and valuable prison intelligence programs. Key cross-cutting themes that emerged from the workshop included the following: The importance of establishing a comprehensive prison security program that can enable effective rehabilitation and reintegration programs. Participants stressed that corrections officials and prison staff should employ basic, sound, correctional practices that establish a safe and secure prison environment, which protects against internal and external threats, and provide good care and custody to inmates. This will facilitate the development and implementation of effective rehabilitation and reintegration programs. Comprehensive intake, assessment, and classification procedures for inmates support a secure prison environment and enable operation of effective rehabilitation and reintegration programs. Panelists stressed that assessment of inmates should begin the moment they enter the penal system and should be a continuous process throughout the lifecycle of the inmate s detention. Intake, assessment, and classification procedures should be methodical, scientific, and standardized, and the results should be shared with prison guards, and corrections, law enforcement, and intelligence officials, and

2 - 2 - rehabilitation staff. The process should also inform key decisions about prison security programs, individual rehabilitation programs, and the development and implementation of prison intelligence programs. Panelists emphasized the importance of special procedures for terrorist inmates in particular, as they represent a unique group within the broader general inmate population who require individual evaluation, special care, and special custody arrangements. Prison security programs should consist of redundant, mutually supportive procedures that enable a controlled environment. In order to operate safe and effective rehabilitation and reintegration programs, corrections officials and prison staff should implement redundant security procedures. These could include physical security safeguards, procedural security mechanisms, and dynamic security processes, such as inmate engagement and intelligence programs. Security policies and procedures should also include contingency plans and corrections officials and prison staff should undergo continuous training with regular audits on response and implementation. Application of segregation, integration, and communication control mechanisms should consider a prison s capacity and the specific needs of its inmate population. It is important for corrections officials to individually assess their prison; its facilities; the capacity, resource, and training of its staff; and various factors including local culture and legislation when making determinations about the most efficient control mechanisms. The needs of various inmate populations may differ according to local circumstances and prison demographics. Participants emphasized that a one-size-fits-all approach for control mechanisms cannot support effective prison security or meaningful rehabilitation and reintegration programs. Drawing from different case studies, participants discussed how different segregation and integration models have each been used as effective control mechanisms for terrorist inmates in various situations. The value and challenge of operating effective prison intelligence programs. Effective prison intelligence programs support good prison security, help inform rehabilitative services, and support intake, assessment, and classification procedures. However, due to the unique and controlled environment in which they operate, prison intelligence programs also face unique challenges, including separation of intelligence sources from one another to ensure the veracity of information and operating in segregated versus integrated inmate environments. To ensure legitimacy and overall effectiveness, prison intelligence programs should be implemented with accompanying legal and policy frameworks and operated in compliance with human rights and in a manner that supports engagement with inmates and prison rapport. Summary The following is a thematic summary of the workshop. It is not intended to be a transcript of the proceedings. Opening Remarks Acting Controller General (CG) of the Nigerian Prison Service (NPS), Aminu Sule, and U.S. Ambassador to Nigeria, James Entwistle, welcomed participants to the workshop. Acting CG Sule

3 - 3 - noted that prisons play an important and unique role in rehabilitating and reintegrating offenders. He underscored Nigeria s commitment to the GCTF and to the continued implementation of the Rome Memorandum, noting that this workshop was part of several Nigerian initiatives designed to disrupt acts of violent extremism and rehabilitate offenders. He also noted that Nigeria and its prison service face mounting challenges posed by growing and increasingly complex prison populations, limitations in operational capacity, and the persistence of threats from violent extremists, including Boko Haram. Acting CG Sule highlighted the need for continued international cooperation and capacity building as effective methods for countering these dangerous trends. Ambassador Entwistle noted that successful and effective implementation of the Rome Memorandum is a major undertaking requiring strong cooperation across governments; an extensive outreach strategy to the most vulnerable segments of the population; and collaboration with civil society organizations and community and traditional leaders. In order for these efforts to succeed, they must be predicated on the basic principles of sound correctional practice upon which effective rehabilitation and reintegration programs can be built. Session 1: Security Enabling Rehabilitation Panelists from the NPS and the United Nations Interregional Crime and Justice Research Institute (UNICRI) discussed how good prison security facilitates and enables the therapeutic environment necessary for an effective rehabilitation program. They reinforced that without good prison security management, follow-on rehabilitation and reintegration programs cannot succeed. They emphasized that in order to ensure security programs are capable of supporting rehabilitation, corrections officials should define the security mission for their guards and staff and articulate how it supports broader rehabilitation goals. This not only supports the development of a welltrained, invested staff that provides good care and custody, and who respect the detainee and their rights, but it also enables staff to engage more effectively with prisoners, build rapport, and address problems in a timely manner all of which help reinforce and support rehabilitation programs and provide for a more secure environment. Participants also discussed the need to strike the proper balance between security and rehabilitation programs, which requires slow and measured progress sustained by feedback and data collection. In their overview of the Nigerian deradicalization and rehabilitation program, which is currently under development and expansion, the NPS described the intake, assessment, classification, and segregation programs that will inform prison security programs, underscoring that they are critical to ensuring that prison staff can provide a safe, secure, and rehabilitative environment. These types of assessment programs offer the best opportunity to mitigate the tension between security and rehabilitation programs. The panelists were also careful to point out that developing these types of structures constitutes a long and laborious process that requires sustained government support and political will. Session 2: Developing an Effective Security Program Representatives from the European Union Technical Assistance to Nigeria s Evolving Security Challenges (EUTANS) mission and the U.S. Department of Justice s International Criminal Investigative Training Assistance Program (ICITAP) offered insights on how to develop and implement an effective prison security program. EUTANS discussed three types of security that

4 - 4 - should be employed in prisons: (1) physical; (2) procedural; and (3) dynamic. These elements support prison staff s ability to deter, detect, and disrupt inmate misconduct and disturbances within a prison so that a controlled environment can be established and effective rehabilitation programs can be implemented. To ensure that a controlled environment can be maintained in the face of unexpected events, such as fires, riots, or external attacks on the prison, EUTANS recommended that corrections officials establish incident management plans that clearly specify roles and responsibilities for prison staff. These plans should include various contingency strategies and staff should undergo continuous training to ensure they can react quickly, efficiently, and in a coordinated manner. EUTANS also encouraged prisons to have a security committee responsible for auditing and testing the security of the institution and the responses of its staff. ICITAP echoed earlier comments that safe, effective, and smoothly-operated rehabilitation programs have their roots in the basic principles of sound correctional practice and good security programs, noting that the UN Standard Minimum Rules for the Treatment of Prisoners provides an effective baseline guide for inmate management procedures. With regard to terrorist inmates, ICITAP noted that additional procedures are often required. To safeguard the security and good order of the prison and to support broader national CT goals, such as terrorist network mapping and intelligence collection, security programs for terrorist inmates should include segregation procedures, direct supervision by highly-trained and professional staff, and careful deconfliction between security and rehabilitation programs. Several participants asked about good practices for responding to large-scale prison escapes. Panelists reiterated their points regarding the importance of a well-trained staff and an effective prison intelligence program, but also stressed the need for good communication and strong coordination between the various security services, noting that a proactive approach rather than a reactive one offered the best opportunity for ensuring prison safety and security. Session 3: Effective Intake, Assessment, and Classification Programs Panelists from the International Centre on Counter-Terrorism The Hague (ICCT) and the Sacramento County, California jail system discussed the importance of an effective intake, assessment, and classification program that can help corrections officials tailor their security and rehabilitation programs. Both noted that prison staff cannot effectively rehabilitate an inmate or help them in a significant way if they do not have a firm understanding of the person s background, vulnerabilities, needs, and individual motivation, a point that was reiterated by several other panelists and participants throughout the course of the workshop. ICCT reemphasized earlier comments that terrorist inmates and violent extremist offenders are unique from inmates in the general prison population and must be approached differently. Understanding those differences and responding accordingly hinges on the intake, assessment, and classification process, and should begin when a prison first has contact with an inmate. Absent this evaluative process, it is difficult for corrections officials to provide the rehabilitative services inmates require or the safe and secure environment that enables such programs. The panelist from the Sacramento County (California, USA) Jail system emphasized that intake, assessment, and classification procedures should operate as an interdependent process in which one phase informs the other. This process should also be organized and overseen by an expert so that it can be operated in a methodical, scientific, and standardized way. To that end, both panelists challenged the idea that intake, assessment, and classification is an initial or static

5 - 5 - process that occurs only upon an inmate s entry to the prison. To the contrary, they underscored that the most effective programs are continuous throughout detention of the inmate and serve as the basis for the inmate s rehabilitation program, providing the necessary data to design a tailored plan. Participants pointed out that comprehensive risk assessments must not only precede the design of any tailored security programs for a prison, they should be conducted at various stages within the prison, from the level of the individual inmate up through the general prison population. Session 4: Segregation, Integration, and Communication Control Measures Officials from Morocco s Prison Administration and the Sacramento County Jail system shared their different experiences with segregation, integration, and communication control measures. They highlighted the need for individual assessment that is dependent on local circumstances. Morocco recalled its experience with the 2003 Casablanca bombings, following which terrorist inmates were segregated into a single facility. Increasing challenges associated with offender management, increased radicalization stemming from the symbol of a single terrorist detention facility, and security concerns about a threat of a single prison escape led Morocco to reevaluate its control measures and instead elect for an integrated system in which terrorist inmates are dispersed throughout the general prison population. Through this system, Morocco has been able to move terrorist inmates closer to their families, which has supported community engagement and rehabilitation efforts, as well as more effectively control extremists communications with outside parties and remove them from areas where they previously held influence. The official from the Sacramento County jail system offered an alternative method, noting that California primarily opts to segregate extremist or high-threat inmates, using minimum, medium, and maximum sub-divisions as part of its classification schema. In order to support effective operation of this system, however, the official stressed that there should be a designated classification unit with primary control over the prison s housing unit. This allows them to manage a fluid process, conduct continual reevaluations, and make adjustments to ensure the continued safe operation of the prison. The official also pointed out the challenges associated with such a system, as improper or hasty segregation poses serious risks that can denigrate the security of the prison, complicate efforts to prevent or intercept communications between inmates, and inhibit the effectiveness of other rehabilitative programs. Both panelists stressed the need for corrections officials to evaluate the capacity, resources, and training of their prison staff, as well as factors such as the local culture and the culture of the prison, physical facilities, national laws, and established policies and procedures when evaluating an inmate and before making decisions about whether to segregate or integrate them vis-à-vis the general prison population. Regional representatives asked for insights on how to best institute control measures in light of limited capacity and resources. Several low-cost good practices were discussed, including an emphasis on training to ensure staff has strong bedrock correctional skills, a basic understanding of intake, assessment, and classification, and the ability to recognize the warning signs of potential radicalization. Leveraging available community-based organizations and increasing communication and cooperation between security officials were also highlighted as good practices. Session 5: The Foundations for an Effective Rehabilitation Program and Training for Prison Staff

6 - 6 - Panelists from the International Centre for Political Violence and Terrorism Research in Singapore (ICPVTR) and ICITAP noted the importance of training prison staff on the foundational elements of an effective rehabilitation program. The need to define the focus of the program, and the importance of a broad set of measurement tools as part of an ongoing intake, assessment, and classification program that informs prison staff training and a rehabilitation program, were recurring themes of the session. ICPVTR noted that corrections officials should be clear about the goals of their rehabilitation program and specify whether the desired outcome for the inmate is deradicalization or disengagement. Each supports broader reintegration goals, but the specific steps for either can vary according to host of individually assessed factors. Both the holistic approach to rehabilitation and specific strategies used to engage a particular inmate also depend on evaluation of the inmate and the desired end goals of the program. Programs involving religious counseling, psychiatric evaluation, vocational training, recreational or sports activities, and creative arts, combined with appropriate community engagement, were all cited as possible methods for supporting successful deradicalization or disengagement program. In order to ensure maximum effectiveness, ICPVTR reiterated earlier comments about the need to deconflict security programs with rehabilitation programs. For terrorist inmates, ICITAP called for a proactive model of inmate management which can account for the challenges posed by this unique population. The proactive model segregates terrorist inmates from the general prison population and ensures they are monitored by highly trained prison staff, who are in turn closely supervised. The panelist advocated for a direct supervision model of inmates in order to ensure the security and safe operation of the prison, but also to ensure that staff are able to monitor and report on institutional matters. Following these reports, information collected by prison staff should be shared with corrections and law enforcement officials, intelligence analysts, and rehabilitation staff, and should inform continuous intake, assessment, and classification procedures being operated by prison staff. Additionally, as part of this proactive model, any accompanying rehabilitation program should be designed and implemented in close consultation with experts due to the fact that terrorist inmates will often actively resist government efforts to rehabilitate them. Session 6: Effective Prison Intelligence Programs An official from the New South Wales (NSW) Corrective Service in Australia and an expert from the New York-based Soufan Group, a strategic security intelligence firm, discussed implementation of intelligence programs inside prisons. The NSW Corrective Service shared its experience with developing risk assessment tools that have been implemented in NSW prisons. These include routinized vetting procedures and collection of inmate data that is shared with corrections and law enforcement officials and intelligence agencies. The NSW Corrective Service also provided an account of their experience with developing the legislative and policy frameworks to authorize and enable the implementation of its risk assessment and collection programs in prisons, noting that this is a commonly overlooked but nonetheless important element of instituting an effective prison intelligence program. The NSW Corrective Service discussed the Australian Radicalisation Extremism Awareness Program (REAP), which is designed to educate corrections officials and prison staff on the indicators associated with radicalization so they can better use information to support their risk assessment and reporting operations. The Soufan Group representative offered perspectives on inmate-level intelligence collection programs, outlining a series of low-cost, non-resource intensive steps that can be taken to support

7 - 7 - broader intelligence goals and rehabilitation programs. Echoing other panelists comments on the importance of intake, assessment, and classification, the Soufan Group representative stressed that as soon as a person is detained, initial assessment needs to begin. To enable this effectively, law enforcement or security forces should request that an intelligence officer or corrections official accompany them on operations to detain suspects so that effective, human rights-compliant interrogation can begin as soon as an individual is in custody. Thereafter, demonstrating professionalism, asking slow and measured questions, exhibiting kindness, and treating the inmate with humanity are critical to establishing rapport. It was also noted that such actions not only yield higher quality intelligence more quickly, but also support long-term rehabilitation efforts. The importance of being truthful with inmates was also highlighted, as lying undermines trust and can compromise the effectiveness of the intelligence program. Finally, the Soufan Group representative pointed out that the process of radicalization takes years, and that corrections officials and prison staff should be prepared for an equally long process for successful rehabilitation to occur. Understanding an inmate s motivations is therefore crucial to supporting that process and to building a counter narrative that can be employed both in and outside of a prison setting. Several participants asked guidelines for how or when intelligence information should be shared with security officials outside of the prison setting. A discussion about the need to share information across government and at various levels ensued, with several participants highlighting that sharing intelligence information gathered inside a prison is an effective way for prison officials to build rapport with other elements of the government. Participants agreed that intelligence information must make its way into the hands of those who need it, but that national legislation governing the use of intelligence and how it can be shared must be observed and considered on a case-by-case basis. Wrap-Up, Way Ahead and Closing Remarks Several themes arose from the discussion, including the importance of establishing a strong security environment that can enable rehabilitation efforts; the need for continual intake, assessment, and classification procedures; and the value of an effective prison intelligence program, particularly its ability to inform provide useful, actionable information to corrections and law enforcement officials and rehabilitation staff. The need for governments to conduct their own evaluations regarding segregation and integration and to consider which method will be most effective given available resources, staff abilities, and local context was also highlighted. Participants agreed that efforts to build capacity at the local level, beginning with prison level staff and corrections officials, through increased training and communication between security partners were key, non-resource intensive steps that could be taken now to begin addressing immediate threats and gaps particularly those identified by Senegal and Chad. Nigeria noted that it would continue to develop its intake, assessment, and classification procedures in conjunction with its broader work to expand the NPS deradicalization and rehabilitation program, bearing in mind the comments experts had offered during the workshop. There was general consensus that although there are enduring challenges associated with developing and implementing prison security and rehabilitation programs, workshops such as this are imperative to finding creative ways to work together to address challenges and move forward.

I Conference Summary

I Conference Summary Executive Summary Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices & Lessons Learned 6-9 December 2011, The Hague Contents I Conference Summary... 2 Background

More information

Detention and Reintegration Working Group

Detention and Reintegration Working Group Detention and Reintegration Working Group Workshop on Education, Life Skill Courses and Vocational Training for Incarcerated Violent Extremist Offenders 7-8 October 2015 Nairobi, Kenya Overview Co-Chairs

More information

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to

More information

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders

Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Rome Memorandum on Good Practices for Rehabilitation and Reintegration of Violent Extremist Offenders Introduction Governments have been increasingly focused on developing more effective strategies to

More information

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization

More information

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Chair s Summary Overview Community-Oriented Policing (COP)

More information

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,

More information

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit

A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has a vacancy for: A Communications & Knowledge Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 1 August 2015

More information

EUROPEAN UNION COMMON POSITION ON UNGASS 2016

EUROPEAN UNION COMMON POSITION ON UNGASS 2016 EUROPEAN UNION COMMON POSITION ON UNGASS 2016 UNGASS 2016 is a key opportunity for the international community to take stock of the achievements of the international drug control system to date, to elaborate

More information

Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit

Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit The International Centre for Counter-Terrorism (ICCT) has three vacancies for: Policy Analyst/Programme Manager for the Global Counter Terrorism Forum (GCTF) Administrative Unit Starting date: 17 August

More information

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism

Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism Background This non-binding good practices document 1 focuses on the ways in which education can be used as a resource

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

South-East Asia Region Capacity-Building Working Group (SEA WG)

South-East Asia Region Capacity-Building Working Group (SEA WG) South-East Asia Region Capacity-Building Working Group (SEA WG) Third Meeting of the South-East Asia Capacity Building Working 18-19 November 2013 Yogyakarta, Indonesia Summary The third meeting of the

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

REHABILITATION SERVICES PROVIDED BY THE CORRECTIONAL SERVICES DEPARTMENT. Executive Summary

REHABILITATION SERVICES PROVIDED BY THE CORRECTIONAL SERVICES DEPARTMENT. Executive Summary REHABILITATION SERVICES PROVIDED BY THE CORRECTIONAL SERVICES DEPARTMENT Executive Summary 1. The mission of the Correctional Services Department (CSD) is to protect the public and reduce crime by providing

More information

First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing

First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing 14-15 May 2014 Marrakech, Morocco Summary Hosted by

More information

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional

More information

Corrective Services NSW Offender Classification & Case Management Policy & Procedures Manual 3.1 CORRECTIVE SERVICES NSW (CSNSW)

Corrective Services NSW Offender Classification & Case Management Policy & Procedures Manual 3.1 CORRECTIVE SERVICES NSW (CSNSW) Corrective Services NSW Offender Classification & Case Management Policy & Procedures Manual 3.1 CORRECTIVE SERVICES NSW (CSNSW) CASE MANAGEMENT POLICY TABLE OF CONTENTS 3.1 CORRECTIVE SERVICES NSW (CSNSW)...

More information

Statement by. Michael A. Corriero Executive Director New York Center for Juvenile Justice. to the

Statement by. Michael A. Corriero Executive Director New York Center for Juvenile Justice. to the Statement by Michael A. Corriero Executive Director New York Center for Juvenile Justice to the New York Advisory Committee to the U.S. Commission on Civil Rights July 0, 20 My name is Michael Corriero.

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and

64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,

More information

Best Practices in Mental Health at Corrections Facilities

Best Practices in Mental Health at Corrections Facilities POLICY BRIEF November 2011 Best Practices in Mental Health at Corrections Facilities Sahil Jain Introduction Police, court personnel, and correctional staff interact with, stabilize, and treat more persons

More information

BUILDING ON THE GCTF s ROME MEMORANDUM: Additional Guidance on the Role of Psychologists/Psychology in Rehabilitation and Reintegration Programs

BUILDING ON THE GCTF s ROME MEMORANDUM: Additional Guidance on the Role of Psychologists/Psychology in Rehabilitation and Reintegration Programs BUILDING ON THE GCTF s ROME MEMORANDUM: Additional Guidance on the Role of Psychologists/Psychology in Rehabilitation and Reintegration Programs Note: This document will be submitted to the GCTF and to

More information

Terrorists in Prison Evaluation of the Dutch terrorism wing

Terrorists in Prison Evaluation of the Dutch terrorism wing SUMMARY Terrorists in Prison Evaluation of the Dutch terrorism wing Tinka M. Veldhuis, Msc. Prof. Dr. Ernestine H. Gordijn Prof. Dr. Siegwart M. Lindenberg Dr. René Veenstra University of Groningen Faculty

More information

Manifesto for Education Empowering Educators and Schools

Manifesto for Education Empowering Educators and Schools Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments

More information

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies

More information

Ambassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004

Ambassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004 Statement to the 60 th Session of the UN Commission on Human Rights Ambassador Christian Strohal Director of the OSCE Office for Democratic Institutions and Human Rights (ODIHR) Wednesday, 31 March 2004

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Meeting Summary. Key themes that emerged during the seminar include:

Meeting Summary. Key themes that emerged during the seminar include: Countering Violent Extremism (CVE) Working Group CVE through Communications Work Stream Practical Seminar on Monitoring and Evaluation Techniques for CVE Communication Programs 10-11 February 2013 Abu

More information

Objective Prison Classification, The cornerstone to good prison security

Objective Prison Classification, The cornerstone to good prison security Montecito # 38, WTC Piso 10, Oficina 18 Col. Nápoles México, 03810, D.F. Tel: (55) 9000 80 04 Objective Prison Classification, The cornerstone to good prison security Classification systems help minimize

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

It s time to shift gears on criminal justice VOTER

It s time to shift gears on criminal justice VOTER It s time to shift gears on criminal justice VOTER TOOLKIT 2014 Who are the most powerful elected officials most voters have never voted for? ANSWER: Your District Attorney & Sheriff THE POWER OF THE DISTRICT

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Wm. R. Snodgrass TN Tower, 25 th Floor Nashville, TN 37243 (615) 532-7825 homelandsecurity@tn.gov Page 1 TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY Current as of June 1, 2013 LAW ENFORCEMENT

More information

Meeting the Challenges Posed by High Risk Offenders

Meeting the Challenges Posed by High Risk Offenders Meeting the Challenges Posed by High Risk Offenders Types of High Risk Offenders High Risk offenders can be classified into four categories. These include the most violent, disruptive hardened criminals

More information

Foreign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon

Foreign Terrorist Fighters (FTF) Initiative. The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Foreign Terrorist Fighters (FTF) Initiative The Hague Marrakech Memorandum on Good Practices for a More Effective Response to the FTF Phenomenon Introduction The threat posed by Foreign Terrorist Fighters

More information

Organization for Security and Co-operation in Europe

Organization for Security and Co-operation in Europe Organization for Security and Co-operation in Europe The Review of the United Nations Global Counter-Terrorism Strategy 12-13 June 2014, New York Remarks by Mr. Thomas Wuchte, Head on Anti-terrorism Issues

More information

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism Expanding Counterterrorism Partnerships: U.S. Efforts to Tackle the Evolving Terrorist Threat Washington Institute for Near East Policy 1828 L

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

Community Policing. Defined

Community Policing. Defined Community Policing Defined The Primary Elements of Community Policing Nonprof its / Service Providers Using the Crime Triangle Community policing is a philosophy that promotes organizational strategies

More information

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings

Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings Madrid Memorandum on Good Practices for Assistance to Victims of Terrorism Immediately after the Attack and in Criminal Proceedings The Cairo Declaration on Counterterrorism and the Rule of Law (September

More information

IMPROVING YOUTH OUTCOMES

IMPROVING YOUTH OUTCOMES IMPROVING YOUTH OUTCOMES Illinois Department of Juvenile Justice 2015 Operating Plan Summary candice jones Director the honorable bruce rauner Governor Mission The mission of the Illinois Department of

More information

Denver Police Department Law Enforcement Advocate Program. Scanning: When a developmentally delayed youth was involved in a police shooting in 2003,

Denver Police Department Law Enforcement Advocate Program. Scanning: When a developmentally delayed youth was involved in a police shooting in 2003, Denver Police Department Law Enforcement Advocate Program Summary Scanning: When a developmentally delayed youth was involved in a police shooting in 2003, the incident increased neighborhood distrust

More information

2012 Party Platforms On Criminal Justice Policy

2012 Party Platforms On Criminal Justice Policy 2012 Party Platforms On Criminal Justice Policy September 2012 1 2012 PARTY PLATFORMS ON CRIMINAL JUSTICE POLICY THE SENTENCING PROJECT The Washington Post recently reported that the gulf between Republicans

More information

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Twelfth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa dbarakamfitiye@issafrica.org 0 www.issafrica.org OUTLINE Historical Overview

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

A public protection order is a court order that will allow the detention of very high risk individuals at a secure facility within prison precincts.

A public protection order is a court order that will allow the detention of very high risk individuals at a secure facility within prison precincts. Q+A - Public Safety (Public Protection Orders) Bill What are public protection orders (PPO)? A public protection order is a court order that will allow the detention of very high risk individuals at a

More information

Criminal Justice Upper Division Restricted Electives Undergraduate Courses

Criminal Justice Upper Division Restricted Electives Undergraduate Courses Criminal Justice Upper Division Restricted Electives Undergraduate Courses CCJ 3058 Origins of Criminal Justice 3(3, 0) PR: CCJ3024 or C.I. Study of criminal justice system evolution. Focus on developments

More information

Chairman s Summary 1 OPENING SESSION

Chairman s Summary 1 OPENING SESSION Federal Department of Foreign Affairs FDFA Conference between the Members of the Global Counterterrorism Forum and the United Nations as well as Other International, Regional and Sub-regional Organizations

More information

The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel

The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel U.S. Department of Justice Criminal Division Fraud Section Washington, D.C. 20530 The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel Bribery of foreign officials to gain or

More information

COMPACTCommunityPartnershipAction

COMPACTCommunityPartnershipAction COMPACTCommunityPartnershipAction PROGRAM AND GRANTS INFORMATION THE MULTICULTURAL NSW COMPACT COMPACT stands for Community, in Partnership, taking Action to safeguard Australia s peaceful and harmonious

More information

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early

More information

House Energy and Commerce Subcommittee on Communications, Technology, and the Internet

House Energy and Commerce Subcommittee on Communications, Technology, and the Internet House Energy and Commerce Subcommittee on Communications, Technology, and the Internet Hearing on H.R. 1084, the Commercial Advertisement Loudness Mitigation (CALM) Act; H.R. 1133, the Family Telephone

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

The Path Ahead for Security Leaders

The Path Ahead for Security Leaders The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.

More information

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY Executive Board Hundred and ninety-seventh session 197 EX/46 PARIS, 7 October 2015 Original: English Item 46 of the provisional agenda UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

Evaluation of counterterrorism policy

Evaluation of counterterrorism policy SUMMARY Evaluation of counterterrorism policy Policy evaluation is booming. Evaluation research is taking place in diverse policy areas. With regard to the counter-terrorism policy (CT) of the Netherlands

More information

Resolving & Managing Regional and Global Conflicts: The Role of Information Technology

Resolving & Managing Regional and Global Conflicts: The Role of Information Technology DELIVERED AT THE 11TH INTERNATIONAL CONFERENCE OF THE NIGERIA COMPUTER SOCIETY (NCS) HELD AT THE ROYAL PARK HOTEL, ILOKO-IJESA, THE STATE OF OSUN, NIGERIA (24-26 JULY, 2013) Resolving & Managing Regional

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

2006-2007 Santa Barbara County Civil Grand Jury A NEW NORTH COUNTY JAIL? A Need That Will Not Go Away!

2006-2007 Santa Barbara County Civil Grand Jury A NEW NORTH COUNTY JAIL? A Need That Will Not Go Away! A NEW NORTH COUNTY JAIL? A Need That Will Not Go Away! For approximately a generation, the need for a new North County Jail has been recognized. At the least, there have been costs and dangers associated

More information

The Human Rights Law Centre is an independent, non-profit, non-government organisation which protects and promotes human rights.

The Human Rights Law Centre is an independent, non-profit, non-government organisation which protects and promotes human rights. Ruth Barson Human Rights Law Centre Ltd Level 17, 461 Bourke Street Melbourne VIC 3000 T: + 61 3 8636 4450 F: + 61 3 8636 4455 E: ruth.barson@hrlc.org.au W: www.hrlc.org.au The Human Rights Law Centre

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

POLICY AND PROCEDURE NO.710 Juvenile Arrests Date Issued August 17, 2004

POLICY AND PROCEDURE NO.710 Juvenile Arrests Date Issued August 17, 2004 POLICY AND PROCEDURE NO.710 Juvenile Arrests Date Issued August 17, 2004 Date Effective August 17, 2004 Revision No. No. of pages 7 GENERAL CONSIDERATIONS AND GUIDELINES: The Worcester Police Department

More information

Five-Year Strategic Plan

Five-Year Strategic Plan U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations

More information

NOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM

NOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM NOTICE OF PRIVACY PRACTICES Effective Date: April 14, 2003 UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

HANDOUT 1: Purpose and Principles of Sentencing in Canada

HANDOUT 1: Purpose and Principles of Sentencing in Canada HANDOUT 1: Purpose and Principles of Sentencing in Canada Principles of Sentencing The Criminal Code of Canada outlines the principles and purpose of sentencing in s. 718. These principles are placed in

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence

More information

Prince William County Police Department Enforcement of Federal Immigration Law

Prince William County Police Department Enforcement of Federal Immigration Law Prince William County Government Prince William County Police Department Enforcement of Federal Immigration Law December 2006 Presentation Overview Background Federal Delegation of Immigration Enforcement

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Moving Towards a Federal Criminal Justice System By Timothy P. Cadigan and Bernadette Pelissier

Moving Towards a Federal Criminal Justice System By Timothy P. Cadigan and Bernadette Pelissier Moving Towards a Federal Criminal Justice System By Timothy P. Cadigan and Bernadette Pelissier The recent literature has been replete with discussions of the need to move the disparate agencies of the

More information

UNODC World Drug Report 2016:

UNODC World Drug Report 2016: UNODC World Drug Report 2016: Launch in Geneva on 23 June 2016 Briefing to the Member States and Civil Society Organizations Remarks by Aldo Lale-Demoz, Deputy Executive Director, UNODC UNODC is honoured

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

Umar Patek: The Test of a Prison System

Umar Patek: The Test of a Prison System Umar Patek: The Test of a Prison System An Analysis By: Chris Rottenberg Research Associate with the Osgood Center There have been many heated debates on whether or not a terrorist should, or even could,

More information

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security 3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are

More information

REDUCING STATEWIDE RECIDIVISM: CHECKLIST FOR STATE REENTRY COORDINATORS

REDUCING STATEWIDE RECIDIVISM: CHECKLIST FOR STATE REENTRY COORDINATORS STATE REENTRY COORDINATORS are uniquely positioned to ensure that the policies and practices that go into a recidivism-reduction initiative are being implemented effectively, both in corrections settings

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

TESTIMONY BY CABELL C. CROPPER MAY 22, 2003

TESTIMONY BY CABELL C. CROPPER MAY 22, 2003 PRESIDENT James Kane Executive Delaware Criminal Justice Council VICE PRESIDENT Raymond T. Slaughter Division of Criminal Justice Colorado Department of Public Safety IMMEDIATE PAST PRESIDENT Mark C. Thompson

More information

7034:12/83 AMERICAN BAPTIST POLICY STATEMENT ON CRIMINAL JUSTICE

7034:12/83 AMERICAN BAPTIST POLICY STATEMENT ON CRIMINAL JUSTICE 7034:12/83 AMERICAN BAPTIST POLICY STATEMENT ON CRIMINAL JUSTICE The proper purpose of a criminal justice system is to protect society and individuals, including victims and offenders from seriously harmful

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

SUBMISSION TO THE SENTENCING ADVISORY COMMITTEE: SUSPENDED SENTENCES

SUBMISSION TO THE SENTENCING ADVISORY COMMITTEE: SUSPENDED SENTENCES SUBMISSION TO THE SENTENCING ADVISORY COMMITTEE: SUSPENDED SENTENCES December 2007 Belinda Lo William Crawford Fitzroy Legal Service 124 Johnston Street FITZROY 3065 Phone: (03) 9419 3744 Fax: (03) 9416

More information

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016 How Data Analytics Add Value to Security Risk Management Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016 Who we are Global leading positions in consumer and industrial businesses Consumer Businesses

More information

The Danish Prison and Probation Service

The Danish Prison and Probation Service The Danish Prison and Probation Service De-radicalisation Background Over the past ten years Denmark has seen a new group of criminals previously not encountered in Danish institutions. We now have a group

More information

Fighting Terrorism at its Source

Fighting Terrorism at its Source The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION

More information

Ankara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism

Ankara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism Ankara Memorandum on Good Practices for a Multi-Sectoral Approach to Countering Violent Extremism Introduction This good practices document addresses the role of government institutions, agencies, and

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL E/CN.4/2006/98/Add.2 24 March 2006 ENGLISH ONLY COMMISSION ON HUMAN RIGHTS Sixty-second session Item 17 of the provisional agenda PROMOTION AND

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

8674/15 MC/pf 1 DGD 1B

8674/15 MC/pf 1 DGD 1B Council of the European Union Brussels, 21 May 2015 (OR. en) 8674/15 JAIEX 22 RELEX 348 ASIM 23 CATS 51 COSI 49 CYBER 32 CORDROGUE 31 DATAPROTECT 71 JUSTCIV 102 EUROJUST 94 VISA 173 ENFOPOL 101 USA 16

More information

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325 Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers

More information