Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence



Similar documents
COUNCIL OF EUROPE COMMITTEE OF MINISTERS

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC

Criminal Justice Courses

BORDER SECURITY AND MANAGEMENT CONCEPT

Good practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons

STRATEGIC PLAN 2013/2014 TO 2015/2016

Adopted by the Security Council at its 5430th meeting, on 28 April 2006

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

TEMPE POLICE DEPARTMENT CALENDAR YEAR STRATEGIC PLAN

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

15 December Crime Prevention and Anti-Fraud Policy

Human Resource Management

ASSOCIATION OF CARIBBEAN STATES (ACS) 19th MEETING OF THE SPECIAL COMMITTEE FOR DISASTER RISK REDUCTION. Bogotá, Colombia, August

Certified Cyber Security Analyst VS-1160

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Core Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies

Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

Elaboration of the Declaration on Universal Norms on Bioethics : Third Outline of a Text

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

The Department of the Treasury established the Financial Crimes

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

PORTLAND POLICE BUREAU CRIMINAL INTELLIGENCE UNIT STANDARD OPERATING PROCEDURE

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE

Bellevue University Cybersecurity Programs & Courses

Cyber Security Strategy for Germany

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

Law of Georgia on Combating Human Trafficking. (Adopted on 28 April 2006, entered into force in 16 June 2006) Chapter I. General Provisions

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

University of Turku HUMAN RESOURCES POLICY

CA Practical Experience Requirements

Europol Unclassified Basic Protection Level VACANCY NOTICE

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.

Reaffirming Bearing in mind Recognizing

TITLE III JUSTICE, FREEDOM AND SECURITY

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

General Corporate Social Responsibility Policy 20/10/15

Crime Prevention and Anti- Fraud Policy of Gamesa Corporación Tecnológica, S.A. (March 23, 2011)

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

NHS Commissioning Board: Information governance policy

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL

Impact and Knowledge Exchange Strategy Delivering Impact from Research Excellence

Introduction to Cyber Security / Information Security

ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK

The FBI and the Internet

University of Sunderland Business Assurance Information Security Policy

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

DECREE THE GOVERNMENT

College of Occupational Therapists Specialist Section Independent Practice. Code of Business Practice

Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University

The Standards of Good Practice for Education Abroad The Forum on Education Abroad May 2007

How To Become A Criminal Justice Professional

International Mechanisms for Promoting Freedom of Expression JOINT DECLARATION ON CRIMES AGAINST FREEDOM OF EXPRESSION

IOE Learning and Teaching Strategy

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters

CEAS ANALYSIS. of the Law on Amendments of the Law on the Security Intelligence Agency

Declaration of the Ministerial Conference of the Khartoum Process

Certificate in Cyber Security

United Nations Educational, Scientific and Cultural Organisation Organisation des Nations Unies pour l éducation, la science et la culture

GaPSC Teacher Leadership Program Standards

Guide on Developing a HRM Plan

Financial Crimes Enforcement Network

Academic Program Assessment Plan Certificate: Homeland Security Studies

provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:

CROATIAN PARLIAMENT 1364

COUNCIL OF THE EUROPEAN UNION. Brussels, 17 December 2003 (OR. en) 14994/03. Interinstitutional File: 2002/0043 (CNS) MIGR 101

Intelligence Training Standards

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services

Protective security governance guidelines

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Optional Protocol on the sale of children, child prostitution and child pornography

AG/RES CYBER SECURITY STRATEGY (RESOLUTION)

COUNSELING PRACTICUM HANDBOOK

Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL Contact: Shavon Williams

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture)

INFORMAL HIGH-LEVEL ADVISORY GROUP ON THE FUTURE OF EU HOME AFFAIRS POLICY (THE FUTURE GROUP)

Small Arms. International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons

Transcription:

Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence City of Bogota, Colombia, September 26-30, 2011 DURATION: 5 days CLASS TIME: 34 hours LOCATION: (Police) Officials Social Center (Centro Social de Oficiales), National Police of Colombia, City of Bogota. 1. COURSE SUMMARY 1.1 DOCTRINAL FRAMEWORK Determined to develop the Police Management Pillar contained within the Commitment to Public Security in the Americas (2008), the National Police of Colombia together with the Organization of American States will convene a training course entitled Management of Police Intelligence. This activity forms part of the Inter-American Police Training Program and will take place from September 26 to September 30, 2011 in the City of Bogota. Management of Police Intelligence hopes to imbue participants with the necessary skills for the management and administration of police intelligence units. An emphasis will be placed upon the transfer of knowledge in the field of police intelligence doctrine, producing intelligence, developing technical operations, risk management, amongst others. 1.2 OBJECTIVE Participants will be taken step-by-step through the model and experience of the National Police of Colombia s Intelligence Service. Additionally, each participant will present his/her country s

experience and know-how relating to police intelligence models with a view to enrich and addvalue to the themes discussed. 1.3 JUSTIFICATION Organized crime presents a challenge to the region s authorities and particularly police institutions which are charged with the responsibility of designing strategies to reduce the impact of criminality and advance the process of providing citizen security. A key priority for governments, this work translates into the strengthening and professionalization of police corps to forge more dynamic cooperation mechanisms. Said mechanisms aim to assist investigations, share operational experiences and exchange information relating to combating the different faces of crime. The National Police of Colombia and the Organization of American States have come together to offer a training course for intelligence service operatives belonging to OAS Member States police forces. The Course s objective is to generate greater regional integration through the sharing of experiences and the strengthening of cooperation mechanisms. 2. COURSE STRUCTURE MANAGEMENT OF POLICE INTELLIGENCE FIELD AREA MODULE DURATION (HOURS) I - DOCTRINE FOR POLICE INTELLIGENCE 2 POLICE TRAINING POLICE INTELLIGENCE II INTERNATIONAL COOPERATION MECHANISMS 2 III STRATEGIC COUNTER-INTELLIGENCE 2 IV PRODUCTION OF INTELLIGENCE 10 V PROSPECTIVE INTELLIGENCE 2 VI INFORMATION SECURITY 8 VII INTELLIGENCE FOR TECHNICAL OPERATIONS 8 COURSE DURATION (TOTAL/HOURS) 34 2.1 ACADEMIC FRAMEWORK The Program takes place over five working days, with a total of 34 class hours during which participants will receive training in the field of police intelligence as per the modules listed above.

2.2 METHODOLOGICAL FRAMEWORK Through the provision of round-table discussions together with spaces for private study, it is hoped that the Course will help participants gain knowledge as well as understand and reflect upon the issues at hand. The course is active with participants required to take part in the learning process to acquire knowledge and enhance their ability to objectively undertake analysis with a view to strengthening institutional principles in the field of police intelligence. The methodological framework is designed so that participants orientate their thoughts and actions in an intelligent manner facilitating application of the content disseminated. 3. KNOWLEDGE ACQUSITION TABLE KNOWLEDGE ACQUSITION TABLE KNOW KNOW HOW TO BE Processes belonging to police intelligence services Techniques for the collection, production and dissemination of intelligence information. Development of interpersonal relations based on human values and ethics Basic techniques for the management of information security Techniques for intellectual and investigative work Doctrine and philosophy of Follow-up on the processes and procedures belonging to police intelligence services Harness strategic and operational thinking Adapt to different mediums Collect Information Be coherent in thoughts, feelings and actions Collect information and produce and disseminate intelligence Communicate effectively, both with individuals and Responsible and Committed Honest Objective Able to work as part of a team Respectful Loyal Sociable Inquisitive Safe

the Office of Police Intelligence Manuals and Rules which regulate the police intelligence service groups Apply the necessary information security protocols 4. COURSE SYALLABUS 4.1 MODULE I: DOCTRINE FOR POLICE INTELLIGENCE 2 HOURS 4.1.1 OVERALL OBJECTIVE Define and distinguish between the basic principles on which the Police Intelligence Service is based. 4.1.2 THEMES AND SUB-THEMES 1. Historical Overview of Police Intelligence 2. Structure 3. Organization of the Police Intelligence Service 4. Fostering an Atmosphere for Responsible Behavior 5. Membership of the National/International Intelligence Community 6. Membership of the Police Intelligence Council (as the National Police of Colombia s role as lead-organization of the body) 7. Regional Intelligence Units 8. Intelligence in different police districts/precincts 9. Directorates of Police Intelligence 10. Role of Police Intelligence Service 11. Role of Intelligence Service in general 12. Police Intelligence Service and Judicial Police 13. Basic Principles pertaining to the Police Intelligence Service 14. Principles 15. Vision and Mission of the Service 16. Quality Assurance Policy 17. Objectives of Quality Assurance 18. Strategic Objectives 19. Strategies to ensure consolidation of the Police Intelligence Service 20. Possible Future Scenarios for the Police Intelligence Service 4.2 MODULE II: MECHANISMS FOR INTERNATIONAL COOPERATION 2 HOURS

4.2.1 OVERALL OBJECTIVE Understand the different international cooperation mechanisms in order to strengthen the fight against transnational crime. 4.2.2 THEMES AND SUB-THEMES 1. Globalization of Information 2. Integration into the International System 3. International Relations from the perspective of Police Intelligence 4.3 MODULE III: STRATEGIC COUNTER-INTELLIGENCE 2 HOURS 4.3.1 OVERALL OBJECTIVE Comprehend the principal characteristics of counter-intelligence with a view to developing police operations in the Americas: identifying risks, vulnerabilities and threats which (in certain circumstances) could affect operational security. 4.3.2 THEMES AND SUB-THEMES 1. General Principles pertaining to the field of Counter-Intelligence 2. Variables of Strategic Interest pertaining to Counter-Intelligence in Colombia (National Strategy for the Protection of the State and its Institutions: ENPEI) 3. Behavioral Analysis and General Framework of Police Corruption 4. Detecting Corruption 5. Low-level and Common Corruption 6. Analysis of Police Corruption through the Theory of Robert Klitgaard 7. Internal and External Causes of Police Corruption 8. Relevance of Public Security vis-à-vis protecting the Nation 9. Risk Management 4.4 MODULE IV: PRODUCTION OF INTELLIGENCE 10 HOURS 4.4.1 OVERALL OBJECTIVE Each participant will learn and be able to make use of the information process in an integral manner. Said process is a key element in the intelligence cycle, producing knowledge across the extent of the various intelligence products. 4.4.2 THEMES AND SUB-THEMES 1. Administration of Information 2. The Information Community

3. Ways of Managing Intelligence originating from open sources 4. Ways of Managing Intelligence originating from closed sources 5. Administration of Integral Information systems 6. IT Tools 7. Treatment of Information 8. Organization of Information 9. Classification of Information 10. Preliminary Evaluation of Information 11. Registration of Information 12. Evaluation of Information 13. Reliability of Source 14. Credibility of Information 15. Information Analysis 16. Four Theories: (16.1) Decision-making Theory, (16.2) Perception-orientated Theory, (16.3) Theory of Rationality, (16.4) Motive-based Theory 17. Factors to consider when analyzing intelligence 18. Methods and Techniques of Analysis 19. Strategic Analysis vs. Operational Analysis 20. Analysis of Strategic Intelligence in Decision-making 21. Components of Strategic Analysis 22. Strategic Police Intelligence 23. Contextualization and Application of Strategic Intelligence Analysis 4.5 MODULE V: PROSPECTIVE INTELLIGENCE 2 HOURS 4.5.1 OVERALL OBJECTIVE Orientation of candidates towards various future scenarios with a view to permitting them to take calculated decisions based on current information available. 4.5.2 THEMES AND SUB-THEMES 1. What is Prospective Intelligence? 2. Relationship between Prospective Intelligence and its Epistemological Field of Application 3. Prospective Intelligence from an Intelligence Service point-of-view 4. Strategic Challenges pertaining to Prospective Intelligence 4.6 MODULE VI: INFORMATION SECURITY 8 HOURS 4.6.1 OVERALL OBJECTIVE The participant will be able to conceptualize and apply fundamental information security principles, putting them continually into action in accordance with relevant protocols whilst

using the necessary technological tools to generate an information security culture, as per the relevant institutional requirements. 4.6.2 THEMES AND SUB-THEMES BASIC PRINCIPLES OF INFORMATION SECURITY 1. Security 2. Basic Terminology pertaining to the field of Security 3. Risks 4. Prevention 5. Hints/Clues 6. Threats 7. Danger 8. Incidents 9. Crises 10. Vulnerability TYPES OF SECURITY 1. Public Security 2. National Security 3. Societal Security 4. Juridical/Institutional Security 5. Civil Security 6. Private Security 7. Territorial Security 8. Collective Security 9. Integral Security 10. Information Security 11. Information Security as understood the National Police of Colombia s Intelligence Office (DIPOL) BASIC CONCEPTS PERTAINING TO INFORMATION SECURITY 1. Confidentiality 2. Integrity 3. Secrecy 4. Permanence 5. Access to Information INFORMATION SECURITY 1. Who accesses networks without authorization?

2. Individuals within an organization 3. Individuals outside an organization SECURITY POLICIES 1. Those responsible for security 2. Why is a security policy required? 3. Creating a security policy CRYPTOGRAPHY 1. Definition 2. Relevant Technology 3. Properties related to Codifying Techniques 4. Systems made for Cryptography/Crypto-analysis 5. Methods for Codifying 6. Substitution Ciphers 7. Transposition Ciphers 8. Spartan Scitala Cipher 9. Polybius Cipher 10. Ciphering the Indecipherable Cipher 11. Steganography 12. Authorities providing Certification FIREWALLS 1. What do firewalls do? 2. What are the different types of firewalls? 3. How do firewalls provide security? PROXY SERVERS 1. Host and Proxy Servers 2. Which is the most secure? 3. Hackers, Crackers and other information system criminals 4. Common Hacking techniques INFORMATION SECURITY 1. Definitions INFORMATION CLASSIFICATION LEVELS 1. Strategic Information

2. Criminal Information SYSTEMS AND EQUIPMENT USED FOR COMPUTATION 1. Recommendations for the use of computation systems and equipment INTELLIGENCE DATA PROTECTION CENTERS 1. Creation 2. Structure 3. Functions of Intelligence Data Protection Centers 4. Groups 5. Information Reception and Dissemination Unit 6. Doctrine and Overall Control of Information Unit 7. Culture 8. Security and Control of Information Unit 9. Educational Protocol No. 020/ DIPOL - PLANE 10. Information Security Protocol (PSI-DIPOL) 11. Reference Documents and Rules 12. Security Rules for the Protection of Information 13. Security Rules for IT Systems 14. Security Rules for Operatives 15. Violations of Information Security Protocol (PSI-DIPOL) 16. IT Systems Security Violations 17. Operative Security Violations 18. Application of the Information Security Protocol (PSI-DIPOL) as a response to information security violations 4.7 MODULE VII: INTELLIGENCE FOR TECHNICAL OPERATIONS 8 HOURS 4.7.1 OVERALL OBJECTIVE The participant will be able to apply technical operations knowledge learnt with a view to developing know-how and skills so that he/she may act professionally to prevent activities undertaken by terrorists, drug traffickers and common- and organized criminal groups. 4.7.2 THEMES AND SUB-THEMES 1. Technical Intelligence Operations 2. Basic Operations 3. Specialized Operations 4. Operational Police Intelligence Models 5. Differences between Conventional Operations and Intelligence-led Operations 6. Structure and Function of Technical Operations

7. A Casuistry-based approach to Police Intelligence 8. Applied Strategic Methodologies TOTAL PAGES: 10 (TEN)