Bryane Michael, Linacre College (Oxford)

Slides:



Advertisements
Similar presentations
Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Advertisements

LAW ENFORCEMENT ANTI-CORRUPTION CONFERENCE
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Government of the Republic of Serbia Presentation of the Work Programme for the year 2008 Dušan Petrović, Minister of Justice Ministry of Justice December.
1 Rule of Law: Implementing a Comprehensive and Integrated Approach in Prevention and Fight against Corruption in the Danube Region, Pravetz May.
Independent Sample T-test Often used with experimental designs N subjects are randomly assigned to two groups (Control * Treatment). After treatment, the.
Unit 1 THE SCIENTIFIC METHOD & VARIABLES. I. The goal of science  To INVESTIGATE! And UNDERSTAND! The natural world...  To explain events in the natural.
To provide technical assistance to States to implement the Organized Crime Convention in order that they may effectively prevent and combat different forms.
Workshop 24 Input by ILGA-Europe (policy and coalition opportunities) Joël Le Déroff – Senior Policy & Programmes Officer – 19 October.
European Monitoring Centre for Drugs and Drug Addiction Margareta Nilson ISAJE, Helsinki, 1 September 2006.
Rule of Law: Implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region”, November 2013.
Using the UN Convention against Corruption as a Basis for Good Governance.
The National Intelligence Model (NIM)
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
Regional Conference Intellectual Property Crime Bahrain April 2008.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Anti-Corruption, the Swedish way Gunnar Stetler Head of the Swedish Anti-Corruption Unit
Wednesday, January 30, 2008 Operations and Information Technology “OIT Training” Joseph M Bognanno Enforcement Advisor Office of Technical Assistance.
Chapter 18 - The Fourth Amendment and National Security.
Problems and challenges in the implementation of anti-corruption activities Drago KOS President of the Commission for the Prevention of Corruption, Slovenia.
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
THE AUDIT BOARD OF INDONESIA : FIGHTING AGAINST CORRUPTION 10 th ASOSAI RESEARCH PROJECT MEETING Dec , 2012 SHENZHEN CITY - CHINA.
On the Optimal Location of the Anti-Corruption Agency Bryane Michael, Oxford University.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Finding the Dirty Cop: When you Neighbour is your Enemy Bryane Michael, Linacre College (Oxford) The material in this presentation is licensed by the author.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Welcome to the World of Business and its Functions.
New Ideas for Implementing the UN Anti-Corruption Convention Bryane Michael, Linacre College This presentation is licensed under a Creative Commons license.
Steal These Tips! Audit Techniques for Accountants
U4 – who we are Operational since 2003 as a web-based resource centre funded by:
Crime Statistics and EU Organised Crime Threat Assessment
Advanced Data Analytics
Fighting Corruption, EU Procurement and EU Subsidies Fraud in Belgium
Name: Faten Al-Mohsin ID: Major: Finance
Eaquals: fostering excellence in international language education
Welcome to AP Stats!.
Organizational & Personal
August 25, 2015 Please turn in any forms or assignments from yesterday. Take out a sheet of paper and something to write with for notes.
Responding to a Data Breach 360° of IT Compliance
ETHICS AND CORPORATE SOCIAL RESPONSIBILITY IN A GLOBAL CONTEXT
EU policy on combating hate speech online
Major international instruments on counteracting corruption and organized crime, ratified by Bulgaria UN Convention against Corruption; Council of Europe.
European case studies relating to the administrative approach
INVESTIGATION PROCESS AND TECHNIQUE
WCS’s work to combat the illegal wildlife trade
Unemployment and Institutions
The War for Talent Jim Godwin
Wyoming association of sheriffs and chiefs of police
Chapter 1,2 Stats Starts Here.
College & Career Awareness
The Role of the Internal Audit Department
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
The War for Talent Jim Godwin
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Chapter 01 Stats Starts Here.
The Scientific Method.
VAW in China: Framework and Barriers to Implementation
Chapter 18 - The Fourth Amendment and National Security
Chapter 01 Stats Starts Here.
Partners: EUI, Hertie, SAR, Basel Institute, and BCE
Mining Social Networks. Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques.
Topic 5: Communication and the Internet
Data Protection in Law Enforcement Area Chapter 9a of the draft law
Assessing organised crime: threat, anticipation and future
Copy into binder – Class notes The Scientific Method
Chapter 13: Using Statistics
UNCAC Chapter II Overview Prevention of Corruption under the United Nations Convention against Corruption 8-10 April 2019 Addis Ababa.
Tackling money laundering
Presentation transcript:

Bryane Michael, Linacre College (Oxford) Quantitative Methods for Anti-Corruption Agencies and Internal Security Units Bryane Michael, Linacre College (Oxford)

Background “Specter” of donor supported ACAs across Europe Lackluster ACA performance in period (1999-2002)* TI data are most used and most horrible measure of ACA effectiveness Risk-management approaches in all law enforcement agencies, FRONTEX, 3rd pillar, etc. Prevention in national law and intl conventions is “education” and “codes of conduct” (=we don’t know) Need something better… * Franklin Steves and Alan Russo (2003)

What and Why? Statistical approach Intelligence approach “guess” about “criminal world” few people needed high-valued work Intelligence approach needs informants labour intensive boring, low-valued work Both approaches used together Statistics small, but vital part of risk management

Risk Assessment for L.E. Agencies 4% prob. of bribes at BCP variance of trade value = 23.4 (either normal method (expectaton or max likelihood) or Bayesian method (based on surveys, expert opinions, etc.) this is not a risk… P[corr] = b1 (surveys) + b2 ($ value at risk) + b3 (dept size) + b4 (time in post) Usual warnings about statistics …this is a risk depends on competencies of ACA (only Art. 6, investigatory, or I&P)

Statistical Methods in Brief 1. Finds significant differences 3s out means 99.9% likely took bribe are there differences in legal infractions based on border crosser passport type? 2. officer performance? 2. Test relationships between variables is there a positive, negative, or no relation between 2 or more variables? price is 2s outside of other traders – possible border infraction

Statistical Methods in Risk Analysis Examples of stats of use to ACA or “affiliated bodies” probability of contraband probability of false documents calculating “out of control” individuals and BCPs calculate resource use for “at risk” strata of border crossers find transactions at risk of blanchissement (FIU) stats with Microsoft Excel Staffing: basic stats for staff, 1-2 “quants”

Modelling Corruption Testing ACA hypotheses Proper place for opinions about law enforcement Modeling hypothesis about level of search of nationals versus non-nationals as prophylactic against crime Testing ACA hypotheses also fulfils Lisbon Agenda/RIA €5000 €3000 reduction in social harm

Using survey data to guide policy Conclusion: Internal security is unreliable – centralise. Conclusion: No one knows law, of course easy to seek bribes – PR is answer

Linking Intelligence-based to Statistics Based RM Software such as i2 helps make order of investigations each component decomposible (quantifiable) plot for trends ACROSS CASES advanced techniques such as network (graph) analysis better than using trained eye The standard for organised crime and corruption cases… Source: i2 Ltd. webpage finding probability of someone with criminal links

Statistics at EU Level packages searched Data envelope analysis as international audit (protect Community interests) Comparing survey data and “epidemiological” data Statistics cheap and good way find repeated international schemes. EU funding 6% complain Elbonian corruption 35% complain Elbonian corruption An ounce of risk management is worth a pound of “prevention”