A means to an end: criminal analysis and organised crime policy

Slides:



Advertisements
Similar presentations
Contents: The Consortium Background Goal Objectives Methodology, dissemination strategies and timetable UNIVERSITA CATTOLICA DEL SACRO CUORE MILANO.
Advertisements

Session 171 Comparative Emergency Management Session 17 Slide Deck.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – SRC’10.
Foresight Flood and Coastal Defence Project Government Office for Science Department for Innovation, Universities and Skills Overview by: Colin Thorne.
Cologne University of Applied Sciences / Fachhochschule Köln Faculty of Economics and Business Administration/ Fak 04   Prof. Dr. Frank Gogoll, Prof.
Business Strategy. Content Types of strategy SWOT Decision making to meet objectives Decision trees Corporate plans Contingency planning.
CSR Project, 3 cr. Corporate Responsibility, C-module (15 cr.) or free-choise studies Introduction to Corporate responsibility, 1,5-3 cr. (depending on.
SWOT ANALYSIS A short- hand summary of a Situational Analysis.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) T. Vander Beken – Sports.
Risks from/to Ok Teddy project Definition of Risks probability that a substance or situation will produce harm under specified conditions a combination.
Unpacking the Question Look for the Key words in the question to help you decide on the approach you should take. Key words include:  Topic Words highlight.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Paris Project Meeting January 2012 Item – Statistics Objective 5 B. Proia With financial support from Criminal Justice Programme 2008 European Commission.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) T. Vander Beken – OCTA: outsider’s.
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 10 Risk Management Proactively managing the positive.
P4.
1 NEST New and emerging science and technology EUROPEAN COMMISSION - 6th Framework programme : Anticipating Scientific and Technological Needs.
POLICE OF THE CZECH REPUBLIC NATIONAL DRUG HEADQUARTERS CRIMINAL POLICE AND INVESTIGATION SERVICE Beograd,
The Precautionary Principle in the UK and Europe IDDRI Workshop Tuesday 3 December Henry Derwent Defra.
© College of Policing Limited 2012 Version 1.0 NOT PROTECTIVELY MARKED 26/10/2015 Stage Two Assess Threat and Risk Gold Public Order Commander 4.4.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – Anticipating.
Cross-Border Cooperation November 17, Purpose Highlight how Canada and US advance cross-border cooperation  Canada-US law enforcement context.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Gaps to Caps project Why we need a discussion on capability and scenario analysis and why task group C and task group D need to work together when it comes.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – How to.
Laboratory on Security Policies and Government of the Territory Valentina Punzo.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – Assessing.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) The Berabalt project - Ghent, 9 June Setting.
SEC-07-FCT-2016 Human Factor for the Prevention, Investigation, and Mitigation of Criminal and Terrorist Acts Dr. William Hynes Future Analytics Consulting.
05 October 2009 Heike Thomsen, BEUC SWOT Analysis - Emphasis on your organisation -
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Table of contents: Preliminary concepts Why proofing legislation against crime? The CRAM Final remarks 1 PROOFING LEGISLATION AGAINST CRIME: THE RESULTS.
Intelligence Led Policing A Model for Strategic Planning, Strengthening Community Policing and Countering Transnational Threats posed by Criminal Activity.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Crime Statistics and EU Organised Crime Threat Assessment
Legitimate businesses and (organised crime) vulnerability
The vulnerability of economic markets to crime in 2015
An Overview on Risk Management
Forming a Strategy for your Business.
Strategic Planning for Learning Organizations
Contribute to the development of a strategic plan.
Tom Vander Beken & Karen Verpoest
LO1 - Analyse the impact and influence which the macro environment has on an organization and its business strategies 1. P1 Applying appropriate frameworks,
SWOT Analysis Workshop A
External influences.
SWOT analysis Hodder & Stoughton © 2017.
European case studies relating to the administrative approach
UNECE Work Session on Gender Statistics, Belgrade,
Chapter 3 Performance Management and Strategic Planning
Vulnerability of the economy and guardianship
Assessing organised crime: risk based and future oriented approaches
Organised crime and legal sectors Theory & cases
Prof. dr. Tom Vander Beken SRC’10
Developing a shelter strategy
Assessing and Managing Risk
Strategic Analysis.
Proofing products against organised crime - a case study of diamonds
Assessing organised crime: threat, anticipation and future
Prevention, Intelligence
Yves Goulet Director, National Fisheries Intelligence Service
Legislative crime proofing - Detection and evaluation of loopholes that offer opportunities for organised crime Prof. Dr. Tom Vander Beken Tackling organised.
Main recommendations & conclusions (1)
Presentation transcript:

A means to an end: criminal analysis and organised crime policy Prof. Dr. Tom Vander Beken Workshop “Tools for assessing the threat of organised crime” Organisation for Security and Co-operation in Europe (OSCE) Vienna, 26 April 2006

Overview Criminal analysis and organised crime policy Risk, threat, harm and vulnerability Tools for assessing organised crime Conclusions

1. Criminal analysis and organised crime policy Why analysing organised crime? What do we need/want to know?

A. Why analysing organised crime? Organised crime is a key concern for many policy makers. To give an appropriate response to the phenomenon, policy makers need to be informed: preventive and/or repressive action operations, tactics and strategy Analyses are there to produce knowledge and understanding, not just information Analyses are tools to set priorities.

B. What do we want/need to know? Knowledge about the phenomenon includes: more than reporting on law enforcement activity: (in)significant law enforcement action can “create” (in)significant phenomena; information to think ahead about possible future developments (more than the report on last year’s situation); not only numbers of criminals, groups or activities, but a ranking of these issues to show differences in dangerousness, seriousness, …; and an understanding of the risk/threat posed by organised crime, the harm caused by it and the vulnerability of the environment.

2a. Risk, threat, harm and vulnerability Risk is the chance of something happening that will have an impact upon objectives. Threat arises when a source of risk has an intent to occur or has the capability to do so. Harm is the damage occuring should a threat be realised. Vulnerability is an aspect of the environment offering opportunities to the threat to cause harm.

2b. Risk, threat, harm and vulnerability THREAT (criminals) RISK VULNERABILITY (environment) HARM (society)

3. Tools for assessing organised crime Several methodological tools (best practices) exist to make « useful » organised crime assessments, focusing on: a. Threat b. Vulnerability c. Harm d. Risk

3a. Threat analyses Focus is on measuring the intent and the capability of criminals (groups) and rank them according to their « dangerousity » (e.g. Canadian « Sleipnir » analysis, European OCTA,…). KNOWLEDGE RESOURCES RISK CAPABILITY EXPECTATION DESIRE INTENT HARM THREAT

3b. Vulnerability studies Focus is on assessing the weak points in the (legal) environment which could be exploited by organised crime. (No law enforcement bias): Vulnerability studies of economic sectors; Environmental scans linking political, economic, social, technological and environmental (PESTE) evolutions to (future) crime opportunities; Scenario studies about key uncertainties; Crime proofing studies about legislation or products; …

3c. Harm assessments Focus is on the consequences (harm) caused by organised crime. Ranking of crime phenomena/groups/vulnerabilities in order of the harm they (might) cause. Difficult and subject to debate: what is harm (economic, emotional, physical, intellectual, political…)? how to measure and compare (and rank)? Examples: UK approach (NCIS and SOCA)

3d. Risk analyses Focus is on the analysis of the risk, thus linking assessments on threat, vulnerability and harm. The « ideal » model as it: combines information on criminal activities (threat), about the crime opportunities of the environment (vulnerabilities) and about the impact (harm) of organised crime; and offers knowledge to policy makers which is not only based on law enforcement activity to set priorities for both prevention and repression.

4. Conclusions A good organised crime policy requires strategic knowledge about the phenomenon allowing targeted and concrete action. Organised crime assessments are useful tools if they are able to help policy makers to assess the seriousness of the phenomenon. Assessments based on a risk-based concept (threat, harm, vulnerability) serve that purpose best.