Korean National Police University May 2016 Paul Ekblom

Slides:



Advertisements
Similar presentations
Strategies for preventing terrorism Lecture by Tore Bjørgo Professor of Police Science Norwegian Police University College; Senior Research Fellow Norwegian.
Advertisements

Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
CHCCD412A Cluster 1.  s/pdf_file/0006/54888/CHAPS_Community- Services-Pathway-Flyer_v 4.pdf
Managing your transition September Managing your transition.
Understanding Your Information Culture Gillian Oliver Victoria University of Wellington.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services.
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
Learning Module 12 Action Planning. #1Identify, Report, and Assess the Hate Crime Problem in Your Community Recognizing and reporting the extent.
Making a difference to practice: challenges and opportunities Dr Lara Allen Director – the Humanitarian Centre Global Food Security Cambridge Symposium.
CYPS – Foundation Degree How to carry out a swot analysis.
Supporting Vulnerable Children: Preventing Violent Behaviour and Violent Extremism.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Working Together for the Benefit of Children and Young People
Article by Caroline Moser
Maritime Security as an Integral Part of an
Projects, Events and Training
Dr. Ceresa Dr. Fonio Comune di Milano
Intelligence Led Policing, The Community, and the Prevention of Terrorism A UK Perspective Chief Inspector Simon Smith Head of Operational Delivery.
TERRA Terrorism and Radicalisation
Section 1 Delivering Value with IT
Integration of Children’s Policies
Learning from Complex Child Sexual Exploitation Investigations
Prevent & Your Role Within it
Module 4 Developing an Adaptation Strategy for the Company
Section V Getting the Job Done… Through Others
Safeguarding Training – Prevent Strategy
Preventing Hate Crimes
Prevent.
Southwark Prevent programme
Name of the idea Description and Military Application Maturity
Strategic Planning for Learning Organizations
Name of the idea Description and Military Application Maturity
CIRAS FINAL CONFERENCE
Advocacy and CampaiGning
World of work How do tasks bring the WoW into the classroom?
focus areas – what we want to achieve…
Standards for success in city IT and construction projects
NHS Education for Scotland Always Event Project
European Network of Environmental Authorities: Making Structural & Cohesion Funds Water Positive Working Group Dr Martin Griffiths Environment Agency for.
Managing Change and Other Keys to Successful Implementation
Integration of Children’s Policies
Making Information Security Actionable with GRC
Prevent Matching Card Game
Communication plan.
Managing Self Self Management 12/31/2018.
How Current Policy Issues Can Benefit from the Family Impact Lens
TOWER HAMLETS GUIDANCE
SOUTH AFRICAN INSURANCE ASSOCIATION
National Child Sexual Exploitation and Trafficking Workshop – Intelligence Led Investigations I will come back to the scenario towards the end of this.
Diploma in HRM – Contemporary Developments in Human Resource Development (HRD) Understand the role and contribution of HRD practice to developing different.
“Choice Theories” Historical Context of Choice Theories
Social prescribing in County Durham
The NDM and THRIVE Suffolk CCR Training 2018.
SUSTAINABLE MICRO-FINANCE for WOMEN’S EMPOWERMENT
Building Capacity for Quality Improvement A National Approach
Principles of Effective Early Intervention
Understanding your Impact on Well-Being of Future Generations (Wales) Act 2015 Contributing to and Reporting on the 7 Wellbeing Goals, Local Wellbeing.
Assessing organised crime: threat, anticipation and future
Children and Young People’s Trust Partnership
Prevention, Intelligence
World of work How do tasks bring the WoW into the classroom?
Independent Practitioner Chartered Society of Physiotherapy Council
Early help: councillor training
A new educative role and expectations
Presentation transcript:

Korean National Police University May 2016 Paul Ekblom The Conjunction of Terrorist Opportunity: A Framework to understand and prevent terrorist attacks Korean National Police University May 2016 Paul Ekblom Visiting Professor Applied Criminology Centre University of Huddersfield p.ekblom2@hud.ac.uk

Counter-terrorism strategy in UK CONTEST – UK Government approach to addressing the threat of terrorism – operates on a number of levels: Prevent – stop people from becoming radicalised Protect – stop attacks from happening Prepare – once an attack has started, stop the attack and limit the harm to people, society and assets Pursue – investigate the crime, and arrest, incapacitate, bring to justice the perpetrators These different approaches operate by influencing a range of different causes of terrorism

Need for an adaptive approach The nature of the terrorist threat is highly dependent on the local context, and successful security solutions or responses have likewise to be customised to suit the context Terrorists are highly motivated, persistent, adaptable and innovative The Technological, Social and Business environment is changing rapidly, which creates new opportunities that terrorists can exploit, ranging from vulnerabilities to weapons We must be adaptable too, so we must make it easy for security practitioners to adapt to context, and to innovate faster than the perpetrators Otherwise we will continue to win individual battles, but we may go on to lose the war in the longer term

Need for an integrated understanding of causes of terrorist attacks In order to help security practitioners to be adaptable, they must Think clearly Communicate using consistent, well-defined terms Store and retrieve knowledge of good (and bad) practice in a well-organised way that can help them to Formulate the problem If they discover successful exemplars of good practice, to replicate them in a way that is intelligently customised to problem and context If they cannot find such good practices to replicate, then to generate a variety of plausible innovations that are based on tested theoretical principles Security practitioners therefore need a knowledge base that is Clearly-structured, Integrated, and With well-defined terminology

Unfortunately… Different policymakers and different police practitioners focus on different levels under the CONTEST schema, and different types of causation of terrorist events, but an integrated approach is needed But the language that different agencies and academics use is extremely diverse For example, terms like ‘risk, threat and vulnerability’ are often given different meanings in different professions, or not defined at all Criminologists have diverse terminologies too, and choose to focus on different sets of causes In particular, there is a big divide between 1) those who focus on the perpetrator or offender, and 2) those who focus on opportunities and vulnerabilities in our target assets, and our environments and services

What we need is… So we need An integrated framework With a common, well-defined language That brings together all these types of causation of terrorist attacks, and different levels and types of response

One such approach was developed to meet these requirements The Conjunction of Criminal Opportunity (CCO) was developed from a study of several hundred different crime reduction projects implemented in the UK’s Safer Cities programme It brings together a range of theories covering the causation of crime from both the perpetrator or offender side (capability and intent), and the environmental or situational side (especially opportunity) It is a ‘one-stop-shop’ for supporting two related tasks: Understanding the immediate causes of criminal events, that reside in the crime situation, and what the perpetrator brings to that situation Envisaging the range of interventions to block those causes, and so reduce the likelihood of the crimes from happening

One such approach was developed to meet these requirements Now, the immediate causes of terrorist events are rather similar to those of ‘ordinary’ crime So, several years ago I and two colleagues from the worlds of crime prevention training, and counter-terrorism, adapted CCO to the Conjunction of Terrorist Opportunity (CTO) CTO has 2 perspectives: On the causes of terrorist attacks or events On the interventions we can make to block, weaken or divert these causes, and thereby frustrate terrorists from achieving their goals

Target Vehicles & Audiences Conjunction of Criminal Opportunity 09/29/99 Conjunction of Terrorist Opportunity Target Vehicles & Audiences Ideology, goals

Ideological predisposition Diagnosis – the immediate causes of terrorist events – the terrorist side Ideological predisposition Lack of skills and other personal resources to avoid terrorism Readiness to act Resources for committing terrorism Decision to commit act of terrorism Terrorist’s (tele)presence in situation I’ll focus on the immediate causes for this presentation, don’t think CCTV has had a significant role on historical timescale yet….

Target of terror – vectors, audiences and military opponents Diagnosis – the immediate causes of terrorist events – situational side Target of terror – vectors, audiences and military opponents Enclosures – for targets and for terrorists Wider environment Absence/incapacity of terrorism preventers Presence/capacity of terrorism promoters Tora Bora

A crime prevention intervention Intervention in cause Disruption of Conjunction of Terrorist Opportunity Decreased risk of terrorist events Reduced number of events A crime prevention intervention Wider benefits

Map of basic intervention principles 09/29/99 Likewise for intervention principles Map of basic intervention principles

Intervention – the terrorist side Ideological predisposition Deradicalisation Lack of skills and other personal resources to avoid terrorism Increasing resistance to radicalisation Readiness to act Addressing short-term motivational pressures Resources for committing terrorism Denial of weapons, tools, info, funds Decision to commit act of terrorism Deterrence (risk) and Discouragement (low reward, high effort) Terrorist’s (tele)presence in situation Approach and access control I’ll focus on the immediate causes for this presentation, don’t think CCTV has had a significant role on historical timescale yet….

Intervention – the situational side Target of terror – vectors, audiences and military opponents Target hardening, making it less vulnerable or attractive; making target audiences more resistant to influence Enclosures – for targets and for terrorists Hardening the enclosure, adding stand-off etc Wider environment Making reconnaissance difficult, making Vehicle-Borne attacks hard to approach the target or enclosure at speed Absence/incapacity of terrorism preventers Mobilising public, organisations, families to influence potential perpetrators or report suspicious activity Presence/capacity of terrorism promoters E.g. mobilising people who sell fertiliser, not to sell, or to tell police Tora Bora

Preparation for attack Complex attacks – multiple steps Preparation for attack Execution of attack Consummation of attack The same diagnostic map of causes can be applied to the event which completes each scene. #Here’s the main scene, as before, the execution of the crime. #Here’s the preparation - showing several components# and 2 stages. #And here’s the consummation. We can target our interventions at any stage - perhaps several. We can use scene diagrams like flowcharts, to help us think strategically how criminals, particularly well-resourced organised criminals, could bypass blockages by seeking alternative routes to their goal. &

Summary CTO aims to provide an integrated model of causes of terrorist events to aid understanding, investigation, risk and threat assessment, and prevention Identifies full range of preventive responses which could be implemented by different agencies acting at different levels and over different timescales Acknowledges evolutionary nature of the problem We can use CTO to Think strategically, or tactically, and always holistically about problems and solutions Help to capture, store, retrieve and share knowledge of practice and policy Communicate efficiently across professional disciplines, and internationally

Where to find CTO https://5isframework.wordpress.com/conjunction-of-criminal-opportunity/ https://5isframework.files.wordpress.com/2013/12/cto-security-journal-july05.pdf