Yves Goulet Director, National Fisheries Intelligence Service

Slides:



Advertisements
Similar presentations
Using Intelligence led policing as a model to Prioritize Organized Crime Investigations – A Canadian Perspective.
Advertisements

Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
Foresight Flood and Coastal Defence Project Government Office for Science Department for Innovation, Universities and Skills Overview by: Colin Thorne.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Environmental Impact Assessment Myriam Raiche November 8, 2007.
Strategic Management & Strategic Competitiveness
Risk Management and Strategy Prioritisation Intelligence Step 8 - Risk Management and Strategy Prioritisaiton Considering the risks associated with action.
Capacity Enhancement for Air Quality Management John E. Hay Senior Advisor UNEP ROAP & IETC.
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Incorporating Ecosystem Objectives into Fisheries Management
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Performance Measurement and Analysis for Health Organizations
Risks from/to Ok Teddy project Definition of Risks probability that a substance or situation will produce harm under specified conditions a combination.
1 1 BRANCH: CORPORATE AFFAIRS 1. CORPORATE MANAGEMENT SERVICES To provide financial and strategic support services that enhance service delivery by the.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
1-1 McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved C H A P T E R SIX Targeting Attractive Market Segments 6.
Canada’s Ocean Strategy. The Oceans Act In 1997, Canada entrenched its commitment to our oceans by adopting the Oceans Act. In 1997, Canada entrenched.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Environmental Management System Definitions
Peter B. Bloland, DVM, MPVM Director Division of Public Health Systems and Workforce Development Global Health Leadership Forum November 10, 2011 National.
GEELONG REVISITED FROM ESD TO EBFM - future directions for fisheries management A COMMERCIAL INDUSTRY PERSPECTIVE ON THE ESD FRAMEWORK Neil MacDonald,
Why Does NOAA Need a Climate & Ecosystem Demonstration Project in the California Current System? Capabilities and Drivers La Jolla, CA 6 June, 2005.
Sample Codes of Ethics in Adventure Tourism
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
1 NOAA Priorities for an Ecosystem Approach to Management A Presentation to the NOAA Science Advisory Board John H. Dunnigan NOAA Ecosystem Goal Team Lead.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Kathy Corbiere Service Delivery and Performance Commission
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – Assessing.
OAS Priority Setting Process Three steps to decision-making A presentation by Pierre Giroux Alternate Representative of Canada & Chair of the CAAP Working.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Jed Abad Anti-Money Laundering Assistance Team Australian Attorney General’s Department.
Lake Management in Alberta. Lake Issues ~2500 lakes in total with 800 fish-bearing lakes in Alberta Many lakes have changed due to Watershed alteration.
Vulnerability Assessment Framework: Mapping and Measuring Vulnerability of Syrian Refugee Households in Jordan.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
K. Bruce Jones EPA Office of Research and Development U.S. EPA Science Advisory Board Regional Vulnerability Assessment Advisory Panel Meeting October,
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Headquarters U.S. Air Force
Vendor/Client/Tenant/Landlord Jones Lang LaSalle Due Diligence
JMFIP Financial Management Conference
DISASTER VULNERABILITY, RISK AND CAPACITY
An Overview on Risk Management
Построение культуры integrity в компании Aнар Каримов партнёр «ЭКВИТА»
ENVIRONMENTAL ASSESSMENT TOOLS
Vendor/Client/Tenant/Landlord Jones Lang LaSalle Due Diligence
Sustainable Fisheries in the Black Sea European Committee of the Regions 7 June 2017, Brussels Sustainability of Black Sea fisheries and tools for fisheries.
Vendor/Client/Tenant/Landlord Jones Lang LaSalle Due Diligence
SAI Jamaica’s SDG Audit Coverage
Enterprise Risk Management (ERM) at Clayton State University
Public-Private Partnerships in German Development Cooperation
Consultation & Participation
Strategies Achieving our Goals
ICH Q9: Quality Risk Management
ICH Q9: Quality Risk Management
A means to an end: criminal analysis and organised crime policy
Assessing organised crime: risk based and future oriented approaches
Sustainability Corporations, Capital Markets and Global Economy.
Cyber security Policy development and implementation
Leticia Martinez Aguilar DG FISH Unit A2 June 2007
RISK MANAGEMENT MARKET & SOCIAL RESEARCH
An Integrated Governance Approach towards Inclusive Development
What is the place for biodiversity in the Catalan 2030 Agenda?
C. Kelly Consultant UN Convention to Combat Desertification
The Proposed Fish Habitat Management Regime for Yukon Placer Mining
Data Governance & Management Skills and Experience
Assessing organised crime: threat, anticipation and future
Briefing to the Portfolio Committee on Defence on the audit outcomes for the 2013/2014 financial year.
Strengthening the Conservation and Stewardship of the Sargasso Sea – Canada’s Lessons Learned for BBNJ Treaty Negotiations Nadia Bouffard, Chief Negotiator.
GEO - Define an Architecture Integrated Solutions
Data Security and Protection Toolkit Assurance 2018/19
Presentation transcript:

Canada’s Strategic threat and risk assessment: An Intelligence Tool to Fight against iuu Yves Goulet Director, National Fisheries Intelligence Service Fisheries & Oceans Canada

The Conservation & Protection Branch C&P is the enforcement arm Has approximately 600 Fishery Officers Promotes and maintains compliance with legislation, regulations, policies and management measures implemented to achieve the conservation and sustainable use of Canada’s aquatic resources, and the protection of species at risk, fish habitat and oceans

Strategic Threat & Risk Assessment Standardized methodological process Identify, assess and prioritize the most significant threats and risks to conservation of fisheries Provides a national and regional understanding of the environmental, species, fishery and industry profiles Basis for to formulate an appropriate response evidence-based decision-making

Threat Risk Assessment STRA Methodology Combines both a Threat and Risk Assessment Probability & Impact   Threat Assessment CAPABILITY Risk Assessment INTENT HARM Knowledge & Resources Confidence & Desire VULNERABILITY Prioritized Threat Risk Assessment  

Key Definitions: Threats Assessments Threats: Individuals, groups or organisations whose activities are likely to cause damage, harm or loss to the resource Assessed by looking at the threat: Capabilities Intent

Key Definitions: Threats Assessments Intent Desire of a threat to engage in activities and the level of confidence of success Assessment will prioritize: 1-Those who have demonstrated intent 2-Those whose intent is unknown Capability Function of the resources and knowledge available to a threat Expressed in a series of capability attributes

Key Definitions: Threats Assessments Capability Attributes: Skills, methods or common practices that enable entities to gain a foothold in fishery or a geographic location. Included in our model: Corruption/Infiltration Private Sector Involvement Organized IUF, IUU, Criminal Links, collusion Unlawful Distribution / Laundering Sophistication Scope Unlawful enterprise Violence

Capability Attribute Weights: Ranked and arranged in order of their ability to create or add to an IUF group, maintain control or order over operations, and/or avoid detection or apprehension.

Capability Attribute Weights and Values Each of the 7 attributes has five possible values: High, Medium, Low, Nil, or Unknown Each value is weighted and defined, giving indicators that analysts use to compare different entities reliably VALUE SCORE DEFINITION High 4 Demonstrated ability to corrupt officials responsible for the management and control of fisheries, or parties working on behalf of the department. Medium 3 Has attempted to corrupt officials responsible for the management and control of fisheries or parties working on behalf of the department. Unknown 2 Unable to assess. Low 1 Has known associations with officials responsible for the management and control of fisheries or parties working on behalf of the department, but there are no indications of attempted corruption. Nil No ability or attempt to corrupt or infiltrate.

Threat Capability Score Threat Scale RCMP methodology customized for Fisheries & Oceans Canada First attempt at incorporating a mathematical model into the C&P categorization of organized entities IUF Attribute High Medium Unknown Low Nil Threat Capability Score Corruption/ Infiltration 16 12 8 4 Private Sector Involvement Infiltration Organized IUF, IUU, Criminal Links, Collusion 9 6 3 Unlawful Distribution/ Laundering 2 Sophistication Scope 1 Unlawful Enterprise Maximum Capability Score 68   Total Threat Capability Score 51 Overall Threat Score 75

Threat Results Presentation The entities are listed on one axis and the attributes on the other. The matrix is filled in with the respective values for each attribute for each group. The values are color-coded on the matrix.

Same logic applied to vulnerabilities on the risk side of the model Probability & Impact   Threat Assessment CAPABILITY Risk Assessment INTENT HARM Knowledge & Resources Confidence & Desire VULNERABILITY Prioritized Threat Risk Assessment Same logic applied to vulnerabilities on the risk side of the model

Key Definitions: Risks Assessments Vulnerability: Weakness or gaps in the protection of assets that can be exploited by threats. Used as indicators of Probability Included in our model: Stock Health Management Regime Enforcement Capacity

Key Definitions: Risks Assessments Harms: Type and magnitude of negative consequence that would occur should a vulnerability be exploited. Includes both direct and indirect Impacts Form part of the assessment’s narrative Included in our model: Environmental Economic Social Political

Threat, Risk and Harms Results Presentation C THREAT A HARMS = STRA B D VULNERABILITIES

Results from STRA 2.0 Second articulation of the threats to fisheries Demanding, but overall a solid, intelligence product which picked up traction in the regions and among senior management Better at using it Protects us against possible legal challenges and accusation of subjectivity in its target selection