Seminar on Undercover Operations By GPTOC UN ODCCP.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Health Insurance Portability and Accountability Act (HIPAA)
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
Right to Privacy: The Unwritten Right
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 8 Criminal Law and Cyber Crimes Chapter 8 Criminal Law and Cyber Crimes.
Chapter 3 The Public/Private Interface and Legal Authority.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Whistleblower Protection Institution Overview of Georgian Legislation and international experience Maia Dvalishvili Deputy Head, Civil Service Bureau of.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Security Services Constitutional Issues in Private Security.
The Bill of Rights Amendments Two through Ten. The Second Amendment The Second Amendment gives people the right to bear arms (weapons) and the right to.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
The Judicial Branch The Criminal Justice Process.
Chapter 9: Criminal Law and Cyber Crimes
Business Law Jeopardy True or False?MultipleChoiceTortsVocabularyBonus.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Regional Conference Intellectual Property Crime Bahrain April 2008.
What is Law? Jurisprudence is devoted to answering this question!
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
Bell Work: 5/8/13 What is seditious speech? What is prior restraint?
Legal Aid of Cambodia Bangkok, August 2015 Mr. RUN Saray Executiva Director and Lawyer Legal Aid of Cambodia WitnessProtection Presentation by.
1 Chapter Outline 1. Civil Law and Criminal Law 2. Classification of Crimes 3. The essentials of Criminal Liability 4. Corporate Criminal Liability 5.
Articles 4-7: The States Amendments Federal Supremacy & Ratification.
Seven Expectations of the legal system:
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
1 st Amendment: Freedom of Expression “Congress shall make no law.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter Fifteen Criminal Procedure Before Trial. Introduction to Law, 4 th Edition Hames and Ekern © 2010 Pearson Higher Education, Upper Saddle River,
Criminal & Civil Law Chapter 15. Where do our laws come from? The Constitution – Constitutional Law The Legislature – Statutory law The Decisions of Judges.
The Bill of Rights The First Fundamental Changes of the Constitution.
 Terms and Procedures  Constitutional Issues  Specific Crimes  Conclusion.
Bell Work: 5/3/12 What is due process? – Hint: look on pg. 564 if you don’t remember!
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
What is Law?. Law vs. Values  Laws Reflect and promote societies values  Values/Morals (as per dictionary.com) of, pertaining to, or concerned with.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Institutional Strengthening Strategy of the National Anticorruption Centre Ion NASTAS, Ph.D.
FOURTH AMENDMENT Search and Seizure. Fourth Amendment “ The right of the people to be secure in their persons, houses, papers and effects, against unreasonable.
The R.I.C.O. Statute By UN CICP. Why Is Organized Crime So Difficult to Fight? n It is a hidden phenomenon n It is produced by organizations that have:
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
1 st Amendment: Freedom of Expression “Congress shall make no law.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
03/07/ MINISTERIO DEL INTERIOR Dirección General de la Policía Comisaría General de Policía Judicial “ ” “ The role of the Police in combatting drug.
Gail Davidson. Approved unanimously by the UN General Assembly on December 10,  Article 19 Everyone has the right to freedom of opinion and expression;
Legal and Ethical Responsibilities
What is Law?  Jurisprudence – the study of law and legal philosophy  Law can be defined as the rules and regulations made and enforced by government.
Legal Aspects of Nursing
Civil Liberties Chapters 15, 16
ASEAN v Transnational Crime and Terrorism…..an Introduction
Street Law Chapter 1.
Chapter 7 Criminal Law and Cyber Crimes
WitnessProtection Presentation
Chapter 8 Criminal Law and Cyber Crimes
ASSET SHARING Between countries in criminal cases
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Army FOIA/Privacy/Records Management Conference
Bell Work (Think of your response and be prepared to share)
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Electronic Surveillance, Post 9/11
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Functional immunity (only for official acts)
Ethics IN PRIVATE SECURITY
A fundamental principle of UNCAC
Presentation transcript:

Seminar on Undercover Operations By GPTOC UN ODCCP

Undercover Operations on the Palermo’s Convention Article 20 Special investigative techniques 1. If permitted by the basic principles of its domestic legal system, each State Party shall, within its possibilities and under the conditions prescribed by its domestic law, take the necessary measures to allow for the appropriate use of controlled delivery and, where it deems appropriate, for the use of other special investigative techniques, such as electronic or other forms of surveillance and undercover operations, by its competent authorities in its territory for the purpose of effectively combating organized crime.

Why Use Undercover Operations? n To target criminal acts committed by secret organized crime groups n To target corrupt individuals who conspire together in secret n Gather evidence that is well hidden n In the U.S., undercover agents are used to authenticate their reports

What is “Undercover” in the U.S. n A technique to disguise the true identity of law enforcement agents –to detect, prevent and prosecute criminal activities –can include proprietary business entities or personnel –can use federal, state and local officers and even collaborators

Constitutional Problems n 1st. And 4th. Amendments (freedom of speech and search and seizure) n privilege will not apply to persons: –who invite conversation –knowingly participate or remain present –when criminal activity is open to the public

Guidelines for ‘UC’ Operations n The risk of personal injury, property damage, financial loss, reputation and other harms n The risk of civil liability and other harms to the government n The risk of violating ones privacy n Interference with privileged or confidential relationships n the propriety of government involvement in criminal activity n serious legal, ethical, prosecutive questions must be answered

Authorization for UC Operations n All operations must be authorized and controlled n Three levels of oversight –the regional SAC authorizes and sends written request to HQ –the regional request is approved by HQ and controlled by committee –Authorization only by the AG

Duration of the ‘UC’ Operation n Initially for 3 months n can be extended by the Committee for 3 month periods

Prohibited Conduct n A ‘UC’ may not participate in acts of violence n may defend himself or others n may not instigate or initiate any plan to commit a crime n may never entrap a person –may not implant the idea to commit a crime he is not predisposed to commit

What can be Authorized? n Misdemeanors or other minor crimes n consensual monitoring even if crime under local law n purchase of stolen or contraband goods n delivery or sale of stolen property n controlled delivery of drugs not for re-sale n more serious crimes but only with approval except in emergencies

Preparing the UC n The agent must be instructed in the: –prohibitions against entrapment –rules against illegal investigative methods –methods to discourage violence committed by persons under investigation

Ethical Considerations n the government is committing crimes n the government knows of criminal activity and ignores it n the government is involved ‘promoting’ crime

UC Operative n Must understand the environment in which he or she will operate –familiarity with customs, dress and language –must ‘fit in’ to be accepted