OET Lesson Developing a Risk Targeting System. Objectives Identify types of information used to create and enhance targeting systems. List the steps required.

Slides:



Advertisements
Similar presentations
On the Customs front, massive changes have taken place under the Customs Modernisation Programme which was launched two years ago. As with Revenue, Customs.
Advertisements

Traveling Kenji Kitao Documents n passport n plane ticket n insurance n travelers checks, cash, credit cards n list of valuables u all belongings u serial.
IMMIGRATION COMPLIANCE AND ENFORCEMENT (ICE) TEAM
1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
Export & Import Practices
1 Unauthorized Trading. 2 Definition  Executing a buy or sell transaction in a customer account without their knowledge and not agreed to by the customer.
SEM II : Marketing Research
“How to utilize the kit for conducting extra-curricular activities?” Miss Chung Shui-ha (NLSI Peace Evangelical Secondary School)
A-TCET Outbound Enforcement February 12, Outbound Mission Preventing terrorists, terrorist groups, rogue nations and other criminal organizations.
THE PRACTICAL ASPECTS OF IMPLEMENTING MEA CONTROLS THE ROLE OF CUSTOMS MEAs Enforcement Training Workshop for Customs Officers and Border Control Personnel.
1 CHAPTER XXXI INT'L FREIGHT FORWARDER & ELECTRONIC EXPORT INFORMATION  International Freight Forwarder  Electronic Export Information.
“Think Security”. Supply Chain Security On the Southern Border.
Freight Security and the World Economic Forum December 5, 2002.
RITA/BTS International Data Improvements Steven Beningo International Transportation Specialist USDOT/RITA/BTS Telephone Presentation to the Texas Border.
Chapter 13 Physical Distribution and Documentation.
1 CHAPTER XIII CUSTOMS CLEARANCE  Entry Process of Goods, Types of Entry  Evidence of Right to Make Entry  Entry Documents, Surety  Entry Summary &
INTERNATIONAL TICKETING
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
Introduction to Collecting and Compiling Data G/T Research Program Introduction to Collecting and Compiling Data G/T Research Program.
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
Brought to you by: Myles Banks and-security-investigationshttp:// and-security-investigations/
Compliance April 29, What is Customs Compliance? A program of ‘shared’ responsibility in which Customs requires all importers to demonstrate reasonable.
2nd Global ABC Conference and Exhibition October 2013
Business Statistics and Registers
1 New Zealand’s Advance Passenger Screening and Biometrics Presentation to : BALI AHEG II Identity Management Workshop 17 March 2004 Rob Bolton Chief Information.
5th Annual International Public Sector Reform Symposium: New Models of Service Delivery for the 21st Century Ian Neill, e-Borders programme, UKBA Wednesday.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
SAN FRANCISCO DRUG INTERDICTION SIGACT Analysis and Network Interdiction By: Adam Haupt and Austin Wang.
SEM II : Marketing Research
Implementation of Prior Notice. Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (Bioterrorism Act-BTA) Public Law
Security Challenges Facing Seaport Operations Day 1 - Module 3.
1 U.S. Importer-Based Certification and Verification Overview Heather Sykes Chief, Trade Policy Branch Trade Policy and Agreements Division Office of International.
The U.S. Department of Transportation and the International Trade Data System Steven Beningo Transportation Border Working Group Border Data Workshop June.
Keys to Successful Marketing  Must understand and meet customer needs and wants  To meet customer needs, marketers must collect information.
Tourism Planning: Travel Essentials CGG3OI. On your own: Make a list of ten things you MUST HAVE when you travel. We will discuss as a class when you.
Copyright © 2004 McGraw-Hill Australia Pty Ltd PPT Slides t/a Office Skills: A Practical Approach 3e by Horsfall & Cairns Slides prepared by June Breheny.
ADVANCE AGRIBUSINESS FARM RANCH BUSINESS MANAGEMENT.
Countering Illicit Drugs. Transnational organized crime Trafficking in persons Trafficking in arms Trafficking in drugs Smuggling of migrants Smuggling.
Data Processing and Analysis. “Do we have a market?”
Rules for Improving Cargo Security The Maritime 24 Hour Rule The Trade Act of 2002 The Automated Manifest System (AMS)
Correspondence Accounts and Wire Transfers
AUTOMATED EXPORT SYSTEM PRESENTATION PRESENTED BY: HARVEY R. WAITE, II Partner, Director of Regulatory Compliance and Security OCEANAIR, Inc. December.
1 CHAPTER XIII CUSTOMS CLEARANCE  Entry Process of Goods, Types of Entry  Evidence of Right to Make Entry  Entry Documents, Surety  Entry Summary &
Automated Manifest System (“AMS”) C. Jonathan Benner Troutman Sanders LLP Washington, D.C. 22 March 2004 Stamford, Connecticut.
Lesson 7 The Chain of Command and What it Means to the USAF and CAP Slide 1 USAF and CAP Chain of Command.
Travel business on-line Learning Objectives To know the trend of E-business in the travel and tour industry. To know how travelers.
1 CASES OF ILLEGAL TRAFFIC Workshop on Illegal Traffic Bratislava, 3 to 5 october 2006 Vojko Otovic, CARS.
Building Smarter Borders To Increase Security and Facilitate Trade International Visitors Program April 26, 2004.
Physical Distribution and Documentation
Overview September 2015 Centers of Excellence and Expertise.
1 Unauthorized Trading. 2 Definition  Executing a buy or sell transaction in a customer account without their knowledge and not agreed to by the customer.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
SEM II : Marketing Research 1.06 Collect secondary marketing data to ensure accuracy and adequacy of information for decision making.
Inception Report 2016 “Developed Market Oriented Export Promotion Strategy/ Marketing Strategy (D)” Country : Name : Organization: 1.
Training Workshop on Business Process Analysis in International Trade Joint Workshop on Trade Facilitation and the Single Window September 2015,
SMALL INDUSTRIES Advisory Bodies Development Commissioner, SSI State Small Industries Board Directorate of Industries Export Promotion Council Government.
Pengantar Sistem Informasi
Proactive Attack Prevention and Detection
Business Partner Screening
ACE Presentation for Industry
SEM II : Marketing Research
SYSTEMS ANALYSIS Chapter-2.
CHAPTER XVI CUSTOMS BROKERS
IS4550 Security Policies and Implementation
The Impact of Advanced Technology on Border Security
International Business Transactions (1)
Lecture-36 Course Project
Overview of Business Area Strategy and Products and Services
LESSON 10-3 Accounting for Cash and Credit Card Sales
Canadian Border security and the Multiple Borders Concept
Presentation transcript:

OET Lesson Developing a Risk Targeting System

Objectives Identify types of information used to create and enhance targeting systems. List the steps required to create and use targeting systems.

Risk Targeting Cycle Collect Data Analyze Data Identify Targets Examine Document Results

Collect Data Arrest/Seizure Reports Intelligence Reports InterviewsDocuments & Computer Systems Collect

Arrest/Seizure Reports Collect the following data: Type, quantity, origin, and destination of contraband Method of concealment Type of conveyance Description of the smuggler Cover story Time of day, season, and other environmental factors Collect

Intelligence Reports Recent smuggling trends Potential terrorist threats Review recent intelligence information about: Collect

Interviews Other knowledgeable officers Travel and trade personnel Other sources Collect information from interviewing: Collect

Documents & Computer Systems Traveler Documents: Passports, tickets, driver’s licenses, and other identity papers Cargo Documents: Manifests, air waybills, invoices, insurance policies, etc. Computer Systems: –Advanced information –Previous travel and trade transactions (if available) –Previous customs findings Collect

Analyze Data Use graphs, diagrams, charts, or automated tools to recognize patterns: –Routing of merchandise/smugglers –Concealment methods –Conveyance used –Frequently utilized flights –Day/date/time of seizures –Age/sex of violators –Origin of contraband Analyze

Identify Targets Identify high-risk targets including: –Known trafficking routes –Intelligence information –Similarities to previous seizures –Unusual cargo or traveler for the port Identify

Examine Begin by reviewing documents Conduct an examination Examine

Document Results Document results. Develop a standard method of documenting examinations. Document

Exercise Instructions: 1.Review the data in the next slide. 2.Identify the smuggling patterns or trends. 3.Describe your high-risk targets.

Seizure Flight AgeSex Date #of ViolatorM/FDrug TypeGrams Method of Concealment 03/ MHeroin25.1In clothing being worn (Jacket) 03/ MCocaine 1In clothing being worn (Jacket) 04/ MHeroin13.6In clothing being worn (Jacket) 04/ MHeroin 80In clothing being worn (Underwear) 04/ MHeroin 32.1In clothing being worn (Pocket) 04/ MCocaine2In clothing being worn (Socks) 05/ MCocaine7.4In clothing being worn (Shoes) 05/ MCocaine2In clothing being worn (Under belt) 06/ MCocaine1In clothing being worn (Jacket) 06/ MHeroin5In clothing being worn (Jacket) 06/ MHeroin 2.2In clothing being worn at his chest 07/ FHeroin 6.8In clothing being worn 08/ FHeroin 26Inside her underwear 08/ MCocaine4.7Sewn in the edges of bed sheet in a suitcase Airport Seizures

Seizure Vehicle AgeSex Others Date/Time Typeof ViolatorM/F in Vehicle Drug Type/AmountMethod of Concealment 03/17 Truck26M none Marijuana 100 kgIn the lining of the roof 08:30 03/30 Car22F 1 infant Cocaine 1.3 kgIn baby’s diapers 13:30 03/31Car35M adult F Cocaine 2.5 kg In spare battery 07:30 04/07Truck25M none Marijuana 122 kgFalse cargo bed 08:00 04/09Car24F 1 infant Cocaine 2 kg In baby’s clothing 14:00 04/12Car27M adult F Cocaine 2.4 kg Body carrier 11:00 04/17Car29F adult M Ecstasy 6.5 kgLining of suitcase 18:00 03/17 Truck28M none Marijuana 150 kgFalse cargo bed 15:30 04/09Car26F 1 child Cocaine 1.6 kg Child’s shoes 16:00 Land Border Seizures

Lesson Summary Do you now know how to: Identify types of information used to create and enhance targeting systems? List the steps required to create and use targeting systems? Collect Data Analyze Data Identify Targets Examine Document Results