Welcome
Sustainable Development Goal 16 pledges to ‘significantly reduce all forms of violence and related deaths everywhere’, and to 'promote the international rule of law through establishing and strengthening transparent, accountable and responsive institutions'.
Course Overview
This course will provide those involved in international security with a comprehensive understanding of key threats and the international mechanisms and methods to tackle them.
Interactive learning will support participants’ understanding of the key themes around international security, such as international frameworks and institutions, the importance of intelligence, and border security management. By examining in-depth case studies and evaluating essential tools to improve security, participants will leave equipped to build a strategic action plan to tackle the most pressing security priorities.
A comprehensive analysis of international security will be provided, with subjects to be discussed including:
-
Border security aspects of international security
-
The international fight against terrorism and crime networks
-
Auditing and accounting to track financial fraud
-
The role of new technologies in international security
-
Intelligence in tackling international security issues
-
Understanding anti-corruption in the field of international security
Experts in the field will lead this training through interactive workshops, lectures and best practice case studies, fostering innovation, creative learning and networking amongst peers.
Learning Outcomes
By the end of the course the delegates will be able to:
-
Critically assess, develop and construct action plans to tackle security threats
-
Lead effective organisational change
-
Apply the key principles of good governance and the rule of law to their organisation
-
Improve capacity and support structures, whilst reducing administrative burdens
-
Monitor, evaluate and enhance performance
-
Deliver services that more precisely meet stakeholder needs
Agenda
Day 1
What is international security? Broad definitions and policy links
Delegates experiences and lesson sharing: what can delegates learn from each other?
Financial crime and money laundering
- Types, main international circuits, secrecy jurisdictions, links with international crime, historical development
Cybercrime
- Cybercrime and hacktivism, international frameworks, data protection issues
Intellectual property issues
- Types, sources of IP piracy, UN conventions and WIPO, extent of film and music piracy
Regulated drug trafficking
- Intellectual property issues, counterfeit drugs, role of pharmaceutical companies, ACTA and other agreements
Illicit drug trafficking
- Types, main international circuits, societal impact, international conventions
- Main responses: prohibition, decriminalisation
Human trafficking and sex crimes
- UN conventions, definitions, slave trade, tracking
Endangered species
- UN conventions, CITIES, key regulatory mechanisms
Day 2
Piracy
- Definitions, conventions, main areas concerned, key development, role of international organisations
- Capture of immovable natural resources (oil and gas)
Extent of problem, effects on security, key areas
- Exploitation of movable natural resources
- History and conventions, Kimberley Process, role in conflicts
- Avoiding common pitfalls and well-known procedural and operational shortfalls
- Planning to succeed
- Action Plans
- Drawing up recommendations and plans of action
- Smart objectives and time-frames
- Obtaining buy-in and real engagement and commitment from international organisations
- Securing staff buy-in and keeping operational parameters secret
Border Management Modernization and smarter border security
Targeting and rummaging techniques
Developing a coordinated regional maritime surveillance
Sharing intelligence and action at national and international levels
Co-ordinating international and local responses and initiatives
Operational and legal agreements
Day 3
The roles of Security Council, General Assembly, UNODC, INTERPOL, World Customs Organisation and others
Human rights and humanitarian law
International cooperation of law enforcement agencies
Stopping funding, human rights violations and weapon proliferation
Ensuring frameworks for investigating finances are in place
Mitigating the tension between privacy, secrecy and security
Agencies necessary to properly tackle financial crime and links to terrorist networks
Day 4
Threat assessment and plans to address the threats
Sources of information - what is open source material
Using the information to enhance the intelligence picture
Intelligence from partner agencies
Sensitive Intelligence from National and International partners
Use of informants
Understanding importance of coordination
Effective communication strategies and implementing coordination
International agreements
National models
Day 5
Different types of corruption
Economic impacts of corruption in developing countries
Corruption across sectors – with specific reference to policing
Jamaica and corruption – a case study and lessons learned
Structuring a written piece of work for assessment – generic overview and principles
Structuring these two specific pieces of work to demonstrate all the assessment criteria
Blending international security content into these structures