SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
International Association of Airport and Seaport Police

                              www.interportpolice.org
                                               ...a Global Force
Tuesday, July 24, 2012
2
              201
                     Middle East Homeland Security Summit

                                                    A Global Emerging
                                                    Security Threat:
                                                      Terrorism
                                                      Organized Crime
                                                      Narcotics
                                                    A Strategic Alliance and its
                                                    Impact on the Middle East
                                                    Homeland Security.

                                                                                                      Presented by;
                                                                                                       Johan Obdola
                                                                                   Director. Latin America Bureau
        ... a Geopolitical Intelligence Analysis.          Association International of Airport and Seaport Police
                                                                                                   InterPort Police
                                                                                          www.interportpolice.org
                                          Abu Dhabi, UAE

Tuesday, July 24, 2012
How We Are..
   The InterPort Police - International Association of Airport and
   Seaport Police - coordinates information sharing, intelligence,
   training, best practices and operational issues with member
   jurisdictions having responsibility for law enforcement and public
   safety at airports, seaports and the transport system within their
   nation and community. Since 1968 departments and agencies have
   worked together as a Global Force to prevent transnational crime
   and terrorism; ensuring public safety of passengers, the supply chain
   and critical infrastructure worldwide.




Tuesday, July 24, 2012
u rity
                                                                                                                  Sec
                                                                                                          eland
                                                                                                     H om
                                                                                             prove
                                                                                      o Im
                                                                            nci   es t
                                                                        Age
                                                                  m ent
                                                              orce
                                                           Enf
                                                     Law
                                                 ort
                                              upp
                                            dS
                                        t an
                                  A ssis
                           lice
                     r t Po
               te rPo
            In
                                                                                                     www.interportpolice.org

Tuesday, July 24, 2012
An Emerging Global Terrorist-Criminal Geopolitical
                 Map...Latin America Region


        Al Qaeda a Global Movement with operative cells in Latin America and the Caribbean.
        Hezbollah and Hamas Bases in Latin America
        In July 18th, 1994, A terrorist attack conducted by Hezbollah in Argentina, killing 85 people
  and wounding a couple of hundreds.
        Iran Strong Alliances with Venezuela, Bolivia, Cuba, Nicaragua, Ecuador and Argentina
        Quds - Iran Elite Revolutionary Guards (IRGG-DF) operate in Venezuela providing regional
  trainings.
        Iran developing Uranium projects in Venezuela and Bolivia, with the support of Cuba.
        Ciudad del Este (Tri-Border Area: Paraguay, Brazil and Argentina. A heaven spot for
  international terrorist groups. Hezbollah receives around US$10 million dollars annually from
  narcotics operations.
        Hezbollah has established alliances with drug cartels from: Mexico, Colombia and other
  Regional Criminal Organizations in Central America and the Caribbean.

     “In 2001, American troops entered Kandahar, and the international press followed close on their heels. Reporting from
     a house in Kandahar used by Al-Qaeda, CNN correspondent Christiane Amanpour displayed a picture poster of the
     Iguazu Falls: „While we were scouring this now-abandoned house, we came across this picture on the wall. These are
     the falls of Iguazu in Brazil, and this is where US intelligence officials say they‟ve identified terrorist cells that they say
     are linked to Osama bin Laden and the Al Qaeda network.‟ Not only had Al-Qaeda become a known global actor, but so
     too had the Tri-border area.”
                                                                                                       - Thomaz Guedes da Costa

                                                                                                                       www.interportpolice.org

Tuesday, July 24, 2012
Violence Relate to Crime,                                            e   nce
                                                                    Vio l                          ia
    claims hundreds of lives in                                te d                    Co lo m
                                                                                               b
                                                        ug Rela
    Latin America an the                        aica Dr
                                             Jam
    Caribbean every month




                                        LA
                               VE NEZUE




                                                                                do r
                                                                       E l Salva

                                                                     BRA
                                                                           ZIL




                                                   ce
                                            Vio len
                                      orism
                               l-Ter r
                C        rimina
         Mexico
                                                                                       www.interportpolice.org
Tuesday, July 24, 2012
An Emerging Global Terrorist-Criminal
                  Geopolitical Map




i  Preventing TERRORISM: Detection - Protection - Prevention - Response   www.interportpolice.org

Tuesday, July 24, 2012
A Global Drugs Map -Geopolitical-




Tuesday, July 24, 2012
Emerging Threat to Homeland Security
                       in the Middle East

           Nearly 60% of cocaine sold in Europe transits through weak West African states such: Niger,
  Mauritania, and Guinea Bissau. Since 1990, this region has been used drug trafficking.
          West African region and expading to the east, are becoming a haven for a shadowy group called Al
  Qaeda in the Islamic Magherb (AQIM). There are indications that terrorist groups and Latin America
  drug cartels are working together.
           Executives Jets, Twin Engine Turboprops, and aging Boeing 727s (carry up to 10 tons)         are
  crossing the Atlantic with drugs.
          The Globalization of Terrorism is now linked links Colombian FARC, Hezbollah, Russian Organized
  Crime, Uranium with AK-103s, and cocaine with oil.
          Hezbollah has established alliances with Central America criminal gangs, Mexican drug cartels
  and organized crime, Colombian drug cartels and other regional criminal groups.
          Afghan heroin has been a strategic financial resource for the Taliban, al Qaeda and its affiliate in
  Pakistan, Central Asia, Africa and Latin America.
          In the last few years, governments El Salvador, Honduras, Mexico and Central America are on
  alert as evidence grows that al Qaeda members are travelling in that region and looking for recruits to
  carry out attacks in Latin America, the potential last frontier for international terrorism. The Brazilian
  government has reported that al Qaeda members have established an active presence in South
  America’s largest country, as have militants associated with Hezbollah.



                                                                                           www.interportpolice.org

Tuesday, July 24, 2012
Emerging Threat to Homeland Security
         in the the UAE, Kuwait, Qatar, Saudi Arabia
   Extremism in Yemen, regional tension and new geopolitical developments in the region, and the new
   emerging-integrated-alliance-globalized of criminal and terrorism organization (West-East) will
   establish new security challenges to the UAE, Kuwait, Qatar, Saudi Arabia and other countries in the
   region.
   Quoting: The rise of AQAP poses the risk of radicalization among immigrants entering the UAE from Africa through Yemen,
   said Marie Bos, the group's chief Gulf analyst and a former researcher on the UN Development Programme in the UAE.
   "Yemen is an open door to the region so you have a lot of people coming from the horn of Africa through Yemen, hoping to
   make it in the Gulf states", she said. That was part of the impetus for Saudi Arabia signing a deal last year to build a security
   barrier on the Yemen border, she said.
   Umar Farouk Abdulmutallab, a Nigerian who tried to blow up an airliner bound for Detroit last month, had studied in Yemen
   before moving to Dubai early last year, returning to Sana'a in August where he allegedly planned the attack. Paul Burke, a
   terrorism and security expert based in Abu Dhabi, agreed that the radicalization of immigrants arriving through Yemen was
   a potential concern. Authorities had to watch out for two types of people, he said - those with a predisposition towards
                                                                                                                                   st
   extremism, and those likely to be influenced by other extremists.                                                           st-Ea  e
                                                                                                                             t ics: W
                                                                                                                        Narco
   Key Issues:                                                                                                      and
                                                                                                                 es
     Immigration                                                                                         ll ianc
                                                                                                 ri sm A
     Trade                                                                                 t erro
                                                                                     , New
     Investment                                                               C rime
   Impact:                                                            an ized
                                                                 e Org
     Transportation                                      from th
                                                   p act
     Borders
                                            and Im
     Structures                      t ions
                             Im plica
                        rity
                    Secu                                                                                              www.interportpolice.org

Tuesday, July 24, 2012
Emerging Threat to Homeland Security
         in the the UAE, Kuwait, Qatar, Saudi Arabia

         As the central leadership of Al-Qa’ida is weakened and challenged, the terrorist movement is
  looking to partnerships in Saharan and Sub-Saharan Africa to re-group and re-energise itself.


         Despite greater co-operation, there seems to be an unresolved tension between transnational aims
  of Al-Qa’ida-core and the local grievances of African partners.


         Following the alliance with Al-Qa’ida-core, regional affiliates such as Al-Qa’ida in the Maghreb and
  Al-Shabaab have undergone similar patterns of strategic, tactical and propagandistic evolution.


         Nigeria’s Boko Haram is still focused on a local campaign, but recent operational refinement and
  ability to stage deadly ‘spectaculars’ suggests disturbing connections with other regional terror groups.


        Links between Al-Qa’ida-core and some jihadist groups in Africa have been established over the
  last decade which vary in strategic and operational significance.


      The focus of anti-jihadist counter-terrorism is shifting to Africa. Western intelligence and security
  services understand what is happening in Pakistan, in the Maghreb and in Yemen, even if they cannot
  do very much about it. But counter-terrorism officials privately acknowledge that they are unsighted
  and are working hard to try to understand how far the jihadist challenge may be migrating to Somalia,
  Kenya, north Nigeria and the borderlands of some of the vast territories of West Africa.

                                                                                            www.interportpolice.org

Tuesday, July 24, 2012
Emerging Threat to Homeland Security
         in the the UAE, Kuwait, Qatar, Saudi Arabia


  Af rica
         The jihadist challenge constantly evolves. As yet, it is unclear whether the Al-Qa’ida-core is making a
  conscious effort to re-group and reconstitute itself in the Horn and across sub-Saharan Africa; or whether
  events represent displacement as Islamist groups fighting for a variety of different causes espouse a loose
  version of the global caliphate ideology and co-operate on an ad hoc basis. Either way, Africa represents a
  potential new front for counter-terrorism in Britain and the linkages already evident across the continent
  suggest the development of some disturbing new trends.the merger2 between Al-Qa’ida-core and Al-
  Shabaab – officially endorsed by Al-Qa’ida leader Ayman Al-Zawahiri in February 2012 – has been viewed
  as the final stage of a progressive alignment between the two groups that has been taking place over the
  last four years.Al-Qa’ida may now see the opportunity to do so in some of the most unstable African
  countries, by ‘playing local’ through its proxies. It is a strategy that the group is already testing in Yemen,
  where ‘Al-Qai’da in the Arabian Peninsula’ has recently undergone a ‘re-brand’ operation allegedly aimed to
  win over local tribes in the south of the country.4 Instead of violently coercing support from the local
  population, the group is trying to do so by providing vital public services and by appealing to the religious
  sense of those who would embrace a more hard-line application of Sharia law in the country. Far from
  merely being a goal in itself, Al-Qa’ida in the Arabian Peninsula views the establishment of a solid
  stronghold in Yemen as necessary to resume its broader terror campaign against the West.



                                                                                            www.interportpolice.org

Tuesday, July 24, 2012
An Emerging Global Terrorist-Criminal
                  Geopolitical Map




                                                M ESIIC



            Establishing an Integrated-Coordinated Middle East Inter-Governmental
            Strategic Integrated Intelligence Centre MESIIC to deal with Airports,
                     Seaports and Borders will Impact on Homeland Security



      MESIIC, Airports, Seaports and Border Regional Intelligence     www.interportpolice.org

Tuesday, July 24, 2012
ted ...
                                                       reven
                                                    beP
                                    It c an
           Counterterrorism| Aviation | Maritime | Crisis Management | Explosive & X-Ray | Media.

         Our training programs are designed for professional law enforcement, public safety and security personnel. Classes
          are held at the Port of Los Angeles Maritime Training Center or the Conference Center in Roslyn, VA adjacent to
                                                         Washington, D.C.
             Training program may also be held at your jurisdiction and customized based on specific requirements of a



i
                                                    department or organization
                                                                                                    www.interportpolice.org

            Preventing TERRORISM: Detection - Protection - Prevention - Response

Tuesday, July 24, 2012
InterPort Police Maritime Training Programs




        Los Angeles Port Police
        Maritime Law Enforcement
             Training Center
              Available POST Certified Courses
               Basic Maritime Officer’s Course
           Intermediate Maritime Officer’s Course
                     Public Safety Dive Course
                            Courses Pro
          Advanced Maritime Officer’s Course
       Advanced Tactical Maritime Officer’s Course
                     Port Security

                         www.interportpolice.org

Tuesday, July 24, 2012
InterPort Police Assistance Programs

  InterPort Police offers a wide portfolio of specialized training, assistance programs and services in the following areas:

  Bridge and Tunnels. Brides and Tunnels are a critical asset to the supply system within a country. Some port authorities have jurisdiction over these
  infrastructures or work closely with an adjacent jurisdiction as they are vital in moving people and cargo, thus they become a high target and require security
  protection

  Buses. Buses are part of the mass transit system, both public and private operations. Security has played a significant part of the everyday system since 9/11. Buses
  have been a source terrorism around the world. There has also is significant domestic and transnational drug trafficking within bus systems.

  Border Management. Borders are the front lines when it comes to protecting any country against terrorism, narcotics smuggling and economic instability.
  Proactive requirements strengthen the front lines ensuring a safe future tomorrow. The strengthening, expansion or reorganization of law enforcement specialties
  such as Border Police, Customs, and Immigration to support strong borders and ports of entries are increasingly in demand throughout the international community.
  Airports, seaports and many of our transport systems at the front line of the international boarders. Who has primary responsibility differs depending on the country.
  Today technology is playing an increasing role is assisting law enforcement manage border requirements.

  Cruise and Ferries. Passenger ferryboats and cruise ships have their own set of challenges when it comes to security. Security while in port or when underway at
  sea bring different situations. Ferries are often an essential part of mass transit while curse ships are an vacation option that can place two or three thousand
  passengers at risk at onetime.The InterPort Police - International Association of Airport and Seaport Police - holds consultative status with the IMO and sits on the
  security committee. Currently we are working on a facilities management report on Piracy relating to crime investigation and armed security guards.

  Airports. Large numbers of people pass through airports every day. This presents potential targets for terrorism and other forms of local and transnational crime.
  Similarly, the high concentration of people on large airliners, the potential high death rate with attacks on aircraft, and the ability to use a hijacked airplane as a lethal
  weapon may provide an alluring target for terrorism.

  Public Safety. The protection of the traveling public, the safety of the supply chain and the securing of critical infrastructure is the main stay of our jurisdiction's
  responsibilities. Together as a Global Force our department member have the responsibility of protecting their nation's and communities airports, seaports and
  transport systems. Working together the international link of cooperation and mutual programs makes a stronger security network.

  Transit. Any nation’s railroads, both passenger and freight, are important pieces of the transportation network. The London subway and Madrid rail bombings
  demonstrated the critical need for protecting trains from terrorist attack. Focuses greater information sharing, increased training and public awareness is essential.

  Seaports. The importance of the container shipping industry is equally matched by its vulnerabilities to terrorist attack. Port security and law enforcement is an
  essential mainstay in the protection of the the global supply chain.

  Rail.Freight rail are the backbone of transport for many countries. Freight trains are very efficient, with economy of scale and high energy efficiency. They too bring
  their own type of security problems as an essential part of the supply chain. Go to a seaport and many airports around the world you will find tracks leading up near
  the terminals.



                                                                                                                                             www.interportpolice.org

Tuesday, July 24, 2012
InterPort Police 1PASS Program
  1PASS Provide a highly secure, ground breaking passive biometric authentication & access system

  1PASS is a biometric fusion technology based software system using high-resolution IP cameras to automatically
  authenticate identification of an individual in a natural flow.  The system offers user based permission, privilege and
  attribute protocols and interoperable access control that may be used with any credential or without any credential
  whatsoever. This highly secure, non-intrusive system provides immediate event alerts and comprehensive reporting.

  1PASS is a state of the art personnel assurance program available to authorities, governments and departments who have
  jurisdiction over airport, seaport, transport, border and other critical infrastructure. Offered by the InterPort Police, the
  program incorporates biometric fusion technology to authenticate an individual from a combination of facial, speech, and
  behavioural recognition using computer software and cameras. No key, card or codes are required. These multiple biometric
  elements are integrated within the access control management system of the facility. 1PASS does not require any ID card,
  but can incorporate a credential into the protocol. In fact, one conforming credential is sufficient for any environment. The
  1PASS symbol can be incorporated on to a credential to alert authorities that an individual is enrolled in the intelligent
  solution.
  This intelligent level of authentication allows for global interoperability but always requires local permissions for access. We
  call this - Global Access - Local Control. The 1PASS program offers a leveraged global interoperable identity and access
  assurance system.
                                                                                                                             1PA
  1
  2
       Identification while in motion, regardless of height, walking or in a wheelchair
       Identity of one or more faces in the frame did not degrade performance                                                            SS
  3    Recognize a face in spite of age and changes in age over an 8-year span of time
  4    Recognition regardless of sex or race
  5    Recognize a face in spite of changes in a person’s weight, change of hair colour, length or facial growth. The use of eye glasses during
       enrolment or upon
  6    entry is not a factor in the recognition process
  7    Accurately recognizes a real face as opposed to a photograph


                                                                                                              www.interportpolice.org

Tuesday, July 24, 2012
InterPort Police SRMX Information Sharing Program

     SMRX 5.0 is an enterprises        RMX offers teams,
     system designed to allow          departments or even
                                                                    In our line of work, having a Facebook or similar account may be fine, but you
     authorized users work inside a    regional jurisdictions
                                                                    cannot share information about your work.  On SRMX you can because
     secure collaborative platform.    the opportunity to have
                                                                    everything within SRMX is safe and secure.  By keeping your own network to
     This powerful tool provides for   the same features use in     business colleagues it too is private and secure. SRMX keeps your information
     connecting other users, and       our main platform for
                                                                    secure and always available in the cloud. PC, PDA, Mac or iPhone, you need
     share information.  This can      your own use and you         never get stuck on the outside of a corporate firewall and unable to retrieve
     also mean managing projects,      can manage the               that vital piece of information again.
     be part of approval chains,       information and users.
     collaborate on documents and      The SRMX Work Groups
     more. SRMX is an information      are private and cannot be
                                                                                              edge                Base
                                                                                   hain Knowl
     portal of the InterPortPolice     shared outside of those
                                                                              ly C
     and 5.0 is the fifth platform      who are vetted and           SRMX Supp
     using the Sosius software.        approved.  However you
     SRMX provides for great           can have your own            The SRMX | KB draws its inspiration from Wikipedia, an online open
     flexibility in sharing and         product Files, folders,      source content provider, and is a repository of information on the
     notifications and you do not                                    supply chain. SRMX | KB examines transnational crime, terrorism and
                                       projects, blogs, workflows,
     need a phD in Advanced                                         sabotage, illicit trade and smuggling, and theft.
                                       databases, projects, tasks
     Networking to be up and           and more can all be
     running, in just a few minutes.                                SRMX | KB examines the vulnerability of supply chains and its constituent
                                       created or uploaded and
     You also can set your daily                                    elements (infrastructure, property, people, operations) to harm. This harm
                                       then shared amogst other
     report to ensure you do not                                    causes unwanted effects that disturbs the effective (successful) and
                                       SRMX if you want further
     miss any of the information       distribution to the entire   efficient (productive) operation of a supply chain. The activity that causes
     appropriate to your work.         grid. There's no limit to    this harm can either be unintentional or deliberate, and legal or illegal.
     SRMX also now offer Real-         the number of users per      Vulnerabilities represent opportunities for criminal and terrorist
     time Alert Management.            group or the number of       activities. It also reviews solutions from stakeholders to law enforcement
     Certain Alert Information         connections you can          and the technology used. Some technology solution are outline throughout
     Emails can be answered back       make with your free          the knowledge base and some of the companies who assisting funding the
     to the entire group. This allow   account.                     program are afforded a page to offer more detailed information from their
     for real-time situation alert
     coordination at anytime.                                       perspective.



                                                                                                                 www.interportpolice.org

Tuesday, July 24, 2012
Thank you..
Tuesday, July 24, 2012
A GLOBAL FORCE
Tuesday, July 24, 2012

Weitere ähnliche Inhalte

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Abu Dhabi Conference 2

  • 1. International Association of Airport and Seaport Police www.interportpolice.org ...a Global Force Tuesday, July 24, 2012
  • 2. 2 201 Middle East Homeland Security Summit A Global Emerging Security Threat: Terrorism Organized Crime Narcotics A Strategic Alliance and its Impact on the Middle East Homeland Security. Presented by; Johan Obdola Director. Latin America Bureau ... a Geopolitical Intelligence Analysis. Association International of Airport and Seaport Police InterPort Police www.interportpolice.org Abu Dhabi, UAE Tuesday, July 24, 2012
  • 3. How We Are.. The InterPort Police - International Association of Airport and Seaport Police - coordinates information sharing, intelligence, training, best practices and operational issues with member jurisdictions having responsibility for law enforcement and public safety at airports, seaports and the transport system within their nation and community. Since 1968 departments and agencies have worked together as a Global Force to prevent transnational crime and terrorism; ensuring public safety of passengers, the supply chain and critical infrastructure worldwide. Tuesday, July 24, 2012
  • 4. u rity Sec eland H om prove o Im nci es t Age m ent orce Enf Law ort upp dS t an A ssis lice r t Po te rPo In www.interportpolice.org Tuesday, July 24, 2012
  • 5. An Emerging Global Terrorist-Criminal Geopolitical Map...Latin America Region Al Qaeda a Global Movement with operative cells in Latin America and the Caribbean. Hezbollah and Hamas Bases in Latin America In July 18th, 1994, A terrorist attack conducted by Hezbollah in Argentina, killing 85 people and wounding a couple of hundreds. Iran Strong Alliances with Venezuela, Bolivia, Cuba, Nicaragua, Ecuador and Argentina Quds - Iran Elite Revolutionary Guards (IRGG-DF) operate in Venezuela providing regional trainings. Iran developing Uranium projects in Venezuela and Bolivia, with the support of Cuba. Ciudad del Este (Tri-Border Area: Paraguay, Brazil and Argentina. A heaven spot for international terrorist groups. Hezbollah receives around US$10 million dollars annually from narcotics operations. Hezbollah has established alliances with drug cartels from: Mexico, Colombia and other Regional Criminal Organizations in Central America and the Caribbean. “In 2001, American troops entered Kandahar, and the international press followed close on their heels. Reporting from a house in Kandahar used by Al-Qaeda, CNN correspondent Christiane Amanpour displayed a picture poster of the Iguazu Falls: „While we were scouring this now-abandoned house, we came across this picture on the wall. These are the falls of Iguazu in Brazil, and this is where US intelligence officials say they‟ve identified terrorist cells that they say are linked to Osama bin Laden and the Al Qaeda network.‟ Not only had Al-Qaeda become a known global actor, but so too had the Tri-border area.” - Thomaz Guedes da Costa www.interportpolice.org Tuesday, July 24, 2012
  • 6. Violence Relate to Crime, e nce Vio l ia claims hundreds of lives in te d Co lo m b ug Rela Latin America an the aica Dr Jam Caribbean every month LA VE NEZUE do r E l Salva BRA ZIL ce Vio len orism l-Ter r C rimina Mexico www.interportpolice.org Tuesday, July 24, 2012
  • 7. An Emerging Global Terrorist-Criminal Geopolitical Map i Preventing TERRORISM: Detection - Protection - Prevention - Response www.interportpolice.org Tuesday, July 24, 2012
  • 8. A Global Drugs Map -Geopolitical- Tuesday, July 24, 2012
  • 9. Emerging Threat to Homeland Security in the Middle East Nearly 60% of cocaine sold in Europe transits through weak West African states such: Niger, Mauritania, and Guinea Bissau. Since 1990, this region has been used drug trafficking. West African region and expading to the east, are becoming a haven for a shadowy group called Al Qaeda in the Islamic Magherb (AQIM). There are indications that terrorist groups and Latin America drug cartels are working together. Executives Jets, Twin Engine Turboprops, and aging Boeing 727s (carry up to 10 tons) are crossing the Atlantic with drugs. The Globalization of Terrorism is now linked links Colombian FARC, Hezbollah, Russian Organized Crime, Uranium with AK-103s, and cocaine with oil. Hezbollah has established alliances with Central America criminal gangs, Mexican drug cartels and organized crime, Colombian drug cartels and other regional criminal groups. Afghan heroin has been a strategic financial resource for the Taliban, al Qaeda and its affiliate in Pakistan, Central Asia, Africa and Latin America. In the last few years, governments El Salvador, Honduras, Mexico and Central America are on alert as evidence grows that al Qaeda members are travelling in that region and looking for recruits to carry out attacks in Latin America, the potential last frontier for international terrorism. The Brazilian government has reported that al Qaeda members have established an active presence in South America’s largest country, as have militants associated with Hezbollah. www.interportpolice.org Tuesday, July 24, 2012
  • 10. Emerging Threat to Homeland Security in the the UAE, Kuwait, Qatar, Saudi Arabia Extremism in Yemen, regional tension and new geopolitical developments in the region, and the new emerging-integrated-alliance-globalized of criminal and terrorism organization (West-East) will establish new security challenges to the UAE, Kuwait, Qatar, Saudi Arabia and other countries in the region. Quoting: The rise of AQAP poses the risk of radicalization among immigrants entering the UAE from Africa through Yemen, said Marie Bos, the group's chief Gulf analyst and a former researcher on the UN Development Programme in the UAE. "Yemen is an open door to the region so you have a lot of people coming from the horn of Africa through Yemen, hoping to make it in the Gulf states", she said. That was part of the impetus for Saudi Arabia signing a deal last year to build a security barrier on the Yemen border, she said. Umar Farouk Abdulmutallab, a Nigerian who tried to blow up an airliner bound for Detroit last month, had studied in Yemen before moving to Dubai early last year, returning to Sana'a in August where he allegedly planned the attack. Paul Burke, a terrorism and security expert based in Abu Dhabi, agreed that the radicalization of immigrants arriving through Yemen was a potential concern. Authorities had to watch out for two types of people, he said - those with a predisposition towards st extremism, and those likely to be influenced by other extremists. st-Ea e t ics: W Narco Key Issues: and es Immigration ll ianc ri sm A Trade t erro , New Investment C rime Impact: an ized e Org Transportation from th p act Borders and Im Structures t ions Im plica rity Secu www.interportpolice.org Tuesday, July 24, 2012
  • 11. Emerging Threat to Homeland Security in the the UAE, Kuwait, Qatar, Saudi Arabia As the central leadership of Al-Qa’ida is weakened and challenged, the terrorist movement is looking to partnerships in Saharan and Sub-Saharan Africa to re-group and re-energise itself. Despite greater co-operation, there seems to be an unresolved tension between transnational aims of Al-Qa’ida-core and the local grievances of African partners. Following the alliance with Al-Qa’ida-core, regional affiliates such as Al-Qa’ida in the Maghreb and Al-Shabaab have undergone similar patterns of strategic, tactical and propagandistic evolution. Nigeria’s Boko Haram is still focused on a local campaign, but recent operational refinement and ability to stage deadly ‘spectaculars’ suggests disturbing connections with other regional terror groups. Links between Al-Qa’ida-core and some jihadist groups in Africa have been established over the last decade which vary in strategic and operational significance. The focus of anti-jihadist counter-terrorism is shifting to Africa. Western intelligence and security services understand what is happening in Pakistan, in the Maghreb and in Yemen, even if they cannot do very much about it. But counter-terrorism officials privately acknowledge that they are unsighted and are working hard to try to understand how far the jihadist challenge may be migrating to Somalia, Kenya, north Nigeria and the borderlands of some of the vast territories of West Africa. www.interportpolice.org Tuesday, July 24, 2012
  • 12. Emerging Threat to Homeland Security in the the UAE, Kuwait, Qatar, Saudi Arabia Af rica The jihadist challenge constantly evolves. As yet, it is unclear whether the Al-Qa’ida-core is making a conscious effort to re-group and reconstitute itself in the Horn and across sub-Saharan Africa; or whether events represent displacement as Islamist groups fighting for a variety of different causes espouse a loose version of the global caliphate ideology and co-operate on an ad hoc basis. Either way, Africa represents a potential new front for counter-terrorism in Britain and the linkages already evident across the continent suggest the development of some disturbing new trends.the merger2 between Al-Qa’ida-core and Al- Shabaab – officially endorsed by Al-Qa’ida leader Ayman Al-Zawahiri in February 2012 – has been viewed as the final stage of a progressive alignment between the two groups that has been taking place over the last four years.Al-Qa’ida may now see the opportunity to do so in some of the most unstable African countries, by ‘playing local’ through its proxies. It is a strategy that the group is already testing in Yemen, where ‘Al-Qai’da in the Arabian Peninsula’ has recently undergone a ‘re-brand’ operation allegedly aimed to win over local tribes in the south of the country.4 Instead of violently coercing support from the local population, the group is trying to do so by providing vital public services and by appealing to the religious sense of those who would embrace a more hard-line application of Sharia law in the country. Far from merely being a goal in itself, Al-Qa’ida in the Arabian Peninsula views the establishment of a solid stronghold in Yemen as necessary to resume its broader terror campaign against the West. www.interportpolice.org Tuesday, July 24, 2012
  • 13. An Emerging Global Terrorist-Criminal Geopolitical Map M ESIIC Establishing an Integrated-Coordinated Middle East Inter-Governmental Strategic Integrated Intelligence Centre MESIIC to deal with Airports, Seaports and Borders will Impact on Homeland Security MESIIC, Airports, Seaports and Border Regional Intelligence www.interportpolice.org Tuesday, July 24, 2012
  • 14. ted ... reven beP It c an Counterterrorism| Aviation | Maritime | Crisis Management | Explosive & X-Ray | Media. Our training programs are designed for professional law enforcement, public safety and security personnel. Classes are held at the Port of Los Angeles Maritime Training Center or the Conference Center in Roslyn, VA adjacent to Washington, D.C. Training program may also be held at your jurisdiction and customized based on specific requirements of a i department or organization www.interportpolice.org Preventing TERRORISM: Detection - Protection - Prevention - Response Tuesday, July 24, 2012
  • 15. InterPort Police Maritime Training Programs Los Angeles Port Police Maritime Law Enforcement Training Center Available POST Certified Courses Basic Maritime Officer’s Course Intermediate Maritime Officer’s Course Public Safety Dive Course Courses Pro Advanced Maritime Officer’s Course Advanced Tactical Maritime Officer’s Course Port Security www.interportpolice.org Tuesday, July 24, 2012
  • 16. InterPort Police Assistance Programs InterPort Police offers a wide portfolio of specialized training, assistance programs and services in the following areas: Bridge and Tunnels. Brides and Tunnels are a critical asset to the supply system within a country. Some port authorities have jurisdiction over these infrastructures or work closely with an adjacent jurisdiction as they are vital in moving people and cargo, thus they become a high target and require security protection Buses. Buses are part of the mass transit system, both public and private operations. Security has played a significant part of the everyday system since 9/11. Buses have been a source terrorism around the world. There has also is significant domestic and transnational drug trafficking within bus systems. Border Management. Borders are the front lines when it comes to protecting any country against terrorism, narcotics smuggling and economic instability. Proactive requirements strengthen the front lines ensuring a safe future tomorrow. The strengthening, expansion or reorganization of law enforcement specialties such as Border Police, Customs, and Immigration to support strong borders and ports of entries are increasingly in demand throughout the international community. Airports, seaports and many of our transport systems at the front line of the international boarders. Who has primary responsibility differs depending on the country. Today technology is playing an increasing role is assisting law enforcement manage border requirements. Cruise and Ferries. Passenger ferryboats and cruise ships have their own set of challenges when it comes to security. Security while in port or when underway at sea bring different situations. Ferries are often an essential part of mass transit while curse ships are an vacation option that can place two or three thousand passengers at risk at onetime.The InterPort Police - International Association of Airport and Seaport Police - holds consultative status with the IMO and sits on the security committee. Currently we are working on a facilities management report on Piracy relating to crime investigation and armed security guards. Airports. Large numbers of people pass through airports every day. This presents potential targets for terrorism and other forms of local and transnational crime. Similarly, the high concentration of people on large airliners, the potential high death rate with attacks on aircraft, and the ability to use a hijacked airplane as a lethal weapon may provide an alluring target for terrorism. Public Safety. The protection of the traveling public, the safety of the supply chain and the securing of critical infrastructure is the main stay of our jurisdiction's responsibilities. Together as a Global Force our department member have the responsibility of protecting their nation's and communities airports, seaports and transport systems. Working together the international link of cooperation and mutual programs makes a stronger security network. Transit. Any nation’s railroads, both passenger and freight, are important pieces of the transportation network. The London subway and Madrid rail bombings demonstrated the critical need for protecting trains from terrorist attack. Focuses greater information sharing, increased training and public awareness is essential. Seaports. The importance of the container shipping industry is equally matched by its vulnerabilities to terrorist attack. Port security and law enforcement is an essential mainstay in the protection of the the global supply chain. Rail.Freight rail are the backbone of transport for many countries. Freight trains are very efficient, with economy of scale and high energy efficiency. They too bring their own type of security problems as an essential part of the supply chain. Go to a seaport and many airports around the world you will find tracks leading up near the terminals. www.interportpolice.org Tuesday, July 24, 2012
  • 17. InterPort Police 1PASS Program 1PASS Provide a highly secure, ground breaking passive biometric authentication & access system 1PASS is a biometric fusion technology based software system using high-resolution IP cameras to automatically authenticate identification of an individual in a natural flow.  The system offers user based permission, privilege and attribute protocols and interoperable access control that may be used with any credential or without any credential whatsoever. This highly secure, non-intrusive system provides immediate event alerts and comprehensive reporting. 1PASS is a state of the art personnel assurance program available to authorities, governments and departments who have jurisdiction over airport, seaport, transport, border and other critical infrastructure. Offered by the InterPort Police, the program incorporates biometric fusion technology to authenticate an individual from a combination of facial, speech, and behavioural recognition using computer software and cameras. No key, card or codes are required. These multiple biometric elements are integrated within the access control management system of the facility. 1PASS does not require any ID card, but can incorporate a credential into the protocol. In fact, one conforming credential is sufficient for any environment. The 1PASS symbol can be incorporated on to a credential to alert authorities that an individual is enrolled in the intelligent solution. This intelligent level of authentication allows for global interoperability but always requires local permissions for access. We call this - Global Access - Local Control. The 1PASS program offers a leveraged global interoperable identity and access assurance system. 1PA 1 2 Identification while in motion, regardless of height, walking or in a wheelchair Identity of one or more faces in the frame did not degrade performance SS 3 Recognize a face in spite of age and changes in age over an 8-year span of time 4 Recognition regardless of sex or race 5 Recognize a face in spite of changes in a person’s weight, change of hair colour, length or facial growth. The use of eye glasses during enrolment or upon 6 entry is not a factor in the recognition process 7 Accurately recognizes a real face as opposed to a photograph www.interportpolice.org Tuesday, July 24, 2012
  • 18. InterPort Police SRMX Information Sharing Program SMRX 5.0 is an enterprises RMX offers teams, system designed to allow departments or even In our line of work, having a Facebook or similar account may be fine, but you authorized users work inside a regional jurisdictions cannot share information about your work.  On SRMX you can because secure collaborative platform.  the opportunity to have everything within SRMX is safe and secure.  By keeping your own network to This powerful tool provides for the same features use in business colleagues it too is private and secure. SRMX keeps your information connecting other users, and our main platform for secure and always available in the cloud. PC, PDA, Mac or iPhone, you need share information.  This can your own use and you never get stuck on the outside of a corporate firewall and unable to retrieve also mean managing projects, can manage the that vital piece of information again. be part of approval chains, information and users. collaborate on documents and The SRMX Work Groups more. SRMX is an information are private and cannot be edge Base hain Knowl portal of the InterPortPolice shared outside of those ly C and 5.0 is the fifth platform who are vetted and SRMX Supp using the Sosius software. approved.  However you SRMX provides for great can have your own The SRMX | KB draws its inspiration from Wikipedia, an online open flexibility in sharing and product Files, folders, source content provider, and is a repository of information on the notifications and you do not supply chain. SRMX | KB examines transnational crime, terrorism and projects, blogs, workflows, need a phD in Advanced sabotage, illicit trade and smuggling, and theft. databases, projects, tasks Networking to be up and and more can all be running, in just a few minutes. SRMX | KB examines the vulnerability of supply chains and its constituent created or uploaded and You also can set your daily elements (infrastructure, property, people, operations) to harm. This harm then shared amogst other report to ensure you do not causes unwanted effects that disturbs the effective (successful) and SRMX if you want further miss any of the information distribution to the entire efficient (productive) operation of a supply chain. The activity that causes appropriate to your work.  grid. There's no limit to this harm can either be unintentional or deliberate, and legal or illegal. SRMX also now offer Real- the number of users per Vulnerabilities represent opportunities for criminal and terrorist time Alert Management.  group or the number of activities. It also reviews solutions from stakeholders to law enforcement Certain Alert Information connections you can and the technology used. Some technology solution are outline throughout Emails can be answered back make with your free the knowledge base and some of the companies who assisting funding the to the entire group. This allow account. program are afforded a page to offer more detailed information from their for real-time situation alert coordination at anytime. perspective. www.interportpolice.org Tuesday, July 24, 2012
  • 20. A GLOBAL FORCE Tuesday, July 24, 2012