BACKGROUND CHECKS & INSIDER THREATS. Anton Olivier : Border Police

Similar documents
ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.

Director of Customer Care & Performance. 26 April The Board is asked to consider and approve the attached draft

CCG CO06: Anti-Fraud, Bribery and Corruption Policy

Having a working relationship between the Private and Public sector - a Law enforcement perspective

NORTHERN IRELAND PRACTICE AND EDUCATION COUNCIL FOR NURSING AND MIDWIFERY

ANTI-BRIBERY POLICY 1. INTRODUCTION

S/2003/633* Security Council. United Nations

FACILITATION IN AVIATION

OFFICIAL GAZETTE OF THE REPUBLIC OF KOSOVA / No. 02 / 20 JANUARY 2012, PRISTINA. LAW No.04/L-072 ON STATE BORDER CONTROL AND SURVEILLANCE

Anti-Fraud, Bribery and Corruption Response Policy. Telford and Wrekin Clinical Commissioning Group

Anti-Fraud, Bribery and Corruption Policy

ICAO Regional Seminar, Montego Bay, Jamaica, November 28, 2017

MINISTRY OF FISHERIES Anti Corruption Policy

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

IBAC Technical Report Summary. Subject: ICAO Aviation Security. Meeting: ICAO AVSECP/20 Meeting March 30 April 3, IBAC File: Security

Standard Operating Procedure

Terms & Conditions for Heathrow ID Pass Scheme (the Terms )

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE

NORTHERN IRELAND SOCIAL CARE COUNCIL

JOC AUTHORISATION & SAPS CATEGORISATION GUIDELINE

Canada and Israel Strategic Partnership (22 January 2014)

POLICY AGAINST BRIBERY AND CORRUPTION. Introductory Guidance. This policy has been introduced in response to the Bribery Act 2010 ( the Act )

Human Trafficking. Sponsored by

COMMISSION OF THE EUROPEAN COMMUNITIES

ID Badging Procedures

International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families

Civil Aviation Act 2011

2. Anti-Bribery and Corruption Policy

12027/16 FR,EB/dk 1 DGD 1C LIMITE EN

(Havana, Cuba, 21 July 2017)

The LTE Group. Anti-Bribery Policy Produced by. The LTE Group. LTEG anti-bribery policy v4 06/2016

INTRODUCTORY REMARKS TO THE JOINT PORTFOLIO COMMITTEES ON BORDERLINE AND BORDER POST SECURITY ON BEHALF OF THE VARIOUS GOVERNMENT DEPARTMENTS

Cowen Execution Services Limited

3.1 The specific sections in the Act, which regulate the production of SALW, are as follows:

Report. i) What national laws, regulations and administrative procedures exist to exercise effective control over SALW in the following areas? (II.

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE)

THE UNHCR NGO RESETTLEMENT DEPLOYMENT SCHEME. Overview and Follow-up

Anti-Fraud, Bribery and Corruption Policy and Response Plan

COUNCIL OF THE EUROPEAN UNION. Brussels, 7 July 2005 (28.07) (OR. nl) 10900/05 LIMITE CRIMORG 65 ENFOPOL 85 MIGR 30

ANTI - CORRUPTION POLICY

Code of Practice for the Investigations and Enforcement Team CAP 1422

Adopted by resolution of the Board on 27 September 2018 FLYBE GROUP PLC. Safety and Security Committee. Terms of reference

CRS Report for Congress

International LE/5 15/8/13 WORKING PAPER ASSEMBLY PROTOCOL. (Beijing, 2010). Strategic Objectives: References:

Civil Aviation Act 6 of 2016 (GG 6047) brought into force on 1 November 2016 by GN 260/2016 (GG 6164) ACT

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS

SECURITY, CRITICAL INCIDENT PLANNING

LATVIAN ADMINISTRATIVE VIOLATIONS CODE DIVISION I GENERAL PROVISIONS. Chapter One General Provisions

COOK ISLANDS AVIATION OFFENCES ACT 1973 ANALYSIS. Offences Relating to Aircraft. Taking firearms, explosives, etc., on to aircraft

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

The Bribery Act Southampton Solent University Key Guidance (May 2017)

2010 UK Bribery Act. A Briefing for NGOs

In 1996 the SAPS established its first internal anti-corruption unit to tackle what was identified as a growing

NETCARE LIMITED CORPORATE GOVERNANCE ANTI-CORRUPTION POLICY POLICY NUMBER COR12 CORPORATE GOVERNANCE PREPARED BY PREPARATION DATE JUNE 2014

CIVIL AVIATION ACT 2008

Counter-fraud and anti-bribery policy

Other Legal Name(s) Used (Enter Maiden Name if applicable) Country of Citizenship Alien Registration Number Non-Immigrant Visa Number

Anti-Bribery Policy. Policies, Guidance & Procedures. The Collett School, St Luke s School Forest House Education Centre

BRIEFING: MANDATE AND ACTIVTIES DIRECTORATE FOR PRIORITY CRIME INVESTIGATION(DPCI): 17 SEPTEMBER 2014

AN GARDA SÍOCHÁNA POLICING PLAN 2014

Anti-Bribery Policy WHC reserves the right to amend this policy at its discretion. The most up-to-date version can be downloaded from our website.

Agreement on counter-terrorism measures

Policy: Notifiable Data Breach

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

National Strategy to address the issue of police officers and staff who abuse their position for a sexual purpose

Alias - Last Name Alias - First Name Alias - Middle Name. Alias - Last Name Alias - First Name Alias - Middle Name

Recommendation of the Council for Development Co-operation Actors on Managing the Risk of Corruption

Threats to Life - Policy

An Inspection of Border Force s Identification and Treatment of Potential Victims of Modern Slavery

Global Anti Bribery and Corruption Compliance Program Be transparent and keep it transparent

Office of the Prosecutor Law

Name {Last, First, Middle} Social Security Number: Check ( )Yes / ( ) No To submit to TSA Clearinghouse Print your Social Security Number Below

The President s Budget Request: Fiscal Year (FY) 2019

Brussels, 16 May 2006 (Case ) 1. Procedure

S/2001/1326. Security Council. United Nations

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005

ANTI-FRAUD, BRIBERY AND CORRUPTION POLICY

Portland International Jetport City of Portland, ME SIDA Badge Application

PINE BLUFF POLICE DEPARTMENT POLICY & PROCEDURES MANUAL

Outer Space and High-altitude Activities Bill

The High Contracting Parties to the present Treaty, Member States of the European Union,

GOVERNMENT GAZE'ri'E REPUBLIC OF NAMIBIA

CHARTER OF THE AUDIT COMMITTEE THE SIAM CEMENT PUBLIC COMPANY LIMITED

S/2003/487. Security Council. United Nations

Automatic Number Plate Recognition (ANPR) Approved Law Enforcement Agencies (Approved LEA)

See Rantsev v Cyprus and Russia, (Application no /04), European Court of Human Rights.

LAW OF GEORGIA ON COMBATING TERRORISM

MSIC Application Guidelines

CHAPTER 3 Section VIII 10/1/2016 Polygraph Policy

Contents. Part 12 Amendments 5. Subpart A General Definitions... 5

Immigration Act 2014

Tourism represents 13.8% of the world s GDP Globally 3.6% of jobs are in tourism - this is one in every 10 jobs on the planet Tourism is one of the

16/06/ LAW N 09/2000 OF 16/06/2000 ON THE ESTABLISHMENT, GENERAL ORGANISATION AND JURISDICTION OF THE NATIONAL POLICE

The Enforcement Guide

CRITICAL INFRASTRUCTURE PROTECTION IN CANADA: THE CASE OF MONTREAL INTERNATIONAL AIRPORT. University of Montreal, Canada

Compliance and Ethics Committee (the Committee )

THE CO-OPERATIVE BANK PLC AUDIT COMMITTEE. Terms of Reference

GUIDELINE 8: Build capacity and learn lessons for emergency response and post-crisis action

GUIDELINE 13: Relocate and evacuate migrants when needed

Transcription:

BACKGROUND CHECKS & INSIDER THREATS Anton Olivier : Border Police

Anton Olivier 34 Yrs Policing Service 26 Yrs Commission Officer 2 x GM Award recipient (ACSA) FOUNDATIONS

THE IMPORTANCE ATTACHED TO VALUES & ETHICS

SECURITY CONCEPT AND POLICING SAPS with a clear and critical role in the NASP The work of policing demands maximum cooperation with stakeholders and Government departments Departments represented or operational at the airport Dept of Home Affairs Dept of Defence Dept of Agriculture & Fisheries Dept of Transport Dept of State Security Dept of Environment DIRCO SARS Dept of Health Dept of Communications Dept of Energy Dept of Tourism Dept of Public Enterprise Dept of Public Works Tourism Board Traffic Police

SECURITY CONCEPT AND POLICING KEY AGENCIES SACAA Regulatory agency Standards Practices NASP/LASC Reporting of Acts of Unlawful Interference Implementation and compliance to Annex 17 ACSA - Specific Aviation security arrangements as per NASP - Infrastructure& coordination of Aviation security role players

AIRPORT COMMITTEES OF NOTE Security at an airport is coordinated through various statutory committees which include among others: Local Airport Security Committee (LASC) Chaired by ACSA Security Joint Planning Committee(JPC) chaired by ACSA(Landlord) Joint Operational Coordinating Committee (JOCOM) Chaired by SAPS. Such collective functioning and approach plays a pivotal role in all measures put in place to counter insider threat in the environment.

SECURITY APPRECIATION & CONSIDERATIONS SAPS Border Police in its strategy had to consider: SAPS have a command and control responsibility during security related incidents and operations SAPS have a directing and managing responsibility during security related incidents and operations Irrespective of other security deployments SAPS operate in various critical areas

SECURITY APPRECIATION & CONSIDERATIONS SAPS Border Police in its strategy had to consider: Acknowledge the presence of both long term and short term security contracts taking care of a variety of safeguarding and processes A Variety of airlines utilising contract security to secure their aircraft and processes SAPS had to keep cognisance of their mandate pertaining to the illegal movement of goods and people

RECRUITMENT SAPS is present and deployed at airports that have international status. Categories due to their status - commercial values. The busier the airport, the higher the number of personnel is deployed. Police members recruited to be assigned with border policing functions are recruited by the broader SAPS and are subjected to security screening that includes their previous backgrounds; this recruitment will also include the minimum requirement on educational aspects.

SAPS PERSONNEL PLACEMENT All SAPS members deployed at airports - Undergo an induction program The induction program is conducted in conjunction with ACSA that includes all aspects of Aviation Safety and Security. Subjected to security checks - Z204 forms Committed offences or not conforming to the standards set, are either removed from sector /permits confiscated / removed from the environment Those found to have committed grossly misconduct are dealt either departmentally or criminally.

SAPS STRATEGY All operational areas in the airport have been demarcated into smaller and manageable areas, and this concept has been designed to cover the whole operational area to include access points, inner perimeter control, outer perimeter, terminals, land side and parking areas.

SAPS DEPLOYMENT Outer Perimeter Access control Baggage makeup area Cargo Area /Warehouses CSC(Crime Prevention) Terminal Contact points Valuable Cargo Passenger movements Firearm permits Air side Sector Land side Sector OTHER SERVICES Permit application checks K9 Intelligence gathering(cig) Specialised Investigations(DPCI) Explosives Ordinance Document specialists Firearm Officers Hostage negotiators Incident Investigators Response capacity

SAPS PERSONNEL DEVELOPMENT All members charged with the functioning at air side are subjected to the same AVOB training in which all stake holders are subjected to. Aviation Learning Program -Understanding the ICAO security standards, Annex 17 understanding the corruption concept,risks & threats Subject specialist training

BACKGROUND CHECK A background check is the process of looking up and compiling criminal records, commercial records and financial records of an individual or an organization.

BACKGROUND CHECK A background check will investigate an individual`s background based on criteria determined by their prospective or current employer. A check of an individual`s background may include previous employment, education, criminal record, credit history, vehicle and license record checks. Each type of check will reveal different information pertinent to that check and it forms part of the employment process It again becomes part of the permit process The check is limited to a criminal background check

ADVANCED FORMS OF BACKGROUND CHECKS & INVESTIGATIONS Banking business All forms of communication data Tracking Lifestyle Audit Advanced Linkages Polygraph Forensic Investigations Cloning

INSIGHT INTO PERMIT APPLICATIONS ID number,surname and date of birth. The information that the system retrieves and displays, will determine as to what is depth the applicant will be scrutinised. The information submitted by the applicant i.e. his/her home address can also be used when scrutinising the information the systems retrieves and displays to confirm or reject criminal convictions.

INSIGHT INTO PERMIT APPLICATIONS On the crim system the 1 st phase check is running by entering the applicants surname, date of birth, population group and gender. (The population group is a mandatory requirement). Again the information that the system retrieves and displays, will determine as to what is depth the applicant will be scrutinised. The information submitted by the applicant i.e. his/her home address can also be used when scrutinising the information the systems retrieves and displays to confirm or reject criminal convictions.

INSIGHT INTO PERMIT APPLICATIONS THE 2 ND PHASE OF THE SEARCH IS THE APPLICANTS ID NUMBER ONLY. Often the applicants do not supply their ID numbers during their arrests. Spelling and typing errors also play a crucial role. Applicants do not always provide their given names, but nick names or street names. Regional and local spelling of names and surnames. Applicants do not always provide their correct dates of birth during arrests. False ID documents have been presented, male person with female persons ID number. ID fraud has on occasion found, the applicants ID number and/or names have been used by someone else. If necessary conduct and interview with the applicant. The police official whom is conducting the checks might have a sense which's alerts him/her to conduct an in depth scrutinising of the applicant.

INSIDER THREAT An insider threat is a malicious threat to an organization or industry that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security, practices, data and procedures and systems In the aviation environment it alludes to the core of aviation security and safety from within

CURRENT AND FUTURE POSSIBILITIES INSIDER THREAT DETECTION APPROACH People working for or within our environments are aware of the mechanisms in place and use this knowledge to circumvent our systems There is a gap between initial background checks and the time the threat is unexpectedly materialise We need an approach to address these challenges by delivering these capabilities in an solution that does not require a long-term data analysis project. We need to know what to do when the warning signs are there Law enforcement structures historically focused on `successful` criminal prosecution We need parallel solutions to close the gap between initial background checks

CURRENT AND FUTURE POSSIBILITIES INSIDER THREAT DETECTION APPROACH We need to develop a purpose-built program that speak to the heart of the insider threat, We need to detect multi high-risk activity, access, and events(activities) in the aviation environment associated with insider threats. There should be room for Insider Risk Intelligence within the framework There is a need for visible rapid matrix indicator that can be populated to indicate potential insider risk and threat levels We need to consider a to develop a multi dimensional program that can be multi populated though suspicious activities witnessed

CURRENT AND FUTURE POSSIBILITIES ADVANTAGES It serves as an Insider threat intelligence tool to monitor, investigate and report on risks in the aviation environment It serves as a predictive threat detection(early detection) It serves as a contingency to mitigate the impact of a threat It serves as a program to close security gaps in a proactive manner It address comprehensive threat response and investigation It serves as a quantified, non-subjective threat and risk reporting tool It clean the industry / Mitigating threats It address both risk & loss management Industry Claim Credit / Earn respect

INSIDER THREAT CASE STUDIES Insight in to insider threat incidents: Human smuggling/facilitation Contravention of Part 108 Baggage manipulation(ctia & ORTIA) Collaboration between staff SAPS Insider threats Syndicate linkages

WHEN SAPS & INDUSTRY WORK TOGETHER

THANK YOU