80 likes | 87 Views
Explore the role, structure, and processes of an intelligence unit within a multi-task authority, focusing on information-sharing, legitimacy, and the core values of anonymity and security.
E N D
Webinar Intelligence in a multi-task authority Stijn van den Broek, Head of Detection Unit, Competition Department
Outline • Background and context • Role of the intelligence unit • Corevalues • Structureandprocess • Information-sharing (internally) • Process/mode of operation • Questions
Background and context • Detection Unit encompasses: • Tips • Leniency • Proactivedetection (screening) • Intelligence Unit • History: • InspiredbyCriminalIntelligence Unit (police) • Introductionby Dutch CompetitionAuthority (NMa) • Currentlybroader scope dueto development of ACM as a multi-taskauthority • Legitimacy • ACM Policy Rule on Informants
Intelligence unit (IU) – role • Authorisedtoobtain information aboutinfringementsfromanonymousinformants • Information shared withotherunits withinACM cannotbetracedto informant • Product is an ‘intelligence report’, which does not serve as evidence(but as a pointer forfurtherinvestigation)
Core values • Lastinganonimity of informants • All contact with intelligence officers is strictlyvoluntary • Sharing as much information as possiblewithother units within ACM • Intelligence reports are never used as direct evidencein cases • Intelligence officers are appointedby ACM-board • Security of intelligence officers
Structure and process Innercircle: intelligence officers • Responsibleforprocess, anonymity of informantsandallcommunicationwithother units 1st circle • Intelligence analysts: • responsibleforenriching information, providing analysis andnamesandprofiles of potentialinformants • Intelligence advisors: • responsibleforthe (legal) content and act as liaison withother units 2nd circle • Other units within ACM, primarilydetection
Access to information Inner circle: intelligence officers • Complete acces toallinformation and responsibleforsharing information withothers 1st circle • Intelligence analysts: • Complete acces toappointed cases • Share information onlywithin1stcircle • Intelligence advisors • Complete access toappointed cases • Share information onlywithin1stcircle 2nd circle • Other units within ACM receiveinformation onlybyan intelligence report
Process/mode of operation • Both reactiveandproactive • Criteria forinformants • Revealingidentity is riskyfor informant • Knowledge of theinfringement, however… • …maynotbe a potentialoffender! • Cooperation with… • Case handlers • Economists (screening for high risk sectors) • Otheragencies, such as policeand public prosecutors • OtherCompetitionAuthorities (?)