1 / 8

Webinar Intelligence

Explore the role, structure, and processes of an intelligence unit within a multi-task authority, focusing on information-sharing, legitimacy, and the core values of anonymity and security.

rswanson
Download Presentation

Webinar Intelligence

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Webinar Intelligence in a multi-task authority Stijn van den Broek, Head of Detection Unit, Competition Department

  2. Outline • Background and context • Role of the intelligence unit • Corevalues • Structureandprocess • Information-sharing (internally) • Process/mode of operation • Questions

  3. Background and context • Detection Unit encompasses: • Tips • Leniency • Proactivedetection (screening) • Intelligence Unit • History: • InspiredbyCriminalIntelligence Unit (police) • Introductionby Dutch CompetitionAuthority (NMa) • Currentlybroader scope dueto development of ACM as a multi-taskauthority • Legitimacy • ACM Policy Rule on Informants

  4. Intelligence unit (IU) – role • Authorisedtoobtain information aboutinfringementsfromanonymousinformants • Information shared withotherunits withinACM cannotbetracedto informant • Product is an ‘intelligence report’, which does not serve as evidence(but as a pointer forfurtherinvestigation)

  5. Core values • Lastinganonimity of informants • All contact with intelligence officers is strictlyvoluntary • Sharing as much information as possiblewithother units within ACM • Intelligence reports are never used as direct evidencein cases • Intelligence officers are appointedby ACM-board • Security of intelligence officers

  6. Structure and process Innercircle: intelligence officers • Responsibleforprocess, anonymity of informantsandallcommunicationwithother units 1st circle • Intelligence analysts: • responsibleforenriching information, providing analysis andnamesandprofiles of potentialinformants • Intelligence advisors: • responsibleforthe (legal) content and act as liaison withother units 2nd circle • Other units within ACM, primarilydetection

  7. Access to information Inner circle: intelligence officers • Complete acces toallinformation and responsibleforsharing information withothers 1st circle • Intelligence analysts: • Complete acces toappointed cases • Share information onlywithin1stcircle • Intelligence advisors • Complete access toappointed cases • Share information onlywithin1stcircle 2nd circle • Other units within ACM receiveinformation onlybyan intelligence report

  8. Process/mode of operation • Both reactiveandproactive • Criteria forinformants • Revealingidentity is riskyfor informant • Knowledge of theinfringement, however… • …maynotbe a potentialoffender! • Cooperation with… • Case handlers • Economists (screening for high risk sectors) • Otheragencies, such as policeand public prosecutors • OtherCompetitionAuthorities (?)

More Related