0% found this document useful (0 votes)
511 views27 pages

Interpol NEYC BG

This document discusses INTERPOL operations related to border security across the MENA region. It provides background on INTERPOL, describing its global presence and role facilitating international police cooperation. It outlines INTERPOL's commitment to impartiality and priorities around circulating data. The document also describes INTERPOL's notice system for issuing international alerts on crimes, criminals, and threats. Finally, it discusses specific INTERPOL operations focused on border security, including projects in Jordan and Turkey, as well as an integrated border management task force.

Uploaded by

Biprajeet Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
511 views27 pages

Interpol NEYC BG

This document discusses INTERPOL operations related to border security across the MENA region. It provides background on INTERPOL, describing its global presence and role facilitating international police cooperation. It outlines INTERPOL's commitment to impartiality and priorities around circulating data. The document also describes INTERPOL's notice system for issuing international alerts on crimes, criminals, and threats. Finally, it discusses specific INTERPOL operations focused on border security, including projects in Jordan and Turkey, as well as an integrated border management task force.

Uploaded by

Biprajeet Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Content

1) Letter from The Executive Board

2) Introduction to the Committee

● The Global Presence and Police Support

● Impartial Objectivity

● Data Circulation Vital Priorities

● Interpol’s Notice System

3) Border Issues

a) North Africa
 Governments
 Movement of Goods
 Country Specifics
 Movement of People
 Research Links

b) Middle East
 Jordan’s Border Security Project
 Turkey Building Wall

4) Interpol Operations

 Operation Qanoon
 Project Sharaka

5) Integrated Border Management Task Force

6) Delegate Guide
Letter from the Executive Board
Greetings, Delegates
With outmost excitement and pleasure, we welcome you to the first edition of North Eastern
Youth Conclave, Model United Nations 2023. Here to discuss the agenda
1) Border Security across the MENA Region over reviewing inter state INTERPOL
Operations

INTERPOL – is the international organisation responsible for a global police cooperation,


acting as an intermediary body between states, INTERPOL has taken the initiative for a
planetary data analysis of suspects and fugitives to make the earth a safer place with the idea of a
force of global significance to keep surveillance over every crime – its omnipresence makes
INTERPOL an organisation attractive to the global audience.
Learning is a two-way process. The executive board is here to give the delegates a
comprehensive experience inside these three days of Model United Nations that wouldn't just
include valuable in that frame of mind as a negotiator however will likewise show you numerous
things that will assist you with advancing in your not-so-distant future. To be a decent speaker
one must be a decent audience. Subsequently, any delegate with any 'x' measure of involvement
and 'y' measure of examination wouldn't have the option to pro the meetings on the off chance
that he/she doesn't pay attention to their partners appropriately.
With long periods of exploration and earlier comprehension of the point I have arranged a
foundation guide to support the delegates which will assist them with social occasion
information in regards to the plan. The different data given will assist them with investigating
better, comprehend the plan with more noteworthy profundity and will assist with acing the
advisory group meetings.
Wishing you well.

Mridushmoy Baruah
Secretary General (INTERPOL)
mailto:mridushmoymitchu@gmail.com
Mrinav Kalita
President (INTERPOL)
The International Criminal Police Organization
Headquartered in Lyon, France – INTERPOL is the most substantial worldwide police
organization acting as a facilitator for interstate police cooperation and shared surveillance for
control over global crime. Divided into seven regional bureaus, the organization has an
integrated subsidiary network of National Central Bureaus (NCBs) across all 195 member states
within the stratified structure.
Also known as The International Peacekeeping Organization (ICPO), The General Secretariat is
also responsible for providing urgent assistance to countries and investigating national police
across time zones. Hence there are three Command and Coordination Centres (CCC) for first
point of contact.

The Global Presence and Police Support


Command and Coordination Centres
COMMUNICATIONS AND DATABASE MANAGEMENT
● Assessing incoming messages received through I-24/7, INTERPOL’s secure global
police network, or from members of the public;
● Conducting instant checks on all INTERPOL databases and replying to urgent queries;
● Providing in-depth open-source monitoring and analysis in order to ensure all policing
capabilities are ready and available when needed by our member countries;
● Supporting transnational operations;
● Issuing global or regional alerts and publishing INTERPOL Notices for imminent or
potential threats.

FIELDWORK AND SPECIALIZED ASSISTANCE


In line with NCBs, the CCC expects an emergency management board job during serious
episodes, provides expertise to significant occasions, or arranges endeavours with the private
sector. This is finished by:
● Deploying INTERPOL Incident Response Teams (IRT), which are tailored to the specific
nature of the incident (terrorist attack, natural disaster, etc.), to provide analytical and
investigative support and enhance the exchange of key police information;
● Deploying INTERPOL Major Event Support Teams (IMEST) at major international
events to support national police with security arrangements and border control measures;
● Coordinate and manage operational data from I-Check it, an INTERPOL screening
solution which allows trusted partners in the private sector to conduct advanced
passenger checks in real-time, in collaboration with the law enforcement community
URGENT POLICE SUPPORT
The CCC's principal work is to upgrade global police participation continuously, counting global
detainments, finding escapees, character checks and transnational examinations. This is finished
in close participation with NCBs as well as INTERPOL's committed crime units. A critical
illustration of this ongoing help is the capacity to distribute right away INTERPOL Notices as a
worldwide instrument for the distinguishing proof, area and capture of hoodlums.
TRAINING AND PRE-DEPLOYMENT PREPARATION
INTERPOL Certified Instructors, the CCC backings exceptional limit building programs pointed
toward supporting the utilization of INTERPOL's policing abilities by officials in our part
nations.
These projects are likewise intended for INTERPOL General Secretariat staff preceding explicit
organizations, when they are probably going to deal with exceptionally a lot of information by
means of checks against our particular data sets.

Impartial Objectivity
Interpol’s enforcement policy is based on neutrality for its members, acting as an intermediary
institute that reaches beyond the prerequisite of Bilateral and Multilateral diplomatic contrasts.
Responsible for facilitation services, The INTERPOL’s Constitution prohibits it to intervene the
sovereignty of any state boundaries and laws of the lands of its member states, Hence the vested
power upon the organization has its limitations implemented by The Universal Declaration of
Human Rights; ‘any intervention or activities of a political, military, religious or racial
character'.

UNIVERSAL DECLARATION OF HUMAN RIGHTS:

https://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf
INTERPOL CONSTITUTION:

https://www.interpol.int/content/download/590/file/Constitution%20of%20the%20ICPO-
INTERPOL-EN.pdf

Data Circulation Vital Priorities


Interpol's information sharing organization is furnished with two primary apparatuses: I-24/7 and
I-link. all day, every day is Interpol's worldwide police correspondence framework on which
police associations can move earnest and secret data rapidly and safely.
The internationality of this framework works with simple correspondence between nations of
various dialects and detailing frameworks.: I-link is a web-based application that permits police
to enter data into I-all day, every day in a normalized, translatable way.
Data took care of into I-link isn't simply shipped off I-: I-24/7, yet additionally to Interpol's
plenty of particular data sets that it uses to unite and sort out the data it gets from its part nations.
All data sets, aside from the Interpol Ballistic Data Network, are accessible every minute of
every day to Interpol's part nations through I-: I-24/7.
There are countless data sets, each centred around various issues from following needed people
to writing about dealt guns. They additionally have quite a large number public information
bases on their site, for example, one posting every single missing individual, one posting all
missing things of beauty, and one posting every single needed individual.
I-link, I-24/7, and Interpol's data sets are all totally encoded and securitized to keep lawbreakers
from hacking into and getting to all information that Interpol has on hoodlums and criminal
associations and practices around the world.

Interpol’s Notice System


One of INTERPOL's most significant capacities is to assist with policing in its member nations,
share basic wrongdoing related data utilizing and arrangement of worldwide takes note. Police
can get involved in notification to alarm policing in different nations of likely dangers, or to
request help with settling violations.
Notification can likewise be utilized by the United Nations Security Council, the International
Criminal Court and worldwide criminal councils to caution that specific people and elements
face UN sanctions.

Notices are international alerts used by police to communicate information about crimes,
criminals and threats to their counterparts around the world. They are circulated by INTERPOL
to all member countries at the request of a country or an authorized international entity. The
information disseminated via notices concerns individuals wanted for serious crimes, missing
persons, unidentified bodies, possible threats, prison escapes and criminals’ modus operandi.
Notices offer high visibility for serious crimes or incidents.

Classification and its significance


Red Notice - To seek the location and arrest of a person wanted by a legal jurisdiction or an
international tribunal with a view to his/her extradition.
The legal basis for a Red Notice is an arrest warrant or court order issued by judicial authorities
in a country. Many of INTERPOL’s member countries consider a Red Notice to be a valid
request for provisional arrest. Furthermore, INTERPOL is an official channel for transmitting
requests for provisional arrest in a number of bilateral and multilateral extradition treaties,
including the European Convention on Extradition, the Economic Community of West African
States (ECOWAS) Convention on Extradition and the United Nations Model Treaty on
Extradition

Blue Notice - To locate, identify or obtain information on a person of interest in a criminal


investigation.

Green Notice - To warn about a person’s criminal activities if that person is considered to be a
possible threat to public safety
Yellow Notice - To locate a missing person or to identify a person unable to identify
himself/herself.

Black Notice - To seek information on unidentified bodies

Orange Notice - To warn of an event, a person, an object or a process representing an imminent


threat and danger to persons or property

INTERPOL - United Nations Security Council Special Notice - To inform INTERPOL’s


members that an individual or an entity is subject to UN sanctions.
United Nations Security Council Special Notice was created in 2005 to provide better tools to
help the Security Council carry out its mandate regarding the freezing of assets, travel bans and
arms embargos aimed at individuals and entities associated with Al Qaeda and the Taliban.

Purple Notice - To provide information on modus operandi, procedures, objects, devices or


hiding places used by criminals.
Diffusions - Similar to the Notice, diffusion is issued for the same purposes as notices but sent
directly by a member country or an international entity to the countries of their choice.
Diffusions are also recorded in the Organization’s police databases.
Notices and diffusions contain two main types of information: identity details (physical
description, photograph, fingerprints, identity document numbers, etc.) and judicial information
(offence with which the person is charged; references to the laws under which the charge is
made or conviction was obtained; references to the arrest warrant or court sentence, etc.)
Border Issues
North Africa
There are many main issues in the literature on border security in North Africa: security and
terrorism, migration, and commodities trafficking. All of these concerns are interconnected.
Migration and trafficking frequently use the same geographical routes, which may or may not
entail weapons smuggling for extremist organisations. Furthermore, cross-border radicalist
groups regularly connect with profit-seeking trafficking. All of the countries in this region have
'porous borders,' especially those that border the desert.
The majority of literature does not have a regional perspective and instead concentrates on
individual countries or places. Algeria and Libya are highlighted in the literature as significant
actors in the area, and most of the research focuses on these nations, as well as the recent
violence in Mali. The security literature focuses on terrorism and foreign policy rather than
border security.
These areas are frequently governed by networks of stateless organisations, such as ethnic clans
and ideological movements. Both the Tuareg and Tebu nomadic ethnic groups operate outside of
official jurisdiction and are viewed as a security danger. AQIM, Al-North Qaeda's African
branch, is a loose network that is powerful in certain regions and weak in others, but poses a
significant security concern to the region as a whole.
The lack of official power at desert borders remote from the capital implies that borders are open
to trafficking and illegal migration in practise. Smuggling and migration use many of the same
routes through the Sahara, from south to north and west to east. Drugs, cigarettes, and firearms
are important commodities. The collapse of Gaddafi freed a considerable amount of weaponry
into the underground market, with the majority of them heading to recent conflict zones in Mali
and Mauritania. Drugs and cigarettes are transported east or north from West Africa. Because of
the low levels of employment, socioeconomic possibilities, and chances for legitimate trade,
there are little incentives to stop smuggling. It is enormously profitable and, to some extent,
authorised by the authorities, many of whom are also engaged. Currently, state control is
insufficient to curb trafficking.

A significant portion of the literature addresses both legal and criminal migration from North
Africa into Europe. This paper discusses a number of significant concerns, including the routes
up from Sub-Saharan Africa and the efforts of both Europe and North Africa to shut their
common border.

Key Actors
Governments
Regional Relationships
The regional ties of the North African states can be described as suspicious and uncooperative.
Due to a lack of trust, legal alternatives for cross-border commerce are limited and expensive,
with hefty taxes, making smuggling a permanent preferred choice.
Algeria is viewed as aiming to behave as the region's primary power holder1, with foreign
security strategy characterised by a desire to maintain control and influence rather than
collaborate regionally. It has, however, failed to take clear and effective action against AQIM
and the present violence in Mali. Concerning AQIM, Algeria has a strong anti-terrorism position
and prefers to engage mainly militarily, but other Sahelian countries prefer to address political,
social, and economic problems as well. Algeria's unwillingness to collaborate at the regional
level, as well as its emphasis on security, appears to show that the country's goals are to preserve
control and power.
Commerce between African nations amounts for just 10% of total national trade, with the
remaining 90% flowing to non-African countries. Only 1.3% of commerce in the Maghreb is
intraregional. Although there have been a few initiatives to establish regional free trade zones,
none have proven very successful. The most successful is the Greater Arab Free Trade Area
(GAFTA), which was founded in 1997 and initially included Libya, Morocco, Egypt, Sudan, and
Tunisia, with Algeria joining in 2009. This has resulted in tiny moves toward free trade.
However, the nations mostly compete against one another, failing to capitalise on comparative
advantages or work together.

Weak Government control over Border Regions


The permeable nature of national borders is exacerbated by the region's weak nations.
Controlling isolated desert regions in the Maghreb's south is a challenge for both authoritarian
regimes and post-Arab Spring administrations. The majority of North African countries have
large borders along the desert. These are enormous and nearly hard to regulate with a centralised
force, especially given that many states lack legitimacy in these areas due to long-term policies
that marginalise these groups.

Trans-National Networks
The premise is that Africa's borders are mostly artificial, separating as well as unifying non-
traditional populations. Much of the movement of products and people in the region is facilitated
through kin networks that cross national borders. Several nomadic communities in southern
Libya and Algeria arrange and carry out cross-border travel via long-established transit routes
and ethnic linkages in neighbouring countries. These two tribes have clan systems that extend
throughout most of the Maghreb, and they travel frequently to shift cattle for pasture and to visit.
They frequently avoid formal border crossings to transport commodities to neighbouring
settlements, but border authorities appear to be aware of their travels and so tacitly authorise
them.

AQIM
Al-North Qaeda's African branch (Al-Qaeda in the Islamic Maghreb) causes significant
instability, tension, and conflict for all governments, including major international entities.
AQIM has significant financial resources, Libyan weaponry, and freedom of movement in
northern Mali, making it a crucial player in the region's turmoil. It is unclear if its members are
jihadists, smugglers, or both. They are undoubtedly renowned for assisting the transit of migrants
over the desert and ensuring their protection in exchange for weapons, as well as for travelling
the same routes as traffickers and carrying out terrorist assaults.

Movement of goods
The North African regional economy is marked by distrust, corruption, and bureaucracy. The red
tape surrounding lawful business operations, combined with a dearth of real jobs, stifles legal
trade, turning borders into roadblocks. This enhances the possibility of smuggling. Other
important elements incentivizing smuggling are the absence of any profitable legal enterprises,
as well as the corruption of authorities, who are frequently assumed to be participating in
smuggling, with even high-ranking officials engaged.

Country specifics
Libya
In Libya, the government has never had enough incentives to halt trafficking, nor has it ever had
enough authority to attempt. The southern borders feature a long-established system in which
border officials exacted tolls from traffickers, and it was considered usual for people to travel
south with gasoline and food and return with white goods, narcotics, booze, and cigarettes.
Cigarette smuggling is regulated by security networks dominated by members of the Qadhadfa
tribe. Senior authorities are alleged to be involved in the smuggling of weaponry to Tunisia,
Algeria, Egypt, and the Sahel, a trade that has flourished since Gaddafi's demise.

Algeria
Provincial authorities in Algeria are suspected of unlawfully selling subsidised gasoline, food,
and humanitarian supplies to northern Mali and Mauritania, as well as receiving cigarettes from
Sahrawi networks. Cigarettes move from Mauritania's Nouakchott or Nouadhibou through the
interior, then to Atar and Zouerate before reaching Algeria.
Sudan/South Sudan
Many of the arguments raised above are supported by a Small Arms Survey research venture
undertaken in southern Sudan (now South Sudan) in 2006, implying that trafficking follows
similar trends across North Africa. Small guns typically flow one direction in Sudan, towards the
Democratic Republic of the Congo. Clan organisations use ethnic relationships to trade in
firearms, and pastoralists and armed civilians pass freely across the border, seldom being stopped
by police. Armed gangs have an important influence in both demand and supply in border town
markets.

Movement of People
UNODC has published a comprehensive review of the smuggling of illegal migrants into,
through and from North Africa (Monzini, 2010). It provides a valuable synthesis of information
on trends. Some key points relating to border security are:
 Land, air and sea routes are used for migration from North Africa to EU countries. Sea
routes are most common, and the most common destination countries are Italy (often
Lampedusa), and Spain (via Morocco and/or the Canary Isles).

 North Africa is increasingly a destination for economic migrants, mostly from sub-
Saharan Africa, but also South Asia. Libya is a key destination country (although perhaps
not after 2011). These migrants do not intend further travel to the EU.

 Most migrants in North Africa seem to be Malian. The other most common nationalities
among migrants in the region are Nigerian, Guinean, Chad, Ghanaian, Senegalese and
Liberian. In Libya, 50 per cent of migrants are Nigerian and 20 per cent are Ghanaian. In
Egypt, many migrants are refugees from Sudan and Somalia.

 East African routes through Chad and the Sudan are likely to become important soon.

 Migrants tend to be young, middle-class men, not poor, and quite well educated. They are
mostly in search of short-term work to send remittances home. It is unclear how many are
asylum seekers.

 Smugglers’ organisational structures are extremely flexible and not hierarchical. Small
networks, often ethnic, interact with each other to arrange passage. The networks adapt to
any new controls put in place by authorities, making it extremely difficult to eradicate
their activities.

International Peace – North Africa section:


http://carnegieendowment.org/regions/?fa=list&id=135

Small Arms Survey:


http://www.smallarmssurvey.org/

African Borderlands Research Network:


http://www.aborne.org/bibliography.html

Middle East
Because of its natural riches and vast oil reserves, as well as its geographical location, the Middle
East is one of the most significant areas in the globe. The Middle East stretches from Morocco to
Iran in the west. The region is home to large deserts, contemporary cities, mountain ranges, and
vital natural resources like as water, natural gas, and oil. Algeria, Egypt, Jordan, Iran, Iraq,
Palestine, Lebanon, Libya, Syria, Tunisia, Turkey, Yemen, Sudan, and Gulf nations include
Bahrain, Kuwait, Qatar, the United Arab Emirates, Saudi Arabia, and Oman. Many other
countries, including the United States, the United Kingdom, and Russia, have turned their
attention to the region. Throughout history, this area has had a significant impact on countries in
other regions, with individuals from the Middle East making significant contributions to history,
culture, art, folklore, religion, and music. Furthermore, the prophets and their followers in these
areas established the three great monotheistic faiths, Judaism, Christianity, and Islam.
Profound schisms between state power, legitimacy, and territoriality are at the heart of the
Middle Eastern state-formation process. As European colonial powers established many of the
boundaries of current Middle Eastern states following the collapse of Ottoman control in the
area, European colonial ambitions and aspirations mainly built a new Middle Eastern regional
order.
Many Arab nations, including Iran and Turkey, have a history as independent political and social
entities. The 'imam-chief type' system of Morocco, Yemen, and Oman, for example, dates back
to the seventh and ninth centuries CE; Lebanon and Syria have been cultural and political centres
since the Middle Ages; Saudi Arabia and Kuwait have political roots dating back to the
seventeenth century; and Egypt, Algeria, and Tunisia emerged as 'bureaucratic-military
oligarchies' in the eighteenth and nineteenth centuries.

JORDAN'S BORDER SECURITY PROJECT


Jordan, has also secured its borders against incursions by ISIS or Daesh fighters from
neighbouring Syria and Iraq. Jordan's border with Iraq is 185 km long, whilst its border with
Syria spans 339 km on land and 39 km along the Yarrnuk River.
In April 2008, DRS Technologies announced that it received an order from the US Army's
Communications and Electronics Command (CECOM) for the initial phase of the Jordan Border
Security Program.
The JBSP features passive barrier fencing, sensors, cameras and a command and control system,
as well as mobile and fixed surveillance towers that use a variety of commercial off-the-shelf
(COTS) sensors.
In the initial phase of the three-phase project, DRS provided mobile and fixed surveillance
towers with off-the-shelf sensors, as well as communications connectivity between the towers
and and mobile and fixed command and control centres.
In April, 2013 Raytheon was awarded a Defense Threat Reduction Agency (DTRA) border
security contract valued at $35.9 million. Under the nearly three-year base contract, Raytheon
will design, develop and implement an integrated surveillance system along dfferent parts of the
Jordanian border neighboring Syria and Iraq. The contract also requires Raytheon to provide
training, maintenance and repair.
The aim is to enhance the Jordanian Armed Forces' ability to deter, detect and interdict threats.
"Our goal is to deliver the best possible border security offering for the Kingdom," said Todd
Probert, vice president for mission support and modernisation at Raytheon Intelligence,
Information & Services. "The best border security solution is the right combination of
equipment, training and sustainment based on customer needs."
But according to Matthew Hedges, a PhD candidate at the University of Durham where he is
researching defence and security policy in the GCC, Jordan will require further manned and
unmanned solutions to allow it to efficiently manage its evolving threat nexus.
TURKEY BUILDS A WALL
Turkey is also concerned about clashes in neighbouring Syria spilling over the border. Turkish
citizens have already been killed by terrorist attacks launched by ISIS fighters crossing over into
Turkey from Syria.
According to the US Army’s Foreign Military Studies Office highlights recent border security
measures implemented by Turkey include the use of Cobra II armoured vehicles, surveillance
and reconnaissance “balloons” and the construction of a concrete wall.
The Cobra II, which is developed in Turkey by Otokar, features radar, a target detection and
thermal camera system, which “can see the other side of the border easily thanks to a camera
system that can be raised up to 12 meters.” The Cobra II vehicles will patrol a wall that is
currently being constructed by Turkey alongside its border with Syria.
The “balloons”, also referred to as “mini-zeppelins” are manufactured by Aselsan, Turkey’s
largest defence company. The FMSO says the balloons will mainly be used along the country’s
southeastern borders with Iraq and Syria. They are based on the tethered aerostat system, PTSD,
developed by Lockheed Martin for the US Army.
“Aselsan is hoping to develop the ‘Water Drop’ and the ‘Global' [balloons] to detect terrorist
activity and illegal crossings along Turkey’s borders with Syria and Iraq,” says the FMSO. “The
balloons will perform intelligence transmission, surveillance and reconnaissance and early
warning missions.”
Other security measures include a three-metre high and two-meter wide concrete wall, which has
been built along the Turkish-Syrian border to prevent smuggling, illegal migration and possible
attacks from Syria; as well as a surveillance tower, lighting systems and trenches. These efforts
have reportedly reduced smuggling by horses and vehicles and reduced illegal crossings by 40%.
Interpol Operations
Operation Qanoon
Qanoon is a multi-year initiative targeting illicit medicines and medical products in the Middle
East and North Africa region. The initiative collects and shares information in order to identify
transnational issues and trends, support investigations and dismantle criminal networks.
It also works to create a pool of experts (police services, health, customs agencies, judiciary and
the private sector) to support sustainable cooperation and actions.
The participating countries – Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Qatar and Saudi Arabia –
carried out inspections and seizures at ports, airports, land borders, free trade zones (entries and exits),
postal hubs, warehouses, pharmacies and other points of sales.
They reported seizures of a wide variety of medicines including anaesthetics, analgesics, antimalarial
medicines, benzodiazepines (tranquilizers) and corticosteroids, as well as supplements, sexual stimulants
and growth hormones. Examples of medical products seized are syringes, suture threads, surgical
adhesive tapes and electronic glycaemia readers.
Pharmaceutical crime poses a serious danger to public health. Falsified and counterfeit medicines threaten
the lives of the most vulnerable members of society.
“INTERPOL is committed to tackling all forms of pharmaceutical crime and disrupting the activities of
the organized criminal groups that profit from it. The volume of illicit medicines and counterfeit medical
products seized during this operation is a reminder of the extent of this global problem and the very real
risk to public safety,” said Paul Stanfield, INTERPOL Director for Organized and Emerging Crime.

Project Sharaka
Tackling terrorism in the Middle East and North Africa.
Strong border security is the first line of defence in preventing the travel of terrorists.
Funded by the European Union, Project Sharaka brings INTERPOL policing tools and expertise
to frontline officers in eight countries: Algeria, Egypt, Jordan, Lebanon, Libya, Morocco,
Palestine and Tunisia.
The objective is to help these countries detect and intercept terrorist individuals and groups
through technology, capacity building and police operations.
Project Sharaka connects frontline agencies to I-24/7 (INTERPOL’s secure, global police
communications network), particularly at airports, seaports and national borders. This enables
them to share intelligence in real time and to access our range of global criminal databases.
With stolen travel documents used by terrorists, particularly foreign terrorist fighters returning
from conflict zones, it is particularly important that border security officers have direct access to
INTERPOL’s database of stolen and lost travel documents.
This project makes sure the target countries have the counter-terrorism expertise, equipment and
skills they need. Frontline officers are trained on how to use INTERPOL’s range of global
criminal databases during regional investigations and operations.

Integrated Border Management Task Force

Our task force supports law enforcement officers working at the frontline of border security.
We need to maintain close coordination with a wide range of stakeholders and improve data-
sharing capabilities to ensure we can follow the trail of criminals as they cross the globe.
Our Integrated Border Management Task Force (IBMTF) is the linchpin in this respect. Drawing
on varied expertise, it assists member countries to enhance their own border security by:
Running operations at air, land, and sea border points;
Screening people, travel documents, and vehicles against INTERPOL databases during
operations;

Using biometric data;


Providing access to INTERPOL databases that are not regularly available and focusing
enforcement efforts on certain crime areas;
Delivering training courses related to crime areas often seen at border points;
Improving worldwide border management policy through direct and indirect partnership with
member countries and international organizations.

Training frontline officers


We deliver training courses on basic security measures and crime-specific skills, which are then
consolidated through real-time operations designed to put those skills into practice.

Key training topics include:


Facial recognition;
Document fraud awareness;
Use of INTERPOL Mobile Devices (IMD);
INTERPOL policing capabilities (including INTERPOL notices and databases).
Border security operations
We also run border security operations with the cooperation of international partners and
member countries. These target fraudulent documents as well as persons subject to INTERPOL
notices and diffusions, and other specific crime areas of importance.
During these operations, we can extend access to INTERPOL’s databases on an ad-hoc basis.
The operations below are a good example of how local law enforcement can leverage
INTERPOL tools with impressive results.

Operation Manila
March and May 2022
Terrorist threats have increased in the East Asia-Pacific region in parallel with the rise of the
Islamic State of Iraq and Syria (ISIS). This is also due to increased cooperation and links
between pre-existing terrorist groups and the formation of new ones.
In this context, INTERPOL carried out border management operations in Manila in March and
May 2022. Of the 55 hits against INTERPOL’s databases, 42 were related to lost or stolen travel
documents. In locations such as Palawan, which does not have data connectivity, INTERPOL
deployed mobile equipment to allow for searches of fugitives, stolen or lost passports and stolen
vehicles.

Customs Police Operations Handbook


https://www.interpol.int/en/content/download/13478/file/CustomsPoliceCoopHandbook_EN_LR
.pdf
Guide for Delegates
a. Guide to Preparation
Preparing for a Model United Nations conference entails research on three levels: the procedure
and structure of the conference, the topic of the committee the delegate belongs to, and position
of the country being represented.
Procedural Research: This is a guide to the basic procedure that regulates the Model UN. This
can be divided into rules regarding speech and rules regarding writing. UNSC is a single
resolution committee, to emphasise the need for productive and unified action. Delegates
acquainted with this style of MUN should still review the details given below as the Conference
modifies procedure slightly to create a more engaging committee dynamic.
Topic Oriented Research: Each delegate is assigned to a certain committee and represents a
certain country/state/ individual within it. Each committee has a specific topic that will be
deliberated during the course of the conference. Delegates are given study guides, and these
should be the starting point for research. Other than published literature, academic papers and
news sites on the Internet can be valuable guides. Reuters, and AP are considered credible news
sources but we would also suggest the Congressional Research Service, the Social Science
Research Network and the Woodrow Wilson Centre database for scholarly papers. While
Wikipedia serves as a starting point for most people's basic country and topic research it is not
counted as a credible source and may not be quoted in committee.
Position Oriented Research: Committee topics are typically divisive and highly debatable.
Delegates, however, are not at liberty to form and represent their own opinions. They are
assigned nations, and their statements and actions within committee must be in line with the
foreign policy of the nation they are representing. The most challenging aspect of a Model UN is
adjusting to policy. Delegates are not allowed to raise caucuses that vary vastly from their topics
though slight digressions are allowed to facilitate debate Study Guides The Directors of each
committee prepare a document called a study guide. The study guide outlines the scope of the
topic. Delegates are expected to know their study guides well. Although the study guide is
detailed, additional research is a must.

b. Guide to Procedure
Language: English will be the official and working language of the conference.
Statement by the Secretariat: At any time any member of the Secretariat may make an oral or
written statement or announcement to the committee regarding an update of their topic. Such an
announcement is not questionable.
General Powers of the Committee Staff: The Director(s) will declare the opening and closing
of each meeting and may propose the adoption of any procedural motion at his or her discretion.
During Debate the committee staff has absolute control over the proceedings. The Director will
direct the flow of formal debate, accord the right to speak, put questions before the committee,
announce decisions, rule on points of order and ensure and enforce the observance of these rules.
The other members of committee staff may advise individual delegates or the committee on the
possible course of debate. The Committee Staff is responsible to the Secretariat at all times. The
Press Corps is free to publish any material that lies within the scope of this conference. It is
advised to refrain from the publication of offensive and derogatory material, especially if
targeted at a select group of persons. The Press enters and observes committee proceedings on
the basis that the committee has no significant objections to their presence.
Appeal: Delegates are free to appeal any decision made by the Director or Director. However, it
is the Director's prerogative to accept or reject any appeals. Should the appeal not be related to
immediate committee proceedings but the committee as a whole, the delegates may appeal to the
Secretary General. All appeals must be given in writing with a 200-word explanation as to its
cause. It must bear the signature of the faculty advisor or the head delegate of the delegation
represented.
Quorum: Quorum for the conference is set at one third of the members of the committee. A
quorum will be assumed to be present, unless specifically challenged and shown to be absent. A
roll call is not required. In case quorum fails, committee session will be suspended at the
discretion of the Secretary General.
On Debate: Once the agenda has been set, debate begins, and we start debate with the Speaker's
List. Now the way committee works is that you put your name on the Speaker's List (usually, the
Director asks people to raise their placards in the beginning, following which you submit chits to
the chair and they will ensure your name is tagged on to the end of the Speaker's List). In the
Speaker's List, each member nation gets control of the mike for a full minute and thirty seconds
(the time can be changed by motioning for the same), which is followed by either a yield
(explained in rules governing speeches) or the floor is thrown open to two comments (from other
member nations) which refers directly to the points made in that speaker's time. Therefore, those
whose names are on the Speaker's List control the debate. To counter this, delegates may (and
do) motion for a Moderated Caucuses on specific parts of the topic area. For example, if the
topic of the day were the Israel-Palestine conflict, at some point I would motion for a ten minute
moderated caucus, with an allotted time of thirty seconds per speaker, to discuss the passage of
Christian pilgrims. In that moderated caucus, if anyone strayed from the specific topic at hand, a
Point of Order could be called as a reprimand. Because the exchange is a rapid fire one, someone
raises a point, another person refutes it almost immediately, debate proceeds at a rate much
greater than that of the Speaker's List and within a mere ten minutes the whole committee would
hear a cross section of views on a specific topic. Committee Staff does not usually refuse
delegates the right to motion for moderated and unmoderated caucuses, but when, for example,
we have had over an hour of caucusing, they might feel that the committee is ignoring debate and
therefore refuse subsequent motions for caucusing.
Setting the Agenda: The agenda is limited to the single topic area outlined in each committee's
study guide thus voting to set the agenda to the topic area is mere formality. However. As soon
as committee begins, a motion to set the agenda to a topic area must be raised.
Debate: After the agenda has been determined, one continuously open Speaker's List will be
established for the purpose of general debate. The Speaker's List will be followed for all debate
on the Topic Area, except when procedural motions, amendments, or the introduction of a
resolution or amendment in the event of an international crisis suspends the list
Debate may be carried out through:
1. General Speaker's List
2. Special Speaker's List
3. Moderated Caucus
4. Unmoderated Caucus

 General Speaker’s List: The General Speaker's List is open throughout the discussion of the
topic area. Motions to open any other medium of debate will not close the General Speaker's
List, but will only overlap it. Hence, if your country is in queue to speak on it and another
medium of debate is opened, your country will remain that position once the General
Speaker's List is returned to. To get your country on the list, simply pass a note to a logistics
member. Speaker's List is ordered on a first come first serve basis provided that their name is
not already on the list. Anything within the scope of the topic area may be discussed. The
General Speaker's List may never be closed.

 Special Speaker’s List: The Special Speakers' List is almost like the General Speaker's List,
except that it must be motioned for. This is opened to discuss a particular topic within the
topic area, and is opened for a specific time period. While motioning to open it, the purpose
and time limit must be specified. Speakers may only discuss the issue that the Special
Speaker's List was opened to discuss. After a delegate finishes his/her speech, he has the
option of yielding. If a delegate chooses not to yield, two 30- second comments are in order.
After a speaker finishes a substantive speech (i.e. speech pertaining to the topic area within
the restrictions of formal debate), two thirty second comments pertaining to that speech may
be made. The comments will be made by two speakers who (usually by show of placards)
display their intent to the Director. It is at the Director's discretion that a delegate may make
comments. This applies to the General Speaker's List as well as any Special Speaker's List.

 Moderated Caucus: The purpose of a moderated caucus is to facilitate substantive debate at


critical junctures in the discussion. The approval of such a motion rests entirely in the hands
of the committee staff and is not subject to appeal. During a moderated caucus, the Director
will suspend the Speaker's List, and call on delegates to speak at his/her discretion. A
moderated caucus is also opened for a specified purpose and a specified time. In a moderated
Caucus, try to be precise and to the point. As far as possible, refrain from going off the
immediate, specific, subtopic. Please do not over-step your time limit.

 Unmoderated Caucus: This is essentially an informal discussion amongst delegates and has
no procedural rules. Delegates generally use it to formulate working papers or resolutions. It
must be motioned for, and it also requires a purpose and a specific time. Suspension or
Adjournment of Session: When the floor is open, a delegate may move to suspend or adjourn
the meeting. If such a motion is in order, it requires a majority to pass. A motion to adjourn
the meeting shall only be in order once three-quarters of the time allotted for the last meeting
of the committee has lapsed. Postponement or Resumption of Debate: When the floor is
open, a delegate may move to postpone debate on particular resolution or amendment
currently on the floor. The motion requires a two-thirds majority vote for its passage.

Closure of Debate: When the floor is open a delegate may move to close debate on a substantive
or procedural matter under discussion. When closure of debate is motioned for, the Director will
recognize two speakers against the motion. No speakers in favour of the motion shall be heard. If
the committee is in favour of closure, the Director will declare the closure of debate, and the
resolution or amendment being debated will be put to immediate vote.

Right of Reply: A delegate whose personal or national integrity has been affronted by that of
another delegate, within the scope of formal debate, may request the Director for the Right if
Reply. If approved by the Secretariat, the respective delegate will be severely reprimanded and
possibly excluded from further committee proceeding. Delegates are requested to employ the
Right of Reply with the utmost discretion.

Points

Point of Personal Privilege: Whenever a delegate experiences extreme discomfort, which


impairs him/her from partaking in the proceeding, he/she may rise to a Point of Personal
Privilege, so that the discomfort may be corrected. Such a point may interrupt a speaker and so
should be used with the utmost discretion.

Point of Order: During the discussion of any matter, a delegate may rise to a Point of Order, out
of order, dilatory or improper if he/she feels the point being made is invalid due to the set agenda
or to point out a factual inaccuracy. It may not however, interrupt a speaker.

Points of Parliamentary Inquiry: When the floor is open, a delegate may rise to a Point of
Parliamentary Inquiry to ask the Director a question regarding the rules of procedure. This
however, may never interrupt a speaker.
Point of Information: If any delegate wishes to raise a question based on the statements made
by another delegate during the formal debate session may do so by raising point of information.
This however, may never interrupt a speaker.

c. Paper Work
RESOLUTIONS
A draft resolution may be introduced when it has the required number of signatures as well as the
signature of the committee Director. There are no official sponsors of a resolution. Signatories
actually sign to see resolution on the floor in debate, and being a signatory in no way express
support for a resolution.
Introducing Resolutions: Once a resolution has the required signatories and is also approved by
the Director of that committee, it is copied, distributed and read out to the committee in
unmoderated caucus. Any two signatories of the resolution will read out the resolution, and this
reading is restricted to the operative clauses of the resolution. The minimum number of
signatories required is 1/5th of the total strength
Amendments: Delegates may amend any resolution that has been introduced to committee. An
amendment requires the same number of signatures of members as the resolution as well as the
signature of the Director. Amendments to amendments are out of order, however, an amended
part may be further amended. There are no official sponsors to amendments. An approved
amendment may be introduced when the floor is open. The General Speaker's List will be
suspended, and a Special Speaker's List will be established for debate on the amendment.
At this point, the Director will take any further motions to divide the question so that the
resolution clauses can be voted upon independently. If an objection is made to a motion to divide
the question, which motion will be debated to the extent of two speakers for and against, and will
then be followed by an immediate vote on that motion.
If the motion receives a simple majority required for passage, the resolution shall be divided
accordingly, and a separate vote shall be taken on each divided part to determine whether or not
it is in the final draft. Parts of the substantive proposals, which are subsequently passed shall be
recombined into the final resolution and shall be put to a substantive vote as a whole. If all the
operative parts of the proposal are rejected, the subsequent resolution or amendment will be
considered as rejected as a whole.
Voting: Each country will have one vote. Each vote can be a "Yes", "No", "Yes with Rights",
"No with Rights", "Abstain" or "Pass". Should a member not be present and voting during a
substantive vote, that member shall have not voted (technically equivalent to "Abstain"). All
votes on substantive issues will be conducted by roll call. No outside observers may be present
during a vote, and the Director shall ensure that the room is sealed before proceeding with the
vote. Voting may be interrupted only by a point of personal Privilege. During a Roll Call Vote,
the Director will assume control of the committee.
During the first round of voting, delegates may vote for their member nations in alphabetical
order, choosing to vote a "Yes", "No", "Yes with Rights", No with Rights", "Abstain" or "Pass".
A delegate from a member nation, which does not pass, may request the right to explain his\ her
vote.
A member nation that passes in the first sequence must vote during the second sequence. The
rights to explain that member nation's vote are suspended in this second round. Member nations
who requested the right to explain their votes may do so, with a time limit set by the Director. A
third sequence will ensue in which members may change their votes by expressing this desire, in
writing to the Director. After allowing a pause in committee session for those who wish to
change their votes, the Director will tabulate and announce the final result. Following which the
door of the hall will reopen.

On Resolution Writing
Before it is formally introduced to the committee, a resolution is referred to as a Draft
Resolution. The Director of your committee would like all drafts to deal with ideas and opinions
presented in working papers and existing resolutions, as well as new ideas and innovations.
Remember, a final resolution has to present a well thought out, feasible solution that will solve
the crisis at hand. Your draft resolution should present the same logical flow that will be present
in the final resolution. A sample resolution is presented later in this conference handbook. A
draft resolution needs three things before it can be introduced to the floor. First, it needs the
signatures (but not approval) of at least 1/5th of the total members to that committee. A word
about signing - being a signatory in no way signifies approval for that resolution, you are not
bound to vote for or against a resolution just by being a signatory. Being a signatory merely
implies that you feel that this resolution should be introduced to formal debate. You are signing
to introduce a resolution to debate - no more, no less. Secondly, a resolution needs to present a
logical, simple and above all feasible solution to the situation at hand. Working papers may
contain the most imaginative and creative ideas, but in a resolution these ideas have to stand up
against the real world.

The draft resolution has to be extensive enough to cover the entire topic area. Thirdly, a
resolution needs authors, who will actually be sponsors (although are not officially recognized as
such), and who are willing to amend and emend the resolution until it suits everybody else,
without compromising the meaning or original premises of the resolution. Amending a resolution
is just like writing the resolution itself. Your amendment has to be presented in resolution
format, and along with it you should submit a short note specifying which parts of the resolution
you wish to amend, as a cause of your amendment (renumbering, change of tense, etc.)

Voting proceeds in three rounds - in the first of which you can ask for voting rights - which
implies that between the second and third rounds you may express your reasons for changing
your vote. If you choose to change your vote in the second round, your rights are null and void.
The first two rounds proceed in alphabetical order by roll call and the last by show of placards
The title should be centered, and can be as simple as "Draft Resolution". Other headings include
Committee and Topic Area, both of which should be left aligned and presented below the title.
Body: The resolution is technically a long sentence, with the following rules:
 The resolution begins with your committee name (look to example).
 The next section consists of Pre-ambulatory Clauses that describe the problem being
addressed. Pre-ambulatory clauses should include references to past action taken,
history of the problem and should offer support to the purpose of the resolution. Each
clause should begin with an italicized phrase and end with a comma (,).
 Operative clauses are numbered and state action to be taken by the committee.
 These clauses begin with present tense active verbs, which are generally stronger
words than those used in the preamble. Each operative clause is followed by a
semicolon (;), except for the last which ends with a period/full stop (.).
WORKING PAPERS
Delegates may propose working papers for committee consideration. Working Papers are
intended to aid the committee in its discussion and formulation of resolutions and need not be
written in resolution format. Working Papers require the signature of the Director to be copied
and distributed. They are concise and an abridged form of the resolution. Working papers
represent the first step in the process of resolution writing. The wonderful thing about working
papers is that unlike other formal documents in a MUN, they are absolutely informal. They
require no signatories, have no absolute format, and can be about anything under your topic area.
All they require for photocopying and distribution is the seal of approval from your Director.
Format: Usually they are presented in the form of a one page draft, but not necessarily so. In my
MUN experience, I have seen working papers in the form of cartoons, in complete resolution
format, as essays.
The only thing they have in common is that they are concise and to the point. Just because they
are informal does not mean they ramble on for pages - in fact, I have never seen a working page
longer than three pages, and most tend to restrict themselves to one. What makes a good working
paper: We have provided a sample one that has all the prominent features of a good working
paper - it makes a good template to base part of a resolution on.

You might also like