{"id":6669,"date":"2021-04-08T17:06:00","date_gmt":"2021-04-08T17:06:00","guid":{"rendered":"https:\/\/iij.fifthtribe.com\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/"},"modified":"2022-03-17T15:57:50","modified_gmt":"2022-03-17T15:57:50","slug":"iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2","status":"publish","type":"event","link":"https:\/\/theiij.org\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/","title":{"rendered":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions"},"content":{"rendered":"\n<p>In April&nbsp;2021, the IIJ convened the second iteration of the&nbsp;IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions,&nbsp;with support from the U.S. Department of State<em>.<\/em>&nbsp;The workshop, delivered in an online format due to the ongoing COVID-19 pandemic-related restrictions, included both a sectoral and regional focus, bringing together 34 judges, prosecutors and investigators from Benin, Burkina Faso, Cameroon, Mali and Niger.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1-1024x572.jpg\" alt=\"\" data-id=\"11002\" data-full-url=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1.jpg\" data-link=\"https:\/\/www.theiij.org\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/core-course-april-2021-1\/\" class=\"wp-image-11003\" srcset=\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1-1024x572.jpg 1024w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1-300x168.jpg 300w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1-768x429.jpg 768w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-1.jpg 1210w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>The main objectives of this workshop were to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>deepen criminal justice sector practitioners\u2019 appreciation for the value of using intelligence to generate evidence for terrorism investigations and prosecutions;<\/li><li>increase their knowledge of the challenges in doing so, and of strategies for addressing these challenges; and<\/li><li>build more effective and rule of law-based counter-terrorism capabilities and capacities.<\/li><\/ul>\n\n\n\n<p>The IIJ, together with four keynote speakers from Switzerland and the United States, convened three interactive sessions on Intelligence Analysis &amp; Collection, Terrorist Explosive Devices and Crime Scene Evidence, and Mutual Legal Assistance. Each session included a video presentation by a keynote speaker and concluded with a hypothetical case study exercise. During the course\u2019s dynamic discussions, practitioners shared their perspectives, insights and personal experiences on the gathering, handling and preserving of evidence, inter-agency cooperation, judicial investigations, and regional and international cooperation.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2-1024x572.jpg\" alt=\"\" data-id=\"11005\" data-full-url=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2.jpg\" data-link=\"https:\/\/www.theiij.org\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/core-course-april-2021-2\/\" class=\"wp-image-11006\" srcset=\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2-1024x572.jpg 1024w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2-300x168.jpg 300w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2-768x429.jpg 768w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-april-2021-2.jpg 1210w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>The&nbsp;first iteration&nbsp;of this workshop was delivered in Malta in July 2019 and engaged more than 55 practitioners from Cameroon, Canada, C\u00f4te d\u2019Ivoire, Ethiopia, Kenya, Lebanon, Mali, Malta, Morocco, Niger, Nigeria, Senegal, Sri Lanka, Switzerland, Tunisia, the United Kingdom and the United States to examine and evaluate success factors, obstacles, and lessons learned, as well as strategies to facilitate the successful use of intelligence to generate evidence. The workshop provided a platform for judges, prosecutors, and investigators to examine a series of 13 hypothetical scenarios based on real-world cases in which intelligence-derived evidence was used in criminal investigations and prosecutions.&nbsp;<\/p>\n\n\n\n<p><em>For more information on the IIJ Core Course, please contact Director, Programmatic Unit, <a href=\"mailto:maloneg@theiij.org\">Gail Malone<\/a>. <\/em><\/p>\n","protected":false},"featured_media":3563,"template":"","event_type":[184],"event_topic":[210],"pages_relationship":[81],"event_category":[],"class_list":["post-6669","event","type-event","status-publish","has-post-thumbnail","hentry","event_type-workshops-ar","event_topic-core-ar","pages_relationship-iij-core-course"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"og:description\" content=\"In April&nbsp;2021, the IIJ convened the second iteration of the&nbsp;IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions,&nbsp;with support from the U.S. Department of State.&nbsp;The workshop, delivered in an...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-17T15:57:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1210\" \/>\n\t<meta property=\"og:image:height\" content=\"676\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/\",\"url\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/\",\"name\":\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\",\"isPartOf\":{\"@id\":\"https:\/\/cms.soundme.app\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg\",\"datePublished\":\"2021-04-08T17:06:00+00:00\",\"dateModified\":\"2022-03-17T15:57:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg\",\"width\":1210,\"height\":676},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/theiij.org\/ar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cms.soundme.app\/#website\",\"url\":\"https:\/\/cms.soundme.app\/\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"description\":\"Building the Capacity of Criminal Justice Practitioners\",\"publisher\":{\"@id\":\"https:\/\/cms.soundme.app\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cms.soundme.app\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cms.soundme.app\/#organization\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"url\":\"https:\/\/cms.soundme.app\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"width\":436,\"height\":436,\"caption\":\"The International Institute for Justice and the Rule of Law\"},\"image\":{\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/","og_locale":"ar_AR","og_type":"article","og_title":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","og_description":"In April&nbsp;2021, the IIJ convened the second iteration of the&nbsp;IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions,&nbsp;with support from the U.S. Department of State.&nbsp;The workshop, delivered in an...","og_url":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/","og_site_name":"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","article_modified_time":"2022-03-17T15:57:50+00:00","og_image":[{"width":1210,"height":676,"url":"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/","url":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/","name":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","isPartOf":{"@id":"https:\/\/cms.soundme.app\/#website"},"primaryImageOfPage":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage"},"image":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage"},"thumbnailUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg","datePublished":"2021-04-08T17:06:00+00:00","dateModified":"2022-03-17T15:57:50+00:00","breadcrumb":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#primaryimage","url":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/EyYBExqXIAMpwEV-1.jpg","width":1210,"height":676},{"@type":"BreadcrumbList","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-course-using-information-derived-from-intelligence-to-generate-evidence-for-terrorist-investigations-and-prosecutions-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/theiij.org\/ar\/"},{"@type":"ListItem","position":2,"name":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence for Terrorist Investigations and Prosecutions"}]},{"@type":"WebSite","@id":"https:\/\/cms.soundme.app\/#website","url":"https:\/\/cms.soundme.app\/","name":"The International Institute for Justice and the Rule of Law","description":"Building the Capacity of Criminal Justice Practitioners","publisher":{"@id":"https:\/\/cms.soundme.app\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cms.soundme.app\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/cms.soundme.app\/#organization","name":"The International Institute for Justice and the Rule of Law","url":"https:\/\/cms.soundme.app\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/","url":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","width":436,"height":436,"caption":"The International Institute for Justice and the Rule of Law"},"image":{"@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event\/6669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media\/3563"}],"wp:attachment":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media?parent=6669"}],"wp:term":[{"taxonomy":"event_type","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_type?post=6669"},{"taxonomy":"event_topic","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_topic?post=6669"},{"taxonomy":"pages_relationship","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/pages_relationship?post=6669"},{"taxonomy":"event_category","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_category?post=6669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}