{"id":6762,"date":"2019-07-26T17:12:00","date_gmt":"2019-07-26T17:12:00","guid":{"rendered":"https:\/\/iij.fifthtribe.com\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/"},"modified":"2022-03-17T16:08:59","modified_gmt":"2022-03-17T16:08:59","slug":"iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions","status":"publish","type":"event","link":"https:\/\/theiij.org\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/","title":{"rendered":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions"},"content":{"rendered":"\n<p>In July 2019, the IIJ convened the first iteration of the newly developed IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions. The Core Course, held in Malta with the support of the U.S. Department of State, brought together more than 55 practitioners, among them representatives from Cameroon, Canada, C\u00f4te d\u2019Ivoire, Ethiopia, Kenya, Lebanon, Mali, Malta, Morocco, Niger, Nigeria, Senegal, Sri Lanka, Switzerland, Tunisia, the United Kingdom and the United States.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"577\" src=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-1.jpg\" alt=\"\" data-id=\"11023\" data-full-url=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-1.jpg\" data-link=\"https:\/\/www.theiij.org\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/core-course-july-2019-1\/\" class=\"wp-image-11024\" srcset=\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-1.jpg 866w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-1-300x200.jpg 300w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-1-768x512.jpg 768w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>The Core Course provided a platform for judges, prosecutors and investigators to examine a series of hypothetical scenarios based on real-world cases in which intelligence-derived evidence was used in criminal investigations and prosecutions, and the legal frameworks necessary to admit such evidence.&nbsp; Participants discussed challenges faced when investigating and prosecuting cases with sensitive intelligence information, including the challenge of protecting national security while ensuring fair trials. They also shared views on broadening and enhancing trial-level judges and criminal justice actors\u2019 knowledge of legal mechanisms, strategies, international norms and GCTF good practices for the improved handling of terrorism cases.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-1024x577.jpg\" alt=\"\" data-id=\"11026\" data-full-url=\"https:\/\/www.theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2.jpg\" data-link=\"https:\/\/www.theiij.org\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/core-course-july-2019-2\/\" class=\"wp-image-11027\" srcset=\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-1024x577.jpg 1024w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-300x169.jpg 300w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-768x432.jpg 768w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-1536x865.jpg 1536w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2-1280x721.jpg 1280w, https:\/\/theiij.org\/wp-content\/uploads\/2022\/03\/core-course-july-2019-2.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p><em>For more information on the IIJ Core Course, please contact Director, Programmatic Unit, <a href=\"mailto:maloneg@theiij.org\">Gail Malone<\/a>. <\/em><\/p>\n","protected":false},"featured_media":3557,"template":"","event_type":[184],"event_topic":[210],"pages_relationship":[81],"event_category":[],"class_list":["post-6762","event","type-event","status-publish","has-post-thumbnail","hentry","event_type-workshops-ar","event_topic-core-ar","pages_relationship-iij-core-course"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"og:description\" content=\"In July 2019, the IIJ convened the first iteration of the newly developed IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions. The Core Course, held in Malta with...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-17T16:08:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/2-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1081\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/\",\"url\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/\",\"name\":\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\",\"isPartOf\":{\"@id\":\"https:\/\/cms.soundme.app\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg\",\"datePublished\":\"2019-07-26T17:12:00+00:00\",\"dateModified\":\"2022-03-17T16:08:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg\",\"width\":1920,\"height\":1081},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/theiij.org\/ar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cms.soundme.app\/#website\",\"url\":\"https:\/\/cms.soundme.app\/\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"description\":\"Building the Capacity of Criminal Justice Practitioners\",\"publisher\":{\"@id\":\"https:\/\/cms.soundme.app\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cms.soundme.app\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cms.soundme.app\/#organization\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"url\":\"https:\/\/cms.soundme.app\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"width\":436,\"height\":436,\"caption\":\"The International Institute for Justice and the Rule of Law\"},\"image\":{\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/","og_locale":"ar_AR","og_type":"article","og_title":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","og_description":"In July 2019, the IIJ convened the first iteration of the newly developed IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions. The Core Course, held in Malta with...","og_url":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/","og_site_name":"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","article_modified_time":"2022-03-17T16:08:59+00:00","og_image":[{"width":1920,"height":1081,"url":"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/2-5.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"1 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/","url":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/","name":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","isPartOf":{"@id":"https:\/\/cms.soundme.app\/#website"},"primaryImageOfPage":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage"},"image":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage"},"thumbnailUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg","datePublished":"2019-07-26T17:12:00+00:00","dateModified":"2022-03-17T16:08:59+00:00","breadcrumb":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#primaryimage","url":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/2-5.jpg","width":1920,"height":1081},{"@type":"BreadcrumbList","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-information-derived-from-intelligence-to-generate-evidence-in-terrorism-investigations-and-prosecutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/theiij.org\/ar\/"},{"@type":"ListItem","position":2,"name":"IIJ Core Course: Using Information Derived from Intelligence to Generate Evidence in Terrorism Investigations and Prosecutions"}]},{"@type":"WebSite","@id":"https:\/\/cms.soundme.app\/#website","url":"https:\/\/cms.soundme.app\/","name":"The International Institute for Justice and the Rule of Law","description":"Building the Capacity of Criminal Justice Practitioners","publisher":{"@id":"https:\/\/cms.soundme.app\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cms.soundme.app\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/cms.soundme.app\/#organization","name":"The International Institute for Justice and the Rule of Law","url":"https:\/\/cms.soundme.app\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/","url":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","width":436,"height":436,"caption":"The International Institute for Justice and the Rule of Law"},"image":{"@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event\/6762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media\/3557"}],"wp:attachment":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media?parent=6762"}],"wp:term":[{"taxonomy":"event_type","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_type?post=6762"},{"taxonomy":"event_topic","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_topic?post=6762"},{"taxonomy":"pages_relationship","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/pages_relationship?post=6762"},{"taxonomy":"event_category","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_category?post=6762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}