{"id":6789,"date":"2019-02-13T17:22:00","date_gmt":"2019-02-13T17:22:00","guid":{"rendered":"https:\/\/iij.fifthtribe.com\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/"},"modified":"2021-10-06T15:24:34","modified_gmt":"2021-10-06T15:24:34","slug":"iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions","status":"publish","type":"event","link":"https:\/\/theiij.org\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/","title":{"rendered":"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions"},"content":{"rendered":"\n<p>In February 2019, the IIJ convened a Curriculum Development Expert Meeting for a new IIJ Core Course on Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions. The Expert Meeting, held in Malta with the support of the U.S. Department of State, brought together 20 practitioners and experts, among them representatives of 13 different countries from across Africa, Europe, the Middle East, and North America. The group included adult education, judicial and prosecutorial training specialists, as well as judges, prosecutors, and investigators with deep experience in this area.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/mlqwhsp1u9p8.i.optimole.com\/OM5RUNw-WzSklyq2\/w:auto\/h:auto\/q:auto\/https:\/\/www.theiij.org\/wp-content\/uploads\/430-copy.jpg\" alt=\"I2E photo Hop KO\"\/><\/figure>\n\n\n\n<p>During the two-day workshop, the participants discussed the challenges that practitioners from different regions face in using intelligence information and materials in civilian criminal investigations and prosecutions of terrorism crimes.&nbsp; Practitioners presented on specific investigations they had led, cases they had prosecuted or adjudicated, and legislation they had relied on in their work, all involving the use of classified intelligence.&nbsp;They discussed similarities and differences in how their countries\u2019 systems (both common and civil law) address the twin challenges of protecting the sources that collected intelligence and methods of collection while at the same time ensuring that a defendant\u2019s right to a fair trial is upheld.&nbsp;These experts made a significant contribution to the development of the new curriculum, which the IIJ will offer to justice sector practitioners twice a year, beginning later in 2019.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/mlqwhsp1u9p8.i.optimole.com\/OM5RUNw-cDN2RadV\/w:auto\/h:auto\/q:auto\/https:\/\/www.theiij.org\/wp-content\/uploads\/I2E-photo-Hop-KO-1.jpg\" alt=\"I2E photo Hop KO\"\/><\/figure>\n\n\n\n<p><em>For more information on the IIJ Core Course, please contact Director, Programmatic Unit, <a href=\"mailto:maloneg@theiij.org\">Gail Malone<\/a>. <\/em><\/p>\n","protected":false},"featured_media":3543,"template":"","event_type":[184],"event_topic":[210],"pages_relationship":[81],"event_category":[],"class_list":["post-6789","event","type-event","status-publish","has-post-thumbnail","hentry","event_type-workshops-ar","event_topic-core-ar","pages_relationship-iij-core-course"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"og:description\" content=\"In February 2019, the IIJ convened a Curriculum Development Expert Meeting for a new IIJ Core Course on Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions. The Expert Meeting, held in Malta with the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-06T15:24:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/\",\"url\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/\",\"name\":\"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\",\"isPartOf\":{\"@id\":\"https:\/\/cms.soundme.app\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg\",\"datePublished\":\"2019-02-13T17:22:00+00:00\",\"dateModified\":\"2021-10-06T15:24:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/theiij.org\/ar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cms.soundme.app\/#website\",\"url\":\"https:\/\/cms.soundme.app\/\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"description\":\"Building the Capacity of Criminal Justice Practitioners\",\"publisher\":{\"@id\":\"https:\/\/cms.soundme.app\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cms.soundme.app\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cms.soundme.app\/#organization\",\"name\":\"The International Institute for Justice and the Rule of Law\",\"url\":\"https:\/\/cms.soundme.app\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"contentUrl\":\"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png\",\"width\":436,\"height\":436,\"caption\":\"The International Institute for Justice and the Rule of Law\"},\"image\":{\"@id\":\"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/","og_locale":"ar_AR","og_type":"article","og_title":"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","og_description":"In February 2019, the IIJ convened a Curriculum Development Expert Meeting for a new IIJ Core Course on Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions. The Expert Meeting, held in Malta with the...","og_url":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/","og_site_name":"\u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","article_modified_time":"2021-10-06T15:24:34+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/soundme.app\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"1 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/","url":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/","name":"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions - \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u062f\u0648\u0644\u064a \u0644\u0644\u0639\u062f\u0627\u0644\u0629 \u0648\u0633\u064a\u0627\u062f\u0629 \u0627\u0644\u0642\u0627\u0646\u0648\u0646","isPartOf":{"@id":"https:\/\/cms.soundme.app\/#website"},"primaryImageOfPage":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage"},"image":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage"},"thumbnailUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg","datePublished":"2019-02-13T17:22:00+00:00","dateModified":"2021-10-06T15:24:34+00:00","breadcrumb":{"@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#primaryimage","url":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2021\/09\/I2E-photo-Hop-KO-1.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/soundme.app\/ar\/event\/iij-core-curriculum-using-intelligence-to-generate-evidence-for-terrorism-investigations-and-prosecutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/theiij.org\/ar\/"},{"@type":"ListItem","position":2,"name":"IIJ Core Course: Using Intelligence to Generate Evidence for Terrorism Investigations and Prosecutions"}]},{"@type":"WebSite","@id":"https:\/\/cms.soundme.app\/#website","url":"https:\/\/cms.soundme.app\/","name":"The International Institute for Justice and the Rule of Law","description":"Building the Capacity of Criminal Justice Practitioners","publisher":{"@id":"https:\/\/cms.soundme.app\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cms.soundme.app\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/cms.soundme.app\/#organization","name":"The International Institute for Justice and the Rule of Law","url":"https:\/\/cms.soundme.app\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/","url":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","contentUrl":"https:\/\/theiij.org\/wp-content\/uploads\/2022\/01\/IIJ_Logo_Arabic-2.png","width":436,"height":436,"caption":"The International Institute for Justice and the Rule of Law"},"image":{"@id":"https:\/\/cms.soundme.app\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event\/6789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media\/3543"}],"wp:attachment":[{"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/media?parent=6789"}],"wp:term":[{"taxonomy":"event_type","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_type?post=6789"},{"taxonomy":"event_topic","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_topic?post=6789"},{"taxonomy":"pages_relationship","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/pages_relationship?post=6789"},{"taxonomy":"event_category","embeddable":true,"href":"https:\/\/theiij.org\/ar\/wp-json\/wp\/v2\/event_category?post=6789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}