This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here
https://flevy.com/browse/business-document/countering-cash-in-transit-attacks-3633
DOCUMENT DESCRIPTION
Countering CIT attacks need proper planning, and needs a proper concept of operations. This scientific approach to planning is sorely lacking. This presentation was done during 2018 to a Middle Eastern client, using the South African example. The author was previously also a member of the South African CIT Forum, and in fact developed that organisation's CONOPS.
1. 1
The Need for Jointness* – May 2018
Ian van Vuuren
*Jointness is not simply cooperation. It encompasses a fusion of resources and minds
around the pursuit of a common objective. It takes the best of whatever capability each
organisation can offer for the achievement of specific crime fighting objectives. It
involves inter alia planning together, identifying objectives together, and employing and
tasking job-specific resources. It is an approach to achieve synergy in a resource
constrained crime fighting environment.
COUNTERING CASH-IN-TRANSIT CRIME
2. 4
Purpose of a CONOPS
To facilitate effective crime control operations by the relevant CIT JOC
against all CIT-related crimes within South Africa, and where relevant, the
region. To accomplish this the JOC:
• Establishes a structure for a systematic, coordinated and effective
response to CIT-related crimes – see IAF.
• Defines procedures for the JOC and CIT resources to augment and
support the efforts of the PPP – who are the PPP?
• Encompass daily risk, incident and consequence management
responsibilities.This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
3. 7
Planning Assumptions and Considerations
• No single member of the PPP possesses the capability or expertise to
act unilaterally.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
4. 10
Planning Assumptions and Considerations (cont’d)
Person State
Company/
Market
LeadershipLeadership
ProcessesProcesses
InfrastructureInfrastructure
EnvironmentEnvironment
Criminal
Groupings
Criminal
Groupings
Brain
Circulatory,
Neuro System
Bones, Muscle
Cells
Leukocytes
President, Key
Media, Policy
Makers
Communications
Energy
Highways
Demographic
Groups
Military, Police,
Merchants, Agencies
CEO, Board,
Market Leaders
Innovation,
Finance,
Communications
Plants, Value
Networks,
Installed Base
Employee Groups,
Customers
Sales, Buyers,
Retail Outlets
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
5. 13
Planning Assumptions and Considerations (cont’d)
• No single member of the PPP possesses the capability or expertise to
act unilaterally.
• Incidents may occur at any time of day with little or no early warning.
• The following principles drive crime control operations:
– Crime control can conduct parallel operations at all levels of the crime
landscape, simultaneously.
– Whoever controls the CIT crime space generally has the initiative.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
6. 16
Planning Assumptions and Considerations (cont’d)
• No single member of the PPP possesses the capability or expertise to
act unilaterally.
• Incidents may occur at any time of day with little or no early warning.
• The following principles drive crime control operations:
– Crime control can conduct parallel operations at all levels of the crime
landscape, simultaneously.
– Whoever controls the CIT crime space generally has the initiative.
– Crime has inherently strategic effects on business operations.
– Crime control should primarily be approached offensively.
– In essence, crime control operations is targeting, targeting is intelligence, and
intelligence is analysing the effects of crime control operations.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
7. 19
Planning Assumptions and Considerations (cont’d)
• No single member of the PPP possesses the capability or expertise to
act unilaterally.
• Incidents may occur at any time of day with little or no early warning.
• The following principles drive crime control operations:
– Crime control can conduct parallel operations at all levels of the crime
landscape, simultaneously.
– Whoever controls the CIT crime space generally has the initiative.
– Crime has inherently strategic effects on business operations.
– Crime control should primarily be approached offensively.
– In essence, crime control operations is targeting, targeting is intelligence, and
intelligence is analysing the effects of crime control operations.
– Crime produces physical and psychological shock to business and clients.
– Intelligence’s unique characteristics necessitate that it be centrally controlled by
specialists.
– Technology and Intelligence are integrally and synergistically related.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
8. 22
Characteristics of the CIT Threat Environment
(cont’d)
• There exists a disharmony in terms of the numbers of perpetrators vis-
à-vis the strategic effect they manage to exert on business. Small
numbers (of criminals) can therefore have a disproportionate impact
on business operations.
• The CIT environment need to unite efforts to close down the crime
space to own terms.
• Law enforcement agencies at present do not control the crime space –
this needs to be done. Criminals’ freedom of movement should be
curtailed.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
9. 25
Characteristics of the CIT Threat Environment
(cont’d)
• Quick, effective and sustained response to crime threats and incidents
should be the status quo – this is not presently the case.
• Crime control strategies should also consider targeting the crime risk
factors.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
10. 28
Characteristics of the CIT Threat Environment
(cont’d)
• Quick, effective and sustained response to crime threats and incidents
should be the status quo – this is not presently the case.
• Crime control strategies should also consider targeting the crime risk
factors.
• Organised crime groups are becoming an increasing problem.
• Criminals increasingly use the porous borders to their advantage.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/countering-cash-in-transit-attacks-3633
11. 1
Flevy (www.flevy.com) is the marketplace
for premium documents. These
documents can range from Business
Frameworks to Financial Models to
PowerPoint Templates.
Flevy was founded under the principle that
companies waste a lot of time and money
recreating the same foundational business
documents. Our vision is for Flevy to
become a comprehensive knowledge base
of business documents. All organizations,
from startups to large enterprises, can use
Flevy— whether it's to jumpstart projects, to
find reference or comparison materials, or
just to learn.
Contact Us
Please contact us with any questions you may have
about our company.
• General Inquiries
support@flevy.com
• Media/PR
press@flevy.com
• Billing
billing@flevy.com