The reforms discussed above have created robust mechanisms through which INTERPOL is
broadly able to identify and prevent misuse of its systems. Nevertheless, some governments
persist in attempting to misuse INTERPOL notices and diffusions for political and other
inappropriate purposes contrary to INTERPOL’s constitution and rules.
Governments attempting to misuse INTERPOL communications for purposes of transnational
repression may seek the publication of red notices and wanted person diffusions for individuals
based on politically motivated charges or send targeted diffusions for individuals to specific
other governments that may wittingly or unwittingly assist or facilitate the repressive activity.
Governments seeking to misuse INTERPOL systems tend not to cite political offenses in their
red notices or diffusions, but instead cite what appear on their face to be ordinary law crimes,
such as fraud, financial crimes, terrorism,
1
and other offenses that would not facially conflict
with INTERPOL’s constitution and/or rules but are in fact fabricated charges or cases based on
weak information or loose associations. In such cases, in the absence of open source information
on the situation, or information from other INTERPOL member countries, it can be difficult for
NDTF as well as the other member countries to distinguish legitimate notices or diffusions from
those based on political motives.
As noted above, all red notices are reviewed by the NDTF for compliance with INTERPOL’s
constitution and rules prior to their publication, whereupon they are disseminated to all
INTERPOL member states and visible in INTERPOL’s database. Wanted person diffusions,
which can be sent selectively by member countries’ National Central Bureaus (NCBs) to other
countries’ NCBs, undergo the same review by the NDTF as red notices, but only after they have
already been sent and received by the recipient NCBs. If approved on review, a diffusion is
recorded in INTERPOL’s database; disapproval results in a message to all recipient NCBs
stating that the diffusion was found to be non-compliant and no further action should be taken on
it. Because diffusions may be limited in distribution and undergo review only after the fact, they
are presumably the most commonly exploited INTERPOL communication. However, the extent
to which diffusions are misused cannot be fully confirmed as diffusions are not visible to all
members of INTERPOL. For example, a country could send a diffusion immediately to select
recipients to provide information and request detention of an individual without scrutiny from
INTERPOL or the knowledge of non-recipient countries until after the diffusion has been
received and repressive action potentially already taken. It is important to underscore, however,
that the immediacy and selectivity which characterize the use of diffusions also greatly benefit
legitimate law enforcement efforts. The United States uses diffusions extensively and effectively
in time-sensitive matters when operational security and protection of sensitive investigative
information are required.
While the review process for red notices and diffusions conducted by INTERPOL’s NDTF is
confidential and information concerning that process and the NDTF’s findings is not available to
member countries, including the United States, we understand that the review process includes
review for compliance with the requirements of the INTERPOL constitution and Rules for
Processing Data (RPD). This review includes public source research on each case, and
1
Freedom House, Out of Sight, Not Out of Reach: The Global Scale and Scope of Transnational Repression,
February 2021, https://freedomhouse.org/report/transnational-repression
.