CRIMINAL INTELLIGENCE
OBJECTIVES
By the end of the session, the participants
should be able to;
Understand the meaning of Criminal
Intelligence
Understand the meaning of Surveillance
Appreciate and be able to apply the use of
Criminal Intelligence in Law Enforcement.
CRIMINAL INTELLIGENCE
1. Introduction:
Criminal Intelligence is vital in enhancing the
effectiveness of law enforcement agencies to deal
with serious crimes.
It provides knowledge on which to base decisions
and select appropriate targets (individuals, groups
corporations, networks) for investigations.
Intelligence provides law enforcement agencies the
ability to effectively manage resources, budget and
forecast community threats to prevent crime
CRIMINAL INTELLIGENCE
2. What is Criminal Intelligence?
“… process which provides information on
suspected criminals and/or organizations that
allows law enforcement authorities to establish
a pro-active response to crime” (Harris 1976:1-
8, Aumond 1998:35-36)
CRIMINAL INTELLIGENCE
3. Definition of Intelligence:
Is the final product created through the process of
collecting, collating and analyzing data. The end
product of analyzed information to relevant
agencies/sections to assist in making decisions. This
is done purely on a need to know basis.
Intelligence is used as a way of enhancing
proactivity in management both in public and
corporate sectors. It is less expensive to act based
on intelligence as compared to reacting to emerging
situations.
CRIMINAL INTELLIGENCE
4. Information and Intelligence:
Information: knowledge in raw form from
which intelligence is derived.
Intelligence: is information capable of being
understood; it has “added value ” & is evaluated
in context to its source & reliability.
Raw data/Information is subjected to a process
after which the reliability and validity is gauged
to determine the intelligence value in it.
Criminal Intelligence
Gathering
Definition:
Is the process of developing raw
information into usable intelligence
through a series of interdependent
functions.
Pieces
Pieces
of
Pieces
Pieces
of of of Intelligence
information
information
information
information
Processed &
Bits &pieces Interpreted
Why do we need the
Intelligence Cycle ?
Ensure focused intelligence efforts
Ensure proper management of
resources & information
Critical to effective functioning of
Intelligence
Intelligence Process
• Planning and direction
• Collection
• Information processing & Collation
• Analysis and Production
• Dissemination
Intelligence Cycle
Step 1: Planning and Direction
Is driven by the needs of the client
Identify customers & determine the
mission of the unit
Scan the environment
Identify and select problem / subjects /
conditions
Continued
Step 2: Collection – Planning
Intelligence process relies on the ability to
obtain and use data
Receive information requirements and
identify objectives
Select appropriate collection methods
Focus collection activities
Continued
Collection - Methods
Covert Methods
Surveillance
UnwittingSources / Informants / Jail
Conversations
Undercover Operatives
Overt Methods
Media
Public Records and Databases
Street Interviews / Jail Interviews
Continued
Collection – Networks
Identify Various Sources of Information Networks
Country’s Law Enforcement Agencies
Police, EACC, NIS, KWS, KFS etc.
State and Local
International Enforcement
Military
Intelligence Community
Open Source Reporting – Internet
Collection databases
Continued
Collection – Evaluation
Accurate -- Relevant -- Timely
Reliability
Consistency of the Source
Validity
Accuracy of the Information
Continued
Covert Collection Considerations
Human Intelligence- Potential Motivations
Money
Quid pro quo
Ideology
Fascination with law enforcement
Personal disputes
Conscience
Step 3: Processing and Collation
Assembling information in proper order
Sorting and organizing information into
categories or a logical sequence
Rapid and selective storage and
retrieval system
Audit trails and audit and purging of files
Processing and
Collation
Collationis transfer of collected
information and/or intelligence into a
storage system (filing
cabinets/computerized data base)
Charts:
The chart is used to present
associations between individuals
and organizations which facilitates
the development of inferences.
Processing and Collation
The following steps should be followed to
create an chart:
Gather all the information obtained through
reports, interviews, surveillance, and other
methods.
Read all the documents to determine names,
organizations, telephone numbers, addresses,
license plate numbers, etc.
Construct a matrix which will facilitate the
creation of the organizational chart. Include all
names in alphabetical order. The matrix is
optional.
Variants of an Organizational
Chart
Unilever
Person belonging to one organization
James K.
One individual belonging to two organizations
Unilever
Bidco
Smith W.
Continued
One Individual Belonging to Various
Organizations
Unilever
Bidco
Kapa Oil
Bic Co.
Textile Co.
C. Kirubi
Continued
Two Organizations With One Individual in
Common
Royal Imports Co.
Smith
Wallace Johnson
Haco Industries Co.
There is no association between the two organizations, only
between the individuals
Continued
Step 4: Analysis and Production
Analysis is resolving/separating a thing into its component
parts to ascertain them; the tracing of things to their
source to discover the general principles behind them; or a
statement of the results of this process.
The “heart” of the intelligence system
Apply various methods of logic
Apply various types of analysis
“Fills in the gaps”
Gives additional meaning to raw information
Continued
Step 5: Dissemination – Criteria
Legitimate request
Right to Know
Need to Know
Release Authority (“Third-party rule”)
Reasonable Use
Trusted
Continued
Dissemination
No dissemination? No value!
All of us gather information and
receive intelligence
What will you be doing with
yours?
Continued
Reporting/Dissemination
Issues for consideration:
Protection of informant identities
Protection of singular information
Protection of classified information
Footnotes or other documentation of sources
Legal constraints upon dissemination (e.g.
privacy, third party restrictions)
Audience: Courtroom, investigator or
policymaker?
Identification of sensitive reporting
Continued
Step 6: Evaluation and Feedback
Evaluation of the Tasks Completed
• The last step in the intelligence cycle
and returns to the planning stage.
• Determines if goals identified at the
planning stage were met.
• Review of project proposal.
Potential Pitfalls
• Dissemination not timely
• Conclusion based upon
disinformation
Types of Reporting
Tactical Intelligence
• Intelligence that supports a criminal or
intelligence investigation, or prosecution
• Gathered through a variety of techniques
• Designed to prevent a crime
• Best performed by analyst in close coordination
with investigators & collectors
Types of Reporting
Strategic Intelligence
Intelligence that supports planning and decision
making by executives and program managers
Generally issue – specific
Identification of crime trends, patterns
Less driven by potential prosecutions
Can assist in determing intelligence gaps
Designed to ascertain the “big” picture
Can provide support for personnel, resource,
and strategic planning.
Types of Reporting
Tactical vs Strategic
Tactical
Time sensitive, Strategic
In-depth, time for
immediate action
Supports specific policy deliberation
Supports program
operation
Usually short in length, decision
Varying length,
driven by specific facts
research intensive
Continued
Tactical vs Strategic
Example Strategic
Tactical Drug trafficking trends
Organizational profiles in South America
Impact of white collar
Telephone analysis
crime on the economy
Link analysis
Organized crime
Event charting
methods of operation in
Racketeering Enterprise key regions
Investigation
Surveillance.
Definition:
Is close observation, especially of suspected
person;
To watch;
Gather information about a person or site
through discreet observation.
Purpose of
Surveillance:
To gather information on individuals or site and
formulate it into a plan for successful operation.
Surveillance
Detection:
Is an organized, systematic methodology
designed to identify hostile surveillance.
Hostile surveillance is an activity conducted by
a non-sanctioned entity; i.e. criminals, against
any protected resource (person, facility or vital
infrastructure).
Must confirm surveillance.
Counter
Surveillance:
Is offensive
Has an operation reaction, i.e. an arrest.
Purpose is to identify hostile surveillance
Response to
Surveillance
Identified person to be turned over to
authorities;
In event of imminent danger, take action, i.e.
effect the arrest; alert the intended
victim/target;
Disturb the intended site by calling armed
security/initiate an investigation.
Identification of
Goals
Observation Post-collecting information regarding
Installation/Target
Surveillance
Leading Person-through a person connected to the
target/installation
For an arrest
Identification Methods;
Photography
Verbal Description
Sketch Portrait
Pointing out
Listening
Way of walking
Characteristics of an
operative:
Having a wide view angle
Blending with surrounding-cover story
Access points-going in/coming out
Physical comfort
Good eye sight
Constant alertness
Constant dedication to the mission
Patience and Perseverance
Good visual memory
Acquaintance and Knowledge
Ways to reveal an Operative
Does not blend with surrounding
Unnatural behavior in the O.P
Meeting between operatives
END
BE BLESSED