Contemporary
Policing
INTELLIGENCE-
LED POLICING
Definitions
Information- data that has been collected, but
not further developed through analysis.
Intelligence- Information that has been evaluated
in context to its source and reliability- Information
with added value. The application of analysis
therefore transforms information into intelligence.
Criminal Intelligence- The International
Association of Police Chiefs (2003) defined
criminal intelligence as, “information compiled,
analysed and/or disseminated in an effort to
anticipate, prevent, or monitor criminal
activities”.
By I Mugari, Bindura University Friday April 25, 2025
Definitions...
Intelligence-Led Policing
Ratcliff (2003: 3) defined ILP as the application of criminal
intelligence analysis as an objective decision making tool
in order to facilitate crime reduction and prevention
through effective policing strategies and external
partnership projects drawn from an evidential base.
According to the International Association of Law
Enforcement Intelligence Analysts (2005), “Intelligence –
Led Policing is the model that brings intelligence and
analysts to the forefront of police operations. It promotes
the efficient use of resources, the production of workable
crime prevention strategies, and the successful completion
of investigations and prosecution.”
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence Process
The intelligence process is best explained by
the intelligence cycle which is defined as
follows;
The process by which information is
converted into intelligence and made
available to users (US Military Dictionary).
The process of developing unrefined data into
polished intelligence for use by policy makers
(FBI).
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence Process
By I Mugari, Bindura University Friday April 25, 2025
Stage 1 Planning, Direction, Needs Requirements
The identification of specific user needs, which
accurately state the problem at hand.
Requirements can either be standing requirements
(providing information for mid and long range planning
and following a fixed pattern) or spot requirements
( which arise during crisis situations)
Planning and direction is needed from the time when a
requirement for intelligence is initiated to when feedback
on the usefulness of the intelligence is provided.
Efficient management and guidance are also necessary to
ensure clear and accurate communication between
intelligence activities and to synchronise the various
phases and steps within the cycle.
By I Mugari, Bindura University Friday April 25, 2025
Stage 2: Collection
Collection is the normal response to
requirements for intelligence and can involve
systematic and accidental acquisition of
intelligence information through a variety of
sources.
Information can be obtained from both open and
covert sources.
Open sources- People, media reports, telephone
directories, company records, internet searches.
Covert sources- Surveillance, undercover
operations, informers, recognisance.
By I Mugari, Bindura University Friday April 25, 2025
Stage 3: Processing/Exploitation
It entails converting the vast amount of
information into usable forms of information.
This stage also entails the removal of useless
or incorrect information.
It also involves the orderly arrangement of
collected material, concepts and data so that
it forms correlative relationships.
Processing can involve the following:
Document translation; film processing;
decryption; interpretation of information.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis
The conversion of the vast amount of information
collected into finished intelligence. It includes
integrating, evaluating and analysing all available
data and preparing intelligence reports.
Analysts, who are subject matter specialists, consider
the information’s reliability, validity, and relevance
The analyst also forms patterns and hypothesis and in
criminal matters, these may be used to forecast
potential criminal activities.
Evaluation, an important of analysis is the
assessment of information for pertinence, accuracy,
and reliability of the source.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Crime analysis tools
Crime Pattern Analysis (CPA)
It involves the examination of the nature and distribution of
crime within an area, in order to identify emerging and current
trends and patterns, and linked crimes.
It therefore includes: crime pattern identification, crime trend
identification and hot spot analysis.
Pattern- is an arrangement or order discernible on any crime
related phenomena
Trend- is a specific type of pattern that assumes a general
direction or tendency.
Hot spot- a specific location or small area where an unusually
high level of criminal activity is committed by one or more
offenders.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
General Profile Analysis
This type of analysis identifies and examines
the characteristics of victims, or common
characteristics of offenders displaying
particular offending behaviour.
Examples of general profiles are the
examination of the characteristics of serial
murderers, serial armed robbers, serial
rapists, or characteristics of repeatedly
attacked individuals or groups of individuals.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Demographic and social trend analysis (DSTA)
It entails the examination of the nature of
demographic changes and their impact on criminality,
as well as the analysis of social factors which might
underlie changing trends of offending patterns.
DSTA usually depends on the collection of information
from openly available sources and organisations
outside policing, for example, unemployment levels,
details of socio-economic status, homelessness levels,
population growth, inward and outward population
migration, ethnic origin of the group, age of
individuals living in an area.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Market analysis
A survey of the criminal market around a given
commodity (e.g. Illicit drugs, stolen vehicles,
prostitution).
Market analysis is used to;
Outline the level of activity of a market
Identify emerging market trends
Understand and explain how and why the market
operates
Assist in the selection of subjects for targeting.
Identify potential new sources of information.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Crime control methods analysis- It is the
evaluation of the investigative or preventative
methods and techniques with the aim of
establishing their future usefulness.
Specific profile analysis- It entails identification
of the specific characteristics of perpetrators or
victims of specific crimes. Also involves
construction of a hypothetical picture of the
perpetrator of a serious crime or a series of
offences on the basis of crime scene data,
witnesses’ statements and the available
information.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Target profile analysis- Embraces a range
of analytical techniques, which aim to
describe the criminal, his or her criminal
activity, lifestyle, associations, the risk the
person poses, and strength and weaknesses
in order to give focus to the investigation
targeting each person.
Comparative case analysis- It involves
identification of a series of crimes with
common modus operandi and seeking
similarities between the offences.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Network analysis
It consists of dissecting the internal
hierarchical structure, management and roles
of individuals within criminal organisations in
order to arrive at a complete picture of an
organised crime group.
Develops and lays out the linkages,
associations, and interactions of all known
members of an organised crime group with
the other organised crime groups and
operations in their respective jurisdictions.
By I Mugari, Bindura University Friday April 25, 2025
Stage 4: Analysis...
Telephone record analysis
It evaluates a data base store of information
regarding certain telephone numbers.
Information can include particulars of area
codes, numbers called, the duration of calls,
detailed of incoming calls and the identity of
the incoming caller.
It can be used to indicate the geographical
range of the conspiracy.
By I Mugari, Bindura University Friday April 25, 2025
Stage 5: Dissemination
It entails the transfer of intelligence from
producers to users. The objective here is to
achieve a balance between failing get valid
intelligence to users and not overwhelming
users with unintended products.
Intelligence information is disseminated under
the following conditions;
Controlled reporting- in response to specific
validated requirements
Periodic reporting- submitted on a
continuing basis at specified intervals.
By I Mugari, Bindura University Friday April 25, 2025
Stage 5: Dissemination...
Initiative reporting- responses to information needs as
understood by a collection element’s determination of an
intelligence gap, or a report that is considered by its
originator to be of immediate, emergency, or critical
importance.
When deciding on which method of dissemination to use,
consider the following;
User requirements- the intelligence product should be
prepared in the form most responsive to the user’s need
and compatible with the projected means of
dissemination. The value of intelligence is based on its
usefulness to the command and staff, not to its quantity.
By I Mugari, Bindura University Friday April 25, 2025
Stage 5: Dissemination...
Urgency- dissemination is not responsive
unless the products reach the users in time to
be of operational or planning value.
Transmittal of critical, time- sensitive
information should not be delayed.
Security- disseminate intelligence only to
users with a need to know and strictly within
security guidelines. When intelligence
impacts on the mission but security
constraints limit dissemination, it should
promptly be sanitised and disseminated.
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence-Led Policing Model in Zimbabwe...
In Zimbabwe, the Criminal Intelligence Unit is mandated to
carry out the following roles in order to spearhead
intelligence-led policing:
Integrate crime management strategies (a combination of
prevention and investigation methods).
Predict the future of crime, which allows resources to be
deployed to best advantage, effectiveness in profiling of
known criminals and targeting the criminals.
Make the most efficient use of resources.
Docket analysis, determining how and why cases at court
fail, and why cases are not being processed thus provide
crime information to identify common modus operandi in
group, or serial offenders, which shapes the focus of crime
investigation, detection and prevention strategies
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence-Led Policing Model in Zimbabwe...
Criminal Intelligence Personnel
The activities of the following criminal
intelligence personnel aid to the adoption of
the mechanisms employed by the ZRP in
implementing intelligence-led policing at
district level:
1. District Criminal Intelligence Officers
(DCIO).
2. Field Intelligence Officers (FIO).
3. Criminal Intelligence Analysts (CIA).
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence-Led Policing Model in Zimbabwe...
The District Criminal Intelligence Officers
(DCIO)
The DCIO spearheads intelligence-led policing by
giving directives on operational matters
concerning intelligence-led policing and crafts
crime management strategies targeted to reduce
crime within the district acting on criminal
intelligence from the CIA. The officer is also
responsible for supervisory and advisory role to
the Criminal Intelligence Unit as well as ensuring
that the unit is adequately staffed and fully
equipped with material and technical resources.
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence-Led Policing Model in Zimbabwe...
The Criminal Intelligence Analysts (CIA)
The CIA integrates all information from the FIOs to
prepare linkage diagram, accused profile and
commodity flow charts which are essential in the
processing of criminal intelligence. The crime analyst
also identifies new subjects involved in criminal
activities, interprets the results to develop ideas about
the nature and scope of criminal activity suspected to
be, or taking place, and identify new trends of crime by
collating and analysing information. The crime analyst
advises the DCIO on the formulation of crime
management strategies to be used by operation
stations to reduce crime in the district.
By I Mugari, Bindura University Friday April 25, 2025
The Intelligence-Led Policing Model in Zimbabwe...
Field Intelligence Officers (FIO)
The FIOs are responsible for gathering
criminal information for analysis. They
undertake follow-up enquiries in the
development of operational information from
whatever source. They also cultivate
informers for the purpose of obtaining
criminal information and verify the
information to build criminal profiles which
are required by the CIA to process criminal
intelligence.
By I Mugari, Bindura University Friday April 25, 2025
Conclusion
ILP serves as the foundation for effective police
leadership, planning, decision making, crime
prevention and intervention strategies. It combines
well with other policing initiatives such as Community
oriented policing, Problem Oriented Policing, Policing
by Objectives and multi-agency approach to policing.
Intelligence-led solutions, in concert with excellent
criminal investigators, increase opportunities for
effectiveness, and promote justice in communities.
The concept should be adopted by the whole police
organisation and information sharing must become a
policy, not an informal practice.
By I Mugari, Bindura University Friday April 25, 2025