OET Lesson Developing a Risk Targeting System
Objectives Identify types of information used to create and enhance targeting systems. List the steps required to create and use targeting systems.
Risk Targeting Cycle Collect Data Analyze Data Identify Targets Examine Document Results
Collect Data Arrest/Seizure Reports Intelligence Reports InterviewsDocuments & Computer Systems Collect
Arrest/Seizure Reports Collect the following data: Type, quantity, origin, and destination of contraband Method of concealment Type of conveyance Description of the smuggler Cover story Time of day, season, and other environmental factors Collect
Intelligence Reports Recent smuggling trends Potential terrorist threats Review recent intelligence information about: Collect
Interviews Other knowledgeable officers Travel and trade personnel Other sources Collect information from interviewing: Collect
Documents & Computer Systems Traveler Documents: Passports, tickets, driver’s licenses, and other identity papers Cargo Documents: Manifests, air waybills, invoices, insurance policies, etc. Computer Systems: –Advanced information –Previous travel and trade transactions (if available) –Previous customs findings Collect
Analyze Data Use graphs, diagrams, charts, or automated tools to recognize patterns: –Routing of merchandise/smugglers –Concealment methods –Conveyance used –Frequently utilized flights –Day/date/time of seizures –Age/sex of violators –Origin of contraband Analyze
Identify Targets Identify high-risk targets including: –Known trafficking routes –Intelligence information –Similarities to previous seizures –Unusual cargo or traveler for the port Identify
Examine Begin by reviewing documents Conduct an examination Examine
Document Results Document results. Develop a standard method of documenting examinations. Document
Exercise Instructions: 1.Review the data in the next slide. 2.Identify the smuggling patterns or trends. 3.Describe your high-risk targets.
Seizure Flight AgeSex Date #of ViolatorM/FDrug TypeGrams Method of Concealment 03/ MHeroin25.1In clothing being worn (Jacket) 03/ MCocaine 1In clothing being worn (Jacket) 04/ MHeroin13.6In clothing being worn (Jacket) 04/ MHeroin 80In clothing being worn (Underwear) 04/ MHeroin 32.1In clothing being worn (Pocket) 04/ MCocaine2In clothing being worn (Socks) 05/ MCocaine7.4In clothing being worn (Shoes) 05/ MCocaine2In clothing being worn (Under belt) 06/ MCocaine1In clothing being worn (Jacket) 06/ MHeroin5In clothing being worn (Jacket) 06/ MHeroin 2.2In clothing being worn at his chest 07/ FHeroin 6.8In clothing being worn 08/ FHeroin 26Inside her underwear 08/ MCocaine4.7Sewn in the edges of bed sheet in a suitcase Airport Seizures
Seizure Vehicle AgeSex Others Date/Time Typeof ViolatorM/F in Vehicle Drug Type/AmountMethod of Concealment 03/17 Truck26M none Marijuana 100 kgIn the lining of the roof 08:30 03/30 Car22F 1 infant Cocaine 1.3 kgIn baby’s diapers 13:30 03/31Car35M adult F Cocaine 2.5 kg In spare battery 07:30 04/07Truck25M none Marijuana 122 kgFalse cargo bed 08:00 04/09Car24F 1 infant Cocaine 2 kg In baby’s clothing 14:00 04/12Car27M adult F Cocaine 2.4 kg Body carrier 11:00 04/17Car29F adult M Ecstasy 6.5 kgLining of suitcase 18:00 03/17 Truck28M none Marijuana 150 kgFalse cargo bed 15:30 04/09Car26F 1 child Cocaine 1.6 kg Child’s shoes 16:00 Land Border Seizures
Lesson Summary Do you now know how to: Identify types of information used to create and enhance targeting systems? List the steps required to create and use targeting systems? Collect Data Analyze Data Identify Targets Examine Document Results