Download presentation
Published byEthelbert August Rose Modified over 9 years ago
1
Criminal Intelligence and Surveillance Operations
Criminal Justice 2011 Chapter 7 Criminal Intelligence and Surveillance Operations : Identification of Criminal Suspects Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011
2
CHAPTER SUMMARY 7.1 Understand the roles and types of criminal intelligence. 7.2 Identify the procedures of intelligence collection. 7.3 Explain the types of flowcharting used in intelligence-gathering operations. 7.4 Understand the usefulness of undercover investigations. 7.5 Describe the steps and resources required to properly implement an undercover investigation. 7.6 Explain the types of surveillance in criminal investigation as well as the benefits of a properly conducted intelligence operation.
3
Understand the roles and types of criminal intelligence
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.1 Understand the roles and types of criminal intelligence
4
Criminal Intelligence
7.1 Criminal Intelligence Overt information Gathering Covert information gathering Lecture Notes: These are the two major categories of criminal intelligence.
5
Overt Intelligence Gathering
7.1 Overt Intelligence Gathering Witness interviews Victim interviews Suspect Interviews Lecture Notes: These are the typical types of overt intelligence gathering methods. There is no requirement nor is there a tactical advantage for covert methods for many, if not most cases. These are the mainstay of methods used by most investigators in most cases. Patrol observations and Field Interviews Searches of public records
6
Covert Intelligence Gathering
7.1 Covert Intelligence Gathering Physical surveillance Electronic surveillance Informants Lecture Notes: These are the typical types of covert intelligence gathering methods. Usually cases using these methods are one of three types Victimless crimes like drug crimes or prostitution Terrorist crimes (both domestic and foreign born) Crimes that are difficult if not impossible to secure evidence using traditional means like fencing operations, gang and organized crime activity, etc… Undercover operations
7
7.1 Types of Leads Lecture Notes:
Physical Evidence Witnesses Informants Intelligence Crime Lecture Notes: Leads come from different sources, all shown here. Witnesses include both named and anonymous Physical evidence includes evidence that directly implicates the suspect like surveillance recordings but also the hidden information found during evidence anaylsis.
8
Identify the procedures of intelligence collection.
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.2 Identify the procedures of intelligence collection.
9
7.2 The Process…. Intelligence Gathering Photo placeholder
Lecture Notes: Intelligence gathering processes are dependent on the following: What type of case is it? What am I trying to learn? How can I get the information? Do I have the resources to obtain the information in the manner necessary?
10
7.2 The Process…. Intelligence Gathering Photo placeholder
Lecture Notes: Intelligence gathering processes at different agencies may involve dedicated report forms like this one.
11
Data Analysis and Dissemination
7.2 The Process Step 1: Select the Target Step 2: Data Collection Step 3: Data Analysis and Dissemination Step 4: Preparation for Prosecution Lecture Notes: This is a typical process where intelligence is necessary prior to prosecution. Normally, this is process is used in crimes like drugs, prostitution, terrorism, and organized crime. Step 1 may have to be delayed until some data collection is made if the target is unknown.
12
Intelligence Gathering
7.2 Intelligence Gathering Technology Advances…. Photo placeholder Lecture Notes: There are countless tried and true methods of intelligence gathering methods like foot surveillance and undercover operations but new technology like GPS tracking devices are allowing investigators to track suspects without ever risking “getting burned.” Other technologies include computer traces, credit card histories, cell phone histories, thermal imaging, etc…
13
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.3 Explain the types of flowcharting used in intelligence-gathering operations.
14
Analyzing Information
7.3 Analyzing Information Putting the pieces together Photo placeholder Lecture Notes: After weeks and sometimes months of gathering intelligence, a map of the criminal activity is hopefully constructed. Once this is completed, prosecution may be initiated and if that is not possible due to a lack of evidence, then further discussion will ensue to determine how evidence can be gathered based on the picture here.
15
Analyzing Information
7.3 Analyzing Information Lecture Notes: Here is another analysis of a drug operation after intelligence gathering. This analysis may lead investigators to look for weaknesses in the operation and seek to infiltrate it using undercover operations. This chart may also be used a court prop to show the jury the operation was in fact a conspiracy to: Distribute controlled substances Launder money
16
7.3 Sharing Information Intelligence Photo placeholder Lecture Notes:
This flow chart shows how intelligence creates several loops of information after information is disseminated.
17
Understand the usefulness of undercover investigations.
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.4 Understand the usefulness of undercover investigations.
18
Stationary Surveillance
7.4 Surveillance Methods Foot Surveillance Vehicle Surveillance Stationary Surveillance GPS Lecture Notes: Each method has advantages and limitations. The key is to avoid getting “burned” or discovered by the target that you are surveilling him or her. The surveillance team has to know whether the surveillance is loose or tight – meaning, is it better to lose the subject and not get burned or should the team do what-ever it takes to get the information?
19
Undercover Operations
7.4 Undercover Operations Getting Evidence vs. Entrapment Lecture Notes: One of the biggest concerns regarding undercover operations and using informants is the entrapment defense. While it is OK to provide an opportunity to commit a crime to someone who is pre-disposed to commit the crime, there are strict limitations on how that “opportunity” is presented.
20
7.4 Undercover Flow Chart Identify the target Assign the UC
Develop a cover story Begin operation Lecture Notes: This shows how UC operations are begun. Normally the target should be known (not necessarily by name) prior to the operation The UC must be chosen for the operation based upon the target and the abilities of the UC (the undercover officer) The UC must develop a cover story – usually this is coordinated with the informant if one is involved The operation may begin with an introduction through the informant. Gaining the confidence of the target is critical before attempting to obtain evidence against him or her.
21
Undercover Flow Chart – Part 2
7.4 Undercover Flow Chart – Part 2 Identify the target Assign the UC Develop a cover story Begin operation Lecture Notes: This shows how UC operations are begun. Normally the target should be known (not necessarily by name) prior to the operation The UC must be chosen for the operation based upon the target and the abilities of the UC (the undercover officer) The UC must develop a cover story – usually this is coordinated with the informant if one is involved The operation may begin with an introduction through the informant. Gaining the confidence of the target is critical before attempting to obtain evidence against him or her.
22
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.5 Describe the steps and resources required to properly implement an undercover investigation.
23
7.5 Undercover Process Reasons for UC as an investigative method
Only way to obtain evidence of a crime Prevent the commission of an act or apprehend a suspect in the commission of an act Locate persons or watch their hangouts and associates Obtain probable cause for obtaining search warrants Obtain information for later use in an interrogation Develop leads and information received from other sources
24
Criminal activity discovered Obtain search or arrest warrant
7.5 Undercover Process General procedure Criminal activity discovered Select Target Undercover Intro Obtain evidence Obtain search or arrest warrant Prosecute
25
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 7.6 Explain the types of surveillance in criminal investigation as well as the benefits of a properly conducted intelligence operation.
26
Use is based upon the case…
7.6 Types of Surveillance Use is based upon the case… Foot Stakeout Vehicle
27
Benefits of Surveillance
7.6 Benefits of Surveillance Reasons for surveillance are the SAME as for UC as an investigative method Only way to obtain evidence of a crime Prevent the commission of an act or apprehend a suspect in the commission of an act Locate persons or watch their hangouts and associates Obtain probable cause for obtaining search warrants Obtain information for later use in an interrogation Develop leads and information received from other sources
28
Why Use Undercover or Surveillance?
7.6 Why Use Undercover or Surveillance? Unfettered Crime vs. Prosecution Lecture Notes: Some believe that the use of UC s not necessary and unsavory. The use of informants is usually involved and many of them lie and the motives are selfish leading to occasional disasters in the field. However, the use of informants can make the investigator look like Sherlock Holmes! It is an incredible shortcut in some cases and in others, it is the only way to infiltrate criminal operations.
29
CHAPTER SUMMARY 7.1 Understand the roles and types of criminal intelligence. 7.2 Identify the procedures of intelligence collection. 7.3 Explain the types of flowcharting used in intelligence-gathering operations. 7.4 Understand the usefulness of undercover investigations. 7.5 Describe the steps and resources required to properly implement an undercover investigation. 7.6 Explain the types of surveillance in criminal investigation as well as the benefits of a properly conducted intelligence operation.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.