Presentation is loading. Please wait.

Presentation is loading. Please wait.

Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.

Similar presentations


Presentation on theme: "Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright."— Presentation transcript:

1 Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

2 8.1 Describe the types of people used as informants. 8.2 Identify various areas of concern in the use of informants. 8.3 Understand the various motivations of informants. 8.4 Document and process an informant properly. 8.5 Maintain control of an informant during an investigation. 8.6 Protect an informant’s identity. 8.7 Understand the problems most commonly associated with the use of informants. 8.8 Understand the usefulness of undercover investigations. CHAPTER SUMMARY

3 Describe the types of people used as informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.1

4 Police officers Types of Informants 8.1 Informants

5 Identify various areas of concern in the use of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.2

6 Informant Issues 8.2 First, informants are often difficult to control.

7 Informant Issues 8.2 Second, an informant can become a source of public embarrassment for the law enforcement agency.

8 Informant Issues 8.2 A third area of concern is the informant’s questionable credibility in court.

9 Understand the various motivations of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.3

10 Informant Motivation 8.3 The fearful informant.

11 Informant Motivation 8.3 The financially motivated informant. “Mercenary” informants give information in exchange for a fee. The financially motivated informant. “Mercenary” informants give information in exchange for a fee.

12 Informant Motivation 8.3 The revengeful informant.

13 Informant Motivation 8.3 The egotistical informant.

14 Informant Motivation 8.3 The perversely motivated informant.

15 Document and process an informant properly. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.4

16 Using Informants Report on “inside” information Report observations Introduce undercover Officers

17 Step Four: Search warrant Step Four: Search warrant Step Three: Controlled buy Step Three: Controlled buy Step Two: Verify facts Step Two: Verify facts Step One: Interview Step One: Interview Informant Reliability Flow Chart 8.4

18 Maintain control of an informant during an investigation. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.5

19 Managing Informants 8.5

20 Protect an informant’s identity. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.6

21 Type of Informants 8.6 AnonymousConfidential vs.

22 Informant Motivation Review… Why do they do it? 8.6 Trying to stay out of prison Getting paid (mercenary) Good citizen Revenge, ego, or other personal motives

23 Understand the problems most commonly associated with the use of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.7

24 Informant Problems 8.7 Investigators becoming too friendly with informants.

25 Informant Problems 8.7 Informants of the opposite sex

26 Informant Problems 8.7 Crimes committed by the informant.

27 Informant Problems 8.7 Officers who “own” their informants

28 Why Use informants 8.7 Prosecution Unfettered Crime vs.

29 Understand the usefulness of undercover investigations. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.8

30 Undercover Operations 8.8 Defined as assuming a fictitious identity and associating with criminals for the purpose of collecting information or evidence on criminal activity. Defined as assuming a fictitious identity and associating with criminals for the purpose of collecting information or evidence on criminal activity.

31 Undercover Operations 8.8 Undercover work and surveillance are viable options for police investigators because they provide considerable information Undercover work and surveillance are viable options for police investigators because they provide considerable information

32 Undercover Operations 8.8 Typically, undercover work has been associated with drug enforcement, but it is a tool that can be useful in the investigation of a number of criminal activities. Typically, undercover work has been associated with drug enforcement, but it is a tool that can be useful in the investigation of a number of criminal activities.

33 The Process…. 8.8 UC Photo placeholder

34 The Process 8.8 Step 4: Introduction and infiltration Step 4: Introduction and infiltration Step 3: Develop a cover story Step 3: Develop a cover story Step 2: Data Collection Step 2: Data Collection Step 1: Select the Target Step 1: Select the Target

35 8.1 Describe the types of people used as informants. 8.2 Identify various areas of concern in the use of informants. 8.3 Understand the various motivations of informants. 8.4 Document and process an informant properly. 8.5 Maintain control of an informant during an investigation. 8.6 Protect an informant’s identity. 8.7 Understand the problems most commonly associated with the use of informants. 8.8 Understand the usefulness of undercover investigations. CHAPTER SUMMARY


Download ppt "Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright."

Similar presentations


Ads by Google