Download presentation
Presentation is loading. Please wait.
Published byMagnus Arnold Modified over 9 years ago
1
OET Lesson Developing a Risk Targeting System
2
Objectives Identify types of information used to create and enhance targeting systems. List the steps required to create and use targeting systems.
3
Risk Targeting Cycle Collect Data Analyze Data Identify Targets Examine Document Results
4
Collect Data Arrest/Seizure Reports Intelligence Reports InterviewsDocuments & Computer Systems Collect
5
Arrest/Seizure Reports Collect the following data: Type, quantity, origin, and destination of contraband Method of concealment Type of conveyance Description of the smuggler Cover story Time of day, season, and other environmental factors Collect
6
Intelligence Reports Recent smuggling trends Potential terrorist threats Review recent intelligence information about: Collect
7
Interviews Other knowledgeable officers Travel and trade personnel Other sources Collect information from interviewing: Collect
8
Documents & Computer Systems Traveler Documents: Passports, tickets, driver’s licenses, and other identity papers Cargo Documents: Manifests, air waybills, invoices, insurance policies, etc. Computer Systems: –Advanced information –Previous travel and trade transactions (if available) –Previous customs findings Collect
9
Analyze Data Use graphs, diagrams, charts, or automated tools to recognize patterns: –Routing of merchandise/smugglers –Concealment methods –Conveyance used –Frequently utilized flights –Day/date/time of seizures –Age/sex of violators –Origin of contraband Analyze
10
Identify Targets Identify high-risk targets including: –Known trafficking routes –Intelligence information –Similarities to previous seizures –Unusual cargo or traveler for the port Identify
11
Examine Begin by reviewing documents Conduct an examination Examine
12
Document Results Document results. Develop a standard method of documenting examinations. Document
13
Exercise Instructions: 1.Review the data in the next slide. 2.Identify the smuggling patterns or trends. 3.Describe your high-risk targets.
14
Seizure Flight AgeSex Date #of ViolatorM/FDrug TypeGrams Method of Concealment 03/17231524MHeroin25.1In clothing being worn (Jacket) 03/30108731MCocaine 1In clothing being worn (Jacket) 04/15202522MHeroin13.6In clothing being worn (Jacket) 04/20202325MHeroin 80In clothing being worn (Underwear) 04/22203127MHeroin 32.1In clothing being worn (Pocket) 04/30202534MCocaine2In clothing being worn (Socks) 05/15108739MCocaine7.4In clothing being worn (Shoes) 05/30108732MCocaine2In clothing being worn (Under belt) 06/15108131MCocaine1In clothing being worn (Jacket) 06/18109527MHeroin5In clothing being worn (Jacket) 06/20109536MHeroin 2.2In clothing being worn at his chest 07/03108730FHeroin 6.8In clothing being worn 08/01202529FHeroin 26Inside her underwear 08/10231521MCocaine4.7Sewn in the edges of bed sheet in a suitcase Airport Seizures
15
Seizure Vehicle AgeSex Others Date/Time Typeof ViolatorM/F in Vehicle Drug Type/AmountMethod of Concealment 03/17 Truck26M none Marijuana 100 kgIn the lining of the roof 08:30 03/30 Car22F 1 infant Cocaine 1.3 kgIn baby’s diapers 13:30 03/31Car35M adult F Cocaine 2.5 kg In spare battery 07:30 04/07Truck25M none Marijuana 122 kgFalse cargo bed 08:00 04/09Car24F 1 infant Cocaine 2 kg In baby’s clothing 14:00 04/12Car27M adult F Cocaine 2.4 kg Body carrier 11:00 04/17Car29F adult M Ecstasy 6.5 kgLining of suitcase 18:00 03/17 Truck28M none Marijuana 150 kgFalse cargo bed 15:30 04/09Car26F 1 child Cocaine 1.6 kg Child’s shoes 16:00 Land Border Seizures
16
Lesson Summary Do you now know how to: Identify types of information used to create and enhance targeting systems? List the steps required to create and use targeting systems? Collect Data Analyze Data Identify Targets Examine Document Results
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.