Unit 6: Undercover Operations CJ293: Investigating Terrorism.

Slides:



Advertisements
Similar presentations
Roles, Responsibilities and Tasks
Advertisements

Work-based learning Click on the speaker on each slide to learn more!
Personnel Background Investigations. Introduction The interests of the national security require that all persons privileged to be employed in the departments.
Massachusetts Department of Elementary & Secondary Education
ISRCL- Young Lawyers Anthony Gett Barrister & Senior Legal Officer Commonwealth Director of Public Prosecutions (Australia)
Patrol Basics. Lesson Goals – Know assigned patrol area – Know the different methods of patrol – Know how to prepare a BOLO (Be On The Look Out )
INTRODUCTION  There has been recognition that the setting up of law enforcement authorities should be encouraged: Recommendation 27 of FATF reads: 
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Risk Management for Virginia Master Naturalist Volunteers Adapted from the Virginia Cooperative Extension Master Gardener Coordinator Manual.
Association of Threat Assessment Professionals Great Plains Chapter November 19, 2010.
FERPA The Family Educational Rights and Privacy Act.
© 2010 Cengage Learning. Atomic Dog is a trademark used herein under license. All rights reserved. Chapter 4 Analyzing Jobs.
PROCEDURES FOR SELECTING THE CONTRACTOR
Develop a Business Plan
Fire and Emergency Services Company Officer — Lesson 1 Fire and Emergency Services Company Officer, 4 th Edition Chapter 1 — Transition to the Role of.
Section II: Law Enforcement
FIRE DEPARTMENT ORGANIZATION State of Georgia BASIC FIRE FIGHTER TRAINING COURSE.
Seminar on Undercover Operations By GPTOC UN ODCCP.
INTRODUCTION TO THE LAW OF EVIDENCE
 The median annual wage for police and detectives was $56,980 in May The median wage is the wage at which half the workers in an occupation earned.
Security Services Constitutional Issues in Private Security.
Building Collaborations to Help Immigrant Survivors of Domestic Violence, Sexual Assault & Trafficking Gail Pendleton, ASISTA Maria Alvarenga-Watkins,
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
Introduction to the Public Safety System Created by Curt Harrell & Jesse Kuzy for.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Capability Cliff Notes Series PHEP Capability 3—Emergency Operations Coordination What Is It And How Will We Measure It? For sound, click on the megaphone.
WORKING WITH SPO AND IAO Lynne HollyerNoam Pines Associate Director Research Administrator Industry Alliances OfficeSponsored Projects Office
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
SBIR Budgeting Leanne Robey Chief, Special Reviews Branch, NIH.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Police 2 Define major aspects of Police Recruitment.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Previous Lecture Kinds of Contract Formal, Simple Quasi Contract
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
EYEWITNESS EVIDENCE A Guide for Law Enforcement EYEWITNESS EVIDENCE “Eyewitnesses frequently play a vital role in uncovering the truth about a crime.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
McGraw-Hill ©2009 The McGraw-Hill Companies, Inc. All rights reserved. Insert cover image so horizontal lines in cover design line up with gold horizontal.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Report Writing Intro to Law Enforcement ROP Instructor: G Uppal.
Government Data Practices and the Open Meeting Law August 2014.
Unit 8: American Law Enforcement’s Role in Capacity Building Operations CJ219: Peacekeeping Operations.
Presented By WVDE Title I Staff June 10, Fiscal Issues Maintain an updated inventory list, including the following information: description of.
Unit 4: Trash Cover CJ293: Investigating Terrorism.
CJ210: Interrogation: Purpose, Guidelines, Procedures, and the Miranda Ruling Unit 6 Seminar: Miranda, Interrogation, Interviews, and other.
CJ-499 CAPSTONE Instructor David F. Connor. Unit 1 Assessment No Assessments scheduled for this Unit Complete – Introduce Yourself Response Read about.
FDIC Perspective on Environmental Risk Presented by: Gordon Stoner Legal Division Federal Deposit Insurance Corporation May 6, 2008.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
Chapter © 2010 South-Western, Cengage Learning Credit Records and Laws Establishing Good Credit Evaluating Credit and Laws 17.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
CJ499: Second Seminar (Voluntary)
Texas Law Enforcement Recognition Program
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
8.1 Levels of Police in Canada/Starting a Police Investigation
For more course tutorials visit
Chapter 13 Using Documentation for Child Abuse Suspicions and Looking at Self-Concept © 2017 Cengage Learning. All Rights Reserved.
Criminal Justice Careers
Red Flags Rule An Introduction County College of Morris
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
Unit 7 Documentation Documentation
Police Powers.
INDEPENDENCE POLICE DEPARTMENT
Presentation transcript:

Unit 6: Undercover Operations CJ293: Investigating Terrorism

Unit 6 Assignments Read (eBook): Chapters Extra Extra! Graded Work: -- Discussion Board (20 pts) -- Seminar (20 pts) -- Project (140 pts) 180 Points Total

Unit 6 Project (140 points) The investigative task force is a recent addition for law enforcement agencies to utilize to combat criminals and terrorism. Please create a 7-10 slide PowerPoint presentation that describes the role of the investigative task force. Provide an overview of the investigative task force Describe 3 factors that lead to the development of the task force Describe how it has evolved to meet the evolving terrorist

Seminar Topics: Tonight Undercover Operations

Scenario A police officer, wearing plain clothes, approaches a drug dealer on a street corner and purchases a small amount of cocaine. The officer then leaves and signals to other officers that he made the purchase. The drug dealer is arrested moments later by the other officers. Do these facts describe an undercover operation?

Undercover Operations Define “undercover” for law enforcement purposes

Undercover Operations For law enforcement purposes, undercover is an investigative technique in which a sworn law enforcement officer operates in a covert mode for the purpose of developing intelligence about illegal activities.

Undercover Operations Distinguish between an undercover operation and the use of an informant.

Undercover Operations Identify the advantages of the undercover technique compared to using an informant.

Undercover Operations An undercover operative is: – trained in investigations and is knowledgeable about the law – loyal to the department – honest – a partner in developing the investigation

Undercover Operations Identify the disadvantages of the undercover technique.

Undercover Operations Disadvantages: – Manpower- and resource-intensive – Dangerous – Risk of psychological harm – Risk of political indoctrination – Damage to personal life

Undercover Operations Identify the three different types of undercover operations

Undercover Operations Limited Contact (One shot) Undercover Semi-Deep Undercover Deep Cover Operations

Undercover Operations Describe the “Limited Cover” operations. Give an example.

Undercover Operations Limited Cover: a very short encounter in which the investigator makes one or more brief contacts with the subject or other knowledgeable person for the purpose of developing intelligence or evidence Examples: – Attend a meeting – Engage in conversation – Visit a target location – Perform a controlled “buy” of narcotics Prep Work – Some advanced planning – False identification may be necessary

Undercover Operations In addition to gathering intelligence and evidence, a “limited contact” project can be used to: 1. Determine the viability of a long-term undercover project 2. Ascertain whether a particular person might be open to an official contact by a law enforcement officer 3. To augment a long-term project

Undercover Operations Describe a “semi-deep” undercover

Undercover Operations Semi-Deep Undercover: the undercover agent makes contacts in the target area with some degree of frequency but does not function on an around-the- clock basis. – Requires advanced planning – False identification (withstand scrutiny) – Background story (about agent, agent’s history, and daily routine)

Undercover Operations In a deep cover operation, the investigator joins the targeted subject or conspiracy on a full-time basis. – Most complex and sophisticated – Rare Essential “Do Nots” – No other police functions – Never extend activity into other illegalities

Undercover Operations What are some essential questions an agency must consider before beginning a semi-deep or deep cover operation?

Undercover Operations Have all other investigative techniques been exhausted Is it an emergency situation Is there a suitable person available to go undercover – Personality must be compatible with undercover work – Family life – Well-known as cop – Other specialized professional duties precluding undercover work (e.g., SWAT, hostage negotiator) – Avoid using “fringe” officers

Undercover Operations (Questions Cont’d) Is the department willing and able to make a handler available Can the department maintain complete security for the operations Can the department protect the undercover investigator Can the department support the undercover operation from a technological standpoint Is the department able to deal with the fallout – Officer and family may require a transfer to a new location after assignment if the officer and his/her family is in danger, or if ability to resume law enforcement officer has been compromised

Undercover Operations Creating an undercover project – Limited contact operation: a detailed proposal usually not required but approval from management may be necessary – Semi and Deep Undercover Project: usually require a detailed written proposal of the project requiring approval by agency’s management personnel What should be included in the written proposal?

Undercover Operations Contents of Written Proposal – description of the crime problem – outline of laws involved – History of the efforts made to resolve the problem to date – Reason for the proposed project – Statement from the departments legal counsel and prosecutor’s office approving of project and no foreseen problems of entrapment if project executed as planned – The proposed scenario for the creation and operation of the project: How UC will make contact with target How undercover operation will develop over time How long project will last, and how it will end How UC will be selected--desired traits and experience How will UC be backstopped (false id and other documentation Who else will be involved in the project (informants, other UC agents, private citizens) Detailed outline of anticipated expenses List of required personnel (sworn and unsworn) to support project

Undercover Operations – The proposed scenario for the creation and operation of the project: How UC will make contact with target How undercover operation will develop over time How long project will last, and how it will end How UC will be selected--desired traits and experience How will UC be backstopped (false id and other documentation Who else will be involved in the project (informants, other UC agents, private citizens) Detailed outline of anticipated expenses List of required personnel (sworn and unsworn) to support project List of personnel required from other law enforcement departments, agencies, and private sector to support project; also, a statement about the degree of commitment required from these entities to guarantee their support (e.g., signed letters of agreement, memorandums of understanding) Description of buildings, offices, residences, and other structures required for project List of equipment needed Detailed description outlining kinds of support that department must be willing to provide to ensure success of operation

Undercover Operations What should a department consider in selecting an investigator for an undercover project?

Undercover Operations Compatibility: can the officer blend in with minimal effort Experience: officer with record of good judgment and knowledge of how to develop evidence to prosecute a suspect (rookies are unlikely choice) Maturity and stability: must be able to resist undesirable temptations (e.g., drugs, sex, money) and withstand pressures (especially mental stress) of project Psychological issues: officer must be able to appear loyal to subject and cause but maintain allegiance to department Personnel issues: no prior credibility or discipline problems

Undercover Operations Describe the role played by “the handling” officer

Undercover Operation The handler functions as the link between the law enforcement agency and the undercover officer. Helps maintain the UC’s “regular” life—for example: – Visits UC’s family – Pickups and pays bills – Maintains personal property and home – Assists in filing income taxes – Handles administrative matters with department Ideal Handler – Mature and stable – Prior undercover experience – Not a high-ranking officer – Not a case officer or co-case officer

Undercover Operations Securing False Identification – must withstand scrutiny – Procuring false identification may violate local, state, and federal law Forms of Identification – Birth certificate – Social security number – False DL – Bank account – Credit cards – Miscellaneous or “Junk ID”: library card, membership cards (museum, clubs)

Undercover Operations Some “Gray Area” Undercover Projects – Cooperative private citizens – Nonsworn law enforcement personnel (e.g., a department computer tech, or translator) Neither of the above involves a sworn law enforcement investigator and thus the project does not qualify as an undercover operation. The cooperative private citizen or nonsworn law enforcement personnel should be treated as an informant and handled accordingly.