Presentation is loading. Please wait.

Presentation is loading. Please wait.

7 Criminal Intelligence and Surveillance Operations.

Similar presentations


Presentation on theme: "7 Criminal Intelligence and Surveillance Operations."— Presentation transcript:

1 7 Criminal Intelligence and Surveillance Operations

2 Instructor Name Date, Semester
Class Name Instructor Name Date, Semester

3 Chapter Objectives Summarize the types of criminal intelligence.
Distinguish between the criminal intelligence and criminal investigative functions. Explain the procedures for the intelligence-gathering process. continued on next slide

4 Chapter Objectives Explain the procedures for flowcharting used in intelligence-gathering operations. Explain the types of surveillance in criminal investigation. Describe how a stakeout is conducted. Summarize the legal requirements of electronic surveillance.

5 Summarize the types of criminal intelligence.
Learning Objective 7.1 Summarize the types of criminal intelligence.

6 Types of Criminal Intelligence
Overt information collection Witness interviews Victim interviews Suspect interviews Patrol observations of activity continued on next slide

7 Types of Criminal Intelligence
Covert information collection Physical surveillance Electronic surveillance Informants Undercover officers

8 Learning Objective 7.2 Distinguish between the criminal intelligence and criminal investigation functions.

9 Criminal Intelligence vs. Criminal Investigation
Strategic intelligence Useful in organizing long-range plans for interdiction in areas of criminal activity over extended periods Provides information about the capabilities and intentions of target subjects continued on next slide

10 Criminal Intelligence vs. Criminal Investigation
Tactical intelligence Targets criminal activity considered to be of immediate importance Provides specifics about individuals, organization, and different types of criminal activity continued on next slide

11 Criminal Intelligence vs. Criminal Investigation
Proactive function Inductive logic Closed files Success gauged by cataloging of an intelligence product continued on next slide

12 Criminal Intelligence vs. Criminal Investigation
Usually reactive in nature Deductive logic Open files Success is arrest or conviction of suspect continued on next slide

13 Criminal Intelligence vs. Criminal Investigation
Procedure for intelligence gathering Target selection Data collection Data analysis Dissemination

14 Explain the procedures for the intelligence-gathering process.
Learning Objective 7.3 Explain the procedures for the intelligence-gathering process.

15 Intelligence-Gathering Process
The process of data description and integration is used to make sense out of the multitudes of information. continued on next slide

16 Intelligence-Gathering Process
Data description and integration methods Link analysis Flowcharting

17 Learning Objective 7.4 Explain the procedures for flowcharting used in intelligence-gathering operations.

18 Flowcharting Event flow analysis
The event is enclosed in a symbolic areas such as circle or rectangle. As different events are documented, they are connected by arrows to indicate the direction of the sequence. continued on next slide

19 Flowcharting Commodity flow analysis
Charts the logical flow of commodities such as drugs, money, illegal arms shipments

20 Auditing and Purging Files
Files that are no longer accurate, relevant to the mission of the unit, do not pertain to investigative interests and activities, or contain insufficient supporting documentation are among those that should be purged.

21 Explain the types of surveillance in criminal investigation.
Learning Objective 7.5 Explain the types of surveillance in criminal investigation.

22 Types of Surveillance Foot surveillance One-officer surveillance
Two-officer surveillance ABC method Progressive/leapfrog method continued on next slide

23 Types of Surveillance Vehicle surveillance One-car surveillance
Two-car surveillance Three-car surveillance Leapfrog method

24 Describe how a stakeout is conducted.
Learning Objective 7.6 Describe how a stakeout is conducted.

25 Stakeout Procedures Stationary Fixed surveillance Stakeout
continued on next slide

26 Stakeout Procedures Outside team Inside team The arrest team
The team responsible for briefing officers if a crime occurs

27 Summarize the legal requirements of electronic surveillance.
Learning Objective 7.7 Summarize the legal requirements of electronic surveillance.

28 Electronic Surveillance
With the growing use of high technology to investigate crime and uncover violations of criminal law, courts throughout the nation are evaluating the applicability of constitutional guarantees with regard to high-tech surveillance. continued on next slide

29 Electronic Surveillance
Forms of electronic surveillance GPS Computer Telephone and mobile phone Social networks Biometric Thermal imaging

30 Chapter Summary The collection of criminal intelligence is an important function of the criminal investigative process. Criminal investigations are reactive in nature. Intelligence gathering is a proactive function. continued on next slide

31 Chapter Summary Intelligence collection should be thought of as a process of connecting a series of interrelated components of information. Flowcharting is use in the data description and integration phase of the intelligence-gathering operation. continued on next slide

32 Chapter Summary There are four principal methods for conducting a moving surveillance on foot, as well as four methods for conducting moving surveillance in a vehicle. A stakeout is the tactical deployment of police officers in anticipation of the commission of a crime at a specific location. continued on next slide

33 Chapter Summary Courts throughout the nation are evaluating the applicability of constitutional guarantees with regard to high-tech surveillance.


Download ppt "7 Criminal Intelligence and Surveillance Operations."

Similar presentations


Ads by Google