SlideShare a Scribd company logo
1 of 17
Training Course 1
Fundamentals of Confidential
Informant
Management
The aim of this training is to introduce law
enforcement officers to the fundamentals
principles involved in managing a
confidential informant
Instructions
• This training is provided through a series of PowerPoint
presentations.
• It is intended to provide officers with a basic understanding
of the concepts involved.
• Each lesson should be read in order and significant thought
should be given to each slide.
• These slides should not be regarded as providing a
substitute for professionally delivered training.
• Confidential informants should be managed in
accordance with legislation and the agency’s policies.
Course Content
• Lesson 1 – Definitions
• Lesson 2 – Roles and responsibilities
• Lesson 3 – Structures and records
• Lesson 4 – Civil Liberties and ethics
• Lesson 5 – Managing risk
• Lesson 6 – Intelligence led policing and
informants
• Lesson 7 – Maximizing information obtained
• Lesson 8 – High risk deployments
• Lesson 9 – Finance and rewards
Training Course 1
Fundamentals of Confidential
Informant
Management
Lesson 1
Definitions
Common language
• “If we allow certain key words in our vocabulary to remain
undefined we tend to project an “illusion of meaning” that
ultimately hinders and misdirects our thinking.”
S I Hayakawa, U S Senator
• “The first step in wisdom is to know the things themselves; this
notion consists in having a true idea of the objects; objects are
distinguished and known by classifying them methodically and
giving them appropriate names. Therefore, classification and
name-giving will be the foundation of our science.”
Carolus Linnaeus: Systema Naturae (1735) Translation - M. S. J.
Engel-Ledeboer and H. Engel (1964)
What is a ‘confidential informant’
• The term is:
• Recognized in US judicial system
• Defined in the legislation of some states
• Frequently quoted in case law
• But:
• It is used to refer to many different types of person
who provide information to law enforcement
• In different sets of circumstance
• For various purposes
• Is often misused and misunderstood
Management of Confidential
Informants
• If officers are to manage a confidential informant
in appropriate way they must be clear about:
• The standards of behavior expected
• The category of person to whom those standards apply
• The criteria that have to me met to fall within that
category
• The identity of the manager in the agency who has the
final word on the matter
• How a person is to be managed when they do not meet
the criteria to fall within the specified category.
Categories of confidential informant
• There are three categories that command an
adequate starting place all of which will fall within
the broader understanding of the established
term 'confidential informant‘:
1. Registered human source
2. Collaborating witness
3. Member of the public
• The terms do not change the legal standing of any
person and are used purely from a pragmatic
perspective to allow appropriate structures to be
put in place by an agency.
Registered Human Source
• The term refers to a person with whom the law
enforcement agency (LEA):
• enters into a relationship
• in order to provide information
• over an identified period of time
• under specified set of circumstances.
• The relationship is authorised by someone in a
management position within the LEA following an
agreed application process.
• All aspects of that relationship are documented.
Collaborating Witness
• This term refers to a person who is in custody, or
who is a co-accused and with whom a LEA:
• enters into a relationship
• with the intention that the person will give evidence
against another person.
• Such a person is often referred to as a 'jailhouse
informant’ or ‘jailhouse snitch.‘
• The key element here is the ‘intention’ to use the
person as a witness.
• Many states have legislation pertaining to such
people
Member of the Public
• This term refers to any other persons who does not
fall within either Category 1 or 2 and who
• passes information to a LEA
• has the expectation that their identity remains
confidential (i.e. No one outside the LEA will know
they have passed the information).
• This category is by its very nature a broad one
with people passing information under very varied
circumstances e.g. concerned citizens,
professionals, casual conversations with criminals,
community leaders, etc.
Interconnected
• There are many things that connect these three
categories of confidential:
• The agency has a duty to take reasonable steps to protect
the safety of all.
• A ‘member of the public’ may initially give one piece of
information but go on to become a ‘registered human
source.’
• There may be tasks a collaborating witness has to do that
are similar to an registered human source, prior to them
revealing their role as a witness.
• Agency structures must be constructed to allow
for these and other aspects of interconnectivity.
Differences
• There are significant differences in managing the
three categories including:
• Only properly trained officers should be involved in managing
a ‘registered human source’ or a ‘collaborating witness’ while
any member of the agency may take information from a
‘member of the public.’
• Evidential statements should be recorded after every
encounter with a ‘collaborating witness’.
• An agency is likely to have the resources to manage a very
limited number of registered human sources.
• The remainder of this lesson deals solely with
registered human sources
Explaining the term
There are three key elements to the term ‘registered
human source:
• Registered – The use of this word is intended to emphasize the
fact that the role the person has been recorded by the
agency and that that individual is being managed to an
agreed set of standards.
• Human – The use of word has two purposes .It distinguishes the
origin of the information collected from other methods of
collection and it is intended to stress the reality that such
individuals are driven by the same basic needs and desires as
others human beings.
• Source – This use of this word has two purposes. It is intended to
highlight that the person is a source of information and it is a
non derogatory term unlike such words commonly used such
as ‘snitch’ or ‘rat’
Cornerstones
There are three foundation stones to managing
confidential informants safely and effectively:
1.Comprehensive policies and procedures making it clear to all who
does what and when and under any given set of circumstances with
regard to a registered human source. Few agencies have adequate
policies or procedures to protect them.
2.A purpose built computerized informant management system. This is
needed to keep all informant records securely and to save time and
resources. Existing systems do not have adequate security or the
functionality needed.
3.Training is essential for every officer, regardless of rank, that has
responsibility for managing registered human sources. A failure to
provide adequate training for the officers is negligence.
Information and Intelligence
• A registered human source provides ‘information’.
• That information should be submitted to a central
location within the LEA for processing to
‘intelligence’.
• Only when it is processed into intelligence should
it be disseminated for ‘action’.
• Those collecting information from a registered
human source should not be allowed to act upon
it, without it going through a centralized location
for processing. This is one of the most important
safeguards to prevent corruption.
Some brief notes
• In the vast majority of instances the identity of a registered
human source should never enter the public domain.
• The ‘true identities’ of all registered human sources should
be kept in one secure location within a LEA.
• Agencies have a very clear duty to protect the life and
safety of any person they use as a registered human
source.
• Managing human sources is a high risk for an agency, the
officers the source and the public. Risks need to be
managed effectively.
• If managed correctly registered human sources can
provide huge amounts of valuable information that can be
used to protect life, prevent crime and bring perpetrators
to justice.

More Related Content

Similar to Lesson 1 - Definitons

21st Century Policing Presentation
21st Century Policing Presentation21st Century Policing Presentation
21st Century Policing Presentationtofcolchester
 
Diminished capacity and the client
Diminished capacity and the clientDiminished capacity and the client
Diminished capacity and the clientOmar Ha-Redeye
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxcelenarouzie
 
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framing
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and FramingBehavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framing
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framingmilfamln
 
Best Technical Writing For Beginners 2023 - AtOnce
Best Technical Writing For Beginners 2023 - AtOnceBest Technical Writing For Beginners 2023 - AtOnce
Best Technical Writing For Beginners 2023 - AtOnceTracy Hill
 
Transparency On Linkedin
Transparency   On LinkedinTransparency   On Linkedin
Transparency On Linkedinjaikishanreddy
 
Remember The Titans Essay. Remember the titans essay film techniques used in ...
Remember The Titans Essay. Remember the titans essay film techniques used in ...Remember The Titans Essay. Remember the titans essay film techniques used in ...
Remember The Titans Essay. Remember the titans essay film techniques used in ...Felicia Gonzales
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxKettyM1
 
Rise of the Private Police
Rise of the Private PoliceRise of the Private Police
Rise of the Private PoliceDavid Ramirez
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docx
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docxInvestigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docx
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docxLaticiaGrissomzz
 
10 Best Free Writing Course
10 Best Free Writing Course10 Best Free Writing Course
10 Best Free Writing CourseMaggie Turner
 
The rti act and its challenges
The rti act and its challengesThe rti act and its challenges
The rti act and its challengesAshutosh Sharma
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethicsOther Mother
 
MIL_Lesson 4_Information Literacy.pdf
MIL_Lesson 4_Information Literacy.pdfMIL_Lesson 4_Information Literacy.pdf
MIL_Lesson 4_Information Literacy.pdfranniejhon
 
Unit hsc m4 week 4
Unit hsc m4 week 4Unit hsc m4 week 4
Unit hsc m4 week 4HCEfareham
 

Similar to Lesson 1 - Definitons (20)

21st Century Policing Presentation
21st Century Policing Presentation21st Century Policing Presentation
21st Century Policing Presentation
 
Diminished capacity and the client
Diminished capacity and the clientDiminished capacity and the client
Diminished capacity and the client
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docx
 
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framing
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and FramingBehavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framing
Behavioral Ethics & Personal Finance: A Discussion of Morality, Bias and Framing
 
Best Technical Writing For Beginners 2023 - AtOnce
Best Technical Writing For Beginners 2023 - AtOnceBest Technical Writing For Beginners 2023 - AtOnce
Best Technical Writing For Beginners 2023 - AtOnce
 
Transparency On Linkedin
Transparency   On LinkedinTransparency   On Linkedin
Transparency On Linkedin
 
Remember The Titans Essay. Remember the titans essay film techniques used in ...
Remember The Titans Essay. Remember the titans essay film techniques used in ...Remember The Titans Essay. Remember the titans essay film techniques used in ...
Remember The Titans Essay. Remember the titans essay film techniques used in ...
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptx
 
Rise of the Private Police
Rise of the Private PoliceRise of the Private Police
Rise of the Private Police
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docx
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docxInvestigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docx
Investigative Intelligence- Chapter 5 Lecture NotesAWASH WIT.docx
 
Care value base
Care value baseCare value base
Care value base
 
10 Best Free Writing Course
10 Best Free Writing Course10 Best Free Writing Course
10 Best Free Writing Course
 
The rti act and its challenges
The rti act and its challengesThe rti act and its challenges
The rti act and its challenges
 
Being A Probation Officer
Being A Probation OfficerBeing A Probation Officer
Being A Probation Officer
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethics
 
MIL_Lesson 4_Information Literacy.pdf
MIL_Lesson 4_Information Literacy.pdfMIL_Lesson 4_Information Literacy.pdf
MIL_Lesson 4_Information Literacy.pdf
 
Unit hsc m4 week 4
Unit hsc m4 week 4Unit hsc m4 week 4
Unit hsc m4 week 4
 

Recently uploaded

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Lesson 1 - Definitons

  • 1. Training Course 1 Fundamentals of Confidential Informant Management The aim of this training is to introduce law enforcement officers to the fundamentals principles involved in managing a confidential informant
  • 2. Instructions • This training is provided through a series of PowerPoint presentations. • It is intended to provide officers with a basic understanding of the concepts involved. • Each lesson should be read in order and significant thought should be given to each slide. • These slides should not be regarded as providing a substitute for professionally delivered training. • Confidential informants should be managed in accordance with legislation and the agency’s policies.
  • 3. Course Content • Lesson 1 – Definitions • Lesson 2 – Roles and responsibilities • Lesson 3 – Structures and records • Lesson 4 – Civil Liberties and ethics • Lesson 5 – Managing risk • Lesson 6 – Intelligence led policing and informants • Lesson 7 – Maximizing information obtained • Lesson 8 – High risk deployments • Lesson 9 – Finance and rewards
  • 4. Training Course 1 Fundamentals of Confidential Informant Management Lesson 1 Definitions
  • 5. Common language • “If we allow certain key words in our vocabulary to remain undefined we tend to project an “illusion of meaning” that ultimately hinders and misdirects our thinking.” S I Hayakawa, U S Senator • “The first step in wisdom is to know the things themselves; this notion consists in having a true idea of the objects; objects are distinguished and known by classifying them methodically and giving them appropriate names. Therefore, classification and name-giving will be the foundation of our science.” Carolus Linnaeus: Systema Naturae (1735) Translation - M. S. J. Engel-Ledeboer and H. Engel (1964)
  • 6. What is a ‘confidential informant’ • The term is: • Recognized in US judicial system • Defined in the legislation of some states • Frequently quoted in case law • But: • It is used to refer to many different types of person who provide information to law enforcement • In different sets of circumstance • For various purposes • Is often misused and misunderstood
  • 7. Management of Confidential Informants • If officers are to manage a confidential informant in appropriate way they must be clear about: • The standards of behavior expected • The category of person to whom those standards apply • The criteria that have to me met to fall within that category • The identity of the manager in the agency who has the final word on the matter • How a person is to be managed when they do not meet the criteria to fall within the specified category.
  • 8. Categories of confidential informant • There are three categories that command an adequate starting place all of which will fall within the broader understanding of the established term 'confidential informant‘: 1. Registered human source 2. Collaborating witness 3. Member of the public • The terms do not change the legal standing of any person and are used purely from a pragmatic perspective to allow appropriate structures to be put in place by an agency.
  • 9. Registered Human Source • The term refers to a person with whom the law enforcement agency (LEA): • enters into a relationship • in order to provide information • over an identified period of time • under specified set of circumstances. • The relationship is authorised by someone in a management position within the LEA following an agreed application process. • All aspects of that relationship are documented.
  • 10. Collaborating Witness • This term refers to a person who is in custody, or who is a co-accused and with whom a LEA: • enters into a relationship • with the intention that the person will give evidence against another person. • Such a person is often referred to as a 'jailhouse informant’ or ‘jailhouse snitch.‘ • The key element here is the ‘intention’ to use the person as a witness. • Many states have legislation pertaining to such people
  • 11. Member of the Public • This term refers to any other persons who does not fall within either Category 1 or 2 and who • passes information to a LEA • has the expectation that their identity remains confidential (i.e. No one outside the LEA will know they have passed the information). • This category is by its very nature a broad one with people passing information under very varied circumstances e.g. concerned citizens, professionals, casual conversations with criminals, community leaders, etc.
  • 12. Interconnected • There are many things that connect these three categories of confidential: • The agency has a duty to take reasonable steps to protect the safety of all. • A ‘member of the public’ may initially give one piece of information but go on to become a ‘registered human source.’ • There may be tasks a collaborating witness has to do that are similar to an registered human source, prior to them revealing their role as a witness. • Agency structures must be constructed to allow for these and other aspects of interconnectivity.
  • 13. Differences • There are significant differences in managing the three categories including: • Only properly trained officers should be involved in managing a ‘registered human source’ or a ‘collaborating witness’ while any member of the agency may take information from a ‘member of the public.’ • Evidential statements should be recorded after every encounter with a ‘collaborating witness’. • An agency is likely to have the resources to manage a very limited number of registered human sources. • The remainder of this lesson deals solely with registered human sources
  • 14. Explaining the term There are three key elements to the term ‘registered human source: • Registered – The use of this word is intended to emphasize the fact that the role the person has been recorded by the agency and that that individual is being managed to an agreed set of standards. • Human – The use of word has two purposes .It distinguishes the origin of the information collected from other methods of collection and it is intended to stress the reality that such individuals are driven by the same basic needs and desires as others human beings. • Source – This use of this word has two purposes. It is intended to highlight that the person is a source of information and it is a non derogatory term unlike such words commonly used such as ‘snitch’ or ‘rat’
  • 15. Cornerstones There are three foundation stones to managing confidential informants safely and effectively: 1.Comprehensive policies and procedures making it clear to all who does what and when and under any given set of circumstances with regard to a registered human source. Few agencies have adequate policies or procedures to protect them. 2.A purpose built computerized informant management system. This is needed to keep all informant records securely and to save time and resources. Existing systems do not have adequate security or the functionality needed. 3.Training is essential for every officer, regardless of rank, that has responsibility for managing registered human sources. A failure to provide adequate training for the officers is negligence.
  • 16. Information and Intelligence • A registered human source provides ‘information’. • That information should be submitted to a central location within the LEA for processing to ‘intelligence’. • Only when it is processed into intelligence should it be disseminated for ‘action’. • Those collecting information from a registered human source should not be allowed to act upon it, without it going through a centralized location for processing. This is one of the most important safeguards to prevent corruption.
  • 17. Some brief notes • In the vast majority of instances the identity of a registered human source should never enter the public domain. • The ‘true identities’ of all registered human sources should be kept in one secure location within a LEA. • Agencies have a very clear duty to protect the life and safety of any person they use as a registered human source. • Managing human sources is a high risk for an agency, the officers the source and the public. Risks need to be managed effectively. • If managed correctly registered human sources can provide huge amounts of valuable information that can be used to protect life, prevent crime and bring perpetrators to justice.