SlideShare a Scribd company logo
Intelligence-Led Policingfor Police Decision-Makers by Deborah Osborne © 2009 Audio is at http://www.blogtalkradio.com/Deborah-Osborne/2009/09/23/Intelligence-Led-Policing-for-Decision-Makers-Webinar
Why ILP?      “So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now.  And many of the technological tools that expedite communication today were in their infancy or didn't even exist in 2001. ”   Janet Napolitano, Secretary, U.S. Department of Homeland Security, from  her July 29, 2009 speech at the Council on Foreign Relations
What is Intelligence? The Intelligence Elephant
A Fable      Six blind men encounter an elephant. The first blind man touches the elephant's leg, and he says an elephant is like a pillar. The second blind man touches the elephant's tail, and he says, no, an elephant is like a rope. The third blind man touches the elephant's trunk, and he says you're both crazy; an elephant is just like a tree branch. The fourth blind man touches the elephant's ear, and says he is certain that an elephant is like a hand held fan. The fifth man touches the elephant's belly, and he insists that an elephant is like a wall. The sixth man touches the elephant's tusk, and he says, you are all wrong—an elephant is like a solid pipe!
The Fable Continued…     The men were arguing about the elephant when a sighted man came along and asked them what was wrong. After they each told him what the elephant was like, he said, "You're all correct! An elephant has all the features you describe."
Intelligence HUMINT, OSINT, COMINT, SIGINT etc Top Secret, LE sensitive, Open Source Surveillance, wiretaps, informants Files on criminals &  organized crime activities Field intelligence Arrest records, parole, probation Crime incidents, calls for service, tip lines Maps, statistics, geography/frequency pattern analysis Analysis of patterns of weapons, targets, stolen goods, victims Modus Operandi analysis Activity flow analysis
Elephant Problems Lack of total situational awareness Lack of mobility and functionality Lack of language to communicate Lack of ability to perceive reality Fear of the elephant by larger society Fear of change Territorialism Solving only parts of problems rather than whole problems
Intelligence Cycle Planning Planning Re-evaluation Collection Collection Evaluation Evaluation Dissemination Collation Analysis
Consider the Cycle Planning Collection Planning and direction involves decision-makers setting tactical and strategic goals  Asking the right REALISTIC questions matters Planning and direction are not mentioned in the traditional crime analysis cycle Some of the best analysis involves unplanned analysis Quality and relevancy of information/data collection matters – we can’t analyze what has not been collected Gaps in collection will be uncovered and should be addressed Much of the data needed is already collected – but is untapped by analysts due to lack of knowledge, tools, imagination, training, and adequate staffing
Consider Cycle evaluation collation Evaluating the information/data collected for reliability, accuracy and relevance is crucial  Identification of collection gaps occurs here Good communication with collectors is needed Sorting the information/data to answer the right intelligence questions can be time-consuming Sometimes we overlook problems that involve multiple crime types or groups Technology helps immensely here – but data accuracy is needed to enhance effectiveness
Consider the Cycle analysis dissemination Analysis means breaking apart into pieces to study the parts Synthesis occurs here as the analyst puts the parts into a new “whole” so that something new and useful is created – relevant analytical product Beware of the “if I have a hammer everything is a nail” syndrome Intelligence that does not get to the right people in a timely manner is useless Dissemination requires clear policies regarding who gets what Dissemination to other agencies can be very effective in creating goodwill as well as combating crime
Consider the Cycle Re-evaluation Return to cycle Did the analytical product pass the “so-what” test? How can it be improved? Did the tactics and strategies to address the problem, employed by the decision-maker as a result of the analysis, work? Do we need to modify our actions? What else do we need to know? Did we find a new problem? The cycle usually involves going backwards and forward over and over again Analytical products should be updated and tracked Tactics and strategies put into place as a result of the analysis should be tracked New problems will arise and should be addressed
ILP for Local LE     “The second layer is local law enforcement.  And if you go out one ring from individuals and the private sector, you have 780,000 law enforcement officials across 18,000 state, local and tribal law enforcement agencies.  Let me just say those numbers again:  780,000 across 18,000 departments.  These men and women play an absolutely critical role, because they are the ones that can act on information they receive from individuals in the community, from their own observations, or from the intelligence community itself.  But the ability of state and local officials, as well as the private sector, to prepare for threats and to respond to a disaster is only as good as their ability to receive useful information, understand what it means and act upon it effectively. “Janet Napolitano, Secretary, U.S. Department of Homeland Security
Intelligence-led Policing     Intelligence-led policing is a business model and managerial philosophy where data analysis and crime intelligence are pivotal to an objective, decision-making framework that facilitates crime and problem reduction, disruption and prevention through both strategic management and effective enforcement strategies that target prolific and serious offenders. ,[object Object],[object Object]
Two Main Strategies Targeting the 6% Problem Analysis How do we identify the 6% of criminals who  commit 60% of crime ? How do we target the 6% of criminals who  commit 60% of crime ? Example: Why are some drug “markets” in the same place for decades in your town? What works and doesn’t work in addressing chronic crime problems?
Laws of Intelligence #1 “The most reliable indicator of future criminal activity is current criminal activity.” #2 “Intelligence that does not influence a decision-maker is not intelligence.” (Ratcliffe 2009)
Tasking & Coordination Recognizing that different levels of policing have differing missions The local intelligence  requirement must address crime and disorder at the local level The regional intelligence requirement must address criminal activity that crosses jurisdictions The federal intelligence requirement is dependent on the mission of the particular agency Tasking analysts based on appropriate intelligence requirements is mandatory for ILP Recognizing the needs of various levels is often absent from ILP strategies in the US because they come from top down requirements
Understanding Analytical Techniques & Products
The Analytical Divide “Crime Analysis” focus “Intelligence Analysis” focus Crime incident analysis 911 calls analysis Statistical analysis Geographic analysis MO analysis Local focus Associate analysis Financial analysis Communications analysis Commodities analysis Threat analysis State and federal focus We need integration and collaboration for improved situational awareness…
Collaboration Is ,[object Object],It requires leadership and vision…
Collaboration is Not These Things ,[object Object]
Coordinating involves making slight alterations to activities to accommodate the needs of another (i.e., one agency might change their hours so that they have staff available to receive referrals from another agency); and
Cooperating entails the sharing of resources (i.e., one agency may provide office space while another provides staff so that services can be co–located).,[object Object]
Stage One: Reactive ,[object Object]
 run to calls, investigate, do your best
 no analytical support
 little understanding of the value of crime    intelligence analysis ,[object Object],[object Object]
 generally rely on traditional policing based on trusting past experiences at the gut feeling level
 random impact on the criminal environment,[object Object]
 supports creativity in problem-solving and long-term projects by select individuals
 work is thus more isolated and limited by individual initiative and time/energy constraints
 some targeted impact on criminal environment – not sustained,[object Object]
Stage Five: Identifies with Institutions ,[object Object]
 meets regularly and analyze current crime    problems tactically and/or specifically ,[object Object],    embedded in the work, not often strategic ,[object Object],    compared to the chronic problems  ,[object Object],    defined procedures/missions ,[object Object],    lack of strategic focus
Stage Six: Combines Logic and Intuition ,[object Object],    combining crime analysis with intelligence,      quantitative information/qualitative information ,[object Object],investigators, incorporates with analytical info ,[object Object],    decision-making at the level of the working         officer as well as the top decision-makers ,[object Object],    criminal environment
Stage Seven: Holistic and Adaptive Agencies ,[object Object]
 forms and maintain strategic partnerships - shares
 identifies/addresses chronic problems/worst offenders ,[object Object]
 invest in quality & sufficient analytical staff –     provide the technology and training needed ,[object Object]
 significant impact to the criminal environment,     short-term and long-term, collaborate in problem-      solving with those outside the jurisdiction with      shared crime and criminal problems
Fusion Centers are a Beginning     “We've now moved three dozen intelligence analysts out to the field.  In other words, as we build the fusion centers, we need to move analytic capacity from the Beltway to the country.  So let's -- how this is used. And I'll take it out of the terrorism context for just a moment.  That if a law enforcement agency reports an increase in drug seizures of a particular type, that is a data point.  That's a piece of intelligence.  But a whole range of agencies working together in a particular fusion center can analyze that trend to understand what it means, how it will affect particular neighborhoods, and whether it foretells something even larger on the horizon. “  Janet Napolitano, Secretary, U.S. Department of Homeland Security
The Future of Decision-Making Tomorrow’s police leaders will understand the potential of technology (Web 2.0) They won’t settle for I-don’t-know They will be more collaborative They will be more networked They won’t be leaders for another 10-20 years Until then, the criminals will have the advantage – they are already connected, have hi-tech resources and the power to use them

More Related Content

What's hot

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
Hi Tech Criminal Justice
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
University of Dayton
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1guest846943
 
03 crime as choice
03 crime as choice03 crime as choice
03 crime as choiceJim Gilmer
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
Stuti Deshpande
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminology
Shaista Mariam
 
Crime statistics uses
Crime statistics  usesCrime statistics  uses
Crime statistics uses
RUFUSDEVAIRAKKAM1
 
Community policing
Community policing Community policing
Community policing
Vicky Pulido
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
History of Criminology
History of CriminologyHistory of Criminology
History of Criminology
Francis Postrado
 
Types of crime and violence
Types of crime and violenceTypes of crime and violence
Types of crime and violence
AlejandroBulan1
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of CrimeDani Cathro
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theory
NihaarikaSaini
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
Zubair
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
jaredplata
 
Lesson plan 3.2 community policing
Lesson plan 3.2 community policingLesson plan 3.2 community policing
Lesson plan 3.2 community policing
Joy Ordono
 
Routine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptxRoutine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptx
CDTESTAC
 

What's hot (20)

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
 
03 crime as choice
03 crime as choice03 crime as choice
03 crime as choice
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminology
 
Crime statistics uses
Crime statistics  usesCrime statistics  uses
Crime statistics uses
 
Community policing
Community policing Community policing
Community policing
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
History of Criminology
History of CriminologyHistory of Criminology
History of Criminology
 
Types of crime and violence
Types of crime and violenceTypes of crime and violence
Types of crime and violence
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of Crime
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theory
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
 
Community Policing
Community PolicingCommunity Policing
Community Policing
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Lesson plan 3.2 community policing
Lesson plan 3.2 community policingLesson plan 3.2 community policing
Lesson plan 3.2 community policing
 
Routine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptxRoutine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptx
 

Viewers also liked

Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
Angela Samuels
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Espionage
EspionageEspionage
Espionage
Tom Clowers
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
Joann Villareal
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleDario Ciro Vietri
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
InterQuest Group
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
Aleyda Solís
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
a16z
 

Viewers also liked (11)

Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Espionage
EspionageEspionage
Espionage
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Security training module
Security training moduleSecurity training module
Security training module
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to Intelligence Led Policing for Police Decision Makers

The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
Melissa Dudas
 
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is tReply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
felipaser7p
 
Effectiveness of Crime Control Measures in Nigeria
Effectiveness of Crime Control Measures in NigeriaEffectiveness of Crime Control Measures in Nigeria
Effectiveness of Crime Control Measures in Nigeria
Gabriel Ken
 
Predictive Policing Essay
Predictive Policing EssayPredictive Policing Essay
Predictive Policing Essay
Ashley Thomas
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
bartholomeocoombs
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
keturahhazelhurst
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
Tiffany Surratt
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led Policing
Christina Ramirez
 
Predictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-PolicingPredictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-PolicingMartin Smith
 
Predictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policingPredictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policing
Yellow Pages of Pakistan
 
4Intelligence-Led Policing The Integrationof Community .docx
4Intelligence-Led Policing The Integrationof Community .docx4Intelligence-Led Policing The Integrationof Community .docx
4Intelligence-Led Policing The Integrationof Community .docx
gilbertkpeters11344
 
Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)
Melissa Moore
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
glickauf
 
Unit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayUnit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayElizabeth Hall
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
healdkathaleen
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
todd271
 
Six Major Causes Of Wrongful Conviction
Six Major Causes Of Wrongful ConvictionSix Major Causes Of Wrongful Conviction
Six Major Causes Of Wrongful Conviction
Michelle Singh
 
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docxCRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
willcoxjanay
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
Sherry Bailey
 

Similar to Intelligence Led Policing for Police Decision Makers (20)

The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
 
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is tReply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
 
Effectiveness of Crime Control Measures in Nigeria
Effectiveness of Crime Control Measures in NigeriaEffectiveness of Crime Control Measures in Nigeria
Effectiveness of Crime Control Measures in Nigeria
 
Predictive Policing Essay
Predictive Policing EssayPredictive Policing Essay
Predictive Policing Essay
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led Policing
 
Predictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-PolicingPredictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-Policing
 
Predictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policingPredictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policing
 
4Intelligence-Led Policing The Integrationof Community .docx
4Intelligence-Led Policing The Integrationof Community .docx4Intelligence-Led Policing The Integrationof Community .docx
4Intelligence-Led Policing The Integrationof Community .docx
 
Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Unit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation EssayUnit 9 Hall Elizabeth Investigation Essay
Unit 9 Hall Elizabeth Investigation Essay
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Six Major Causes Of Wrongful Conviction
Six Major Causes Of Wrongful ConvictionSix Major Causes Of Wrongful Conviction
Six Major Causes Of Wrongful Conviction
 
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docxCRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
CRIME ANALYSIS FOR PROBLEM SOLVERSIn 660 SSmall SSteps R.docx
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 

Recently uploaded

What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
Lloyd Dobson Artist
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
TANMAYJAIN511570
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
ssuser8d5e2d1
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
Chandrakant Divate
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
ngochaavk33a
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
Michael Herlache, MBA
 

Recently uploaded (6)

What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
 

Intelligence Led Policing for Police Decision Makers

  • 1. Intelligence-Led Policingfor Police Decision-Makers by Deborah Osborne © 2009 Audio is at http://www.blogtalkradio.com/Deborah-Osborne/2009/09/23/Intelligence-Led-Policing-for-Decision-Makers-Webinar
  • 2. Why ILP? “So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now.  And many of the technological tools that expedite communication today were in their infancy or didn't even exist in 2001. ”   Janet Napolitano, Secretary, U.S. Department of Homeland Security, from her July 29, 2009 speech at the Council on Foreign Relations
  • 3. What is Intelligence? The Intelligence Elephant
  • 4. A Fable Six blind men encounter an elephant. The first blind man touches the elephant's leg, and he says an elephant is like a pillar. The second blind man touches the elephant's tail, and he says, no, an elephant is like a rope. The third blind man touches the elephant's trunk, and he says you're both crazy; an elephant is just like a tree branch. The fourth blind man touches the elephant's ear, and says he is certain that an elephant is like a hand held fan. The fifth man touches the elephant's belly, and he insists that an elephant is like a wall. The sixth man touches the elephant's tusk, and he says, you are all wrong—an elephant is like a solid pipe!
  • 5. The Fable Continued… The men were arguing about the elephant when a sighted man came along and asked them what was wrong. After they each told him what the elephant was like, he said, "You're all correct! An elephant has all the features you describe."
  • 6. Intelligence HUMINT, OSINT, COMINT, SIGINT etc Top Secret, LE sensitive, Open Source Surveillance, wiretaps, informants Files on criminals & organized crime activities Field intelligence Arrest records, parole, probation Crime incidents, calls for service, tip lines Maps, statistics, geography/frequency pattern analysis Analysis of patterns of weapons, targets, stolen goods, victims Modus Operandi analysis Activity flow analysis
  • 7. Elephant Problems Lack of total situational awareness Lack of mobility and functionality Lack of language to communicate Lack of ability to perceive reality Fear of the elephant by larger society Fear of change Territorialism Solving only parts of problems rather than whole problems
  • 8. Intelligence Cycle Planning Planning Re-evaluation Collection Collection Evaluation Evaluation Dissemination Collation Analysis
  • 9. Consider the Cycle Planning Collection Planning and direction involves decision-makers setting tactical and strategic goals Asking the right REALISTIC questions matters Planning and direction are not mentioned in the traditional crime analysis cycle Some of the best analysis involves unplanned analysis Quality and relevancy of information/data collection matters – we can’t analyze what has not been collected Gaps in collection will be uncovered and should be addressed Much of the data needed is already collected – but is untapped by analysts due to lack of knowledge, tools, imagination, training, and adequate staffing
  • 10. Consider Cycle evaluation collation Evaluating the information/data collected for reliability, accuracy and relevance is crucial Identification of collection gaps occurs here Good communication with collectors is needed Sorting the information/data to answer the right intelligence questions can be time-consuming Sometimes we overlook problems that involve multiple crime types or groups Technology helps immensely here – but data accuracy is needed to enhance effectiveness
  • 11. Consider the Cycle analysis dissemination Analysis means breaking apart into pieces to study the parts Synthesis occurs here as the analyst puts the parts into a new “whole” so that something new and useful is created – relevant analytical product Beware of the “if I have a hammer everything is a nail” syndrome Intelligence that does not get to the right people in a timely manner is useless Dissemination requires clear policies regarding who gets what Dissemination to other agencies can be very effective in creating goodwill as well as combating crime
  • 12. Consider the Cycle Re-evaluation Return to cycle Did the analytical product pass the “so-what” test? How can it be improved? Did the tactics and strategies to address the problem, employed by the decision-maker as a result of the analysis, work? Do we need to modify our actions? What else do we need to know? Did we find a new problem? The cycle usually involves going backwards and forward over and over again Analytical products should be updated and tracked Tactics and strategies put into place as a result of the analysis should be tracked New problems will arise and should be addressed
  • 13. ILP for Local LE “The second layer is local law enforcement.  And if you go out one ring from individuals and the private sector, you have 780,000 law enforcement officials across 18,000 state, local and tribal law enforcement agencies.  Let me just say those numbers again:  780,000 across 18,000 departments.  These men and women play an absolutely critical role, because they are the ones that can act on information they receive from individuals in the community, from their own observations, or from the intelligence community itself.  But the ability of state and local officials, as well as the private sector, to prepare for threats and to respond to a disaster is only as good as their ability to receive useful information, understand what it means and act upon it effectively. “Janet Napolitano, Secretary, U.S. Department of Homeland Security
  • 14.
  • 15. Two Main Strategies Targeting the 6% Problem Analysis How do we identify the 6% of criminals who commit 60% of crime ? How do we target the 6% of criminals who commit 60% of crime ? Example: Why are some drug “markets” in the same place for decades in your town? What works and doesn’t work in addressing chronic crime problems?
  • 16. Laws of Intelligence #1 “The most reliable indicator of future criminal activity is current criminal activity.” #2 “Intelligence that does not influence a decision-maker is not intelligence.” (Ratcliffe 2009)
  • 17. Tasking & Coordination Recognizing that different levels of policing have differing missions The local intelligence requirement must address crime and disorder at the local level The regional intelligence requirement must address criminal activity that crosses jurisdictions The federal intelligence requirement is dependent on the mission of the particular agency Tasking analysts based on appropriate intelligence requirements is mandatory for ILP Recognizing the needs of various levels is often absent from ILP strategies in the US because they come from top down requirements
  • 19. The Analytical Divide “Crime Analysis” focus “Intelligence Analysis” focus Crime incident analysis 911 calls analysis Statistical analysis Geographic analysis MO analysis Local focus Associate analysis Financial analysis Communications analysis Commodities analysis Threat analysis State and federal focus We need integration and collaboration for improved situational awareness…
  • 20.
  • 21.
  • 22. Coordinating involves making slight alterations to activities to accommodate the needs of another (i.e., one agency might change their hours so that they have staff available to receive referrals from another agency); and
  • 23.
  • 24.
  • 25. run to calls, investigate, do your best
  • 26. no analytical support
  • 27.
  • 28. generally rely on traditional policing based on trusting past experiences at the gut feeling level
  • 29.
  • 30. supports creativity in problem-solving and long-term projects by select individuals
  • 31. work is thus more isolated and limited by individual initiative and time/energy constraints
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. forms and maintain strategic partnerships - shares
  • 38.
  • 39.
  • 40. significant impact to the criminal environment, short-term and long-term, collaborate in problem- solving with those outside the jurisdiction with shared crime and criminal problems
  • 41. Fusion Centers are a Beginning “We've now moved three dozen intelligence analysts out to the field.  In other words, as we build the fusion centers, we need to move analytic capacity from the Beltway to the country.  So let's -- how this is used. And I'll take it out of the terrorism context for just a moment.  That if a law enforcement agency reports an increase in drug seizures of a particular type, that is a data point.  That's a piece of intelligence.  But a whole range of agencies working together in a particular fusion center can analyze that trend to understand what it means, how it will affect particular neighborhoods, and whether it foretells something even larger on the horizon. “  Janet Napolitano, Secretary, U.S. Department of Homeland Security
  • 42. The Future of Decision-Making Tomorrow’s police leaders will understand the potential of technology (Web 2.0) They won’t settle for I-don’t-know They will be more collaborative They will be more networked They won’t be leaders for another 10-20 years Until then, the criminals will have the advantage – they are already connected, have hi-tech resources and the power to use them
  • 51. Consider this: Wilbur Wright didn’t have a pilot’s license. Questions?