Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Confidential Sources: Recruiting, Documenting and Managing (Stennett)

Description

 

Please be aware that this class is a 16-hour training. Therefore, the training will be 8am-5pm local time each day.

 

 

Even in this age of technical advancement, officers must remember that all types of crime are committed by humans, whose motives are constantly evolving and whose behavior cannot be accurately measured or predicted by technology. Successful patrol officers and investigators need to identify who is willing or can be induced to assist in criminal investigations and who will be acceptable by the courts and the public. That requires observing people of all ethnic and socioeconomic backgrounds and becoming familiar with the issues and quirks associated with potential sources.

This course provides comprehensive techniques for recruiting, documenting and managing confidential sources. Beginning with a history of confidential sources, it explores legal and ethical issues related to sources, types of assistance that can be obtained, personality traits and associated inducements, influences, motivation, and predictable behaviors. Participants will learn effective techniques for approaching a potential informant, encouraging cooperation, deploying the source, and properly documenting all activities.

Upon Completion:
Participants will be able to:

• Explain the historical use of confidential sources and how lessons apply to modern-day policing
• Understand how personality types affect a person’s reasoning to betray others
• Identify, approach, recruit, document and manage confidential sources
• Recognize the legal and ethical aspects of using sources
• Identify the management issues associated with each type of informant
• Apply ancient understanding of human attachment to modern-day inducements
• Recognize personality traits, individual motivations, rewards, and predicted behaviors
• Appreciate the value of consistency and commitment issues
• Steer an initial conversation into providing intelligence and cooperation
• Update the source file and closing policies
• Cite safety precautions and control associated with deploying sources
• Identify issues related to loaning sources to other agencies
• Facilitate high-risk and long-term undercover operations

Similar seminars

Mobile Phone Investigations and Cellular Record Analysis

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information
Advanced Financial Crimes Investigations

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS. THERE ARE NO PREREQUISITES FOR THIS CLASS. NEW AND SEASONED OFFICERS ARE WELCOME.

More Information
Calming The Fire: Principles for De-escalation and Understanding People

This is a 3-day class. Start time is 8:00am - 4:00pm local time each day.

More Information
Covert Surveillance

NOTE: DAY 1 OF THIS CLASS WILL BEGIN AT 4:00PM-MIDNIGHT DAY 2 OF THIS CLASS WILL BEGIN AT 8:00AM-4:00PM

More Information
New Detective and Criminal Investigator (Conference)

This course is a comprehensive INTRODUCTORY LEVEL overview for the law enforcement officer who has recently the crucial task of conducting supplemental investigations of suspected criminal offenses.

More Information
Officer-Involved Shooting and Use-of-Deadly Force 5-Day (Kempf)

This is a 4.5 day class. The PD hours for this class are 40 due to assignments that are given during class and as homework.

More Information
Mobile Phone Investigations and Cellular Record Analysis (Conference)

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information
New Detective and Criminal Investigator

This course is a comprehensive INTRODUCTORY LEVEL overview for the law enforcement officer who has recently the crucial task of conducting supplemental investigations of suspected criminal offenses.

More Information
Killers and Their Victims

WARNING: Graphic images and discussions are included in this course

More Information

Press enter to see more results