Confidential Sources: Recruiting, Documenting and Managing (Stennett)
Description
Please be aware that this class is a 16-hour training. Therefore, the training will be 8am-5pm local time each day.
Even in this age of technical advancement, officers must remember that all types of crime are committed by humans, whose motives are constantly evolving and whose behavior cannot be accurately measured or predicted by technology. Successful patrol officers and investigators need to identify who is willing or can be induced to assist in criminal investigations and who will be acceptable by the courts and the public. That requires observing people of all ethnic and socioeconomic backgrounds and becoming familiar with the issues and quirks associated with potential sources.
This course provides comprehensive techniques for recruiting, documenting and managing confidential sources. Beginning with a history of confidential sources, it explores legal and ethical issues related to sources, types of assistance that can be obtained, personality traits and associated inducements, influences, motivation, and predictable behaviors. Participants will learn effective techniques for approaching a potential informant, encouraging cooperation, deploying the source, and properly documenting all activities.
Upon Completion:
Participants will be able to:
• Explain the historical use of confidential sources and how lessons apply to modern-day policing
• Understand how personality types affect a person’s reasoning to betray others
• Identify, approach, recruit, document and manage confidential sources
• Recognize the legal and ethical aspects of using sources
• Identify the management issues associated with each type of informant
• Apply ancient understanding of human attachment to modern-day inducements
• Recognize personality traits, individual motivations, rewards, and predicted behaviors
• Appreciate the value of consistency and commitment issues
• Steer an initial conversation into providing intelligence and cooperation
• Update the source file and closing policies
• Cite safety precautions and control associated with deploying sources
• Identify issues related to loaning sources to other agencies
• Facilitate high-risk and long-term undercover operations