Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Confidential Sources: Recruiting, Documenting and Managing (Broadway)

Description

In recent years, technology and intelligence analytical methods available to law enforcement investigators have made headlines. In this age of technical advancement, it must not be forgotten that crime, whether local, or international terrorism, is committed by humans. The motives of humans are constantly evolving and individual behaviors cannot be accurately measured or predicted by technology. The effective patrol officer and thorough investigator must learn to integrate the skillful art of influencing people with the latest technology to build solid cases, uncover criminal behavior and forecast future events.

It is critical for the successful investigator to identify people who are willing, or can be induced, to assist in criminal investigations and who will be acceptable by the courts as well as the policed public. To become an effective recruiter, the skillful investigator must learn to observe people of all ethnic and socioeconomic backgrounds and become familiar with the issues and quirks associated with potential sources. At the conclusion of this block of instruction, the attendees will be familiar with the historical use of confidential sources and how lessons learned apply to modern day policing. The investigator will understand how personality types affect a person’s reasoning to betray others. The investigator will learn how to identify, approach, recruit, document and manage confidential sources.

 

  • The History of Confidential Sources: This block of instruction focuses on the need for and use of confidential sources throughout history from war time spy application to criminal investigations. Infamous confidential sources will be examined to include development, use and public perception.
  • Legal Issues: This block of instruction will concentrate on the legalities of recruitment, suitability, development of probable cause, payment/rewards, promises and acceptable behaviors.
  • Ethics and the Use of Confidential Sources: This block of instruction will be a precautionary warning for the use of confidential sources and possible negative public relations.
  • Types of Human Intelligence and Assistance: This block of instruction will cover the different types of confidential sources of information and management issues related to each.
  • Threading: This block of instruction will explore this ancient method of understanding human attachment as it relates to modern day inducementsthe confidential source and warning signs for operatives used during and after deployment.
  • Recognizing Personality Traits: This block of instruction will explore different personality traits related to the confidential source’s abilities and predicted future behaviors.
  • Principles of Influence: This block of instruction will list and explain consistency and commitment issues of individuals as it relates to cooperation.
  • Motivation and Predictable Behaviors: This block of instruction will examine the “Hierarchy of Needs” and its role in influencing cooperation.
  • Identifying the Potential Source: This block of instruction will list traditional areas law enforcement uses to cultivate confidential sources as well as new avenues created by recent events.
  • The Initial Approach and Conversation: This block of instruction will familiarize the attendee with techniques on how to steer a conversation into providing intelligence and cooperation
  • Identifying a Palatable Motivation: This block of instruction will utilize earlier blocks of instruction to identify motivations unique to a target individual.
  • Documenting the Confidential Source: During this block of instruction, a documenting packet will be provided to each student. The instructor will then go line by line emphasizing critical areas. Further covered in this block will be updating the source file and closing policies
  • Deploying the Confidential Source: This block of instruction will cover issues concerning risk vs. gain, safety precautions and control of confidential sources.
  • Loaning Out the Confidential Source: This block of instruction will cover issues concerning the loaning of your documented source to different agencies and possible converging policy issues.
  • Payments and Rewards: This block of instruction will cover how to make acceptable compensation to confidential sources and creative ways to foster future cooperation.
  • High Risk and Long Term Deployments: This block of instruction will cover suitability, logistical needs and cover documents to facilitate a long term undercover operation. The block will further cover contracts and conditions of release for the high risk confidential source.
  • Anticipated Effects on Long Term Undercover Work: The course of study will end with a critical checklist for controlling the confidential source and warning signs for operatives used during and after deployment. 

Similar seminars

Calming The Fire: Principles for De-escalation and Understanding People

This is a 3-day class. Start time is 8:00am - 4:00pm local time each day.

More Information
Covert Surveillance

NOTE: DAY 1 OF THIS CLASS WILL BEGIN AT 4:00PM-MIDNIGHT DAY 2 OF THIS CLASS WILL BEGIN AT 8:00AM-4:00PM

More Information
Killers and Their Victims

WARNING: Graphic images and discussions are included in this course

More Information

Press enter to see more results