暗記メーカー
ログイン
Intelligence and Information
  • ユーザ名非公開

  • 問題数 76 • 5/27/2024

    記憶度

    完璧

    11

    覚えた

    28

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Define Intelligence

    Intelligence is intormation that has been subject to a defined evalation and risk assessment process (3x5x2) in order to assist with police decision making. - It is also formulaically denhedas Information + Analysis = Intelligence.

  • 2

    What is the difference between intelligence and information?

    Information refers to all forms of information obtained, recorded, or processed by the police, including personal data and intelligence. Intelligence is defined as information that has been subject to a ‘defined evaluation and risk assessment process (3x5x2) in order to assist with police decision making.

  • 3

    What is Community Policing?

    - Police and community collaborating/interacting. - Officers are accountable in needing to know their area. - Allows community to have a say in policing priorities. - Enhances decision making at lower levels (bottom up). - Builds police legitimacy in eyes of public. - Community safety takes priority.

  • 4

    What are the pros of community policing?

    - Community satisfaction - Police legitimacy and confidence in police is central aim. - Focus on community priorities. - It is ‘bottom up’. - Local police are responsible.

  • 5

    What are the cons of community policing?

    - Community policing is so ‘broad that police officers are inundated with requests that go beyond the scope of traditional law enforcement. - About community reassurance rather than fighting crime. - It’s ‘target’ outcome is unclear. - Limited effect on crime, or fear of crime.

  • 6

    What is problem-oriented-policing about?

    - Hollistic ‘problem solving’. - Long term fix (not short term). - Not just detecting crime and making arrests, but addressing root problems. - Uses SARA model.

  • 7

    What is the SARA model?

    - Scanning: identifying recurring problems + impact on community. - Analysis: Collecting + analysing data e.g. time of occurrence, location, and how to alter causes. - Response: What responses work elsewhere; pick a range of local options then pick best. - Assessment: Did the response reduce the problem; if no identify other strategies that may work.

  • 8

    What are the pros of problem-oriented-policing?

    - Officers and analysts to ID and solve the problem. - Seeks long term solution. - Looks at not just criminal law/sanctions as a resolution. - Success of intervention is evaluated. - Links in well with situational crime. - Solutions grounded in evidence base (what works?).

  • 9

    What are the cons of problem-oriented-policing?

    - Officers defer to management to resolve the problems. - Officers cannot control whether these issues get resourced and cannot operationalise their solutions. - It requires a culture change: officers are prone to be prosecution oriented.

  • 10

    What is Compstat?

    - Involves face to face performance meetings to compare statistics, addresses crime trends, patterns, hotspot mapping. - Holds middle managers to account for delivering crime reduction strategies. - One of key reforms introduced to NYPD on zero tolerance policing in 1990s. - It’s about blending data crunching (crime mapping) with operational strategy.

  • 11

    What are the pros of compstat?

    - Encourages internal accountability and development of local problem solving. - Meetings focused on problem solving (rather than blame) had greater innovation and stronger crime control gains. - Good evidence in targeting recidivist offenders in Australia.

  • 12

    What are the cons of compstat?

    - Introduced alongside other strategies e.g. (hotspot policing) - difficult to assess effectiveness. - Meetings ‘held people to account’ rather than problem solved. - Pressure could encourage manipulation of crime figures. - Reinforces traditional ‘command and control’ hierarchical approach. - Commanders apply traditional and reactive methods e.g. directed patrol + offender arrests. - Few commanders are trained to interpret mapping.

  • 13

    What is predictive policing?

    - Use of historical data to forecast future criminality and therefore make decisions about having officers at a time and place to defer criminal activity.

  • 14

    Define intelligence led policing.

    - Intelligence-led policing emphasises analysis and intelligence as pivotal to an objective, decision-making framework that prioritises crime hot spots, repeat victims, prolific offenders and criminal groups. - It facilitates crime and harm reduction, disruption, and prevention through strategies, and tactical management, deployment and enforcement.

  • 15

    Why did intelligence-led policing develop?

    - A 1993 Audit Commision Report concluded: A need to target criminals (not the crime) and focus on ‘forensic and intelligence based’ evidence. Rely on informants, and undercover surveillance.

  • 16

    What is intelligence-led policing?

    - Business model for policing, not a process for ‘managing intelligence’. - Several central themes: 1. Targets prolific + serious criminals proactively. 2. Screens out most crime from further investigation. 3. Makes greater strategic use of surveillance + informants; cultivates informants and tasks them to produce info on high priority crimes and criminals. 4. Positions intelligence to central decision making should at the hub of operational policing. - Many modern approaches to risk - looks at chronic high risks, rather than individual offence detection. - Places analysis at the centre of decision making, including solving ‘traffic, patrol and partnership activities’. - Not just linked to gathering intel from informants or surveillance. - Necessity to be more ‘efficient and effective’. - Crime analysis of crime patterns (places), hotspot data, and intelligence about offenders. Blend of knowledge about offenders and about crime events. - Places emphasis on information sharing and collaboration and strategic solutions to crime problems. - Antithesis of community policing. - Like compstat, hierarchical and top down. - Intelligence officers and analysts guide operations rather than the other way around. - Intelligence led policing that is the philosophy underpinning the police national intelligence model (NIM).

  • 17

    When was NIM introduced?

    - 2004, rolled out across 43 forces in England and Wales.

  • 18

    Why was NIM needed?

    - Frustration of central government and senior police ranks. - Traditional reactive methods not effective (not proactive). - Why were police failing to reduce crime? (anti logical crisis). - Volume crime committed by a few prolific offenders (let’s target them). - Let’s more effectively target using technology (surveillance equipment).

  • 19

    What is NIM?

    - Business model that prioritises use of resources, coordinating action for targeting serial perpetrators, organised crime groups (OCGs), and crime hotspots. - Not just about ‘intelligence processes’, some think it has been wrongly named and should be the national policing model. - Standardising processes, structures, and practices across police service. - Promoting ILP. - Problem solving approach.

  • 20

    What are the different levels of NIM?

    - Improves flow of info from the small micro level of a division to macro level of a nation (divisions/forces/region/nation). - Level 1 is concerned with local area (basic command unit (BCU) (division or one force). - Level 2 is force and cross-regional issues. - Level 3 is national and international threats (serious and organised crime).

  • 21

    What are the policing purposes?

    - Officers are responsible for recording and disseminating info which must have a policing purpose. 1. Protecting life and purpose. 2. Preserving order. 3. Preventing the commision of offences. 4. Bringing offenders to justice. 5. Any duty or responsibility of the police arising from common or statute law. - These provide a legal basis for collecting, recording, evaluating, sharing, and retaining.

  • 22

    What is routine collection?

    - Police/PCSO responding to incidents. - Arrests made. - Stop and search/ stop and account. - Patrol work.

  • 23

    What is tasked information?

    - You have been tasked with doing something around a suspect, victim or area as part of an “intelligence requirement”. - Could be CHIS, ANPR, CCTV systems or other internal/external databases.

  • 24

    What is volunteered information?

    - Not from routine or tasked. - Examples, crimestopper tip-off, anti-terrorism hotline, neighbourhood watch info, an incident where info put on system (and officer didn’t attended), and info from partner agencies e.g. social services referral about a child protection matter.

  • 25

    What is reliable?

    - Source is believed to be competent. - Info generally reliable. - Scientific/forensic: DNA/fingerprints. - Can include human intelligence, technical (CCTV/ANPR).

  • 26

    What is not reliable?

    - If either reliable/untested are not met the answer should be not reliable. - If you have a reason to doubt specify it in the report.

  • 27

    What is untested?

    - Source has not given info to person receiving it before. May not be unreliable but should be treated with caution. - Before acting on info, seek corroboration. - Examples, members of public, crime-stoppers, and neighbours.

  • 28

    What is A?

    - Known directly to the source. - First hand info. - Witnessing event.

  • 29

    What is B?

    - Known directly but corroborates - Source has not witnessed. - Must be corroborated. - Corroboration can come from technical or other intel sources, investigations, or enquiries. - Has to be corroboration and not info from same source.

  • 30

    What is C?

    - Known indirectly to the source. - Source does not witness or have first hand knowledge. - Someone else told them (second hand/third party info).

  • 31

    What is D?

    - Not known. - No way of addressing info. - Could be info from an anonymous source/ crime-stopper.

  • 32

    What is E?

    - Suspected to be false/ - Treat with extreme caution. - Regardless of how source came upon info, there is reason to believe the info provided is false. - Rationale behind why you think it’s false must be in intelligence report.

  • 33

    What is the meaning of MOPI?

    - Police must use info for a policing purpose and manage lawfully. - Review retention, and disposal scheme about offenders, suspected offenders, or ‘another’ policing purpose.

  • 34

    Why retain under MOPI?

    - Crime/Offence: Retain and review info to protect public and manage risks posed by known offenders/other potentially dangerous individuals and ensures compliance with relevant legislation. - Other policing purposes: missing people, lost/found property, licensing records, event notifications, RTCs (where there is no suspecting behaviour).

  • 35

    Under MOPI, what should police records be?

    - Accurate - Adequate - Up to date. - Kept no longer than necessary.

  • 36

    What are the risks from the National Retention Assessment Criteria?

    - Evidence of a capacity to inflict serious harm. - Concerns kids/vulnerable adults. - Involves breach of trust? - Is there evidence of established links or associations which might increase risk of harm? (OCGs). - Concerns of substance misuse? - Concerns of mental state? - Other issues that impact on the level/ of the risk the person presents. - Is individual of interest to ongoing public enquiries?

  • 37

    What are human rights related to the National Retention Assessment Criteria?

    - Infringement of rights to privacy. - Are records accurate, relevant, up to date, and for a policing purpose? - Are risks still current?

  • 38

    What do person records contain?

    - As minimum: forname, surname, partial name, nickname, alias. - No name = no record creation. - Desirable fields: Age, DOB, Sex, Race/ethnicity, height.

  • 39

    What are the 3 types of reviews?

    1. Inital Review. 2. Scheduled Review. 3. Triggered Review.

  • 40

    What is a triggered review?

    1. Nominal is a higher risk than previously recorded - alters retention period. 2. Old record is found to be inaccurate/out of date. 3. Nominal has died.

  • 41

    What is the intelligence cycle?

    - Workflow tool for analysts. - Planning: what is intell requirement or intell gap? - Collection: open sources, classified, human assets (CHIS), technical, docs? - Processing: sifting noisy data, removing outliers or missing values. - Analysis + production: evaluates, makes sense, interpret, inferences drawn. - Disseminate: Do we still have a gap? Disseminate + protect source.

  • 42

    What is evidential support?

    - Anacapa chart: network diagram, pictorial aid, simplifies a mass of data. - For example, who is related to who, who is central, who is peripheral? Simple communication of results.

  • 43

    What is timeline?

    - Temporal analysis, referring to time. Who did what, when? - Events chronologically ordered, following a time sequence. - Useful for cold case investigations.

  • 44

    What is strategic threat assessment?

    - May be based on home office priorities (level 3). - Force strategic assessments by force tend to be produced yearly (level 2). - Helps basic command units focus on divisional priorities (level 1).

  • 45

    What is tactical threat assessment?

    - Draws immediate attention to immediate issues that need resourcing. - Combine discussion of old priorities and newly arising problems on that division or in that force. - These documents typically contain crime mapping, charts, hotspot data, defining victims, how offences occur, where issue impacts.

  • 46

    What is tactical taking and coordination groups?

    - TCG owner of business at divisional level. - Chair typically superintendent. - Intelligence hub inspector involved. - Decision making should be informed by intelligence + analytical products. - Idea of TCG is to implement control strategy and their tactical assessment document. - Meetings held fortnightly, monthly, or daily. - Little difference in crime reduction when first introduced.

  • 47

    What are some good evidence of productive tactical tasking and coordination groups?

    - Increased use of intelligence logs across division. - Involved partner agencies in sharing info/intelligence. - Target criminals arrested as result of a TTCG. - Change of tactics, plans, and resources due to new intel picture (evidence).

  • 48

    What are some problems with tactical tasking coordination groups?

    - Senior leaders didn’t routinely chair meetings. - Like a competition with staff ‘bidding’ for resources. - Not read tactical assessment. - Lower ranks do not have capability to direct resources. - No attention paid to analytical evidence. - Too much looking back meant short term problem solving. - Lack of training on NIM. - Preoccupation with performance targets not intelligence findings. - Retention of analysts.

  • 49

    What is a CHIS?

    Any person who: a) Establishes or maintains a personal or other relationship with another person for the covert purpose of facilitating the doing of anything falling within paragraph (b) or (c). b) Covertly uses such a relationship to obtain information or to provide access to any info or another person. c) Covertly discloses information obtained by the use of such a relationship or as a consequence of the existence of such a relationship.

  • 50

    What are the benefits of a CHIS?

    - Audit commision 1993 supported their use to target persistent offenders. - Provides low cost, relevant, and accurate info. - Prevents need for expensive and lengthy police activity (surveillance). - Helped ID and disrupt terrorist plots.

  • 51

    What are the dangers of CHIS?

    - Often criminals themselves. - Revenge motive against person they are ‘grassing’ on. - Seeking out info rather than providing police with intelligence - Intend to disrupt investigation by providing false info. - Deception. - Informants are sneaky, have malicious intent, and unpredictable. - Should only be managed by experienced officers.

  • 52

    What is public interest immunity (PII)?

    - Disclosure of intelligence material looks at (PII). - Public interest in not making disclosure (of the CHIS details) outweighs the interests of the accused (full disclosure). - Can involve redacted docs; summaries of sensitive intelligence, or abandoning the case. - Has chequered past before the European Court of Human Rights.

  • 53

    What is a juvenile CHIS?

    - Enhanced authority and safeguards expected when children are CHIS. - Children already involved in crime — not exploiting. - Sometimes using juvenile CHIS is the only way e.g. drug dealing in schools. - In 2015-2018 only 14 juvenile CHIS compared to 3000 adult CHIS.

  • 54

    What is the authority for juvenile CHIS (under 16)?

    - Lasted 1 month but under RIPA Juvenile Amendment Order 2018, lasts 4. - ACC must authorise (higher authority). - Risk Assessment needed before authorised. - CHIS can’t inform on parent/ or someone with parental responsibility over them. - Appropriate adult must be present at all meetings between police and juvenile CHIS.

  • 55

    What is the regulation of Investigatory Powers Act (RIPA) 2000?

    It governs the use of covert surveillance by public bodies.

  • 56

    What does the regulation of Investigatory Powers Act (RIPA) 2000 cover surveillance by?

    - Police. - Other law enforcement (Serious Fraud Office, National Crime Agency). - Security and intelligence services (MI5, MI6, and GCHQ). - Local Government.

  • 57

    What is surveillance?

    - Monitoring, observing, or listening to persons, their movements, their conversations or their other activities or communications. - Recording anything monitored, observed, or listened to in the course of the surveillance. - Surveillance by or with the assistance of a surveillance device.

  • 58

    What is the meaning of covert?

    - If surveillance is carried out in a manner that is calculated to ensure that the persons who are subject of the surveillance are unaware that it is or may be taking place can it be defined as covert.

  • 59

    What is directed surveillance?

    - Covert and is undertaken: for the purpose of a specific investigation or operation, likely to result in obtaining private information about a person, whether or not that person is specifically identified for the purpose of the operation, and the surveillance. - It is otherwise than by way of an immediate response, to events or circumstances.

  • 60

    What is the example of directed surveillance?

    - Example: Surveillance officers intend to follow and observe Jo Smith covertly as part of a pre-planned operation to determine her suspected involvement in a series of city centre robberies. Covert surveillance is undertaken and officers are recording her activities as part of the investigation. (Likely to obtain private information). Covert surveillance is pre-planned and not part of general observational duties or reactive policing. A directed surveillance authorisation should therefore be considered. - Drones (unmanned aircraft) - demonstration being monitored: Directed Surveillance - Vehicle tracking ‘lump’

  • 61

    What authority is need for directed surveillance?

    - A written authorisation may be given by a superintendent for 3 months (6 month if intelligence services). - An urgent oral authorisation may be given by a superintendent for 72 hours. - An urgent written authorisation may be given by an inspector (if no superintendent available) for 72 hours.

  • 62

    What are the principles of directed surveillance?

    - Necessity: no other way of addressing the aim in question. - Proportionality: the activity proposed is proportionate to what is sought to be achieved. - Least intrusive methods: not defined in RIPA or HRA. - Collateral Intrusion: authorising officer has to consider other people who are not necessarily the intended targets (is this proportionate?).

  • 63

    What is/ when does CCTV cameras need authority?

    - CCTV does not require surveillance authority. - CCTV and ANPR are overt cameras (aware they are there) so no authorities needed. - In response to immediate events - not practicable to obtain directed surveillance authority. - If surveillance is in public place and not focused on any specific subjects - directed surveillance not required. - Howerver if they are used to follow an individual already identified then a directed surveillance authority is required.

  • 64

    What is intrusive surveillance?

    - Covert - Carried out in relation to anything taking place on residential premises, or in any private vehicle, and involves the presence of an individual on the premises or in the vehicle, or is carried out by a means of a surveillance device.

  • 65

    What authority is needed for intrusive surveillance?

    - A written authorisation may be given by a secretary of state for 3 months ( 6 months if in intelligence services). - In an urgent case, written authority can be given by Assistant Chief Constable (ACC) - In urgent cases oral or written authority only lasts 72 hours. - For renewals Judicial Commissioner approval needed.

  • 66

    What is property interference?

    - Intrusive surveillance is usually linked to a property interference authorisation (to install a device). This is generally on private property or interference with private property without consent. - Planting a listening device (bug) in someone’s house is ‘intrusive’ surveillance. - Also the mechanical installation of an eavesdropping device with microphone in a car. - A vehicle tracking device (lump) also amounts to property interference (but doesn’t any other authority.

  • 67

    What is communications data?

    - About a communication rather than its contents: Phone number, phone provider, create itemised billing (who the phone phoned), time and duration of calls, identify sender or recipient, subscribe checks (name and address of phone owner), and billing methods.

  • 68

    What is intercept data?

    - Most sensitive part of phone call/text msg/fax (what was said in conversation). -Intercept requires a telecommunications operator. -Authorised under warrant by the home secretary.

  • 69

    What is terrorism?

    -Systematic use of coercive intimidation, usually. to service political ends. It is used to create and exploit a climate of fear among a wider target group than the immediate victims of the violence and to publicise a cause, as well as to coerce a target to accede to the terrorsts aims.

  • 70

    What is RARA?

    - Remove the risk. - Avoid the risk. - Reduce the risk. - Accept the risk.

  • 71

    What is the 7/7 London Bombings about?

    - 52 people killed. - Several hundred injured 7 july 2005. - Circle line, piccadilly line, and top of double decker bus. - All perpetrators from West Yorkshire, born and raised in UK. All pakistani heritage other than Lindsay who was West Indian born in Jamaica and a convert to islam. - Explosions, home-made organic peroxide-based devices, packed in rucksacks. - Khan and Tanweer monitored on at least 4 occasions, seen as peripheral figures by SIS, they had operational training in Pakistan Nov 2004 to Feb 2005.

  • 72

    What happened in the murder of Lee Rigby?

    - He was brutally attacked and killed in Artillery Place, Woolwich. - Adebolajo and Adebowale crashed into him using a car, then used a machete to cut at his neck. - Intended a martyrs death: wanting to be shot at when police arrived. - Adebowale seen as low priority. On periphery. - Application for intrusive techniques against adebowale - sent the day before the murder.

  • 73

    What happened in the Ariana Grande bombings?

    - 2017 bombing killed 22 people and injured hundreds. - Much criticism about the lack of coordination between police and other emergency services - ‘didn’t work at all’. - Reports by public about Abedi fell on deaf ears. - Parents sought asylum in UK in 1993 facing persecution from Gaddafi. - Wider Abedi family hold significant responsibility for radicalisation of Salman Abedi and brother Hashem Abedi (convicted 2020 for supporting).

  • 74

    What are undercover operatives (UCO)?

    - Should not act as an ‘agent provocateur’. - Intimate and sexual relationship ‘never acceptable’ when deployed to infiltrate.

  • 75

    What are passive data sources?

    - Financial data. - CCTV. - ANPR. - Telecommunications data (phone calls to/from and when and to whom). - Suspicious activity reports (SARS) elmer database. - List of passenger data (terrorism). - Gas and electricity companies.

  • 76

    What is ANPR?

    - Can pinpoint a vehicles movements at a particular time,date and location, possibly implicating the driver in particular criminality. - The cameras are static, also some mobile units. They read car reg numbers every 4 seconds. These images are stored. - It can track suspect vehicle and suspect. - It can track vehicles in convoys; or witnesses in the line of traffic. - It can research victim vehicle. - It can research an alibi. - Assists with future surveillance operation (proactive).