1 / 16

OET Lesson

OET Lesson. Developing a Risk Targeting System. Objectives. Identify types of information used to create and enhance targeting systems. List the steps required to create and use targeting systems. Risk Targeting Cycle. Document Results. Collect Data. Examine. Analyze Data.

lstarr
Download Presentation

OET Lesson

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. OET Lesson Developing a Risk Targeting System

  2. Objectives • Identify types of information used to create and enhance targeting systems. • List the steps required to create and use targeting systems.

  3. Risk Targeting Cycle Document Results Collect Data Examine Analyze Data Identify Targets

  4. Collect Collect Data Arrest/Seizure Reports Intelligence Reports Interviews Documents & Computer Systems

  5. Collect Arrest/Seizure Reports Collect the following data: • Type, quantity, origin, and destination of contraband • Method of concealment • Type of conveyance • Description of the smuggler • Cover story • Time of day, season, and other environmental factors

  6. Collect Intelligence Reports • Recent smuggling trends • Potential terrorist threats Review recent intelligence information about:

  7. Collect Interviews • Other knowledgeable officers • Travel and trade personnel • Other sources Collect information from interviewing:

  8. Collect Documents & Computer Systems • Traveler Documents: Passports, tickets, driver’s licenses, and other identity papers • Cargo Documents:Manifests, air waybills, invoices, insurance policies, etc. • Computer Systems: • Advanced information • Previous travel and trade transactions (if available) • Previous customs findings

  9. Analyze Data Analyze • Use graphs, diagrams, charts, or automated tools to recognize patterns: • Routing of merchandise/smugglers • Concealment methods • Conveyance used • Frequently utilized flights • Day/date/time of seizures • Age/sex of violators • Origin of contraband

  10. Identify Targets Identify • Identify high-risk targets including: • Known trafficking routes • Intelligence information • Similarities to previous seizures • Unusual cargo or traveler for the port

  11. Examine Examine • Begin by reviewing documents • Conduct an examination

  12. Document Document Results • Document results. • Develop a standard method of documenting examinations.

  13. Exercise Instructions: • Review the data in the next slide. • Identify the smuggling patterns or trends. • Describe your high-risk targets.

  14. Airport Seizures Seizure Flight Age Sex Date # of Violator M/F Drug Type Grams Method of Concealment 03/17 2315 24 M Heroin 25.1 In clothing being worn (Jacket) 03/30 1087 31 M Cocaine 1 In clothing being worn (Jacket) 04/15 2025 22 M Heroin 13.6 In clothing being worn (Jacket) 04/20 2023 25 M Heroin 80 In clothing being worn (Underwear) 04/22 2031 27 M Heroin 32.1 In clothing being worn (Pocket) 04/30 2025 34 M Cocaine 2 In clothing being worn (Socks) 05/15 1087 39 M Cocaine 7.4 In clothing being worn (Shoes) 05/30 1087 32 M Cocaine 2 In clothing being worn (Under belt) 06/15 1081 31 M Cocaine 1 In clothing being worn (Jacket) 06/18 1095 27 M Heroin 5 In clothing being worn (Jacket) 06/20 1095 36 M Heroin 2.2 In clothing being worn at his chest 07/03 1087 30 F Heroin 6.8 In clothing being worn 08/01 2025 29 F Heroin 26 Inside her underwear 08/10 2315 21 M Cocaine 4.7 Sewn in the edges of bed sheet in a suitcase

  15. Land Border Seizures Seizure Vehicle Age Sex Others Date/Time Type of Violator M/F in Vehicle Drug Type/Amount Method of Concealment 03/17 Truck 26 M none Marijuana 100 kg In the lining of the roof08:30 03/30 Car 22 F 1 infant Cocaine 1.3 kg In baby’s diapers 13:30 03/31 Car 35 M adult F Cocaine 2.5 kg In spare battery 07:30 04/07 Truck 25 M none Marijuana 122 kg False cargo bed 08:00 04/09 Car 24 F 1 infant Cocaine 2 kg In baby’s clothing 14:00 04/12 Car 27 M adult F Cocaine 2.4 kg Body carrier 11:00 04/17 Car 29 F adult M Ecstasy 6.5 kg Lining of suitcase 18:00 03/17 Truck 28 M none Marijuana 150 kg False cargo bed15:30 04/09 Car 26 F 1 child Cocaine 1.6 kg Child’s shoes 16:00

  16. Lesson Summary Do you now know how to: • Identify types of information used to create and enhance targeting systems? • List the steps required to create and use targeting systems? Document Results Collect Data Examine Analyze Data Identify Targets

More Related