police intelligence operations catd n.
Skip this Video
Loading SlideShow in 5 Seconds..
Police Intelligence Operations (CATD) PowerPoint Presentation
Download Presentation
Police Intelligence Operations (CATD)

Police Intelligence Operations (CATD)

2105 Views Download Presentation
Download Presentation

Police Intelligence Operations (CATD)

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Police Intelligence Operations(CATD) CAPIM

  2. Supporting References FM 3-19.1 Military Police Operations FM 3-19.30 Physical Security FM 3-19.40 Military Police Internment/resettlement Operations FM 3-19.50 Police Intelligence Operations (draft) FM 7-15 Army Universal Task List (AUTL) FM 19.4 Military Police Leaders Handbook FM 19.10 Military Police Law and Order Operations FM 19-15 Civil Disturbances, 25 Nov 1985 FM 19-20 Law Enforcement Investigations, 25 Nov 1985 (under revision) FM 19-25 Military Police Traffic Operations, 30 Sep 1977 Applications in Criminal Analysis (Peterson) Crime Analysis through Computer Mapping (Block) Law Enforcement Intelligence: A Guide for State, Local and Tribal Law Enforcement Agencies (Carter)

  3. PIO is Not New Characteristics of Effective PIO: Timeliness Relevance Accuracy Predictiveness Tactical, Non-tactical, MOOTW, Urban Ops

  4. PIO Information is not the same as Intelligence

  5. Police Information versus Criminal Intelligence Police Information is: unprocesseddata Criminal Intelligence is: the result of Police Information that has been analyzed, assessed, collated, compared, considered, contrasted, dissected, evaluated, fused, mapped, matched, processed…

  6. PIO PIO incorporates three individual yet inter-dependent operational cycles. • Police Collection Cycle • Criminal Intelligence Analysis Cycle • Staff and/or Operations Cycle

  7. CIAC PCC PIO Process Staff

  8. Police Collection Cycle PCC Planning Dissemination Observing Collecting and Recording Assessing

  9. PCC MP’s gather information from various contacts able to substantiate or verify other sources of information. These sources include: • Routine contact with the local populace • Combined police patrols with Host Nation (HN) military and civilian law enforcement agencies • Close liaison with local, State, Federal, HN, and multinational law enforcement agencies • Field interviews • Nongovernmental organizations (NGO’s) • Private volunteer organizations (PVO’s) The information is processed/disseminated through: • SALUTE • SPOTREP

  10. “PCC Rule of Thumb” We train our collectors to recognize if they: Fail to observe then there is nothing to collect or report Fail to collect and report there is nothing to disseminate for analysis Fail to disseminate and you have added nothing to the COP

  11. Criminal Intelligence Analysis Cycle Planning and Directing Dissemination and Integration Collection and Reporting Analysis and Production Processing Evaluation and Feedback

  12. Criminal Intelligence Analysis Cycle 20+ Analytical Methods 30+ Analytical Products

  13. Activity Flow Chart Assessments Association Analysis Association Chart Association Matrix Bank Record Analysis Bar Charts Biographical Sketches Briefings Case Analysis Chronological Table Collection Plan Commodity Flow Analysis Commodity Flow Chart Commodity Flow Matrix Composite Table Conclusion Content Analysis Conversation Analysis Corporate Record Analysis Crime Analysis Crime Bulletin Recommendations Report Source and Application of Funds Statistical Analysis Strategic Analysis Summary Survey Table Telephone Record Analysis Telephone Record Chart Telephone Record Matrix Threat Assessment Time Series Analysis Trends Trend Analysis Visual Investigative Analysis Visual Investigative Analysis Chart Vulnerability Assessment Warning CIAC • Criminal Investigative Analysis • Data Bases • Demographic Analysis • Descriptive Analysis • Geographic Distribution Analysis • Event Flow Analysis • Event Flow Chart • Fact Pattern • Financial Summary • Forecasting • Frequency Distribution • Geographic Flow Chart (map) • Indicator Analysis • Inference Development • Maps (Crime Mapping) • Market Analysis • Matrices • Net Worth Analysis • Pie Chart • Premonitory • Probability Factor • Profile

  14. Association Chart Biographical Sketches Commodity Flow Chart Recommendations Strategic Analysis Telephone Record Chart Trends Visual Investigative Analysis Chart Vulnerability Assessment CIAC • Event Flow Chart • Fact Pattern • Geographic Flow Chart (map) • Maps (crime mapping)

  15. “CIAC Rule of Thumb” We train criminal intelligence analysts to understand: Incomplete or imprecise information is sometimes better than none at all; Untimely or unusable information is oftenthe same as none at all; Inaccurate or irrelevant information is always worse than none at all “you will never be 100% correct, because you will never have all the data…” S.H. Lawhead

  16. Planning CCIR PIR Commanders’ Intent MDMP Dissemination Staff Cycle Planning MDMP (Military Decision Making Process) Dissemination

  17. Staff Cycle Purpose and Direction • Must provide the “so what” message • Must provide clear and unambiguous instructions “assumptions are the mother of all mistakes” • Must provide an reasonable and achievable goal • “if you don’t know where you’re going, how will you know when you get there”

  18. Maintain Your Lane • Understand your mission • Recognize how your mission fits into the overall scheme • Ensure your mission is successful

  19. Planning MDMP Dissemination Staff Cycle Prepare for a Mission: • Develop a Plan • Apply MDMP • Generate Supporting CCIRs IAW Commander’s Intent • Disseminate the Requests/Requirements (5- Paragraph OPORD) • Receive results and apply MDMP toward COAs • Feedback…

  20. Planning MDMP Dissemination Staff Cycle cont’ The PIR/CCIR must: support the mission; be specific and clear The PIR/CCIR should: be disseminate in writing; provide feedback to the action entity; be recorded If PIR/CCIR is OBE – terminate ASAP If you don’t ask the right question, you won’t get the right answer.

  21. Planning MDMP Dissemination Staff Cycle cont’ Disseminate requirements to the Police Collection Cycle and the Criminal Intelligence Analysis Cycle The PCC best answers BOLOs, Officer Safety and other immediate operational needs. (PCC follow a SALUTE or similar reporting method) Know what it is you’re trying to achieve….

  22. Planning MDMP Dissemination Staff Cycle cont’ The Criminal Intelligence Analysis Cycle best answers strategic and criminal specific requirements, typically following the criminal threat estimate or similar reporting method. The CIAC can provide predictive analysis on the criminal/threat and likely COA’s, based on geospatial analysis, statistical data, and known or hypothesized information, etc.

  23. Geospatial Crime Mapping

  24. What does this captured information indicate?

  25. Police Intelligence Process Model Information enters the data stream and is converted to actionable intelligence

  26. Police Intelligence Operations PIO Focus must be on Intelligence Led Policing Current and traditional focus is on Reactive Policing

  27. Crimint Analysis Primary purpose for Analysis: Graphically represent information in a simple/understandable visual format

  28. Association Matrix + Significant Person + + Pistol Palace

  29. Link Analysis

  30. Link Diagram

  31. Dissemination and Integration ? Meetings (formal/informal) Digital (e-mail, web based, etc) Reports Telephonic, Briefings, Hard-copy Etc Limited only by the imagination

  32. Seven words will ensure PIO Fails “That’s The Way We’ve Always Done It.”

  33. 7 Keys to Successful PIO (P.R.E.P.A.R.E.) PATD Read Everything…twice Expect to find answers Pursue leads…don’t gather them Always write it down! Repeat successful practices Educate yourself (continually) “to old fast, to smart slow”

  34. PIO Leverages All Source Information/Intelligence PIO employs all the assets and resources available in order to accomplish the mission (fulfill PIRs and CCIRs), including CRIMINT, A/S, I/R, L&O and MMSO. PIO IS NOT LIMITED to LE collectors but does rely heavily on MP Functions for data.

  35. The Need for Liaison • During crisis, the seams between agencies must disappear if we’re to be successful. • To be effective, PIO must establish and maintain open lines of communication.

  36. Liaison (CONUS) Military Police DPW CID G2 DA Police/ Guard CIV/POL 902nd MI

  37. Liaison (OCONUS) CID Military Police CIV/POL G2 OGA’s 902nd MI

  38. Staff Military Police CID S2/G2 902nd MI

  39. State Police Local Police Regional Intel US Govt LEA Foreign Govt LEA Law EnforcementConnectivity BaseCrimint DetCrimint BnCrimint GroupCrimint G2/G3OPS CTR HQ USACIDCIntelligence Division

  40. USACIL CID Intel COPS ACI2 JPEN NCIC G2/G3OPS CTR LEO HQ USACIDCIntelligence Division CJIS WAN NCIC - CCH - Other NLETS Commercial NIPRNET OSINT - LEO - JPENJRIES - Other SIPRNET Harmony - M3 - Other JWICS TTIC - M3 - Other BaseCrimint DetCrimint Network ofConnectivity BnCrimint GroupCrimint

  41. MOOTW Benning Bn Hawaii Bavaria Bn Europe Korea Bn Riley Bn Lewis Bn Campbell Bn PSU Bragg Bn Hood Bn Wash Bn USACIL 6th Grp JTTFs PMGATOIC 3rd Grp CRC AFOSI CIFA NCIS 902dMI HQ USACIDCIntelligence Division HQ USACIDCIntelligence Division FBI DIA CIA TTIC DHS NSA StateDept G2/G3 OPS CTR G2/G3 OPS CTR

  42. PIO SRO

  43. Summary “The success of Police Intelligence Operations isn’t so much a matter of what you know…but rather what you do with what you know…” E.M. Matthews “Intelligence should lead the sword.” Sun Tzu

  44. ? Questions “Deeds not words”