Title: Police Intelligence Operations (CATD)
1Police Intelligence Operations(CATD)
CAPIM
2Supporting References
- FM 3-19.1 Military Police Operations
- FM 3-19.30 Physical Security
- FM 3-19.40 Military Police Internment/resettlement
Operations - FM 3-19.50 Police Intelligence Operations (draft)
- FM 7-15 Army Universal Task List (AUTL)
- FM 19.4 Military Police Leaders Handbook
- FM 19.10 Military Police Law and Order Operations
- FM 19-15 Civil Disturbances, 25 Nov 1985
- FM 19-20 Law Enforcement Investigations, 25 Nov
1985 (under revision) - FM 19-25 Military Police Traffic Operations, 30
Sep 1977 - Applications in Criminal Analysis (Peterson)
- Crime Analysis through Computer Mapping (Block)
- Law Enforcement Intelligence A Guide for State,
Local and Tribal Law Enforcement Agencies (Carter)
3PIO is Not New
Characteristics of Effective PIO
- Timeliness
- Relevance
- Accuracy
- Predictiveness
Tactical, Non-tactical, MOOTW, Urban Ops
4PIO
- Information
- is not the same as
- Intelligence
5Police Information versus Criminal Intelligence
- Police Information is unprocessed data Criminal
Intelligence is the result of Police Information
that has been analyzed, assessed, collated,
compared, considered, contrasted, dissected,
evaluated, fused, mapped, matched, processed
6PIO
- PIO incorporates three individual yet
inter-dependent operational cycles. - Police Collection Cycle
- Criminal Intelligence Analysis Cycle
- Staff and/or Operations Cycle
7PIO Process
PCC
Staff
8Police Collection Cycle
Planning
Dissemination
Observing
Collecting and Recording
Assessing
9PCC
- MPs gather information from various contacts
able to substantiate or verify other sources of
information. These sources include - Routine contact with the local populace
- Combined police patrols with Host Nation (HN)
military and civilian law enforcement agencies - Close liaison with local, State, Federal, HN, and
multinational law enforcement agencies - Field interviews
- Nongovernmental organizations (NGOs)
- Private volunteer organizations (PVOs)
- The information is processed/disseminated
through - SALUTE
- SPOTREP
10PCC Rule of Thumb
- We train our collectors to recognize if they
- Fail to observe then there is nothing to collect
or report - Fail to collect and report there is nothing to
disseminate for analysis - Fail to disseminate and you have added nothing to
the COP
11Criminal Intelligence Analysis Cycle
Planning and Directing
Dissemination and Integration
Collection and Reporting
Analysis and Production
Processing
Evaluation and Feedback
12Criminal Intelligence Analysis Cycle
- 20 Analytical Methods
- 30 Analytical Products
13CIAC
- Activity Flow Chart
- Assessments
- Association Analysis
- Association Chart
- Association Matrix
- Bank Record Analysis
- Bar Charts
- Biographical Sketches
- Briefings
- Case Analysis
- Chronological Table
- Collection Plan
- Commodity Flow Analysis
- Commodity Flow Chart
- Commodity Flow Matrix
- Composite Table
- Conclusion
- Content Analysis
- Conversation Analysis
- Recommendations
- Report
- Source and Application of Funds
- Statistical Analysis
- Strategic Analysis
- Summary
- Survey
- Table
- Telephone Record Analysis
- Telephone Record Chart
- Telephone Record Matrix
- Threat Assessment
- Time Series Analysis
- Trends
- Trend Analysis
- Visual Investigative Analysis
- Visual Investigative Analysis Chart
- Vulnerability Assessment
- Warning
- Criminal Investigative Analysis
- Data Bases
- Demographic Analysis
- Descriptive Analysis
- Geographic Distribution Analysis
- Event Flow Analysis
- Event Flow Chart
- Fact Pattern
- Financial Summary
- Forecasting
- Frequency Distribution
- Geographic Flow Chart (map)
- Indicator Analysis
- Inference Development
- Maps (Crime Mapping)
- Market Analysis
- Matrices
- Net Worth Analysis
- Pie Chart
14CIAC
- Activity Flow Chart
- Assessments
- Association Analysis
- Association Chart
- Association Matrix
- Bank Record Analysis
- Bar Charts
- Biographical Sketches
- Briefings
- Case Analysis
- Chronological Table
- Collection Plan
- Commodity Flow Analysis
- Commodity Flow Chart
- Commodity Flow Matrix
- Composite Table
- Conclusion
- Content Analysis
- Conversation Analysis
- Recommendations
- Report
- Source and Application of Funds
- Statistical Analysis
- Strategic Analysis
- Summary
- Survey
- Table
- Telephone Record Analysis
- Telephone Record Chart
- Telephone Record Matrix
- Threat Assessment
- Time Series Analysis
- Trends
- Trend Analysis
- Visual Investigative Analysis
- Visual Investigative Analysis Chart
- Vulnerability Assessment
- Warning
- Criminal Investigative Analysis
- Data Bases
- Demographic Analysis
- Descriptive Analysis
- Geographic Distribution Analysis
- Event Flow Analysis
- Event Flow Chart
- Fact Pattern
- Financial Summary
- Forecasting
- Frequency Distribution
- Geographic Flow Chart (map)
- Indicator Analysis
- Inference Development
- Maps (Crime Mapping)
- Market Analysis
- Matrices
- Net Worth Analysis
- Pie Chart
15CIAC
- Association Chart
- Biographical Sketches
- Commodity Flow Chart
- Event Flow Chart
- Fact Pattern
- Geographic Flow Chart (map)
- Maps (crime mapping)
- Recommendations
- Strategic Analysis
- Telephone Record Chart
- Trends
- Visual Investigative Analysis Chart
- Vulnerability Assessment
16CIAC Rule of Thumb
- We train criminal intelligence analysts to
understand - Incomplete or imprecise information is
- sometimes better than none at all
- Untimely or unusable information is
- often the same as none at all
- Inaccurate or irrelevant information is
- always worse than none at all
you will never be 100 correct, because you will
never have all the data S.H. Lawhead
17Staff Cycle
Planning
MDMP (Military Decision Making Process)
Dissemination
18Staff Cycle
- Purpose and Direction
- Must provide the so what message
- Must provide clear and unambiguous instructions
assumptions are the mother of all mistakes - Must provide an reasonable and achievable goal
- if you dont know where youre going, how will
you know when you get there
19Maintain Your Lane
- Understand your mission
- Recognize how your mission fits into the overall
scheme - Ensure your mission is successful
20Staff Cycle
- Prepare for a Mission
- Develop a Plan
- Apply MDMP
- Generate Supporting CCIRs IAW Commanders Intent
- Disseminate the Requests/Requirements (5-
Paragraph OPORD) - Receive results and apply MDMP toward COAs
- Feedback
21Staff Cycle cont
- The PIR/CCIR must
- support the mission be specific and clear
- The PIR/CCIR should
- be disseminate in writing provide feedback
to the action entity be recorded - If PIR/CCIR is OBE terminate ASAP
If you dont ask the right question, you wont
get the right answer.
22Staff Cycle cont
- Disseminate requirements to the Police Collection
Cycle and the Criminal Intelligence Analysis
Cycle - The PCC best answers BOLOs, Officer Safety and
other immediate operational needs. (PCC follow a
SALUTE or similar reporting method)
Know what it is youre trying to achieve.
23Staff Cycle cont
- The Criminal Intelligence Analysis Cycle best
answers strategic and criminal specific
requirements, typically following the criminal
threat estimate or similar reporting method. - The CIAC can provide predictive analysis on the
criminal/threat and likely COAs, based on
geospatial analysis, statistical data, and known
or hypothesized information, etc.
24Geospatial Crime Mapping
25What does this captured information indicate?
26Police Intelligence Process Model
- Information enters the data stream and is
converted to actionable intelligence
27Police Intelligence Operations
- PIO Focus must be on Intelligence Led Policing
Current and traditional focus is on Reactive
Policing
28Crimint Analysis
- Primary purpose for Analysis Graphically
represent information in a simple/understandable
visual format
29Association Matrix
Significant Person
Pistol Palace
30Link Analysis
31Link Diagram
32Dissemination and Integration
?
- Meetings (formal/informal)
- Digital (e-mail, web based, etc)
- Reports
- Telephonic, Briefings,
- Hard-copy
- Etc
Limited only by the imagination
33Seven words will ensure PIO Fails
- Thats The Way Weve Always Done It.
347 Keys to Successful PIO (P.R.E.P.A.R.E.)
- PATD
- Read Everythingtwice
- Expect to find answers
- Pursue leadsdont gather them
- Always write it down!
- Repeat successful practices
- Educate yourself (continually)
to old fast, to smart slow
35PIO Leverages All Source Information/Intelligence
- PIO employs all the assets and resources
available in order to accomplish the mission
(fulfill PIRs and CCIRs), including CRIMINT, - A/S, I/R, LO and MMSO.
- PIO IS NOT LIMITED to LE collectors but does rely
heavily on MP Functions for data.
36The Need for Liaison
- During crisis, the seams between agencies must
disappear if were to be successful. - To be effective, PIO must establish and maintain
open lines of communication.
37Liaison (CONUS)
Military Police
CID
DPW
G2
DA Police/ Guard
CIV/POL
902nd MI
38Liaison (OCONUS)
CID
Military Police
CIV/POL
G2
OGAs
902nd MI
39Staff
Military Police
CID
S2/G2
902nd MI
40Law EnforcementConnectivity
BaseCrimint
DetCrimint
BnCrimint
GroupCrimint
G2/G3OPS CTR
HQ USACIDCIntelligence Division
41BaseCrimint
DetCrimint
Network ofConnectivity
BnCrimint
GroupCrimint
PersistentData Mining
Ad Hoc Queries Product Exchange
42(No Transcript)
43(No Transcript)
44Summary
- The success of Police Intelligence Operations
isnt so much a matter of what you knowbut
rather what you do with what you know - E.M. Matthews
Intelligence should lead the sword. Sun Tzu
45Questions
?
Deeds not words