Police Intelligence Operations CATD - PowerPoint PPT Presentation

1 / 44
About This Presentation
Title:

Police Intelligence Operations CATD

Description:

Prepare for a Mission: Develop a Plan. Apply MDMP. Generate Supporting CCIRs IAW Commander's Intent ... CIA. TTIC. DHS. NSA. State. Dept. DIA. 902d. MI. CIFA ... – PowerPoint PPT presentation

Number of Views:2808
Avg rating:3.0/5.0
Slides: 45
Provided by: cw3eugene
Category:

less

Transcript and Presenter's Notes

Title: Police Intelligence Operations CATD


1
Police Intelligence Operations(CATD)
CAPIM
2
Supporting References
  • FM 3-19.1 Military Police Operations
  • FM 3-19.30 Physical Security
  • FM 3-19.40 Military Police Internment/resettlement
    Operations
  • FM 3-19.50 Police Intelligence Operations (draft)
  • FM 7-15 Army Universal Task List (AUTL)
  • FM 19.4 Military Police Leaders Handbook
  • FM 19.10 Military Police Law and Order Operations
  • FM 19-15 Civil Disturbances, 25 Nov 1985
  • FM 19-20 Law Enforcement Investigations, 25 Nov
    1985 (under revision)
  • FM 19-25 Military Police Traffic Operations, 30
    Sep 1977
  • Applications in Criminal Analysis (Peterson)
  • Crime Analysis through Computer Mapping (Block)
  • Law Enforcement Intelligence A Guide for State,
    Local and Tribal Law Enforcement Agencies (Carter)

3
PIO is Not New
Characteristics of Effective PIO
  • Timeliness
  • Relevance
  • Accuracy
  • Predictiveness

Tactical, Non-tactical, MOOTW, Urban Ops
4
PIO
  • Information
  • is not the same as
  • Intelligence

5
Police Information versus Criminal Intelligence
  • Police Information is unprocessed data Criminal
    Intelligence is the result of Police Information
    that has been analyzed, assessed, collated,
    compared, considered, contrasted, dissected,
    evaluated, fused, mapped, matched, processed

6
PIO
  • PIO incorporates three individual yet
    inter-dependent operational cycles.
  • Police Collection Cycle
  • Criminal Intelligence Analysis Cycle
  • Staff and/or Operations Cycle

7
PIO Process
PCC
  • CIAC

Staff
8
Police Collection Cycle
Planning
Dissemination
Observing
Collecting and Recording
Assessing
9
PCC
  • MPs gather information from various contacts
    able to substantiate or verify other sources of
    information. These sources include
  • Routine contact with the local populace
  • Combined police patrols with Host Nation (HN)
    military and civilian law enforcement agencies
  • Close liaison with local, State, Federal, HN, and
    multinational law enforcement agencies
  • Field interviews
  • Nongovernmental organizations (NGOs)
  • Private volunteer organizations (PVOs)
  • The information is processed/disseminated
    through
  • SALUTE
  • SPOTREP

10
PCC Rule of Thumb
  • We train our collectors to recognize if they
  • Fail to observe then there is nothing to collect
    or report
  • Fail to collect and report there is nothing to
    disseminate for analysis
  • Fail to disseminate and you have added nothing to
    the COP

11
Criminal Intelligence Analysis Cycle
Planning and Directing
Dissemination and Integration
Collection and Reporting
Analysis and Production
Processing
Evaluation and Feedback
12
Criminal Intelligence Analysis Cycle
  • 20 Analytical Methods
  • 30 Analytical Products

13
CIAC
  • Activity Flow Chart
  • Assessments
  • Association Analysis
  • Association Chart
  • Association Matrix
  • Bank Record Analysis
  • Bar Charts
  • Biographical Sketches
  • Briefings
  • Case Analysis
  • Chronological Table
  • Collection Plan
  • Commodity Flow Analysis
  • Commodity Flow Chart
  • Commodity Flow Matrix
  • Composite Table
  • Conclusion
  • Content Analysis
  • Conversation Analysis
  • Recommendations
  • Report
  • Source and Application of Funds
  • Statistical Analysis
  • Strategic Analysis
  • Summary
  • Survey
  • Table
  • Telephone Record Analysis
  • Telephone Record Chart
  • Telephone Record Matrix
  • Threat Assessment
  • Time Series Analysis
  • Trends
  • Trend Analysis
  • Visual Investigative Analysis
  • Visual Investigative Analysis Chart
  • Vulnerability Assessment
  • Warning
  • Criminal Investigative Analysis
  • Data Bases
  • Demographic Analysis
  • Descriptive Analysis
  • Geographic Distribution Analysis
  • Event Flow Analysis
  • Event Flow Chart
  • Fact Pattern
  • Financial Summary
  • Forecasting
  • Frequency Distribution
  • Geographic Flow Chart (map)
  • Indicator Analysis
  • Inference Development
  • Maps (Crime Mapping)
  • Market Analysis
  • Matrices
  • Net Worth Analysis
  • Pie Chart

14
CIAC
  • Activity Flow Chart
  • Assessments
  • Association Analysis
  • Association Chart
  • Association Matrix
  • Bank Record Analysis
  • Bar Charts
  • Biographical Sketches
  • Briefings
  • Case Analysis
  • Chronological Table
  • Collection Plan
  • Commodity Flow Analysis
  • Commodity Flow Chart
  • Commodity Flow Matrix
  • Composite Table
  • Conclusion
  • Content Analysis
  • Conversation Analysis
  • Recommendations
  • Report
  • Source and Application of Funds
  • Statistical Analysis
  • Strategic Analysis
  • Summary
  • Survey
  • Table
  • Telephone Record Analysis
  • Telephone Record Chart
  • Telephone Record Matrix
  • Threat Assessment
  • Time Series Analysis
  • Trends
  • Trend Analysis
  • Visual Investigative Analysis
  • Visual Investigative Analysis Chart
  • Vulnerability Assessment
  • Warning
  • Criminal Investigative Analysis
  • Data Bases
  • Demographic Analysis
  • Descriptive Analysis
  • Geographic Distribution Analysis
  • Event Flow Analysis
  • Event Flow Chart
  • Fact Pattern
  • Financial Summary
  • Forecasting
  • Frequency Distribution
  • Geographic Flow Chart (map)
  • Indicator Analysis
  • Inference Development
  • Maps (Crime Mapping)
  • Market Analysis
  • Matrices
  • Net Worth Analysis
  • Pie Chart

15
CIAC
  • Association Chart
  • Biographical Sketches
  • Commodity Flow Chart
  • Event Flow Chart
  • Fact Pattern
  • Geographic Flow Chart (map)
  • Maps (crime mapping)
  • Recommendations
  • Strategic Analysis
  • Telephone Record Chart
  • Trends
  • Visual Investigative Analysis Chart
  • Vulnerability Assessment

16
CIAC Rule of Thumb
  • We train criminal intelligence analysts to
    understand
  • Incomplete or imprecise information is
  • sometimes better than none at all
  • Untimely or unusable information is
  • often the same as none at all
  • Inaccurate or irrelevant information is
  • always worse than none at all

you will never be 100 correct, because you will
never have all the data S.H. Lawhead
17
Staff Cycle
Planning
MDMP (Military Decision Making Process)
Dissemination
18
Staff Cycle
  • Purpose and Direction
  • Must provide the so what message
  • Must provide clear and unambiguous instructions
    assumptions are the mother of all mistakes
  • Must provide an reasonable and achievable goal
  • if you dont know where youre going, how will
    you know when you get there

19
Maintain Your Lane
  • Understand your mission
  • Recognize how your mission fits into the overall
    scheme
  • Ensure your mission is successful

20
Staff Cycle
  • Prepare for a Mission
  • Develop a Plan
  • Apply MDMP
  • Generate Supporting CCIRs IAW Commanders Intent
  • Disseminate the Requests/Requirements (5-
    Paragraph OPORD)
  • Receive results and apply MDMP toward COAs
  • Feedback

21
Staff Cycle cont
  • The PIR/CCIR must
  • support the mission be specific and clear
  • The PIR/CCIR should
  • be disseminate in writing provide feedback
    to the action entity be recorded
  • If PIR/CCIR is OBE terminate ASAP

If you dont ask the right question, you wont
get the right answer.
22
Staff Cycle cont
  • Disseminate requirements to the Police Collection
    Cycle and the Criminal Intelligence Analysis
    Cycle
  • The PCC best answers BOLOs, Officer Safety and
    other immediate operational needs. (PCC follow a
    SALUTE or similar reporting method)

Know what it is youre trying to achieve.
23
Staff Cycle cont
  • The Criminal Intelligence Analysis Cycle best
    answers strategic and criminal specific
    requirements, typically following the criminal
    threat estimate or similar reporting method.
  • The CIAC can provide predictive analysis on the
    criminal/threat and likely COAs, based on
    geospatial analysis, statistical data, and known
    or hypothesized information, etc.

24
Geospatial Crime Mapping
25
What does this captured information indicate?
26
Police Intelligence Process Model
  • Information enters the data stream and is
    converted to actionable intelligence

27
Police Intelligence Operations
  • PIO Focus must be on Intelligence Led Policing

Current and traditional focus is on Reactive
Policing
28
Crimint Analysis
  • Primary purpose for Analysis Graphically
    represent information in a simple/understandable
    visual format

29
Association Matrix

Significant Person


Pistol Palace
30
Link Analysis

31
Link Diagram
32
Dissemination and Integration
?
  • Meetings (formal/informal)
  • Digital (e-mail, web based, etc)
  • Reports
  • Telephonic, Briefings,
  • Hard-copy
  • Etc

Limited only by the imagination
33
Seven words will ensure PIO Fails
  • Thats The Way Weve Always Done It.

34
7 Keys to Successful PIO (P.R.E.P.A.R.E.)
  • PATD
  • Read Everythingtwice
  • Expect to find answers
  • Pursue leadsdont gather them
  • Always write it down!
  • Repeat successful practices
  • Educate yourself (continually)

to old fast, to smart slow
35
PIO Leverages All Source Information/Intelligence
  • PIO employs all the assets and resources
    available in order to accomplish the mission
    (fulfill PIRs and CCIRs), including CRIMINT,
  • A/S, I/R, LO and MMSO.
  • PIO IS NOT LIMITED to LE collectors but does rely
    heavily on MP Functions for data.

36
The Need for Liaison
  • During crisis, the seams between agencies must
    disappear if were to be successful.
  • To be effective, PIO must establish and maintain
    open lines of communication.

37
Liaison (CONUS)
Military Police
CID
DPW
G2
DA Police/ Guard
CIV/POL
902nd MI
38
Liaison (OCONUS)
CID
Military Police
CIV/POL
G2
OGAs
902nd MI
39
Staff
Military Police
CID
S2/G2
902nd MI
40
Law EnforcementConnectivity
BaseCrimint
DetCrimint
BnCrimint
GroupCrimint
G2/G3OPS CTR
HQ USACIDCIntelligence Division
41
BaseCrimint
DetCrimint
Network ofConnectivity
BnCrimint
GroupCrimint
42
(No Transcript)
43
(No Transcript)
44
Summary
  • The success of Police Intelligence Operations
    isnt so much a matter of what you knowbut
    rather what you do with what you know
  • E.M. Matthews

Intelligence should lead the sword. Sun Tzu
45
Questions
?
Deeds not words
Write a Comment
User Comments (0)
About PowerShow.com