Law Enforcement Intelligence


Book Description

This intelligence guide was prepared in response to requests from law enforcement executives for guidance in intelligence functions in a post-September 11 world. It will help law enforcement agencies develop or enhance their intelligence capacity and enable them to fight terrorism and other crimes while preserving community policing relationships. The world of law enforcement intelligence has changed dramatically since September 11, 2001. State, local, and tribal law enforcement agencies have been tasked with a variety of new responsibilities; intelligence is just one. In addition, the intelligence discipline has evolved significantly in recent years. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. This guide is intended to help them in this process. The guide is directed primarily toward state, local, and tribal law enforcement agencies of all sizes that need to develop or reinvigorate their intelligence function. Rather than being a manual to teach a person how to be an intelligence analyst, it is directed toward that manager, supervisor, or officer who is assigned to create an intelligence function. It is intended to provide ideas, definitions, concepts, policies, and resources. It is a primera place to start on a new managerial journey. Every law enforcement agency in the United States, regardless of agency size, must have the capacity to understand the implications of information collection, analysis, and intelligence sharing. Each agency must have an organized mechanism to receive and manage intelligence as well as a mechanism to report and share critical information with other law enforcement agencies. In addition, it is essential that law enforcement agencies develop lines of communication and information-sharing protocols with the private sector, particularly those related to the critical infrastructure, as well as with those private entities that are potential targets of terrorists and criminal enterprises. Not every agency has the staff or resources to create a formal intelligence unit, nor is it necessary in smaller agencies. This document will provide common language and processes to develop and employ an intelligence capacity in SLTLE agencies across the United States as well as articulate a uniform understanding of concepts, issues, and terminology for law enforcement intelligence (LEI). While terrorism issues are currently most pervasive in the current discussion of LEI, the principles of intelligence discussed in this document apply beyond terrorism and include organized crime and entrepreneurial crime of all forms. Drug trafficking and the associated crime of money laundering, for example, continue to be a significant challenge for law enforcement. Transnational computer crime, particularly Internet fraud, identity theft cartels, and global black marketeering of stolen and counterfeit goods, are entrepreneurial crime problems that are increasingly being relegated to SLTLE agencies to investigate simply because of the volume of criminal incidents. Similarly, local law enforcement is being increasingly drawn into human trafficking and illegal immigration enterprises and the often associated crimes related to counterfeiting of official documents, such as passports, visas, driver's licenses, Social Security cards, and credit cards. All require an intelligence capacity for SLTLE, as does the continuation of historical organized crime activities such as auto theft, cargo theft, and virtually any other scheme that can produce profit for an organized criminal entity. To be effective, the law enforcement community must interpret intelligence-related language in a consistent manner. In addition, common standards, policies, and practices will help expedite intelligence sharing while at the same time protecting the privacy of citizens and preserving hard-won community policing relationships.~




Intelligence-Led Policing


Book Description

What is intelligence-led policing? Who came up with the idea? Where did it come from? How does it relate to other policing paradigms? What distinguishes an intelligence-led approach to crime reduction? How is it designed to have an impact on crime? Does it prevent crime? What is crime disruption? Is intelligence-led policing just for the police? These are questions asked by many police professionals, including senior officers, analysts and operational staff. Similar questions are also posed by students of policing who have witnessed the rapid emergence of intelligence-led policing from its British origins to a worldwide movement. These questions are also relevant to crime prevention practitioners and policymakers seeking long-term crime benefits. The answers to these questions are the subject of this book. This book brings the concepts, processes and practice of intelligence-led policing into focus, so that students, practitioners and scholars of policing, criminal intelligence and crime analysis can better understand the evolving theoretical and empirical dynamics of this rapidly growing paradigm. The first book of its kind, enhanced by viewpoint contributions from intelligence experts and case studies of police operations, provides a much-needed and timely in-depth synopsis of this emerging movement in a practical and accessible style.




Networks and Network Analysis for Defence and Security


Book Description

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ‘big data’ and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches.







Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Crime and Networks


Book Description

This innovative collection of original essays showcases the use of social networks in the analysis and understanding of various forms of crime. More than any other past research endeavor, the seventeen chapters in this book apply to criminology the many conceptual and methodological options from social network analysis. Crime and Networks is the only book of its kind that looks at the use of networks in understanding crime, and can be used for advanced undergraduate and beginner’s graduate level courses in criminal justice and criminology.







IBM Public Safety Solutions for a Safer Planet


Book Description

IBM® public safety solutions bring a unified approach to public safety that fosters interagency collaboration and provides foundational data integration, visualization, and analysis tools that drive analytics and insights. Public safety solutions from IBM provide the optimum knowledge tools for modeling, assessing, and managing responses to the incidents and the people who pose danger. Public safety solutions from IBM include advanced capabilities that provide unified support for the critical missions of the law enforcement and emergency and incident management communities. This IBM RedguideTM publication describes the business value of IBM public safety solutions and the capabilities that include a flexible design that enables organizations to deploy the solution in phases according to their most pressing needs. This guide is intended as an introduction for public safety, law enforcement, and emergency management executives and professionals evaluating advanced software solutions for their organizations.




The De Gruyter Handbook of Automated Futures


Book Description

How does automation affect us, our environment, and our imaginations? What actions should we take in response to automation? Beyond grand narratives and technology-driven visions of the future, what more can automation offer? With these questions in mind, The De Gruyter Handbook of Automated Futures provides a framework for thinking about and implementing automation differently. It consolidates automated futures as an inter- and transdisciplinary research field, embedding the imaginaries, interactions, and impacts of automation technology within their social, historical, societal, cultural, and political contexts. Promoting a critical yet constructive and engaging agenda, the handbook invites readers to collaborate with rather than resist automation agendas. It does so by pushing the agenda for social science, humanities and design beyond merely assessing and evaluating existing technologies. Instead, the handbook demonstrates how the humanities and social sciences are essential to the design and governance of sustainable sociotechnical systems. Methodologically, the handbook is underpinned by a pedagogical approach to staging co-learning and co-creation of automated futures with, rather than simply for, people. In this way, the handbook encourages readers to explore new and alternative modes of research, fostering a deeper engagement with the evolving landscape of automation.




Police Intelligence Operations


Book Description

Field Manual (FM) 3-19.50 is a new manual for the Military Police Corps in conducting police intelligence operations (PIO). It describes the doctrine relating to: * The fundamentals of PIO; * The legal documents and considerations affiliated with PIO; * The PIO process; * The relationship of PIO to the Army's intelligence process; * The introduction of police and prison structures, organized crime, legal systems, investigations, crime conducive conditions, and enforcement mechanisms and gaps (POLICE)-a tool to assess the criminal dimension and its influence on effects-based operations (EBO); * PIO in urban operations (UO) and on installations; and * The establishment of PIO networks and associated forums and fusion cells to affect gathering police information and criminal intelligence (CRIMINT).