04-35 Source Management – Confidential Source Flashcards
Rationale
Policing is moving towards more intelligence–led strategies, while at the same time making efficient use of limited resources. Sources (informants) have a legitimate place in law enforcement, and it has long been recognized that they are one of the most ——- means of obtaining information. Professional and ——— management of sources is
paramount in maintaining public confidence in the Toronto Police Service (Service). The proper management of sources is a key component of risk management.
This Procedure sets out clear guidelines to ensure that sources are dealt with in a ——–manner and all information obtained is ——utilized. Compliance with this Procedure will ensure that the use of a source is properly supervised, confidentiality is maintained, and the security of sources and police officers is protected.
cost–effective
ethical
consistent
fully
Supervision
Supervisory Officer —— mandatory
when considering whether to establish a ——–with a source
prior to any ——- with a source
after any ——– or meeting with a source
upon becoming aware that the safety of a source may have been ———-
————– – Source Management notification mandatory
prior to ——- any source information obtained from a person who is a first time source
prior to using any source information obtained from a source, under ——— of age
notification
relationship
meeting
communication
compromised
Covert Operations
using
eighteen (18) years
Procedure
All officers shall consider the following PRIMARY concerns when establishing a relationship with a source
POST CI
p——- safety
o————–
safety of the s——
the a————– of justice
the i———– of the Service
corporate l————
public safety
officer safety
safety of the source
the administration of justice
the integrity of the Service
corporate liability
Sources
The following information shall be taken into consideration when dealing with sources
a source is an ——-of the Service and is not the ——— asset of any one police officer
confidential sources – level 2 shall only be designated by the ——–
confidential sources – level 2 shall only be managed by handlers – level 2 unless otherwise approved by the Controller
all payments made to a source shall only be dispersed by a member of ———. See Appendix A
If the source requests advice regarding taxation for money received from this Service, they shall be advised that financial —— from the Service are considered —— income, however since the source is not a Service employee, T4 slips will not be issued.
asset
exclusive
Controller
CO–SMS
awards
taxable
Sources
all crown letters issued on behalf of a source shall only be provided by the ——————
caution shall be used when dealing with sources who are
facing ———– charges
subject to any stage of an ———– inquiry
subject to a ——— or probation order
Unit Commander – Intelligence Services (INT).
criminal
immigration
parole
Source Privilege
All requests regarding information on the identity of a source shall be referred to —— by e–mail. A source’s identity is privileged and shall not be disclosed to anyone other than a sworn police officer without the source’s ——-.
When a charge is laid in a matter where ——from a source is involved, the case manager shall notify CO–SMS in writing on a TPS — as soon as practicable.
CO–SMS
consent
information
Confidentiality
Confidentiality commences ——after the first officer undertakes that the information provided will be kept confidential, whether or not the source is later formally ——— with CO–SMS
immediately
registered
Utilizing Source Information
There are inherent risks associated to the utilization of information provided by a source. To mitigate the potential for
these risks, and to ensure officers are fully informed prior to acting on source information, it is mandatory for CO-SMS to be notified in the following instances:
First Time Confidential Source – prior to acting on any source information obtained from a person who is a first
time source, the handler shall notify and ——- with a member of CO-SMS
Source Under eighteen (18) Years of Age – any source information obtained from a source, under eighteen (18) years of age, shall not be ——–until the handler has consulted with a member of CO-SMS and received ————-authorization that states that the information can be actioned.
consult
actioned
documented
Police Officer
1. When assessing the reliability of the source shall always consider a potential source’s ——— for providing information.
2. When considering whether to establish a relationship with a source shall, without delay
carefully consider the ——–concerns
advise the source that their ——–shall be checked against all available resources
conduct a Person Query, including a CPIC check
advise a ———-officer
upon establishing a relationship with a source, consult with CO–SMS
motivation
primary
background
supervisory
Police Officer
- Officers shall not establish or continue a relationship with a source where they have had or are having a personal or ——–relationship.
- When communicating with a source shall
exercise caution
not
use a source as an ——-without prior approval of the ————-
permit a source to conduct unauthorized ———- activities
make promises contrary to ———– or Service Governance
make promises which cannot be ———- or for which they are not authorized to make
discuss confidential police business or internal —— with or in the presence of a source
discuss ——— business in the presence of a source
introduce a source to the ——– of any member of the Service
give/accept directly or indirectly a ——– or money from a source or their family
permit the source to ——-for any goods or services received by a member
pay or commit to pay for services without prior authorization and approved ————–
commit to protective measures without prior approval by ————-section as directed in Procedure 04–37
———-the moral standards of a source
business
agent
Unit Commander – INT
illegal
Legislative
fulfilled
procedures
personal
family
gift
pay
documentation
INT – Covert Operations – Witness Assistance & Relocation Program
adopt
Police Officer
- Prior to any meeting with a source shall
conduct a Person Query, including a CPIC check
notify a supervisory officer within —————- hours of the scheduled meeting providing the supervisory officer with the date, time, location and secondary officer’s name and badge number
ensure that a second officer will be present at the time of the meeting with a source in all circumstances
make the following entries in the memorandum book or case book, if applicable
details of the scheduled meeting including date, time and location
name and badge number of the ———–officer notified
name and badge number of the ———–officer attending
twenty four (24) hours
supervisory
secondary
Police Officer
- After the initial communication or meeting with the source shall, without delay
notify a ———— officer
make the following entries in the memorandum book or case book, if applicable
details and information received from the communication or meeting
name and badge number of the supervisory officer notified
name and badge number of the secondary officer who attended, if applicable
complete a TPS 270, TPS 276 and, if required, a TPS 277 ensuring that all details of the contact are included
forward all reports to a supervisory officer in a secure fashion prior to the completion of the current tour of duty or
as directed by a supervisory officer
———reports shall not be accepted by CO–SMS and shall be returned to the officer’s ———— for action.
supervisory
Handwritten
Unit Commander
Police Officer
- When receiving confirmation that a source has been ——-by CO–SMS shall identify the source by the assigned Confidential Source Number only in all future reports, internal correspondence, memorandum books and case books.
- After each subsequent communication or meeting with the source shall, without delay
notify a supervisory officer
make the following entries in the memorandum book or case book and, if applicable
details and information received from the communication or meeting
name and badge number of the supervisory officer notified
name and badge number of the secondary officer who attended, if applicable
complete a TPS 276 and, if required, a TPS 277 containing all details of the communication or meeting with the
source and forward to a supervisory officer in a secure fashion prior to the completion of the current tour of duty
or as directed by a supervisory officer
When ——- communications or meetings occur within the same tour of duty, all incidents may be recorded on a ———TPS 276 or TPS 277. A single notification to the supervisory officer is sufficient.
registered
multiple
single
- In the case of an unscheduled communication or meeting shall
notify a supervisory officer as soon as possible after the event has occurred
comply with item 8
10.Prior to using any information provided by a source
if the person is a first time source, the handler shall notify and consult with a member of CO-SMS
if the source is under eighteen (18) years of age, the handler shall
consult with a member of CO-SMS
obtain documented ————– that states that the source information can be actioned
authorization
11.When requesting payment to a source shall comply with Appendix A.
12.When requesting consideration in the form of a crown letter shall comply with Appendix B.
13.Upon becoming aware that the safety of a source may have been compromised as a result of the source’s identity
having been revealed shall
ensure the ——– of the source
immediately notify a ——- officer
immediately notify the ———-, detailing the circumstances, the potential risk to the source, and the effect on the related investigation
safety
supervisory
Controller
Supervisory Officer
14.When notified by an officer of an intended meeting with a source shall
carefully consider the ——- concerns
determine whether to permit
the continuation of a ————with a source
the ———- with the source to occur
ensure the officer complies with all responsibilities set out in this Procedure
make the following entries in the memorandum book or case book, if applicable
the date, time and location of the intended meeting
the primary and secondary officers’ names and badge numbers
when assigned, the Confidential Source ———
primary
relationship
meeting
Number
Supervisory Officer
15.When notified by an officer that a communication or meeting has taken place shall
ensure reports submitted by the officer are accurately completed
sign and submit the reports in a secure fashion to the —— forthwith
make the following entries in the memorandum book or case book, if applicable
the date, time and location of the communication or meeting
the primary and secondary officers’ names and badge numbers
the Confidential Source Number
detective sergeant
Supervisory Officer
16.When notified by an officer that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall
ensure that the ——-and the ——— are notified forthwith
notify the —————-
Controller
Unit Commander
detective sergeant
Detective Sergeant
17.When a source is used shall
ensure that the officer and supervisory officer comply with all the requirements set out in this Procedure
ensure reports submitted are accurately completed
sign and submit the reports in a secure fashion to the ——- forthwith
18.When notified by a supervisory officer that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall ensure the ——— and Unit Commander are notified forthwith
Unit Commander
Controller
Controller – Intelligence Services – Covert Operations
19.When notified that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall take the necessary action.
20.The Controller shall
determine the appropriate ———— of all sources
ensure the handler is of the appropriate —– given the classification of the source, and if not, ensure that an appropriate handler is assigned
ensure a Confidential Source ——— is
assigned upon receipt of the initial TPS 270 and TPS 276
communicated to the original submitting police officer by email
the only identifier on any subsequent documentation or report
All subsequent TPS 276 and TPS 277s shall identify the source by the Confidential Source Number only. Under no circumstances shall the identity of the source be ———- on any source–related report, memorandum book or case book once the Confidential Source Number
has been ———–.
comply with Appendix A when receiving a request for payment to a source
comply with Appendix B when receiving a request for crown consideration
21.The Controller shall ensure the distribution and disclosure of source files are only made under the written direction of the ———–or the———–
classification
level
Number
divulged
assigned
Unit Commander – INT
Chief of Police.
Agent means a person who acts on ——- of the police and under their direction, which may result in them becoming a material and compellable ———. The identity of the agent is subject to ———–.
behalf
witness
disclosure
Confidential Source (Source) means a person who is ——-with Intelligence Services – Covert Operations – Source Management (CO–SMS) and ———–provides information of some usefulness or interest to the Toronto Police Service
with respect to the prevention and ———- of crimes, with the explicit or ———expectation of confidentiality. This person would generally not become a witness or require protection as a result of their involvement or the information they have provided.
A confidential source is an asset of the Toronto Police Service and is not the exclusive asset of any one police officer.
A confidential source does not include a person who provides a statement to police as part of routine police inquiries into alleged offences; e.g. a witness to a crime.
There are two levels of confidential sources: Confidential Source – Level 1 and Confidential Source – Level 2.
registered
voluntarily
detection
implicit
Confidential Source – Level 1 means a confidential source who is not a Confidential Source – Level 2.
Makes Sense
Confidential Source – Level 2 means
a source under the age of 18 (young person), or
a source whose information could be considered:
——————
may affect ———– security;
involves ———– crime;
is beyond the ——–or the source–handling abilities of the officers involved;
at the ——–of the Controller.
Unless otherwise approved by the Controller, a confidential source – level 2 shall be managed by a Handler – Level 2.
multi–jurisdictional;
national
organized
resources
discretion
Controller – Source means the ———– – Intelligence Services – Covert Operations who ensures the effective control, accountability and ———of the source, continually assessing the risks and managing all information provided by the source. The Controller – Source is ———-for the Source Management Program of the Toronto Police Service
Detective Sergeant
evaluation
responsible
Crown Letter – Source means a document provided to the crown attorney by Intelligence Services – Covert Operations – Source Management (CO–SMS) on behalf of a source seeking ——–for that source’s assistance to the police.
All crown letters issued on behalf of a source shall only be provided by the ———————- See
Procedure 04–35, Appendix B.
consideration
Unit Commander – Intelligence Services.
Handler means a police officer who has received information from a source and who has been so designated by the ——— or designate. A handler, on behalf of the Toronto Police Service, is responsible for the:
————- of a source
————-of any contact
acquisition and ———-of information received from the source.
There are 2 levels of handlers: Handler – Level 1 and Handler – Level 2.
Controller
development
integrity
dissemination
Handler – Level 1 means any police officer from the Toronto Police Service who can handle level 1 sources only
awareness
Handler – Level 2 means any police officer from the Toronto Police Service who has been ———- and designated by the Controller or designate. A handler – level 2 can manage agents, and level 1 and level 2 sources. For the purposes of agents, a handler – level 2 is also responsible for:
the ———– of agents on behalf of the Service
considering the ——–concerns
the ————–and dissemination of information from that agent
accredited
management
primary
acquisition
Restricted Source means a person who has been restricted by Intelligence Services – Covert Operations – Source Management (CO–SMS). Such a person shall not be used as such by any officer unless designated by the ———–.
Controller