04-35 Source Management – Confidential Source Flashcards

1
Q

Rationale

Policing is moving towards more intelligence–led strategies, while at the same time making efficient use of limited resources. Sources (informants) have a legitimate place in law enforcement, and it has long been recognized that they are one of the most ——- means of obtaining information. Professional and ——— management of sources is
paramount in maintaining public confidence in the Toronto Police Service (Service). The proper management of sources is a key component of risk management.
This Procedure sets out clear guidelines to ensure that sources are dealt with in a ——–manner and all information obtained is ——utilized. Compliance with this Procedure will ensure that the use of a source is properly supervised, confidentiality is maintained, and the security of sources and police officers is protected.

A

cost–effective
ethical
consistent
fully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supervision

 Supervisory Officer —— mandatory
 when considering whether to establish a ——–with a source
 prior to any ——- with a source
 after any ——– or meeting with a source
 upon becoming aware that the safety of a source may have been ———-
 ————– – Source Management notification mandatory
 prior to ——- any source information obtained from a person who is a first time source
 prior to using any source information obtained from a source, under ——— of age

A

notification
relationship
meeting
communication
compromised
Covert Operations
using
eighteen (18) years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Procedure
All officers shall consider the following PRIMARY concerns when establishing a relationship with a source
POST CI
 p——- safety
 o————–
 safety of the s——
 the a————– of justice
 the i———– of the Service
 corporate l————

A

 public safety
 officer safety
 safety of the source
 the administration of justice
 the integrity of the Service
 corporate liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sources
The following information shall be taken into consideration when dealing with sources
 a source is an ——-of the Service and is not the ——— asset of any one police officer
 confidential sources – level 2 shall only be designated by the ——–
 confidential sources – level 2 shall only be managed by handlers – level 2 unless otherwise approved by the Controller
 all payments made to a source shall only be dispersed by a member of ———. See Appendix A
 If the source requests advice regarding taxation for money received from this Service, they shall be advised that financial —— from the Service are considered —— income, however since the source is not a Service employee, T4 slips will not be issued.

A

asset
exclusive
Controller
CO–SMS
awards
taxable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sources
 all crown letters issued on behalf of a source shall only be provided by the ——————
 caution shall be used when dealing with sources who are
 facing ———– charges
 subject to any stage of an ———– inquiry
 subject to a ——— or probation order

A

Unit Commander – Intelligence Services (INT).
criminal
immigration
parole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Source Privilege
All requests regarding information on the identity of a source shall be referred to —— by e–mail. A source’s identity is privileged and shall not be disclosed to anyone other than a sworn police officer without the source’s ——-.
When a charge is laid in a matter where ——from a source is involved, the case manager shall notify CO–SMS in writing on a TPS — as soon as practicable.

A

CO–SMS
consent
information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality
Confidentiality commences ——after the first officer undertakes that the information provided will be kept confidential, whether or not the source is later formally ——— with CO–SMS

A

immediately
registered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Utilizing Source Information

There are inherent risks associated to the utilization of information provided by a source. To mitigate the potential for
these risks, and to ensure officers are fully informed prior to acting on source information, it is mandatory for CO-SMS to be notified in the following instances:

 First Time Confidential Source – prior to acting on any source information obtained from a person who is a first
time source, the handler shall notify and ——- with a member of CO-SMS
 Source Under eighteen (18) Years of Age – any source information obtained from a source, under eighteen (18) years of age, shall not be ——–until the handler has consulted with a member of CO-SMS and received ————-authorization that states that the information can be actioned.

A

consult
actioned
documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Police Officer
1. When assessing the reliability of the source shall always consider a potential source’s ——— for providing information.
2. When considering whether to establish a relationship with a source shall, without delay
 carefully consider the ——–concerns
 advise the source that their ——–shall be checked against all available resources
 conduct a Person Query, including a CPIC check
 advise a ———-officer
 upon establishing a relationship with a source, consult with CO–SMS

A

motivation
primary
background
supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Police Officer

  1. Officers shall not establish or continue a relationship with a source where they have had or are having a personal or ——–relationship.
  2. When communicating with a source shall
     exercise caution
     not
     use a source as an ——-without prior approval of the ————-
     permit a source to conduct unauthorized ———- activities
     make promises contrary to ———– or Service Governance
     make promises which cannot be ———- or for which they are not authorized to make
     discuss confidential police business or internal —— with or in the presence of a source
     discuss ——— business in the presence of a source
     introduce a source to the ——– of any member of the Service
     give/accept directly or indirectly a ——– or money from a source or their family
     permit the source to ——-for any goods or services received by a member
     pay or commit to pay for services without prior authorization and approved ————–
     commit to protective measures without prior approval by ————-section as directed in Procedure 04–37
     ———-the moral standards of a source
A

business
agent
Unit Commander – INT
illegal
Legislative
fulfilled
procedures
personal
family
gift
pay
documentation
INT – Covert Operations – Witness Assistance & Relocation Program
adopt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Police Officer

  1. Prior to any meeting with a source shall
     conduct a Person Query, including a CPIC check
     notify a supervisory officer within —————- hours of the scheduled meeting providing the supervisory officer with the date, time, location and secondary officer’s name and badge number
     ensure that a second officer will be present at the time of the meeting with a source in all circumstances
     make the following entries in the memorandum book or case book, if applicable
     details of the scheduled meeting including date, time and location
     name and badge number of the ———–officer notified
     name and badge number of the ———–officer attending
A

twenty four (24) hours
supervisory
secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Police Officer

  1. After the initial communication or meeting with the source shall, without delay
     notify a ———— officer
     make the following entries in the memorandum book or case book, if applicable
     details and information received from the communication or meeting
     name and badge number of the supervisory officer notified
     name and badge number of the secondary officer who attended, if applicable
     complete a TPS 270, TPS 276 and, if required, a TPS 277 ensuring that all details of the contact are included
     forward all reports to a supervisory officer in a secure fashion prior to the completion of the current tour of duty or
    as directed by a supervisory officer
     ———reports shall not be accepted by CO–SMS and shall be returned to the officer’s ———— for action.
A

supervisory
Handwritten
Unit Commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Police Officer

  1. When receiving confirmation that a source has been ——-by CO–SMS shall identify the source by the assigned Confidential Source Number only in all future reports, internal correspondence, memorandum books and case books.
  2. After each subsequent communication or meeting with the source shall, without delay
     notify a supervisory officer
     make the following entries in the memorandum book or case book and, if applicable
     details and information received from the communication or meeting
     name and badge number of the supervisory officer notified
     name and badge number of the secondary officer who attended, if applicable
     complete a TPS 276 and, if required, a TPS 277 containing all details of the communication or meeting with the
    source and forward to a supervisory officer in a secure fashion prior to the completion of the current tour of duty
    or as directed by a supervisory officer
     When ——- communications or meetings occur within the same tour of duty, all incidents may be recorded on a ———TPS 276 or TPS 277. A single notification to the supervisory officer is sufficient.
A

registered
multiple
single

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. In the case of an unscheduled communication or meeting shall
     notify a supervisory officer as soon as possible after the event has occurred
     comply with item 8
    10.Prior to using any information provided by a source
     if the person is a first time source, the handler shall notify and consult with a member of CO-SMS
     if the source is under eighteen (18) years of age, the handler shall
     consult with a member of CO-SMS
     obtain documented ————– that states that the source information can be actioned
A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

11.When requesting payment to a source shall comply with Appendix A.
12.When requesting consideration in the form of a crown letter shall comply with Appendix B.
13.Upon becoming aware that the safety of a source may have been compromised as a result of the source’s identity
having been revealed shall
 ensure the ——– of the source
 immediately notify a ——- officer
 immediately notify the ———-, detailing the circumstances, the potential risk to the source, and the effect on the related investigation

A

safety
supervisory
Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Supervisory Officer

14.When notified by an officer of an intended meeting with a source shall
 carefully consider the ——- concerns
 determine whether to permit
 the continuation of a ————with a source
 the ———- with the source to occur
 ensure the officer complies with all responsibilities set out in this Procedure
 make the following entries in the memorandum book or case book, if applicable
 the date, time and location of the intended meeting
 the primary and secondary officers’ names and badge numbers
 when assigned, the Confidential Source ———

A

primary
relationship
meeting
Number

17
Q

Supervisory Officer

15.When notified by an officer that a communication or meeting has taken place shall
 ensure reports submitted by the officer are accurately completed
 sign and submit the reports in a secure fashion to the —— forthwith
 make the following entries in the memorandum book or case book, if applicable
 the date, time and location of the communication or meeting
 the primary and secondary officers’ names and badge numbers
 the Confidential Source Number

A

detective sergeant

18
Q

Supervisory Officer

16.When notified by an officer that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall
 ensure that the ——-and the ——— are notified forthwith
 notify the —————-

A

Controller
Unit Commander
detective sergeant

19
Q

Detective Sergeant

17.When a source is used shall
 ensure that the officer and supervisory officer comply with all the requirements set out in this Procedure
 ensure reports submitted are accurately completed
 sign and submit the reports in a secure fashion to the ——- forthwith
18.When notified by a supervisory officer that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall ensure the ——— and Unit Commander are notified forthwith

A

Unit Commander
Controller

20
Q

Controller – Intelligence Services – Covert Operations

19.When notified that the safety of a source may have been compromised as a result of the source’s identity having been revealed shall take the necessary action.

20.The Controller shall
 determine the appropriate ———— of all sources
 ensure the handler is of the appropriate —– given the classification of the source, and if not, ensure that an appropriate handler is assigned
 ensure a Confidential Source ——— is
 assigned upon receipt of the initial TPS 270 and TPS 276
 communicated to the original submitting police officer by email
 the only identifier on any subsequent documentation or report
 All subsequent TPS 276 and TPS 277s shall identify the source by the Confidential Source Number only. Under no circumstances shall the identity of the source be ———- on any source–related report, memorandum book or case book once the Confidential Source Number
has been ———–.
 comply with Appendix A when receiving a request for payment to a source
 comply with Appendix B when receiving a request for crown consideration
21.The Controller shall ensure the distribution and disclosure of source files are only made under the written direction of the ———–or the———–

A

classification
level
Number
divulged
assigned
Unit Commander – INT
Chief of Police.

21
Q

Agent means a person who acts on ——- of the police and under their direction, which may result in them becoming a material and compellable ———. The identity of the agent is subject to ———–.

A

behalf
witness
disclosure

22
Q

Confidential Source (Source) means a person who is ——-with Intelligence Services – Covert Operations – Source Management (CO–SMS) and ———–provides information of some usefulness or interest to the Toronto Police Service
with respect to the prevention and ———- of crimes, with the explicit or ———expectation of confidentiality. This person would generally not become a witness or require protection as a result of their involvement or the information they have provided.
A confidential source is an asset of the Toronto Police Service and is not the exclusive asset of any one police officer.
A confidential source does not include a person who provides a statement to police as part of routine police inquiries into alleged offences; e.g. a witness to a crime.
There are two levels of confidential sources: Confidential Source – Level 1 and Confidential Source – Level 2.

A

registered
voluntarily
detection
implicit

23
Q

Confidential Source – Level 1 means a confidential source who is not a Confidential Source – Level 2.

A

Makes Sense

24
Q

Confidential Source – Level 2 means
 a source under the age of 18 (young person), or
 a source whose information could be considered:
 ——————
 may affect ———– security;
 involves ———– crime;
 is beyond the ——–or the source–handling abilities of the officers involved;
 at the ——–of the Controller.

Unless otherwise approved by the Controller, a confidential source – level 2 shall be managed by a Handler – Level 2.

A

multi–jurisdictional;
national
organized
resources
discretion

25
Q

Controller – Source means the ———– – Intelligence Services – Covert Operations who ensures the effective control, accountability and ———of the source, continually assessing the risks and managing all information provided by the source. The Controller – Source is ———-for the Source Management Program of the Toronto Police Service

A

Detective Sergeant
evaluation
responsible

26
Q

Crown Letter – Source means a document provided to the crown attorney by Intelligence Services – Covert Operations – Source Management (CO–SMS) on behalf of a source seeking ——–for that source’s assistance to the police.
All crown letters issued on behalf of a source shall only be provided by the ———————- See
Procedure 04–35, Appendix B.

A

consideration
Unit Commander – Intelligence Services.

27
Q

Handler means a police officer who has received information from a source and who has been so designated by the ——— or designate. A handler, on behalf of the Toronto Police Service, is responsible for the:
 ————- of a source
 ————-of any contact
 acquisition and ———-of information received from the source.
There are 2 levels of handlers: Handler – Level 1 and Handler – Level 2.

A

Controller
development
integrity
dissemination

28
Q

Handler – Level 1 means any police officer from the Toronto Police Service who can handle level 1 sources only

A

awareness

29
Q

Handler – Level 2 means any police officer from the Toronto Police Service who has been ———- and designated by the Controller or designate. A handler – level 2 can manage agents, and level 1 and level 2 sources. For the purposes of agents, a handler – level 2 is also responsible for:
 the ———– of agents on behalf of the Service
 considering the ——–concerns
 the ————–and dissemination of information from that agent

A

accredited
management
primary
acquisition

30
Q

Restricted Source means a person who has been restricted by Intelligence Services – Covert Operations – Source Management (CO–SMS). Such a person shall not be used as such by any officer unless designated by the ———–.

A

Controller