COVERT EXAMINATIONS Flashcards
A covert operation is designed to obtain evidence by
use of agents whose true role is undisclosed to the target
There are two major forms of covert operations
undercover operations and surveillance operations.
Undercover operations seek
develop evidence directly from people involved in the offence through the use of disguise and deceit
surveillance operations use
the skills of observation to determine activity of individuals
Prior to an undercover operation, it is essential that the basis for the operation
be committed to writing, preferably in a memo . The memorandum should clearly state:
• The information upon which the covert operation will be based
• The information that is expected to be gained from the operation
• The identities of suspects, if known
• Operatives under your care, custody, or control
he following situations are those in which covert operations have traditionally worked well:
• There is reliable information about criminal activity or asset losses, but insufficient detail for prevention or apprehension.
• Losses are known to be occurring in an area, but there is no information as to how they
are occurring or who is responsible.
• It is desirable to gather information concerning personal relationships or to identify the
contacts made with or by certain people.
• It is desirable to compare actual practices with supposed or required practices.
• It is important to obtain information in an indirect manner from people believed to
possess it.
all covert operations have similar general objectives:
• To obtain evidence of a past, current, or future crime. This evidence usually bears on the
culpability of individuals. If an operative in a covert investigation is posing as a thief, for example, actual thieves might confess their involvement to him, unaware that their conversations were being recorded.
• To identify those engaged in possible illegal activity. If, for example, cash is missing, a covert
investigation or surveillance might disclose who is committing the offence. Thereafter, the covert operation might be discontinued, and the evidence gathered by more traditional means.
• To recover illegal gains. If an accounts payable clerk has been stealing to purchase an
automobile, locating the car might permit civil litigation to recover it.
• To identify co-conspirators. If an employee is in collusion with another employee, a covert
operation might lead to the identity of the second individual.
• To identify the modus operandi. Again, in the case of missing goods, the identity of the
perpetrator might be known or suspected, but the internal control deficiencies permitting the theft might be unknown. A covert operation might discover the missing link.
Entrapment occurs when
law enforcement officers or government agents induce a person to commit a crime that he is not previously disposed to commit.
There are two general types of surveillance:
mobile and fixed
During loose surveillance, targets
need not be kept under constant observation. The surveillance should be discontinued if the person becomes suspicious.
In close surveillance
subjects are kept under observation continuously even if they appear to become suspicious
In the “A-B” surveillance technique
the observer directly behind the target is known as the “A” observer. A follows the target, and B follows A either on the same side or from across
the street.
The “A-B-C” technique of surveillance
A follows the subject. B follows A and concentrates on keeping him rather than the subject
in sight. The normal position for B is behind A. C normally operates across the street from
the subject and slightly to his rear, enabling C to observe the subject without turning his
head. Variations, such as having both B and C across the street or all three of the observers
behind the subject on the same side of the street, might be necessary because of crowded
conditions or traffic.
Progressive surveillance
the subject is followed a certain distance and the surveillance is discontinued and the time noted.
The next day another observer picks up the subject at the time and place where the surveillance was previously discontinued, and again follows the subject for a short distance. This continues day after day until the surveillance is completed
A confidential source furnishes information as
a result of occupation or profession and has no
culpability in the alleged offence