Information & Intelligence Flashcards
Identify the difference between information and intelligence
- Information is all information obtained and recorded.
- Intelligence is information that has formally been processed.
State internal sources of information for the police
- Directly/Indirectly obtained information
- CHIS/Test Purchase by undercover officers
- Police intelligence databases
- Police National database (PND)
- Social networking sites – such as Facebook, Twitter
- Open sources (search engines)
- Supervisors
- Specialist Department (e.g. NPT/Public Protection)
State external sources of information for the police
- Partner Agencies – e.g. Local Authority, YOTs, Education/ Schools
- House-to-house enquiries
State policy sources of information for the police
- Force Policy / National Guidelines
- CPS Guidelines
Explain how NIM applies to a policing context
NIM is:
* concerned with using intelligence to determine priorities for policing.
- It is a model for policing that senior managers can use to help them to determine the strategic direction and make tactical decisions about resourcing and operational policing to support local and national objectives
- it also helps manage risk.
Therefore, NIM is not just about intelligence gathering, it is also a business process model that can be used to guide all activities of a police force.
State advantages of the NIM
- allows operational strategies to focus on key priorities
- allows more officers to focus on solving priority problems and targeting the most
prolific and active offenders - informs the management of risk
- provides more informed business planning and a greater link to operational
policing issues - improves the direction and briefing of patrols
- improves integration with partner agencies
State some personnel who are involved in the Management of Information/intelligence
- Local Intelligence Officer (LIO)
- Field Intelligence Officer (FIO)
- Single point of contact (SPOC)
Describe the 3 levels of the NIM
Explain how intelligence is graded on Niche
High - THREAT TO LIFE, SERIOUS HARM, IMMINENT RISK or OPPORTUNITY to a child, adult or property
Medium - TIME CRITICAL
Low - All other criminal intelligence
What system do we use on the national intelligence report form?
3-5-2 system
Explain the 3 in the 352 system
Source evaluation:
- Relaible
- no doubt of the authenticity, trustworthiness and competence of the source, or the information has been supplied by an individual who has generally proved to be reliable. - Untested
- a source that has not previously provided information to
the person receiving it, or has provided information previously that could not be substantiated. - Not reliable
- Sources where information in the past, in the majority of instances,
has proved unreliable.
Explain the 5 in the 352 system
Reliability assessment:
- Known directly to the source - Refers to information obtained first-hand
- Known indirectly to the source but corroborated - Refers to information that the source has not witnessed themselves, but can be verified by separate information that carries the intelligence assessment of ‘A’
- Known indirectly to the source - Refers to information that has been told to the source by someone else.
- Not known - Refers to when there is no means of assessing the information.
- Suspected to be false - Regardless of how the source came upon the information, there is a reason to believe the information is false
Explain the 2 in the 352 system
Handling codes:
P. Lawful sharing permitted - intelligence may be shared with others under the appropriate GSC marking provided there is a policing purpose, local protocols in place and a legitimate need to receive it
C. Lawful sharing permitted with conditions - used when concerns
regarding how widely intelligence should be shared, and that specific handling instructions are to apply
State the intelligence cycle
Explain sanatisation as it relates to the 352 system
Sanitisation of information occurs when material is removed which explicitly or implicitly identifies a source. It also occurs when** identifying details of a data subject are removed**. This process will be undertaken by the intelligence unit prior to the dissemination or inputting onto an intelligence system.
Officers / Staff can help this process, however, by understanding the principles of sanitisation and ensuring that only relevant information is included in the report.