NIM Flashcards

1
Q

NIM - Level 2

A

Cross border issues affecting more than one district within a force or affecting another force or regional crime activity and usually requiring additional resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIM - Level 3

A

Serious & organised crime usually operating on a national and international scale, requiring identification by proactive means and a response primarily through targeted operations by dedicated units.

It is also likely to require a preventative response on a national basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Under intelligence-led policing what are the 4 assets required to ensure the NIM process works effectively?

A
  1. Knowledge assets
  2. System assets
  3. Source assets
  4. People assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIM:

Knowledge assets

A

Knowing the business of policing and understanding law, policy and guidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIM:

System assets

A

Having appropriate systems and structures in place, including secure environments and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIM:

Source assets

A

Ensuring information is effectively gathered and managed from as many sources as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIM:

People assets

A

Establishing a professional personnel structure with trained and suitably skilled staff to carry out the required functions within the model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition:

Signal crime

A

Any criminal incident that causes a change in the public’s behaviour and/or beliefs about their security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 ways information enters the organisation as information sources?

A
  1. Tasked collection
  2. Routine collection
  3. Volunteered information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Under NIM what is ‘Tasked collection’?

A

It is deliberately sought out and collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under NIM what is ‘Routine collection’?

A

It is collected as a result of another policing activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under NIM what is ‘Volunteered collection’?

A

It is information given to the police.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In dealing with information sources what are the 4 considerations that are needed?

A
  1. Open & closed source information i.e. Public access information and structured police systems.
  2. Information management.
  3. Sanitation and risk assessment processes.
  4. Compliance with DPA and Human Rights Ct 1998
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the four intelligence products under NIM.

A
  1. Strategic assessments
    2 Tactical assessments
  2. Target profiles
  3. Problem profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of INFORMATION

A

Information refers to all forms of information obtained, recorded or processed by the police, including personal data and intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of INTELLIGENCE

A

Intelligence is defined as information that has been subject to a defined evaluation and risk assessment process in order to assist with police decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an INTELLIGENCE REQUIREMENT?

A

Within the intelligence process, the identified gap between what is known and what is not, forms the intelligence requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 5 elements of the Intelligence Cycle?

A
  1. Direction
  2. Collection
  3. Evaluation
  4. Analysis
  5. Dissemination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Direction under the Intelligence Cycle means

A

Deciding what is to be monitored and analysed

20
Q

Collection under the Intelligence Cycle means

A

Obtaining raw information

21
Q

Evaluation under the Intelligence Cycle means

A

Refining and analysing the information

22
Q

Analysis under the Intelligence Cycle means

A

Data has been processed and translated into a finished product which includes integrating, collating, evaluating and analysing all the data

23
Q

Dissemination under the Intelligence Cycle means

A

Providing results of processing to the intelligence community.

24
Q

Under the management of risk what should be considered?

A
  1. Public
  2. Physical
  3. Psychological
  4. Legal
  5. Ethical
  6. Moral
25
Q

NIM - Level 1

A

Local crime and disorder being managed at a local/district level. Appropriate arrangements have to be made for intelligence collection & dissemination and the allocation of tasks.

26
Q

What are the 5 key elements of the National Briefing Model?

A
  1. Briefing of intelligence
  2. Individual & team tasking
  3. Delivery methods
  4. Debriefing
  5. Results
27
Q

Name the 4 key themes required for intelligence briefing?

A
  1. Priority locations
  2. Crime & incident series
  3. Subjects
  4. High risk issues
28
Q

What are the 6 questions that need to be answered in order to ensure the delivery of effective briefing?

A
  1. What is happening?
  2. When is it happening?
  3. Where is it happening?
  4. Who is involve Do?
  5. What are the objectives?
  6. What tasks are required of me?
29
Q

What are the 5 SOURCE ASSESSMENT grades?

A
  1. Always reliable
  2. Mostly reliable
  3. Sometimes reliable
  4. Unreliable source
  5. Untested source
30
Q

List the 5 INTELLIGENCE/INFORMATION EVALUATION grades.

A
  1. Known to be true without reservation
  2. The information is known personally by the source but not the person reporting
  3. The information is not known personally to the source but can be corroborated by other information
  4. The information cannot be judged
  5. Suspected to be false
31
Q

List the 5 INTELLIGENCE/INFORMATION HANDLING codes.

A
  1. Dissemination within the UK Police Service & other law enforcement agencies as specified.
  2. Permits dissemination to UK non-prosecuting parties
  3. Permits dissemination to (non-EU) Foreign Enforcement Agencies
  4. Permits within originating Force/Agency only
  5. Permits dissemination but receiving agency to observe conditions.
32
Q

Under MoPI Police information is information required for what policing purposes?

A
  1. Protecting life and property
  2. Preserving order
  3. Preventing the commission of offences
  4. Bringing offenders to justice
  5. Any duty or responsibility arising from common or statute law
33
Q

Legal basis of what is police information & why vital that there is management of this information.

A
  1. Establishing a policing purpose
  2. Implications to the Human Rights Act 1998
  3. Section 75 of the Northern Ireland Act 1998
  4. Code of Ethics
34
Q

State the 5 stage of the Management of Police Information

A
  1. Collection
  2. Recording
  3. Evaluation & Actioning
  4. Sharing
  5. Review, retention & disposal
35
Q

What are the 5 principles of European Convention of Human Rights to b e considered under Section 6 of RIPA (2000)?

A
  1. Legitimate aim
  2. Legality
  3. Necessity
  4. Proportionality
    Accountability
36
Q

RIPA only covers or regulates covert activities that may otherwise breach Human Rights. The Act provides a legal basis for 4 areas. What are they?

A
  1. Surveillance (directed & intrusive)
  2. Covert Human Intelligence Sources (CHIS)
  3. Intercepting communications
  4. Collecting communications data
37
Q

Define surveillance

A
  1. Monitoring, observing or listening to persons, their movements, their conversations or their other activities or communications
  2. Recording anything monitored, observed or listened to in the course of any surveillance, and
  3. Surveillance by or with the assistance of a surveillance device
38
Q

Define COVERT SURVEILLANCE

A

Covert Surveillance is carried out in a manner calculated to ensure that the person(s) subject to the surveillance are aware that it is or may be taking place.
RIPA regulates Covert Surveillance in 2 categories:
1. Directed surveillance
2. Intrusive surveillance

39
Q

Define DIRECTED SURVEILLANCE.

A

Directed surveillance is covert but not intrusive surveillance undertaken with three aspects.

40
Q

Directed surveillance is covert but not intrusive surveillance undertaken with three aspects.

What is the first aspect?

A

For the purposes of a specific investigation or operation

41
Q

Directed surveillance is covert but not intrusive surveillance undertaken with three aspects.

What is the second aspect?

A

In such a manner as is likely to result in the obtaining of private information about a person (whether or not one is specifically identified for the purposes of the investigation or operation).

42
Q

Directed surveillance is covert but not intrusive surveillance undertaken with three aspects.

What is the third aspect?

A

Otherwise than by way of an immediate response to events or circumstances the nature of which is such that it would not be reasonably practical for an authorisation under the Act to be sought for the carrying out of surveillance.

43
Q

An authorisation for Directed Surveillance may be authorised by whom?

A

All directed surveillance activity within the PSNI will be authorised by a Superintendent or above.

44
Q

How long does written authority last for?

A

Authorisations will be in writing and will be for a period of 3 months, beginning from the time it took effect.

45
Q

How long does an oral authorisation last for?

A

In urgent cases, a Cadre Superintendent may give oral authorisation, which is effective for 72 hours.

46
Q

What are the 8 Data Protection Principles regarding personal information?

A
  1. Fairly & lawfully processed
  2. Processed for limited and lawful purposes
  3. Must be adequate, relevant and not excessive
  4. Must be accurate and kept up to date
  5. Kept no longer than necessary
  6. Processed in accordance with the rights of the data subject
  7. Must be kept secure
  8. Only transferred to countries with adequate security.