Here is a story about the compromise of a list of informants names from Nevada’s Record Courier. A worker in the state’s information technology department, was able to open the file containing the names, addresses and even photos of the informants. If informants are being managed properly this should not be possible. It is negligence on the part of the agency managing the informants. We are putting people’s lives in great danger.
Undercover Training course - Allegations of things going badly wrong
Key advantages of Computerized Confidential Informant Management Records Software
The blog discusses the key benefits for law enforcement in using computerized confidential informant management software. The article highlights the risks that will be managed and some of the cost savings that can be made. The article will be of interest to Chiefs of Police and Sheriffs who are interested in maximising the intelligence gained from informants and at the same time minimizing risk
Informants destroy police careers
Here is a story of three careers destroyed because of the failure to manage a confidential informant safely. The FBI are the USA’s most prominent law enforcement agency. This case begs the question as to what happened to facilitate the mismanagement of this informant. Be under no illusion this is not just one officer acting badly - it is a failure of systems and processes.
Problems with confidential informants - We can fix them
A lot of agencies out there have problems with the management of confidential informants. Unfortunately, some of them do not know it yet. For others they are trying to clear up the mess. And one or two are trying to cover up the mess not caring that it will just manifest itself again in a different way at some stage later.
At HSM Training and Consultancy we believe we have the solutions regardless of what the problem is.
Why did the chicken cross the road - Understanding motive and motivation.
Often asked as a child’s joke, the question ‘Why did the chicken cross the road?’ is about motive. We could rephrase it and ask: ‘What motivated the chicken to cross the road?’ This article discusses some of the factors relevant when it comes to working out what drives a person’s behaviour. The full details are contained in the book: Why - Understanding Motive and Motivation.
The moral and emotional world of police informants - Academic research
At HSM training and consultancy we are great believers in research relating to the management of confidential informants (CHIS, Confidential human intelligence sources, human source, HUMINT) . The more we look at the topic the better equipped we all should be. A recent paper The moral and emotional world of police informants was recently published by Bethan Loftus, Matthew Bacon, and Layla Skinns.
Witness Protection - If you build it they will come ... or maybe not.
When it comes to building a witness protection scheme merely building the framework, does not ensure people will come as this story from KTTN in Missouri illustrates. Despite the state government setting aside a fund of 2 million us dollars, little of the money has been used. Of the state’s more than 600 law enforcement agencies, 13 have signed up to participate, and of those signed up, only four have actually used it. This article examines the fact that no matter how good you think your product is if no one buys it it is worth less.
Confidential Informant related corruption - USA
Well here is a different take on a an unfortunately all to common tale of allegations of inappropriate sexual relations between a police officer and a confidential informant. Unfortunately, this is not the first time that allegations of serious corruption relating to informants and Philadelphia police department have come to light. This article discusses options to remove the risk of such allegations/and events.
Human Sources (CHIS) domestic violence and managing risk
Confidential Informants and 'no-knock' warrants
We are currently listening to the Washington Post’s podcast on no knock warrants. From a law enforcement perspective it does not make for pleasant listening. The podcasts are told from the perspective of the families of those involved. Undoubtedly, there are questions to be answered bylaw enforcement and the judges involved.
The use of undercover operations in counter terrorism investigations
A discussion a recent Background Briefing podcast from the ABC. It discusses an undercover investigation into terrorist activities in Melbourne, Australia. The program is interesting from many perspectives. It tells the tale of a number of young Australian men who were radicalised and the use of an undercover operation to investigate the activity of those involved. It raises legal, ethical and operational matters and is useful in leading discussions on the topics raised. Listen with an open mind.
Confidential Informant management - hitting the tree
Managing the insider threat.
One of the joys of working across the globe in this business area is that we get to work with a lot of different companies each of these brings a different aspect of to our knowledge. One such company is Daltrey who produce the Identity Today podcast. There are lots of learning there featuring interviews with industry leaders.
Here is a link to the podcast we did with them on the topic of managing the insider threat.