Confidential informant compromise - Police Negligence.

Here is a story about the compromise of a list of informants names from Nevada’s Record Courier. A worker in the state’s information technology department, was able to open the file containing the names, addresses and even photos of the informants. If informants are being managed properly this should not be possible. It is negligence on the part of the agency managing the informants. We are putting people’s lives in great danger.

Undercover Training course - Allegations of things going badly wrong

Here we discuss a case from Canada about an undercover police training course where things seem to have gone badly wrong. I am not quite sure what to say, In fairness to all it is probably best to wait for the official investigation.

Key advantages of Computerized Confidential Informant Management Records Software

The blog discusses the key benefits for law enforcement in using computerized confidential informant management software. The article highlights the risks that will be managed and some of the cost savings that can be made. The article will be of interest to Chiefs of Police and Sheriffs who are interested in maximising the intelligence gained from informants and at the same time minimizing risk

Informants destroy police careers

Here is a story of three careers destroyed because of the failure to manage a confidential informant safely. The FBI are the USA’s most prominent law enforcement agency. This case begs the question as to what happened to facilitate the mismanagement of this informant. Be under no illusion this is not just one officer acting badly - it is a failure of systems and processes.

Problems with confidential informants - We can fix them

A lot of agencies out there have problems with the management of confidential informants. Unfortunately, some of them do not know it yet. For others they are trying to clear up the mess. And one or two are trying to cover up the mess not caring that it will just manifest itself again in a different way at some stage later.

At HSM Training and Consultancy we believe we have the solutions regardless of what the problem is.

Why did the chicken cross the road - Understanding motive and motivation.

Why did the chicken cross the road - Understanding motive and motivation.

Often asked as a child’s joke, the question ‘Why did the chicken cross the road?’ is about motive. We could rephrase it and ask: ‘What motivated the chicken to cross the road?’ This article discusses some of the factors relevant when it comes to working out what drives a person’s behaviour. The full details are contained in the book: Why - Understanding Motive and Motivation.

The moral and emotional world of police informants - Academic research

At HSM training and consultancy we are great believers in research relating to the management of confidential informants (CHIS, Confidential human intelligence sources, human source, HUMINT) . The more we look at the topic the better equipped we all should be. A recent paper The moral and emotional world of police informants was recently published by Bethan Loftus, Matthew Bacon, and Layla Skinns.

Witness Protection - If you build it they will come ... or maybe not.

When it comes to building a witness protection scheme merely building the framework, does not ensure people will come as this story from KTTN in Missouri illustrates. Despite the state government setting aside a fund of 2 million us dollars, little of the money has been used. Of the state’s more than 600 law enforcement agencies, 13 have signed up to participate, and of those signed up, only four have actually used it. This article examines the fact that no matter how good you think your product is if no one buys it it is worth less.

Confidential Informant related corruption - USA

Well here is a different take on a an unfortunately all to common tale of allegations of inappropriate sexual relations between a police officer and a confidential informant. Unfortunately, this is not the first time that allegations of serious corruption relating to informants and Philadelphia police department have come to light. This article discusses options to remove the risk of such allegations/and events.

Human Sources (CHIS) domestic violence and managing risk

An interesting article from the BBC relating to the management of a Covert Human Intelligence Source (CHIS) (confidential informant) and the source’s alleged involvement in domestic violence. This case involves the security service (MI5) and a person they managed as an informant.

Confidential Informants and 'no-knock' warrants

We are currently listening to the Washington Post’s podcast on no knock warrants. From a law enforcement perspective it does not make for pleasant listening. The podcasts are told from the perspective of the families of those involved. Undoubtedly, there are questions to be answered bylaw enforcement and the judges involved.

The use of undercover operations in counter terrorism investigations

A discussion a recent Background Briefing podcast from the ABC. It discusses an undercover investigation into terrorist activities in Melbourne, Australia. The program is interesting from many perspectives. It tells the tale of a number of young Australian men who were radicalised and the use of an undercover operation to investigate the activity of those involved. It raises legal, ethical and operational matters and is useful in leading discussions on the topics raised. Listen with an open mind.

Confidential Informant management - hitting the tree

A story from Raleigh, North Carolina about corruption involving a Raleigh police officer and a confidential informant. While the article lacks detail and the investigation is still ongoing, there are a few things we can be fairly sure were wrong.

Managing the insider threat.

One of the joys of working across the globe in this business area is that we get to work with a lot of different companies each of these brings a different aspect of to our knowledge. One such company is Daltrey who produce the Identity Today podcast. There are lots of learning there featuring interviews with industry leaders.

Here is a link to the podcast we did with them on the topic of managing the insider threat.