Book Read Free

Advanced Criminal Investigations and Intelligence Operations

Page 26

by Unknown


  Intelligence Files and Analytical Investigative Methods

  205

  SECRET. Any additional designations are adjectives referring to the type of information accessed, such as CRYPTO and SCI (specially compartmented

  information). Terms such as EYES ONLY are used in other countries, such as Great Britain (MI5 and MI6 SIS).

  Strategic intel igence supports long-range planning or policy. Tactical intel igence is for immediate operational use. Reactive intel igence refers to a response to a situation after the fact. Proactive intel igence refers to anticipation of needs and/or preemptive action before an incident.

  Intelligence files were once literally paper files that were indexed by

  names and subjects, with file numbers. They were cross-referenced by pri-

  mary categories and subcategories (primary, secondary, and tertiary). Source documents were indexed and filed (documenting the source of raw data or

  information). Source documents were rated for reliability, content, and classification. Folder logs and dissemination control forms were used to control information. Such manual systems can be of value in areas where technology is scarce but the need for intelligence files is great. Primarily, however, today, intelligence files are automated and computers are programmed to process

  massive amounts of stored data, information, and intelligence.

  Intelligence Analysis

  The analysis of intelligence can be conducted by two nearly identical processes, which were developed from scientific and engineering practices: analytical investigation methods (AIMs) and visual investigative analysis (VIA).

  Other methods of intelligence analysis are available, but AIM and VIA are commonly used by law enforcement, intelligence, and military analysts to

  present complex information with presentation media.

  Analytical Investigative Methods

  AIMs analyze large amounts of information using scientific concepts of investigation, data collection, and evaluation techniques, including the following:

  • Construction of association matrices and link analysis

  • Use of inductive and deductive logic from sources of information

  • Flow charting and construction of charts for analysis

  • The analytical process

  • Development of inferences from analysis

  • The delivery of clear and concise briefings and presentation media

  AIMs, like VIA, emerged from using tools and techniques borrowed from

  science and engineering project management. Two such tools, critical path

  206

  Advanced Criminal Investigations and Intelligence Operations

  method (CPM) and program evaluation and review technique (PERT), are

  discussed further under section “Visual Investigative Analysis.”

  CPM is used for scheduling, planning, and control ing projects with deadlines. Users decide which path in a network will take the most time. This path then becomes a critical path.

  PERT is a scientific management information system for scheduling, planning, and control ing complex research and development projects. It is oriented to events and uses a network to display graphically the sequence of events, dependent relationships, and estimated duration of times for all the activities.

  A network is a series of interconnected and interrelated symbols that graphically displays the sequence of occurrences and dependent relationships. Link network analysis shows associations, while time flow analysis shows sequential events.

  Visual Investigative Analysis

  VIA was developed in the 1960s by the Los Angeles Police Department and

  named VIA by the California Department of Justice in the 1970s (Morris, 1982, p. iv). It was first used in trial support in Los Angeles in 1968 in the trial of Sirhan Sirhan for the murder of U.S. Senator (and former Attorney General) Robert F. Kennedy (Morris, 1982, p. 5).

  VIA, or crime analysis charting if used in criminal cases, makes complex

  investigations more controllable and makes it easier for supervisors and managers to monitor the hour-by-hour use of resources to avoid duplication. It also helps trial attorneys to quickly understand complex cases and large amounts of information by providing a sort of roadmap of critical events and essential elements. It also helps judges and juries to understand cases by allowing them to see and hear the progress of the events presented. Such analysis saves time, often reducing trial time by half, and clearly states essential facts.

  VIA developed from concepts borrowed from engineering, construc-

  tion, and ship building that used techniques such as CPM and PERT . CPM

  is similar to PERT and is geared toward scheduling and controlling projects.

  PERT is geared toward facilitating control of research activity in scientific tasks. The two can be integrated into one system. VIA is such an integration, with modifications that are responsive to the law enforcement or intelligence functions. VIA is a network approach to displaying graphically the sequences of events and the relationships of each element of an incident

  (Morris, 1982, pp. 3–4).

  VIA can be performed manually or by use of computer graphics and

  tools. While computers are more practical today, understanding the manual system can aid in practice or be used in more remote or primitive environments. To perform VIA manually, the analyst needs a few tools and supplies:

  Intelligence Files and Analytical Investigative Methods

  207

  1.

  Index cards—3 × 5, using only one side, to tape or affix to the layout.

  2.

  Binders—a case library for copies of all documentation supporting the VIA chart. Each binder is numbered and each page in each binder

  is numbered for quick reference (e.g., a document or information in

  Binder 2 and on page 25 would be noted on an index card as 2-25).

  3.

  Highlighter pens—during the reading phase of the documentation,

  the analyst highlights items or information for transfer to the index

  cards. This can simply be in yellow highlight or various colors can be

  used to color-code specific aspects of information.

  4.

  Template—symbols can be drawn using a template that includes cir-

  cles, rectangles, arrows, triangles, and other symbols.

  5.

  Paper—durable drafting paper can be used for the chart and tracing paper can be used for final drafts.

  6.

  Tape and pins—pins can hold index cards on the drafting paper during layout and tape can be used to affix them when finalized. Here, the

  index cards are taped down after the lines, circles, arrows, and triangles are added and the chart takes the shape and appearance of a storyboard.

  7.

  Pens and pencils—for compiling the index cards and drawing the

  chart. The final draft, of course, should be in ink.

  8.

  Copies of reports and documentation—all materials for the case

  should be copied (never the originals) because they will be hole

  punched, page numbered, and highlighted.

  The same process can be performed with a computer, using various com-

  puter-aided design (CAD) tools and programs (such as Visio®, IntelliVIEW®, and other commercially available programs). The important points of developing a VIA chart and library are as follows:

  1. Determine the important elements and data in reports, documents,

  and other information from the case library:

  a. Does this information relate to the incident in question?

  b. Does this information provide a who, what, when, where, why, or how?

  c. Does this information build upon another known or suspected

  key element?

  2. Summarize information into 50 words or less (for each element or

  key point):

&nbs
p; a. The index card’s upper line might show who gave the data

  (W = Witness, I = Informant, V = Victim, O = Officer, etc., fol-

  lowed by the name).

  b. The bottom line might show when—day, date, time, and binder

  and page numbers.

  3. Link the nexus between activities when dates, times, and other ele-

  mental details are unclear, ambiguous, or missing.

  208

  Advanced Criminal Investigations and Intelligence Operations

  The VIA process should not be viewed as individual steps, but as a continuous process like the intel igence cycle itself. However, the tasks in the VIA process include the following:

  • Confer with the client/consumer for planning and direction (trial attorney or intelligence consumer) on the EEIs.

  • Collect source documents; collection.

  • Develop the case library (documentation).

  • Conduct first reading of source documents.

  • Conduct second reading of source documents.

  • Create index cards ( processing) (Figure 12.6).

  • Compare and edit materials.

  • Conduct index card analysis ( analysis).

  • Take the information from the reading and rereading of the

  source documents of the case library and write each activity on

  an individual index card.

  • Study the index cards to determine which event and card most

  likely starts the network and which one is the logical conclusion.

  • Arrange the remaining cards in a logical chain of activity

  (sequential, if possible).

  − Activity flow (sequential and logical)

  − Parallel activity (simultaneous)

  − Activity display— nodes

  W = witness

  I = informant

  V = victim

  O = officer

  Source name

  Activity description

  Date

  Time

  Page

  Binder number

  number

  Figure 12.6 VIA index cards.

  Intelligence Files and Analytical Investigative Methods

  209

  • Create chart (attaching information from index cards) ( analysis and production).

  • Use Network Logic to show each nexus.

  • What activities precede the next one (logical sequence)?

  • What activities are concurrent with this one (simultaneous)?

  • What activities follow this one (continuing logical sequence)?

  (Morris, 1982, p. 16)

  • Create arrows and nodes (arranged to show the logical sequence of activities and their relationship) and assign reference numbers

  (to source binders and pages from the case library) ( analysis and production).

  • Use symbols to represent information in the network and on the

  chart.

  • Each arrow represents one activity (any portion of the case analysis that consumes time and/or resources and has a definable

  beginning and end).

  • A circle or node, between the arrows, denotes the start and stop of an activity. These event nodes consume no time or

  resources.

  • Every activity in a network must be preceded and succeeded by

  an event node (except the conclusion of the chart); there can only

  be one activity between every two nodes.

  • A burst (depicted by vertical sets of event nodes) is the initiation of two or more activities.

  • A merge depicts the completion of two or more activities.

  • The end of a VIA chart is signified by a triangle (the termination symbol) (Figure 12.7) (Morris, 1282, pp. 19–20, 22).

  • Create activity and dummy lines (analysis and production).

  • An activity arrow (mentioned earlier) represents one activity.

  • A dummy line is represented by a dotted arrow and represents an activity that consumes no time.

  − It maintains network continuity and logic by indicating that,

  while a relationship exists between two activities, it does not

  warrant the strength of a solid line arrow.

  − The dotted dummy line completes a straggler line by attach-

  ing it to something—a continuing solid line (Figure 12.8)

  (Morris, 1982, pp. 20–22).

  • Confer (again) with the client/consumer on the progress from

  the planning and direction phase (trial attorney or intelligence consumer).

  210

  Advanced Criminal Investigations and Intelligence Operations

  Event 1

  Event 2

  Event 3

  Event 4

  Event 5

  5

  10

  15

  20

  25

  12/07

  12/14

  12/24

  12/26

  01/01

  Activity

  Dummy

  21 Node

  Flowchart or link diagram

  71

  Terminal

  Legend

  Figure 12.7 Flowchart or link diagram.

  Node

  Node

  Termination

  Node

  Figure 12.8 Nodes, activity lines, dummy lines, and termination.

  • Finish drafting and finalizing (inking, if manual y constructed) the

  chart.

  • Number each node or circle (in increments of five or more along the main line to allow for upgrades) for reference to points of

  interest.

  • No two nodes should have the same number except fragnets and

  subnets (Figure 12.9) (Morris, 1982, p. 22).

  • Attach information from index cards (with tape, if manually

  constructed).

  • Create a legend (of symbols), title, and credits (of who drafted the chart).

  Intelligence Files and Analytical Investigative Methods

  211

  5

  1 Event#2

  Event#3

  11/16/2013

  11/17/2013

  2

  Individuals

  Event#1

  involved

  Decision

  11/14/2013

  point

  4

  6

  Start

  Event#2

  Event#4

  Finish

  11/16/2013

  11/17/2013

  11/14/2013

  02/23/2014

  3

  7

  Event#1

  Event#3

  Decision

  11/14/2013

  11/17/2013

  point

  Individuals

  Individuals

  involved

  involved

  Video

  Video

  Documents:

  1. Receipt

  4. Cash deposit slip

  7. Video tape and cash

  2. Credit card payment 5. Receipt

  receipts

  3. Video tape

  6. Credit card payment

  Figure 12.9 Network diagram.

  • Develop fragnets and subnets, used to expand a complex chart.

  • Fragnets are an expansion that occurs as an appendage (for smal er amounts of information) on the face or surface of the original chart.

  − It is usual y small (one to five activities) and always relates

  directly to one activity between two nodes on the original chart.

  − It is depicted by dotted lines, without arrow heads, attached to

  each end of the fragnet and to the nodes on the original chart.

  − Node numbering in the fragnet begins with the first node

  number to be fragneted on the original chart and ends with

  the next node number to the right (Morris, 1982, p. 23).

 
; • Subnets resemble a fragnet but are displayed on an independent chart and usually represent large amounts of information or

  numbers of activities.

  − It is usually represented as a separate chart of its own, often

  after the completion of the original (main) chart. (When

  created on a computer, it may be embedded and brought up,

  opened, or enlarged with a click.)

  − It follows the numbering of the original chart. (It begins with

  the first node number to be subnetted on the original chart

  and ends with the next node number to the right.) (Morris,

  1982, p. 23).

  212

  Advanced Criminal Investigations and Intelligence Operations

  • Conduct a final review with the client/consumer for planning and

  direction (trial attorney or intelligence consumer) ( dissemination and feedback).

  The use of computers can greatly simplify this process, especially the use of fragnets and subnets. The final draft of the chart can be copied using the trace paper or saved as a computer document, using overlays. Charts may then be present using presentation software, such as PowerPoint®.

  Financial Information

  Single-entry bookkeeping refers to the entry of information from all sources in one place without making an effort to balance the records. Double-entry bookkeeping refers to a system in which every transaction affects two or more accounts (with equal debits or credits) and is recorded in these accounts.

  Two or more adjustments must be made (never only one) and, in summary

  form, shows the results of many transactions and the force affecting the

  organization.

  Fundamental Equation

  Assets (items of value) = claims assets = Liabilities and Capital

  A − L = C

  Accounting Cycle

  1.

  Journalizing—analyzing and recording transactions in a journal 2.

  Posting—copying the debits and credits of journal entries into the ledger accounts

  3.

  Preparing a trial balance—summarizing the ledger accounts and

  testing the recording accuracy

  4. Constructing a work sheet:

  a. Affecting the adjustments without making entries in the account

  b. Sorting the account balances into

  i. Balance sheet

 

‹ Prev