Download as pdf or txt
Download as pdf or txt
You are on page 1of 84

If you have issues viewing or accessing this file contact us at NCJRS.gov.

· ... 1 1""

BASIC
This microfiche was produced from documents received for
ELEMENTS
inclusion in the NCJRS data base. Siilce NCJRS cannot exercise
control over the physical condition of the documents submitted, OF
the individual frame quality will vary. The resolution chart on
this frame may be used to evaluate the document quality.
~l 1 .••' ' J INTELLIGENCE
of

1.0 ~~ llllll~ 11111


25
.
v~
~ ~[ill~
IIIp2 .2 A Manual of Theory, Structure and Procedures
r;.

,
-1.1-
t IJ~
... ~
l.oLl.r..
for Use by Law Enforcement Agencies
111111.8 f ,j

Against Organized Crime


,...
\\\\\1.25 1IIIi !'4 \\\\\1.6
iI
! . By
E. Drexel Godfrey, Jr., Ph.D.
and
MICROCOPY RESOLUTION TEST CHART
Don R. Harris, Ph.D.
NATIONAL BUREAU OF STANOARDS-J963-A

The fact that the Law Enforcement Assistance Administration


Microfilming procedures used to create this. fiche comply with furnished financial support for the writing and publishing of
the standards set forth in 41CFR 101·11.504 this manual does not necessarily indicate the concurrence of
LEAA in the material presented herein.

Points of view or opjnions stated in this document are


those of the author!s) aild do not represent the official Technical Assistance Division'
Office of Criminal Justice Assistance
position or policies of \ ~ e U.S. Department of Justice.
Law Enforcement Assistance Administration
Department of Justice

U.S. DEPARTMENT OF JUSTICE


November, ·1971
LAW ENFORCEMENT ASSISTANCE ADMINISTRATION
For sale by the Superintendent of Documents, U.S. Government Printing Office
NATIONAL CRIMINAL JUSTICE REFERENCE SERVICE Washington, D.C. 20402 - Price $2.10

WASHINGTON, D.C. 20531


'I t.

\ 7/1/76 .

~ ______ "!..._o~ __
-'I---~-

FOREWORD
This manual is the product of two men experienced in the processes
and operations of intelligence at the national level. They have spent many
years as participants in the latter stages of the intelligence process-analysis
and reporting, reevaluation, and management. From these vantage points
they have also been closely associated with the other elements of the process-
collection, evaluation, arid- collation. They were asked by LEAA to bting
this knowledge and experience to bear on the problems posed to the law
enforcement agency by their need to develop and to improve intelligence
directed against organized crime.
Since this project obviously required knowledge of how intelligence is
now produced in law enforcement agencies and what are the dimensions of
the target, namely, the organized criminal, the two authors went to the field
to find out. The many involved in this effort at the local, State, and national
level gave most generously of their time, giving the authors a full, fast, and
what might have been an unique display of operations, structure, personnel,
and problems. Without exception they were most encouraging in the project
since there was little in the literature to guide them in their efforts to
establish an intelligence unit and to operate it effectively.
During the process of drafting the manual, many 01. those visited also
gave of their time to review the sections and chapters in draft. They offered
much assistance and many ideas. In this sense the manual can be considered
a joint effort by the community of intelligence units in the many law
enforcement agencies which participated. They bear no responsibility for
the final product, yet without them it could never have been brought into
what the authors believe is direct focus with the practical problems currently
faced by the inteliigence units across the country.
There were some that gave specific assistance to the authors and should
be recognized for their help. Mr. Charles Lister made a major input of
ideas and did the initial draft of Appendix A, Intelligence and the Law.
Mr. Leonard M. Zandel contributed the bulk of the section in appendix B
on computer operation security. Mr. Vincent Piersante of the Michigan
State Police contributed his lists of questions which were used in appendix C
to provide a starting point for an agency to develop its own question form
for the important function of debriefing. The New England Organized
Crime Intelligence System was kind enough to permit the reproduction of
two analyses used as examples of strategic intelligence reporting (appendix E).
The State of Florida Department of Law Enforcement was kind enough to
allow the reproduction of their excellent guidelines for use in background
investigation of applicants (appendix F).
The authors are deeply indebted to Georgia Lee Furniss, not only for
editing the text in a most professional manner, but even more importantly
for culling from the text a series of specific principles or guidelines to be
found in appendix D. The project could not have been successfully con-

iii
eluded without the ever present assistance-of Phyllis Modley, who not only
combined the functions of office administrator, research assistant, and gen-
eralist to-do-what-had-to·be-done, but also is solely responsible for the
excellent bibliography which appears as appendix G.
Finally, mention should be made of the several members of LEAA who PREFACE
gave us counsel, guidance, and the fullest of support-Mr .. Martin B. ?an-
ziger, former Chief, Organized Crime ProgTam and now Dlrector, NatIOnal
Institute of Law Enforcement and Criminal Justice; Mr. Louis Scalzo, cur- The basic objectives of this manual are:
rently Director, Technical Assistance Division; Mr. Joseph A. Nardoza, • To describe the process of intelligence and to point out how Jaw
Regional Administrator, Region II (New York); and Miss Karen H. Clark. enforcement agencies may al)pJy intelligence to combat organized
IVlr. Joseph F. Cahill, in addition to his other tasks, carried the burden of crime.
arranging the details of the many trips. Mike Favicchio made a major • To. explore structure, training, staffing, and security of intelligence
contribution in his work preparing the graphic presentations. And last umts and to provide guidelines for commanders of law enforcement
but far from least, the authors express much gratitude to Misses Diane Lehr intelligence units to improve their overall management. ,
and Jan Eichenseer for bearing the burden of final manuscript typing. • To present trends in the law as they may now and in the future im-
pinge on the mission and functioning' of the intelligence unit of law
enforcement agencies .
.The gui~ance prese~ted in this manual cannot be specific. It cannot
be smce the slze. of mt.elhgence units varies widely as does the threat posed
locally by orga~lZed cnme. The manual does point up the changing nature
of orgamzed crune, and suggests how techniques from disciplines unfamiliar
to law enforcement can be adapted effectively to aid in the fight against the
organized criminal.
One focus of the manual is on the needs of the head of the law enforce-
ment agen~y. His u.n~~r~ta~dinl? ?f what intelligence can do to help him
carry out Ius responslbllItles IS cntlcal. If he does not understand this the
~ntell~gence unit. may employ excellent techniques to produce excellent
mtellIgence, but It WIll only be tactically useful. The strategic role of the
law enforcement agency in meeting the challenge of organized crime will
not be served.

iv
TABLE OF CONTENTS
Page
Forew'ord ................................................. . 111

Preface ................................................... . V

List of figures ............................................. . Xll

Glossary .................. '.' ............................... . XUl

CHAPTER 1. THE ROLE OF INTELLIGENCE IN COMBATING


ORGANIZED CRIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction .................................. . 1
What intelligence means ....................... . 1
The intelligence process ....................... . 2
Tactical intelligence ....................... . ..,
')

Strategic intelligence ...................... . 2


The command level and its use of intelligence .... . 3
The analytic method in the service of the
policymaker ................................ . 4
Getting down to basics .......................... . 4
The three essentials of an intelligence unit ....... . 4
"Add-ons" to the essentials ..................... . 4
Factors making fQr sound intelligence ............ . 6
Intelligence as a staff function .................. . 6
The agency head's intelligence brief or report .. 7
Pushing out the traditional boundaries .......... . 7
Expanding the intelligence data base ............ . 7
Strengthening the analytic capacity .............. . ::;
Use of professional specialists ................... . 8
Looking beyond the La Cosa Nostrc ............. . 9
The role of the commander of the intelligence unit . 9

CHAPTER II. THE INTELLIGENCE PROCESS . . . . . . . . . . . . . . . . . . . . . . 11


Introduction .................................. . 11
Collection .................................... . 12
Planning the ~ollection function ............ . 13
Example of collection planning .: ....... . 13
Collection methods ........................ . 14
Overt collection ....................... . 14

vii
....''''",= 'M" __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

~
'
~
"
_
O
C
'
~
~
Page Page
Investigators .. ".......... . . . . . . . . . 14 The intelligence unit and th~ head of the
Information from non-intelligence units 15 law enforcement agency ...... , ........... . 30
Information from other jurisdictions ., 16 The fil tering effect ........................ . 4·0
Debriefing as an aid to information The intelligence unit and internal problems
gathering . . . . . . . . . . . . . . . . . . . . . . . . 17 of the agency ........................... . 40
Information from sources other than The shape of an intelligence unit ............... . 41
law enforcement agencies . . . . . . . . . . 17 The control of information and document flow 41
Complainants. . . . . . . . . . . . . . . . . . . . . . 18 Logging ...... , ............. '" ....... . <12
Covert colI ection .. . . . . . . . . . . . . . . . . . . . . . 19 Circulation, filing, and storage .......... . 44
Physical surveillance ..... . . . . . . . . . . . 19 Division of labor-information control
Electronic surveillance .............. 20 versus analysis ...................... . 46
Informers ......................... 20 Structure and analysis ..................... . 47
Undercover agents ......... , : . . . . . . . 21 Analysts and investigators .............. . 47
Evaluation or intelligence inputs .:....... 21 The team approach ................... . 4.7
Collation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Supervising the team .................. . 48
Filing system .......................... 23 Clerical support ........................... . 49
Cro~~ndexing ......................... 23 Intelligence unit command ................. . <19
Mechanical filing aids .................. 24 Dissemination, a command function ..... . 50
A,nalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 The intelligence unit l mmander ....... . 50
An example of analysis ........... . . . . . . . 24 Strategic intelligence component ........ . 51
The role of the hypothesis .............. 25 Intra-agency relations and the unit
The role of research .. . . . . . . . . . . . . . . . . . . 26
commander ......................... . 51
External relations ......................... . 51
The relationship between collation and analysis 26
The analyst-investigator relationship .......... 27
Obstacles to effective external relations ... . 52
The intelligence report ..................... 27
Actions to improve external relations .... . 52
The protection of intelligence information . 53
Periodic reporting ..................... 28
A treaty as an aid to external relations ... . 55
Indicative versus evidential intelligence ... 28
External liaison ....................... . 55
Role of the consumer. . . . . . . . . . . . . . . . . . . 28
Dissemination .. ..................... ... .. . 28
CHAPTER IV. STAFFING THE INTELLIGENCE UNIT . . . . . . . . . . . . . . . . 59
Reeval uation ............................ ,. 29
30 I ntrod nction ................................... 59
Management of the intelligence process ...... .
Collection plan ....................... . 30 The unit commander .......................... . GO
General criteria for staff selection ................ . 60
Monthly report of intelligence unit's
activities ........................... . 31 The first step-the interview ............... . 61
Monthly evaluation of operations ....... . 31 Investig'ator candidate testino'-use
n of
field problem ........................... . 61
Analyst candidate testing-use of analytic model 62
THE STRUCTURE OF AN INTELLIGENCE UNIT " . . . . . . . 36
CHAPTER III. The selection process ...................... . 6g
Introduction .................................. . 36 The special problem of choosing the
Structure and l~ission ......................... . 37 intelligence investigator .............. . 64
The intelligence unit and the two-way stretch .. 37 Determining the analytic discipline needed ... . 65
The intelligence unit and enforcement ....... . 37 The nonspecialist analyst ............... . 65
Guiding principals of organization ........... . 38 The specialist analyst .................. . 65
Location of the intelligence unit ................ . 38 Use of the academic community ......... . 1\36
Intelligence as a staff function ............... . 38 The problem of the nonbadged employee ........ . 68

IX
viii
,.

Page
Page
The special nature of staffing' the intelligence unit , , 69 Physical security , ...... "., ... ,........... , .... . 98
Career considerations for intelligence personnel '10 The office, . , .... , . , ... , ... , ...... , ....... . 98
The files ................................... 98
CHAPTER V. TRAINING AND INTELLIGENCE , . . . . . . , .• " . , . , . . . . . 73 Restricted materials, .. , .. , ............. . 98
Introduction, ...... , , . , . , , , , , , , , , , , , , , , , , .. , , , , 73 Security and the computer, , , .............. , . 100
The three levels of training " , , , , . , , , , , , , , , , , , , , 74 Security and privacy , .. , ... , , .... , .. , ...... . 100
Training for the nonintelligence officer " " " " ' " 75 Organization of the office for security .. , , .. , . , 101
Intelligence is not a mysteryl " " " " " " " " 75 Operational security ., ... ,., .... , ...... , .... , .. , 101
Field reporting by t~le peace officer " , , , , , , , , , 76 The responsibility of the unit commander ' .. , , .... 102
Introduction to orgahized crime for the APPENDIXES:
general officer , , , , , , , , , , , , , , , , , , , , , , , , , , , , 77
Understanding the role of the agency head, , , , , 77 A. Intelligence and the Law .... , ...... , ....... , ......... . 107
Training of intell igence officers " " " " " " " " " 78 B. The Computer and the Intelligence Unit ."., ........ . 115
Intelligence theory and c ;ganized crime ,,','" 78 C, Sample Debrief Form ...... , ....... ,., ... ,., .... ,., .. 123
The target: organized ,ime".",',.,""'" 79 D. Guidelines: Operation of an Intelligence Unit .......... . 12H
Official corruption, , , , .. , , .... , .. , .. , . , , . , 79 E. Examples: Strategic Intelligence Reporting , ........ , ... . I:~7
Organized crime}' fond the "Mafia" ., .. ,',., 80 F. Guidelines: Background Investigation of Applic<lllts-
Emphasis on an Itic technique .......... , .. , 80 Intelligence Unit , .......... .
Sophistica t analysis problems ,. , .. , .... . 81 G. Bibliography .... , ...... , . , .. , . , : : : : : : : : : : : : : : : : : : : : : :
Report prepal In ...... , ................ . 82
Field repG , ...................... , , . 82
The analyl 'port ................... . 82
Technical trainir ........................ 83
Security training ....................... 84
Other topics ..... • ••••••••••••••••••• I. 84
Command level train in§. ...................... 84
"War galning" , .. ,. . ........ , ........ , . , 85
\"Triting the intelligen 'e report , ........ ,.". 85
Understanding methode 1, ?;y and process 85
The command level and t!?;anized crime ..... , 86
Training priorities and I ardware .. , ........ . 86
Other training programs .... ., ......... , .... , .. 87
Training techniques ,....... ., .... , .. , ..... , ... 87
Untraditional training tee.. niques , ........ , .. 87
Sample problem-demonstratio . and test of
analytic techniques ........ . ................ . 88

CHAPTER VI. SECURITY AND THE INTELLIGENC.e PROCESS ., . . . . . . . . 92


Introduction ..." .... , .......................... . 92
Personal security ...... , .. , ...... , ......... , , . , , 94
The backgrotllld investigation . , .. , ...... , . , . , 94
Update of background investigation .. , ...... . 95
Polygraph ... , ................ , .. ' , ....... . 97
Security training .. , ..... , . , ....... , .. , .... . 97

x Xl
LIST OF FIGURES GLOSSAP,-Y
l' age Agency Head-A phrase in this manual used to refer to the head of any law
5 enforcement agency-local and Stale police, local and State prosecutors
The structure of the intelligence unit ............... . offices, etc.
FIGURE 1.
2. Sample intel1igence report form [or use by 16 Analysis-The function of assembling in a logical manner bits and pieces of
non-intelligence units .................... ,., .... . information to form patterns and meaning.
3. Sample daily patrol report form on survei.llance of Analyst-A person in an intelligence unit that performed the analysis function.
17
locations of interest to intelligence U11lt .... , . . . . . . . Collation-The function of handling, sorting, and filing information, inc1udihg-
the sifting out of useless information, the orderly arrangement of collected
4. Sample evaluation system-reliability of source and
content of information ................. : " ....... . materials so that relationships may be established, and the creation of a
system for rapid retrieval of filed information.
5. Sample monthly repmt of the intelligence u11lt s 32 Hypothesis-A tentative statement of the meaning of a collection of information
acti vi ties ...................................... .
, ......... . 33 when m-ranged ill a logical manner.
6. .Analysis .............................. . 3<1 Indications Intelligence-Information processed by an intelligence unit which
7. The intelligence process ........................ : .. . informs of or suggests the occurrence of an event.
8. Sample logsheet: Incoming documents and ll1.formatlOn 43 Information-\,vritten or oral reports or documents, short or long, telling Ot an
received by telephone ........................... . event, or an activity.
45 Intelligence-Information that has been processed-collected, evaluated, collated,
9. Sample 10gsheet: Outgoing documents and reports .... . 54
Sample record of inquiries ........................ . analyzed, and reported.
10. 56 Intelligence Officer-A person engaged in the substantive work of an intelligence
11.
Information flovv ........ , ........................ .
71 unit-investigative, analysis, or command.
12. Criterion for selection of intelligence unit staff ....... . Intelligence Reports-Written or oral presentations that convey intelligence to
13. Suggested weighting of subjects in intelligence 75 consumers.
training courses ................................ . Intelligence Studies-Intelligence reports that cover subjects that have been re-
14. Two-week training course for intelligence searched and analyzed in depth.
anal yst I investigation ............................ . 91 Intelligence Unit-A phrase used in this manual to refer to intelligence orga-
15. A sample financial questionnaire ................... .
96 nizations regardless of size or the type of agency in which they are an element.
16. Sample logsheet: Visitors record ................... . Investigator-In this study it refers to the personnel in an intelligence unit that
103 performs the investigatory task.
17. A sample secure office layout ....................... .
105 Law Enforcement Agency-Any official unit at the State or local level that has the
18. A sample secure office layout-a sma~l unit: ......... . responsibility for enforcement of ordinances and laws relevant to its juris-
19. Example: Summary printout categones and input diction.
inEonnation ................................... . 119
Organized Crime-Means the unlawful activities of the members ot a highly
organized, disciplined association engaged in supplying illegal goods and
services.
Premonitory Intelligence-Sec Indication Intelligence above.
Raw Data-Information that has not been put through the intelligence process.
Strategic Intelligence-Intelligence that indicates significant patterns of activity
that may become a major inputs to the planning and decision levels of
the agency.
Tactical Intelligence-Intelligence that is immediately useful to the enforcement
element of an agency.
Unit Commander-A phrase used in this manual to indicate the commander of
an intelligence unit regardless of size or type agency of which it is an element.

xiii
xii
Chapter I
THE ROLE OF
INTELLIGENCE IN
COMBATING ORGANIZED.
CRIME
INTRODUCTION dicate. Great numbers of impatient young men
have been waiting a long time on the organiza-
Special weapons are needed to combat orga- tional ladder for their older superiors to move
nized crime. Unlike the street gang or the single on.
hoodlum, the large criminal syndicates have, as If law enforcement- is to tackle organized
their name suggests, an organization behind crime systematically, it must have a strategy, or
them, often with sophisticated members in key strategies. The development and perfecting of
positions and usually with much larger "operat- strategies rests on sound intelligence. This
ing budgets" than the average law enforcement manual has as its objective the elaboration of. a
agency. In some localities organized crime sound intelligence service to support law en-
amounts to a countersociety complete with its forcement in combating organized crime. A
own set of perverse human values and societal main focus of the volume is on intelligence sup-
rules. In most localities organized crime seeks port to the command level of law enforcement
to conceal itself by buying official protection. In agencies,l but there is also a substantial amount
all localities where it exists organized crime of material on intelligence support for opera-
shields its leadership from prosecution by tions. The distinctions between these two
insulating the command levels from direct support roles will be discussed below.
involvement in criminal acts.
For all these reasons organized crime presents WHAT INTELLIGENCE MEANS
the law enforcement agency with a special and
difficult challenge. A single arrest, or even a "Intelligence" is a word that gives gram-
.... series of arrests, may not seriously impair the marians headaches. It can mean a select piece
effectiveness or a self-perpetuating organized of information: "I have intelligence which tells
crime network; indeed, picking off individual
1 The phrase "law enforcement agencies" is used through-
criminal figures, simply as the opportunities out this manual as a general reference and includes Statc,
arise, may amount to nothing more than offi- county, and local police departments, and prosccutors at
cially sponsored career development for thesyn- similar levels.

~.• & u_.- _""'.........


_ _ _ _;"'.II1II0081..'1_
11 _ _.........___
...__
..........,____ ~ ___.-_.--+_--_-........,..~_~.~,_. ,
crime in a major sector of the metropolitan area. how and when and in what format he expects
me that the Second National Bank is going to be criminal world they are exploring. It can also to receive the finished intelligence product. It
It might be an analysis of the development of
robbed." It can describe a process of· physical become an input to intelligence reports and the agertcy head is himself preoccupied with the
studies. In some cases a piece of raw informa- certain criminal phenomena in a neighboring
and mental ;lctS: "Through the use of intelli- tactical details of enforcement activities, then he
tion may give a hint or warning of things to city with some suggestions as to how quickly the
gence techniques, I have concl.uded that this city will only receive tactical intelligence from his
home city might be affected. Strategic intelli-
may soon see a gangland war." It is sometimes come or criminal activities developing. This subordinates instead of the broad interpretive
type of information when received by a law en- gence differs from tactical in that it deals with
used to define a specific fmiction within a law material that can give hin1 a perspective on the
forcement agency is called preni.onitory or the larger issues 'with which the top decision-
enforcement agency: "Captain Jones from In- major planning moves he must make.
makers of the agency are concerned, not the nuts
telligence tells me that he is being transferred to indications intelligence. The flexible use of intelligence materials as a
The most useful way of categorizing the dif- and bolts of intelligence support which the in-
Traffic." All of these, of course, are proper prime tool of management may be a difficult
vestigator or patrol officer on the street must
usages. "What concerns us here, however, IS not ferences in intelligence end products is to focus concept for some law enforcement leaders.
a grammatical oddity, but an understanding on the use of the material by consumers of in- have to do his job.
To clarify further the role that strategic in- Their leadership style has traditionally been
of the word as it applies to 20th century law telligence. On this basis, there are two broad quite different-making the big case, being up
and sometimes overlapping categories: tactical telligence plays in the workings of a law enforce-
enforcement. front in the dangerous raid, responding alertly
ment agency, it is useful to consider what a
and strategic intelligence. (See chapter II, page and efficiently to emergencies. These have been
THE INTELLIGENCE PROCESS 11, for detailed definitions.) principal policymaker or strategist needs to meet
his responsibilities. In the! case of his obligation the hallmarks of leaclership. As the size and the
Intelligence is the end product of a complex to lead the agency in its effort to redu~e or neu- functions of law enforcement agencies have ex-
process, sometimes physical and always intellec- Tactical Intelligence tralize organized crime, he should have available panded, leaders have not always kept pace with
tual. The end product is most often an in- Tactical intelligence is that which contributes at all times a full picture of the strength, influ- the changes taking place all about them .. They
formed judgment; it may also simply be a directly to the success of an immediate law en- ence, and effectiveness of criminal syndicates in have, with rare exceptions, allowed <lgency size
thoughtful description of a state of affairs; it can forcement objective. It may be the supplying his jurisdiction (and neighboring jurisdictions). to outstrip command control, <lnd paperwork to
be a single fact, or best guess. The process which of a lead to an investigator; it may be compila- He should have a strong feeling for the weak- smother thought. Organizational structures
generates these judgments, descriptions, or facts tion of a list of potential surveillance subjects; nesses in the social and economic fabric of the have remained static. By and large the leader-
and near facts, is called the intelligence process. it may be some small new fact supplied by an city he serves. For example, he should know ship passively receives problems instead of per-
~I.t is. discussed in detail in chapter II.) The observant police officer 'who is aware that reports what types of businesses, unions, social organiza- ceiving them in advance and heading them off.
lI1telllgence process refers to the handling' of on the activities of a certain loanshark are being tions, etc., are controlled or penetrated by orga- \Vhile most agencies now have small planning
individual items of information and their con- entered in a dossier on the subject. Clearly, tac- nized crime and to what degree; equally, he 'mits, these are primarily hostages to the budget
version into material useful for law enforcement tical intelligence can take many forms. One should have some appreciation for which insti- process.
purposes. The process includes the collection form is as simple as passing a fact from one police tutions are most susceptible to future penetra- "What has been lacking-and too often lacking
of data, the collation (or combini J1 Q,' and storage) intelligence unit to another: "You asked if we tion-and this includes, of course, the political at all levc;-ls of leadership in law enforcement-
of data, the evaluation and analysl'; of the col- had any information about X. Well, not much. institutions of his jurisdiction. Finally, he must is the disposition to think systematically about
lected and stored data, and the dissemination of He is, however, as associate of Y." What trans- know what weapons or strategies are available to responsibilities and assets. Objectives are rarely
the analyzed and evaluated material. Collection forms this item from simple information to him in the battle against orgcmized crime and viewed as problems requiring careful planning
and storage are traditional pursuits of law en- intelligence is that a report attesting to the rela- what.he needs to sharpen his weapons or improve and the setting of priorities. Horizons are not
forcement agencies; the other parts of the in- tionship between X and Y had previously been his strategies. A disciplined, imaginative intelli- scanned for potential emergencies so that pre-
telligence process tend to be less well understood acceptc;-d by the first intelligence unit, eval uated gence unit, equipped with proper manpower monitory 'action can be taken to preempt them.
and in some cases are hardly practiced at all. A as having sufficient credibility to be entered in resources, can provide him with support on all Or if they are, it may be at the last moment
basic premise of this manual is that the systematic its files, and considered substantial enough to be of these [Tonts. when preparations are by necessity hasty and
exploitation of raw data through the operation passed on to the second unit. It is tactical in- possibly ill-conceived.
of the intelligence process can provide the law telligence because, presumably, the intelligence THE COMMAND LEVEL AND ITS USE This unhappy picture, admittedly somewhat
enforcement agency with a high-quality end unit requesting the information is in the process OF INTELLIGENCE exaggerated, is a product of flabby mental dis-
product. The process turns information into of assembling a file on X with a view towards cipline. It means that in many cases law en-
intelligence. eventual apprehension of X as a lawbreaker. But the agency head 2 cannot expect intelli- EOl'cement leadership has not seen fit to put
Raw information can be processed into a va- gence support on such matters to flow up to him intelligence to work-that is, leadership has been
riety of intelligence end products. In the sim- automatically. He must make clear what his unwilling' to require a staff component to ex-
Strategic Intelligence needs are to his intelligence unit commander,3
plest form it may be no more than descriptive amine the agency's movement toward a given
-the biogmphy of a known organized crime Strategic intelligence is the highest form of the objective or the fulfillment of a specific respon-
leader, the backgTound history of a criminat end product of the intelligence process. It is a 2 The phrase "agency head" is used throughout this manual
sibility. It has been unwilling to use the bright
as a general reference, and includes chiefs of police depart-
activity, a sketch of the human relationships in blending of facts and analysis to produce an ments, district attorneys, ancl State attorney generals. minds in its ranks to measure a problem, dissect
an illegal business enterprise, etc. Such intelli- informed judgment on a majox' aspect of a law 3 The phrase "intelligence unit commander" is used it, pore over it, balance the demands of that
gence normally is used by intelligence officers to enforcement agency's objectives. An example througho~lt thir manual as a general reference and includes
the head or commander of intelligence units regardless of
problem against the current deployment of
assist them in their work, as reference material of strategic intelligence would be a report to the agency assets, and draw conclusions about a
their specific title in their own agency.
to provide them with an understandin bcr of the head of the agency on the growth of organized
3
2
FIGURE 1
course of action to meet the problem. Leader- THE THREE ESSENTIALS OF AN
ship has been exercised from the hip, not from INTELLIGENCE UNIT
THE STRUCTURE OF THE INTELLIGENCE UNIT
the head.

--
There are three essential components of an
THE ANALYTIC METHOD IN THE intelligence unit. Or to put it another way,
SERVICE OF THE POLICYMAKER there must, at a minimum, be provision for three
activities to take place. The absence of anyone
One large metropolitan intelligence unit com-
of the three could have a crippling effect on the
mander recently completed a survey of the judi-
effective functioning of the intelligence unit.
cial disposition of narcotics cases which his
(See figure 1: The structure of the intelligence
agency had brought before the city's judicial
unit, page 5.)
authorities. The study was detailed and thor- !:::
Other activities or organizational subelements z: ,!!i
ough. It showed.that a gTeat proportion of nar- =>
..., 1;!~;1I1
can be added to the three, but they merely give
cotics offenders apprehended in a major s'weep
the whole operation greater flexibility .-md
'"
a:
:5 !i!~~~ ! .......... :
~ :
.:........ .. ..
program over a year's time were either back in ""
business or soon would be. The study showed
sophistication.
The minimum essentials are: . . ;:."::::::::::::::\;~<,':\
more; it demonstrated that the agency's arrest
procedures had been poor by cithg the large L Files containing information arranged
number of cases thrown out of court for proce- in a manner susceptible to rapid and effec- ' ..........
dural defaul ts; it further showed that, given tive exploitation for the purposes of analysis.
court backlogs and prison overcrowding, the They should be thoroughly cross-refer-
agency's whole approach to the narcotics enced and organized functionally as well as
problem was bound to fail. The system simply biogra phical 1y.
could not absorb wholesale prosecutions and 2. There must be a formal, permanent
confinements. arrangement for a flow of raw information
By demonstrating the failure of the unit's nar- to reach the unit from whatever sources can
cotics control policy, effective use of the analytic be tapped: unit investigators, technical col-
method opened the door to adopting a new and lection devices, other reporting elements
hopefully more realistic policy. In this instance of the agency and other agencies, public
the raw data had nothing to do with organized and official record repositories, and private
crime, but were statistics from the city's criminal data collections where possible and legally
justice system arranged in meaningful groupings defensible.
and related to the agency's own policies and 3. There must be one or more persons
arrest procedures. The story illustrates a fine specifically designated as analysts. That
piece of strategic intelligence put to work in sup- person (or persons) should be capable of
port of a principal policy responsibility of the developing from the file records and the
agency head. It is one for which there are too incoming raw information patterns, net-
few parallels around the country. works, connections, new areas of organized
crime penetration, etc. "Without the ana-
GETTING DOWN TO BASICS lyst, the information flow cannot be utilized
The law enforcement agency head, who wishes effectively to contribute to the strategic
to establish a sound and €ffective in.telligence purpose of the agency. vVithout the ana-
unit that can serve all operational levc:;ls of his lyst, much of the incoming raw inform\ltion
organization (including his own), should begin will remain just that; moreover, a great
by getting down to basics. He must define for deal of it will be lost forever in untapped
himself what an intelligence unit should do, filing cases.
what its functions should be. He should have a
firm grasp of where. it should fit structurally in
"ADD·ONS" TO THE ESSENTIALS
the ag-ency. Finally, he should understand what
the minimum essential components of a good The listing above is not exclusive; many other
intelligence unit are. Having satisfied himself functions and specialties can justifiably be added
on these counts, he will be in a position to move to an intelligence unit which serves a major
toward his objective. metropolitan area. Beyond the essential nu-

4 5
cJeus, however, "add-ons" will simply be proud come a partisan of any particular opera- The Agency Head's Intelligence Timeliness
moments in empire building if each accretion tional policy. An intelligence report which Brief or Report The agency head's intelligence brief should
does not contribute significantly to the overall winds up by recommending that an agency also be timely. It will hel p neither him nor the
Each unit commander must decide how in-
objective of the unit: the production of sOlind, take specific courses of operational activity intelligence unit if he is given information he
telligence is to be served up to the agency head.
finished intelligence which can be of substantial is not a good intelligence report. Should already knows, simply because a brief is sched-
He will have his own 'tastes and idiosyncrasies,
use in neutralizing organized crime. But most that policy fail-or some other approach be uled to be presented. In the case of the auto-
but whatever these are, certain guidelines are
agencies will find they can absorb "add-ons" that adopted and succeeded-something of the mobile thefts, for example, let us say that the
necessary. A routine delivery or presentation
improve the quality and quantity of their in- credibility or the intelligence unit will have enforcement chief has already told the agency
schedule is useful because it becomes something
telligence effort. Among the possible peripheral been lost. head of the past night's score. The intelligence
that cannot easily be postponed or skipped.
contributors are a specially detailed investigative Therl! is no room for the intelligence officer brief obviously should not duplicate this infor-
Some agency heads will want their intelligence
squad working only for the agency's intelligence to develop an emotional identification with a mation. But it may be able to go a little further.
reports or briefings (written or oral) daily, some
needs, a technical equipment section to handle given operational plan. Sooner or later emotions Perhaps it can report on similar crime waves in
once a week; it makes little difference as long as
photographic and electronic surveillance equip- will get in the way of objectivity. neighboring cities and what breaks have been
the presentation is at a fixed point in time. The
ment, liaison officers to work with precinct made in those cases, if any.
contents, of course, will depend on local circum-
.::ommanders or with other agencies, highly The brief had· best be crisp-short, gTam-
INTELLIGENCE AS A STAFF FUNCTION stances and personal needs, but a few minimum
sp~cialized personnel, such as accountants,
standards should be built in'to any brief. matically uncomplicated, stripped of extraneous
systems analysts, etc., and information control What, then, should be the relationship be- detail, and well organized. Finally, it should be
technicians. tween the agency's chief operational planner or up to date-there is 'no point in providing the
Usefulness
strategist and the intelligence unit? Ideally, it head with ancient history simply to point out
FACTORS MAKING FOR SOUND should be as close as possible. As a staff orga- The intel1igence contained in the agency the heinous nature of organized cnme. Case
INTELLIGENCE nization the unit should be expected to supply head's brief should first of all be useful-that is, histories can sometimes be useful, if they make
the agency head with all the intellectual material directly concerned with the head's area of re- a point-but the point should be clearly stated
Sound intelligence on organized crime can be he needs to layout his strategy or make his sponsibility for organized crime. It will only be at the outset.
provided to the law enforcement agency's top operational plans. The intelligence unit, or its confusing to him, for example, if ex,raneous
cori1mand level if it is demanded and if quality commander; should be part of the process of material on street crime is included in an orga- PUSHING OUT THE TRADITIONAL
standards for the intelligence product are im- strategy formation, not a proponent of any par- nized crime brief. If a street crime has been BOUNDARIES
posed. Good quality intelligence depends on a ticular approach. Nevertheless, the commander 'committed about which he should be informed,
number or factors, of course, but perhaps the should be in a position to warn of the conse- news of it should be brought to him by his So far the discussion ha5 centered around con-
most important one is the separation of the quences of embarking on a strategy or opera- cepts of intelIigence support for the agency head
enforcement division, or should be placed in a
intelligence function from responsibility for tional plan whose implications do not appear to concerned with organized crime. Once the head
~,
special category of the commander's report.
'.~~/l'.
operations. For a number of reasons, merging be cI ear to the agency head .. In order to do this has adopted the analytic methods suggested in
or the two functions will end in the dilution of effectively, he must not tarnish his image of the foregoing to meet his strategic and planning
the intelligence function as the hunt reaches a Pointedness problems, he will find that his perceptiveness has
objectivity by lending his support to some other
climax and an arrest seems near: strategy or plan. The intelligence contained in the brief must increased, his capacity to think beyond the tra-
The relationship between agency head and . be pointed-that is, shaped in such a way that ditional boundaries of a problem enhanced .
1. To unravel a major criminal syndicate This will be critical over the next few years as
may take many months or years of pains- intelligence unit must be close enough so that the significance of the item to the agency head
the head's requirements can be quickly and is immediately apparent. For example, it is next organized crime changes its methods of opera-
taking work; it may require temporary tion and moves into more sophisticated and less
moratoriums on arrests of criminal offend- clearly transmitted to the unit. Filtering his to worthless to include in the report a list of cars
stolen in the city over night, complete with their obvious criminal enterprises. It will require a
ers while more intelligence is gathered to requirements through many hands can result in
desc'riptions, license numbers, etc. The agency broad and flexible approach to cope with the
gain access to higher and higher echelons the production of intelligence he does not want
head is not likely to retrieve any of them himself subtler machinations or criminal syndicates as
of the group. or need. By the same token, it is the agency they develop confidence around the countly.
2. Organized crime's involvement in head's responsibility to insure that his views of and, therefore, has no need to know or interest
some apparently legitimate business affairs the quality of the intelligence he is getting feeds in knowing that one was a "blue 1969 Dodge
requires the use of specialized intelligence back to the unit. In this way the end product sedan." On the other hand, if the city has been EXPANDING THE INTELLIGENCE
officers, frequently from outside traditional can be developed and polished and handcrafted suffering a wave of organized car thefts, an item DATA BASE
law enforcement agencies; they would prob- to a point where the agency head finds it not might be composed which said simply, "The The simplest way for most law enforcement
ably not be authorized to make an arrest no only useful but indispensable. At this point, 'wave of organized crime car thefts is still rolling agencies and their intelligence units to expand
matter how eager they were to do so. (The intelligence will have served its proper role as a without any signs of slowing up. Last night's their resources is to build on their present in-
separation of intelligence and operational principal tool of the command level. (The place count was eight, the largest since the operation telligence data. For many, this is now only a
responsibilities is discussed in chapter III.) of. an intelligence unit within a law enforcement began last month. No progress yet on resolution series of biographic files on known "family"
3. The intelligence officer must not be- agency is discussed in detail in chapter III.) of this problem." members and assorted local hoods, which obvi-

6 7
ol1s1y is completely unable to support an am.- The larger and better heeled law enforcement not only for its intelligence unit, but for all its ties and eliminating them as discrete functional
lytic effort. First of ,dl, such an ordering of agencies will be casting about for ways to apply ranks. (Training is discussed in detail in chap- operations~ After all, it is criminal enterprise
data is useful only if the strategic assumptions the computer to these efforts. Even where an ter V.) The role of intelligence-and particu- that consti~tltes organized crime, not necessarily
of the agency are geared to a case-by-case ap- ADP capability appears remote (and to some law larly its modern role of direct support for the a homogeneous ethnic association.
proach. It presupposes that "a pick-em-off-one- enforcement officers, threatening), any revamp. command level-should be thoroughly appre- There can, in other words, be little comfort
by-one" strategy can cope with quite sophisticated ing of current filing systems should be done in a ciated by all hands. If it is, the anxieties over for the law enforcement agency head who has
organizations operating more or less clandes- manner that does not foreclose the move into integration of specialists into the agency and the felt himself fortunate over the years that no
tinely, sometimes illegally, but quite often com pUler storage and retrieval facilities at a bureaucratic problems related to such a change "family member" was located in his Jurisdiction.
legally. It presumes, also, that the law enforce- later date. (See appendix B on the use of ADP may be somewhat ameliorated. But in the final The presence of industrial or commercial wealth
ment agency can keep pace with or outstrip the techniques in intelligence.) analysis, the agency head who goes this route may be as sure an indication that organized
sophisticated practices of organized crime. It must be prepared to anticipate some difficulties crime is at least viewing his dty with interest as
ignores the fact that for every organized crime STRENGTHENING THE ANALYTIC from within his organization. (Staffing' problems the visit of a notorious "capo." 'White-collar
fignre knocked off by arrests, there are several CAPACITY are discussecl in detail in chapter IV.) ~Time is on the rise. On the other hand, large
subordinates of considerable experience waiting The returns, however, should be worth the C'Oncentrations of disadvantaged poor in a de-
Technical improvenlent of filing methods can
in line to fill his shoes. It also ignores the diffi- price. Some of the benefits, of course, will be fined and compacted sector of the dty may
be accomplished in many hw enforcement agen.
cuI ty posed by the fact that organized criminal less than obvious. An improvement in analytic attract those always ready to exploit, the defense-
cies by the short-term employment of infor·
syndicates will increasingly be using individuals potential is not something easily measureable, less and uneducated. Only:1I1 imagi.native and
mation consultants. Beefing up the analytic
-either as effective partnen or as fronts-who particularly in a field such as fighting organized sophisticated intelligence unit can be cognizant
capability of the intelligence unit is another
have no criminal records, no dents in their crime, where victories come rarely and the ad- of changes as they occur-changes in the nature
matter. It may require considerable soul search·
armor. vances of the enemy often go undetected for of criminal organization and makeup, as well as
ing about sacred traditions of the agency, such
An important priority, then, is to reorg'anize years at a time. But if the analytic component changes in the susceptibility to crime of certain
as: the introduction of nonbadged personnel,
the unit's clata hase on crime so that it can be of the intelligence unit has been selected with areas of the city.
stepping into civil service en t~nglements, and
maui pula teel in a variety of ways. First and C:lre and discrimination, a more vigorous intel-
contemplation of a freer exchange of informa·
fon:most this will mean the setting lip of func- lectual tone in the workings of the unit should
tion with other law enforcement agencies. All THE ROLE OF THE COMMANDER OF
tional files-on businesses, city sectors, travel soon emerge and the effectiveness of the unit
of these points are touched on elst'ivhere in this THE INTELLIGENCE UNIT
patterns of known hoodl ums, etc.--an" cross- should improve.
mannal, but it is essential to pause here for a
referencing them to existing biographic files. A The final word in this introduction must
word or two on the permanent use of trained
detailed kl1<lwledge of individuals is only one emphasize the role and responsibilities of the
professional specialists. LOOKING BEYOND THE LA COSA
element of a useful intelligence data base. By intelligence unit's commander. In most cases it
Organized crime increasingly is moving away NOSTRA IMAGE
itself it is only of marginal value, but "'hen com- is he who must take the initiative in improving'
from reliance on muscle and violence and put-
bined with pools of knowledge about activities, One majbr objective which the unit C0111- his staff, in fighting to insure that he has unfet-
ting more dependence on guile, detailed knowl·
localities. movemellts, etL, all manner of asso- mander should have in mind in strengthening tered access to the agency head, and in educating
edge of the intricacies of business and coui.merce,
ciations aud pa tLe1'llS of criminal or suspicious his analytic component and adding specialists ~d the agency as a whole to what it can gain from
alld 011 mobility. More and more the strategic
behavior may emerge. In the past it was some- his staff, should be to widen the unit's concept the activities of his unit.
emphasis of criminal syndicate leaders is on care·
timcs possible to put together quite complex of wbat organized crime is. He and the unit The commander of the intelligence unit is in
ful exploitation of legal loopholes, the quick
"pictures" by combinillg hiogra phic data with must look beyond the traditional "Mafia fami- a unique position in the agency. He will nor-
movement of goods or cash, and even on such
intensive surveillance of specific individuals. lies" or La Cosa N ostra imagery to the organized mally be somewhat junior to other principal
esoteric matters as market mechanics. An ade·
\Vhat is being suggested here is that such pat- criminal networks that may characterize the officers with access to the chief. In many cases,
quate response to this trend will require that
terns could haw been discerned all along from 1970's. he will have to take energetic action to preserve
law enforcement agencies have at least the same
existing storcd data had not one dimensional It is not possible now to predict the forms that his unit's independence without antagon.izing
type of weapons as the enemy-if not yet equal
hI ing techniq lies hidden the rela tionships from organized crime will assume throughout the others who might nominally consider themselves
firepower.
intelligence analysts. (Chapters II and III COll- country over the next decade, but it is possible his superiors. In particular, his people may
tain considerable material on this general topic.) to say with some conviction that they will be develop information pointing to corrupt acts on
USE OF PROFESSIONAL SPECIALISTS
By using' a truly manipulative data base, many different, and certainly more complex. The the part of members of another element of the
intelligence units will find themselves in a posi- Accordingly, intelligence units must face up ethnic composition of criminal gTOU pings is agency. He must in this and in all other cases
tion ' J exploit materials long' untouched in their to the need of hiring such specialists as econo· changing; more overall heterogeneity can be take actions that reflect the impeccable integrity
files. They will be able to detect hitherto unsus-- mists, accountants, attorneys, and even systems expected as mental dexterity displaces brute of his unit and himself.
pected links and associations; they may even un- analysts. The problems their employment may force and violent codes of discipline. Finally, In the struggle for the allocation of resources,
cover legal frouts for illegal activities, and they pose for the personnel policies of the agency the law enforcement agency that stays with the it is the unit commander who must prove his
.J
lllay be able to accomplish this without as much involved had best be faced, studied, and pre· old-fashioned emphasis on specific ethnic gTOUpS case. And his case will be more difficult to prove
reliance as in the past on single case surveillance pared for in advance. There are also implica· and "families" will be unable to move to a strat- than other unit heads, because he will not be
and electronic eavesdropping techniques. tions for the training programs of the agency, egy based on attacking identifiable illegal activi- able to point to numbers of arrests or other con-

8 9
crete indicators as measures of his unit's success. event, It IS up to him to come up with a suffi·
Indeed,. he n11y have been working closely with ciently convincing picture of the extent and
other jurisdictions, g~vit:g them ~ev.elc~pe.cl cases, nature of the threat of organized crime opera·
since the statutes of Ius local JunsciIctlOn are tions in his jurisdiction to gain support for his
inadeq nate [or successful prosecution. In any unit.

Chapter II
THE INTELLIGENCE
PROCESS
Intelligence is a iJrDcess made 11.1) of a series of inlercoll1U'cted fll71rtiolls or activities: rolire-
tion, evaluation, collation, analysis, Tel)orting, dissemination; and r('("uaillation.
Collection is the gathering of raw data or infonnation whirlz in its raw stale or ill Il finish ana-
lytic rep01·t becomes an intelligence input to law enfoTrement activities.
• Collection must be planned and focussed to be effective.
• Collection activities include both overt and covert methods, and the ulilization and coordi-
nation of nonintelligence elements of law enforcement agencies.
Collation is the fiTst stet) in the j)rocess of translating information into intelligence.
411 Collation is m01'e than simj)le storage of lnaterials in files.

• The information must be evaluated, arranged in files so that it can be mlJidly ref1ie't.!f(i, and
cross-indexed so that relationships between data elements can be established.
Analysis is the function that assembles bits and pieces of infonnation from many sources and
tmts them together in such a. manner as to show jJattern and meaning.
• The hYiJothesis is an important tools o{the analyst-it is tentatille statement of the lIIean-
ing of a collection of information when arranged in a logical manner.
The end product of the intelligence j)TOCeSS is an intelligenre 1-ejJOrt-it may he long or
short, it may be oral 01" written, it may be llsed for j)lanning or for ellforcement action.
Essential to the management of the intelligence process is the function of reevaluation.
• The unit commander m list continuously review the fllnctioning of his unit and m list seek
feedback from his conSllmers, especially his agency head. as to effectit'enes5 of his ojJemtioll.

INTRODUCTION the operation of its adjoining fUllction. At the


same time there is continuous feedback in play
. :~~~.
Intelligence can best be thought of as a process_ as the performance of functions further down
t ,))t,
(See figure 7, page 34, at the end of the chapter, the process indicate that something more should
,~~~ which portrays the intelligence process.) It is be clone in one or more of I' prior Junctions
:~;:
a process made up of a series of interconnected back up the line. For example, should a clear
1;,'
.;~,
functions or activities: collection, eval nation, need for more information develop while a re-
collation, analysis, reporting, dissemination, and port is being prepared, a request can be made
:teevaluation. The products of each, beginning to collection, to the investigator, informer, or
with collection, feed into and are essential to whatever source is available. This information

11
10
.. -~----------" .. ..
=~=.-=~- ...........

when rcccived would go through ali steps of the head 01' the ultinate consumer, does not convey gation. The pattern into which the information of know~1 criminals iu\'olvi'lg auto supply
proces,i, through collation and an.alysis and ent~r to him the extent of knowledge and the conell!- is fitted may be an hypothesis ba8ed on fragmen- stores. During the COUl'se of a period of a
into the report being drafted. The process IS siems of the intelligence unit, then the system as tary data. The importance of information that week, he spots 1Iood Zekc and I Iood Walzak
orciinarUy thought to be completed when the a whole has failed. enters into strategic intelligence is that it is usee! in two dill'erent autu supply stores. In each
report is (lisseminated. by the heac! of the agency in planning the strat- case they ~e(,1ll to be in deep discussion with
Howner, from the point of view of managing egy of his agency or the allocation of his the store managcrs.
COLLECTION
the process the function of reevaluation must resources over a perioe! of time in the future.
Investigator Abk reporl.s his findings,
still be performed. This function involves con- The first function, collection, is the one that is '1. Evidcntial illtelligence.-As the naIlle indi- adding that he had llo(iced SOllle chang(· in
tinuous rt'dc\\' of the operation of the process normally explicitlyrecognizecl by all. Some may cates, the information in this category is factual the composition of customcrs ill on(' of" the
in order to detect any weak points before they lIot call it collection; it may be called investiga- and precise, It can be presented in conrt. two stores. (Indica Live intelligellce) Lt.
cause majo]' pl'<lblems. Part of this function is tory reporting. It may include the soliciting 'Whether and ",hen it will be used depends on Harry, C()1ll111atHI('t of the organized <Time
the deterlllination of ho;\' '\'cll the products of of police reports and reports from infnl'm- other elemcnts entering into the case building. intelligeuct' unit and the imlllediate supe<
the process art' sl'ning ('le cOllSumer-this is ants. It lllay include taking notes on public Decisions on case building are normally not in rior of Itl\'cstigator Ahle, calls a llIeeting of
knO\\'n as feedback and is the final act that ir;. documents I istelling to electronic surveillance the hands of the intelligenc(' unit but in those his analysts and lIlvestigato1's. The lieu-
fact closes lhe loop of the intelligence process. O'car , and I~lan)' oth~r activities which are parts
i"1 of the action elements of the agency or of the tenant decides after the llH'etillg to writ(' an
The discussion below will focus in turn on of collection. prosecutor. This kind of information may be alerting memo to his agency lll.'ad! But at
each of thl' seH'ral ftlllctiollS of the process. But filed to be llsed in developing a strategic report, the same time he advises his crew to keep at
In formation resul tino't> from collection activi-
thb should llot (Teate a misconceptioll that an their norma I tclsks, not to change their
ties can generally be categorized according to its or it lllay have tactical vallie and be currently
intelliol'llce unit in oj)eratioll should be rigid pattern of work ulltil Able's report is
h ~ end use. But it should be noted that items of useful in a case that is being pressed, ('vallia tecl.
and hiohlv
h , cOIllllartmentalized. The intellie:ence
II information lllay fit into more than one category,
process is dynamic, and in most units personnel heino'to used in several different ways. The four Planning the Collection Function The lieutenant do('s go ahead anel (,()ll-
illvoln.~d will perform more than one function. tarts his friends in the DA's ofIice, the U.S.
general categories are: , Collection to be efficient must be focused. It Attorney General's strike forc(', the repre-
It is often diflicult to separate neatly one function
1. Indicative 01' j)remonilory intellig;ence.- must be directed against a target. The several
from another. Finally, the commander of the sentative of the State police in the agency,
Information in this category is that whIch sug- methods of collection must be coordinated with and the inspector in chargc of burglary.
nnit, the manager of the process, will be making'
g-ests new developments or new operations by respect to the target, A coordinated approach The DA tells him of an increased number
daily decisions regarding one or more of the ele-
organ~zed cri.minals. It may. be f:'agmel~tary an~ to investigating a given criminal activity saves bf reports of car strippings. The inspector
ments of the process, These decisions couid call
often llnposslble to substantIate ll~meehately, 01 resources by avoiding duplication of efforts. It of burglary tells him of sevl'1'a1 hijackings
for a shift in collection efforts, a change in the
it may be hard facts. It can be ll1clllcled both commits the collection system with the best of automotive mpply items, items which
filing' system, a different foclls in analysis, a could be retailed easily through anto supply
in a report of i.ndications. of new ?evelopn:rents chances of success to the task. Collection plan-
modification of the reporting, Of perhaps only
or filed to aWaIt further mformatlO!1 th.a~ COI1- ning also takes into account data that are on stores.
changcs ill dissemination.
firms or disproves the trend or event It ongmally hand and insures that additional collection is The lieutenant reports his findings to the
J\Jany who arc involved in intelligence tend to
forget the components that make up the total su~ges:ed" , '. . . " . d~rectecl ~t gaps in the in,for~ati()n; good pl~n- agency head. On the basis of the findings to
~. 7 actu:al /1Ilel~lgel~ce.-.The dISt1l1?ll1s111I1,g mng aVOIds the waste 01: laYl11g on a new lll- date, the agency head decides to place the
process. As each person focuses on his own part
feature ~)f lllfo~'mat~on 111 .tlllS catego:'y IS th~t ~t vestigation to cover old ground. Collection auto supply stores on his target list. How-
of the process or as 8e\'('I'al parts or functions are
has ~n ll1~me(hacy l,n call1l1g for actIOn, ~1~1Ce planning should be lC'"iewed at different phases ever, it is to lemain low in priority. He has
performed by Olle person, the distinctions be-
the. 111t~lltgence ,l~l11t shOl~ld not be an actIOn during an inve~tigation. During the early, ex- promised the DA to press as hard as possible
tween the clements blur. An individmd may on gambling in the next few weeks, and has
unIt, tIllS type of 111formatlOn should be turned pI oratory phase the type of information desired
be aware that he is performing several particular
over to one of the othe1: ele!nent~ of the agency is less exact than that which will be required also agreed to help lhe Statr police ill their
fUllctiolls, but hc may not be able to discern
to be acted UPO!1. TactIcal mtelllgel:ce can l~ad during the latter stages when precise evidence is efforts against thrce suspected cigarette
where one compollent in the process ends and smugglers (the tax in this particular Stale is
to an a.nest, or It can lead to further 111format~on ne("ded. Regardless of certain traditional views,
another begins. It is Yital to understand each 5 cents higher than it is in surrounding
gathenn?' and a subsequent arrest. InformatIOn name.ly, that the course of an investigation can States). In addition, he has promised tt'
spccific fUllction in order to design the most
effective system for the total process. This is not
~)f a tactIcal nature can als? be filed to be used be ehrected intuitively by "gut feeling," the lend a few men to assist the Fc(leral strike
111 on~ of th~ o,ther ~ategones as note(~ be~ow .. resources available to anyone department are force as they develop a major cas(' against
to say that there need be a separate office, mllch
3. 5tra!egtc Intel.lzge~lce.-InformatlOi? 111 tlus too limited to permit such an approach. a syndicate leader whose home base is in a
Iess a scparalte person, to do each function. B II t cateo-ory IS that wluch IS collected over time and
n major city some hundred miles away. The
it is important that an intelligence unit be aware" put together by an analyst to indicate a new (or Example of Collection Planning
of all specific activities to be performed, and, agency head does agree howC'ver, that all pa-
newly discovered) pattern of activity by orga- To eluI)1 as' tl . trol personnel will be as l to report OH
therefore, confident that each is being performed . .. I . f' 1, Ize 1e Importance of collection
l11zed cnmmals. Some of t 1e m ormatIOn on plal11l1'110' (11'd tl f II . activities in and around nlto supply stores
as efIkielltly as possible. .
persons and fllnctlOns may alreaeIy Ilave b e~n develol)ing'
' b' C) SI er
't t' . 1e '0 OW1110'b
outline of a while they are on their normal patrols,
Regardless of how efliciently the system ap- useeI 111 . d'IcatlOns
. an 111 . . I
report or as tactlca 1 - n Sl lla lOn.
pears to be operating, if the final product, that On the basis of th!' :l~l'n('v head's decisiClIl
telligence. The information may be confirmed . Inves~igator Able, in line with a general
is, the report to the law enforcement agency or be in the form of a still unsubstantiated aile- ll1strllctlOn, keeps an eye out for any activity
the lieutenant increases to two the number
of investigators directly committ{'d to auto
12
13
i',",

still fresh. The analyst may then be able to add Of course, this system would be less effective
supply stores. He also directs ~ne of his unit, but also reports by the general force-that a new dimension or recommend another ap- in downtown areas where there would be diffi-
undercover agents to apply for a Job at one is, the patrolmf'n and the detectives, and extra- proach to the investigator. This is ~ot to sug- culty in associating parked cars with a specific
of the stores first visited by Able. But all clep~<rtmental sources. The latter can be the
gest that investigators. should ~e discouraw:!d building. Moreover, the increased use of rental
the rest of the Lieutenant's assets are com- district attorney's office, investigators for other from thinking analytIcally wlule conductmg cars by organized criminals makes more difficult
mitted to the higher priority items as elements such as a crime commission, and open the linkup between the car and the person using
their investigations. The more analytic the
determined by the agency head. sources including newspapers, public trial. rec- investigator's report, the more useful it will be. it. Nevertheless, the presence of rented cars in
(At this point, the situation would be out ords, congressional hearings, legislative he~rmg~, the vicinity of known or alleged organized crimi-
of hand if the lieutenant had jumped at the crime commission hearings, etc. The llltelh- Information from nonintelligence units nals' homes or places of business should be
flood of information developed by his crew b
o'ence unit should also seek •
to encourage

the
•.• 'With regard to reports from elsewhere within treated as a valuable piece of intelligence in10r-
r('rrarding the auto supply stores. His assets public to write letters pomtmg out aC~lvltIes its own agency, the intelligence unit should seek mation. For example, it can be usecl to trace
w(~uld h;~ve been misapplied since the head, that are illegal and that suggest corruptIOn of to work out specific forms to be llsed by the back to the rental agency that is being usecl most
as principal policymaker, knew of other public officials.
more pressing requirements. It was ap- patrolmen, patrol car officers, detectives, desk often, and the cooperation of that rental office
parent to the agency head that the auto Investigators sergeants, etc. Special effor~s should be made to can be requested. If a greater effort appears to
supply case could be handled as a slowly encourage the men in other units to report any be merited, this type of patrol surveillance
In O'cneral, the single most effective overt col-
developing situ~ti~n ~nd, thus, should re- activity which relates to organized crime. (See can be augmented by photographic and fixed
ceive a lower pnonty m terms of manpower lectio~ source will be the investigators assigned fio'ure 2' 0
l)aO'e 16, for a samlJle form with ques- surveillance.
t:!
applied.) to the intelligence r.nit. The word "investi- tions which might be asked. See also chapter V There are many different methods for devel-
gator" as used in the manual refers to any.office.r where further suggestions are outlined to help in oping the source of information represented
The lieutenant now receives word from who collects information in the field for llltelh-
his undercover agellt employed ~t the auto developing the flow of reports.) by the patrolmen in the districts. Thre.e are
gence purposes. Where he con:es from-:-bur- Any new information entered into the general suggested here.
su pply store that the store has, 111 fact, be-
come an outlet for stokn Gf)llds. He further rrlary squad, vice squad,' narcotICS, or dIrectly files of the agency's records section referring to 1. Palrolllnits whose area encomjJasses Imown
, d~termilles that th(~ rayoff is ~ade W a re.c- from uniformed ranks-is less important than organized crime activities or personnel should residences or businesses of major criminals are
ognized uIlderling- nf rilw ~yndIc~te.. Agam what he does for the intelligence unit. He is a be made available to the intelligence unit. To req llested to note any activity) including license
he reports to the ageI1l~ y h,:<lD: thIS tIm~ urg- fieldworker gathering data on orga?iz~d. cr!me systematize this, flag cards can be placed in the numbers of cars in the area) on a special 1-epo'rt
ing that the problem be asslgned a lugher figures and enterprises. In some JunsdlctIOns general files against the names of major figures fo1'1n (see figure 3, page 17, for a sample form).
priority. he may be called an intelligence offi.cer or an in organized crime. Another appToach is to have -This shouid be done each time the address is
(We will not follow this problem any intelligence agent. (Throughout tIus ma.l1l~al a standing order requiring the passage to the passed. Such a routine check has the advantage
further! However, it serves to point up the the term "investigator" is employed to dIst1l1- intelligence unit of any information which re- of keeping in continuous, though periodic, sur"
problem of determi~ing priori~ies: the im- guish the activities of the fieldworke:- fr~m those lates to known organized crime activities- veillance on desired locations without requiring
portance of informatIOn looks chfferer:t from of the analyst, 'who generally remalllS III head- gambling, narcotics, prostitution, usury, etc. that an investigator be detached on a special mis-
different levels of command. It pomts up quarters. Both are intelligence officers in the Routine patrol units can be particularly use- sion. It also has the -advantage of using the
the problen. of accepting req uirements from sense that they serve the intelligence unit.) ful in assisting in the dail y collection of data. patrol car or foot patrol which, because it is
outside the department when resources are It is the investigators' function to develop the These units should report activities noted at known in the area, will raise no suspicions of
limited. It suggests that s"me problems indications of criminal activity contained in the
may have an importanre derived from the the residences or places of business of known surveillance.
inputs collected from one or more general organized crime leaders. For example, car or 2. The intelligence unit encoumges rejJorting
political situation; this cannot be overlooked sources. Investigators check out reports ob-
if the context is to be stated honestly. But foot patrol personnel could be asked to record by singling out active) observant patrolmen.-
tained from informers, especially those whose any unusual event taking place at these loca- The intelligence unit should review activity
most of an, it shows bl untly how planning
must be applied to the limited assets that reliabili~y is untested or believed not to be l:igl~, tions, to record the license numbers of any cars reports of patrolmen in areas of special interest.
are available to any department or element In conjunction with the analyst (be h~ an mdi' that are parked at these addresses, and-to the Where these indicate that a patrolman is show-
engaged in law enforcement.) vidual with such a title, the sergeant m charge exte'1t that they are known-to report by name ing particular zeal in his job (measured in part
of the files or the officer in charge of the unit) the people who frequent the particular house or by his reports on persons stopped for question-
Collection Methods they increasingly sharpen the precision of tar· office. This is all example of a source of infor- ing), he can be contacted for special treatment.
geting as the investigation changes fr?m .a "look· mation which is relatively cheap to get, but can He can be praised and given additional informa-
Collection can be broken down into two gen-
ing into the situation" to th~ compll~tlOn o~ ~ be useful through time as it builds up lists of tion to sharpen his efforts. He can be asked to
eral areas: overt and covert. Overt and covert
study in depth or to a gathermg of e."lden.ce fOl known and unknown associates that can be cate- contact the intelligence unit directly on matters
refer to the means by which information" is
prosecution. (See chapter V for a dISCUSSIOn of gorized through license numbers. It can also of inteTest (though also being encouraged to
collected.
investigator training.) become a source of initial indications of inter- keep his district commander or supervisor
Overt Collection Every effort should be made to develop report
connections if license numbers are noted at one informed).
The intelligence unit should be prepared to forms that are simple and will encourage the
or more of these leaders' homes or places of 3. Shift-cha.nge formations used to 7'equest
use all sources available to obtain data on orga- investigator to put all his findings down as :a
business. (See figure 3, page 17, for a sample specific help.-A representative of the intelli-
nized crime. These include not only informa- matter of record. The aim should be to get I11S report form.) gence unit can meet with the patrolmen before
tion d~veloped by investigators assigned to the observations on paper (or tape) while they are
15
14
'-,

FIGURE 2.-Samplc intelligence report /orm for use by nonin!elligellce units 1 FIGURE S.-Sample riaily patrol re/)ol't /0/'1/1 01/ SlIl1'ciliance of localiolls of illterest to illtelligence unit 1

Date: _ _ _ __
INFORMATION REPORT I'OR INTELLIGENCE UNIT

Time: _ _ _ __

Reporting officer and unit: _ _ _ _ __


Location: _ _ _ _ _ _ _ _ _ _ _ _ __ ,--1 Location
surveilled * Timc
DAILY PATROL REPORT TO INTELLIGE'GE

Activity
noted
Names of known
observed persons
UNI;·~ - - - - - . --~-·l
Repolting officcr's name, badgc number, and unit: _____ ~ _________ .. ____ __ ____

'----------------
_ ___________ _

License
No:
Type event:~ _______ _

Names of persons involved: ______ ~ ________,___________.

----------
.
Any idcl1lificatIon malcl'la d (L'lcenses, telephone numbers, serial numbcrs, idcnti-
. 1 note: ~ -~~.-~- - . ---------- "--~- ----~.------~----
,
_ _ ~_·T~. ____ ~ _____ ~_. ____ ."~ _____ ~. ____ ~..........,_ .. ,~ __
fication numbers, etc.) __________________ ~_ _ _ _ _ _ _ _ __

1 This form,~lOt Sho\~l-~;;:~~Ial- size, should come in a pad and bc printed on colored paper. The d~stinc.tivc
co 101' -.----------~-------~--~~ "--". -----"-----~.-------- .. ~.---~~----~------~---~---~----->-~.--.-.-----
used for all lion intelligence unit rcpOi ting to the intelligence unit emphasizes the special, and at the same tunc Important
nature of this function. -------------------'-------------------------------------'----'~---------

they are dispatched on their shift. He can tell Finally, the intelligence unit sh~uld pre~s .for .. Location surveilled indicated by identifying number given on intelligence request for patrol action.
them about his problems and items of special the ailocation of time in the vanous trammg
interest, that is, who or what is most important courses, including rookie classes, to describe 1 This form, not shown at actual size, should comc in a pad and be printed on colorcd paper. The distinctive color,
in terms of information desired. He can also organized crime and the way intelligence is put natureused for all nOllintelligence unit reporting- lo the intelligence unit emphasizes the special, aild at the same time important
of this function.
meet with the shift coming off duty and debrief to work against it. This is essential to make snre
those with specific information. (See below for that the force as a whole knows the na,ture of
a discussion of debriefing.) the problem and appreciates that each memb~r Debriefing as an aid to information gathering
have a standardized debrief form. (See appendix
Regardless of the approach adopted, two fea- can help in the fight. (Training is discussed m
The intelligence unit's collection plan should C for a sample debriefing form and suggestions
tures should be present. First, it should include more detail in chapter V.)
include the concept of debriefing--followu'p as to types of questions to ask.)
the use of a special report form such as shown in
questioning of report sources from inside and,
figure 2, above. This form should only be Secu1'illg information from other jun:sdictions hopefully, outside the law enforcement agency. Information from SOU1"ces other than lawen.
used where the officer will not fill out another
This is especially importal1l for reports concern- forcement agencies
form such as an arrest form. Second, the intelli- Tn many, if not most cases, other jurisdictions
ing all crctivities by known members of the syn- There are also many open sources from which
O'ence report should be rout.:!d directly to the must be contacted for information. For exam-
intelligence unit (lateral di~tribution within a
dicate, whether or not the person was engaged valuable information can be obtained, informa-
ple, where an organized crime ring is ol:er~ti~lg
in an act directly related to organized crime. tion that is usually of a backgTolmd, or of a gen-
precinct or district or up through the patrol both within a city and in its separate Junsdlc-
For example, imagine a syndicate leader arrested erally informative nature. The most general
channels can be done where required-but this tional suburbs it will be essential to ask for
should not prevent the initial direct distribution for speeding. The patrol officer sends in his source is the newspaper. Here articles occasion.
assistance. 'Vhere there is to be a major ex·
arrest report. It might say nothing of the cir- ally appear concerning activities of the various
of the report to the intelligence unit). This sec- chano-e of information between two jurisdictions,
o . cumstances-who was in the car, where the per- members of the underworld, as well as stories of
ond feature is important since it will avoid it is often useful to appoint officers to act 111 a
clogging the main command communic.:1_tion son was going, why he was in a hurry, etc. These actions by members of organized crime and by
liaison capacity. These officers can expedite the
could be important indicators to an experienced members of law enforcement agencies in other
channels with intelligence information and re::., transmission of data between the units, and they
investigator. The intelligence unit can often parts of the country. The newspaper should be
ports. It will enr:ourage the intelligence unit should be responsible for keeping' both d~part­
commander to make contacts with the patrolman obtain answers to this kind of question only by considered a potentially fruitful source because
ments alvare of the progTess of the partlcular
sending a man to debrief the arresting officer, reporters are often as much intelligence opera-
for followup, to encourage him to do more and, investigation. This technique becon-:es an id~al
where indicated, to elicit more information who may have useful information but does not tives as are official investigators. The news-
way for developing personal connectlOns whlch
about the event reported. But, most important, know he has it until he is specifically queried. paperman is seeking to obtain information about
can serve as a basis for trust between the depart-
it insures a rapid, timely, direct flow of bits of ments involved. (See chapter III for a more To assist in the debrief and to make sure cer- a particular event, and he is every bit as inter-
information to the intelligence unit. complete discussion of this pToblem.) tain questions are always asked, it is useful to ested as the investigator. Newspaper stories

16 17

J
that can be considel"ed as "honey" attracting at the various police departments or prosecutors' f1'aud, th~ connectors may be even more diffi-
from other areas can also be a useful device to
criminals. These criminals have the funds avail- offices, or who write letters, signed or anony- cult to discover. Fronts will be used; individuals
jump the information flow over jurisdictional
able to buy into legitimate deals, but they almost mous. They complain about questionable situa- acting as though for theJ;Ilselves may in fact be
boundaries. The possibility of controlled ex-
always make their transactions through fronts. tions or activities or they cite illegal acts by a under the control of a criminal. There can be
change or information with more trusted
Thus, efforts should be made to discover the person or persons. The complainant is often several cutouts, or persons, between the crook
newspaper reporters should be considered.
names of these financial fronts. Newspaper one whose legitimate occupation places him in a and his business front.
The more usual method for obtaining infor-
stories on city requests for bids and those com- position to see, hear, and possibly record facts of Covert collection is expensive in terms of man-
mation from newspapers (and other periodicals)
panies replying should also be explored for any va1ue concerning a crime. He will reveal this power. This is the case whether physical sur-
is to clip articles and to file them, making cross-
suggestion of organized crime participation, information as a matter or civic duty. How- veillance or electronic methods are used. In
references where appropriate. Clipping can be
directly or through one of their "legitimate" ever, unless the particular complainant is known, both instances investigators must focus on the
done either by a member of the intelligence unit
or by a clipping service. The cost of the two fronts. the information must be checked out by the particular operation at the expense at investi-
Other excellent sources of intelligence data intelligence unit's own personnel before its gating other potential sources of information or
should be compared relative to the output in a
are public records and documents-·Eor example, reliability is assessed. pursuing several leads. Special precautions must
particular unit, and a decision reached as to the
best method. However l when relative cost trial records and grand jury proceedings (to the The complainant is different from the in- be taken to insure that the covert operation re-
extent they can be made available). Records of former. The latter is a person whose -mode or mains covert. This als0 requires til-he and effort.
favors the clipping service (sti11 a high-cost item),
this type provide indicators as to activities and living, habits, and personal relations place him In most cases, the operation will be run on a
care must be taken in developing the contract
to be sure the correct materials are clipperl associations of organized crime characters other i.n contact with criminals. His identity must be three-shift, around-the:c1ock basis. Thus, any
and that important items of interest are not than those 'who were directly involved in the kept secret for his own protection and in order decision to resort to covert collection should
overlooked. particuiar trial at hand. The intelligence unit to maintain him as a source. The intelligence require a specific decision by the unit com-
Instead of clipping, the staff of an intelligence should be aware of-and revie'w the output of-- unit should be alert to the possibility of recruit- mander. The commander must weigh the value
unit can be called upon to abstract articles in local, State, and national crime commission hear- ing' as informers those complainants whose in- of this use of the unit's manpower not only
periodicals. In this manner important points ings, and investigative hearings by State and formation is generally accur~te and useful. The against the importance of expected information
can be highlighted, and file bulk reduced. Effec- Federal legislators. Again, such hearings tend use of informers is discussed in the next section. but also against the potential merit of other
tive, concise abstracting can be done by experi- to provide indications intelligence rather than tasks.
enced personnel almost as rapidly as clipping, evidential, but important leads can be developed Covert Collection p hysical sm'Veilla~lce
and the end product in many instances is easier from the relationships that may be presented.
to use. A file of newspapers going back over 12 The inte11igence unit should also use all avail- Covert collection is the acqulSltlon of infor- Covert physical surveillance is the observation
months could be maintained in the event the able sources of financial information-local mation from a subject who is unaware he is being of the movements of suspected criminals without
full text of the subject article is ever needed (or stores, bonding houses, banks, insurance compa- observed or overheard, although he may suspect their knowledge. The purpose cf the activity is
the public library 01' newspaper office files can nies, etc. The specific amount of information that he is a target If covert collection is used to discover associates, places visited,' and activi-

be relied upon). that can be obtained formally will depend on effectively, his suspicions will not be confirmed ties engaged in by the subject (insofar as it is
Whether in clipping or abstracting, attention State laws and local ordinances. However, in- until it is too late; he will continue to perfor.m possible). Surveillance may include foot, auto,
should of course be given to any items about formal approaches can often produce useful leads his illegal activity and to speak and act with a and stationary positions by intelligence investi-
which are especially valuable in the early stagn ~egree of confidence. Even if he suspects that gators. Because organized criminals are sensi-
known or suspected criminals and their associ-
ates-their marriages, deaths, and the hio'her of an investig'ation. Another excellent :;omce he is .being obl;erved or overheard and attempts tive to the probability of being watched,
. 0
secul'lty measures as a matter of prudence, the most surveillance operations require several
ed tlcatlonal focus of the children of organized of indicative as well as evidential intelligence is'
criminals. But attention should also be given telephone toll charges. probabilities are high that as long as he does not investigators in order to conceal their coverage.
to stories suggesting new opportunities for orga- The intelligence unit should also make con- know for a fact that he is under observation he Physical surveillance by itself has certain limi-
will make mistakes. ' tations. Although it can indicate a pattern of
nized crime or changes in operation or manage- tact with State and lor local agencies, such as
ment of businesses indicative that criminal those responsible for overseeing the operations Covert collection methods are essential if evi- movement and a pattern of associates, it may fail
involvement has already started. The potential of banks, hospitals, insurance, mortgage and de.nce that can be used in court against organized to uncover the purpose of the movements and
cnme leaders is to be obtained. These leaders or the meetings with associates; what is being
new fields are as varied as the economy and the
demands of a high-consuming and pleasure-lov-
deeds, corporations, etc. A list of names, includ-
ing criminals, their associates, lawyers, anel front n: ake every effort to avoid being directly asso" discussed with associates is usually the vital
ing people. They include real estate, banking, organiza'ion men can be given to these govern- cIated :vith the criminal acts committed by their matter.
manufacturing, insurance, trucking, trash haul- mental staffs (or one of their members who is ~mder~mg.s, and normal police surveillance and Accordingly, other methods needed to supple-
ing, retail stores, restaurants, etc. The inte1H: willing to help and is known to be honest) with lllvestlgatlOns are not enough to unearth the ment physical surveillance may have to be
genre newspaper reader should be looking not a request that notice be given whenever an connections bet,veen the leaders and the crimes. brought into play. Such methods could include
only for names of known criminals, but also for ~vidence is needed to prove that the leader electtonic surveillance or the use of informer or
activity involves any name on the list.
their lawyers, the banks they use, and companies issued orden for or l'eceived money from the act. undercover agents. These are discussed below.
in which they or their associates have an interest. Complainants In sophisticated penetrations of legitimate busi- Where possible, and where it is deemed essen-
He should also be looking for major deals in Mention should also be made of complainants. ness, iuvolving such illegal acts as unfair busi- tial, a photogTaphic record should be made of
which a great deal of money is involved, deals These are persons who either appear in person ness practices, illegal restraint of trade, and important meetings (or at least of the persons

18 19
'i
'i

going into the meeting place), of cars used, of Once some form of electronic surveillance i! The payment of money to informers raises informer Ipay help him to be promoted within
other places visited. decided upon, the actual operation should be serious problems for the department. A fund the ranks of the organization to which he belongs
turned over to experts. The eavesdrop opera, for this purpose must be approved by the finan- and thus improve the quality of the information
Electronic sU1fJeillance tion in particular calls for skillful application, cial unit of the agency. Then there must be an which he contributes. It should be noted, how-
The principal means of covert collection Proper equipment should be used and the tap agTeement reached on safeguards, so that the use ever, that there are problems with this approach;
against organized crime operations is electronic or eavesdrop placed in the most effective posi, made of the funds can be checked. Safeguards one of the greatest is that the informer in his new
surveillance-wiretap, eavesdrop, or body re- tion, a position that can be occnpied withOlIi could involve receipts or the presence of a wit- position may be called upon to commit a major
corder. rv1any believe that effective action disclosing its existence to the suspect. Consid, ness when the paying officer passes the money to crime, a crime for which the enforcement unit
against leaders of organized crime can be taken eration must be given to potential noise source! the informer. Sometimes, however, an informer could not avoid arresting him.
only if electronic surveillance is permitted. that could blanket any conversation. The s(} may be so suspicious that he will work with only
one person he knows in the agency and will give [jl1dercover agents
Physical surveillance can determine who is meet- phistication of the suspects must also be con·
ing in what building. But knowledge of what is sidered; what is the probability that they will no receipts. The decision on the accompanying . Another covert source is the undercover agent.
done or said at the meeting can come only from know how to examine a room effectively in risks versus the value of information 'will have He is a law enforcement officer operatincr clan-
• 0
an eavesdrop (or from a person present). Be- searching for a possible listening device? to be made on a case-by-case basis. Information destlvely on the fringes of an organized criminal
cause both planning arrangements for meetings on crime leaders can be expensive and usually group. He ordinarily takes on the coloration
and fund pickups and orders to underlings must Informers becomes more so the higher the level of target. of a hanger-on in the same bars anel restaurants
be communicated, the telephone is essential to Another major source of covert inte11igence It appears that despite the problems, the effort as are frequented by the gang', or he works in
organized crime. Wiretaps can make this flow information is the informer. The importanct to get a substantial fund for informers is their enterprises. He might also become a minor
of communication available tc' the law enforce- of this source is indicated by a saying commor worthwhile. operator, such as a runner. However, since the
ment agencies. (The trends j, law relating to among law enforcement officers: "An officer i! There are two approaches to management of gang normally requires that each of its members
the use of electronic surveiJ1ance are discussed just as good as his informers." The informer i: informers. The traditional approach is to main- has committed a major crime-armed robbery
in appendix A.) a person who is not a member of the department tain no central record, and, in fact, no recorded or murder-it is almost impossible to conceive
The racketeers have tried many dodges-use or staff but who is part of the scene where orga· identification of the informer other than his of inserting an undercover agent into the hier-
of third person and public telephones, attempts nized criminals operate, and who is willing, for association with the detective or investigator to archy of a major criminal gTOUp. Depending
to maintain strict security in conversations, sub- whatever the reason, to provide information whom he is willing' to confide his information. on the calculation of the risks involved, the un-
stitution of code names for persons and places, The information furnished by the informer i< This preservation of anonymity takes into ac- dercover agent, as well as the informer, can be
etc.-but none of these has been total1y effective. normal1y considered raw material which must count the nervousness of the informer and his made more effective by wiring him for sound so
By the use of physical surveillance, or through be checked out. (A possible exception exis~ concern•
that word of his actions mia'ht
0
get back that he picks up the various conversations that
informers or undercover agents, phones used by where an informer has worked in positionJor a to Ius friends. he enters into or that go on around him.
the leaders can be iden tified, and sufficient data number of years and has come to be trusted.) A more systematic approach is followed in :Money is also a problem for the undercover
then developed for a show-c'ause order to obtain In most cases the informer will want direct some intelligence units-the central registration ageryt. He must have funds available for enter-
court approval to tap the phone in question. compensation for the risks he is taking, but occa, of the names of informers. But even though taining, for purchase of stolen goods, for buying
Even in supposedly guarded conversations, slips sionally an informer can be developed on a basi! sllch a list is handled with the utmost security, drugs that are offered, for gambling, etc., and
are likely. Perhaps the most important contri- other than payment of money. The informel the fact that it exists concerns informers, and in these funds must be so allocated and controlled
bution of electronic survei1lance is the evidence who does not work for money may be providin1 some cases informers have refused to operate that the undercover man has them available
it provides of a direct relationship between a information in order to gain revenge on somf under these circumstances. \Vhere the list-of- when he goes into operation. If he is to escape
crime leader and an il1egal act-evidence that member of his organization. Or he may have ~1ames syst~m is in effect, the only reference to suspicion, he cannot find someone to sell him
often can be obtained in no other way. been caught in a compromising situation ane 1l1fonners 111 reports must be by number, and stolen goods, and then say he has to go back to
'Vhen electronic surveillance is permitted, may agree to give information, if a crime is in· the relationship between number and name the bank and get the funds. The requirement
plans should be made to exploit leads and indi- volved, in return for a lesser sentence (in tht must be known only to the unit commander. for funds is a significant problem, especially for
cations beyond the specific case under investiga- case of police this would be a promise of inter, Th~ value of this second approach is that it smaller police units and prosecutors' offices.
tion (due account being taken of the limits set cession with the prosecutor). Or he may simph obVIates the possibility of an informer selling' his
by law). This will raise personnel and workload enjoy his police contact-because he trusts hin: wares to more than one, person in one agency or Evaluation of Intelligence Inputs
problems, especially where the investigators who and feels that he is a good man. In some eX to several agencies. It also assists in the evalua- Evaluation can be divided into two parts.
maintain the wiretap must translate the informa- treme cases he may want a promise of assistanci tion of the report since more than one person The first is a judgment of the validity of a par-
tion onto a typed report. But the amount"Of in moving to another area should his cover bl (other than the investigator running the in- ticular piece of information whether it be writ-
information obtained can be worth the effort. blown by inadvertent actions or by his havilll former) knows who the informer is and can ten or verbal; that is, the extent to which the
One hel pful approach might be to acquire spe- to surface to give testimony. In the final anal} form an independent judgment through time as information is factual. The second part of the
cialists in translating tapes. Perhaps one or sis, regardless of the kind and amount of reward to the validity of his reports. evaluation is an assessment of the truthfulness
more typists should be trained to understand the maintenance of a good informer depend . ?onsideration should be given to the possi- and reliability of the source. A source of high
voices and the use of tapes, and then to basically on his belief that his contact is beini blltty of upgrading informers. In some cases, reliability may indicate that the report he is
transcribe the materiaL honest with him in all matters. the judicious use of feedback information to an transmitting is rumor 01' secondhand and that its

20 21
FIGURE 4.-Sample evalualioll system-reliability of source at1d content of inforlllation
validity should therefore not be accepted with and of equal importance, there should be some
1. General source of information can be indicated by a color tab, for example:
full confidence. The person in charge of the indicator to tell the reader how reliable the
intelligence unit must decide how best to relate content of the report was assessed. The system Intelligence investigator .............................................. . Retl.
Intelligence unit, informer ........................................... . Reel cross.hatching.
this report to other reports he is receiving from should allow for separate evaluation by all Other intelligence units .............................................. . Reel dots.
a number of directions, some from men of his knowledgeable persons involved such as investi· Other elements, same agpncy .....•.................................... Green.
own squad, some from other members of the gators, other informers, undercover agents, the Other clements, other agency ......................................... . Green dots.
agency, and some from people outside of the analyst in the intelligence unit, and finally the Or a tab can display a number, figure, or letter to indicate gencral source of information. Or tht' two ("lll be (,<llllhincd with
agency, including ordinary citizens sending unit commander himself. This is not to say the the color to show general type of agency and with number, figurc, or lettcr to show clement within an agellc).
in complaints or persons wishing to become system should force evaluation on everyone listed For example:
informers. above. Only those with definite knowledge of Other element, same agency-burglary squad ........ " .... "" .. .. Green tab with large II in
Evaluation as a function consists of two major the source or substance of a report should can· the center.
actIvItIes. Initially, the commander of the in- tribute to the evaluation. On the other hand, 2. Specific evaluation to source and content of bit of information can be provided by a combination of letter and lIumbl'r
telligence unit evaluates reports containing leads the more contributions the better. The view! indicators, for example:
and indications to determine which require a of officers at different levels in the agency or in· Source Content of information
[ollowup by his own investigators (or to request formation chain who may have had different I. Highly reliable. A. Factual.
bel p from others where necessary), and which experiences or relationships to the person or sub· 2. Usually reliable. II. Vicws of reporter.
3. Not often reliable.
can be filed until something further develops. ject of the information report will enrich the 4. Unknown.
C. Hercsay/unsubstantiatcd allegation.
D. Unknown.
Tbis eval uation or review can be related to the report and facilitate its overall evaluation. (See
further development of evidellce in a current figure 4, page 23, for a sample of a classification Thus, a report from a ~ource that is considered usually reliable and containing some unsupported statements would he dassi.
lied on the rcport as bel11g 2-C.
case, as well as to indications of new activity by system.)
organized criminal figures or new associates of It is also important to apply the evaluation 3. The system could be expanded to indicatc a further classification for the source, for example:
known criminals. Evaluation related to an ac- system when a report for the agency head or for 1. Highly reliable
tion decision is common; it is performed daily the prosecutor is compiled. It is essential that Ia. Highly reliable informer
1b. Highly reliablc intelligence investigator
in intelligence units without tbe function tl'l'; consumer have some concept of whether the Ie. Highly reliable officer, other element of agency
necessarily being identified as evaluation. particular item that is being brought to his atten·
The second activity of the evaluation function tion is rumor or fact or something in between Thus, a report from an informer that was considered highly reliable and contained factual information would he classified as
follows: la-A.
is the explicit gTading of the worth of the source possibly true. He should know if it is a poten
and of the substance of his information. It is tial piece of evidence. He should also know the
performed too infrequently in general practice source from which it came. In order to pro ted or incorrect information, the orderly arrange- activities. It is the overall organization of the
and, in fact, is often not regarded as a necessary sonrces, it would be most appropriate to have ment of collected materials so that relationships files that eventually makes possible effective
procedure. Each piece of information must be some sort of a lettering system to indicate between apparently disconnected data elements analysis.
evaluated anel it mllst be evaluated when filed whether the material came from a policeman on may be established, and the creation of a system-
or it will often be too late-the persons involved patrol, an informer, an undercover man, as l for rapid retrieval of stored (filed) information.
or the circumstances may be forgotten. Proper result of electronic surveillance, or from a lette: Cross-Indexing
eval uation requires some means of transmitting written in by a citizen. To protect identity, til( Filing System It is important for indications intelligence to
the assessment of the worth of a piece of infor- person giving the report, if asked, could tell the file bits of information by function as weJl as
mation to all subsequent readers. When a file agency head the specific source of the material At the heart of collation is the system for filing by a person's name. As information begins to
is pulled, whether a day or a year later, it is un- the information gathered. It is essential that accumulate on the activity of organized crimi-
likely that the person so doing will know about the information being reported is filed in such nals in a field where they have not been active
all the reports in the file, or will have immedi- Collation ~ mal:ner that it can be easily retrieved. This before, all such information can then readily be
ately available the men who might know. In a sense, the intelligence produced by th! IS baSIC. But just as important, the information brought out for analysis. But unless this infor-
many collection efforts can be considered as III .must be filed so that it can be related to other
'~,~..
Therefore, it is necessary that an intelligence mation is filed or cross-referenced as it comes in,
unit establish some means of indicating more than information. Intelligence is not ~ ·information of a similar nature. In other words it may be lost in the totality of the files because
much a kind of information or data, but rathe ,it is n~t su!fi~ient to keep filing reports on Jo~
~
evaluation on each item of information. the human memory approach is unreliable at
;i The evaluation system can be simple. Color
of paper can be used to indicate general source~
how it is analyzed and used. In large measllnJ:Iood m hIS Jacket file. All this provides is a
the word "intelligence" is more applicable tl smgle source of references; that is, Joe Hood.
best and may, because of transfers, retirements,
or deaths, be totally ineffectual.
inside the agency, patrol, detective bureau, pre- the finished product of the total process. Th: ;rhe. reports received on him may convey infor- Basic to effective collation is a coding system
cinct, or vice squad; or outside, incl uding other subject of this section, collation, is the first stei ,lllatlOn about places he frequents, such as bars which permits cross-filing and cross-referencing
law enforcement agencies, complainants, in- in the process of translating raw informatior ind ~estaurants. There may be references to his of several items of information on one report,
formers, etc. Or a letter or numerical code can into intelligence. Collation means more thar a~soc~ates and to other activities. The informa- and at the same time assures effective retrieval
be used. But an evaluation of the source, re- the simple storage of materials in files. It ir. ~lOn l.n this particular report must therefore be of the information when it is needed. It is essen-
gardless of who he is, should be given. Then, eludes the sifting out of useless or nonrelevan .cross-mdexed to files 0 f b usmesses . an d 1'11 ega I tial that the coding of the material for distribu-

22 23
tion within the filing system be performed by 1ems revol ving around cost and the restructuring and develop the evidence for final case en~ompass both legal and illegal actiVIty.
one person or by a disciplined group that 1S of files and inserting the information into the building. (2) One main objective seems to be to de-
Lieutenant Harry recognizes that the ac- velop control of legitimate retail outlets
respollsible for thc care and maintenance of tl:e machine. If the law enforcement agency doe!
tivity he has been.investigati1~g may be l11?re throngh which to sell hijacked goods. (g)
fiks. It is also important that a systematIc not have a computer, the risks of using a non. than fencin o'. HIS problem 1S to deternune Another major tbeme seems to be the use of
approach is used in th~ classificat.ion ?f informa- dedicated computer on a share-time basi~ must whether th~ fencing operation was only the PDQ Corporation to gain a relationship
tion under whatever mdex codmg IS adopted. be weighed. The security problem exists and that, or was related to a larger activity in- with businessmen through the corporation's
There must be uniformity in this matler so that must be lived with if the val ue of the data cIudino' hijacking. He feels it is also possi- ownership of mortg'ag'cs. (4) rinally the
when queried, the files will turn out the i.nfor- processing approach is considerec~ essenti~L ble th~t the organized crime element in his syndicate seems to be developing control of
mation desired. This can only be aclueved (The use of automatic data process1l1g and Itt city is seeking to pelletrate legitimate clerk and trncker locals to coerce members
through precist, and systematic c1assificati?l~ as attendant problems are discussed iq more detail business and to use it for illegal purposes. to conceal the hoods' activities and to coerce
reflected in the index to the files. In add1tlOn, in appendix E.) In the meantime, Analyst Sam has been 'the target stores to use the XYZ Truck Line
the Ii les lllust be structured so that material reviewing the flow of reporting' focused on and to buy goods from designated suppliers.
from confidential sourccs, or that is in itself con- Analysis the supply stores and Hooel Zeke and Hood (The latter seems aimed at situations where
'Valzak. In particular, he has noticed from the hoods cannot gain control of the stores
fidential, (an be restricted only to those with a
If there is a heart to the intelligence system surveillance reports on the auto supply but still require an outlet.)
need to know. (See chaptcr III for further stores: (1) the names of three trucking finns
it is the analysis function. It is this function or Analyst Sam reports his fil'ldings to Lieu-
discussion of the handling of confidential or and the license numbers of their trucks; (2)
activity that converts information in.to. focu~ec tenant Harry. Harry, convinced of its va-
restricted information.) pictures of the drivers; (3) name of the bank
finished intellig'ence. It is the analys1s functlOr liclity, lays on a plan to begin investigations
that assembles the bits and pieces of informatior where the auto supply store funds are de- to check out the implications of Sam's
Mechanical Filing Aids posited. From a review of the ownership of
that have been collected by many different col hypothesis.
the stores, he has obtained a list of several
Because of the increasingly complex opera-
tions of organized crime, any action a~ainst it
leetion systems or from various sources and pUt
them too'ether in such a manner as to show pat
names of lawyers and a mortgage company.
(This is as far as this example will be
taken. It is intended to point out the im- [
And [Tom a clerk in the stores he has learned
will require improved systems of col!atll1g and
retrievin o' intelIiu'ellce data. The fillllg system
tern ancl meaning'. Without the analysis fu~1C the name of their union and some of its
portant role of the analyst and the require-
ment that he has available files based on
I
t
tion, a piece of information in th~ files remal.n: officers.
should be n n
developed so that it is stlSCepti'bl e other than biographic classifications so that
just that. Such pi~ces are ~ssent1~1 to the l~ On the basis of these leads he has queried they can be rapidly queried. It shows in
eventually to lllechanization. Microfilm filing his biognphic and functional files to see
vestio'ator or detectlVe who 1S 100k1l1g for addl pal:ticular the vital role of the analyst in the
and retrieval of reports, the use of pllnchcarcls
tional'" information or leads as he pursues, what relationship the leads might have to premonitory or indicati,ie intelligence. By
to correlate material by function, or the use of other activities. From his files he discov-
specific investigation. But una1:alyzed informa putting together the bits and pieces of in-
automatic data processing' are some of the ap- ered the following: (1) the XYZ Trucking
tion tells little about a develop1l1g pattern or, formation into a pattern, he was able to
proaches that might he adopted. To prepare firm's president was the brother of "Patsy,"
potential area of activity of the subject :1f.l:le: suggest new areas of organized crime activi-
for the l1se of mechanical means it is also neces- captain in the local syndicate. (2) The ties. It also shows his responsibility in
analysis. (See figure 6, page 33, for a deplctlOf
sary to have a forma t of reporting that is con- clerk's union has been reported by an in- pointing out further information that l:e
of the analytive process.) former to be working closely with the truck-
ducive to the particular system desired. For needs to develop a particular hypothes1s.
example, Oil some forms it is very ~imple to ~dcl.a An Example of Analysis er's local, the leader of which was a brother Finally, it highlights the role of intelligence
n ulllerical code to each in forma tion box. nus of Joseph, reported to be the head of the analysis as an input to strategic planning.)
To emphasize the role of analysis in the ill syndicate. (3) The hijacking file indicated
information can tl'.cn easily be placed 111 a
tellio'ence I)l"ocess let us return to our story of. th: several recent hauls not only of auto supplies The Role of the Hypothesis
computer and retrieved as needed. n
apparent association of a group of orga11lzei but women's and men's clothing, TV's, and
In many jurisdictions the proliferation of 01'- electrical goods. (4) In his file on unions, The hypothesis is an important tool of the
criminals connected with an auto supply stOfe
(ralliz('d criminal activities has nlll ahead of the there are reports that the trucker's local had anal yst. He uses it to hel p establish the mean-
~aJlacily of the local filing systems. Filing sys- Lieutenant Harry·now believes there I been negotiating with other clerks and ing (or alternative meanings) of a collection of
teIlls based largely on names connected with enolJO'h information for a case to be dere truckers' locals to develop a closer "work- pieces of information abollt a particular subject
o'1ll11bling'
n , can do little to assist in ferreting out oped"'against the auto supply stor~s. on th ing" relation. (5) In the mortgage company (a gambling operation, hijacking/fencing gang,
oro'anizecl criminals as they take over an eco- grounds that they have been reCelV1l1g an file, he found the names of several knO\ll11 or whatever criminal activity is suspected, but
b "
nomic area such as cl ean mg', scavengermg, sellino' stolen croods. He has reached tlt hoods that had been reported using the where the full scope of the operation is not fully
wholesale meat, ('tc. Files in which the bulk conc1~sion on tile basis of reports from mal: PDQ Corporation, and that the PDQ Cor-
understood. The analyst studies the availab}e
of the in formation is kept in original hand- different sources, including his own inv:st poration was one of a complex of holding
companies, the ultimate ownership of which pieces of information and attempts to assemble
writtell reports may be of marginal effectiveness crators patrol reports, reports by detectllf them into a logical pattern. In the process, he
whell the correlation of clata from many different in bU~'glary, informers, two of h.is lInd~ was not clear. (6) In the insurance files
develops a tentative statement which he believes
cover men, the newspaper, and IllS C~!1t:~ there were no connections between the su b-
reports is essential. jeet insurance company and other activities may describe the operation under review. This
in the Federal strike force. The dlsttl'
These problems indicate that in some areas in which there were known hoods. is his hypothesis. In many cases, if the informa-
attorney is apprised of this informat~on ~Il
"
serio liS consideration will have to be given to aOTees with lieutenant Harry. At tIllS pOIn Analyst Sam has by then developed an tion is limited and poorly related, it may fit
the use of mechanical aids, such as automatic I-Iarry recommends to his chief ~hat anot~ll ~lypo~he?is. (1) It appears that the syndicate several logical patterns. Thus, the analyst may
clata processing. This raises a host of new prob- unit of the agency take over the mformattG 1S bmldmg an interconnecting structure to develop several alternative hypotheses.

24 25
!

,'j
~
,
In developing his logical pattern, the analyst knowledge of how to conduct research. He mu: I An example will show how collation consists Jones). He also strengthened the credibility
must often "construct" activitic:; that he either develop a capability not only for locating SOUtClof a series of judgments, that collation is not as of the unit's new informer by inclkating
estimates or assu1Ut"S should have happened if of data connected ,."ith crime but also withi:niechanical as it might at first seem. officially that some of his information had
the overall logical pattern is to reflect what ac- the society in general. Research is critical, e been corroborated. Any unit ollieer using
tually happened. These constructed activities pecially in the indicative, premonitory stal Let us sl1ppose that Analyst Sam receives the informant's material in the future would
may relate to persons believed to be involved. where intelligence is probing for new pattenl on his de;;k ooe morning' a report from the now do so with greater confidence.
narcotics squad giving the details of a raid
They lTlay describe how an operation is carried new areas where organized crime may be apr
the previous night on a pool hall that had
out-an operation about which relatively little ating. It is through research the analyst ca been under surveillance for some weeks. The Analyst-Investigator Relationship
is known specifically. The constructed pieces of often best find areas and patterns of operatiot Same is assigned to detecting new develop- There should be a close working relationship
informntion an' inserted into the hypothesis to which may seem lucrative to criminals who at ments in organized crime in the area of the in the intelligence unit between the analyst and
help reach tClltative conclusions. trying to make large amounts of money in .. city where the pool hall is located. Two
the in\·estigator. '\'hil(' the analyst Inay be able
'1'he analyst mnst now test his hypothesis. 1£ hurry. well-known pushers were arrested ~,nd sev-
to develop suggested aWIlues of investigation
tbere is a scarcity of information, the testing The researcher (or the analyst if they are corr eral other people at the hall detained, ques-
tioned, and re leased. The names of these and research, it often requires the serYic('s of a
must await further collection efforts. If the hy- bined) also has an impnrtant role to play in tem
people were given in the report, along w'ith trained investigator to .obtain inforru<ltioll tinder
pothesis is fairly well documentf'd, then the unit of the legal aspect of the search for indication
brief summaries of how they had responded conditions short of a full-fledged lIn (·stigatioll.
('ollllllander will have to send his staff into the The Tesearcher-analyst should be on the outlor
to questioning. Sam, noting that the report It is important in the premonitory or indicative
Held to determine the validity of the logical for acts which appear to be committed by org
had not been routed by information con- period to be able to de\"elop information with-
pattet'll. In either case, the hypothesis becomes nizations associated with the syndicate but a:
trol for Officer jones, who is charged with out the power of the subpena. The lattL'!' can
an illstrnmellt for levying' further requirements not considered illegal in his particular jurisdi. probing' for indications that a major nar- only be employed when there is eHough infor-
on the collection machinery. tion. Through research it can be determim cotics figure is moving into the city's dope mation to make it appear profitable to lay on a
The [ormation of patterns or hypotheses relat- how other jurisdictions handle similar activiti: market, sends him a copy. He then con- full-fledged investigatioll. It is the tr;lined in-
ing to potential major new activities on the part and how a case can be developed for suggestt sults the files to determine if they contain
vestigator who understands best how infnr:nation
of organized criminals learls to important stra- legislation in the research-analyst's own jurisdi anything on the persons other than the
pushers in the hall. He quickly "makes a can be obtained in circumstances where he has
tegic intelligence inputs. They are included in tion. For example, to cite a common case, i
hit." One of the people detailed was men- 110 legal powers-by discussion, by talking to
reports to th(' agency chief and will serve both some States usury, or loansharking, is not COl
tioned several months ago by a new in- people, by indirectly approaching the subject.
to warn hirn of lleW developments and to assist sidered a crime. In such a jurisdiction tt
him in deciding 011 future al1ocation of his research-analyst could, by probing the effecth fanner as a recent arrival in town with an
eye on the vending machine business. The Intelligence Report
resources. ness of usuary laws in other jurisdictions, co:
At this point, Analyst Sam turns to his
The head of the intelligence unit must keep struct a model ordinance or State' law on usual teammate, Investigator Able, and suggests The word "report" is used in a variety of ways
the analyst and his hypothesis building under If his superiors successfully press it on the Sta that he have a talk with the pool hall opera- in lirw enforcement agencies. In its most fa-
review. He must bt, prepared to stop the effort legislature or dty conncil, the new law, in tut tor. The next day, Able reports that the miliar form it refers to the information dis-
when it it ppcars that too much time will be could become a weapon for dealing with It pool hall operator, although no symbol of patched by patrolmen or investigators or even
required relative to the foreseen outcome, or activities of organized crime. civic rectitude himself, was indeed outraged informers to headquarters. .)uch field reports
that new information indicates the developing at several recent attempts by one of his pa-
constitute inputs of information. They are dis-
hypotlH'sis is in fact wtong. Or the hypothesis The Relationship Between trons to bully him into changing his vending
machine licensee. He identified the man cllssed in the St,(tion on "collection" earlier in
may point the way to a new area of activity by a Collation and Analysis
detained for questioning the night before this chapter. It is essential to a (olllprehel1sioll
group of organized criminals, but fail to connect The various parts of the intelligence Pl'oct
as the patron in question. Sam does two of the intelligence process to umlel'stancl that the
their apparent involvement with any illegal ac- should not be thought of as watertight compa: "in formation" contained in field reports cannot
things: he opens a file on vendino' machine
ti"itie~ or the breaking of any existing laws. ments. This is especially true of collation ar licensees in the suspect business rfJe and he properly be thought of as "imelligenc(''' until it
The commander of the intelligence unit Ulllst, analysis; the two functions are frequently ~ obtains the repoTt of the informer from the is evalllated in the intelligence unit, (·(llllp.lred
however, be prepared to support an analyst formed simultaneously, and in some cirelli biogTaphic files. To this report he adds to other information already on lJle and possibly
whose developing hypothesis is uncovering an stances they are inseparable. Good collatii the comment that a major item passed by combined with other data.
entirely new area of criminal involvement by practice requires that the analyst is capable the new informer has been corroborated, Intelligence reports as llsed ht'l(' rder to tht'
ordering an increased collection effort to provide bringing good judgment and synthesis to: and cross-references the vice squad's report end products of the intelligence process. They
the analyst with additional information. intelligence problem. The analyst is suppos: on the raid and the report of the interview
are the distillations of all the elements in the
to look beyond the immediate "face val tie" between Able and the pool hall operator.
The Role of Research Analyst Sam has not only initiated a new process prepared in written or OJ al 10rm. Some
an item of information. He must ask, "wht may be q nite briel', for exam a summary of
line of inquiry (vendingmachines) and laid
One other elemt.'nt of the function of an ana- does it fit?" "would it dovetail with some at! the suspicions {lctintics oi a w\t'rn owner to be
a paper base for such an inquiry, he has also
lyst should he emphasized-research. It is information not apparently related to the l made two significant moves in the collation given to the precinct cOlnrnalldt.T where thl' tav-
through research that the analyst begins to de- mediate problem I'm 'working on or is it L process. He saw to it that incidental in- ern is located. Some way be 'plite mmplt'x
velop ideas and concepts which later become the related to the bits and pieces of paper on r telligence got to an interested party (report docnments, prcI"lred spt'cifirally for the !lightest
basis for hypotheses. The analyst must have desk?" of the arrest of the two pushers to Officer consumer, the agency head or the prosecutor.
2{)
'2.7
0·.

------- -~- - -~ -~ - --- ----- -- -- --


elements where they will be used. Reports kinds of il)formation from other law enforce-
In any case they should be tailored to t~e brief examples of such reports, one of whid 'which remain locked up inside the intelligence ment units. Decisions must be made from
particular requirements of the consumers m describes new developments in a specific crimina ;unit, to be read only by intelligence personnel, witbin the department on how these are to be
question. . . . activity, the other of which warn~ of a. nel 'fail to fulfill their primary role. But dissemina- handled. (For a discussion of this problem, see
The intelligence report must be Objective m development that may attract orgamzed cnme, tion is more than the mere sending out of cha pter III.)
order that the decision maker, the one who deter- reports. It invol yes specific decisions by ~he
mines which future courses of action will be Indicative Ven;us Evidential Intelligence Reevaluation Lt
,unit commander as to whom should receive
followed, will know exactly what existing' infor-
mation and analysis can tell him. The report
A relatively clear distinction can be ma~ what product of his unit. In many cases these
between the two general areas of intelligena decisions must be approved by the agency head
The final element of the intellig'ence process r.'
is reeval uation. The commander of the intelli-
should be written in ouch a way that there is a functioning, namely, the premonitory or indica himself. The recipi'ents are indicated basically gence unit should be aware that it is his function
clear delineation between positive information tive phase and the case or evidential phase. II by the criterion of "need-to-know." Also in- to continuously review the effectiveness of his
or facts, those pieces which have gone into devel- the former, intelligence reports will often hi ,volved, however, is the degree of sensitivity of oIJeration on the basis of his own observation of
oping a hypothesis, and the conclusions 'which hypotheses pointing to the development G the information, especially as it relates to the hdw effective is the reporting, how good is the
are drawn from both the facts and the hy- courses of action and trends which are based 0: ~ource. Moreover, reports in the indicati~e analysis in terms of pointing out new areas of
potheses. In the indicative stage of intelligence some, but not complete, information. The stage could contain hypotheses which, if misread operation before the organized criminals ac-
alternative hypotheses may be included in the may even be based on research to indicate area or misused, would lead to the maldeployment of tually g'et there, how good is his cdllection sys-
report to help suggest to the policymaker the in which organized crime could profitably stat resources in the department. tem. But, in addition to this, he should have
extent of the uncertainty and also the potential activities, even though there is no informati(l Thus, as in the case of the report format and established a formal feedback process or system
areas in which he may want to lay on further to link it with the particular area at the tim content, dissemination should be established on which requires the agency head to tell the com-
investio-ation before deciding' what his specific the report is written. In the latter or the e\: the basis of discussion between the intelligence mander of the intelligence unit how useful or
course '"of action will be. dential stage, ordinarily another element of th unit leader and the agency chief. The dissemi- how pointed his reporting is. No matter how !.I
agency or the prosecutor will have the re~pom natio.n should be determined by the purpose of observant the commander is, he cannot without
Periodic Reporting bility for case building. However, the mtelL the re'port, those who have a need to know, and guidance really understand the requirements of
The intelligence report may be a daily or O'ence unit may still be furnishing reports a the commander's decision as to additional read- the agency head, and therefore he must establish
weekly periodic report or a special report cal1ed information that it has in its files. In sue ers he wishes to make aware of the flow of a formal means to elicit this type of information
for to cover a specific item of interest or a cases, the analyst may make a contribution b intelligence information and analysis. Security from the head.
developing case. The report may be focused on suggesting what the various pieces of ev~dem is important but rarely should it be the deter- Reevaluation raises a management problem
biographic data, it may present the general back- gathered.so far suggest, and where other eVidem mining factor in deciding who should read the that might be called measures of effectiveness,
ground on a specific problem or a specific case may be found. reports and what offices should get them. If the It is certainly not the size of the files or the
that is developing, or it may be in a sense an chief wishes the intelligence unit to produce number of entries that determine the effective-
estimate of the situation-the intdligence unit's Role of Consumer imaginative pieces for him in which there is a ness of the intelligence unit. The commander
best anal ysis of a developing situation indicating It is important in thinking of the probfem( free-swinging discussion of problems, he may should think more in terms of how he might test
where it believes the current trends will lead. the intelligence report to emphasize that tn wish these to be for his eyes only. But this 'is the ability of his system to produce analyses
In most cases, intelligence reports should have report content and format should be defined h p,ot a matter of security so much as a matter of quickly with a minimum of file-search time. He
two parts. One part should be an analytic state- the primary consumer. It does little .good f~ protecting persons who are developing ideas might analyze his operation in terms of ability
ment giving the conclusions of the unit's chief the intelliO'ence unit to suggest what It shaUl from potential trouble. through time to have detected new operations of
(and analyst) as to the meaning of the data col- report anl how it should report, when its ide; The most important single rule of dissemina- the organized criminal before either operations
lected in the report. This statement is not a differ from those of the chief planner or proi tion is that intelligence analysis is delivered actually start, or before anybody else actually
summary of the information in the report, but cutor. On the other hand, the consumer ofte intact to the head of the agency. Only in this detects them. This is a har.::1 test, but, after all,
answers the questions: "So what? What does is not fully aware of what he wants. Thus, tt manner can the integrity of the intelligence unit the function of intelligence is to warn of new
this report mean? 'Why should I read it?" The format of reporting should be a matter of dl be insured. Only in this manner can the head developments, to suggest areas where the orga-
reader should be given a concise statement of cussion between the intelligence commander an be assured that the unit will keep him fully in- nized (7iminal might turn next. A final test
what the information indicates-certain illegal the primary consumer of intelligence .in the ~ formed; only in this manner will the intelligence might be the extent to which the unit has de-
activities arc becoming more important, new partment or ao-ency. Moreover, report1l1g shot!< staff know that others are not editing or slanting tected criminals beginning to operate in legiti-
lines of investigation are required, an arrest be reviewed f~om time to time to insure that tt their reports. It is also vital that the head be mate business with apparently legal means-
should be made, a shift in priorities shouk! be final product of the intelligence process is; made aware directly of very sensitive material legal, that is, because there is no ordinance or
considered, this week has been worse than last effective as possible. that may have a bearing on a current case of State law or Federal law agaip the particular
week, etc. corruption in political leadership or among his operation.
The other part of the report should be a sum- own people. It is important that the integrity These are all very stiff measures of effective- .
Dissemination
mary of the information that' backs up the con- of the intelligence reporting system be insured. ness. They are also difficult to quantify. Never-
clusion. It would be an abstract giving times, The primary function of dissemination i~ d ( Finally, there is the problem of external dis- theless, the intelligence unit commander must
dates, sources, and a brief statement of the crimi- intelligence process is to distribute th~ fimsht semination. There will be requests for various
try to develop his own tests of effectiveness be-
nal activity involved. (See appendiX E for two product or report to cQmmand and enroi-ceme!
29
28
II
cause his responsibility is so different from the
normal line functions. The effectiveness of. the
Management of the Intelligence Process
In the process developed above there are three
'of the agency because if he agrees to the collec-
tion targets of his intelligence unit, it tells him
what is required of other units. If he disagrees,
• Are there reports or rumors of organized
crime activities that the unit itself has no
other information about? What has been
t
I
motorized patrol in the traffic bu-:eau can. b.e activities which, in addition to being essential it provides hiIll., with an explicit mechanism (his done to check out the rumors? I, I
tested by the way the traffic is flowmg. If It IS to the production of intelligence, are important review of the collection plan) to reach such a • What developments on organized crime
moving smoothly, it is being successful. In t,he tools for managing the intelligence process: decision. have been reported by neighboring (or
burglary squad, if the number of actual break-l~s collection planning, periodic reporting, and reo other) jurisdictions? Have investigations
declines and the number of arrests and conVIC- evaluation. These sources provide the intelh· Monthly Report of Intelligence Unit's Activities in their own jurisdiction been focused in
tions goes up, the operation is effective. But,in gence commander with. the ess~ntial tools to A monthly report provides the management these areas to see if such developments are
organized crime the number of arrests .of pollcy direct the proper allocatIOn of Ius resources, to occurring here?
chain with an explicit statement of what the
l'Ullllel •sand ,gambling-O'arne
, b operators IS no real review the effectiveness of his decisions, and intelligence unit did for them during the past • What developments elsewhere have been
te .>t of the effectiveness of the intelligence system. to report ro his higher command in the month. It should be directly related to the col- suggested by questions received (about per-
The payo1f IJ<lsically is when the intelligence management chain. .. . lection plan for the month. (A sample format sons or actiVIties) fTom other jurisdictions?
process can provide informat~on which lea?s to Specifically, the head of the lI1telllgence unH is shown in figure 5, page 32.) It should pro- Have they beeilchecked out locally?
the breakup of a major portIon of a syndIcate, should have his unit produce monthly the vide substantive backup for discussions of the • Has there been'a flow of information from
includinrr e~pecially the arrest and conviction of following reports: collection plan and material for the eval uation
onc or l;~ore of the major leaders. (Obviously, others in the agency? Have patrolmen, in
6f operations discussed next. particular, ~een responsive to the unit's
in this examination, account would have to be Collection Plan
taken of a failure on the part of the prosecution request for information? Have the reports
or on the I)art of the judge or courts to pursue This document should briefly review the focllS Monthly Evaluation of Operations been followed up?
vi1torollsly the case that has been made.) of efforts over the past month, analyze current The section above on reevaluation as a func- • Has the filing system been responsive to
I~cvicws and post mortems will serve little requirements, and indicate areas of focus for col· tion of the intelligence process provides the questions directed at it? Have there been
purpose unless they result in action of some kind lection for the next month. The .report shol~ld rationale for this activity, It should be made a questions that have not been answered be-
to correct the deficiencies uncovered or lead to be divided into two parts, one havmg to do "'.!th part of the monthly management review of the cause of the filing system? Have analysts
the institution of new methods or experimenta- premonitory or indicative: intel,ligen~e reqmre· activities of the unit. The commander of the noted need for other categories? For more
tion with unfamiliar techniques. Some of the ments,. and the second with eVIdential or case· irtelligence unit should meet with his principal extensi ve cross-filing?
practical consequences of good, hard-hitting building requirements. Efforts should be made assistants, or better, his whole staff) once a
• Have there been reactions to the units re-
reevaluation might be: the dropping of an to indicate what agency or gr0u. P should be rnonth. At this lneeting, coI1ectively they should
porting? Have the consumers been queried
informant who is fast losing his connections, the tasked to collect desi:ed inf~rm~tIO,n. For ex·, try to answer a series of specific questions that a
as to usefulness and the material being on
addition of new cross-reference items for all fu- ample, in the premomtory or lI1dlcatlve area, the member of the staff (or someone from outside
target? Have there been any leaks?
ture fiJ ing entries, the assignment of a liaison responsibility might. be g~ven.to re~earchers and the unit) has formulated. Examples of the type
officer on a part-time basis to the local Federal investigators of the Intelhgence umt. If appro· of questions that could be posed are: . • What questions should be asked next
strike force, the abandonment of a file on street priate reference should be ma~e, to w~at could month?
narcotics pushers (and the dispatch of this file be expected from requests for lI1formatIOn from !a Does the unit know more about organized
to the vice squad in operations), the Jaying on other departments. In the evidential area, the crime activities in its area of jurisdiction The whole concept outlined above is a formal,
of a long-range study of the practices of the local recommendation might be made to hand the than it did a month ago? directed, self-examination of the successes,
securities market, the acquisition of a short term case over to the prosecutor and his sta~ or a • If the answer is yes, then: What has been failures, and general operation of the unit. Un-
consultant from a local university to devise an Federal agency for development of full eVIdence learned? How was it learned? Could more der no conditions should the activity be COll-
RFP for a contract survey of the economic costs needed for an eventual prosecution in the courtS. have been learned by better approaches? sidered as a bull session. The meeting should
of organized pilferage in the dock area. These Or it might be noted that the intelligence unit's result in a report on gains and losses, and sugges-
What is being done. to exploit the gain in
exam pIes represent only a few of the infinite own staff would have to cover all of the collee· tions for improvement. This report can be
knowledge? Can some specific cases be de-
number of decisions that can flow from effective tion. The collection plan should also address veloped? Should there be a shift in the reviewed at the following meeting to see what
reevaluation. They do suggest, however, that exploration of type sources, such ~s infor~ersJ investigative effort? etc. action has been taken-it becomes a long needle
reevaluation as an intelligence manager's tool is undercover agents, electronic deVIces, busmeSS to force improvement.
• If the answer is no, then: Why not? Is
not for nit-picking. analysts, etc. The nature of the intelligence function, its
analysis failing to keep track of activities of
The commander's final responsibility in re- The report does not have to be lengthy .. II
organized crime? Are investigators focused security and compartmentation, makes evalua-
evaluation is to establish some system for review- can incl ude a form on which to update, modify,
only on low-level operations? What devel- tion difficult. Self-examination seem8 to be the
ing his records. These records should be kept or leave unchanged current allocation of r~'
opments have been learned from outside most useful approach. This puts a heavy respon-
current and not accumulate a vast amount of un- sources. The purpose behind this document II
agencies? Have they been followed up? sibility on the commander of the intelligence
necessary material. In particular, there should once again to force formal and periodic revieW.
etc. unit.
be some means developed for purging the records And review without an explicit statement of the
of incorrect information. (Purging for privacy problem and situation tends to be meaningles~
purposes is discussed in appendix A.) The document should be valuable to the head
31
30
,
j
i·.Q
.~
I
i

~
FIGURE 5.-Sample monthly report of intelligence unit's activities I
FIGURE 6-ANAL YSIS I
1. Genera/utilization of staU-

Number Man-hours t1\


Initiated Completed
t~i
Continuing Investigator Analysl ,
during during
Type activity month month
,--~,.",.-""-"'----=-~.....:...~~,~-----==~---=::.::..:.:~------------- 1

Investigation: [....1
Subject/unit initiated ..................... _______________________________ f'

Subject/requested by other
l;
clement in agency:
[,
Chief ....•.......................... _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

I
Detective clement .................... ________________________________ f.,;,.'
Enforcement clement ................. ________________________________
Internal squad •................... '" - - - -____________________________ ~
1. Assembling available data on problem. 2. Identifying unavailable data and defining
Other ............................... - - - - - - - - - - - - - - - - - - - - - - - - - - - _ new collection targets to collectors.
l.

Subject/requested by other
agency:
II,
Prosecutor (same jurisdiction ......... ________________________________
State agency ........................ .
Federal agency ....................... _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Other ............................... _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Special study/analysis
title and requestor:

--~----.--------'-------------------------

2. Subject area of activity-


Areas of continuing study investigation (by function 01' person)
a.
b. 3.Additional data provided by collector adds to picture. 4. Reassembling data .ndch~ckln~ ,..\\;, other
analysts. investigators or other agencies,
New areas of study/investigation (by function or person)
I:
a. !
b.

3. Developments which suggest new activities by organized c1'imina/s-


a.
b. _. _______________________________________________

5. Forming the hypothesis. 6. Testing the hypothesis.

7. Writing the report.

32 33
z:
CI
;:::
..:
z:
:Ii
..... FIGURE 7-THE INTELLIGENCE PROCESS
er~ en
ci5t:: en
'"
z
e
i~l§
r= 2i

...~
z:
CI
;::: co
'"
v;
~ ...
i5
'"
~
t;:
'"'- Step Activity
....""::::. '"'z :E

7>~ ~ t t;<..
'"
'" i5'"'
>- ~
~ ..,z:>-
""
....
>-
..... ~ '"
!::;
c
13
e " L~ \)
l. The ultimate success of the intelligence process depends on a continuing flow of accurate, up-to-date, and
"" ~
=>
V)

l:! ~ ~ relevant information from all possible sources .


• • • • e '"
z:
;:::
a::
CI 2. Each intelligence unit must have some method for determining the value of incoming information that is to be
....,
a..
a:: entered into its fIles and/or to be acted upon. The evaluation can be initiated by the collection element but
should also be performed by a knowledgeable person (knowledgeable in terms of accuracy of the reporter and
correctness of the data reported) in the intelligence unit. Recording the evaluation can be simplified by use of
V) number or letter code system.
'"
z ts '"z
~ ~
g c... ~ .,
=>
e
(/)
(/)
5 Cl
=>
Ii; ~ 3. It is essential that the information to be retained in the unit's fIles be indexed, cross-referenced, and fIled in
U.1
(.)
i ~ ~
0 such a manner that it may be efficiently retrieved as required. The classification of files by name, address,
D::
D. business, function, etc., and the cross-referencing should be done in a manner that supports the analysts.
U.1
(.)
l", \ L., ?> )/\
z .... \ \ I I / / 4. On the basis of the information flow, the analyst will seek to determine new developments and warn of
U.1
CJ
....:IE
z
\ \1 1/ /
:::; ..... im, .mding activities, to perform on request studies of trends and networks of activities by organized criminals
...j
U.1
...z
." \ \j v/ (or those suspected of such activities), and to assist in putting together evidence for case building .
~
I-
11:
:II
...z
U.1 ~ 5. The intelligence unit is responsible for producing reports, both those specifically requested and those
:t: generated by the flow of information.
I" Ii ~
V)
~ e
......
i•
to

U.1
'"
!iil
Z
::I
1:0: ~ 6. The intelligence unit commander should in most circumstances approve of reports prepared in his unit before
'-'
D::
::l • • • they are sent out.

r
CJ
G:
~ 7. The connecting link between the intelligence process and the management of the process is the action of
reevaluation or assessment of the effectiveness with which the particular intelligence unit is performing its
... ... ts mission-that is, performing the intelligence process in such a manner that it is making an effective input to the
'"' t;~ >-
~I
'-'
'" '"
=>
agency's effort against organized crime. On the day-to-day baSiS, the commander of the intelligence unit must
e
~
co
5]
V)

Cl ... ;,j:5
C .., perform this function of reevaluation, of assessing the effectiveness of the operation of his unit. Periodically, the
§ "" '" t:; z:
'" 1== :c CI
• • • • • ;::: agency head will have some outside element inspect the unit.
....""
::::.
..:
...,
>- 8. The outcome of the reevaluation, whether it is performed by the commander alone or in a more formal manner,
""z:
CI becomes the basis on which the commander redeploys or refocuses his assets.
...;:::....
...::J
CI

34 35

I i
t.t.i
.discussed without considerable attention to ex- reporting function to meet the requirement to
-ternal relations. In many cases, the organization have strategic intelligence inputs for the agency
~of an intelligence unit is of less importance than head. Small intelligence units probably will
:the capacity of the unit to do business effectively have to rely on a handful of flexible and harried
,beyond its own suite of offices or array of desks officers to meet both needs, often simultaneously.
,and files. Thus, considerable emphasis will be A major preoccupation of the intelligence unit
given to built-in arrangements for dealing with commander should be to insure that proper
Chapter III other agencies at all levels. Perhaps the first
principle for a sound approach to intelligence
balance is maintained between the two require-
ments. He must not only constantly review the
unit structure is a negative one: vVhatever else functioning of the outside demands on his filesj
it may be, an intelligence unit should not be an I11formation system, but must also keep whatever
THE STRUCTURE OF AN hermetically sealed, totally self-contained unit,
living by and for itself, recycling its own stale
analytic capability he has focussed on what he
and the agency head perceive to be the most
air for survival. It must, in other words, have a pressing problems. Whenever he is faced with

IN"TELLIGENCE UNIT vital external life; it must be able to reach out


not only up and down the organizational ladder,
but also beyond it to other ladders.
a cruel choice because his people are seri-
onsly overtaxed in keeping up with both re-
quirements, he must always direct his own skills
to meeting the requirements of the agency head.
STRUCTURE AND MISSION For if he does not, he will be in danger of losing I
Intelligence unit must. be m"g~nized to provide strategic intelligence to agency head and taco the war for the sake of winning an immediate
t
Traditionally the intelligence unit in law en-
tical intelligence to operaltonal umts. . . battle. Moreover, if he is not in a position to 1
forcement agencies has been looked upon as a I
Intelligence unit should be a staff organization reporttng dtrectly to agency head. . provide his superiors with an overall picture of
clearinghouse or reference point primarily of f
organized crime in the jurisdiction, there is
Essential intelligence rejJorts go directly from unit to agency head to .preclude filtenng effect. use to the field investigator in developing his
probably no one else who can. There will I
Intelligence unit must not have 1"esponsibility for internal squad functtOn. casework. Slowly this old-fashioned_ concept is
ah'{ays be persuasive advocates impatient to mo-
. f' t lligence tJrocess can be per· giving way to that of a two-directional unit nopolize the policymaker's attention on such
Structure of the intelligence unit must ensure all functwns 0 me, , which supports and services the agency head on
perennial questions as traffic safety, riot control,
formed. . the one hand, and the field investigator and
and new squad cars.
• A single pe1"SOn may pe1"form mm"e than one functtOn. .' d 'tl' prosecutor's office on the other. This dual
. d d'" t' f fi w of informatwn-m) out) an Wt In mission, this two-way stretch, constitutes a recog-
• StnlctW"e must provtde control an nec tOn or 0
unit. l nition of the differences between strategic intelli- The Intelligence Unit and Enforcement
• Structure must permit coordir:ated effort of intelligence investigators and ana ysts)' use 0' gence and tactical intelligence (see chapter II, Another major function of the intelligence
tearn approach where atJpropnate. page 11, for a discussion of the differences
unit, especially its commander, is to deliver
l · . . and evaluation) for management 0' between tactical and strategic intelligence).
Command element of unit responsible for (lSSemmatwn critiques of major pending enforcement tactical
process. .' f p" moves of the agency on four levels:
The Intelligence Unit and 1. The potential impact on continuing in-
• Responsible for intra-agency and external 1"elatwns m all facets 0 10cess.
, .' l' 1 . relations with other ager. the Two-Way Stretch telligence collection activities in the area or
• Take initiative in developing bases for establtshmg anc tm ?rovmg
cies but within guidelines of security. The most difficult structural problem for the with respect to the subject at hand. For exam-
improving value and productivity of extenJ& designer of an intelligence unit is to build this ple, will the operation cause the identity of a
• Develop Hse of liaison officen as means for two-way stretch: The unit must have an infor- valuable informer to become known?
}eiations. Il1ation system that can rapidly and effectively 2. The extent to which all available intelli-
. . . les whid respond to requirements from its own investi- gence has been made available to the tactical
INTRQDUCTION tempt to do is enunClate some pnn~'p. cot gators and requests for information from other planners.
regardless of other factors or con luons, dements of the agency and from other agencies 3. The interpretation placed on the reliability
Shaping and build~ng m~ intelligence --l.ll1it .
sutute . , I lements of sound structull . . I' ' .
mll11ma e. .
. . Ie -,-t 11S IS the rapId response functIOn .
of the Ul11t. of information by the tactical planners. It is
targeted against orgamzed cn:a1e must be a mat- practice for intelligence Ul11ts. These pn~clp, At the same time, it must have the capability to important that planners not base their plan on
ter of customized tailoring. No two .law en- can be adapted to the needs of agenCle: (0 ~roduce intelligence reports that are responsive information that they are, giving higher reli-
forcement agencies have the same reqUlreI?~nts various sizes and with varying degrees a .~ to the requirements of the agency head. ability to than the intelligence unit believes is
or local needs or the same powerful tradlt:ons
organized crime problem. . . d'; In the larger units, there should be sufficient correct.
that may have to be accommodated in preclsely Because organized crime knows no JUriS' personnel to have some assigned to information 4. Where appropriate, an appraisal of the po-
the same way. This chapter will not set d,own
tional or geographic boundarie~, tl~e struct~ ~?ntrol ~nd the answering of requests for spot tential value of the planned enforcement action.
rigid prescriptions for size, structural. rela.nons,
of an intelligence unit to cope WIth It cannot . mformatlOn, and others assigned to the analysis- Thus, if the vice squad, for example, has con-
or even organizational form. What It WIll at-
37
36

-
vinced the agency head to clean out a string of agency's life so that it does indeed become a pan tion that the penonnel assigned to the unit are The Intelligence Unit and the Head
prostitution houses in a certain district, the in- of the vital activity of the agency. In othei t~ be. primarily co~cerned with intelligence. of the Law Enforcement Agency
telligence unit commander might be called upon words, an intelligence unit-although it may hi 1 hat IS to say they wtll be "men in the middle"
to answer such questions as: "Will the prosti- saddled with sensitive security consideratiOlI cO!lstrtlcti~g a coher~nt pi.cture of organizdd An in.telligel:ce unit must be prepared to serve
tution problem merely move from one precinct unknown elsewhere in the agency-cannot bl ;cnme a~ It operates In theIr jurisdiction (and the pohcymakll1g echelon of the Jaw enforce-
to another, and if this proves to be the case, is reason of its placement in the agency be pel.b~yond ~f necessary!. They will not participate mel:t agency by c~n.tributing to its capacity to
the harassment factor sufficient to justify the mitted to become a quiet retreat detached fron ~dlrectly In the eradlcatlOn of organized crime in m~ke effectl\!e deCISIOns (see chapter I on this
operation?" the rest of the organization's activity. . :the sense of making raids and arrests. While pOlllt). After all, that is one of the fundamental
The intelligence unit commander must also 4. The unit must disseminate its product t(they may conduct investigations on the street, assumptions of its existence. It should, there-
be brought into the planning for major raids appropriate consumers in order to demonstrau such field~vork :vill be c~one as a necessary means fore, be so placed (or the unit's commander so
since they can be important information collect- its usefulness and to perform a real, albci,?f COIl:C~I?n pIeces o~ mformation on develop- placed) that a reciprocal unclerstanding' of the
ing sources. The intelligence commander may somewhat unique, role in law enforcement. i111g actlVItles of orgamzed criminals, or to follow ne~cls of tl~e ag~ney head and the capability the
recommend that some of his personnel go with :up leads already de~eloped by analysis. They Ul1lt to delIver IS developed. As the commander
the raiders to be sure that all possible informa- LOCATION OF THE INTEI"LIGENCE may f~-equently ~dvlse (and even accompany) of the intellip;ence unit learns more about the
tion is gained-data beyond the evidence col- UNIT operatIOnal 11l1ltS 111 the ccnduct of enforcement d~ily pI:eoccllpations of the agency h~ac1, he will
lected against the criminals at the scene. The activities, but. in such cases their participation ta.tlor Ius reports and briefings to fit more closely
intelligence personnel will be looking for infor- The proper placement of an intelligence unimer:ly constl~utes a service in support of WIth th~se preocc~lpatiOl~s; similarly, the agency
mation which will help to explain the relations in a law enforcement agency depends on a" .trachtIOnal polIce operations. head WIll fin~ hnnself lllvolnxi in a learning
between the current operation and the larger riety of local factors such as the overall size ~ : The. more the intelligence officer is drawn into pr~cess-learnll1g, that is, what his intelligence
network of organized criminals. At a minimum, the agency, the criticality of the organized crim pperatlOnal activity the more he will be deflected 11l1lt can do [or him.
the intelligence unit can provide questions for problem in the area served, the mission of th from his primary mission. There are after all The best agency head is the one who learns to
the raiding party to put to the entreprenuers agency (e.g., investigation, prosecution, labc conere,te. satisfa~tiol1s _in making arres~s, in per~ stretch the capabilities of the unit, test its Hexi-
inv.olved about their superiors at a time when relations, etc.) and, candidly, the integrity que sonall) l11terfermg WIth the professional career ~ility, question its hypotheses, and insist on
they are apprehensive and possibly off guard. tient of the agency's personnel. There are sitUi of an ~rganized crime network. The temptation ll10easingly high standards of performance. If
In short, the intelligence unit, while not a part tions where for a variety of sensitive reasor. .to be 111 on the climax will be strong, but to so the agency head is truly skillful in his role he
of the enforcement mechanism, while not itself -and the foremost of these is internal comf conf use 1'0 Ies and missions almost always will discover that he has drawn more out ()1~ his
tion-an agency head may find it necessary I . I h intelligence unit than even the commander of
operational, cannot and should not stand apart Fean~ t lat t e less glamorous routine of the
and aside from enforcement responsibility. combine intelligence functions with other fun mtelhgenee officer will be the loser. ~he unit originally thought was possible. This
tions, usually internal investigations. Th 2 Tl . ldeal effect can only be achieved, however, if the
should be regarded as more 'or less unique an .
I Ie mieil£gence unit should be inslil'lted
l
agency head insists on maintaining one other
Guiding Principals of Organization generally is an undesirable confusion of fun a~~ mtlc.l as jJ?ssible from day-to-day jJolice func- level of excellence-that is, the excellence of the
tional objective5_ The focus of the discussi~ flons (zn.cludln{5 l~ng c~U?"t appearances) so fha·t perso~ll:el comm~tted to the intelligence unit.
The necessity of encompassing intelligence to that follows will be on the discrete unit with tf~t :-an stIck to .It~ mtellzgence miss/on-and jJer- Any fml nrc on Ius part to insist on the highest
serve all the needs of an agency imposes peculiar single mission of conducting intell igence for tf /01 m t7za~ ml~slOn as objectively as jJossible. standards-o~' any indulgence on his pa;-t of
structural burdens on those responsible for or- law enforcement agency against the organize ?nce an ll:telhgence unit is permitted (or per- per~onnel r~lds by other units of the agency
ganization planning. In practice, there are no
crime target. suaded~ to :l1Volve itself in operational activities agall1st ~he ll1telligence unit-will to a degTce
whoJ.1y correct structural solutions-only prin- for winch It provides the intelligence base, the
ciples that must not be ignored if the intelligence
Intelligence as a Staff Function Success of the operation inevitably becomes para-
unclermme the quality of the staff he has devel- I
product is to reach its varied consumers clearly, mount '. The cool ' (l'IspasslOnate, . oped to serve his needs. (For a discussion of t
even imper- personnel selection, see chapter IV.)
pointedly, urgently, and with effective impact. Ideally, the organized crime intelligence un ~onal VIew of the professional intelligence officer
These principles are: is a staff organization whose commander repo! ray . become clouded. . For many agencies the kind of relationship
1. Intelligence, particularly intelligence fo-
cused on organized crime, is a commodity not
necessarily understood by all law enforcement
directly to the agency head. It should be a sll examme ne,v I'llform t'
organization so that operational obligations ~ of
minimized. It should report directly to Ii ! . .
.~
someone co
He may begin to
a Ion Tom t Ile perspective
f
mmltte d to a certall1
. . operational
cltscussed above is clifficul t to achieve because
political winds are constantly blowing old agency
heads out of office and new heads in. The com-
r 'i
.,
officers simply because they wear a unifOrm, chief because the substance of organized criu
~~th: he. may unconsciously seek material which mander of the intelligence unit may have rela-
intelligence is often extremely delicate and ~ ylll Just~fy the undertaking rather than question ;,
carry a badge, or have passed a bar exam. tively litt~e ti~le to develop effective working
~fs
(
.2. The usefulness of intelligence may not al- cause the unit should be providing the high! premIses. In other words, once he is a party
relatIOnslups WIth the agency head, much less to
ways be appreciated by either superiors or sub- authority with material which enables him p th.e ~peratiol1: he may be less able to spot the
hone the intelligence products produced for the "
ordinates and accordingly it is often neglected make effective policy decisions. Let us exami :~:~ :n Its pl~nnll1g assumptions; equally he may agency h~ad on the wheel of this relationship.
by both. both these propositions. d hat he IS less than eager to credit new evi-
In such CIrcumstances the intelligence unit com-
3. Regardless of how the intelligence func- The intelligence unit must be in a staff Ie ien~:e which suggests that the targeting is poor
mander must rely on his wits to establish a pat-
tion is structured into a law enforcement agency, because: ~rl t le real quarry has already skipped town or
Wlatever. ' tern of service to the agency head and, at the
it should be placed within the mainstream of the 1. Such a positioning is an implicit reCOE same time, preserve his unit's momentum cle-
38
39
~~-----------------------

ats about cautionary use of the material lost,. to be drawn into such matters, it will soon find to h~m more often than llot will depend on the
spite ('hang('s at til{' top. The (Hlly rule he can and if the agency head actually does ap- ,itself shut off £rom cooperation with the prin- 9ualJ~y of the finished product served up by his
follow h to regard all demands, all requirements, prove a special investigation of the suspect cipal line elements of the agency. Once it has llltelilgence unit.
all hints he may get from the agency head, as in question, the fact of the agency's interest ?eCOl~e known .as "~he head-hunting unit," the
imm<:tiiate anel urgent levies on his unit. He in criminal activity in the laundry business llltelhg~nce Ul1lt will find itself frustrated in THE SHAPE Ol~ AN INTELLIGENCE
must devise a formula of briefings or reports may be prematurely disclosed. Fil tering ~ttempt1l1g to draw raw intelligence from the UNIT
geared to the daily life and preoccupations of his has done good intelligence work a bad s~reet patrolman or detective squad. In addi-
dmiv(' superior. service. ~lOn, any hopes for developing other forms of . As noted earlier in chapter II, it is not essen- ,I
ll1tra-agency collaboration will be lost. ~~al that ~I1 the classical fUllCtiollS of an intelli- i :1
The Filtering Effect The Intelligence Unit and . If, because of agency size or some other in- oenee Ul11t be performed by separate people or 1

Internal Problems of the Agency ~ractabl: ~)bstacle, al~ i.ntelligence unit is placed separate g.roups of people. 'What is essential
Proximity of the intelligence' commander to
The filtering effect is particularly pernicious 11l a posltlOn where it IS not directly responsible
l:~w,e,ver, IS th~t each iclentifiabl e step in th~
the ag('lIc), head is also essential as a barrier
l~lO(.ess (collectIOn, collation, analysis, dissemina-
against the filtering c:ffect-the distortion or where an agency has had serious integrity prob. to the agency head, special access arrangements
tIOn, etc.) be thought of as distinct mid that the
dllutioll of finished intelligence that is bound to lems. If organized crime in the jurisdiction has should ,be sought. These might entail "skip-
;\'orkflow of the office be so structured as to
on ur if it passes through several hands on its made inroads on the force itself or on political ecl:eion agreements between the intelligence
1l1sure a dynamic movement from one step to
way to th(' ultimate consumer, the agency head. leaders associated with law enforcement, the first Ul1lt commander, his immediate superiors, and
~not~er-~ s~nooth. continuing' flow. "With this
In ('xtn'nH' cases, this can be damaging both to evidence of this may be unearthed by the investi· the agency h~ad to peru:i.t tl:e commander daily,
~n m1l1d, It IS po~slble to define basic physical
contcnt and objectivity. gative diggers of the intelligence unit. Such sen· or at least frequent, VISitatIOn rights with the
,mel human. reqUIrements necessary to sustain
shive matters obviously must be closely held, agency head on certain prescribed subjects. In
not only to prevent compromise or coverup bl ~ost cas~s, the officers occupying' positi~ns in the
Lt.t LIS aSSllme that an intelligence unit l"??mentum 111 th.e process. An examination of
tlllS process and Its requirements will in t .
situated well down the organizational ladder the individuals involved but also to protect thf ~nten'el111:g ed:elons will insist on participating )1'0\'1 l ' ' 111 n,
e e an orgalllzational base onto which can
"clean" members of the agency or the area'! 111 these d.ISc~lssIOns.
prepares a premonitory type report flagging 1
the possibility that organized crime is about be .g':-a.ftecl numbers of people occupied ill the
political leadership from unwarranted suspicioll I Tht' prmnple that the intelligence unit should
to ('llte1' the laundry services of the city.
Din't't access to the ag'cncy head is the mOIl Iba\'e dIre~:t access to the agency head should be
altivities
.' . '.. -rlIe eX,,(t
'" .defined " . num1)ers aSSIgned
.
This report cOlltains some names of known 0 served '\~ll dIffe~ enormously according to agency size
. ~n any case, no matter how numerous
,-,
expeditious means to handle such information I
skills avaIlable, and any number of other vari~
crimillal figures, but it is primarily a waru-
ing papl'1' pointing out potential new area It might be argued that cross-agency communi, tle part;~lpants. This means quite simply that abies. I1: this section only the pieces of the
of organized crime penetration. The in- cation with the director of the internal squad j, t. C 111t.el Igen:e unit commander should have on
process WIll ~e discussed~not the numbers of
telligenc(' unit chief passes it to his superior all that is needed. This may be true for mino: a r~)Utll1e bas.Is. the privilege-indeed, the obli-
p~ople co~nl1ttecl to the individual pieces of the
instances of petty corrupt practices, but whell g.atI~~~of r~lS1ng matters which he believes are
StH
with the admonition that it not yet be used
pl~~ess. Ma.nagement officers will be more than
as a basis for action. the evidence is still less a P;lCmber of the agency or the political esta~ e~nt WIt.h the agency head. The number anxIO.llS to pIck up where this manuallcaves off;
than conclusive, the penetration not yet at lishment is alleged to have been reached by ~ 0 ~Olle, senIOr. officers clustered about the'
that IS, at the point where the pieces of the .'
a dangerous point. etc. The nHlnnander's representative of organized crime-no matte: ~ene~ lead dunng such talks is less important L
l~roce:s are converted to bo~es on an organiza-
how lowly that representative may be-tht .,an It ~e fact that he uses the privileo'e-or exer-
,I
inu1l('lliate superior promises to "get it to
the chil'C" but decides that the only way to . I
agency head must be adVIsed urgent y am 1 , .
I d' ClS(~S lIS obi ig'ation
.'
. I f ' 1:>
-WIt 10rce, dIrectness, and
tIon chart and numbers are 1l1scribed inside the
Ctlptllrl' 1Ii.1 immediate superior's attention boxes.
is to describe the laundering activities of rectly. Such infonriation, after all, is the mo.' ~~gcnt ~nalY~Is. Should even this procedure not
organized (rillle ill the city as "substantial, pointed material an agency head can receiy! g. l~?sslb~e, It may be necessary for the intelli-
The Control of Information
growing, amI threatening." He attaches a If anything can give him a picture of the er. f e~lCe I nOit commander to resort to more in-
and Document Flow l
blllksli~) to this effect and urges the paper vironment in which he must carry out his jol d~l.m,a ,procech~res. to insure some measure of
on its course. it is knowledge of how sllccessful organiz~ l1eet commUOIcatlon. He might, for examI)le .To begin with, raw information must be re-
The llext ollierr in line (who reports di- .
C1'une 1las 1)een In
. cu I' .
tlvatmg I115 ~.
. aSSOCIateS request Ja 1)lace
0 0 '
at tlIe penoc
,
. l'IC meeting's of tIle' ceIved by the intelligence unit. It is being
, agency Ie l' .
rectly to the agency head) sees something subordinates. t' f ae s .semol' staff circle, or the install a- ~nanufactured around the dock, on the streets,
('1\e in the paper: mention of a suspect
whom he has long yearned to put [!Way for
In sensitive cases direct access to the agel1r ;Ol~
s
0f speCial, open phone line between his
head is also critical to achieve some measure (h: ~nle the agency h.ead's desk. If all else fails
111 ~fIices, bars: ot~ler law enforcement agencies,
ne:\,spaper edItonal rooms, on electronic sur-
organizational distance between the intelligen'niz l~l? It at~ach to IllS unit an officer of recog~
r('asollS of professional pride. (He had &lce verlla~ce gea.r, etc. So, clearly, there must be a
had a wel\ documented case against the sus-
pect thrown out by a young anel contemptu- unit and the agency internal squad. Since threl:t' ll1t~~1'Ity. who is known to enjoy a special ~eceptIOn P01l1t, and, if some of the information

ow; prosecutor.) A week later he uses the internal squad normally functions ~s an integr.ev~r 101~ l'p WIth the agency head. But what- IS of a sensitive nature, perhaps there will he two
original report and the comments affixed to part of the ~IT:ce of the agency he~d, only he ca;t~'; a~~l :tItute ~rran~'ements he may be forced or u:ore reception points, one for general infor-
it by his immediate subordinate as a vehicle keep the miSSIOns of the two umts clearly serer'.' IP, the 111telhgence unit or org'anized matIOn, t~e otl:er(s) for more sensitive inputs.
. I I' '. line )ureau c d (
to make a special plea to the agency head for rate(.1 To put It anot ler way, tIe 111terventl°fietl un' '. omman er cannot remain satis- !!l~l)ractice wIll vary according to the division
starting a new i1lYestigation against his old of the agency head may be necessary to keep tftialo tIl I11S function is recognized as so essen-
neml'sis mentioned in the report. The pur- intelligence unit from becoming involved I ft, t t~le agency head that direct acces . 1 See figure 11 at the e IIIl 0f l IIC CImpt('r wlllch
. IJOrtl"l}'S
P05l' of the original document bas heen-
allH'it unintentionally-thwarted, the cave-
internal affairs matters. If the unit is alloWeo ~red hun. Aua whether this door i; ope~e~ control ,and now 0f'In f ormatIOn
gcnce unit.
.
. ,.

and uocunwnts in '1Il illll'lIi
-

41
·10
j ,~

~
FIGURE 8.-Sampl
. - log sh ce:
p
. , documents an d'III f onnation received by jJ/!olle
t I ncomlnlT
but will be available for normal processing. The Source (agenc}', office, T' .-.~.----
Time in Document
of labor in a unit. In some instances, receiving regular receiver can track them down from the name of sender) forltle (sufficient
identification) Distl:ibution. (handling
lllstructlOns) 1 ~O.2
i
E
may be the function of a clerical employee, in log entries and submit them to standard handling Date - ,\
~-
..-----~---~- ~-~~

others a relatively junior police officer, or in a procedures. •


prosecutor'S office, a legal secretary. Sensitive
material, properly labeled as such, should only Logging
be en trusted to a su pervising officer of the unit. Generally speaking, incom 1ug material shoulo
Once a reception point or points are established, be logged as a matter of course. (See figure i,
several questions remain to be answered which page 43, for a sample logsheet.) Naturally thi!
SAMPLE
relate directly to structure: How often is recep- does not apply to such items as letters addressee l
tion to take place, bow is incoming material to
be recorded, if at all, and how is the flow to be
to individual members of the unit, or neWt '
papers for clipping, or periodicals for wholl
k
! \
I'

con trolled? there are routinely designated recipients. HOll


The first of these questions is significant only ever, police reports, surveillance readouts, allt ., ------t-------+.-- ~.

the like should be logged-if only by title, date ------ ------1- I',
fur larger departments or agencies. As a prac- i
subJect matter, and originator-as the first ste; I-------.,-------L---------+----
tical matter, most intelligence units will close
in a watertight information control systell 1----·---
their file drawers and their doors at fixed ter-
minal points in the day's work and, barring Logging can become a considerable burden an',
emergencies or states of crisis, will simply permit from time to time it may be necessary to reviet
information to pile up overnight. The eve- the logging requirement. If, for example, on
ning's take will be received the next morning. of the officers in the unit is routinely sent a
Larger departments may feel the need or oper- police and detective reports, then it may be cO[
ating-at least, on a skeletal basis-around the sidered redundant for the original receiver t
clock. Thus, they can receive all night long, 1------_.
log these items as they come in. Their locatifr
either in their regular offices, or through the is a known factor. But if a police report shou'
service of their own oHicers assigned rotationally for any in
officer reason come or
the unit, in be
ticketed for aduring
received differera tL--- --,--------1-------... --,..------..
to the agency's command and control center.
\Vbatever the arrangements, the purpose is the emergency, say, by the on-call duty officer, the --,--.---1f--------
same: to insure that incoming information, this unusual flow should be recorded in tt
which may contain critical intelligence, is re- receiver's log. r----1-----i---------L--.-
ceived by the unit which has responsibility for Any office
mation should
control. Thehave some system
placement of this of infi r - - - - I - - - - -
functir --------
- ..- ...--.. -- -- ---------
the agency's inte1ligence function.
It goes without saying that the simple capacity will vary according to the size and complexity
to receive sllch information is of no importance the intelligence unit, bnt in a great number
..:....---1-----t--------~--------- -.. "-.. . ~ -, - - .-~- .. _--

rf;---l------t---------l~-. ~'-"-
cases the best location for it is at the receil'i:
unless arrangements are also available to trans-
mit it to an offi('er or officers who appreciate its point, whatever or whoever that may be. 11 I-.. l'
contents and can successfully exploit it during will not always be an easy task, given the tt ~. - - - - -... --~- ..-.
r---t-----+---------L-
off-duty hours. Most large intelligence units dency of law enforcement officers, like nl' '
maintain an on-call duty officer to perform this people, to stuff papers in their pockets and 1\1
function. He can be inval uable in certain situa- del' off unaware of 'what they have done- ._-_..--

r..;:,~--i-----~--:-------~---·-·. -
tions, particularly if the agency has an estab- aware of what they have done and determin
lished practice of referring' plans for large-scale to put the papers back in their rightful ph
enforcement actions to the intelligence urnt for almost, but not quite immediately. Other
l
r\---~----t--------J~-·· ...-
critique. Items of information arriving at off- tails of a control system need not be exploreo, :..;.
duty hours require careful recording; they are this volume, except to emphasize that there
sensitive points in the movement of pa'
i

..
T---·i----t-------- 1-----
.___- L
likely to be overlooked if they have not been
received during. the normal working day. A around
special aattention.
law enforcement
One ofagency
these,which req' .
obviously ----- -..- - _ ...._.
careful log vf all incoming phone calls, messages, ' .c utlOll wlthm tl· . - .... -.-.----.-
important teletype items, and the like will pro- the departure of a record, or extract of a 61f: 1 Distrib' .. - .-.-- ---..- ....
·,' response to a request from an element af;'mfo-m
f~ '~l~tlon
?f,by the' use of stand arcI Il~ u~lt ~an be
(lstnbutlO
~)I
r indicated in several,"
' \ ays. TIIe rCClpICnt
.. (0' ... ' .
~
",d~.
vide the regular personnel with some view of agency outside the intelligence unit or by' ,y1 - ocument center (or the mail de r would
numb Ists represented on the
be thoroughly f fOfm
T by letter Of 1IUlll er
II'ClP1ClltS\
(odc. The call be dcnigl'atnl by IIlIlIIe
person in eha • f h
what went on overnight when they report for
duty in the morning. Equally important, the
o '" agency altogether. No matte, cl," '. .'
: "
a" "',"m, p.n of ideo,,",· atlOll system fOf documents
,m' '" "hh <h." I""
which
."d are filed. <g'." I "
tl
overnight items will not be lost in the shuffle, 43
clerical assistance. Obviously, the choices {r
are legitimate requests; they should be recorded what to do .with any single item of informatio: FIGURE 9,-SamjJle log sheel: Olltgoil/g documel/is and retlorls
fully and a copy of whatever is passed on main- are numerous, but by and large, the objecthr a---.,-----.----- .---.-...-... ~.-'-~'...-.....-._--..
. Document
tained in the files. Similar restrictive proce- Recipient (agency. office, T'tl ( m' [ Authorizing person
the item to the person or persons within t~It
in this stage of the intelligence operation is ti Date Time receipt
dures should be imposed on materials dealing !ret
" r-__ r ___ I.______
received 1 I__~I_la_m_e~'_o_re_cl:·p.~ie~n~t)~.
f C SU IClcntor
Iidentification) 2
(handling instructions) :t
; i

wi th electronic surveillance and eavesdrop tapes, 'office system-and sometimes beyond it-when . c . . .... - _._._-- _._• . . . . .
etc. In short, any documentation susceptible to
it may add value to the overall effort. The am
illegal or maliciolls exploitation requires special
lyst who reads incoming traffic has to bear i'
handling of the most scrupulous kind. (See
mind that several uses may be made of a sing]:
figure II, page 56, which shows graphically the
item and so indicate on the item as he prepare
importance 01 information control.) it to continue its journey to a particular dell
A careful log should be kept of all copies
to several desks, to a particular file or files, on
made for external passage-this, of course, pri-
the computer storage system. (See chapter I.
marily as a record of who outside the agency has
for a discussion of various classes of intelligence - - - - ---f--------------.--..- _._--
acce!iS to what materials. (See figure 9, page 45,
In many cases this is the beginning of tt
for a sample logsheet for outgoing documents.)
To each item so passed a dated buck~lip should collation process.
By making the judgment that "Officer Jont ____ . --_._---1-.-_.._ - - - - - . - - - - - - . - --_. -_ ----. - __
be attached indicating the intended recipient by
would like to see this item because he is asse[
name, title, and agency. The buckslip should
bling a me on the subject," an analyst is tickr
be signed by the authorizing officer of the origi-
ing an item as suitable for combining with otht
nating agency. One copy of the buckslip should
similar or related materials. It will, of COUll!
be placed in the appropriate subject files from
be up to Orncer Jones when he receives the iter
whence the material was drawn and another copy
to determine finally whether it is related in sam I
r

kept separately with all other notations of ma- I"


way to the other materials he has colleetel
terials so passed out of the agency, Finally, a
receipt should be attached to all materials sent
Officer Jones may feel that it indeed is pertinec I)
to the study he is preparing and examine i ,-1---+--------1--------·-··---·-·------·...·· -..
out of the agency to be signed and returned by
against the base of what he already has on han:
the designated recipient. When the receipt re-
turns to the originating agency, it should be
filed with the separate collection of bucksHps
By adding it to his collection-and by diseen
ing where it fits, ho·wever indirectly with his oth( I
i.

authorizing the passage of the material receipted.


This step closes the circle. If, of course, no
material-Officer Jones will have almost eot
pleted the collation process, A final step Illi
remain, however. Jones may decide that!l
[
~,i
receipt is received in a reasonable amount of I,
only does the item belong in the files indieatt
time, a followup phone call may be necessary.
These procedures may seem cumbersome, but if
by the original analyst, but that it also bears( I!;i
others and should be cross-referenced to the:
they enable an intelligence unit commander to
The foregoing description stops short of U ~.
give as full an accounting as possible of who has analysis function, but it has included, if or: --'r--_.---l
access to his materials, and if the receipt proce- implicitly, one aspect of another major strar r---j----+-----~~-----------
dure impresses on the receiving agency the seri- of intelligence activity. Two separate d e c i s i a - ._.-_. _. - - -......
ollsness with which the material is regarded by
have been made as the item passed from c
its originating agency, then the mechanics of
original reading analyst to Officer Jones. Bli
. _-_._,----+---...........;.---
._--- --_._.
the process will have been justified. 11
thought the item was worthy of attention-e
Circulation, Filing, and Storage as the collector had already done. At a mu
mum both decided the item was not who'
Once received, information must be passed on worthless. Evaluation begun by collector, .Ct ~+--...-·--t-----+--------.----· ----------. -- ...
and routed internally to those who need it. Sub-
tinued at the point the analyst passed the Itt L
sequently decisions must be made as to whether to Jones, took place once again when Jones.( r·;--I---I------+------~-----
it is to be filed or stored, and if so, how. The cided it fit in some fashion with his coll eetli - - - - - - - . - ...·· ...-1

~ i~~s ~Olu~.n
circulation and storage function is not wholly a
and was sustained by the secondary decisiolll.
clerical one. Recognition of significant nuggets both to store copies of the item in varions f. .: applies only when a document receipt is snl t . h d . ........... -
£ 'bl f 11 :l Th" r co; 1~1!? task can be simplified by assi 'nin cod ~ lout wIt ocumcnt. Datt' of r('tllrned lcc:eipt.
of intelligence in incoming material is an essen- or POSSI e uture reca . adV3nC(', ~~I\,.Onzll?g I?erson can be indicated b~ c08e ~;lU~l~frs}o ~'eporfts that ;~re prodlln:<t periocIicillly.
C 1 speCial Item must have the authori"z,at'JOn' 0 f t IeJe '~l lO11z~tlonofficer.
be given in
tial part of the follation process, and it should As indicated in chapter II, eval uation is!, responSIble or c('rtum classes 'of material can
be doue by a trained analyst or analysts with
45

--
\
j.":~).~
I l"
i ~
) i
1 !
i

another finite step in the intelligence process. and request logs \ .. Quld be mrtintained here, antJ Structure and Analysis ,
three. shifts of two investigators each would be
Final (,valuation occurs when Jones studies more the filing performed as documents flowed bai:k:"~ - Tlicnext Step itt the intelligence process to be
(alC'fuJly tIw relationsb i r of the item to other ru.nn,lOg a~'Ol!nd-the:clock surveillance on a gam-
from the analysts for storage. Cross-referencing: {harted is analysis. Once again this function
blmg. operatlOn wh~ch was being mapped by a
materials. He «)uld decide finally that, although as indicated by the ana!ysts :vould als? be. per',~an ?e performed by one person or by many. It
illt('r('~ting. til{' report in question contained genera~ ana!yst, wIllIe another investigator and
formed here. In sOl~e 1l1telh%en~e UOltS w:t~ a. qonslsts of so many acts, mental and physical,
~he SOCIOlogist were trying to get an understand-
senne ratlwr dubio\lS material and should not be large volume of bus1l1ess, tIus bnd of actlVltr:41at n? ~ull cat.alog is possible. For our pur-
lo~ of narcotics movements in the dock--workers
(ollsic\en'd valid uutil wrrohorated. at least in can l?econ:e burdens.ome, and the commanderol ~ose~, It IS .suffiCient to generalize the activity as muon.
part, hy otlll'r information. One of hi5 reasons the 1l1telhgence UOlt may well have to spend, (jne 111 winch the collected materials are exam-
Furthermore, in certain circumstances, per-
(Ill' hankiw,..,r the infonnatioll (after sllitahle cod- considerable time assisting the inf0rmation~.cll.u::..inedJ.._stll£li~i and 29red over for leads, trends
ill~~I, ('\('11 thollgh it does seem que~tionable, is
sonnel who normally perform their duties as
trol personnel in perfecting the office's flow 01; dues or the beglnning,soral:lOssiblepattern. I~
--a~~ysts-m-ay~~~~~e.mployed as investigators, and
that hI' JIllJ~t all"" time for 6thcr corroborative paper and insuring that the system is ~espectedaJso includes the final phase of-;;;;YU'itfc:;r;:;' 1'1:
VILt ver~a. 1 nus, a ltleU1L"1 v-[-·~h, :n.nP; ....."nce
or di~Pl()\itl~ information to appear. and followed by all members of the umt. ,Such:"I:r.ay often T('sult in further investigation-either • \,."\...\'-"'t,.....
... .. &\.,. .\.1. .:i..;..

UOlt who is a trained aCCOuntant and has devel-


a section, if working properly, can contnbutton the street, or in the files, or by communica-
oped a keen understanding of the bookkeeping
Dh ison of Lahor-Infofmation Control Versus much more than simply keeping an office from Hon '~ith other elements of the agency en-- other procedures of a suspect b.usiness, may find that
drowning in its own paper. It can assure that agenCIes. All this activity may produce a written
he .can onlX add ~o. ~lis knOWledge, 01' "cap an
Analysis
the collation process functiOl:s as it sho.uld-:-that T~port, a~l oral report, or a decision suggesting
The 'itnl<tnraI apparatlls necessary to com- a~tlv: cas~ by VISItlOg the premises or inter-
cross-references are plentiful, s.ubJect ',_ fil~ s~me aC~lOn by enforcement or prosecuting at-
plPtt' the initial, pre<tnalysis steps in the intelli- Vle'~mg dlrectly officers of the finn. In such
informatively indexed, and the maxllnum.oppol: tQ:-ney. It may also result simply in the deter-
gen( (' IJl()((,~s ('an be as simple Of complex as the a clrcum~tancF. the accountant/analyst would
tunity for "making m~tches" (~.g.: relatmg ao. ~ll1ation . by the analyst or his supervisor that probably form a two-man team with an officer
~i/(' I)f the llnit dictates. Clearly, one intelligent dresses to people; assocmtes of ~nnllnals to placB the I~atenals he has on hand have not yet jelled
l't'l~()n tall perf(Jrlll almost all the acts described
more experienced in field investigations, but less
of illegal business; telephone -numbers to hcen~H~~ffiClently to permit hirn to reach any conel u-
schooled in accou~ting. By the same token, per-
so far: It is quite possihle for a single police plates, etc.) is afforded al1 analytic personne1.slO~s, and that he must put them away for awhile
s~nnel normally lOvolved in investigative work
olli('J' 01 dvilian t'mployee to be the receiving An information control section ~an also .p;o U?tll more material is for.thcoming.
w111 l:robably contribute increasingly ~o the
point of the olliee, to be the information control vide the crucial service of protectmg senSltlw .'
analYSls process as they become more and more
allthority. to route the materials as they arrive, materials from unauthorized circulation outsidl!palysts and Investigator~. ~amiliar with how their knowledge can be used
to make initial decisions as to filing, and to be the intelligence unit or outside the agency. Thf,There must t b .
. II . O·IlItion. . preferably ,a any rate e an analytic sec- 10 conjunction with other information to
(harged with preparing and maintaining certain serVice has two parts, equa y Important. 0 'd I' h' construct finished intelligence analyses.
substantive accounts (studies or cases). In other . . I' I . f t' , ' , ne remove s Ig tly from the
IS the relatively mec 1aOlca operatlOn 0 cO:.information COlltrol I I J •
words, Omcer Jones (or Ahle or Sam) could by . . I -? . e ement. n arger agenCles The Team Approach
trollmg documentary flow-the physlca mOHla-junior member could i 11 b . . l'
himself IH'1'form-with one possible exception- . I 'd f l ' I t th i• f
ment of matena outSl e 0 t 1e uOlt on y 0 ,lO ormation control perform ' n co a
h oratlOn. WIt
1 1
The close professional relationship between
allV oi. thl' acts described so far, and more be- . . . d h d' f It'- ; . , e a c mornmO' t 1e
appropnate renplent an t e recor l11g 0 [lOUlal routino- and file designat'on f ! b., analyst. and investigator has aLready been dis-
.1 ., . I ~" , l o t le unll s
ceipts from the OUtS1C e reClplent 10 t 1e case \Ile~v materials. vVhere possible th cussed m cl~apter II. The team approach can be
b
sid't's. Ideally, however. a sharper division of h ld b
lahor SIWllld ohtain. The person who carries . . .( fi 9 ~-'. , ere s ou e
highly sensltive documents see gure., pac[e1?reSentatlv:s. o~ the analytic staff from a ~tructured lOto an intelligence unit as the work-
OUl information ('ontrol responsibilities with the 109 core of the operation. In such a system a
115). . , " ;va:lety of dlSclphnes: economists, socioloO'ists,
It'ill l}{'«('ssary to insure an orderly and systema- The second part reqUlres more pamstaklD,aC~Ountants, attorneys etc. There 1 Jd b I team or teams of investigators and analysts would
.., ·b·· , s lOU a so
tized flow of materials may have neither the time methods. It is the whole range 0 f actlVltieS co:, eLexpenenced investigators of the traditional be targeted on particular organized crime-~rob­
nor the indina tion to be a judicious analyst of nee ted with ~ecording' evaluative )udgments (IV\I.~~ety, who in t~eir o.wt;t r~ghts are specialists in lems. :ractically,. of course, one analyst J may
Stl bstan t ive matters. Something will have to reports, carryl11g throu~h on purgl11g the files:h~lghly ?emandlOg ~hsclplme. The melding of work WIth several. lm:estigators on different proj-
slip: one fUllction or the other will suffer. what proves to be fallaclOus matter, and the p\se v~r,1011.s talents lOto one team pulling in the ect~. But the obJectlve would be in all cases to
A quite trim organization can be built on the suit and correction of documents that have bee>l!Je dllectlon may not be the difficult task it mamtain continuity on studies to build a foun-
basis of st'parating what are purely information passed out of the unit into other e1ements oftltv~Uld appear at first glance. dation of mutual respect and cooperation
control udivities and what are analytic activities. agency or other agencies. The importancelfldom would all the investigators and all the between analysts and investigators.
Thlls. at the beginning of the organizational these procedures cannot be emphasized 1~\llnl~ ysts b~ ~t work on one large problem. In Physically there would appear to be some
t !lain there would be a small information con- 1 . I 't
str0l1O'ly. fhey not on y msure t 1at lUll 0 '!:r'
r fso!;probablllty they
,wou ld b ' .
e worklOg 10 small ad~antage in housing the analytic and investi-
trol s('ninn, which would concern itself with P rofe~sional standards, but, even more inlP)eOe·;Upps of d 01' three-or even one-toward a
•.;t
two
er nn erst d' f
gatI~e
but 10
eleme.nt
a senes
not in a bullpen as in the past,
of different sized slllall cubicles
n'n'iving' materials. making prescribed 1'01ltings, tantly, protect the rights of citizens whose actt)fthe I ' . an .lOg 0 . some particular aspect
and m,\rking tip the materials for the more ob- ties are the raw material of intelligence files a!iU\ils arg.er oI%antzed cnme problem. One can accommodating two to six persons. This ar-
. 11' e U( ,...
age SltnatlOns where th . rangement would provide some degree of privacy
vious hUng destinations. All reproduction of records (see appendix A ) . A n mte 1genc )ebgaged . h . e aCCOuntant mIght
materials, as, for (''X.ample, when one item would commander must be able to satisfy hi~sel~1ttqrne~, o~ :l~onO~caslOnal assistance from the a.nd cO.herence for specific studies or investiga-
bt, rt'lt>\ant to two or more staff members, would both counts if he is to operate responsibly lC~ized crime lllani g{a?ge ~ayout study of orga- tlOns; It would also provide for intercommuni-
ht' ll\ltlel'laKen in this section. The document free society. f pu atlons 10 the securities field; cation between the teams when needed without
the circus-like chaos of the bull pen. The cubicle
".
,.j
i
47
t,

--~~-.--
rm
II
,
1;I
.
layout would make it possible for investigators not a problem, intelligence umt commandet laccountants and economists investI' 0'" tors 1 '
'bl : .', " , ' 0 « , 1alcot-
to come in from their fieldwork and discuss their should encourage the most fl eXI e use o;pcsspeClahsts, gambIll1gspecialists, what-have- au port. l11~lst I:Ot be spread so thin that it becomes
findings with normally headquarters-bound ana- their personnel-both within and without thi !(see figure 1, page 5). y ll1effectlveIll all 1:
Slll)l)orting' 'lInc t'Ions.
"
lysts without disrupting the work of all the indi- headquarters b u i l d i n g , j i\for~ appropriately, but perhaps feasible only NothlllO' IS more , t f I I
'1 ,', I 0 ,1\as e u tlan skul1ping' on
'
viduals in the analytic force, (See figures 17 and over tIme as the investio'a tor-sl)ecialist t c ellca support 1t' f I '
Supervising the Team I I' 'eaU1S b .. " I S wasteu first and foremost
ofecd:lsfe 10f ,ItS n~ortal impact on large al110Unts
0 , ,
18 at end of chapter VI.) (eve op reCiprocal working relationships, would
In such an atmosphere the relationship be- The direction, supervision, and guidance i be the command concel)t of sevel'al tea I' f use u mtelllg'ence l~ll' ,
':, , " In c 11e s fl' ' e l11Vestlgator will
tween analyst and investigator could ripen into the analytic and invest.igative force are clelica~ ,reportlllg to a stIpenor officer in overall 'I "
" ' .f h 'I' . ' " , ' TI' c laIge.
?: ten s 10rten Ius report-or not file one at all
n t I1e one h ane, 1 mvesugators,
a truly effective one, The investigator could
become absorhed in the rnf>thodology of the ana-
matters,
° (Toet ,0 t e alIt! ytlc-mvestIO'atlve fnuctI'ol1
.
erally operating alone in the field or in pain rangement wOt~Id have several advantages, In
0 , , 11S aI-
It he has to prel)are it entirely 011 1 '
'I "
dna yst wIll heSItate to make a d
" f' "
' l I S own, The
C', , -

OCUl11ent for
lyst, and the analyst, enjoyitlg the opportunity to may require closer control than analysts, 0: ,the firs~ place, It would tend to soften the hard Closs-re erenCll1g' if he knows he 'II I
more thoroughly debrief the investigator, could the other hand, analysts, generally 'working ii, protectIve shells that often encase law enforce- battle the CO) in . ' " WI lave to
, I I' ' I Y, g maclune lumself to g'et the
suggest questions to be put to witnesses or dis- house with files, statistics, and scraps of worl ',;ment officers . who have sl)ecialized
', I'n ,a pmtlcu.,' Iar ~~) (one, Illestunatable amounts of l'aw'intelli-
. --':llssdtffen:tn approaches to fieldwork, Thus, sheets, may become absorbed with the l)l'oble~ ;fiIe Id for many years, Instead of: tl '. " b
ence have been lost for all time b ' ,
.: ffi " ' , Ie nm cotles 0" t · 'I ' ecause mvestl-
truly effective multiskilled teams might evolve they are working' on for its own sake, The fie!: 9 eelS (0l1t111 tllng to be OTOllj)ed anel 'I bel 01 s WIt 1 an aversion for the l)en l ' 1 . I
" 'I" I ' ",0 ,supervIsee ready , . " (tIC not lave
that would hold together, even as subject matter investigato1" may need a system of prods (and; fS Stl( 1 "It 1111 the llltelitgence unit (or detached TI ~C(ess, to a ehctaphone and/or a typist
or targets changed, rOlltine reporting'-in schedule) to keep him f ;IS a sllbelement of the unit) tlley
:, d '
II b
wOU e e as- Ie ot lel~ sI~le of the intelligence waste coin i;
The suggestion of the team approach does not the job; the analyst may need more than a pr~ ~Igl~e to teams that were preoccupied 'tl tl1e use of· lug'hly k'l1 d "
SI e and expenenced I)er.
mean necessarily that analysts and investigators to e,g-et him off a J'ob where the well is runnit, yanety of targets. 0l)timally a bl'oadel',VI
, . 11no' 0'
1 a sonne l on tasks f ' I' I
, ' " " , ,
f 'VI " , cn W llC 1 they are unsu i ted
will be assigned to a team for an indefinite dry, the returns are slIght, and the man-hou: pelspectlve mIght develop; the old adao'e ,,0 • 'f~le mvesltg-ators and analysts are obll'g'ed to'
period, The team would be organized for the costly, a n~rc always a narc," would Iose SOl11e of it
~~( e per 'orm tl "
,
,
lell Own clencal Slll)IJort functio11S
duration of a project. At the end of the investi- 'While it is incontestable that good anal)t l. 1 be se.cond..c~dvantage to team-ori~ihe lSI ~' tYI)Ing'
,
of ' ,
, leports, reprodu(:t~on and filin' of
-
gation, they would normally break up and be takes time, the intellig'ence unit coi'nmanM rlsory arrangements would be tIle ob, ,e supel- documents, etc,-they canl10t b ' 1; g
i 'f ' , 'IOUS one I ' e hPP ylng' them-
reassigned to other team formations if there were must be prepared to sd limits on an anall~ ~ glVlI1g the team approach more pune! T se yes to wbat ~hey do best and what th'e Jre~
investigations requiring this approach, As indi- study within the context of his own unit's orll tpembers would probably come to re o'1. d leal:: sumably are paId relatively I "J I,' YI
"11 ' (1' n I" 11g 1 sa alles to do
cated above, investigators and, especially, ana- agency ,s prIorIties,
" , TIliS WI reqUIre penUU;'.J nerfon
11 ~ance or t 1elr teamwork) as
oar ."t le11I
ame f', mvestlgate and analyze, Moreover be~
lysts mig'ht be assigned to more than one team reapprmsa ' 1 0 f IlIS ' UJ1lt
"s ,lllte II'1gence actlvll~!.
, "i fuctor 1n tl Ie ratlllgs ' they received f. a Clltlca. ~allse ,111 most cases they are likely to b e b' .
at one time, This would be particularly likely and POSSI'bl y t I
' f
1e 'll11posltIOn
, , 0 f a f onna I repl,
' I ' ! pI),'
'VIsors ' N 0 I011ger would they be eval!Omt supel- 1 '
, ua ee S1111-
lI1~es~~gators and analysts than they are ty~)~~~~
where the investigations appeared to be long reqUIrement rom each team on Its accomp II, {" as expenenced narcotics investiga . t· b a,n 1 e clerks, they will probably spend more
and drawn out and not under time pressure, ments, expectations, and disappointments, ,SU'I' Hither as productive and coopel'atl'v
ItT '
01S, b ut
e mem ers tU:1e than n~cessary in typing a report and com-
Finally, adoption 0[ the team approach does not repons should be made orally (and prefera~ ~ eam A or B, etc, Finally the ' , nut 1110re fi l ll1g' b bbl I
'I'k " es t 1an would a competent
in the team's cubicle) so that the unit coml11an~ spphistication of oro'anized c~'in;e ele 1l1creas ll1 g
0
rule out an individual handling a particular case c el -typist-and they will be paid a gTeat deal
1 iilteli' , 0 manei s t l1at
or investigation where the scope is relatively can challenge what he hears, suggest new ce~1 j , Iqe,nce tactl~s become multifaceted, It is more than necessary for shabby c1eri('al 'f'
limited, tures or leads to the team, or even rotate ~ quIte lIkely that 111 the larg'e intellio' , '\l1C Tl" ,c pel 01l11-
'. ,es, , lIS IS cost effectiveness in its dreariest
The foregoing' description of the working' rela- personne I 1'f I1e fee Is tI 1e neee,I !! the anal t' I '
~ c c YIC ane 1l1vestio'ative teams
oenee 'II bUlllts ' I everse form,
tionships of field investigators and professional
analysts is not meant to suggest that the analyst
Periodic appraisal of the teams is an aspeclf sl,gned Whole criminal n~tworks to st '~I
reevaluation described in chapter n, The r; c~n sen'~ best if a variety of skills u~~l~~' sin
as-;11?
is handcuffed forever to his headquarters desk, cedures sketched out above are not for the r:: C?ntrol IS targeted against a l)artiCl I . ~ke Intelligence Unit Command
Mention has already been made of circumstances pose 0'f "I ' IItest sup
t 1e tig I" III tIeIN avy," an d~I 1' I m netwOl ' In Id" ,
, 1 ~e, Itlon, to the Information control and
when a team, consisting of a specialist and a sea- not intended in any sense as disciplinary 1l1~ 1 CI . [~na y~IC-ll1VestIgative elements, one other broad
soned investigator would visit the premises of a mes, They are, rather, means by which \ t encal Support , unct~onal area should be institution I', d '
bllsint'ss being exploited by organized crime, commander can g'uard against the developl11\ 1So far then, the structural ' " ll1tell'
' I~ence unit, This functional area com-
a lze III an
There are any number of occasions when the of natmal but unfortunate working habitS\Qpe of three identifiable fu'n ~~Ictu~e :ll1erg g IS 1l1 b mes m a g'eneral 'V'l tl ' jj'
' ,< y le 1I1te Igence processes
his teams and preserve the validity of his own: d~voted to information cont ~ ;ona I g~ oups: one
.
specialist or analyst could and should sally forth not ~et wholly touched on in this cha )ter and
on his own to conduct inquiries or collect docu- his agency's planning priorities, i alJalysis and investigation 1~1 an~ t Ie others to prOVIdes monitoring' for all 1)1Irts of tIle) ,
mentary evidence that he can best recognize ., and In the more modest sized units, it will b~\e\em~nts must be physicall' . e~r y these three I 'I'
n ml Itary parlance, it would be called tbe
(process,
, evaluate on the spot, For that matter, it does unit commander himself who provides ,dl~a~ly 111 many agencies will y~)l~x~mate and prob-
~fmmand element, ~\s the name implies, it pro-
"

OlC
not require an officer wearing a holster and gun leadership for the analytic and inVestlgar,!,!~her considerations have' t Y b : of sp~ce and , des the st:ucture WIth command or direction'
to serve a subpena for records on banks, insur- detac IIment. Larger mte 'II"Igence umts WI'\lof'j ,'4 .l'he cI enca ' I assistants" to tl ' 0
f e ll1termlllg'led
' '
'"t,
It also fUl'lllshes strategic (or policy) .'
, , an p'C!rson( ) , Ie m ormatIOn control
ance companies, and the like, In certain juris- ously reqUIre more complex superVIsory arT} Ii, s wIll almost surel I I the a I' f
,,?enc~ c 11e' or to the public proseClitor, In
Support to
dictions there m.ay be complications about the ments-for example, senior officers in ch~tG:Vl'Jcal support for the an~lylt~Ve tO (,oubl~ as ad~ltIOn, It concerns itself with such basl'c I'n-
definition of a police officers, but where this is , f' 1 iaF lYe perso I " I C an d InvestIg'a- tellIg'en <
of broad groupll1gs of unctIOna spec 1'1', J,
,1 nne, But in this l)roce I' I '
ss, c enca sup- . ' ce process~s as evaluation, reevaluation,
1 eportll1g, anel dIssemination 1~11e I' ,
I 1 , C ISCUSSIon

11
h"i 49
L, i
r"~
[>1
!. I
here will deal first with how all these processes is not forgotten-either by the other law enforce,! ,;if the report is found useful by the agency head,
ran be structured into an organized crime intelli- ment agency or the innocent victim of the actioll(,it may also have a profound impact on the im- el~tt corps, l:esented by the rest of the unit and
e,en the agency.
genre unit and, secondly, on the vertical, or unit if indeed he is innocent. 1.;mediate law enforcement community. So, it is
to agency head relationship. Another reason for concentrating dissemina-! pot unre~onabJe for the unit commander to
The final judgment in the unit on the analyses lion authority in the hands of the intelligenci locus consIderable energy on this responsibility, Intra-Agency Relations and the Unit Com-
mander
and .mldics produced is made by the llnit com- unit commander is that, assuming he is properh rne! ~o have the effort and any personnel it may
mand level. Is the study produced by the ana- placed in the structure of the law enEorcemenf reqmre, att~ched to his immediate, personal . More than anyone else the unit comm d .
i r II I · 'b an el
lyst p(~rsllasive? Is the dossier assembled a agency, i.e., dose to the agency head, he aloni . pffice. Even If.the report is prepared by an assist- .~l )~ lesp~nsl,le for the qllalit,u[l:he 1'e1a-
(Tc(libl c depiction of criminal activities? Is the will probably be in a position to know wh(~ant or subordmate, the unit commander must tlOnslllps l:lamtamed with other elements of the
case pllt togcther one which would normally be should not receive it. He should have a knowf,' .,:insist on bringing • himself into the l)repal'at'
c , Ion agency. Smc:e he must rely greatly on the per-
acceptable to prosecutor for action? These are edge of "soft spots," if any, in the agency Oll,pr~ce?s d'rectly, freql.~ent~y, and with energy. :~nn,el o~ other units ~o feed his own with raw
all qll('stions which an intelligence unit com- side his OW'l unit; moreover, he and the agend l.t
IS 111 part the culmmatlOn of his unit's mis, fonnatlOn, the ,vay Ius organizntion is reo'arded
mander is likely to ask himself as he evaluates head are more likely to be knowledgeabJe aboll~ pon; he must be central to the effort. The by the. patrol division, the detective b~lreau
. what )1(' ,h.!s.received from his subordinates. the softness of other, neighboring agencies Ii report must feel his personal impact. etc, , 11'111 be. crit"lea.lecuuseB . ( ,
all law enl:orce-
Obviously, tlwre ;re' ()(:~:asionsw}lenhis judg- ,vhom the material Bligh t otherwisebeof il1tere!!,:-..·S.· tl'atcgic" In''te''II'I'g'-e'On' c' Component"
e'
l~lent al?encl~s ~re m()re or Jess llniqlle organiza-
ment may 1)(' "no" to any of these questions even tl~n~, th.ere IS little point in detailino' hel~ei~o-w
t/tough he personally believes that what has been The Intelligence Unit Commander 1 Larger intelligence units say tho
. . . . ,( .
se SerVing th~s mtncate set of relationships should be struc-
pn'scl1lcd to him is valid. There u.re many rea- Structurally, the office of the unit commande ,major " .'. ll1etropo!ttan
! . b, aO'enCles should pllt 1"1
a ug 1 ~lll eel. or how they tllig-ht be exploited by the
sons wby it may be impossible to move the may be ([uite simple. If his unit is small, h: PlJ,Ollty on t 1e asslgnn:e~t of a few well qualified l11telhgenc.e unit commander. There are, how-
matter forward. can operate alone with an investigator or analy{ pelson~lel to a. stl'at~glc 1l1telligence component e\~e]', certa~n steps that the commander can take
designated as deputy in his absence. It can tr: .pr ~ectlOn servmg ~lrectly the unit commander. ~~) .R;\rlJ:o.l)~zel the relations between his unit and
Dissemination, a Commanel Function more ambitious for a larger unit, but size shm«' {flns component ~mght consist of a small nucleus others ll1 the ag,~ncy.
fn any <~V('nt, if his answer is "yes" to any of depend on the responsibilities imposed on Ih; pf more or less mterchangeabJe officers with a 1 ~n par~icular, a syStem?f tyipg the i.ntelligence
these questions, the unit commander has also unit by his superior. He can exercise dissemint;proad ~nowled~e. ~f all intelligence functions lmt 1:101.e ~lo~ely to local precincts may help in
made an important judgment-one which under tion control by utilizing the services of whoe,~ r~d a keen S~nSltlvlty to the intelligence needs sOl1:e J~I1'lS(hctlOl1S. This could take the form of
usual rircumstances means he must now take acts as information control officer. In this c~? the law enforcement community. This group ~)en~(h~ visits.by Officers. of the intelligence unit
anot!wr step in the intelligence process: uis- it wonl.d b~ the information control officer's d\~;~~~l\ld ha~e th~ authority ~o l.evy requirements o p1 ecmct shIft formations, or it could be the
semination. Dissemination as used here refers to d~vlse m.ternal procedures wh~reby repolulfh~ ~olleC~lOn 01 ,d~ta camp.datlOn on the rest of l:l~re pennan~n~ .l:osition of an officer with
to the exposure of a finished int('lIigence product st~l(hes, do.sslCrs, :<lses-:-all those tlllngs that COllies ntelllg:.n~e ~ll1lt-and m d?ing set priori-
s,o hal?On respOl:slblhtlCs in the precinct. Few in~
to thos(~ whom it is dcsigned to serve Of support .r
stttute fil11shed mtelhgence-do not leave 1\,) . or tart,etmg and the begmnmg of analytic telhgence Ul1lts 'would have sufficient personnel
in some way, nnit 'without the commander's official sancti~ ploJects. It would be in this OTOUP that daily to a~ord the luxury of detailing an officer to each
• . ' I' Or weekly sum .' f b
precll1ct, s~) one or two men might be shifted
It is esselltial that this step in the process be or Wrlttcn mstructlon prepared, say, before ttl be ). , . ~~l1es ~r the ag'ency head should 1,.
the prerogative of the intelligence unit com- document's final typing. 1 In! lepa1ed, liaIson WIth other agencies on in- from precm~t to precinct for visits of several 1

mander, lIe is responsible for the product of The unit commander's responsibility to ser~t~ 1gence matters conducted, and the tactical weeks dU1'at~on. By means of such a system
his uuit. for the combined judgments of the f
directly the policymaking apparatus of tD, aus of enfor,:cment units critiqued. In no ':etter target1l1g procedures by the patrol officers
grOllp of persons who worked on the report, agency may require more elaborate arrao4ie?se ~lOUld (/:1S group be considered the cIeri- c~uJd develol~' and the liaison officers could
study, or case. Moreover he, more than anyone
dse in the unit, should be in a position to know
ments. He may, for example, carry the ablif\ Yn
o~ l~e-k~epmg squad of the intelligence unit.
tion of reporting daily or weekly on organiu'i ~1 h.kehhood the main concern of collators
s~rve as condmts £01' getting helpful information
[10m them to the intelligence unit, and vice
wbere it can be most useful-and at what point crime intelligence developments to the age~ ~~ 1 e cl.erks or retrieval specialists would be versa. (See chapter II for a further discussion
'1; to s('rve it up, 01' send it to his opposite number head. He may be in a position to prepare dl r~~ tactlca.l support for field investigators. of methods to develop a flow of information
~ in another agency. If he allows finished intelli- report himself-or. if he is heavily burdencd\ I h ~~e. ~V1lJ, of course, be difficulties in any from other elements of the agency.)
">~." gellct' material to flow uncontrolled from his unit the unit's multiple activities, he may have\ ~IC IVISI?n o! duties in an intelligence unit.
'-~ at tIl(' derision of subordinates, the quality stand- delegate to an assistant or particularly resou~; {~~ °bne th~ng, ll1telligence is power, and power External Relations
ful analyst or to the strategic intelligence secl1~lhl
i'j.'
.-<\ ards h(' hns set for himselE and his unit will e qll1ckly recognized and appreciated by
rapidly rollapsc. He may soon suffer the conse~ .
If ,
there IS one. { earn j
lOse W 10 have les £. h
(.so It t an othel's. The unit's ~ny survey of t!le structure of an intelligence
qut'nres: e.g., a swdy based on Jess than factual Whatever the particular circumstances, ~1$k'lI mand~r i~'lll have to use all the leadership unit targeted agaInst organized crime perforce
data may get into the hands of another law 'en- is a function which should merit the closest ~ .6,,~ S at hIS dlsp.osaJ to keep the strategic QTOUP has t(~ treat the external relations of the unit;
forct'lll('nt agency, which, believing it to be .
sonal attentlOll. J f 'f''I'
t can, 0 c~~urse, 1 prOr'! ~ , ':,l" 11 and accesslbJ
( . h .
e to t ose not 111 it. He will b ~rgal1lzed crime disregards the neat jurisdic-
sound, takes action against an element of the conceived, desig11ed, and supported, embra(e~~l\~\e to deVIse means to move personnel from tIOnal boundaries within which most law enforce-
criminal conspiracy in its own jurisdiction men· ~he analytic and investigative eff?rts of his ~i.'.iIi: ~~up. to t~e other fol' specific assignments. ment ag~ncies operate. Yet, external relations l
O,!:rh as practtced today by most intelligence units,
tioned in the study. The action fails for one
reason OJ' another, but the faulty basis [01' acting
It can set the pace for the quality of the
materials produced in the unit. Needle~ \0 li] Ject: ve, In other words, must be to keep
\0 StrategIc component from becoming a d05ed, are often characterjz~d. by mis~rust
and frequently are hnllted to mformal conver..
or jealousy

50 "" I
:;Ai 51
i
1'1
if
'lations hetw(:en longstanding professional appear on the front pages of the morning new~: f~bjects betw,eell certain designated officers? Or, able t . ,
inthnate'i. paper, There may be political differences whic[,gll!en past Instory, would it be better to t ,t o ll1stltute new or rt'vised d
.., ' I b' sal (The handlh~o' f ' " , pl'oce mes .
keep police agencies apart or, as is more often tht> .~autLOlls.}' y proposmg a series of informal aet- in det '1' Ii:) 0 lest!lcted matenaI lS discllssed
Obstades to Effective' External Relations case, a ptosecutor's 0 ffilce of one political per;. t,oge.'11ers l~r I: h 1:1
t e pt!rpose of building confidence al 111 c lapter VI, See fierure 10 '~4
for a sample 100' which is d ?, d ,page ~ ,
There may be good reasons for hesitation. in suasion may :-eflls,e t? c~Ol?era~e with a city poli~ ~efo.re taJ~mg busll1ess? If some suspicion of da f ' 1:1 . eSlgne to prOVIde
seeking external associations. The neighboring department In a JUrlSdlctlOn 'where the mayor~,~he m,tegTlty of t·he target agency lino'ers on in . ' ta :1se ul ttl any analysis of external fim '£
agemy may haY(' a repILation for corruption so of a different political strive, Separated b\~he mmd of the unit commander, sho~ld he test ll1telhgence materials,) 'if \)

!itl'ong that it is wisest to be wary about all1evels politics, the profc&siona-ls in each agency oftet: ~he :v~ter first before entering into any more certam
R~ciprocal I external anano'ements l"l'lll'eq "
t), lllle
of its structure, If its offkers are not corrupt, find that, even though th~y might wish to ge:c~ml)ltlOus exchange plans? A simple test could den procec mes that do not place all the bur-
l
n
tht·y may h(~ naive or undisciplined, and the together, an official (often unstated) policy deter,' ?e ma,de, Th: target agency could be given Dd the agency to whirh materials are beino'
«lUS('qnCl)( {'s of their mishandling a delicate nny rontarts other than the most perfunctorY,1 ~o~le mfo:'manon ,that would require further passe. Establishin o' ( " (:l
.' .1 b or revlewlllg-) contacts
maller of concern to both agencies might be Finally, there are those situations where ar~ ~ct10n on Its part, lllcluding perhaps the arrest i\ 1t 1 another agency when the relations!' I·'
lono' beer -, 'b d ,up 1<IS
d('eply in jurious to both. agency ('on tents itself w' h the form of exterm>qf a kl1()w~\ hood, !he information should not . i:) 1 ••101"1 1111
matter Tl.' '_, _. ' .
or nonexistent is a d I'
" . e Icate
?\Ic)f('over, physkal factors may justifiably in- contact but not s :;tance, Exchanges of info::R e so sensltn': that Its misuse could be harmful' in' " leI e is llu p~Hl1() however, in aSSU111-
hihit good cornmllnications bsce~t'~ve~c~nJc-,(l@e:ll!J."!;;;':l.-_ll!.<u·.L!'..lU--!,~:,*,~:;:-~. p ace, officers visit back and forrl,tp the releasmg unit, The recipient agenc g the 1\ orst about the new partner and as the
The neighboring agency may be hon'sed in regularly, but the intelligence moved from am: Gould the~l be observed for a period of time t~ song "
goes,,
"willino' on.
him to f"1'1" T'lIe "ao'en('y
de( aying huildings that are impossible to secure, agency to the o~her is inconsequential-often n: s~e ~\'rhat It does wit,h the sensitive information o~lgll1datmg the passage of materials ~an b take
for example, or be laboring under unrealistic more than offiCIal arrest records and newspapf )ecel:ed. Such a SImple, one-shot test hardly ploce ural stel)S wI 'I . ff '
'1" 11C 1, 111 e eet, protect the
workloads that result in the warping of proper clippings. This is not effective external tell; cpnstltutes a cl~an bill of health if the results are Ie . attOnshlp by IJl'ote t' 'b I
, c lllg ot 1 agenCIes ag'ainst '
intdligence procedures despite the best will and tions: it is a sham designed to cover some co(~\'Ol'able, but It,may help the unit commatlder m IS~lse,. The sllnplest and most widely' used
takm in til" ·world, And there is the bedrock ceal~d motive for not wishin~ t~) commlll,li~atf; tp, o,:erc()m~ hesItation in his Own agency and (i eVlce IS to excerlJt '. 11 t • I f
1a ·ena S Tom sensitive file
problem that cooperation between two or more Or It m~~ ~onceal an m;reabstlc evaluatlQU ~!~l~\lde th: Impetus necessary to carry the probe ca:'~ftllly "sanitizing" those I)arts t h a t ' S ,
Cl'ltlGIi ' ate most
agencies (kp<'uds in the final analysis on an ac- the SenSitIvlty of matenals held by the fir~ ~ lIttle flllther, , .;' as to source, circumstances of collection,
u'pt,lble degree of reciprocity, If one of the agency that would be useful to the second. }The Protect' f I 1. ~~a;\ l<1tever. The synopsis or "sanitizeo" sum-
ag{!nd('s illvolwd does not warlt to rooperate 11 Ion 0 nte hgence Information , y can then be passed without fear of the
with another, tlwrc is little that the latter can do Actions To Improve External Relations
!'t - 1
I;
Onre embarked on a cours f J' ,
' e 0 exp oltmer ex-
conseq llences of mishtll1c1ling, This is a usef I
hut kecp 011 trying to Initintc a productive The intelligence unit commander can improt ~1I1a contacts, ,the intelligence unit eonllna~1d~r procedure when dealing with hio'Illy ~el1siti~e
relationship, his external l'elations; he can maximize his cd~lst look to lu5 own house, He must be con- l11a\~r~ or documents which, if re 7ealed cntoto 1

In some rases mistrust or hostility between lection take from outside sources, and he 11l1jl ent that what he has to offer his newly deve!- ~?~l e :onstrued as an invasion of )l'ivac'
agencies is based primarily on tradition, A long- even be able to coordinate strategy against [rj cd p~rtners in the fight ,lO'ainst organized
0r. l1gh~s. It IS, however, time and man ow~r COl;'
standing policy of not {'()op<.'ratillg or communi- very mobile target, organized crime, The fin: cpme Wll! be worthy of exchaJ~ge-or to put 't St~mll:g and whele possible exact cO~ies of file
ratillg with a ndghboring agency may have its task, ~learly) is to ~lcfine those law enf()rcem(~~~ore cr~ssl)', that it will produce SOl1lethin~ ~~e~~o(lJm,~ntecllllate.rials should be used instead,
roots, for ('xampk, in a history of earlier cor- agennes that are ltkely to be of most \'altle(!~,UlllJy "tIllable from the other <1 o-ency To / ' , espeCIal precnlltlOns are essential. (Detailed
ruptioll or political infhwure that has now in tenus of exchanging information and coordi1H: tl~s l~e m.us~ be confident of the ~alidi'ty of I ,0 ,control entitle 1 "I f
features are spelled out in tl
' . le sectIOn
'
{;lct 1)('gUt\ to 1)(' ull're<'ted, Old habits, howeve1', ing strategy and to review past and present po';~~n,lestrlctl\'e procedures, This entails a :oll~ ( normntlOn Control" earlier in tl'
kecjl the ng('nries apart hecanse neither party cies concerning cooperation with them, Hal'irjS&(~l(lble output of intellectual energy a~ ~ ; chapter,) us
TI '
ha~ n'l'xamilwd the sltuadon, In other instances determined which ones are either not open 1~ plag ,metl,lOds are all too sloppy, s~l11e( v~ ~. e tl l~re IS n(~ I~leans of guaranteeing absol utely
trusting r('lationships have been established only him or open only on a limited basis, the ur~hl~ r~dll'ert1~m of the information mana 'el~e~~t l<1t ~,1e rece~vH1g-, agency will not misuse the
l)(·t \\1('('11 ('('rtain units or particular individuals. commander should fully explore the reas~$ Ilf etLon. Fn'st and foremost he must a~ll' _ matellals rec(~Ived 111 some way. It will "'t . 1
be able to I, (Cl am y
In eifert, ('ertain limited channels have been therefore and identify where new efforts mig.~ efi;. IWhether he has set too high the restri t~un " ' copy t 1cm 01 to send them Oil to other
~ 1 I' l i S I
t('st('(! am 1011l)( wort l}'. ,UC) channe S ;lre I ff 11 ! '
pay 0 ,as we as W lere It wau (Stl )e WIse l&e r II '11 1 '1;0 t le movem f e l o n s
" ent 0' materials olltside of his unit ,1genCles not approved by the '." ~
tl' ' _ . Ollgll1ator, I' or
disrr~'<'lly maintained in an atmosphere which say aloof, \Vith his targets selected he can lh1idr. estnC,tl ons, for example, imposed on Ii
1~~ 1 edson, the bucksl1p attached to such mn-
t('IUis to inhibit the development of new open- poll his associates to determine who has perso~i$J on~~nts reports whether or not they rev a I tenals, or the materials themselves, should not
,', or even ofli.cial contacts in the tal'get agCJ1(l~tHme: lIng of the informant's identity? Are e~l
ings. But they arc better than no channels at
<l1l.
Otht>l' apprehensions may lw based on unit
It is important hefore he initiates approacl;(~f (OCU~lents pertaining to a certain m
tbat the imelligJi!I're unit commander have! ~ partIcular individual actually as sens~t' el exte1
t: '
only be clearly marked as to orig'in, but should
also ~ear a stamped legend, "not authorized for
th ' nal use exce})t by ' , , .. , . , .. , , , . " " 'Vit . h
prid~''''-<It' scorn dircrtcd lit another unit-or en precise plan in mind. 'Would it be more fru; t OSe at the core of the file? Only the 1 1~~ th: l~~tcl~ed recipient, agency's name inked in
nl~ander can in the end answer most of tl
UUl
(oncct'l) for such things as receiving credit for rui to adopt a p ,Ley of full faith and credit an, Unamhonzed publk exposure of
. , I d· I eStlons bl t 1 . lese CI ocuments bearing t!' 1 1
smT('sslul jomt opel'al1ol1s, or at least a proper open t le oors WIde to personnel from tIe I.seal' ~ 1e can get help by institutin n , 11S egen( would, of course,
shan' of the resulting headlines, If one agency agency in exchange for a reciprocal gua e reVlew and reevaluation of his 1 ~t' 1 e_move the resp,onsibiJity of the originatin
OPt'tlS a P1'CSS polk>" <wother rnay be scared off -or would it be preferable to suggest exch. t·
On th~ basis of such a survey he can ~11l ~ ~ge~?, although It might wet! be harmful to th~
bl't\\\IS(' the ht'ad is feai'ful lest his materials at first on a certain limited and agreed hst y, make mtelligent decisions and he l;la~~: mchVldllals mentioned in the docnments.
In the last analysis the only inhibition tv

53
I'4I
r:(C,t:IU ) O.-\om/)/I' log olreqllCltJ for informlltion from the illtelligellCe l tle_ I !frivolous-or malevolent-mishandling of ma-
Rlqu('sling ag(,lIIy:1 I iterials hy another agency is the shutting off of formal amendments to the "treaty" will be
lcontncts hy the originating agency. Indeed, if necessary.
DiSposition ithcre h suspicion of illegal use, the best recollrse In sornt' major cities that are alS() State capi-
Imay be to Federal authority. This is a harsh tols. and where many law enforcl'lllt'llt agellcies,
Oaw H'qUI'~t Request Requeslnot
rl'll'iH'r1 "ulljett of inquiry Date filled filled/reason isanctioll for one law enforcement agency to use local, State, and Federal, work in oYl'rlapping
!against another~pa.rticularly where efforts to j urisdi ('tiolls, an organized crime intelligencC'
enlarO"e W!lltllUI1lCatlOll flow ha"e been made- committee with regular meetings and agreed.on
,,(hut i;m<lY be the only available m~al1s of enforc- arrangements for exchange of information may
inO" acceptable standards of professlOnal conduct be a practical device. Similarly, Ft'd,,-ra! strike
.IOIt some elements of the law enforcement forces could sponsor subcommittees on i.::.td!i.
, .
'co III mUll it\'. gellce as part of their 0\\,11 apparatus. Apart
from other beuefits, this device would probably
A Treaty as an Aid to External Relations help toward bett<!1' techniqnes of targeting
against organized crime.
Wherc the barriers against effective contact The institutional· approach to exte;-Ilal rela-
betwcen law enforcement agencies. or subunits
I tions is limited only by geographic proximity.
----I bE them, are based not so much on integrity good faith, and imagination. At its bl'st. it could
fa(,tors but on other considerations, such as be a prescription for regional coordination of
jealousy, personal frictions, or ingrained habits intelligence-and ('\'en strategy: tasks could be
--l that lJa\'c b('come practices to live by, there may allotted. <ll'1'angements made for joint operations,
---J
pe S0111e benefit in what might be called the and new intelligence requil'emellts agreed upon
I
institutional approach. Th is a pproach can take and allocated. Relations beyond the imlllediat('
--I *lany forms. The analogy drawn from interna- urban area in which the law ('llforct'Ulellt agellcy
__1 tional relations of the treaty can be usefully
----------~--
is located will probahly havc to «)utiIlU(' for
I
Jpplied to one form. By this method the head some time on a catch as catch ran basis. Here
------- -
--~-~--- ---~i bE State (agency chief) designates a senior asso- p('rsonal relatiolls will be critical. Intelligence
---;qiate (deputy or chief inspector) to act as plenipo- unit commanders will have to avail themselves
~---.-------~--- --1.
(entiary (negotiator) with some representative of ever)' opportunity of contacting distant oppo-
- I
qf the other State (ag·ency). Negotiations (dis- site numbers, by attending conferences whenever
------'I qussions) are held to determine, first, what mini- possible, by themselves traveling on extradition
-~-----L ~1l~1 set of common objectives desirable. to both trips to make the acquaintance of opposite num-
-- I
partIes ('Un be agreed upon. These findll1gs are bers, and encouraging the latter to return the
visit, etc.
-------, somlIlllllicated to the two heads of State (agency
-- chiefs) and if both parties feel they give promise
---- 11f producil~g e~ective areas of coope~'ation,
a
External Liaison
- j Sfcond seSSIOn IS held by the negotIators to Liaison officers can be key fignrcs in the ('xter.
_____ J~ammer Out a treaty (agTeement).
agT(~ement
nal relations fUllction of the unit. Liaison can
- 1-
I The might cover only the bare best be thought of as extending the unit ('0111-
-----------------efsentials at first: levels of material to be ex- mander's authority or voice to areas beyond his
---- :c/l.anged and rules for exchange; some predeter- immediate responsibility. It can scarcely suc-
~---- - j ~llled
schedule for periodic officia I get-togethers ceed unless it does indeed carry the weight of

,1
-, - -; ~.- ...____ ._T"_~ ~ ~-- --.- --~--~------ ---- -- ---'I't? eliminate misunderstandings and impro\'e the cOlllmander, and for this reason the
__ ~______ ----!;'1l}echanics; a formula for joint press releases in
fUllction should be controlled from the com-
---~------ - hi~e event of arrests or other action resul ting mander's personal office. In a very real sense,
--~.-'---~------ - - ' " :qom the passage of one agency's information to liaison is simply another form of dissemination,
-.-- --- -.---' ~ve other. Naturally, the pNential areas for and if it is done skillfUlly, it can also be another
. _- --- _!&teement are almost unlimited; new elements form of collection .

- - - , - -- - ---- -- - mann " """


~nP?rtunities
be added at any time as long as there are
fnr periodic discussions_ Equally
But what the liaison officer collects he may not

'~~'. '''" k'"d,~",,,,rm,,,,,'oo


. . tclli"ence data. In thIS ) kll' VIOL .I f' necessarily be free to channel into the unit's
Krep Cor a(tJ~t~
' " " ''''''''',,' ",," """",,
1I,ltk ofislilt'
illCmm,lllOll most
USl'U UI\,lUthoflll
' ." h' k,p, .,""> 'h',
ag(,I~(~~S Pa::;I)OS('~' TIll' ufdata can 'llso be used
roo req""""', '"
,re to
-"
plot poten
"""'-
"'" ,.,,, '"
I mu"m"" uf
I< '. ,-;,
'",ki",m,,,,'''''''
""w' • " IS t "act that as cooperation grows,
'and less commitment to the making of receiving point for normal processing through
the system. The information obtained, say,
from the unit's liaison with a Federal agency,

55
127

FIGURE 11- CONTROL AND FLOW OF INFORMATION AND DOCUMENlfS

Activity

COMMAiioER.iHluUGEii~ UNIT 1. All documents and pieces of information must enter through a single point in the intelligence unit and be logged
• ROO/USE
tIlM\\lMTUPIl!! in. The log should show date, time, subject, originating office, and initial recipient in unit.
PASS IlH - --
(I)
TO fiLES 2. All requests for information, whether from inside or outside the agency, are to be logged separately in a request
log. Data <)n the log sheet should include date, time, subject, requestor, and whether routine or special handling.
Routine requests are those covered by unit SOP; special requests are those requiring approval of the unit
I
I
ANALYSTS commander before action taken.
I INfORMATIO" FLOW -
I DOCUMENT CONTROL C£tlTER
f--
I
'-~
INIORhlATIOH-IlGCUMOOS-RlPilRTS g g 3. All documents and pieces of information must be routed to commander, analysts, Of investigators for decision
PASS ON @ : C T
TOflLES \ 1 -----~~E
_------;0 ~I on dispostion after having been read.
I 1 K
T
N
G

rI -- -----...1
r-------- J R ~ ~ The recipients of the documents and information-the commander, the analysts, and/or the investigators-may
o 0) G C
L--I-.-.:-----1¥' CD ~ do one of several things with the material as it comes to their desks. They may read, initial, and pass on. In
L----4-------------,~ A addition to reading, they may make some comments on items in the material. The material may also be current
~~~J-~-~-----~--L------t:==:;;;~~~'G
RECutSTS fOR INfORMATION
RG E
and they may Plake use of it by adding to the information they are accumulating on a current research project,
or a current case.
Q

ROutINE
U
E
S
r( ':i
I :~ In passing the material on, each recipient may choose (or his actions may largely be determined by SOP) to pass
l;
SPECIAl T
S
it to one or bOUl of the other recipients, to send to the files, or to throwaway. The secondary and tertiary
CD filE CLER~S
-----
-----
L
o
recipients must also go through the same procedures (although often the first recipient will have marked the

r
CLASSIfiCATION • INfORMATION
'-----'-I Of MCUt.lf.KTS RETREIVAl G m;i .;\. •
_,'1
disposition he desires on the document).
• AKSI'I!R EXTERNAL .: ~
INDUING
REQUESTS !'
fiLING
flLE CORRECTION
• fiLE I'\l1lGING i .... -------------~--- 1.,;S Ordinarily the handling and storage of material considered to be of a sensitive nature will be under the control
FILE C\lI!I\l{)L
of the commander of the intelligence unit.
LEGEND \ ('

FII.ES
INCOMING INFORMAllCi!.
16i . All filing should be done by the ming clerks. They should classify and index new information. They should be
VACKEr.CARO.AOP)
AND REQUESTS l i responsible for reflling material that has been taken out of the files for use. They should, to the greatest extent
INFORMATION \ AHOO~ possible, be the only persons allowed to pull information out of the files. Where such information is to be
FLOW WITHIN UNIT [ \ removed from the me room, it should be taken only by a person authOrIzed to do so and record must be made
Il'lFORMATION SEHTltt· I of the action-date, time, file number, and recipient.
FROM WITHIN UHIT \ I
OUTGOING REPOR'(\I\.:P· The organization and nature of the mes will depend on the system adopted by each individual unit:However, in
Al'lSW E RS TO REQUEI~\ ' all cases, cross-indexing must be pushed further than merely name files. In particular, functional files should be
established as an essential tool of the analysts. i 'I
J

IS. Requests for information that the information comrol determines, on the basis of his SOP, to be routine will be
·... 1

", ·'1
,i:'.'
sent directly to the me clerks who will answer the request on the basis of specific SOP set forth by the
J commander. "1
I
·1
Requests for information that information control judges to be special will be sent directly to the comrnander
FIGURE 11 I
(or to a person designated by him to have the responsibility) for decision as to how It should be answered and
specifically what information is to be given.
CONTROL AND FLOW OF INFORMATION AND DOCUMENTS

57
!)G
rj
1 r h' !ff i

of tIme e~ta) IS mgder had best not expect sud,li'


' 1)" restricted for passage on1y to the com- d ' . his good faith and credl'lf
mtty 1'" I n ., this case, () f course, tIle cornman el
bility. . HIS c~n:mar:l1 be a painstakingly slo1l'I.::
'.
mane cr.it' ,(·l f. 1n , 'I [)()SltlOn
., to ltSe the mforma-
• I?
wIll I1lH II1tnS.. ( "11 be' an den mIracles, It Wl i I
' h'
don as a test agalDs~ l~eOcan~ot nass it on in
wn' It WI
eval uutive tool, assummg, . 1
process" .
The 11a1son ffi
0 lCer ,
'vill probably find it 1 use£ulli
kee~t~ 1:~ll~~~~'ade hi~:
, I this stlpenor, ' . written account of t le com'l
a useIu way 0 I 'J! remain a luxury to, and has had made to
Using liaison personne, WI I ' : as the value
for most departments u~trl Sl~(' 1 t~l:~~ut become
;~t,me 'II be useful if he has to ~ppeal to hul
of (ollection-in and (hSSemdm,a. budget diree-
'
OhVlOUS to age
n('y heads an t lelr
del's will enJ' oy
COl~:n:l~der
' I
for assistance in ~uclgllblg,
)osite number 111to emg more;
the com'l Chapter IV
e,
I d' 1 f 'w umt cornman man del' s, °PI. t1 e relationship. It can alsol
tors, 11 eec e or two liaison per- forthcommg 111, 1 b 'nst Tvhich to J'Ud!111
tIl(' servi( es of more than one lJ I lanmng ase agal.
serve a~ a J, •
Thus o.

sonne!-t t ley (~,


'[ 1 "m afiord any at a ,
t is ood business,
efficient lise of thls r,are asse , , ~ that instead
the deslTabtl,lty of mo
, vin the liaison officer on)
g If the account showl!
to more fnutful targ~sts, romises of delivery are
l
STAFFING THE
On balanc{', expenen(:e suggtS , 1 would a that the other agency dP f lfilled then scaml
of HCllcling tIl<' liaison offlcer OLlt as or ~ tomers
trave!mg . sa I t)
('sman ( cover as' "
'\S J)()s~iblc in a given to'Jr, Ins P!ogram,
many ' eus should
del"
1 nftlled or un er- u ,
talentsy may
most u
' her doors, F'
()t
better be apr ]'lec1 to knocking
'tUal1y, successful use of ah'halson: ,~\
\
, , on;1 INTELLIGENCE UNIT
"he' (ardlllly plallned I) / t?C ! ,u mt tcomman that a 'ency, officer will depend 111 ' gTea t , part
e!, s on
home1S unit!
O\U'
II , 110uld sllcnd most of Ius tIme a c e g .. knowledge of what goes on m 11 1 ' d Ii
( S. , to be anllel- SPecial selection p1"oblems !07' each categ01'y-Co1l11ilanderJ investigator) analyst.
froll) which the gr~at~st r~turns :l~as long been 1 Id b bliged to spend at least a t 11T 0'1
He s lOU eo k ' breasi
j>'lt('d or where mlsslOnmy WOl 1" d co his time in his own headquarters :eeplllg; it 'lily) meticulousness,
Highesl criteria for' selecting pmonn, lin all categorie" inteWity, in' elIee'"al! "lalytic ('ai'''''
ll~'gle:'le(l. Repeated visits at ?fikcs ,lacl
, WI'II pro)a I hly evolve Into
~ ~Jairs~ of new developments, longstandmg nee, S, ~~1 ,
Personal interview
oj>erat1l1g ' 1SOC h Ie ,
k 'nto recently elaborated requirements: He, ~s, a 61
imjJortant step in selection process! especially in determining motivation.

~~; ~~tYal~: org~nized inc,..a~'Hequirem'nt


(On the other hand, an oc('aslO~a ~ (1)Cras11' ons J emissary for hIS U1l1t s CDID1
Most effective selection requires realistic testing) using oll-the-job p?"oblems,
. may I)revent mlllor A' 1a vorking (,
u4 i
w,~'l
friendly ptCllllses 'll, a pri';e collector for the Changing nM",'e of Clim, for genem/i" and 'peciali" (maly,t"
front festering into ugly sore,s.) 1 gOOb(ee'11 Httle
' "1 t \ ,here t lere las fm\sana . 'llector he may pump
co 'b at dsy
away thIS SerVJC6 . The academIC commumty as ,ource of ,peClallSt nnaly"s on con,ultmg basIS,
',I~i
,lSSlIll1ptlOl1 IS lla '. ' the llast the liaison
contact ane COt
1 ' )]lel"'\tlOn In
,
ofHrer 'will have to spene ,\ (On (
1"
,
si 1erablc amount for. have
will ""ood been his 1."sgument,
part 01wort 1 e if he u,
lW h'l bnngs In f'mtecat'eer
dgency
1. I;ments 0' ii'zgencedevelopment
,
Unzl, mu't take aCCOUnt of 'pecial pr'o b I,,,,, posed by prr,onnei req1lire,
occasional gusher. [ ;

'. ~t INTRODUCTION I
l,
A critical category is that of the analyst. This.
,•.. { Any supervisor setting out to filJ a critical and chapter will put considerable emphasis on the
•. ~ensitive position in his organization asks him- analyst since he is a member of a relatively l'ilre

I ·~elf two basic questions: "Is the person I am


.fonsidering for the position capable of doing the
~,Job?" and, "Can other officers work with bim
species in the law enforcement aviary. In many
agencies, the analyst will not be a transfer but a
professionaJ hired from the outside.
r fffectively?" In law enforcement (as well as in
l~any,
The investigator ea tegory poses yet another
other OCcupations) there is aI:ways a third selection problem, Unlike the analyst, the in-
t ~UestlOn: "Can 1 trust the person 1 am COll- vestigator uSllally will be n transfer, Bnt, he
I 11dering; is he clean?" And then, from the point
II ~f \'ie~v will be faced with unique challenging require-

.I·•
of intelligence: "Can this man think ments, In addition to being ahle to conduct an
1n~lytlcalJy; can he assemble and structure pieces investigation, the inve,~tigator in an intelligeuce
jf 1Uform,~tion questi~n)
to answer the w/:y?" unit must be able to work on a team with aUa-
~n
.' i lookll1g at the staffing of an mtelhgence lysts, develop new approaches to the inueasingly
,sntt, personnel requirements can be divided sophisticated illegal enterprises 'If org<mizec1
F.~PtQ
re
fo~r general categories.' 'Most important is niminals, and, at the same ti i" draw satisfac-
k llnlt commander, SelectiuQ' a commander
t~ying
tion from 'making investigations without making
,j,qsllally becomes a problem of to match arrests, The selection of investigators ~md ana-
,~~e capabilities of a senior member of the agency lysts is generally tr~ated as a common problem,
l~/th
~i the unique requirements
. of the position. since, where possible. these functions should be
58 ~1,1 thought of as interchangeable and to a great ex-
. ~l'
59
l'\,~
tent requmng the same level of intellectural gence unit commander have impeccable in.!i
i J har~ess
such a pe:'son to a specific and narrow
equipment. The fourth category is information tegrity credentials. In great measure he will (OJll sp~cwl.ty lvl1ere ~llS burning, uninterrupted in- 5. natll~'e .?f an assi?,nment to intelligence:
control and clerical. This group poses no should) set the tone for his unit. He must nOll I telest lIJ the subject can be an asset, but this is It ,PIO\ldes the Interviewer with some-
llniq(w recruitment problems and is not only symbolize incorruptibility by his own r~11 J seldom the case. . , tlung to talk abollt.
discussed in this chapter. cruitment policies and personnel managememt I ap~roach t? ll1telltge n ce personnel re-
,<?ne
practices, he should be instilling in his unit ai i cJUltment IS t~ begl.n ?y setting age limits quite The interviewer must. ;»f course d
than re 1 tl .o ' '" 0 more
deep sense of pride in its own unassailable!! Jaw ~nd th~n IdentlfYll1g the candidates with a careful1
ae Ie autoblO
'bJ
:r{.\e \'.' He 1 Id
S IOU , as
THE UNIT COMMANDER .I
b 1'.'
Y as POSSl e, ('ompare the autohiooT'l )h
integTity. The agency head can expect no less ol! ; genuIne tlurst for. self-education and sel f-im-
the intelligence unit than that it be clean. i bPro:eme~t. Intelhg?nce is a mind-stretchino' backoTollnd wIt 1 the ("()l1tents of the candidatt"s 1 . j' h .' 1 Y
CllOO'>ing all intelligence unit commander re- . . '. ( " He Immal'Y
I llSll1eSS, Its targets chmwe its metI10cl J ' '" M ~ ll~\' estlgatlOl1 or personnel jacket
(plirt's a positive au:)wer to all the selection ques- i · . n ' 0 ogles aTe
I, lI11provmg constantly and require more 1 . j ol'eover. the mterviewer should be " , "1 .
tion!) llH,'miotled above, bu t the rather special Jevel with tl I' ,pH.'pclrec to
GENERAL CRITERIA FOR STAFF I", innovative ideas to cope with the .. ,ane mO,1 e b 1e app lcnnt. He mllst know and be
character of the position to be filled makes for a SELECTION " f ' glOWll1D" S(1)/11S- • • 1'1
(anC{!(t a out any , . 1
, , I tlcatlOn 0' or o'ul1lzed crime 1'1 0 I'
somewhat (liffelcnt weighting of the questions. I f ' I}' 0 • lese are aspects 'I .' Caleer (tlS(lC vantages iml)1icit
•• f 0 Illte 1gence work which b ' 111 t 1e candIdatc's 111ov'n . . , .
The right Ulall for the post of organized crime IvI uch of the same general cntena as apply ld ~l) )e~I'n . . can e used both as I1 e 111 llS t b e 1)' Ig UltO ll1telllgCl1('e W()l'k'
, f .,. .' ." J ,,1 0 temptatIOns to the b" I . . 1 . "
intell igellcc unit commander cannot, of course, selectlOn 0 an ll1telhgence Ul11t commander WIlli i and als 0 ; I' . l1g 1t ccll1dlclate ino' " J epm ~o to open 11ll11Self to prol>.
he found hy any process. All sorts of limits, obtain in recruitinO' the balance of the unid } " d' 0 as sdnp e conversatIOnal topics de- ;:-'1 QbllestlOl1S on tl11s score. In other words 1
• 0 i slgne to gao'e the candidat ' . IHle est be complet I ' f i I . , le
which are familiar to any bureaucracy, are built staff. (See figure 12, page 71, "Criteria fet) ichalJel t:l , , e s responslVeness to • '
JICY nnc! ng'ency t,..J· "
e } can clent nbollt 'tgency
• ,. at en d 0'f' c1lapter. ) ~rl" " 1ges. po . '
into the system of choosing, The selector may .Se JcctlOn, 11S IS not t( j , , ' 1 all1tlOnS III personnel
practIce.
find himself with imperfect choices. As he men- say that the commander should seek to fill hi!/f i
tally juggles the attractions of what may already ofIkc exclusively with subordinates who ti;ill\,"i The First Step - the Interview 1 , Obviously,. any good interview will eonccn-
he a smaller list of (lv(lilables than he would have as be does, He will, on the contrary, need al~~l It is almost al,v b fi'
:1
ate ~m probln?' mo:iv1tiollS. This is especially
wisbed, he may have to give lower than desirable
, " ' , \ ays ene CIaI t ' I I Iml~oll tant for mtelhgence work where the r _
manner of men and women who can look a:!lhealthy amOllnt of I'" 0 .lI1C lIC e it \Val ( s arc more often t1 . J' • e
marks for some q ualificalions like cooperative- intelligence problems from a variety of perspee ,'jstaff selection pro p~rson~ IntervIe1~ll1~ in the tinO' 't )t' b le SatlS actIOn of 11l1ravel-
ness while satisfyillg himself that, "nobody can tives. But whatever their individual views Q:/ !supervisor's confidec~.\S" I t:y?nd ~1I11?lllg the a 't'
P,1
b' 1 0
" , lem, than they are mOllet"!' l'
« y or ( rreet
lClratIOn 111 pursllit of the 1" , J "
fault X on brainpower." Or he may be thor- skills, they must have a strong sense of integ\'il~f lone, the interview ~e~~1~:a~111ls chol:e IS a good ar I C 11111na. 1 here
onghly confident of Y's integrity, but suspects and high intellectual level. As far as beini' lplishes what the WI" tt q e sOmetlmGs accom- , e, a so,. o~her qualities to probe for chat few
people wlllmg-ly nneT openly disl)lay 1<, ,
that r's taciturnity hides not wisdom, but "comfol'table" with his subordinates, a unit cOI1{~tiveJy. It al1ow5 t~ en te;,t can rarely do objec- among' the ' ' . '. oremost
smugness. mander is better off if he has some "prickn;'and his dispOsition t e ql~~ I? of a man's mind t ' se IS ~netlClllollsness or scrupulous at-
pears" in his basket, who will not hesitate I,; :(in this case tacklin o;~~~l1i:~e prol~osal at hand ,entl~n to de,ta:l. . "Without this qllali,t , D"ood
However, if he has any misgivings whatsoever
about the integrity of X or l', he should no suggest the unorthodox approach and challen8[, Fhrough unequal a g o nce 1\ o~k) to filter
1l1t.elligence dlsnplmc can quickly dissi
~YtIC studie,s can founder and cases . pc b' c a-
ftc ~n
longer even entertain their candidacies as accept- traditional assumptions, than if he has },.,'gro tll1dS or tnedi~ une~en educatlOnal back- Jeeted b t1 , , ' , may ere-
cre
able. The intelligence unit commander has to collection of agree~ble, think al~ke yes-men. ,,' })revio us supervisors. tness reports from er
y 1e prosecutor. A law enforcement
be-if nothing else-vigilant about the possi- A search for bnght, tough-m1l1cled personnqr The most fruitful . ',' offic: who has previously bad invcstigntivc ex- '.
penence should be asked t l ' . <
bility that organized crime will be seeking in any can present difficulties. The unit command~prepared for by b th ll1t:~Vlew IS that which is , 0 )rlllg In a copy or
' d ' 1" , 0 ,pal tIes A useful . copIes of old field reports lIe h .
way it can to corrupt the Jaw enforcement offi- S1loul d take care to avOl certam personall [nent is that the cand' 1 . " reqmre- b ' us wrItten In a
cers of tIl(> agency. There is no room for com- types who, though they may be impressive li.prief autobiooTapl~ IC at~l submlt lt1 advance a ~ll s~qucnt or followup interview" this 'repor~
promise on this point. Any weakness or softness first acquaintance, will not have the flexibiliri, pages), WhicltSllOu rd(usua .y
no more than two can I e used as t!1C basis for a discussion of per-
in the demcn t of the agency most concerned for sOllnc1 mte· II'Igence wor. k Tl1e 0 illleer \\l'fp1ent
,'f" about his car contaIn .at' . least
' on e state- ~~ln~ wo~k habits,. collection technh}ues, thor-
ghness 111 folJowlUg Hj) kl(ls "te' L' • •
with the pt~netrative strrttegems of organized his mind made up on most issues-no mat,lft ffhis requirement jer expe~tatlOl1s 111 the agency. . " ,,, '. ....01 ,1 11101'0
crime. and any weakness or softness in the ele- how polished that mind may be-will havedl~ll 1as sevclal acIvantnges: ex.actll1g measure of a candidate's t~ndenc t
Il1Cllt of the "genry charged with the collection culty dealing with the unexpected. If, for tl; f l.It discour f ' tl~ll1k .a~1d work with precision, Ci)mmerciul rest~
and maintenance of the most delicate of intelli- am{Jle, his investioo'ation has led him to conclli~, ',I <; It ' ages nvolous applications' ale ::t\allabJe. Because of cost factors the
, -. may surface d" ' worthwhile only if more tl1an aI' If Y are[,
gence matcrials, would be perilous to the agency that a certain target is surely the wanted culptt; ca~1t not re < I ~n~enSI?nS of the appli- ·I ' c larJ( II I 0
as it whole, in a complex case, he may tend to overlook f l')' 3 It . . Yen e 1n hIS personnel file' caneII( ates are being considered.
! . IS Or It may 1 I '
ThllS, inlt·grity is a primary consideration in dence that begins to suggest the contrarY.:.ll degr~e of hell) 1 )e, c eP1endin g on what
selel ting an organized crime intelligence uhit may have more confidence in his own intulll~ 1 its )re ' le may lave received in Investigator Candidate Testing_
rOHllnander; it is critic-al. In making his choice than in the facts. At the worst, sHch personalh,JJ \!, I , paratIon, an early O'1iml)se of his
CapaCIty f o r ' . 0 Use of Field Proh1em
tYI)es become zenlots or crusaders, sing'lem,in d(lJj;,~
<

the Sll per\'isor can give nothing away on in- J; ~


" It 'lIn pre WrItten artIculation'' .
. 1fi/~tcr t~1e in~tiaJ interview, a prospective
'to
tegrity ('\'en if the scales holding mental agility pursuing objectives they have identl~ed ,> _ sses on the candidate the spednl
and ('ooperatjv('m~ss are imbalanced, There is thernselves with little regard for the obhgat IOnc hurdle is not l' ;nte .Igenc.e l11Vestlgator shows promise, it ma
one other obviolls but nonetheless highly critical of the llnit or even the law enforcement, kgrllulld illvCstigat'< Iscussed in this chapter-the full field /e Wlse to ll1volvc him in a <;tructurcd field pro~
' apter VI. ' Ion of applicants. This is covered ill
reason for insisting, as a starter, that the intelli- as a whole. It m:ly occasionally be possibeI em (or the designing of an analysis model)
Such tests reqli 'd' - .
1 re COnsI erable advance prepara-
60
61
tion if they are to reveal much that is useful or
new about the participant. For example, a field
rl
that the candidate is sufficiently well known ani' itackli?g the problem. What answers he comes
regarded by the intelligence unit to merit aJread,! luP. WIth, of course, are less significant at this held. In the early t
cle I I
f
' s ages 0 selection there are
problem might be put together by an experi- a measure of trust, a good test can be devised 0;1 /pOInt ~han how the~ wefe handled and what ~r. y t lose who may have the potential fo '1
enced investigator using materials drawn from a the basis of in-house materials. /lmgenUlty was shown 111 shaping them. Unless a pOSItIOn and those who clearly d I r t le
circumstances T1 ' 0 not une er any
variety ()f past investigative activities. A rather The purpose of the test would be to obsent! ./seasoned anal~st from some other law enforce- . I' ' . Ie latter are shaken out with
1 e atlve ease accordin '
simple, noninterrogative problem could be de- how the candidate tackles the challenge of sol~l iment . agency IS :mder consideration, it is not standards. If the q1.' ~l.tt~ mOlf·e or less .uniform
vised that WOli Icl require some passive surveil- ing an intellectual problem in intelligence. Thl! iexpenence t1~at IS being tested in the circum- • • I, lies 0 an applIcant
test might consist of a single question: "By ex·! lstances deSCrIbed above, but imaginativeness mall1 111 doubt after tl " " I re-
lance, address and automobile lkense checks, , b le ll1Itla cut, he or she
puhlic library research, an examination of official ploiting existing files and documents in tht tesourcefulness, thor~u~hI:ess, logical use of can
.
e
'.
passed along t . . . .
0 pm tlclpate 111 the more
recorcis and the like. The applicant would be unit's storage facilities, can you suggest ways ant iresearch tools, and self-dIsCIpline. l~tenslve 1I1terviews and field or analyti' .
Clses A . , c exeI-
ohliged to fill out two written statements at the means of establishing whether there is a rebf : 1 . b ssumll1g, however, that all these barriero
conclusion of his field problem: one, a standard tionship between person X and business Y ani,; The Selectio p, lave een successfully overcome the sel t .. .')
now on the spot. , e c 01 IS
iuvestigator's report, which he would be given illegal activity Z?" Or, depending on thl! ' n locess
at the start of the exercise; and two, a comple- materials available, it might be made more COIl}! l. If the ~)erformance of t'~o or more applicants ab Up l~ntil this point he has thought positively
mentary form in which he recorded a log of his plex: "Prepare a statement describing the lik1
,111 an y ,01 all of the screel1lpg devices described ~ ou~ t Ie candidates who were sllccessfully mov
activities with an explanation as to why he de- lihood of there being an organized crimina; above could be. measl~red against one another it 1I1g a ong ~he selection process. If he Ihas beel;
cided to lllove on from one investigative point element active in business X, and suggest ar' ~I'ould be relatIVely. sImple to decide which ;ne personally ll1volved ill the va .
to the next. There should be no "school sol u-
tion" to snch a field problem, but good discipline
approach for deeper exploration of this subjeal ra~ 0ne
n
1 the best Job, and, other things being
complete ,vith the goals you would hope II q a, ~le should be certified to fill the vacancy
views and testin 'S '.
in h i ' ! ,
' nous stages of inter-
g , he may even have envisaged
WOld~ n~I:l~~t ey~ ~lOW each one of the candidates
would r('(plire a fixed time table for completion achieve in such an exploration." In both easel ( lit .thiS happy state of affairs may not alway~ well with Geo~' ,l1S apparatus. "X would work
of the exercise. the applicant would be given a timetable, s~l ?~tal!1. CandIdates may appear one at a time or . '1, ge. Y looks as though she's just
Clearly the two written reports would be prod- rific files would be made available for peru~ ~~:.egularly t.hroughout the year so that satisfac- 1:
~~ to take over information control from
ucts of great interest to the selectors. They and an on-duty analyst would be assigned to t~l I I YcomparIsons cannot be made directly. The ~~y so we could put Harry back in the field
would, if the exercise were well designed, indi- candidate to answer specific questions as to lit! ~e eet?r or sele~tors, then, wiII have to develop . " etc. But, faced with choosino' amon .
eral demon t bl g sev-
~~~~e;ously theIr own sense of standards and
b '
cate the candidate's capability for advance plan- availability of other files or resources. t 01- 0 f ten turns s ra y capable applicants the selec-
negat' H '.
ning (or his tendency to bolt into situations), for The on-duty analyst's role would not be th} j 0 them. The momentary need to beef up fiel 1 ,IVe. e must W111now the
careful husbanding of his time (or, contrarily, of coach or adviser, but simply that of inl~ ~n overtaxed staff should not be used as an e . to one or two, so he starts lookin for dis
for wasting his energies pursuing nonproductive preter of the available data base against whi~ ~xcllse to lo,.ver the e!ltry threshold for new- luahters that have not hitherto surfa!ed or if
leads), [or thoroughness, clarity, attention to de- the candidate was working. The on-duty anal)] ~~~ers. An Ill-prepared investigator or analyst t :ey lave, were regarded as irrelevant or . ' .
tail, etc. A good field exercise report would also
reveal something of the candidate's imaginative-
ness and flexibility-whether or not he had fol-
circumstances, his main task would be to resp05 ri
would volunteer nothing and probably, in m~ yl .over the long run, put a greater bu;den
liS (or he.r) more skilled associates than if
to questions ]Jut by the candidate, "1 can't t9 /S 1~ at remall1ed unmanned until a qualified
I1lficant
I' I

number f
,I
.
E"l . ' .
x lal,stlve negatIve scrutiny finally
p oe uces one or two candidates with the le"st
'bl .
0 POSSI e ehsqualifiers (and they are
1I1S1g-

"
lowed any set path that finally had hit the selected you that. You have to make your request 1110} iP~'leant turned up. . on y. possible at tbis. point) and tbe prize' is
target. specific. If you do, I can tell you whether \~J" lh . p~'oblem of a different nature arises when awalded to the most 1l10ffensive
you are looking for is available or not, and 11"~1 ele {S an e~barr~ssment of riches; that is to T.he i~lsidious effect for such 'a technique, of
is, where you can find it." :' lY'I~~I~n an I.ntelhgence unit has a number of c~lll,se, IS t.hat by emphasizing the search for
Analyst Candidate Testing -
The role of the on-duty analyst in this form ,~l~ ~ ~ .applIcants for but one or two places ~~::~~esses 111 the candidates, any slight deficien-
Use of Analytic Model
testing is two edged. First, he saves the time~ ~ l~ .la.lel put t~ make a choice. On the sur- . I otfed tend to become exaggerated in the
Testing an analyst candidate by involving him all concerned by pointing out where wanted ~ ie~e t l1S l~ an enVIable condition for the intell'- ml11e 0 the selecto.r: Two spelling mistakes
or her in the constrllction of an analytic model
ce
terials are located. The applicant need ~1) \'ro ~11lt. The commander can hardly ~ r~l~embered.on the 111vestigative report exercise
is in many ways a more delicate selection tech- spend valuable time learning the particularfilt b~ ng ecause whomever he picks wiII probab1
1 ab'.L. very qll1ckly slides into scepticism as to X's
nique than the field exercise. First, there is the and storage system employed in the unit. 511 eh~~l~~ ~ sou~d member of the team. Tru~ a lhty to handle the English language. The
practical problem that this approach requires ondly, the on-duty analyst can be called 01111eXer ¥.'
,ut Will he pick the best of the lot b °In-dut y anal::st. working with applicant Y noted
the lise of real files about real or suspected crimi- the selection officer to give an account of h~\ 5~lec~~Sl!1g care!ul self-examination of his OWl~ t lat he was lug'hly
. . . "
. "b
. cunous a out the promo-
nal conspiracies. If the candidate is not yet a tbe applicant handled the assignment; that} 1Tl Ion techlllque? tIOn posslbdltles 111 the unit so Y may b 1
g'er. OlI.S IY am b'ltIOUS. . " e e an-
whether the process came quickly and easi:, . IUS~e natural human tendency under these c'
I .
full-fledged member of the Jaw enforcement At the worst this kind of
.d ft' ances is to find lr- t11lnkl?g can lead to a form of amateur psycho-
ng('llcy, or if no full background investigation whether bad leads pro d uce d eVI ent ruS lllor I' reasons for eliminating one
has been completed, there is a risk, albeit slight, and discouragement, whether the files r e app lCants, not reasons to select one ~;::IYSIS of the applicants with bizarre results:
that the files could he compromised. Fabrica- . .
ham/led wIth care, etc.
e OUt of th 1 f '
re b e ot or the Job. This is a far
or n:
m , I :vonder why Z is still a bachelor?"
tion of names, addresses, etc., in existing files to But the principal product for the selc an t~U tIe, a,nd often subconscious, process ObvIO~lSly, 111 all these cases the selector is doing
overcome thisdifficllity would be a herculean concern will be the applicant's answers to U tion at practIced at the moment when appl'- the lI~llt. no service .at all by straining for reasons
and probably uneconomic task. But, presuming questions posed and the logic of his manner papers are filed or early interviews ar~ t~ el,I~I~late qualIfied candidates rather than
Pl11pOl11tll1g the best of the good.
62
63
. . . ---,.-
I:
.-,,, ,. ~~~ • • • h _ _ _ ........ ~_,~~_. _ _ _ _ _ ._" _ _ _ _ _

:r--~..-,',j ... ""<'T-... '4"~'_'~~_ ' ."'""-'"".. ."._ _ _~ _ _ _ ~.-.---..-~~~--«"" ,--~

.,

Selecting the best out of the good is, of course,


no easy matter, Very often the choice will have
!i
have to fight hard for freedom to select frou/The interchangeability of at lea t
among the best investigators in the agenqJ ,staff greatly enhances the flexibi~it so~e, of tl:e appraisals of t;he state of g. ' .
to be made on the basis of fine tailoring, One of v\There he can find none that fit his needs, nl! !lOrmally a small staff, Personn I y b vh~t IS jurisdictions or rei')
,
or a l11zed crune in their
Orts on t lle trend f ' ,
the candidates will have a range or attributes may 1lave to fiIg1lt even h arc1er to get t h e ng ' If"" "
It Ii" .to 1I1veStlgatlOn when cases ar '
e can I e' shIfted acti vity in the area b I S o " cnml11al
more suitable to the particular opening than his , f'
1llre rom outSIde,
I I
I
"~tages, and then to analysis as tl
' e 111 t lelr early
'f' . investigators or dra~vn ~;~~ ~~I tl~e soundings of
competitors, If this is not the case, however, the The intelligence unit should look for traine('begins to accumulate, le 111 OimatlOn may be used to res 'I leI Sources. They
determination become a little more complicated, investigators, In most circumstances, the uni; 1 exploiting public l:ee~~I:dl c~mplex problems by
About all the selector can do at this point is to will be relatively small and will have little tim!: Determining th A I ' ". tutions and II'b' , Soother official insti·
{ lanes. In sho t 1 '
start searching for qualities that were not neces- to train investigators on the job, The difficul~ .!, . e 11a ytlC DIScIplme Needed applying IOo"ical de I " l' " t ley WIll be
, 0 e uCtIve technIques eff t"
sarily qualifiers at the beginning of the process, nature of organized crime investigations demall Smce the 1l1troduction of l)rofession I I 111 any context to tl ec Ive
, 1 . Ito " ' d ' " ' a ana ysts le task of 1 I'
Some or the most telling in this regard are the expenencee personnel. Investlgators should al ,0 rgal11ze crUTIe Intelligence is a r I ' I (ultimately) exposing' "I,nrave mg and
' J I ' e atIve y covert cn1111nal activity,
range of a candidate's interests-what does he do ready know the CIty and at least the street lere' pew P lenomenon, there are more tlleor' b
. " I 'I' I k'll Ies a out The Specialist Analyst
with his spare time? "What books does he read operatIOns of org-al11zecl cnme and the mak \1" lie 1 SIS to apply than there al'e I '
I 1', " I ' ana ysts In
for relaxation?-his candor as well as his self- areas o~ such activity, Hopefully" they wi!l halt rOSI~lO~l .. T l~ llse of, accountants and attorne s Not all analysts are e '
confidence; without resort to self-deprecation, served 111 one or more of the prec1l1cts wInch a~ I,~l plCcmg together c!Isparate pieces of ' f y more technical e' 'I
( xp oratIOns and
,qUIpped to handle the
r
how honest is he about himself? What about his major operating areas for the organized crimin~ ~lOn to [onn a finished intelligence pro~l or7 a- sary to achieve an understand~ 0' stue les n~ces-
capacity to synthesize many and varied inputs; But the trained investigator also presents!tp°re often an actionable case) is not 1 ,uce ?r as business frallels s " 1110 of SUdl tlungs
( ,eCunties m ' I '
can he take fragments of a conversation or the problem in the selection process, The best tx: Ir:"
enforc~men,t, but the employment l~lque 111 Shady financing and ' al11pu atlOn, and
various elements of a biographic file and get is an investigator who has done well at ro,1 ~:Ists, SOClologIStS, anthropologists ~ e~o~o­ for otherwise lega'l b ~CCOunt111g arrangements
, ( US1l1esses WI, ,
come to generalized conclusions rapidly but tine work but is not satisfied, He should respon( ~lstS: ~tc" certainly is, What the~ I syc o~­ CrIme has moved into hi "h 0'" lel,e organIzed
undogmatically? positively when the more complex investig11to~ sfe~lahsts, able to do for an intellig~l;lre su~; more or less covertl' f oear and IS operating
There are, quite natur<llly, many other quali- work involved in fighting organized crime i YhlCh skIll fits which problem area? T~~r~l:~:e specialists such as yIn t lese areas, highl Yskilled
, accountants and '
ties or characteristics to look for that may be discussed, He must be a man that can both ta~ 10 easy answers to these questions but it ' " may have to be call I economIsts,
, ' ee UI)on N t II '
more appealing to the in1.lividual unit com- direction and have sufficient initiative to devrl~~le to make some generalizatio;IS wI " I~ POSSI- telho"ence ' ' aura y, an 111-
l !=' unIt commander must look to t'
mander who must do the selecting than those avenues of approach to a problem over and aboisfrve as pathfinders for intelligence u~~~ t may e ffi~lClent way of " ' ,le most
listed above, or that may more precisely measure those suggested, The trained investigator w~ I£ancl~rs-who, after all, must deal wit~ ~omi he is fid
con ent that the t
gett1l1g such analysis done
'
If
the applicant's capacities for the opening in
question, The following are offered here only
seeks only the rapid arrest should be avoid,s\tuat:ons ~nd the local characteri / oca
He will not be able to live in a world where!~gal11zecl cnme as they see them, SICS 0 f ~~~l ~~:~, s~r~:s~!c~~~1 ~h;:~1~e~ng~~~lJjl~~fJ7~~~~
because they are in themselves important attri- complex investigation might go on for mon~~he Nons '. likely to come alon " ee d UP, no other group is
( g an enter the v h
butes for the good intelligence officer: a broad and where the ultimate arrest is the respoI1\1 peclahst Analyst may decide that it is best to . ,acllum, e
range of interests because this may signify a bility or another unit; that is, the case he be# ITo begin with the least s 'I' using borrowed personnel ~et the Job done by
flexible, thirsty mind with a wider than average
social interest; candor about himself because
this is a good g'auge of innate honesty and in-
would be turned over to others"
t'l
I
The intelligence investigator must be able(~ve fonnd that the use of s 111
ivork in harness with the analyst, He must~~~aduates is rewarding, Such r~~~l~re lberal arts
(
ent, many intelligence u l11' t '
peCIa Ized
e
I'
ana ytiC
ti:
country
enforcement
no such specialists
ag"ency' I -I o~ some other law
, 111 t le ocalay

'harness lIe may aival a e 111 law enforcement


'I bl' '
If th
ere are
, re y on ' I'
tegrity; capacity to synthesize because successful willing to take leads from the man (or wom~y~l~ng women, are quite sin/ I I 'irequently sultant basis, If he feels ISP~CI~,~st~ on a con-
intelligence depends on getting at the core sitting in the office, He must be able to parM~,~{nvaI they may know nothi P Ybana yst,s, , On continuing' problelTI th leI IS 1, e y to have a
g , en t le 11l1lt com d
of a problem no matter how dense the trivia pate in the analysis itself, to help guide thea }ggy, or police work or tIl n a out cnmmol- must enlarge his staff d' I man er
. "th d , e l a w or e I ~ ~rect y to cope over
surrounding it. lyst in-turn, He must be factually correct II ? ology of data analysis b:lt i ven t le time with '
I'
t us complex ehmension of crimI'nal
.. reporting, But he must also be able to de
, , '" II
eIhgent, precise and all ' '
' ( ,XIOUS to expl
f they are
.
bel laV1Or, '
The Special Problem of Choosing the Intelli.
gence Investigator
a capaCIty for at least "first-cut' analYSIS 4'f. Y uncharted waters the
interpretation of the meaning of his findings. \ ",rortant contributions' t
ore gen-
~ c,an Soon make an~I~::il~I;~~is:OciOlogists and psychologists or
Under normal circumstances, the intelligence " " 1~!By -II
fact, he should relIsh tillS aspect of 1l1vesUgal ':1 anl arge they should I I ' ' ( 0 cllm111al analysi
s, al1alYZi~g i~te;g~~~I) bbeelpr0!itabI~" deployed in
investigator will be transferred into the unit work, e Collation I)rocess d I ( ea WIth aspects of 'd ' laVlOr WIth a vi "
1 I' an t le pure an I ' f war s detectmg weak links ' ,ew, to·
from the detective branch, He will have gained The intelligence commander in many ,w 1leh is the ' h (a ytiC unc- com bina tions for the arm ?rgal11zed CrIme
Ie' searc for reI t' I' " measures F ' . ' P,P IcatlOn of counter-
experience in the mOre traditional modes of should think of developing his unit in SI re an ll1telIig"ence " a IOns ups,
investigative work, He will be part of the~nor­ , , yor ' operatIon IS newl d '
In Inonty OTOll" 01 example, If two or more ethnl'c
way that at least some of the H.lvestlg-ator IS revampino· its apI) I y un er '
, I !l.." 1 alyst ,0 ( roac les nonspe ' r , o' ps are workmo' too'ether '
mal career structure, looking forward to further analysts can be mterchangeable, (See C13[-,.; S can be lllvaJ uable in I ,,', , CIa 1St marnage f ' , 0 0 m a
d ~ 0 cnmmal convenience but not of
promotion which likely will take him out of the III for a discussion of this point,) In mosua. ~sIs-referencing systems b e tesIgnl11g filmg and evotlOl1, the dynamics of such a
"/ al a yti es attuned to tl
intelligence unit. The area of conflict thus
posed is that of the special requirements of the
this would mean that they would both hal n«. I C process, The anal " I
( IIIust y , ( ( YSIS t ley d
be badg"ed or sworn officers, It WOll\d also ill ..,.; ,lI1volve charting' I)attern f ' , 0 ',VI
Ie
'II ~~~t~S~I~~ ~~~l;d bt ,studied,by a spe~aril;~~:~~~~:
, (ill' ~plracle I ( s 0 " cnmmal a ' ura ImperatIVes of the groups with
intelligence unit versus the career service of the that the analyst would have filled an l11ves 10' ~"': f s Or egal and iUegal 11 Id'" ' , con- , VIew towards better understand' o· h
ag"ency, The intelligence unit commander will ,
bIllet ,
before bemg selected f"or h'IS curre ntr~"'\.lO organlzed , criminal , TI 0 1I10S and Inter
0 - the combination hoM mo w at makes
s, ley may prepare be likely t 11 ' together, or what would
64 o pu It apart, In like fashion, soci.

65
('.:".\l.'

" ,.
rf~f the academic community is to follow the
:: I,

)1'0-
oJogists can often be helpful in counseling un- senously dIsrupt normal workmg routmes O\'~: fessional literature, say on criminol 0' I as ~n experie!lCed specialist in his intelligence
'd 0f tIme, ' Some 0 b' I·· l °oY I or man-
dercover agents on acceptable behavior in the an exten d e d peno
' "
VlOllS ell ngement and select a local allthor
,t f ' < <. 1'1 lose wor'
k un~~,. Clearly, he ll:USt apply a rule of reason.
roles they must assume, and psychologists can amples are: the redesIgn of an mtellIgence nU1l1 .lnay be relevant to criminal intellig'e 1 I' Fust of all, the lIl1lt commander will be be'ter
" fi)' d '1 I I ce or po Ice
able t~ harmonize these two quite different c~n-
assist in developing techniques for the deli- I i ,
eXlstmg mg an retneva system, a ong-ran~ administratlOn and write him directl b I'
1 d ' " \' Y a out 115
cate business of handling recalcitrant or self study 0 - travel patterns. 0 ea mg cnmll1al fi~ research, There are countless v
f f t b' cerns If he has what mio-ht be calleel "comp,nt-
' .
"h til 1 ays 0 nng ]' 0 (l
important informers, ures as a means of determmmg t e nature ~ _about a discreet encounter with m b, - f h me~1ta ~zed projects" in the planning' pipeline,
'II 1 ," 1 ' . em ers 0 t e
~h~s slmply means that discrete studies of a
As noted previously, there are no hard and c
1 ega actIVItIeS, a survey oc rea estate owuer(&cademic community of course b t l '
fast rules for the deployment or even the em-
ployment of specialists in an intelligence unit,
h ' f' , , 'f
s Ip ronts m a given sectlOn 0 a major C1\11 .hIatter to keep in mind is tllat n
Not to be forgotten, 0 f course, IS 'I
"f ' "

t le k''md«'1'tactics are used they must be , ab 0 matter ' "IV, lat


u t Ie essentIal
1 0: }uUIted set
other
data that can be set aside from the
collections and from the daily routine of
Hut one managerial principle should remain , I' 1 I ' , , ove SUsplclOn
research whIch may not be e I1'ect y related t 1fhe l)urpose of the visit must al b I' " the office, would be assigned to an inexperienced
, , 'd 'd -! ! ,ways e exp lot
uppenuost in the commander's mind, He must crlmll1al acts, but IS nee eel to proVI e strateSl~and lluchallenO'able' a search f
' , d' F S ( .\
' II
or Inte ectnal !~holar t? tac~1e. Or such persons could be
for countenng orgamze cnme, 'or a tate (' . ~ssistance for a law enforcement p' bI
0'
have a comprehensive plan as to how he will < <
f tl
iven an 1l1vestlgative assignment almost wholly
" J' ] k' 1 l k "I ' 10 em 0 O'rav-
use the specialists after the most tempting and mumclpa tty ac 111g a oan s lar' statute Wlttity and delicacy Only a fe
, Ed'. I 1 '
h 1
W SC oars would
0 ~ev~ted to pU,bEc sources, such as library
immediate targets are dispatched, If he has no teeth: a study o~ the effe~tl~~n~ss ,0 Iife,rent lO~~ebuff ,suel! an ~pproach out of hand, lefelcnce matenals, newspaper files, etc, '
permanent, continuing use [or specialists, he had shark statutes 111 other JUllSel!ctlOns m1ght ha~ i Havmg tdentlfied what al)l)ears t b . 1 , One exan::ple of such a study would be a statis-
best not hire them in the first place, They are more 1ong'-range Impact '1
t la11 many actlV1([~scholar ' "I ,
(or scholars) on a local 0 e a ta h en ted ' tIcal analysls of telephone toll records, This
probably too expensive to employ as nonspe- " I
more trae1ItlOna to ll1te Igence Ul11ts,
']J' ' sliehi\. commander'I
may find that lIe
l campus, t e unIt
'I h' , w?uld se,ek to determine the time and frequency
cialist analysts. Even if they were so used, they , . ) , < can aVal IS Ul11t
study mIght best be done by an attorney or la\.' qf the serVices of a gTaduate st d WIth whIch calls are made frOI11 a known num-
' b,l, , u ent or two on
wonld probably soon grow restless and move on pro f essor un d er contract or on a consul tlllg Ill.\ spectfic projects that threaten t ber (the analysts would not even have to know
'I I ' ] ) " f ' 0 consume too
to greener pastures, ~he n~me o[ the person in whose name the phone
<
WIt 1 t le 111te Igence Ul11t. much of the time of his pel'ma ff S
'I < nent sta -, ,on1e
The imaginative intelli,I;)'ence unit commander - . match ~~ re~lstered) to other phones outside the city;
with nonrecurring requirements for studies in Use of the AcademIC Commumty fi ld f' between the graduate <
st d '
U ent s pnnClpal
"
lat IS, p~one calls that would show up as toll
, " " je 0 lllterest (or a subject related to his dis-
depth or the occasional analysis of highly com- The resources of local or reglOnal UniVetsltl~. sertation topic) would b . I I b calls, ThIS could be useful where a new tele-
plex problems can sometimes avail himself of sII~U ld b e exp1Olte ' d for specla ']' d · !
Ize ~ersonn'v.enient arran gement would e 1C ea, ut such a con-
phone num?er of interest to the intelligence unit
other community resources, Most major mu- aSSIstance whenever the budget permIts, $[{Jnly rarely N
~':!
h 1 ,probably turn up
ill! bo'oeS we11 , an d has b~en ?Iscovered, The telephone number
nicipalities have more than one law enforcement , ,
pnsll1g pools of talent can be tapped by '.)fhe '
student ,
_ teVert
d e "ess If (,
analySIS m1ght be an initial effort from which
agency, It is not impossible that where two or imag'inative unit commander if he is willingr A k OI S ll, ents 111 questIOn fmd the part- leads could be developed in other cities, N um-
" ,./ vme wor expenence for t l ' ,
more agencies are working together in full faith spend some tnue expIonng such schools, partl(\; '.(L d f 1e Ul1It rewardll1g, bers frequently used in adjacent suburbs would
,j fie see s or a more permanent
and confidence, they could share the costs of lm'ly those WIth , modern departments 0 f CTllli
r f f _ atlOnsh'Ip 111
re J' ,
be of greatest interest, and could lead to a re-
nolog-y manag-ement pub I IC ' a d" , ,,\ le "I utllIe may have been so\"n E'sta) I I'ISIHng
' an
finding one highly specialized analyst between m1l11strat· " ' ,
~u,:st ,fo~ survei11ance by the agency in whose
them, Or an accountant, say, might be agree- systems" sciences , soclOloo-y etc, Conce ucemlClllternshilH'IOu ld'1I1VO ]ve an agTeement
JUlISchction the new telephone is located,
able to entering' into a retainer relationship with scholars workin; in field~ ~hat at first gIan:- ~wcc~ the law enforcement a_!!ency and the , In ~uc1~ cases, only a minimum background
b 111 VCl'Slty t ' ~
one or more of the agencies, Such arrange- seem to have little connection with law enfol 0 permtt a graduate student (or for
JnVestIgat~on of the student would be necessary
ments al'e obviously not as satisfactory as having "
ment llltelltgence can be Identl " f i ed wor'1l1g k' at matter
' f ' even ( ana. d vance d underQTaduate)
a,nd the nsk of compromise of official materials
the full-time services of such a person, but they a variety of disciplines, They, may be fou~d ::t~~-~ so~e of hi~ c,nurse :equire~ents by (~f ,any) wo~I1c1 be measurable, "Where such
may be all that enn be defended from a cost the permanent faculty or 111 the ranks , I S asslg11ed wltlun the llltelligence unit Illlllted st,ndles ca,nnot be isolated from the nor-
standpoin t-anel they do have the advantage of graduate students preparing advanced,.,);~l~ht even be P?ssible to extend this prin~ mal w?rk1l1~ routlJ1e of the unit, the commander
keeping an analyst experienced in intelligence dissertations, ,II I 0 the preparatIon of a study which, on the mnst, If he 1~ to protect his unit, undertake a far
work on tap, Approaching the campus is a delicate ,e land, the unit needed done, and which on more extenSIve background check, even for such
A variant o( the retainer relationship is the if the intelligence commander has not aJrear'le, other hand, the university would acce1 't a temp?rary employee, In the long run, of
lise of contract employees or consultants when established contacts or friends who can ~/~n lllput to the stUdent's dissertation, ) as ~ours~, IE the young scholar is tempted to enter
particular needs arise, This, of course, may be the way for him, He had best not blundefln,; All s~lch arrangements would necessI'tat ' l1~telhgence work, the background investigation
costly and is often time consuming for the agency the dean's office looktng ,
vaguely for ad' Vlceal-{ s t!un'lng k'
through of the iml)}1' (t' e a sen- , WIll have more than paid [or itself. In essence
thatwishes to let a contract, Much depends, of who IS , undertak1l1g , specllC'fi k' d
'U1 s a res
f ,IVed by t1Ie unit commander H ca IOns 111- . then" muc~1 will depend on the assignment tha~
course, on the rigidity of local laws governing that might be usefully employed by an in 1mary obligation protect tl'e ' e ml~st, as a the, mtelhgence unit commander is able to
£" t
the letting of such contracts, hiring tempOn'1Ty gence umt , target ted on orgal1lzed "u en me,r ' t 1 y 0 Ius unit. Howeve'1 'f111I egrlty d and
< delmeate for the interested, part-time scholar
employees, and best-source agreements, Gen- may arouse all manner of latent and not so la ~ ~rance procedures as str I, 1 Ie emands ~ fin~l w~rd is necessary on the intelligenc;
erally speaking, this kind of arrangement is most suspicions as to his rea] motivations and cle",ured for permanent pe ~l1l1101US as those re- ~l11t/ul11vers1ty connection, So far the discus-
satisfactory when there is a specific objective an atmosphere of hOStlhty , , that, even t IlOUghI)J au ,_~e good yonner scholars fr
rsonne " Ie may discOl11'-
Sl?n, has centered on the simple problem of ob-
task at hand that either requires special skills justified, deters scholars, who would othe[\~'~e law enforceOment;r f _o,m ge~ng a t~ste of tmnmg, or borrowing, intelligent minds from
O
unavailable within the agency, or that, if tackled be interested in his needs, from contacting h~~~oress lose a promising eSSi1?dn , f e may m the the campus to assist in intelligence functions
by the incumbent staff of the agency, would One Ideal , way to begm " a dla1og wit )J
'I1 a pOTII' {
cane I ate or 1)laCemellt
and hopefully, to attract some of these minds o~
,t,
."\
66 :~
67
(I
a permanent basis. There is a great deal more tive and purely housekeeping functions, to) '!\lmeliorated by ceremont' If 1 '
that a healthy relationship with a strong and 1
SlI d (en
' I 0 f'" ClVl'I'Ian " personne I may hI ,'hension among the oft'c'es, 1 t "lere, IS 'Ire-
arnva ap)
, d for some tune, ' ReSlstance' 'II t 1 els t lat CIVIIHln " l'
ingly intractable problems
civic-minded university faculty can do for the reslste WI not on, kids" constitute a threat t b ' ' W HZ- some as they ivould may not be as worri-
intelligence unit, It might, once confidence and co, me from badged personnel in the intel1igenJ foE the badg'ed force be' ea 0 esta 11shed members appear at first g'la 1
, , ) ! c USe 0 f t 1 le ed ' I as all hands understand the differ nc~, as on.g C

respect is reciprocal, become involved in the urat who may feel the~r temple has been de~ !advantages, then he must seek b ~lcatlOna and are not permitted t ,e,nces 111 detail
training process of intelligence officers and ana- crated, but also from higher command echeloJ ipossible to uPbTade th d revel y means Over imag"ined l'lleq I" 0 hm b01 resentments
suspicious of civil service employees clill1tir i Iments and level~ of his se e lIcatlOnal require-
lIa ltles
lysts, Training is a particularly difficult prob-
Over the long run, the i~tel1i ' ,
the discipline of the agency's sworn officer ranJ !merelY o'ets aOTeement fw~rn ,j~ersonnel, If he
f~ lem for most intelligence unit commanders
because few police academies offer more than a
few hOllrs of instruction on the subject, (See
r." f ' I I
between civil service compensation and bene~ Idegree level say lIe 1"1'11
{ I
0
Ie there 1S any conSIderable degree 0 dIspari~ rquirements for sworn 0 ffi ' 0

' , ,
01 ralSll1g' entr

ContInue t
ance re-
ce~s to the college
1l1ander will probabl fi cl I
point from
dam to t .
a managenal j)el'sj)c t'
'
elminate the em I
gence UUlt Com-
, y : n t 1at the most sensitive
, ,
C lve is Ius free-

~: chapter V for full treatment of training in


inteI figence,)
rates and those of the sworn officers, the ll~ ,resentment from those S
tility to mixing might become severe and e\~ lin his shop who did not 1~~:~, llcers c~/rrently 0
ffi 0 encounter tory civilian memo
) • • j" "
If) °lyment of unsatisfac-
ers 0 t Ie team In i

l
f'Ji
~~i"
As the specialties needed for analysis of orga-
nized criminal activities become more abstruse,
unit commanders will virtually have to hand
emotional. I 'a degree, So he must wo 'k I t le se~vlce \:'ith
Despite the potential frictions inherent { :that officers already on ~ t~ make It pOSSIble
intermixing sworn officers with civil servicea[1 ~o do so) be given free ~~e (a~d Who ,wish
oca Itles Clvl\ service re 'ula .
vide virtuall
in these j'UriScJl'Ctl'O ' I
'g
, Y perpett"'j J'ob
, ns w lere the
"
"some
trons operate to 1)[0-
protectIOn, and it is
I b
j
I
~,~.
selection procedures ']1 b most e a orate
e necessary Tl

I
tailor their own courses-and this can often be lysts, the game is worth the candle-if for rl :opportunities, There are Feder fO} edUcatIOn,al WI
#r< COlnInancJer will rarely 1 I " le
~{ done best by employing the resources of a uni- other reason than that few Jaw enforcement ag(! able for systematic npgya d' f al moneys avml- posing of the ser~ices flave t le luxury of dis-
;t\ versity faculty, or indeed by funding course work des have as yet the skills on their sworn offici If he neglects this phas U}gl ~ Such personnel. ,
Simply not worked out well" b '
0, nn analyst "wI
_ ,10 ~as
1
rosters that would enable them to combat Of1 gram, he may simj)/y o/t 0 [lIS, ~ersonnel pro-
1
,te', at the university for particular members of the or her to anoth ' 1 Y tlansfernng lum
unit. lJsually arrangements of this latter sort , dCrime
mze ' , 11 mo d ern ana Iytic
Wlt ' tee I' I ,
1111qll~ Plent of his on-board s ,
rans errll1O' the I'e sem- ma b ' ~l, e ement of the agency. There
otll~r p:r::ooF~~:~l~;el~~eni~s ev~n
,0
wii! require considerable give and take between The techniques of civilian analysts can lend ~ fivilian analysts to the ,~orn p,elson,nel from the 01' slots in
the university officials and the law enforcement , I cnme
' '11'Igence unlt . 'lJ1to fi etd.l~\ '~laled
-, rookie patrolme ll1commg- hlg'hly C'Ie d en-
il"\,7 orgamzec ll1te F' a special trainin 'effort ,e must eIther make
agency-for example, an agTeement to waive investigation hitherto untouched by traditior{ ~irectly and arrgressiv~' I,n~lly, he Ulust deal ized skills of gb 1 to mcrease the speciaJ-
b
<t
e
""l
prerequisite courses for police students, police officers. Even more importantly, it~ prospective ilUbalance WIt any present or ,
COlUe a proponent f
on- oare Sworn personnel or b
e-
~~ ,
One or two intelligence units around the coun- turn the fncus of an intelligence unit away ff(~ levels of sworn officers ~t\:e~n cO,mpensation aO-ency or (I ' 0 autonomous status for his
anc b, , epa! tm en t, separa ted fro J "
try have moved even further than this wi th their exclusive attention to assisting the street inm He must become all ad CIV l1 serVIce analysts, serVIce system with full 1 '.', ~ t le CIVIl
university contacts, They are experimenting , " 1 Jf
gator toward (hrect support of the mISSIOn} 0 deservino- officers wI
'vocate f or the 1
' )rOmotIOn
' vested in tl Unllg and finng pOwers
with brainstorming sessions in the company of the agency head, This redirection of emph~ that of ~nore high~O ar~:Ol,n?- work parallel
to ideal for la~; :~-;~~l;:~d, ,SUC~l syste,ms are
trusted and respected, acaclemicirins, The ses- may take some time, but it can be accol11pti~! tice versa. Once ao'ainY pall CI:11 servants-or critically vulnerable to thlt agenCl.e,S which are
if well disciplined minds stay at the task and1 a~f the peculiar diff~~-e ) an\ parttcula:ly in light
sions are informal, usually consisting of the unit
commander and his immediate subordinates sit-
ting around a table discllssing their knottiest enforcement duties,
'
spared the normal interruptions of traditi0 ~nd police officer rati nces Jet ween ,CIVIl service
Jot be an easy proble
ngs
and salanes, this will
of organized crime b t he corrupt1l1g practices
tIe
,
1 leg1slative
If the aD"
, u t ey may be fa' ff'
future of some' '1' ,1 0 111
Junse lctrons.
intelligence or management problems. Often
1
Encouragement and rhetoric will not by th ':F1timately he Succeed m to sol,ve, !3u:
whether ,
l~1tO
oency IS fortunnte enourrh to be m
such a statllS by local Ie 'isl~ti ' ove
d
the guest plays the role of c1evil's advocate by selves bring off a successful combiqing of J )~oll1e measure of ~ \or ,not l11,bnngmg abollt .tIve authority 11" g \e or execu-
proposing ways and means to meet the difficulty sWorn officer and the civilian analyst in a si!1\ -that he demonstrate~U1 ~ IS less Import~nt than upon the int~ll~e~l~~onal, responsibilities fall
-ways and means that may be highly unortho- sh~p, The supervisor l~L1St ~ssist in the prOCj, 0 a troops that he IS trying, ever, He willI unl~ cOUlmancler, how-
dox by traditional Jaw enforcement standards. n:
to insure that the marnage 15 ore of ~ h"~)-f.TfIE SP, _ recommending the rem
lave to exerCIse
I ,great r~stral11t 111
' ,
The purpose of these sessions is not necessarily one and a less of a shotgun affmr. It wIl! hL, T ECIAL NATURE OF STAFFING personnel. Should he ~~a of any, o~ Ins civilian
to have the professor layout specific solutions to to be his Jeadership genius that puts togel!l; HE INTELLIGENCE UNIT out an iron clad c f ~ve precIpitately with-
specific difficulties, It is rather to stir the think- teams of analysts and investigators as sugge5iz.' The message I ld ' , ase or lI1coml)eten ' 1
feasance ao'ainst 'T - ce 01 ma-
ing of law enforcement personnel, who may be in chapter III. This will be a direct confront: at the intelI' S lOu b,e Couung through clearly il1volvin~ ~;Ie ag~nCIVl ,Ian eI~l:Ioye~> he may risk
becoming wedded to old habits and comfortably tion technique that can succeed only if t I " re responsi~1e~~e nnlt command is the officer , 0' cy 111 a CIvIl SUIt Tl'
familiar approaches to intelligence or manage,
ment difficulties-difficul ties that are resistant
Iysts rapidly prove their mettle, There ar~o(l:iIJ amalgamatio~
devices he can use to ease the introductlOn) f SUbordinate
o;n
any other for the success-
k the work of different types
;::~If be worth the gamble if the e~pjoy:~ i~l~~
e or no use and cannot be readil t, t
But under circumstances where th~ ~ga~s errhed.
to traditional methods, civilians into the midst of a professional t elp from the s ~vr~~' He mayor may not get recently been switch d ncy as
enforcement body, He could, for exampl~1 Ily thorny p p hi nnel b~reau on this poten- within the jurisdict~o to ~n autono l11?US status
THE PROBLEM OF THE NONBADGED
sist that the newcomer be administered Ve to acqtl" , rO ,em, but In any case, he will stiff resistance fr n" ~ most certamly after
, . " d ctl11t IumseJ[ 1 •t I L ' ' "1' om polItIcal sUPIJorters of the
her CIV11 serVIce oath m the assemble pr e local civil ' VI 1 t le regulatIons of CI VI serVIce system 1
EMPLOYEE serVIce com " ,
of all future colleagues~as a way of emplI :rate effectivel I mISSIOn If he is to b t' d I a new lUe and cry will surely

In some law enforcement agencies, where that even civilians must be sworn, t1sdictions moT' fr~ t;nay be that in certain la~:dI~!a'eck ttlP'l At the worst, things will be Jegis-
,ering Jevels of~eb IcfitIOns wiII surface over
, 0 t le scattls quo I
there is a longstanding bias against employing But in the 10nger run he must work to the chances for , , ' ante-ane, of course,
nonsworn personnel in other than administra- , ot Vet' ene ts and ' b ' to ' gettl11g another crack at au-
come institutional problems that callIl lI1equities ' JO secunty than
III campen' t' nomy WIll have been forfeited for '
Sci lOn, These seem- This worst ' , some tune,
68 -case SItuation is tl1r~ntioned here only

69
t,?t
as a reminder of the importance of being right other portions of the pictuyre until there urI patrol traffic narcotics I ' .
about acquiring new civilian analysts the first enough for a warrant, aJ:l arrest, an indictmelllt-t intelli~'ence ,~ork is so's P a:lll,ll1g, etc.; and (2) ever he bo'oes'In tIe 1 aO'eney All
. d' 1 I' ! peCla1lzed that fe lli ' .
t lOugh the skills
time;
. that is, at the point of hiring, not of firing'.
"
Tlle anests ane1 111 ictments are a mos.r alWa)l~l eers do it well, and those that do < w 0 1- depart th ,<,
, ,e gam may be Import
b "
1)
made by somebody else, usually at a tune aulti kept where they are bec . had best be who remain, probabl 1 0'" ant. Jt:t to those
Career Considerations for place .unknc)'V~n to ,the ,intelligence professional!"! etc. For the civili~n a~:~IS~t e~l~e~Ien,ce cOlInts, brio'ht ollic'er's . Y OI1t)l::r than C0Il11)nrably
111 coneSl)Ol d' I" .
I cou:se , move-
b
Intelligence Personnel IntellIgence IS often, 111 short, an anonymow!{ ment from one division t y, where in the ag'enc' l ' 1 lUg (lVISlons else-
·
b US1l1ess, d '. '1' b' '; , '
an It certam y 'I.S a usmess wheli ',I agency may be ,111 iml)ossl'l ./.
0 anot ler 111 a] ,
I mge TJ ,.' , y, le also has an oblig'nt'
The intelligence unit commander soon recog- · . ' )1 Itya together S lere are two basic tIl' 0'"S • ,< IOn.

nizes that the personnel management problems success cannot b e measurecI statIstIcally or bl j commanders, when the " , '" . . , ome mander can and must d 1l1b the Unlt emu"
,he encounters ~re likely to be qnite different headlines, or by the awarding of medals of valQ!' 1ingly intractable ['lCt'S oYr.·11ecogl11Ze these seem- First , ()f (all , 11>e must fi10'hn 0 for ,such-subordinates
' ' ... "
, ',, < , Jureaucrat' J'f
from those of other elements in the law enfo'rce- Three months spent on a study of racketeerill;" j to accept them philoso I' II (Ie I e, tend positions in 111'S 5h) b II lard for 111gh ranks or
- , , (p - ere t1
merit agency, 'Mention has already been made in the Ivholesale laundry business has lilt);f Jselves, "Well, all intelli~ uca y and. tell them- on the wits of the me; I 1(, case must l'C'st

of the special situations that can be created in glamor potential compared to the highly expenlJ, ducks anyway; they pt'Obe~~e people ,are, queer cannot res~, as note I 11 <llf1C ,wol11en involved. It
and highly publicized detective work which lea&('fwhat .they are claino' if t~ Y woul~ln t g'lVe up .
the nllmb.( Je f: 01 e" on ('lrl'e"t ., S t atlstlCS
' .
those jurisdictions where there is a mix of sworn
and civilian personnel in the same shop, But to the apprehension of an axe murderer. !:lmissioners:" This i~ too
'With this gap between the pace of intelligcme i An intelJio'cnce unit co (l a 1st/Ie an approa, ch.
/rl~ol~I,d all be C0111- aPl)l'chended'In tIe
or even

0'0 by r'tl
, el s 0 org'an z 1 '
1 . . '. < 1, ,~'c CrIme leaders
Jlll'lsch c t'1011. Months may .
there are more pervasive career peculiarities his , . d " .. f", . mmanc el' sh(" I I 1 b 1\ 1 lout a score S '. '(
~ealities; that is,' tha;. th~' l~l:a~ to rest on the
b
snbordinates will have to face that spring from actIVIty an actual apprebenSlOl1 of CrlmInr ,ian aggTesslvc personnel I' ' ,nl. C 1ave

the natme of the work itself: and the pre- offenders in mind, it is up to the unit commanrldloperate under different po 11.C~ even If. It must 1l1volves are an exceptional! 0 d~els and, analysts
· 1 I:' f . I, f I cone ltlOns from tl y ta cored group and
mium placed on continuity in the intelligence to c1eV1se ot ler ways ot: satls yll1g the ps)'cK,;O t le agency. He should I '.. Ie rest could probably be do'
e
needs of his subordinates, One practical ani, lown unit enCOlll"lge tl 'be es Plt the cost to his selves els h . 1l1g much better for them-
profession, . ' ( ,
obvious approach is to keep himself thol'ough~ lmake a run for o'l~ry' 1 I l l s 0 'lcers to
< le est o·r h' m . ew ere 111 the aO"
professions. To use tl' . ~ bene y e~r In other
..
First of all is the circumstance that, by and
large, unlike most law enforcement personnel, informed about the .uses to which the intel~lla.n occasional assrgnm~n~e s lOU/I., pres: hard for tive imj)a'ct on I . 11S ~lgument with any eifec-
11S supenors f
gence produced in his shop is put. This m~iihis best I)eople' l~f all moltt ~ 111telhgel1ce for
c • < .
intelligence professionals rarely enjoy concrete 11' 0 leer IS 0 . be confident that his seJ .. .' () co~n:se; he must '
deed produced an ex . .~ctlOn POlICIes have in-
c ,
triumphs in the conduct of their duties, A vice mean no more than reporting back to the ami lm?v~d onwards and Upwards h n~e 111 awhile
squad officer may anticipate personally arresting lyst that the study he produced was taken 110llt ;nllSSlOnary for O'ood int lJ' ' e wIII become a must hend every' eft' ~.eptle~llal team, Second, he
noxious individuals and subsequently testifying ?y the, Chief. to :-ead, Or it n~ay be that in taUl1 b e Igence support wher- '.
l11telhgenee ullit th '
OIt to 111sure th t ,'J'
" a· 'V,lt 11n the
mg w1th a JUlllor attorney. ~n the prosecutOlf j , e careel of an offIcer or a
in the proceedings which may remove them
office, he learned that a·declSlon had been ma~ I l'lGURE 12 -c' ,,'
temporarily from scciety. Not so far the intelli- , rtte, /0 [0)' selection of inlelligl'llce unit staff
gence professional. A'patrolman may be quick- to build a case agaill<. crime figme X or qirr~'1 Essential
Htghly desirable
ii1inking and aD- evenhanded approach to a street nal activity Y, based on his investigator'S effolli' }.Integrity_ Desirable
LI I I' j
' \ ' ; PHonesty 1. Fle:dbility_
brawl satisfy himself that he has headed off a r. e cannol assume t lat l1S l)eople wlll natural I
1 cesonal candor 1\"ondogl1J a tic I. Persl'vl'rance_
dangerous conflagration; he may be told as much know the,se thing~ because he does. If he l!Realistic about self Broad range of interests Not easily diSCouraged
sumes tIllS, be wlll only demonstrate that }1" 2, High illl It ' Opellminded or frustrated
by his precinct captain, Not so for the intelli- 'k d' a I e eetllal tapacJty_
gence professionaL A district attorney may d oesn t 'now very much abuut the \'ast 1116 J Alertness 2, Special 1l10livaticJll_
savor his name in newspaper headlines the day ences in human personality, So, he must ~i Inquisitive mind Draws ~'tisfaction frol11 2, Planning skill-
d' Imaginative problem solving Good l1Janar,-el' of time
after the major criminal figure he has prosecuted hy himself, a sort of feedback 10op-articuJaur; 1 Particll'.1r desire to be
is found guil ty of conspiracy charges. Not so as best he can the connection between a pi~J! ~. I 11:<I)'tical a t' 1 !\' intelligence officer
for the intellig'cnce professional. Yet, in the first of analysis, an investigation of some monthsj>l~ i Think~ I'P,lttll( c- 3. Arliculall'_
• L'J ' oglca ly
and last of the examples above, the intelligence or a stlirly and the consequential event 11'1111·1 I \
Capacity to svnthes'
C' , Ize 'I'ritl's well anc! cOllcisely 3, Self.C\iscipline_
takes place somewhere else far removed fro'/i apaClt)' to hypothesize Speaks well and conciscI y The "self-starter
professional mai have contributed, if anI} indi- personnlity"
rectly, the essential input to the vice squad's the intelligence unit. He lllUSt go further;~1' Meticulousncss_
tactical plan or to the prosecutor's brief. must make sllre that his superiors and fell11 ~horough 4, ResourcefuJnl'ss_
' I ! ,v ' 1 ays alten'tion to I ' The "digger" type 4, Coopel'ativC'lll'ss_
The point is, obviously, that the relationship o I1ilcers elsewhere m the agency une erstam lI'f"'l Precise in h 11' (etail "Where there's a will Capacit), to work wdl
, , h ' ,1 anc Ing data
between the painstaking work of'the investigator connectlOll, and that they appreClate t e [lllx'i ' there's a way" ' with otlwrs
or analyst and the ultimate unraveling of an inv~lvecl., , J,
organized criminal network or the indictment Fmally, the Ul11t commander may dlseovert~t~______________ 5. Fast Jearner-
of a gang leader is seldom evident, Intelligence the exp~rienced l:er?onnel unde~ his comiU~f(! Essential chara~~~~--~-'-~'-----'-'~'~'---' ___ ___ ~Uick response capability
one of tile charactc ..st~lOllI(li be conSidered just that' the canu' J t
~ ~
f #

aCtlVlty, 111 other words, may rarely have a recog- are so hlghly specwhzecl that theIr advancetlltr! J --'----- --.- .--.--
. , . ' 1 l ,', fiight)· D ' , as ICS s louie! proba!)1 ".' ' I t a I' W 10 appears w' k
nizable outcome that is personally satisfying and 111 the agency may be Jeopardtzed, n n,,/',,! ' ,~slrnble'Desi1'able cila1'acte'" y not ue appointed, La on any
. , ... .:. ~ qualities and tl miles. Should be Con' I, I
rewarding to the professional. Instead, small agenCIes they can be caught between twO CiPLIl Trade'offs "I' " lUS not all of them arc necessary f SI( ~Ie( as complementing the otlwl'
' . ". (1) 10 '1'1.
d"bulld(" " e POSSible with' )'" or successful careers' , JJ'
pieces of information are pieced together to make fl lCt1l10'
b...
bureaucratIC ImperatLVes: es.
k f II less well
III cae I bundle" of Hi hI' D '"
g Y eSllable and Desirab1
III IIlte Igence,
I..,',
a portion of a larger picture. Othel' officers, vance slgl11ficantly In the agency an officer Ill'fl Forceful ddCV~JOPCd capaCity in on ' e c lalactcllslICS, and between the tw
' . en ,,'/ S b an skillfUl I' category can be ma I ' 0
other law enforcement agencies, may contribute l:lave a vanety of career expenences, sU;i u sequent tmini management can offset some weak ".' (~ up for by great strength in onc" ,
, '1 ng can be applied ill some cases t ' ,ne s 1Il the secondar), characteri~;ics ,01 mOle of the others.
nil n a weakness i t '
70
.1, 0
n 0 a strength.
."
"t
71
';' '
>J
nt to )articipate 111 t
. t11e train!;
·1
'" varied as possible. Not ~n~y even years can be se £Ii Is from all elements~!
civilian analyst IS clS '1 rly restless Splrtt, ing of middle level 0 lce r',7iI0 has worked 10nJ
' . I 'I to still t 1e ove . . . A serO'ean t , .
does thIS 1,' P , 1'" of the mteillgence the agency. on be 'iven a year off to carr}
. 'nts Inn enmg . '
and hard per~1aps ca r. "gl is cleoTee. Dependin;
but also It preve . (. I sts and lllveStl-
~,\rl re l)ossible, ana y A
, Itywor k LOt 1
. t the ol)portUl11tles l~,l
arteries. ,,1(' .. , lly exchange roles. n 0 " rl
pI ete ul1l vel'S
gat01"S should 0('caS1Ona "' I' long investigations '7 of the U11l, I' . ,
on the She, f' tellio'ence proeSSlOna{
officer who has done seve~a 'I '1 to a narcotics f I
on gamblltlg
'IJl'oblem.
. .. n be sWlte le(
'1'1 Cddes k'-1lOU11(1 c'l'vilan
Ie
'
analyst Wl0
. 'll"ac'y [or months or
I
1 1 ment 0 1In commander
flexible (ep o~
, 'I 'e It IS up to tIe .,
0

al e t leI1 :ts those ol)portu11ltles.


he exp 01
how ul\
" " 'I, Chapter V
has !llappec1 a large ronsp ' ,

TRAINING AND
I INTELLIGENCE
i
i,

AjJprl'Ciation Of value of intdligence' to law (mforcement agency requi1'es three-pronged ;rain-


'f ,ing effort:
" .. General jJatrol force.
o Personnel assigned intelligence unit.
lr'~; • Command level.
For jJatrol forces) general intelligence training jJrogram should focHs on:
' • DisjJellingmyste1Y of intelligence.
I II Solicitin&," cooperation of non-intelligence office1'S.

• Accuracy and conciseness in field rejJorting.


For intelligence officers) trainillg jJrogram should focus on:
• them.
Current and jJotential activities of organized criminals) and role of intelligence in fighting

• Official corruption as an essential elell/ent. of Sllccess of organized crime.


t Analytic technique as basic tool Of intelligence unit.
• Need f01' effective rejJort writing capability.
Command level training should focus on lhettle: ;what intelligence can do for romnlClnd level.
• time
Training for this level 11'IOSt demanding of all-jJToblenz agenc), head being willing to give
to subject.
• Focus on relations between intelligence inputs and agel/c)! deciSion/strategy tlUlHng; both
a substantive and a management problem.

I, INTRODUCTION
intelligence is as much a product as a technique.
l.i!f intelligence means anything to most people, To obtain the product "intelligence," some or
!I~ IS a mysterious mixture of sleuthing, intuition, al/ of the dramatic collection techniques so fav-
I dpngerous looking chemical experiments, and ored by TV script writers may be necessary at
a.pOl:ymous agents appearing (and disappearing) one occasion or another. But concentration on
taglC~I.ly i~l the right places at the righ r times. these techniques obscures the end resul t, which
"eleVlSlOl1 llUages have created impressions that should be a careful, measured judgment abou t
ate both misleading and, worse, miss the point some situation, some person, or some allegation.
i
!,
11rPletelY. The real point, of coun(., is that
"
If no judgment evolves, there is no point what-
soever to the antics of video's star performers.

72 I:': i1 73
',<r
~ "''t

...
t):l
;'0 it is in real life law enfon {'ment. Collec- strate 'what intelligence can do for managemerr t f. . .
tion techniquC's are famiHar to most veterans of and what assets the intellig'ence unit should halll ,; Tlus .chapter . WIll ll1dude Suogestions
police departments and prosecutors' offices. How- at its disposal to do the necessary job of strate~!f 1what mIght ~o Into a commanllevel tr ,~s. to cent.rate on field re )ort writ' r,. •
ever, fascination with these techniques has su pport for the decisionmakr.:rs. All categorl~r program fo:- .ll1telligence on organized cr .alnlr:g
i ~he rntelligence pro~ess I .111<;> as an Input to
tended historically to deflect attention from ef- of course, should receive a good dose d1 I full recogmtlO? tha t such a COurse or l1~e 111 many law enforcem . t IS little wonder that·
forts to imprm:-e the ultimate product. A good instruction on the nature of organized crimJ l'nay be a prac~Ical impossibility for manf:o~~~:n that intelJio-ence ca ent °lfficers ha\'e no feeling
training program for intelligence against orga- But each category presents a different proW Iheads and theIr s~affs. But it is necessary ~ f. .
any dIrect way If I .
0
'.
n or s lOuId co .
t lelr ag'e
llcer11 them In
1
.'

nized <rime should begin with a recognition of lel1l in development of program and COU~Lf,\!c1ude such m~te~Ial, first because a few m 0 ~1 gence unit, it is llsllall wr~) ncy. las an intelli-
this longstanding myopia. Accepting the fact presentation. The first two of these tiers mar jable to explOIt It, and second to d ay e of secrecy that they Yd" I pedrn such a cloak
that the enel prod llct has been neglected raises be dealt with fairly directly; that 1S to say train j.'.
I ,that three (IS r tInct
'],
C Iel1teles for trainino· c
emonstrate
b out more abOllt tl 'b"
are IS('ourao- ! f -
'<"lee 10m nndmo'
.
. le Sn Ject TJ .
iug progTams for them-al though perhaps ql1i~ Ildentdied al;cl ~ac~ l~uSt be handled cliffer~~1 I e
b
in turn a fundamental premise about the state Il1tellio'ence Ull't '. , ' . 1e Ullage of the
• t> I q llIte () f ten IS f"
of intelligetl«(, in many law enforcement agen- different in content from what has traclitionalf 1 How speCIfic traInIng cycles are broken ('11t y. cesslole fortress ()f {'J'. .' one () an lIlac-
1 • J 1 1110 cases ll1J I-
cies: \Vha t is needed most is a general reorien- been offered on the subject-can be fitted in!\1 lIto accomplish the af?rementioned Objecti/ OWl: lla I officers '111 1 . '1' 0
, C Cl VI Ians III t .'
" 1a )Heel by odd-
,
tation, from the top down, on the character and existing curriculums and facilities: The corrl !e~oc~~ many hou~s of mstruction are reqnire~S, f~l~ .
paper instead of 111 k"
a Ingarr~~.
ys el1ou~Iy pushing'
'
usefulness of intdligcnee-not simply another mandlevel category presents an entirely difEere~ 1£' Ist~lde.nt. clIentele group ca,nnot be d fi i
training tourse. . f ' \ or a I ]unsd1('tio b e nee
kmd of problem. There are ew recogl1lzK 1 I ' . ns, ut some sug'g'estions
! re atlve welghtin' f l " , as to , Intelligence Is Not a Mystery I
Al though agency heads and their Sli bordinates ways that the command levels of law en Eora, )1 d' gs o· t le vanous compone t f
every day come to rational judgments on the ment agencies can he trained. In fact, the ge{ b,t leI Ifferent courses are suggested in fio'u ~1 s}03 Clearly, then, an el' _... '
fen-. law enforcel11en~ Zffi~::~~l tl,1l111l1g program
basis of information presented to them, few . f . . h ,I. e ow. 0 Ie"
eral assumptlOn o' most agenCIes IS t at 1~1
understand they are there!JY fashioning the in- command level will dictate the tone anel gener{l of Its first goals tl '1 _ 11l11st have as one
. ' l e ( earPlO' a' f
telligence cnd product themseh·es. Not under- philosophy of the training progTams.offered,,,~: 1 TRAINING FOR THE tenes surrounclino. th . ' ~ ,\\ay.o the lll)'S-
standing this, they are unlikely to insist to their that i~ does so Ol~t of a large fund of wis~loma~'\.~ NONINTELLIGENCE OFFICER Therds. of cours~~ vel: ~i(~~~('Pt, o!' Il1tclJigence.
subOldinates that the process could be improved expenence acqUlred through long serVIce. Fl\ The objecti , f . - the process itself-fo/ th. th<lt IS secret about
or their own llse of intelligence extended. Draw- [rom needing training' for itself, the assu~OtolJrse) design\~ ~ ani COllrse (or portion of a contents of the 61' . . e most part ollly the
. 1 lI1g cdses "Ire ' "
ing cclndusions based on analysis of assembled tion goes, the command level designs trainij"'Aon-intellio'ence _ ~r t 1e patrol force or other tIl1S is lInclerstooc( I 1" StllSItIve. Once
information is a simple description of how a . f b d'
reqUlrements '01' su or mate eye s.
I 1 ... .pe
) to prepare " e aSSloned l)e'lce ffi
tl 0 ' 0 I..-.:rs shOll leI the distance betwee:[ tl;W ..el1fo~-cel11ent officers,
policymaker-or decisionmaker-uses intelli- But 1'f tram1l1g
.. programs f'or su b or d'mate Ie\i(t.o ' ! the intellig". 1em to understand., an d contribute the rest of the ag'enc : lI1tellIgence unit and
gence, and at the same time is an essential pm-t r.' II' . . d'
O( mte 1gence agamst orgal11ze cnme are \ ~mies now a1101 f I '
I I ence process

M t I'
os· po Ice acad- shorten. . y pelsonnel should begin to
of the process. He is the consumer. Training have a meaning{ul impact; if they are to ~,Of organized c / L.l an hour or so 011 the subject Perb aps t le best ,vay to ael' ',. '. .
I
has concerned itself very little with the consumer designed soas to be supportive of strategic thirr~assing referen~:~~ ~I~~ ~ few make more than an officer of tile'. II'
mte Igenc
ueH tll1S IS to have
.
anil therein lies the need for a revamping of ing as well as of operations, then the role'l·tbat do tOllch I' dhgence. Indeed, those rookie <"lass , ,or 1
W latever t - . .
, e unIt address the
existing training assumptiollS and directions. mtelhgence must be more c I ear I y un d
• C •
erslo\· t 'j . on t lIS sllbiect J USua 11 y only con- program is lIBelel-n'a' Ia1111ng or retrainino'
", y 111 exact 1 tl 1")
than it now is at top command positions. 11:} FIGURE 13.-8urr I d . . should Cl11I)hasize tl .' I '. Y . lese. terms. He
. B 1 1
I '/ <>ges e . ll'eightlll{,; of l' . ' , lelt t 1e meth' I· f .
practical pro b lem relnall1S: y W lat mec'i I intelligence lraini c . .I'll }jects in .ll1vestio·ation allal . {)( S 0 collectIOn
THE THREE LEVELS OF TRAINING . • .• 'd 1 . ~ ng COllr.les o " YSIS etc en 1 I. . '
lllsm can trall1l11g at tlus level be provll .. are not at ·tlJ the ' ~., lJ> oyee mIllS unit
'[ I 'IS no satls . f'actory answer t 1lat can '.f"! lT
ar' . ,rallllllg /01' tei1l0llHn ' telligence o[Jicer: . 1~el~ltive . .
Imagined them t I, r
' mysterIous rit I
' lla S SOl11e have
GeIleral reorientation of a law enforcement lere
. . 0)(. n fact he 511 I 1
agency to all appreciation of intellig'ence re- to all sections of the country or to all local Juri ,~ What intelligence is IN'lglzt pOSSIble, offer tl 'I" ., ,ou c, Whel'e
dictions. It might be possible sometime ini(.i ~he intelligcnce ~;r~'c~~~""'" ............ '. 2 • 1(:' ( elSS a case st 1 f' 1
quin's a three-pronged training effort, that is te.lIIgenCe has C0l1tr1'b t. 1 ., . , l l ( yo. lOW in-.
(lirectecl toward: (I) th(' general patrol force; nearuturef· f . I . . f f lOr;!. i ow the agency h(' I
or reglOna entltles 0', or exa~, I Techniques f b . a.c uscs lntclligence . .
,til Important ('1'1' . I l\ ec to the 111'1
. rave I'1110- of
. . . ' ! F' Id 0 0 SCI vatJOll l11Ina eOllsIJIr'I' \ I 1:>
(~) the personnel assigned to intelligence a professlOnal pollce aSsoClatlOll, to sponsor'! .'j Ie reporting.... " .............. " .. I comparable to the 't . I'. ' (y. I oeal case
nual short programs, possibly with some Fedq f ~~~~dltlcti.on to orga~i~~ci '~I:i;l;~"'" '" " '" '"
· all OllW HIe SUI' 1 .
responsibilities; and (:1) the command level. I (Iescnbec1 in chapte r II ·)P Yst.nre caper
The largest (general patrol force) category of
training programs should focus on a better un-
.
[und1l1g, for command level I)ersonne 0, ,;t. .
I fl\l
.I
"IUlI/III /
r OplCS

municipalities and counties in the regIOn. 1Inte1/ r the illtelUgellce o[Jicer:


. ..................... .
.......... .
" ••••••. X
I
This kind of
. ' . , lOll s 101Ild e
I a h 01"1011S
!WeSeI1t at' WC1Hlld
,ls 1Jects of makillljll<lSIZ,e the
be appropriate.
1 .
. hi ~ gence theory
some States such a training progTam Illig J ,! Organized crime ................... , .... ". " what had 1)e(:,11 tl I ' ng llJatch,'~ between
derstanding of what the intelligence process is
and \\'here the inputs ol non-intelligence officers given annually by the State police acad eJIl1:)i'! ~he intelligence ~l:~~~S~"""""""""""" 4
. lOUO" 1t
pIe, or l)laces 01- btl . ' )e 11I1('(JllI1ened pen-
"0 I
) lISll1Csses etc TI
can be inserted into the process. For the second its eq uivalel1L. Finally, if a local jurisdicUi- T:~~~:c"l'rit~n.g. (field anci '~I;;;iy'ti~)"""""" .. ·1 methOdology :ihould be d .: _.' 1(' actual
• 'Oi1n~" 0 a tlali llng ........... . I
category, that is, those training to go into in- has a strong t':al11111g program on oro' ! ther topics .. ' ... :: '" ...... " .............. . 2 studcnts can J'l'd o" f "1 esolbed so that the
crime, it might experiment on a one shot~llail/il/g/orthe . ' . ' "c Oltlemsel\'esl ,,' J
telligence either as inyestigators, analysts, or ......................... . X pall1stakirw much of' . JI' ,1Oh ~lInp e but
with a 2- or 3-day course tailored to COJIl1lltt" T1ntell,igence, ~~~:lllland level: '. t>
Onee the aUra of n • ,.' . . lllte Igenc(' \\"ork is
information control personnel, very practical . '.
intelligence I)rocess ltYI ,,~el ~ ~s :cmonxJ from the
. . lar l.:l he Jnt II' agement, and strat
instruction is necessary-how to collect, eval u- level students, pIggybacked on ItS reg. l1 r~\~ Dnd e l~encc report.. . ' egy ......... 4·
ate, conate, analyze, etc. But for the command
rce1ilt'1lf erstaucitng m 'tl I
gram for somewhat lower level la,,, en f0 . '.' f Organized cr' C 10C oIogy and process ..... .
.. .. . . .. . . .. .. . I c. Iea I WIth . w'lys t ",I" It 1tr<l 1111 11 t>o· ('Ollr'.'iC S'1 lOu I(I
'ffi - ' :} HardWare lntC. . . . . . . . . . . . . . . . ........ 2 , ( ) so IClt ( I e ' .. '
level, the main objective should be to demon- o lceIS. . ,; Othe ........ " . " .... " . . . . .. . . 8 111tellio-cnce ofr " _ . (O()j>elatlOH of non-
i r tOPICS ................. I <"l Hers, panlcllhrly tl .
assio-nments'" • l1. n um )el" 01 .
I .' lose
1 1I1 patrol
·····1 ........................... ::::::: X ,.,
74 ble here but . I ,lpproac H:'S are jJossi-
~;
, arOllSl11g tIle awareness of the aver-
;ol
. <~t;'~
75

-
"

,J
age law enforcement officer should be the main he will have observed breaks in the pattern that ' ask~d to i\lIagine that they are f T '
emphasis. He should be encouraged to think sl1g'gest human interactions are in play which all the low-level underworl~l 1 ar~ll Iar with tion Billy Y -(althot !
of the precinct or beat he serves as a source 'of may have considerable importance to him as a the p~aces (a tavern) that ~::!z:ct~rs -and volved in tl C I?, 1 he was not directly ;n-
le scena1'1o) the '1 I . .
reportable information. To direct his thinking I)olice officer-and, I)ossibly to the in tell ig'ence scenano. '" The instructor, p'111S a pIcture
. p the of have little meanino' f()~' I i\ 10 e epIsode will
this way, some assistance can be offered. He unit. Once he begins to see his precinct in thi! J J o.nes on a board; the class is told th t
Joe pointed reportino' t~chl' leadquarters. Direct,
must be urged to view the area he covers less as way, the I)eace officer will automatically store in ' ones ~s well known in the neig'hbo'l d af drilling is necess~ry. llque can be learned; but
the Tmy Tavern; his rin' I 1?0 0
a geographic whole and more as a composite of his mind, patterns of activity and the rhythm of " !arr;e is that his girlfrien~, L~~:}l c1aII? to
human interactions, each of which has a specific people's movements. He will have begun to mtUTIate associate of Dol" X I a Z,. IS an
me,ining and purpose. As one who daily visits unoerstane
J 1 t1le c1ynamlcs
. 0'fl' lIS b t llIS
ea, ' pet· f'
0 aI~ Important mobster, Bill Y
IS ,t Ie miS tress Introduction to Organized C .
,this area he witnesses some, at least, of these in- ceptions will sharpen and in time he maycomt people are pictured on tl y : All the~e
f or t h e General Office:r rIme
teractions. lIe should study them to determine, to recoorrnize the meanin oo' of unusual activitil'i,' board, as in the Tiny T Ie 1I1strllctor's OF ,COurse, it does little 0'ood - j
. avern The il
if possible, their significance. and changes in normal patterns. At that poilJlj' .mary event which takes pIa ' . I uag- generill IJolic'c ()ffi b to encourage the
lcer to 'let '
patrolman observes Jones en' c~ I~ t lat ~he
','.
For,example,' if an officer is assig'ned to
he will have grasped the essentials of being a
1 b
gooe 0 server.
N h
ext e WI
'11 J I
lave to sc 1001
I Tavern ,with Doris and f telll1g the Tmy
stay, departinrr with 1 a tel' a half-hour
lector for the int II"' '
h ayC' an effective e under
(Time co , , I
dS. an extended {'ol-
1gence unIt if I ' I
. le e oes llOt
standll1g of oro ',ll1ized
an area in a city where the commercial ac- himself to become a good reporter of h i ! i ' 0 leI'. . ,1evela Course 1 I i:"l'
tivity centers around the garment trade (an observations. 1 : 'Tl fi . to this subject if 1 lours:5 IOulcl be deyoted
activity about which we assume he knows !: _le rst POll1t which the instructor will complexity of ~he ~n. y .to depIct the variety and
little), his first re;lction would probably be • • ' " 1 to get across by use f l ' '. want cnmll1al under' II
that he has a hell of a traffic problem on FIeld Reportmg by the Peac~ Officer 1'S-el)Olt Wl'I'tt l o t 11S e?,erClse IS that the gest
, "'lreas. 1'0 r h'IS 0 b servation H \~orI c and SllO'-
b
•. en on t le scenarIO b for examl)le that . s. e S IOulc! know
his hands. He will encounter great numbers 'I " ' e as useful to . , , certaIn b'ISil' . '
Good reporting techniques not only have to) ! Je reClpIent as possible In !)ract' I !ndustries <1re particularl 1essc.s and serVIn'
of trucks hurriedly unloading and loading
often at several doors on a single block.
1)etauglt;tley
1 · ·
1 1lave to b emspll'e. d P 'd' J'inean 't I ld
ersuall1!!, lSI S101l be complete do , ' , 'lca terms this
a .busy police officer to pass on information forl~letail. In other ,\lords, the ~'ep >~:1 to the last
nized crime penetratio~' h susceptIble to orga-
activities of oro-anized ,:. e should know what
The streets may be full of handcarts holding which thc:'re is no immediate operational neces'll~SSlll11e that simply beca use he k01 e,r n~lust not recorded in otl~er cities \lll~e h;w recently heen
l<1cks of clothing' and knots of men on the sity is not easy. In fact, the impetus for dOinllhe. local characters-who enjo nOi\S a . about
sidewalks in deep discussions impeding that he has, all obII'~ t.' e s lotlldunderstand
pedestrian movement. Confusion is the ~o I?r?bably will have to come from within ~nfl.~?nety .on his be~t-that anyl;>~l a e~~:ta1l1 110- with the kn'
, ua Ion t f '1' .
.0 . 0 aIUl Ianze himself
111dlvldual officer. No amount of exhortatlOnrrne. wIll recognIze the signifi y IIp the Oi\ n cnm1l1al flo' '. ' l'
principal impression. If he makes an effort and to learn <15 much b ollIes 111 11S precinct
to understand the flux all about him, he will drag it from him, unless he, personally, U}1el a.tlO l1ships between them. cance of the , a out them as his .
(0l11l11ander can tell 1 . . prec1l1ct
will soon discover that suppliers' trucks do interested in what he sees,about him and feeltJ.The student should also learn th h' , . 11m. If he be
actIve reporter, he sh 11. comes an
arrive and unload according to rather rough i,t may have value to others. It is for this re"aso~IJ'lllnot receive mllch attention lInl at ;s leports he will have read Oll c know where and how
daily tiriletab}es, that local manufacturers that an effort must be made to induce the POIiCl/" qown hard and early on his main :ss t ley come , y access to the intelligence unit.
save transportation costs by moving new officer to think like an observer. This approad!~ot.hoI?e to get his mess<1ge tt~mth ~-re.caI:­
lloug
clothes to nearby retail stores by handcart, may tickle his imag'ination; simply appealingl~!~llned lJ1 a mass of detail 01' onl . tf It IS Understandin a th R
him to record the unusllal that he sees on h~I.~1n~ m~t~rial. So he must be tra~nl~~rtia 1)' rele-
that larger ciothing' firms sell off unpur- , b e ole of the Agency Head
chased stock to discoun t houses, also using
handcarts, and that clothing is bought, sold,
beat will not. !~le.ITI~ll1 thrust of what he h
But instruction on good report writing l111 Jgmnmg of a report and letaS to say at ~he
to present , ~lI1ally, some time in the ' ,
('er s COllrse should 1 ' g.cneral patrol offi-
)e commItted t 1
transferred, etc., often on the basis of oral . b" !'s.lactual 111 t . l ' tlle supportmo' maneI obl io'ations f I ' 0 t 1e com-
agreements made on the street between an" should 1)e presentee1 as a pnme 0 Jectm"bJ"i'
' · . ,1" ones f '
a e1'1a follow. Hi .
S leport on Joe
0 'While this ~ubJ'ect'o t Ie ~gency S leadershij).
' IS not stnetl . II'
neighboring businessmen or in favorite the general lawen forcement 0 ffi'lcers tralOlllt'sl '. 01 . example, should
Conciseness, thoroughness, and accuracy are Itr:~methmg lIke t,his:
b bl .
IS directly related to tl " r
ll1te Igence, it
coffee houses or bars. pro a y rlln .A good 1ecture devotedl~ H,l,te Iilgel:ce flln~tion.
principal qualities to get across. Style anc~ grarrli" the agency head" I J :1 0 a ( ay 111 the lIfe of
Other things may then come clear to him.
He may nole that certain trucks rarely un- matical perfection arc less important at thiS lerll'j- C At 4 p.m. on June 6 I O b d eral training pro's lOU ( be part of every gen-
load on the open street, but seek out alleys than pointedness. The student should be cafrl ) e e,l1tral Blvd., Joe Jon;s a I~ecrvle at l200 policymakir~o' fU~rC~I~nO!'l It ShloUld. c, mphasize the
. . . f' 1~li' ' n"er the T' T ' , a h oocll urn L

fOT the discharge of their deliveries, even if uonecl to read Ius own practIce report 10m 'T 'I the' my avern with Doris X h . ' " () f tIe lug'he t I l
. ,. fl" If'l I 'nsf lllistress of B'll y w 0 IS command and describe ' , ' s eve of
Doris X . ' 1 Y ,West-Side mob t ' of policymakino' 'I " the ll1~erconnecteclness
.I
they cannot get as close to the store they are P0111 t of VIew 0 t le reClpient. le em J
serving. At the larger establishments he do this, he will avoid miss~ng the target. F~.f: ' Louella ~5 ~~lose fnend of Jones' girlfri~neJ: port for tl 0' P annmg, anclll1telJigence SllP- '
may observe that certain truckers do not example, let us say that the lI1structor constr\l(,[ J alone:n J' ~ has not been observed before Such a pre::~t~~~~nr~:~~(;::~ibilities .. Not only is
wait their turn to unload their goods, Qut a si.mple scen~rio about which the students at,~ for ul1kno~~~sd COl?pa~y. The two departed own sake b t ' I and deSIrable for its
automatically go to the head of the lineup obhg'ed to wnte a one-paragraph report. ,; estmatlOn after a half hour." C ,U It a so hell) t 'I 'fy
of truCKS which have arrived earlier. rmthe st nd role inteIlio'ence 1 I .s 0 (an the strategic
,,'t'J· el1ts omit tl I' ao'nnc a 0 ' ) ays m a law enforcement
The scenario can be put together b)'P~"I~elr practice,
At this point, he should be beginning to ask
le re atlOnships in writinrr
tures clipped out of magazines plus a fep~adql!arter r~ports: they will have provided
ft:~lgl'Z1g 'o~~:~~~)t not fully understOOd 'by many
~',
himself why these things are so. He will, in words addee~ to each picture. T~le sc~n:r'~~Y be no s al~ the l11:elli.gence unit with what
other words, have learned how patterns of activ- the beat winch all tht" students ale askerh,st~eet cl ' lllOle than mdlfferent goss' b
imag:'le as their own. They are fur '!
, 1 The pamphlet, "Police Glild ' ,
ity define the nature or his neighborhood, and 1atacters. If the student f 'IIP a out h$hed by the (' S D l on Orgallll<'cl Crime" pllJ)
, SaIto men- . , '''' l'partrn('IIt of J " , . . -
tndltdtors slIggestive of tl • listIe!', wlltallls a list of 20
Ie presellce of organized crime.
76

77
!l.'~
~'I
TRAINING OF INTELLIGENCE should be one which recognizes the disparity in ffthe question: "What would be tI1
OFFICERS ,
learnmg'speeds, Much more course tnne should . /qlle nc e, , /I.!
s 1'f we d'd 1 t l'
us?" Or "If ,ve e d conse-1 by exposing them to the wle 'I
I 1d I ' a optee percfptiveness of their f Il er knowledge and
be spent on the development of a deep under, . ISll,Cl, an SUcl, a strategy against a p t ' I .
P b bl ,e ows,
For those personnel designated as organized standing of, the intelligence pro~ess-and the ~cnmI~1al org~l11zation?" (Chapters II ~n~~uI~~
I ro a y the best 1va t
crime special ists in such fields as narcotics, vice, personal adjustment necessary to Its demanclillgi~onta~n conSIderable material on COnt' sion is to permit a ' C Y 0 conduct such a ses-
discipline-than to the more traditional subject jwtellIgence support,) 111gency inputs by ind' ,c 1PIclture to gTOW naturally from
etc" quite specific training is called for, (See 1VIe ua students T
figure H, page 91, "Two-Week Training matter, such as new hardware, surveillance tech, ,I !he reaso~ for enunciating this d t' I started it may be nec
essary for tl '
, 0 get things
Course for In telligence Analyst/ Investigator,") nique, and the like, This is not to say that OIlepomt aJ:d laY111g such stress on it must ~c r~na prearrano'e witl1 a stt d
o ' I ent w 10' k
I le mstructor to
'Where the general officers training program need is more or less important than the other-ani) JO the ll1str~lctor, He should be lar' Ie c, ear some
, 1
knowleclg'e of ' "
orgalllzed CrImm I
IS. n,own to have
"
extend only to a broad utiderstanding of the that the former takes longer to be assimilated_ rern,ed at, thIS point in the training cO~le, y cfn- 111 t 1e area
,
to be th k' I, .
e IC ,,-off man Th '
a actIVIty
nature of the intelligence process and some exer- even for the quickest mind, ,the lI1tellIgcnce unit come to b I . lse t lat tor Could start a list f tl c, .e lllstruc-
" e une elstoocl CIS I)ome: ' I "current 0 nee' columns on a bl ac- k
fill
·
C
cises in report writing', courses for organized , ll1g a specIal, even unique I ' ' ' f
J f' . pace 111 the law "potential k mani estatlOns and indicators"
crime specialists should emphasize professional en Olcemcnt aO'ency-and t1 t 'f '
wea' Spots," and" b b '
l
, C
Intelligence Theory and Organized Crime . not understanci the c, 1a 1, Its members do future criminal activit" pro a Ie type of
development heavily, particularly methodology, : C lllUque relatIonship t1 '
The intelligence process should, in fact, be the An introduction to the intelligence oRieell'! I,Jas to the command level, they will b 1e U~~It man l11io'ht remark tl YI'
f ° , c 1at _', 1e was per
Thus, the kick-off
lJ
heart of the training, The reasons for such an course should begin with a few-probably nol. \0 s,erve the command level objectively e l~1a e o a gambling ring' C sona y aware
emphasis are simple, The intelligence process, more than 5 or 6-hours devoted to a cliscusslon[ ~esslOnally, For once the intelligence tan, p~o­ sectors of th '
e City,
°Tver.111g at least two distinct
I11S woul I b
which consists of a Hmtinuous series of inter- of intelligence theory as it relates to organiz1ll! $il~meS to I:rol~ose or dictate strategic n~~~~tf~ the first column ( e entered in
related intellectual activities, is not familiar to crime, These will not be easy concepts to get! 1\1111 lose Its mdependence, It will b· '1 another s'tudent ~~a:vfu~l a follo wllp remark by
l
most people, It requires a mental discipline- across, Considerable attention should be givenUagged and second-guessed by the lar ,e s~ne­ his informants tha't b1~0~!': 'o~een ,told by one of
a habit of mind and energy.which, although not to the role or intelligence in the battle agaimlfeonents, of the agency; it will no Ion ,ge~ CO?1- out of State,
" vere now to be f
goed CIgarettes from
l' ,
unique to the law enforcement profession, must organized crime, The students should see it~1 ~lIl~portll1g staff arm of the agency h~e~ ~ t 1e throughout the' ~)Une In dIspensers
CIty, PerSIstent '
in great part be learned rather than developed defining the scope of organized criminal actil'ilflqlalmant for power, battling for its vie a , ,l~t a questioning' by tll ' provOcatIve
w a e ll1structor mig'l t 1"
Ollt of job experience, with increasing precision and developing poinul1nequal odds, Its effectiveness will be l t ?al11s t comment frol11 yet 1 1 e ICll the
the ,new harness trac;~~~s1~1~i:~ucl~r:t tr at ~nce
' " " 1 l' h' eesloyec 1
Manual skills requiring practice to develop O'ocusor
ff f lI1tC:H1SIVe 111vestigatlOn eae mg tot II '
dexterity can be learned fairly rapidly, and once ultimate decision that an attempt should hI 1 The Tar . 0 . . bonng county, a new flood ' ~ee , 111 t 1e nelgh-
f
learned, remain more or less constant at a level made to build a case, This phase of the intr~ I < get. rgalllzed Cnme criminal interests wo II °b cnm111al and semi-
t k u e pro ably devel Tl
determined by physical factors and the quality duction would of necessity involve some explo!1' j !I~e next portion of the intelligence ffi ' rac ' manao'ement m' 'h b Op,.1e
of the training involved, Thinking habits or tion of both indications intelligence (or warninl ~al~ll1g shou,ld be a fairly generous one dO lcers uncler '(1)otOelltI'al Ikg
wea' Spots" F
t e suggested for listing
'
or danger signals) and strategic intelligcllC( ~~ t le,.target Itself-organized crime If ,~v?tee
1 1 ,
tne ll1structor could'
'
I' rom that POlllt
mental processes develop more slowly, Or, it p
may be more accurate to say that the introduc- (report on existing or potential pattern of aetili,. lye ~mp~ct, it will have to concen'trat 1 IS to gestions back and f sllln y weave students' sug'-
C , ort 1 und I
tion of new ways to use mental processes is re- ties), Also required would be a discussion oflnl~Jea t lat IS no~ normally the sLlbstan~e e ~n a;l columns until so I' er t1e appropriate
sisted by old, familiar comfortable habits of different uses made of indications, tactical, su'JlIrse~-~rgal11zecl crime involvement ' 0 I S~~C,l hypothetical Pictllren:%:~~~d, of a composite
111
though t. Thus, the suggestion that the end tegic, and evidential intelligence, (Sec chnptl! .gplate llSlIless and its interest in l)en t eg,Itl-
' , f f ' vernment e ratll1g-
product or the intelligence process should be an II, page 11, f'01' a d ISCUSSlOn 0 the our t)p6 In ''
analytic judgment of some sort or another may of i n t e l l i g e n c e ' ) c & l ,ependll~g Oil the location of the t, ' , Official Corruption
e
be perfectly well understood when the point is The distinction between the pure intelligen~ pt! lbisl , the mstructor will have more llaIl1l ng- Emphasis on corruption teel '
made, for example, in training lecture, But a f'unctlOn ' I ' Id b d at 0 em overc ommg ' or ess 0 f a nized crime 'lg'aI'nst ' 1l11ques of org'a-
ane operations wou e n'eate as, sJ;II the it-can't- '1a l -h 'c governme t ffi 'l '
subsequent classroom exercise in which the stu- , f
essentwl means 0 preservmg 0 JeCtlVIty,
'b'" Tnlil, crome He
eia I ' ' ' )pen ere
may, of Course be deal'lllg ' h stage of training only th fi .. n, 0 lCIa s ~s at this

dents are asked to produce end products may should lead directly to a discussion of iIltelil ~~tl?P:S that are far remove~l from C tl ,WI~ theme that should be e llst llltroduction of a
' f 1
IT f'unctlOn o· t 1e comman 'pie d lell .. Ion 111 whic1 1 , I e ] u ns- OTall1 Tl I ' woven throughout the pro-
turn up nothing better than simple summaries gence as a sl";. ' ,1 11S students ol)erate B "f I ' t:> ' 1at t 1eme IS clearly th
of the exercise, This is not student sabotage at ' k'
an d Its use by those ma mg strategy or (Oln~ POrt cl b
l ' tnt sentatlon IS 1 IJ
we . prepared and caref 11
c, lit 1 us of any law enforcemel;t a ~n ' , e sllscept,ibility
planning for the law enforcement ag'eney, ,J h¢s~ou/ facts, I:ecords of court transcril~t: ~~IP­
work; it is, rather, a consequence of old habits org'anized ' g cy to penetratIon by
C cnme, The whol "
overcoming the effort of a novel idea to establish du
critical point that should emerg'e from tlllS tdtl ,cl have lIttle trouble The b 1 , c,' mously im ortant f , . , e que~tIOl: IS enor-
" 'I ' I tra 1 Ie It-can't I ' e s t answer gence worr and ' or.f~tl~e carecnsts III intelli-
itsel£ as an accepted part of the mental process, cusslOn IS that lllte hgence su pports ne s tl tn', k I 1 - 1a.ppen-here scel)tic of '
A bright law enforcement officer can maSter , f d I Id n(I 1"S' t Ie stud ' . COllrse IS sino'le I)art of IS PIO, a, Iy the most sensitive
gISts 0 the agency, It does not an s lOll ,edge f I ents from their gener 1 k ' ,° I ( , ,any trall1ll1g curriculum P
the fine technical (and even dexterous) detail of arrogate to itsel f the planning or decision fll~'~se 0 t 1e me~ropolitan area they se ,a nowl- Clse 1y 10", It IS han II 1 'II ,re-
a new long-range camera in a few days. It may tion of the command level. On the other han . ~ pea hscenano descriptive of ho,1'\ e:tto com 1- conditions, the int~ '~itec WI depend on local
take the same officer many months t,) adjust his
,
It should be thoroug'hly responSive to t le ,an
' I n ere Tl' ,
' - 11S kmd of 0'-01.11) exe '
v 1 cou d and a number of o~he: recor~ of lo~al (JIgencies
thin king 11a bits and develop mental disciplines
, 'd 01111/' extremely
I f o· rClse can which should be con 'd fa~tOls, It IS a subject
of the command level for gUl ance on e ,;theil11' , use ul tool-not only i t '
to which he has not been accustomed, Thus the
, , 1' the h . ! agIl1atlven f n estll1g only by the co SII ere at great length, not
gency questIOns, In practIce t 11S means :tng' til ,ess 0 the students bllt' bl urse p anner b t b 1 '
first guideline for the intelligence officers' course
,
tellIgence officer should be prepare to a !1
d tlii1fi . e SCeptIC'
ISm of the doubters in tI
, 111 unt- command levels of the a' ' :1 y tIe, lughest
i1 1e group soring' the t. ' , gency lllvolved 111 spon-
~ " lallung, There may be merit in
78

79
l .... "".'"
. ~.,!

, ,J I1 ;1derstood, even to the point of giving tlie stu- process, He should, of course, be put through
d'rection and discipline Imposed b~ command identssimulated investigative reports and putting these paces on a number of different kinds of
, . utside speaker, preferably one 1 \els? To what extent have old-fas~uo~edlsf lthem through the individual steps-collection, problems, (An example of an analytic problem
Impo:tlrng atD d~scuss the difficulties experienced ~ngs gTown up to be th,e n,uc1e1 ot se -per· bllation, evaluation, analysis, reporting, dissemi- to give trainees can be found on page 88,)
who IS ree 0 , r d partment ~etuating criminal co ns pnac1es?, I?o I '11ation, and reevaluation, This is a laborious
along this line by a partIcular po :ce , e or the
\oosely held together bands o~ crnmnals coor ,training technique, but if it results in identifying
C

, ffice Dramat1za t ton Sophisticated Analysis Problems


or prosecutor s o , ' ' m i ht be one
te with one another for speClfic ~entur:s arm, ~Iearly for the participants both the uniqueness More sophisticated analytic techniques should
impact of: corruptlOn dO,n a, Cl;;~:rhe gPolitics or
1 Jo1m Gar mer s e~.ticular districts of the metropol:tan ~~e~? " bE each step and the interrelatedness of all steps, be described to the class and, if possible, field
approac~, ,,' urce for such a presenta- fhe answer to any of these, quest1?nS u, yes, It will have been worthwhile, cxereises conducted using some of these tech-
Corruptton, IS a,goo~ sl°by the head of the inter- there may be a severe orga~llzed cnme 1. The most difficult single subject within the niques, Subjects such as the identification of
tion,2 A dISCUSSIOn ec head itsel£-
nal affairs squad-or the agency , in the city, or the beg~nnmgs oE one, " . . process to clarify will be a nC}-l ysis, Since}lmost real estate ownership, hidden corporate manage-
might be another. 'S any participation or mterest by a , ~Il intelligence l:rob,lems are one of a kInd, no ment, gathering evidence of skimming opera-
The question of how to cover ~ntegnt~eqy~~e~ member whatsoever. , . . be' sJnglc set of gllldel1l1es can be o,ffered to, the tio~s, etc., involve highly technical knowledge,
, 1' "ng' programs IS one Similarly, the intellIgence officers ,~ll~~~l ~tuc\ents, although a few self-testll1g qlles.tlOns but an introduction to these areas may stimulate
tions WIt 11n trml1l M I , nforcement
conraged to think beyond the traeht1~ , d' ~re applicable to all analy.sis; that is to say, there the students to reach out for new techniques, or
the sc?pe of this man:lal. l~st f~~ ~reating this
agenCleS have a specillc po y U 11y of criminal activity hitherto long ~ss~Clate . \ ~re questions which the analyst~hould ask him- even one day to perfect analytic techniques of
, "
subject in recrUlt tra1l1m . p 'I' "f~ee CUI) of
' g'rograms sua organized crime, such as ginnbl1l1,g, , s~lf about all data that comes l11s ,~ay that may their own in other fields, Instructors who are
" k h form of the faIm 1ar 1 fencing, loan shark,lng, an,d the, hke'redit ~e helpful. By asking (and answering) these responsible for this type of training should prob-
tius ta es t ~" 'What is under discussion here, collar crime, securitIes mampu,latIOn, chis ! questions the officer who would be an analyst ably themselves be exposed to the U,S, Internal
coffee spe~cl, far more sophisticated approacl:, fraud, new forms of ext.ortIOn, ~?p qoes not achieve overnight mastery of the ana- Revenue Service' Special Agent Basic .. School,
however, Isa, d ' d taIl
in which a real effor,t should be m~e~l ~~i:i~al -ackets involving the physIcal se~U11ty , , lytic process, ~ut he will be getting closer to an which contains quite intensive training in tech-
the pernicious tecbl1lques of orgal11 ffi - or ~these are the fields where orgamzedic~~~~:al l\nderstanding of what is expected of him as an niques of financial investigation, Some knowl-
, ntra law enforcement 0 lceIS, be moving next, They are largely g analyst. edge, of accounting is necessary for this course,
~f~~~e~h:~ eum~fttingly in positionsdf~0~11 wh~~~ trainiI1D' courses today, be~ause they are not Beginning with two or three scraps of raw IRS regional offices occasionally make available
ille al obli 'ations can be extracte a er. ll1dersfood as real threats 111 many , . ' tion, which point to tbe existence of other training prognms for State and municipal
d ~
au Ience 0 .
1 intelligence officers would be an 1. Clearly no one intelligence officer s c~Ulse
, , " f
I activity in a certain field, the analyst investigators,
f a d'1SCUSS1'on- l)erhal)S provide a thorough tra1l11l:g or . 1
copmg
learn to ask himself: "'What other in for- , The course director who wishes to push his
excellent ['orum or [stematized
conducted by an attor~1ey-o sy these potential danger spots 111 the loca r would I lihe to have to better complete students to the limits of their imaginative powers
approaches to anticorruptlon measures, tion, 'What it can and should do, ~o:\ever, picture? What other information am I likely may also want to acquire professional assistance
provide him with the t,ools for une eiS d ' be able to obtain relatively rapidly and eco- from a local university faculty, Many faculties
Organized Crime Beyond the "Mafia" , the complexity of the Clty ,h~ ,serves an lIy-this is, what information can I get contain specialists in problem-solving theory,
him to think about the poss1bI,l1t; that . will be worth the ('ffort? Given additional Such men may be located in departments of sys-
The second principal area essential to tl~ or-
crime may penetrate the CI~y s eco:10mIc tion, do I perceive a new dimension in terns analysis, psychology, and even philosophy,
g anized crime portion or the intelli~enclel °tolC~~~ )olitical life at an unconventtonal 1:ollI1t' problem? What is the critical element in The introduction of this discipline to an intelli-
, .. ' 'ng more sl)ecl!1ca y } , , 'ities partic u arlY JI ? C - any 0 f the materIals
'
conrse IS that perta1l11 , ' I ld faculties ot local lYl1lVelS ,( IT '. ' pro) em ,an I match gence officer's course would not be for the pur-
. A f 1 ental obJectlve s 101.1
t 'arget OTOUP, 0 '
'une am
,
(
h' k'ngbeyon t1e
d I departments ot sociology or urba~1 \ ?1IS, hand with otber information in storage (files pose of converting the students into instant
be to stretch the students t 111 I, ' I be helpful to the course planner 111'l~ 1~ to . computer) in such a way as to broaden my psychologists, It should rather be thought of as
" 'of org'al1lzed cnme, n
,.' traditional ethl1lc image l' 1 levels in The overall purpose, of ,course, WI r~it of the whole problem? Assem- additional stimulation for those about to plunge
j.
many jurisdictions, and eve~ at lug 1 m[ortin o ' move the traditional b11l1c1e r s that I all the pieces, that is, the original two or into the analytic world. Au imaginative aca-
, '1" tllere eXIstS t le co 0 re
these Junse 1ct1OnS,, dIme " IS not muc11 0 £ ,a thinkin rr of the students ~o the mlo tized scraps of information, the newly collected demic from one of these disciplines might pro-
11o tion that OH"al1lze cr "f 'ly" mem1)er IS
. O J ,
' activities o of organll,e , d cr-me , as
~ e rama , " and ' ( ' If It ' was e1eCl'd ee1 more would b e vide insights to the students for thinking through
problem because no maJ,o:' amI his atti- ~lIch literature as "Th~ Valac~~1 Papels ( , e) an~ the stored matter that impinged problems rather than having them tie themselves
, I ed in criminal actIvity locally, T
Invo v ' l ' cr of criminal con- many vol urnes on the Mafia, ,the other pIeces of data, can I now reconstruct to set formulas for the resolution of intelligence
tude ignores the who e Ianoe , tl nic . T chnique problem? Is what results a clearer picture puzzles,
, ' . [rom dIfferent e 1
spiraCles that spnng Emphasis on Analytic e before I started the process? Can I draw Much of the mystery behind the so-called
, s or are not ethnically homogeneous,
group. , ( , f - th instructor As noted earlier, the major part of th~ 'I) this new overall picture a significant judg- problem-solving discipline now popular on some
Perhaps the best perspectlve o~ e, l' k officers' counie should be ~levote, of some kind? How confident am I of my campuses clears away when it is understood as
'1' n this subject IS to t lllJ. gence 1 ,tlcular I
o1'o'anizing maten~ s o , ' intellio'ence process, ane m p a r ' ..lave I indicated the deg1'ee of my largely a matter of hypothesis formation and
otthe metropolitai1 area from whIch the trall:~es
, £ ' I 0l)portunlues techni;ue, The process must be III my judgment statement? If the testing, (See chapter II for a discussion ,of this
are drawn as a compOSIte 0 socIa, .' r
'"'1'I'me clear1v exists 111 the Junse lC- _ II "tten bv Herbert ' analyst asks himself all these questions technique as applied to analysis,) Whereas the
til, I rly the pamp 1 et WII his I '
<f' ,
'01' cnme, v - ' h , f LaW
I

tion-to what extent is it tied into networks WIt 3 See partlCU by the ~:1tional Inst~tute 0 act exp oratlOn of the materials he has on academic approach usually includes a good dose
hertz and pub IS lee "The ~aturC, Imp he will b ' of mathematical formulas, they are not necessary
forcemcnt and Criminal Justice:, "M"' 1970, eg1l1 to get a feel for the analytic
--- -- -~ -I this book is available .
Prosecution f ,\Thite Cilliar Crllne, I ay
2 A short documentary film IbaS~,( OI~orp ~ew York. N ,Y. 0
from the 'Vestinghouse 13roae cas 1I1g "' 81

80
" ./
!
pants in tJ!
for abasic understanding of the technique. The ing can take the place of a young, dynamic . should Ji
professor recruited from the local campus had nized crime intelligence unit analyst coming to activity.:
best be advised that he should offer only the most the classroom equipped with the basic raw rna., and not I
rudimentary. essence of his technique to the terials from which he has put together a satisfy an:
intelligence officer's class. He will have con- study or investigation. If he can spread selected Ii
tributed significantly to stretching' the imagina- materials among the students and then gence re~
tion of the students if he can persuade them that step by step, how he conducted the analysis phasizecl.!
systematized ways of breaking' down problems fashioned the final judgments which emer~ellf·. analysis ,)
which contain unknown factors are possible and from this process, he will do more to sheel structurir,
profitable. on the analytic mysteries than any
An exceeding'ly simple example might be a participant in the program.
g'ood point for introducing intelligence officers
to the analytic process and problem solving in Report Preparation
general. Any expansion or elaboration of this Report writing should occupy an im
simplest concept will be IJossible only when each bloc of time in any intelligence officer's coum.
student thoroughly grasps the fundamental idea Report writing in this cont~xt has two
and is con fielent enough to extend himself a little investigati ve reports prepared in the field
further. The simple example is the Fujiyama submitted to headquarters, and the reports
. concept. This concerns the Japanese father and are the end products of the intelligence prolcesllrlglllCl ,ec1
his son traveling by train from Tokyo to Osaka. These latter reports are those which are
Out of the right-hand window the famous snow- culmination of sorting through raw in
capped Mount Fujiyama suddenly appears, its coJlating those related pieces, ar:alyzing the
top covered as usual with heavy clouds. The lection selected for study, and drawing T
father says to the boy, "You can see most of useful judgments from the picture so
Mount Fujiyama, son, but not the top. Tell me
what you think the top looks like." The son, a Field Reports
studious little boy, draws a picture of the moun- The field report will probably be familiar·
tain with its cloud cover on a small pad or paper. most of the students in an intelligence .
\,'
", He then draws the same picture of the moun- training course. In fact, not much more
tain, but removes the clouds. Then, he extends tion will be needed at this point in their
the sides at the same pitch until they intersect. than to reemphasize the necessity for clearly
He gives this picture to his father as his answer. ing the who's, where's, when's, with what's,
"Very good deductive reasoning, son," says his how's. The fundamentals, such as short
father, "but very bad answer. If you read more tenees, clear antecedents and the like,
geogl'aphy and fewer comic books, you would have been mastered by most many years
know this whole part of our country was once If not, this is hardly the course for
volcanic. Almost all the mountains around here them. On the other hand, a truly
are old craters and their tops are flattened out- presentation on effective exp~sitory writing
they are not pointed as you have :,hown." often dramatize the need for correcting bad, .
The class should be able quite quickly to habits in an hour or two. One additional
grasp the moral of this story. Deductive reason- "I'
which should be stressed at every
ing alone cannot solve all problems when only the need for incl ucling evaluation in field sian
abo,
I
some of the facts are known. In this case, total ports. Here the instructor must balance on . in 01
reliance on deductive reasoning' lead the boy thin line between the general instruction Ne,~
astray. A moment's research into any refereJ.lce tell only the facts" and the need at headq enjol
work would have offered the boy a better chance for knowing' what the investig'ator on the byal
to be right. He made an intelligent hypothesis, believes to be the worth of the in lUo~
but since things are not always what they seem to has passed on. the r
be, his assumption was badly mistaken. Without Th i
research, he could never have made an accurate The Analytic Report to t~
• hypothesis. The analytic report is another matter himl
One final word on analysis is nececsary. Noth- getber. It is quite possible that not all
I

I
82
.,

. pants in the intelligence officers' tra' .


' ' 111mg program
for a basic understanding of the technique. The ing can t.ake the place of a young, dynamic orga. shou Id receIve . , extensive trailll' ' ng m . 1. for his own use D .
professor recruited from the local campus had nized crime intelligence unit analyst coming to
t l1S loan's' . unng the Course of the
actlVlty. It IS, after all a hicrhlv SI) • I' d tberm, the borrmver repaid the $3 000
best be advised that he should offer only the most the classroom equipped with the basic raw 'd ' . ' b . ' eCla lze art t h
o t e ank." ,
an not everyone WIll do it well h
. .f . enoug to
rudimentary. essence of his technique to t~le terials from which he has put together a satls y an agency head. But for th h
intelligence officer:s class. He will have con- study or investigation. If he can spread : I d '. . ose. w 0 are A summary of tl . .
se ecte, to tram m analytIC
I
.' draftl'll' g 0 f'111tel1I- ' 11S excerpt nuo'ht read, "Tl'
tributed significantly to stretching the imagina- materials among the students and then paragraph tells how loan shark~ ': us
gel nc~ Tdeportss, a few baSIC skills need to be em- able to 'bI ' ' . SOmetImes are
tion of the students if he can persuade them that step by step, how he conducted the analysis p laSlZe. (ee the section ill. cha(p terI l l on , I ! , support from bankers when thei
.
systematized ways of breaking down problems fashioned the final judgments which ana IYSIS . and report. writing) 0 f h . 011 l~ operatIOns are short of ready cas! "A l'
. ne 0 t ese IS cluslOn, on the other 11and . I con-
which contain unknown factors are possible and from this process, he will do more to shed structunng the repon so that tl fi l' IIi ' mlO'1t saY' "B k
L
'b I I . 1e ne ll1gs are o lcers are sometimes susceptiblebt f " an
profitable. on the analytic mysteries than any . descn ec ogically and coherentl AI'
An exceedingly simple example might be a participant in the program. . . ~
conClsen,.SS and the elimll1atiOll f '
'. y. not ler IS
. by organized crime fi ures 0 avots offe~'ed
' 0 contentIouS practices of oro'anize Ig " . fiThus , the bankmg
good point for introducing intelligence officers wor dS an d extraneous detail Finall . Ioan sharks, should b' e Cllme 19t1res lJat't' I I
to the analytic process and problem solving in Report Preparation erable amount of time shou.lei be ( y, a hconsld- be . ' I ' ICU ar y
. ' . spent on ow to possible." Other' 1 . ~onltored as closely as
general. Any expansion or elaboration of this Report writing should occupy an w meanl11gful conclusions N 'fi which I COnc USlons could be composed
· ·many mte . 11'Igence 0 ffi' lce mes can )e offered in this reg d' P . pro-
, d I . 0 specIlc
point tl~~~L~~s ~oe b:c;uall? ~ppropriate, but the
simplest concept will be IJos&ible only when each b loc o·f tIme cer s
, I' ar. omted
student thoroughly gTasps the fundamental idea Report writing in this context has two u".al1lll~' • lconc USlOI1S, after all, are the l)l'oel t f
.1
derivative It dd nac e IS ~hat a cOl1cl'usion is
"d' . I' uc s 0 mental
and is confident enough to extend himself a little investigative reports prepared in the field ! ISClP me, even more than masterv of th . . " a s a perspectIve or demonstrates
further. The simple example is the Fujiyama . d to h ea d quarters, an d t Ile reports
su b mitte i.'
'word' ACCO~" d'mg Iy, the students . e wntten
should be ~ relatIOnshIp that Was only implicit in the ori ._
concept. This concerns the .Japanese father and are the end products of the intelligence jgllldecl to tram themselves to d mal text. Above all, it tells the sig'nificance ogf
; . raw out one or an item.
his ~on traveling by train from Tokyo to Osaka. These latter reports are those which are jtwo, or pOSSIbly a few more mao "
Out of the right-hand window the famous snow- . . f . hI' i. , ,111 POll1ts that
culmll1atIon 0 sortmg t raug 1 raw xonstltute the basic reasons f I '
capped Mount Fujiyama suddenly appears, its '
co 11 atl11g t1lose re Ia;,eelpIeces,
' ana I '
yzmg the I ,tle I '
matenals and WrItten . tileor "1aVll1g. assembled
top covered as usual with heavy clouds. The ·
IeetlOn 1
se ecte
d f d d d'
or stu y, an . rmnng
)I
;p ace. These main ideas or themes I eport 111 the first
sl 11 b
Technical Training
father says to the boy, "You can see most of useful judgments from the picture so ;r'ouped in a rough order of priority ane~~e~dee~ It lllust be aSSumed th
Mount Fujiyama, son, but not the top. Tell me the . t II' o at personnel assigned to
;mto a paragraph or two Ideal! . 111 e l 'ence officers' t, . .
Field Reports 'of the a e 1 . , y, a senIOr officer b ra111111g pro 'l!
what you think the top looks like." The son, a
studious little boy, draws a picture of the moun-
l
The field report will probably be familiar pn What he needs b
'g ncy s 10uld be asked to present l' ,. ha~e ,undergone basic training in jn!;~~'a;~~e
tain with its cloud cover on a small pad of paper. most Li~ the students in an intelligence Jntelli . .
.
y way of reports from his
11S VIews
::~:~\qyu:~., ~nde1ed m?st will probably hav: had
He then draws the same picture of the moun- training course. In fact, not much more 'b e sha~e~ce un~t, a.nd how such reports should (IS 111 e etectlve or oth'
activity learning their trade b ~r. ll~Vestlgar~ve
'.'
tain, but removes the clouds. Then, he extends tion will be needed at this point in their
l I
The e. t? sU.lt hIS tastes and work style. teIIi 'en IIi" , " y e 0111g. The 111-
the sides at the same pitch until they intersect. k dlstl11ctlon between a su " .g ce 0 lcers traulIng program should not
than to reemphasize the necessity for clearly ,conclusion should be t .mmmy and a ObVIOusly, occupy the time of the students witl;
He gives this picture to his father as his answer. ing the who's, where's, when's, with what's, ~rcises conducted t ~Iressed repeatedly and ex-
"Very g'ood deductive reasoning', son," says his how's. The fundam~ntals, such as short /implest method to ~ 1 ustr~te th~ ~atter. The
.~hese matters, but should be llsed as a vehicle to
father, "but very bad answer. If you read more tences, clear antecedents and the like, 'Ihe I . ccomphsh tIllS IS to present emonstrate ne.wly developed techniques in such
geography and fewer Lomic books, you would have been mastered by most many years c ass WIth a Series f . I areas. as surveIllance, photocrra)h eI " .
.aescribinO'som 0 Sll1g e paragTaphs eaveSdropping, and the like bTll Y, I ectr0111C
know this whole part of our country was once If not, this is hardly the course for dealing 'lions anct l' e aspect of organized crime opera- t" . lese e emonstra-
volcanic. Almost all the mountains around here them. On the other hand, a truly pro hllsio~s fOl,:;U~st the students to compose con- lOllS
the
optlma.lIy

would include field exer"' .
Clses 111
are old craters and their tops a:e flattened out- presentation on effective eXIJ<;?sitory writing .Ihe foll' . 'c paragraph. Take, for example use 0 new eqUIpment or new tec11nI'
o well I' . ques as
they are not pointed as you have shown." often dramatize the need for correcting bad, .1 wmg paragraph on loan sharking: ' . a~ e ISCllsslons of their applicabilit . '
tam CIrCUmstances In 1 y 111 cer-
The class should be able quite quickly to habits in an hour or two. One additional .1
j "If 10(1.n sharks . . should be reI t d ' ot 1er words, hardware
grasp the moral of this story. Deductive reason- which should be stressed at every op sion of . h expenence theIr own ver- a e to actual or potential situatI'ons
ing alone cannot solve all problems when only a tlg t mon .. 1
W1erever 'bl T
the need for inc! uding evaluation in field abOve 'o'etting t ' ey cn~ls, they are not . 1 ~OS~I e. he training of highly tech-
some of the facts are known. In this case, total ports. Here the instructor must balance on in ordeo t 0 a professIOnal loan officer lUca speCIalIsts, such as electronic eavesdro
reliance on deductive reasoning lead the boy thin line between the general instruction' New England l' 0 use bank fund R . ~per~tors or accountant analysts will probabl p
b k s. ecently in requIre resort t . 1. ( Y
astray. A moment's research into any refereJ:ce tell only the facts" and the need at enjoyed a tast: . t~. ~oa~ ?fficer, who had b
0 specla m-service courses offered
work would have offered the boy a better chano for knowing what the investigator on th~ by a racketeer 0 Ig1 hVll1g offered him y t 1
le local polI'ce d
. . aca emy, or even Federal
to be right. He made an intelligent hypothesib, believes to be the worth of the informatIOn modatin . a : re~l~rned the favor by accom- ~ra111111g, such as the basic agent's school operated
but since things are not always what they seem to has passed on. the rack;t '~ I~dlVldual referred to him b
be, his assumption was badly mistaken. Without The bo ,eel w~th a personal loan of $3
. nOWer Immed' t l ' ,
ood
.
y the Internal Revenue Service H
mini l' .
mum, t 1e Intelligence officers' trainin 1'0-
owever, at a
research, he could never have made an accurate
hypothesis.
The Analytic Report to the rack
. to th eteer/loan
(lIm b
Ia e y paId $600 or so
shal'k wh 0 1lad steered gram has an obligation to make it clear ! ~he
The analytic report is another matter
e ank and retained' the balance studen~s hov.v such skills can be used to produce
One final word on analysis is necessary. Noth- gether. It is quite possible that not all sounclmtellIgence.
82
83

~~------------~-------- ............
proposed to dramatize a quite personal involve- in the intellig'ence unit, and a selection of recent
. 'mply a minimum bOll ment in the intelligence process as something of investigators' reports and data received from
leno,th in this chapter IS SI d1 1 I
b .' tl er topicS could be a e ee as P~l service first, to the agency head, and secondly, to <)ther agencies. The task would be to compose'
Security Training upon WhICh 0 1 1 d mand or oPl)Ortuniti~·" the investigator developing' a specific inquiry. something of value to the policymaking level of
" '1 blem for the intelli- . 1 1 al neee s e , 1
tlCU ar oc' ., m base however II, Such a presentation would only have impact if the agency. There need be no attention to such
Secunty IS a specIa pro red I'n the trail1ing , Even as a mlnnnu (, ' .1
, d must b e cove , arIse. . . . program represents a qU!E the official were able to demonstrate that he lIsed things as style or grammar in this exercise, but
gence umt an . VI f a discussion or thIS )l'oposed traU1111g . 'l11 ffi I
See chapter or b 1 " 1 challeno'e for the tralll g 0 eel intelligence directly and strategically. Its value each student would be required to defend his
course, ( '11' ellce officer must e Soplllstl~atef c b' om~what beyond the capab[, as a reorienting device would come as he de- selection of topics, format, and the overall thrust
The mte 19
pro b1 em,) ' b ' ted to a much more Itmaym act es . l' ;1
aware or why he IS ~u, Jecstigatio:l than that of . 'iven staff on board 111 po Ice aC3. l scribed how he was able to draw from his intelli- of bis report against the criticisms of his peers
ues. of any grl even the most progressive politI gence unit specific reports or briefings that and the course director.
thorough backgTo~ll1e ~~v~1Ust understand why emles. C ea y, . 0 d outside help ~ assisted him in' making better decisions about
his brother officers, l' d have . re 0111 ' to nee .I 'Clearly, the variations possible in this sort of
this is essential even thOUgl~~~1~al;e:h~1~:S In the
academIes a g b., • some o[ the prOpDlt,
a training program are limited only by the
organizing and presentl11g I sirrnificant policy problems. Since there can be no
been a law enforcement 0 1 , sl~bstitute for the reality of the particular world imagination of whoever designs it. But in all
sub]' ect matter, ,t f II
for several years, '. b\e to contract out pal so k\ in which each of the students lives and operates, cases the objective remains the same. It is to
same ag~ncy" ffi must understand the It may be c1esna
,
. .
all of it to a U!1lVerslty P~l the next step might be an informal session re- stimulate rigorous thinking about the relation-
re~~~s 1~~:llt~~:nr~;i~ l:~~:~rit~ot~~gql~i~e~~~~~s af~~~
'n WhICh Ie IS g
l)rOoTanl
f essor
b
or
or even ,
researc 1101"", ~alll'zation
b
'
,
.
'11
'11' l
Fllla y, In so[') quiring them to adapt the speaker's system of
to alTangd \ intelligence usage to their own situations. This
ship between intelligence and command level
decisionmaking. Only the rare course director
a:
the OuIces 1 , l' its files, He cannot , "
'lirLSChctlOnS . m,ay be l)OSSI)
It , . e' . \'
especially for the m~terIa ~nlk to other officers in {he intellio'ence officers' tra1l11l1g proglram to 1 could be followed by a general critique of can describe this relationship with any degree
b " , 1 lItside the aeac emy at l the various suggestions made by the course of conviction or persuasiveness. On the other
even be completely ree to a C tIle matters under conducted entne y 0 This option I11i~'
, . cy about some 01 ( 1 . 1 ,t d by a contractor. 't participants. hand, a feeling for it may develop from the im-
lus own ag,en ,( 's unit He must understane SIte se ec e E l thers since it WOll merSIon into the process itself of those involved
consideratlon m 111
'ff between ea m
d' l' g ivith unsubstan-
' - be pre fel'a ble to any 0 t 1e 0 ,
t' the newne r,.>. 01c,l lIe techmnll.
.
1 "War Gaming" in decision making.
the ell erence t' ns harmful to the sub- tend to drama Ize d t ely On the other han'
tiated reports and all~g~.lO, with official arrest and approaches un e;ls ~ ve to be chosen Iii,' Another technique for provoking new think-
The concept behind this approach is one
ject persons,,, and e eatsl~g This is the obviolls which is reiterated throughout this volume: To
the contl'ac~~~e i~~~~l~io':~ee theory and praCli', ing on intelligence as a tool of supervisors is to
records and rap she~. 'uest lecture by an involve each course participant in a "war game
appreciate the intelligence process and to be able
great care SI. 1 '1 "de1y known or unclerstoo
point in the co~me £o~ ,~t; and intelligence:' is not a partlcll al y i\ I exercise." A scenario describing certain phased
to exploit intelligence effectively the component
n parts of the process must be unclerstood thor-
attorney on pnv ac y g Iesel;ted to the intelli- discipline. j penetration moves of organized crime in a given
·'ty should a1so b e pr , oughly. Without this understanding, the com-
SeCUD for guardlllg an area .Icity would be presented, and roles, such as police
ger:ce officers as a ~~e:~~ or 'ani;ed crime pene-
mandlevel officer will be unable to discern 'what
COMMAND LEVEL TRAININ? : '\chief, ,Prosec.utor, intelligenc~ unit commander,
WhICh may be a tar b , g, Ethe unit can he can do with the mass or paper coming across
, ff.t EffectIve secunty 0 .' 's the most c1eman\orgamzed CrIme boss, etc., aSSIgned to the various
hi~ desk, or will not fully grasp why he is being
tratlon e 01 s.
only be achieved 1[ tIe \\ ly
'. 1 ",\" or security IS
,
e ,om~a nd , level, 1 tra1l11Tlg
It 'Will /u
1 necessitate sel':. I. dents 111 . t I1e course. T he purpose would be
asked to acquire two additional investigators for
~ng obl,lgatl~n of ,~o: for students and i).ISt:U(I~! \Iess t~ find a scho~1 solutior: to tl:e game than to .his intelligence unit, or how he can measure the
understood, ,
The intellIgence officel must a S?
. 'I be O'iven 1l1tellectuall etooll b h' 1 zaI'ds tillS ilnnli~·lconstlUct later a hst of the ll1telhgence products
, . I1 a11 tlIe psyc overall effectiveness of the unit, or offer any rea-
. .lC. , 1a ntent should IIIr '..
b • 0'

~.Ithat would have been useful 111 the course of the
A
" ' ..' ty when he IS operatlllo alIke, WIt
special tra1l1111g m secm.I . o· in difR- The trall11 n g co " , . A . sonable resistance to the public prosecutor ,vho
, tl e fIeld He will olten be operatlll b 1 for t1Ie 1at t er. 1 t ' 11telligence canl ~ .exelClse. postmortem of thIS ty})e could arouse
. . tl me' w la I ; r wants to "let up a little on hijacking investiga-
111 1 , d ust come to understanc a s111g1e m~ Jor Ie I . 1 Minor themes 1I'0i:;~ rln the students a recognition of the intelligence
cult circumstance~ an. m b k to his unit must (or the command evde. 1 topics re1ated.:lreso urces they should develop with their own
tions and concentrate on gambling." In effect,
why his commumcatlOnS 'iV~c away his operation usua II y cI u ster aroun ' . 1severa. breakthrougll, I ' 'Ci ommands. Tl1e scenarIO . would have to be care- he will be more or less a helpless victim of the
be guarded so as not to g , . to thema111tleme·.c I ) lfllil 1 " posed a sHua- swirling events of the day, the routine preoccupa-
, . 1 . bouts to the crllnlllal. some way . strategies Ot tIel •. i y preparec , however, so that It
or lus own w leI ea ' techmques, new ( II' .' {tion f tions of all law enforcement age[lcies, and the
inte II IgenCe : the inte Igec; 1 0 some degree of reality. Too fanciful a
. d cn. minal managll1g \' ,', ~'ga,me wou Jcl only produce synicism or derision. seemingl y mysterious expertise of his subordi-
o'alllZe " 1" n sand intellge'i
Other Topics b recent court e eCISlO < . nates. Instead of being buffeted by all these
process,_ j

f r described for forces, he should prepare himself to use intelli·


limitations, etc: . '01 t be to offera!t!i Writing the Intelligence Report
The training progTam so a
. fRcers is by no means a
cOmI)lete A good start1l1g p01l1t m I b : t
officer fro~:
. or discussion by a promInent 1 spe~. ~ A~otll1ng trammg deVIce whIch would have
'. ,, . . gence for his own command purposes and to sup-
port him in controlling the assets at his disposal.
intel 1Igence 0 ' , other sub]' ects that
k There a1 e many 1 tlll e
t' onal intelligence agen~. y Sue
' I a
I uselt;} ' ~peClal'. me' an1l1g to t 1Ie command Ieve1 would be The only way he can do this is to comprehend
pac 1~gqe~lite l)rOl)erly and rewardingly be t?uchee na lid be asked to emphaSIze ho'~ lei di~jto aSSIgn each participant the task of preparIng the intelligence process and its potential for
cou l I t processUlO' an d wou ass IllS ces ~ "weekl' II'
n-for example, automatee c a a . i:l.. ~nte11iO'ence which comes ~cr 1 vantSall1'1n y lJ1te Igence report for the agency head. contributing to the basic missions or the ag'ency,
o . l' amlinin ' the collation (unctIOn, new
analY~ls, st e, £ g the intelligence unit, plans IhoiV 11~ defines what intellIgence lie 't 'aCCOIII'~' Ie students would be given factsheets describ-
nd wla'
secunty cO.nc.ept~?r intelligence and trends in able to him each mormng, a
'
,
11
£ l's pers~
terms .0 11ntS to II .rgamzed'
'ng tI .
I,e prevIOUS weeks' events as they related to Understanding Methodology and Process
for in-serVIce tram1l1g, l' d at some d ations he 111ak'es 111. ' cnme c1evelopments, newspaper stor- So far the discussion has centered on intelli-
W hat has been e ISCUSS e , eqUlrem e . es, Statl . .
the law, etc. timetable and competll1~ r this approac\ ~ ~ 'IS accounts of varIOUS studIes underway gence as a product-that is, the informed judg-
_ _ ~--
,j For further elaboration see appc
'ndix A "Intelligence and
. ,
himself informed. ObVIOusly, U 85
the Law." \~ I\
~(
!.\,l
84

..
~ •. 1 ,""* ",' ....

, ..,~
ment resulting from the collection, evaluation, it bring' in the most innovative and even expen(:··.·.•.•
. I '!
1
cally some review of th 1
' e atest analytl'c
and analysis of varied scraps of information. mental approaches 111 use wherever t ley mayM'~ techniques. But even within the 'd"
The command level needs to have confidence:! in found. This, in turn, 'will normally require t~I.! 3. Trends in organized crime '" framework, ce;tain u' 1 r t~a !tronal training
the process which converts raw information into appearance of speakers fTom other intelligellJ.<J throughout the country. . actlvllies low. Factsheets are ~et~e~ ~~es are useful to fol-
these informed judgments. Moreover, and this units or from Federal law enforcement agenciJj " another way, lectures that an. lectures. ?r put
point is critical for management, the command f i If there IS S!I)! some time avail bl f' of factual data are deadl are SImply a r.ecltation
level must come to recognize that in a real sense The Command Level and Organized CrimI/broad subject areas are cove;'e~l ~ e a tel' those speaker who is a VIP' 1 y. A. potentIal guest
it is responsible for setting the qualitative stand- . . vtieleration of new hn 'd ' . le~ scnne con- is not thereby a g'r'eat In a'k" enforcement circles
An 111novatIve apprO?dl should also be ul((t, '11 I. . ,1 ware apphcatlon for SUr- . ' s p e a 'cr F' d
ards of the agency. Shoddy intelligence w'ill . 1 . f 1
111 t lat portlOn 0 t le comman
d 1 t, ,.,lel ance, e ectrol1lc dete t'
evel COUI¥.. .f, t, 1 1 I 1 . c lon, etc., could be
Ius oratorical talents , . as we II'as 1 III out about
', .
" resul t in bad decisions or faulty strategy or 1 .1 . 1 . . If
concernee Wtt 1 orgal1lzec cnme ltse . The e~th lei b '
1,ll1!Ocllcec. ceally tIllS
Sort of instruction
He may do better l'n
a
I'
(iSCUSSlOn
.' us
setf
lCputatIOl1.
. D J
unrealistic plans. Therefore, training at the use Outdated trainin g fi1 I . mg. on't I
command level should aim at clarifying' the eval-
phasis should be on trends in the activitieslf Oll
. d . . 1 d' fr
e .reslerved for the technical experts but
. ) as a practlca matter the b d ' suspect tha t you are tr in ,ms, the stl:den~s will i
orgal1lze crumna syn lcates om a vanetYt1{f d ale T' • '" 'u getary aspects of
'. lazy, or both Eff y g to use up tunc, or are I
uative and analytic elements of the intelligence urban points in the country. Since most lall,.I.lar d"l acq Uls!tIOn may be such that tIle com • Jectlve field exercises
. "I man eve l rna b bl" . '- - enormo~lS amOll11ts
process, not only so that the component parts of
the process are fully appreciated, but so that the
enforcement agenCIes suffer to some degree ('I th b', Y e.o.
1ged to become immersed
l
.
)nor to I d '
ane unnO' the ex ,.
f'
0' mstructC)"
. .
"
1 S tune
. llseboth
'
up.
another from "Iocalitis," this approach rna)' pnil':llle su jen · ThIS IS the level, after all WI1I'('h be taken that tIle re~ I ' erose. Care should
command 1evel can assert its responsibilities for . . . . ] WI lave to (efend
rl I
proro~a s for costly acquisi-
,.
quality control at points where it may expect to
make some impact. (See chapter II for a fuller
voke some SCeptlClsm. It IS always eaSIer tOlJ,
of one's mvn jurisdiction, "vVell, that can't liar tn~t'
It h db,
t.
'lest ~now.ll1tlmately 'what it wishes
pen here," than it is to admit that, although )'0:1 to 0 a111 Ol t le 111telhgence unit.
" II t IS worth the investment
l •

Untraditional Training Te 1· '


discussion of managing the process.)
A significant portion of any command level
~?n't .think it could happen h~re, it might,.l1 OTHER T T

~v ~lere budgets are relativel


C Inlques

If rt chd, you 'wouldn't necessanl'7 know aballt,/RAINING PROGRAMS trammg office1's ar y generous and
training progTam, then, should be devoted to For this reason it would be desirable to dfli In chapter IV on staffing som
J
" , e O'el1erall y f f 1
)
new techniques of t b I' ree 0 ot ler duties,
evaluating' techniques and analytic methodolo- examples of organized crime activities fromcili ,~ade for special training'/)l'o e sU!gestIOns are Presumably the inte~~~ 11l1g should be attempted.
gies employed in the intelligence process. The . d I' . filt 11' ill grams iCr the active
o·f a SIZe an comp eXlty comparable to tru$ e Igence 0 '1Cer and analyst N l' ' will be amonO' the n ~gence officers to be trained
command level will not, of course, be deeply which the students serve. The training offi~~ed be added here save to r' ,~t ~ll1g further ful l)ersonnetI'n tIl Ole resourceful and thought-
engaged in these matters itself. Instead, the charged with preparing this part of the coun ~'zed crime changes its charac~ma~1 t l:.t
as orga- probably m k le. aO'ency All
. ' S suc 1 t ley would
may be hard put to come up with a variel) )~ry to combat it may be aber'l let 11l~ neces-
b
training should provide insights which senior a e a good gTOU h'
ute new trainin ' a l P on w Ich to test
officers in command positions may find useful in criminal activities from distant points. There 'Jam those now employeel sTol . y dl~erent soh'ino' for ~x'a:lr~aC.les. SmalJ group problem
querying the validity and soundness of the judg- .' 'U ' . le 111tell
no better answer for tlus than to do careful IIo ... IUlt commander must remain fl '11' Igence provid~s a o·ag'e )f~' IS lal.method which not only
ments offered to them by their intelligence work well in advance. This may include ami; ~f requests by his subordinat ese;I) e 111 ~he face but can also meas'
b' 0 Inte Ig'ence d
an practlcalrty
'.
apparatus. This portion of the training will paper clipping file on organized crime storie\i~Ctaltyprograms of training' M or speCIfic spe- . ure In a rough 1"
as leadership potent' I d way SUcl tlungs
have served its purpose if it provides the top even subscription to a clipping service on Unl uelget permittino") enco~lra ~reo~er, ?e ~hould flexibility S' '1 1a an personal volatility or
levels of the agency with the capacity to ask tough subject. Regionai contacts habitually llsed!i~e professional j(~lrnals of ge su. sCnption to . Iml arly open b k .
questions about the way in which intelligence 'l 1 h' 51\lilles d ' a vanety of e1' . the students are o'ived r - fOO projects where
t h e oca agency can be tapped for t IS pur~I~( ,an attendance by I . b . ISCl- limit against which th: I~ a Sources and a time
judgments are developed. an d POSSI'bl y the larger law enforcement c~F;. .Inrofess·IOna I '
SOCIety me t' '11S su ordmate ' s at and finite piece f YI .ust construct a small
If the above sounds more like management . ' ' . The e lUgs and con vent'
mUl1lty networks such as LEIU or an assoClau:~ t Se are where the new t 'd Ions. method of J'lldg'iI~' ana YSIS can be used as a
training than intelligence training, that is be- of police chiefs. J\~here reports of method lesO'. 1 leas are floated; " " g mental dexterity
cause good intelligence results only when there ,'are made and 1 0 °olca breakthrouo'hs pllOntles, and the abilit t ' sense of
he'll ' w lere new uses for f . I:? pressure. y 0 keep cool under
is sound management of the information flow, Training Priorities and Hardware 11' s may be Spotted. All o f ' un am~Itar
and it certainly cannot afford to be passive about ,;~lIch a part of " . thIS, of course, IS as All these-and man 1 .
what it receives as an end product. The section There need be no set program for a cOlllm,,}' tralllmg as actual Course work be used-should h~v/ ~l~ ler deVIces .which could
of the training program devoted to analysis and level course set down in these pages. TI1; ~
opportunities for training at this level 1I'11I.JJ
d
TRAI ~,
NING 1 ECHNIQUES
. They should be Ie
say, they should b
.
arnlnO' eXI)e .
b.
e e l ement In common.
nences. That IS to
.
methodologies should be sufficiently detailed so . . e monItored cl 1 b
that it lifts the analytic process out of the realm very I~ng in terms of man-hou.rs away from~~tca,tt:red throughout the fore" " . tramll1g' staff ,
.1.'
WIt 1 certar .Ii ose'y. y the
of mysteries performed by experts and makes it, operatIonal desk, so there 1,,111 almost ahultralluug for different Ie 1 f rom g dISCUSSIon mind. The first b' . n specIIC ObjectIves in
. 0 jectlve would b t .
if only roughly, meaningful to top management. need to be a hig'h premium set on staking~~ c~rs and analysts havev~ s 0 awenf?rcement t Ile idea that there are n 1 e ~ get across
Such exposure should provide the command training priorities. A good guide to foil: ~~r,llmg certain useful t ~el: sUggestIOns con- problems or exer' . 0 sc 1O?1 SOlutIOns to the
level with a faT more sophisticated view of what would be that presented in this chapter: ~:~Itten exercises, "war O',ec .11l~~es: seminars, should do a greatClses 111 questIon
deal to' . . .
Th'
IS, alone,
an intelligence unit can do if the necessary funds
;l'lse un tradition I oammg, etc. N one of the notion that ' I ' ll1~tlll 111 the students
I~to I' I a approaches sho 11 b product of a e1' ?ol~c 111telligence is often the
and talents are available to it. It is important, 1. Exploring what intelligence can d0 ". Igltly. Th r II . u c e entered , Iscrp 111ed and . . .
dJist' C) a requrre hi 11 ' . d' . rather tl .' Imagll1atlve mind
therefore, that this portion of the course not be the command Ie.vel and h o w . " Ie teaching skill . g 1 Y m IVld- . . lan an elephantll1e mem '
a mere representation of what is going on in the 2. Understanding the intelligencepr((f' •g, and, in some s, conSIderable preplan- objectlVe of careful staff m . "O?: Another
oro \lram'!' cases, access to a .
local organized crime intelligence unit, but that particularly its methodology, an.d sr' fi; . lIar materials d f '" ,vanety of a critique or evalua . On~tollng IS to set up
l! an aClItties. each problem Or e ,tl?n seSSIOn at the end of
~l xelCIse. It should not matter
86 d
lH
:lli 87
. lupc
.. k'mg. , He isV,S'
a lower e. What is the status of hijacking on the West
. .' 1 I ther an individual did volved m 1 Query files. 1. Update, clwnge, or write a new hypothesis
in courses ,of tIus ~l1lC ;~\;I~at matters is that he . C,en t1,'a1 Clty'S vest dC e
captain 111 based on the new information he obtained from
d, 'Who is involved in ownership of the Eating
cat;,) The two had dinner at the Eati~lg
well or (ltd pOOl y. I tIle assio'nment as the instructor. (Each student may have a some-
d 0 w latever , , 0 b? Query liquor license bureau.
learnecl I~(~w t,o '1 if he has done poorly, the • 1 f· e, What has been the pattern of I-larry Jones' what different clata base since all may llot ask the
well. Accordmg y, d I 1 in sllch a way that and• I-Iany palO or a very expenslve
questions necessary to get all available infor-
critique should be m~) Ie ec ineffectively, recog-
'ties over the past year? Qlwry the files and
ning. D 'vas dressed expensively , general police records. mation. As stated above, the instructor should
he learns what he: has e~ne _ 'eciates what to do 9 Jane
". .
oe"
h
b . I ' only give out the informatioll that is now reo
nizes his cleficiennes, an appl ,.'" is not in was weanng w a t ,al)l)eared to e tea '
. ,them The cntIq ue elO1"s Reaction quired and logical somces from which it can be
about correctlllg. '.~., I' but an explora- monds. . ed a t the Eating CI ub ' obtained.)
. 'reC"tlve (h~ClI) lne, . 4 They arnv , 'b ' To Student 1: This is a legitimate hypothesis
this sense a (eH f the tram- .' 'd'll The license1'" num, er
, • '
l> t oj- those areas 0, ,vlute Ca 1 ac., utseems to be out of keeping with the potential Samj)Ze Studenl Resj}(Jnses
tion with the stue <:11 ' 1 nd an effort to NY 61245. Jane Doe was C IlV111g.
'n o' he has not understo?c a ' d " ere. ing of the change in pattern for Harry
1'rst'mdlllO' then an t 1 ,)'tlldent 3: HYjJothesis:
The pnsence of
1 /") . The investigator .handling the informer es, Beea llse of his rank, if for no other rea-
strengthen hIS une e ';. , 1 in this chapter will Jane Doe was a cover for a meeting in the Eating
The approaches Ollt mee ,. "around of tra- his own views, statIng: there should have been, at least, one round
. " 1 'able wrenc Hng , Club between Harry Jones anc! other!> unknown.
1 Jane D oe,(, vas a new woman .[or further questions to determine who the girl
reqUlre a conSlC e:, _ . "nino' l)rograms. It was probably an organiza, ional meeting per-
.. I I 'n!'orcement trell " ',. c). From the nature of the ~)Ut~ng, " and what Harry has been doing recently.
chaona aw <:. , ,'1\ 1 _ a laro'e task m It- To Siudent 2: This was an excellent hypothe- haps to bring Harry Jones together with the
Training' the tra1l1er S \\ 1 )e, have to -' t have received a substantIal . I,

J~
,b _
' ~' I Midamerica City people who reputedly were
,,
self. h>r thIS, spec
'ial arrangements may ,
" o tl e ecluCltion of a Iususcut 'f
0 t le p
roceeds. [Tom whatever and one that could be tested rather q llickly,
owners of the Eating Club. The goal wOllld ap-
tion he was in.voII~:~e:nl:el)Orted before
' sl)onsonn least, as to its general thrust and whether fur-
be made, sue I1 ,1S ,
1 -,
,b. r f institutes or pear to be to expand hijacking operations, espe-
. " , ffieers at a \anet) 0 ~L I-J any W,lS '"1 . ' activities should be focused on Harry Jones.
few traUll11g . ,() 1 I ,
) ISOl' f 51)ec'l'aI1'sts
' , . Such an . o' at' h
In t e Eating
, Club wluc 1t IS cially focusing on means to unload the "hot"
Federal traHung sc lOt d ' t lrl1s ifit l)1"oduces CIty.1::> ,
s m t eXI)ensive
o restauran
s. '. goods. It would appear that the l\Iidamerica
,'11 .' eld 0'00 re 1
investment t> 11
. . \\1)l ffieer capa ) eo f sparking
, student
Students ale ashe d 101(;S ., pond to lhe rejJorl '" Phase II City connection might be the answer to the fenc-
olle tra1ll1l1g ~) f' -~ . ino' new approaches to
' .' ing problem,
officer enthUSIasm 01 tl Y 0 1. Developing an hypot IleSlS . t 0 explal11
,,( it ' Instrllctor gives new informalion to students:
intell igence methods. · date mig'ht mean anc w ly 1 List of questions:
the e1mner
The instructor can give only the answers de-
'Ied below, and then only if the instructor feels
a. 'Who is Jim Roe? Query the files.
place. . s g'iving in
TO DEMONSTRATE c) .1\'Iake a list of five quest10l: , b. vVhat information is available on fencing
SAMPLE PROBLEMA:LYTIC TECHNIQUE r _ . . ority additional informatlOn they d
the student asked a valid question obtain-
AND TO TEST AN . from a logical source. of the hijacked items from either the East or
Ol pn b tter understan
, l ' lains what the m- immedia~ely necessary to -{he student must " vVest Side? Query the files under "F:>.ncing."
The followmg ~xamp e e~Pt(llclent and what H ., m1ght be up to, . 1. Intelligence files-biographic. Also the burglary squad.
1 lowe to t l1e s all y
pinpoint where Ile tl' nks the informatIOn a. No information on Jane Doe.
structor wou ( b '. 1 f the student. To 11 c. Who are the real owners of the Eating Club?
. ould be requnec 0 I1 be found. b. Harry Jones has a record of arrests for Query corporate license office of the state.
actIOll w '11 the problem shou c
the ([rea test extent POSSI ) e 1 t be a school variolls crimes including armed robbery but
. d. Who are the known associates of I-larry
be s~structured that ~he~'e 1~~~~ ~l~Cour~ges
the
SallljJie Stlldenl Responses . not for hijacking. As informer report in his
~Ie states that he is newly in charge of hi-
Jones? Query the files.
solution bl~t an al~I,)1oachline of thought. The St lldent 1: lIYiJothesis:, T~~e ~ll~ep~~;e~ to' e. Who is .Jane Doe? Check telephone com-
. 'fi 'other than w lat 1 , ( Jacking operations for the West Side syndi-
student to Jollow Ius own 1 is )art to evaluate slgl111CanCe I ',1 Harry Jones cate. The report is evaluated as probably pany, credit bureaus, city register, voting regis-
instructor must be rcad, y on 1 ~ '1'1> 1 and to namely a clinner da~e to w 11C 1 tration, drivers license registration.
1 t) the PIOU en, ' true and the i.nformer as being reliable,
different approac les 1'( t 1here he might have taken a new girl .friend. didn't 2. Intelligence fil es-functional.
l ' . I of qllestzons: (Student. f. Query Midamerica City the following:
point out to th.e .~tU( .e~~f ~~1 formation. This is ~IS thwlule) a. Hijacking: Substantial and increasing
req ucsted, other kmd,s. rather than to test further questioning was .wor " air! amOunt of hijacking on the East Side Dock 1. Any record on Harry Jones?
II t test tee lmque . > 2' HYiJothesls: The new 0 a~'eas,
a pro) em 0 , , _ follow a partIcular Student . r ' together Small amount of hijacking on West 2. Any record on Jim Roe?
the ability of a student to and the expensive surrounc 111gS f Side Docks, beginning about 6 months ago. D. Any record on Jane Doe?
analytic path. ~ated some change in the patter;1 0 b. Restaumnts: According to uncon- 4. Any reports in intelligence files on hi-
f~r Harry Jones. I~ ~~uld be tbla~ firmed reports, the Eating Club is owned by jacking that connects activities (including
Phase I .. k'
ported hIJac 111g, .
actIVItIes were
h Id be rl1l1"""',,,,, one of the criminal syndicates, some mem- fencing of "hot" goods) between the two
· to the stud~ents: . h ThiS report s 01.1 bers of which have connections in Mid- cities?
Ins/ruclor gives infonna t Ion , into lug gear.. d ' information america City, '
as an alerting Hem an :n~le .
. h d d a piece of paper on . 3. A uto license TecoTds-license reported 5. Any record of criminals holding own-
The student IS an e. ' )ur orted to have be sought on a high pnonty bam, ership in Eating Club?
I 'I there is informatlOn I p IS,sued to Jim Roe, a resident of the East
w List of questions: Side of the city.
UC 1
been turned in by a re I'la)
1 Ie .1 nformer . fil Student 4: Hypothesis: The dinner date
. D? Query the es"
1 the name of Jane Doe a, Who IS Jane oe , £the I s~udent is asked to Tespond to the new represented out of town persons getting in con-
b. Who is the registered ownel 0
. I IT )yry Jones (LI
1. A woman r an
'y Jones is Ion by: tact with Harry Jones through the good offices of
was seen WIt 1 ~ar 't d of being in- Query the license bureau . Jane Doe. The idea was to take over con trol of
a known criminal, suspec e '

88 89
based o.n the new information he ob-
that the student asked a valid question ,SlIbjecl
the city. The outside element was using' both from the 1l1structor. liow.I
the woman and money to buy Harry. The meet- able from a logical source. B. NOlltraditional Pattcl'llS
The sample problem enels 11el'e . fI owever }. Infi~tl'ation of legitimate busincss
ing portends a possibility of a gang war and an 1. Intelligence files-biographic. . 2. lluslJ1css manipulation ... , ........ ,. I
( mOl.e p Ilases.'
exerCise could go on for several·· 3. Real estatc .................. , . . .. I
incre,l!ie in crime as Harry attempts to prove to a. Jim Roe has no arrest record but " ' .. , .... , ... , .. . ... , . , , , ,. ....... I
4 . SkImming"
his new leaders what a tough, effective crook he ported to be a principal captain in each phase there should be ' .vers. t'Ilat I ead
ans'
5. White.collar ~~'i~;l~' .... " .. "" .... ' ... , .... " I
organized crime syndicate that controls. now Ilere,
. . and others that are
(ugO'estlve s . of C, 0111lela
. 1 Corruption as a ..........
PI" " 1 .': ...,' ..... , .... I
really is. ly dIfIerent hypotheses. The It>· 1) TI • 0" .. IlHlpa ObJcctlve 2
East Side. A reliable informer report 'I' . 0'
c,oa IS to test , 1C I ga11l7ed Crul1C Figur(' of tll(' I !170's .:::::::: 2 i
Roe with a criminal group in M' capa b I Itles of the students to put f'acts to-
Lisl of questio/ls:
0. Send ur~ent queries to all major dties 111
City. and to .construct a I)attern ' b 0 tl1 ten . ta- . III. The illlelligellfl' ProC('I.1
A. Collection ' .
I
2. Intelligence files-functional. to exp "I am the events ' (anci t 0 gUI'd e t 11e !.

I
the area seeking answers to the following: . .. I:'ieid .reporting .......... , .. .
a. East Side gang-syndicate: This tors 111 theIr search for ,IlOna acld't' I facts. 2. Survctllan('c .. , ... " ... , .
1. Any reports on criminals or others in has as their attorney S'am Laul and
3~ Infornlanls .. ... '" ........ , ....... .
their jurisdictioll who were reportedly in- leaders appear to use the Corner Bank. 4. Undercover ~;e'n"::"""""""""
H. Collation .... , ........ , ..... .
\'<llved in hijacking in Central City or in the informer reports a rumor that the fence I I
FIGURE I,J,-Two-wel'll training c . . / . . 1. Information
2• j \ . control ircll IHqU('~
. I
disposal of stolen goods therefrom? the East Side gang is in another city, . ,Oll1oe or IIIlelllgenee uto111allc data processing
.•.
, ,. , . " . , ..
2. Ally reports in their files on Jane Doe,
James Roe, Barry Jones?
:1. Ally reports on criminal gangs that ap-
say Midamerica City. Another in
report, unverified, states that Jim Ro&
bragged about his plan to take over the
aria Iyst/llloestigator

The Theory 0/ intelligence


Subject
.

Hours
C. Evaluation
D. Analysis

.
. . . ....... , .... ,...... I
.. " ......... : .......... , , ....... , • .t. . 1
l. Problems in analytic technique
2. Problrm solving '" ........ I
I
pear to be attempting in any way to develop /J. Fences: The "Vest Side gang SuPP?rt Function in Law Enforccmcnt 10" Disscmination ... , ....... , , . , ......... " ·1
ported using a legitimate company as a I. Suppo:'t to thc policymakcr or agcn~y"l; .. i" " .
relatiom with any persons or groups in Cen- a. Strategic intclligcnce cat I. Exercises in finished report writing, .. ,. . . . . .. 2
for getting rid of their hot goods. b. Contingcncy questions
tral City? owner is a woman, Janet Joe, from IV.. 0 pt'r~ltio~lal Tec!miqu('.\
h. Query the Federal agencies OIl Jane Doe, 2, Support t? ,the; ope~'ational objective A. Investlgatlvc Aids
america City. . a. TactlC,llllltelllgence H. Electronic Equipl11;';l~' , ..... " ......... , " " , .... , .!
James Roe, and I larry Jones. c. Banhs: Information derived d .. The Objectivity of Intelligence , ... , ............. . C. Photography ....... , ................ " .. 2
.•...........•....................... 2
c. Query the Federal agencies on any reports in vestigation on another case indicated Orgallized Crime
haying to do with hijacking in Central City and the IP.'J.iority ownership of the Corner V. SjJeciai Field P1'Obl(,l1ls
Traditional Pattel'lls
A. Investigative ... , ....... .
any link up between persons or groups in NEd- appears tV be held through a front. I. Gamblin!l" (bookmaking, policy, casino n. Analytic . '" ............ , .. " .. ,. 12
operatIOns, etc.) ., .. ,., ....
. ................................ .
america City and Central City. owner not known. 2. Loan sharking ........ . - ............ " 2
3. County Records. Ownership of . 3, Prostitution ........... , .. , ............. ,... I VI. Illlelligl'llCl' and lhe !.all'
Instrllctor's Reaction ing Club gives every appearance of 4. Narcotics traffic . . ....... , . . . . . • . . . . . . . V2 A. T~ends in Judicial Decision.!
R. Pnvacy Arrangcments " .. , ... , ... " ....... .
To Student 3: The hypothesis seemed rea- noncriminal hands. 5. L~~or . rackctecrin~ . : : : : : : : : : : ........ , . . . . . . . 1 C, Securitv ..... , .. " . . . . .. ..... 2
6. HI]ucklllg .......... ........ .. ...... I " ............. , ........ . ..................
sonable in light of the information and would 4. Intelligence files-Miclamerica ......................... 1
Total ............. , .... , .................. 80
sen'e as a good guide to probing the problem Department.
a. Jane Doe has no arrest record.
further. It did llot try to nm away with the
the wife of Bill Doe who was
developmcllt as though it were a major threat. being a fence and subsequently
"/.' It might become stich but the information avail-
• prison.
able at the moment did Hot appear to support b. Bill Doe had a record of a number
the Harry Jones operatioll as a major affair. arrests for robbery and for acting as a i
To Slue/ellt 4: This hypothesis seemed to be He had one prior conviction for
running too far ahead of facts. It led the student He reportedly worked with one of t1:c .
to put too much pressllre on a series of other law dicates, the North Side gang, which III
enforcement agencies to produce information. six months before Doe's arrest lI'al'
Finally, there was nothing in the information pOl-tedly becoming involved in hi
... available to suggest that Harry Jones would be
c. Jim Roe was born and
america City. He had several arrests
capable 01 taking over the city and thus worth one conviction for auto theft. He
stich as effort oy outsiders. portedly was a friend of EiH Doe .and
seen with members of the North Side
but is not thought to have been a
Pha~c III
of the gang.
Instmcto)" gives additional infQ1-mation to
Each student is asked to resjJond to the ·
students:
information by:
The instructor can give only the answers de-
tailed below and then only if the instructor feels 1. 1) pclating, changing', or writing a

90 91
'!
(
lalso
~ , some subsidiary objectives: (I) Enhancing to the person il1Volvec1, whether or not that per-

I
(

(the morale of the law enforcement agency as a son has a criminal record.
lll'hole by providing strong resistance to corrup- These are the security objectives, then. They
f ition, and (2) encouraging the flow of raw intelli- may be better understood if a list is madc of
i;~
1gence from the rest of the agency because of objecti yes for which a security policy slwuI d 1/ot
Iconfidence in the security level of the intelligence be reaching.
I . 1. The intelligence unit lIlust 1Iot lise security
!lUllt.
I To achieve these objectives, the intelligence to exclude authorized persons fro111 reading or
Chapter VI \mit must take steps to insure that all members
101 the unit nrc trustworthy and are in no manner
learning its findings. Intelligence is not pro-
duced for other intelligence o(JiCCl'S (except to
:1cting as an agent for organized crime or any the extent it is essential for den-Iopin)!, further
hther lawless element. The unit must adopt analyses), but for the collSlllller beyond the in-

SECURITY AND THE :physical security. methods which ensure that the
files are locatedll1 such a way that only author-
. heel personnel have access to them. Steps must
telligence unit. Once the consumer's ne('<1 to
know is determined, and fouud appropriate, the
intelligence material lUust be made avaih\blc to
be taken to ensure that the area cannot be pene- him. The intelligence unit must perfect guide-
INTELLIGENCE PROCESS trated easily at times when no personnel are on
duty. Personnel should apply rigorous security
lines for passing reports outside of its control.
Such guidel ines will generally concern the reli-
·jlrecautions in the performance of their duties. ability quotients of recipients. But the end pur-
. This applies generally to operations in a clanger- pose of determining levels of reliahility is to
I I' 1lnit due to: . ous area, either in plain cl othes or as an under- insure that the appropriate people receive and
'ty a sjJecial jJroblem for inte 1ge1lre
•SeC/lrl ) . fil agent. It applies specifically to the use of read the reports, not to prevent them from being
• seNsitivity of information tn ~~.'? targets for efforts to corrupt. communications where there is always a read.
• Lilwlihoocl its personnel are imme .. • of giving away their location or other infor- 2. Security must not under any condition be
.. Need for protection of rights of jJ1'lva 0 : I 12 trustworthiness of its personnel: . which would help to identify them. used to conceal an intelligence unit's employ-
t' peratwn dejJwC s o . d' d Ie Finally, it is important to understand that the ment of illegal techniques, such as electronic sur-
EffecU'ueness of intelll,gence unz s ~,
, ? •

b' f jJ{lst and present actzons of can t a .


t tlstworthiness reqw.res pro tng 0 system has an important role in protect- veillance where it is not permitting according to
• Assurance 0 f r . I tatus the right of privacy of individuals. Much of the statutes of the particular jurisdiction, In
employment-esjJecially finan~w s J ~ w adverse change occurs. information in intelligence files has to do sllch a case, security would simply be contribut-
. pd t required to tnsw'e t w 1 • h question of indo
• Periodzc u·a es . .. t . nnel especially were any allegations, unverified reports of activities ing to a more disastrous showdown when, as is
• polygraph is useful in evaluattng 'Jerso ) associations, and other matters which are not inevitable, the lise of illegal means is revealed.
integrity. . Il files are jJ1'otected evidential. :For example, the investi- 3. Security must not be used to conceal reports
office siJaces and) especw. y) 1
StejJs mllst be tahen to insure cannot always be sure what the relation- either from tbe jurisdiction'S political leadership
against access by unauthorized tJersons... t' tJ'e"t' 'lg operations requires: are between a number of people observed or other official representatives who are not mem-
• 1 '1 nforma zon-ga • / , lly entering a given location, allegedly bers of the law enforcement agency, or to prevent
Protection of personnel w neon t
the purpose of holding a criminal enterprise documents from being used by a public prosecu-
• Security of communicati01~s. 11 '(t1'Ce and in vehicles used, . The problem is even more compli- tor even though the sources of the documents are
• Anonymity 0 f /7Ie,i"erson tn a· nem , . . where a public place, such as a restaurant highly sensitive. Nor should security be used to
)lace on the shelves. She there?y aC,llleves tavern, is invol ved. 'Who is engaged in a conceal or cover up mistakes or corru pI activities
INTRODUCTION I ' t I in a fluid operational sltuatlO n, \' and who is simply a hungTy or thirsty by members of the unit or the agency.
con ro ' '-1 Ethe basic purpose ~ of the public? In many cases informa- 4. To summarize, ~ecurity should be llsed to
. I 'blem for the intelli- course, loses all Sig 1~ 0 I . tellig ence unIt
Secllri ty is a speCla PIO ffi nd
1l1 secured from observations of this kind can the end of preventing disclosure of material to
library. Similarl.y, 111 tIe b understood
, • . £ personnel, 0 Ice a £ secunty must e , be presented in court. On the other hand, unauthorized persons, and to preH~nt unauthor-
o'ellce Ul11t-secunty 0 .' " I rly purpose 0 . ' or the unIt,
t> • Secunty IS a pctrtIcll a iml)it1D'e on the basic objective 'ty in an essential information for an intelligence unit ized persons from gaining access to the files with
files, and operatIons., . ' I 'easons' the o I oses or secun
, . , fOl' two l)nnc1I)a 1 , .
What are tIe purp 'Ire that: seeks to develop an understanding of the the potential of misusing the information.
sensltl\'e (,onceln . '1 ·t's files
~ub_jeC~~,~t~~~r~t~'~:n~~\o-?rga~
.? Tl yare to 1l1SL . I patterns of organized crime, Thus, Security in any organization, \\'hether it be
delicacy ,of th7 telligence ul11t Ie, d ao'ains t
Intelligence unit personnel and their com~
and the mtel hgence u . t (or enetration or Information on file is pro~c(~) i;iormation military or diplomatic or police, focuses on three
unauthorized perso~s, ,an IUUst be fully aware of their responsi- aspects. There is, first, the necessity to assure the
nizec1 crime as a general talrge. tPlle clal'ly busi- -ao-encyand
. n ' - ' t 's I) ace In ' reports circulated wlth111 the, 0 .encie3 are to maintain a security system not only personal security of the organization's staff. Sec-
corruptlO . Seetin y , b (11y under-
. II' 'el1ce Ul11t must e u utecl to other law enforcement ag te with potential penetration by organized crime, ondly, there is the development of means for
ness () f- an 111te 19 1 in itself Some . el' commensura '
stood or it will become .an ene elderl librarian tected 111 a mann 1 to Ilass also against

inadvertent leakaO'e
0
of nnsub- protecting records and facilities used by the
. se allowec
intellio·ence officers are hke the 11 Yd \1 books sensitivity an d , 111 no ca " There lIlformation that might be damaging agency, And, finally, there is operational se-
• tl 1 I vhen she has reca e a c th rized persons .
who IS on y Iappy \ I ' n its rightful the hands Ot unau 0
on loan, and has every va ume 1 93

92
Third, the investigator mtlst not allow fairness Update of Background Investigation
on'-caused camp' laints by 1 the t d neighbors,'"
How did to prec I ue1e I' , 1 t'
lIS COnsiC era IOn
tlla·t tl. h: Sll b'Jec t
• "1 ornmunicating and when next to useless, unless eva ua ~ " rniO'ht in fact be a rogue as stlggeste(! by the It is illlportant also to have a specific program
cunty; that IS, W len c '. ,1 11r()blem These
c: 11 ' 11 ol)eratlO ncl ' investiO'ator gage the cha:'acte1 of the de~ogatory information, This is the hasic reason for updating- background investigations. Updat-
in the lIe ( on a
, )11S fa('ets o( secunty ell
' . 'e discllssed below; 'What ~vas the relatiolls lll P betwee1n t,\le, for careful checking of derogatory information, ing is necessary simply because people do get into
val'll I,
and the landlady? Had, th:y hac ot ler If an investigator is una ble to satisfy himself thZ!t trouble, even though up until the particulal'
'es which might expla1l1 111 part her one dangerolls allegation against a subject can be moment of trctnsgression; they bad nothing nega-
PERSONAL SECURITY em 1 I' ? Had the investigator checked explained by the malicious character :If the tive on their records, The update can be COI1-
towar( s u n 1 ' 11 'A' . nsf Did
, 't 1 e assured that its the neighbors about her a co~tlO, f source or a strained relationship between the ducted at routine intervals for every staff member
AllV intelligence urut mllS ) , , , tl y that
I ," , " tl emselves trustwO r 1 , tt ll1)t to trace (IOwn ,my 0 two indivicltwls, he is justified in recommending or, if in a large unit, a detailed investigation can
own Illembu s ,11 C. 1 "o()(1 security risks, inves.tigator, a e1 b'ect (lill'i.ng that lleriod
of the Sll J " further investigation into the allegation, If be done on a spot-check basis; every fifth man,
t is known as g ,. 1 Sl11)j' cds social life?
they ale W Ila ' I b' determinec ass(,)c,tate,s Ise If a b 0 lIt -'I" nothing' further turns lip which corroborates or for example.
satlS \y l U11
I ...
The secllrit y of a person can on y e. tina' to .' '1 ,".reful checking out
, ' . , ' IS in the past, attcmp " , short, eval11atlOll a1>:' '''are basic elements negates the charge, then the subject himseJf {Jpdating should fqcus on two areas in particu-
by p1'o\nng 1m a(tIOl " , del' certain 01'- 1 ' o'atory infor11lat10 11 , " , should be asked about it. lar, One is the financial status of tbe subject.
, I 'he wIB react un ,
c1eterHllne lim , 1 ' the current assona- e:ot"> W 1U(
([all'ness, "J1 S11oulcl be the investlgator s Stlcl1 ,"" llrocedure is delicate and should best The investigator should seek any evidence of
ll
cml1stances, and by assess gal' nt'lins \Vhile be undertaken with some care and prepJanning. significant change, either in terms of greatly in-
' I Intterns 1Ie In, ' ' too J' " ' 1 that an investigator
tiollS (\11<1 son a ,' ,'" is not a perfect Second lt IS essentIa c' , ' \ A formal but not unfriendly atmosphere for stich creased spending habits or of substantial borrow-
the hackground 1l1veStIgcltlOn, 'or the Fed- elude• . .,
informatlOn ,
11
1 devc\ol)S
e, 111 eva (" I 1 I '
! a can rontatlOlliS Jest llne er t lese nrcumstances, ing, The source of income which supports the
, ,. ns the expenence
~ysten.l by any me,1 " 'I t it is not only an sources of derogatory in(orm~tlOnf ~nlth~ , Very often the subject'S responses will give the increase in spending should be reported and the
' ' l l " l l t SI1('-O'ests t la I
eral ( J()\'elJ1l" ' t">b " lIT the loyalty ane ' d bove it is insuffiClent 01 tIe , investigator new ll'acls to trace clown', sometimes motivations behind the substantial increase in
eiTecti\'l' approach to ~sta~)lls,11ll ?' ff b It it is the pI e ('Ite a ,
1 to report negatlye y t 1a lC
, I I t I
. his personal reactions and facial expressions will borwwing should be explored, In the first in-
inl(.grity of an o~'ganllatlon s Std , 1 ga tojr I mere Ybstalltiate the I~Hldlady's allegation!
una) e to su " , )reted as . i reveal either genuine righteous indignation or stance, income without an apparent source could
only method avallable.
Such, a staten1lent c~n fb~t~11~~e:~ic1ence' 'there iI' some consternation mixed with guilt, In those mean a payoff. In the second instance, heavy
that 111 the a )sence 0 1 1' ,jurisdictions where it is legal, polygraphing the borrowing could mean either a payoff or the
The Background Investigation le;~st the possibility tha~ the ~~n~,:~lr: style.· f.bject (with his agTeement) about the all ega- development of a situation in which the subject
flected accurately on tIe su Jec 1'1 lion can be useful. (See page 97 below for a could become susceptible to an offer of help (see
A bac ,g
'k round investigation should ,Probe all
, I' f, both l)rofesslOnal and ~~1 the ()~her hanel, the in:estig;:ttO\, e e'~:~i:' discussion of the usc of the polygraph,) figure 15, page 96, a sample financial ques-
,t of '\ l)erso n She, 'I k to substantiate or (ISO
aspe( s 'TI' b'l( k'gToUne11'11"estig'ltlon s IOU11 ( steps he toO , then he has impHcitly In the last analysis, if doubt still remains in tionnaire).
persona I '
v ,
1~ '1'·' )£ lack of: character or landlady's tesumony, 1 ' in the picture, ,the minds of the unit supervisor or the investi- The second point of focus of an update should
seek to detect me lcatlOl1S ( , 1 lut'ks eluded elements of eva uatlOn 'd ;gator, the subject may be told that unless he can be on social life. Here again, any significant
. , t A l)erson w 10
,
111teg;1l "
"ty in either contex . ", d \
I life-that IS, 111 IllS ea-
'1~11e recil)ient of the report can JU ge I change without apparent cause should be inves-
1 ts by the j lelp refute the allegation, his candidacy will be
integri~y 1111:1S ,l~~rS~n\nd family-will have a ,Q
tll '- (lctails of denials or 1agree1n:en ec lIt)'"v tllC osed, This may be looked on as putting
tigated, In partiwiar, a careful look should be
inos with I11S (nen s ' I ' inteoTity bors and associates of tIe SU )J t ., I 'given as to wbether the subject'S social group
t"> , 'nt to act WIt 10th " , 1 lid be measmc(, monkey on the applicant's back, but given
tendency at some pOl 1 Id be remem- lady's accusatlOnS s 101, often position he is hOI)ing' to aSStlme, this is includes anyone on the fringes of organized
in a l)rofessional matter. ~t s lOU
'
, 'on in b" IS pOlnt but IS one ~ crime, Similar care should be shown if the sub-
1 . ngh t to a POSltl perhaps an 0 \101 '" d because unJ·ustifieel.
bered that no one la~:1 , , [Ifill the re- 1)y file 1e1 11 ' lVes tiga tors. I t IS nllsse ' ject appears to be involved with a group that
,
publIC 0 lCe, C\ e ,
II' "'ry Citizen mllst u 1
' I t ol1ice before
" r' 'n many law In the background investigation, in addition
does not fit in with the pattern of his other activi-
is a IOllg,standll1g trac,ltlOn,l te obJ'ectivity" I f '
q uirernents established IOl t la l ' tegrity ment agencies of ellspas slOl,la, This a searc 1 () the normal records of schoolmg, ties, especially in terms of his income,
Tl 'I aracter am 111
being considered, Ie, C l.'e uiren~ents, and, as , nne I investl IT atlO nS , previous employment and family, ql1es-
But, as important as is the updating of the
conducting perso
' d 'eel a
£nnc1ame "lltal rule for
s
I
lould be asked concerning the candidate's
of an applicant are baSIC ,I q 1ecially important fine ru.e, I 111 e ..I , ,,' But background investigation of the intel1igence
pointed out above, they me ,e~l , 'ntelligence 'jO'ency that prides itself on 111tefll~' t the II, dealings and his associates, (See figure unit's personnel, prior announCI~ment of such a
,\'llen associated with a pOSltlO~ 1\1 1 l't lIas' :)ften' a narrow interpre,tatiol? 0 I\' ;hUS page 96, for a sample financial question- requirement is even more important. This is
, I ' 11lgence un
I 1 to ugly dlStortlO nS ,
c
\Vhether Of not t le ll1te . ',' ' The financial dealings are important, if essential to prevent unwarranted concern that
, f lin o' the ll1vestlgatlOl1S means, eae s, , k' the distinction to I
responsibility for per orn, 0 t be aware of the superVisors [all to ma e , e no at leI' reason than the negative one of the update has been triggen:d by the revelation
of its own new personnel, It muS , ',' , b tween clispasSlO nate r .1"""Klcrmining whether the candidate is in financial of negative information about a specific person,
, " ' 1 such an 111veStlgatlon, investlgators e d I injection
prinoplcs ':ll1cl:rot ~1I1Ce ,d 'uidelines to direct all the derogator~ facts an t l~)f fairnesS, '11,Ii!.l""WlU ties which might make him susceptible to The periodicity of the updates should be speci-
(Sec appendIX F suggeste g '" investigator or lus own sense the irascible offer of a bribe by someone intent on learning fied; that is, whether they are to OCCllr at one,
an iJ1\'estigatio~l.), , '1 tl 'It the investigator investigatcr who rep~rts O1l imselE that she tion about the intelligence unit's opera- two, three, etc" ye"r intt:rvals, Every person
,'irst of all It IS essentla d dy may be fully satlsfied. h 'no latitude A similar circumstance obtains where the
l h la( newly applying for a position in the intelligence
' 'E t' n reporte on a b 'f there I S ' ,
carefully evalua,te all !l1'orma 1~ "It was alleged vindictive old bag, ut 1 11 for stich an IS conducting his personal life in such a unit, whether by transfer from elsewhere in the
b' The sllnple statemen , his reporting system to a ow ' to gh,jnga he might be open to the use of blackmail to agency or from outside, should be told that the
su Ject.. 1 dlady of the subject that he was ' fOI'ced bac'k In his subjec , t him t 0 b etray a trust, update is part of the requirement for service in
by a prev:olls an becaUSe his noisy parties vation, then 1Ie IS ,
an undesIrable tenant d vUd 'goings- torted, albeit objectIve, report on
_where, moreover, she Sllspecte , 95
FIGURE 15.-San.'pie financial questionnaire
the unit. Notification of this practice should be
Name __________________________~--------~--~--~-------- Date _ _ _ _ _ __ included in the initial interview when the re- no alternative- but to ask the subject about the
quirements for acceptance by the unit are being truth of the allegation. If he is attempting to
described.
Do you, your Wife, you an d your wife jointly. and/or you r children have
1. Bank accounts .
No a: conceal his past actions, he can deny he ever did
If the unit is sufficiently large so that the Spot such a thing. Then the interrogator (and, espe- .,
J

checking account Yes '_ __ check method is employed, this, too, should be I
cially the unit commander, particularly if he is
savings account Ycs,__ _ No._ __ understood as fl natural consequence of empio - really interested in getting the subject on his
ment in the unit. There might be some merit y
No.___ staff) is in a dilemma. The use of the po'lygTaph,
safety deposit box Yes . in involving the rank and file members in the operated by experienced and welI-trained tech-
If so. give the name of the bank and the type' 0 f account and the name 0 f the person in which __ the accounl appean: lottery selection of those to be investigated. Such nicians, can hel p resolve this dilemma.
a system would remove the arbitrariness of pres- . The polygTaph can be used at the time of the.
ent background investigation procedures where in'itial check and also at the time of the recheck
candidates for investigation are chosen secretly or update. But, in either case, it should be the
; and the investigations carried out and concluded announced policy of the intelligence unit to
2 Charge . h you, your wife, you an d your wife jointly, an dl or your children have charge ' as surreptitiously as possible. This procedure require SUbmission to this test. The prospective
. List- theaccollnts
companies with whle lI'ould have the further advantage of committing member of the unit must be tolel what to expect
credit card accounts:
all members of the unit to active participation -whether the poly~aph is used as a matter of
; in the arrangements for deterring corruption. It Course on all applicants both at the time of initial
- - - ' - - - - - ---- •. could be an important building block in putting acceptance and at the recheck, Or whether it is
, • the agency on a footing Where pride in the only used to check derogatory statements, as dis-
integrity of the personnel takes precedence over wssed above. The prospective staff member, by
-.yot! receive 1I1come
11icollle
3. Do . f.10m any other source than )OU. , "agency salary? pride in personal loyalty to colleagues, right or knowing in advance that he may be Subjected to
Yes No,____ _ wrong. But even where the SPOt check system the polygraph need not feel personally offended
; is used, those not having the full field investiga- When the test is given. More importantly, he
t; i questionnaire.
gi~e
tion should still have to fill Out the financial probably wilI not apply in the first place if he has
something he is attempting to conceal which he
If you do. the source and amoUi. '" - - - - - - - - ' - - - - - - - - = = = = = = = = - _ tj theNone unit commander
of the foregoingshould is not haveto full
meant .implyauthor-
that knows might keep him froin being accepted as an
- -------------- N,,_ __ intelIigence officer.
'}.'ity to order a backgTound investigCltion of one of
D,~- dl your children receive al .. I income:
It should be recognized, however, that, even
Iif;., IEresponsible
hishSUbordinates
__~ I~;
yo", wlfu. Y'" 'm I 'h, ""'""'. l"dl",I", 'h, """ . ' lyrecelvlI1g
income?t leYes'
1 your wife jointly, an or e of the person _ for theat overall
any time. He, of
integrity afterhis alI,
unit.is
though legally acceptable in the jurisdiction, the
If so, give the SOUlce ant _____________ __. e suspects that one of his colleagues is "turn- lise of the poly~aph may produce difficulties.
=
==================~~~===============~~~-!)~gWU~"hehad
One such diffiCUlty Could arise if it is used only
================-~==================_'-~Ii~~ti~b~k~oundinv~ti~tionoom~upm
=
best not lvait until the routine by the intelligence unit. Agency personnel from
~.
=========~======-~--~~~~~~~~~~~~~~~~:I ~--- "i~nenback~oundinv~ti~tion 'other units might fear their careers would be

~"
\" jltake a chance that his suspect will be picked in jeopardized if by transferring to the intelligence
"t, . update. For
they had to submit to the poly~aph. The
'It,

f1 . . 't ms of property Ie . . lal amount pal(, 0"' wif, "Y'" 'fe J'OJntlt "'f h
. ;, eI'w'''s, Eh' . IIe cannot
b e econ fid I unit
4 ProlJerty
,d/"" you, ,hi1d,",". g"m,
.
(. 'al estate, autolUobtles. boa ts. etc)owl1cdbyyou.y
:. I remaining indebtedness f al lyandthe311
end , ,,,,,"' ",;"'
"_~ ,; 110ft llness 0 IS unIt.
. H may ent of t 1e. tr!lst"
b e eXposIng th e
"_~'
I
local police union or the civil service commission
Li" ,ll ""J" "
;:" "" 0' re,l ,,",,),
"" 'h, '>P' " pWP"'y· on,n ,
••geney as a Whole to s',ious damage"
might consider its use by only one element of
the agency as' discriminatory and thus work

====~---------=======----- j; Polygraph
against its being used at all. On the other hand,
integYity standards for the intelligence unit

~-=====-----~~---:-:--=~~':ld:.:.~g~i\:'i~ng~th:e ~!!
-Ili should be as high as any in the agency-if not
lfilhose jlU"isdictions where it is permitted. the the highest. Use of the polygraph could sym-
- .. l{ your chi lcn. ((oompan! ,) !polygraph
th " . can be of great assistance
. in evaluating

~~::~~:I::~~:an:(~I:ili:e~a:~~m=l~~~_~~===============.==~=
dI I Y you YOUI c. d . 'cha t IV bolize the special personal requirements de-

~;.
WI
1·.1 e1l1legnty of a prospectIve staff member. (See
List all stocks 'an.d bonds Owne(). d'cost pee . 'f'
,1""vouwi""
ami P""'''''
"our wife, jOll1tly. am or
I I
Per fa, a detailed discussion of staffing manded of members of the unit.
!h, n"",b" , ' ' ' ' ' ' ,
'.pract')B' iCes" y Its use, the UOlt . can make su,e .
that
=
=================~==============~~~~~ ~a m~ht hon~~ h~ ~n~pahllityu~dm~
----'tht h the. SUbject is not hidinO'b some past action Security Training

===========~~~~~~::~=~:~~::~~;::;~~~
! "'"lify ih", "" "",'"'"" '"" , d rrect to the best 0 f nly knowledge and belief.
~~a~Mh~
---- ~esl) . II
II·,ijerogator
;.:tesolve dOUbts raised
Qst doubt on

I
It be
by an unsubstantiated b
to to
It is important that special attention be given
security during the training of new personnel
I 1 ",,,1, '" 'me. "mp1,,,. '" " _____ " YrepOn n such cases, there may e selected for the intelligence unit. They must be
Signature \1 thoroughly indoctrinated with the requirements
96 for security, why it is important, and the often
i)~

~.
97

~-------
FIGURE 16 Logs/leet: Visitors record ,
gence unit office of the end o£ the chapter for a
Time
tragic results that can result from a breach of description of the several security measun:s that' Dale In Out Name (please pri Ilt) Signature Title and agency Person visited
uld understand that reople shoLlld be taken.)
security. They sho it, especially those working
from their own un, or their informers, can be
as undercover men The Files
security failures. (More spe-
put in jeopardy by g can be found in chapter V.) The files themselves, if in hard form, can be
cific data on trainin
kept in ordinary filing cabinets. There is no

PHYSIC AL SECURITY
need to have safes or special lock devkes if the
room itself can be secured as discussed above. If ,
I,
physical security is to insure there is a problem in securing the room, then it ,
The objective of would be well to have files with locking devices. I)
he intelligence unit that no
the personnel of t ns will have access to their In any event, where there is sensitive material, it
una uthorized perso
working quarters. work The members or the unit should be placed in a separate area and stored ,
with their material and Sensitive material would be that can·
should feel free to nd studies with one another in a safe.
taining informants' names; any information on )
discuss their cases a promising sensitive informa-
corruption of members of the department or ..\~
without fear of com also be confident that the --- I~- .---
local political figures; or material given to the
tion. They should 'i
In their files IS unit by other departments which they have c1assi·
integrity of the in formation fied as Ilensitive. Ordinarily the container of [:;
orized persons should ever be
secure. No unauth sensitive material should be located in the in· :,!
allowed to use the files. te11igence unit commander's office, but if not the i.
lock combination should be available only to rl -
T he Office him or perhaps to one or twO other senior memo ~\
bove objective, steps must be bel'S of the unit. f,'-
To achieve the a ~;
rance to the area occupied by
taken to restrict ent
it to its own personnel and
the intelligence un
pted as being trustworthy. A Restricted Materials
f.,1--
those formally acce t or all nonunit people that The cr{~eria for sensitivity' of files 01' in forma·
log should be kep
ce unit's areas. (See figure tion are at base subjective matters; that is to sa)"
enter the intelligen sample logsheet to record
some purely personal judgmental factor entell I--
16, page 99, for a
ust be physical means to anow into most decisions as to whether a file, or a
visitors.) There m it to identify all persons be- document, or an item of information is to be
the intelligence un into the area. In particular, It is nol
given special, protective handling. -
fore they can come . ers and a specific recognition
good practice to have only twO classifications o(
there must be barn
troIs access to the working material-that which is sensitive and that which
is not. Such a system works well when all pe~' ,
procedure that con
Furthermore, the file room
area of the unit. al controls, a controlled area
.
",. must have addition
within a secure are a.
(See figures 17 and 18 at
sonnel engaged in the clarifying process are dedi' .1--
cated to a free and full exchange of intelligence
ges 103 and 105, for sample and are confident of the techniques for stora~ I--
and evaluation employed in their unit. The~l r--
end of chapter, pa
office layouts.) al working day, one person confidence is probably directly related to the1l .
During the norm
should always be re
sponsible for recognizing and substantive knowledge of what is in the filesal~aaln .
I-- - -
to the intelligence unit area. how cautiously analysts have marked .cerl '1--
pieCeS of informRtion as to source, and hoW pl~
admitting persons
e a person to watch over the
There should also b
e period. At night, if no one cisely they have allotted eva! uative weiglns to the .1-
files during this sam m- must be secured by sorlle
contents. Unless this confidence is strcng,hO\(i
is on duty, the 1-00
\~il t--
\ type of electronic 0
trigger an al arm if
l' mechanical means that will
anyone attempts to penetrate
it area or, especially, the file
ever, the natural reaction of unit personnel
be to over-restrict the information in their. fi;e~\
Whether conscious or not, the guiding po! ICY h t---f--.
I--
the intelligence un
should ring in the command the unit will be: "When in doubt, restr~~ts:al:
room. The alarm
cy which presumably will be The obvious solution for tillS . ~
center of the agen information. ,
(See the sample intelli-
staffed 24 hours a d ay. 99 ,

98
-
of affairs is to build unit confidence by removing those authorized. vVhen further control of ac· never be tested in the
as much doubt as possible from the filing and cess to sensitive information is deemed necessarv, . . courts. Many wI
" ~ames are 1Il l11telligence files will lose for indication!; of new c· .
classifying systems in force. computer programs may be coded so as to restrict Ject to arrest. Thus it is '. never be sub-
A useful means w build confidence is to move wiII want to have his e nmmal .developments
retrieval to those who know the code. Not only ; rity system of an in'tellig cntical .that the secu-
unnoticed if at 11 ~orts rema111 completely
to a more sophisticated classifying (and this may to insure security but also proper evaluation of flow, storage, lise and d' ~n.cbe l~lllt protect the , , a POSSIble Th
mean, in turn, storage) system. Instead of rely- inputs, it is best that all inputs be inserted into . f ' i s n utlOn of info n?t want anyone outside of . e. analyst does
~lOn rom persons not re uired rma- Ius concentration on th d the unit to know of
ing on the simple dual category system of re-
stricted or nonrestricted, a unit can introduce a
range of sensitivity labels, or perhaps somewhat
better, it can assign certain indicators to files or
the computer by the intelligence unit rather than
directly from outstations. In other words, the
computer should be programed to refuse out·
station inputs In a like manner, protection of
It, or from those like a I ,q J'
criminal group or someoure ifg ?f an organized
mation i~ order to defamne w l~ IS seeking infor-
Tl . ' e a pnvate citizen
to know about . I
tiCU ar pattern of crimi nal
he has as yet no 1 d
. I' .
1I1e Ications to be reI f J
T ' .
e evelopm

lar eVIdence b
a Ive y
. "

.
certa1l1.
f
ent 0 a par-
~ctlVltles about wllich
ut su Clent
ffi .
I
Ie secnnty of the system in . . o maXImIze security of h .,
documents which characterize their contents in data in the computer can be assured if no apply to the answering of ' particular, must
the office phones should b t e unIt s personnel, J
more than one way. outstation can query the computer directly for tion from other units I r~9uests for informa- j
For example, documents containing unsub- to ,be sure that no wiret e chbecked periodically
intelligence information. should under no conditi nte igence information Th ap 1las een .
stantiated information about an individual could Other security problems concern the protection to non-law-enforc~ment ons b e. ext.ended or given · e office should also be s put I.n place.

I
1I1sure that no eIe t . wept e1ectroOlcal1y to
be assigned a color tab indicative of the fact that of the computer data bank from overt, un· operations as credit card ~genCieS, 111cluding such · c roOlC eavesd' I'
the material has not been corroborated. If the 111 place. If possible th ffi lOp C eVlces are
authorized atteml)ts to destroy or to modify exist· men t '
agencies, persOlu.leI de a ' llreallS banks em
, p oy-J
one or more nona en' .e 0 1ce should be given
document in question concerns a matter sugges-
use byit~ own per;on~~/(:~e,~ )~one n.umpers for
ing information. Special care is l'c;'quirc;'d sinre ,lrill have to be taken p rtments, etc. Care
tive of official corruption, another color could be da ta in the bank often requires review and cor· avoid giving' such inf on a. case-by-case basis to
Once 111 the field tl 'f e as by mformers) ,
rection. It may also require purging where the. EOJ'cement ~gencies tl~r~:tlOn to those law en-

I
added. If, further, the official corruption touches · b e enhanced b ' le sa ety of til' .
on a law enforcement agency, a third color could Cdn e 111Vestigator
subject of the information is found to be incor· handling such mater' 'la . lave a record of not ·
n ono ffi clal licenses Tl y use of unmarked .
cars with
be included and so forth. Given combinations rec t ! Y 1.d en t'1fi e d or, for examp I e, were
h a suspect Secondary diSclosure ' ia
ca inb a l)rot ecte d manner. models with no ide'nt'fi le. car? should be stock
of colors appearing on the edge of a document or is rc;'Jeased from judicial proceedings without ,individual as disclosur~ nb etl~s da~aging to the · 1 catIOn In th .
w h lch might reveal official

II
.e engme area
file would immediately warn as to the sensitivity con viction. :(For further discllssion ~ ~ prImary agency. radios should b ownershIp. Two-way
quotient of the contents. Finally, the computer room must be protectedldix A, "Intellig'ence dOl prIvacy, see appen- e concealed"l '
A su pervisor faced with the choice of passing' fTom unauthorized entry which could lead to the . . an t le Law" F . ments. There should b 111 g ove com part-
Cusslon of practical con . or a dIS- that used for the e no antenna other than
or not passing files or documents that otherwise destruction of the machinery and/or the datl }hapter III.) trol procedures, see norma l car rad' Tl
f
o the cars should be 1 ,10. le colors
would be hel pful to a neighboring agency, could, filed on tapes or disks. Some member of the
they will not be re~)~fU a: b.ut subdued so that
with this system, make discriminating decisions must have the explicit responsibility at all tim5, Organization of the om f s . hand rather than ' elY dlstmguished. Second
far more easily (and hel pfully) than if he has to of recognizing and admitting pe'rsons to the com· .' . ce or ecunty funds can be ne'd" cars a:'e preferable. Where
rely entirely on an analyst's decision that the puter area. This become a particularly.acutl T? i~lsure the implementati . ma e avatlabl .
o~ s1lOuid be given t th e, conSIderation
material in question is sensitive. Naturally, the
most sensitive materials the unit commander will
P roblem when the intelligence files
a non dedicated computer,' that is, one which .
are pJacedon It IS essential
be oQ'iven'fi
in th .
e 111telligence
of
speC! c respon 'b Tunit t at
securIty
. h
pol- .
Vestlgators. Portable radi
0 e use of
can be used in place of t1 0 ~ansn:Itter /recei vers
1
ren~a cars by in- i
keep to himself, probably in his own safe. One owned by another department and serves several.· be charged with making S\ 1 Ity. He le

I
residual benefit of moving to a color code system elements of the J'urisdiction's administration is maintained as I . sure t lat physical Security should b b xed Installation.
, c eSlrrned and I . e 0 served .
for contents sensitivity is that it will require a (For a more detailed discussion of the nrO'Olellll.i)~ coming' . I 0 , , t lat new tlons from the field t 1 111 communica_
h mto t le office ar b' £ Wherever possible . 0 t l~ office (and vice versa).
wholesale ransacking of existing files-presum- associated with the use and protection of coi1l' • P ysicaJ and personal . e ne ed on ,lnVestIQ'ators h Jd
ably those dating back to a certain arbitrary fixed puters, see appendix B.) .. "rm""'·'hle for seein 'th' secunty. He must be Ph ones-public phones if 0' . s ou use tele-
date, thus giving the unit one more review of security is imI)Jei! adt the SOP worked out be made directly to th . pOls,SIblt. CalIs should
th . ente In orde t . e 1I1te hg'en .
its stored assets and the sensitivity level hereto- e impOrtance of se ' . . . r 0 empha- mg the agency switchbo d I c e un~t, bypass-
fore assigned to them. Security and Privacy the task of sect't ~unty, It IS suggested to check out intell', ar. t makes little sense
members of th
0
1:1 y 11' cer be rotated among' integrity and then tlgehncedloffice~s specificaIly for
A major function of a security system of an b e 111te 19"l1ce . T . 0 an e thplr
intelligence unit in a police department is t ecome aWare of -~he i ~. unit. his way t1l1ely as investirrato"
o
h
IS 111 r e det t'
- reports as rou-
Security and the Computer and the add' . mportance of the prob- Where radio must b ec We bureau.
of protecting its information from misuse.
For the unit that has its own computer, there privacy issue when it relates to intelligence shared
, Itiona] resp . b '1'
onSI i Hy is also gence unit should use ~.~mployed, the intelli-
the rest of the a enc a 1 erent frequency from
are special problems. Over and above the security is a more difficult and urgent problem than
OPEl{ . that are also dgI'ffe y. C °c1es should be available
of the unit's area discussed above, the c'Om- in relation to routine police records, the . ATIONAL SECURITY rent fr om ili
ot h er units of t1 ose used by the
puter and its data must be protected from pene- rap sheets. In the case of intelligence Securitt' 1 . le agency Th
I a so has a definite . SImple limited h . e code may be
tration and harm. The first concern must be for much of the information will be unverified of the int 11' . role 111 the opera- .' per aps to th b' .
the consoles through which the computer's in- therefore, will contain allegations, references e Igence unIt Th' . gatlon, the investigator and ehsu Je:t. o,f Investi-
tor must tak . e 1I1telhgence reported. Cod d ' t e aCtiVItIes being
formation are queried and inputs made. Whether associations, and even incI ude analyses of . e measures to insure th t h' e names lette d
that IS h i s ' a IS :an be changed periodic;l1 ~s, an numbers
there is only one console or there are a series of tial activities; routine police records are, ar time d' speCIfic acti vi ties at a
an pJa ' 1I1te1ligence unit' . y. S~nce most of the
remote stations, access must be controlled to only documents. Much of intelligence matenal as POssible TI c~, are .known to as few tive rather than oSf operatflO ns WIll be investiga-
. le mvestlgator on a search . an en orcem .
100 Imperative as a matt f .ent nature, It is
. ' er 0 secunty (both for the

101
-- -- . -
"I .. ~.!\tilWi\HiIIIiI!Wt!Jf
rr"C

FIGURE 17 - A SAMPLE SECURE OFFICE L1\YOUT


HE RESPONSIBILITY OF THE
' f personnel) that T UNIT COMIVIANDER
, d £ r the sa fety 0 ,
operatIOn an 0, b kept within the Ul1lt. , 1 rlreas discussed in thi!
day-to- d ay , '
operatIOnS e
d absolutely necessary
(or As in most funct~ona , of the intelligence
Only where lt,lS ?eem~ "ointl with or under 1 tIe1 effectlVeness , ®
manua, . t almost solely wIth the IHllIYlEr 'OOM
where the umt IS actl~g.J I Yagency) should umt
, ,
s seen
rity systenl
B res
. s
a
,
'a'ln the
'11'
mte 1gence
tl er umt m t le , del' ele 'b' O
,
orders of ano 1 know of an on-gomg unit com man , 1 rest of the agency, AI
other elements of the ag~nclY of such opera- , ' ·t [rom t le
umt IS set apar 'ffi . the unit cannot rely on
. ",'ty Dlsc osure , d g
opcratlO nS ac tl: 1 , ld be carefully restncte in training and sta ,ln ; uidelines to cover iu ,
tional infonnatIOn ,s~ou This care is required the normal operatlo na g
to the specific aCtlVltY. t f: organized crimi- security needs, 't 'II be the responsibilitl
I: 1 known mteres 0, , ost cases 1 WI ,
because o( t le , nks of law enforcement Thus, In ~n ' d to clevelol) the secur1tl
nals in penetratmg l~l\r~ome part of the SOP
, . mman er
of the umt co , '1-1 1st see to the arrange,
'~that it always operates rules f or h 1
· s L1l11t. e m1. h'
agencies, It, shou
of. the intellIgence um, £ its agency were pene-
as though other elemle~tsl0mellt of: tl'e SOP itself space secur
ed m a 1 er
He must press to have II
ment of the o~ces. d'ff ent manner than an)
.1
H requires speCla cars, ,
CQ>
IIlE 100M
C9
IHIIIS!
IINYlSTIUlDIJ

, Iy t llS e e • , . 1 agency e 'd ;'1


trated, 0 1)\IIOUS , not to antago mze other In t le, . '., . quire SI)ecial COllSl' filE!
CD
"
should be held closely so as . ml mlcatIOnS Ie . fIltCLEIK CD COiWIIOll,
and IllS com st tll1dergo a more ngor· , mllllCTIDH
IKIIlIlGIHCIUHII

f he intelligence unit mu~t . I-l's men 111U . IHIUll


brother officers, eratIOn. 1 1 1 this may 111 turn caU\~ 1IIIIilll
® II!YIIIIGIIOIJ

~
The commander 0 ,td f tile security of IllS ous backgTound chec <. anlc o£)eration of the per·
~ ~
. )YOVI e 'or ' , s . the norma . y But all 0 f tle~ I
also take cale to I I re on operatlons l)roblelll . m
own personnel when t,ley Oalltact with known
come In c ' f actions and
.' of the agenc .
sonnel dIVISIOn . ' will 1l'obably have to ,e
pOhCles. 1 nder and he
b
11
-------
00
Ie
11

where they ma Y 1f other elements 0 . . 1 unIt comma,


WI\\
II
, ' 1 IE l)ersonne rom en- imtlated by tIe shing to O'et some ora
eranl na s, 1 1 enrorcement ag
the agency, or ror 1
f not ler aW
ke reports of these co n - probably have to k~ep P~~lese proc~dures are at'
cies, shonld see al1C m a sations to be made accepted. Even IV ~~~l 0 )erating routine or t~e
, Id e fa se accn ,
taets It cou cans, 1 , 1 d The com- cepted as part of t
'11 'llbeumqu ,
1 . e and thus reqturel
.,' Asample office layout which demonstrates the physical security principle discussed above is shown in the figure
, I ' I tigators l1lVO ve" , agency, they WI Stl. to insure that secuntyu
ao'ainst t le 111\ es 1 I is l)eoI)le operate m above. The numbered items on the layout are explained in the text which follows.
" choose to lave I his particular attentlon
mander may ffi cover the person
'rs or have another 0 '1Cer effective. 1. If possible, the intelligence unit should always be housed above the ground floor. This adds the protection of
pa l , "
doing the invesugatmg, whatever door guards are at the agency's entrance, and discourages potential walk-ins. It also minimizes the
possibility of break-ins through windows that are not sealed.
2. The intelligence unit should be housed in an area with only one entrance which is under 24-hour-a-day
control. If the office is closed at night, the door should be wired to give warning of an unauthorized intruder.
The warning device should be connected to whatever desk (or area) in the agency that has 24 hour duty
personnel. If the unit is in a building separated from the agency, or the agency does 'not have 24 hour duty
personnel, then the warning system should be connected to the nearest police unit which does have
around-the-clock operations.
2a, If it is felt necessary to have other emergency exits for use in case of fire, they should be barred against
entrance from the outside and wired to give an alarm if they are opened from the inside.
2b. All windows in the area occupied by the intelligence unit ideally should be sealed.
2c. However, if some windows are left unsealed, for example, in the commander's office, they should be
secured against entrance from the outside by the use of bars, and an electronic device to give warning if
the window is being tampered with.
There should be an entrance area which is closed off from the rest of the intelligence unit's space. This can
serve as the waiting room for visitors and for persons to be questioned. It can also be the receiving point for
mail and other documents, thus making it unnecessary for messengers to have access to the intelligence area.
The point should be reemphasized: the fewer non-intelligence personnel permitted into the intelligence unit's
sbPa~e, the less ~pportunity there is for inadvertant or planned acquisition of data to which the intruder has no
USlUess.

103

\
~
102

'~
----------
~ ....., *¥' 'S Jl"tM* lee'r=

~.
~1
1{
Ar
f: FIGURE 18 A
if
;,1 - SAMPLE OF SECURE OFFICE LA"/'OUT S
3a. During the hours that the office is open and manned, there should be a person on duty to controlaCttl Ii ... - MALL UNIT
to the office. In smaller units, a receptionist can also be responsible for other duties such as handlingili 21

~,
document and message log, answering the telephone, typing, newspaper clipping, etc. f:
3b. Access to the intelligeflce unit's space is through a door electrically controlled by the receptionist.
® ® =

I
r-
3c. The receptionist should be protected by a glass panel. However there should be a pass-through for~ @
receipt and dispatch of mail and messages that are carried by non-intelligence unit messengers.
ENTRANCE HAlL FIlE CLERK
3d. Adjacent to the entrance but behind the controlled access door, there should be provision made[1 ANAL YST /INYESTlGATOR
interview rooms. They should be individual rooms (they need not be large) to protect the privacy of '-

p:::rson who has come to give information. They should be so placed (as is shown on the diagram) jl
protect the activity, fililS, and layout of the intelligence unit's office from the non-cleared person.
4. Files of information and reports of the intelligence unit must be kept in an area which can be ®
ANAL YST/
QJ ~ filES
I
separated from the balance of the intelligence unit's space and where access can be controlled. 0)

~
INYESTIGAT OR I
4a. Where pOSSible, the walls of the me room should be made fire-resistent, if not fireproof. filE ROOM
'~ ANAL YST/INYESTIGATORS OffiCE
4b. The single access door should be wired so that when no personnel are on duty, an alarm will sound in . \
agency's command center if the file room is violated. During duty hours the door can be left CD ~
®
\~ q
access should be only with the approval of the file clerk (or his temporary replacement should
CD
~
called away).
4c. If at all pOSSible, the file clerk (and possibly analysts who work closely with. him) should be the @ UNIT COMMANDER'S OffiCE
SAfE
person allowed access to the files themselves. When materials are required by investigators (or allaIH"',.,r RECEPTIONIST
given access) or by other elements in the agency, they should be requested from the file clerk.

~
find them in the file, and, if the material is to be handed out. make a record of who has taken
[or what reason. Sensitive material should be clearly marked and given only to those
®
~
authorized by the unit commander.
-J
4d. To assist in the control efforts, access to the files should be denied by a gate electrically controlled bill "-
me clerk. =t
"- -M

4e. Any provision for reproduction equipment (ZEROX or other make) should be controlled. One ® 1. '-

shown on the di.agram, is to place it within the area controlled by the file clerk. The room can I
@
IA
used for additiona\ files. The I
' , samp e layout for a small unit fall
5. If the file room can be made large enough, it can be used as a secure area in which analysts can work. 17. The layout· F' ows the pattern and .
way, sensitive material o,oes not have to be taken from the file room. Furthermore, if these analysts ate '; , m Igure 18 Was deSigned for a three to ~~n:;~I~:;/ down f~r the larger unit, as shown in
access to the files, there is little reason for them to take material from the file room. I If . . ce, countmg all personnel that might be
6. The investigator and/or the analyst-investigator teams should be given office space which can be ~en:!t3te1l(:.l . POSSIble, the intelligence un't I
if only in cubicles, not only as an effective working area, but also to provide better security for the whatever dovr guards are at t~· s 10uld always be housed above the r
used and people interviewed, Compartmentation is a traditional tool of the intelligence trade used to pOssibility of break-ins through ~i~~~cY':hentrance, and discourages ~O~~:~i~oor ilcT!U s adds the protection of
the possibility of a major penetration into sensitive information, The separation of some analysts from la, If the 'd ws at are not sealed. wa oms, It also minimizes the
Wm ows are left unsealed
makes certain that the materials that apply to each 'case will be kept separate, This separation can e b the use of bars, and an elect " as ~hown, they shOuld be secured '
the sample to the analyst-investigator teams in that single teams can use spaces 5 and 6. Ib, The intell' , romc deVIce to give warning if the Windo:~a~s~ entrance from th~ outside by
7. Them ' tIl'
e 1gence um't commander mus t h ave a pnva ' t e 0 ff'Ice, He prob ably wave
ill h papers tl1at he Igence umt should be ho u~e d'm an area with ani one
~ontrol. If the office is I
IS emg tampered
' with '
keep under his personal control. He will need to confer privately with visitors from within and . hlntruder, The warning de~I,Ocesedh at mght, the door should ~e Wir:dnttranc,e whICh is under 24-hour-a-day
agency because of the sensitivity of the material being imparted to him. OUr d t s auld be can t d 0 gIVe warning f
24 h u y personnel. If the unit is in b ildn~c e to whatever desk (or area)' th 0 an unauthorized
7a. It is suggested that a c;afe be available to the commander in his office, This will insure the ' OUr duty personnel then a, u lng separated from the a m e agency that has 24
tion of highly senshi'/t' material and infonnation that is for the knowledge of the commander alonl, does have around-th I' k the warnmg system should b >, gency, Or the agency does not h
for those members of his staff that l1e determines are to be apprised of it). 2 e-c oc operations, e connected to the nearest police unit r:v~
. There sh uld w c
Mmman~'·.! k 0 be an entrance
7b. Efforts should be made to increase the degree of soundproofing of the walls and door oftIIe oeep Control of person's entea~ea which is closed off from the rest of ' ,
office to insure that his privacy is, in fact, maintained when the door is closed, fflee Tl ,nng and to m' , . the mtelllgenc 't'
unit's 'sp Ie point shOuld be reemphasized' th l11;nIZe visitors who are not admitted e ~m s space, This is to
has no b~~~e!~.e less opportunity there is' forein:~~~r~~~;i~:~~~~~ec; pers~~n,el permi:::~~~ t~h~h~ar:t~11i~~~;:
acquISItIon of data to which th '
e l11truder

104

105
,
1 • FV
,
.~

rt
ld b person on duty to control access l
t the office is open and manned, there sho~ble ;o~ other duties such as handling the \~
2 During the hours t h a r . t can also be respom,l .' t " j
a, to the office. In smaller units, a :r~egP~~~~lephone, typing, newspaper clippmg, e c. ,U
document and message log, answ . . t with the aid of an electncally:
. ntrolled by tile receptioms tl Appendix A
2b Access to the intelligence unit's space IS co ,
. operated gate. .t must be kept in an area which can be physlCalit
I
Files of 'informatiOn and reports .of tl~e iI~~~i;~~sC:p~~~ and where access can be controlled. , ,~ INTELLIGENCE AND THE LAW I
3. , d from the balance of the mtelllgen I on duty, an alarm will sound In the ':,
separate ld be wired so that when no pers?nne are ours the door can be left open,but ;. I
3 The single access door sho~
a.
fl m is penetrated. Dunng duty h
ency's command cent~r if the lIe roo f the me clerk (or his temporary rep ac
1 ement when he is called
I,' New legal restrictions on some areas of lntelli- t1l1y than in the past. From this scrutiny may
.I
l
~~cess should be only wlth Jle approva 0 I I luence operations are beginning to develop, emerge detailed legal rules and standards of op-
away). . I t who work closely with him) shou~ be the ~nYf'iThese restrictions are generally based on the eration-either issued from the bench or pre-
3b If at all possible, the file clerk (and P~S~~~;y:~:X:I ~s to be handed out ~nce f~~;~~~on;r~I~:~~~t~e:C?nstitution of the ~Jni~ed States, and thus im- scribed by legislation or administrative Ollclers. I
I
. son allowed access to the mes, and; d li ating material is to be used, thlS sho ifically authorizeo \;JJlnge or may soon lmpmge on State law. Al- Questions of the constitutionality of domestic
pw~o has taken it and for what .reashon·lId b~Pd~arly marked and given only to those spec\hollgh the courts have traditionally insisted on intelligence operations have already been raised
same manner. SenSllV .t' e matenal s ou • k I ,':the
.( elaboratIOn 'f o' (1eta!'1 ed Iegal regulatlon ' on in a few cases. The dissemination and usage of
by the unit commander. . b used as a secure area in which analy~tfstlcan WOnraly's~l[ertain aspects of the criminal justice system criminal history information-a much less COIl-
enough It can e Further-nlOre 1 lese a , I' 1 . f .
file room can be made 1arge t' b taken from the me rOom. b 't't te .JslIch, for example, as t 1e 1I1troc lIcHon 0 eVI- troversial form of recorclkeeping-is now the
3c. If tlle . Ides not have 0 e k 'f th e is no other su s 1U • , I' f d . . II'
this way, sensitive matena 0 d uble for the file cler 1 er~ence), col ectlOn 0: omestlc 1I1te Igence clata, subject of legislative consideration in several
are also given access to the mes they can 0 e made fire-resistent, if not fire-proof. \~nd the subsequent storage and dissemination of jurisdictions and of a gTowing number of court
'ble the walls of the me room should b h tIe wishes 10 ihis data, have onl y recently beg:un to engage the cases. Congl'essional and to a certain extent
3d Where POSSI , ill have papers t a l 1. f I d f .l. . . I . b' d' public attention is also focusing more frequently
. 'vate office. Be probablY w 'tl . nd without thl ,!ttcntlOl1 o. t Ie courts an 0' egIs atIve 0 Ies.
4 The intelligence unit commander must ~ave e~ ~~ confer privately with visitors from WI lill a t This new interest in domestic intelligence on privacy problems-as, for example, the Sen- j
. keep under his personal C?~t:ol.:l~l: m~:rial being imparted to him. , . rtmenla.pthering and its procedures springs from a num- ate Committee on the J ucliciary hearings con-
agency because of the sensItiVlty d . l' office This will Illsure the compa 1 ( ,bel' of recent developments: ducted by Sena tor Ervin in 1971.
to the cornman er 111 us . f ti e commander a one \or ~ I .. .
. gested that a safe be availabl e t' that is for the knowledge 0 1 ~ ,Orgalllzecl cnme became a subject of na- The development of legal rules and standards
4a. 1t IS sug . 1and informa Ion f't) '" I ' ,.
tion of higluy sensitive. matena determines are to be apprised 0 1 • 'I Ilona concern 111 th~ early 1960 s; radlcal revol u- for criminal justice intelligence systems reflects
for those members of Ius staff that he
4b . Efforts h Id b
e made to mcrease the degree. of soundproo
. d h
fj
lllg 0
the
f the walls and door of the commander ,\ronary movements 111 the late 1960's.
door is closed.
i~.,9 Th e vanous
,. I' .
. local movements for reform of
some public uneasiness about the potential haz-
ards in such systems for civil alld political I
ff' ts' ouSUI'e that his privacy IS,
. 11l
. fac t , mallltame W en l' .
~Imma Justlce systems, toget ler WIth Important I iberties. The collection in secret of detailed
o lce 0111 n' "
,ew constltutIOnal ••
deClsIOns, have turned the information concerning the activities, habits, and
rtlight on recordkeeping and data gathering beliefs of large numbers of citizens-whatever
,~ocedures. the form of criminal conduct in which it is be-
p. :\t the same time, there has been a signifi- lieved they are engaged-involves substantial
,lltJump in many localities in the volume and constitutional questions. Undisciplined collect-
i ~epth of criminal justice data collected and ing techniques and the indiscriminate aggTega-
~ored. More generous funding of State and tions of dossiers can, often unintentionally. un-
{tropolitan law enforcement agencies has dermine basic U.S. constitutional assllmptions
jeant that materials can now be coli ected and concerniug a free society, tolerant of dissent anel
~ored tha~ would not previously have had high unorthodoxy.
! :Inotlg~ prIOrity to qualify even for coli ection. Rules and standards for intelligence operations
A. ~1l1ally, courts and legal theorists have arc beginning to d{'velop, then, as deter-
lllllcl~ted a constitutional right of privacy. As rents to practices that threaten to abme con~ti­
II, thiS concept is vague and imprecise, but as tutionalliberties. These rules anel standards are
becomes
"lell' clearer, it almost certainly will affect not designed to cripple or eliminate completely
" 1gence procedures. the intelligence function as it relates to organized
tLawenforcement agencies, then, should antici- crime. Their ('mergence do(~s mean, howe\,er,
i ;~ that their intelligence activities will come that every individual engaged in the colle< tWil,
~ er closer public (or, at least, judicial) scru- maintenance, aud dissemination of intelligence

107
\
lOG
\
i
1
ing COlTlllJentators have recently argued that in ] II
data sll .IId be aware tint he is working in an cyclists to ivear llchnets Tl
these and other areas the privilege has been -[ schools and other ins~'i' . ley ~lave rulcd that
extended well beyond its proper scope.:! In prac. ~ Over .the past 40 years the Supreme Court of
area of high constitutional sensitivity. Detailed
legal rules and standards defining the conduct of the clothing and I ' t~1tIOnS Canllot regulate
tice, however, many rules and In-actices have be'n\ ;1'.l fthe U!1ltecl • • I States L,s drawn 'om [1' t 1Ie fi11'st, ployees \ ' ,. .1alr s.ry es of students anel em.
the intelligence officer ancllimiting certain of his great vartety of 'tt k
)ermitted which might be thoug-ht ~ inconsistent ii. i' ourt, t, l1lnt t r 1 .and. 14th amendnlen ts a scnes . of •
which '1lI'cael I
j
,1 ac '5, some of
procedures, will help him to safeguard important I
with the constitutional protection against self. :Jlmpor an l1~ltat1O~ls on the purposes for which made " y lave been s U(CCss.u, ,,' f I Ilavc been
constitutional val ties. Scru pulous observation
incrimination. Thus, al though some rerortin~rnd .man.ncr 1~1 wluch government may collect , 011 statutes reg'ulat'n
exercised in ,. 1 , 1 g sexual conduct
!
requirements have been invalidated uncleI' th~ :;itnfo\l~atlOn f10m and about its citizens. The
of rules and standards may also be the best guar-
antee in the future for the continued existence
of till' intelligellcc function. The purposes of
privilege of self-incrimination, others, no le~ ;IClourbt 51' e~lorts have been premised chiefly ujJon
· £ . I . I t l e e Ie that Stich restnctio .
:. "

. .. . (
p1n:ate)y conscnting adults.
:\ nan ower ll1tcrprctatioll o[ the rio'llt ()f
pnvacY-'1l1d ,a I1lOre concrete ont'-I I 1 t> I
I
this essay are to describe the direction in which 1lazare1ous• 111 terms 0 - potentla prosecutlOl1, hal( 'j'ffor tIe I efCCtl fve '· c ' ,. .f IlS .are . 111l1ler'lti,'e anll1ehVlclual i I I . - lOCS tlat
• •
been valldated. 4 UntIl relatIvely recently, !:.l: 1 TI > ( ' XCIClse 0 - po.lltlcal and civil
<
< , n t 1e a )SCllce of overriding" ,., 1 JI
the law ill this area seems to be developing, to
identify guideliucs for I.he conduct of intelli-
f,!;ellcc activities that have already emcrged, and
.
c Imal o·
.
fl"1
. t le pnvl ege con
..
II b
. e e commentec1upon ')tl
to the Jury by prosecut111g attorneys, often toili~ '\tl'011111a'
c" t
l\lglts.
) la t Il1VlO Ia b'l'
If'

l
1(' ,ourt has recoo·n··

,
'
I lty of ])ri\·ac· .
.
Y111 m.ll1y CIrcumstancc b . l'
0
I f
lzee, or example '
'. ,y m group associa-
nce(IS, has the rio'l t t . . . ,
to otl' . to 1 .0 (011t101
bC'li. f~e1s .of I.~lf(~rmatlOn concerning his behador,
e s, aSSOCIatIOns, and characteristics TI','
the
' . "O( 1,1
chSS('mlllation
I
/

to suggc~t additional methods and standards of stnous IweJuchce of defendants:'


'k -:to Ilresen'at'
. ' 10n 0' reec om of as ' . f [ 1 • s e me Ispensable t Ile meaning' 0 f . ' ,. us IS
operations responsive to that dir'ection and those The fourth amene1ment s blan et protectioTii ; The eS5ellt', I . . ' SOClat1On.
"-
I
leadino: I 0: 1 , pnvacy suggested by many of the
1,1 pomt IS that the bl' .t> eba commentators. lO
against unreasonable searches and seizures 'ideas must . pH Ie exchang'e
th:tc;)sn~~i~l~:~~~a~o, idel:ti!'y the spccific ten~ls of
gui(1e1 illes. l' ." '.
, . • , e m a m ul11l1hlbitecl b
also bcen extcnsl~'ely elaborated by State an~
L

"S an 1 I I" ' 1'0 list and


. 1 I . " e t lat t 11S IS l)ossibl I'f tIl' . . .. I estnctlOns II pOll clomestic in-
I Federal court rulIngs, ane t le controllmg de· I
activitics , and )C I I'Ie fs 0 f] arO'e 11 e bon y I·f e ~gen:e actIVItIes that are cOl11ino' or m'lV come
cis ions are familiar
. to a11 law enforcement . agen· lal citizens ar not cata I'oged ° and um ers 0 I as tIe nO'ht of privacy d It>' ,

~~,I~~ 1~11:~:i~ns ;1~t b:~~ ~X;ires~~~l~;y i:,:~~~~;;


It may be useful to look backwards first and . . . ,e
nes. Fmal1y, speCIal statutory regulatlOns Ime Government ao'cnci TI assessee
that follows r~om t~s: I: leE l?o1t.tI~al argu-
examine the rules which have traditionally gov-
C ' ••
have
been imposed in many jurisdictions for collee·
erned the collection of domestic intelligence . 1 1 . l' . I1 • lIS 1ne 0 . JudICIal thi k denc~ tl~'1~1:i :here I.S, 1.1Owevcr, substantial evi-
ill formation. By and large there have heen few. tlOn methoe s regarc ed as Invo vmg partlCl1 an. IS that if O'overnm ' '. n - ener '. leSe restrIctIons will follow certain
· . .l' "{.\T·· b ent were pennltted
Legislatures, both State and Federal, have rarely e1e Ilcate pnvacy ConSle eratIOns. v Iretapptnj . opportunities t II,' . g al 11l1es of development '1' '1
. l' I ' .l ' 0 co eet 111fo"111at1011 sllmmarized as follows' ' i\ lle 1 may be
treated the subject in any explicit fashion; judi- ane1 e1ectromc eavese roppmg ~ are t le pnnclpa Its citizens , 11n01'tl10e1 oxy nug'ht . l
I < d'
cia I bodies have not often pronounced on a buses. examples .. of suchI regulated methods. . ' .. ' by . notoriety ' and e\,en tc IIe l1uldest )~ lS- to First priv~cy i
it is de' tl . I .
ell' 1 lat tIe constltutional rio'ht
Consequently, both private persons and official .
Trae1ItIOna Iy. more comprehenSIve restm·
1 b . 1 1 l' .,
tnettlCs llught be noted fo' ffi' I
S·· I 0 CIa evalua-
vidual 'rio' s not a )SO~ ute. Protection of iI~~li­ I
agencies have on the whole been left to ask such tIOns lave een llnposee on t 1e e Issemmal1ea•J oC1Cty l1110'ht b be left Ie 'I a t'lve Iy more ' b hts as a desll'able Purl)ose of s . i
must be bal anc d ' ,,0Ctety
questions and collect such information as they andllsage of information than have surroundl'J controlled, and rio'id 0
. .\ (' .e agmnst competin o. social intel'-
cs t s.mono' tl e f
° 1 actors to be weio'heel in the to
believed to be proper. its collection. Federal courts have for man! d' restrictions
. . upon il1fonl1 , o a.t Ilenng
atI'0'11 . ·•
I)a Iance are the de '
The principal exceptions to this permissive ears excl uded the introduction of evidence Issen11.nat101l
. which al'e de,'elol t;
nno' rom [ 1'. . . gTee 0'ft l Ie'lIltrl1sion t>
[or the
Y Plo I~e I~urpose at hand and the availabilit f
state of affairs have been in connection with the tained illegally, or as a consequence of learu assl1mpt1Ons have been described bb e
unlawfully obtained. () This doctrine has ancll.egal a. te1natlve methods to serve tl y 0
fourth and fifth amendments. The conrts have 1 I"theorists• as flowino' b
[roln ya llg s,?r:nh t \ . ".
" pernusslble mtrusion is in t/"
' le same purpose
,. ..
tha~ strik~s m~)re ()rod~~\I"(~~IC~~ ~n~
sought to prevent arrest and interrogation tech- extended to prosecutions in State courts, 111p IClt 1\1 the Constitution F
niques that have the effect of forcing individuals
. I I' commentat· . •ew no widely
would appear to be relatlvely weI rootec 111. ' CllS agree on what the rio'ht f
me~ns ~
b SOl1aJ affmrs than IS essential for tIl I, Y1 • I e1
to provide evidence incriminating' to themselves. nation's judicial subsoil. In addition, there' and what it entails. Now ho of a . ' (' ,IC uevement
These restrictions have been extended beyond the very considerable problem of ci\'l la 11 '1 I' b'l'~ •
IS ell' I '
ar aut 10rIty that sllch a rio'ht . ,,- , proper publIc purpose TI' . ,
defall1atory.materia~ tl~e COl~stitlltion.o br~~cle~~
measllrino' and b I . . lIS IS ,1 process of
·testimony given in formal courtroom proceed-
ings to a wide variety of circumstances in which
an individual is compelled to offer evidence that
might, directly or indirectly, assist in his criminal
prosecutioll. 1'01' ('xample, the privilege against
for improper circulation of
'Vhile it is trne that Government offiCials
. .
WIthout malIce have been protectec 1'0111
. . .
lty 1ll cases where they have III the course 0
official duties disseminated dcfamatory .
1f I
f
a t
ll1

<lIOnomy that'
develo l' ' , IS, an mc IVIdual's freedom
P 11S personalit
of aov '
1.
The
IS that It constitutes a right of I)er
. I'"
'. y ane !l1 terests without
tit ~lI1m~ntal ll1terference. It would be
-
°<
anthmetical precision.
a a~1cmg competing social pur-
p~ses, none of winch may be assessed

Second, privacy rights are morc likel ' to be


upheld hy the courts wherc the riohts in .(' t'
aJ)I)roxi 1 t to· lues 1011
. I
WIt 1
I
i
sel I'-incriminatioll has provided the basis for the tion, the threat of civil action neveI:thel ess doctr~n~ma~ne a more abstract or far-reach- of , : I la e more traditional and hmili
all lildividu I F '
"1
ar Ilg lts
unconstitutionality of reporting requirements in
the Federal gambling and firearms tax statlltes.
The pridlege's requirements have been "ex-
1
mains a potential weapon against offinaldol11
the private citizen who feels himself
lower F' I onetheless, a number of State
iut :(,eral.col1rts already have accepted
el pI etatlOn Cal ,t 1
Ullconstit t' l' n s lave on thIS basis
.
will
".
tlllslOns
. r
be

.
r a t

VIOlatIve of
. or e~at;npl(',
c l~pos~e to scrl1tllllze most careful! in-
.l)crscHl"l
.
~n~o~vldl1a] or. in~lividl1als involwd are potentia~
<l
courts generally

I:'1 eec1Olli wheny til I


tended beyond the courtroom so as to encompass
all interrogations that occur while the inter-
rogated person is in ofTicial cnstody.2 ~Iany lead-
a Friendly, The Fifth Amendment Tomorrow, 37
of Cincinnati Law Re"icw 671 (1968).
4 Cf. SlwjJiro v. United Slates, 335 1'.S. 1 (J!J.!8).
_____

v.
11 1011a statutes requiring motor-

Alabama 357 US 4
Legislatil'c /;west'r t: 49 (HJ5~). See also Gibsoh
albcts for C1'1 m1'l <1 I prosecutioll Tl' .
wiJl in .
tel1ia
b"
Ipose ~l lIgatIOns Oll organizcd crime in-
. 11S 1Il tnrn I
I
:; Griffi/l V. California, 380 U.S. 609 (1965). . ,t 19a1lle COlI/lIllttee 372 US 539 b ence Ul11ts to balance the social purpose of
o This is known alltl)' as the "fruit of tllc pOlson~{

I
. l~ ~ . . . .
1 Marchetti \. Ulliled SIII//'.I, 390 {l.S. 3!l (19ull); 1l1l)'f/('.1 Y. " • 1 ~ta/l'
doctrine. Sec, for example, Nardolle v. ['/lllfe· .. ark Tilllcf v ~ zr
Griswold v C .. II ~1'all, 376 U.S. 254 (196'1).
['lIilni Slrlir'.I, 3!)0 r.s. ~5 (lUli~). 10 Sec, for ('xanlpl(', \
",\[;'1111(/11 \. ArhOllll, :184 C.S. 436 (l!)G6). l'.S. 338 (1939). . ,olll/eet,cul, 381 U.S. 479 (1965). (1967). ". '\'('stin, "Priv,'lC·)'_ and Fn'('dotn,"
f

lOR
109
I
I
'- -_.,
certainly do not constitute any comprehensive This questiol1 has frequently been thought to
, important presumption under, guidelines for the governance of criminal justice be one merely of administrative convenience-a
. n , ' st the privacy That IS to s~y, an " y would be that the intelligence systems. They are intended to indi- problem of the most efficient use of available
an intelligence operatlO aga~n, , tl ng'ht to pnvac
t 'o'et l)ersonahtles, ly,U1g 1e f' f mation about an individual cate only the direction in which the law now is resources and storage space. In fact, much more
interests 0 f t Il~ al~, b ermitted to intrude chscl osure 0 m, or oI1sent of that individual.
the pnor c . going. As noted earlier, many questions-in- serious problems are at issue, Civil disorder
Third, offiCla,ls \\111 e '~itizens only for pur- rests Ol~ ' I 1 rd for the propnety of col· cluding those of the greatest practical impor- f1les involve constitutional questions of the
on the privacy mterests o~ sti~utional responsi- The I)nnclpa stanc a 11 b h
. 1 . 10' Jersonal data wou C e t e tance-have never been directly addressed by greatest seriousness. Although these questions
poses clearly related ~o ~fn useful inquiries will lecting or dISC Osll b I h 'mplied consent of the courts or legislators. Nonetheless, these guide- are only now beginning to reach courts ancI legis-
. or at least, t e l
bilities, Idle or margll~adY not mean that it is exp:ess, , I' This of course, would be lines suggest variolls methods and standards of lators, it is clear that such files offer palpable
. '1 I' T 11S nes t of the ( elta, ' " J' ,
be impernlls s1 ) (" f the agency su b Jec 'ly met by crumna Justice operation essential for every criminal justice dangers for the exercise of political and civil
. I' tl' overall purposes 0 a stat~dard not. eaSI The recognition of such a intelligence system, Those methods and stand-
suffincnt t lclt 1(, , t'tutionally accept- rights, Merely the collection of such informa-
, II'
or 1l1te 19;c:nc e , .
'u11lt are cons 1
d ,ill be whether eac
h intell1gen:e sys'~~~~'would not mean that intelli, ards of operation are described in the section tion may discourage the exercise of rights guar-
·\b1e The questlO n mstea \\ f data col- standard m the h~t fail to Ratisfy these standar~ which follows, anteed by the Constitution. If such files were
,. . 1 1 . ch element 0 "
intrnsion-11lC eec, e,l I' d to government's gence systems t d It could mean, however, intermingled with organized crime intelligence
leeted-is reason,lbly '1r~I,at~ees Stated as baldly would be outl~we, 't tllat coHects or dis, records, the constitutional problems implicit in
. ' 1 resl)on51)l 1 I , b . t 111o'enee um '
co1'.StlllltlOna . , "Il b limited to those a - that t h e me,? b t a criven individual, III the former would inevitably attach to the'latter.
as possible, intrn.slO ns W\ effective performance
-loses informatlOn a ou
c 'I t his consent, would be oblIged to .emon,
b. d
This section will identify methods and stand- Moreover, the political and public acceptance of
sol u tely illlperatn'e for, t le, e lCy'S responsibilities, Wit lOUt a court's satisfaction the neceSSIty for ' ards of operation responsive to the legal rules organized crime intelligence systems would be
of the law enforcement s agel I' 1 lata are col- strate 0 , 1 1 ' b 1 l' , eroded by the controversy that might surround
, I ds by W 11e 1 C, , ( b 'ncr the normal stane arc s. 'd' winch appear to e Ceve opmg With respect to
Fourth, tnt' met 10
.' ~ 'noly come un er
d closer senl-
. Yh~~~~tl~, rights of access and challenge bYI:~ell; ',the collection, storage and dissemination of do- civil disorder f1les. As a matter both of ordinary
leeted \\'111 lllcreclSI " 1 I' I the courts . 1 0 to data collected about them are, II: mestic intelligence clata. For convenience, the prudence and of sensible administration, intelli-
i t methoC s w 11e 1
tiny. It may l )e t la, ' , iyc will be sub- VIC l lla1 s £
'''lof'' l'110'casingl y faml lar ,
'1' aspects of. 1l1te h I, sectIOn ,
WI'11 b e c1"dIVI e d mto
. .
vanous su b '
sectlOns, gence files relating to organized crime and
find to be 11l111eCCssa~tly 1l1tll~at~ obtained by to ncc 0 .. -
!.' a~ and data banks,
TI
le e
stabhs mellt
c
.
each concerned With a separate aspect of the racketeering activities should be maintained
""ere restnctlO l1S . I ded
,
, 1 " from forma1 gezHe!II!:. 1s to tleconcepto,con, 'f" I' . . II'
l eete( to sc c ',~i '~cvhts corresponc 1 'bl operation 0 'cnmma Justlce mte Igence systems. entirely separately from civil disorder records.
such met I10C1S 1l1ay be exe u . J'
Ot ~IIU{ I 0
, .
, ,
'oceedll1gs 111VO
. IVI'l1Q: the inch-
" ' I 1;. They also repres ent relta ' A Each sectIOn con tams a common pro bl em: t I1e
e anu . ' (ii) The jJersons to be included.-In part, this
I )resent<ltlon
. 1
111 pI
roperty,
TI 's
11,
'vould repre- ~e'i1W'~ 1 ,,~ve o'wU'antees of data accuracdy· 1 balancing of conflicting social interests ancI question merely repeats those discussed above,
vidual' 5 ng 1ts or p
I ort extenslO 0
, l1 f tile J' udicial rnl e
.
1l1expen
I n. ghts iI. 0
become more co mmon , an vaI ues'111 a f asl' .
110n conSIstent . I I' . .
WIt 1 ImitatlOns for it is imperative that organized crime intelli-
sent mere ya s 1 1
that excl udes as eVIC ence ,
. 1 any infonnatlOn S~1C l'fi ance more widely understood, anyI ' by courts or legislatures interpreting gence f1les should not be broadened to encom-
S1O'nl1C, , 'Iy be t I e , .
o'al means, b, 1 cle them-as wlll necessan . II' e tIOnal guarantees, The Impact of an pass information concerning the political and
1 1 il1e 1 1 to mc u , . l' t" e 1l1te 100enc . . . ,
col Iectec )y , o. r " I I oldings, particu ar Y , 'th respect to cnmma JUs lC I 0 I Igence system upon the constitutlOnal nghts other activities of unpopular or unfavored groups
Fifth, (ertam JlIC 1~la ;81 US 479 (1965), n
tlO Wls ",ill stimulate demands by tIe, h th' those about whom it collects information ulti- of citizens. But it is also important that con-
Griswold v, Connectlcllt, , l : ' , ' " may be sys t em - . . fi " As WIt '
" 'ia1 zones of pIl .. acy ( , ' XIJlanatio n ancI JUStl catlOn, '11'O'enre depends upon the whole of the system's scientious efforts be made to prevent the coI1ec-
suggcst tl~~ :~)~~o'ulcl be physical or geog1:aphl-
f01 e, 'f . I' 'I I '
, t of Co,lsensual'Ity 1' t seIf, th e 1l1te 10 . t Ile categones 0' 111C 1VIC ua s 111- tion of information concerning citizens about
createc, l le, in which any ll1tru- COl:ce P t denies rights of access and . in its files, the persons and agencies to whom there is no reasonable basis for a charge
cal areas, sllch as the home, ,The exact unIt t Ila .1 . burden IS 'd" . f . I that they are involved in organiz~d criminal
r find that the eVIC enuary, d It ISSenllnates m ormatlOn, t 1e pro-
f sit,l1 would ,be. partic~l~arly i~~~~~~~~~l that might ma) l't to J'ustify its data collectlO an n it makes for verif1cation and purging, the activities. This, admittedly, is a goal more easily
~.
legai prescnptlO l1S ag~I~~t of such special zones upon I f "
' 't'es 'ts 0 Its secunty arrangements, anc so on.
I stated than achieved. However, since every sys-
cmerg;e from the 1 ecog nItlOn act! VII. ' cy llltcres bI '"
, I not yet clear. ' til it is likely that pnva a ance of thIS sectlOn Will be devoted to an tem should include mechanisms for the prompt
unclcr the aware , may be .:'stab- N In , ' I e they and, so far as reasonably possible, the complete
Sixth 1)l'ocec1ural reqlllremen~s ' t ' on of receive special attentlOn w ler ctectio n " of each of these aspects,
" , II -tion or dlssemlllC1 1 'I or are necessary for the pr d : (I) The scojJe of the intelligence system's evaluation of data entering the syst(,m, the least
lishecl for the co ec As the significance of Wltl' . 'I an '1'"
cons~itutionally protected CIVI a' 'ive spe~\ ~flVl~les,-The issue here is essentially whether substantial entries can be readily eliminated.
,
varIOUS ' .. ,
such collcctv"1S)
('I'\sses of cla ta,
1 eromes mOl,e ,,1
be made that informati?n
r' dely unc er-
1
J'b ,ties, In particular, courts
1 e;ection to privacy interests W~IC 1
m'r .gl intellIgence systems should be closely restricted
,10 organized criminal activities, in the sense of
Information that seems plausible, but cannot be
verif1ed should not be disseminated, or, if dis-
sto()cl, proposals. may 1,
, • 'Cl' <'s ta I'.e vallo,
"'IS steps only With
f I~ro stiwtional rights of speech .anc NAACP' lacketeering enterprises, or whether instead they seminated, should be rigorously restricted to the
gatlwnng
, , ag ,,. val I 'I
eIt leI' 0 f (a Inacristrate
, b
or 0' a ~:~is was, for example,. the b.asls ~eE lcourt ~ly~eextended to all situations ~n which groups law enforcement intelligence community and
A la/wnw, cited above, 1ll ,WhlC~ ~1!\.Cp . pels~n~ are thought to be persIstently engaged
the prwr apI)1 ) , ffi Tile I)urpose of accompanied by clear warnings that it is not yet
' , t, tive 0 cer,
hig;hcr a d Imt1lS ra b nit intellio'ence from disclosure varlOUS Nl '. Y lnpermciOUS activities. The important practical substantiated,
su'ch rcstrictions wO.lllcl bfe ~:~~v~IY indepe~c1ent tec tecl . n 1)r1vac lie t' ,
hi P Iists. This em pha.SlS 1.1 po 'oteetion SIon IS whether organized crime in telligence The essential point is that organized crime
c\ct'isions to the reVIew 0 r 'tal ()fficers. Such
. .
and dls1ntercs e b
, t (l o'overnmen ,
I eady been estab-
~vhere they are essent~al for t!~~1 pI reflects l: tems should be broadened to include civil intelligence units should targ'et as precisely as
requirel1;el1t S have of cours~ a l' . by elec- other constitutiOl 131 n?l:ts m as~icrned by ~rder files and other records concerning possible on known or suspected participants in
11 ti 11 0 f 111 fonna tlOn 'eff.'lTed I)osition tradltlOnal.ly , , Os bUps who are thought to be engaged in syndicated crime. Where known racketeers are
lishe:l [or tl~e co ec n~ electronic eavesdropping, l)l ~ 1" 1 I bertIe. u I'e '
involved in .otherwise legitimate businesses, it
trolllC survel1lance a , . 1 right to privacy courts to civil and po luca 1 described rSlve or dissident activities.
Seventh, the constitutlO na d " " The possible developments ,
111;y",'ell take shape as a "consensual octnne. III

110
may require extensive investigation to determine ing~
the inadmissibility in J'udicial l)rOceedings the mere collection of j)el"s onal'111fonu .
which business partners are criminal associates or the entire chain of evidence. be regarded as creatin" atlon may
and which, if any, are unwitting, innocent busi- Certain minimal safeguards are therefore stitutional problems tl~ pnva~y and other con- "'?ich the individual involv'
Will be permitte~l ed 111 the chsclosure
.
· , e seventy of th
ness colleagues. Differentiating between the needed. First, those responsible for the evalua. : Iems rapIdly increases as the inf.. " os~ prob- cernmo' . 11im Taccess l ' to the sys t em '11 s lIes con-
two becomes particularly difficult where some of tion of intelligence data should be made aware widely disseminated A . ollnatIOn IS more I . o. • . le unIt should f . 1. "
t lat CIvIl remedies' I d' ttrt leI antiCIpate
the figures in question have no criminal records. I law
b ot h 0 f tIe " s reqUlrements anc1 0f t1le urgency lip on such disseminat'}'oll , . . s~nes
IS UUper of t' restrictions
.f . may be providecj f
, Inc u Ing m
onetary c1amag'es
Probably the best guideline here is the rule of of complete adherence. Second, legal counsel tant constitutional probl . a lve 1 llnpor- d les· or cases of ab S '
now exist for In . ' . use. uch reme-
reason. Where an associate is an intimate of a should be available to each intelligence unit, to (See chapter III for a disc em.s at e to b~ avoided. as a practical matte
any SituatIOn b
f I' I
1
. s, Ut t ley are,
~ l' . . USSIon of restn t' . . r, 0 Itt e aSSIst . .
known racketeer, whose interests appear to be whom doubtful questions should be promptly (lSsenunatlOn.) c Ions on CItizens, and it should b ' ance to 111]ured
intertwined with those of the criminal, he should referred. Third, where the information has Above all, the c1issemin . ultimately be m d e expected that they will
be the subject of an intelligence file. "Where the been 0 b tame . d fr om anot h er 1a\,'1 en f'orcement . crime . intellio'enc"e clata S1IOUaltiIon C b of organized. . a e more effecti "
0·, , pOSSible consequenc . h ve. 1. et another
connection appears more tenuous and the person agency,
~
that agency should be required to offer : mminal •
justice ao'enC'I'
' 0
. 1
. es WIt 1 a cl
e restncted to statute of a require e mIg t be the creation by 1
· 0 ft l le'111 f'ormatlon's.
. receIve them . TJ' , tl ear". need to . ment that Sl 1 . f

I
in question has no criminal record, he probably an assessment 0'f t 1le 1ega1lty lIs sUo'o"ests that f may be released
collection. These devices do not provide any ,Han buddy system"-tll~ eust < le 1111 'Orma- ( OUtSI'd e th IC 1 111 ormation
.... .
should not. The line is a difficult one to draw, :ommunity only with th ~ cllmmal Justice
and some diminution of intelligence operations' cOml)lete guarantees, but, if combined with can. which information is " omary c evice by Judge or magistrate Teh 'pllor approval of a
I . given only t th .
effectiveness could result from drawing it too tinning efforts to avoid the col1ection and dis. l\'lom the 111 [ormation's coll 0 ose 111 words, extend tl (,' IS would, in other
sharply. But a forward and liberal posture by semination of such information, they offer at ronfidence-is an impo t ector has personal · Iosures.
(IISC Ie warrant sys t em to Such I
the intelligence unit on this kind of question least minimal protection agamst . potentially " tion,. albeit a hal)hazal"d ' r antwIthm
one ~nd. useful
tl limita-
' . . These possibilities in turn •
may sometime in the future protect the overall q uite serious errors. . JustIce community Bl t ' le cnmmal WIth which all l'Ilf . suggc:st a demand
gests that many '111 . I, Sound practice also sug'- ' (onUatIOn syst
activities of the unit from judicial censure or (iv) Data puygl:ng.-For more than one reason b! ernoers of th . f b e forced to deal' tl d ems may shortly
even legally imposed restrictions. intelligence unit commanders should commit ncely systemS-trllste I . ese 111 ormal systems should 'p~rl11~~ .el~land that information
(iii) The data Lo be includecl.-It is essential themselves to periodic purgings of the materials tive aides, employees ( l~ewspape~"m~n, legisla- lenge to all tl ng ts of access and chal-
that organized crime intelligence systems should in their data systems. The mere entry of a data ngencies ' j)rivate' , 111Vestl~ o'atnon-cnm111al-J'ustice .
mel uded in their fil
10se persons '1
\\ I.ose names are
restrict the data included in their files to those element into a storage system is often enough to should be excluded S 0' ors, and others_ . es. There IS 1 I
cenuble trend to im os . a . c ear y dis-
reasonably relevant to preparation for prosecu- confer authenticity on the data for years to come. 'J . I coUected by orrralll'z'ed'
0'
o~e of
Crtme intelJ' . the information . most laro'e-scale I'nfo p .e tIllS reqUIrement on
tions. Each intelligence system should assume a Or, to put it differently, data systems deepen ; IS ug 11y sensitive and 1gence Ul1lts . 0' nllatlon syst . .
1I h . " some of it if . 1 credIt bureaus etc E ems 111 bUSIness
continuing obligation to evaluate each of the institutional memories; once in the system, a 'Call c ave Significant I" , I e eased, , . 'xempti . l' ,
n ' po Hlcal and so . I tems will inevitabl ng mte hgence sys-
data elements it collects in light of this restric- fact, a nalne, an allegation,
~
a report, rarely gets l"ences. Careers, el ec t'Ion cam pai CIa conse- planation and' Yfi' pr?voke demands for ex-
tion, and to eliminate those elements which are out, even if it is not totally accurate, or if it is . opportunities and )er ,~s, employ- f or exemption 'JUStl catlon. Th . . .
th"t ca b e JustIficatIon
found to be no more than marginally useful. In false. Periodic purging, then, becomes a matter eaSIly be wrecked. To per~it s~na~. lIves might ' .
cnme 111tel1igence syst.
" , n e offered b
Y orgal1Ized
.
particular, the col lcction of data that are "un- of maintaining" the accuracy of the files or stored such information_which le bissemination tive, provided that . emlsl~s persuasive and effec- f
usually intrusive" should be permitted only if materials. At the same time, the elimination of unreliable who 1 may e wholly or . . 111te Ig'ence d
they are, after careful assessment, found to be false or inaccurate data on individuals contri~
, .,
, and which ma re'..
IC 1 maYbe less th f
an ully
WIt/un the criminal"
only for investigative and
, JUstIce com
ata are held
.
mun~ty ancI used
I
utes to the protection of the civil rioo'hts of the relevant data_ I Y pr.esent only part of
necessary for effective intelligence operations. . ." at t le optIOn of d" :-? t!le extent that such dftros~cu. tonal purpo~es.
This evaluative obligation must be a continuing subJ·ects. The intellig'ence function, which officml without t1' an a mll1lS- cnnllnal J'ustice ag' . a ale released outSIde
f ' 1e ll1tervention , encles Or
one; each system should periodically assess the necessarily depends for its success upon the cor· . 0l' .any COurt.. , pI esen ts sIgnifi . orI assess- p:lrposes, it will be exceedin . are. used for other
information it collects to determine if there relation of information obtained over time from , Inc IVlc1ua) rights.
'.~ There a .
cant c angers WIthholding them from the .gly.cl~fficult to justify
are categories of information which may be a variety of sources, can be purged only WlUl •• ' re vanous possibl l' . .
eliminated from its collection efforts. great difficulty and with some risk that "the a.ml~lInum, disseminatio~ ImIt.~Ions. F.irst, . (vi) Data ' class;fi • ca t'ton - IndIVIduals p . I involved .
111telligence operat' . n~Clse y as effective
Special attention should be given to data which missing piece" in some future puzzle wili be Jllstlce system, whether f ~UtSI e t~e crllni- ,Ions reqUIre
eva1uation of the reliabilit a. systematic
may be tainted by the unlawfulness of its col- eliminated. But ambitious purging schedules .be prohibited with or mal or 111formal, collected so Such y ~f the mformation
lection. The handling of such data is by no can, potentially at least, jeopardize the chanceof Intelligence unit's hi 'h out tl1(~ approval of t h e protection .
' an evaluatIOn .
Contnbutes to
means an easy problem: in the first place, such making successful future correlations. Accuraci I shOuld be given ~n~;t a~~Clal. This .ap- gIven to
?f the individuals involved fIb Us and.ll1terests
the '0'1 .
information cannot easily be identified. Com- and a sound constitutional approach suggest that ega I counsel I . er conSultatIon IS that individuals int . The; POll1t again
"'Villi 11 0-,0" • t 1l1lght well b
plex issues of law, perhaps involving ambigu~ls
or changing legal principles, may often arise. It
is unrealistic to expect that busy intelligence
analysts can come up with fully accurate solu-
purrrino' on a fixed timetable should be a
req~ireOd procedure for all units.
(v) Dissemination and llse of intelligetlCl
dala.-The potential dangers to privacy right!
t upon the furtl
officials Outside tlle :er aj~proval of appro-
procedure would Imt~:lgenCe unit itself.
be kept in the ~.!~ I:tate that official
e made . by the care and prof ere;sts a.re dIrectly served
gence system (S
I ·
c ass~~cation.)
.
1essIOnalism of an mte
ee c lapter II f
or matenal on
. II'I-
. /
" I' lated to disselUI'llat olloI.natmg agency of all' (VlI) Extemal councils d ' .
tions to such issues. Nonetheless, the dangers d J
an ot ler constltutlOna mterests are re, Second tl . ,~d OutSIde of its control One of the m an adVisory groups._
of error are by no means trivial: information the kinds and effectiveness of the limitations thai ,Ie 1l1tellro'en' . ost common 1) I
ernance .of intell' , roposa s for the gov-
tainted by the unlawfulness of its collection may . d . . II' . upon the for the possib?I' ce unIt should be pre- f Igence systems' 'h ..
org'amze cnme mte Igence Impose Ultirl1ately" II I~y that Such disclosures o an external group t . IS t. e prOVISIOn
taint the information obtained through il, caus- dissemination and usage of their data. A resu t m . d' . and direction S h 0 prOVide POlICY guidance
a ] u IClal l"'uling by intended to' fUC groups, particularly where
112 per orm only d'
a VISory functions ,

113
. ~,,, 'F-

'11 be legal requirements for


jurisdictio~s there '~; of them. But one pur-
.' b ex ected to impose signifi-
cannot reahStlcally e p .h ctl'vities or any imp1cme~tlng fe\~ 1. any, f these procedures and
0
.'
cant restnctlO ns
upon t e a
Th dministrators of the
. pose behmd the eSIg~1 ossible legal action in
.
intelltgence sy
steme a
. h nd the advisers toO guidelines is t? foreta. n~ividual officers or files
system will kno\~ ~oo ml~~ \~ill have time and tb~ future ~gall1st t 1<:: / In this connection it is Appendix B
little; the admlllistrato . and the advisers of an intelhgence ulm. I'dence of institutional·
ber t lat ev
opportunities for preparatlon well to remem . f n considered favorably by
will not. b' ections need not mean ized procedures IS °o~~tration of good "fait~l and THE COMPUTEF. . Al\JD THE
Nonetheless, these a J h l'tl10ut value the courts as a ~eI~n other words, an SOP l\1cor-
. e altoget er w . reasonableness. d and guidelines should
that sllch groupS elr or to the publlc.
either to intelhgence systems tl ey can offer an
. h
poratmg t e~e
proce ures
e but be available to all per· INTELLIGENCE UNIT
. Ir ence system 1 ' not only be m. forfr' ence unit, as well as to the
For the mte Ig .1 d' suggestions against
. t test Ie eas an sonnel of the mte Ig
opportumty o . d d interested out-
a saml)le of well-mforme an . ht help public. INTRODUCTION and (3) punchcarcl operators or typists to
, d . 1 such groupS mIg
siders. If use WIse y, r errors Moreover, IV input data as it becomes available.
This appendix gives some general pointers
to avoid many serious po ICY migh; significantly
d ds of operation described I! about the use of a computer by an intelligence This appendix can offer little to assist in giving
the existence of .such a group f intelligence sys- The rules an~ standard t be exhaustive state· 'i unit. It suggests the conditions under which an guidelines for the above cost analyses. Little has
encourage pubhc b~~ce~l~~~c~r~ups could provide above are
not Inten e O .
d
£
ds or l)ossible lltore intelligence unit should consider committing been published that will guide s11ch calculations.
tems. For the pu lC, ml'ssion of relevant e law's eman ,
. for the trans ments 0 f th '
d . 'ntelligence systems, resources to this purpose. It reviews the various It apparently must be done on a case-by-case
a mee Ilal1lSm on domestlc I
. . t va dlrectlO . I)llblic fears an
. ' ns' demanc1s, up I s in mind is that the uses to which a computer can be put-informa- basis. Computer companies or independent con-
informatIOn III ,
. Id be commumca The point to be kept ~e'~~~ to provide rules for
. ted to the sys-
tion storage and retrieval, collation, and analysis. sul tants in the field must be called upon to assist
com pi amts call 1 'eneral information
law has only recently 1 g tems and it is not yet This appendix does not attempt to develop or to in making these studies and analyses.
. . t tors ane g ' .
tem's ac1milliS ra '...
, actiVities cou the governance of suc 1 SY~d n~e' as to the form
ld be communl-
. suggest programs nor does it attempt in any way There are mechanical aids other than the com-
about the system s d' . . tr-ators to the public. POSSI'bl e to 0 ffer ,rolear
-' 1
crUl
0 a
"hich ultimately WI'II to probe the technical attributes of computers. puter that are available to the intelligence unit.
tile a mllUS ,
ntec f
, I . r o m 'f and conten t of the ruI eSI 'YL whatever the TlIIes
-I groupS s110UleI not be There is no doubt that when the intelligence However, the discussion that follows focusses on
The usefulness o· SUC 1 I t some assist- 1 d Nonet le ess, , . ht
d b tl ey offer at eas be deve ope . h important fact 1S t a process is computerized the intelligence unit will the computer because the authors believe that
exaggerate, ut 1 f gencies that are both
that ultimately appear, t.e t' nal values should become more efficient. But this will have a it offers the most flexible and, thus, the most
nce in the governance 0 a d ther constl tu 10 .
,a . t'ally dangerous. privacy ~n .0. rn of every organize~ cnme cost. Resource planning and allocation must effective system in the long run. Whatever ap-
controversial and paten 1 , . cmit _These
be a contllltllng conce . ' al ingrechent of
( viii) Personnel and phYSIcal ~e . IY' t VI
intelligence sys.'
tem A pnncIp'
,vith respect to suc
h take into account a series of expenditures, proach is adopted, it is recommended that from
. l' detatl m clap er ,
. . nm akmg process . including: the first step taken to bring in mechanical aids,
questions are cliscussec III 1 t observe that an the declSlo nces of any actIOn arrangements should be compatible with even-
.'
and It IS nee ,
-essary here on Y 0 systems shoule~ b~ t~le COI~i~ill~: and interests. If
. c\lleling careful clear- 1. An initial cost-effectiveness study to deter-
tual conversion to a computer. This applies to
ity system m . .
or policy for mdividual _ 0 d by those who con· mine the advantages it is hoped will accrue to
adequate seCllr ersonne , c\.lr·
' I ectly ,and slgmfi-
n is demonstrate '\I the unit.
the indexing systems adopted and the data input
anees of sys~;m P I thi, concer
_ tection of individual I likelihood that they w~ forms. In particular it applies to developing
cantly contnoLites to t le pro . duct such systems, t ~r onfidence will be !1l' 2. The development of the software or pro-
information element codes.
righ ts and intere~ts. of the l)focedures attract and hold pu IC c h ffer to pofitical ~ams to determine how the bits of intelligence
, d and the dangers t ey 0 . For those concerned that the computer will
. ) SOP's _Fmally, many . mformation will be available .
(IX . .' . . d in the preceehng para- credase. '1' rl'ghts will be diminished. tend to run the unit, or cause unwanted infor-
and gllldel l11es suggeste . In some an C1Vl 3. The large task of reviewing existing files
mation flOlv burdens,. it must be remembered
gTaphs are clearly less than preClse. to determine which ones and what contents of
that the computer is a machine. Its output is
each should be put into the computers data bank.
bounded by the information put in and the
,4. The development of computer related
instructions given to it through the programs
Information report forms.
that tell the computer what to do with the
5. Operational costs whi~h will include;
information in its storage tapes or disks. It can-
a. A proportionate share of the cost of not require that additional information be col-
the computer. I ected, nor can it make its own analyses. Its
. b. A share of the cost of the computer- output can only show holes in the data bank and
personnel, including: (1) computer opera- its programed collation can only assist analys;s.
tors; (2) programers (contract or hire-to But there is no doubt that the presence of the
refine and to update programs through time computer, once its capabilities are appreciated,
to keep abreast of changing circumstances); will have the effect of pressing the unit to gather

115

114
- introduce 111 0
. t thc com I)tlte1' 'all that have cur·
. A more austere
makes it much more readily available for use in
a tactlca . I sense. I nves t'Iga t ors can reques t a
printed out all data will appear to have equal
validity, '
, 1 t make the reporting I Ie informatlOn. IJrintout of most recent information (tactical
re informatIOn anc 0 ren.t1y usa) 1 . to esta bl'IS11 a ctltoff . date from which intelligence) and have it correlated with fi led Collation
:~pati1;le with the input programs, approaCl IS d 11 'n[ormation will be collected information without having to pull a series of The computer adds many dimensions to the
point forwar a l' vith inputting the com,
b1
in a format compati Ie Ie tIle old files in their hard copy reports and perform a time-consmu- collation potential. Through the use of appro-
TO
~~~g{s~~~ ::~~~~~JTER , puter anc re a
1 t in anc us
A compromise on the latter
inO' hand collation, Similarly the analyst can,
day by day, obtain the assistance of the computer
priate coding of the bits of information as they
are filed they can be associatecl with other bits
, ',' hould be kept in m~nd hard copy fon~. b t combine the cutoff date in his efforts to correlate bits of information and of a similar nature and through programing asso-
Two major cntel1a s 'b '1' ty of computeriZIng approach ',,,oule. elIot reel infonnation as new ciated with other types of information to present
of 0 e s 0 develop. patterns of activities or organized
when considering tl:e pOSSl 1 1 'vith a reVIew Where elata- fro 111 the old is ' I igence), aggregations that can be used in turn to develop
\ criminals (strategic llltel
the intelligence nl1lt: , cases develop, be )lIt into the computer.
relevant, it could thken ,11. mind is that becanse One decision that will have to be made is patterns, associations, and trends,
, ab1T' of a secure compute!. , t to be -ept 11 whether the totality of the remarks on a report, The most important area of improvement will
1. Thc avall It!' .' r )otential organized One P0111 . bTt of the computer to ,I
C) The level o[ eXlstll1g 0 I f information of the enhanced c'la pa 1 :aYte bits of information, an electronic surveIl ance, or a court record will be in cross-indexing. A single report from an
,~. 'Ic,tivity and the vO1ume 0 11 te ane assOCl, 'f i be inserted in the computer, be abstracted, or investigator that contains information on several
crune , han dl e: co a "lIe (and will want) more mar·
on it. thc ulUt can hane, ' activity or suspected only be given as a source, with a referral to the different persons, locations, and activities tan be
, investl0'atlOI I, ' ' . ' complete report being held in its hard copy form, broken up and inputted in a manner which asso-

I'
Computer matIOn per °b ele of a more extensl\'C 'I
A 'I bility of a Seenr e , Tl e use to e ma £, How this problem IS reso ved will have to be ciates them with others of similar nature, The
val a , , 'ty of the informatlO n person, 1 , ' 1 vel oping patterns at ! Ib I ' I b ' f'
flow of informatIon lIn el~C clearly delineating j determme( y eae 1 11111t on t le aSls o· Its com-

names can be checked to see if they are already
Because of the sens1~r;1 fil security of the I,

, II' en~e u111tS es, VI , dime ane m o ' 19 pnter capacity, punehcard operators availability, on file. Similarly the locations can be checked,
in the 111te 19 L , .' 1 (See chapter orgamze cr" ." clieated by figure ,
ation IS essentia , criminal partiCIpants IS 111 potential developments in the organized crime Notation that they were seen more than once in
computer opere " o f the problems lhreat, etc. Experience of other units should be a particular location can be put in as a summary,
l'x A for a dISCUSSIOn , page 119.'
and appene 1 , 11 ' of its relationshIp to songht on this problem, especiall y units of The fact that the person was seen performing a
of security and, espe~la ~ bi In seems to rule
Tl secuTlty pro e THE COMPUTER AND THE roughly comparable size and level of organized similar (or different) activity can be recorded,
privacy,) Ie, Jroach when thc computer
out the shared-timc apl d 'leased by the law INTtiLLIGENCE PROCESS . crime problem, But the point is that each separate bit of infor-
l' ot owne 01 < ,
, to examine the manner I~l
It will be essential that all data filed be coded mation is filed under its appropriate category,
being sbarec IS n ,1 the jurisdiction 111 for sensitivity, (See chapter II for a discussion Unlike the hard copy or the index card, the
enforcement agency 01 )Y I either of these One practical way", intel1i cr ence I1ll11
t r may aSSIst an 0
Oflhis problem,) Unless this is done there will subsequent user of the information in the com-
, y o!)eratcs. 11. b which a compu e " ' to the several step!
wInch the ag el: c 't 'an paten tian y, esta - is to review its applIcatIOn A ",ill be indicated be no way of separating sensitive from nonsensi- puter does not have to bring out the hard copy
'telhgence unl (, ,
cases t Ile 111 cedllres to acllleve a I ' l)rocess s tive material when printouts are made of data with all the original information on it-some
lish adequate rules a~:l pr~he specific problems in the intcl 1genCe
tel' has a 10 e
. '1 in most of these
.
bclow, the compu , teel out the operatIon in the computer. Since not each element of applicable and some not, Furthermore, the
requisite level of seC\lllty, 't will be discussed , also l)Oln '
, ')Inl)llter secun y 118 stel)S, But as IS, , '11 have to beo na intelligence information has the same degree of information can be gained from the computer
involvec1 111 c' I' 1 .'nnino' on page ' , '1 'oInl)utel WI ' !ensitivity, it will be essential to have some sys- ip several ways, that is, by asking several different
, I 's appenc IX, )egl 0 d of the U11lt WIt 1 a c I ' t'cation than when
below 111 t 11 . ' [ormation storage an , 1 I I of sop us 1 , lem of classification, some system by which data questions, It can be asked for by the name of
By themselves th,e 111 . f most if not all J'nucb lHoo'her e\ eI
- L , d "massaO'e(1" 11ctles ' There
' 'reqlllrelnents 0 it operates WIth Ian , ail\ble and a greal er inputs are given a seilsitivity rating when they the person, by the activity, or by the location,
data haneII 111g , 10 not see III laro'c '0
enough to vill be more informatH~n av, " in the dala ~re put into the computer. '\-\Thile the bulk of It should also be noted that with a computer
intelligence U11lts e , .' However, if an , , , , the 111(ormatlO n .
support a c o l l i
nl)uter operatIOn,
cqllired a computer capabIlIty t,o l~se nal sis-in searching EOl: ral mformation may not be considered sensitive, at there is no danger that someone will inad-
bank to aSSIst 111 a , y , 1 ' bctween lteoll least within the intelligence office', consideration vertantly walk off with a hard copy of a report
agency already alreae y larS a e handling of the ' ' terrelatIOnS lIpS " It mllst be given to its potcntial drculation to
, ' t o do so or 1 tl , terns and or 111 E l1.d actiVIties. and thus create a hole in the files,
or is planmng T I of its patrol forces, then , of l)erso ns a I
o'eneral filcs and c(n~t 0 I 'no' to get a "piece of informatIOn J 'f ne and perhapS IU~! olhers. If it is not protected by code, the com- Of course all of the above will not happen
!"> • I 11 bc actIve p an11l tl L, would be most usefui I SO\ learn the mysterIes ~1I1er, when asked for all information on a per- automatically, There must be a program writ-
thCIC s 10 t,I c " [ , 1 'ntellio'ence U11lt. of the members of tIe U
lll
' may exploit l.lS IOn or subject, will put it on a printout that ten that will file the inputs .in their correct
of the actIOn 01 tIe 1 0 the
of the computer so that F' Y l1y the unit WIll could become a serious breach of security or location and will have them come out again,
Volume of Data
. To Be Handled
, 'I'd capabilities to the ,full~st. n~\l~~ il~tlnc1ated Witll of p r i v a c y , . . either as a unique piece of data or in proper
1 t l
) 01' with reques . Equally important is the requirement that in-
However, before t le ~o
nversion exerCIse IS al
mander should do
11ave
,
to oO'uard aga111s )eCO
t for same I IS
association with like or associated bits of data.
, t llio'ence umt com , " printouts (01: re~ue~ so' but not very usefu se lormation put into the intelligence file be evalu- The unit must obtain the service of a pro-
on, the 111 e 0 r. l'llfol'mation IllS u11lt to produce 111teIeSt1l\?, lied as to accuracy of the reporter and of the gramer-as a new hire of a permanent employee,
, E I amount Ol "'d
an anal YSIS o' tIe, ffi' tly it could be handle of figures and correlatIOns. lubllance and that this evaluation be coded and by training one of their own men, or by turning
, dhow e 1C1en d
recel
, ves
' ,an , d manua tec 1 I I niques , an mos
t
, n FloW
'Ilached to the data location, Once data is to a computer software company on a contract
With llnplove '1 ojection of the orga- Colleetion-InfonnatlO , be able 10 lU!erted into the computer it is time consuming basis, Programing and file maintenance are not
\ importantly, what is t Ie .Pt~le next 5 years, The
, I ' e l)l'oblem over
nlzec CrIm . and-o )erated system to one
,
The U11lt WIth t le c
'
1
1
0' l'
oml)uter WIll
flow 0
f ' fornlatlOil.
111
, Ii ~recall and develop an evaluation, But it must
r:t el'aluated either before or after or when
a one-time thing, As information begins to
accumulate on a new area it may have some
changeover [rom, a ~" :elatively costly opera- Il,andl e a muC 11. '£ ar oe ,
at10n In ,
' a nlanner
can handl e thIS 111 'orm
that is computenze IS. a I ',view all files and
tion, One approach IS to Ie 117

116
significance for other fil es already in the com- value, etc. This is the raw material for develop.
puter. The programer must come to understand ing hypotheses on how a particular gTonp of '
the problem and develop the requisite instruc- criminals are operating and may indicate new i
tions to give the com pll tel' so it will associa te areas where they might attempt their next strike.
the new and on-file information and to give it The information on the right-hand side of the
back in the format most useful to the analysts second and third pages of figure 19 is the input
and investigators. data. It would be highly desirable if the unit
developed formatted pages to be used by the ;?IGURE 19
investigator or debriefer. These formatted
Analysis EXAMPLE-SUMMARY PRINTOUT CATEGORIES AND INPUT INFORMATION
pages would Jist the questions to be asked and
The computer can offer great assistance to the would insure that the subject was covered and
GOODS NOT MENTIONED
analyst also. Through progTaming and through the desired information obtained. The ques· BELOW
coding bits of information that are inserted into tions themselves can be coded on the form which
the data bank, the computer can do basic associa- will assist the operator to input the information
tions and correlations that the analyst, 'without into the computer data bank. '.
the computer, must do himself laboriously (and Finally, by having the information organized :
may in fact overlook). to respond to predetermined or progTamecl qucs· , '
In particular, the computerized files will help tions, the analyst is aided in his probing; the sub· i.
in the development of new patterns and areas of ject of hijacking-where is the point of foclIs in
operation by the organized criminals. In areas terms of goods, locale of action, methods, per·
where they have already been operating but are sons or groups involved, companies being hi· ,
enlarging their sphere of activity the computer jacked, and how the stolen goods are ultimatel)' ,
can be called upon to associate MO's with peo- disposed of.
ple, with types of activities, with areas of opera-
tions, etc. Figllre 10 'which follows depicts a Security
hypothetical file on hijacking. It is designed as
an example of a data base that can be constructed Computer security means, first, protection of
and be made available relatively easily by using the clata file against access by persons who are
the computer. In new areas, the exploration of unauthorized, and second, the protection of tile
a particular function, such as laundries or sales files against destruction and unauthorized il1pu~,
of a new product such as detergents, or of new It presents the same problem as the file drall'fll
acti vities such as penetration of a union or theft in the file room. But the problem is usually
and sale of securities, the data base describing more complicated because of location, and wha1
the functional area of activity can be developed frequently the simultaneous llSC' of the
through programing the structure of new infor- by other clements of the agency. The
mation to be placed in the computer (and the if often further complicated because the
association of pertinent data already in the com- puter may be part of a system which
puter). Subsequently, as names and associations consoles with input and retrieval
and ani vides are reported, they can be tested sited at distant locations. LOCATION
against the organized data in the file. Computer technology has progressed t~ GDS WHEN
Figure 10 attempts to demonstrate the breadth point where it is presently feasible to deSIgn HIJACKED
and depth of information that can and should be computer system so that multiple users call
available to the analyst on an area of organized currently access a common data base. In such
crime. It also shows how, through progTaming, system each individual user can get only
the basic data can be organized. The elements information that he is allowed to see and
shown in capital letters on the first page' of information entering the system is
figure 10 are in a direct sense the totals and sub- from public disclosure. However, the degree
totals. The data from the files when totaled in security will often be a result of the amount
this manner can tell the questioner how much of funds available. The system designe.rs
a particular class of materials has been hijacked determine the value of the inforll1atlon .
in a particular period, "where, by what group (if desiQ"n safeo'uards that are commensurate
o 0 I .
known), what was the modus operandi llsed, the that value. In the paragTaphs that folo\l,

118

110
~. . . . ""$! 7T2" ?""ft:- .......... :=n~rr:,..~"t
,~~

_. - ---'~'-- ---------------- \
r
FIGURE 19 (continued)

l
:===;N~~lvin~address,PhOnenUl'1ber
- V~::~
weight per pac~age'tolal shipment
r-::
::;I
" - _---
.""
ValUe per Uniliotal shipment
~~,'
Name of perSall "'~"." ..
receiving,end
responsible ,,",""
Name. of sending firl'11address hOrle nuOllJer

WR--.n~I~
1-- __----------------------------~---'
...
Type securities marie of company. denominations \

~ ~ "~,, ."."'.~"'.".' .""~ '"


j"~".,.",.~
_u _

\,,~" ,,"'" ,,, ..,,,,,m".""'"'


~,,~.~ "'""'"
Name of receiving :irm'addresslphOne number

Form in which shipped


Weight per unitltOtal shipment
How packaged!weight per package

~ ",,,,,, "'" ''''~''


Name of person responsible sendmg end
Name of person responsible receiving end
Name of sending (irl'11address'phone number
Name of receiving firmladdressfphone number

Form in which shipped nl


Weight per unitltotal shipme
HoW packagedlv:eight per packageltolal weight

-."""""'~"- "~,,
"~"."" ~""
"","'''''~"'"' ,..
1 SO< '" ,,",," " .,,"
/ r'" Name of .,,,, .., " ..,"'
sending firmIaddresslpho ne, number
..
Name of receiving firm/address/phOne number

Type clothing
HoW packaged/weight per paCkage/total weight
Value per packageltolal shipment
Na me of person responsible sending end
Name of person responsible receiving end

=
Name of sending firm/address/phone number
Name 01 receiving firm/address/phone number
~
Brand of ciglreUeS
State tax slamp affixed
Worth of total shipment
Name of person responsible sending end
Name of person responsible receiving end
Name of company sendingladdress/phOne number

=
Name of receiving firmIaddress/phO ne number

Serial numbers
Brand or company name of goods
What type 01 product
How packaged/weight per package/weight 1)f shipment
Value per package/tolal shipment
Name of person responsible sending end
Name of person responsible receiving end
Name of sending firm/address/phone number
Name of receiving firm/address/phone number

,--..o"".=e;=,,",-d'i"T ?ODcP·m"&t% W'" rn~~

FIGURE 19 (continued)
Headquarters (address/phone numberl
,,,",vIC Of any) Area of operations
Members Inames)
l----------1
Persona/ information
Bought information Ina me of perDn)
HOW GA /N KNOWLEDGE Group member in company (name of person)
SH/PMENT External surveillance Truck captured-stopped at signal
~ -stopped on highway
~L _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _--l -stopped at reslaurant
~ -sfopped at gas stat.

~ HI lACK SCENE/RIlIl DING l


-after chase
Truck Iaken-emptied later
Truck emptied where captured
Type truck/car used by criminals
I
Driver-Iaken/released laler
-boundlleft where truck taken
-beaten
Entered with k~y -shot
Entered through window -unharmed
Entered through doorlbroke lock
Goods removed from crates
Goods Iaken in crates
Through fence:~~~ ~~~d before
:aken aparUsold by componenls
' - - - - - - - - - - - - - - - - - - - - - - - ; . Goods sold as stolen
Goods disposed through oullet
I
associated with group !store)
When
Where
Truck company Inameladdress/phone number)
Shipping company Inameladdresslphone numberJ
Driverlname . ----1 When I
I When
--------------------'"""'1 Where
Railroad company
Shipping company Inameladdresslphone no.)
Where
Typelowner warehouse-airline
-freight forwarder
-Post oflice
'Cusloms
-other
Shipping company Inameladdresslphone
_ _-'-_ _
nber)
nUl _ .-l
When
Where
.. Pier num~er/name
Steamship line
I When Shipping company Inamefaddresslphone no. I
Where
Warehouse companylnameladdressfphone no)
Shipping company )name/addresslphone numb." When
.....______________________-1 Armored Where car company (name/addressl ph no)

I)ypen Dri.ver/other personnel Iname~l


ShIpping company Inameladdresslphone no. I

,......
Kl
.-
. . . 'ffr :r" hI lilli'll'"

... jlkratioll i~ g;i\'l'1l to the variotls areas the system puter room personnel, there are several areas to
dl',i~I!{'l'i ~hCltljd (()t1,>ider in developing' security be watched. A dishonest systems analyst can :'
Ill1 ;I parti( ulal «()mpute)' imla!1ation, modify the software to enable specific users 10 ~
program around security measures. A dishonest!
l'itYlil (1/ Jil('

I
computer operator can copy a tape or reprint a ;
'r hI' computer facility should be physically listing. A bribed maintenance man can change i
1'1 ot('( tcd from ill Lrudt'rs. This may involve no the logic of the hardware so that a certain;
IlIOll: thall a guard at the door; it can also involve seq lienee of instructions will bypass the hard, ; Appel!dh: C
~ll,lHl .. aud douhle·locKing doors with a TV ware protection. All of these types of security·
(,111)('1<1 in betweeIl. In the latter system the' violations are diflicult if not impossible to dis, :
P('I.,UlI., ck.,iring ('ntrallce tnT held hetw('<'11 two (,O\'Cl', The best way to foil the dishonest: SAMPLE DEBRIEF FORM
lo( heel d(}CH''> while they are iclentifi('d by means ('rnployee is to carefully review all system AND LIST
III n'( !Jl-!,lIiLioll mel' tilt' TV circuit. Tht' ('om·
I'lltel .,houle! also he located helow the ground
modifications after they are performed and til
insist that the employees work in pairs,
OF SELECTED SPECIFIC
fI()l)l. This ,dll pn'\'(,lH unauthorizcd per· QUESTIONS
~IIIlS 1lOW ('ntering thloUgh windows anel will Secllrity of the information i?l 111(' com/mifT
data ballhs INTELLIG.ENCE
<tho help .1IIeyiat(' electromagnetic radiation T --" ---~---~- . . ... ' REPOR T -DEnRrEl~
problems. Security of the computer's clata bank and of. Name of debriefer - -.
its operation is a complex matter and should bt Name of officer ,--. .." Date and time
1'1'1.1 (} lIN /'/
thl' suhjcct on which help is sOllght from experts, R other perSI)!} debriefed
01
\11 PCI'>oJlilcl aWl( iated "'jth the operation The problems lllultiply in circllmstances where cason for debriefing
;lI1d 11Iainlcll<lI}((' of the ('omputer facility should
Ill' iml'~tigal('ll. Ideally tltis will ha\'e already
the intelligence lInit is sharing a computer with.
another clement of its agency or another element'
GeneraJ questions t b··· ..... - I
o e answered:
1>1'('1\ dOlle [or allY illt ell igent (' uni l persllnnel of the government of the jurisdiction in which VVllere did the event OCCur?
i\l\()l\vd, Sill('(' jt will prohably not be possibk it is located, These are also increased where
'When did tl
In gin' ;d J }>cl's(Jllllcl the rig()rous check that the decision is made to giV(~ outslation terminals Ie event Occur? Date
il1ll'lligt'IH'(' oflicc}'s H'(T;\(', it is e~sl'ntial that right to inpllt and to request data directly vVeather Conditions ('f ' .... Time
the unit !la\(' its OW1\ P(,l's()l1lll'1 in the radlity at the data hank. 1 ImpOrtallt)
vVhat was
;tli lilll('" to )llOtl'ct it'> rilc~ ('rom possible llli'>l1s('s The cost of security should he taken < apparent cause of the eV('Ilt?

hv Ill1alltl\ori/l'd }>('r~()ns. IIm\'e\'('l', if it is iJ1l- account whcn studies are first being
po~~ihk til hil\,(' intelligellce jlers()lln('\ in the whethel" the unit is to switch to the co
lllllljllltl'l LHilit\' at ail lilllt's (that is all times Costs will be involved in developing
Who was involv~(i'l~n··t·l ..
1e event?
\l'hl'l1 it is ill Iljln,1l iOll) thell ~'\t'r)' t'fJ'ort should programs, initially to control the input and
he H'lde til hall' int{'lIige}l! (' tapes and disks put procedures including necessary ('ontrol .
IOlhed lip, I'hh i .. pll'isihlt' illll<'St' fi!l's arc not For permitting entry into the data bank. and
tll be (J{ll'l<ltcd oil an lIll·lill(' basis,
With l(,:-'P('( t to w('ttrity problems with W\11·
(,Oil) puter time as they cheCK on the f

of the security l)]'ooTams durilllY\\ Oflerations,


\Vere there m;y t~~llsllal ci"
t'J .- "-, _"_ l( lI111stal1('es (,Ol1ll('cled T\.!'tll t1 .
-- " , Ie e\'('JUt
~ific Questions T
o Be Answered
i Tlte qtl ' '
e:SHOllS asked "1 •
.Illeel'em for e Vr
.l/C atlllg to the specifics
lit, • ....<unp C the 1
:, lIere a hijackino' or I m~l us operandi
:tcted to O'ain' ~ oan !lharkll1g', should b('
'ori r! (') Ing all knowledo' I '
flee perceived ,./ ' be t le person
~\I'S about f' at tIe trme of the event ( , SUGGEST.ED SPE ' .
lll
\lier ShOlllc! IJC)lr other experiences). TIle (1Cell BY ., . CIFle QUI~STIONS
~b ep'u'e /' " . , CRJi\flNAL ACTIVIT\,
;. efore he ll1eet~ .? I 1st of q llestiol)s to this (.Ol'l'ItjJtiol/
',lied, An il.1t"111' ," It 1 the person to be de- I t\re
't! f "oence' ilWilJ'(' of tl ' .
;' 0 standardizecI ~mlt can de\'(>lop a '.. you
ofTenng of atl'.' "l"lt ' , Je .. II ('Ptdll(, (It Ill!'
.:c !Times "cll' . questlOns reJating' to 51)e. , 6 < lI11lt'S or Inil "1' .'
, l
'(es' ,,, Clno' to tl •. 11l1pro]J<'l" S(~ITj('(', • . . 1 )l.' ClJ II/(,oal or
I' ltve debriefino~' I' lem as events and
'.!ached, b lJl( lcate, tl
• ~ 1 Clll ('red by: ....
r 'Ill' ell. I'Ol'(,(,lll('llt (,iIi( .('ls
a1easeri f ' • . H

es 0 questIons that indicate b, Attol'llcys


1'1'1
r. Other pllblic officials

12'~
,f
l

2. Do you know of any prosecutions being


4. The names of those people operating the t Labor
17. Nonworkincr 1"
"fixed" or dropped due to illegal agreements or book. r The followit1O' O'
are areas to be I sonnel on eml)lo b, ane no-show" union l)er-
5. Do you know of any persons engaging ill ~ may develol) inforlilat' , IOn 0 £ tl exp
. I ored
. which 18 U . yer s payroll;
activities by involved officials? or the methods used to transfer monies to a bank i Taft-Hartley Act, the Lab Ie, VlO atlOns of the , . 1110n control f
3. Have you ever observed a public official in companies SUO" . 0 COntract awards to
or drop point? ; closure Act, the vVelfare and or-Management Dis-
Pen' P
,
arrangements;
ogestlve of . II .
co USlve bidding
the company of a known racketeer? 6. Do you know the location of the bank (be !, as well as the Hobbs Act: SlOn Ian Act,
4. Do you knew or any places that are hang- specific including a description of the physical) 19 .. Inducing emplo e'
1. Employer or em I contnblltions' Y IS to make l)Olitical
outs for known racketeers which are regularly
layout, lookouts if any, and methods of entry): ments to union offi . IP oyer-representative I)ay C) ,
CIa s· ' -

, ~O. Union contributions


frequented by public officials or police officers? 7. Do you know the number or types of 2. Withholdino'
. elu 'f'
es 10m pay 0' I Fecleral office; to candidates for
5. Do you know any payoff men? vehicles used in these operations? an d remIttance to
0
. 1 emp oyees
6. Who handles payoffs for: . . a unIOn witl 21 . QuestlOl1able
. loans ma 1 I .
a.
Gambling
8. Do you participate in any type of gambling! alit IlOrlZatlon from
9. Could you introduce an undercover agent(
I
3. Employer ])ayem p oyees concerned;
'lOll t written an~l pension trusts t .)r
' (.e unIOn welfare
, ment of due f 22. Evidence of (k) .s,lklsbPect lllItlates;
b.
Prostitution 10. Do you have any knowledge relating to assets, that is due s Tom his own 1 [ IC' aeks on I
, ' s not checked If' £ 1 Ients rom union 'ivelf ' ' . nan arrano'e-
c.Narcotics the transportation of gambling paraphernalia) P1oyee s wag'es subJ'ect t .' 0 rom em- C) 3 I ill e and l ' t'J
4 ~ 0 wntte I -:. mproper diversion ( )CnSIOI) plans:
d.
Court Fixes (as bet pads, tip sheets, almanacs) .. Union officials with clir n au.t lOrization; U1110n funds; or embezzlement of
7. Do you know any hoodlums or racketeers 11. Do you know how the paraphernalia is ests In companies e I . ect or 11ldclen inter-
who contribute to political campaigns? shipped and hom where? union or in compo 1:1P OYl~g members of that 24. Application of force 0' " \
. allIes whIch d b ' ( threat of such acr'>' .' 1, 10Ience or the
12. Do you know of any wagering business I e limon; 0 USll1ess with tl ' ( ",nlnst unIOn 111 b
a. vVho, when and how much h lem of any of their ri 'I em ers to deprive
which makes use of a ''lire communication facil· 25. Use f . I g lts as members'
ity including telephones? If so, were any 5. Employers mak'
ffi . I ' lI1g
, o VlO ence or th" .'
Fireal'Hl8 violations o cia s of articles 1 purchases fTom union ers or firms beino' '" . leats agamst employ-
1. Do you have any information regarding these communications interstate in nature? prices; ane commodities at inflated , 0 Olgclnlzed to "
01 to enforce improper t gam a con tract
13. Do you know any layoff men or set
racketeers or hoodums who are known to travel .111 26. Evidence of f I 'fien~s;
with a gun on thEir person or in their luggage? ;j'("ch;ng
•• • 6.eUnion
Irms ' some , afIl'1'1110'
officials to enEorce contract fi a S1 led m£or .
H With em 0 g mancial reports" matIOn regarcl-
2. Do you have any information regarding the 1. Do you have any information about 7. Failure of P ,oyers; unions and welfare le(lluec~ to be submitted by

I
collection of guns by hoodlums and racketeers- hijacking operation? . .
gnevances of tl . llnIOn offic'Ia Is to process 27. Frequent ch anc,yens lOn plans;
a' anOIllo' of ca .
any machine guns? 2 . Do you know 0 f any the fts from elllployers; lelr memb ers agamst . certain ,ncc III connection '~itl~c. rners of insur-
3. Do you have any information regarding or interstate shipments? plans, SU!2"g'estive of k' kb penSIOns or welfare
3. 1£ so: 8. Failure of unions t - • • • ~c IC' ack
any racketeers traveling out of State to purchase efforts relative to so 0 pUIsue organizational mItIaI premiums. ,( arrangements on
guns? l.O. When did these thefts occur? L is generall
Illat ,me, ' em])1 oyers in an indust '
4. Do you know of any racketeers traveling b. From where was the merchandise n U . Y Olganlzecl; 1y Legitimate business
;/. 111011 ffi . 1
on hunting or vacation trips where they are
ersl~o ]~? .Iess than union sca7~". certall1 employ-
(Acquire the name of the 0 lCIa S permitti cr . I. Do you have any kn( ,I '
armed? If so, who, when, where and so forth. warehouse or platform where the Il~m or racketeer inI . ?'il edge of any hood-
5. Do you know anyone who keeps or stores may have occurred) . 1110n officials pen ',' ' a eg'ltunate business either'
weapons for the orgallization or its members? c. vVho are the persons responsible ers to llse less than the rll1tt~ng certain employ- a. Owning tl b .
b 0 . le USl11ess directly
.
the theft? (Complete description on the job; eqUlred working force . man
Wllmg the busine ss t'I1TOllgh a "front"
Gam 11 ling · Ies d'
ve 1llC rIven) I\. Union 0 ffi' lClals permittiI cr
1, Do you know of anyone engaging in: d. From what type of vehicle are employees in otlleI' I the'employers to
t 1<1n 10 c. In partnershil)
, l ~'f
. -openly or hidden
occurring? lr Own craft (. ana o'll10' the b .
1
a. Off-track betting (bookmaking) e. 0 "'. 0 llSlness
1) Trains
, KnOWll
. ,SSOCIatlon
a ' . o f ' . peratm oo' the b USlness
.
/J. Numbers or policy ((2) Trucks I11divic1uals; wuon offiCIals with
c. Sporting events gambling ~. "Vhat specific busines "
d. In-house games of chance (this is in- (3) Aircraft 13. Direct or'll1cllrect. I "
J, v\That are tl S 01 busll1esses?
· dnrprll.llI'rrPl control f 4 A Ie ocatIOns of til b'
tended for information and refers to 4. "Where is stolen merchanc1ise emgb 14 or suspect person; 0 unions by . re any of these b ,.' ese llSIllesses?
barbuti, dice or poker games that are form of illeo'al 't" USlllesses fronts for '~(jlue
(Get as complete a description of the " Shakedown of u . r: 0'. ac IVlty? . ,
being; cut by the operator [or profit) Jayollt
, (as I)Ossl'ble)
, , I' fOl' JO . b placement. 1110n member' b y ll1110n. ,). ApproXlluatel Y 1
Do you know where one can: .... 5. How is the merchandise sold or ( 1 co Ilection of " 1
!l, errsl " . each of the business ,~lOw many employees in
oE? fees by union l' ~ nes, m.ltlation fees or 6 A
.
' es.
re ally of the em I
a. Place a bet Through a fence Workers wI epIeSentatlves from tran- racketeers? p oyecs hoodlums or
~lie
(I..
O
I). Buya number b. Direct to friends and associates or only t: may l:Ot be members of 7. Do you know of an 1
that. are on the payrol'ls ~. lOodlums or racketeers
c. Buy a gambling ticket on a sporting c. Shipped out for disposal elsewhere mporanly associated with the
event speCIfic business? vho do not work in the
6. Do you know the 10cation of any fictitious employees
:tDo you know the location of any book-
goods either being stored or already soW
on 8. Do you know of
making' operation? occurring' within .' . ally tax viola tions
a pen ticular business:
12·1
125
i
{
t
a. Not declaring all income 3. What makes you believe that this ~ a. Hand to hand
lJ. Failure to pay proper revenues for individual is a member?
4. Identify:
i b. Use of a front man
5. Do you know the .
employees t c. Use of the tele ho e I.n pr~ces of the various
c, Writing off personal expenditures as
a. Occu pation
~d. Subject acts as ~ m ?d d 1 the transaction
types of POrnograph'
6 Wh' IC materral?
Wh eman . ere IS the porno h'
business expenses
b. Residence *..
t Q
; ,
at out-of-town
I
.
aSSOCIates d oes t h e sub- factured? grap lC material manu-
H. Do you know of any falsification of other ~ Ject have? '
c. Businesses
required reports to Federal, State, or local f
lD. Who is the sub 'ect'
7. What is the locati
case of films? ' on of the studios in the
go\'ernmellts~
d. Criminal specialities
t 11. Does subject ha~e s SOu~ce of SUpply?
e. FamiHal connections I 12. Where does sLlb'Ject anYkPnor arrests?
{/. Aunual reports f. Criminal associates ,. eep 1 . a. A professional studio d .
I ! lIarcotICS? 11S SUpply of b. Someone's home unng off hours
h. Corpora tion re ports g. Police and public official connections I

I 10. Do you know of anyone who has effected 5. Describe his organizational activities. i
I
IS. Obtain from the s
I ' to Subject's d Ouree c. Othe~ types of buildinO's I
: reative ' . any info Imation
- .
rl. LOCatIOns f b f
or tried to effect the operation of any business 6. Does he have an in-State or an out-of. i d
; ence, te Iephone numbescnption, I veh' I
C e, resi- 8. At what tim orf,olutdoo r shooting
through the use of force, violence, robbery or State residence? ; 14 A er, etc 1 ' e 0 t le day or . 1
. re you aware of an . P 10tographing' take I ? lllg It does the I
extortion or threatened use thereof?
a. How often does he use it? cal profession, dOctors 0 ll~e~be~'s the medi- 9 T'VI ' P ace
. v lat are the t
11. Do you know of any business establish- f
ments requiring a liquor license being operated
a. What means of travel does he ordinarily Ihe distribution of narcorti' ,
rugglSj ts, 'lI1volved in
cs or C rugs.1
equipment llsed? ypes of cameras or other
use? 10. Who are the models
lly a frollt man and owned by a racketeer? (1) In-town ; POl'llography graphic films? (get 'fi Who pose for porno- f
12. Do you know of any mob-connected
(2) In-State and ont-oE-State t 1. Do you have an . f age, address and veh~Plecl cs as to description
taverns which tic-quiTe their liquor supplies from Y 111 ormation a b out the -1 ' lC es used) ,
other than State licensed outlets?
(3) Does he use a travel agency !I manufacture, distribution 1 . Do you know of an _
(4) Does he visit Canada (give details) i nographic material: ' or sale of any por- pornographic material? y 1 egular Customers of
UL Do you know of any business being oper-
7. Does he own an airplane or a boat? !~ 12. Could you make
I
ated by a hoodlum or racketeer that was acquired
through loan shark payments?
8. Does he have connections with out-of-State I
a. Motion picture films
~ b. Photographs
graphic material or ~ ~ purchase of porno-
or out-of-country members of the organization iN c B k future sales? cquire samples as if for
ILL Do you know the source of supplies
and services for racketeer owned or operated
or any other criminals? ,~• . mOOt s: I pamphlets, or other print d
Prostitution
a eria e
busincsses? . &\ 2. 'Where is thi .
j\iurder , ~ 3, What f s m~te:Ial kept or stored? 1. Do you know the locat'
I.OIIIl s/wrh i IIg ., orm of dlstnbut' . prostitution? Ion of any houses of
I. Do you have any knowledge about any', ,a 'Th Ion IS used:
I. Do you know of anyone involved in loan murders being' investigated? ~ b: Th~o~g~l frOl:ltS (as retail outlets) a. Who is the madame?
sharkillg, either as a lender or a victim?
~. II'so, obtain:
2. Do you know of any deaths that appear· c St. . .. mall
.
aCCidental or natural, but were not? lWh
' leet men ~. .
W
How
I?any girls are in the hOuse?
hat IS the cost?
f/, ,\Tho is the loan shark :L Do you have any information about ~ ~~rlbutio~
missing persons who may be dead? ,."
:Ie
:r peop~e lvho handle sale and
he
P nograpluc material?
:. Do you know any pimps?
. Have you ever .
fl. \\'ho does he work for? prostitutes for b ' acqUIred the services of
4. Who are the musclemen? ~
c, \\'ho is the victim?
f usmess purposes?

I
5. "Vho are the enforcers or hit men?
tI. \ Vho makes collections? (when, where
G. Who do they work for?,~
and how)
e. \Vhat is the amount of the loan?
Narcotics ,
f. What is the rate of interest?
g. I la\'e there been any threats of force used 1. Are you aware of any information r,e1ating,

h.
01' implied, by whom?
Obtain the background of suspects, their
\'chicles, anel so forth.
to heroin, cocaine, marihuana, barbItllateS,~
amphetamines, or bal1ucigens?
2. Does the subject sell, use, or both?
If'.:
f:
I
.!l. What quantity is sol~: !Glos, nickel orl~

I
/, Do you know of any musclemen or
collectors for loan sharks? " clime bags, or the number of pIlls: . Ii
4. 'What is the price charged per umt? , ct'!~
.H IIli II-e {J,Wl X OS/1'Il S)I II d i til tc 5. Have you ever purchased from the suuJe %~
l. Are you familiar with an organization G. Could you introduce an undercover agenI~
known as the j\l((/i.a or the COS{( Nos/m or the
,)'ym/icale?
to the subject? .
7. ""'lith whom is the subject assocIated? J~
I /
2. Do you kl10W anyone who you believe is a ~. 'What is the subject's answer of sale aniJ
member? delivery? li
12G
I
------------........J
I
I
127 !
priate, should be assigned (a.) Newspapers
. and a1"t:lC Ies .
III
to ~ote any activity around Journals
f . should be exa . d
. < mme
resIde.nces and businesses 01' mformation on actions of
of maJor crimina Is in their members . of Olgamzed
"" . crime
area. b. oth. d'm and. out of tlIe agency's
(ii) They should report their Juns IctIOn.
fin~mgs on a special in- (i) Articles from newspapers
tellIgence report form. and
b I'other periodI'c a Iscan
Appendix D
(See Intelligence Manual e c Ipped, filed, and cross-
p. 17 for saml)le form.)' , referenced, either by a
GUIDELINES: OPERATION OF AN , ,a lep-
(iii) When al)l)rol)riate .
relsl~ntative from the in-
member of the intelli-
gence unit or a clipping
te Igence unit should service.
INTELLIGENCE UNIT request specific help from (ii) ~bstracting articl es and
[ other elements of agency Journals should be consid-
intelligence unit are an effecthe! an d where indicated the ered as an alternative
overt collection source. personnel directly in- method.
1. THE INTELLIGENCE PROCESS
(a) The investigator develops vo!ved should be de- (b) Public records . . and d ocurnents)
indications ot criminal bnefed. (See appendix C sue I1 as. tnal
. records ' g·ralld
' .
Jury
Theintdligence in"ocess is a continuous series
contained in information of lthe Intelligence Man- commISSIOn
" . hearings "and I n. -
of interrelated activities directed toward convert- ua for sample debri E
lee ted Erom one or more vestIgatIVe hearing"s b
ing raw in [ormation into informed judgments. form.) e and f d I Y state
eral sources. , ·e era legislators, are ex-
The prod uets of each step in the process-collec-
(b) He checks the validity of (vi) All intelligence reports cellent sources of d a t a, t1lOugh
tion of information, evaluation, collation, analy-n
ports obtained from in from other elements of usually they provide indicators
sis, reporting, dissemination, and reevaluat.io rather'd than hard int eII'Igence
(c) He works with the analyst the agency should b
-are essential ing,Tedients of: the end product, routed directly to th . e or eVI entiary material
sharpen the target as the I' e m-
the intelligence report. vestigation progresses from. te IIge~ce unit, al though (c) Financial
b d' centers-Io ca l' stores.
"looking into the situation," . supervIsors should be in- on mg houses, banks, insur~
A. Collection of information
the compilation of a study formed. ~:~ ~ompanies, telephone
1. Collection of information must be care- pames-can form all .
depth, to a gathering of (v) TIIe mtelligence
. unit form II y or In-
fully planned.
dencc. ~hould press for time But a .y provid~ useful leads.
a. The collection effort by the intelligence pnvacy conSIderations and
(d) Throughout the m ~he various training
unit should be directed against a spe- state and local laws must be
he should promptly record COUIses to describe th
cific target. role o.f'mte 11'Igence againste kept'
" In.mIn. . d (See appendix A
fll1dings on suiwble
/J. The collection system with the best orgamzed crime. IntellIgence and the Law" in
chance of success should be given the (orms. the Inte~ligence Manual.) ,
(2) Illformation from 1I0n (3) Information
lions from other Junsc.. . l'zc-
primary responsibility for the task. (d) Complamts. Information is
units of the law enforcement
c. Collection efforts must be coordi- t often .revealed by a citizen vol-
(a) The agency head mns (a) Because organized
" cr'Ime 0 f ten
untanly, but his report should
nated so as to avoid duplication. that any information reI operates beyond the city limits,
(l. Collection should be directed at gaps ?e ca~efully checked out by the
to organized crin: e, the agency head should Of intellIgence unit before 't .
in the information; there is no need to sib I . ,1 pos-
gambling, narco tlCS , le, establIsh
" relatI'ons .h accepted. I IS
tion, usury, be pass,~d on to
,WIt
prove a fact more than once. aut 10ntIe.s in surrounding sub-
\ c. Collection progress should be reviewed
by the analyst at different phases of the
intelligence unit.
(b) All elements or law
IJ) urbs ~nd m neighboring cities.
b. .Covert
f collectio
. ··h
n IS
m ormatIOn from a sub'
aware h . b'
...
t e acqulSltIOn
.
of
Ject who IS un-
( App.omtment of a liaison offi- e IS emg observed or
investigation effort. In the early stages ment agencies- _.....,,'''"'". heard I t ' over-
cer .IS. frequently useful in ex-
information can be general and indka- trol cars, detectives, .
pedltmg and controlling the pr~se~utio:1 u~f ISI:~~ee~~ial [if succes~fuI
tive: in the latter stages precise evi- sergeants, etc._should be crim' b 0 orgal11zed
. t to the transmission
. of dat
,a b etween • ~ IS to e achieved, but it is expen
dence is needed. courao·ec
o 1 to lepor . 'ty c1Ifferen t agencies. sIve In terms o f manpower. -
te11i a ence unit any actlVI
The means of collecting information may o .' e (4) Information f rom sources other (1) Physical
f su rvez,'11 ance-observation
<)
relates to orga11l zecl cn11l . til I
be overt or covert. an aw enforcement agencies o movements of suspects without
(i) Patrol units, ",here
n.. Overt collection
(1) The i1!"uestigators assigned to the 129
,~

)
involved must be carefully con-
is most effective I 'tical body which pro·l sidered. matic data processing may be essential for
po 1 , 'h'
their knowledge- 1ement to other, Vides the agency Wit r larger agencies (see appendix B).
when used as a supp 11 . n AI- funds. 1 B. Evaluation of intelligence inputs is an essen-
r covert co ectlO . , t . D. AnalysiS-is at the heart of the intelligence
types 0 . I survei11allce can (ii) Safeguards agams miSUse Ii, tial part of the production of intelligence.
system.
though physlca. on a suspect's of the funds, such as reo ; I
lead to informatIOn . 'ts and I. The validity of any report must be judged
} lacfs he V1S1 , celp. ts , or the presence . of (
h' 1. The analyst must first assem1ble data, often
by the commander on the basis of the

I
associates, t le JP. . not necessarily observer dunng t e i scattered and incomplete, on the area un-
J 's actI'vl'ties, t 11S IS . . g an . hIy de·'' reliability of the reporter, as well as the
,11 c . f determmm transaction, are h.lg der investigation.
a useful techmque or t's move- substantive credibility of the report.
. 'ble', if the mformer
sna , .
of a suspec
2. The commander (or his designated sub- 2. From these facts he attempts to develop a
the purposes . s he is discuss- will not agree, the nsks of
ments and the topIC ordinate) should: logical pattern Or an hypothesis explaining
ignoring safegua~ds must the operation or activity under study.
ing. 'Il ce _ where, be weighed agamst ~he a, Seek to verify facts in the report by
(2) Eleclmnic survet an . surveil- The commander of the intelligence unit
J
val ue of the informatIOn comparing them with other informa-
I I the use of electrOnic. 11' tion. reviews the hypothesii>. He may have to
ega,. bles an mte 1- likely to be obtained. . require further col1ection, or decide the
I deVices ena f
ance . . ' e evidence 0 a ( ) "Managelnent" of informers.IS b. Decide which leads in a report should hypothesis doesn't stand up or to waitt for
ence umt to acqUlr rime
~irect relationship between a C
c an 1'mI)ortant aspect. of an m.. be followed up. further development.
leader and an illegal act. te11igence unit's ~utles. c. Grade the worth of the reporter.
3. A close working relationship should be
(( '), Ol'ganized cnme. leaders are (i) It is insl:~.Glent ~hat . d. Before it is filed, mark on each report maintained between the analyst and in-
C I . t'
• C
becoming •
increclsmg I y sop us. l- the indlvldual 1 . his eval uation of the reliability of both vestigator so that the investigator can con-
. 'd Methods and eqtup- tor know the identity its substance and the reporter so that tribute his skills to the collection of
cate . 1 d to these "1 . s" informer. A more it can be of use for future reference.
ment must be ac opte
new circumstances. sy:~ematic and desirable specific information needed by the analyst.
approach is the C. Collation. Collation must be thought of as E. The end product of the intelligence process
. 1 athered should more than tlle simple storage of materials in
(h) The matena g' refer- ment of a central is a finished rejJort. It may be prepared in
I care fully l)rocessed, p files. It includes the sifting out of useless or written or oral form. It may be quite brief,
)e, . d per- of the names of
ably by specially trame irrelevant or incorrect information, the or-
ers, handled with d' the for example, a summary of the suspicious
sonne!. d most security an 111 derly arrangement of collected materials so activities of a tavern owner to be given to the
~eads and indications ~ey~n more than one officer that relationships between apparently dis- precinct commander where the tavern is
(c) nder investigatIOn connected data may be established, and a
the case U I this eval uate the worth oE located. It may be quite complex; i.e. a col-
should be exploited, w lere system for rapid retrieval of stored informa- lection of documents prepared specifically for
informer. tion created.
. legally defensible. . the highest consumer, the agency head or the
IS, • of e1ec- (ii) Consideration prosecutor.
( d) The actual operatIOn 1 given to u . l. A filing system should provide for the
' tronic surve1'11 anc e 0o'ear turnec
formers by a J quick retrieval of information on anyone '1. The report must be tailored to the needs
over to experts, .' feedback of ->n'rm'",IU'''''' human subject or on a general area of of its principal recipients, the head of the
(,'~) informers, .Incl'1V1. d lI,'tIs outSide
" . n who me anl1
. f the 'I- which ,viII hell? t!lei11
be promoted wltlll.n
criminal activity or on illicit businesses,
phone numbers, licenses, etc. An exten-
agency or the prosecutor, or the enforce-
ment elements of the agency.
I
\ police orgal1lzatlO . 'anized
. . vith the operatIOns of org
la~ ,
CrIme, ' are
() f information.
often

formel. rqtll'n:s
'f'orrnel,
a valuable

' ,
(a) Effective explOitatlOn 0 , in- '
e . that the I .
' be convinced thatI us
f
source

an
.

.
m-
criminal
This obviously IS a

dangerous.
(4) Unde1'cover agen, is are law
t officers who lIsua y
11
.

which is both difficult


sive system of cross-reference and cross-
indexing should be set up to allow
pertinent material to be referred to under
more than one category.
~. A COding system for filing should be
2. It must be objective and dispassionately
presented so that the decisio~lmaker ~an
act on the basis of accurate 111format1On
and sound analysis.
3. It must be structured so that the findings
I
I
adopted. A code, using colors, numbers, are described logically and concisely.
h ao'ency a ways1
. tee"" clandestinely on t Ile frino'es
men

I
1 contact m 1)
and letters either alone or in combination,
I
deals with him honestly al~C O;g'anized criminal group. t 4. It must clearly separate positive informa-
can be set up to designate functional and
discreetly. ' T be effectl\e . t Ie 'lgen tion from hypotheses and inferences.
1 ( activity files. It can then be used to incli-
(a) 0 f cIs immediately
I'loney, the usual payoff de- have un .' p cate on a multisubject report how its sub- F. Dissemination of the intelligence report
(I!) l\ f raises bl e for entertallung'd
manelecl by in 'ormers, aing stolen goo d s, (an stance has been filed and/or cross-indexed. should primarily be the responsibility of the
unit head.

I
serious I)l'oblems for many The codes saves time when compared to
gambling, etc. Using full subject titles and referrals.
agencies. , 1. The head of the agency must receive an
be more
'(.) A fund for such pm poses (IJ) He also can d but the 3. The use of mechanical aids, such as auto- intellio'ence report directly (or at least in-
I must' he d apprm e by the if wired for so un , tact) t~ insure that he is fully informed
I

131
amine-at the agency be received at a central point and logged
contained in the re- a. It should ex, maJ' or pending enforce, as a matter of course. 2. The unit cQmmander should have the
and that the .messagde b 011inions of other head's request, responsibility for intra-agency intelligence
. ot dIS torte y d t tactical moves. 3. An information control system must be
port IS n 1 hom it has passe . relations and in this role he should:
men ld ke available to the taco set up to insure the unit of solid profes-
readers throug 1 W .' 1 utside (1) It shou ma 'h a. Ensme that all enforcement elements
.' both mSlde ana 0 ' Jlanners all intellIgence t at sional standards. It must:
2. Other reClrllent~d be selected on the basis tIcal 1 t 'bute to the success of know what the intelligence unit is look-
the agency 5 IOU d the purpose of might con. n a. Route information to analysts within ing for, encourage all elements of the
of their need to know an . the operatIOn. . .. the unit who might find it useful. agency to pass along information and
' terpret the , .1 of
relIabIlIty
the repo~t.. (9) It shou mld b. File documents returned to the analysts provide them with a simple reporting
-es )ecially in trans- - informatIOn . beinO' used by t le tac,
9. Security IS nnporta~t I. or hypo- 0 for storage. system.
.J. , •• mformatlOn tical planners. .
mitting sensItIve . h ld not be the c. Protect sensitive materials from unau- 3, The commander must establish contacts
. I ana 1Yses-but s • ou.• n ropriate It should ap'
thetlca . (3) Wh~re a pp potenti~l value of the: thorized circulation outside the intelli- with those external agencies that may be
decisive factor in dissemmatlo . 1
praIse tIe . gence unit. valuable in terms of exchanging informa-
. . The uOlt . comma nder must planne d e nforcement actlOn. k (1) The section must see that sensitive tion and coordinating strategy.
C Rcevalua/,J.on. .. 1 Jeration oE the . ander should ma 'e aT,
J. • 1 reVlew eac I or . b. The Ul11t com~xploit any intelligence documents go only to appropriate
contmuous Y 1 teet weak pomts recipients and that receipts from III. STAFFING THE INTELLIGENCE
at he can • c e - I lems. rangen:ents to ortunities during the
I)rocess so tl1,
\ ·
before they )ee'ome major pro)
1
t evaluate the qua 1
1. The com~andef musllection system, and
1'ty
collectIOn opp
operation itself.
outside recipients are obtained and
recorded.
UNIT
A. Three criteria should be applied to the selec-
. of the intel1igence unit. (2) It must record evaluative judg-
o[ rep,ortmg,. t Ie ~o in identifying new B. Location . t should be a staff . ments on reports, carry through on
tion of all levels of the staff: integrity, ca-
1 analysIs (partIcular y ,
of criminal operatIOns.
) 1 The intelligence uhnl ld be insulated as .
. .' It s ou 0 0
purging the files of what has proven
pability and personality.

are<ts· . db k from the orgal11ZatlOn. . f day-to,day polIce·. to be fallacious matter. B. The most important personnel selection is
e for fee ac
2. He must arrang tImers on how muc1I as p ossible . rom tick to its inte 11'I. 4, The principal substantive work of the unit that of the unit commander.
agency hea d an.. d other cons' functions so that It can s .
1. He must not only be himself a symbol of
useful the intelhgence 15. ff _ gence mission. 'bI will be done by investigators and analysts;
if the unit is large enough these functions incorruptability; he must also instill in his
tests to measure the e ec 2 The Ul11t ' I>'h OU ld be dirtctly responsl e to •
'\ He must develop. . b'lity to l)roduce can be grouped in sections. unit a sense of pride in the organization'S
' . c the nl1lt-lts a 1 . I . h gency head. 0
integrity.
tiveness Ol ' I',1ient crimma tea , .' ned to con·. a. The analysts and the investigators
l' to detect mc . The unit must be pOSltl~ , 2. He must be able to amalgamate the work
quick ana yses, '. t legitimate bUSl- should be encouraged to work together
operations, to pomt d~u t may be begin-
a. tn'b u te. to the decisionmak1l1g .. of different types of subordinates.
nesses which the syn lca e , b 'I' ties of the head. as a team under the supervision of the
1 I d . must make unit commander. 3. He must have a lively curiosity and imag-
ning to penetrate.
b. The unit coml7an ~~ncy head's I,
b. Where needed, specialists (economists,
ination.
self aware of t le ,~,~ activities and attorneys, sociologists, etc.) should sup- 4. He must have organizational ability.
II THE STRUCTURE N~~ AN and tailor the Ul11.
plement regular personnel.
. INTELLIGENCE U mvn reports accordmgly, 1 C. Ideally the unit should be autonomous, out-
. II' 'ence from t le c. Adequate clerical support should be side the local civil· service system, with full
, o.[ I · unit to ot IIe l' com- c, Finished lI1te Ig 1" tly to the provided.
A Th(' relationslllp t 1e 1 ld be IJassed ( nec hiring and firing powers vested in the agency
,. . f I geney Slon '. "filtering. head.
I)onenls o· t .1e a .. , , law head to aVOld t1~e. intelligence unit command.
' t lIiooence uOlt m , reClplen~s.
1 Traditionally the 1I~ e t') I n looked intermediate l' tely
oI. The unit comm<tnder should: D. Candidates for both analyst and investigator
. 'enetes has )ee t be numec la
enforcement a,g reference point d. The he~d mus 1 of any internal a. Monitor all parts of the intelligence
jobs should be personally interviewed and
'Ieannghouse or , should be given appropriate testing.
upon as a ( , 1 fi Id investigator m directly 111formec d b intellio'ence process.
. '1 f lse to t1e Ie
\ pnman Y O l k This concept
' his casewor .
ruption uncovere y 0
b, Evaluate the products of the teams of E. Analysts can be either nonspecialists or spe-
cleve1opmg lection,
0

d . n favor of a two- cialists.


\ should he abandone 1 "d "strategic analysts and investigators and decide
. I 't that l)rovl es o l e oE the lI1te Ige . 11' nce unit. 1. The nonspecialists (those who prepare re-
clirectLOna Ul1l 0' 1 d or l)rose- C. The slap f 'nte which products should be pushed fur-
"t the aO'ency lea , 1 process o l d ther. ports, make appraisals, develop filing sys-
intelligence a . 1 ? telliO'ence" to th€. 1. Each step m ~dle ed and understo O d tems, etc.) should be selected on the basis
futor and "tactlca 111 0
should be cons 1 er '1 office shoul c. Decide to whom all finished intelli-
field investigator. b rt . 'ty bnt t le gence should be sent-and to whom it of their intelligence, precision, and mo-
distinct actlVI , oth con
. nit should not e a pa so structured that a smOnother is should not be sent. tivation rather than on their experience.
<)
.....The intelhgence
[:nent 11
mec I1a nism', it should o step to a 2. Specialists with advanced training, such as
flow from one d. Regularly report to the agency head on
of the enorcel . 1 However, it can- accountants, lawyers, economists, should
not itself be operatlOna . d apart and aside tained. all intelligence developments in orga-
ld not stan ( , nized crime. be used to meet specific needs, temporarily
not an(1 sI10 Il 'b'lity 2. Incoming information
or on a long-term basis.
[1'0111 enforcement responsl 1 •

133
F. Investigators normal1y should be transferred They should be made aware that a good a. The
normal Use f '
into the unit from the detective branch. observer and a good reporter can be in. policymakers. 0 ll1telligence by
1. They should be experienced. valuable source of information. a. Entranc3 to tl
b. The method o1 . 11' Ie area oC(' .
3. Several hours or the training program telligence pro ogy employed in the in- ll1te 19-ence . , . upled by tIle
2. They must be able
to work in harness with I cess and . . - llllIt mUst b
the analyst-even to the extent of inter- should be devoted to the matter of orga. atest analytical . partIcularly the Its own or approved e n,'stricted to
~ize~ crime-its compJexity and its sophis- c. Th techl1lques. (1) Barri personnel.
changing some functions. e responsibiIit . , ers mUst b
tlcatlOn. screen all el t e established to
3. They must be able to accept direction but level for qualit y of the command 9)
(~ At niO'ht if 1 rants /
also be capable of taking initiative. 4. The patrolman should be instructed on products for pol! Control of finished .
3 0 I - -cymakers 0, no one is
,,,,here and how he can gain access of the
1. They must be factually accurate in report-
ing, and in addition capable of analysis
intelligence unit.
. t leI' themes m '
a N ay ll1cJude
. .e w developments i .
.
. b. Files c
electronic or In./
t
em should b ' ec latllC<l1
. on duty, an

' . e 111 Operation.


.',al',mu sys- I
I
and interpretation. 5. A lecture should be given on the policy. : l1lques. n CollectIon tech- ontaU11l1g ..
making function of the agency head and. shOuld be placed' senSitlVe material
h. Managing the intelIi . preferabl . 1~1 a separate area d
G. Special problems may accompany the man- how this relates to intelligence. c. COUrt de . . gence process y, stored 111 CI f an ,
agement of intelligence personnel. can be kept in d' (sac. Other files
tions C1Slons and intelliO'ence 11' •• tlere
l 'IS no problor l11ary iii'lIlg cases if
B. Intelligence training programs for the intelli·: • 0 1l11ta- .
1. In some ju risdictions because of the pres-
ence of both "badged" officers and civil-
ians in the same office, the commander
Illust work out special arrangements to
gence officer.
1. The primary emphasis in this
should be placed on analytic techniques. :
4. The tech .
l1lques used' h
sh~U~d be carefulI sll~ t e training course
tralnl11g officer istl{ . e ected. Unless the
~ophisticated meth °dloughly familiar with
room.
c. The unit with
s· -
peoal measures t
em with securing the

cl computer
. must take
Pl~ter and its chua; protect the com-
I
r

enable these two groups to work together. 2. The course should start with an exp l11g" 1 0 s, SUch " ll1ISUse. 10m penetra tion or
tion of the intel1igence process. , Ie should stick as war gam.
2. Because intelligence personnel rarely en- proaches, such as s .to traditional ap- 1
a. Emphasis should be made to ( ) Access to itc; .
joy concrete recognition of their accom- exercises. eml11ars and written limited to auth c~nsoles must be
plishments, he must, in order to maintain the difference between the intel
(2) Com oIlzed personnel
morale: function and the operational , pu ter progTall1s , .
fl. Personally keep unit members in- b. The different categories of . V. SECURITY AND to restrict retrieval n.ay be coded
and their primary uses should be INTELLIGENCE p TIlE know the cod , t o those who
formed of how and for what their ·s . ROCESS (3) T e. f
product is being Ilsed. ered. The categories are indicative rreClInty i~ a particular co . . he computer ShOI I
II. Push hard for promotions. warning, tactical, strategic and '. oen:e unIt because f ncem of the in tel/i- ?rall1ed to refuse dir,1 d be pro-
dentia!' . subject matter in t%e the ~:nsitivity of the ll1puts or retrl' I ect Outstation
c. Vary assignments within the unit and
3. The need for intellig·ence by the s of tl . unIt s file and th (4) The computer eva. J
seek temporary or rotational assign- asattractiveness
at le unIt to 0 0" e tected from rOom must be pro-
ments outside the intelligence unit. of the agency should be stressed, but at ,arget of penetrClt' roanlzed crime . unauthorI'z I
' Ion or corru .
w I11ch could lead to
'l'
same time it must be made clear that 10 protect t h ' . ptlon. ec entry
d. Directly and aggressively correct any ' . '1' . . e tntegTlty f the machin . the damage of
imbalance between compensation levels teII Igence IS a contn mtlOn to strategy, lIIl!t Its commander a the intelJiO'ence ery and/or d
on tapes. ata stored
of "badgcd" officers and civil service a determinant of strategy. steps in three areas: mUst take approl~riate
8. OjJeralional secU1it .
analysts. 4-. The status of organized
. I ar I ocal'lty shOll Id
I. Person l
a security
. sure that the acti .~. The unit must in
partlcu .hn,-","01lIVii
worthiness f . T 0 lllSure
. the t t
th' .
e 111telho·ence ill
( Vltles Clnd . 1
.' pans of both
-
covered: should a an individuClI (, tlle rus.unIt- are 0 Vestlo·ator I
IV. TRAINING AND INTELLIGENCE ' securely guat'de I a' ane analyst
a. The range or activities of a. Conduct b k a Offi c.
A. Intelligence training programs for the gen- . . I d' . . I mel1t b a ac ground' , . . . ce phones should be .
crIme, mc u mg Its mvo ve otll prOfessional I lllvestIgation on Ochcally for y • checked I)cri-
. a candIdate's l i f ' perso
eral patrol force, or non-intelligence officer. mretnps a d
legitimate business. o f · (anc . na 1 aspects eavesdrop clevi n electronic
1. The training courses should clear away b. The susceptibility of the law cral status and h' e, l11c1.uchng his 611an- b Tl'
. le mvestigator sho
ces. I
mysteries surrounding the concept of in- ment agency to penetration. b Co I IS aSSOCIates
. I1c lIct periodic . and incol1scicllo nId lise 1111l1lnrked
telligencc. Non-intelligence officers should c. The common misconception that ground investig /Pdates of the back- . us cars. .
c. S~cunty should be abs'
be taught generally what the intelligen~e
process is. They need not know the spe-
nized crime is always ethnically
family) based must be dispelled.
members.
c. Il1doct .
.
a Ions of the unit's
nnate new ) . (1) Telepl
t
l1Ications between ii I ved In commu-
.
e c and office.
cifics of individual cases. lone calls-I)' r. •
C. The command level. Importance of se l.eIsonneI with the public II rele1ably from
2. The contributions that non-intelligence d. Wb cunty. . ) lOnes-shol I I 1
()f11cers, particularly those on patrol duty, l. What intelligence can do [or the Physica~re legal: the polygraph can be llsed chrectly to the int 11' .1 ( Je made
passing the agen e 19~nce unit, by- /.
level should be the basic theme. security 1 .
can make to the final product of an in- _~~.l1nm.ijl1I Illust be protecte' n~ormation on file (2) Where d'
ra 10 must b
cy SWItchboard.
t('lligenre agency should be explained. 2. The training progTam should unautllorized. d agamst access by an telligence unit h e used, the in-
pel sons, by wllatever mea y
ns. ferent frequenc; ~.~!d have a diE-
the agency. 11 the rest of
I
I
185 /
.----- ( 0'
;1)
.
On-!!Olng
"t 1
1 a('Ll'vitics
atiOml'
ot.>cr l' \ sC" to other
t hc C 1SC 0 u
. 'de or outside the agency who have a
11151
need to knoW,
2, Security should
t be used to conteat
tl~~tivities
or the emptoy· .
shou ( r~(). . ency unless abso- mistakes, canup t 'ques by members of .
f'1cmcIlts of the ag
ltltely necessary.
ment or i1leg a1 tec 1111 . , Appendix E
it or agency.
I an end in itselE. the un . t in the privacy of the
, 1 us t ma1l1 a i ' d
Security should not )e , 'ng the t~. Secunty I? . 1 files hom unant lome :
C. . . Jose of deteri1l1nl . informatIOn 111 t 1e EXAMPLES: STR.ATEGIC
1 'l'bc uhilll<lt<' purr " ve rcciIJients 15 to persons.
• '1' r lJ\,ospectl . 1's
reI iabillty 0 . ' 11 lualifled consume
. . intellige\lce to.l (
pcl~~
INTELLIGENCE REPORTING
BOOTLEGGED CIGARETTES untaxed cigarettes arc brought north and sold
through organized crime controlled distributors,
In April 1971, the tax on cigarettes in the
vending machines, and stores.
lth of Massachusetts was increased
" SON to .$0.16 per pack. This increase A front page article in the Nlay D, 1ml, issue
Massachusetts level with Connecticut on of the New York Times reported that N ('w York
per·pack tax for cigarettes. The increase in State Tax Department officers recently estimated
usetts was part of the Governor's tax pro- the total tax loss (city and Stare) due to boot-
and was expected to raise an additional legged cigarettes at $6.9 million a year. Joseph
million in tax revenue, Connecticllt and Carter, assistant director of the Special Investiga-
setts are now tied for third highest tions Bureau, said he thought a figure of between
tax in the country. The actual per- $20 and $30 million annually would be more
tax rates for cigarettes in New England are: realistic, while a cigarette wholesalers gTollp esti-
50.16 Ncw Hampshire:
mated a 5-year loss to all States to total $4,11
.12 Regular and king SO.085 million. The Times article furtber reported
.16 100 mm. ....... ,09 that in New York, a flourishing market, Gov-
.13 Vermont ......... ,. .12
ernor Rockefeller has called for a thorough ex-
comments: The tax increases in amination of contraband cigarette tramc, It is
and Connecticut with the con- noted' that the $0.12 per-pack tax of New York
t increases in the total price per pack of is equalled or exceeded by five of the six New
leads to the projection that organized England States.
in New England will be attracted to the
of sm lIggling and distributing boot- ORGANIZED CRIME'S TRAINING
cigal'ettes. 2 The tax on cigarettes in all SCHOOLS
England States greatly exceeds that of
\
i
~fO large tobacco producing States of Vir-
($0.025 per pack) and North Carolina
Source: Task Force Report: Organizcd Crime,
'iVashington, D.C., I!Hl7
Life, February 12, 1071
, per pack). Organized crime has both the
\ expertise to conduct large-scale opera-
bootlegging cigarettes in New England
Very little has been recorded about the current
methods of training employed by variolls orga-
\! , have clone in other States. As a result, nized crime families for their IJarticular skills.
tax revenue from the increase may Consequently, one of the targets established in
as great as projected as more and more the bask intelligence collection plan of NEOCIS
is the identification oE organized crime training,
England Organized Crime Intelligence System instruction, and/or schooling methods and proce-
e.xamplcs in this appcndix camc from the New
Organized Crime Intelligence System "Briefs," June
dures. The task force report identified several
methods of training and instruction that have
by author of manual. been employed by organized crime members in

137
" ~
the execution of lower class crimes. The report skill and, as stated previously, the Task Force fl
also pointed out that soon there would be no Report identified methods of training and in- t . /1
place in the higher levels of organized crime for strnction employed in the execution of other t
high school dropollts and that the skills now 10~N-level crimes. However, do we know how the II
needed within organized crime do not come highly skilled org~nized c~-i~e ~enc: learns ~o Ij
"automatically" and are not merely those neces- "wash," "clean up,' or legltUnatlze $320,000 III 1/
sary to "avoid trouble." In connection with this, diamonds and over $217,000 cash? i Appendix F
it is interesting to note that a LIFE magazine In 1968, a new auto antitheft system was intro- 1J
article, concerning airport theft, reported the dnced whereby turning off the ignition also! I
accuracy of the ";\.1 ob's spotting system" for high- locked both steering and transmission. This 11 GUIDELINES: BACKGROUND
value shipments and then indicated that at John system has done much to foil the young joyrider. n
F. Kennedy International Airport in New York,
a cargo supervisor had founded a "criminal
However, the system has done virtually nothing Ij INVJ~STIGATION OF APPLICANTS-
to thwart the professional auto theft rings which :1
schoo] for spotters" in which he instructed re- pocket approximately $1 billion a year from II 1
cruited cargo handlers in what kind of shipments their efforts. It takes a safe manufacturing com- i INTELLIGENCE UNIT
to watch for. Each graduate spotter was then pany a year or longer to develop a modern $8,000 j
paid $500 if the theft succeeded. To get the
process stalled, the spotter called a predesignated
safe, but members of organized burglary rings i
can take such a safe apart in only an hour's time. I STAFFING BACKGROUND A. Be deeply motivated and aware of the respon-
telephone number and repeated the following There appears little doubt that organized crime , INVESTIGATION sibilities.
('ode sentence: "I got a party tOllight." These
is staying on top of the advances of modern secu- I. Introduction B. Be adept at gathering all facts possible.
sllccessful high-value thefts have inc! uded a rity technology.
pouch containing $:l20,OOO in diamonds and a . ., ... . j The intelligence unit must maintain an un- C. Possess a sense or fairness and respect. Re-
packet (,()Iltaining' $217,500 cash. Orgal11zed cn~e s capabIlItIes, te~hl11ca~ ad- jequaled standard of excellence in its personnel port all facts, both for and against.
vances,. and tl:eI~- metl:ods of te~clllng hIghly land their performance. The degree of success
NEOC/S' (,Ollllllcnt.l: The Life article has D. Evaluate the facts carefully.
professlOl:al cnmmal skIlls. to synchcate mel~bers ,iwhich the unit enjoys will be limited by the
pointed out that one group of low-level criminals and aSSOCIates are areas wInch should be of ll1~er- lintegTity of its employees. The process whereby E. Be a good interviewer.
actually received formal schooling in a criminal !
est and concern to all law enforcement agencIes. personnel are selected can, therefore, be regarded F. Be tactful, diplomatic and patient.
las the key to successful law enforcement opera- G. Put aside personal comparison.
! tions. The most important step in this selection
H. Maintain a professional and moral responsi-
jprocess is the backgTolmd investigation of appli-
bility to the agency.
I cants for positions with the unit. This investi-
tgation is necessary in order to evaluate the quali- 1. Review the ap/Jlication
Ilfications, backgTolmd, character, and suitability L Determine if all information has been pro-
lo~ the applicant in determining its eligibility for vided. If application needs a clarification
! a position of public trust. Any doubts as to the or lacks certain data, prepare a memo-
applicant's suitability will be resolved in favor of randum to personnel requesting the addi-
I the intelligence uni t. tional information.
I 2. Determine if any information provided or
tII. Responsibility of Personnel Conducting
developed affects the applicant's eligibil-
l the Investigation
ity for employment.
I Agency (or intelligence unit) personnel con- J. Report Derogatory inforlllation to the sllj)er-
ducting applicant background investigations
visor immediately.
must be resourceful and attempt to uncover any

.I
I undesirable qualities an applicant might possess.
In order to successfully process an applicant for
employment and maintain a high level of pro-
1. Derogatory information should be fully
developed.
2. The reports should reflect unbiased and
! f~ssionalism the agent conducting the investiga- complete inquiry.
I tlon must keep the following in mind at all :1. Information should be immediately evalu-
I times. ated to determine whether further investi-

Irl.
I - gation is warranted.
1 The Guidelines presented here are, for the most part,
. ~ose del'cloped by the Florida Departmenl of Law Enforce- NOTE.-The investigator's character,
rn, [" H. "" io 'ppli,,", i",~Ug,"i",,,. ideals, standards, personality and ability
1~18
l:l9
J.
" ~11 , I

8. Militm-y service 22. Organization membet'ships (ex. labor)


to understand his fellow man will have a Criminal and civil court records II
, !
fraternal)
f1 a. There is VA Form 07-3288 obtaii1-
tremendous effect upon the evaluation of Police warrant files ~ I able from the VA that will give in- 23. Banks
background findings. Other
formation about a veteran. 24. Retail businesses
2. Personal history (divorce, marriage,
b. Provost marshal-record check (give 25. Church-baptismal records
III. The Background Investigation birth, etc.)
name, branch, and military unit
, 26. Neighborhoods
, A. Geneml Bureau of vital statistics ,1 when requesting information.)
:; Military or draft board records ),1 27. Industrial Commission
1.. Advise the interviewee the posltlon for q
I)'I 9. Financial status
which the applicant is being considered. Civil courts E. Additional information regarding form used
2. Request that all interviews be treated as 3. Loyalty II ;,1
Ratings (satisfactory, unsatisfactory) by the applicant investigation unit. .
Ii Any judgments
confidential. Check membership in organizations :1 1. Personal History (verify)
;1 Debts (banks or loan company)
!l. Iruerview the interviewee in priv3te. Professional II Birth Adoption
',1 Amount of payments
4. The j 11tcrview must be voluntary. Associates II
Marriage Separation
:1 Public records or pending civil action
Fellow 'workers-travelers
5. Tile investigation must be impartial and
Ull biased.
Teachers ~II 10. Health
Divorce
Death
Legal name change

Employer "
Family doctor-hospitals-clinics
G. Obtain information, don't give it. Avoid "
Check neighborhoods Review records, ascertain cause of action _
Neighbors
character assassination or spreading of
Other ij and adverse publicity.
rumors. D. Som-ces of infonnation Source of Information: Other State agen-
4. EmtJloyment II
7. 'Watch the interviewee for reactions to II 1. State investigative bodies (es. State po- cies, bureau of vital statistics, State ~'1I'1d
Dates of:
~
specific questions. lice, beverage) Federal investigative county ~ecords.
Type of promotions
H. \Vheuever possible personal contact bodies (ex. U.S. Justice Department; 2. Naturalization (Verify if applicable)
Rate of pay
should be made with the interviewee.
Description of duties
II Treasury Department) Through immigTation and naturaliza-
A.ppointments should be made prior to an l'
Ii 2. County and circuit clerks office, U.S. dis- tion recorrl.s or court records. Need date
Abilities (aptitude and initiative)
interview whenever possible. In lieu of
personal contact make telephonic inquir- Attendance record II trict court clerk. and place of entry; date and place of

ies and / or send letters. Recommenda tions


Ability to get along with others
!I
Jl
3.
4.
Probation and parole departments
Welfare and health departments
naturalization. and number.
3. Financial investigation (information to
1\
B. () bjeclives Reason for leaving I' be furnished to the credit bureau).
5. Licensing agencies
1. Determine if an applicant is qualified for
S. Education
U a. Applicant's name
fj 6. Telephone directory
employment with the intelligence unit. b. Date and place of birth
Dates attended 11'I 7. Newspaper files (morgues)
2. The following points must be kept in c. Social security number
Any disciplinary action !I 8. Commercial credit bureau
mind throughout the investigation which II
d. Marital status (name of spouse and
may predict Sllccess or failure in the posi-
IQ rating or testing scores 11 9. Utility companies
Attendance record 'I DOB)
tion. 1.1 10. Chamber of Commerce (Better Business
Infirmary at school ii e. Present and past addresses amI dates
fl. Character and reputation II Bureau)
Average grade i I residing there.
I). Loyalty l! 11. Auto clubs
Activities in school
f! f. Schools, addresses and dates ci'ttended.
c. Associates and/or relatives Standing in class 12. Plant and secmity forces g. Employment addresses and dates.
d. Qualifications and ability Any radical tendencies \1 13. Railroad investigative staff
t h. Credit record-debts over $100.
e. Emotional stability G. Residence and neighborhood investiga- 14. Hospital and medical records (doctors I. Parents name if applicant single
f. Social adaptability tion records)
j. Credit check to be made in all areas
g. Health Emotional stability 1
15. Bureau of vital statistics resided in by the applicant or his
II
C. Areas to ilmestigale Drinking habits ! 16. Records bureau of Federal, State, County parents.
Previous residences ( and City P.D.'s.
,::;: 1 1. Crilll inalrecords 4. Education
Personality traits, behavior and reputa- 1 17. Selecti'.'e Service boards-Military serv-
FBI files !I a. If letters sent submit release forms
tion ice-Veterans Administration.
Agency-DAI files with correspondence.
i\'Iarital problems
Agency-NCIC fIles
State/motor vehicle/DL flies
Spends leisure time II)) 18.
19.
Motor Vehicle records
School, college, and instructor records
b. Personal contact-interview a regis-
trar representative, school officials,
Ability to budget and live within means.
Sheriff anc1local PD files 20. Employment records-fellow workers instructors and fellow students if
County judge'S office 7. References II
Subversive files Personal contacts whenever possible.
[I 21. Associates-relatives possible.
1\1
I
141

~
1·10
e. Verify all reported information under 3. Arrest record
-
r, PJau~~ to check: Registrar's office; by reserve classification in addition
court record in application. 4. Financial investigation
~('( urity J>er~()nrwJ; dean's office; to draft classification. l-R = Avail- r i

1!oll'.,ing office, judicial affairs office. able for order to active duty. ll-R f. FBI check-if former police officer, 5. l£ducation
r" 1'(,1 ~fJ1lfd ll'/fTf'rlces
= Not available because of civilian check field office in the area where the 6. Employment
fl. Pc'p,oJlal contact when possible,
occupation. 111-R = Not available applicant was an officer for civil rio-hts
violation and FBI indices. 0
7, Personal and developed refel'ences
because of dependency. 8. Neighborhoods
I,. l.rlf en g. When necessary, name search local
10. AWitary service
:'\0 [I-..--I! d,·rogatory information police agency files regarding personal
('xist~ (otic (·ming a personal reference, a. Prepare a letter to be forwarded to GENERAL INFORMATION REGARDING
and developed references .
•1'>( ('1 witt til(' asso( ialion between the the repository of records requesting THE SYNOPSIS
NOTE.-Ascertain details of arrest
app1ic ant ilnd r('lef('nc(~. Developed service record. (Submit release form 1. "When using applicant's name, use full
or complaints. Not necessary to
ll'll'1I'11I('., .. ho\lld be ;\( quired wh(~n­ at that time.) Check for information name. If using name more than once in the
search names of relatives under 15
('\'('1 PIJ~'iibl(', concerning any physical disabilities synopsis, the surnam<: can be \.~sed prefixed by
years of age.
II. Nt'lalit'n or probJems. Mr., Miss, or Mrs.
15. Acquaintances in agency should be inter-
II, (>htain ill/ormation regarding close b. There is a VA Form 07-3288 avail- viewed as developed references. . 2. When describing a place always identify, by
l/'lati\(''i allel associates eluting the in- able from the Veterans Administra- CIty or State.
16. Drivers license checks (verify)
\(·~tigat.ion of all applicant. tion which wi11 give information re-
garding a person's V A record. a. Out-of~State 3. Any derogatory information must be thor-
Ii. If dcrogatory allegations are uncov- oughlyexplained.
11, Aiedical ~;:,
b, In-State
(·It·d, I llltlH'\' inwstigation may 1)('
4. The synopsis must cover all the elements
t\;llLII!tC'c! to verify or refute the Check with personal physician or depart- il
ch;[rg('~. mental records. Ii IV. Report of Investigation listed in part IV(B) of this broc)mre. The only
n
fi A. Heading exception would 'be in cases where a specified
7. !-,IIl/'/o,; Ifl ('1/' NOTE.-'ViIl need applicant's release
Ii"
tI
1. Title area does not apply, or the investigation was
(I, V{" ify all em ploymen t including any form.
I!11 terminated.
IJc'\\' cHIC'S discovered during the in- 12, Organizations 2, Dates covered
\('~tip;alioll. I n most cases ('llrrent \1 3. Recommended disposition 5. In the case of a termination the backup
a. During investigations make inquiries oj
I'
"llll'loYIIH'nt of an applicant should material will not be typed. However, that infor-
to determine if the applicant has been [\ B. Synoj)sis mation which was secured will appear in a type-
not 1>(' \('ri lied ltll til em pI oyJl1(, 11 t hy affiliated with any subversive or dis- ii 1. Introductory information written synopsis and termed a partial background
;lg(,ll( y i~ imminent.
I sident organizations. 2. Personal history investigation.
~ /I. IlltCldl'W ilupervisofs anel fellow em- b. If allegations are received indicating
!I ' piOYCl'S. disloyal, subversive or criminal activ-
(. ,If appiiclllt in business for himself, ity, attempt to contact known in-
! Jllt(·) view cOlllpetitol's.
formants in the area of the activity
I iI . .\11 lllJ('lllplo),Illt'lll should he ac-
e Oltlll('cl [or.
and clarify.
l:{. Foreigll Imvel (if applicable)
H, ,\',·i,l.!,h /lul/wod
a. State Department
II. Pt'l ,oual cotltact (IallcUonls, neigh-
/J. Immigration and Naturalization
bon behind, (len)s", eitl1t'l' side anti Service and/or U.S. Custom Service.
;lho\(' or Ill'lo\\" i\Jlplicant's former 1(
'I

rcsid('Il< l').
14. Initiate arrest checks (applicant and all r·
"

members of the family) include traHie. if


h. A,~btaIH('
criminal, wanted and complaints.
il
(1 i Polin' \1\'('( il1<t
a. Out-of-State and in-State ~
j'
(:21 ()tIH'!' poli(e ag('lld('~-~Ol1l-()r­ d
(1) Teletype
;
.1
St<lt(' (pl('Jliln'
1).\(/t'C tin' IIT7'i{(' .\tat 11.\
ktters)
(2) Letters ~\
" (:~) Personal contact (Local lawen- :J
1/. sl'nire to dt,-
(:nl1t,U tlll!.11 sl'It'l'th"t' 11
forcement agencies)
it properly registered, classi-
tt't millt'
lit·d, IOUt'lY lllllUht'l\ ('lc. /1. FCIC-wanted check )1
fl
II, H l('~('n (', dt'lt'rmine whether readv c. NCIC-wantecl check
01 'il;lllclhy. ' d. FBI-applicant only (initiated by U
!l
:\on'., If stall(\by. a~n'l'tain stand- personnel) Ii
1r
, I

U 143

~
HUTCHINSON, JOHN. "The Anatomy of Corrup- RelJort on Organized C,·ime. Harrisburg,
tion in Trade Unions." Industrial Rela- Pa., 1970.
tions, v. 8 (February 19(9), pp, 135-150. Presick~lt'S Commission on Law Enforcement
Illinois Crime Investigating Commission. Juice and Administration of Justice. The Chal-
Racheteers)' Report on Criminal Usury in lenge of G-rime in a Free Society. \Vashing-
the Chicago Area. Illinois, Illinois Crime ton, D.C., Government Printing Office,
, , Appendix G Investigating Commission, June 1970. 1967.
KING, RUFUS. Gambling and 01'ganized Crime. See Chapter 7, "Organized Crime."
\Vashington, D.C., Public Affairs Press, - - - , Task F01'ce Rej)ort: Organized C-rime.
BIBLIOGRAPHY 1969. \Vashington, D,C., Government Printing
LANDESCO, JOfl:'ol. OrgalliZ<'d Crime in Chicago. Office, 1967.
2d ed. Chicago, University of Chicago REID, ED., and DEl\lARIS, OVID. The Green Felt
A. GEN.ERAL UJBLIOGRAI)HY ON Crime in America. New York, Harper and Press, 1968. Jungle. New York, Trident Press, 1963.
ORGANIZED CRIME Row, 1969. Law Enforcement Assistance Administration. Research Institute of America. "Protecting
"The Functions and Structure of Ii Organized Crime ProgTam Division. The Your Bu.siness Against Organized Crime:
ALHINI, JmEPI! 1.. 'I'll,. American Mafia; Gene- Criminal Syndicates." Appendix A of the Role of Siale Organized C1'illle P1'evention Research Institute Staff Recommendations,
.\i~ of fl l.f'gend. N('w York, Appleton, Cen- President's Commission on Law Enforce- COllncils. -Washington, D.C., Organized April 15, 1968." In remarks of Jack Ed-
t my, Crofts, l!J71. ment and the Administration of Justice, Crime Program Division, LEAA, 1970. wards. Congressional Record (Daily edi-
AmC'riwll Academy of Political and Social Task Force RejJOrt.' Ot'ganized C1·ime. LOFTO:'ol, OLIVER. "Organized Crime in the tion) v. 114 (May 15, 19(8), H3856-H3863:
Sciellce, Philadelphia. Com baling Orga- \Vashington, D,C., Government Printing Ghetto," Speech in the Congressional RUTlI, HENRY S., Jr. "Why Organized Crime
nized Crime. lfs ;/utIals, v. :147 (May 19(3), Office, 1067. Record (May 4, 1970), H3845. Thrives." Annals of the Ame'l'ican Academy
pp. 1,112. Gus Tyler, editor. DEMARIS, OVID. Caj)tive City. New York, Lyle ~IAAS, PETER, The Valac1zi Pal)e1·s. New York, of PoUtical and Social Science, Philadelphia,
BT'R~, l'vJU.VIN K. The Pf'llelration of Legili- Stuart, Inc. 1969. G, P. Putnam's Sons, 1968. v. 37'1 (November 1967), pp. 113-122.
ma/(' Bwit2fSS b)! Organized Crimf'-An DUSTER, TROY. The Legislation of M.omlity. :\IESSICK, HANK. Lansky, New York, G. P. SALERNO, RALPH. The C1'irne Confederation>,
AlIalysis. Prt'pan'd for the New York State New York, The Free Press, 1970. Pu tnam 's .sons, 1971. CosaNostra and Allied Operations in Orga-
I(kntifH atiol1 and Intelligence System and EDEI.HERTZ, HERBERT, The Nature) Im/)act) and - - - , Syndicate in the Sun. New York, The nized Crime. Garden City, N.Y., Double-
lh(' National Institute (or Law Enforcement Prosecution of White-Collar Ct·ime. Na- Macmillan Company, 1968. day and Company, Inc., 1969.
ancl Criminal .Justice. \Vashington, D.C., tional Institute of Law Enforcement and National Symposium on Law Enforcement "Organized Crime's Growing Threat
LFAA, {l.S. Department of Justice, April Criminal Justice_ (ICR 70-1), 'Washington, Science and Technology, 1st, Chicago. 1967. to American Business," Business l\1anage-
l!J7() , D.C., Government Printing Office, May Law Enf01'cement Science and Technology', ~
ment, v. 35 (November 1968), pp. 57-59.
BI.,\I{.H, (;. ROBEIn'. Orgallizf'd C"ime in Ihe 1970. Proceedings of the First National Sym- SCHELLING, THOMAS C. "Economic Analysis of
UlIil('ri SlaI('s. Current History, v. 52 (June GARDINER, JOHN A. The Politics of CorrujJtion: posium on Law Enforcement Science and Organized Crime." Appendix D of Presi-
1!)(i71, PI'. :l!n :1:1:1 and :Hl4·.,:165, Organized C1'ime in an A merican City. Technology. \·Vashington, D,C., Thompson dent's Commission on Law Enforcement
.. BllI I ~Lllket in Thievery." Forbes, v. 102 New York, Russell Sage Foundation, 1970. Book Company, 1967 . and the Administration of Justice, Task
(l)(o(C1ll\)(,l' 15, J!lGH), PI'. :14, :~7-:~H. - - - with the assistance of David J. Olson. See pp. 3-46. F01'ce Rel)ort: Organized Crime. Wash-
Th.(', wl(' of tlWl\fafia in the stl'aling of ""Vil1canton: The Politics of Corruption." ;\ew York (State) Commission of Investigation. ington, D,C., Government Printing Office, '4
,.~I
1vlarch 1970. Racketeer Infiltration into 1967.
, ,t~I'
M'(llllll('S. Appendix 13 of the President's Commission
Chamlwl' of Commerce Oil the t Tniled States. on Law Enforcement and the Administra- Legitimale Business. This report is an ex- SEIDL, JOI-IN MICHAEL. U1Jon the HilJ-A Study ,.~

'. :t!
lk"hlwo!i on ()lp;anized Crime. An t Trb;lI1 tion of Jllstice, Tash Force Report: Orga- tract from the Twelfth Annual Report of of the Criminal Loan Shark Industry. '.;'1.

Alfair)) Publicat ion of llw Chamber of Com- nized C1'ime. 'Washington, D.C., Govern- the New York State Commission of Investi- Ph. D. dissertation, Harvard University,
IlW1'«' of lht' t Tnitl'll Stales, \Vashingtoll, ment Printing Office, 1967. gation (March 1970). -Washington, D.C" Law Enforcement As-
).( :., J !Hi!l. "Public Attitudes toward Gambling New York (State) Temporary State Commission sistance Administration, 1969.
. Marshaling Citizcn POWl')' Against and Corruption." Annals of the Ame1'ican of Investigation. An Investigation of the SMITH, DWIGHT C., Jr. "Cooperative Action in
Climt'. Washington, D.C., Chamber of A cademy of Political and Social Science, Loansharh Rachet)· A Rep01·t. New York, Organized Crime Control." Jounwl of
Cotnl1H'ne of til<' United Statcs, H170. v. ~l74 (November 1967). 1965. Criminal Law) Criminology and Police
Chicago Crinw Commission, "Spotlight Oil HILL, A1.BERT F. The N01'th Avenue Inegulars; Oyster Bay (New York) Conference on Combat- Science, v. 59, No. 4 (December 19(8), pp.
I,egitimall' Businesses and the Hood, Part A Suburb Battles the Mafia. New York, ing Organized Crime, 1965. Combating 491-498.
11." In rt'lllarks by Charles Harting Pt.'n~y. Cowles Publications, 1968. Organized C1'ime. A report of the 1965 SMITH, 'WILLIAM. "The Unseen Impact of Or-
C:()I/,~r('ssi()tlnl Rt'corris (Daily edition), HINOELAG, rVhCHAEL J. "Bookies and Book- Oyster Bay Conferences on Organized ganized Crime on Manufacturing." Mod-
v. 1I it Gl11H> 24, 19GB), S75D5-S7596. making: A Descriptive Analysis." Crime Crime. Albany, 1966. ent A/anufacturing, v. 1 (July 1968), pp.
Clu'o'on, nO~ALn R. Thr/t of a Nation; the llnd Delinquency, v. 17, No.3 (July 1971), Pennsylvania Crime Commission. (Office of the 160-161.
SI ntt'l lin' fllld Oju'mlions of Organized pp. 245-255. Attorney General. Department of Justice.) TURNER, \VALLACE. Gamble1's' ]Honey) A New

145

.--
Vnited Aircraft. Corporate Systems Center. U.S. Department of the Treasury. Federal Law
Foru' in Amf'rimrz /,iff. Bo<,ton, Houghton Pe1'mitting the Compelling of Testi- i;" Definition of Proposed NYSIIS Organized Enforcement'SchooJ.1 .
.\Wflin. JlJ(;!). mony and the Granting of Immunity With Crime Intelligence Capabilities. A Recom- "Evidence." Text 14 (4-71).
;:
Dat('d, bllt intfrc.,ting acconlll of prOlni. ResjJect to Certain Crimes; Report to Ac- mended Development Plan. (A report pre· "Description and Identification." Text ~l3
IWllt syndicate 1(';l(kr~' interest'> in organi7ed company S. 677. (90th Cong., 1st sess., pared for the New York State Identification (3-69).
gambling. Senate. Report No. 308) \'\Tashington, and Intelligence System.) Farmington, "Undercover Operation." Instructor Guide
Tn fR, (;pe.;. "An Interdisciplinary Attack on D.C., Government Printing Office, 1967. Conn., United Aircraft Corporate Systems 48 (1-69); Student Guide ,18 (1-69); Test
Olgillli/('c! Crime," The Annals of the The bill would authorize immunity Center, December 21, 1966. 48 (1-69) .
.\t1l('rican Ac ademy of Political and Social grants from criminal statutes directly appli. See section 2. "Surveillance." Instructor Guide :H> ('1-71);
Sci/'Il((', v. :H7 (!\Iay 1!)(i11, PI'. HJ.l-112. cable to organized crime. Student Guide g5 ('1-71).
'. ()rp;rmi::f'd Crimt' in Amt'rica; A Book The bill would make it a Federal crime Chapter II: The Intelligence Process "Informants." Instructor Guide :15 (4-71):
of Rt'llclillgl. AI1Il Arhor, :\[ich., Pni""r- to intimidate, harass, or attack witnesses ,vho Student Guide ;35 (4-71) .
Department of the Air Force.
.,ilV Clf ;\Hc higan Pr('~s, l!J62. have pnlYided information to Federal in- WILSON, O. \'V. Police Administration. New
Air University. Extension Course Institute.
,\11 illt('r('~ljng (ol1l'niol1 of essays that are vesligators prior to the commencement of York, McGraw-Hill Book Company, 196B.
The Intelligence Cycle. (2001-1) Extension
mO'>llr hhtori( al. Some of the' mOrt' in- criminal proceedings. It would assist in Especially Chapters 14, 15, ancI 18.
Course Institute, Gunter Air Force Base,
c~'iv(' rf1llark~ mille from Tyler's introduc- I)rosecuting and convictincr orcranized crime New York State Identification and Intelligence
\. b b
Alabama.
tlom til the various parts of the volume. members. System. . Security SYjlem, for Organized
Begins usefully enough with a brief de-
{'ni[('d Aircraft. Corporal(' Systems Center. P.S. Congl'ess. Senate. Committee on the Ju- Crime Intelligence Capability, Reprints
scription of collection, production, and dis-
j)('/miliml of Pm/mlf'd NYSllS Orgallizl'd diciary. Subcommittee on Criminal Laws available from Law Enforcement Assistance
(:ri111(, Inldligl'JI( (' (;apahilitks. A'recorn.
semination, but soon gets into the Air Force
and Procedures. Controlling Crime
application. Chapter 2, on production, has Administration, V .S. Dep~rt111ent of .J ustice.
JIIc'lul/·c1 D{'\'['lojlmcllt Plan. (A report Throl/gh More EIJer-live Law Enforcement. (Information releasable to any criminal jus-
pl('paH'c\ fOI titt' New 'York Slate Identifica- some useful passages.
Hearings, 90th Cong., 1st sess., 'Washington, tice agency.) .
lIEwl"IT, \VILLIAl\I H. Police Records Adminis-
tioll and Intelligence "i)'~tcm.) Farming- D.C., Government Printing' Ofllce, 1967. BRISTOW, ALLEN P. A Preiiminm)' Sturly of
lOll, COlltl .• t Tnitl'd .\irnafl Corporate Sys-
tration. Rochester, New York, Aqueduct
Hearings held March 7-Jnly 12, 1967. Problems and Techniques in Decision 1\1.ak·
[('Ill~ C('l1tt'r. Ikn'Illher ~I. 1!J(W.
Books, 1968.
- - - . MeaSll1'('S 1'l'lating to O'rgan£zed Crime. ing for the Police Administrator. Thesis
')t't· Chilptt'r ~ and Appendix.
New York State Identification and Intelligence
Hearings, 9Ist Con g., 1st sess., l\:larch 18, for masters of science in public administra-
C'.S. l.all'.~. Statlltes, etc.
System. A New Concept in Criminal .Jus-
19, 25, 26, and June 3, 4, 1969. \'Yashing- tion, Los Angeles, School of Public Admin-
Omnibll\ Crime Control and Saf(' Stl'{'ets Art. ton, D.C., Government Printing Office,
tice Information Sharing: The New York
State Identification and Intelligence System. istration, V niversity of Sou them Californ ia,
I!ltlH. Puhli< l.aw 90'<151. !lOth Congress, 1969. June 1957.
ILR. :;():17 • .lUIit' In. I!}()t{, H2 Stat. 197. Albany, New York, NYSIIS, April 1967.
(l.S. President, 1969- (Nixon) Organized BRISTOW, ALLEN P., and GAllARD, E. C. Decision
{' ~, COllgl {'s~. S('nal{'. COl1lmitt('e 011 Govern·
SHAW, \VILLIAl\I. "An Introduction to Law En-
Crime. Message . . . (91st Cong., 1st sess. Making in Police Administration. Spring-
o rgtlll i::.N[ Criml' and forcement Electronics and Communica·
llH'Ilt. 0p('l'iHiollS. House. Document No. 91-105) \;Yashing- field, III., Thomas, 19G 1.
IIlit il Tit/till' ill XUl'mlirs. \Vashincrton, tions," Law and Order, V. 13, No.4 (April
ton, D.C., Government Printino' 1:)
Ofllce, GA~IMAGE, ALLEN Z. Basic Police RejJort Writ-
D.C :.• (:ll\l'tIHIlt'llt Priuting Office, I !l65. 1965), pp. "14-48; 13, No.6 (June, 1965),
1969. ing. Springfield, Ill., Thomas 19G L
t' ') (:()Ilgn'~'i. I I(luw. Comlllitte(' on (;overIl· "The Urban Poor and Organized Crime." In p. 30.
P.S, Department of the Army. "Techniques of HARNEY, MALACHI L., and CROSS, .J OJIN C. The
Illclll Opt·I.llion.... l.('gal and :o.Iollt'tan Af- 1':l1larks of Joseph M. i\fcDade. Congres- Informer in Law Enforcement. Springfield,
filii, "iuh( ()Illn~itl(,t', Frdt'ral RfJorl Against Surveillance and t'ndercover Investiga-
SIOnal Record (Daily edition), v. 1 B (Au- Ill., Thomas, 1968.
Otg~/Il11..t·cl CtlH.It': RI'/JOr! of Agt'lIc)' Op-
tions." Technical Bulletin TB PMG 8.
gust 29, 19(7), H1l431-Hll<135. KA H!'oI , GILBERT; YERIAN, TUEODORE; and STEW-
t'ltltwm. Il<,>,1l'lIlP;S, !lOth Cong., 1st and 2d \Vashington, D.C., Department of the Army,
Headquarters, ::"\Q\.·ember 2, 1965. Useful ART, JEFFREY R., Jr. Filing Systems and
~t·'i' .• Il.ll'l\ 1,,:1: .\pril 5, UIG7-February H,
theory of technique. Records j\!J.anagement. 2cl cd. New York,
Hili/,{. W:I',hinglon. D.C.. (;O\'ernn{ent YfcGraw-Hill Book Company, i971.
B. BIBLIOGRAPHY BY CHAPTER - - - . "Polygraph Examinations." Technical
Priming OHin" l!l(i7·} !In/'{. O'HARA, CHARLES E. Fundamenlals of Criminal
, Ft't/emf Effort ..tglli/l.~t Orgauized Bulletin TB P~fG 22. 'Washington, D.C.,
Ch~pter I: The Role of Intelligence in Com- Department of the Army, Headquarters, Investigation. 2d ed. Springfklcl, m.,
(li1ll/': R~J/I' of tltt:' Pri't'alt' Snlor. lI('arings,
bating Organized Crime November 1, 1966. Thomas, 1970.
~II 'it Congo !!d S("'., August 1:3.-Sept<.'mber
Some useful comment on theory of poly. WHISENAND, PAUL M. Police SUjJervision;
I !'i. I !170. W.\\hingtoll, D.C., Government IkI.LES, ALLE!'oI. The Craft of Intelligence) Theory and Practice. Englewood Cliffs,
Plimill,g Ollke, 1!170. graph technique.
Harper and Row, New York, 196:~. N.J., Prentice-Hall, Inc. 1971.
t'S <.:tl.l1gn·s\, Sl'nate. Committt,{, on the .Tn- KE:,,:r, Strategic Intellig(mce for
SI-IER;\fAN.
r .S. Army Intelligence School. "Intelligence
<in hay. O/JstwclitHlS of Criminal Imlfsli· Research Offi(I'r Technician." Program of
A. merican World Policy. Princeton, N.Y., 1 Requ(:~ts for copie~ of Federal Law Enforu'mc'nt ';(h()()l
IZ,ttliolls: Uf'/Iort to Afcom/J/Wj1 S. (Jib. (90th
Instruction. Fort Holabird, ~faryland,
Princeton Pniversity Press, 1966. texts should be scnt to the Technical Asqi~tana' f)iVisirm,
COllg., 1st ses~ .• St'nate. Report No. :107) R.A;>;SO)'I, HARRY H. The Intelligence Estab-
r.s. Army Intelligence School, June 1970. OffICe of Criminal Ju~ticc A'l!li9tarHc, Law Enfor«'f{U'Tlt A~·
Washington, D.C" GOH't'IllHem Printing :\0 substance but some useful biblio- sis/anec AcJmini~trati()n, e.5. Ikpartmlmt of Justife, W,,5h·
lishment. Cambridge, ?lIass., Harvard l:}ni· ington, D.C. 20530.
OlIll (', 1!l{ii. ' graphieal additions.
versi ty Press, 1970.

lili
147

....
"

WW.,F,:-';AND, PAm. M., and TAMARU, TUG T. Slate Identification and Intelligence System. WHISENAND, PAUL M. Police Supervision; V.S. Department of the Treasury. Internal
Au/ontaiNj p{Jlirr~ Informa/ion Systems. Albany, New York, NYSIIS, April 1967. TheoTY and Practice. Englewood Cliffs, Revenue Service. Intelligence Division.
:--:cw York, tl Wiley and Sons, Inc., 1970. 'WHISENA~D, PAUL IV1. Police Supervision; N.J., Prentice-Hall, Inc., 1971. Digest of Wagering OPerat£ons. Document
SC;ClI.\1.AN, Erw.:.\!,1J A. Evaluative Research; Theory and Practice. Englewood Cliffs, No. 5466 (1-63) vVashington, D.C., Govern-
N.J., Prentice-Hall, Inc., 1971.
Chapter V: Training ment Printing Office, 1963. .
['rindtJies and Practices in Public Service
and Sofial Atlion Programs. New York, WILSON, O. \V. Police Administration. New American Academy of Political and Social Westinghouse Broadcasting Corporation. The
Russell Sage Foundation, 1967. York, McGraw-Hill Book Company, 1963. Science. Philadelphia. Gambling) Phila- Corrupt City. A documentary file, New
(r ni leci Airna(t. Corporate System Center. Especially chapters 1 through 7. delphia, 1950. V. 269 (May 19,50) . York, 1969. Suchman,
lh'finilion of Pro/Josed NYSIIS Organized WILSON, O. VV. Police Planning. Springfield, BRERETON, GEORGE H. "The Importance of WILSON, O. W. Police Administration. New
(;rirllf' Intelligence Caj)(dJililies. A Recom- Ill., Thomas, 1957. Training and Education in the Professional- York, McGraw-Hill Book Company, 1963.
Illended Ikv('loprnent Plan. (A report pre- linited Aircraft. Corporate Systems CenteJ.;. ization of Law Enforcement," Joumal of See Chapter 7.
pan'c1 for tilt, N tW York State Identification Definition of ProjJOsed NYSflS Organized CTiminal Law) C1"I:millology and Police
allel Int('lIlgcnce System.) Farmington, Crime Intelligence CajJabilities. A Recom- Science, v. 52 No.1 (May-June 1961), pp. Chapter VI: Security
COlin., Fnited Aircraft Corporate Systems mended Plan. Farmington, Conn., United 111-121.
HEALY, RICHARD L. Design for Security. New
Center, December 21, UHiG. Aircraft Corporate System Center, Decem- GAl\I;\IAGE, ALLE:-.1 Z. Basic Police Report Ttl/rit-
York, John vViley and Sons, Inc., 1968.
See section 2. ber 21, 1966. ing. Springfield, Ill., Thomas, 1961. Deals 'iVith physical aspects of secu'rity
See parts 4 and 5. GERl\IANN, A. C. "Education and Professional
only. Sllggested use of modern techniques
Chapter III: Structure of an Intelligence Unit Law Enforcement," Journal of CTiminology
and devices.
ANDER<,ON, ANNEJ.lt;E. Organized CTime: The Chapter IV: Staffing the Intelligence Unit and Police Science, v. 58, No.4, December New York State Identification ancI Intelligence
(1967), pp. 603-609.
NI'l'd for H('sc'arc/l. Law Enforcement As- ANASTASI, A:-.1NE. Psychological Testing. 3d eel. System. Security Systern for Organized
Law Enforcement Assistance Administration,
~islan«' Administration, U.S. Department CTime Intelligence CajJability. Reprints
London, The Macmillan Co., 1970. Organized Crime ProgTam Division. Police
oJ J lIstiee, Dccember 1mo. Useful guide to range of tests available. available fr0111 Law Enforcement Assistance
BRISTOW, ALLF:-.1 P., (omp. Police SU/Je1""uision
Guide on Organized
, Crime. OrO'anized
0 Administration, V.S. Department of Justice.
BLUl\f, RICHARD H. Police Selection. Spring- Crime ProgTam Division, LEAA, U.S. De-
R('adings. Springfield, 111., Thomas, ID71. field, Ill., Charles C. Thomas, 19M. (Information releasable to any criminal jus-
partment of Justice.
BJww~, \Vlf.l.IAM P. A Polic(, Administrative Cha pters on backgTolmd investigation tice agency.)
See Chapter 1 and the section on training.
A/'/JrI){Ic/! to Ihl' Corfll/Jlion Problem. and psychological testing. Project SEARCH (System for Electronic Analy-
LOFTEN, OLIVER. "Organized Crime in the
Pt'epan'd fo)' the Organized Crime Program PIGOR,), PAUL, andlV!YERS, CHARLES A. Person- sis and Retrieval of ~riminal Histories),
Ghetto." Speech in the Congressional
Divisioll, Law Enforcement Assistance Ad- nel Administration) A Point of View and a Committee on Security and Privacy. Sew-
minislrati01l, 1l.S. lkpartment of JlIstice. RecoTd, (May 4, 1970). H3845. Tit)1 and Privacy Considerations in Criminal
J\Jelhod. 5th ed. New York, lvlcGraw-HilI National Sheriffs' Association. klanual on
(Available Fall, 1!l71). Book Company, 1965. History Information Systems. Techmca1
< " l~·
CRFS.WY, DONALD R. "'Methodological Problems
Training for Sheriffs. (A Law Enforce- Report No.2, July 1970. Project SEARCH
'li~ ill t he Study of Organized Criu1(' as a Social
Good basic text though directed at indus- ment Assistance Administration project re-
Staff, California Crime Technological Re-
trial and white collar management. port by the National Sheriffs' Association)
Problem." A ?l 1111 ls of lite A 71wrican A cad- ,t\TILSON, O. ,\V. Police Adnl1:nistration. New search Foundation, Sacramento, California.
('IIl'V of Political lind Social Sci('nce, v. H74
"Vashington, D.C., Government Printing
York, McGraw-Hill Book Company, 1963. V.S. Department of the Army. Pol),graph Ex-
Office, 1969.
(November W(7), pp. 101-112. See Chapter 8. aminations. Technical Bulletin TB PMG
F,\Sl'MAN, CEOlWE n., and EAST;\IAN, ESnlER M. Police Training and Pe1j01"1nance M,anual.
THORNDIKE, ROBERT L., ed. Educational Aleas- 22. vVashington, D.C., Department of the
iHIl7licijJllI PoliCI' Adlllinistration. "Wash- Washington, D.C., National Institute of
II n!1/1C1l I. 2d eel. Washington, D.C., Ameri- Army, Headquarters, November I, 1966.
inglon, D.C., International City Manage- Law Enforcement and Criminal Justice,
can Council Oil Education, 1971. Some useful comment on theory of rlOly-
llH'l1t Assoda liol1, 1!)(i!l. Chapter by Ear-
LEAA, U.S. Department of Justice, (Sep-
BELl.OWS, ROGER M. Psychology of Personnel tember 1970) (PR 70-4). graph technique.
hart lind Pace 011 vice, organized crime, and
in Business llnd Indllsl1·y. 3d ed. Engle- SEIDL, JOHN MICHAEL. UjJon the Hip-A Study
inl('lligcnce. Appendix A: Intelligence and the Law
\ wooel Cliffs, N.J., Prentice-Hall, 1961. of the CTiminal Loan Shm"k Industry, ,'Vash-
,
11 FWITT, ,i\Tll.tIAMH. Police R('('ords A dlllinis-
, BELLOWS, ROGER M., with the assistance of 11. ington, D.C., Law Enforcement Assistance American Bar Association. Project on Mini-
Ira/ion. Rochester, New York, Aqueduct
,
\c .
Book, 1!HlH. FRANCES ESTEP. EmjJloyment Psychology; Administratioll, V.S. Department of Jus- mum Standards on Criminal Justice. Stand-
Institute Oil Police l\[anagement for Supervisory The Interview. New York, Rhinehart. H tice, 1969. ards Relating to Electronic Surveillance.
and Administrativ(' Personnel, Dallas, 1962. 1954:. \!
1,
U.S. Department of the Treasury. Federal Law Tentative draft. June 1968.
P()li('/~ .\I(lIWgt'tl/f'llt
f01' SlljJl'1-oisory llnd Ad- BRISTOW, ALLEN P. Effective Police Manpower 11 Enforcement School. "Ethics and Conduct American Bar Association. Special Committee
millist1'lltirlC Personnel. Springfield, Ill., Utilization. Springfield, Ill., Thomas, 1969. Ii for Investigators." Student Guide 1 (5-71). on Electronic Data Retrieval. Computers
Thomas, 1n{):~. compo Police Supervision Readings. IIIi "Effective vVriting for Investigators." Text and the Law; An Introductory Handbook.
Nt'\\' Ymk State Ictetlljfication and Intelligence Springfield, Ill., Thomas, 1971. 11 44 (5-69).2 New York, Commerce Clearing I-lOHse,
GER:o.rANN, A. C. Police Pet"sonnet Management. H
System. A Xt'll CO'/lCl'jJt in G1"i7llinal Jus-
t
II 2 See footnote I, page 147, for information 011 obtaining 1966.
tia In/Ol'lIIatioll Sharing: Till' New York Springfield, 1I1., Thomas, 1958. Ii these texts. See the section on substantive law aspects
)1
I:
l·IH [' 149
tJ
)1
1':

i)
j
.... ..,,,.~---"-----------------------------

-J,
of (oUlplllc'n, ('~I'e( ially number 0, "Evi- MILLER, ARTHUR R. The Assault on Privacy,'
dr'Il!(', II Comtmtc1'S, Data Banhs, and DossicTs. Ann
BLAlU\" C. ROBERf'. "Aspect of the Evidenc(' Arbor, V niversity of ivfichigan Press, 1971.
(,athe'rillg Pwcc'ss in Organized Crime "Personal Privacy in the Computer
(:'!(i('S," API'C'llClix C of Prt'.lidf'rtlJ Com mis- Age," ~Ii('higan Law Review, v. 67, p. 1089.
~i(Jn T{HIt Rtf/JOrl Organized Crinw. 'Wash- "~ixon anel Courts Stir 'Wiretap and Bugging
ingtoll, D.C., C;ovc'nlmcnt Printing OfTke. Disputes." Congressiollal Quarterly TVee~lY'
1%7. RejJort, v. 27, April 25, HJ69: 593-603 ..
"Collltlllling Crime' Through More A factsheet on the electronic surveillance
F/«'c live' r,(IW l<:nforn'ment." rStatc'merlt controversy incI ueling its use in organized.
011 jllohl(,lm as\C)( iatrd with ('/ectronic 'illr- crime investigations.
v('illdll(('.j 111 C.S. Congress. St'lUlle. Project SEARCH (System for Electronic Analy-
(:(}f1111111ff'(' on filt' J/{diciary. SlI/}("()1nmil- sis and Retrieval of Criminal Flistorv), Com-
/('(' on Crimit/(/l l.aws and Pro C(!ti 11 Te. mittee on Security and Privacy. ,)'ccllrity
JI (·i1rillg~. !JOth Ccmg., 15t sess., "Washington, and Prj'vaey Considerations in CTiminal
D.C., (;OVC'flllllC'llt Printing Offic(', U1G7. History Infonnation Systems. Technical
pp. Crt! !1!i4. Report No.2, July 1970, Project SEARCH
For his C OlJlp/('t(' t('stimony, see pp. !l:H·- Staff, California Crime Technological Re-
1001. search Foundation, Sacramento, California.
( :H!.\\ll R. J. SIIA"> E. Th(' I.aiL' of A rr('.I/, St'arrlz Rm:uIIAvsEN, OSCAR M., and BRIM, ORVlLLE
1/1/(/ .)'('/::IIrt'. Philaclc·lphia, 'V. B. SalllHI('rs G., .J r. "Pri vacy and Behavioral Research,"
(:oJllpaIlY. IlInK. Columbia Law Review. v. 65, No.7 (No-
(),\",". SA\II'H.. Tht 1~(Lv('sdrol)I)(~n. Nc'w vember 1965), pp. 118'1-1211.
BIlIll~l\'ick, N.J., Rutgers University Press, SILVER, EDWARD S. "Organized Gambling and
IIJ~!I.
Law Enforcement," Journal of Criminal
F\~(./ I r., ()i\~ II- B. "Electronic Surveil/ann.' of
Law, Criminology, and Police Science, v. 50,
Olgani/(>c\ Crime." Remarks in Th(' House.
No.4 (1959-1960), p. 397.
(;1J1I.l.(u·ui(JI/((/ R('('ord (Daily edition) v. 14·1,
SCOllI.AR, Rormwl' F. "'Viretapping and Eaves-
jaJlllill y IIi, I !J(iX: 1l71l-·If77.
Rt·( ()1ll1ll('nd~ the liSt' of reslrict(,cl. ((Jurt- dropping; from Olmstead to Katz." St.
ClI del ('d (,ll'!llOl1ir sUl'willal1('(, by inV('~tiga·
Louis University Law Journal, v. 12 (1968),
l h (' agel1c ie's of tl)(' Feelc'ral (;()\'('rn1ll('nt in
pp. 51 H-549.
cllgillli/('C\ (lin\(' cast's. U.S. COllgTeSS. Senate. Committee on the Ju-
TII(l'~K.\, RIl\I,\" LFF. "Electronic Surveillarl('(' diciary. Obstnlrlion of Criminal hwesliga- .~
hv .\ulilOli/('cl La\\' EnfOl"(,(,JlH'IH OlIicel's." lions; Rel)o)'1 to AeromjHlnY S. 676. (90th J
RC'l1l.11·ks ill the' S('nat('. Congressional Cong., 1st sess., Senate. Report No. H07)
RC'(Old. (Daily (,clition) v. 11:~. August H, 'Vashington. D.C., Covernment Printing
1!}(i7: SIII:l:ISIII:Hl. Office, 1967.
:\kCUll "", ,lOll" L. "Organized Crime Evi- l [VII.U<:R, H. RIC.HARD. Lawflll F.ieelmnic Sur-
dell( (,," Relllarks in thl' S"llate. Congr('s- 'veillm!fl',' A lHanllal fo'r Slale Prosecutors
~itll1al Rc>( onls. (Daily (,clition) v. 115, and Law Ellforrell/ent Offleers. Law En-
J111lt' !l, I !Hi!l: ,1.i()O!l!!S(iOon. forcement Assistance A.c1ministration, U.S. .}
Cotllm('l1t\ of til(' Alclerman clisdosnre Department of Justice. (Available in the
n'(ptil'('mt'l1t that liks b(' opene(\ to crimi- fall, 1971.)
nals who ha\"(' b('('11 subjected to unlawful WESTI:-J, ALA:-J F. Prir.l{(ry and Freedom. New"
t'lellUllllr SUl'\'('i1lanc(' and a Life magazine York, Atheneum, 1970. '"
art ide' consisting or ('x('('rpts of cOl1VC'Tsa. '\'I1EEl.ER, STA:>iTON. On necord: Files and
Lions ll\'erlward thl'ot1gh FBI {'\('nronic sur- Dossiers in AUll'riran Life. New York.
willnnn'. Russell Sage Foundation. 1969.

'It U. S. GOVERNMENT PRINTING OFFICE: 1973 0 - 509- 922

You might also like