World Library  
Flag as Inappropriate
Email this Article
 

Criminal intelligence

Criminal Intelligence is information compiled, analyzed, and/or disseminated in an effort to anticipate, prevent, or monitor criminal activity.[1][2][3]

The United States Army Military Police defines criminal intelligence in more detail; criminal intelligence is information gathered or collated, analyzed, recorded/reported and disseminated by law enforcement agencies concerning types of crime, identified criminals and known or suspected criminal groups.[4]

It is particularly useful when dealing with surveillance, informants, interrogation, and research, or may be just picked up on the "street" by individual police officers.

Some larger law enforcement agencies have a department, division or section specifically designed to gather disparate pieces of information and develop criminal intelligence. One of the most effective ways of applying criminal intelligence is first to record it (store in a computer system) which can be "mined" (searched) for specific information.

Contents

  • US Army usage 1
  • CRIMINT Process 2
  • Criminal intelligence analysis 3
  • See also 4
  • References 5

US Army usage

Criminal intelligence:

CRIMINT is the result of the collection, analysis, and interpretation of all available information concerning known and potential HUMINT) within the provisions of applicable statutes and regulations. Army law enforcement agencies have the capability to analyze and disseminate collected time-sensitive information concerning a criminal threat against Army interests. The value of such intelligence cannot be overemphasized; it not only serves the purpose of police investigations, it also contributes to the development of countermeasures to safeguard Army personnel, materials, information, and other resources.[5]

CRIMINT Process

The CRIMINT process is effective intelligence results from a series of interrelated activities. The intelligence process is a continuous process of collecting and converting data into intelligence products to be integrated into operations. The process consists of several phases with continuous evaluation and feedback at each phase and at the end of the process. With the minor modification of adding “reporting” to the second phase, the following text outlines the intelligence process as discussed in Army Regulation (AR) 525-13.

  • CRIMINT planning and directing.
  • CRIMINT collection and reporting.
  • CRIMINT processing.
  • Analysis and production.
  • Dissemination and integration.[5]

Criminal intelligence analysis

Criminal intelligence analysis has been recognized by law enforcement as a useful support tool for over twenty-five years and is successfully used within the international community. International organizations, such as the International Police (INTERPOL), European Police (EUROPOL) and the International Criminal Tribunal for the former Yugoslavia (ICTY), and while there are many definitions of Criminal Intelligence Analysis in use throughout the world, the one definition agreed in June 1992 by an international group of twelve European INTERPOL member countries and subsequently adopted by other countries is as follows:

The identification of and provision of insight into the relationship between crime data and other potentially relevant data with a view to police and judicial practice.[6]

As such, criminal intelligence is a more intense or specific application towards investigations than criminology.

See also

References

  1. ^ Department of Justice (DOJ), National Criminal Intelligence Sharing Plan (2003). Retrieved from https://fas.org/irp/agency/doj/ncisp.pdf
  2. ^ International Association of Chiefs of Police (IACP) Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing At the Local, State and Federal Levels (2002). Retrieved from http://www.ncirc.gov/documents/public/supplementaries/intel_sharing_report.pdf
  3. ^ International Association of Chiefs of Police (IACP) National Law Enforcement Policy Center (2003). Retrieved from http://www.ojp.usdoj.gov/BJA/topics/CI_Paper_0703.pdf
  4. ^ Field Manual (FM) 3-19.50 Police Intelligence Operations (2006). Retrieved from https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/22739-1/FM/3-19.50/chap4.htm;jsessionid=2Dp2J7GTSyJPCJpXR821z1Mvh17s0z9VsGLgtBMJLwv2DTyngKbZ!99557122
  5. ^ a b FM 3-19.13 LAW ENFORCEMENT INVESTIGATIONS
  6. ^ International Police (INTERPOL) (2010). Retrieved from http://www.interpol.int/Public/cia/default.asp
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 


Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.