Developing Confidential Sources for Criminal and Drug/Narcotics Investigations
DATES: 4/11/2017 through 4/12/2017
INSTRUCTOR(S): David Broadway
LOCATION: Public Agency Training Council Training Center - 5235 Decatur Blvd, Indianapolis, IN 46241
HOTEL: Holiday Inn - Indianapolis, IN 317-856-6200
$89 Double or Single
Identify with PATC to receive discounted room rate. Book Room Online Here
COURSE REGISTRATION FEE: $295.00 Includes all training materials, and a Certificate of Completion.
David Broadway is a thirty-four year retired practitioner in criminal justice. During his career, David served ten years on a local police department in the patrol, detective and K-9 divisions. In 1986, David was selected to be a founding member of Florida’s first Anti-Terrorist and Fugitive Apprehension Bureau with the Florida Department of Law Enforcement (FDLE). While employed at the FDLE, David was assigned as the statewide coordinator of Florida’s Domestic Marijuana Eradication Program (DME). During his tenure in the DME program he developed training programs for the Drug Enforcement Administration (DEA), coordinated statewide conferences and delivered training nationwide for the federal government and state agencies. During this same period, David was certified as an expert witness in state and federal court in marijuana cultivation. After the DME assignment, he served in the Major Drug, Economic and Violent Crime Squads. During the aforementioned assignments, David was selected to work on temporary special security details for governor transition teams, presidential visits and foreign dignitaries. During his law enforcement career, he identified unique avenues to recruit foreign nationals and target populations to assist state and national agencies as confidential sources. Further, he recruited and managed confidential sources and developed and taught a block of instruction for the FDLE academy. A recurring theme in David’s yearly performance review was “has an uncanny ability to develop confidential sources.” David is currently an adjunct professor in the school of criminal justice at Western Carolina University.
Pre-Payment is NOT required to register or attend this seminar
CLICK HERE TO REGISTER FOR THIS SEMINAR
In recent years, technology and intelligence analytical methods available to law enforcement investigators have made headlines. In this age of technical
advancement, it must not be forgotten that crime, whether local, or international terrorism, is committed by humans. The motives of humans are constantly evolving and individual behaviors
cannot be accurately measured or predicted by technology. The effective patrol officer and thorough investigator must learn to integrate the skillful art of influencing people with the
latest technology to build solid cases, uncover criminal behavior and forecast future events.
It is critical for the successful investigator to identify people who are willing, or can be induced, to assist in criminal investigations and who will be acceptable by the courts as well as
the policed public. To become an effective recruiter, the skillful investigator must learn to observe people of all ethnic and socioeconomic backgrounds and become familiar with the issues
and quirks associated with potential sources. At the conclusion of this block of instruction, the attendees will be familiar with the historical use of confidential sources and how lessons
learned apply to modern day policing. The investigator will understand how personality types affect a person’s reasoning to betray others. The investigator will learn how to identify,
approach, recruit, document and manage confidential sources.
- The History of Confidential Sources: This block of instruction focuses on the need for and use of confidential sources throughout history from war time spy
application to criminal investigations. Infamous confidential sources will be examined to include development, use and public perception.
- Legal Issues: This block of instruction will concentrate on the legalities of recruitment, suitability, development of probable cause, payment/rewards,
promises and acceptable behaviors.
- Ethics and the Use of Confidential Sources: This block of instruction will be a precautionary warning for the use of confidential sources and possible
negative public relations.
- Types of Human Intelligence and Assistance: This block of instruction will cover the different types of confidential sources of information and
management issues related to each.
- Threading: This block of instruction will explore this ancient method of understanding human attachment as it relates to modern day inducementsthe
confidential source and warning signs for operatives used during and after deployment.
- Recognizing Personality Traits: This block of instruction will explore different personality traits related to the confidential source’s abilities and
predicted future behaviors.
- Principles of Influence: This block of instruction will list and explain consistency and commitment issues of individuals as it relates to cooperation.
- Motivation and Predictable Behaviors: This block of instruction will examine the “Hierarchy of Needs” and its role in influencing cooperation.
- Identifying the Potential Source: This block of instruction will list traditional areas law enforcement uses to cultivate confidential sources as well as
new avenues created by recent events.
- The Initial Approach and Conversation: This block of instruction will familiarize the attendee with techniques on how to steer a conversation into
providing intelligence and cooperation
- Identifying a Palatable Motivation: This block of instruction will utilize earlier blocks of instruction to identify motivations unique to a target
- Documenting the Confidential Source: During this block of instruction, a documenting packet will be provided to each student. The instructor will then
go line by line emphasizing critical areas. Further covered in this block will be updating the source file and closing policies
- Deploying the Confidential Source: This block of instruction will cover issues concerning risk vs. gain, safety precautions and control of confidential
- Loaning Out the Confidential Source: This block of instruction will cover issues concerning the loaning of your documented source to different agencies
and possible converging policy issues.
- Payments and Rewards: This block of instruction will cover how to make acceptable compensation to confidential sources and creative ways to foster
- High Risk and Long Term Deployments: This block of instruction will cover suitability, logistical needs and cover documents to facilitate a long term
undercover operation. The block will further cover contracts and conditions of release for the high risk confidential source.
- Anticipated Effects on Long Term Undercover Work: The course of study will end with a critical checklist for controlling the confidential source and
warning signs for operatives used during and after deployment.