Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN


Register for this Seminar | Return to Schedule |

Seminar Title:  
Confidential Sources: Recruiting, Documenting and Managing

DATES:  6/26/2023 through 6/27/2023

INSTRUCTOR(S):  David Broadway

LOCATION:  Hamilton County ESC - 11083 Hamilton Avenue, Cincinnati, OH  45231

HOTEL:  Embassy Suites Cincinnati Northeast Blue Ash - Blue Ash, OH  513-733-8900
Contact Hotel for State Govt. Rate

COURSE REGISTRATION FEE:  $350.00 Includes all training materials, and a Certificate of Completion.

Instructor Bio

David Broadway is a thirty-four year retired practitioner in criminal justice. During his career, David served ten years on a local police department in the patrol, detective and K-9 divisions. In 1986, David was selected to be a founding member of Florida’s first Anti-Terrorist and Fugitive Apprehension Bureau with the Florida Department of Law Enforcement (FDLE). While employed at the FDLE, David was assigned as the statewide coordinator of Florida’s Domestic Marijuana Eradication Program (DME). During his tenure in the DME program he developed training programs for the Drug Enforcement Administration (DEA), coordinated statewide conferences and delivered training nationwide for the federal government and state agencies. During this same period, David was certified as an expert witness in state and federal court in marijuana cultivation. After the DME assignment, he served in the Major Drug, Economic and Violent Crime Squads. During the aforementioned assignments, David was selected to work on temporary special security details for governor transition teams, presidential visits and foreign dignitaries. During his law enforcement career, he identified unique avenues to recruit foreign nationals and target populations to assist state and national agencies as confidential sources. Further, he recruited and managed confidential sources and developed and taught a block of instruction for the FDLE academy. A recurring theme in David’s yearly performance review was “has an uncanny ability to develop confidential sources.” David is currently an adjunct professor in the school of criminal justice at Western Carolina University.

Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.


Course Objectives

In recent years, technology and intelligence analytical methods available to law enforcement investigators have made headlines. In this age of technical advancement, it must not be forgotten that crime, whether local, or international terrorism, is committed by humans. The motives of humans are constantly evolving and individual behaviors cannot be accurately measured or predicted by technology. The effective patrol officer and thorough investigator must learn to integrate the skillful art of influencing people with the latest technology to build solid cases, uncover criminal behavior and forecast future events.

It is critical for the successful investigator to identify people who are willing, or can be induced, to assist in criminal investigations and who will be acceptable by the courts as well as the policed public. To become an effective recruiter, the skillful investigator must learn to observe people of all ethnic and socioeconomic backgrounds and become familiar with the issues and quirks associated with potential sources. At the conclusion of this block of instruction, the attendees will be familiar with the historical use of confidential sources and how lessons learned apply to modern day policing. The investigator will understand how personality types affect a person’s reasoning to betray others. The investigator will learn how to identify, approach, recruit, document and manage confidential sources.

  • The History of Confidential Sources: This block of instruction focuses on the need for and use of confidential sources throughout history from war time spy application to criminal investigations. Infamous confidential sources will be examined to include development, use and public perception.
  • Legal Issues: This block of instruction will concentrate on the legalities of recruitment, suitability, development of probable cause, payment/rewards, promises and acceptable behaviors.
  • Ethics and the Use of Confidential Sources: This block of instruction will be a precautionary warning for the use of confidential sources and possible negative public relations.
  • Types of Human Intelligence and Assistance: This block of instruction will cover the different types of confidential sources of information and management issues related to each.
  • Threading: This block of instruction will explore this ancient method of understanding human attachment as it relates to modern day inducementsthe confidential source and warning signs for operatives used during and after deployment.
  • Recognizing Personality Traits: This block of instruction will explore different personality traits related to the confidential source’s abilities and predicted future behaviors.
  • Principles of Influence: This block of instruction will list and explain consistency and commitment issues of individuals as it relates to cooperation.
  • Motivation and Predictable Behaviors: This block of instruction will examine the “Hierarchy of Needs” and its role in influencing cooperation.
  • Identifying the Potential Source: This block of instruction will list traditional areas law enforcement uses to cultivate confidential sources as well as new avenues created by recent events.
  • The Initial Approach and Conversation: This block of instruction will familiarize the attendee with techniques on how to steer a conversation into providing intelligence and cooperation
  • Identifying a Palatable Motivation: This block of instruction will utilize earlier blocks of instruction to identify motivations unique to a target individual.
  • Documenting the Confidential Source: During this block of instruction, a documenting packet will be provided to each student. The instructor will then go line by line emphasizing critical areas. Further covered in this block will be updating the source file and closing policies
  • Deploying the Confidential Source: This block of instruction will cover issues concerning risk vs. gain, safety precautions and control of confidential sources.
  • Loaning Out the Confidential Source: This block of instruction will cover issues concerning the loaning of your documented source to different agencies and possible converging policy issues.
  • Payments and Rewards: This block of instruction will cover how to make acceptable compensation to confidential sources and creative ways to foster future cooperation.
  • High Risk and Long Term Deployments: This block of instruction will cover suitability, logistical needs and cover documents to facilitate a long term undercover operation. The block will further cover contracts and conditions of release for the high risk confidential source.
  • Anticipated Effects on Long Term Undercover Work: The course of study will end with a critical checklist for controlling the confidential source and warning signs for operatives used during and after deployment.

Register for this Seminar | Return to Schedule |




View Legal Article Archive



Click Here to See Our FAQ!



Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

PATC Mailing List

Public Agency Training Council - 2230 Stafford Road STE 115 PMB 379 - Plainfield, IN 46168 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy