intelligence based investigation: obstacles and …

24
INTELLIGENCE BASED INVESTIGATION: OBSTACLES AND STRATEGIES USED IN LAW ENFORCEMENT AGENCIES BY KHEN HAN MING A dissertation submitted in partial fulfilment of the requirement for the degree of Master of Protective Security Management Kulliyyah of Information and Communication Technology International Islamic University Malaysia JUNE 2016

Upload: others

Post on 24-Feb-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

INTELLIGENCE BASED INVESTIGATION:

OBSTACLES AND STRATEGIES USED IN LAW

ENFORCEMENT AGENCIES

BY

KHEN HAN MING

A dissertation submitted in partial fulfilment of the

requirement for the degree of Master of Protective Security

Management

Kulliyyah of Information and Communication Technology

International Islamic University Malaysia

JUNE 2016

ii

ABSTRACT

Intelligence Based Investigation (IBI) is a methodology which is essential in

producing efficiency and effective intelligence for the purposes of open investigations.

The IBI approach not only shortens the completion time of an investigation but also

enables effective pooling of various expertise needed in dealing with complex

investigations to yield positive outcomes in every investigation. Legal scholars,

prominent members of the prosecution, politicians and civil society movement has

protested against the practice of undercover policing as the prime reason for argument

is that there was no adequate legal basis for the systematic use of undercover method,

which could easily infringe the private lives of the citizens. Secondly, IBI has been

argued to be a breach of natural justice as preventive means of deterring a crime does

not substitute the prevention of an actual act of crime as the credibility of information

sources are often questioned since the act of an attack has yet to actually taken place.

Experienced investigators, however, argues that intelligence based investigations

coupled with the implementation of Task Force has proven to be most effective in

most major cases. This dissertation examines the challenges and to explore strategies

used in conducting effective Intelligence Based Investigation within Malaysian law

enforcement agencies with the objective of contributing towards the discipline of

intelligence studies and academic reference to the law enforcement agencies.

iii

البحث ملخصABSTRACT IN ARABIC

إنتاج في عنها غنى لا التي المنهجية هوعلى الاستخبارات التحقيق القائم

لا تقتصر طريقة . المفتوحة التحقيقات لأغراض الفعال والذكاء لكفاءةا

التحقيق وإنما منالتحقيق القائم على الاستخبارات على تقليل وقت الانتهاء

تقوم بالتجميع الفعال للخبرات المتنوعة المطلوبة للتعامل مع التحقيقات

وأعضاء القانونيين الباحثين. المعقدة التي تعطي نتائج إيجابية لكل تحقيق

ممارسة ضد وااحتج المدني المجتمع وحركة والسياسيين النيابة في بارزين

ملائم قانوني أساس يوجد لا أنه للجدال رئيس كسبب السرية الشرطة

حياة بسهولة تنتهك أن يمكن التي السرية، لأسلوب المنهجي للاستخدام

أن طريقة التحقيق القائم على قيل وقد ثانيا، .الخاصة المواطنين

الجريمة لردع وقائية كوسيلة الطبيعية للعدالة خرق يكونالاستخبارات قد

وغالبا المعلومات مصادر كمصداقية للجريمة الفعلي حدوثال منعل بديلا لا

قبل أن تحدث الجريمة بشكل حتى هجومالحقيقي لل فعلال منذ شككت ما

تحقيقات بأن ونيجادل ذلك، ومع الخبرة، ذوي من محققينال .واقعي

معظم في فعالية كثرالأ هأن ثبتأ العمل فرقة تنفيذ إلى استنادا المخابرات

الاستراتيجيات واستكشاف التحديات الأطروحة هذه تبحث .الكبرى القضايا

فرض وكالات في الاستخبارات وبناء فعال تحقيق إجراء في المستخدمة

الاستخباراتية الدراسات نظام في المساهمة بهدف الماليزية القانون

.القانون فرض وكالات إلى العلمية والمراجع

iv

APPROVAL PAGE

I certify that I have supervised and read this study and that in my opinion, it conforms

to acceptable standards of scholarly presentation and is fully adequate, in scope and

quality, as a dissertation for the degree of Master of Protective Security Management.

...............................................................

Jamaludin Ibrahim

Supervisor

I certify that I have read this study and that in my opinion, it conforms to acceptable

standards of scholarly presentation and is fully adequate, in scope and quality, as a

dissertation for the degree of Master of Protective Security Management.

...............................................................

Nurul Nuha Abdul Molok

Examiner

This dissertation was submitted to the Centre for IT Advancement and is accepted as a

fulfilment of the requirement for the degree of Master of Protective Security

Management.

...............................................................

Lili Marziana Abdullah

Head, Centre for IT Advancement

This dissertation was submitted to the Kulliyah of Information and Communication

Technology and is accepted as a fulfilment of the requirement for the degree of Master

of Protective Security Management.

...............................................................

Abdul Wahab Bin Abdul Rahman

Dean, Kulliyyah of Information and

Communication Technology

v

DECLARATION

I hereby declare that this dissertation is the result of my own investigations, except

where otherwise stated. I also declare that it has not been previously or concurrently

submitted as a whole for any other degrees at IIUM or other institutions.

Khen Han Ming

Signature …………………………………… Date ……………………..

vi

COPYRIGHT

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

DECLARATION OF COPYRIGHT AND AFFIRMATION OF

FAIR USE OF UNPUBLISHED RESEARCH

INTELLIGENCE BASED INVESTIGATION: OBSTACLES AND

STRATEGIES USED IN LAW ENFORCEMENT AGENCIES

I declare that the copyright holder of this dissertation is Khen Han Ming

Copyright © 2016 Khen Han Ming. All rights reserved.

No part of this unpublished research may be reproduced, stored in a retrieval system,

or transmitted, in any form or by any means, electronic, mechanical, photocopying,

recording or otherwise without prior written permission of the copyright holder

except as provided below

1. Any material contained in or derived from this unpublished research may

be used by others in their writing with due acknowledgement.

2. IIUM or its library will have the right to make and transmit copies (print

or electronic) for institutional and academic purposes.

3. The IIUM library will have the right to make, store in a retrieved system

and supply copies of this unpublished research if requested by other

universities and research libraries.

By signing this form, I acknowledged that I have read and understand the IIUM

Intellectual Property Right and Commercialization policy.

Affirmed by Khen Han Ming

……..…………………….. ………………………..

Signature Date

vii

ACKNOWLEDGEMENTS

I would never have been able to finish my dissertation without the help of God

Almighty and I would like to express my deepest gratitude to my supervisor, Br.

Jamaludin Ibrahim, for his excellent academic guidance, care, patience, and

motivating me in completing this research.

I would like to thank Dr. Lili and Dr. Nurul Nuha for guiding my research and

helping me to develop my dissertation paper.

My humble appreciation to my mentors, Rahmat Muda and Khairul Azizam

for their endless and untiring support.

Special thanks to Mahendran Sharma Jairam, who as a good friend throughout

all these years, was always willing to help and give his best suggestions. Also to Yasri

D, Dehli R, East O, Wan Z, Harjinder Singh and Gurbinder Singh, as it would have

been a very lonely journey towards accomplishing this research without them.

Many thanks to the officers from the Royal Malaysian Police Special Branch

(SB) and Criminal Investigation Department (CID), Federal Police Headquarters

(Bukit Aman) and Kuala Lumpur Police Contingent Headquarters (IPK Kuala

Lumpur) who participated in this research as it would not have been possible without

their wisdom.

Finally, I would like to dedicate this achievement to my wife, Jaroonsap J and

both my parents, Khen Hock Choon and Kam Chooi Gin for their love and being my

utmost motivation and driving force behind my academic career.

viii

TABLE OF CONTENTS

Abstract ........................................................................................................................ ii

Abstract in Arabic ........................................................................................................ iii

Approval Page .............................................................................................................. iv

Declaration ................................................................................................................... v

Copyright ..................................................................................................................... vi

Acknowledgements ...................................................................................................... vii

List of Tables ............................................................................................................... xi

List of Figures .............................................................................................................. xii

List of Abbreviations ................................................................................................... xiii

CHAPTER ONE: INTRODUCTION ..................................................................... 1 1.1 Background of Study .................................................................................. 1

1.2 Research Problem ....................................................................................... 1

1.3 Research Questions ..................................................................................... 2

1.4 Objectives of Research ............................................................................... 2

1.5 Scope of Study ............................................................................................ 3

1.6 Research Design ......................................................................................... 4

1.7 Chapter Organization .................................................................................. 4

CHAPTER TWO: LITERATURE REVIEW ........................................................ 5 2.1 Fundamental of Intelligence ....................................................................... 5

2.2 History in Malaysia .................................................................................... 6

2.2.1 Preventive Laws as Intelligence Based Legislation .......................... 7

2.2.2 The Salleh System (Conventional Intelligence Policing

System) ............................................................................................. 8

2.2.3 Kent Policing Model and ILP ........................................................... 10

2.2.4 ILP in the United States .................................................................... 12

2.3 Intelligence Based Investigation (IBI) ........................................................ 13

2.3.1 What makes Intelligence Based Investigation (IBI) unique?............ 14

2.3.2 Intelligence for the purpose of law enforcement .............................. 15

2.3.3 The Intelligence Based Investigation Processes, Obstacles and

Strategies .......................................................................................... 16

2.3.4 Tactical Intelligence Based Investigation versus Strategic

Intelligence Based Investigation ....................................................... 17

2.3.5 The Intelligence Based Investigation Process ................................... 17

2.3.6 Direction/ Tasking in Intelligence Based Investigation .................... 18

2.3.7 Collecting process of Intelligence Based Investigation .................... 19

2.3.8 Evaluating and Sanitization Processes in Intelligence Based

Investigation (IBI) ............................................................................ 23

2.3.9 Collation in Intelligence Based Investigation ................................... 27

2.3.10 Data Integration and Analysis in Intelligence Based

Investigation .................................................................................. 27

2.3.11 Dissemination ................................................................................ 30

2.3.12 Re-evaluation ................................................................................ 32

ix

2.4 Intelligence Based Investigation in Royal Malaysian Police

Perspective. ................................................................................................. 32

2.4.1 Tasking and Coordinating Process .................................................... 34

2.4.2 Four Aim of Intelligence Based Investigation Product ..................... 35

2.4.3 Knowledge products of Intelligence ................................................. 36

2.4.4 System Products ................................................................................ 37

2.4.5 Analytical techniques and products in Intelligence Based

Investigation (IBI) ............................................................................ 38

CHAPTER THREE: RESEARCH METHODOLOGY ....................................... 41 3.1 Qualitative Research: Interviews, Observations & Documentary .............. 41

3.1.1 Research question number 1. ............................................................ 43

3.1.2 Research question number 2. ............................................................ 43

3.1.3 Research question number 3. ............................................................ 44

3.1.4 Research question number 4. ............................................................ 44

3.2 Other Factors .............................................................................................. 45

3.2.1 Security and risk ............................................................................... 45

3.2.2 Permissions & privacy factor ........................................................... 45

3.2.3 Research Integrity ............................................................................. 46

3.3 Conclusions ................................................................................................ 46

CHAPTER FOUR: DATA ANALYSIS & FINDINGS ......................................... 47 4.1 Data Analysis .............................................................................................. 47

4.2 Findings ...................................................................................................... 48

4.2.1 Basic Training & Exposure ............................................................... 49

4.2.2 Significance of documentation .......................................................... 50

4.2.3 Source Evaluation ............................................................................. 50

4.2.4 Risk & Implication ............................................................................ 50

4.2.5 Constraints ........................................................................................ 51

4.2.6 Strength of Strategies ........................................................................ 51

4.2.7 Support of Technologies ................................................................... 52

4.3 Research Questions Answered? .................................................................. 52

4.3.1 Research Question 1.......................................................................... 52

4.3.2 Research Question 2.......................................................................... 53

4.3.3 Research Question 3.......................................................................... 54

4.3.4 Research Question 4.......................................................................... 55

CHAPTER FIVE: CONCLUSION ......................................................................... 57 5.1 Introduction ................................................................................................ 57

5.2 Limitation of Research ............................................................................... 58

5.3 Future Research .......................................................................................... 58

5.4 Recommendations ...................................................................................... 59

5.5 Contributions of Research .......................................................................... 60

5.5.1 Significance to Academic Research .................................................. 62

5.5.2 Implication to Practice and Benefits to RMP & other LEAs ............ 62

5.6 Summary ..................................................................................................... 63

REFERENCES ........................................................................................................... 64

x

APPENDIX A: RESPONDENT’S QUESTION FORM ........................................ 67

xi

LIST OF TABLES

Table ‎2.1 Comparison of Evaluation of 4 x 4 and 6 x 6 Methods (Ratcliffe,

2007) 26

Table 2.2 Sample handling code explanation 31

Table ‎2.3 Aim of IBI Product (Authority, 2015) 35

Table ‎2.4 Analytical techniques and products in IBI (Authority, 2015) 39

Table ‎3.1 Respondent’s Background 42

Table 4.1 Respondent’s Feedback 48

xii

LIST OF FIGURES

Figure ‎2.1 Photo of Tun Mohamed Salleh Ismael (Police, 1999) 8

Figure ‎2.2 Photo of a Meiji-era Japanese koban from Sudo-cho, Tokyo 9

Figure ‎2.3 Photo of Sir David Philips (Police K., 1993) 11

Figure ‎2.4 IBI Process (Macdowell, 1997) 18

Figure ‎2.5 Evaluation Process (Justice Assistance, 2005) 24

Figure ‎2.6 Handling Codes System (Metscher, 2005) 31

Figure 4.1 Respondent’s Analysis 49

Figure ‎5.1 Research Benefit 61

xiii

LIST OF ABBREVIATIONS

IBI Intelligence Based Investigation

ILP Intelligence-led Policing

LEA Law Enforcement Agencies

Mens rea Mental state of person must be in while a crime for to be

intentional.

RMP Royal Malaysian Police

Rukun Negara National Principles of Malaysia

UCO Undercover operation

1

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDY

Intelligence Based Investigation (IBI) is information compiled, analyzed, and/or

disseminated in an effort to anticipate, prevent, or monitor criminal and subversive

activity, which needs to be gathered or collated, analyzed, recorded or reported and

disseminated by law enforcement agencies (LEA) concerning types of crime or

activity, identified criminals and known or suspected criminal groups and subjects of

interest, for example, matters relating to national security (Abdul Aziz, 2009).

Early forms of IBI were introduced in Great Britain in the early 1990’s and are

based on the “Kent Policing Model”. This investigation focuses on the local crimes

depending on the seriousness of the crime and carried out entirely by intelligence unit.

After the completion of the intelligence investigation, all the criminals will be handed

over to the open investigation unit to be prosecuted. The “Kent Policing Model” was

then upgraded to the new USA model. This new USA model is the combination of

intelligence information center and multiple agencies (Justice Assistance, 2005).

1.2 RESEARCH PROBLEM

The implementation of IBI into Malaysian LEA is problematic for several reasons.

Firstly, many agencies do not understand what intelligence is or how to manage it.

Second, agencies must work to prevent and respond to day-to-day crime, while

safeguarding national security interests. Third, the realities of funding and personnel

resources are often obstacles to IBI.

2

With preventive laws being recently abolished and intelligence-based

legislation coming under scrutiny by human rights group and movement, it is the

researcher’s intention to look at the effectiveness of IBI and its current role in law

enforcement application through case studies (Rahmah, 2013).

1.3 RESEARCH QUESTIONS

The researcher is looking forward to closely examine the role of intelligence in the use

of investigations by having a better understanding on the entire intelligence cycle and

how it serves its purpose (Peterson, 1997). The researcher attempts at seeking

enlightenment on the following questions in order to address the research problem:

1. What are the processes used in the development and application of IBI in

Malaysian LEA?

2. What are the approaches used in the implementation of IBI in Malaysian

for LEA?

3. What are the challenges in the implementation of IBI in Malaysian for

LEA?

4. What are the strategies used in the application of IBI in Malaysian for

LEA?

1.4 OBJECTIVES OF RESEARCH

Investigation is one of the most important duties of any LEA. Due to the nature of its

complexity, which at times involving cross border investigations, the adoption of IBI

through intelligence fact gathering as a methodology is essential in producing efficient

and effective intelligence for the purpose of open investigations.

3

The researcher’s intention is to understand how the implementation of the IBI

approach, a component of the Kent Policing Model’s Intelligence-Led Policing (ILP)

strategy, contributes in shortening the completion time of an investigation but also

enables effective pooling of various expertise needed in dealing with complex

investigations to yield positive outcomes in every investigation and how IBI can be

applied to a wide series of domestic and national security threats such as organized

(syndicated) crimes, corruption, espionage and terrorism (Metscher, 2005). This study

embarked on the following purposes:

1. The researcher is interested in understanding and determining what are the

processes used of intelligence and type of information gathered for the

purpose of facilitating an investigation process (Fuentes, 2006).

2. The researcher is interested to explore how investigators process

information gathered for further analysis and utilized as intelligence for

the purpose of crime prevention operations and compliment evidence in

prosecution (Peterson, 1997).

3. The researcher would like to address the challenges faced by Malaysian LEA

in the field of intelligence studies by recommending solutions to enhance

productivity and performance by means of continual improvement, which in

turn also contribute towards the discipline of intelligence studies and to be a

source of academic reference to LEA (Sidhu, 2005).

1.5 SCOPE OF STUDY

The researcher focuses on the process of information collection, analysis and how

processed information is then used as intelligence for investigative purposes. It

4

examines the role of each intelligence cycle processes and significance towards

facilitating an investigation (Innes, Martin & W. E. Sheptycki,James, 2004).

1.6 RESEARCH DESIGN

The researcher uses an empirical research design, since it involves the researcher

going into the field and focusing on personal experience of the participants in this IBI

study. An empirical design is the production of knowledge based on experience or

observation and therefore the researcher only targets intelligence practitioners with

background on information sourcing and analysis (J. Peterson, 2008).

The empirical design provides in-depth details on the study. However, the

design’s limitations are that the results cannot be generalized, since they constitute the

views of individuals, measurements cannot be standardized, and the collection and

analysis of data may be time consuming.

The researcher addressed the limitation through an in-depth literature study on

the topic and believes that an empirical research is one way of gaining better

knowledge with regards to IBI. The empirical research design for this study includes a

thorough literature study and face-to-face interviews with intelligence officers of the

Selangor, Kuala Lumpur Police Contingents and the Federal Police Headquarters

(Jairam, 2015).

1.7 CHAPTER ORGANIZATION

a. Chapter 1: Introduction

b. Chapter 2: Literature Review – Intelligence Based Investigation (IBI)

c. Chapter 3: Research Methodology

d. Chapter 4: Data Analysis & Findings

e. Chapter 5: Conclusions

5

CHAPTER TWO

LITERATURE REVIEW

2.1 FUNDAMENTAL OF INTELLIGENCE

What is the fundamental of intelligence? Intelligence define about data collection and

evaluation of information which is used to mould into intelligence semi product for

further analysis in order to produce complete intelligence products to defend or

support informed decision making wisely. In this paper, the researcher refers to

intelligence as information relevant to a raw information or semi intelligence product

developed based on the process of collecting, collating and data examining for further

dissemination as reliable and important usually describes basic element of ‘5W and

1H’ such as assesses events, area or adversaries and other relevant information as

part of first information report to sustained and allow appropriate action or pro active

task and change of strategies to reach a desired outcome in law enforcement

operations and investigations (Security, 2013).

Hence, before we can properly investigate the information of a subject, an

intelligence element and analytical process in the hypothetical and practical terms, we

need to understand what the terms means are:

i. The link between information and subject.

ii. Understand the sources of information (Dixon, 2010).

iii. Collected information by defining raw intelligence product.

iv. Intelligence is an information that differ by acceptance and capable of

being understood with technical value (Metscher, 2005).

v. Collected information has been assessed based on perspective of source

and reliability factor.

6

vi. Further analysis to be performed on received and collected intelligence for

the main purpose of rectifying or separating the facts of a targeted subject

into its section accordingly.

Hence, by having proper understanding the difference between the terms and

its connection, it is important to note that even at this preliminary stage, the definition

addresses the key variances. Information is basically raw data of any type related to

IBI. On the other hand, intelligence is data which has been evaluated and analyzed,

giving it an added value or significance.

2.2 HISTORY IN MALAYSIA

Malaysia is a multi-racial, multi-religious and multi-cultural which has been exposed

to various types of security threats even before Independence. Over the years, the

federal government has often engaged in domestic intelligence activities of one kind

or another.

The main threat then was that posed by the communists, which forced the then

government to declare an Emergency in 1948. The Emergency ended in 1960. During

that period the country also faced other threats, particularly those from racial and

religious conflicts. Between 1945 and 1957 there were 17 racial incidents as set out in

various parts of the country (Sulaiman Abdul Hadi, Othman Jamilah, Abu Samah

Bahaman, Yero Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).

These threats continued after Independence. The communist threat however

gradually declined and ended on the 2nd of December 1989 when the Malayan

Communist Party (MCP) signed a peace treaty with the Malaysian government in

Hatyai, Thailand. Communal issues and problems, on the other hand, continued and at

7

times led to the outbreak of serious racial disturbances such as the 13th May 1969

incident.

The country has witnessed other significant threats during the 1970’s and

1980’s, alongside with armed communism activities by deviant religious groups

threatening Muslim unity and national security by more subtler means through

subversion, in which deception is inherent. Although such groups were eventually

neutralized over the years, later forms of deviant religious groups started to emerge in

the mid 1990’s to present day through international network of terrorist organizations,

which managed to produce many homegrown terrorists claiming affiliation or support

for such ideologies (Dolnik, 2013).

2.2.1 Preventive Laws as Intelligence Based Legislation

In order to maintain national security and public order, the country enacted various

laws such as the Emergency Ordinances and Regulations made under them, the

Internal Security Act 1960, the Sedition Act 1948, the Societies Act 1966, the Printing

Presses and Publications Act 1984, and ordinary criminal laws.

The Internal Security Act 1960, empower the law enforcement officers to

counteract and hinder any person from acting in a approach of prejudicial to security,

it is a way of maintaining vital services and economic control in Malaysia. Therefore,

the enforcement of Internal Security Act 1960 not only restricted to the communist

threat alone (Sulaiman Abdul Hadi, Othman Jamilah, Abu Samah Bahaman, Yero

Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).

8

2.2.2 The Salleh System (Conventional Intelligence Policing System)

In the Malaysian context, elements of IBI can be traced to post World War II era in

the 1960’s during the time of Armed Communist threat and rising crime.

Figure 2.1 Photo of Tun Mohamed Salleh Ismael (Police, 1999)

In September 1967, the Police Planning and Research Branch has developed

and compiled a new concept called the Salleh System, which was taken in conjunction

with the name of the former Malaysian Inspector General of Police, the late Tun

Mohamed Salleh Ismael.

The Salleh System, modeled after the Japanese Koban System (neighborhood

system) is based upon community oriented policing by implementing the program in

order to eradicate crime by directly engaging the public as a part of the policing

program (Reference, 2012). The Malaysian police operationalize the concept and

added some cultural elements to make it more inclusive. The Salleh System consisted

of police personnel who were trained to be more responsible and portray a plain image

that would be accepted by community.

9

Figure 2.2 Photo of a Meiji-era Japanese koban from Sudo-cho, Tokyo

(Reference, 2012)

The modus operandi for community policing consisted of placing police

officers to each sectors to stay and live as a member of the community, by

assimilating themselves, interact and accepted by other members of the community.

This includes, but not limited to attending community activities and educating the

community about police work, crime prevention and strategies for managing crime

and disorder.

The aim of this model was to enable the police to gather local intelligence and

work with the local community in identifying local problems and act on them by

gaining trust and confidence from their community. With such approach, the police

department could study, analyze and have detailed information about the crime and

disorder situation in their respective areas (Sulaiman Abdul Hadi, Othman Jamilah,

Abu Samah Bahaman, Yero Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).

The Salleh System was initially implemented in the town of Petaling Jaya in

February 1968. The result of this implementation has significantly reduced crime rate

and instructions for implementation was issued on the 7th

of June 1968 by Police

Force Order in all state contingents nationwide.

10

2.2.3 Kent Policing Model and ILP

ILP in Malaysia was reconstructed from modern policing concepts and strategies has

its roots in the Kent Policing Model, indigenous from Great Britain. The Kent

Constabulary first developed and coined the concept of ‘Intelligence-led Policing’ in

the early to mid 1990s under the leadership of Sir David Philips in response to sharp

increases in property-related offense particularly in burglary and automobile theft at a

time when police budgets were being cut (Authority, 2015).

Based on the information, officials assessed that a relatively small group of

people were responsible for a comparatively large percentage of crimes. They

believed that police officers would be more productive against crime by focusing on

the most obvious number of offenses happening in their jurisdiction. In addition, a

report by the Audit Commission in 1993 recommended that increased use of

intelligence from informants and other sources to effectively mitigate crime would be

effective and efficient with the use of police resources.

In 1993, a team within the Kent Constabulary was tasked with reviewing the

force’s current intelligence gathering resources in light of the Audit Commission’s

findings in order to make recommendations for further improvement. The resulting

document, The Force Intelligence Review, established the framework for what is now

known as the Kent Policing Model. The overriding objective of the model was, and is,

to reduce crime and to increase public safety and it has sparked the most significant

changes in the force’s methods since its founding (Fuentes, 2006).

The review team recommended an intelligence function at the very heart of the

decision making process. Each one of Kent’s nine policing areas would be deployed

with an intelligence unit. These units would be capable of recruiting and handling

informants, while conducting technical and physical surveillance.

11

Figure 2.3 Photo of Sir David Philips (Police K., 1993)

The intelligence provided by these units was instrumental in mitigating

criminal activities and to target serious offenders either through direct police

intervention or by providing actionable intelligence to other regulatory authorities

such as Inland Revenue, Customs and utility companies. While some of the elements

in this new strategy already existed, the challenge was to effectively establish a

method that addressed current and anticipated problems in some comprehensive

manner.

The Kent Policing Model was originally designed to organize service

responses calls by prioritizing calls and directing general non-police services to other

agencies. With this strategy in place, the police were able to better manage their time

and was able to focus their intelligence units to property-related offense in each of the

jurisdiction’s nine service areas. The result was an outstanding 24-percent drop in

crime over the span of 3 years (Barnes, 2013).