intelligence based investigation: obstacles and …
TRANSCRIPT
INTELLIGENCE BASED INVESTIGATION:
OBSTACLES AND STRATEGIES USED IN LAW
ENFORCEMENT AGENCIES
BY
KHEN HAN MING
A dissertation submitted in partial fulfilment of the
requirement for the degree of Master of Protective Security
Management
Kulliyyah of Information and Communication Technology
International Islamic University Malaysia
JUNE 2016
ii
ABSTRACT
Intelligence Based Investigation (IBI) is a methodology which is essential in
producing efficiency and effective intelligence for the purposes of open investigations.
The IBI approach not only shortens the completion time of an investigation but also
enables effective pooling of various expertise needed in dealing with complex
investigations to yield positive outcomes in every investigation. Legal scholars,
prominent members of the prosecution, politicians and civil society movement has
protested against the practice of undercover policing as the prime reason for argument
is that there was no adequate legal basis for the systematic use of undercover method,
which could easily infringe the private lives of the citizens. Secondly, IBI has been
argued to be a breach of natural justice as preventive means of deterring a crime does
not substitute the prevention of an actual act of crime as the credibility of information
sources are often questioned since the act of an attack has yet to actually taken place.
Experienced investigators, however, argues that intelligence based investigations
coupled with the implementation of Task Force has proven to be most effective in
most major cases. This dissertation examines the challenges and to explore strategies
used in conducting effective Intelligence Based Investigation within Malaysian law
enforcement agencies with the objective of contributing towards the discipline of
intelligence studies and academic reference to the law enforcement agencies.
iii
البحث ملخصABSTRACT IN ARABIC
إنتاج في عنها غنى لا التي المنهجية هوعلى الاستخبارات التحقيق القائم
لا تقتصر طريقة . المفتوحة التحقيقات لأغراض الفعال والذكاء لكفاءةا
التحقيق وإنما منالتحقيق القائم على الاستخبارات على تقليل وقت الانتهاء
تقوم بالتجميع الفعال للخبرات المتنوعة المطلوبة للتعامل مع التحقيقات
وأعضاء القانونيين الباحثين. المعقدة التي تعطي نتائج إيجابية لكل تحقيق
ممارسة ضد وااحتج المدني المجتمع وحركة والسياسيين النيابة في بارزين
ملائم قانوني أساس يوجد لا أنه للجدال رئيس كسبب السرية الشرطة
حياة بسهولة تنتهك أن يمكن التي السرية، لأسلوب المنهجي للاستخدام
أن طريقة التحقيق القائم على قيل وقد ثانيا، .الخاصة المواطنين
الجريمة لردع وقائية كوسيلة الطبيعية للعدالة خرق يكونالاستخبارات قد
وغالبا المعلومات مصادر كمصداقية للجريمة الفعلي حدوثال منعل بديلا لا
قبل أن تحدث الجريمة بشكل حتى هجومالحقيقي لل فعلال منذ شككت ما
تحقيقات بأن ونيجادل ذلك، ومع الخبرة، ذوي من محققينال .واقعي
معظم في فعالية كثرالأ هأن ثبتأ العمل فرقة تنفيذ إلى استنادا المخابرات
الاستراتيجيات واستكشاف التحديات الأطروحة هذه تبحث .الكبرى القضايا
فرض وكالات في الاستخبارات وبناء فعال تحقيق إجراء في المستخدمة
الاستخباراتية الدراسات نظام في المساهمة بهدف الماليزية القانون
.القانون فرض وكالات إلى العلمية والمراجع
iv
APPROVAL PAGE
I certify that I have supervised and read this study and that in my opinion, it conforms
to acceptable standards of scholarly presentation and is fully adequate, in scope and
quality, as a dissertation for the degree of Master of Protective Security Management.
...............................................................
Jamaludin Ibrahim
Supervisor
I certify that I have read this study and that in my opinion, it conforms to acceptable
standards of scholarly presentation and is fully adequate, in scope and quality, as a
dissertation for the degree of Master of Protective Security Management.
...............................................................
Nurul Nuha Abdul Molok
Examiner
This dissertation was submitted to the Centre for IT Advancement and is accepted as a
fulfilment of the requirement for the degree of Master of Protective Security
Management.
...............................................................
Lili Marziana Abdullah
Head, Centre for IT Advancement
This dissertation was submitted to the Kulliyah of Information and Communication
Technology and is accepted as a fulfilment of the requirement for the degree of Master
of Protective Security Management.
...............................................................
Abdul Wahab Bin Abdul Rahman
Dean, Kulliyyah of Information and
Communication Technology
v
DECLARATION
I hereby declare that this dissertation is the result of my own investigations, except
where otherwise stated. I also declare that it has not been previously or concurrently
submitted as a whole for any other degrees at IIUM or other institutions.
Khen Han Ming
Signature …………………………………… Date ……………………..
vi
COPYRIGHT
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA
DECLARATION OF COPYRIGHT AND AFFIRMATION OF
FAIR USE OF UNPUBLISHED RESEARCH
INTELLIGENCE BASED INVESTIGATION: OBSTACLES AND
STRATEGIES USED IN LAW ENFORCEMENT AGENCIES
I declare that the copyright holder of this dissertation is Khen Han Ming
Copyright © 2016 Khen Han Ming. All rights reserved.
No part of this unpublished research may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording or otherwise without prior written permission of the copyright holder
except as provided below
1. Any material contained in or derived from this unpublished research may
be used by others in their writing with due acknowledgement.
2. IIUM or its library will have the right to make and transmit copies (print
or electronic) for institutional and academic purposes.
3. The IIUM library will have the right to make, store in a retrieved system
and supply copies of this unpublished research if requested by other
universities and research libraries.
By signing this form, I acknowledged that I have read and understand the IIUM
Intellectual Property Right and Commercialization policy.
Affirmed by Khen Han Ming
……..…………………….. ………………………..
Signature Date
vii
ACKNOWLEDGEMENTS
I would never have been able to finish my dissertation without the help of God
Almighty and I would like to express my deepest gratitude to my supervisor, Br.
Jamaludin Ibrahim, for his excellent academic guidance, care, patience, and
motivating me in completing this research.
I would like to thank Dr. Lili and Dr. Nurul Nuha for guiding my research and
helping me to develop my dissertation paper.
My humble appreciation to my mentors, Rahmat Muda and Khairul Azizam
for their endless and untiring support.
Special thanks to Mahendran Sharma Jairam, who as a good friend throughout
all these years, was always willing to help and give his best suggestions. Also to Yasri
D, Dehli R, East O, Wan Z, Harjinder Singh and Gurbinder Singh, as it would have
been a very lonely journey towards accomplishing this research without them.
Many thanks to the officers from the Royal Malaysian Police Special Branch
(SB) and Criminal Investigation Department (CID), Federal Police Headquarters
(Bukit Aman) and Kuala Lumpur Police Contingent Headquarters (IPK Kuala
Lumpur) who participated in this research as it would not have been possible without
their wisdom.
Finally, I would like to dedicate this achievement to my wife, Jaroonsap J and
both my parents, Khen Hock Choon and Kam Chooi Gin for their love and being my
utmost motivation and driving force behind my academic career.
viii
TABLE OF CONTENTS
Abstract ........................................................................................................................ ii
Abstract in Arabic ........................................................................................................ iii
Approval Page .............................................................................................................. iv
Declaration ................................................................................................................... v
Copyright ..................................................................................................................... vi
Acknowledgements ...................................................................................................... vii
List of Tables ............................................................................................................... xi
List of Figures .............................................................................................................. xii
List of Abbreviations ................................................................................................... xiii
CHAPTER ONE: INTRODUCTION ..................................................................... 1 1.1 Background of Study .................................................................................. 1
1.2 Research Problem ....................................................................................... 1
1.3 Research Questions ..................................................................................... 2
1.4 Objectives of Research ............................................................................... 2
1.5 Scope of Study ............................................................................................ 3
1.6 Research Design ......................................................................................... 4
1.7 Chapter Organization .................................................................................. 4
CHAPTER TWO: LITERATURE REVIEW ........................................................ 5 2.1 Fundamental of Intelligence ....................................................................... 5
2.2 History in Malaysia .................................................................................... 6
2.2.1 Preventive Laws as Intelligence Based Legislation .......................... 7
2.2.2 The Salleh System (Conventional Intelligence Policing
System) ............................................................................................. 8
2.2.3 Kent Policing Model and ILP ........................................................... 10
2.2.4 ILP in the United States .................................................................... 12
2.3 Intelligence Based Investigation (IBI) ........................................................ 13
2.3.1 What makes Intelligence Based Investigation (IBI) unique?............ 14
2.3.2 Intelligence for the purpose of law enforcement .............................. 15
2.3.3 The Intelligence Based Investigation Processes, Obstacles and
Strategies .......................................................................................... 16
2.3.4 Tactical Intelligence Based Investigation versus Strategic
Intelligence Based Investigation ....................................................... 17
2.3.5 The Intelligence Based Investigation Process ................................... 17
2.3.6 Direction/ Tasking in Intelligence Based Investigation .................... 18
2.3.7 Collecting process of Intelligence Based Investigation .................... 19
2.3.8 Evaluating and Sanitization Processes in Intelligence Based
Investigation (IBI) ............................................................................ 23
2.3.9 Collation in Intelligence Based Investigation ................................... 27
2.3.10 Data Integration and Analysis in Intelligence Based
Investigation .................................................................................. 27
2.3.11 Dissemination ................................................................................ 30
2.3.12 Re-evaluation ................................................................................ 32
ix
2.4 Intelligence Based Investigation in Royal Malaysian Police
Perspective. ................................................................................................. 32
2.4.1 Tasking and Coordinating Process .................................................... 34
2.4.2 Four Aim of Intelligence Based Investigation Product ..................... 35
2.4.3 Knowledge products of Intelligence ................................................. 36
2.4.4 System Products ................................................................................ 37
2.4.5 Analytical techniques and products in Intelligence Based
Investigation (IBI) ............................................................................ 38
CHAPTER THREE: RESEARCH METHODOLOGY ....................................... 41 3.1 Qualitative Research: Interviews, Observations & Documentary .............. 41
3.1.1 Research question number 1. ............................................................ 43
3.1.2 Research question number 2. ............................................................ 43
3.1.3 Research question number 3. ............................................................ 44
3.1.4 Research question number 4. ............................................................ 44
3.2 Other Factors .............................................................................................. 45
3.2.1 Security and risk ............................................................................... 45
3.2.2 Permissions & privacy factor ........................................................... 45
3.2.3 Research Integrity ............................................................................. 46
3.3 Conclusions ................................................................................................ 46
CHAPTER FOUR: DATA ANALYSIS & FINDINGS ......................................... 47 4.1 Data Analysis .............................................................................................. 47
4.2 Findings ...................................................................................................... 48
4.2.1 Basic Training & Exposure ............................................................... 49
4.2.2 Significance of documentation .......................................................... 50
4.2.3 Source Evaluation ............................................................................. 50
4.2.4 Risk & Implication ............................................................................ 50
4.2.5 Constraints ........................................................................................ 51
4.2.6 Strength of Strategies ........................................................................ 51
4.2.7 Support of Technologies ................................................................... 52
4.3 Research Questions Answered? .................................................................. 52
4.3.1 Research Question 1.......................................................................... 52
4.3.2 Research Question 2.......................................................................... 53
4.3.3 Research Question 3.......................................................................... 54
4.3.4 Research Question 4.......................................................................... 55
CHAPTER FIVE: CONCLUSION ......................................................................... 57 5.1 Introduction ................................................................................................ 57
5.2 Limitation of Research ............................................................................... 58
5.3 Future Research .......................................................................................... 58
5.4 Recommendations ...................................................................................... 59
5.5 Contributions of Research .......................................................................... 60
5.5.1 Significance to Academic Research .................................................. 62
5.5.2 Implication to Practice and Benefits to RMP & other LEAs ............ 62
5.6 Summary ..................................................................................................... 63
REFERENCES ........................................................................................................... 64
xi
LIST OF TABLES
Table 2.1 Comparison of Evaluation of 4 x 4 and 6 x 6 Methods (Ratcliffe,
2007) 26
Table 2.2 Sample handling code explanation 31
Table 2.3 Aim of IBI Product (Authority, 2015) 35
Table 2.4 Analytical techniques and products in IBI (Authority, 2015) 39
Table 3.1 Respondent’s Background 42
Table 4.1 Respondent’s Feedback 48
xii
LIST OF FIGURES
Figure 2.1 Photo of Tun Mohamed Salleh Ismael (Police, 1999) 8
Figure 2.2 Photo of a Meiji-era Japanese koban from Sudo-cho, Tokyo 9
Figure 2.3 Photo of Sir David Philips (Police K., 1993) 11
Figure 2.4 IBI Process (Macdowell, 1997) 18
Figure 2.5 Evaluation Process (Justice Assistance, 2005) 24
Figure 2.6 Handling Codes System (Metscher, 2005) 31
Figure 4.1 Respondent’s Analysis 49
Figure 5.1 Research Benefit 61
xiii
LIST OF ABBREVIATIONS
IBI Intelligence Based Investigation
ILP Intelligence-led Policing
LEA Law Enforcement Agencies
Mens rea Mental state of person must be in while a crime for to be
intentional.
RMP Royal Malaysian Police
Rukun Negara National Principles of Malaysia
UCO Undercover operation
1
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
Intelligence Based Investigation (IBI) is information compiled, analyzed, and/or
disseminated in an effort to anticipate, prevent, or monitor criminal and subversive
activity, which needs to be gathered or collated, analyzed, recorded or reported and
disseminated by law enforcement agencies (LEA) concerning types of crime or
activity, identified criminals and known or suspected criminal groups and subjects of
interest, for example, matters relating to national security (Abdul Aziz, 2009).
Early forms of IBI were introduced in Great Britain in the early 1990’s and are
based on the “Kent Policing Model”. This investigation focuses on the local crimes
depending on the seriousness of the crime and carried out entirely by intelligence unit.
After the completion of the intelligence investigation, all the criminals will be handed
over to the open investigation unit to be prosecuted. The “Kent Policing Model” was
then upgraded to the new USA model. This new USA model is the combination of
intelligence information center and multiple agencies (Justice Assistance, 2005).
1.2 RESEARCH PROBLEM
The implementation of IBI into Malaysian LEA is problematic for several reasons.
Firstly, many agencies do not understand what intelligence is or how to manage it.
Second, agencies must work to prevent and respond to day-to-day crime, while
safeguarding national security interests. Third, the realities of funding and personnel
resources are often obstacles to IBI.
2
With preventive laws being recently abolished and intelligence-based
legislation coming under scrutiny by human rights group and movement, it is the
researcher’s intention to look at the effectiveness of IBI and its current role in law
enforcement application through case studies (Rahmah, 2013).
1.3 RESEARCH QUESTIONS
The researcher is looking forward to closely examine the role of intelligence in the use
of investigations by having a better understanding on the entire intelligence cycle and
how it serves its purpose (Peterson, 1997). The researcher attempts at seeking
enlightenment on the following questions in order to address the research problem:
1. What are the processes used in the development and application of IBI in
Malaysian LEA?
2. What are the approaches used in the implementation of IBI in Malaysian
for LEA?
3. What are the challenges in the implementation of IBI in Malaysian for
LEA?
4. What are the strategies used in the application of IBI in Malaysian for
LEA?
1.4 OBJECTIVES OF RESEARCH
Investigation is one of the most important duties of any LEA. Due to the nature of its
complexity, which at times involving cross border investigations, the adoption of IBI
through intelligence fact gathering as a methodology is essential in producing efficient
and effective intelligence for the purpose of open investigations.
3
The researcher’s intention is to understand how the implementation of the IBI
approach, a component of the Kent Policing Model’s Intelligence-Led Policing (ILP)
strategy, contributes in shortening the completion time of an investigation but also
enables effective pooling of various expertise needed in dealing with complex
investigations to yield positive outcomes in every investigation and how IBI can be
applied to a wide series of domestic and national security threats such as organized
(syndicated) crimes, corruption, espionage and terrorism (Metscher, 2005). This study
embarked on the following purposes:
1. The researcher is interested in understanding and determining what are the
processes used of intelligence and type of information gathered for the
purpose of facilitating an investigation process (Fuentes, 2006).
2. The researcher is interested to explore how investigators process
information gathered for further analysis and utilized as intelligence for
the purpose of crime prevention operations and compliment evidence in
prosecution (Peterson, 1997).
3. The researcher would like to address the challenges faced by Malaysian LEA
in the field of intelligence studies by recommending solutions to enhance
productivity and performance by means of continual improvement, which in
turn also contribute towards the discipline of intelligence studies and to be a
source of academic reference to LEA (Sidhu, 2005).
1.5 SCOPE OF STUDY
The researcher focuses on the process of information collection, analysis and how
processed information is then used as intelligence for investigative purposes. It
4
examines the role of each intelligence cycle processes and significance towards
facilitating an investigation (Innes, Martin & W. E. Sheptycki,James, 2004).
1.6 RESEARCH DESIGN
The researcher uses an empirical research design, since it involves the researcher
going into the field and focusing on personal experience of the participants in this IBI
study. An empirical design is the production of knowledge based on experience or
observation and therefore the researcher only targets intelligence practitioners with
background on information sourcing and analysis (J. Peterson, 2008).
The empirical design provides in-depth details on the study. However, the
design’s limitations are that the results cannot be generalized, since they constitute the
views of individuals, measurements cannot be standardized, and the collection and
analysis of data may be time consuming.
The researcher addressed the limitation through an in-depth literature study on
the topic and believes that an empirical research is one way of gaining better
knowledge with regards to IBI. The empirical research design for this study includes a
thorough literature study and face-to-face interviews with intelligence officers of the
Selangor, Kuala Lumpur Police Contingents and the Federal Police Headquarters
(Jairam, 2015).
1.7 CHAPTER ORGANIZATION
a. Chapter 1: Introduction
b. Chapter 2: Literature Review – Intelligence Based Investigation (IBI)
c. Chapter 3: Research Methodology
d. Chapter 4: Data Analysis & Findings
e. Chapter 5: Conclusions
5
CHAPTER TWO
LITERATURE REVIEW
2.1 FUNDAMENTAL OF INTELLIGENCE
What is the fundamental of intelligence? Intelligence define about data collection and
evaluation of information which is used to mould into intelligence semi product for
further analysis in order to produce complete intelligence products to defend or
support informed decision making wisely. In this paper, the researcher refers to
intelligence as information relevant to a raw information or semi intelligence product
developed based on the process of collecting, collating and data examining for further
dissemination as reliable and important usually describes basic element of ‘5W and
1H’ such as assesses events, area or adversaries and other relevant information as
part of first information report to sustained and allow appropriate action or pro active
task and change of strategies to reach a desired outcome in law enforcement
operations and investigations (Security, 2013).
Hence, before we can properly investigate the information of a subject, an
intelligence element and analytical process in the hypothetical and practical terms, we
need to understand what the terms means are:
i. The link between information and subject.
ii. Understand the sources of information (Dixon, 2010).
iii. Collected information by defining raw intelligence product.
iv. Intelligence is an information that differ by acceptance and capable of
being understood with technical value (Metscher, 2005).
v. Collected information has been assessed based on perspective of source
and reliability factor.
6
vi. Further analysis to be performed on received and collected intelligence for
the main purpose of rectifying or separating the facts of a targeted subject
into its section accordingly.
Hence, by having proper understanding the difference between the terms and
its connection, it is important to note that even at this preliminary stage, the definition
addresses the key variances. Information is basically raw data of any type related to
IBI. On the other hand, intelligence is data which has been evaluated and analyzed,
giving it an added value or significance.
2.2 HISTORY IN MALAYSIA
Malaysia is a multi-racial, multi-religious and multi-cultural which has been exposed
to various types of security threats even before Independence. Over the years, the
federal government has often engaged in domestic intelligence activities of one kind
or another.
The main threat then was that posed by the communists, which forced the then
government to declare an Emergency in 1948. The Emergency ended in 1960. During
that period the country also faced other threats, particularly those from racial and
religious conflicts. Between 1945 and 1957 there were 17 racial incidents as set out in
various parts of the country (Sulaiman Abdul Hadi, Othman Jamilah, Abu Samah
Bahaman, Yero Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).
These threats continued after Independence. The communist threat however
gradually declined and ended on the 2nd of December 1989 when the Malayan
Communist Party (MCP) signed a peace treaty with the Malaysian government in
Hatyai, Thailand. Communal issues and problems, on the other hand, continued and at
7
times led to the outbreak of serious racial disturbances such as the 13th May 1969
incident.
The country has witnessed other significant threats during the 1970’s and
1980’s, alongside with armed communism activities by deviant religious groups
threatening Muslim unity and national security by more subtler means through
subversion, in which deception is inherent. Although such groups were eventually
neutralized over the years, later forms of deviant religious groups started to emerge in
the mid 1990’s to present day through international network of terrorist organizations,
which managed to produce many homegrown terrorists claiming affiliation or support
for such ideologies (Dolnik, 2013).
2.2.1 Preventive Laws as Intelligence Based Legislation
In order to maintain national security and public order, the country enacted various
laws such as the Emergency Ordinances and Regulations made under them, the
Internal Security Act 1960, the Sedition Act 1948, the Societies Act 1966, the Printing
Presses and Publications Act 1984, and ordinary criminal laws.
The Internal Security Act 1960, empower the law enforcement officers to
counteract and hinder any person from acting in a approach of prejudicial to security,
it is a way of maintaining vital services and economic control in Malaysia. Therefore,
the enforcement of Internal Security Act 1960 not only restricted to the communist
threat alone (Sulaiman Abdul Hadi, Othman Jamilah, Abu Samah Bahaman, Yero
Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).
8
2.2.2 The Salleh System (Conventional Intelligence Policing System)
In the Malaysian context, elements of IBI can be traced to post World War II era in
the 1960’s during the time of Armed Communist threat and rising crime.
Figure 2.1 Photo of Tun Mohamed Salleh Ismael (Police, 1999)
In September 1967, the Police Planning and Research Branch has developed
and compiled a new concept called the Salleh System, which was taken in conjunction
with the name of the former Malaysian Inspector General of Police, the late Tun
Mohamed Salleh Ismael.
The Salleh System, modeled after the Japanese Koban System (neighborhood
system) is based upon community oriented policing by implementing the program in
order to eradicate crime by directly engaging the public as a part of the policing
program (Reference, 2012). The Malaysian police operationalize the concept and
added some cultural elements to make it more inclusive. The Salleh System consisted
of police personnel who were trained to be more responsible and portray a plain image
that would be accepted by community.
9
Figure 2.2 Photo of a Meiji-era Japanese koban from Sudo-cho, Tokyo
(Reference, 2012)
The modus operandi for community policing consisted of placing police
officers to each sectors to stay and live as a member of the community, by
assimilating themselves, interact and accepted by other members of the community.
This includes, but not limited to attending community activities and educating the
community about police work, crime prevention and strategies for managing crime
and disorder.
The aim of this model was to enable the police to gather local intelligence and
work with the local community in identifying local problems and act on them by
gaining trust and confidence from their community. With such approach, the police
department could study, analyze and have detailed information about the crime and
disorder situation in their respective areas (Sulaiman Abdul Hadi, Othman Jamilah,
Abu Samah Bahaman, Yero Aliyu, D'Silva Jeffery Lawrence & Ortega Adriana 2014).
The Salleh System was initially implemented in the town of Petaling Jaya in
February 1968. The result of this implementation has significantly reduced crime rate
and instructions for implementation was issued on the 7th
of June 1968 by Police
Force Order in all state contingents nationwide.
10
2.2.3 Kent Policing Model and ILP
ILP in Malaysia was reconstructed from modern policing concepts and strategies has
its roots in the Kent Policing Model, indigenous from Great Britain. The Kent
Constabulary first developed and coined the concept of ‘Intelligence-led Policing’ in
the early to mid 1990s under the leadership of Sir David Philips in response to sharp
increases in property-related offense particularly in burglary and automobile theft at a
time when police budgets were being cut (Authority, 2015).
Based on the information, officials assessed that a relatively small group of
people were responsible for a comparatively large percentage of crimes. They
believed that police officers would be more productive against crime by focusing on
the most obvious number of offenses happening in their jurisdiction. In addition, a
report by the Audit Commission in 1993 recommended that increased use of
intelligence from informants and other sources to effectively mitigate crime would be
effective and efficient with the use of police resources.
In 1993, a team within the Kent Constabulary was tasked with reviewing the
force’s current intelligence gathering resources in light of the Audit Commission’s
findings in order to make recommendations for further improvement. The resulting
document, The Force Intelligence Review, established the framework for what is now
known as the Kent Policing Model. The overriding objective of the model was, and is,
to reduce crime and to increase public safety and it has sparked the most significant
changes in the force’s methods since its founding (Fuentes, 2006).
The review team recommended an intelligence function at the very heart of the
decision making process. Each one of Kent’s nine policing areas would be deployed
with an intelligence unit. These units would be capable of recruiting and handling
informants, while conducting technical and physical surveillance.
11
Figure 2.3 Photo of Sir David Philips (Police K., 1993)
The intelligence provided by these units was instrumental in mitigating
criminal activities and to target serious offenders either through direct police
intervention or by providing actionable intelligence to other regulatory authorities
such as Inland Revenue, Customs and utility companies. While some of the elements
in this new strategy already existed, the challenge was to effectively establish a
method that addressed current and anticipated problems in some comprehensive
manner.
The Kent Policing Model was originally designed to organize service
responses calls by prioritizing calls and directing general non-police services to other
agencies. With this strategy in place, the police were able to better manage their time
and was able to focus their intelligence units to property-related offense in each of the
jurisdiction’s nine service areas. The result was an outstanding 24-percent drop in
crime over the span of 3 years (Barnes, 2013).