Upload
unisa-za
View
0
Download
0
Embed Size (px)
Citation preview
2008
Crime Intelligence Investigations of organised crime syndicates involved in
illegal narcotic distribution and trade
Copy Right Andrew Fordred 2
TOPIC
An analytical view of the value of crime intelligence in intelligence-led investigations of
organised crime syndicates involved in illegal narcotic distribution and trade.
THE PROBLEM
Crime intelligence is an intense and complex process however, it has undeniably been
successful in intelligence led investigations against specific crimes. Though, crime
intelligence takes place over a long period of time and it often depends on the patience of
the crime intelligence client to allow it to perform and even when it does perform success
can vary. This applied to the concept of organised crime activities which in itself suffers
from a firm definition world wide and thus when applying crime intelligence to identity and
individualise organised crime illegal activities, organised crime groups, individual
members and modus operandi the complexity of the situation is increased. Only too
often, organised crime suffers from the ‘shifting sand’ phenomena, this is due to a lack of
a firm globally accepted definition, which further enhances the difficulty for crime
intelligence to formulate an attack strategy.
RESEARCH AIM
Intelligence-led investigations have a specific objective whereas forensic investigations
may be used in the investigation of every crime that is perpetrated and is not restricted to
its scope or purpose. The aim of this research will be to analyse the value of crime
intelligence and applicability of intelligence-led investigations into the illegal narcotic trade
and distribution by organised crime syndicates in concert with embryonic crime mapping
and analysis enhancing crime intelligence capabilities for forensic investigations and
proactive police prevention strategies.
Copy Right Andrew Fordred 3
1. INTRODUCTION
A supporting means to forensic investigations is crime intelligence, which is, evaluated in
this research as to its utilisation against organised crime syndicates in their illegal trade
and distribution of narcotics. With most organised crime activities, forensic investigations
ultimately investigate the result on their illegal activities whereas crime intelligence breaks
the shackles of secrecy on which or should it be said within, on which it is so reliant for its
progression. Therefore, crime intelligence is able lay the foundation to predict illegal
activities, the locations of such and who will be involved. All things considered crime
intelligence remains embryonic, as it has by no means reached its full potential. In
addition, organised crime has a capricious nature even though it portraits structure and a
system of management, this nature it has to adopt in its continuous attempt to remain
elusive.
While this research is not a study of the history of either crime intelligence or organised
crime, nevertheless for the purpose of this research the origins of crime intelligence
seems to have taken some official starting point in United States of America (U.S.) in
1920’s when a rudimentary crime intelligence system was established to investigate
organised crime (Carter 2005:51). Where relevant historical references are made.
Research has been restricted to crime intelligence models of primarily of the USA and
United Kingdom (UK) who have obtained leadership in this matter and secondary on
Australia, Canada and European countries where relevant, drawstring with initiatives
back to Southern Africa, primarily South Africa (SA). In addition, while organised crime
syndicates (syndicate/group in this context viewed as the same) transact a number of
criminal acts, in this context it has been limited to illegal trade and distribution of
narcotics. Focus is on organised crime syndicates in Southern Africa, but drawing on
reference and examples of the global phenomena. Gangs per se for the purpose of this
discussion are viewed as a separate entity and referred to accordingly.
Copy Right Andrew Fordred 4
2. DEFINITIONS
Forensic investigation is a systematic and scientific search method for facts in the
form of direct or indirect evidence to deal with crime management and to individualise
the suspected criminal.
2.1. Crime Intelligence
Maguire and John (1995:16) define it as follows:
“Criminal intelligence can be said to be the end product of a process often complex,
sometimes physical, and always intellectual, derived from information which has been
collated, analysed and evaluated in order to prevent crime or secure the apprehension
of offenders.”
2.2. Organised Crime
Peter Gastrow in his introduction to Penetrating state and business: Organised crime in
Southern Africa (ISS 2003:3) cites the UN Convention Against Transnational Organised
Crime (the Palermo Convention) the following definition was presented:
‘Organized criminal group’ shall mean a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences established in accordance with this Convention, in order to obtain, directly or indirectly, a financial or other material benefit;
‘Serious crime’ shall mean conduct constituting an offence punishable by a maximum deprivation of liberty of at least four years or a more serious penalty;
‘Structured group’ shall mean a group that is not randomly formed for the immediate commission of an offence and that does not need to have formally defined roles for its members, continuity of its membership or a developed structure…
3. ORGANISED CRIME, WHAT IS IT?
3.1. A hypothesis
The definition of organised crime amongst crime researchers and criminologists remains
inconsistent (Morris 1998:1; Paoli 2001:14; Criminal Networks, Criminal Enterprises
2002; Cloete & Stevens 1990:161) and at best has obtained a sense of acceptance
(Institute of Security Studies (ISS) Organised Crime in the SADC Region Police
Perceptions monograph 60, 2001, chapter 2 Survey Methodology).
Hobbs in Street Gangs and Organised Crime (2004:2, 3) essay for University of Cape
Town (UCT), reports the numerous countries South Africa included, found the above
definition ambiguous and vague. Hobbs continues in citing the South African Police
Services definition as:
Copy Right Andrew Fordred 5
Organised crime [is] the systematic commissioning of crimes motivated by a craving for profit and/or power” (stated in Standing 2003). Modern organised crime groups are “fluid and flexible and can quickly adapt themselves to meet new opportunities, challenges and risks.
Levi and Maguire (2004:399 & 459) are of a similar opinion that definitional debate will
continue, however add, based on the Translation Organised Crime Convention
signatories, that organised crime is:
two or more people are involved in continuing significant illegal activities, irrespective of national boundaries;
such a group is capable of defending its members, enterprises or profits and to this end, may use violence, coercion or corruption; and
than £1 million of criminal proceeds have been generated by a grouping which has both core and peripheral members
Three issues are noted in this definition which are fundamental in setting organised crime
apart from other traditional crimes a) borders are not the limitation to the criminal activity
b) there is an aspect of protection to the criminal activity and c) considerable financial
revenue obtained from the criminal avenue.
Cloete and Stevens (1990:161) define organised crime as:
Organised crime includes any group of individuals whose primary activity involves violating criminal law to seek illegal profits and power by engaging in racketeering activities and, when appropriate, engaging in intricate financial manipulations.
The authors allude to the word ‘power’ and in their explanation of organised crime
activities, the inference is there is a form of authority and intimidation in the protection of
criminal activities within this context.
Paoli (2001:14) cites Block and Chambliss’ definition of organised crime:
Organized crime [should] be defined as (or perhaps better limited to) those illegal activities involving the management and co-ordination of racketeering and vice. Organised crime is thus considered a synonym of illegal enterprise. If this definition is accepted, it is obvious that illegal drug production and trafficking, in Russia as anywhere else, represents a form of organised crime.
Another important aspect is illustrated “the management and coordination” as with the
terminology organised this must go hand-in-hand. (own emphasis)
Dowling (1974:206) also submits that a satisfactory definition for organised crime is
lacking as to the broad scope of organised crime activity but however, considers the
following operational description:
Criminal Business: organised crime finds itself involved in a number of
activities, structures and organisations, and people
Copy Right Andrew Fordred 6
Continuing Conspiracy: seen as a primary feature of organised crime is the
continued relationship between the perpetrators which sets itself apart form
other criminal activities and therefore, perpetrators collect to act in concert and
in support of the perpetration of crime forming an organised crime infrastructure
Hierarchical Structure: within the organised crime structure there is a
hierarchical structure of people arranged into a rank system, which allows for
authority of selected persons by others and the rank system is either on a
formal or informal basis.
Nevala and Aromaa (2003:16) for research purposes make use of the following definition:
Organised crime comprises of repeated (systematic) acts of purposefully co-ordinated criminal activities (and activities supporting these acts), where actors are criminal groups or organisations (largely with a multiple-level vertical organisational structure) whose main goal as to attain the maximum illegal profit while minimising the risk (ensured via contacts in decisive social structures).
In the Organised Crime Project (OCP) of the New Zealand Police (NZP) (1999:10) while
completing its own research made use of the following definition:
Organised crime constitutes two or more persons engaged in continuing illegal activities for some purpose, irrespective of national boundaries.
The authors above admit while the definition provided simplicity it fell short of identifying
other criminal groupings, which should be included in a broader definition, and the
complex nature of organised crime.
Annette Hübschle in Unholy alliance? Assessing the links between organised criminals
and terrorists in Southern Africa (2004) to the ISS defines organised crime as:
Activities of organised criminal groups consisting of three or more persons who commit serious crimes over a period of time for profit.
The above definition falls far short and is totally inadequate and while the context of the
paper offers a chilling aspect of future crime through its association with terrorism,
nonetheless, Hübschle continues in citing Gastrow:
Organised crime consists of those serious criminal offences committed by a criminal organisation, which is based on a structured association of more than two persons acting in concert over a prolonged period of time in pursuit of both their criminal objectives and profits.
Therefore, for the purposes of this discussion and research organised crime is defined
as:
Copy Right Andrew Fordred 7
Organised crime is the proliferation of criminal commerce and racketeering maintained over a prolonged period of time through a continued membership of criminal associates with a configuration of vertical authority levels under leadership control with the primary objective of pursuing and protecting of illegal activities unrestricted by geographically boundaries.
This definition incorporates essential aspects thus distinguishing it from other crimes:
a) Criminal commerce: repeated illegal sources of financial revenue or other
reward, including investment in ventures or in procurement of illegal items.
b) Prolonged period of time: eliminates any criminal transaction that is casual.
c) Continued membership: the ongoing relationship even though as suited by
certain criminal syndicates come together for a period of time of a criminal
undertaking in a specific location, thereafter disseminating as John Grobler
describes in his chapter entitled Namibia in Penetrating state and business:
Organised crime in Southern Africa (2003:22), the issue at hand, the
membership coming together is prearranged and reliant (even ad hoc) on a
continued relationship, despite it being between one or more allied syndicates.
This proposed relationship/membership negates the amount of members to a
structure before it can be an organised crime syndicate as 1 person cannot
have a membership to themselves and if a repeat offender of any sort they are
considered a serial offender (Pistorius 2005). On the other hand as with the
Richardson brothers (Nash 1992:334, 335) they were a two man criminal
enterprise.
d) Criminal associates: the infrastructure of criminal membership (Cloete &
Stevens 1990:164).
e) Vertical authority: a system of echelon, coordination and discipline applied to
the individuals within the infrastructure
f) Leadership: a leader or leaders in overall command (a board of directors) of the
infrastructure (Cloete & Stevens 1990:164), which provide inter alia planning,
set objectives and goals, determines regulation and authority (Paoli 2001:14),
and methods of operation. One could even consider the word ‘conspiracy’
appropriate here.
g) Pursuing and protection: the development and repetition of criminal enterprises
(Nevala & Aromaa 2003:16) that in turn feed the criminal commerce and
Copy Right Andrew Fordred 8
protection (Levi & Maguire 2004:399) of the criminal commerce or racketeering
through intimidation, violence, corruption and other means against law
enforcement agencies, rival syndicates, non-cooperative communities or any
other threat to the criminal enterprise.
h) Geographical boundaries: organised crime syndicates forward their activities
beyond provincial and national boundaries.
While other crimes to some point have similar aspects what sets them apart is the
continuation of activities through planning and the protection of activities and organised
crime is not bound to one operational area. Organised crime, further out of protection
and development of its activities, is prone to infiltrate legal businesses and government
structures (Cloete & Stevens 1990:162), and a number of syndicates such as the
Colombian cartels and Canadian groups employed highly trained individuals to conduct
both intelligence and counter intelligence operations against law enforcement agencies
(Levi & Maguire 2004:44, 459; Criminal Intelligence Service Canada, Annual Report on
Organized Crime in Canada 2001).
On the other hand commercial crimes are established out of existing legitimate
business infrastructure organised crime in contrast develops new crime in
demand of a market, commercial crimes further lack the type of “protection” that
organised crime is reliant on even though corruption of public officials has
occurred, it is not to the extent and means that organised crime will endeavour
to perform.
3.2. Organised crime has a global effect
There is no doubt that organised crime is a global phenomena and a generalist
statement would be to assume that every country of the world has been touched by
organised crime in one way or another, may also be a matter for additional research. It
is important to note that all organised crime syndicates venture to increase and develop
their markets and will not stop at the point of origin. Furthermore, it is interesting that
organised crime assume the identity, nationality or persona of their country of origin
such as:
American Mafia though originated out of Sicily, Italy and almost franchised
itself in America, always maintained its ties back to its origins and the Mafia
established itself in the U.S.A. based on its original Italian structures and
Copy Right Andrew Fordred 9
traditions (Nash 1992:264-267 and Shelley 1994:665-667) with its members
being mostly Italian of birth and the varying groups being family based.
Chinese Triads in The Changing Face of Organized Crime in New Jersey
(2004:60, 61) also operate Tongs, originate from the Chinese mainland and
Hong Kong, the most prominent of these secret societies is the 14K with a
membership of in excess of 80000 members and claimed to be the most
powerful Triad today (Nash 1992:462), the Great Circle Triad is Hong Kong
based and responsible for heroin trade into Belgium and the Netherlands, the
Taiwanese triad the United Bamboo of Taiwan with an apparent membership
of between 10000 and 15000 members involved in drug smuggling and money
laundering operations. In Criminal Intelligence Service Canada, Annual
Report on Organized Crime in Canada 2001, reports on the Chinese Triads in
Canada who are responsible for heroin smuggling operations. Stander
(2005:8) presents the existence of Chinese Triads involved in the illegal
narcotic trade in South Africa and in particular with the gangs of the Cape flats,
Steinberg (2005:4) concurs with this notion.
The Colombian Cartels no less a significant feature of organised crime even
after the much publicised law enforcement actions in the 1990’s, however, the
Cali cartel being one of the most powerful cartels under the previous
leadership of the Rodriguez Orejuela bothers and the supreme Medellin cartel
under the leadership of Pablo Escobar (Cadena 2003:48, 49; Nash 1992:280,
282-283). Cadena (2003:47) further submits that the Colombian cartels
modelled themselves on the Mafia structures and were predominantly family
based, nevertheless they remain formidably today, U.S. Department of Justice,
National Drug Intelligence Centre, National Drug Threat Assessment 2006
(2006:i)
Nigerian syndicates are growing in prominence in Africa. They originally
established themselves when the oil price declined so in the 1970’s the impact
on Nigerian oil trade forced individuals to seek alternative sources of income
with a number turning to crime. Levi and Maguire (2004:430, 439) report of
incidents of Nigerian syndicates being involved in vehicle theft from the United
Kingdom, Irish (2005:1) attributed the development of the illegal narcotics
Copy Right Andrew Fordred 10
trade to inter alia Nigerian syndicates. Steinberg (2005:3, 6) agrees with this
and their ever-increasing prominence in the illicit narcotic trade (Mashele
2005:3) together with the well reported incidences of so-called drug mauls,
individuals who are recruited to smuggle narcotics from South Africa to other
international destinations. The very reason the mauls or couriers are recruited
is due to the fact there is a belief in the syndicates they will be able to “bypass”
courier profilers of law enforcement agencies who monitor incoming foreign
nationals who could be suspected of being involved in the illegal smuggling of
narcotics.
Japanese Yakuza were established in the 1600’s (Nash 1992:410, 411)
originally as Japan’s “Robin Hoods” however, over time they progressed into
highly sophisticated organised crime syndicates (Evans 2002:10) with about
90000 members in Japan where it is legal to belong to a criminal organisation,
in addition, the headquarters of the Yakuza is known to all and members wear
lapels in public identifying themselves as such. It is however, their activities
that are not legal and their criminal enterprise is based (Evans 2002:11) on
extortion, prostitution, illegal narcotic dealings and gambling. Levi and
Maguire (2004:459) refer to an instance when the Yakuza had a contract to
sell flowers to Japanese airlines for a price well in excess of normal
commercial prices.
The above list is far from an all detailed list of international organised crime
syndicates as there are numerous which could be the topic of alternative research in
particular the differentiating modus operandi of each of the syndicates, however, the
intention of the list is to provide the extent of diversity, international prominence and
flavour, and enormity of their existence. One must by no means be caught in the
simplicity that these organised syndicates are not highly efficient and ruthless
operating forces with a continued threat of violence, with murder not being any less
applied (Miró 2003:9; The Changing Face of Organized Crime in New Jersey
(2004:41); Criminal Intelligence Service Canada, Annual Report on Organized Crime
in Canada 2001; LeBeuf 2001:35; Lee 1991:6).
3.3. Crime participation
Copy Right Andrew Fordred 11
Organised crime syndicates follow the money hence will partake in the primary crime
of demand, and will commit crimes that feed and develop the criminal commerce
seeking maximum profits, Gastrow (1998:40, 43, 44); Levi and Maguire (2004:400,
431), however it must be said that the illegal narcotic and drug trade is highly
lucrative Miró (2003:5); Evans (2003:13); The Changing Face of Organized Crime in
New Jersey (2004:29); Criminal Intelligence Service Canada, Annual Report on
Organized Crime in Canada 2001. However, there seems to be some rival revenue
through fraud networks and obtaining finances on false credit claims. Other crimes
are additions and may assist the primary crime and assault, corruption, murder are
often carried out in protection of the primary criminal activity and to enforce payment
for “services” on the other hand extortion is used to both protect the criminal
commerce but also to maximise profits from the local community which is then
applied as a enforcement method to keep the community under control (Morris
1998:8; The Changing Face of Organized Crime in New Jersey 2004:31; Levi &
Maguire 2004:400), it is no less frequent from South Africa and the SADC region, as
reported by Goredema (2005:4) and Goredema in Zimbabwe (2003:4); Mashele
(2005:5); Nkala (2003:67); Irish and Qhobosheane in South Africa (2003:87). Other
crimes such as money laundering could be termed as a product of the primary crimes
to lessen the quantities of cash in possession of the syndicates and its individual
members, for this reason a number of syndicates attempt to legitimise their income
by investing in legal businesses (Cloete and Stevens 1990:164).
3.4. The illegal trade and distribution of narcotics
As Swanson et al. (1988:524) explains the reasons and substantiation for the
explosive spread of illegal narcotic distribution would be the subject of additional
research particularly focussed on the distribution factors. The “distribution chain” is
largely dependent on the narcotic type and the distribution system, (Dowling
1979:202) narcotics will be brought into the country via a courier or smuggler and
packages, (The Changing Face of Organized Crime in New Jersey 2004:34, 35)
which is then sold to a number of distributors (Miró 2003:6) who forward it onto the
clients/users etc. Naudé and Stevens (1988:156, 157) propose the dealing in
narcotics operates the same way as any legal commercial enterprise – there is a
producer, wholesaler, the retailer and consumer with the only exception that the
Copy Right Andrew Fordred 12
revenue of narcotic transactions are not subject to tax deductions thus, the
government is deprived of an income source. In this process again dependent on the
drug, it is further diluted (Swanson et al. 1988:535) i.e. divided and mixed with similar
non-narcotic substances to increase its volume for increased sales and profit, this is
also known as “cutting”, this further provides an identification opportunity due to
methods and contents applied to the mix (Evans 2003:13). Therefore, in the ongoing
investigation of organised crime syndicates, it is crucial the distribution system is
identified with urgency (Swanson et al. 1988:550, 551) to trace it back to origin of the
narcotics this applies to both to a narcotic appearing for the first time or ongoing
illegal narcotic trade and its extent being monitored continuously. Often this is where
the investigation or intelligence operation commences, as the previous existence of
the narcotic was unknown making its appearance in a particular area, on other
occasions, the courier is apprehended which exposes the activity.
4. CRIME INTELLIGENCE
4.1. Describe Crime Intelligence in further detail
The Devon & Cornwall Constabulary procedure guideline Handling Intelligence refers to
a number of categories of intelligence; nominal intelligence, vehicle intelligence, modus
operandi intelligence, business intelligence, crime intelligence and custody intelligence.
The purpose of this discussion will focus on crime intelligence.
The South African National Strategic Intelligence Act No. 39 of 1994 defines Crime
Intelligence as:
“intelligence used in the prevention of crime or to conduct criminal investigations
and to prepare evidence for the purpose of law enforcement and the prosecution
of offenders”.
Read with paragraph (xiv) of the act:
“National Intelligence estimate: means the product of the process of considering
and weighing the possibilities, probabilities and facts disclosed by national
security intelligence with regard to any situation, and of drawing conclusions from
such possibilities, probabilities and facts”.
Copy Right Andrew Fordred 13
According to Ratcliffe (2003:2) exact definitions of crime intelligence in intelligence-led
investigations are rare however, make use of the following definition:
Targeting offenders (especially the targeting of active criminals through overt
and covert means)
Management of crime and disorder hotspots
Investigation of linked series of crimes or incidents
The application of preventative measures, including working with local
partnerships to reduce crime and disorder
A South African Police (SAP) Crime Intelligence Services (CIS) training document
Voorligting t.o.v. Navorsingingsmetodiek describes crime intelligence as:
“Intelligence research is the processing of information in an objective and
scientific manner to serve to the client, forewarning to act proactively and to meet
the objectives of the organisation. This process includes problem identification,
evaluation, interpretation and prediction and distribution”.
These descriptions bring the element of forewarning or advanced warning into context
and Zinn (2002:38) offers the description of crime intelligence based on the Directorate
of Intelligence and Detection at Scotland Yard, London as:
“a continuous cycle, which consists of different steps with regard to information
namely;
Gathering, Evaluation, Development, Analysis, Further development,
Dissemination, Action and the recycling of information”
This description points to the elements of the crime intelligence cycle, however, Zinn
continues to describe the process of crime intelligence is the collation of small
fragments of information pieced together to form a solid depiction.
International Association of Chiefs of Police Model Policy: Crime Intelligence (2003:1)
define crime intelligence as:
“Criminal Intelligence. Information compiled, analyzed and/or disseminated in an
effort to anticipate, prevent, or monitor criminal activity”.
Cope (2004:190) simply puts it as:
“Intelligence can be understood as information developed to direct police action”.
4.2. Crime intelligence typologies
Copy Right Andrew Fordred 14
Strategic Intelligence and Tactical Intelligence must be provided for to offer a
complete understanding of the intelligence process, International Association of
Chiefs of Police Model Policy: Crime Intelligence (2003:1) present:
“Strategic Intelligence. Information concerning existing patterns or emerging
trends of criminal activity designed to assist in criminal apprehension and crime
control strategies, for both short- and long-term investigative goals.”
Tactical Intelligence. Information regarding a specific criminal event that can be
used immediately by operational units to further a criminal investigation, plan
tactical operations and provide for officer safety.”
A number of other authors also refer to the above, the essential component in the
understanding of the differentiation is Tactical Intelligence (also known as Operational
Intelligence) has a shorter time span of usefulness or “shelf life” and often utilised in
entrapment operations, raids and arrests e.g. the location of a suspect on the run is
tactical intelligence. Strategic Intelligence on the other hand has a longer life span and
is used as an overall strategy when dealing with specific scenarios i.e. the arrest of a
particular suspect will not be beneficial to overall investigation as it would only offer a
warning to the main culprits who either have yet to be located or sufficient evidence
compiled to bring them to court. In terms of intelligence led investigations a
combination of the two are utilised. However, Zinn (2002:44) cites Tonry and Morris
that crime intelligence has three forms:
Prospective intelligence (future directed): based on target selection crime
intelligence is collected in response to a predicted crime or dilemma. The
crime intelligence will include a hypothesis of the “origin, appearance and
tendency” of the dilemma i.e. the perpetrators and crime typology is identified
and a police response plan is formulated to counter the dilemma.
Retrospective intelligence: this is background intelligence of arrested
perpetrators regarding previous convictions or current similar cases against
them and is based on fingerprint records, previous conviction records, traffic a
violations etc.
Applied intelligence: this is the linking of known perpetrators to known crimes
through available evidence such forensic evidentiary material and deductive
work supporting a link to the suspect based on time, place, opportunity and
Copy Right Andrew Fordred 15
motive to crime. This is also known as forensic intelligence will be discussed
below.
Similarly Quarmby (2003:4) speaks of four intelligence product categories:
Basic (background) intelligence: reference nature intelligence on issues that
have already occurred, historical and similar to retrospective intelligence.
Estimative intelligence: envisaged predictions setting out probable future
scenarios based on analysis of the developed applied law enforcement
strategies and their implications
Current intelligence: the status of a current scenario of illicit activity, criminal
threat, events, environmental conditions or indicated events.
Warning intelligence: closes the gap between estimative and current
intelligence by offering a warning of criminal threats against lawful interests and
provides sufficient time to frame a response.
While Quarmby’s breakdown can be understood with warning intelligence and
Tonry & Morris’ prospective intelligence being the same however, Quarmby’s
estimative intelligence is presumably based on analysis of situations rather than
fact.
4.3. The difference between crime information and intelligence
Information is gathered in various stages taken through a process to deliver an
intelligence product, that being it has several packets of information of one issue, are
“glued” together through an evaluation process similar to that of the intelligence cycle
(will be discussed below) similar to that described by International Association of
Chiefs of Police Model Policy: Crime Intelligence (2003:1), Cope (2003:16), Dowling
(1979:208), Innes et al. (2005:42), Maguire and John (1995:24), Zinn (2002:38),
therefore simply put; “raw” information collected goes through a process of analysis
and evaluation which produces crime intelligence.
4.4. The crime intelligence cycle
Crime intelligence ‘process’ is a continued cycle (Innes et al. 2005:43, Zinn 2002:38)
through which information is placed to ultimately produce intelligence and this
process has been broken up.
The following illustration on page16 of the crime intelligence cycle is described and
based on SAP CIS training document Voorligting t.o.v. Navorsingsmetodiek:
Copy Right Andrew Fordred 16
Crime Intelligence Cycle
Gathering/collection Relevance of information received
Purpose of investigation
Evaluation The reliability of the source i.e. a repeat source and accuracy of information delivered in the
past or a new source reliability and accuracy is unknown
Information is reliable based on the source and compared against other similar information
and unknown new information
Collation Packaging of information with other items of similar information for processing
Integration New information in perspective with existing
Forms a stable picture
New trends established
Relevance
Development Valid conclusions
Consequential
Links to independent occurrences
Direct and indirect reasons of events and activities
Meaning to information
Analysis Identify all facts separate facts from meanings, interpretations, threats, promises and
subjective deductions etc.
All facts of the situation described
Are facts new, old or additional
Source reliability and origin of information
Complete information – including who, when, what, why, with and how
Identification of subjects, persons, trends, groups
Language corrections
Classification
Re-development Including predictions
Dissemination Security of information
Timely for alerts
Accurate and complete
Copy Right Andrew Fordred 17
Relevant
Action New reports generated as a result
Feedback on intelligence supplied
Planning, organisation, response and resource allocations
Re-evaluation
4.5. Crime analysis
Swanson et al. (1988:163) claim that crime analysis was established in the early 1900’s
by New Scotland Yard, England police when they found that modus operandi linked
similar perpetrated crimes together. The State Intelligence Branch (SIB) of the South
Australia Police (SAPol) (Saywell & Bawden 2000:2; Read & Oldfield 1995:v) crime
analysis includes:
Crime Patterns: the nature and distribution of crime within an area.
Crime Trends: significant changes, new clusters and emerging trends in a
specific area’s crime pattern.
Crime Clusters: groups of crimes linked through similar characteristics, such
as Modus Operandi, time, day and targets.
Crime Series: crimes with common offenders.
While some authors and researchers may argue that crime analysis is a modern
development according to Read and Oldfield (1995:iii-v,1) it is not and as presented
above, it covers a broad area of circumstances, information collection, interpretation
and usability and a number of methods are a form of crime analysis for example case
analysis established the events prior, during and after a serious offense and crime
pattern analysis discover the scale of a particular type of crime within a designated
area. Naudé and Stevens (1988:21,22) further support this theory as it acts as crime
prevention tool when the following is considered:
Types of crimes committed
The extent and the crime pattern in a specific environment
Social and physical characteristics of the environment
Methods to be applied to reduce opportunities for crime
Copy Right Andrew Fordred 18
Therefore, with certain crime assuming a particular pattern in a particular area, and based
on modus operandi, this information after analysis certain predictions can be made and
crime countered (Naudé & Stevens 1998:119). Cloete and Stevens (1990:137) concur
that in specific environments crime may be predicted from analysed data and should the
environment be changed it may lead to the reduction in crime, this obviously adds value
to the intelligence process this leading to intelligence-led policing (Innes et al. 2005:41)
and that effectively crime analysis utilises both open and closed sources of information
whereas police intelligence makes use of informers and police database information
which is confidential or covert operations (Botha Covert Gathering of Information
1996:89). Chainey and Smith (2006:1) in their study discuss Geographical Information
Systems commonly known by its abbreviation GIS, which is based on shared information
to reduce crime and social disorder. However, Read and Oldfield (1995:45, 46) point out
the important Trevi definition of crime analysis which divides crime analysis into two
components being strategic that includes the formation of a crime predicament image and
a long term counter is developed to reduce the crime problem, and operational
endeavours to present information collected during the course of a particular investigation
such as identification between the event and the suspects, highlight additional information
requirements and unsubstantiated or unverified. The Trevi definition divides this into 8
forms of analysis:
Strategic Analysis Operational Analysis
Crime Pattern
Analysis:
Attempts to form a picture of particular
crimes in terms of typology, extent and
area
Case Analysis: Establishes the events prior, during
and after a serious offence, this
includes all aspects of the offence.
General Profile
Analysis:
This focuses on the particular
characteristics of the perpetrator of
specific crimes.
Comparative Case
Analysis:
Focuses on similarities between
offences to link a perpetrator or group
of perpetrators.
Crime Control
Methods Analysis:
A review of previously utilised police
methods in previous police actions and
to assess their usefulness in future
operations.
Offender Group
Analysis:
A compilation of all available
information about an individual
perpetrator in police records to
connect them to specific crimes
Specific Offender
Analysis:
This is the hypothetical image of the
perpetrator based on information
found at the crime scene, this is
offender profiling
Copy Right Andrew Fordred 19
Investigation Analysis: The study and evaluation of
information pertaining to an
investigation to complete the
investigation and identify courses of
action not utilised
This in turn achieves; analysis of volume crime, violent crime, illicit drugs and organised
crime and assists in identifying crime trends, clusters, series and patterns, hence a
crime threat profile aiding operational police in areas such as targeting ‘hot spots’,
geographical profiling and predictive assessments. In terms of investigating organised
crime, incidents of illegal narcotic trade may be monitored and traced back to selected
organised crime syndicates, thus, providing crime intelligence to the investigation
process.
4.6. The objectives of crime intelligence
The objectives may be associated with both strategic and operational intelligence. It
must be understood the crime intelligence is utilised as there is no other methods to
combat or terminate a particular criminal dilemma and is usually of covert nature, Botha
Covert Gathering of Information (1996:89) terms it as:
“the employment of people (informers, infiltrators and police traps) and methods
(observation and pursuit) under clandestine circumstances to obtain criminalistic
information”.
Dowling (1979:208) refers to it as an investigative technique of organised crime, and
due to the continuous conspiratorial nature of organised crime, it is important the
intelligence files are maintained containing information of relationships between the
individual perpetrators, their activities etc.
The International Association of Chiefs of Police Model Policy: Crime Intelligence view
the mission of crime intelligence as:
“to gather information from all sources in a manner consistent with the law and to analyze that information to provide tactical and/or strategic intelligence on the existence, identities, and capabilities of criminal suspects and enterprises generally and, in particular, to further crime prevention and enforcement objectives/priorities identified by this agency.”
SAPCIS Orientation of Agents training document sets the objectives as:
Copy Right Andrew Fordred 20
To determine if a crime is being planned or committed – this is fundamental in
reference to organised crime syndicates who are responsible for illegal narcotic
trade
To determine the infrastructure of the criminal syndicate – i.e. the echelon of
seniority and leadership
Identify who is planning, organising and implementing the criminal act
Locate contraband and stolen property
To establish timing for raids, searches and arrests
Remove contraband and stolen property from the illegal market
Immobilise suspects
Develop cooperation of individuals in the community or criminal network
Locate and collect evidence for court.
4.7. Forensic intelligence
Ribaux et al. (2006:172) provide a notable definition of Forensic Intelligence:
“forensic intelligence is the accurate, timely and useful product of logically
processing (analysis of ) forensic case data (information) for investigation and/or
intelligence purposes”.
And Ribaux et al. continues:
“This definition points to how the collection, collation, interpretation and dissemination
of forensic case data can support investigation and broader intelligence programs”.
4.8. Covert sources of information for crime intelligence
Within the context of covert collection in combating illicit drug trade of organised crime
syndicates, the following sources would be available to provide secreted information:
4.8.1. Informers
4.8.2. Infiltration agents and human intelligence sources
4.8.3. Entrapment investigations
4.8.4. Physical surveillance and observation
4.8.5. Hidden cameras
4.8.6. Hidden microphones in a room which transmit to a receiver and recorder;
commonly known as room bugging
4.8.7. Recording of telephone conversations; known as telephone taps
Copy Right Andrew Fordred 21
4.8.8. Cell phone monitoring and surveillance i.e. locating a subject
4.8.9. Body taps i.e. an eavesdropping device is concealed on the body of a person
which transmits discussions to a receiver and recorder or the recorder is
hidden on the person
4.8.10. Bank accounts monitoring of transactions in and out of the account
4.8.11. Financial records
4.8.12. Analysis of finances e.g. income versus expenditure does the subject not
have the income to support high living standard
4.8.13. Garbology: searching or digging through a subject's refuse and rubbish they
discard from which information may be collected about the subject
4.8.14. Fax interception
4.8.15. Computer hacking including e-mail interception and web surfing
4.8.16. Travel movement e.g. passport control or airline bookings
4.8.17. Published articles and press releases in terms of high profile subjects
4.8.18. Medical records
It has to be said that the above is a formidable arsenal to provide the investigation
team with options of primary information sources.
4.9. Open sources of information
Numerous open sources are available to the intelligence operation and there is a
greater shift towards utilising them, which consist of public and unclassified
information obtained from government and corporate sources, publications,
databases and all media, and the ever growing Internet resources. This information
includes academic research and reports (Criminal Intelligence Service Canada,
Annual Report on Organized Crime in Canada 2001). It is however, important that
any information obtained from open sources is evaluated against investigation and
other intelligence information (intelligence cycle) to establish its relevancy and
importance.
4.10. Databases information
As most government, corporate and private institutes capture and retain information
in computerised databanks, makes the searching and retrieving of information less
Copy Right Andrew Fordred 22
problematic and quicker. Dienstein (1974:46-50) provides a list of databases similar
as:
Banks and credit companies: maintain databases of personal banking and
credit transactions of individuals, this is particularly important with regard to
money laundry investigations and falls under the Financial Intelligence Act.
Department of Agriculture: licensed food packers are registered with them,
import and export information regarding specific traders, permits and
applications
Civil Aviation Administration: registered aircraft and pilots, data of airports,
permits issued
Credit Information: maintain a financial profile on individuals and there
financial credibility
Crime Information Analysis Centre: maintains databases of all reported and
investigated crime and utilisation of the Crime Administration System (CAS)
Criminal Record Bureau: holds criminal records of all convicted persons
Department of Home Affairs: birth and death registrations, passport issues,
immigration, visas issued and resident permits etc.
Licensing: information of liquor applications and registrations
Medical practises and doctors: patient history and treatment information
Hospitals: will hold information of all admissions and treatments
Hotels: hold information on their databases of registered guests, date of
check-in and departure, telephone calls to and from the room, credit
information and residential information
Public records: court records of civil litigation and other records, divorce,
property ownerships, legal contracts
Telkom: registered phone uses and directory, telephone usage, calls made
and received etc.
Traffic Department: National Road Traffic Institute Services (NARTIS)
database which lists all licensed drivers and registered vehicles
Richards (1999) offers a similar summary, the importance of the above databases is
for verification of other information obtained i.e. a suspect may be selling liquor from
Copy Right Andrew Fordred 23
a particular premise and it may be verified whether such an individual has a license
for such, or when attempting to trace and link suspects or criminal associates various
databases may provide residential information or other location details. Travel as
recorded on passport databases may be used to question a suspect or obtain a
statement, or plan pro-active counter enforcement measures.
4.11. Information from arrested or convicted suspects
Both arrested and convicted suspects especially within any organised crime framework,
must always be exploited for information, Fyfe and Sheptycki (2005:16,17,23) offer a
breakdown of European countries who provide for some for leniency for suspects assist
in investigations leading to the arrest of associates involved in criminal offences, they
continue by referring to the Northern Ireland experience of suspects who supplied
information in return for immunity from prosecution. Gastrow and Mosse (2002:21) also
relate to the investigation of organised crime in Mozambique where arrested suspects
led investigators to organised crime kingpins, Irish (2005:7) claims that it is standard
procedure for any person arrested for attempting smuggle stolen vehicles out of South
Africa to be handed over to SAPS crime intelligence for questioning, and it is not
uncommon to ‘turn’ an arrested suspect and use them as an informant, Maguire and
John (1995:28) agree with this notion, however, caution that it is yet to become an
accepted modus operandi, but that investigators did obtain ‘pieces’ of information from
arrested suspects. Zinn (2002:18,41) focuses on obtaining intelligence from convicted
and imprisoned suspects of vehicle hi-jackings, further emphasises that, additional
intelligence may be gleaned from arrested and convicted suspects.
5. CRIME INTELLIGENCE USED TO LEAD INVESTIGATIONS
5.1. Criminal Intelligence as prevention or cure
While the answer of this particular question may lie in detail in further research, it
is however, important to briefly understand the effectiveness and shortcomings of
crime intelligence through its correct utilisation. In context, referring to crime
analysis and in particular Read and Oldfield (1995:45) the Trevi definition
provides for exposing crime by area, typology, modus operandi, frequency etc.
which in turn allows for the development of policing strategies to counter high
volume crime phenomena (Read & Oldfiled 1995:1, 2) and in addition, may be
Copy Right Andrew Fordred 24
included in crime intelligence objectives to target specific perpetrators and/or
criminal groups Botha Covert Gathering of Information (1996:89), Dowling
(1979:208), International Association of Chiefs of Police Model Policy: Crime
Intelligence (2001:1) who further claim crime intelligence focuses on inter alia
patterns and intentions of criminal groups, and in reference to definitions of
organised crime, crime intelligence focuses on the perpetration of crimes by
particular groups and individuals. Therefore, on its own it does not prevent crime,
however, when taking the definitions organised crime it is ideally suited to focus
on dealing with the symptoms of organised crime and the causes, once the
organised crime dilemma including the illegal narcotic trade is dealt with, it
obviously prevents consequential crime of the organised crime activities (Levi
and Maguire 2004:399, 402). Nonetheless, crime intelligence is an important
aspect to all policing functions (Quarmby 2003:2), but focusing on organised
crime it has a tremendous success, as Cadena (2003: 46, 48-52) illustrates in the
neutralisation of the Colombian Mendellin and Cali cartels.
5.2. Crime intelligence-led forensic investigations
Crime intelligence can be used in support of a forensic investigation in most cases and
would probably only be restricted by the resources available to the investigator. When
observing the above definitions especially Forensic Intelligence by Ribaux et al.
(2006:172) there is minimal restrictions on the uses of crime intelligence. Furthermore,
when one considers house breaking which often leaves an investigator with no eye
witness accounts, no fingerprints with a common modus operandi which does not
individualise any one specific incident, the investigator has the alternative source of
evidence as proposed by Maguire and John (1995:5):
systematic records of targeted suspects’ movements
financial dealings and associations with others
indications from informants about the location of stolen property or the sites
of planned offences
direct police observation (sometimes photographed or video-recorded) of
criminal acts and, though still relatively unusual
statements from undercover police officers.
Copy Right Andrew Fordred 25
Therefore, crime intelligence exposes the criminal activities, identity of associations,
extent of operations and distribution, protection and corruption leading to evidence
individualising perpetrators and linking them to offences once presented in a court of
law completing the forensic investigation which either commenced or gave rise to an
intelligence operation.
5.3. Crime intelligence a process to develop crime databases and subsequently
link matrixes
Crime databases retain crucial intelligence for the development of link matrixes based
on link analysis a technique for evaluating, integrating and presenting complex
information by taking information pieces collected from various sources and putting
them together to show patterns and meanings. It provides a graphic picture of
associations and relationships among various individuals, groups and their activities.
Link analysis presents links based on the following for example:
Telephone numbers
Vehicle, aircraft, boat registration numbers
Financial transactions
Property ownership
Illegal trade
Communication
Warehousing and storing of contraband
The link analysis converts intelligence into the link matrix, which in turn develops into a
link diagram depicting relationships amongst people, groups and activities such as:
Quinton Petersen
Nemo Group
Razza Group
Copy Right Andrew Fordred 26
Eric Tong James John Cathy Simpson
The relationship above shows that Petersen identified as a main distributor of
narcotics, who receives his shipments from Rettas shipping where Eric Tong is the
contact person. The narcotics are supplied to the Razza Group who in turn ‘cut’ the
consignment between themselves and the Nemo group. Financial payments are
laundered through Willy’s Laundry from Petersen and Cathy Simpson removes the
funds from the country. James John through so-called legal contracts obtains
‘legitimate’ business for Willy’s Laundry to provide a cover for its high-income
revenues.
Link analysis and matrix can develop the communication network to identify the
direction and frequency of telephone calls or in the case of banks accounts financial
transactions between suspected parties (Xu & Chen 2004:474).
021-7608905 3 09-44-567-8904
3 7 3
2
4 089-456-7890
6
Willy’s Laundry
Rettas Shipping
Thailand Brazil
Copy Right Andrew Fordred 27
021-987-4321 5 011-546-7890
6
The above illustrates the direction of calls between different identified suspect
telephone numbers and the small circles report the number of calls.
The communication network allows the intelligence analyst the ability to simplify and
synthesize the relationships and suspected communications of people in the group
involved in criminal activity. This technique can be used to present material during the
intelligence gathering process and presented as evidence in subsequent criminal
proceedings.
The above is based on the researcher’s own experience and the objectives of crime
intelligence in terms of depiction of the Link Matrix, in addition refer to the Trevi
definition; Swanson et al. (1988:442, 443); Zinn (2003:13), either in consensus or
contribute to the link matrix and diagram concept. This technique of intelligence
analysis is highly effective and is often the crux of the investigation into organised crime
activities while fulfilling the elements of tactical intelligence. The National Drug
Intelligence Centre of the U.S. Justice Department, National Drug Threat Assessment
2005 Threat Matrix, provides an additional example of various organised crime
syndicates involved in the illegal trade of narcotics and origins.
6. FINDINGS
Crime intelligence is no easy endeavour, however, it must be said that neither is
combating organised crime and its tentacle crimes including the illegal narcotic trade.
The most effective crime intelligence methods infiltration, electronic surveillance and
physical surveillance to obtain sufficient probable cause and evidence in order to launch
proactive investigations against organised crime to obtain search and arrest warrants
against known suspects. Conversely, crime analysis has as an important role to play as
Copy Right Andrew Fordred 28
it establishes a window of so-called ‘product’ crime such as the selling of illegal narcotics
on the streets and can then plot the majority of incidents and through arrests curtail them
to specified areas while forming a base for future crime intelligence operations to trace
the origins of the narcotics. However, while the definition of organised crime remains
either too broad or too narrow, it will remain restrictive for law enforcement agencies to
curb and combat organised crime in the true sense other than incidental or repeat
offences i.e. the selling of drugs. In addition, research into the investigation of organised
crime remains at odds even though it there are reports of considerable law enforcement
successes against this criminal dilemma, it none the less remains ever present. Crime
intelligence even though it dates back to early law enforcement measures, it remains a
relatively embryonic method gradually growing in acceptance as a crime fighting
technique.
7. RECOMMENDATION
Crime intelligence is quite capable of loosing its effectiveness and importance if not
utilised correctly and timeously, therefore, it is important that information is processed in
terms of the intelligence cycle and stored on easily available retrievable databases. In
addition, the processed intelligence must be have a comparable trend. This on the other
does not mean that all and sundry should have access to it, continually it should be dealt
with on a need to know basis. The utilisation of crime intelligence must in addition must
be quadrupled as accurate intelligence not only lends itself to crime prevention strategies
but also intelligence led investigations.
8. CONCLUSION
It remains evident that organised crime itself requires additional specialist research and
will never remain consistent as organised crime syndicates will always endeavour to
adapt their modus operandi as law enforcement agencies amend their strategies to
combat them, while crime intelligence is a growing in its usefulness in breaking into the
secret actions and structures of the syndicates. It is important the that all law
enforcement personnel are taught and trained in basic intelligence gathering techniques
and more so, responsibilities, that crime intelligence is the responsibility of everyone and
not restricted to a few individuals. A culture to be created that everyone has the
Copy Right Andrew Fordred 29
obligation to report any suspicious activity or person no matter how trivial. Many may
argue this approach will result in so-called ‘information overload’, true and dedicated
crime intelligence analysts will know how to focus and sift the important intelligence
aspects.
References
Cadena R, 2003, Capturing the Cali Cartel: Selections from Jaque Mate; Crime, Law & Social Change 43-59, Kluwer Academic Publishers, Netherlands, viewed on line http://0-www.springerlink.com.oasis.unisa.ac.za/media/e2eywvtwwj4v0xwvuxv2/contributions/m/4/6/2/m462034118m76117.pdf 15 March 2007. Califana & Levkov, 1978, Criminalistics for the Law Enforcement Officer, McGraw-Hill Book Company, New York Carter D, 2005, Brief History of Law Enforcement Intelligence: Past Practice and Recommendations for Change, in; Trends in Organized Crime, Vol. 8,No. 3, Spring 2005, Transaction Publishers viewed on line
http://0-sas.epnet.com.oasis.unisa.ac.za/externalframe.asp?tb=0&_ug=sid+EDA190BA%2D82D0 %2D4DB5%2D93C8%2D87C177021105%40sessionmgr4+E0EF&_us=SLsrc+ext+or+Date+034D&_usmtl=ftv+True+137E&_uso=hd+False +db%5B0+%2Daph+1BEE&fi=aph_17060939_AN&lpdf=true&pdfs=&tn=&tp=PC&es=cs%5Fclient%2Easp%3FT%3DP%26P%3DAN%26K% 3D17060939%26rn%3D1%26db%3Daph%26is%3D1084%2D4791%26sc%3D%26S%3D%26D%3Daph%26title%3DTrends%2Bin%2B Organized%2BCrime%26year%3D2005%26bk%3DS&fn=1&rn=1&bk=S&EBSCOContent=ZWJjY8Lr7XePprFrsObxa6Gmr4GPp7OFoai5fa
Copy Right Andrew Fordred 30
WWxpjDpfKCoq+ygaiurbjQ3+151N7uvuMA&an=17060939&db=aph& 5 April 2007 Chainey S, Smith C, 2007, Review of GIS-based information Sharing Systems, Home Office, London viewed on line http://www.homeoffice.gov.uk/rds/pdfs06/rdsolr0206.pdf 7 March 2007. Cloete M & Stevens R, 1990, Criminology, Southern Book Publishers, Halfway House
Cope, N, 2004, Intelligence-led Policing or Policing-Led Intelligence, Volume Crime Analysis into Policing' British Journal of Criminology 44, 2: 188-203 viewed on line http://0-proquest.umi.com.oasis.unisa.ac.za/pqdlink? 2 April 2007. Criminal Intelligence File Guidelines, Law Enforcement Intelligence Unit (LEIU) 2002.
Criminal Intelligence Service Canada, Annual Report on Organized Crime in Canada 2001
Director General, Criminal Intelligence Service, Canada 2001.
Diestein W 1974, Technics for the Criminal Investigator, Charles Thomas, Springfield, Illinois
Du Preez G. 1996, Criminal Investigation. In Forensic Criminalistics, Van der Westhuizen J. (ed), Heinemann, Johannesburg Evans J, 2002, Criminal Networks, Criminal Enterprises, viewed on line http://www.icclr.law.ubc.ca/Publications/Reports/netwks94.pdf 1 June 2007. Fish J 2004, The Evidence Does Not Lie: A Forensic Investigation Program to Bridge the Gaps Between Crime Scene Investigation and Forensic Science, viewed 9 March 2007, http://web.utk.edu/~jackiefi/
Fyfe N, Sheptycki J, 2005, Facilitating witness co-operation in organised crime cases: an international review, Home Office, London, published online http://www.homeoffice.gov.uk/rds/pdfs05/rdsolr2705.pdf viewed 7 April 2007. Goredama C, 2005, Organised Crime and Terrorism: Observations from Southern Africa, ISS Paper 101, March 2005, Institute of Security Studies viewed online http://www.iss.co.za/dynamic/administration/file_manager/file_links/PAPER101.PDF?link_id=3&slink_id=455&link_type=12&slink_type=13 &tmpl_id=3 2 April 2007 Goredema C, 2003, Zimbabwe, Penetrating state and business: Organised Crime in Southern Africa, viewed on line http://www.iss.co.za/index.php?link_id=3&slink_id=453&link_type=12&slink_type=12&tmpl_id=3 30 May 2007 Grobler J, Namibia, Penetrating state and business: Organised Crime in Southern Africa, viewed on line http://www.iss.co.za/index.php?link_id=3&slink_id=453&link_type=12&slink_type=12&tmpl_id=3 30 May 2007 Hobbs S, 2004, Street Gangs and Organised Crime, essay Faculty of Humanities, University of Cape Town, viewed on line http://web.uct.ac.za/depts/sjrp/publicat/street.pdf 22 May 2007 Innes M, Fielding N, Cope N, 2005, The Theory and Practise of Crime Intelligence Analysis, The British Journal of Criminology 45, 39-57, viewed on line http://0-proquest.umi.com.oasis.unisa.ac.za/pqdweb?index=0&did=784811271&SrchMode=1&sid=2&Fmt=10&VInst=PROD&VType=PQD&RQT=3 09&VName=PQD&TS=1143978533&clientId=27625 2 April 2007 International Association of Chiefs of Police, 2003, Model Policy: Criminal Intelligence, Virginia
Copy Right Andrew Fordred 31
Irish J, Illicit trafficking of vehicle across Beit Bridge border post, ISS Paper 109, June 2005, Institute of Security Studies viewed on line http://www.iss.co.za/dynamic/administration/file_manager/file_links/104.PDF?link_id=3&slink_id=444&link_type=12&slink_type=13&tmpl_id=3 11 June 2007. Jenkins P, 1992, Narcotics trafficking and the American mafia: The myth of internal prohibition, Crime, Law and Social Change 18: 303-318, Kluwer Academic Publishers, Netherlands, viewed on line http://0-www.springerlink.com.oasis.unisa.ac.za/media/2dyrcfyhtjcjympjhq06/contributions/q/1/4/t/q14t60w88j671361.pdf 19 April 2007 LeBeuf M-E, Organized Crime and Cybercrime Criminal investigations and Intelligence on the Cutting Edge, Technical Report – Information Technology Series, Police Sciences School, Canadian Police College, Ottawa, 2001. Lee R, 1991, Columbia’s cocaine syndicates, Crime, Law and Social Change 16, 3 – 39, Kluwer Academic Publishers, Netherlands, viewed online www.springerlink.com.oasis.unisa.ac.za/media/92jwqgvtvqhb0ylpgw97/contributions, 15 April 2007. Levi M, Maguire M, Reducing and preventing orgnaised crime: An evidence-based critique, Crime, Law and Social Change 41, 397-469, Kluwer Academic Publishers, Netherlands viewed on line http://0-proquest.umi.com.oasis.unisa.ac.za/pqdweb?index=0&did=707262601&SrchMode=1&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT= 309&VName=PQD&TS=1143977202&clientId=27625 2 April 2007 Maguire M, John T, 1995, Intelligence, Surveillance and Informants: Integrated Approaches, Home Office Police Research Group, London viewed on line http://www.homeoffice.gov.uk/rds/prgpdfs/fcdps64.pdf 5 May 2007. Marais C. 1992, Physical Evidence in Criminal Investigation, Henmar Publications, Wierda Park Marais C. & Van Rooyen H. 1991, Crime Investigation, 2nd edn, Promedia Publisher, Silverton Morris S, 1998, Clubs, Drugs and Doormen, Home Office, London viewed on line http://www.homeoffice.gov.uk/rds/prgpdfs/fcdps86.pdf 7 April 2007 Mashele P, Mainstream drug control into socio-economic development in Africa, ISS Paper 100, March 2005, Institute of Security Studies http://www.iss.co.za/dynamic/administration/file_manager/file_links/PAPER100.PDF?link_id=3&slink_id=458&link_type=12&slink_type=13&tmpl_id=3 12 May 2007 Miró R, 2003, Organized Crime and Terrorist Activity in Mexico, 1999-2002, Federal Research Division, Library of Congress, Washington D.C. viewed on line www.loc.gov/rr/frd/pdf-files/OrgCrime_Mexico.pdf 30 March 2007 National Drug Threat Assessment 2007, National Drug Intelligence Center, U.S. Department of Justice viewed on line http://www.usdoj.gov/ndic/pubs11/18862/18862p.pdf 22 May 2007
National Strategic Intelligence Act No. 39 of 1994
Nevala S, Aromaa K, 2004, Organised Crime, Trafficking, Drugs, Selected papers presented at the Annual Conference of the European Society of Criminology, Helsinki viewed on line http://www.springerlink.com/(f5impc55d1zo3qfmg5vrvbfu)/app/account/profile-register.asp 12 April 2007 Organised Crime Project, Report on the Organised Crime Group Survey, New Zealand Police viewed on line http://police.govt.nz/resources/1999/organised-crime-group-survey-report/organised-crime-group-survey-report.pdf 10 April 2007
Copy Right Andrew Fordred 32
Paoli L, 2001, Illegal Drug Trade in Russia, viewed on line http://iuscrim.mpg.de/verlag/Forschaktuell/Paoli.pdf 15 April 2007. Pistorius M, 2005, Profiling Serial Killers and other crimes in South Africa, Penguin Books,
Johannesburg
Porter M, 1996, Tackling Cross Border Crime, Webb B (ed), Home Office, London viewed online http://www.homeoffice.gov.uk/rds/prgpdfs/fcdps79.pdf 7 April 2007. Quarmby N, 2003, Future Work in Strategic Criminal Intelligence, Australian Institute of Criminology, Canberra Ratcliffe J, 2003 Intelligence-led Policing, Trends and Issues in Crime and Criminal Justice, Australian Institute of Criminology, Canberra viewed on line http://scholar.google.com/scholar?q=organised+crime+research&hl=en&lr=&start=10&sa=N on 15 April 2007. Read T, Oldfield D, 1995, Local Crime Analysis, Home Office, London viewed online http://www.homeoffice.gov.uk/rds/prgpdfs/fcdps65.pdf, 27 March 2007. Reader’s Digest Illustrated 1998, Oxford Dictionary, Oxford University Press, Oxford
Ribaux O, Simon W, Pierre M, 2004, The Contribution of forensic science to crime analysis and investigation: Forensic Intelligence, Elsevier, Ireland Russell. M & Coetzee. C 2000, Truth Extraction, Spearhead Press, Cape Town Saywell J, Bawden P, 2000 Crime Mapping from an Intelligence Perspective, State Intelligence Branch South Australia Police, Adelaid online http://0-proquest.umi.com.oasis.unisa.ac.za/pqdlink?Ver=1&Exp=03-31-2011&FMT=7&DID=679035551&RQT=309 viewed 2 April 2007. Shelley L, Mafia and the Italian State: The Historical Roots of the Current Crisis, Sociological Forum Vol. 9, No. 4, 1994, viewed online www.springerlink.com.oasis.unisa.ac.za/media/59dam5dfyr3rpn919h2m/contributions/m/8/4/0/m84022280p6k8843.pdf 15 March 2007 Steinberg J, 2005, Drug Smuggling and Border Control at Johannesburg International Airport and Durban Harbour, Institute of Security Studies viewed online http://www.iss.co.za/dynamic/administration/file_manager/file_links/104.PDF?link_id=3&slink_id=444&link_type=12&slink_type=13&tmpl_id=3 30 May 2007. Swanson C, Chamelin N, Territo L, 1988, Criminal Investigation, 4th edn, Random House, New York
The Changing Face of Organized Crime in New Jersey State New Jersey Commission of Investigation, State of New Jersey Commission of Investigation, Trends in Organized Crime Vol. 8, No. 2, 2004 viewed online http://0-sas.epnet.com.oasis.unisa.ac.za/externalframe.asp? 2 April 2007.
Van der Westhuizen J. 1996 Forensic Criminalistics, 2nd edn, Heinemann, Johannesburg
Xu J, Hsinchun C, 2003, Fighting orgnaized crimes: using shortest-path algorithms to identify associations in criminal networks, Elsevier viewed on line http://ai.eller.arizona.edu/go/intranet/papers/Printed.pdf 25 April 2007 Zinn R, 2002, Sentenced Motor Vehicle Hijackers Imprisoned in Gauteng as a Source of Crime Intelligence, Technikon RSA, viewed online http://www.unisa.ac.za/contents/docs/zinn.pdf 20 April 2007