Posted: March 13th, 2023
Module 3 discussions
Please click on the below link (Improving the Law Enforcement Intelligence Community Relationship (pages 21-93 only) and answer the following questions:
1. How did BCO Bangkok address the need for accurate, specific actionable intelligence?
2. How can intelligence collection be improved to identify counter violent extremism in prison?
3. What characteristics, if any, exist between Islamic extremist groups and major prison gangs?
1. BCO Bangkok developed a thorough intelligence system that combined the many information sources available in order to satisfy the requirement for precise, detailed, and actionable intelligence. The BCO was able to successfully target, evaluate, and acquire data from a range of sources, including law enforcement, criminal justice, and community sources, thanks to this technology. The system also included an intelligence-led methodology that enabled the creation of operational plans and tactics based on information.
2. Law enforcement and criminal justice organizations should collaborate more and pool resources in order to better intelligence gathering to detect and fight violent extremism in jail. Agencies should also use intelligence-led strategies to find, evaluate, target, and keep an eye on people who could be involved in extremist activity. In order to locate, target, and dismantle extremist networks, law enforcement and criminal justice organizations should also use data-driven intelligence operations.
3. There are a number of similarities between large prison gangs and Islamic extremist organizations. Among them include the use of violence to accomplish their objectives, a shared feeling of injustice, and a language and set of symbols that all members of the group use to interact and identify with one another. Additionally, prison gangs and Islamic extremist organizations often have close relationships to criminal networks that help with the circulation of firearms and other illegal goods as well as the propagation of their ideologies.
1. BCO By building a comprehensive intelligence system that combined the many different sources of information that were available, Bangkok was able to satisfy the need for precise and particular intelligence that could be put into action. Because of this technology, the BCO was able to efficiently target, evaluate, and collect information from a wide range of sources, such as those associated with law enforcement, the criminal justice system, and the community. The system also had an intelligence-led approach that made it possible to construct intelligence-based operational plans and tactics. This was one of the system’s many features.
2. The coordination between law enforcement and criminal justice agencies should be increased, and resources should be shared, in order to better the intelligence collecting that is done in order to detect and fight violent extremism in prisons. Additionally, intelligence-led tactics should be used by government agencies in order to locate, evaluate, target, and keep an eye on persons who may be participating in terrorist operations. In addition, institutions dealing with law enforcement and criminal justice should use data-driven intelligence operations in order to detect extremist networks, target them, and disrupt their activities.
3. Islamic extremist organizations and big prison gangs have a number of similarities, the most notable of which are listed below. A common sense of injustice, the use of violence to attain their aims, and a shared language and set of symbols that are used to communicate with and identify with one another are some of the defining characteristics of these groups. In addition, Islamic extremist groups and prison gangs often have close relationships to criminal organizations, which helps enable the dissemination of their ideology as well as the trade of guns and other illegal items.
Improving the Law Enforcement Intelligence Community. (n.d.). Retrieved October 23, 2020, from
Module 4 discussions
Please click on the below report (Predictive Policing: The role of crime forecasting in law enforcement operations) and answer the following questions:
1. What are the most promising technical tools for making predictions about criminal activity, and what are the most promising tactical approaches for acting on these predictions? 2. What tools and methods have been used by law enforcement agencies, and what lessons can be drawn from those experiences?
Module 5 discussions
Please click on the below link (USING INTELLIGENCE TO COMBAT TRADE-BASED MONEY LAUNDERING) and answer the following questions:
1. The authors offer four recommendations/solutions to address the threats posed by TBML. Do you agree with each recommendation? Why or why not?
2. Can you think of other solutions the authors might not have included?
Module 6 discussions
There are two questions this week from 2 different readings.
1. Please click on the below link and answer the following question: How can law enforcement best leverage future communications capabilities anticipated to be fielded over the next 10 to 15 years while mitigating potential risks?
2. Please click on the below link and answer the following question – What are some of the challenges of implementing intelligence led policing?
Module 7 discussions
Please click on the below link (read sections 1-6 only) and answer the following questions:
1. How are State and Local Anti-Terrorism Training (SLATT) Program sites selected for training?
2. What factors facilitate or hinder law enforcement’s participation in SLATT?
3. What behavioral changes do participants report as a result of SLATT training?
4. What insights and suggestions can be derived from the assessment to improve BJA’s SLATT Program?
Module 8 discussions
Please click on the below link and answer the following question:
Can some of the principles and lessons learned from the report be applied to state and local law enforcement agencies? If so, how?
To improve intelligence collection to identify counter violent extremism in prison, law enforcement and criminal justice organizations should collaborate and pool their resources to enhance intelligence gathering capabilities. They should also utilize intelligence-led strategies to locate, evaluate, target, and monitor individuals who may be involved in extremist activity. Data-driven intelligence operations should be used to identify, target, and dismantle extremist networks.
Place an order in 3 easy steps. Takes less than 5 mins.