Page 33 - Cyber Warnings
P. 33
situation in their community. The classification of the sources as the persons with some useful
information is given in a Table 1.
Table 1. The sources classification by the given criteria
By the Table above, we would distinguish the sources as (1) Ad hoc, (2) Reliable and (3)
Trusted. The ad hoc sources may provide the information from time to time, while the quality of
such an update depends on the external circumstances. On the other hand, the reliable sources
may be active regularly and provide many findings which are more or less acceptable. Finally,
being the trusted source to any Police Department is a great responsibility, because such a
person would mostly deal with the highest quality information covered with the real evidence.
Many expert’s informants are assumed as the trusted sources to the Police or intelligence
services. Some literature resources would suggest that an informant or [somewhere] source
may come from a criminal environment providing the best piece of the information about the
crime.
The process of the interviewing the witnesses, victims or informants may be in person, via
computers, phone devices or through some web ways of the information gathering. The first
thing being collected from a source is a statement which may be more or less clear. So often
the source may be under some sort of stressful experience, so those statements would appear
as somehow irrational. To get the clear content out of that statement, the Police would try to
document the statement into a data format. The next step would be searching for any new
findings amongst such a collected data. Such a new finding is called the information. Further,
the information should get deeply analyzed in order to get some intelligence which would get
used to a case leading. This recent methodology is well-known as the intelligence-led
investigation, while we would suggest applying the similar approach to the preventive operations
within the Police Force. The entire process of dealing with the findings is illustrated in a Figure
1.
Figure 1. The process of dealing with the findings
33 Cyber Warnings E-Magazine – February 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide