Académique Documents
Professionnel Documents
Culture Documents
for
PORT INTELLIGENCE UNIT
OFFICERS
Copyright © United Nations Office on Drugs and Crime, 2015.
This Operational Handbook was produced by the United Nations
Office on Drugs and Crime, Regional Office for Southeast Asia and the
Pacific, in Bangkok, Thailand.
This is not an official document of the United Nations. The
designations employed and the presentation of the material in this
document do not imply the expression of any opinion whatsoever on
the part of the Secretariat of the United Nations Office on Drugs and
Crime concerning the legal status of any country, territory, city or area
of its authorities, or concerning the delimitations of its frontiers and
boundaries.
UNODC would like to specifically recognize the contribution of The
Government of Canada.
Introduction
The movement of people from one country to another, fleeing
persecution, war, disease, famine or in search of a better life and
economic opportunities, is a dangerous enterprise. The danger
increases when irregular migrants are smuggled by profit-driven
criminal organizations. Criminal organizations are motivated by greed
and money, not the welfare of the victims, and risk the lives of irregular
migrants and human trafficking victims. Many thousands of these
victims die tragically each year.
Don’t forget, however, that SoM and TiP activities can involve different
means of transport as part of complex routes – so, for example,
passengers arriving by plane could be intending to travel overland to
board a smuggler’s boat.
You should carry this guide with you while you are on duty. It contains
quick-reference tools to address situations you may experience in the
course of your duty.
Service Providers
• Taxi drivers
Open Source • Bus operators
• TV/Radio • Social workers
• Print media • Shipping agents
• Internet (including • Travel Agents
social media) • Airlines
• Hotels and guesthouse
owners/employees
• NGOs
Official Sources
• Officers / databases within your agency
• Other law enforcement and government Confidential / Criminal Sources
agencies (national and local) • Informants
• Foreign law enforcement agencies • Suspects
• Prisoners
• Other PIUs
2. Internet Research
The Internet provides a vast range of information sources and is a
vital tool for information collection and intelligence development.
Sources include:
• News websites
• Official Databases with public
access (including voters list,
company registrations etc.)
• Hotel and guest house websites,
including online booking
companies
• Social Media
• Commercial databases(including
ships location (via AIS Lloyds
Seasearcher) airline route guides
(OAG), telephone directories etc.)
Other Databases
There are many government and commercial databases which
are not open source, and may not be held by law enforcement
agencies, but to which law enforcement agencies can/could have
controlled access. Examples include:
• Social security • ID cards • Private plane registrations
• Employment • Housing records • Ferry manifestos
• Driving licences • Medical records • Harbour masters record
• Vehicle • Tax records • Ship / Boat registrations
registrations
• Hotel registrations etc.
• Passports
• Flight manifestos
Google Maps and Street View are also extremely useful tools for
analysts.
I.M.E.I. Number
• International Mobile Station Equipment Identity number.
• Unique to each phone handset.
• Used to identify if a stolen phone is using the network.
• What SIM cards have been used in a handset.
How to find the I.M.E.I Number
• Open the phone and it is usually printed inside the battery
compartment.
• If you don’t want to open the phone, or can’t, dial *#06#
• Criminals will try and change the IMEI number – websites
SIM Cards
• Subscriber Identity Module.
• The phone number attached to the SIM card.
• The SIMs unique serial number – Integrated Circuit Card
Identifier (ICCID).
• Two passwords. One for the user and one for the service
provider (PUK code).
Recording Evidence
We want to be able to show who had possession or who used the
cell phone, plus who they were in contact with (and later where
the phone was used) plus any other relevant details about their
lives:
• We can do this by;
1. Check on SIM card. 6. From photographs/videos
2. Check on IMEI number. stored on the phone.
3. Address book. 7. From applications used/stored
on the phone (including social
4. Contents of SMS messages. media).
5. Calls made to and from the 8. From internet searches and
cell phone. downloads
How to find the Phone Number?
• I.M.E.I. number
• IP Address
• Locations where phone was used (from cell towers0
• Records of calls made / received
• Records of SMS / MMS messages sent / received
• Content of SMS / MMS messages sent / received (usually for
limited period)
• Photos / attachments sent / received (usually for a limited
period)
Providers of Internet / Social Media Websites / Messaging
Applications (such as Skype / WhapsApp, Viber etc.) can also
provide details of, and in some cases content of emails / messages
sent and received.
Mobile
Good for covering distances and when the
suspect is using a vehicle.
Use several vehicles to follow the suspect.
Use nondescript vehicles of different makes,
models and colours. Rotate vehicles to avoid
overexposure. Use two officers per car.
Motorbikes are useful, too.
Marine
When following vessels, use navy or marine
police vessels or aircraft that have the ability
to track vessels from a long distance away.
Use unmarked or nondescript boats to get
closer to the targeted vessel. You may also
be able to watch vessels from the shore
using a combination of mobile, foot or static
surveillance methods.
Foot
Good for following suspects who are walking
or using public transport.
Allows you to get closer to the suspect and
observe their actions, meetings or hear
conversations. Use at least three officers
where possible. Rotate your positions to
avoid being noticed.
Static
Good for watching fixed locations like ports,
houses, businesses or areas where a specific
crime occurs.
Use two officers. Be careful entering and
leaving an observation post to avoid being
compromised. If no buildings are available,
use a vehicle or other hideout.
Technical
Good for providing real-time locations of
suspects.
Use covert cameras and tracking and listening
devices to monitor suspects remotely, if you
are lawfully entitled to use them.
Video Surveillance
Video cameras allow you to collect
visual evidence and intelligence.
Images can be collected by:
- Closed circuit television cameras
(CCTV)
- Cameras that can monitor the
subject from afar, sending images
remotely
- Handheld cameras in observation
posts, on foot or within a vehicle
- Body-worn cameras to covertly
record meetings
- Mobile phone cameras used covertly
Listening Devices
Listening devices allow you to covertly
monitor conversations. They can be
installed in places where suspects will
have discussions, including vehicles,
vessels, premises and public places.
The signal of the device can be picked
up by radio or sent via phone lines.
Listening devices can be worn
covertly by undercover officers and
informants.
Phone Interception
Phone interceptions also allow you
to covertly monitor conversations.
Monitoring phone conversations
usually requires special authority and
liaison with the telecommunications
provider.
Intercepting
Online Communications
The ability to monitor emails, chats,
social networks, online banking, and
online voice calls (such as Skype,
LINE, Viber) usually requires special
authority and liaison with the
service provider. It may also require
installing a device inside the suspect’s
computer.
The report should not contain any information that may reveal
the identity of the informant. Do not include the informant’s
name, alias, sex, date of birth, occupation, contact details, or
clues leading to the informant’s identity.
Submit the completed report through authorized channels
without delay so that the information can be assessed and, if
necessary, disseminated.
You should use a recognised intelligence evaluation system, such
as the Admiralty or NATO system, detailed below:
Intelligence 1 2 3 4 5 6
Evaluation Confirmed Probably Possibly Doubtfully Improbable Cannot
True True True Be Judged
Workshop 1 2 Garden
Bedroom 3 4A 4B Living
Room
Wardrobe 5 6
8 Kitchen
9 7
Bedroom
Bathroom
Complete an evidence
2.
label. Place the label on the
evidence bag before putting
the object inside.