Seminar Title:
Confidential Sources: Recruiting, Documenting and Managing (Stennett)
DATES: 5/23/2022 through 5/24/2022
INSTRUCTOR(S): Jess Stennett
LOCATION: Columbus, Ohio Division of Police Training Academy - 1000 North Hague Ave., Columbus, OH 43204-2121
HOTEL: Drury Inn & Suites Columbus Convention Center - Columbus, OH
Contact Hotel for State Govt. Rate
COURSE REGISTRATION FEE: $7500.00 Includes all training materials, and a Certificate of Completion.
|
 |
Instructor Bio
Jess Stennett is a Detective Sergeant with the Idaho State Police. Jess has over 20 years of law enforcement experience and training with a primary focus on drug related investigations. He is currently assigned to the Idaho State Police Investigation’s Division District One in Coeur d’Alene, Idaho. His primary duty is to supervise the North Idaho Narcotics Enforcement HIDTA Task Force (Task Force NINE) located in Coeur d’Alene, Idaho. In 1994, Sergeant Jess Stennett began his law enforcement career as a member of the United States Coast Guard. In 2001, Sergeant Stennett became a deputy sheriff working for the Klamath County Sheriff’s Office in Oregon where he worked a variety of assignments to include being assigned to local drug task force and later to the general crimes division. In 2008, he was hired by the Idaho State Police and moved to Meridian, Idaho, where his primary duties were major drug investigations, homicides, and other major crimes. In 2018, he was promoted to Sergeant and relocated to Coeur d’Alene, Idaho. Jess is an Idaho POST certified instructor, holds an Idaho POST Supervisor certificate, has a Bachelor of Science in Criminal Justice Administration from the University of Phoenix and is a recipient of two lifesaving awards, a Distinguished Achievement award, and the state of Idaho Silver Star. In 2022, the unit he supervises won the Oregon Idaho HIDTA Outstanding Team Award and the DEA Administrator’s award for OCDETF Operation Red Road. He is also a co-creator of the Idaho Fentanyl Education Project and continues to educate the public on the topic of dangerous drugs.
|
|
 |
 |
 |
Pre-Payment is not required to register or attend IN-PERSON seminars. Pre-payment is required for WEBINARS and ONLINE COURSES.
CLICK HERE TO REGISTER FOR THIS SEMINAR
|
 |
Course
Objectives
Even in this age of technical advancement, officers must remember that all types of crime are committed by humans, whose motives are constantly evolving and whose behavior cannot be accurately measured or predicted by technology. Successful patrol officers and investigators need to identify who is willing or can be induced to assist in criminal investigations and who will be acceptable by the courts and the public. That requires observing people of all ethnic and socioeconomic backgrounds and becoming familiar with the issues and quirks associated with potential sources. This course provides comprehensive techniques for recruiting, documenting and managing confidential sources. Beginning with a history of confidential sources, it explores legal and ethical issues related to sources, types of assistance that can be obtained, personality traits and associated inducements, influences, motivation, and predictable behaviors. Participants will learn effective techniques for approaching a potential informant, encouraging cooperation, deploying the source, and properly documenting all activities. Upon Completion: Participants will be able to: • Explain the historical use of confidential sources and how lessons apply to modern-day policing • Understand how personality types affect a person’s reasoning to betray others • Identify, approach, recruit, document and manage confidential sources • Recognize the legal and ethical aspects of using sources • Identify the management issues associated with each type of informant • Apply ancient understanding of human attachment to modern-day inducements • Recognize personality traits, individual motivations, rewards, and predicted behaviors • Appreciate the value of consistency and commitment issues • Steer an initial conversation into providing intelligence and cooperation • Update the source file and closing policies • Cite safety precautions and control associated with deploying sources • Identify issues related to loaning sources to other agencies • Facilitate high-risk and long-term undercover operations
|
|
 |
 |