National Police Service Training Manual on Technology in Policing - PDF
Document Details
Uploaded by Deleted User
2019
National Police Service
Tags
Summary
This document is a training manual on technology in policing, specifically for Inspector of Police Course B, from the National Police Service. The 2019 edition covers topics including introduction to policing and technology, applications, crime mapping, cyber space, and integrated communication command and control.
Full Transcript
**NATIONAL POLICE SERVICE** **Service with Dignity** **TRAINING MANUAL ON** **TECHNOLOGY IN POLICING** **For** **INSPECTOR OF POLICE COURSE B** ![](media/image2.png)**\ ** Table of Contents {#table-of-contents.TOCHeading} ================= [LESSON ONE: INTRODUCTION TO POLICING AND TECHNOLOGY...
**NATIONAL POLICE SERVICE** **Service with Dignity** **TRAINING MANUAL ON** **TECHNOLOGY IN POLICING** **For** **INSPECTOR OF POLICE COURSE B** ![](media/image2.png)**\ ** Table of Contents {#table-of-contents.TOCHeading} ================= [LESSON ONE: INTRODUCTION TO POLICING AND TECHNOLOGY 3](#_Toc65239918) [LESSON TWO: POLICING TECHNOLOGY APPLICATIONS 6](#section) [LESSON THREE: CRIME MAPPING TECHNOLOGY 10](#lesson-three-crime-mapping-technology) [LESSON FOUR: POLICING THE CYBER SPACE 14](#lesson-four-policing-the-cyber-space) [LESSON FIVE: INTEGRATED COMMUNICATION COMMAND AND CONTROL (IC3) CENTRE 22](#lesson-five-integrated-communication-command-and-control-ic3-centre) []{#_Toc65239918.anchor} **LESSON ONE: INTRODUCTION TO POLICING AND TECHNOLOGY** **UNIT CODE:** 315.1.0 **UNIT TITLE:** TECHNOLOGY IN POLICING **SUB-UNIT CODE:** 315.1.01 **LESSON TITLE:** INTRODUCTION **DURATION:** 60 MINS **EXPECTED CLASS SIZE:** 40 **LESSON OBJECTIVES:** By the end of the lesson, the trainee should be able to: +-----------+-----------+-----------+-----------+-----------+-----------+ | **Objecti | | | | | | | ves** | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | | K | U | S | A | B | +-----------+-----------+-----------+-----------+-----------+-----------+ | 1. Defin | | **√** | | | | | e | | | | | | | techn | | | | | | | ology | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 2. Under | | | | | | | stand | | | | | | | the | | | | | | | role | | | | | | | of | | | | | | | techn | | | | | | | ology | | | | | | | in | | | | | | | polic | | | | | | | ing | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 3. Expla | | **√** | | **√** | **√** | | in | | | | | | | relev | | | | | | | ance | | | | | | | of | | | | | | | techn | | | | | | | ology | | | | | | | in | | | | | | | polic | | | | | | | ing | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 4. Descr | | **√** | **√** | | | | ibe | | | | | | | types | | | | | | | of | | | | | | | techn | | | | | | | ology | | | | | | | in | | | | | | | polic | | | | | | | ing | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ - A manner of accomplishing a task especially using technical processes, methods, or knowledge - The application of scientific knowledge for practical purposes, especially in industry(Oxford dictionary) **Role of Technology in policing** 1. Crime detection The major police role is fighting crime. Detecting perpetrators is based not only on the conduct of simple investigative activities, but requires specialized knowledge of the motive behind the offender and the circumstances of the offense. Due to the increasing importance of forensic techniques, also achieved through the use of new technologies, including detectors, crime detection is almost always associated with a series of complicated activities that reveal evidence of crime. 2. Crime prevention Crime prevention is crucial in modern policing. Police officers should apply crime prevention methods to reduce and deter criminal activities. Use of technology in preventing crime has evolved ith major innovations being put into practice. These innovations can be put into two broad categories: i. *Hard technology (hardware or materials)* These innovations include new materials, devices, and equipment that can be used to either commit crime or prevent and control crime. ii. *Soft technology (computer software, information systems)* Involve the strategic use of information to prevent crime (e.g. the development of risk assessment, and threat assessment instruments) and to improve the performance of the police (e.g. predictive policing technology, and recording/video streaming capabilities in police vehicles). Soft technology innovations include new software programs, classification systems, crime analysis techniques, and data sharing/system integration techniques. 3. Crime analysis Technology is applied in crime analysis to identify and analyze patterns and trends in crime and criminal activities. Police officers can use available technological innovations to perform crime analysis to reduce crime, improve operations, and make smarter, data driven decisions. Examples of these innovations include crime mapping using GIS. 1. 2. 3. 4. 5. **TYPES OF TECHNOLOGY IN POLICING** 1. 2. 3. 4. 5. **REFERENCES** - Hughes's T.(2004).[*[Human-Built World:HYPERLINK \"http://www.amazon.com/Human-Built-World-Technology-Culture-science-culture/dp/0226359344\" How to Think about Technology and Culture]*](http://www.amazon.com/Human-Built-World-Technology-Culture-science-culture/dp/0226359344) - Peter Thiel, (2014). [*[Zero to One: Notes on How to Build the Future ]*](http://www.amazon.com/Zero-One-Notes-Startups-Future/dp/0804139296/ref=sr_1_1?ie=UTF8&qid=1411159418&sr=8-1&keywords=Zero+to+One%3A+Notes+on+How+to+Build+the+Future) LESSON TWO: POLICING TECHNOLOGY APPLICATIONS -------------------------------------------- Police technology refers to the wide range of scientific and technological methods, techniques, and equipment used in policing. Due to the extent that technology has advanced, the National Police Service has been in the forefront to provide essential technological equipment to its officers to help them in provision of essential services to the public and also among themselves. The service also provides capacity building to the officers in usage of the equipment. Some of the technological advances can be categorized into: 1. *Administrative Technology* Administrative work can encompass a wide variety of duties. These are the duties that provide support to the organization. This support might include general office management, answering phones, speaking with clients, assisting a superiors, clerical work (including maintaining records and entering data), or a variety of other tasks. Automation of office task therefore is essential to provide effective method of accomplishing tasks. Some of these technologies applied in the NPS include; a. Criminal records have equally been computerized enabling the daily processing of about 4000 police clearance certificates, formerly known as certificate of good conduct. Applications are done electronically via E-citizen and at Directorate of criminal investigation offices and Huduma Centers throughout the country. b. Internal Affairs Unit has developed an Anonymous Reporting Information System (ARIS) through which members of the public and police officers can provide information against police. c. The Digital OB has automated office work in the police stations whereby major policing duties are processed online and submitted to NPS servers. OB entries can be done on a computer or a tablet. d. Digital filing system known as IMS (Information Management System) for the NPS is also available whereby Human resource information for police officers in included in a digital file. 2. *Weapon Technology* 3. *Mobility (Vehicular) Technology* - With Vehicle-to-Vehicle(V2V) communication, vehicles are able to communicate relevant pieces of information with each other while, - Vehicle --To- Infrastructure (V2I) allows vehicles to transmit and receive signals. It has potential to improve transportation networks in many ways, including the realms of safety, mobility environment and entertainment. 4. *Communication Technology* Communication technologies include the internet, multimedia, email, telephone and other sound based and video-based communication means. There is a need for National Police Service to adopt latest technological advancements in crime control and prevention. Presently police officers uses mobile phones and walkie talkies, Radio signals as the main communication equipment in crime control and prevention. Two ways in which communications technology improves situational awareness a. **Geo-fencing Radio Channels** b. **Three Dimensional GPS** 5. *Protective technology* These are technologies, tools and techniques to protect an individual or community against things that would cause it harm (hazards). Police officers use these technologies for safety measures against enemies. Protective technology can be categorised into: - Personnel Technology that provide bodily safety to police officers e.g. MLABs, APCs to provide movement - Equipment These includes communication equipment, weapons, support equipment such as drones among others - Facilities The NPS IC3 center is a good example of modern technology facility applied in policing in our major town. It provides a way of monitoring and controlling of personnel and equipment effectively. 6. *Automated access control systems* 7. *Security alarms systems* A security alarm system is a system that prevents unauthorized intrusion into a premise, and reports such attempts An alarm system is made up of a control panel, arming stations/keypads, sensors, sirens, and special lighting or vibration pads if necessary. 8. *Biometrics* Use of Biometrics in policing has fairly emerged due to its effectiveness. Biometrics machines are slowly replacing the rollers in collection of fingerprints. 9. *Road policing technology* These are the technology that helps police officers to manage and police road networks. These systems include: - *Intelligent transport systems* - *Highway management systems* a. Information collection b. Surveillance c. Control of traffic d. Collection of tolls 10. *Investigative technology* Involves use of high end technologies to solve crimes. **Technology can** assist in **crime**-solving by providing a more efficient way of working that allows investigating officers to review all the relevant evidence quickly through forensic technologies. LESSON THREE: CRIME MAPPING TECHNOLOGY -------------------------------------- **Key Notes** Figure 1.1: Pin maps. *Source: Keith Harries. University of Maryland,* *Baltimore County, Baltimore, Maryland.* Today, "virtual" pin maps can be made on the computer, using pins or other icons as symbols. This approach is known as **computer mapping.** **Crime mapping** is therefore the process of using maps to visualize and analyze crime pattern incidents in a specified area by law enforcement agencies. Sophisticated computer software such as Geographical information systems are used to crime map. This allows crime analysts to identify crime hotspots along with their trends and patterns. With the information police officers are able to make precise decisions, target resources, formulate strategies and help in tactical analysis. 1. Target hardening 2. Target removal 3. Reducing of means 4. Reducing the payoff 5. Access control 6. Surveillance 7. Environmental change 8. Rule setting 9. Increasing the chances of arrest 10. Deflecting offenders Although it is tempting to think of geographic information systems (GIS) as a thoroughly contemporary technology, its conceptual roots reach far back. A GIS is based on drawing different spatial distributions of data on paper (or other suitable media) and overlaying them on one another to find interrelated points. Modern geographic information systems can be linked to developments in the 1960s. The earliest applications of crime mapping appeared in the mid-1960s. Early GIS efforts were restricted by the limitations of older computer systems lacking memory and speed, such as the 512k memory of the IBM 360/65, a computer widely used in the 1960s and 1970s. These constraints limited the attractiveness of GIS technology to law enforcement agencies. GIS applications in policing took off in the late 1980s and early 1990s as desktop computing became cheaper and software became more accessible and user friendly. **What Is a GIS?** A GIS is a computerized mapping system that permits information layering to produce detailed descriptions of conditions and analyses of relationships among variables. Take for example; you want to calculate the crime rate in a specific area. To answer this we have to know the base of the rate. Do we want it per 1,000 persons, per reporting area, or per police division? To calculate this rate we must know how many crime incidents have occurred, and, if we are calculating a population-based rate, how many persons there are per unit area. This value, the base of our rate, is also known as the denominator, because it is the bottom of the fraction used to calculate the rate. Therefore: \ [\$\$density(rate) = \\frac{\\text{number\\ of\\ incidents\\ per\\ area}}{\\text{population\\ per\\ area}}\$\$]{.math.display}\ If there are 428 incidents and the population expressed in thousands is 3.7, the rate is 428/3.7, or 115.68 per 1,000 persons. **A GIS program** would do these calculations for you, but analysts need to know how to provide appropriate instructions before anything useful can be produced. Functions of GIS The two main functions of GIS are: 1. GIS is used for *descriptive*, *analytical*, and *interactive* purposes 2. GIS is used to represent information in the form of *points*, *areas (polygons)*, and *lines*. Limitations of crime mapping and GIS 1. **Technology imbalance** Most police departments do *not* use crime mapping technology. 2. **Urban, suburban, and rural differences** In terms of crime analysis and mapping, the perspectives and needs of urban, suburban, and rural police departments greatly differ. 3. **Incomplete geocoding** Most of our areas have to be geocoded to enable the use of GIS applications 4. **Costs** Some GIS applications are costly to buy and maintain **Computer applications in crime mapping** Crime mapping can be applied in various areas of policing which are not limited to: 1. *Criminal intelligence.* 2. *Crime prevention.* GIS applications can be used in monitoring of high risk repeat offenders/offences. Hotspots can be assigned extra patrols therefore optimizing resources. 3. *Courts and corrections.* The mapping of home addresses of parolees and probationers, along with modus operandi data, enable law enforcement to quickly identify local parolees as potential perpetrators of particular crimes occurring in a neighborhood. 4. *Public information* 5. *Resource allocation and planning.* GIS can be effective in decision making process whereby resources can be allocated proportionally to the events. **References** 1. Rich, T.F. (1995). *The Use of Computerized Mapping in Crime Control and Prevention Programs*. Washington, DC: U.S. Department of Justice, National Institute of Justice. NCJ 155182 2. Weisburd, D., and J.T. McEwen, eds. (1997). *Crime Mapping and Crime Prevention*. Monsey, NY: Criminal Justice Press. 3. **U.S. Department of Justice. *Mapping crime; Priciple and Practise.* Wasington, DC:** Office of Justice Programs, *National Institute of Justice* LESSON FOUR: POLICING THE CYBER SPACE ------------------------------------- **KEY NOTES** **INTRODUCTION** There is no explicit agreement about the exact year in which we can talk about the beginning of the implementation of social networks. However, it can be noted that social tools, with the characteristics that we know today, began to appear in the 90s. However, the first signs of social networks go back to previous years. The National Police service has social media accounts which promote relationship between police and the members of the public. It also serves as a channel for collection of vast information the internet offer. These accounts are: 1. YouTube- National Police Service Kenya- Official 2. Facebook -- National Police service 3. Twitter - National Police Service-Kenya (\@NPSOfficial\_KE) **DEFINITION AND TYPES OF SOCIAL MEDIA** - **Internet and law enforcement** The internet and the number of its users have grown faster than anyone ever imagined. As people continue to venture into cyberspace and conduct activities online, this has created vast opportunities for cyber-crime. The mode of traditional crime has thus evolved and much of the criminal activities are conducted online. Law enforcement officers therefore, have an obligation to up their game in order to curb these fat evolving criminal activities. **DEFINITION** **Social media** - Forms of electronic communication (as websites for social networking and micro blogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos). - **A** method of communicating using websites that allow people to post public information, chat with others, send messages and share photographs or videos. - Computer-mediated technologies that allow the creating and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. The variety of stand-alone and built-in social media services currently available introduces challenges of definition. However, there are some common features. 1. Social media are interactive Web/Internet-based applications. 2. User-generated content, such as text posts or comments, digital photos or videos, and data generated through all online interactions, are the lifeblood of social media. 3. Users create service-specific profiles for the website or app that are designed and maintained by the social media organization. 4. Social media facilitate the development of online social networks by connecting a user\'s profile with those of other individuals and/or groups. Social media use web-based technologies, desktop computers and mobile technologies (e.g. smartphones and tablet computers) to create highly interactive platforms through which individuals, communities and organizations can share, co-create, discuss, and modify user-generated content or pre-made content posted online. They introduce substantial and pervasive changes to communication between businesses, organizations, communities and individuals. Social media changes the way individuals and large organizations communicate. **TYPES OF SOCIAL MEDIA** These types of platforms allow you to share and consume information across your network and to join, create, and participate in groups. 1. **Social Networking** a. **Facebook** b. **LinkedIn** c. **Google+** d. **WhatsApp** 2. **Video Sharing** a. b. 3. **Live-Streaming** a. b. 4. **Micro blogging** a. b. 5. **Blogging** a. b. 6. **Social News** a. b. 7. **Photo Sharing** a. b. 8. **Content Curating** a. b. 9. **Wikis** Wikis are collaborative platforms where users contribute articles to create sites full of vast information. They include: a. **Wikipedia** b. **Wikia** **POLICE FOCUS ON SOCIAL MEDIA** A. **Scope** 1 **Intelligence gathering** - Social media intelligence allows one to collect intelligence gathering from social media sites, using both intrusive or non-intrusive means, from open and closed social networks. 2 **Crime Investigation -** social media has been used in investigation of both serious and less serious crimes. It allows the police to listen to what their communities are saying and to build evidence for investigations by monitoring social media content. Criminal investigation strategies that use social networking have hit the mainstream. Once looked upon with skepticism, an increasing number of law enforcement agencies have embraced the technology. It is not unusual to hear a news story about a criminal who posted details of their actions online, only to be apprehended within hours. 3 **Public Order -** Policing of public order is changing rapidly. Demonstrators have become aware of the power of organizing marches and protests over the internet, and the rise of mobile social media such as Twitter on smartphones has meant that protests can be organized almost spontaneously, and without a clear leadership or organizing group. 4 **Providing information** -- enabling specifically-targeted information to be shared quickly, easily and cheaply. 5 **Engagement** -- providing the police with a way of connecting and building relationships with local communities and members of the public. 6 **Crime Prevention** - One of the easiest ways for law enforcement agencies to prevent crimes of opportunity is by educating the public about the value of privacy in social networking venues. 7 **Public Relations -** Law enforcement -- like any other business -- can benefit from the use of social media to build relationships within an online community. Not only can agencies publish crime notices as indicated above, they can also share information on employment opportunities, neighborhood ―night out‖ events, charitable initiatives, fundraisers, and more. B. **Security risks and social media** 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. **Managing police use of social media -** Police officers and staff of all ranks and levels of experience are able to use social media, which presents considerable management challenges. Content placed on social media by police officers and staff must be appropriate for public consumption and use the right tone and style. **PRECAUTIONS AND PROHIBITIONS** - Do not post information related to any police tactical response without official approval. - Do not disseminate any information that should not be disseminated by law. - Prohibit the display of any logo, uniform, patch or badge. - Make it clear when employees may exercise free speech on their personal sites. - For safety reasons, employees should not post information identifying them as department members. - Employees should be prohibited from using speech that is obscene, sexually explicit, or inflammatory. - Personnel should be aware that they may be subject to civil litigation for posting false information. - Employees should have no expectation of privacy on posts that are in the public domain. **DISCIPLINARY ACTION** Social media policy always include a provision for disciplinary actions in the event of policy infractions, including possible termination of employment - **Characteristics of computer crimes** 1. Its committed using a computer 2. A computer is either a tool, a target or both 3. The crime is perpetrated in a computer environment 4. The crimes are mostly non violent - **Classification and types of computer crimes** - **Handling of convectional and digital evidence** - **Cyber-crime investigations** - **Challenges in investigating computer and cyber crimes** 1. The perpetrators are often smart and well informed people 2. Challenges associated with legal frameworks 3. Too many cybercrime incidents 4. Lack of experts in policing agencies 5. Challenge in linking a particular crime to a certain person **Terrorism and social media** Terrorism and social media refers to the use of social media platforms to radicalize and recruit violent and non-violent extremists (Wikipedia). Terrorists have found social media to be useful for disseminating ideology, recruiting terrorists and even planning operations. Police officers should therefore make good use of social media to gather information, prevent criminal activities and apprehend criminals. Assessment/Evaluation - Kona Mbaya police station has developed a Facebook page where members of public can report and highlight security threats within Kona Mbaya area. As a Deputy OCS, discuss ways in which social media can be utilized to prevent and solve crimes in your jurisdiction. Reference - Tiry E, Oglesby-Neal A, and Kim K,(2019). Social media guidebook for law enforcement agencies. - National Police Service manuals. Lesson Five: Integrated Communication Command and Control (IC3) centre ---------------------------------------------------------------------- DURATION: 60 MINS EXPECTED CLASS SIZE: 40 COMPETENCE: The trainee should comprehend the utilization of IC3 in policing technology LESSON OBJECTIVES: By the end of the lesson the trainee should be able to: +-----------+-----------+-----------+-----------+-----------+-----------+ | Objective | Domain (√ | | | | | | s | Tick) | | | | | +===========+===========+===========+===========+===========+===========+ | | K | U | S | A | B | +-----------+-----------+-----------+-----------+-----------+-----------+ | 1. Expla | | √ | | | | | in | | | | | | | the | | | | | | | meani | | | | | | | ng | | | | | | | of | | | | | | | Integ | | | | | | | rated | | | | | | | Commu | | | | | | | nication, | | | | | | | Comma | | | | | | | nd | | | | | | | and | | | | | | | Contr | | | | | | | ol | | | | | | | Centr | | | | | | | e | | | | | | | in | | | | | | | polic | | | | | | | ing | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 2. Expla | | √ | √ | | | | in | | | | | | | the | | | | | | | IC3 | | | | | | | opera | | | | | | | tions | | | | | | | and | | | | | | | capab | | | | | | | ility | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 3. Discu | | √ | | | | | ss | | | | | | | the | | | | | | | impor | | | | | | | tance | | | | | | | of | | | | | | | IC3 | | | | | | | in | | | | | | | polic | | | | | | | ing | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | 4. Discu | | √ | | | | | ss | | | | | | | the | | | | | | | succe | | | | | | | sses | | | | | | | and | | | | | | | chall | | | | | | | enges | | | | | | | of | | | | | | | IC3 | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ | KEY: K- | | | | | | | Knowledge | | | | | | | ; | | | | | | | U-Underst | | | | | | | anding; | | | | | | | S-Skills; | | | | | | | A-Attitud | | | | | | | e; | | | | | | | B-Behavio | | | | | | | ur | | | | | | +-----------+-----------+-----------+-----------+-----------+-----------+ Questions 1. Explain the organizational structure of IC3 2. Discuss the importance of IC3 in modern policing in Kenya. 3. Outline the major benefits of the IC3 technology KEY NOTES INTEGRATED COMMUNICATION COMMAND AND CONTROL (IC3) CENTRE The National Police Service deals with a wide range of incidents and operations that are typically resolved by deploying resources available at that time. On occasion, however, the police response to certain incidents or operations requires a different approach and the establishment of a dedicated command structure may be required. The Integrated Communication Command and Control (IC3) Centre is the operation room situated at National Police Service Headquarters, IG's office, offering a point of contact for any member of public seeking urgent police assistance, information or facing a crisis situation. With the main operation room based at the National Police Service Headquarters, IG's office, the IC3 has reinforced its national response with the opening of additional center at Mombasa and planning to open more centers within the country. In this way, the IC3 can better provide 24 hours 7 days a week operational support across country while delivering more direct assistance and communications. ORGANIZATIONAL STRUCTURE OF IC3 **2. IC3 OPERATIONS AND CAPABILITY** The IC3 operation integrates the Command, Control, and Communication functions through the following service areas: - ***Emergency Call Centre (ECC)*** -- ECC handles all incoming and outgoing public trunk calls in wake of emergency. ECC receives emergency calls from 999,911,112. - ***Dispatching Centre (DC), Nairobi Area and Traffic Control*** - Dispatches monitor and supports operational resources efficiently and in a timely manner. They are responsible for contacting police officers and other agencies (e.g. Fire brigade, Emergency medical, Emergency power services, Kenya wildlife service, Emergency children and gender cases etc.) support within the country. - ***Critical Incident Management Suite (CIMS)*** -- CIMS proactively and intelligently monitors the public spaces and which include: - CIMS plans and manages all the pre-planned and spontaneous major events through a defined escalation process to contain and manage a situation or an event through a clearly defined command structure. It contains integrated tools that merge information in an environment that provides leadership quick and accurate data to evaluate situations. - Video Management System is responsible for displaying video streams Video-Based Incident Detection system based on intelligent analysis of the video streams of the CCTV Cameras. - Video Wall Management System (and video wall) displays video streams on the video wall. - Automatic Number Plate Recognition (ANPR) Control System controls all ANPR equipment and archiving/retrieving recognized license plates. - Data Centre operates as a receiving and recording point for CCTV images that are available to the CCTV matrix for IC3 Centre. Images can be displayed and, where appropriate, passed into the Dispatching Centre for viewing at work-stations and/or for display on the video-wall. **Importance of IC3 in policing** a. Provides centralized command and communication during major events and incidents b. Assuming a crisis-management role during serious incidents, such as terrorist attacks, and coordinating specialized assistance. c. Assessing all incoming communications and determining the priority level of each message received by Contact Support Officers. d. Conducting instant checks, distributing, assigning information and replying to all urgent queries immediately. e. Monitoring open sources in order to assess threats and to ensure the full resources of the organization are ready and available whenever and wherever they may be needed. f. Coordinating the exchange of intelligence and information for important operations, and involving specialist units, regional offices and external partners as necessary. g. Deploying support teams at major events with an international implication in order to support national police with security arrangements. Success a. Reduced crimes within the country b. Quick deployment of police resources c. Quick response to crime incidences and emergencies d. Reduced traffic congestions on the roads Challenges a. New technologies, new organizational challenges, and evolving threats have made Police Communication Command and Control Center more challenging than ever. b. Systems tend to fail when they are stressed, often during an emergency; when you need them most. If the target area's command and control infrastructure is rendered unusable, an incident command post from a neighboring jurisdiction needs to assume control. **Assessment/Evaluation** - Discuss how IC3 technology helps a senior sergeant in better management and supervision of the juniors in their respective stations and platoons. **References** - National Police Service-Official, (2017). Retrieved 20 September, 2019 from