NT O F
M E
T R
A P E
D
J U S
T
I
C E
U.S. Department of Justice’s Global Justice Information Sharing Initiative
Global Justice Information Sharing Initiative United States Department of Justice
Criminal Intelligence Resources Guide
A Collection of Intelligence Information Sharing Products and Resourc Resources es
June 2011
Criminal Intelligence Resources Guide
About Global
The U.S. Department of Justice’s Global Justice Information Sharing Initiative (Global) serves as a Federal Advisory Committee to the U.S. Attorney General on critical justice information sharing initiatives. Global promotes standards-based electronic information exchange to provide justice and public safety communities with timely, accurate, complete, and accessible information in a secure and trusted environment. Global is administered by the U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Assistance.
This project was supported by Grant No. 2009-DB-BX-K105 awarded by the Bureau of Justice Assistance, Office of Justice Programs, in collaboration with the U.S. Department of Justice’s Global Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Justice.
ii
Criminal Intelligence Resources Guide
Foreword The U.S. Department of Justice’s Global Justice Information Sharing Initiative (Global), its working groups, and partner agencies and organizations have developed many valuable resources that assist law enforcement intelligence personnel in improving agency operations and criminal intelligence sharing efforts. To centrally locate these resources so as to provide the law enforcement intelligence community with a single reference to “all things intelligence” is an ongoing challenge. As such, the Criminal Intelligence Resources Guide was created to address this need. While this document does not claim to be the all-encompassing guide to intelligence products, it does aim to capture a valuable representation of the intelligence-related resources available to the intelligence community. This document is considered to be a “living document,” and persistent effort will be employed to continually update it as new resources are identied. The Criminal Intelligence Resources Guide was prepared under the guidance of the Criminal Intelligence Coordinating Council (CICC), a Global working group, and sponsored by the U.S. Department of Justice (DOJ), Ofce of Justice Programs (OJP), Bureau of Justice Assistance (BJA). This collaborative effort of state, local, tribal, and federal government ofcials, via the CICC and its research arm, the Global Intelligence Working Group, provides a well-balanced approach not only to the content and organization of this document but also to the many resources detailed herein.
About the Criminal Intelligence Coordinating Council The Criminal Intelligence Coordinating Council (CICC), established in May 2004, is made up of members representing law enforcement and homeland security agencies from all levels of government and serves as an advocate for state, local, and tribal law enforcement and their efforts to develop and share criminal intelligence for the purpose of promoting public safety and securing the nation. The CICC operates at the policy level—setting priorities, directing research, and preparing advisory recommendations to the Global Advisory Committee (GAC). The GAC acts as the focal point for justice information sharing activities and works to provide the U.S. Attorney General and the U.S. Department of Justice (DOJ) with appropriate input from state, local, tribal, and federal agencies/associations in the ongoing pursuit of interjurisdictional and multidisciplinary justice information sharing.
Relationship to Intelligence-Led Policing The goals of the Criminal Intelligence Resources Guide and intelligence-led policing (ILP) are very similar, in that both ILP and the Criminal Intelligence Resources Guide seek to provide law enforcement with the ability to strategize and take a targeted approach to crime control while focusing on the identication, analysis, and management of persisting and developing problems. ILP implementation results in better allocation of resources, saving money, crime prevention rather than reaction, and use of technology and well-dened business processes.
iii
Criminal Intelligence Resources Guide
iv
The CICC believes that the Criminal Intelligence Resources Guide will be a valuable asset to law enforcement agencies that engage in ILP by providing them with a single document of well-organized products and resources that benet the intelligence community and the institutionalization of ILP.
Criminal Intelligence Resources Guide
How to Use This Guide The Criminal Intelligence Resources Guide focuses on intelligence products available to law enforcement ofcials. This guide contains a listing of available products and a brief summary of what each product entails. The guide is broken down into the following categories:
Analysts Fusion Centers
Policy
Training and Technical Assistance (specic to fusion centers)
Technology
Gangs
General Intelligence
Nationwide SAR Initiative (NSI)
Privacy
Security
Training (other than fusion center training)
Documents are sorted alphabetically under each category and are available electronically via the hyperlinked title. To access a document electronically, click on the title of the document or copy the Web address (underneath the document title) and then paste it into your browser’s address bar. Hard copies may also be obtained by completing the order form (included on page vi) and submitting it online, by e-mail, or by fax.
Access to Copies of Resources Contained in This Guide Electronic Copy Access For an electronic copy of any of the resources detailed in this guide, please click on the title of the document in which you are interested and you will be taken to the copy available online. You may print out as many copies as you need.
Hard-Copy Access For hard copies of any of the resources detailed in this guide, please complete the enclosed form and e-mail it to
[email protected].
v
Criminal Intelligence Resources Guide
Intelligence Resources Request Form Document Name
Quantity
1. 2. 3. 4. 5. 6. 7. 8.
Shipping Information: Name: ___________________________________________________________ Title: _____________________________________________________________ Address 1: ________________________________________________________ Address 2: ________________________________________________________ City, State, Zip: _____________________________________________________ Phone Number: ____________________________________________________ E-mail Address: ____________________________________________________ Additional Shipping Notes: ____________________________________________ _________________________________________________________________
Send to: E-mail: Fax:
vi
[email protected]
(850) 422-3529
Mail:
IIR/Information Sharing Post Ofce Box 12729 Tallahassee, FL 32317
Criminal Intelligence Resources Guide
Table of Contents Foreword ............................................................................................ iii How to Use This Guide........................................................................v Intelligence Resources Request Form .............................................vi Analysts ...............................................................................................1 Fusion Centers ....................................................................................3 Policy ........................................................................................................3 Training and Technical Assistance (specific to fusion centers) ..............4 Technology ..............................................................................................5
Gangs ..................................................................................................6 General Intelligence ..........................................................................7 Nationwide SAR Initiative (NSI) .........................................................9 Privacy .............................................................................................. 11 Security ............................................................................................. 12 Training (other than fusion center training ) ..................................................... 13 Appendix A—Intelligence and Information Sharing Web Sites ............................................................................ 14
vii
Criminal Intelligence Resources Guide
viii
Criminal Intelligence Resources Guide
Analysts Analyst Toolbox http://it.ojp.gov/docdownloader.aspx?ddid=1284 Provides intelligence analysts with information on the tools they need to effectively and efciently perform their duties and produce useful intelligence products. The tools examined in this document represent the basic toolbox that the intelligence analyst will need to provide the vital intelligence service expected in today’s law enforcement environment.
Common Competencies for State, Local, and Tribal Intelligence Analysts http://it.ojp.gov/docdownloader.aspx?ddid=1296 Identies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for analysts to effectively perform their job duties and are required in their unique operating environments.
Law Enforcement Analyst Certification Standards http://it.ojp.gov/documents/law_enforcement_analyst _certification_standards.pdf Assists in instituting standards for the intelligence analysis process to ensure that intelligence products are accurate, timely, factual, and relevant, while also recommending implementation of policy and/or action(s). The certication standards incorporate the Law Enforcement Analytic Standards, developed by the International Association of Law Enforcement Intelligence Analysts (IALEIA) with support from the Global Intelligence Working Group (GIWG). This booklet contains 25 recommended analytic standards. The rst 7 standards relate to analysts or those who ll the analytic function. These standards refer to education, training, professionalism, and certication. The remaining standards relate to analytical products and processes.
1
Criminal Intelligence Resources Guide
Law Enforcement Analytic Standards http://it.ojp.gov/documents/law_enforcement_analytic _standards.pdf Consists of 25 standards that explain the requirements of agencies to adopt the minimum standards for intelligenceled policing in order to support the development of sound, professional, and analytical products (intelligence). Included are educational standards and intelligence process standards, as well as testimony, data-source attribution, and feedback standards.
2
Criminal Intelligence Resources Guide
Fusion Centers Policy Baseline Capabilities for State and Major Urban Area Fusion Centers http://it.ojp.gov/docdownloader.aspx?ddid=1051 Identies the baseline capabilities for fusion centers and the operational standards necessary to achieve each of the capabilities. It is an addendum to the U.S. Department of Justice’s (DOJ) Global Justice Information Sharing Initiative’s (Global) Fusion Center Guidelines, which provide guidance to ensure that fusion centers are established and operated consistently across the country. Using the Fusion Center Guidelines, as well as identied best practices, federal, state, and local ofcials identied the capabilities and standards necessary for a fusion center to be considered capable of performing basic functions.
Critical Infrastructure and Key Resources (CIKR): Protection Capabilities for Fusion Centers http://it.ojp.gov/docdownloader.aspx?ddid=1136 Identies the capabilities necessary for fusion centers to establish a critical infrastructure and key resources (CIKR) protection analytic capability that supports infrastructure security activities at the state and local levels. It also provides guidance for those fusion centers that have chosen to support Critical Infrastructure Protection (CIP) activities; outlines the additional capabilities fusion centers should achieve in order to effectively integrate CIKR activities into their analysis and information/intelligence sharing processes; and identies how centers should support risk-reduction efforts taken by federal, state, local, and private sector partners. Finally, this document provides the federal, state, local, and private sector ofcials responsible for protecting CIKR with an overview of the value in working with their local fusion centers and how they can better integrate their CIP-related activities with the efforts of those fusion centers.
3
Criminal Intelligence Resources Guide
Fire Service Integration for Fusion Centers http://it.ojp.gov/docdownloader.aspx?ddid=1244 Identies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the re service into the fusion process. Within the context of this document, the re service is dened as including re and emergency operations, emergency medical service operations, rescue operations, hazardous materials operations, re prevention/protection, re investigation, incident management, and responder safety. The document is an appendix to the U.S. Department of Justice’s (DOJ) Global Justice Information Sharing Initiative’s (Global) Baseline Capabilities for State and Major Urban Area Fusion Centers.
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector **Also available online as a resource CD
http://it.ojp.gov/documents/fusion_center _guidelines.pdf Developed to ensure that fusion centers are established and operated consistently, resulting in enhanced coordination efforts, strengthened partnerships, and improved crime-ghting and antiterrorism capabilities. The guidelines and related materials will provide assistance to centers as they prioritize and address threats posed in their specic jurisdictions for all crime types, including terrorism.
Training and Technical Assistance Fusion Process Technical Assistance Program and Services http://www.ise.gov/docs/misc/fusionprocesstechassistance .pdf
GlobalJustice Information Sharing Initiative
T O F J U S T
M E N
T R
A P E D
I
C E
UnitedStates DepartmentofJustice
DHS/DOJ
Fusion Process Technical Assistance Program and Services
To facilitate the development of a national fusion center capability, the U.S. Department of Homeland Security’s (DHS) Protection and National Preparedness (PNP) and the U.S. Department of Justice’s (DOJ) Bureau of Justice Assistance (BJA) partnered in 5 2007 to develop the Fusion Process Technical Assistance Program. The Fusion Process Technical Assistance Program consists of the following components: fusion process technical assistance services, the Fusion Center Exchange Program, fusion center fellowship programs, online fusion process resources, and other specialized fusion process support services. Further, in an effort to accelerate the implementation of baseline capabilities within all state and urban area fusion centers, DHS and DOJ have partnered to develop 15 targeted fusion process technical assistance services found in this catalog.
thEdition
RevisedSeptember2010
4
Technology
Criminal Intelligence Resources Guide
Defining Fusion Center Technology Business Processes: A Tool for Planning http://it.ojp.gov/docdownloader.aspx?ddid=1118 Provides a tool to fusion center directors/managers to assist with understanding and implementing the fundamental business requirements of their centers and planning the underlying components for each of the business processes a particular fusion center is or will be undertaking (e.g., SAR process, training, statewide incident analysis). It is essential that each center fully dene its business processes before attempting to purchase or develop technology to handle those processes. If processes are not clearly dened, the technology will drive the business processes rather than the business processes driving the technology.
Fusion Center Technology Guide http://it.ojp.gov/docdownloader.aspx?ddid=1283 Provides a methodology for fusion center directors and managers that can be used to facilitate technology planning and to provide a practical perspective on the value of technology as an enabler of the fusion center mission. Fusion center directors and managers can use the document to aid in the development and implementation of technology within their fusion centers to achieve their missions.
Fusion Center Technology Resources Road Map http://it.ojp.gov/documents/Fusion_Center _Resources_Road_Map.pdf Provides fusion center leaders—in particular, senior technology managers—with guidance on how information, technology infrastructure, applications, performance metrics, and business processes align with the core business capabilities of a fusion center. Leaders can use this document to assist in formulating a strategic technology vision and plan for their centers and to support sound investment and technology selection decisions within such a plan.
5
Criminal Intelligence Resources Guide
Gangs Guidelines for Establishing and Operating Gang Intelligence Units and Task Forces http://it.ojp.gov/docdownloader.aspx?ddid=1058 Provides guidance to agencies seeking to establish and operate gang task forces or gang intelligence units within their jurisdictions or to those agencies that participate in gang task forces. This document was developed by the Gang Intelligence Strategy Committee (GISC), under the U.S. Department of Justice’s Global Justice Information Sharing Initiative’s Intelligence Working Group. The GISC—composed of federal, state, local, and tribal law enforcement; justice; and corrections representatives—is tasked with improving gangrelated information sharing.
6
Criminal Intelligence Resources Guide
General Intelligence Web site: www.it.ojp.gov/global
10 Simple Steps to Help Your Agency Become a Part of the National Criminal Intelligence Sharing Plan http://it.ojp.gov/documents/Ten_Steps.pdf Provides valuable guidance towards systematically sharing law enforcement information among federal, state, local, and tribal law enforcement agencies—large or small—using ten succinct steps to information sharing success.
1.
Recognize your responsibilities and lead byexample
2.
Establish amission statement and apolicyto address developing andsharinginformationandintelligencedatawithinyour agency
3.
Connect to your state criminal justice network and regional intelligencedatabases, andparticipatein informationsharing initiatives
4.
Ensure privacyissues are protected in policyand practice
5.
Access law enforcement Websites, subscribe to law enforcement listservs, and use the Internet as an information resource
6.
Provide your agencymembers with appropriate trainingon the criminalintelligenceprocess
Recognizethevalueof sharingintelligenceinformationwithinyour ownagency, andencourage thepracticeof sharinginformationwithotherlawenforcement andpublicsafetyagencies. Usethe guidelinesandaction steps outlinedinthe NationalCriminalIntelligenceSharingPl an (“Plan”)to implement orenhanceyourorganization’s intelligencefunction.
NT O F J U S T I C
M E
T R
A P E D
E
10 Simple Steps to help your agency become a part of the National Criminal Intelligence Sharing Plan Workingtowards
ThePlanprovidesmodel policies andguidelinesfor implementingorreviewingan agency’s intelligence function. ExamplesincludeCriminalIntelligence Systems OperatingPolicies fede ralregulation 28CFRPart 23, theInternationalAssociationof Chiefsof Police’s CriminalIntelligenceModelPolicy, andtheLawEnforcement IntelligenceUnit’s (LEIU) CriminalIntelligenceFileGuidelines.
Manystatesprovideaccess toothergovernment databases,includingmotorvehicles, corrections, andothers. Regionalintelligencedatabasesandsharinginitiatives promotecommunicationand collaborationbyprovidingaccess tootheragencies’and organizations’investigativeandintelligence data.
Theprotectionof individuals’privacyandconstitutionalrights isanobligation of gover nment ofcials andiscrucial tothelong-termsuccess of criminalintelligencesharing. ThePlanprovides g uidelines that support policieswhichwillprotect privacy andconstitutionalrights while not hinderingthe intelligenceprocess. Implem entingandsupportingprivacy policiesandpracticeswithinyour agency willalsoreduce yourorganization’sliability concerns.
ManyWebsites ontheInternetandothersonclosed networksprovidevaluableintelligence assessments andnews. Listservsprovideinstant andwidespreadcommunicationforinvestigators. Listservsallowboth thereceipt anddistributionof intelligenceinformation. TheInternet pro videsa wealthof open-sourceinformation, includinggovernment informa tionandaccess to privateagencies that sharewithlawenforcement.
Sometrainingmodels ormodulesarealready foundinInternet-basedandinteractive CDs, suchas theInternationalAssociationof LawEnforcement IntelligenceAnalysts (IALEIA), NationalWhiteCollar CrimeCenter, andLEIU“TurnKeyIntelligence.” Alisting of availableintelligencetrainingsourcesand specicallyscheduledclasses isfoundon theIALEIAWebsite: www.ialeia.org. Thislistingallows individualstodirectly contact trainingsourceagenciesand organizationsformoreinformationon classes andschedules.
7.
Become amember of your in-region Regional Information SharingSystems® (RISS)center
8.
Become amember of the Federal Bureau of Investigation’s (FBI) LawEnforcementOnline(LEO)system
9.
Partner with public and private infrastructure sectors
RISS operatestheonly secureWeb-basednationwidenetworkforcommunicationand exchange of criminalintelligenceinformationbylocal, state, federal, andtribalparticipatinglawenforcement memberagencies. RISS partnerswithotherlawenforcement systems toelectronicallyconnect themto RISSNETTM, includingHighIntensity DrugTrafckingAreas(HIDTA)InvestigativeSupport centersand otherfederalandstate agency syste ms.
systematicallysharing law enforcement informationamong local, state, tribal, and
TheFBI’s LEO systemisasensitive but unclassied,real-timeinformationsharingcommunications systemforall levelsof thelawenforcement communityandis availableat nocost toitsusers. LEO provides securee-mailcapability, anationalalert mechanism,andaccessto over125special-interest groupsforsharinginformationby providingaccessto othernetworks, systems,databases, an dother services.
federallaw enforcement agencies—largeor small
Reprinted02/08
Regularcommunicationwiththeentities that controlAmerica’scriticalinfrastructures, suchasenergy, agriculture, transport ation, andshipping, iscritically important toensuringthe safetyandsecurity of the citizens inyourcommunity.
10. Participateinlocal,state,and nationalintelligenceorganizations Inmost areasof thecountry, the rearelocally basedintelligenceorganizationsthat welcome participationfromallagencies andareoftenafliated withst ateandnationalorganizations.
UnitedStates Department of Justice
Thisdocumentwaspreparedundertheleadership,guidance,andfunding oftheBureauofJusticeAssistance(BJA), OfficeofJusticePrograms,U.S.DepartmentofJustice,incollaborationwiththe U.S.DepartmentofJustice’sGlobalJustice InformationSharingInitiative.Theopinions,findings,andconclusionsorrecommendationsexpressedinthisdocumentare thoseoftheauthorsand donotnecessarilyrepresenttheofficialpositionorpoliciesofthe U.S.DepartmentofJustice.
Interagency Threat Assessment and Coordination Group (ITACG) Intelligence Guide for First Responders http://www.ise.gov/sites/default/files/ITACG _Guide_2ed.pdf Designed to assist state, local, and tribal law enforcement and reghting, homeland security, and appropriate private sector personnel in accessing and understanding federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting. Most of the information contained in this guide was compiled, derived, and adapted from existing intelligence community and open source references.
Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies, Second Edition http://it.ojp.gov/docdownloader.aspx?ddid=1133 Describes changes (since the publication of the rst edition) in the philosophy, national standards, and practice of law enforcement intelligence, while maintaining the core goal of being a primer on “all things intelligence” for the law enforcement community. The guide is intended to support policy in law enforcement agencies and seeks to objectively provide the best knowledge and practice of law enforcement intelligence at the time of publication. It is not intended to be an academic work, nor does it look at theoretical issues or arguments. It is not directed as a guide to the intelligence community except to explain the roles, responsibilities, and restrictions of the intelligence community’s
7
Criminal Intelligence Resources Guide
state, local, and tribal law enforcement partners. UnitedStates Department of Justice
National Criminal Intelligence Sharing Plan (NCISP) http://it.ojp.gov/documents/NCISP_Plan.pdf Executive Summary
**Also available online as an overview CD ( http://it.ojp.gov/documents/ncisp/ )
National Criminal Intelligence Sharing Plan Solutions and approaches for acohesive plan to improve our nation’s abilityto develop and
Reprinted06/10
he need for a National Criminal Intelligence Sharing Plan (“Plan”) was recognizedascriticalafter thetragic events of September11, 2001, when nearly3,000innocentliveswerelostasaresultof terroristattacksagainstthe UnitedStates. This event initiatedaconcertedeffort by Americanlawenforcement agencies tocorrect theinadequacies andbarriers that impedeinformationand intelligencesharing—sothat future tragedies couldbeprevented.
“ThisPlan representslaw
Inspring2002, law enforcement executives andintelligenceexperts attendingthe InternationalAssociationof Chiefs of Police(IACP)CriminalIntelligenceSharing Summit recognizedthat local, state, tribal, andfederallaw enforcement agencies andthe organizationsthat represent them must work towards commongoals— gatheringinformationandproducingintelligencewithint heiragency andsharing that intelligencewithother lawenforcement andpublicsafetyagencies. Summit participants calledforthecreation of anationally coordinatedcriminalintelligence councilthat woulddevelopandoverseeanationalintelligenceplan. 1 Inresponse tothis crucial need, theU.S. Department of Justice’s GlobalJusticeInformation SharingInitiative(Global)IntelligenceWorkingGroup(GIWG)was formed. Local, state, and tribal law enforcement representatives were key participants in the development of the NationalCriminalIntelligenceSharingPlan .
connected, be it in crime
T
**Also available – Executive Summary ( http://it.ojp.gov/documents/NCISP _executive_summary.pdf )
enforcement’scommitment
sharecriminalintelligence
to take it upon itself to ensure that the dotsare orterrorism. The Plan isthe outcome of an unprecedented effort by law enforcement agencies,
October2003
with the strong support of the Department of Justice, to strengthen the nation’s security through better
Many state law enforcement agencies and all federal agencies tasked with intelligencegatheringandassessmentresponsibilitieshaveestablishedintelligence intelligence analysisand functions withintheirorganizations. However, approximately 75percent of the law enforcement agencies nthe i UnitedStateshave less than24swornofcers, and sharing.” FormerU.S. AttorneyGeneral moreoften thannot, theseagencies donot havestaff dedicatedto intelligence JohnAshcroft functions. Ofcers inthese smaller, localagenciesinteract withthepublicin the M May14, 2004 communities daily withthe tools NationalKick-Off Event T hi n in h n irthey patrolona i n l ri in l n basi l ils.nProvidinglocalagencies hrn i ln and resources necessary receiving, and “ l n” n rin n , for developing, ll n r gathering, i h accessing, l n sharingintelligenceinformationis critically importan t toimproving publicsafety ih n r l n r n r i n l . andhomelandsecurity. l h r J i i n , J i r r ,During . . a February r n 2003 J i speech, , in rnPresident r hi i George hh l W.l Bush pledged to make n lli n informationsharinganimportant rkin r , h lni r toolinthenation’s l in lli n h rin waron terror. “Allacrossour ini i i hcountryr we’llbeable h totie ri nourterrorist in lli n informationtolocal n r ni informationbanksso r h that r i thefront n lineof defeatingterrorbecomes r 11 , 1. activatedandreal, andthosearethe locallawenforcement ofcials. Weexpect themto bea part of oureffort; wemust givethemthetoolsnecessaryso theycandotheirjob.” The NationalCriminal agencies canemploy Th . . IntelligenceSharingPlan r n J i ’ l is akey l J itool nthat r lawenforcement i n h rin tosupport efforts. ni i i l l r theircrime-ghtingandpublicsafety r l i r i h .. rn n r l n ri i l i in r i n h r ni ini i i . l l r 1 Additionalninform r ation - on the IACPSummit l r ni incanr be located i n in h n Recommend ations From the I ACPIntelSharing: ANat Policing at the Local, r i i ligencen Summit,il Criminal Intelligence ni i i h iional l Plan , for rIntelligence-Led , State,andFederalLevels. This document is availableat http://www.theia cp.org/Porta ls/0/pdfs/Pu blications l , n/intelsharingreport.pdf i l in r. i n in r n r n ir n n . l li ini r h . . r n J i , J i r r , r J i i n .
Provides a blueprint to help agencies establish criminal intelligence sharing policies, procedures, standards, technologies, and training. Implementation of the NCISP will provide law enforcement agencies with the ability to gather, analyze, protect, and share information and intelligence to identify, investigate, prevent, deter, and defeat the perpetrators of criminal and terrorist activities, both domestically and internationally. Th
ln n i i :
i i n l i 3 -
u
T R
S T I C E
The
National Criminal Intelligence Sharing Plan
NationalCriminalIntelligence Sharing Plan
r ni
h
E NT O F J U
A P E D
u r
n il
n l
l -
in il
l
r
h
l i ri.
.
r t
l r
l h n
1
Solutions and approaches for acohesive plan to improve our nation’s abilityto develop and sharecriminalintelligence
/
Navigating Your Agency’s Path to Intelligence-Led Policing http://it.ojp.gov/docdownloader.aspx?ddid=1082 Serves as an overview for implementing the intelligenceled policing (ILP) framework within a law enforcement agency and provides insight regarding the challenges of ILP implementation. The ILP approach is a process for enhancing law enforcement agency effectiveness. It also provides an organizational approach to gather and use many sources of information and intelligence to make timely and targeted strategic, operational, and tactical decisions, thereby enhancing law enforcement effectiveness. Law enforcement executives can use this document as a resource to assist in the successful implementation of the ILP framework within their agencies.
Why Law Enforcement Agencies Need an Analytical Function http://it.ojp.gov/documents/analysts_9_steps.pdf Delivers nine convincing reasons why the analytical function is so important to law enforcement agencies.
8
Criminal Intelligence Resources Guide
Nationwide SAR Initiative (NSI) Web site: http://nsi.ncirc.gov
Findings and Recommendations of the Suspicious Activity Report (SAR) Support and Implementation Project http://it.ojp.gov/documents/SAR_Report _October_2008.pdf Describes the all-crimes approach to the gathering, processing, reporting, analyzing, and sharing of suspicious activity by local police agencies. This report and its recommendations are important for establishing national guidelines that will allow for the timely sharing of SAR information; however, it is understood that every jurisdiction will have to develop policies and procedures that take into account the unique circumstances and relationships within that community. These recommendations are intended to be used by law enforcement agencies to improve the identication and reporting of suspicious activity and the sharing of that information with fusion centers and Joint Terrorism Task Forces (JTTFs). UNCLASSIFIED
ISE-FS-200
INFORMATIONSHARING ENVIRONMENT (ISE) FUNCTIONALSTANDARD (FS) SUSPICIOUSACTIVITYREPORTING (SAR)
ISE-SAR Functional Standard, Version 1.5 (ISE-FS-200) http://www.ise.gov/docs/ctiss/ISE-FS-200_ISE-SAR _Functional_Standard_V1_5_Issued_2009.pdf Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
VERSION1.5
1. Authority. Homeland Security Act of2002, asamended; The Intelligence Reformand TerrorismPrevention Act of 2004 (IRTPA), as amended; Presidential Memorandumdated April 10, 2007 (Assignment ofFunctions Relating to the Information Sharing Environment); Presidential Memorandum dated December 16, 2005 (Guidelinesand Requirementsin Support ofthe Information Sharing Environment); DNImemorandum dated May 2, 2007 (Program Manager’sResponsibilities); Executive Order13388; and otherapplicable provisionsof law, regulation, orpolicy. 2. Purpose. Thisissuance servesas the updated Functional Standard forISE-SARs, and one ofa seriesof Common TerrorismInformation SharingStandards(CTISS) issued by the PM-ISE. While limited to describing the ISE-SAR processand associated information exchanges, information fromthisprocess may support otherISE processesto include alerts, warnings, and notifications, situational awarenessreporting, and terrorist watchlisting. 3.Applicability. ThisISE-FS appliesto all departmentsor agencies that possess or use terrorism orhomeland security information, operate systemsthat support orinterface with the ISE, or otherwise participate (orexpect to participate)in the ISE, asspecified in Section 1016(i)ofthe IRTPA. 4. References.ISE Implementation Plan, November 2006; ISE Enterprise Architecture Framework (EAF), Version 2.0, September2008; Initial Privacy and Civil Liberties Analysisfor the Information Sharing Environment, Version 1.0, September 2008; ISE-AM-300: Common TerrorismInformation StandardsProgram, October31, 2007; Common TerrorismInformation Sharing StandardsProgramManual, Version 1.0, October2007; National Information Exchange Model, Concept ofOperations, Version 0.5, January 9, 2007; 28 Code ofFederal Regulations (CFR)Part 23; Executive Order13292 (Further Amendment to Executive Order12958, as Amended, Classified National Security Information); Nationwide SuspiciousActivity Reporting Concept ofOperations,December 2008; ISE SuspiciousActivity Reporting Evaluation Environment (EE) Segment Architecture, December 2008. 5. Definitions. a. Artifact: Detailed mission product documentation addressing information exchangesand data elementsfor ISE-SAR (data models, schemas, structures, etc.).
Final Report: Information Sharing Environment (ISE)—Suspicious Activity Reporting (SAR) Evaluation Environment Provides lessons learned, best practices, and implementation steps identied during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
9
Criminal Intelligence Resources Guide
Nationwide Suspicious Activity Reporting Initiative Concept of Operations
NSICONCEPT OF OPERATIONS VERSION 1, DECEMBER 2008
http://nsi.ncirc.gov/documents/NSI_CONOPS_Version_1 _FINAL_2008-12-11_r4.pdf Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
NATIONWIDE SUSPICIOUS ACTIVITY REPORTING INITIATIVE CONCEPT OF OPERATIONS Preparedby the Program Manager, Information Sharing Environment
Suspicious Activity Reporting Process Implementation Checklist
Version 1, December 2008
http://it.ojp.gov/docdownloader.aspx?ddid=1147 A companion document to the Findings and Recommendations of the Suspicious Activity Report (SAR) Support and Implementation Project ; assists chief executives and senior leadership in implementing a SAR process within their agencies. Using this checklist in developing an internal SAR process will aid agencies in their crime prevention efforts and help successfully incorporate state, local, and tribal agencies into the nationwide SAR process.
Suspicious Activity Reporting Line Officer Training http://nsi.ncirc.gov/SARLOT Assists law enforcement line ofcers in understanding what kinds of suspicious behaviors are associated with pre-incident terrorism activities; documenting and reporting suspicious activity; and protecting privacy, civil rights, and civil liberties when documenting information. This training also provides information about integrating the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) into an agency’s operations.
Suspicious Activity Reporting Line Ofcer Training
10
Criminal Intelligence Resources Guide
Privacy Web site: http://www.it.ojp.gov
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template http://it.ojp.gov/docdownloader.aspx?ddid=1269 Assists fusion center personnel in developing a center privacy policy related to the information, intelligence, and suspicious activity report (SAR) information the center collects, receives, maintains, archives, accesses, and discloses to center personnel, governmental agencies, Information Sharing Environment (ISE) participants, and other participating criminal justice and public safety agencies, as well as to private contractors and the general public. Provisions contained in this template will help centers comply with requirements of the DHS Homeland Security Grant Program Guidance, the ISE Privacy Guidelines, and the Nationwide Suspicious Activity Reporting (SAR) Initiative.
The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety training video http://www.ncirc.gov/privacylineofficer/ Assists local, state, and tribal law enforcement line ofcers in understanding their role in the protection of privacy, civil rights, and civil liberties as they perform their everyday duties. The short video provides an introductory overview of what privacy, civil rights, and civil liberties protections are; examples of these protections; and the important function line ofcers have in upholding these protections.
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise http://it.ojp.gov/docdownloader.aspx?ddid=1285 Assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identies the highliability areas of concern that should be included when performing the review.
11
Criminal Intelligence Resources Guide
Security Electronic Questionnaires for Investigations Processing (e-QIP) Designed to facilitate the processing of standard investigative forms used when conducting background investigations. e-QIP allows the user to electronically enter, update, and transmit personal investigative data to a requesting agency over a secure Internet connection. The requesting agency will then review and approve the investigative data. This brochure details exactly what a user needs to know about the e-QIP system, from technical requirements through entering and certifying data. I i
ur r n i lii r c h l n n r r ur r fi l f r l n n r r n r n r f ur n r . ri k u ch , u c n vi urn " L L E EE L E n u rc u r cr n ur r n , h cc ur r n l . n r in
Th v il i n r u l h n Err r n r c rr c . h vli i n r u l n ci n r , u h n v i i n ull - n n u i . k hn c r ch n n click h ri in
En r : ri r n r ni f r h if r i , r h ni r uch Fr l i n I n r uc i n c r n . n if r h uh v r r n h cu n c i l ck ni h c r r n i n u n . F r h F u ill l h n i cl i r c r n h r vi i i n l n r u ri E cu vi r r . Y u ill n in i c h r n un r n h i i n l i n ru ci n c i l ck ni h c r r un.
u i n vi i n : Y u n u i n ,in n r r T h n v i i n n ui l c
u
h vi i n u l-l n nu l c ni h c i n u i n . Th n clic k h r i h h- n c nr r f h c r n .
.
r ni n : f r u c il ck h E u n , fi h r i n r r r , h il l i l h cr n i h li i n ul h fh f r . Y u u c rr c h u h v ju n r . li i n ccur n l h n uh v n n r u i n r ri l .
n
F r l i i n Errr , u crrc ur r r i f i l n i i n . f r k ni c r c i n , c il kc h h f h v ur ch n . Err r rc f r f ni l v l i i n c uc r . F r v li i n rnin in f r i n r ch c k h I F TI . nI ch ck i u . frch
,
I
c
i n n c i n ,c il ck h
n
c r llni h E u n u c r-
u i h r r vi h r u TK T HE E E T E i i n l l n i n i r u ri fi h E u n
v
u r ch n
.
F r v l i i n Er r n r ni n , u l ch c il kc h v n ni u u n . If u cli kc v n ni u , u c n v n c h n u in ihu k ni h c r r c i n . Y u il lh v c r r c h i nf r i n ir r h if n l u i i n f u rf r . If u k i k nhv r v r , clci k h u n n i r i r cl cki i n h u n. cl r l l n r n h cr n . in r: If u c n inu r l , u h ul cn c I curi . i
l h u hh - I ill u ic l v li ur f r v r cr n v , u l nu ll v li ur c r n. T , h n vi i n u ll - n n u r i h h n i f h cr n n l c li t , i n rtif u n .Th n l c lc h ri h f h ull n n. Th i ll k u h li , vi n r fi c r n .
ur
F ri Ti in n n un f r , in r uc i uhv nin
Err
n r ur l n u i n . h - I . Th n r r r c ll f r r ccuu ic ll k l n n r u if r h i l in h if u cli kc h E " ch ck . n l l n h l i u r n r r n h cr n .If r n c nl n u n h i ll h v
in
T hi cr n Th i rc n ill ri n c L i n
h n uh v c l ll f h u i n n h f r n r r u i , l c h li , vi n r fi c n fr h vi i n nu h f h cr n n cl ck i . If h i l i li i n F u n E rr r r n i f i r ni n , cl ci k h n i nu u n r c . Th cr n ill r u fin lr vi f ur i hn h r TI E u n rc .
n
Th fll in crn illhv r it f I n t i t i n u t u n . f r c r fic i i n ,Y L E KE H E T THE F . Y ur n r ill l ck n un v il l f r i ni . Th Fin l l f u cr n . .
ur r u
i in hr
lc i l th r hi l rintin . Thi lli n r . v f r ur r c r .
.
Fc
n h
l
f h t i In ti ti n f ur f r
Inv i
Electronic Questionnaires for Investigations Processing (e-QIP)
i n
u t f r rin n r
lc
l
l
i l th i n t ur F r f r r ni itn n r h rf r n c r fic i i n . Y ur c u r u h v cr in r r v i h F f l i . Th i f r f r n l i v i -l : . .c r uc cr r .h l
u r r u i r t r ni tt h r l fr h i hi n lu t h r it if ti n t t nt, n r l l f r n if li l , i l r l f r . f r r ni ni , l i n h f r . Y u r i n u r h ul l i l n r f r l ni l ck ni .k u nr h i n r l fr I c ur i . T T - .
. Th f ni l i c ilck h l u f r u h v u cc f ul l c r fi i u rf nc, ucnn chn ur rl n f r u c c h - I h n h i v n ccu r n u l n r - ul in h n r u li in in in. ITI L E TI : .
ur
Y uc n i l n r r ni u r r n l ni f r i n n i r n r ni u r l c ni h i l li nk n h h u r l f h- n c rn r f h cr n . l cin i l , n r r i n ill r. Thi cn in nHTLfr f li , h ci h l i l i l n h c r n h h n n r u h in .If ir , u c n rin fir l c i n Fil , h n rint fr h n r r
rnin h n rr r . T c rr c u r h cin h n u n.
ur
l
h li u nnrlc
in ill llh h i l in .
frn
u
Tr n i nc u n. r n rl i ur c ki n h u nl ih r i i. ., uf ur r inv i i n. in -I, f ur ill h n r - n r ll f ur n c I c uri - -
n
- il
in
r c nc rn .
DepartmentofHomelandSecurity
Officeof Intelligence andAnalysis SecurityManagementBranch .
Phone:202-447-4499 Fax: 202-447-4246
[email protected] Department o fHo meland cS eurity
. .
urt r r ut t t r t t r r u r t
t t . .
r
t r
r
t t
,t
u ur t
t
r
t t
r
t
r t: r
u t t
t
. . r r t. t r
r t r tr t t r r
r t
t t
Departmentof HomelandSecurity
Personnel
Security
Frequently
-
-
-
State & Local Clearance Process Details how an individual can be nominated for a security clearance. It outlines the forms that need to be completed for a formal nomination and the notication procedure for both acceptance and denial.
User’s Responsibility Guide: Secure Terminal Equipment (STE); QSEC – 2700 Secure Cellular Phone
State & Local Clearance Process
Departmentof HomelandSecurity
Office of Intelligence & Analysis SecurityManagementBranch Phone:202-447-4499 Fax:202-447-4246
[email protected]
Educates U.S. Department of Homeland Security personnel on how to place and receive classied phone calls. This responsibility guide has been developed for informational purposes only. Readers are advised to consult their local standard operating procedures prior to placing or receiving classied calls. Local security ofcers are available to answer further questions.
User’s Responsibility Guide Secure Terminal Equipment (STE) QSEC – 2700 Secure Cellular Phone
nc
n
-
n y
.
AskedQuestions
Officeof Intelligence and Analysis SecurityManagementBranch
-
n
u ur t r t:
Personnel Security Frequently Asked Questions
Phone: 202 447 4499 Fax:202 447 4246
[email protected]
12
ur t u t :
r
Serves as an informative resource for U.S. Department of Homeland Security personnel on matters pertaining to security. The basic Q&A format covers security clearances, background investigations, adjudication, forms, visit requests, and permanent certication.
c
t
t
Personnel Security Frequently Asked Questions
. r
t r r
r r
r
r t t
rt
ur t
t r
Criminal Intelligence Resources Guide
Training Common Competencies for State, Local, and Tribal Intelligence Analysts http://it.ojp.gov/docdownloader.aspx?ddid=1296 Identies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for analysts to effectively perform their job duties and are required in their unique operating environments.
Minimum Criminal Intelligence Training Standards for Law Enforcement and Other Criminal Justice Agencies in the United States http://it.ojp.gov/documents/min_crim_intel_stand.pdf Provides perspective and guidance for the development and delivery of law enforcement intelligence training. This document explains the recommended development of minimum training standards for all affected levels of law enforcement personnel, including core training objectives in six areas: General Law Enforcement Ofcer, Law Enforcement Executive, Intelligence Manager, Intelligence Ofcer/Collector, Intelligence Analyst, and Train-the-Trainer. The goals in developing the standards were to identify specic training topics and issues for each level of personnel involved in the intelligence process, to make specic recommendations for training objectives and the delivery of training, and to work with relevant agencies and groups to develop model curricula.
13
Criminal Intelligence Resources Guide
Appendix A – Intelligence and Information Sharing Web Sites American Correctional Association (ACA) www.aca.org
American Probation and Parole Association (APPA) www.appa-net.org
Bureau of Justice Assistance (BJA) www.ojp.usdoj.gov/bja
Criminal Intelligence Coordinating Council (CICC) www.it.ojp.gov/CICC
Dru Sjodin National Sex Offender Public Website (NSOPW) www.nsopw.gov
Executive Office for United States Attorneys (EOUSA) www.justice.gov/usao
Federal Bureau of Investigation (FBI) www.fbi.gov
Gang Resistance Education And Training (G.R.E.A.T.) www.great-online.org
Global Justice Information Sharing Initiative (Global) www.it.ojp.gov/global
International Association of Chiefs of Police (IACP) www.theiacp.org
INTERPOL www.interpol.int
Justice Information Sharing Web Site www.it.ojp.gov
Major Cities Chiefs Association www.majorcitieschiefs.org
National Center for State Courts (NCSC) www.ncsc.org
14
National Criminal Intelligence Resource Center (NCIRC) www.ncirc.gov
Criminal Intelligence Resources Guide
National Criminal Justice Association (NCJA) www.ncja.org
National Gang Center (NGC) www.nationalgangcenter.gov
National Information Exchange Model (NIEM) www.niem.gov
National Institute of Justice (NIJ) www.ojp.usdoj.gov/nij
National Sheriffs’ Association (NSA) www.sheriffs.org
Nationwide Suspicious Activity Reporting (SAR) Initiative—Program Management Office (NSI PMO) http://nsi.ncirc.gov
Nlets—The International Justice and Public Safety Network www.nlets.org
Office of Community Oriented Policing Services (COPS) www.cops.usdoj.gov
Office of the Director of National Inteligence (DNI) www.dni.gov
Office of the Program Manager, Information Sharing Environment (PM-ISE) www.ise.gov
Regional Information Sharing Systems ® www.riss.net
SEARCH, The National Consortium for Justice Information and Statistics www.search.org
State and Local Anti-Terrorism Training (SLATT ® ) www.slatt.org
United States Central Intelligence Agency (CIA) www.cia.gov
United States Department of Homeland Security (DHS) www.dhs.gov
United States Department of Justice (DOJ) www.usdoj.gov
15