1 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Michigan State University Intelligence Program The Changing.

Slides:



Advertisements
Similar presentations
Police Organization and Management
Advertisements

Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
FBI Intelligence Houston Field Intelligence Group Overview Carlos J. Barrón FIG Coordinator Field Intelligence Group H O U S T O N UNCLASSIFIED.
Visual 3.1 Unified Command Unit 3: Unified Command.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Security Threat Groups Identification and Management
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
1 Intelligence Community and Classified Information.
IS-0700.A: National Incident Management System, An Introduction
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
NIM – European Perspective Supt Russell Scott Principal Analyst Anne Lavery ACPOS NIM team.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Los Angeles Joint Regional Intelligence Center
Intelligence Analysis Tools PRS 3 Michele A. Melton Upstate New York Regional Intelligence Center Minneapolis, Minnesota March 29, 2007.
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
The National Incident Management System. Homeland Security Presidential Directive 5 To prevent, prepare for, respond to, and recover from terrorist attacks,
Codex Guidelines for the Application of HACCP
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Compliance Presented by: Marty McNulty, ARMA Board Member.
Part of a Broader Strategy
Information Security Issues at Casinos and eGaming
Electronic Records Management: What Management Needs to Know May 2009.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Idaho Statewide Interoperability Executive Council.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
National Preparedness All Hazards Consortium Corey Gruber Assistant Deputy Administrator, National Preparedness National Preparedness.
Module 3 Why measure corruption? Assessment anxiety? vast diversity of approaches that serve different purposes UNCAC reporting mechanism asks countries.
Community Partnerships as an Intelligence Resource.
IS-813: ESF #13 – Public Safety and Security
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
The Nationwide SAR Initiative Briefing for the National Maritime Security Advisory Committee April 2, 2013.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
© 2012 Delmar, Cengage Learning Section I Management, Supervision and Leadership: An Overview Chapter 2 The Organization and Structure of American Policing.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Environmental Management System Definitions
Nationwide Suspicious Activity Reporting (SAR) Initiative IJIS Institute Winter Briefing.
Institutional Review Board Issues for Classroom Research Sharon McWhorter IRB Administrator, The University of Akron (With assistance from Phil Allen,
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
Access to Information: Bolivia Main Headline Goes Here Special Meeting of the Juridical and Political Affairs OAS December 13, 2010 Laura Neuman Access.
David Steingraber, Executive Director Wisconsin Office of Justice Assistance Homeland Security and Justice Information Sharing Where the Rubber Meets the.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Norm Suchar Director, Office of Special Needs Assistance Programs
Police Organization and Management
Terrorism Training for Law Enforcement
The National Network of
IS-700.A: National Incident Management System, An Introduction
Introduction to: National Response Plan (NRP)
Enforcement and Policy Challenges in Health Information Privacy
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Prevention, Intelligence
Presentation transcript:

1 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Michigan State University Intelligence Program The Changing Shape of Intelligence Led Policing David L. Carter, Ph.D. School of Criminal Justice Michigan State University

2 Intelligence Program Copyright 2009 © Michigan State University Topics to Be Covered Intelligence Led Policing Public-Private Partnerships Homeland Security (All Hazards) Intelligence Baseline Capabilities for Fusion Centers Intelligence Requirements Information Sharing Environment Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Controlled Unclassified Information National Open Source Enterprise FBI Strategic Execution Teams (SET) Privacy and the intelligence function Intelligence training and technical assistance Online resources

3 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence Led Policing Definitions Executive implementation of the intelligence cycle to support proactive decision making for resource allocation and crime prevention The collection and analysis of information related to crime and conditions that contribute to crime resulting in an actionable intelligence product intended to aid law enforcement in developing tactical responses to threats and/or strategic planning related to emerging or changing threats

4 Michigan State University Intelligence Program Copyright 2009 © Michigan State University SIMILARITIES OF COMPSTAT AND INTELLIGENCE LED POLICING There are important lessons learned from CompStat that can be applied to ILP Both have a goal of prevention Commitment to the concept by the Chief Executive is essential Analysis serves as the basis for operational responses Processes for constant raw information flow for analysis must be in place Community engagement is critical for reporting suspicious activities Intervention activities are driven by definable evidence of crime and threats Administrative and organizational flexibility are required Research and lessons learned serve as the basis for creative intervention Managers and supervisors are held demonstrably accountable W HILE PRINCIPLES AND PROCESSES ARE SIMILAR, THERE ARE ALSO SUBSTANTIVE DIFFERENCES CompstatIntelligence Led Policing Intra-jurisdiction Incident driven Analysis based on known facts from reported crime data and investigations Focuses on crime sprees and incident trends with intent to apprehend specific offenders Relies on crime mapping; incident analysis; Modus Operandi analysis Time sensitive (24 hour feedback/response) Predominant focus on “street crime” (burglary, robbery, homicide, assault, theft etc.) “Reported criminal incidents” drive collection and analytic parameters Multi-jurisdiction Threat driven Analysis based tips, leads, suspicious activity reports and information collection Focuses on “root causes” and conditions that contribute to serious crime and terrorism Relies on link analysis; commodity flow; transaction analysis; association analysis Strategic (inherently long-term) Predominant focus on “criminal enterprises” (terrorism, organized crime, violence, etc.) “Intelligence Requirements” drive collection and analytic parameters

5 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence Led Policing Some agencies are struggling with ILP because: They have not taken the time to learn it It is conceptual, not prescriptive or “plug and play” It is requires a commitment to change Agencies must: Identify problems and strategic priorities Conduct a self-assessment of policies and resources Re-allocate resources Amend operating policies to meet new needs ILP helps meet new challenges and responsibilities Michigan State University ILP Self Assessment

6 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Mature Advanced Basic Minimal Capacity Commitment Training Infrastructure Operations Records Analytic Information Management Capability Sharing

7 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Public-Private Partnerships & National Plans Virtually all initiatives and sources support public-private partnerships Integration of the private sector with government initiatives is critical for effective homeland security Information sharing must be two way All public-private information sharing must take measures to protect privacy and civil rights Public sector must be cognizant of the need to protect private sector information

8 Michigan State University Intelligence Program Copyright 2009 © Michigan State University The Community and Private Sector - Issues Sharing information Law enforcement agencies sharing Personal Information about individuals with private sector partners Private sector sharing proprietary information with law enforcement What unique expertise is possessed by the private sector that would be of value to law enforcement? Terrorism Liaison Officer/Intelligence Liaison Officer program Civil libertarians opposed to public-private partnerships with law enforcement because of privacy issues Providing community education BJA Communities Against Terrorism Program

9 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Homeland Security/All Hazards Intelligence The collection and analysis of information concerned with non-criminal domestic threats to critical infrastructure, community health and public safety for the purpose of preventing the threat or mitigating the effects of the threat. Examples: Bird Flu, natural threats, vulnerable infrastructure Developing areas include: Fire Service Intelligence Enterprise Public Health/Medical Intelligence Critical Infrastructure/Key Resource (CIKR) Intelligence

10 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Homeland Security/All Hazards Intelligence Challenges Thinking about and addressing issues that have law enforcement implications but have not been traditional priorities Requires law enforcement to learn about new disciplines In some ways, it “goes against” traditional law enforcement occupational culture Training becomes a critical element to deal with these issues

11 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Baseline Capabilities for Fusion Centers Minimum operational standards for fusion centers Meeting these standards “is considered to have reached a baseline level of capability” Standards include: Approved: Law Enforcement/Criminal Intelligence Drafted: CI/KR In Development: Public Health In Development: Fire Service Intelligence Enterprise

12 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Baseline Capabilities “Achieving the baseline level of capability ensures that a fusion center has the necessary structures, standards, and tools in place to support the gathering, processing, analysis, and dissemination of terrorism information, homeland security information, and law enforcement information.” Set performance criteria for the Intelligence Cycle Capabilities include establishing “intelligence requirements”

13 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence Requirements A “requirement” is information that is needed to: Answer a question related to a terrorist or criminal threat or Make a decision It is information you do not have and are “required” to get in order to: Better understand the threat or To make a more informed decision

14 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence Requirements Threat requirements Standing requirements – information that needs to be collected on an ongoing basis to monitor known threats Case requirements – information that is needed to determine the existence and character of a threat based tips or SARs Legal requirements – evidence that is needed to establish reasonable suspicion to create an intelligence record on an individual or organization Remember: The reason that law enforcement can be in the “intelligence business” is based on their statutory authority to enforce the criminal law

15 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Information Sharing Environment Mandated by the Intelligence Reform and Terrorism Prevention Act of 2004 Intent: To increase two-way sharing of terrorism information between intelligence community, law enforcement at all levels and private sector Critical elements: Local intelligence capacity Designated state fusion center A “consistent lexicon”

16 Michigan State University Intelligence Program Copyright 2009 © Michigan State University

17 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Suspicious Activity Reporting (SAR) ISE-SAR: Information Sharing Environment-Suspicious Activity Report Limited to terrorism and crimes with a terrorism nexus Suspicious Activity - “observed behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal, or other illicit intention” “Other illicit intention” must be criminal The focus is on behavior SAR –Official documentation of the observed behavior

18 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Suspicious Activity Reporting (SAR) Issues Should there be SARs for “all crimes”? Is a SAR a “criminal intelligence record”? SAR process must: Avoid “profiling” Ensure privacy Have a criminal nexus Critics claim that SARs are an excuse to record and retain expressive activity In some cases this has happened It has been the basis for lawsuits and complaints

19 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Sensitive But Unclassified Information (SBU) Sensitive But Unclassified (SBU) information – information that does not meet the standards and control requirements of classified information, but should not publicly disseminated for a variety of reasons Two broad types: Law Enforcement Sensitive (LES) – may be shared with anyone in law enforcement who has the “right to know” and “need to know” For Official Use Only (FOUO) – may be shared with anyone who has the “right to know” and “need to know” 100+ SBU labels among all federal agencies

20 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Transition to Controlled Unclassified Information (CUI) As part of the ISE, new guidelines have been developed for SBU information Dissemination – sharing information on purpose Controlled – Making certain information is not inadvertently shared; protecting information SBU is being replaced with “Controlled Unclassified Information” (CUI) Recipient must have the “Right to Know” and “Need to Know” the information

21 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Controlled Unclassified Information Controlled with Standard Dissemination – information must use standard safeguarding procedures and may be shared may be shared with anyone who has the “right to know” and “need to know” Controlled with Specified Dissemination – information must use standard safeguarding procedures and may be shared may be shared with anyone who is in the specified dissemination category (i.e., designation of “right to know”) and “need to know” Controlled Enhanced with Specified Dissemination – information must use enhanced safeguarding procedures and may be shared may be shared with anyone who is in the specified dissemination category (i.e., designation of “right to know”) and “need to know”

22 Michigan State University Intelligence Program Copyright 2009 © Michigan State University CUI Policy Issues The local, state, or tribal law enforcement agency must implement a privacy policy consistent with the Information Sharing Environment privacy guidelines While CUI cannot be mandated for adoption by state, local and tribal governments, it will become a de facto protocol Presents new policy and training challenges The National Archives and Records Administration is responsible for managing CUI

23 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Open Source information Open Sources – Information that is lawfully obtained that does not require legal process or consent Note: Criminal predicate rule applies to open source information that identifies individuals or organizations National Open Source Enterprise (NOSE) All members of the Intelligence Community required to develop open source exploitation

24 Michigan State University Intelligence Program Copyright 2009 © Michigan State University FBI Strategic Execution Team (SET) Enhances Field Intelligence Groups A more intelligence-driven national and regional approach to the FBI’s criminal investigations More FBI intelligence reports about criminal matters Intelligence-based uniform structures, positions, and processes across all FBI field offices, making it easier to work with the FBI Increased tactical and strategic intelligence assessments for dissemination to local agencies Overall, more FBI intelligence products

25 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Privacy Issues “Privacy” actually includes: Protection of civil liberties Restrictions on government power e.g. First, Fourth and Fifth Amendments) Protection of civil rights Rights and privileges of citizenship e.g., Fourteenth Amendment Due Process and Equal Protection clauses Personal information (both that which identifies individuals and that which describes individuals’ behaviors)

26 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Privacy Issues and ILP Public concerns Transparency of intelligence activities Safeguards to protect rights Accountability for intelligence activities Application of 28 CFR Part 23 to a criminal intelligence records system Federal lawsuits under 42 U.S.C., Section 1983, Civil Action for Deprivation of Civil Rights against a law enforcement agency's intelligence practices, including intelligence records

27 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence Training & Technical Assistance Master Criminal Intelligence Training Calendar Michigan State University Intelligence Program State and Local Anti-Terrorism Training (SLATT) Fusion Center Technical Assistance Program Accessible via National White Collar Crime Center Federal Law Enforcement Training Center International Association of Law Enforcement Intelligence Analysts

28 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Intelligence and ILP Resources BJA National Criminal Intelligence Resource Center Accessible on RISSNET Portal and LEO Global Intelligence Working Group Lessons Learned Information Sharing National Criminal Justice Reference Service Program Manager-Information Sharing Environment Law Enforcement Intelligence Unit

29 Michigan State University Intelligence Program Copyright 2009 © Michigan State University Michigan State University Intelligence Program QUESTIONS and COMMENTS David L. Carter, Ph.D. School of Criminal Justice Michigan State University