national criminal intelligence sharing plan - electronic privacy

54
Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 United States Department of Justice

Upload: others

Post on 09-Feb-2022

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: National Criminal Intelligence Sharing Plan - Electronic Privacy

Solutions and approaches for

a cohesive plan to improve our

nation’s ability to develop and

share criminal intelligence

October 2003

“I am pleased to announce that I have just approved the National Intelligence Sharing Plan, a direct result of recommendations made at the IACP Summit held in March of 2002. With the Plan formally in place, we can build on the communication, coordination, and cooperation that are winning the fight against crime and the war against terror.”

John AshcroftFormer U.S. Attorney General

“Critical to preventing future terrorist attacks is improving our intelligence capability. The Plan will serve as a blueprint as we continue to develop our overall national strategy for sharing information.”

Robert MuellerDirector, Federal Bureau of Investigation

“...We must create new ways to share information and intelligence both vertically, between governments, and horizontally, across agencies and jurisdictions...efforts with the Global Intelligence Working Group to create a National Criminal Intelligence Sharing Plan...a helpful and welcome response.”

Tom RidgeFormer Secretary, U.S. Department of

Homeland Security

United States Department of Justice

Third Printing 07/05

Page 2: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

The

NationalCriminalIntelligenceSharing Plan

Solutions and approaches for a cohesiveplan to improve our nation’s ability todevelop and share criminal intelligence

October 2003

United StatesDepartment of Justice

Page 3: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

This document was prepared under the leadership, guidance, and funding of the Bureau of

Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in

collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative.

The opinions, findings, and conclusions or recommendations expressed in this document

are those of the authors and do not necessarily represent the official position or policies of

the U.S. Department of Justice.

This project was supported by Award No. 2000-LD-BX-0003, awarded by the

Office of Justice Programs.

Page 4: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Table of Contents

Executive Summary ..................................................................... iii

Acknowledgements ................................................................... ix

The Rationale for the National Criminal IntelligenceSharing Plan ............................................................................... 1Background and Methodology................................................... 1

Convening the International Association of Chiefs of Police (IACP) CriminalIntelligence Sharing Summit ........................................................................................... 1

Formation of the Global Intelligence Working Group .................................................... 1GIWG’s Mission and Vision ....................................................................................................... 2Building on Existing Information .............................................................................................. 3The Importance of Criminal Intelligence, Intelligence-Led Policing,

and Community Policing .................................................................................................. 3

Recognition of Needs ....................................................................... 4Data Warehouse........................................................................................................................... 9Data Mart ....................................................................................................................................... 10“Pointer” Systems ........................................................................................................................ 10

Recommendations for Implementation of the Plan ..... 10

Appendix A: Glossary ..............................................................27

Appendix B: Acronyms ..........................................................31

Appendix C: Sources ...............................................................33

Appendix D: Core Criminal Intelligence TrainingStandards ...................................................................................35

Table of Contents i

Page 5: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Page 6: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

T he need for a National Criminal Intelligence SharingPlan (“Plan”) was recognized as critical after the tragicevents of September 11, 2001, when nearly 3,000

innocent lives were lost as a result of terrorist attacks againstthe United States. This event initiated a concerted effort byAmerican law enforcement agencies to correct theinadequacies and barriers that impede information andintelligence sharing—so that future tragedies could beprevented.

In spring 2002, law enforcement executives and intelligenceexperts attending the International Association of Chiefs ofPolice (IACP) Criminal Intelligence Sharing Summit recognizedthat local, state, tribal, and federal law enforcement agenciesand the organizations that represent them must work towardscommon goals—gathering information and producingintelligence within their agency and sharing that intelligencewith other law enforcement and public safety agencies.Summit participants called for the creation of a nationallycoordinated criminal intelligence council that would developand oversee a national intelligence plan.1 In response to thiscrucial need, the Global Justice Information Sharing Initiative(Global) Intelligence Working Group (GIWG) was formed.Local, state, and tribal law enforcement representatives werekey participants in the development of the National CriminalIntelligence Sharing Plan.

Many state law enforcement agencies and all federal agenciestasked with intelligence gathering and assessmentresponsibilities have established intelligence functions withintheir organizations. However, approximately 75 percent ofthe law enforcement agencies in the United States have lessthan 24 sworn officers, and more often than not, these agenciesdo not have staff dedicated to intelligence functions. Officersin these smaller, local agencies interact with the public in the

communities they patrol on a daily basis. Providing localagencies with the tools and resources necessary fordeveloping, gathering, accessing, receiving, and sharingintelligence information is critically important to improvingpublic safety and homeland security.

During a February 2003 speech, President George W. Bushpledged to make information sharing an important tool in thenation’s war on terror. “All across our country we’ll be able totie our terrorist information to local information banks so thatthe front line of defeating terror becomes activated and real,and those are the local law enforcement officials. We expectthem to be a part of our effort; we must give them the toolsnecessary so they can do their job.” The National CriminalIntelligence Sharing Plan is a key tool that law enforcementagencies can employ to support their crime-fighting and publicsafety efforts.

Whether it is the officer on the street, the intelligence manager,or the agency executive, having access to the informationthat will help them do their job is essential. As lawenforcement officials begin reviewing this Plan, they shouldask themselves the questions, “What is my responsibility?”and “What can I do to get involved?” They should assesswhat type of intelligence functions are currently beingperformed in their agency and utilize the guidelines in thisPlan to determine how they can improve their intelligenceprocess.

This report outlines specific “action steps” that can be takenimmediately by almost any agency and what can be expectedby performing those steps. The portion of the report titled“The Rationale for the National Criminal Intelligence SharingPlan” should be carefully reviewed, as it provides an in-depthdiscussion of the issues and recommendations presented inthe National Criminal Intelligence Sharing Plan.

Executive Summary iii

Executive Summary

1 Additional information on the IACP Summit can be located in Recommendations From the IACP Intelligence Summit, Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local, State, and FederalLevels. This document is available at: http://www.theiacp.org/documents/pdfs/Publications/intelsharingreport.pdf.

Page 7: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

GIWG VisionThe GIWG membership articulated a vision of what the National CriminalIntelligence Sharing Plan should be to local, state, tribal, and federal lawenforcement agencies:

♦ A model intelligence sharing plan.♦ A mechanism to promote intelligence-led policing.♦ A blueprint for law enforcement administrators to follow when enhancing or

building an intelligence system.♦ A model for intelligence process principles and policies.♦ A plan that respects and protects individuals’ privacy and civil rights.♦ A technology architecture to provide secure, seamless sharing of information

among systems.♦ A national model for intelligence training.♦ An outreach plan to promote timely and credible intelligence sharing.♦ A plan that leverages existing systems and networks, yet allows flexibility for

technology and process enhancements.

iv Executive Summary

The GIWG focused their efforts on developing an intelligencesharing plan that emphasized better methods for developingand sharing critical data among all law enforcement agencies.

The GIWG identified several issues that were viewed asinhibitors of intelligence development and sharing. The GIWGexpressed these issues as needs when formulatingrecommendations for the national plan. One of the key issuesacknowledged by the GIWG was the need to overcome thelong-standing and substantial barriers that hinderintelligence sharing. Examples include the “hierarchy”within the law enforcement and intelligence communities anddeficits in intelligence. Overcoming the barriers that impedeinformation and intelligence sharing is a continuous endeavorthat will require a firm commitment by all levels of government,and the implementation of the National Criminal IntelligenceSharing Plan will most certainly assist in this undertaking.

The following additional issues were recognized and addressedby the GIWG:

♦ The need to develop minimum standards for managementof an intelligence function.

♦ The need to establish a Criminal Intelligence CoordinatingCouncil, composed of local, state, tribal, and federalentities, that will provide and promote a broadly inclusivecriminal intelligence generation and sharing process.

♦ The need to ensure institutionalization of the NationalCriminal Intelligence Sharing Plan.

♦ The need to ensure that individuals’ constitutional rights,civil liberties, civil rights, and privacy interests are protectedthroughout the intelligence process.

♦ The need to develop minimum standards for all levels of

the intelligence process: Planning and Direction,Information Collection, Processing/Collation, Analysis,Dissemination, and Reevaluation (feedback).

♦ The need to increase availability of information, fromclassified systems to local and state law enforcementagencies, for the prevention and investigation of crime intheir jurisdictions.

♦ The need to develop minimum criminal intelligence trainingstandards for all affected levels of law enforcementpersonnel to include training objectives, missions, numberof hours, and frequency of training.

♦ The need to identify an intelligence information sharingcapability that can be widely accessed by local, state,tribal, and federal law enforcement and public safetyagencies.

From the issues identified above, the GIWG developedrecommendations for the National Criminal Intelligence SharingPlan. Following are the action items and steps that local,state, tribal, and federal law enforcement agencies shoulduse as a road map to ensure that effective intelligence sharingbecomes institutionalized throughout the law enforcementcommunity nationwide.

This report represents the first version of the Plan, which isintended to be a “living document,” and will be periodicallyupdated. Those charged with developing and implementingthe Plan will continue to solicit the involvement of the lawenforcement and intelligence communities, nationalorganizations, and other government and public safety entities,in order to ensure that the Plan is responsive to their needsfor information and intelligence development and sharing.

Page 8: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Action Items/RecommendationsThe primary purpose of intelligence-led policing is to providepublic safety decision makers the information they need toprotect the lives of our citizens. The followingrecommendations detail the essential elements of the NationalCriminal Intelligence Sharing Plan.

Recommendation 1: In order to attain the goals outlinedin this Plan, law enforcement agencies, regardless of size,shall adopt the minimum standards for intelligence-led policingand the utilization and/or management of an intelligencefunction as contained in the National Criminal IntelligenceSharing Plan. The standards focus on the intelligenceprocess and include elements such as mission of the function,management and supervision, personnel selection, training,security, privacy rights, development and dissemination ofintelligence products, and accountability measures.

The agency chief executive officer and the manager ofintelligence functions should:

♦ Seek ways to enhance intelligence sharing efforts and fosterinformation sharing by participating in task forces and state,regional, and federal information sharing initiatives.

♦ Implement a mission statement for the intelligence processwithin the agency.

♦ Define management and supervision of the function.♦ Select qualified personnel for assignment to the function.♦ Ensure that standards are developed concerning

background investigations of staff/system users to ensuresecurity (of the system, facilities, etc.) and access to thesystem/network.

♦ Ensure appropriate training for all personnel assigned to orimpacted by the intelligence process.

♦ Ensure that individuals’ privacy and constitutional rightsare considered at all times.

♦ Support the development of sound, professional analyticproducts (intelligence).

♦ Implement a method/system for dissemination ofinformation to appropriate components/entities.

♦ Implement a policies and procedures manual. The intentof the manual is to establish, in writing, agencyaccountability for the intelligence function. The manualshould include policies and procedures covering all aspectsof the intelligence process.

♦ Implement an appropriate audit or review process to ensurecompliance with policies and procedures.

♦ Promote a policy of openness when communicating withthe public and all interested parties regarding the criminalintelligence process, when it does not affect the securityand integrity of the process.

Recommendation 2: In order to provide long-term oversightand assistance with the implementation and refinement ofthe National Criminal Intelligence Sharing Plan, a CriminalIntelligence Coordinating Council (CICC) should be establishedas contemplated in the IACP Criminal Intelligence SharingReport. The purpose of the CICC is to advise the Congress,the U.S. Attorney General, and the Secretary of theU.S. Department of Homeland Security on the best use ofcriminal intelligence to keep our country safe. The CICCshould operate under the auspices of the Global AdvisoryCommittee (GAC). The CICC should consist of representativesfrom local, state, tribal, and federal agencies and nationallaw enforcement organizations. The GIWG will act as theinterim CICC until such time as the CICC is operational.

Recommendation 3: The CICC should monitor theimplementation of the National Criminal Intelligence SharingPlan, in order to gauge the success of the Plan. A report onthe progress of the Plan will be submitted to the Office ofJustice Programs (OJP) beginning December 31, 2004, andannually thereafter.

Recommendation 4: This Plan is designed to strengthenhomeland security and foster intelligence-led policing. Thereis a critical need for more national funding to accomplish thesegoals. Without adequate funding, many of therecommendations contained herein, such as improving trainingand technical infrastructure, will not occur, and the countrywill remain at risk. The CICC, the GAC, and theU.S. Departments of Justice and Homeland Security shouldpartner to identify and fund initiatives that implement therecommendations contained in this report.

Recommendation 5: In order to publicly recognize thecreation of the Plan and demonstrate a commitment by allparties involved, a National Signing Event should be heldwhere law enforcement and homeland security agency heads,from all levels, and other relevant groups come together to“sign on” to the National Criminal Intelligence Sharing Plan.The National Signing Event should be held beforeDecember 31, 2003.

Recommendation 6: All parties involved with implementingand promoting the National Criminal Intelligence Sharing Planshould take steps to ensure that the law enforcementcommunity protects individuals’ privacy and constitutionalrights within the intelligence process.

Recommendation 7: Local, state, tribal, and federal lawenforcement agencies must recognize and partner with thepublic and private sectors in order to detect and prevent attacksto the nation’s critical infrastructures. Steps should be takento establish regular communications and methods ofinformation exchange.

Executive Summary v

Page 9: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Recommendation 8: Outreach materials prepared by theCICC should be utilized by law enforcement agency officialsto publicize and promote the concepts of standards-basedintelligence sharing and intelligence-led policing, as containedwithin the National Criminal Intelligence Sharing Plan, to theiragency personnel and the communities that they serve.

Recommendation 9: In order to ensure that the collection/submission, access, storage, and dissemination of criminalintelligence information conforms to the privacy andconstitutional rights of individuals, groups, and organizations,law enforcement agencies shall adopt, at a minimum, thestandards required by the Criminal Intelligence SystemsOperating Policies Federal Regulation (28 CFR Part 23),2

regardless of whether or not an intelligence system is federallyfunded.

Recommendation 10: Law enforcement agencies shoulduse the IACP’s Criminal Intelligence Model Policy (2003revision)3 as a guide when implementing or reviewing theintelligence function in their organizations.

Recommendation 11: In addition to Federal Regulation28 CFR Part 23, law enforcement agencies should use theLaw Enforcement Intelligence Unit (LEIU) Criminal IntelligenceFile Guidelines as a model for intelligence file maintenance.4

Recommendation 12: The International Association of LawEnforcement Intelligence Analysts (IALEIA) should develop,on behalf of the CICC, minimum standards for intelligenceanalysis to ensure intelligence products are accurate, timely,factual, and relevant and recommend implementing policy and/or action(s). These minimum standards should be developedby June 30, 2004. Law enforcement agencies should adoptthese standards as soon as developed and approved by theCICC.

Recommendation 13: To further enhance professionaljudgment, especially as it relates to the protection ofindividuals’ privacy and constitutional rights, the NationalCriminal Intelligence Sharing Plan encourages participationin professional criminal intelligence organizations andsupports intelligence training for all local, state, tribal, andfederal law enforcement personnel.

Recommendation 14: To foster trust among lawenforcement agencies, policymakers, and the communitiesthey serve, the National Criminal Intelligence Sharing Planpromotes a policy of openness to the public regarding thecriminal intelligence function, when it does not affect thesecurity and integrity of the process.

Recommendation 15: The National Criminal IntelligenceSharing Plan promotes effective accountability measures, asexpressed in 28 CFR Part 23, the LEIU Criminal IntelligenceFile Guidelines, and the Justice Information PrivacyGuideline,5 which law enforcement agencies should employto ensure protection of individuals’ privacy and constitutionalrights and to identify and remedy practices that areinconsistent with policy.

Recommendation 16: Law enforcement agencies involvedin criminal intelligence sharing are encouraged to use, to theextent applicable, the privacy policy guidelines provided inJustice Information Privacy Guideline: Developing, Draftingand Assessing Privacy Policy for Justice InformationSystems.6 The goal of the Justice Information PrivacyGuideline is to provide assistance to justice leaders andpractitioners who seek to balance public safety, public access,and privacy when developing information policies for theirindividual agencies or for integrated (multiagency) justicesystems.

Recommendation 17: The CICC, in conjunction with federalofficials, should identify technical means to aid and expeditethe production of unclassified “tear-line” reports. These reportsare the declassification of classified data needed for lawenforcement purposes, with the sensitive source and method-of-collection data redacted, yet retaining as much intelligencecontent as feasible. The technical means for production ofthese reports should be identified by June 30, 2004.

Recommendation 18: Training should be provided to alllevels of law enforcement personnel involved in the criminalintelligence process. The training standards, as containedwithin the National Criminal Intelligence Sharing Plan, shallbe considered the minimum training standards for all affectedpersonnel.7 Additionally, recipients of criminal intelligencetraining, as recommended in the National Criminal IntelligenceSharing Plan, should be recognized and awarded certificatesfor successful completion of training.

Recommendation 19: The CICC shall foster a workingrelationship with the International Association of Directors ofLaw Enforcement Standards and Training (IADLEST)organization, the IACP State and Provincial Police AcademyDirectors Section (SPPADS), and other relevant trainingorganizations, in order to obtain their assistance withimplementing the recommended National Criminal IntelligenceSharing Plan training standards in every state.

vi Executive Summary

2 This 28 CFR Part 23 regulation is included on the companion CD and is also available at www.it.ojp.gov.

3 The IACP Criminal Intelligence Model Policy is included on the companion CD and is also available at www.theiacp.org.

4 The March 2002 update of the LEIU Criminal Intelligence File Guidelines is included on the companion CD.

5 This document is included on the companion CD and is also available at: http://www.ncja.org/pdf/privacyguideline.pdf.

6 This document is available at http://www.ncja.org/pdf/privacyguideline.pdf.

7 The recommended training standards for each level, including roles and missions, core training objectives, and length of training, are included in the appendix of this report and on the companion CD.

Page 10: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Recommendation 20: In order to support agency tactical,operational, and strategic needs, law enforcement agenciesare encouraged to consider an automated, incident-basedcriminal records tracking capability, in addition to traditionalcase management and intelligence systems, to use as anadditional source for records management and statistical data.These systems should be Web-based and configured to meetthe internal reporting and record-keeping needs of thecomponent, in order to facilitate the exportation of desireddata elements—without the need for duplicate data entry orreporting—to relevant statewide and federal criminalinformation programs.

Recommendation 21: The Regional Information SharingSystems® (RISS) and the Federal Bureau of Investigation(FBI) Law Enforcement Online (LEO) systems, whichinterconnected September 1, 2002, as a virtual single system,shall provide the initial sensitive but unclassified securecommunications backbone for implementation of a nationwidecriminal intelligence sharing capability. This nationwidesensitive but unclassified communications backbone shallsupport fully functional, bidirectional information sharingcapabilities that maximize the reuse of existing local, state,tribal, regional, and federal infrastructure investments. Furtherconfiguration of the nationwide sensitive but unclassifiedcommunications capability will continue to evolve inconjunction with industry and the development of additionalstandards and the connection of other existing sensitive butunclassified networks.

Recommendation 22: Interoperability with existing systemsat the local, state, tribal, regional, and federal levels with theRISS/LEO communications capability should proceedimmediately, in order to leverage information sharing systemsand expand intelligence sharing.8

Recommendation 23: The CICC shall work with Global’sSystems Security Compatibility Task Force to identify andspecify an architectural approach and transitional steps thatallow for the use of existing infrastructures (technology,governance structures, and trust relationships) at the local,state, tribal, regional, and federal levels, to leverage the nationalsensitive but unclassified communications capabilities forinformation sharing. This strategic architectural approach shallensure interoperability among local, state, tribal, regional, andfederal intelligence information systems and repositories.

Recommendation 24: All agencies, organizations, andprograms with a vested interest in sharing criminal intelligenceshould actively recruit agencies with local, state, tribal,regional, and federal law enforcement and intelligence

systems, to connect to the nationwide sensitive butunclassified communications capability. Such agencies,organizations, and programs are encouraged to leverage thenationwide sensitive but unclassified communicationscapability, thereby expanding collaboration and informationsharing opportunities across existing enterprises andleveraging existing users. Moreover, participant standardsand user vetting procedures must be compatible with thoseof the currently connected sensitive but unclassified systems,so as to be trusted connections to the nationwide sensitivebut unclassified communications capability.

Recommendation 25: Agencies participating in theNational Criminal Intelligence Sharing Plan are encouragedto use Applying Security Practices to Justice InformationSharing9 as a reference document regarding informationsystem security practices. The document was developed bythe Global Security Working Group (GSWG) to be used byjustice executives and managers as a resource to securetheir justice information systems and as a resource of ideasand best practices to consider when building their agency’sinformation infrastructure and before sharing information withother agencies.

Recommendation 26: Agencies are encouraged to utilizethe latest version of the Global Justice Extensible MarkupLanguage (XML) Data Model (Global JXDM) and its componentGlobal Justice XML Data Dictionary (Global JXDD)10 whenconnecting databases and other resources to communicationnetworks. The Global JXDM and Global JXDD were developedto enable interoperability through the exchange of data acrossa broad range of disparate information systems.

Recommendation 27: In order to enhance trust and “raisethe bar” on the background investigations currently performed,law enforcement agencies must conduct fingerprint-basedbackground checks on individuals, both sworn or nonsworn,prior to allowing law enforcement access to the sensitive butunclassified communications capability. Backgroundrequirements for access to the nationwide sensitive butunclassified communications capability by law enforcementpersonnel shall be consistent with requirements applied tothe designation and employment of sworn personnel, as setby the participating state or tribal government, so long as, ata minimum, those requirements stipulate that a criminalhistory check be made through the FBI and the appropriatelocal, state, and tribal criminal history repositories and beconfirmed by an applicant fingerprint card. Additionally, aname-based records check must be performed on lawenforcement personnel every three years after the initialfingerprint-based records check is performed.

Executive Summary vii

8 The GIWG conducted a preliminary survey of systems/initiatives that are operational or being developed at the local, state, regional, and federal levels. Several systems/initiatives were identified. Refer to the companionCD for a list of the systems identified, as well as summary information obtained during the survey.

9 This document is available at: http://www.it.ojp.gov/global/.

10 The latest version of the Global Justice XML Data Model and the Global Justice XML Data Dictionary is included on the companion CD and can be found at: http://www.it.ojp.gov/jxdm.

Page 11: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Recommendation 28: The CICC, in conjunction with OJPand the connected sensitive but unclassified systems, shalldevelop an acquisition mechanism or centralized site thatwill enable law enforcement agencies to access shared datavisualization and analytic tools. The CICC shall identifyanalytical products that are recommended for use by lawenforcement agencies in order to maximize resources whenperforming intelligence functions, as well as a resource list ofcurrent users of the products. The CICC will submit a reporton these tools to OJP by June 30, 2004.

viii Executive Summary

Page 12: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

T he GIWG wishes to acknowledge the following GIWG members for their dedication and tireless efforts towards thecompletion of this document:

Mr. William BergerNorth Miami Beach, Florida, PoliceDepartment

Miami, Florida

Mr. Kenneth BoucheIllinois State PoliceChicago, Illinois

Mr. Donald BrackmanNational White Collar Crime CenterRichmond, Virginia

Ms. Ledra BradyU.S. Drug EnforcementAdministration

Quantico, Virginia

Mr. Ron BrooksNorthern California HIDTASan Francisco, California

Mr. Alan CarlsonThe Justice Management InstituteKensington, California

Mr. Melvin CarrawayIndiana State PoliceIndianapolis, Indiana

Mr. Steve CasteelU.S. Drug EnforcementAdministration

Arlington, Virginia

Mr. Henry CoffmanINTERPOL-USNCBWashington, DC

Mr. David CohenNew York City, New York, PoliceDepartment

New York, New York

Acknowledgements ix

Acknowledgements

Mr. Ritchie MartinezArizona Department of Public Safety/HIDTA

Tucson, Arizona

Mr. Jerry MarynikCalifornia Department of JusticeSacramento, California

Mr. Miles MatthewsCounterdrug Intelligence ExecutiveSecretariat

U.S. Department of JusticeWashington, DC

Mr. Kent MawyerTexas Department of Public SafetyAustin, Texas

Mr. Peter ModafferiRockland County, New York, DistrictAttorney’s Office

New City, New York

Mr. Dennis MortonNational Drug Intelligence CenterJohnstown, Pennsylvania

Mr. Daniel OatesAnn Arbor, Michigan, PoliceDepartment

Ann Arbor, Michigan

Mr. Thomas O’ConnorMaryland Heights, Missouri, PoliceDepartment

Maryland Heights, Missouri

Ms. Marilyn PetersonNew Jersey Division of CriminalJustice

Trenton, New Jersey

Mr. Carlo CudioMonterey, California, PoliceDepartment

Monterey, California

Mr. Michael DuffyU.S. Department of JusticeWashington, DC

Mr. Max FratoddiFederal Bureau of InvestigationWashington, DC

Mr. Thomas FrazierMajor Cities Chiefs AssociationBaltimore, Maryland

Mr. Dennis GarrettArizona Department of Public SafetyPhoenix, Arizona

Mr. Vernon KeenanGeorgia Bureau of InvestigationDecatur, Georgia

Mr. Phil KeithKnoxville, Tennessee, PoliceDepartment

Knoxville, Tennessee

Mr. Gerard P. LynchMiddle Atlantic-Great LakesOrganized Crime Law EnforcementNetwork®

Newtown, Pennsylvania

Mr. George P. MarchOffice of Information TechnologyRegional Information SharingSystems

Thorndale, Pennsylvania

Page 13: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Mr. Russ PorterIowa Department of Public SafetyDes Moines, Iowa

Mr. Louis QuijasFederal Bureau of InvestigationWashington, DC

Mr. Philip RamerFlorida Department of LawEnforcement

Tallahassee, Florida

Mr. Richard RandallKendall County, Illinois, Sheriff’sOffice

Yorkville, Illinois

Mr. Steven RaubenoltOhio State Highway PatrolColumbus, Ohio

Mr. Edward ReinaYavapai-Prescott Tribal PoliceDepartment

Prescott, Arizona

Mr. Michael SchrunkMultnomah County District Attorney’sOffice

Portland, Oregon

Mr. Richard StanekMinnesota Department of PublicSafety

St. Paul, Minnesota

Mr. Gregory StieberU.S. Secret ServiceU.S. Department of HomelandSecurity

Washington, DC

Mr. Richard H. Ward III (Retired)Bureau of Justice AssistanceWashington, DC

x Acknowledgements

The GIWG would also like to acknowledge the following individuals for theircontributions to this document:

Ms. Maureen BaginskiFederal Bureau of InvestigationWashington, DC

Mr. Jim BurchBureau of Justice AssistanceWashington, DC

Mr. David CloptonSystem Planning CorporationArlington, Virginia

Mr. Bruce EdwardsBureau of Justice AssistanceWashington, DC

Mr. John ElliffFederal Bureau of InvestigationWashington, DC

Mr. Bill Eubanks (Retired)Federal Bureau of InvestigationWashington, DC

Mr. Steven HooksFederal Bureau of InvestigationClarksburg, West Virginia

Mr. Cliff KarchmerPolice Executive Research ForumWashington, DC

Mr. William LueckenhoffFederal Bureau of InvestigationClarksburg, West Virginia

Mr. Allyn LyndFederal Bureau of InvestigationClarksburg, West Virginia

Mr. Steve McCrawFederal Bureau of InvestigationWashington, DC

Dr. John MorganNational Institute of JusticeWashington, DC

Ms. Karen MorrU.S. Department of HomelandSecurity

Washington, DC

Ms. Marilynn NolanU.S. Drug EnforcementAdministration

Arlington, Virginia

Mr. John O’NanOhio Office of the U.S. AttorneyGeneral

London, Ohio

Mr. Kevin PerhamNew York City, New York, PoliceDepartment

Brooklyn, New York

Mr. Henry PinoAk-Chin Tribal Police DepartmentMaricopa, Arizona

Mr. Paul RedmondU.S. Department of HomelandSecurity

Washington, DC

Mr. Carl RingwaldNew York City, New York, PoliceDepartment

New York, New York

Mr. Craig SamtmannFederal Bureau of InvestigationWashington, DC

Mr. Mike SapsaraU.S. Drug EnforcementAdministration

Miami, Florida

Mr. Jim SavageU.S. Secret ServiceU.S. Department of HomelandSecurity

Washington, DC

Mr. John SmithU.S. Drug EnforcementAdministration

Alexandria, Virginia

Mr. Kenneth StaabBroward County, Florida, Sheriff’sOffice

Pompano Beach, Florida

Mr. Len StarlingFederal Bureau of InvestigationWashington, DC

Mr. Mark TannerFederal Bureau of InvestigationWashington, DC

Ms. Kathleen TimmonsFederal Bureau of InvestigationWashington, DC

Mr. David WalchakFederal Bureau of InvestigationWashington, DC

Page 14: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

The Rationalefor the National CriminalIntelligence Sharing Plan

Background andMethodologyConvening the International Association ofChiefs of Police (IACP) Criminal IntelligenceSharing SummitIn fall 2001, law enforcement officials attending the annualIACP conference in Toronto, Canada, identified the need for acomprehensive assessment to identify the inadequacies ofthe law enforcement intelligence process that, in part, led tothe failure to prevent the tragic events of September 11. As aresult, law enforcement executives and intelligence expertsmet together at the IACP Criminal Intelligence Sharing Summitheld in Alexandria, Virginia, in March 2002 and articulated aproposal for an intelligence sharing plan that was in alignmentwith President Bush’s initiative to develop a Cabinet-levelagency to coordinate homeland security. The Summitparticipants envisioned local, state, and tribal law enforcementagencies fully participating with federal agencies to coordinate,collect, analyze, and appropriately disseminate criminalintelligence information across the United States to makeour nation safer. Results of the Summit are documented inthe August 2002 report entitled Recommendations From theIACP Intelligence Summit, Criminal Intelligence Sharing: ANational Plan for Intelligence-Led Policing at the Local, Stateand Federal Levels.11

The IACP Criminal Intelligence Sharing Report contained aproposal to create the National Criminal Intelligence SharingPlan (“Plan”). The most central and enduring element of thePlan advocated by Summit participants was therecommendation for the creation of a Criminal IntelligenceCoordinating Council (CICC or “Council”) composed of local,state, tribal, and federal law enforcement executives.12 TheCouncil’s mandate would be to establish, promote, and ensureeffective intelligence sharing and to address and solve, in anongoing fashion, the problems that inhibit it.

The IACP Summit participants noted that the Plan and theCICC’s mandate must overcome the barriers that hinderintelligence sharing. The following barriers were identified assome of the most significant: the absence of a nationallycoordinated process for intelligence generation and sharing;the “hierarchy” within the law enforcement and intelligencecommunities; local, state, tribal, and federal laws and policiesthat unduly restrict law enforcement access to information;the inaccessibility and/or disaggregation of technologies tosupport intelligence sharing; and deficits in analysis.

Formation of the Global IntelligenceWorking GroupIn fall 2002, in response to the IACP’s proposal to create theNational Criminal Intelligence Sharing Plan, theU.S. Department of Justice (DOJ), Office of Justice Programs(OJP), authorized the formation of the Global Justice

The Rationale: Background and Methodology 1

11 This document is available at: http://www.theiacp.org/documents/pdfs/Publications/intelsharingreport.pdf.

12 IACP Criminal Intelligence Sharing Report, p. 6.

Page 15: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Information Sharing Initiative (Global) Intelligence WorkingGroup (GIWG), one of several issue-focused working groupsof the Global Advisory Committee (GAC).13 Melvin J. Carraway,Superintendent of the Indiana State Police, was designatedas chair of the GIWG.

The initial meeting of the GIWG occurred in December 2002in Atlanta, Georgia. The members and organizationsrepresented at the meeting were selected by OJP, inconsultation with the Global Executive Steering Committee,based on their backgrounds and broad experiences withcriminal justice and criminal intelligence issues. Theseofficials represented all levels of law enforcement, includingpractitioners, policymakers, and subject-matter experts. Inaddition to local, state, tribal, regional, and federal lawenforcement personnel, the individuals on the GIWG representthe following organizations and groups: CounterdrugIntelligence Executive Secretariat (CDX); Criminal InformationSharing Alliance (CISA); IACP; International Association ofLaw Enforcement Intelligence Analysts (IALEIA); JusticeManagement Institute; Law Enforcement Intelligence Unit(LEIU); Major Cities Chiefs Association; National Conferenceof State Legislatures; National Drug Intelligence Center;National White Collar Crime Center (NW3C); National Sheriffs’Association (NSA); prosecutors; Regional Information SharingSystems (RISS); SEARCH, The National Consortium ofJustice Information and Statistics; and state Law EnforcementIntelligence Networks (LEIN).

GIWG’s Mission and VisionThe GIWG members developed the following missionstatement to formalize their intent to create the NationalCriminal Intelligence Sharing Plan:

The GIWG mission is to develop, build, and supportthe creation of the National Criminal Intelligence SharingPlan, which will provide law enforcement agencies withthe ability to gather, analyze, protect, and share credibleand timely information and intelligence to identify,investigate, prevent, deter, and defeat criminal andterrorist activities, both domestically and internationally,as well as protect the security of our homeland andpreserve the rights and freedoms of all Americans.

Using the above mission statement as a foundation to buildupon, the GIWG members articulated a vision of what theNational Criminal Intelligence Sharing Plan should be to local,state, tribal, and federal law enforcement agencies:

♦ A model intelligence sharing plan.♦ A mechanism to promote intelligence-led policing.♦ A blueprint for law enforcement administrators to follow when

enhancing or building an intelligence system.♦ A model for intelligence process principles and policies.♦ A plan that respects and protects individuals’ privacy and

civil rights.♦ A technology architecture to provide secure, seamless

sharing of information among systems.♦ A national model for intelligence training.♦ An outreach plan to promote timely and credible intelligence

sharing.♦ A plan that leverages existing systems and networks, yet

allows flexibility for technology and process enhancements.

Chairman Carraway established the following committees tofulfill the GIWG mission and vision and to address the goalsand objectives outlined in the IACP Criminal IntelligenceSharing Report:

♦ Connectivity/Systems Committee, chaired byM. Miles Matthews, Executive Officer, CDX

♦ Outreach Committee, chaired by William Berger, Chief,North Miami Beach, Florida, Police Department and pastIACP president

♦ Policy Committee, chaired by Thomas Frazier, ExecutiveDirector, Major Cities Chiefs Association

♦ Privacy Committee, chaired by Russ Porter, SpecialAgent in Charge, Iowa Department of Public Safety

♦ Standards Committee, chaired by Peter Modafferi, Chiefof Detectives, Rockland County, New York, DistrictAttorney’s Office

♦ Training Committee, chaired by Thomas O’Connor, Chief,Maryland Heights, Missouri, Police Department

After the initial gathering in Atlanta, the GIWG membersconvened four additional meetings to develop recommendationsfor the National Criminal Intelligence Sharing Plan. Theworking environment of the GIWG committees was issue-driven, and recommendations were developed for each issueidentified. This report presents the issues andrecommendations formulated as a result of the GIWGcommittees’ discussions, deliberations, and collaborations.This report contains and serves as the supportingdocumentation for the National Criminal Intelligence SharingPlan.

2 The Rationale: Background and Methodology

13 The Global Justice Information Sharing Initiative (Global), operating under the program management of the Office of Justice Programs (OJP), serves as an advisory body to the federal government—specifically throughthe U.S. Attorney General and the Assistant Attorney General, OJP—to facilitate standards-based electronic information exchange throughout the justice and public safety communities. The Global Advisory Committee(GAC) is comprised of key personnel from local, state, tribal, federal, and international justice and public safety entities and includes agency executives and policymakers, automation planners and managers, informationpractitioners, and end users. GAC membership reflects the involvement of the entire justice community in information sharing. Global working groups, consisting of committee members and other subject-matter experts,expand the GAC’s knowledge and experience. These groups are formed to address timely issues impacting justice information sharing; the Global Intelligence Working Group is one of four working groups. For additionalinformation on Global, please visit http://www.it.ojp.gov/global/.

Page 16: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Building on Existing InformationThe IACP Criminal Intelligence Sharing Reportrecommendations were utilized as a blueprint by the GIWGwhen developing recommendations for the National CriminalIntelligence Sharing Plan. In addition to the IACPrecommendations, other information was used, including asurvey recently sponsored by the Major Cities ChiefsAssociation in which they requested survey respondents toprovide the top five impediments to the flow of intelligenceinformation between law enforcement agencies, which, ifremedied, would most assist the agencies’ investigative,enforcement, and prevention efforts. Surveys were distributedto all major cities’ chiefs and sheriffs and heads of state-levellaw enforcement agencies. Preliminary findings suggest thatthe results are consistent with the barriers identified by theIACP Summit participants. The following are the top fiveimpediments identified from the survey:

1. Lack of communication and information sharing—specifically, lack of a centralized analysis and disseminationfunction, either at the state or federal level; lack ofintelligence from federal agencies; and state statutoryrequirements that present hurdles to sharing information.

2. Technology issues—specifically, lack of equipment tofacilitate a national intelligence data system, lack ofinterconnectibility of law enforcement and other databases(e.g., immigration services), limited fiscal resources, lackof technological infrastructure throughout the state, andlack of uniformity between computer systems.

3. Lack of intelligence standards and policies—specifically,lack of common standards for collection, retention, anddissemination of intelligence data; a need for increasedlocal training on legal standards for collection, storage,and purging of data; access to classified data; and lack ofstandards for determining when to disseminate intelligenceto federal agencies.

4. Lack of intelligence analysis—specifically, lack ofcompatible analytical software and lack of analyticalsupport, personnel, equipment, and training.

5. Poor working relationships—specifically, unwillingness oflaw enforcement agencies to provide information due toparochial interests and a culture within the federal systemthat does not foster sharing of information or trust betweenagencies.

In May 2003, preliminary recommendations for the Plan weredeveloped and published in the GIWG’s Interim Report. Thepreliminary recommendations were made available to theGIWG member organizations, to the public via Internet Websites, and to various law enforcement groups, such as theannual conference of the LEIU in Seattle, Washington, in June2003. Feedback on the preliminary recommendations wassolicited, and the input was used to refine therecommendations.

The Importance of Criminal Intelligence,Intelligence-Led Policing, and CommunityPolicingThe GIWG focused their efforts on developing an intelligencegathering and sharing plan that emphasizes better methodsfor sharing among all agencies and describes a method forpassing and receiving critical data among those agencies.Key to this process is the efficient leveraging of existingefforts—the commitment to build on, not reinvent, substantialinformation sharing activities already under way. As indicatedby IACP Summit participants, it is difficult to enhanceintelligence sharing without also having a commonunderstanding of the phrase “criminal intelligence.” IACPSummit participants noted that criminal intelligence is thecombination of credible information with quality analysisinformation that has been evaluated and used to drawconclusions. Criminal intelligence results from a processinvolving planning and direction, information collection,processing/collation, analysis, dissemination, and reevaluation(feedback) of information on suspected criminals and/ororganizations. This sequential process is commonly referredto as the intelligence process, and it will be further explainedlater in this document. The following graphic depicts thisstep-by-step process:

Intelligence Process

The Rationale: Background and Methodology 3

A recommendation that the IACP Summit participantsidentified as core to achieving the goals of the National CriminalIntelligence Sharing Plan was to “promote intelligence-ledpolicing through a common understanding of criminalintelligence and its usefulness.” Intelligence-led policing isdefined as the collection and analysis of information to produce

Page 17: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

an intelligence end product designed to inform lawenforcement decision making at both the tactical andstrategic levels. Intelligence-led policing is predicated on theproduction and application of intelligence information andproducts. For intelligence-led policing to be effective, theprocess must be an integral part of an agency’s philosophy,policies, and strategies and must also be integral in theorganization’s mission and goals.

Consistent with the IACP Summit findings andrecommendations, GIWG members recognized theimportance of community-oriented policing (COP) efforts whendeveloping the national intelligence sharing plan. “Over thepast decade, simultaneous to federally led initiatives toimprove intelligence gathering, thousands of community-policing officers have been building close and productiverelationships with the citizens they serve. The benefits ofthese relationships are directly related to information andintelligence sharing: COP officers have immediate andunfettered access to local, neighborhood information as itdevelops. Citizens are aware of and seek out COP officers toprovide them with new information that may be useful tocriminal interdiction or long-term problem solving. The positivenature of COP/citizen relationships promotes a continuousand reliable transfer of information from one to the other. It istime to maximize the potential for community-policing effortsto serve as a gateway of locally based information to preventterrorism, and all other crimes.”14

Recognition of NeedsA key need and goal identified by the GIWG was to ensurethat the guiding principles contained within the NationalCriminal Intelligence Sharing Plan become institutionalizedthroughout the law enforcement community nationwide. Thevarious components addressed by the Plan—systemconnections, personnel training, promulgation of modelpolicies and standards, outreach efforts, and others—shouldbe implemented in a multifaceted and ongoing manner. TheGIWG members envisioned that implementation of the Planwill provide the impetus for many law enforcement agenciesto institute intelligence-led policing, which will help tosubstantially increase intelligence development and sharing,ultimately improving public safety.

GIWG members recognize that overcoming the barriers thatimpede information and intelligence sharing is a continuousendeavor that will require a firm commitment by all levels ofgovernment, and the implementation of the National CriminalIntelligence Sharing Plan will most certainly assist in thisundertaking. Key elements of the Plan that will aid in thiseffort include model policies and standards for all lawenforcement agencies to emulate; guidelines for local lawenforcement to develop an intelligence function within theiragency; access to analytic resources and tools previouslyunavailable; comprehensive training provision and outreachmechanisms, both of which provide education and continuedemphasis on intelligence sharing; access to a nationwidenetwork with links to local, state, tribal, regional, and federaldatabases; and implementation of security requirements thatinstitute trust in network participants.

As indicated above, the GIWG identified several issues thatwere viewed as inhibitors to intelligence development andsharing. These issues are expressed as needs in thisdocument. The GIWG then developed recommendations thatare the steps to be taken to respond to these needs. Therecommendations are explained in the section,“Recommendations for Implementation of the Plan,” and theissues are explained below:

The need to develop minimum standardsfor management of an intelligencefunction.In the aftermath of the 9/11 terrorist attack, law enforcementagencies realize that they need to develop new capabilitiesand methods of deterring crime and terrorist activities and,more importantly, that they need to share all—not justterrorism-related—criminal intelligence. The effective use ofa criminal intelligence function is crucial to a law enforcementagency’s ability to combat crime. A properly managed criminal

4 The Rationale: Recognition of Needs

14 IACP Criminal Intelligence Sharing Report, p. 2.

Page 18: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

intelligence function can have a tremendous impact on a lawenforcement agency and the community it serves.

As these enhanced capabilities are built, so, too, must propermanagement principles be implemented. Informal surveysduring analytic training indicate that the primary reasonagencies do not use analysis and intelligence is that theexecutives, managers, and supervisors of the function do notunderstand its capabilities and have not been given guidancein its use. Some guidance on management was provided ingovernment publications in the 1970s15 and in the 2001 versionof the book Intelligence 2000: Revising the Basic Elements.This guidance, however, has not been universally disseminatedor adopted.

Refer to Recommendation 1 for details and furtherdiscussion regarding this issue.

The need to establish a CriminalIntelligence Coordinating Council,composed of local, state, tribal, andfederal entities, that will provide andpromote a broadly inclusive criminalintelligence generation and sharingprocess.The most central and enduring element of the National CriminalIntelligence Sharing Plan advocated by the IACP Summitparticipants was the call for a CICC. The Summit participantsviewed the CICC as an ongoing solution to the need for anationally coordinated, but locally driven, criminal intelligencegeneration and sharing process for the promotion of publicsafety.16

Refer to Recommendation 2 for details and furtherdiscussion regarding this issue.

The need to ensure institutionalization ofthe National Criminal Intelligence SharingPlan.Experience in law enforcement has shown that progress doesnot occur when a new philosophy of policing is adopted by aspecific unit in law enforcement agencies rather than accepteduniversally by all units within the agencies. Thus, there is aneed to institutionalize the use of intelligence and the NationalCriminal Intelligence Sharing Plan into the operations of alllaw enforcement agencies.

As indicated in the IACP Criminal Intelligence Sharing Report,local, state, tribal, and federal law enforcement agencies andthe organizations that represent them must all work together

toward a common goal—gathering information and producingintelligence within their agency and sharing that intelligencewith other law enforcement agencies. The sharing of timely,accurate, and complete information among justice-relatedagencies is critical to the defense of the United States and allAmericans, at home and abroad. Providing credible andreliable intelligence to the agency in need is imperative toaddressing criminal and terrorist activities. Whether it be theofficer on the street, the intelligence manager, or the agencyexecutive—having the information that will help them do theirjobs is essential. The National Criminal Intelligence SharingPlan will be a comprehensive reference document that everylaw enforcement officer should access when developing a planto implement or enhance the intelligence process in his orher organization.

Refer to Recommendations 3, 4, 5, 7, 8, and 17 fordetails and further discussion regarding this issue.

The need to ensure that individuals’constitutional rights, civil liberties, civilrights, and privacy interests are protectedthroughout the intelligence process.The protection of individuals’ privacy and constitutional rightsis an obligation of government officials and is crucial to thelong-term success of criminal intelligence sharing. Protectingthe privacy and constitutional rights of individuals, while atthe same time providing for homeland security and publicsafety, will require a commitment from everyone in thesystem—from line officers to top management.

For the purposes of this document, the term constitutionalrights refers to those rights that an individual derives from theConstitution of the United States. Constitutional rights arethe strongest protection from improper government conductagainst an individual. Unlike other legal rights, constitutionalrights cannot be changed by a statute. They can only bealtered by amending the Constitution.

The term civil liberties refers to fundamental individual rightssuch as freedom of speech, press, or religion; due process oflaw; and other limitations on the power of the government torestrain or dictate the actions of individuals. They are thefreedoms that are guaranteed by the Bill of Rights—the firstten Amendments—to the Constitution of the United States.Civil liberties offer protection to individuals from impropergovernment action and arbitrary governmental interference inrelation to the specific freedoms enumerated in the Bill ofRights.

The term civil rights is used to imply that the state has a rolein ensuring all citizens have equal protection under the law

The Rationale: Recognition of Needs 5

15 Harris, Don R. and E. Drexel Godfrey, 1971. The Basic Elements of Intelligence, Washington, DC: U.S. Government Printing Office, and Don R. Harris, et al., Basic Elements of Intelligence – Revised, Washington, DC:Law Enforcement Assistance Administration.

16 IACP Criminal Intelligence Sharing Report, p. 2.

Page 19: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

and equal opportunity to exercise the privileges of citizenshipregardless of race, religion, sex, or other characteristicsunrelated to the worth of the individual. Civil rights are,therefore, obligations imposed upon government to promoteequality. More specifically, they are the rights to personalliberty guaranteed to all United States citizens by theThirteenth and Fourteenth Amendments and by acts ofCongress. Generally, the term civil rights involves positive (oraffirmative) government action, while the term civil libertiesinvolves restrictions on government.

The term privacy refers to individuals’ interests in preventingthe inappropriate collection, use, and release of personallyidentifiable information. Privacy interests include privacy ofpersonal behavior, privacy of personal communications, andprivacy of personal data. The U.S. Constitution does notexplicitly use the word privacy, but several of its provisionsprotect different aspects of this fundamental right.17 Althoughthere does not exist an explicit federal constitutional right toan individual’s privacy,18 privacy rights have been articulatedin limited contexts by the U.S. Supreme Court.19 Privacyprotections are numerous and include protection fromunnecessary or unauthorized collection of personal information(e.g., eavesdropping), public disclosure of private facts, andshame or humiliation caused by release of personalinformation.

The National Criminal Intelligence Sharing Plan supportspolicies that will protect privacy and constitutional rights whilenot hindering the intelligence process. When agencies arereviewing or formulating their policies, it may be helpful toview the intelligence process as a series of discretionarydecisions.20 At each step, a decision must be made, usuallyinvolving a choice from among several possible alternatives.Consider, for example, how a criminal intelligence unit mightrespond to an unsolicited, anonymous tip alleging that aparticular individual is engaged in criminal activity. Shouldthe unit query various police records systems in an effort tolearn more about the “suspect”? Should they querycommercial or other public record databases? Should theyconduct surveillance of the “suspect”? Or should theydisseminate the information to other law enforcementagencies in an effort to learn more about the person? Whatkinds of additional records are created when these actionsare taken? And then, after those actions are taken, additionaldecisions must be made regarding what information and howmuch, if any, to store about the “suspect” in the criminal

intelligence files. Violations of privacy and constitutional rightsmay potentially occur when choices are selected from thesevarious alternatives. In order to be effective, a policy thataddresses the protection of individual privacy and constitutionalrights should attempt to eliminate the unnecessary discretionin the decision-making process, guide the necessarydiscretion, and continually audit the process to ensureconformance with the policy goals.21

It is imperative that a privacy policy have legitimacy; therefore,when an agency is developing a new policy or reviewingexisting ones, interested parties and competing viewpointsshould be represented. Legitimate parties include not only awide selection of law enforcement agencies but alsorepresentatives from privacy and constitutional rights advocacygroups. Input from all interested parties is a vital step towardsestablishing legitimacy of the policy and achieving itswidespread acceptance.

It is also essential that the parameters of a privacy policy beclearly defined. This includes, for example, identifying theparticular aspects of the intelligence process to which itapplies, as well as defining the scope and meaning of thephrase “individuals’ privacy and constitutional rights.” Theextent to which information and activities have been held tobe private or constitutionally protected under the law is, in alllikelihood, much narrower than what the general public believesto be private and protected. This phenomenon must beunderstood and acknowledged when developing andconducting outreach in regards to these issues.

It is impossible for a policy to conceive of every imaginablesituation or set of circumstances. An agency’s privacy policyshould, however, acknowledge and address important issuesthat currently are not included in some existing criminalintelligence policies. For example, the policy shouldacknowledge the existence of information that is received orpossessed by law enforcement agencies that does not riseto the level of “reasonable suspicion of criminal activity” andprovide guidance on how to process that information. Oftenthis information—sometimes referred to as “temporary” or“working” files—is received unsolicited by law enforcementagencies and cannot simply be dismissed.

Finally, an agency’s privacy policy should identify the decisionpoints within the intelligence process and provide appropriateguidance and structure for each. This should be the heart ofthe policy—to map out clearly, for law enforcement personnel,

6 The Rationale: Recognition of Needs

17 For early references to this principle, see Samuel Warren and Louis Brandeis. 1890 (December 15). “The Right to Privacy.” Harvard Law Review 4(5): 193-220.

18 The most closely related constitutional right is that under the Fourth Amendment, which prohibits unreasonable search and seizure of individuals and their houses, papers, and effects. U.S. Constitution Amendment IV.Some states, such as California, recognize a right to privacy in their state constitutions. See California Constitution article 1, §1 (West 1983).

19 National Criminal Justice Association. 2002 (September). Justice Information Privacy Guideline: Developing, Drafting and Assessing Privacy Policy for Justice Information Systems. Washington, DC: NCJA,pp. 18-19.

20 This framework was used by Wayne LaFave, who observed, “It is helpful to look at the total criminal justice system as a series of interrelated discretionary choices.” (LaFave, 1965). Arrest. Boston, MA: Little Brown. Likeany model or framework, it is valuable not because it is the only way or the right way to describe the process, but because of the insights that it provides.

21 The framework for regulating discretionary decisions (i.e., eliminating unnecessary discretion and confining, structuring, and checking necessary discretion) through administrative rule making and agency policies isderived from Kenneth Culp Davis. (Davis, 1971). Discretionary Justice: A Preliminary Inquiry. Urbana, IL: University of Illinois; and (Davis, 1975). Police Discretion. St. Paul, MN: West Publishing Company.

Page 20: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

the parameters of the decisions they must make throughoutthe intelligence process; educate them on permissible options;and provide guidance on appropriate choices. For example,the policy should stress the need for and importance ofplanning and direction (the first stage of the intelligenceprocess). Although it is only one phase of the intelligenceprocess, planning and direction guides the overall activitiesof the criminal intelligence function. Some of the mostegregious violations of sound criminal intelligence practicecan be prevented by developing a clear statement of themission and goals of the criminal intelligence unit (usually interms of crimes it seeks to prevent or investigate), establishingclear policies and procedures, appropriately tasking personnel,and performing ongoing checks to ensure that the criminalintelligence function is being carried out in accordance withthis guidance.22 As mentioned earlier, in addition to thedecision points identified with the planning and direction phaseof the intelligence process, discretionary decisions related toother phases of the intelligence process should also bespecified, along with helpful guidance for each.23

Refer to Recommendations 6, 13, 14, 15, and 16 fordetails and further discussion regarding this issue.

The need to develop minimum standardsfor all levels of the intelligence process:Planning and Direction, InformationCollection, Processing/Collation, Analysis,Dissemination, and Reevaluation(feedback).The IACP Summit participants outlined several mandates tobe addressed by the developers of the National CriminalIntelligence Sharing Plan, including the importance of ensuringcompatible policies and standards for all levels of theintelligence process. There are various models of theintelligence process in use; however, most models containthe following basic steps: planning and direction, informationcollection, processing/collation, analysis, dissemination, andreevaluation (feedback). Storage and retention are additionalsteps that can be included.

The intelligence process (or cycle) is the means of developingraw information into finished intelligence products for use indecision making and formulating policies/actions. The firststep, planning and direction, involves identifying the need fordata. Agency members should engage in a process of decidingwhat they want to know (or what they need to collect) before

they collect it, or they may end up with indiscriminate,unfocused information.

Collection is the gathering of the raw data needed to produceintelligence products. Data may be collected from manysources, including but not limited to public records, theInternet, confidential sources, incident reports, and periodicals.

The next step, processing and collation, involves evaluatingthe information’s validity and reliability. Collation entailssorting, combining, categorizing, and arranging the datacollected so relationships can be determined.

Analysis is the portion of the intelligence process thattransforms the raw data into products that are useful. This isalso the function that separates “information” from“intelligence.” It is this vital function that makes the collectioneffort beneficial. Without this portion of the process, we areleft with disjointed pieces of information to which no meaninghas been attached. The goal is to develop a report where theinformation has been connected in a logical and valid mannerto produce an intelligence report that contains valid judgmentsbased on information analyzed.24

Dissemination is also a vital step in the process. Withoutdisseminating the intelligence developed, it is pointless tocollect it. The intelligence disseminated must be timely andcredible to be useful. Dissemination must also be evaluatedbased on a “right to know” and the “need to know.” The rightto know means the recipient has the legal authority to obtainthe information pursuant to court order, statute, or decisionallaw. The need to know means the requestor has the need toobtain information to execute official responsibilities.25

The final step of the intelligence process involves obtainingfeedback on the process performed and the products producedby the intelligence function. This step allows evaluation ofthe performance or effectiveness of an intelligence function.

The proper completion of these steps ensures that the dataused are managed appropriately and within the legalconstraints regarding the privacy and rights of all citizens;however, the steps are often interconnected, and frequently,the boundaries blur. Each step of the process needs to beunderstood to produce accurate, timely intelligence reports.

The two primary standards applying to the intelligence processwithin the United States have been the Criminal IntelligenceSystems Operating Policies 28 Code of Federal Regulations(CFR) Part 23 and the LEIU Criminal Intelligence File

The Rationale: Recognition of Needs 7

22 For reference on the management of the criminal intelligence function, see: Wright, Richard. 2002. “Management of the Intelligence Unit.” In Marilyn B. Peterson (Managing Ed.), Bob Morehouse and Richard Wright(Eds.), Intelligence 2000: Revising the Basic Elements. Sacramento, CA: Law Enforcement Intelligence Unit, and Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analysts, Inc., pp. 67-77.

23 The GIWG would like to extend particular thanks to Special Agent in Charge Russ Porter of the Iowa Department of Public Safety for his contributions to the Plan regarding privacy issues and recommendations.

24 Morehouse, Bob. 2000. “The Role of Criminal Intelligence in Law Enforcement.” In Marilyn B. Peterson (Managing Ed.), Bob Morehouse, and Richard Wright (Eds.), Intelligence 2000: Revising the Basic Elements,Sacramento, CA: Law Enforcement Intelligence Unit, and Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analysts, Inc., pp. 1-12.

25 Ibid, p. 9.

Page 21: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Guidelines. Federal regulation 28 CFR Part 23 governs onlythose agencies that receive federal funding in support of amultijurisdictional intelligence system, while LEIU FileGuidelines historically have applied only to its memberagencies. Moreover, in the past, many agencies covered bythese standards have only applied them to information givento or received from/through the multijurisdictional informationsystem; thus, their other files might not be in compliancewith these guidelines.

Refer to Recommendations 9, 10, 11, and 12 for detailsand further discussion regarding this issue.

The need to increase availability ofinformation, from classified systems tolocal and state law enforcement agencies,for the prevention and investigation ofcrime in their jurisdictions.The IACP Criminal Intelligence Sharing Report noted thedifficulties of intelligence sharing between local, state, tribal,and federal law enforcement agencies. The current laws,policies, and procedures that govern the classification ofintelligence information and individuals’ clearance to view data,as well as the length of time it takes to process securityclearances, are examples that impede the transfer ofintelligence between law enforcement agencies. The fact thatsome information needs to be classified is not disputed;however, the current process needs to become more efficientto better serve public safety and homeland defense.

Many local law enforcement agencies are expanding theirintelligence functions, and many have personnel assigned toa Joint Terrorism Task Force (JTTF). Being a member of aJTTF requires a national security clearance of at least “secret”classification. A classification level is assigned to informationowned by, produced by or for, or controlled by theUnited States government. Clearance levels are based onthe need-to-know doctrine, which requires a background checkfor officials who need to have access to national securityinformation. Information may be classified at one of thefollowing levels:

1. “Top secret” is applied to information of which theunauthorized disclosure could reasonably be expected tocause exceptionally grave damage to the national security.

2. “Secret” is applied to information of which the unauthorizeddisclosure could reasonably be expected to cause seriousdamage to the national security.

3. “Confidential” is applied to information of which theunauthorized disclosure could reasonably be expected tocause damage to the national security.

Information is considered for classification if it concernsmilitary plans, weapons systems, or operations; foreigngovernment information; intelligence activities (including

special activities), intelligence sources or methods, orcryptology; foreign relations or foreign activities of theUnited States, including confidential sources; scientific,technological, or economic matters relating to the nationalsecurity, which includes defense against transnationalterrorism; United States government programs for safeguardingnuclear materials or facilities; vulnerabilities or capabilities ofsystems, installations, infrastructures, projects, plans, orprotection services relating to the national security, whichincludes defense against transnational terrorism; or weaponsof mass destruction.

The Federal Bureau of Investigation (FBI) brochure SecurityClearance Process for State and Local Law Enforcement(2002) identifies two categories of clearance levels: a “secret”security clearance may be granted to those persons whohave a need to know national security information that hasbeen classified as “confidential” or “secret,” and a “top secret”clearance may be granted to those persons who have a needto know national security information, classified up to the“top secret” level, and who need unescorted access in FBIfacilities when necessary. The time required to obtain a “topsecret” clearance is six to nine months. A “secret” clearancecan be awarded in 45 days.

Presidential Executive Order mandates the backgroundinvestigation and records checks for “secret” and “top secret”security clearances; the FBI does not have the ability to waivethem. Local and state officials who require access toclassified material must apply for security clearance throughtheir local FBI field office. Understanding the inherent delaysin such background checks, local officials should begin theapplication process promptly to help ensure a timelyturnaround by federal officials.

Refer to Recommendations 4 and 17 for details andfurther discussion regarding this issue.

The need to develop minimum criminalintelligence training standards for allaffected levels of law enforcementpersonnel to include training objectives,missions, number of hours, and frequencyof training.The IACP Criminal Intelligence Sharing Report included therecommendation to “promote intelligence-led policing througha common understanding of criminal intelligence and itsusefulness.” Standards for training on intelligence functionsare critical to implementing a national model for intelligence-led policing. National intelligence training standards canprovide criminal justice agencies, individually and collectively,with the framework for achieving that end. The goal of thetraining is to professionalize and enhance the practice ofcriminal intelligence collection within the United States lawenforcement/criminal justice community, demonstrate the

8 The Rationale: Recognition of Needs

Page 22: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

benefits derived from the intelligence, and encourageinformation sharing in support of the intelligence.

Refer to Recommendations 18 and 19 for details andfurther discussion regarding this issue.

The need to identify an intelligenceinformation sharing capability that can bewidely accessed by local, state, tribal, andfederal law enforcement and public safetyagencies.Information and intelligence sharing is essentially a voluntaryendeavor, whether in law enforcement, other areas ofgovernment, or the private sector. Certainly, policies exist toexhort, promote, and “require” information sharing. Thesemay be expressed informally; assumed to be necessary andunderstood; or set down formally in the form of a written policy,memorandum of understanding, or statute.

Still, sharing is founded upon trust between the informationprovider and the intelligence consumer. Such trust is mostoften fostered on an interpersonal basis; therefore, lawenforcement task forces and other joint work endeavorssucceed where colocated, interspersed personnel fromdifferent agencies and job types convene for a commonpurpose. In these instances, sharing can either flourish orfalter due to changes in leadership, personality differences,and real or perceived issues.

Trust is fostered and may be further institutionalized by settingstandards for participation in the information sharing process;thus, personnel vetting procedures are established that rangefrom the most stringent—national security clearances foraccess to classified information through law enforcementagencies’ employment background checks, including criminalhistory records and indices—to situational criteria that definean individual’s “need to know.”

The IACP Criminal Intelligence Sharing Report correctlyobserved, “Technology cannot stand in for trust.” However,technology systems can extend trust-building opportunitiesand facilitate collaboration well beyond the boundaries of directinterpersonal contact. Technical systems owners stipulatemembership criteria; information owners define the criteriaby which their systems or databases grant information accessprivileges. These are enforced through membership andaccess vetting procedures that serve to define and supporttrust relationships.

Technical systems provide a range of depth and breadth ofinformation sharing, from almost full and unfettered accessto another’s collection of sensitive information through redactedreports that provide the gist of salient information whileremoving (and thus further protecting) sensitive sources and

methods of information collected, through indices ofinformation holdings, to “pointers” to inform one individual ofanother’s precise or similar subject/target interest so thatcontact can be established and sharing or collaborationnegotiated.

Finally, a widely understood, unwritten rule is the expectationin law enforcement that data access and sharing hinge onequitable participation. The so-called “pay-to-play” or “give-to-get” principle governs the meaningful sharing of informationrecommended in the methods and formal recommendationsdescribed in this Plan.

This portion of the National Criminal Intelligence Sharing Planmakes recommendations regarding information technology(IT) connectivity and systems compatibility to advanceinformation and intelligence sharing. In so doing, the GIWGrecognizes and promotes as the highest priority thosesystems that seek and provide full access to sensitive butunclassified information and intelligence by combiningagencies’ and organizations’ investigative and intelligence datafor common access through data warehousing and outreachor factual data search and retrieval and for data visualizationthough the application of analytical tools.

Data WarehouseData warehouse examples include, but are not limited to:

♦ The Multistate Anti-Terrorism Information ExchangeTM

(MATRIX) Program is a pilot effort that will initially connectparticipating states’ criminal indices and investigative filedatabases, driver’s license and motor vehicle registrationdatabases, and other public records information forcombined data query and sharing among law enforcementparticipants on the sensitive but unclassified RISS secureintranet (RISSNETTM).

♦ The Gateway Information Sharing Initiative demonstrationproject in the St. Louis, Missouri, FBI field division, whereinsome local, state, and federal criminal indices andinvestigative files are combined in a data warehouse andmade available to all participating agencies for sophisticatedfactual search and retrieval and data visualization (linkanalysis and geo-mapping). Also included in the project isa classified data warehouse that adds classified FBIcounterterrorism investigative data to the sensitive butunclassified holdings for exploitation by interagencymembers of the JTTF in the FBI field division.

These programs would each benefit from greater participationby additional local, state, and federal law enforcementagencies. Given the unique nature of these new endeavors,they should collaborate on developing factual data searchand retrieval and data visualization tools, as well as sharedexperiences on crafting the governance arrangements and

The Rationale: Recognition of Needs 9

Page 23: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

associated participation memoranda of understanding.

Data MartMany law enforcement agencies may be prohibited by law orpolicy from participating in a data warehouse commingling ofinvestigative data. To address these concerns, the GIWGproposes a data sharing method of the next highest priority:the so-called “data mart” approach, wherein the investigativeindices, case files, and intelligence data are redacted, withthe most sensitive case types (e.g., public corruption andinternal conduct-related investigations) and the most sensitivedata elements (e.g., informant identities) excised. Thebalance of the data is duplicated and presented in a separatedatabase (data mart/information space) outside the agency’scentral database(s). Access can be by a variety of means,including a sensitive but unclassified connectivity, aspresented later in this Plan.

“Pointer” SystemsFinally, the GIWG appreciates that some law enforcementorganizations may not yet be familiar and comfortable withthe breadth and depth of data warehouse-based or data martsharing advocated above. With that recognition, lawenforcement agencies are encouraged to mandateparticipation in “pointer” systems, wherein agents andinvestigators register investigative interest in a particularsubject/suspect/target so as to ascertain which other lawenforcement agencies and investigators (or officers within thesame agency) might have a common investigative interest,might share information, or might consider participating in ajoint investigation. Noteworthy ongoing databases for thispurpose include, but are not limited to:

♦ The RISSIntel/RISSNET II databases, operated by the RISScenters.

♦ The U.S. Drug Enforcement Administration (DEA) NationalDrug Pointer Index (NDPIX).

♦ Certain High Intensity Drug Trafficking Area (HIDTA) casedeconfliction/management databases.

Each of these databases operates in essentially the samemanner. As a result of a law enforcement officer/agentregistering investigative interest in a particular individual, thesystems provide “pointers” identifying contact information tothose with the same investigative interest. All receive thepointer information simultaneously and are notified that sharedinterests exist, whom to contact, and how to do so.Subsequent information sharing is a matter for mutualagreement, which is almost impossible without the pointerdatabase capability.

The GIWG recognizes and recommends information sharingsupported by collaborative communications networks andsystems—joined together as a virtual single communications

capability—as a means to overcome geographical distances,better support communications and investigative operationalsecurity, provide an audit trail of information shared, andensure information access and transfer. Due to the use ofidentical technology mechanisms, the RISS and LEOinterconnection offers a technically straightforward step inproviding an initial nationwide sensitive but unclassifiedbackbone for law enforcement connectivity. It is anticipatedthat this initial nationwide sensitive but unclassifiedcommunications capability will expand and evolve with theconnection of other existing sensitive but unclassifiedenterprises, networks, and systems.

Refer to Recommendations 20, 21, 22, 23, 24, 25, 26,27, and 28 for details and further discussion regardingthis issue.

Recommendations forImplementation of the PlanRecommendation 1: In order to attain the goalsoutlined in this Plan, law enforcement agencies,regardless of size, shall adopt the minimum standardsfor intelligence-led policing and the utilization and/ormanagement of an intelligence function as containedin the National Criminal Intelligence Sharing Plan. Thestandards focus on the intelligence process and includeelements such as mission of the function, managementand supervision, personnel selection, training, security,privacy rights, development and dissemination ofintelligence products, and accountability measures.

Discussion: The agency chief executive officer and themanager of intelligence functions should:

♦ Seek ways to enhance intelligence sharing efforts and fosterinformation sharing by participating in task forces and state,regional, and federal information sharing initiatives.

♦ Implement a mission statement for the intelligence processwithin the agency.

♦ Define management and supervision of the function.♦ Select qualified personnel for assignment to the function.♦ Ensure that standards are developed concerning

background investigations of staff/system users to ensuresecurity (of the system, facilities, etc.) and access to thesystem/network.

♦ Ensure appropriate training for all personnel assigned to orimpacted by the intelligence process.

♦ Ensure that individuals’ privacy and constitutional rightsare considered at all times.

♦ Support the development of sound, professional analyticproducts (intelligence).

♦ Implement a method/system for dissemination of

10 The Rationale: Recommendations for Implementation

Page 24: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

information to appropriate components/entities.♦ Implement a policies and procedures manual. The intent

of the manual is to establish, in writing, agencyaccountability for the intelligence function. The manualshould include policies and procedures covering all aspectsof the intelligence process.

♦ Implement an appropriate audit or review process to ensurecompliance with policies and procedures.

♦ Promote a policy of openness when communicating withthe public and all interested parties regarding the criminalintelligence process, when it does not affect the securityand integrity of the process.

Recommendation 2: In order to provide long-termoversight and assistance with the implementation andrefinement of the National Criminal Intelligence SharingPlan, a Criminal Intelligence Coordinating Council (CICC)should be established as contemplated in the IACPCriminal Intelligence Sharing Report. The purpose ofthe CICC is to advise the Congress, the U.S. AttorneyGeneral, and the Secretary of the U.S. Department ofHomeland Security on the best use of criminalintelligence to keep our country safe. The CICC shouldoperate under the auspices of the GAC. The CICC shouldconsist of representatives from local, state, tribal, andfederal agencies and national law enforcementorganizations. The GIWG will act as the interim CICCuntil such time as the CICC is operational.

Discussion: The CICC should be structured similarly to theCounterdrug Intelligence Coordinating Group—a mechanismdeveloped to provide management and oversight to the federalentities charged with implementing the General CounterdrugIntelligence Plan of the National Drug Control Strategy. Rulesshould be established that stipulate rotation of the chairbetween local, state, and federal representatives. Additionally,funding for the CICC should continue through OJP. It isrecommended that the CICC be responsible for the followingfunctions:

♦ Lead an effort to identify a framework for implementing andensuring the longevity of the standards-based intelligenceplan.

♦ Act as the governing body for the recommendedcommunications capability.

♦ Represent all user groups and serve as an advisory councilto the U.S. Attorney General, U.S. Department of HomelandSecurity (DHS) Secretary, and state governors.

♦ Perform a review of new systems/initiatives requestingconnection to the communications capability, in order todetermine adherence to guidelines/standards referencesecurity, connections, data elements, and userbackgrounds.

♦ Review proposed systems/initiatives to avoid duplicity with

other established systems.♦ Assist localities, states, and tribes in eliminating barriers

in their laws and policies that limit intelligence sharing.♦ Ensure coordination among departments and agencies

responsible for systems participating in the nationwidecommunications capability.

♦ Submit an annual written report on the Council’s activitiesto the U.S. Attorney General, national law enforcementorganizations, and appropriate congressional committees.

♦ Monitor implementation of the National Criminal IntelligenceSharing Plan; the Council will adjust and modify the Planas needed and required.

Recommendation 3: The CICC should monitor theimplementation of the National Criminal IntelligenceSharing Plan, in order to gauge the success of the Plan.A report on the progress of the Plan will be submittedto OJP beginning December 31, 2004, and annuallythereafter.

Discussion: Assessment of the various components of thePlan should occur at different phases of its implementation inorder to measure the success of the project. Areas to evaluateshould include community knowledge, training efforts, agencyadoption of policies and standards, and systems participatingin the nationwide communications capability. A time-intervalseries of surveys may be utilized and should be appropriatelydeveloped to various law enforcement levels (beginning withthe implementation of the Plan, through use and benefits ofthe Plan). Consideration should also be given to developingperformance measures to gauge the results and outcomes ofthe Plan.

Recommendation 4: This Plan is designed tostrengthen homeland security and foster intelligence-led policing. There is a critical need for more nationalfunding to accomplish these goals. Without adequatefunding, many of the recommendations containedherein, such as improving training and technicalinfrastructure, will not occur, and the country will remainat risk. The CICC, the GAC, and the U.S. Departmentsof Justice and Homeland Security should partner toidentify and fund initiatives that implement therecommendations contained in this report.

Discussion: The Plan’s action agenda cannot bemeaningfully advanced with the existing resources of thenation’s law enforcement community. This Plan will fosterintelligence-led policing and strengthen homeland security,but simply stated, more local, state, and federal funding iscritical to accomplish these goals. Without adequate funding,many of the recommendations, including improved trainingand technical infrastructure, will not be implemented, and the

The Rationale: Recommendations for Implementation 11

Page 25: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

country will remain at risk.

To date, the cost estimates for all of these initiatives have notbeen fully calculated. The CICC, in conjunction with lawenforcement elements of the federal government andrepresentative organizations of local, state, and tribal lawenforcement, should calculate these resource requirementsfor presentation to the U.S. Attorney General, as the nation’schief law enforcement officer. Working with the Cabinetsecretaries who have criminal law enforcement and homelandsecurity responsibilities, the estimates should be included inthe resource estimates presented as a cohesive fundingstrategy, with a special appropriations request analysis, tothe Administration and the Congress for fiscal year 2005appropriations.

Recommendation 5: In order to publicly recognizethe creation of the Plan and demonstrate a commitmentby all parties involved, a National Signing Event shouldbe held where law enforcement and homeland securityagency heads, from all levels, and other relevant groupscome together to “sign on” to the National CriminalIntelligence Sharing Plan. The National Signing Eventshould be held before December 31, 2003.

Discussion: Participants in the National Signing Event shouldinclude a wide range of law enforcement representatives fromevery level of government and major law enforcementorganizations. Conducting outreach and marketing effortsregarding the Plan is imperative prior to the National SigningEvent. Those agencies signing on to the Plan should have aclear understanding of what the commitment entails.

The education process should include national law enforcementorganizations, such as the IACP, the Fraternal Order of Police,and the NSA; local and state law enforcement associations/organizations; and entities of local, state, tribal, and federallaw enforcement. Specific groups should be targeted forpresentations regarding the Plan at national conferences.

Additionally, press conferences should be held to promotepublic acceptance of the Plan. One of the most importantaspects of information sharing in the law enforcement andintelligence domains today is ensuring public trust andawareness. Each step of the process must include educationand outreach to the communities served. The public must beconstantly aware of what type of information is used toenhance public safety and how it is processed. Outreach,education, and public awareness are crucial for success andmust be considered from the outset.

Recommendation 6: All parties involved withimplementing and promoting the National CriminalIntelligence Sharing Plan should take steps to ensurethat the law enforcement community protectsindividuals’ privacy and constitutional rights within theintelligence process.

Discussion: In this post-9/11 era, the need for criminalintelligence sharing is more compelling than ever. The public’sdemand that law enforcement agencies do all they can toprevent terrorism—including the effective sharing of criminalintelligence—is also clear. Legislatures and individual electedofficials, likewise, demand that agencies share criminalintelligence so that overall patterns of criminal activity,undetectable within a single jurisdiction, can be observed whenthe whole is examined. Rapid technological advances offerthe promise of making criminal intelligence sharing even moreefficient, effective, timely, and secure. What, then, could stopthis momentum towards criminal intelligence sharing?

One of the critical issues that could quickly stop intelligencesharing is the real or perceived violation by intelligence sharingsystems of individuals’ privacy and constitutional rights. Tounderstand why, one must consider the context in which thesharing of sensitive and often preliminary criminal intelligenceinformation operates.

First, both constitutional values and an individual’s right toprivacy are deeply embedded in our nation’s laws, culture,and expectations. Our nation’s preference for governmentrestraint has a long and conspicuous history in America. Ourfounding fathers, fearful of a large, centralized, and authoritariangovernment, crafted the Bill of Rights to limit the power ofgovernment. These guarantees include freedom of thought,belief, expression, and assembly; protection againstunreasonable searches and seizures; and provisions for acourt hearing prior to the government’s taking of a person’slife, liberty, or property. Similarly, although there is no explicitfederal constitutional right to an individual’s privacy,26 privacyrights have been articulated in limited contexts by the U.S.Supreme Court.27 In fact, Justice Louis Brandeis observedthat the “right to be left alone” is the most comprehensive ofrights and the right most valued by a free people.28 Individuals’information privacy interests have also been articulated infederal and state case law and protected in statutes andregulations governing collection, use, and sharing of justiceinformation, including criminal intelligence systems (see, forexample, 28 CFR Part 23). Thus, the American traditionincludes a healthy suspicion of unrestrained government anda fervent demand by the public that their government does

12 The Rationale: Recommendations for Implementation

26 U.S. Constitution Amendment IV. See California Constitution article 1, §1 (West 1983).

27 National Criminal Justice Association. 2002 (September). Justice Information Privacy Guideline: Developing, Drafting and Assessing Privacy Policy for Justice Information Systems. Washington, DC: NCJA,p. 18-19.

28 Olmstead v. U.S. (1928).

Page 26: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

not infringe on the constitutional rights of the people norunnecessarily violate an individual’s privacy.

Second, the public perception of current intelligence work isstrongly shaped by its recent history. Since the 1960s,overzealousness by some criminal intelligence units hasperiodically led to infringements on civil liberties. For example,some individuals have been targeted for surveillance and otherinvestigative activities apparently based solely on theirconstitutionally protected exercise of free speech, expressionof political beliefs, and other lawful activities. These lawenforcement actions involving the misapplication of the criminalintelligence function have resulted in lawsuits and judgmentsagainst some of the agencies involved.29 In fact, some lawenforcement agencies completely disbanded their criminalintelligence units30 in the face of allegations of abuse. Thishistory directly affects how the public perceives intelligencework and how it judges the effectiveness of any proposedpolicy that addresses the protection of constitutional rightsand individuals’ privacy. It also demonstrates how thecontinued existence and operation of the criminal intelligencefunction in a law enforcement agency may be affected byimproper criminal intelligence practices.

The protection of individuals’ privacy and constitutional rightsis, therefore, an obligation of government officials and is crucialto the long-term existence and success of criminal intelligencesharing. Consequently, it is important to advocate policiesand practices that accomplish this goal. Indeed, the NationalCriminal Intelligence Sharing Plan will provide model criminalintelligence policies for law enforcement agencies to use thatwill protect the privacy and constitutional rights of individuals.However, it must be recognized that policies are merely ameans to an end—the protection of individual rights withinthe intelligence process. Achieving that end, while at thesame time providing for homeland security and public safety,will require a commitment from everyone in the system—from line officers to top management. This commitment,however sincerely held, will not have the necessary intensityor staying power unless it becomes part of the culture of thecriminal intelligence community. This goal will require thesustained effort and focus of all participants in theimplementation and operation of the National CriminalIntelligence Sharing Plan.

It is important that the commitment to protect individuals’privacy and constitutional rights is prominently highlighted inall areas of the Plan. Outreach activities should be proactiveon this mandate, both within the law enforcement communityand with the general public. Law enforcement officials mustbe assured that protecting the privacy and constitutional rights

of individuals will not hinder the effectiveness of their agency’sintelligence process.

Recommendation 7: Local, state, tribal, andfederal law enforcement agencies must recognize andpartner with the public and private sectors in order todetect and prevent attacks to the nation’s criticalinfrastructures. Steps should be taken to establishregular communications and methods of informationexchange.

Discussion: All elements of our society have a stake inprotecting and reducing the United States’ vulnerability toterrorist attacks. Currently, the private sector controls85 percent of America’s critical infrastructure. Criticalinfrastructure is defined as those systems and assets,whether physical or virtual, so vital to the United States thatthe incapacity or destruction of such systems and assetswould have a debilitating impact on security, nationaleconomic security, national public health or safety, or anycombination of those matters.

Protecting America’s critical infrastructures requirescooperation among all levels of government and the privateand public sectors. DHS is the lead agency responsible forevaluating vulnerabilities; issuing warnings and advisories; andcoordinating with other local, state, tribal, and federal agenciesand private entities to ensure the most effective homelandsecurity response for America’s public safety agencies,elected officials, industry, and the public. Information sharingis vital to the homeland security effort; law enforcement andpublic safety agencies must use the capabilities of the privatesector to achieve a practical level of security without hinderingproductivity, trade, or economic growth. Cooperative efforts,such as the critical infrastructure pilot project initiated by DHS,should continue and expand as mechanisms for the receiptand exchange of important information are developed and fine-tuned.

Recommendation 8: Outreach materials preparedby the CICC should be utilized by law enforcementagency officials to publicize and promote the conceptsof standards-based intelligence sharing and intelligence-led policing, as contained within the National CriminalIntelligence Sharing Plan, to their agency personnel andthe communities that they serve.

Discussion: An Outreach Package has been prepared topublicize and promote the concepts and standards containedwithin the National Criminal Intelligence Sharing Plan.Samples of materials prepared include an article, brochure,

The Rationale: Recommendations for Implementation 13

29 American Friends Service Committee. 1979. The Police Threat to Political Liberty. Philadelphia, PA: American Friends Service Committee.

30 Martens, Frederick T. 2000. “Uses, Abuses, and Misuses of Intelligence.” In Marilyn B. Peterson (Managing Ed.), Bob Morehouse, and Richard Wright (Eds.), Intelligence 2000: Revising the Basic Elements, Sacramento,CA: Law Enforcement Intelligence Unit, and Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analysts, Inc., pp. 37-47.

Page 27: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

and a CD containing testimonials from several law enforcementofficers and an explanation of the Plan.

Recommendation 9: In order to ensure that thecollection/submission, access, storage, anddissemination of criminal intelligence informationconforms to the privacy and constitutional rights ofindividuals, groups, and organizations, law enforcementagencies shall adopt, at a minimum, the standardsrequired by 28 CFR Part 23,31 regardless of whether ornot an intelligence system is federally funded.

Discussion: Federal regulation 28 CFR Part 23 is a guidelinefor law enforcement agencies that contains implementingstandards for operating federal grant-funded, multijurisdictionalcriminal intelligence systems. It specifically provides guidancein five primary areas: submission and entry of criminalintelligence information, security, inquiry, dissemination, andthe review-and-purge process. The 28 CFR Part 23 regulationdoes not provide specific, detailed information on how thestandards should be implemented by the operating agency,but it provides for each agency to develop its own policiesand procedures. This regulation is currently pending revision.The proposed revisions are the result of three major concerns:the speed at which technology changes, the nature of thenew threat to public safety (exemplified by terrorism), andthe critical need to facilitate information sharing among alllevels of government.

Recommendation 10: Law enforcement agenciesshould use the IACP’s Criminal Intelligence Model Policy(2003 revision)32 as a guide when implementing orreviewing the intelligence function in theirorganizations.

Discussion: In 1987, the IACP entered into a cooperativeagreement with the Bureau of Justice Assistance (BJA), DOJ,to establish a National Law Enforcement Policy Center(“Center”). The objective of the Center was to assist lawenforcement agencies across the country in the critical anddifficult task of developing and refining law enforcement policy.Organized under the direction of a broad-based advisory boardof recognized law enforcement professionals, the Center hascarried out its mission through the development of a widevariety of model law enforcement policies. Each modelincorporates the research findings, the input of leading subject-matter experts, and the professional judgment of advisory

board members who have combined this information with theirextensive practical field and management experience.

The Criminal Intelligence Model Policy was originallypromulgated in February 1998. The purpose of the Policy isto provide law enforcement officers, in general, and officersassigned to the intelligence function, in particular, withguidelines and principles for the collection, analysis, anddistribution of intelligence information.

The GIWG, with concurrence from the Center, suggestedrevisions to the Criminal Intelligence Model Policy. The revisedPolicy was presented to the Center Review Board in June2003 and was approved at that time.

Recommendation 11: In addition to federalregulation 28 CFR Part 23, law enforcement agenciesshould use the LEIU Criminal Intelligence File Guidelinesas a model for intelligence file maintenance.33

Discussion: The LEIU, in existence since 1956, is a networkof intelligence specialists from nonfederal law enforcementagencies nationwide that promotes the gathering, recording,and exchange of criminal intelligence. The LEIU first developedthe Criminal Intelligence File Guidelines in the 1970s topromote professionalism, provide protection of citizens’privacy, and provide guidance to their member law enforcementagencies when collecting information in the pursuit of preventingand solving crimes. Law enforcement agencies involved withintelligence gathering should operate under specific guidelinesin order to ensure that abuses do not occur. It is recommendedthat agencies also adopt file procedures as a check andbalance against inappropriate activities. The LEIU CriminalIntelligence File Guidelines can provide law enforcementagencies with a foundation for establishing sound standardsregarding maintenance of their criminal intelligence files.34

Recommendation 12: The IALEIA should develop,on behalf of the CICC, minimum standards forintelligence analysis to ensure intelligence products areaccurate, timely, factual, and relevant and recommendimplementing policy and/or action(s). These minimumstandards should be developed by June 30, 2004. Lawenforcement agencies should adopt these standards assoon as developed and approved by the CICC.

Discussion: The role of analysis in a law enforcement agencyis to support the investigative, planning, and intelligenceactivities of the agency. Thus, the work that is performed by

14 The Rationale: Recommendations for Implementation

31 The 28 CFR Part 23 regulation is included on the companion CD and is also available at www.iir.com/28cfr/guideline1.htm.

32 The IACP Criminal Intelligence Model Policy is included on the companion CD and is also available at www.theiacp.org.

33 The March 2002 update of the LEIU Criminal Intelligence File Guidelines is included on the companion CD.

34 Civil liberties groups, citizens, and government and police officials have agreed that the standards embodied by LEIU are proper for collecting, maintaining, and disseminating criminal intelligence information. See the“Settlement Agreement and Release” entered into by and between Joseph N. Riggs III, Alice Hector, Peter Cubra, James R. Toulouse, Tova Indritz, Randi McGinn, Nancy Hollander, Sigmund Bloom, Hank Farrah,Joe Fine, Dorie Bunting, Allen Cooper, Richard Moore, The American Civil Liberties Union of New Mexico, and The New Mexico Chapter of the National Lawyers Guild, and the City of Albuquerque, dated September29, 1993, resolving Cause No. Civ. No 88-1141 JP/RWM in the United States District Court for the District of New Mexico, and CV-91-07599, Second Judicial District Court, County of Bernalillo, State of New Mexico.

Page 28: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

an intelligence function should reflect the priorities and goalsof the specific agency or organization. There is a range ofanalytic products that result from a careful and thorough reviewof varied documents, and the types and formats of intelligenceproducts also vary (e.g., working reports, analytic reports,assessments, or reports of raw data). Regardless of theformat, intelligence products must be accurate, timely, andfactual. “Reports are the very lifeblood of the intelligenceprocess,” and “intelligence reporting is the basis most oftenused for judging the value of a police intelligence unit.”35

Therefore, it is critical that reports be done and that they bedone well.

Recommendation 13: To further enhanceprofessional judgment, especially as it relates to theprotection of individuals’ privacy and constitutionalrights, the National Criminal Intelligence Sharing Planencourages participation in professional criminalintelligence organizations and supports intelligencetraining for all local, state, tribal, and federal lawenforcement personnel.

Discussion: Participation in professional criminal intelligenceorganizations in conjunction with comprehensive, high-qualitytraining offers promise for ensuring that working group normsin law enforcement agencies foster the protection of individuals’privacy and constitutional rights. Active participation inprofessional organizations encourages professionaldevelopment, including a commitment to ethical service,continuous learning about the profession, peer evaluation, andopenness and accountability to all stakeholders. Participationin professional organizations also develops trust andconfidence among members, as well as from the justice andpublic safety communities. All of these features are particularlysalient to the important issue of protecting individuals’ rights.In addition to encouraging participation in professional criminalintelligence organizations, the National Criminal IntelligenceSharing Plan must also encourage appropriate training to bewidely available on this topic. Through the use of core trainingcurricula, all levels of law enforcement should be educatedon constitutional rights, privacy issues, and safeguards asthey relate to the criminal intelligence function.

Recommendation 14: To foster trust among lawenforcement agencies, policymakers, and thecommunities they serve, the National CriminalIntelligence Sharing Plan promotes a policy of openness

to the public regarding the criminal intelligencefunction, when it does not affect the security andintegrity of the process.

Discussion: The police consistently rank high among theinstitutions and occupations in which the public expressesconfidence and trust.36 Although many indicators show thatAmerican police are among the most trusted and admiredinstitutions of contemporary society, there are also manyindicators that some citizens are wary of the police.37 Thismay be especially true in the area of the criminal intelligenceprocess.

At least two factors combine to make earning the public’strust in the intelligence process an especially important andkey part of long-term, successful intelligence sharing. First,put simply, the public’s trust in intelligence work has beenreasonably shaken in the past through the disclosure ofexcesses and abuses. Second, by its very nature, criminalintelligence work is often unseen or unobserved by the public.These two factors can contribute to diminished trust in theapplication of the intelligence process and a lack ofunderstanding in how it is carried out.

But that same public trust is necessary for successful criminalintelligence sharing. Trust gives law enforcement agenciesgreater access to valuable information that can lead to theprevention and solution of crimes. It also engenders supportfor law enforcement efforts.38 Public cooperation and supportcan be obtained most readily if public trust and confidenceexist in the intelligence process.

A general policy of openness can foster public trust in lawenforcement agencies. A principle of openness about criminalintelligence processes should therefore be applied wheneverpossible. Of course, criminal intelligence information isconfidential and must be protected from unauthorizeddisclosure, but the operating principles of the intelligenceprocess can be open and accessible to the public. Thisapproach can demystify the intelligence process and defusesuspicion that might be generated by the sometimes shroudedand enigmatic nature of the criminal intelligence process.

Recommendation 15: The National CriminalIntelligence Sharing Plan promotes effectiveaccountability measures, as expressed in28 CFR Part 23, the LEIU Criminal Intelligence FileGuidelines, and the Justice Information PrivacyGuideline,39 which law enforcement agencies should

The Rationale: Recommendations for Implementation 15

35 Parks, Dean and Marilyn Peterson. 2000. “Intelligence Reports.” In Marilyn B. Peterson (Managing Ed.), Bob Morehouse, and Richard Wright (Eds.), Intelligence 2000: Revising the Basic Elements, Sacramento, CA:Law Enforcement Intelligence Unit, and Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analysts, Inc., pp. 121-133.

36 Source: Harris Interactive, Inc., The Harris Poll, Feb. 7, 2001, pp. 4-6; Jan. 30, 2002, pp. 3, 4 (Los Angeles: Creators Syndicate, Inc.). Cited in Ann L. Pastore, and Kathleen Maguire (Eds.), Sourcebook of Criminal JusticeStatistics [Online]. Available: http://www.albany.edu/sourcebook/, May 3, 2003, at Table 2.13.

37 Gallagher, Catherine, Edward R. Maguire, Stephen D. Mastrofski, and Michael D. Reisig. 2001 (October 2). The Public Image of the Police: Final Report to The International Association of Chiefs of Police by theAdministration of Justice Program, George Mason University. Accessed on the World Wide Web at http://www.theiacp.org/profassist/ethics/public_image.htm, May 3, 2003.

38 From the Web site of the Community Policing Consortium, http://www.communitypolicing.org/about2.html, May 3, 2003.

39 This document is included on the companion CD and is also available at http://www.ncja.org/pdf/privacyguideline.pdf.

Page 29: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

employ to ensure protection of individuals’ privacy andconstitutional rights and to identify and remedy practicesthat are inconsistent with policy.

Discussion: Accountability is essential to the effectiveimplementation of a policy designed to protect individuals’privacy and constitutional rights. It acknowledges aresponsibility to ensure that the standards specified in thepolicy are carried out in the field. Frequently, a gap occursbetween a policy and the actual practices that occur in “reallife.” Accountability mechanisms reduce that gap, which, inturn, reduces liability to the agency. Accountabilitymechanisms are the invisible bridge from words on paper (i.e.,the policy) to actions in the field.

The primary responsibility for ensuring accountability restswith law enforcement agencies themselves.40 Policing expertHerman Goldstein has argued, “The nature of the policefunction is such that primary dependence for the control ofpolice conduct must continue to be placed upon internalsystems of control.” Most police experts assert that internalmechanisms of accountability are more likely than others tobe effective for at least two reasons: (1) department officialshave direct, day-to-day contact with the work that is conductedand thus are “closer” to the situation, and (2) officers aremore likely to understand and respect rules that are developedby law enforcement agencies.41 By the same token, agenciesmust take seriously the need for effective implementation ofaccountability measures.

The National Criminal Intelligence Sharing Plan identifies awide array of suggested accountability mechanisms, suchas periodic review by management on decision makingthroughout the intelligence process; audit trails withinintelligence processes and computer systems; staff surveysand questionnaires; effective training on department policies,procedures, and professional criminal intelligence practices;and periodic audits of criminal intelligence operations andfiles.42

Recommendation 16: Law enforcement agenciesinvolved in criminal intelligence sharing are encouragedto use, to the extent applicable, the privacy policyguidelines provided in Justice Information PrivacyGuideline: Developing, Drafting and Assessing PrivacyPolicy for Justice Information Systems.43 The goal of theJustice Information Privacy Guideline (Guideline) is toprovide assistance to justice leaders and practitionerswho seek to balance public safety, public access, and

privacy when developing information policies for theirindividual agencies or for integrated (multiagency)justice systems.

Discussion: Some privacy issues can be addressed throughfollowing basic tenets of information collection and use; theJustice Information Privacy Guideline provides specificdirection on how to employ good collection and use practices.The Guideline also discusses a number of other privacy issuesthat are not as easily resolved, such as determining thesensitivity or public accessibility of certain data. The Guidelineis the result of a two-year collaboration of local, state, andtribal justice leaders, as well as academia, elected officials,media, and the private sector. The GAC, through its GlobalPrivacy and Information Quality Working Group, coordinatedproduction of the Guideline.

Recommendation 17: The CICC, in conjunctionwith federal officials, should identify technical meansto aid and expedite the production of unclassified “tear-line” reports. These reports are the declassification ofclassified data needed for law enforcement purposes,with the sensitive source and method-of-collection dataredacted, yet retaining as much intelligence content asfeasible. The technical means for production of thesereports should be identified by June 30, 2004.

Discussion: The law enforcement and intelligencecommunities routinely protect the sources of information andthe methods by which that information is garnered. In thismanner, the identities of confidential police sources areroutinely excised from reports. For classified information,the procedure is unchanged, but more difficult. The data inits entirety is classified, although the basis for theclassification relates to the source or the technical means bywhich the information was acquired. The Plan does notrecommend any change to those rules and classificationprocedures.

To that end, two approaches are recommended:

1. Use “reports” officers/analysts to generate and disseminatesanitized reports of current law enforcement investigativeinformation to their counterpart law enforcement agenciesat the local, state, tribal, and federal levels. Establishingsuch a capability can markedly and actively enhance lawenforcement information sharing. Doing so necessitatesthe dedication of a cadre of intelligence analysts in thefederal law enforcement agencies, especially the U.S. DrugEnforcement Administration (DEA), FBI, and U.S. Customs

16 The Rationale: Recommendations for Implementation

40 Goldstein, Herman. 1977. “Controlling and Reviewing Police-Citizen Contacts,” in Policing a Free Society. Cambridge, MA: Ballinger, pp. 157-186.

41 Walker, Samuel. 1999. The Police in America, Third Edition. Boston, MA: McGraw-Hill College, p. 279, citing Goldstein, Herman. 1967. “Administrative Problems in Controlling the Exercise of Police Authority.” Journalof Criminal Law, Criminology and Police Science, 58, pp. 160-172.

42 Audits of this type have been successfully conducted by the Executive Board of the Law Enforcement Intelligence Unit (LEIU) for some law enforcement agencies.

43 This document is available at http://www.ncja.org/pdf/privacyguideline.pdf.

Page 30: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

and Border Protection headquarters and field offices. Theirprimary mission is to ensure that timely and high-value,but not case-sensitive, information is provided to those witha need to know—while protecting sensitive, undercover,and legally restricted law enforcement sources, information,individuals, and techniques. The law enforcementcommunity needs a reporting capability comparable to theintelligence community’s reports officer to push out valuableinformation from law enforcement field offices to their ownheadquarters elements.

2. Establish procedures and designate supervisors to passand receive sensitive “tips and leads.” Information sharing,as currently practiced, includes the use of tips and leadsto trusted individuals who may direct subordinate agents/officers to take actions without informing them of the basisfor that action. As such, designated supervisors serve asa “cut-out”; they can appreciate the value of sharedinformation yet not reveal the source of shared informationto subordinates. Law enforcement investigations may bethus initiated, directed, or developed from the facts observed,without including the intelligence that prompted the agents/officers to be in a position to make those observations.

Attempts to tag data in its initial preparation, so as to identifythe sensitive sources and methods, are ongoing; however, aphilosophical change by the agencies that prepare classifieddocuments may be required in order to fully implement thisprocess. Reports should be prepared in such a manner thatall content below a certain line in the document or messageis of a lower classification. This method protects sensitivesources and methods of higher classification and provides adiscernable marking in the document or message whereinformation may be shared.

Evidence of the ongoing efforts to provide classified data tolocal law enforcement includes a bill, currently pending beforeCongress, that would authorize the DHS to conduct a pilotproject in which intelligence information from DHS is madeavailable to officials of local and state governments throughthe use of tear-line intelligence reports. Efforts to automatethese redactions (e.g., interface filters) are encouraged, soas to ease the preparation of declassified reports and tear-line reports of classified data.

Recommendation 18: Training should be providedto all levels of law enforcement personnel involved inthe criminal intelligence process. The trainingstandards, as contained within the National CriminalIntelligence Sharing Plan, shall be considered theminimum training standards for all affected personnel.44

Additionally, recipients of criminal intelligence training,as recommended in the National Criminal IntelligenceSharing Plan, should be recognized and awardedcertificates for successful completion of training.

Discussion: The IACP Criminal Intelligence Sharing Reportidentified several recommendations specific to training issues:

♦ Training should provide recipients with the skills to providemore targeted, evaluative summary data to decision makers.

♦ Appropriate training must be provided to in-service lawenforcement personnel and basic recruits on informationsharing systems and criminal intelligence concepts.

♦ Training should promote building trust for intelligencesharing.

♦ Training should promote protection of civil and constitutionalrights.

♦ Training should emphasize that all personnel, regardlessof position, have a role in the intelligence process andinformation sharing.

♦ Training should equip personnel to use new technologies.

It is important that recognition be given to those individualsand agencies that participate in the training curriculum.Certificates of Completion should be given to each individualwho participates in the varied levels of intelligence training bythe entity delivering the training.45

Recommendation 19: The CICC shall foster aworking relationship with the International Associationof Directors of Law Enforcement Standards and Training(IADLEST) organization, the IACP State and ProvincialPolice Academy Directors Section (SPPADS), and otherrelevant training organizations, in order to obtain theirassistance with implementing the recommendedNational Criminal Intelligence Sharing Plan trainingstandards in every state.

Discussion: IADLEST is an international organization oftraining managers and executives dedicated to theimprovement of public safety personnel. Every state isrepresented in its membership. The mission of IADLEST isto research, develop, and share information, ideas, andinnovations that assist states in establishing effective anddefensible standards for employment and training of peaceofficers. Additionally, IADLEST recommends model minimumstate standards in the following areas: entry-level standards,basic training, in-service requirements, discipline anddecertification, and curriculum issues for criminal justiceofficers. As a national association of training managers,IADLEST can effectively liaison with local, state, tribal, and

The Rationale: Recommendations for Implementation 17

44 The recommended training standards for each level, including roles and missions, core training objectives, and length of training, are included in the appendix of this report and on the companion CD.

45 A wide range of training is available from local, state, regional, and federal providers. A listing of available intelligence training sources and specifically scheduled classes may be found at www.ialeia.org. This listingis updated on a semiannual basis and also allows individuals to directly contact training source agencies and organizations for more information on classes and schedules.

Page 31: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

federal training academies and other training providers to makecurriculum changes in support of new intelligence sharinggoals. The membership of SPPADS, which was establishedby IACP to advance the principles and competency ofprofessional law enforcement instructors, should also beutilized to effect changes in curriculum at the local and statelevels.

Recommendation 20: In order to support agencytactical, operational, and strategic needs, lawenforcement agencies are encouraged to consider anautomated, incident-based criminal records trackingcapability, in addition to traditional case managementand intelligence systems, to use as an additional sourcefor records management and statistical data. Thesesystems should be Web-based and configured to meetthe internal reporting and record-keeping needs of thecomponent, in order to facilitate the exportation ofdesired data elements—without the need for duplicatedata entry or reporting—to relevant statewide andfederal criminal information programs.

Discussion: For more than 75 years, the FBI’s Uniform CrimeReporting (UCR) Program, with more than 16,000 lawenforcement agencies contributing crime statistics, has servedas the principal means to measure crime in America. Tomove this important program into the twenty-first century, theFBI partnered with other local, state, and federal agencies tocreate a new, automated National Indices and Pointer Systemthat will be designed to collect data on each crime occurrenceand arrest associated with that occurrence.

The most significant difference between incident-basedreporting and the traditional UCR system is the timelinessand degree of detail in reporting. Unlike the traditional or“summary” UCR system, which collects statistics on only ahandful of major crimes (often after several months of reportedlag time), the incident-based reporting system collects dataon approximately 50 criminal offenses in near real-time,drawing the data from the day-to-day internal recordsmanagement systems used by participating law enforcementcomponents. The goals are to enhance the quantity, quality,and timeliness of crime data collection by law enforcementso as to improve the methodology used for compiling,analyzing, auditing, and publishing the collected criminalstatistical data.

Today, some 4,200 law enforcement components throughoutthe country employ internal, Web-based, incident-basedrecords management systems for internal records storing thatare compatible with the National Indices and Pointer System.Much more is needed to make this useful initiative a coreelement of criminal intelligence sharing. These participating4,200 components represent jurisdictions that cover only 17

percent of the nation’s population. The FBI’s Criminal JusticeInformation Services (CJIS) Division encourages and assistsadditional jurisdictions to deploy information systems toachieve incident-based reporting.

The CJIS Division envisions a System of Services InformationSharing System that capitalizes upon and integrates its ITsystems housed at the CJIS Division—the UCR System; theIntegrated Automated Fingerprint Identification System(IAFIS); the National Crime Information Center (NCIC); theInterstate Identification Index or criminal history records; thedenied persons file of the National Instant Criminal BackgroundCheck System (NICS); its aggregation of local, state, andfederal incident-based law enforcement data reporting; CJIS-supported telecommunications systems; and the FBI LawEnforcement Online (LEO) system, which is linked toRISSNET. The FBI’s vision is to provide a consolidated reportof all criminal information relative to an individual’s contactswith law enforcement.

The Chicago Citizen and Law Enforcement Analysis andReporting (CLEAR) system exemplifies the intelligence valueof such a local, statewide, regional, or metropolitan systemto the deploying agency. CLEAR’s coverage includes the132 police jurisdictions in Cook County, Illinois (including fieldcomponents of the Bureau of Alcohol, Tobacco, Firearms andExplosives; the FBI; and the U.S. Marshals Service), as wellas future plans to incorporate the Illinois State Police LEADSsystem (Law Enforcement Agency Data System consistingof 1,200 law enforcement data systems of the otherjurisdictions in the state of Illinois). CLEAR provides arepeatable, integrated criminal justice records system. Itpresents real-time, relational information of value to operations,policymakers, and participating police agencies. Presently,the Chicago Police Department and the Illinois State Policeare piloting wireless access to CLEAR statewide. CLEAR’sdatabase serves 25,000 law enforcement officials with thefollowing capabilities: holds information and digital photoson 7 million offenders and 3 million incidents, compares andlinks any database elements, records information on all lawenforcement stops, provides warnings relative to want notices,and conducts link and pattern analysis. CLEAR is creditedwith permitting the redeployment of 90 officers to enforcementactivities, the elimination of 330 clerical positions, a 20 percentimprovement in officer effectiveness, and savings in excessof $15 million.

The value of an incident-based records system is importantfirst to the implementing jurisdictions and its citizens. Thevalue of such a system (and the information that could bederived from it) is also important to a national statisticalsystem, such as the envisioned FBI System of Services. Withbetter UCR data, law enforcement stands to better trackcriminal trends for policymakers and the Congress; with

18 The Rationale: Recommendations for Implementation

Page 32: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

incident-based data, the integrated databases of the FBI CJISDivision can provide valuable criminal information and potentialintelligence across jurisdictions at a level of granularity thatcan assist in crime prevention and crime solving. In this regard,the CLEAR program is currently engaged in planning to provideincident-based data needed by the FBI incident-based recordssystem, though at present only summarized UCR statisticsare provided.

Recommendation 21: RISS and the FBI LEOsystems, which interconnected September 1, 2002, as avirtual single system, shall provide the initial sensitivebut unclassified secure communications backbone forimplementation of a nationwide criminal intelligencesharing capability. This nationwide sensitive butunclassified communications backbone shall supportfully functional, bidirectional information sharingcapabilities that maximize the reuse of existing local,state, tribal, regional, and federal infrastructureinvestments. Further configuration of the nationwidesensitive but unclassified communications capability willcontinue to evolve in conjunction with industry and thedevelopment of additional standards and the connectionof other existing sensitive but unclassified networks.

Discussion: Current capabilities to share criminal informationand intelligence data are greatly disaggregated, although inthe past year, significant strides have been taken to connectthese capabilities as a virtual single system for local, state,tribal, and federal law enforcement, intelligence communityagencies, the diplomatic community, and first responderconnectivity. Six sensitive but unclassified systems andnetworks have been identified46 with national coverage. Othersensitive but unclassified systems and networks exist withadmirable and similar capabilities (with significant informationsharing capabilities and security) but with local, state, orregional geographical coverage.47 The first four sensitive butunclassified systems and networks listed in footnote 46 applyprimarily to law enforcement agencies and have considerablecapacities, capabilities, and scope; yet, taken individually,they remain relatively limited in use in terms of intelligencesharing by the aggregate of local, state, tribal, and federallaw enforcement agencies and personnel.

IACP Summit participants and representatives of individuallocal, state, tribal, and federal law enforcement agencies notedthat a considerable number of law enforcement and protectiveservice organizations already engage in substantial informationsharing. The capabilities identified above—and their collectivemembership of some 150,000 current users—should be builtupon; connected to one another and to other sensitive butunclassified communications capabilities; and expanded, notreplicated or kept static.

Consequently, the consensus of law enforcementrepresentatives to the GIWG recommends leveraging,strengthening, and expanding existing systems by addingusers and connecting local, state, and regional systems. Inessence, this means maximizing existing systems byconnecting them to expand collaboration opportunities anddatabase access, while continuing to evolve the nationwidesensitive but unclassified architecture to support fullyfunctional, bidirectional information sharing. Therecommended “system of systems” network is trusted,secure, and accessible by all levels of law enforcement. Itshould, and can, support collaboration with homeland securityofficials and the first responder community. It must have greatercapacity to handle the larger volume of informationtransactions. As the first crucial step in response to theneed for greater information sharing among local, state, tribal,and federal law enforcement, OJP provided funding for theinterconnection of the RISS and LEO systems. This wasachieved in September 2002.

The RISS and LEO interconnection is recommended as theinitial nationwide connectivity backbone for several reasons.The RISS Program is a secure nationwide communicationsand information sharing network that serves over 7,000 lawenforcement member agencies from all government levels,with members in 50 states, the District of Columbia, U.S.territories, Canada, Australia, and England. Internettechnology and virtual private network (VPN) software providean encrypted, secure intranet that is able to connect memberagencies to the databases of six regional RISS centers andfive other intelligence systems from a single query viaRISSNET. In essence, while six RISS regions exist, there isbut one RISSNET. Additionally, several High Intensity DrugTrafficking Areas (HIDTAs), state intelligence systems, theLEIU network, and the nationwide Clandestine LaboratorySeizure System are accessible via RISSNET.

The Rationale: Recommendations for Implementation 19

46 The six sensitive but unclassified systems identified are as follows: 1) Regional Information Sharing Systems’ secure intranet (RISSNET), funded by the U.S. Department of Justice (DOJ), Office of Justice Programs,and membership fees of participating local and state law enforcement departments and agencies and also some federal law enforcement agencies’ field divisions and field offices; 2) Law Enforcement Online (LEO), fundedby DOJ; 3) the International Justice and Public Safety Information Sharing Network (NLETS); 4) Anti-Drug Network-Unclassified (ADNET-U), provided to law enforcement agencies primarily along the Southwest Borderby the U.S. Department of Defense (DoD), Defense Information Systems Agency (DISA); 5) Open Source Information System (OSIS), provided to the intelligence community, military, law enforcement, and diplomaticcommunity agencies by the Intelligence Community Chief Information Officer through the Intelink Program Management Office; 6) OpenNet Plus, provided by the U.S. Department of State (DOS) to the 40-plus U.S.government agencies’ representatives at 250 embassy sites internationally and the DOS headquarters.

47 Examples include, but are not limited to the following: a) the Automated Regional Justice Information System (ARJIS)—a complex criminal justice enterprise network utilized by 38 local, state, and federal agencies in theSan Diego, California, region. The ARJISNet secure intranet contains data on the region’s crime cases, arrests, citations, field interviews, traffic accidents, fraudulent documents, photographs, gang information, andstolen property, and b) CriMNet—an enterprise architecture that puts in place a statewide framework of people, processes, data, standards, and technology focused on providing accurate and comprehensive data to thecriminal justice community in the state of Minnesota.

Page 33: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

To date, RISS has some 60,000 “access officers” approvedto receive information and services from RISS for 7,000 lawenforcement agencies, representing some 700,000 officers.Approximately 18,000 users have active RISSNET accounts,including some 1,000 federal law enforcement agents andanalysts. RISS needs additional funding to add some 6,000local, state, and tribal member agencies, addingapproximately 20,000 “access officers,” so that 80 percent oflocal, state, and tribal law enforcement personnel nationwideare represented and have access to those who, in essence,have intelligence information that warrants sharing and thestaff to react to that information.

The FBI-hosted LEO system is a nationwide source of lawenforcement intelligence that is compiled from many sources,can be subscribed to by Internet-enabled law enforcementpersonnel, and is funded by DOJ. It functions as aninformation repository but also features segmentedcommunity-of-interest areas with multilevel controlled accessfor specialized law enforcement groups that have their ownmembers (termed LEO Special-Interest Groups, or SIGs),interactive chat groups, electronic calendars, listservintelligence “push” capability, and secure e-mail options—allof which additionally support intelligence exchange.

To date, LEO has some 25,000 users, of which approximatelytwo-thirds are local, state, and tribal law enforcementpersonnel. On September 19, 2002, the FBI ExecutiveAssistant Director for Law Enforcement Services invited federallaw enforcement agencies to identify an initial 5,000 new lawenforcement personnel to be added to LEO with FY2002resources.

The FBI has proposed expanding LEO to local, state, tribal,and federal law enforcement personnel and has plans to relyon it for sensitive but unclassified communications foremerging FBI data systems.

The FBI has selected and tested a National Alert System(NAS) for another 21,000 law enforcement personnel on LEO.Unique from the current homeland security bulletins nowtransmitted via LEO, RISSNET, and the International Justiceand Public Safety Information Sharing Network (NLETS), ithas the capability to interrupt an ongoing LEO session withsounds and eye-catching visuals to call attention to the alertmessage. The system can cast its alert broadly, as it presentlyoccurs, or more narrowly to pertinent recipients. The alertlinks LEO recipients to more detailed information at secure,encrypted sites. Further, the system is not Internet-dependent. A message notifying that an alert has been sent

is also transmitted to secondary and tertiary devices, suchas pagers, telephones, and cell phones, as stipulated by theindividual LEO recipient. The individual LEO recipient canalso include such devices for ten additional law enforcementcolleagues. The FBI contemplates implementation of the NASin the near future.

The nationwide RISS and LEO interconnection employs fullencryption. Technologically, a VPN is initiated from currentdesktop and stand-alone Internet connections to achievesecure, encrypted connection and single sign-on accessprivileges to the connected systems. Privileges grantedseparately to members of each system can be exercised atthe same time whether through LEO or RISS; access privilegesgranted to RISS members can be exercised through the LEOconnectivity with RISS; access privileges granted by LEOcan be accessed through the RISS connectivity with LEO.The cost for use of these systems is minimal for RISS usersand free for LEO users; the cost of the existing and proposedexpanded sensitive but unclassified communicationscapability is markedly less than the creation of a new networkor system. This cost-effective approach could be furtheramplified by leveraging infrastructure investments of otherexisting sensitive but unclassified enterprises through theimplementation of industry standards-based interconnections.

In February 2002, the CDX, the interagency staff element ofthe Counterdrug Intelligence Coordination Group (CDICG), aninteragency intelligence sharing body comprised ofrepresentatives of eight Cabinet principals and the five headsof federal law enforcement with drug law enforcementmissions, proposed that “federal law enforcement agencies48

endorse, select, and take steps to join the FBI LEO systemas the primary sensitive but unclassified e-mail andcollaboration environment for federal law enforcement agenciesand for connectivity (through RISS) with local and state lawenforcement.” The U.S. Attorney General, the Deputy AttorneyGeneral, the FBI Director, the DOJ Chief Information Officer(CIO), and 13 federal law enforcement agencies endorsedthis sensitive but unclassified connectivity.49 The HomelandSecurity IT Investment Review Board of Agency CIOs and theDHS CIO also endorsed this connectivity plan.

Finally, the RISS and LEO systems are recommended asthe initial communications backbone for the National CriminalIntelligence Sharing Plan, given that no other system hasbeen identified that can provide local, state, tribal, and federalnationwide communication connectivity. In a recent HouseAppropriations Committee report regarding funding for RISS,

20 The Rationale: Recommendations for Implementation

48 The term federal law enforcement agencies, as used herein, connotes federal agencies with criminal law enforcement authorities, particularly those involved in drug law enforcement activities, and also includes, but isnot limited to, those involved in counterterrorism and homeland security activities. The definition here does not include the Offices of the Inspectors General.

49 The RISS/LEO interconnection for sensitive but unclassified information sharing is endorsed by the following: U.S. Drug Enforcement Administration; Federal Bureau of Investigation; U.S. Customs Service; ExecutiveOffice for United States Attorneys; Organized Crime Drug Enforcement Task Force Program, Criminal Division; U.S. Secret Service; U.S. Postal Inspection Service; U.S. Forest Service; U.S. Coast Guard; Bureau ofAlcohol, Tobacco, Firearms and Explosives; Internal Revenue Service; U.S. Marshals Service; U.S. Department of Commerce, Bureau of Industry and Security; National Drug Intelligence Center; El Paso IntelligenceCenter; Financial Crimes Enforcement Network; Intelligence Community Chief Information Officer; Deputy Chief Information Officer, Community Management Group, Central Intelligence Agency; High Intensity DrugTrafficking Areas Program Office; Office of National Drug Control Policy; and Defense Information Systems Agency, U.S. Department of Defense.

Page 34: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

the following was reported, “The Committee is pleased withthe Administration’s efforts to integrate RISS with the LEOprogram and with the proposed expansion of RISS AutomatedTrusted Information Exchange (ATIX) and the MATRIX Program.The Committee expects OJP to coordinate their efforts withother components of the U.S. Department of Justice and withthe U.S. Department of Homeland Security to ensure thatstate and local agencies have electronic access to crimeand terrorism information. The Committee remains concernedat the continuing proliferation of local, state, regional, andfederal information sharing initiatives that are being developedindependently, with no apparent plan to integrate them withother systems operated by federal law enforcement agenciesand with RISS and LEO. The Committee directs theDepartment to ensure that interstate information sharingsystems funded by OJP and the Office of Community OrientedPolicing Services utilize the existing communicationsinfrastructure and are compatible with RISS and LEO.”50

Additional congressional recognition of RISS and LEO wascited in a recent Senate Appropriation Committee report. “TheCommittee commends the ongoing collaboration betweenRISS and LEO, particularly with regard to the decision toprovide access to RISS ATIXTM resources to any user holdinga valid LEO account, regardless of whether the user alsoholds a RISS account. The Committee recognizes that therelationship between RISS and LEO is dynamic and evolving,and strongly supports further collaboration.”51

This recommendation proposes the utilization of the RISS/LEO sensitive but unclassified communications capability asproviding a network that supports nationwide sensitivebut unclassified communications. By definition, acommunications backbone denotes the flow ofcommunications bidirectionally. This Plan acknowledges theexistence of and allows for other network connections withinand between communities represented by agencies andprograms but strongly encourages that a fully functional pathbetween community sensitive but unclassified users andresources and the national sensitive but unclassifiedcommunications capability be provided. The phrase fullyfunctional denotes supporting enterprise-to-enterprise, user-to-application, and user-to-user/system-to-user messagingcapabilities and system resource access (databases,communities of interest, discussion groups, home pages, etc.)while maximizing the use of existing participant infrastructures;i.e., existing program/community authentication methods,governance and vetting processes, and networks. The intentis to have the nationwide sensitive but unclassifiedcommunications capability provide a highly flexible

architecture and baseline policy to rapidly facilitate informationsharing through the reuse of existing participant and programresources (hardware, software, and personnel).

The National Criminal Intelligence Sharing Plan promotes andencourages law enforcement agencies to join in the dataaccess and collaboration capabilities enabled by the proposednationwide sensitive but unclassified communicationsbackbone.

Recommendation 22: Interoperability with existingsystems at the local, state, tribal, regional, and federallevels with the RISS/LEO communications capabilityshould proceed immediately, in order to leverageinformation sharing systems and expand intelligencesharing.52

Discussion: The RISS/LEO interconnection is used forcommunicating investigative and intelligence data on all typesof crimes. However, the need for the exchange of informationextends beyond law enforcement and beyond RISS and LEO.Law enforcement agencies should expand sensitive butunclassified collaboration with the intelligence and diplomaticcommunities. Further, law enforcement agencies should, andcan, communicate and share information and intelligence ina sensitive but unclassified environment with first responders,public safety, and others engaged in the broad homelandsecurity mission.

To this end, the RISS/LEO interconnection is in the processof expanding with connections to the Intelligence CommunityOpen Source Information System (OSIS), the U.S. Departmentof State (DOS) OpenNet Plus network, and the DefenseInformation Systems Agency (DISA) Anti-Drug Network-Unclassifed (ADNET-U) system. Connectivity expansion isin process with NLETS for both RISS and LEO and is beingconsidered with the U.S. Department of Defense (DoD)Unclassified but Sensitive Internet Protocol Router Network(NIPRNET).

The FBI agreed with the Intelligence CIO and the IntelinkProgram Manager to connect their OSIS to the RISS/LEOinterconnection; that connection is planned for September2003. This will provide LEO and RISS users with access toOSIS commercial databases and OSIS users throughencrypted sensitive but unclassified e-mail. Further, theIntelligence Community contemplates establishing anInformation Manager resource on OSIS for law enforcementto make known its investigative interests to the IntelligenceCommunity, to examine its agencies’ classified holdings, andto return sensitive but unclassified tear-line53 information, as

The Rationale: Recommendations for Implementation 21

50 House Committee on Appropriations Report 108-221 (to accompany H.R. 2799), July 21, 2003.

51 FY2004 Senate Appropriations Committee Report 108-144.

52 The GIWG conducted a preliminary survey of systems/initiatives that are operational or being developed at the local, state, federal, and regional levels. Several systems/initiatives were identified. Refer to the companionCD for a list of the systems identified, as well as summary information obtained during the survey.

53 The definition of tear-line is a classified report that has information redacted from its content, primarily relating to the source of the data and method of collection.

Page 35: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

appropriate, to law enforcement inquirers through the sensitivebut unclassified connected systems or other means (e.g.,through federal agencies or the FBI JTTFs).

The OSIS system connected to the DOS OpenNet Plussensitive but unclassified system (43,000 users) in November2002. Planning is under way for the DOS Bureau of ConsularAffair’s Consolidated Consular (visa) Database to beaccessible for query by law enforcement.

DISA’s ADNET-U, a system of 5,000 local, state, tribal, andfederal law enforcement officials predominantly along theSouthwest Border, Canada, and Latin America, was certified,accredited, and connected to OSIS in April 2003. The OSIS/OpenNet/ADNET-U connection with RISS/LEO will enablepreviously unavailable collaboration among law enforcementand the intelligence community at the sensitive butunclassified level.

RISS has expanded its resources and implemented RISSATIX to provide access through RISSNET to additional groupsof users for secure interagency communication, informationsharing, and dissemination of terrorist threat information.Additional groups of users include public service, public safety,emergency management, utility, and other criticalinfrastructure personnel that have traditionally not been servedby RISS. RISS ATIX participants are assigned restrictedaccess to certain specific RISS services and resources, asappropriate, in consideration of their roles with regard toterrorism and disasters.

DHS, in conjunction with the RISS centers, has implementeda pilot project that has established a bulletin board and securee-mail capability for communications between DHS, local andstate law enforcement, and appropriate security personnel atnuclear power plants, using RISSNET. The initiative involvesidentification of selected critical infrastructure sites (initiallya set number of nuclear power facilities), establishing liaisonwith local and state law enforcement agencies within thejurisdictional areas surrounding the identified facilities,reporting of suspicious activities and incidents related to thesecurity of those facilities, and provision by DHS of analysisand feedback on those activities. The pilot project, initiatedin spring 2003, involves the states of Arizona, California,Connecticut, Florida, Massachusetts, Nebraska, andPennsylvania. The scope of the project and the nature of thecritical infrastructure being monitored are expected to expandas the initiative progresses.

There are other systems and valuable applications that arecurrently being used by the law enforcement community. Froma strategic perspective, these types of systems and initiativesshould become part of the nationwide sensitive but unclassifiedcommunications capability in order to expand collaborationand information sharing opportunities across existingenterprises.

One example is the Joint Regional Information ExchangeSystem (JRIES). JRIES was initiated as a pilot project bythe DoD Defense Intelligence Agency (DIA) to improve theexchange of counterterrorism information between local andstate law enforcement and components of DoD and DIA, soas to further engage law enforcement in military force andinfrastructure protection at domestic U.S. military facilities.The DIA-led Joint Intelligence Task Force-Combating Terrorism(JITF-CT) has access to classified and sensitive butunclassified data and provides analysis of these data forsharing, at the sensitive but unclassified level, with lawenforcement.

Initiated as a pilot project in December 2002 by JITF-CT withthe New York Police Department Counterterrorism Bureau(NYPD CTB) and the California Department of Justice Anti-Terrorism Information Center (CATIC), JRIES employscollaboration and data visualization software over a securenetwork. JRIES reached operational status in February 2003and now includes participation by many states, municipalities,and federal agencies, including DHS. JRIES connectivity withRISSNET was proposed but is not yet implemented, pendingresolution of security and architectural compatibilities.Connectivity was also proposed for JRIES using the proposedOSIS connection to RISS/LEO. This connectivity is also notyet adopted, pending resolution of the same issues. TheJRIES Executive Board is addressing these, as well as otherrelated program governance issues.

The JRIES program sponsorship and management is currentlybeing transferred to DHS.

With 85 percent of the nation’s critical infrastructure ownedand operated by the private sector, these facilities, theirsecurity personnel and systems, and the security personnelof the nation’s commercial sector offer important partners withwhom information and intelligence must be shared and withwhom the law enforcement and homeland securitycommunities must improve, and make routine, the means ofcollaboration. RISS ATIX, combined with JRIES capabilities,offers the most immediate and pervasive system to satisfythose important needs.

Recommendation 23: The CICC shall work withGlobal’s Systems Security Compatibility Task Force toidentify and specify an architectural approach andtransitional steps that allow for the use of existinginfrastructures (technology, governance structures, andtrust relationships) at the local, state, tribal, regional,and federal levels, to leverage the national sensitivebut unclassified communications capabilities forinformation sharing. This strategic architecturalapproach shall ensure interoperability among local,state, tribal, regional, and federal intelligenceinformation systems and repositories.

22 The Rationale: Recommendations for Implementation

Page 36: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Discussion: Any requirement to utilize the nationwidesensitive but unclassified communications backbone, initiallythe RISS/LEO communications capability, will allow for theuse of existing infrastructures without constraining the abilityof those wanting to participate in the most timely and cost-effective manner. The nationwide sensitive but unclassifiedarchitecture will evolve to include the necessary flexibility tosupport fully functional bidirectional information sharing, whileutilizing existing local, state, tribal, and regional infrastructure.

Recommendation 24: All agencies, organizations,and programs with a vested interest in sharing criminalintelligence should actively recruit agencies with local,state, tribal, regional, and federal law enforcement andintelligence systems to connect to the nationwidesensitive but unclassified communications capability.Such agencies, organizations, and programs areencouraged to leverage the nationwide sensitive butunclassified communications capability, therebyexpanding collaboration and information sharingopportunities across existing enterprises and leveragingexisting users. Moreover, participant standards and uservetting procedures must be compatible with those ofthe currently connected sensitive but unclassifiedsystems, so as to be trusted connections to thenationwide sensitive but unclassified communicationscapability.

Discussion: Currently connected sensitive but unclassifiedsystems must establish a common means of recognizingand accepting various access control and individualauthentication methods as acceptable methods of access tothe nationwide communications capability and the informationresources accessible on the network and various participatingsystems. Currently, existing connected sensitive butunclassified systems employ the certification andaccreditation processes to assess and establish the requisitetrust to connect another system to the LEO and OSISsystems. System administrators and security authoritiesshould define an “approved” set of network and system accesscontrol methods for joining systems to satisfy and meet theirsecurity, encryption, and connectivity needs so that they canrecognize and provide access throughout the nationwidecommunications capability as if a single access method hasbeen employed.

As the recommended initial communications backbone, theRISS/LEO interconnection is able to connect to severalunclassified systems throughout the United States. Forinstance, the Florida Department of Law Enforcement’s state

system and Iowa’s Law Enforcement Intelligence Network,commonly known as LEIN, are both connected as nodes toRISSNET.

In addition to Florida and Iowa, ten other state law enforcementnetworks are connected as nodes to RISSNET, includingCalifornia, Colorado, Missouri, New York, Oregon,Pennsylvania, South Dakota, Utah, Washington, andWyoming. Recently, the Commissioner of the MinnesotaDepartment of Public Safety agreed to examine connectingthe state and local law enforcement component of the CriMNetnetwork (see footnote 47b) as a node on RISSNET.Additionally, RISSNET node connections are pending for thefollowing states: Arizona, Connecticut, Delaware, Georgia,Hawaii, Michigan, Nebraska, Ohio, and Tennessee.

In a variation on that theme, the CISA Network (CISAnet),54

serving state and local law enforcement organizations in sixstates (Arizona, California, Georgia, Idaho, New Mexico, andTexas), is connected through a trusted gateway to the sixRISS centers and the DEA’s El Paso Intelligence Center(EPIC) in Texas. This is a system-to-system connection thatestablished fully operational capabilities in late 1996 basedon trust relationships and honest broker agreements thatprovide real-time bidirectional query access to data and doesnot require that CISAnet employ the RISSNET authenticationand encryption software and hardware.

Similarly to that approach, the Justice Consolidated OfficeNetwork of DOJ employs the RISSGate VPN software, butnot the RISSNET smart card and companion card-readerhardware, to authenticate and encrypt Internet sessionsinitiated to RISS and LEO. The 94 U.S. Attorneys’ Officesare connecting to RISSNET.

A recently developed project, supported by DOJ and DHSfunding, will rely on the existing RISSNET communicationsnetwork. The MATRIX pilot project was initiated in responseto the increased need for timely information sharing andexchange of terrorism-related information among membersof the law enforcement community. The MATRIX pilot projectincludes three primary objectives: using factual data analysisfrom existing data sources and data integration technologyto improve the usefulness of information contained in multipletypes of document storage systems, providing a mechanismfor states to become nodes on RISSNET for electronicexchange among participating agencies, and encouraging theexchange of information via secure state Web sites. Severalstates55 are participating in the pilot project, and it is hopedthat the project will be expanded nationwide once the conceptis further documented.

The Rationale: Recommendations for Implementation 23

54 The Criminal Information Sharing Alliance Network (CISAnet) is the former Southwest Border States Anti-Drug Information System (SWBSADIS) begun in 1992 when the initiating states requested support from the federalgovernment to share law enforcement information. It received funding from the U.S. Department of Defense (DoD); Defense Information Systems Agency (DISA); and the U.S. Department of Justice (DOJ), National Instituteof Justice, the DOJ’s research and development office. CISAnet is now funded by the Congress through DOJ, Bureau of Justice Assistance, and DoD and administered by DISA.

55 The states participating in the MATRIX pilot are Connecticut, Florida, Georgia, Michigan, New York, Ohio, Pennsylvania, and Utah.

Page 37: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Recommendation 25: Agencies participating inthe National Criminal Intelligence Sharing Plan areencouraged to use Applying Security Practices to JusticeInformation Sharing56 as a reference document regardinginformation system security practices. The documentwas developed by the Global Security Working Group(GSWG) to be used by justice executives and managersas a resource to secure their justice information systemsand as a resource of ideas and best practices to considerwhen building their agency’s information infrastructureand before sharing information with other agencies.

Discussion: Modern justice agencies rely heavily upon theirIT resources to perform critical tasks and to provide emergencyservices to the public. Increasingly, justice agencies shareinformation across wide-area networks and the Internet. Thesensitivity of this information and its related systemsinfrastructure make it a particularly vulnerable target. Becauseof its importance, sharing itself requires a technologicalenvironment, intended and trusted to keep information safefrom unauthorized exposure.

LEO, RISS, OSIS, OpenNet, and ADNET-U systems havedefined security practices and accreditation and certificationcriteria for participation in their systems. Likewise, local andstate sensitive but unclassified systems have securitystandards for employing Internet and intranet connectivity.

In May 2002, the GSWG recognized the increased emphasison security practices to ensure trusted information sharingand has since developed the document Applying SecurityPractices to Justice Information Sharing. In July 2003, theGSWG formed a Systems Security Compatibility Task Force,comprised of local, state, tribal, and federal representatives.The group’s mission is to establish security priorities, policies,and guidelines to achieve system-wide compatibility for justiceand public safety information sharing without compromisingsecurity.

Recommendation 26: Agencies are encouragedto utilize the latest version of the Global JusticeExtensible Markup Language (XML) Data Model (GlobalJXDM) and its component Global Justice XML DataDictionary (Global JXDD)57 when connecting databasesand other resources to communication networks. TheGlobal JXDM and Global JXDD were developed toenable interoperability through the exchange of dataacross a broad range of disparate information systems.

Discussion: Extensible Markup Language, or “XML” as it iscommonly referenced, was developed out of the standardgeneralized markup language (a page definition and formatting

language). XML is sanctioned by the World Wide WebConsortium (www.W3.org) to define a way of transmitting andrepresenting data. XML is designed to transmit data and themeaning of the data. This is accomplished by allowing data“tags” to define both the name of a data element and theformat of the data within that element. XML also allowsstructured relationships to be defined; for example, one namedperson (subject) in the database might have multiple streetaddresses and multiple criminal associates, all of which XMLis capable of recognizing, revealing, and communicating as“relationships.”

XML is easily transmitted as text over the current Internetinfrastructure. It is compatible with major Internet transmissionprotocols and is also highly compressible for fastertransmission. Major database vendors and their databaseapplications provide software development “tools” to assistjustice agency technical staff to develop and use XML moreefficiently and productively within agency applications. XMLis very developer-friendly, yet ordinary users with no particularXML expertise can make sense of an XML file. The XMLstandard is designed to be independent of vendor, operatingsystem, source application, destination application, storagemedium, and/or transport protocol.

In August 2002, the Global Infrastructure/Standards WorkingGroup, XML Committee formed the Global XML Structure TaskForce (GXSTF) to identify data requirements, explore XMLconcepts, and apply XML best practices to design andimplement a Global JXDD. The GXSTF is composed ofgovernment and industry domain experts (from lawenforcement, courts, and corrections), technical managers,and engineers. The Global JXDD is an object-oriented datamodel, database, and XML-schema specification thatrepresents the semantics and structure of common dataelements and types required to consistently exchangeinformation within the justice and public safety communities.The GXSTF is developing technical compliance criteria tofacilitate interoperability of the Global JXDD. These criteriacan be referenced in requests for proposals and grantconditions in order to support consistent and interoperableimplementations.

Recommendation 27: In order to enhance trustand “raise the bar” on the background investigationscurrently performed, law enforcement agencies mustconduct fingerprint-based background checks onindividuals, both sworn or nonsworn, prior to allowinglaw enforcement access to the sensitive but unclassifiedcommunications capability. Background requirementsfor access to the nationwide sensitive but unclassified

24 The Rationale: Recommendations for Implementation

56 This document is available at: http://www.it.ojp.gov/global/.

57 The latest version of the Global JXDM and the Global JXDD is included on the companion CD and can be found at: http://www.it.ojp.gov/jxdm.

Page 38: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

communications capability by law enforcementpersonnel shall be consistent with requirements appliedto the designation and employment of sworn personnel,as set by the participating state or tribal government,so long as, at a minimum, those requirements stipulatethat a criminal history check be made through the FBIand the appropriate local, state, and tribal criminalhistory repositories and be confirmed by an applicantfingerprint card. Additionally, a name-based recordscheck must be performed on law enforcement personnelevery three years after the initial fingerprint-basedrecords check is performed.

Discussion: Issues of trust continue to undermine informationsharing efforts between all levels of law enforcement.Information security is primarily a factor of the individuals whohave access to the information. The trust relationship neededfor criminal intelligence sharing is founded, in part, on theintegrity of the individuals with whom information is shared.That integrity can be assessed, in part, through stringentmembership vetting procedures of both the individuals involvedand their parent agencies. To promote use of the nationwidecommunications capability and the sharing of criminalinformation and intelligence in a meaningful level of detail andcompleteness, a greater level of stringency membership criteriais recommended for individuals desiring access to the sensitivebut unclassified communications capability for lawenforcement purposes.

The background name check recommended for access tothe sensitive but unclassified communications capability doesnot include or require a field investigation component, as isrequired for law enforcement employment in many jurisdictionsand at the federal level, for national security clearances andfor law enforcement employment suitability determinations,such as that for public trust (high-risk) positions. Therecommendation for a fingerprint-based records check, followedby a name check every three years thereafter, is the minimumstandard suggested; more stringent background criteriaimposed by agencies are not discouraged.

Recommendation 28: The CICC, in conjunctionwith OJP and the connected sensitive but unclassifiedsystems, shall develop an acquisition mechanism orcentralized site that will enable law enforcementagencies to access shared data visualization and analytictools. The CICC shall identify analytical products thatare recommended for use by law enforcement agenciesin order to maximize resources when performingintelligence functions, as well as a resource list of currentusers of the products. The CICC will submit a report onthese tools to OJP by June 30, 2004.

Discussion: Participants in the IACP Criminal IntelligenceSharing Summit stressed that law enforcement officers’training and continuing education must equip relevant personnelto use new technologies that complement or facilitateintelligence sharing. Mechanisms must be developed thatenable local law enforcement agencies, including those withlimited resources, to participate in intelligence developmentand sharing and to practice intelligence-led policing.

Consideration should be given to generically identifying thetypes of products available (in lieu of identifying the vendor).A current list of product users should be recommended asresources for those agencies that are in the market foranalytical tools. Categories of analytical tools will be identified(open source, data mining, crime information, trend analysis,visualization and collaboration methods, link analysis,Geographic Information Systems mapping, etc.) and astandard “tool set” of these products will be recommended toutilize as a resource for sharing tools among groups of users.A listing of the various available products, as well as a list ofusers, can be disseminated using various mechanisms,including Web sites, publications, and training sessions.

The Rationale: Recommendations for Implementation 25

Page 39: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Page 40: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Appendix A: Glossary

Administrative Analysis – The provision of economic,geographic, or social information to administrators. (Gottlieb,Singh, and Arenberg, 1995, p. 13)

Analysis (law enforcement) – The review of informationand its comparison to other information to determine themeaning of the data in reference to a criminal investigation orassessment. (Peterson, 1994, p. 269)

Collation – The process whereby information is stored andcross-referenced so that it can be retrieved easily.(INTERPOL, 1996, p. 10)

Collection – The directed, focused gathering of informationfrom all available sources. (INTERPOL, 1996, p. 9)

Collection Plan – The preliminary step toward completing astrategic assessment which shows what needs to becollected, how it is going to be collected, and by what date.(Peterson, 1994, p. 36)

Confidential – Information obtained through intelligence unitchannels that is not classified as sensitive and is for lawenforcement use only.

Counterintelligence – Information compiled, analyzed, and/or disseminated in an effort to investigate espionage, sedition,subversion, etc., that is related to national security concerns.

Crime Analysis – A set of systematic, analytical processesdirected at providing timely and pertinent information relativeto crime patterns and trend correlations to assist operationaland administrative personnel in planning in the deployment ofresources for the prevention and suppression of criminalactivities, aiding the investigative process, and increasingapprehensions and the clearances of cases. (Gottlieb, Singh,and Arenberg, 1995, p. 13)

Crime Pattern Analysis – Examining the nature, extent,and development of crime in a geographical area and within acertain period of time. (Europol, 2000, insert 3)

Appendix A: Glossary 27

Criminal Analysis – The application of analytical methodsand products to data within the criminal justice field.(Peterson, 1994, p. 2)

Criminal Intelligence – Information compiled, analyzed,and/or disseminated in an effort to anticipate, prevent, ormonitor criminal activity.

Criminal Investigative Analysis – The use of componentsof a crime and/or the physical and psychological attributes ofa criminal to ascertain the identity of the criminal. (Peterson,1994, p. 42)

Data Element – A field within a database that describes ordefines a specific characteristic or attribute.

Data Owner – Agency or analyst that originally entersinformation or intelligence into a system.

Descriptive Analysis – Data and information systematicallyorganized, analyzed, and presented. (Europol, 2000, insert 3)

Dissemination – The release of information, usually undercertain protocols. (Peterson, 1994, p. 271)

Evaluation – An assessment of the reliability of the sourceand accuracy of the raw data. (Morris and Frost, 1983, p. 4)

Explanatory Analysis – Analysis that attempts to understandthe causes of criminality. It often includes the study of alarge amount of variables and an understanding of how theyare related to each other. (Europol, 2000, insert 3)

Feedback/Reevaluation – Reviews the operation of theintelligence process and the value of the output to theconsumer. (Harris, 1976, p. 133)

Forecasting – The process which predicts the future on thebasis of past trends, current trends, and/or future speculation.(Peterson, 1994, p. 46)

Page 41: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

28 Appendix A: Glossary

Indicator – Detectable actions and publicly availableinformation revealing critical information. (Krizan, 1999,p. 63)

Inference Development – Drawing conclusions based onfacts. (Peterson, 1994, p. 48)

Information Classification – Protects sources,investigations, and the individual’s right to privacy and includeslevels: sensitive, confidential, restricted, and unclassified.(LEIU File Guidelines, as printed in Intelligence 2000: Revisingthe Basic Elements, 2001, p. 206.)

Intelligence – The product of systematic gathering,evaluation, and synthesis of raw data on individuals or activitiessuspected of being, or known to be, criminal in nature.(Quoted in IACP, 1985, p. 5, from National Advisory Committeeon Criminal Justice Standards and Goals, Organized Crime,1976, p. 122) Intelligence is information that has beenanalyzed to determine its meaning and relevance. Informationis compiled, analyzed, and/or disseminated in an effort toanticipate, prevent, or monitor criminal activity. (IACP NationalLaw Enforcement Policy Center, 1998)

Intelligence Cycle – Planning and direction, collection,processing and collating, analysis and production,dissemination. (Morehouse, 2001, p. 8)

Intelligence Files – Stored information on the activities andassociations of individuals, organizations, businesses, andgroups who are suspected of being or having been involved inthe actual or attempted planning, organizing, financing, orcommission of criminal acts; or are suspected of being orhaving been involved in criminal activities with known orsuspected crime figures. (LEIU Guidelines, in Peterson,Morehouse, and Wright, 2001, p. 202)

Intelligence-led Policing – The collection and analysis ofinformation to produce an intelligence end product designedto inform police decision making at both the tactical andstrategic levels. (Smith, 1997, p. 1)

Investigative Information – Information obtained from avariety of sources—public, governmental, confidential, etc.The information may be utilized to further an investigation orcould be derived from an investigation.

Need to Know – Indicates that an individual requestingaccess to criminal intelligence data has the need to obtainthe data in order to execute official responsibilities.

Network – A structure or system of connecting componentsdesigned to function in a specific way.

Operational Analysis – Identifying the salient features suchas groups of or individual criminals, relevant premises, contactpoints, and methods of communication. (Europol, 2000,insert 3)

Operational Intelligence – Intelligence that detailspatterns, modus operandi, and vulnerabilities of criminalorganizations but is not tactical in nature. (Morris and Frost,1983, p. vi)

Operations Analysis – The analytic study of police servicedelivery problems, undertaken to provide commanders andpolice managers with a scientific basis for a decision or actionto improve operations or deployment of resources. (Gottlieb,Singh, and Arenberg, 1995, p. 34)

Pointer Index – A listing within a database containingparticular items that serve to guide, point out, or otherwiseprovide a reference to more detailed information.

Predicate – The basis for the initiation of any inquiry orinvestigation.

Predictive Analysis – Using either descriptive or explanatoryanalytical results to reduce uncertainties and make an“educated guess.” (Europol, 2000, insert 3)

Preventive Intelligence – Product of proactive intelligence.(Morris and Frost, 1983, p. 6)

Privacy – An individual’s interests in preventing theinappropriate collection, use, and release of personallyidentifiable information. Privacy interests include privacy ofpersonal behavior, privacy of personal communications, andprivacy of personal data.

Proactive – Obtaining data regarding criminal conspiraciesin order to anticipate problems and forestall the commissionof crimes. (Morris and Frost, 1983, p. 6)

Problem Profile – Identifies established and emerging crimeor incident series. (NCIS, 2001, p. 18)

Procedural Guidelines – Every criminal justice agencyshould establish procedural guidelines designed to provide abasic and general description for the collection of intelligencedata. The guidelines should take into consideration the rightsof privacy and any other constitutional guarantees. (IACP,1985, p. 6)

Reasonable Suspicion – When information exists thatestablishes sufficient fact to give a trained law enforcementemployee a basis to believe that there is a reasonablepossibility that an individual or organization is involved in adefinable criminal activity or enterprise. (Criminal IntelligenceSystem Operating Policies, as printed in Peterson,Morehouse, and Wright, 2001, p. 212)

Recommendations – Suggestions for action to be taken bylaw enforcement management as a result of an analysis.(Peterson, 1994, p. 275)

Page 42: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Requirements – Validated and prioritized statements ofconsumers’ needs for intelligence information. (Morris andFrost, 1983, p. vi)

Restricted Data – Reports that at an earlier date wereclassified sensitive or confidential with the need for high-levelsecurity no longer existing.

Right to Know – An individual requesting access to criminalintelligence data has the right to access due to legal authorityto obtain the information pursuant to a court order, statute, ordecisional law.

Risk Assessment – A report aimed at identifying andexamining vulnerable areas of the society that are, or couldbe, exploited. (Europol, 2000, insert 3) (Also see VulnerabilityAssessment.)

Secret – Applied to information of which the unauthorizeddisclosure could reasonably be expected to cause seriousdamage to national security.

Security – A series of procedures and measures which, whencombined, provide protection of people from harm, informationfrom improper disclosure or alteration, and assets from theftor damage. (Criminal Justice Commission, 1995, as reprintedin Intelligence 2000: Revising the Basic Elements, p. 159)

Sensitive Data – Information pertaining to significant lawenforcement cases currently under investigation and criminalintelligence reports that require strict dissemination andrelease criteria.

Situation Report – A mainly descriptive report that is orientedonly towards the current crime situation. (Europol, 2000,insert 3)

Strategic Assessment – A long-term, high-level look at thelaw enforcement issues that not only considers currentactivities but also tries to provide a forecast of likelydevelopments. (NCIS, 2001, p. 17)

Strategic Intelligence – Most often related to the structureand movement of organized criminal elements, patterns ofcriminal activity, activities of criminal elements, projectingcriminal trends, or projective planning. (IACP, 1985, p. 6,quoting National Advisory Committee, 1976, p. 122)

System – A group of databases that interact and form a wholestructure.

Tactical Assessment – Ability to identify emerging patternsand trends requiring attention, including further analysis.(NCIS, 2000, p. 17)

Tactical Intelligence – Information regarding a specificcriminal event that can be used immediately by operationalunits to further a criminal investigation, plan tactical operations,

and provide for officer safety. (IACP, 1998, as reprinted inPeterson, Morehouse, and Wright, 2001, p. 218)

Target Profile – A profile that is person-specific and containssufficient detail to initiate a target operation or support anongoing operation against an individual or networked group ofindividuals. (NCIS, 2001, p. 18)

Tear-Line Report – A classified report that has informationredacted from its content, primarily relating to the source ofthe data and method of collection.

Threat Assessment – A strategic document that looks at agroup’s propensity for violence or criminality or the possibleoccurrence of a criminal activity in a certain time or place.(Peterson, 1994, pp. 56-57)

Top Secret – Applied to information of which the unauthorizeddisclosure could reasonably be expected to causeexceptionally grave damage to the national security.

Unclassified Data – Civic-related information to which, in itsoriginal form, the general public had direct access (i.e., birthand death certificates). This would also include newspaper,magazine, and periodical clippings.

Vet – To subject to an expert appraisal or examine andevaluate for correctness.

Vulnerability Assessment – A strategic document thatviews the weaknesses in a system that might be exploitedby a criminal endeavor.

Warning – A tactical warning is a very short-term warningthat attack is either under way or so imminent that the forcesare in motion or cannot be called back. A strategic warningis any type of warning or judgment issued early enough topermit decision makers to undertake countermeasures;ideally, such warning may enable (them) to take measures toforestall the threat altogether. (Grabo, 1987, p. 6)

Appendix A: Glossary 29

Page 43: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Page 44: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Appendix B: Acronyms

ADNET-U Anti-Drug Network-Unclassified

AES Advanced Encryption Standard

ARJIS Automated Regional Justice Information System

ATIX Automated Trusted Information Exchange

BJA Bureau of Justice Assistance

CATIC California Anti-Terrorism Information Center

CDICG Counterdrug Intelligence Coordination Group

CDX Counterdrug Intelligence Executive Secretariat

CFR Code of Federal Regulations

CICC Criminal Intelligence Coordinating Council

CIO Chief Information Officer

CISAnet Criminal Information Sharing Alliance Network

CJIS Criminal Justice Information Services

CLEAR Chicago Citizen and Law Enforcement Analysisand Reporting

COP Community Oriented Policing

DEA U.S. Drug Enforcement Administration

DES Triple-Data Encryption Standard

DHS U.S. Department of Homeland Security

DIA Defense Intelligence Agency

DISA Defense Information Systems Agency

DoD U.S. Department of Defense

DOJ U.S. Department of Justice

DOS U.S. Department of State

Appendix B: Acronymns 31

FBI Federal Bureau of Investigation

FOUO “For Official Use Only” information handling caveat

GAC Global Justice Information Sharing InitiativeAdvisory Committee

GISWG Global Justice Information Sharing InitiativeInfrastructure/Standards Working Group

GIWG Global Justice Information Sharing InitiativeIntelligence Working Group

Global Global Justice Information Sharing Initiative

GSWG Global Justice Information Sharing InitiativeSecurity Working Group

HIDTA High Intensity Drug Trafficking Areas

IACP International Association of Chiefs of Police

IADLEST International Association of Directors of LawEnforcement Standards and Training

IAFIS Integrated Automated Fingerprint IdentificationSystem

IALEIA International Association of Law EnforcementIntelligence Analysts

III Interstate Identification Index

ISI Gateway Information Sharing Initiative

IT Information Technology

JCON Justice Consolidated Office Network

JITF-CT Joint Intelligence Task Force-Combating Terrorism

JRIES Joint Regional Information Exchange System

LEADS Law Enforcement Agency Data System

Page 45: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

LEIN Law Enforcement Intelligence Network

LEIU Law Enforcement Intelligence Unit

LEO Law Enforcement Online

LES “Law Enforcement Sensitive” information handlingcaveat

MATRIX Multistate Anti-Terrorism Information Exchange

NAS National Alert System

NCIC National Crime Information Center

NDIC National Drug Intelligence Center

NDPIX National Drug Pointer Index

NICS National Instant Criminal Background CheckSystem

NIPRNET Unclassified but Sensitive Internet Protocol RouterNetwork

NIST National Institute of Standards and Technology

NLETS International Justice and Public Safety InformationSharing Network

NSA National Sheriffs’ Association

32 Appendix B: Acronymns

NW3C National White Collar Crime Center

NYPD CTB New York Police Department CounterterrorismBureau

OJP Office of Justice Programs

OSIS Open Source Information System

RISS Regional Information Sharing Systems

RISSNET Regional Information Sharing Systems secureintranet

SIG Special-Interest Groups

SPPADS State and Provincial Police Academy DirectorsSection

SWBSADIS Southwest Border States Anti-Drug InformationSystem

UCR Uniform Crime Reporting

VPN Virtual Private Network

W3 World Wide Web Consortium

XML Extensible Markup Language

Page 46: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Appendix C: Sources

Appendix C: Sources 33

Krizan, Lisa, Intelligence Essentials for Everyone. JointMilitary Intelligence College, 1999.

LaFave, Wayne, Arrest. 1965.

McDowell, Donald, Strategic Intelligence. Istana Enterprises,1998.

Morris, Jack, and Charles Frost, Police Intelligence Reports.Palmer Press, 1983.

National Criminal Intelligence Service UK, The NationalIntelligence Model. 2001.

National Criminal Justice Association, Justice InformationPrivacy Guideline: Developing, Drafting, and AssessingPrivacy Policy for Justice Information Systems. 2002.

Peterson, Marilyn B., Applications in Criminal Analysis.Greenwood Press, 1994.

Peterson, Marilyn B., Bob Morehouse, and Richard Wright(Eds.), Intelligence 2000: Revising the Basic Elements. LEIUand IALEIA, 2001.

Prunckun, Henry W., Jr., Special Access Required.Scarecrow Press, 1990.

Smith, Angus (Ed.), Intelligence-Led Policing. IALEIA, 1997.

Warren, Samuel, and Louis Brandeis, “The Right to Privacy,”Harvard Law Review. 1890.

Bureau of Justice Assistance, Criminal Intelligence SystemOperating Policies (28 Code of Federal Regulations Part 23.20).1993.

California Department of Justice, The Bureau of IntelligenceOperations Manual. 1993.

California Peace Officers’ Association, Criminal IntelligenceProgram for the Smaller Agency. 1988.

Davis, Kenneth Culp, Discretionary Justice: A PreliminaryInquiry. 1971.

Europol, Analytical Guidelines. 2000.

Goldstein, Herman, “Controlling and Reviewing Police-CitizenContacts,” Policing a Free Society. 1977.

Gottlieb, Steven, Raj Singh, and Shel Arenberg, CrimeAnalysis: From First Report to Final Arrest. Alpha Publishing,1995.

Grabo, Cynthia M., Warning Intelligence. Association ofFormer Intelligence Officers, 1987.

Harris, Don R., and E. Drexel Godfrey, The Basic Elementsof Intelligence. Law Enforcement Assistance Administration,1971.

Harris, Don R., et al., The Basic Elements of Intelligence,2nd edition. Law Enforcement Assistance Administration,1976.

International Association of Chiefs of Police, National LawEnforcement Policy Center. Criminal Intelligence. 1998.

, Law Enforcement Policy on theManagement of Criminal Intelligence. 1985.

INTERPOL, Crime Analysis Booklet. International CriminalPolice Organization Crime Analysis Working Group, 1996.

Page 47: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Page 48: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

Appendix DCore Criminal Intelligence TrainingStandards for United States LawEnforcement and Other CriminalJustice Agencies

BackgroundThe International Association of Chiefs of Police (IACP) andthe Community Oriented Policing Services (COPS) “Summiton Criminal Information Sharing: Overcoming Barriers toEnhance Domestic Security” underscored the need toestablish standards for intelligence training.

The IACP Criminal Intelligence Sharing Report: A NationalPlan for Intelligence-Led Policing at the Local, State andFederal Level included the recommendation to “promoteintelligence-led policing through a common understanding ofcriminal intelligence and its usefulness.”

The IACP “Core Recommendations to Achieving the Plan”identified several intelligence-training issues:

♦ Training should provide recipients with the skills to providetargeted, evaluative summary data to decision makers.

♦ Appropriate training must be provided to both current andentering law enforcement personnel on information sharingsystems and criminal intelligence concepts.

♦ Training should promote building trust for intelligence sharingand maintaining civil rights/constitutional protections.

♦ Training should emphasize that all personnel, regardlessof their job, have a role in intelligence and sharing information.

♦ Training should equip personnel to use new technologies.

Standards for training in intelligence functions are critical toimplementing a national model for intelligence-led policing.National intelligence training standards can provide criminal

justice agencies, individually and collectively, with theframework for achieving that end.

The goal of the training is to professionalize and enhance thepractice of criminal intelligence within the United States lawenforcement/criminal justice community, demonstrate thebenefits derived from the intelligence, and encourageinformation sharing in support of the intelligence.

Purpose of StandardsThe purpose of these standards is to establish core concepts,principles, and practices within the law enforcement criminalintelligence function. This, in turn, will promote the sharing ofinformation and increase cooperation among law enforcementto better protect the public from criminal enterprises andthreats.

ScopeThe Global Justice Information Sharing Initiative (Global)Intelligence Working Group (GIWG) Training Committeeadopted the IACP Summit participants’ trainingrecommendations that all levels of law enforcement need tobe trained in intelligence. Otherwise, intelligence couldbecome solely the focus of a small unit within the department,rather than being part of the core mission in which all levels ofthe department are involved.

The GIWG Training Committee focused on developing a train-the-trainer component and establishing standards for policeexecutives, managers of criminal intelligence/investigative

Appendix D: Core Criminal Intelligence Training Standards 35

Page 49: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

functions, general law enforcement officers, intelligenceofficers, and intelligence analysts. The Committee’s first goalwas to identify specific training topics and issues for eachlevel of personnel involved in the intelligence process. Theirsecond goal was to make specific recommendations fortraining objectives and the delivery of training. Their thirdgoal is to work with relevant agencies and groups to developmodel curricula.

The GIWG Training Committee discussed and reviewed keylaw enforcement criminal intelligence organizations’ methodsand best practices. The intelligence training standardsdeveloped by the Committee were based upon core concepts,subjects, and essential functions of the law enforcementcriminal intelligence process.

Approximately 19 intelligence training curricula, representinginternational, national, state, and local-level programs, werereviewed. The programs contained a variety of subjects andapproaches to instructing/learning methods. The number ofprograms narrowed drastically when looking for differingprograms that are noncommercial-based and associated withreputable and knowledgeable organizations. During theresearch phase, the Committee noted the lack of national-level training standards and an absence of any single nationalagency coordinating intelligence training.

Local, state, and federal governmental agencies as well asprivate/nonprofit professional associations provide intelligencetraining. There is no one source or set of comprehensivecurricula that meets the goals of the GIWG TrainingCommittee. Their effort, then, was to draw from the variedsources of training, identify training that needed to bedeveloped, and compile it into a cohesive training package.

Global Intelligence Working GroupIntelligence Training Standards

Policy StatementLaw enforcement and other criminal justice agencies engagedin the planning, collection, collation, analysis, anddissemination of information and criminal intelligence shallmeet criminal intelligence training standards to ensureprofessional conduct and the capability to achieve a commonunderstanding of intelligence-led policing. Complying withthe intelligence training standards requires:

♦ Training all levels of personnel involved in the sharing ofinformation and intelligence management and operationalprocess.

♦ Promoting the understanding and learning of core principles,concepts, and practices in intelligence-led policingoperations and the management of the intelligence function.

♦ Making intelligence training mandatory for those involvedin the national criminal intelligence sharing system.

These standards shall be considered national intelligencetraining standards, created to serve as a blueprint fordeveloping core knowledge necessary to achieve anintelligence-led policing capability within every law enforcementagency. The intelligence training policy standards representthe minimum training objectives for agencies performingintelligence functions.

It is important to note that the Training Committee recognizesthe difficulties associated with the implementation andsubsequent delivery of a suggested training for local and statelaw enforcement officers.

It is imperative that all Peace Officer Standards and Training(POST) Commissions of this nation become partners in thetraining proposals. The POST commissions should act asliaisons to ensure intelligence training is mandated anddelivered to all law enforcement personnel.

Once implemented, the criminal intelligence curriculum shouldbe evaluated in order to determine its effectiveness.

36 Appendix D: Core Criminal Intelligence Training Standards

Page 50: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

LawEnforcementOfficers

RoleThe role of law enforcement officers, relative to intelligence,is to be cognizant that they play a crucial part in reducingcrime by collecting information that may reflect or indicatecriminal activity. Law enforcement officers are the largestand most viable information collection resource available withinthe law enforcement community.

MissionThe intelligence mission of each law enforcement officer is tosupport the agency’s criminal intelligence function bycollecting and reporting indications of criminal activity andsuspicious individuals.

Core Training ObjectivesI. Law enforcement officers will understand the criminal

intelligence process and its ability to enhance theircontributions to the criminal justice system.

II. Law enforcement officers will be provided with informationon available data systems, networks, and resources.

III. Law enforcement officers will be able to identify key signsof criminal activity and procedures for collecting data onand reporting such activity.

IV. Law enforcement officers will gain an understanding ofthe legal, privacy, and ethical limitations placed on thecollection of criminal intelligence information.

Training Length and DeliveryThe two-hour training for law enforcement officers should bepresented in an academy classroom environment (basictraining or in-service), during roll calls, or through videoteleconference (e.g., California and Arizona Peace OfficerStandards Training Board) format. Training materials shouldbe developed and provided to state-level training standardsboards for inclusion into basic training curricula.

LawEnforcementExecutives

RoleThe role of the chief executive is to ensure the intelligencefunction is management-directed and complies with every lawand regulation governing collection, storage, anddissemination/use of criminal information and intelligence. Thechief executive shall also establish an intelligence-led policingenvironment that promotes the sharing of information anddevelopment of criminal intelligence.

MissionThe intelligence mission of the chief executive is to ensurethe administration, monitoring, and control of the organization’scriminal intelligence function is effective and ethical.Establishing the proper environment allows the intelligenceprocess to produce timely, relevant, and actionable criminalintelligence that supports the mission of the organization.

Core Training ObjectivesI. Executives will understand the criminal intelligence

process and its role played in enhancing public safety.II. Executives will understand the philosophy of intelligence-

led policing and their own role in the National CriminalIntelligence Sharing Plan.

III. Executives will understand the legal, privacy, and ethicalissues relating to criminal intelligence.

IV. Executives will be provided with information on existingcriminal information sharing networks and resourcesavailable in support of their agencies.

Training Length and DeliveryTraining is four hours and should be delivered in a classroom-style or conference environment whenever possible. Trainingshould be delivered by other law enforcement executives orexecutives in combination with intelligence professionals.

Appendix D: Core Criminal Intelligence Training Standards 37

LevelTwo

LevelOne

Page 51: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

IntelligenceCommanders/Supervisors

RoleThe role of the intelligence commander/supervisor is to ensurethe daily intelligence function operates in accord with theagency’s policies and intelligence collection requirements.The commander/supervisor role also involves managing theaccountability for the functioning of the intelligence process,ensuring the intelligence structure of the organization isorganized and staffed with properly trained and skilledpersonnel, and ensuring there are adequate resources forproducing intelligence/knowledge products.

MissionThe mission of the intelligence commander/supervisor is tomanage and direct the agency’s criminal intelligenceprograms. Through establishing the proper environment, thecommander/supervisor may ensure that the intelligencefunction produces timely, relevant, and actionable criminalintelligence that supports the mission of the organization.

Core Training ObjectivesI. Managers will understand the criminal intelligence

process, intelligence-led policing, and their roles inenhancing public safety.

II. Managers will be provided with information on training,evaluating, and assessing an effective criminal intelligencefunction.

III. Managers will understand the unique issues of a criminalintelligence unit, including personnel selection, ethics,developing policies and procedures, and promotingintelligence products.

IV. Managers will understand the principles and practices ofhandling sensitive information, informant policies, andcorruption prevention and recognition.

V. Managers will understand the legal and privacy issuessurrounding the criminal intelligence environment.

VI. Managers will understand the processes necessary toproduce tactical and strategic intelligence products.

VII. Managers will be provided with information on criminalinformation sharing systems, networks, and resourcesavailable to their agencies.

VIII. Managers will understand the development process andimplementation of collection plans.

Training Length and DeliveryThe intelligence commanders/supervisors training is 24 hoursand should be delivered in a classroom environment. Regionalor statewide training of intelligence commanders wouldprobably be the best approach.

IntelligenceOfficers/Collectors

RoleThe intelligence officer’s role is to collect, evaluate, andcompile information in support of specific agency collectionrequirements or operations. The role of intelligence officersfrequently extends beyond their agencies and requires themto create external information networks and to support otheragencies’ information and intelligence requests.

The intelligence officer’s role also involves evaluating bothsource and information, preparing written reports andassessments, giving briefings, determining the need-to-know/right-to-know about specific activities, and protecting citizens’rights to privacy.

MissionThe mission of the intelligence officer is to support the agency’scriminal intelligence requirements/assessments though thecollection and handling of information, using properinvestigative and intelligence gathering practices.

Core Training ObjectivesI. Intelligence officers will understand the criminal

intelligence process and their critical role in the process.II. Intelligence officers will understand the legal, ethical, and

privacy issues surrounding criminal intelligence and theirliability as intelligence information collectors.

III. Intelligence officers will be provided with information onInternet resources, information sharing systems,networks, and other sources of information.

IV. Intelligence officers will gain an understanding of the properhandling of criminal intelligence information, including filemanagement and information evaluation.

V. Intelligence officers will understand the processes ofdeveloping tactical and strategic products and experiencethe development of some products.

VI. Intelligence officers will experience the development ofcriminal intelligence from information through the criticalthinking/inference development process.

VII. Intelligence officers will understand the tasks of buildingand implementing collection plans.

Training Length and DeliveryThe intelligence officer/collector training is 40 hours long andshould be delivered in a classroom environment. Delivery atthe statewide or regional level by local, state, and federalpolice training agencies, intelligence professionalassociations, and/or qualified private law enforcement trainingcompanies would probably be the best approach.

38 Appendix D: Core Criminal Intelligence Training Standards

LevelFour

LevelThree

Page 52: National Criminal Intelligence Sharing Plan - Electronic Privacy

Version 1.0 National Criminal Intelligence Sharing Plan

IntelligenceAnalysts

RoleThe intelligence analyst’s role is to collect, evaluate, analyze,and disseminate information in support of specific agencycollection requirements or operations. Before information canbecome intelligence, it must be analyzed. Therefore, theintelligence analyst’s role is vital to the production of usable,timely, and comprehensive intelligence. Intelligence analystssystematically organize, research, compare, and analyzeinformation. They produce assessments of criminal activity,tactical and strategic intelligence collection plans, anddocuments that allow management to maximize the agency’sresources.

MissionThe mission of the intelligence analyst is to research andanalyze raw data, apply critical thinking and logic skills todevelop sound conclusions and recommendations, and provideactionable intelligence in a cohesive and clear manner tomanagement.

Core Training ObjectivesI. Intelligence analysts will understand the criminal

intelligence process, intelligence-led policing, and theirroles in enhancing public safety.

II. Analysts will understand the importance of the NationalCriminal Intelligence Sharing Plan and the role it plays inreducing crime and violence throughout the country.

III. Analysts will gain an understanding of the proper handlingof criminal intelligence information, including filemanagement and information evaluation.

IV. Analysts will experience the development of intelligencethrough the processes of critical thinking, logic, inferencedevelopment, and recommendation development.

V. Analysts will understand the tasks of building andimplementing collection and analytic plans.

VI. Analysts will be familiar with the legal, privacy, and ethicalissues relating to intelligence.

VII. Analysts will be provided with information on researchmethods and sources including the Internet, informationsharing systems, networks, centers, commercial andpublic databases, and other sources of information.

VIII. Analysts will demonstrate a practical knowledge of themethods and techniques employed in analysis including,but not limited to crime-pattern analysis, associationanalysis, telephone-record analysis, flow analysis, spatialanalysis, financial analysis, and strategic analysis.

IX. Analysts will be familiar with the skills underlying analyticmethods including report writing, statistics, and graphictechniques.

X. Analysts will be familiar with available computer programsthat support the intelligence function, including database,data/text mining, visualization, and mapping software.

Training Length and DeliveryThe intelligence analyst training is a minimum of 40 hoursand should be delivered in a classroom environment. Thetraining should be provided by individuals with analyticexperience in local, state, or federal police training agencies(that may be training on behalf of those agencies), intelligenceprofessional associations, or qualified private law enforcementtraining companies.

This is the area of intelligence in which the most training iscurrently available. Structured courses have been given forthree decades, and new or revised models are constantlyarising.

Appendix D: Core Criminal Intelligence Training Standards 39

LevelFive

Page 53: National Criminal Intelligence Sharing Plan - Electronic Privacy

National Criminal Intelligence Sharing Plan Version 1.0

Train-the-Trainer

RoleIt is necessary to train people to deliver the different levels ofcourses before they can be provided, particularly for LevelsThree and Four. (Levels One and Two are a one-half day orless, and program materials can be easily developed andprovided to potential training organizations.)

MissionThe mission of the trainer is to provide an overview of materialsdeveloped for presentation to Intelligence Commanders/Supervisors and Intelligence Officers, to support the nationwideintelligence training initiative and to be fully capable of providingthe assigned training.

Core Training ObjectivesI. Trainers will understand the intelligence process and how

it functions.II. Trainers will understand the importance of the National

Criminal Intelligence Sharing Plan and the role it plays inreducing crime and violence throughout the country.

III. Trainers will be provided with information from a variety ofsources and how these may be researched and updated.

IV. Trainers will understand the processes of developingtactical and strategic products.

V. Trainers will understand the methods and techniques ofadult learning.

VI. Trainers will be familiar with the use of audiovisual aidsavailable.

VII. Trainers will be provided with examples of all coursematerials and guidance on all course exercises.

VIII. Trainers will be aware of the legal, privacy, and ethicalissues relating to intelligence.

IX. Trainers will prepare and present a short module onintelligence.

Training Length and DeliveryA train-the-trainer class is 40-plus hours and should bedelivered in a classroom environment. However, those beingtrained should be provided with all Commander/Supervisorand Intelligence Officer training materials in advance so theymay become familiar with them. They should also be providedwith copies of source material being used in the class (e.g.,laws, policies, standards, Intelligence 2000: Revising the

LevelSix

Basic Elements, etc.) and should be committed to reviewingall of these before attending the class. This would requireapproximately 25 hours of reading and study.

The train-the-trainer class should be provided by agencieswith established intelligence programs and intelligenceprofessional associations.

Resources to SupportTrainingTo develop and provide the training noted in these standards,further work must be done to develop specific curricula, trainingaids, and exercises.

Some training models or modules are already found in Internet-based and interactive CD-ROMs, such as the InternationalAssociation of Law Enforcement Intelligence Analysts(IALEIA), National White Collar Crime Center, and LawEnforcement Intelligence Unit (LEIU) “Turn Key Intelligence”;U.S. Army Military School’s - Analytical Investigative Tools;the Joint Military Intelligence Training Center, DIA, Counter-Drug Intelligence Analysis course; the National High IntensityDrug Trafficking Areas Assistance Center, “Analysis andCritical Thinking”; as well as California and Arizona POST58

Board curricula. A listing of available intelligence trainingsources and specifically scheduled classes is found on theIALEIA Web site, www.ialeia.org. This listing is updated on asemiannual basis and also allows individuals to directlycontact training source agencies and organizations for moreinformation on classes and schedules.

Literature such as the IALEIA and LEIU Intelligence 2000:Revising the Basics Elements can be used to studyfoundations of the criminal intelligence process, while otherbooks and booklets published by the two groups (including abooklet on Intelligence-Led Policing distributed by IALEIA)can also be of assistance.

40 Appendix D: Core Criminal Intelligence Training Standards

58 For more information, see the California POST Web site, www.post.ca.gov, and the Arizona POST Web site, www.azpost.state.az.us.

Page 54: National Criminal Intelligence Sharing Plan - Electronic Privacy

Solutions and approaches for

a cohesive plan to improve our

nation’s ability to develop and

share criminal intelligence

October 2003

“I am pleased to announce that I have just approved the National Intelligence Sharing Plan, a direct result of recommendations made at the IACP Summit held in March of 2002. With the Plan formally in place, we can build on the communication, coordination, and cooperation that are winning the fight against crime and the war against terror.”

John AshcroftFormer U.S. Attorney General

“Critical to preventing future terrorist attacks is improving our intelligence capability. The Plan will serve as a blueprint as we continue to develop our overall national strategy for sharing information.”

Robert MuellerDirector, Federal Bureau of Investigation

“...We must create new ways to share information and intelligence both vertically, between governments, and horizontally, across agencies and jurisdictions...efforts with the Global Intelligence Working Group to create a National Criminal Intelligence Sharing Plan...a helpful and welcome response.”

Tom RidgeFormer Secretary, U.S. Department of

Homeland Security

BJA Bureau of Justice Assistance

United States Department of Justice

Third Printing 07/05