- Page 1: David L. Carter, Ph.D. School of Cr
- Page 6 and 7: Chiefs' Intelligence Commanders, Hi
- Page 8 and 9: Moreover, critical issues are addre
- Page 10 and 11: Another significant change in law e
- Page 12 and 13: Summary of New Initiatives • Deve
- Page 15 and 16: Table of Contents CHAPTER 1: INTROD
- Page 17 and 18: Joint Regional Information Exchange
- Page 19: List of Figures 1-1 Diverse Informa
- Page 22 and 23: CHAPTER ONE
- Page 24 and 25: Not every agency has the staff or r
- Page 26 and 27: transcend the threshold of exercisi
- Page 28 and 29: CHAPTER TWO
- Page 30 and 31: 1 "Investigation" is defined as the
- Page 32 and 33: 5 Carter, David L. (2002). Law Enfo
- Page 34 and 35: 8 International Association of Law
- Page 36 and 37: 15 Carter, David L. (2002). Law Enf
- Page 38 and 39: 19 The FBI may keep such records in
- Page 41 and 42: A Brief History of Law Enforcement
- Page 43 and 44: A Brief History of Law Enforcement
- Page 45 and 46: in the 1940s because of World War I
- Page 47 and 48: Commonly referred to as 1983 suits,
- Page 49 and 50: greater coordination for the rest o
- Page 51 and 52: attention was given to the role of
- Page 53 and 54:
• Each agency should develop proc
- Page 55 and 56:
held accountable for abuses of powe
- Page 57 and 58:
about what is happening, or may hap
- Page 59 and 60:
Intelligence-Led Policing: The Inte
- Page 61 and 62:
Intelligence-Led Policing: The Inte
- Page 63 and 64:
• Provide examples and materials
- Page 65 and 66:
Ethical Issues Another important ch
- Page 67 and 68:
• Who poses threats? This respons
- Page 69 and 70:
public encompasses many different g
- Page 71 and 72:
Figure 4-2: Examples of Topics in P
- Page 73 and 74:
experience in researching land titl
- Page 75 and 76:
Figure 4-4: Austin, Texas Police De
- Page 77 and 78:
The Intelligence Process 5
- Page 79 and 80:
The Intelligence Process In definin
- Page 81 and 82:
as in the case of problem oriented
- Page 83 and 84:
This simple example demonstrates th
- Page 85 and 86:
and related information should beco
- Page 87 and 88:
Figure 5-5: FBI Intelligence Cycle
- Page 89 and 90:
Figure 5-6: Illustration of Descrip
- Page 91 and 92:
• Establishing data classificatio
- Page 93 and 94:
When raw open source information is
- Page 95 and 96:
through validated and corroborated
- Page 97:
Figure 5-8: Illustration of Open-So
- Page 100 and 101:
CHAPTER SIX
- Page 102 and 103:
111 For example, follow-up instruct
- Page 104 and 105:
114 The questions asked of people i
- Page 106 and 107:
training programs for police person
- Page 108 and 109:
119 The newly developed Homeland Se
- Page 110 and 111:
Figure 6-1: Fact Sheet - National C
- Page 112 and 113:
122 At this writing, changes to 28
- Page 114 and 115:
CHAPTER SEVEN
- Page 116 and 117:
123 For information on the Global J
- Page 118 and 119:
unit - including both tactical and
- Page 120 and 121:
128 Performance standards are often
- Page 122 and 123:
proactive role in all aspects of de
- Page 124 and 125:
• Participants: Organizations tha
- Page 126 and 127:
http://www.centerdigitalgov.com/cen
- Page 129 and 130:
Human Resource Issues 8
- Page 131 and 132:
Human Resource Issues Who should pe
- Page 133 and 134:
more creative and less restrictive
- Page 135 and 136:
terrorism, drug trafficking, money
- Page 137 and 138:
Categories of Currently Available I
- Page 139 and 140:
in different cities throughout the
- Page 141 and 142:
In addition, the State and Local An
- Page 143 and 144:
Enforcement Intelligence Dr. Barry
- Page 145 and 146:
Networks and Systems 9
- Page 147 and 148:
Networks and Systems Essential to e
- Page 149 and 150:
• Regional Organized Crime Inform
- Page 151 and 152:
Terrorism Information Exchange (ATI
- Page 153 and 154:
• Email: Provides the capability
- Page 155 and 156:
LEIU is not a computer system where
- Page 157 and 158:
terrorist actions. Information shar
- Page 159 and 160:
primary means of integrating data r
- Page 161 and 162:
Figure 9-3: INTERPOL Notices 168 U.
- Page 163 and 164:
Since 9/11, new regional intelligen
- Page 165:
CONCLUSION If effective information
- Page 168 and 169:
CHAPTER TEN
- Page 170 and 171:
The same phenomenon applies to the
- Page 172 and 173:
4. Define logical networks • How
- Page 174 and 175:
threat capacity, several factors ne
- Page 176 and 177:
Figure 10-3: Intelligence Informati
- Page 178 and 179:
IIN Illegal activities of suspect g
- Page 180 and 181:
IIN - response of suspect groups to
- Page 182 and 183:
CHAPTER ELEVEN
- Page 184 and 185:
181 http://www.whitehouse.gov/ news
- Page 186 and 187:
182 The FBI provides the following
- Page 188 and 189:
186 Department of Homeland Security
- Page 190 and 191:
189 The FIG should be contacted at
- Page 192 and 193:
191 On August 28, 2004, President B
- Page 194 and 195:
to terrorist watch lists from multi
- Page 196 and 197:
and prevent terrorist acts and to p
- Page 198 and 199:
Figure 11-1: DHS and Intelligence a
- Page 200 and 201:
Figure 11-4: DHS Physical Advisory
- Page 202 and 203:
196 A number of DEA Strategic Intel
- Page 204 and 205:
198 See http://www.dea.gov/programs
- Page 206 and 207:
active case-targeting information t
- Page 208 and 209:
202 See http://www.whitehousedrugpo
- Page 210 and 211:
and Explosives (ATF) 205 The Intell
- Page 212 and 213:
Network (FinCEN) 207 The Financial
- Page 214 and 215:
The HIFCA program is intended to co
- Page 216 and 217:
194 Law Enforcement Intelligence: A
- Page 218 and 219:
CHAPTER TWELVE
- Page 220 and 221:
209 The COPS Regional Community Pol
- Page 222 and 223:
A number of factors may be included
- Page 224 and 225:
that the department will receive an
- Page 226 and 227:
APPENDIX A
- Page 228:
Advisory Board Members Doug Bodrero
- Page 231 and 232:
Law Enforcement Intelligence Unit (
- Page 233 and 234:
A. Information on an individual or
- Page 235 and 236:
- Narcotic trafficking/manufacturin
- Page 237 and 238:
V. INFORMATION EVALUATION Informati
- Page 239 and 240:
2. Corruption (police or other gove
- Page 241 and 242:
Information from a criminal intelli
- Page 243 and 244:
A. Purge Criteria: General consider
- Page 245 and 246:
Criminal Offender Record Informatio
- Page 247 and 248:
Intelligence Unit Management Audit
- Page 249 and 250:
a. Does the police department opera
- Page 251 and 252:
Priority Highest Level Medium Level
- Page 253 and 254:
4. Management of Information: Data
- Page 255 and 256:
. What is the accountability system
- Page 257 and 258:
5. How are physical records stored?
- Page 259 and 260:
a. Is there adequate secured storag
- Page 261 and 262:
5. Is there sufficient support staf
- Page 263 and 264:
3. Are performance evaluations tied
- Page 265 and 266:
g. Total number of queries into the
- Page 267 and 268:
a. If Yes, Describe the methods of
- Page 269 and 270:
3. Is there a designated person the
- Page 271 and 272:
28 CFR Part 23 249
- Page 273 and 274:
§ 23.3 Applicability. (a) These po
- Page 275 and 276:
authorities who shall agree to foll
- Page 277 and 278:
(j) A project shall notify the gran
- Page 279 and 280:
(1) assume official responsibility
- Page 281 and 282:
funding and operation of these syst
- Page 283 and 284:
23.3(b)(1)), the Office of Justice
- Page 285 and 286:
hence are not covered by the regula
- Page 287 and 288:
FBI Security Clearance 265
- Page 289 and 290:
state and local law enforcement off
- Page 291 and 292:
candidate. Q: If I have a poor cred
- Page 293 and 294:
Biography of David L. Carter, Ph.D.
- Page 296 and 297:
APPENDIX G
- Page 299 and 300:
Audit Factors for the Law Enforceme
- Page 301 and 302:
6. Does the mission statement expre
- Page 303 and 304:
c. Is there a procedure articulatin
- Page 305 and 306:
3. How often does a review and purg
- Page 307 and 308:
a. How is the possession of persona
- Page 309 and 310:
11. How are physical records secure
- Page 311 and 312:
6. Do undercover officers receive t
- Page 313 and 314:
3. Have members of the Intelligence
- Page 315 and 316:
. Providing information to apprehen
- Page 317 and 318:
a. If Yes, Describe the methods of
- Page 319 and 320:
3. Is there a designated person the