Confidential Law Enforcement Telephone, Cellular, Satellite & VoIP Investigation Guide, March 10, 2010.
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the fire service into the fusion process. Within the context of this document, the fire service is defined as including fire and emergency operations, emergency medical service operations, rescue operations, hazardous materials operations, fire prevention/protection, fire investigation, incident management, and responder safety.
The law enforcement-private security (LE-PS) partnerships featured here were formed or expanded to address a range of critical needs: to avert or respond to a terrorist attack, support urban downtown revitalization, marshal resources to combat financial crimes, compensate for law enforcement budget cuts, improve safety at special events, improve security for the nation’s infrastructure, and bring community policing approaches and new resources to bear on crimes against residents and businesses. Many of the partnerships have been able to measure success not only by meetings and exchanges of information but also by crimes prevented and solved.
Digital currencies combine the intrinsic value of gold and other precious metals as well as the designated value of national currencies with the worldwide reach of the Internet to create an ideal mechanism for international money laundering. Users can anonymously fund digital currency accounts, send those funds (sometimes in unlimited amounts) to other digital currency accounts worldwide, and effectively exchange the funds for foreign currencies—often while bypassing U.S. regulatory oversight.
Intelligence operations have been reviewed, studied, and slowly but steadily transformed. Most efforts have focused on reorganizing intelligence infrastructures at the federal level; however, corresponding efforts have been made to enhance state and local law enforcement intelligence operations. Such enhancements make it possible for state and local law enforcement agencies to play a role in homeland security. Perhaps more important, improvements to intelligence operations help local law enforcement respond to “traditional” crimes more effectively.
To facilitate the development of a nationwide, integrated, inter-connected fusion center capability, the U.S. Department of Homeland Security’s (DHS) National Preparedness Directorate (NPD) and the Office of Intelligence & Analysis (I&A) and the U.S. Department of Justice’s (DOJ) Bureau of Justice Assistance (BJA) have partnered to develop and deploy the Fusion Process Technical Assistance Program. This program has been developed in coordination with the Office of the Director of National Intelligence (ODNI); the Office of the Program Manager, Information Sharing Environment (PM-ISE); the Federal Bureau of Investigation (FBI); and experts from the State and local community—including the Global Justice Information Sharing Initiative (Global), the Criminal
Intelligence Coordinating Council (CICC), and the Global Intelligence Working Group (GIWG).
Law enforcement needs timely and secure access to services that provide data wherever and whenever for stopping and reducing crime. In response to these needs, the Advisory Policy Board (APB) recommended to the Federal Bureau of Investigation (FBI) that the Criminal Justice Information Services (CJIS) Division authorize the expansion of the existing security management structure in 1998. Administered through a shared management philosophy, the CJIS Security Policy contains information security requirements, guidelines, and agreements reflecting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI); and the Personally Identifiable Information derived from CJI.
U.S. DOJ Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
According to the Supreme Court, a “‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property,” United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized the interception of intangible communications as a seizure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a “‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed.”
What is a SAR?
•“Official documentation of observed behavior that may be indicative of intelligence gathering or preoperational planning related to terrorism, criminal, or other illicit intention”
• SAR process focuses on what law enforcement agencies have been doing for years—gathering information regarding behaviorsand incidentsassociated with crimeand establishing a process whereby information can be shared to detect and prevent criminal activity, including that associated with domestic and international terrorism
• Examples: Surveillance, photography of facilities, testing of security