N-17 SUBJECT: SUSPICIOUS ACTIVITY REPORTING AND RELATIONSHIP WITH THE NORTHERN CALIFORNIA REGIONAL INTELLIGENCE CEN Flashcards
N-17 SUBJECT: SUSPICIOUS ACTIVITY REPORTING AND RELATIONSHIP WITH THE NORTHERN CALIFORNIA REGIONAL INTELLIGENCE CENTER
PURPOSE
1- The terrorist attacks of September 11, 2001, and subsequent attacks throughout the world have demonstrated the necessity of an organized and integrated information sharing system at all levels of law enforcement. In order to prevent, prepare for, respond to, and investigate potential acts of terrorism and other violent criminal threats, it is necessary to establish an efficient system of communication whereby critical information can be quickly disseminated within the Berkeley Police Department (BPD) and to various local, state and federal law enforcement agencies.
2- National guidelines have been developed and implemented throughout the United States through the National Criminal Intelligence Sharing Plan, the Findings and Recommendations of the Suspicious Activity Report Support and Implementation Project and the Nationwide Suspicious Activity Reporting Initiative (NSI) to establish a means for the sharing of information, known as Suspicious Activity Reporting (SAR). The information sharing plan was developed by law enforcement agencies to establish an all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious activity related to potential terrorism and crime. By maximizing information from citizens, law enforcement, and public safety officials, criminal acts can be detected and disrupted and incidents that have occurred can be properly investigated.
3- The Berkeley Police Department will continue to attempt to detect crime before it occurs, including terrorism, through various means such as Suspicious Activity Reporting (SAR). The SAR program will provide a format for the Department to accurately and appropriately gather record, analyze and share suspicious activity or, in cases of named or identified individuals or groups, information that gives rise to a reasonable suspicion of criminal activity, including those activities related to foreign or domestic terrorism.
N-17 SUBJECT: SUSPICIOUS ACTIVITY REPORTING AND RELATIONSHIP WITH THE NORTHERN CALIFORNIA REGIONAL INTELLIGENCE CENTER
N-17 LIMITATIONS
4- If the information gathered is developed into criminal intelligence, the Department will ensure that the information privacy and legal rights of all persons will be recorded and maintained in strict compliance with existing federal, state and Department guidelines regarding criminal intelligence systems as defined in (28 Code of Federal Regulations (CFR), Part 23 including subsections 23.20 (a) and 23.20(b)), the California Constitution and the California Attorney General’s Model Standards and Procedures for Maintaining Criminal Intelligence Files and Criminal Intelligence Operational Activities and the California State Threat Assessment System Concept of Operations.
(a) A project shall collect and maintain criminal intelligence information concerning an individual only if there is reasonable suspicion that the individual is involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.
(b) A project shall not collect or maintain criminal intelligence information about the political, religious or social views, associations, or activities of any individual or any group, association, corporation, business, partnership, or other organization unless such information directly relates to criminal conduct or activity and there is reasonable suspicion that the subject of the information is or may be involved in criminal conduct or activity.
5- Non-violent civil disobedience is specifically exempted from SARs reporting, and such activities shall not be reported as SARs.
6- SARs must not be submitted based on ideology, social or political opinion or advocacy of religious beliefs or association with a particular group. Criminal activity that would not ordinarily result in a SAR does not become worthy of a SAR when the subject’s speech or expression indicates a particular ideological viewpoint or association.
N-17 LIMITATIONS
N-17 POLICY
7- Effective immediately, all sworn BPD personnel will document incidents with an actual or potential terrorism nexus or other suspected criminal activity and submit those proposed Suspicious Activity Reports as outlined in this policy.
All Department members will adhere to the procedures and responsibilities described in this policy whenever potential terrorism related activity is encountered, observed or reported.
DEFINITIONS
8- Suspicious Activity:
Behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, or criminal activity. Suspicious behavior must have a criminal predicate (defined below), and must rise to the level of reasonable suspicion (defined below) in order to be reportable as a SAR in circumstances involving a named or indentified individual or group.
9- Criminal Predicate:
The standard by which the determination as to whether information may be used to create a SAR is made in circumstances involving a named or identified individual or group. It means that there exists a “reasonable suspicion” based on the analysis of legally obtained information that the subject of the information is or may be involved in definable criminal conduct and/or activity that supports, encourages, or otherwise aids definable criminal conduct. For the purposes of this order, infraction violations will not be considered sufficient to establish a criminal predicate. The underlying offense must amount to a misdemeanor or felony.
10- Reasonable Suspicion:
Information which, when viewed in its totality, leads a person with appropriate training, specialized knowledge, and/or experience to conclude that a person, association of persons, or organization is involved in definable criminal conduct and/or activity that supports, encourages, or otherwise aids definable criminal conduct.
N-17 POLICY
N-17 PROCEDURES
11- Examples of behaviors that could be reported as a SAR are as follows (all of these behaviors have been verified as behaviors which have preceded and been linked to actual terrorist incidents as well as common criminal acts.
Breach/Attempted Intrusion-
Unauthorized personnel attempting to or actually entering a restricted area or protected site.
Misrepresentation-
Presenting false or misusing insignia, documents, and/or identification, to misrepresent one’s affiliation to cover possible illicit activity.
Theft/Loss/Diversion-
Stealing or diverting something associated with a facility/infrastructure (e.g., badges, uniforms, identification, emergency vehicles, technology or documents {classified or unclassified}, which are proprietary to the facility).
Sabotage/Tampering/ Vandalism-
Damaging, manipulating, or defacing part of a facility/infrastructure or protected site.
Cyber Attack-
Compromising, or attempting to compromise or disrupt an organization’s information technology infrastructure.
Expressed or Implied Threat-
Communicating a spoken or written threat to damage or compromise a facility/infrastructure.
Aviation Activity-
Operation of an aircraft in a manner that reasonably may be interpreted as suspicious, or posing a threat to people or property. Such operation may or may not be a violation of Federal Aviation Regulations.
Eliciting Information-
Questioning individuals at a level beyond mere curiosity about particular facets of a facility’s or building’s purpose, operations, security procedures, etc., that would arouse suspicion in a reasonable person.
Testing or Probing of Security-
Deliberate interactions with, or challenges to, installations, personnel, or systems that reveal physical, personnel or cyber security capabilities.
12 - Examples of behavior which cannot be reported as a SAR unless:
1) the activity rises to the level of criminal conduct, or 2) the person taking part in the activity is not identified, and therefore, not subject to possible investigation by state and federal investigative agencies:
Recruiting-
Building of criminal operations teams and contacts, personnel data, banking data or travel data
Photography-
Taking pictures or video of facilities, buildings, or infrastructure in a manner that would arouse suspicion in a reasonable person. Examples include taking pictures or video of infrequently used access points, personnel performing security functions (patrols, badge/vehicle checking), security-related equipment (perimeter fencing, security cameras), etc.
N-17 PROCEDURES
N-17 SARS
13 -Employee’s Responsibilities:
All personnel are reminded that Constitutional rights will be honored at all times and nothing in this policy diminishes Constitutional protections.
Personnel are specifically reminded of Fourth Amendment protections and that persons cannot be arrested without probable cause, detained without reasonable suspicion, and that evidence cannot be seized except pursuant to a warrant or an existing recognized exception to the warrant requirement.
Any BPD employee receiving any information regarding suspicious activity potentially related to terrorism shall:
(a) Notify their direct supervisor.
(b) Notify a department Terrorism Liaison Officer (TLO)
(c) Document the incident as described in this policy.
Employee’s Responsibilities
N-17 supervisor responsibilities
14- Responsibilities of Supervisors:
Upon notification that personnel have received information regarding a potential SAR, the BPD Supervisor shall:
(a) Determine if any further law enforcement response is needed, will consult with a BPD (TLO) if available and determine if immediate notifications to the Chief of Police, and/or the City Manager or his/her designee is required.
(b) Provide the information in written form to the TLO for consideration of SAR submittal.
(c) Review the reports and ensure the proper reporting has been completed.
N-17 supervisor responsibilities
N-17 Responsibilities of the TLO and TLO
15- Responsibilities of the TLO and TLO Coordinator (TLOC):
Terrorism Liaison Officers (TLOs) have received training in the identification, handling and reporting of potential terrorism related incidents. TLOs will be available as a resource for SAR related incidents.
(a) TLOs will review proposed SARs from officers, and supervisors, and forward them to the TLO Coordinator (TLOC) for further review. If the report meets sufficient criteria for submission as a SAR, the TLOC will submit it to the Operations Division Commander or his designee for submission approval.
(b) The TLOC shall maintain a written log of all SARs submitted, and prepare an annual report to be provided to City Council.
N-17 Responsibilities of the TLO and TLO
N-17 Responsibilities of the Operations Division Commander:
16- Responsibilities of the Operations Division Commander:
(a) Review of proposed SARs, and approval/rejection as appropriate.
(b) Forward all SARs to the City Manager and Chief for review
(c) Ensure that a written log is maintained and an annual report prepared by the TLOC.
N-17 Responsibilities of the Operations Division Commander:
N-17 Responsibilities of the NCRIC
17- Responsibilities of the NCRIC:
It is the policy of the NCRIC to make every effort to accurately and appropriately gather, record, analyze, and disseminate information that could indicate activity or intentions related to threats to homeland security and submit such information to the Federal Bureau of Investigation – Joint Terrorism Task Force (FBI-JTTF) and the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) in the form of an NSI suspicious activity report. These efforts shall be carried out in a manner that protects the information and the privacy, civil rights, and civil liberties of individuals. Suspicious activity information shall be recorded and maintained in strict compliance with existing federal and state guidelines.
N-17 Responsibilities of the NCRIC
N-17 NSI unified process
18- The NSI has established a unified process for reporting, tracking, and assessing terrorism-related SARs throughout the nation.
The NSI adheres to the guidelines established by the Intelligence Reform and Terrorism Prevention Act and the Information Sharing Environment Suspicious Activity Reporting (ISE-SAR) Functional Standard. These guidelines call for all terrorism-related suspicious activity reporting to be routed through designated fusion centers for appropriate vetting and review before the information can be shared within the nationwide system. The NCRIC as a component of California’s State Threat Assessment System has been designated as the review agents for all terrorism-related suspicious activity reporting in the region.
N-17 NSI unified process
N-17 NCRIC
19- The NCRIC will then make the decision to share the SAR information with the NSI based on the standards established by the NSI. The NCRIC is also responsible for ensuring that all TLOs, line officers and other first responders in the region have received appropriate training in the collection and reporting of terrorism-related suspicious activities and the responsibilities related to protection of privacy, civil rights and civil liberties of individuals.
The NCRIC also works closely with the NSI Program Management Office to ensure a statewide implementation of suspicious activity reporting.
N-17 NCRIC
N-17 SARS
20- Reporting a SAR: All Suspicious Activity Reports (SARs) will be submitted through the www.ncric.org website. When the SAR involves a criminal act or attempted criminal act, a written BPD police report shall be submitted (and BPD case number created) identifying the suspected criminal behavior and referencing the systems and personnel notified of the SAR.
N-17 SARS