Documente Academic
Documente Profesional
Documente Cultură
for
Intelligence Officers, Analysts, and Investigators
Compiled by:
Michael E. Chesbro
UPDATE: 1 March 2010
ABOUT THE GUIDE
The "Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators" is compiled
from multiple and various open sources. The information found in the guide was obtained from the
organizations listed herein or from other open sources (i.e. Internet) and may not have been fully
validated.
This guide is not intended to be an exhaustive compilation of all sources of information available to
intelligence officers, analysts, and investigators. There are many other sources of valuable information
that may be useful for intelligence, analytical, and investigative purposes. The specific sources of
information identified in the guide exemplify the types of information available, and that which may
have proven useful in the past.
The inclusion of specific products or services should not be viewed as an endorsement by any agency,
organization, or person.
As a user of this guide, you should be aware that, in many cases, information and sources we cite may
be privileged or restricted and, therefore, you will need to apply for accounts or access to the specific
systems, and databases listed.
The information provided in this guide is current as of the date of publication. The guide was originally
compiled and published in October 2009. The guide is a 'living document' to which I continually make
changes and updates. I request your assistance in updating and improving the guide. Please submit any
updates or suggestions on how the guide can better meet users’ needs, or requests for a copy of the
most current edition of the guide, directly to me by e-mail at michael.chesbro@leo.gov
* If your copy of the Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators
is more than 90-days old, please check with me for the latest update.*
* Note: Although I work for DoD, the "Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators" is a
personal project and should not be considered an official government publication, nor is it officially endorsed by any
government agency.
TABLE OF CONTENTS
Consumer Sentinel
Cybercop
First Observer
HSIN-Intelligence
Infragard
IntelCenter
Intelink
Intelligence Is The Future Intelligence Applications & Analysis for Law Enforcement
SENTRY
TRIPwire
Intelligence Cycle
What is intelligence?
ALARACT 322/2009 - Force Protection - Ten Key Indicators of Potential Terrorist Associated Insider Threats to the Army.
Detecting Bio-terror
DNA Initiative
Navy and Marine Corps Intelligence Training Center (NMITC) Intelligence Courses
*Selected Resources*
Analysis of Competing Hypotheses Software
Baseline Capabilities for State and Major Urban Area Fusion Centers
Cryptography Program
Data Ferrett
Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era
Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels
VineLink
*Glossary*
*Web-Sites*
Anti-Terrorism
Encryption
Language Studies
The Bureau of Alcohol, Tobacco, Firearms and Explosives field divisions are located throughout the
United States. Some of the field offices have jurisdiction in surrounding states.
As the Department of State's security and law enforcement arm, the Bureau of Diplomatic Security plays
an essential yet behind-the-scenes role: To provide a safe and secure environment for the conduct of
U.S. foreign policy. Not only is Diplomatic Security a unique organization in the foreign affairs
community--it is the only law enforcement agency with representation in nearly every country in the
world.
Diplomatic Security has offices throughout the United States staffed with special agents and contract
investigators. These agents form the backbone of DS's investigative mission, conducting criminal,
counterterrorism, and background investigations. Agents assigned to field and resident offices assist in
providing support to the protection of the Secretary of State, the U.S. Ambassador to the United
Nations, and visiting foreign dignitaries. In addition, they are charged with security support for resident
foreign diplomats and assistance to the private sector through the Overseas Security Advisory Council.
Liaison with federal and local law enforcement, foreign mission personnel, local officials, and the private
sector complements their major responsibilities.
The U.S. Army Crime Records Center is co-located with the USACIDC Headquarters at Fort Belvoir
Virginia. The CRC is a multi-functional center, supporting not only the Army and the command, but also
foreign, federal, state and local law enforcement agencies.
The CRC receives, safeguards, maintains and disseminates information from Army law enforcement
records. The center has accumulated more than 2.5 million reports. It also serves as CID's Freedom of
Information and Privacy Act authority and annually responds to more than 2,000 requests for
information. Another major function of the center is to manage the Army law enforcement Polygraph
Program.
Mailing Address:
Director
U.S. Army Crime Records Center
USACIDC
6010 6th Street
Fort Belvoir, VA 22060-5585
Phone:703-806-0431
DSN: 656-0431
Name Check
Phone: 703-806-0397
DSN: 656-0397
Customs and Border Protection (CBP) - http://www.cbp.gov
Inquiries 877-CBP-5511
TTD 866-880-6582
C-TPAT 202-344-1180
There are 20 Field Operations Offices in the United States that provide centralized management
oversight and operational assistance to 327 U.S. ports of entry and 15 preclearance offices. Established
geographically by region, Field Operations Offices serve as the spokes of a wheel for CBP Headquarters
to distribute key policies and procedures to field staff. Field Operations Offices provide guidance to their
regional ports and ensure the dissemination and implementation of core CBP guidelines. These offices
also provide for mission support functions within their regions; such as, resource management, equal
employment opportunity, labor, employee relations, and other human resources management
functions.
The DEA has 227 Domestic Offices in 21 Divisions throughout the U.S. and 87 Foreign Offices in 63
countries.
The FBI has 56 field offices centrally located in major metropolitan areas across the U.S. and Puerto Rico.
The FBI also maintains about 400 resident agencies in smaller cities and towns across the nation. Each
field office is overseen by a Special Agent in Charge, except our offices in Los Angeles, New York City,
and Washington, D.C., which are managed by an Assistant Director in Charge due to their large size.
Alabama Georgia
FBI Birmingham 205-326-6166 FBI Atlanta 404-679-9000
FBI Mobile 251-438-3674
Hawaii
Alaska FBI Honolulu 808-566-4300
FBI Anchorage 907-276-4441
Illinois
Arizona FBI Chicago 312-421-6700
FBI Phoenix 602-279-5511 FBI Springfield 217-522-9675
Arkansas Indiana
FBI Little Rock 501-221-9100 FBI Indianapolis 317-639-3301
California Kentucky
FBI Los Angeles 310-477-6565 FBI Louisville 502-263-6000
FBI Sacramento 916-481-9110
FBI San Diego 858-565-1255 Louisiana
FBI San Francisco 415-553-7400 FBI New Orleans 504-816-3000
Colorado Maryland
FBI Denver 303-629-7171 FBI Baltimore 410-265-8080
Connecticut Massachusetts
FBI New Haven 203-777-6311 FBI Boston 617-742-5533
Florida Minnesota
FBI Jacksonville 904-248-7000 FBI Minneapolis 612-376-3200
FBI North Miami Beach 305-944-9101
Mississippi
FBI Tampa 813-253-1000
FBI Jackson 601-948-5000
Missouri Pennsylvania
FBI Kansas City 816-512-8200 FBI Philadelphia 215-418-4000
FBI St. Louis 314-231-4324 FBI Pittsburgh 412-432-4000
Alabama - Joint Terrorism Task Force Arkansas - Joint Terrorism Task Force
Birmingham 205-326-6166 Fayetteville 479-443-3181
Mobile 251-415-3259 Little Rock 479-443-3181
Montgomery 334-263-1691
California - Joint Terrorism Task Force
Alaska - Joint Terrorism Task Force Fresno 559-436-4474
Anchorage 907-276-4441 Long Beach 310-477-6565
Los Angeles 310-477-6565
Arizona - Joint Terrorism Task Force Riverside 951-686-0335
Phoenix 602-279-5511 Sacramento 916-481-9110
San Diego 858-565-1255
San Francisco 415-553-7400 Louisiana - Joint Terrorism Task Force
Santa Ana 714-542-8825 New Orleans 504-816-3000
Colorado - Joint Terrorism Task Force Maine - Joint Terrorism Task Force
Colorado Springs 719-633-3852 Portland 207-774-9322
Denver 303-575-7386
Maryland - Joint Terrorism Task Force
Connecticut - Joint Terrorism Task Force Baltimore 410-265-8080
New Haven 203-777-6311
Massachusetts - Joint Terrorism Task Force
Delaware - Joint Terrorism Task Force Boston 617-742-5533
Wilmington 302-658-4391 Springfield 413-736-0301
District Columbia - Joint Terrorism Task Force Michigan - Joint Terrorism Task Force
Washington, DC 202-278-2000 Detroit 313-313-2323
Grand Rapids 616-456-5489
Florida - Joint Terrorism Task Force
Jacksonville 904-721-1211 Minnesota - Joint Terrorism Task Force
Miami 305-787-6115 Minneapolis 612-376-3397
Orlando 407-875-9976
Pensacola 904-721-1211 Mississippi - Joint Terrorism Task Force
Tampa 813-253-1000 Jackson 601-948-5000
West Palm Beach 561-833-7517
Missouri - Joint Terrorism Task Force
Georgia - Joint Terrorism Task Force Kansas City 816-512-8200
Atlanta 404-679-6339 St. Louis 314-589-2500
Hawaii - Joint Terrorism Task Force Montana - Joint Terrorism Task Force
Honolulu 808-566-4300 Helena 406-443-3617
Idaho - Joint Terrorism Task Force Nebraska - Joint Terrorism Task Force
Boise 208-344-7843 Omaha 402-452-2580
Cour de' Laine 208-664-5128
Nevada - Joint Terrorism Task Force
Illinois - Joint Terrorism Task Force Las Vegas 702-385-1281
Chicago 312-421-6700
New Hampshire - Joint Terrorism Task Force
Springfield 217-757-3580
Bedford 603-472-2224
Indiana - Joint Terrorism Task Force
New Jersey - Joint Terrorism Task Force
Indianapolis 317-639-3301
Newark 973-792-3000
Iowa - Joint Terrorism Task Force
New Mexico - Joint Terrorism Task Force
Des Moines 515-223-4278
Albuquerque 505-889-1341
Kansas - Joint Terrorism Task Force
New York - Joint Terrorism Task Force
Kansas City 816-512-8200
Albany 518-431-7373
Wichita 316-262-0031
Buffalo 716-843-4332
Kentucky - Joint Terrorism Task Force New York 212-384-1000
Covington 859-341-3901 Rochester 585-464-9230
Lexington 859-254-4038
North Carolina - Joint Terrorism Task Force
Louisville 502-569-7138
Charlotte 704-377-9200
Ohio - Joint Terrorism Task Force Brownsville 956-546-6922
Cincinnati 513-421-4310 Bryan 979-776-8894
Cleveland 216-622-6688 Conroe 281-292-3329
Toledo 419-254-8945 Corpus Christi 361-883-8671
Dallas 972-559-5000
Oklahoma - Joint Terrorism Task Force El Paso 915-832-5000
Oklahoma City 405-290-3756 Fresco 214-705-7000
Tulsa 918-664-3300 Houston 713-693-5000
Laredo 956-723-4021
Oregon - Joint Terrorism Task Force
Lubbock 806-765-8571
Portland 503-552-5204
McAllen 956-984-6300
Midland 432-570-0255
Pennsylvania - Joint Terrorism Task Force
San Antonio 210-225-6741
Erie 814-452-4516
Texas City 409-935-7327
Philadelphia 215-418-4500
Pittsburgh 412-432-4000
Utah - Joint Terrorism Task Force
Salt Lake City 801-579-1400
Puerto Rico - Joint Terrorism Task Force
San Juan 787-772-2166
Virginia - Joint Terrorism Task Force
Charlottesville 434-293-9663
Rhode Island - Joint Terrorism Task Force
Norfolk 757-455-0100
Providence 401-272-8310
Richmond 804-627-4624
South Carolina - Joint Terrorism Task Force
Washington - Joint Terrorism Task Force
Charleston 843-722-9164
Everett 425-252-3500
Columbia 808-551-4404
Inland NW 509-892-9945
Greenville 864-232-3807
Seattle 206-262-2421
Tennessee - Joint Terrorism Task Force
West Virginia - Joint Terrorism Task Force
Knoxville 865-544-0751
Charleston 304-346-3232
Memphis 901-747-4300
Clarksburg 304-624-6200
Nashville 615-232-7500
Wisconsin - Joint Terrorism Task Force
Texas - Joint Terrorism Task Force
Madison 608-833-4600
Austin 512-345-1111
Milwaukee 414-291-4821
Beaumont 409-832-8571
FPS Headquarters is located in Washington, D.C. Regional offices are geographically located in New York,
Boston, Philadelphia, Atlanta, Denver, Chicago, San Francisco, Seattle, Fort Worth, Kansas City, and
Washington, DC. Other sites include the Far East and the Caribbean.
Region 1-Boston, Massachusetts 617-565-6360
Area of Responsibility: Massachusetts, Vermont, New Hampshire, Maine, Rhode Island, and Connecticut
http://www.hidta.org/locations.asp
The High Intensity Drug Trafficking Areas (HIDTA) program enhances and coordinates drug control
efforts among local, State, and Federal law enforcement agencies. The program provides agencies with
coordination, equipment, technology, and additional resources to combat drug trafficking and its
harmful consequences in critical regions of the United States.
HIDTA Locations
United States Immigration and Customs Enforcement (ICE) is a component of the Department of
Homeland Security (DHS). The Office of Detention and Removal (DRO) is a division of Immigration and
Customs Enforcement. DRO is the primary enforcement arm within ICE for the identification,
apprehension and removal of illegal aliens from the United States. The resources and expertise of DRO
are utilized to identify and apprehend illegal aliens, fugitive aliens, and criminal aliens, to manage them
while in custody and to enforce orders of removal from the United States. DRO is committed to
enforcing our nation’s immigration laws in a fair, effective, and professional manner.
The Office of Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the
United States. The SAC offices are responsible for the administration and management of all
investigative and enforcement activities within the geographic boundaries of the office. The SACs
develop, coordinate, and implement enforcement strategies to ensure conformance with national
policies and procedures and to support national intelligence programs. SACs coordinate law
enforcement activities with the highest level of Federal, state, and local governments, as well as
intelligence organizations and international law enforcement entities. In addition, SACs supervise all
administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program
is developed.
To efficiently manage their designated geographic regions, SAC offices maintain various subordinate
field offices throughout their areas of responsibility, which support the enforcement mission. These
subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge
(ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing
enforcement activities within the geographic boundaries of the office.
The National Drug Intelligence Center (NDIC) was established by the Department of Defense
Appropriations Act, 1993 (Public Law 102-396) signed into law on October 6, 1992. Placed under the
direction and control of the Attorney General, NDIC was established to "coordinate and consolidate drug
intelligence from all national security and law enforcement agencies, and produce information regarding
the structure, membership, finances, communications, and activities of drug trafficking organizations."
Email: NDIC.Contacts@usdoj.gov
The National Gang Intelligence Center (NGIC) is a multi-agency effort that integrates the gang
intelligence assets of federal, state, and local law enforcement entities to serve as a centralized
intelligence resource for gang information and analytical support.
The mission of the NGIC is to support law enforcement agencies through timely and accurate
information sharing and strategic/tactical analysis of federal, state, and local law enforcement
intelligence focusing on the growth, migration, criminal activity, and association of gangs that pose a
significant threat to communities throughout the United States.
NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department
of Energy.
NNSA is responsible for the management and security of the nation’s nuclear weapons, nuclear
nonproliferation, and naval reactor programs. It also responds to nuclear and radiological emergencies
in the United States and abroad. Additionally, NNSA federal agents provide safe and secure
transportation of nuclear weapons and components and special nuclear materials along with other
missions supporting the national security.
NOAA's Regional Climate Centers (RCCs) are a federal-state cooperative effort. The RCC Program is
managed by the NOAA's National Climatic Data Center (NCDC). The six centers that comprise the RCC
Program are engaged in the timely production and delivery of useful climate data, information and
knowledge for decision makers and other users at the local, state, regional and national levels. The RCCs
support NOAA's efforts to provide operational climate services while leveraging improvements in
technology and collaborations with partners to expand quality data dissemination capabilities.
The United States Secret Service is a federal law enforcement agency with headquarters in Washington,
D.C., and more than 150 offices throughout the United States and abroad.
Alabama Arizona
Birmingham 205-731-1144 Phoenix 602-640-5580
Mobile 251-441-5851 Tucson 520-622-6822
Montgomery 334-223-7601
Arkansas
Alaska Little Rock 501-324-6241
Anchorage 907-271-5148
California
Fresno 559-487-5204
Los Angeles 213-894-4830 Kansas
Riverside 951-276-6781 Wichita 316-267-1452
Sacramento 916-930-2130
San Diego 619-557-5640 Kentucky
San Francisco 415-744-9026 Lexington 859-223-2358
San Jose 408-535-5288 Louisville 502-582-5171
Santa Ana 714-246-8257
Louisiana
Ventura 805-383-5745
Baton Rouge 225-389-0763
Colorado New Orleans 504-841-3260
Denver 303-850-2700
Maine
Connecticut Portland 207-780-3493
New Haven 203-865-2449
Maryland
Delaware Baltimore 443-263-1000
Wilmington 302-573-6188
Massachusetts
District Of Columbia Boston 617-565-5640
Washington 202-406-8000
Michigan
Florida Detroit 313-226-6400
Fort Myers 239-334-0660 Grand Rapids 616-454-4671
Jacksonville 904-296-0133 Saginaw 989-497-0580
Miami 305-863-5000
Minnesota
Orlando 407-648-6333
Minneapolis 612-348-1800
Tallahassee 850-942-9523
Tampa 813-228-2636
Mississippi
West Palm Beach 561-659-0184
Jackson 601-965-4436
Georgia
Missouri
Albany 229-430-8442
Kansas City 816-460-0600
Atlanta 404-331-6111
Springfield 417-864-8340
Savannah 912-652-4401
St. Louis 314-539-2238
Guam
Montana
Hagatna 671-472-7395
Billings 406-245-8585
Hawaii
Nebraska
Honolulu 808-541-1912
Omaha 402-965-9670
Idaho
Nevada
Boise 208-334-1403
Las Vegas 702-388-6571
Reno 775-784-5354
Illinois
Chicago 312-353-5431
New Hampshire
Springfield 217-726-8453
Manchester 603-626-5631
Indiana
New Jersey
Indianapolis 317-226-6444
Atlantic City 609-487-1300
Newark 973-971-3100
Iowa
Trenton 609-989-2008
Des Moines 515-284-4565
New Mexico South Dakota
Albuquerque 505-248-5290 Sioux Falls 605-330-4565
The Terrorist Screening Center (TSC) maintains the U.S. government’s consolidated Terrorist Watchlist—
a single database of identifying information about those known or reasonably suspected of being
involved in terrorist activity.
By supporting the ability of front line screening agencies to positively identify known or suspected
terrorists trying to obtain visas, enter the country, board aircraft, or engage in other activity, the
consolidated Terrorist Watchlist is one of the most effective counterterrorism tools for the U.S.
government.
TSC is leading significant improvements in counterterrorism information sharing among federal, state,
local, and international agencies by distributing information about encounters with known or suspected
terrorists reported to its 24/7 call center.
To report specific violations and concerns about security, please contact the TSA Contact Center:
Phone: 1-866-289-9673
E-mail: TSA-ContactCenter@dhs.gov
To report suspicious activity at your local general aviation airport, contact the National Response Center.
Phone: 1-866-GA-SECURE or 1-866-427-3287 (24/7)
The IC is a federation of executive branch agencies and organizations that work separately and together
to conduct intelligence activities necessary for the conduct of foreign relations and the protection of the
national security of the United States. These activities include:
Collection of information needed by the President, the National Security Council, the Secretaries
of State and Defense, and other Executive Branch officials for the performance of their duties
and responsibilities;
Special activities;
Administrative and support activities within the US and abroad necessary for the performance
of authorized activities; and
Such other intelligence activities as the President may direct from time to time.
US Marshals District Offices
http://www.usmarshals.gov/district/index.html
The geographical structure of the U.S. Marshals Service mirrors the structure of United States district
courts. There are 94 federal judicial districts, including at least one district in each state, the District of
Columbia, the Commonwealths of Puerto Rico and the Northern Mariana Islands and the two territories
of the United States -- the Virgin Islands and Guam.
ALABAMA GEORGIA
Northern District of Alabama - 205-776-6200 Northern District of Georgia - 404-331-6833
Middle District of Alabama - 334-223-7401 Middle District of Georgia - 912-752-8280
Southern District of Alabama - 251-690-2841 Southern District of Georgia - 912-652-4212
OREGON - 503-326-2209
PENNSYLVANIA
Eastern District of Pennsylvania - 215-597-7273
Middle District of Pennsylvania - 570-346-7277
Western District of Pennsylvania - 412-644-3351
INFORMATION SHARING NETWORKS & RESOURCES
The American Board for Certification in Homeland Security (ABCHS) serves a diverse membership of
professionals including active and retired military, law enforcement and security experts, first
responders, and others dedicated to the important mission of protecting our nation. The ABCHS is
comprised of some of the world's leading professionals who have significant experience in homeland
security and emergency response.
Our total commitment, together with an extraordinary knowledge base provided by our members,
combined with an in-place organizational structure designed to deliver the highest quality training and
continuing education opportunities for homeland security and emergency response, places the ABCHS in
a pivotal position to make significant contributions to the most pressing issue facing our nation.
The Bomb Arson Tracking System (BATS) is a web-based case management system which provides you,
State and local arson & explosives investigators, access to up-to-date arson and explosives investigative
data from across the nation. Unlike anything you may currently use, it's not just limited to your local
jurisdiction or state. BATS provides you access to national arson and explosives incident information.
Consumer Sentinel is the unique investigative cyber tool that provides members of the Consumer
Sentinel Network with access to millions of consumer complaints. Consumer Sentinel includes
complaints about:
-- Identity Theft
-- Do-Not-Call Registry violations
-- Computers, the Internet, and Online Auctions
-- Telemarketing Scams
-- Advance-fee Loans and Credit Scams
-- Sweepstakes, Lotteries, and Prizes
-- Business Opportunities and Work-at-Home Schemes
-- Health and Weight Loss Products
-- Debt Collection, Credit Reports, and Financial Matters
Consumer Sentinel is based on the premise that sharing information can make law enforcement even
more effective. To that end, the Consumer Sentinel Network provides law enforcement members with
access to complaints provided directly to the Federal Trade Commission by consumers, as well as
providing members with access to complaints shared by data contributors, who include:
Consumer Sentinel has undergone a major overhaul, and is now powered by an enhanced search engine
and user interface, making it easier than ever to find the information that you need. In addition to the
new tools, the system has a spiffy new look and feel, and incorporates new data access and security
features.
Consumer Sentinel is free and available to any federal, state or local law enforcement agency. In
addition, Consumer Sentinel information is also available to select international law enforcement
authorities.
Cybercop -- http://www.cybercopportal.org/
The CyberCop Portal is designed to bridge system stovepipes between organizations by providing a
separate means to collaborate over the web using the security controls necessary to handle sensitive
but unclassified law enforcement information. The CyberCop Portal created and hosted by The ESP
Group, is entirely Web-based, meaning that no additional software clients need to be downloaded onto
users' machines. That allows CyberCop users to enter the portal from any machine, anywhere. The
Portal allows users to share libraries of documents and case studies, send secure e-mail, participate in
ongoing threaded discussions, create and distribute surveys and share online briefings. The Cybercop
mission is to provide individuals an ultra-secure web-based environment to promote and facilitate the
sharing of sensitive information among a cohesive network of cyber security, law enforcement, first
responders, homeland defense and law enforcement related professionals from all levels of
government; international, federal, state, local and the private sector, regardless of department
affiliation and jurisdictional boundaries. CyberCop is committed to providing a safe and secure
environment where ideas can be freely exchanged to aid individual efforts and foster cooperative efforts
in the fight against crime, terrorism and the security of our homeland.
El Paso Intelligence Center -- http://www.usdoj.gov/dea/programs/epic.htm
Access: https://www.esp.gov
The El Paso Intelligence Center was established in 1974 in response to a study by the Justice
Management Division of the U.S. Department of Justice entitled, "A Secure Border." Recommendation
number 7 of this study suggested the establishment of a southwest border intelligence center to be led
by the Drug Enforcement Administration (DEA) and staffed by representatives of that agency, as well as
the U.S. Customs Service. The initial focus of the Center was to assist in the identification of drug
traffickers and alien traffickers along the U.S. - Mexico border.
In 2001, immediately after the terrorist attacks in New York and Washington, DC, the multiagency
environment of EPIC was called upon to support investigations to find those responsible. EPIC’s mission
evolved from its experience in supporting interdiction efforts and investigations regarding drug
trafficking, alien and weapon smuggling, and other criminal activities, by adding counterterrorism to its
efforts.
EPIC is now staffed with over 300 personnel and liaison officers from 15 agencies. Agencies currently
represented at EPIC include the Drug Enforcement Administration; Department of Homeland Security;
Customs & Border Protection; Immigration & Customs Enforcement; U.S. Coast Guard; Federal Bureau
of Investigation; Bureau of Alcohol, Tobacco, Firearms and Explosives; U.S. Secret Service; U.S. Marshals
Service; National Drug Intelligence Center; Internal Revenue Service; U.S. Department of the Interior;
National Geospatial–Intelligence Agency; U.S. Department of Defense; Joint Task Force–North; Joint
Interagency Task Force–South; Texas Department of Public Safety; Texas Air National Guard; and the El
Paso County Sheriff’s Office.
EPIC’s vision is to continue to provide timely and expeditious support to Federal, State, local, tribal, and
international law enforcement agencies and to remain the premier tactical operational intelligence
center in the nation.
The FPS Portal is a compilation of FOUO products for law enforcement and first responders.
The FBI Citizen’s Academy is an outreach program of the Federal Bureau of Investigation which affords
business and community leaders an inside look at Federal law enforcement in general and the FBI family
in particular. The Academy allows you to meet and interact with personnel of the FBI in a positive and
informal setting sharing ideas and information.
The FBI Citizen’s Academy creates a closer connection between the FBI and the surrounding community
through an educational process; fosters greater understanding of the role of FBI policies and programs
through frank interactive discussions; and expands the pool of community leaders who understand first-
hand the complex challenges of Federal law enforcement through examination of actual FBI
investigations.
“First Observer” is a national safety and security program that uses the skills, experiences and "savvy" of
America's transportation professionals to help protect the critical transportation function that moves
the goods and services and people across America.
“First Observer” is operated by Team HMS under a Cooperative Agreement with the Department of
Homeland Security (DHS) Trucking Security Program (TSP). The program's mission is to administer an
anti-terrorism and security awareness program for highway professionals in support of the National
Preparedness Guidelines. A key component of the program is to recruit volunteers from the Trucking,
Motor Coach Carriers and School Bus industries to act as our “First Observer” in reporting suspicious
activities of either a criminal or potential terroristic nature to authorities.
The High Tech Crime Consortium is a 501(c) (3) nonprofit organization founded in 1998. It is a
professional organization that assists law enforcement and corporate investigators to obtain the
knowledge and skills needed to combat 21st Century crime where the use or abuse of digital technology
is an element of an offense. Members of HTCC comprise an international cadre of professionals
experienced in detection and investigation of digital crime and forensic examination of digital evidence,
practitioners of international, federal, and state criminal law, digital forensic software development or
information management and security.
HSIN is a comprehensive, nationally secure and trusted web-based platform able to facilitate Sensitive
But Unclassified (SBU) information sharing and collaboration between federal, state, local, tribal, private
sector, and international partners. The HSIN platform was created to interface with existing information
sharing networks to support the diverse Communities of Interest (COI) engaged in preventing,
protecting from, responding to, and recovering from all threats, hazards and incidents under the
jurisdiction of the Department of Homeland Security.
A key by-product of HSIN is the ability to provide real-time, interactive connectivity between states and
major urban areas and the National Operations Center (NOC). HSIN is focused on providing a
collaborative environment that interoperates with existing mission area systems developed and
managed by our federal, state and local partners. HSIN is focused on enhancing collaboration rather
than duplicating the capabilities provided by our partners. As a result of its unique perspective, HSIN
facilitates collaboration between mission areas such as Law Enforcement, Emergency Management, and
Critical Sectors.
HSIN-Intelligence -- https://hsin-intel.dhs.gov/
The Department of Defense information assurance portal. Provides a wide range of information
assurance products, information and training in support of the military services and the combatant
commands. Although some material is restricted to Department of Defense personnel, much of the
information and training provided by the Information Assurance Support Environment is available to the
general public.
Infragard -- http://www.infragard.net/
InfraGard is an information sharing and analysis effort serving the interests and combining the
knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between
the Federal Bureau of Investigation and the private sector. InfraGard is an association of businesses,
academic institutions, state and local law enforcement agencies, and other participants dedicated to
sharing information and intelligence to prevent hostile acts against the United States. InfraGard
Chapters are geographically linked with FBI Field Office territories.
IntelCenter - http://www.intelcenter.com/
The IntelCenter focus is on studying terrorist groups and other threat actors and disseminating that
information in a timely manner to those who can act on it. The IntelCenter looks at capabilities and
intentions, warnings and indicators, operational characteristics and a wide variety of other points in
order to better understand how to interdict terrorist operations and reduce the likelihood of future
attacks.
The results of this work is then disseminated in a variety of Alert, Current Intelligence and Analytical
Resource services. It also provides the foundation for our field books such as the "First Responder Chem-
Bio Handbook." The IntelCenter's primary client base is comprised of military, law enforcement and
intelligence agencies in the US and other allied countries around the world.
Intelink -- https://www.intelink.gov/
Intelligence Is The Future Intelligence Applications & Analysis for Law Enforcement --
http://www.intelligenceisthefuture.com/
This web page was established for a variety of law enforcement professions, including those with a focus
on analysis, intelligence, research, and investigations. The site may also benefit students and faculty
members in various academic programs, to include Criminal Justice, Political Science, and Intelligence.
Additional products are available related to the intelligence community and the military. All products
available on this website are based on open source information, and does not include any sensitive or
restricted caveats.
The International Association of Crime Analysts was formed in 1990 to help crime analysts around the
world improve their skills and make valuable contacts, to help law enforcement agencies make the best
use of crime analysis, and to advocate for standards of performance and technique within the
profession itself. IACA membership is around 1,500 members and climbing. Members include crime
analysts, intelligence analysts, police officers of all ranks, educators, and students. The majority of our
members (roughly 86%) are from agencies within the United States of America. Non-U.S. members
include analysts from Argentina, Australia, Brazil, Cameroon, Canada, the Cayman Islands, Chile, China,
Cyprus, Fiji, Finland, France, Germany, Greece, Haiti, India, Israel, Italy, Jordan, Kenya, Luxembourg,
Malaysia, Mexico, the Netherlands, New Zealand, Nigeria, Norway, Pakistan, the Philippines, Poland,
Portugal, Russia, Rwanda, South Africa, Spain, Sweden, Switzerland, Trinidad & Tobago, Turkey, the
United Arab Emirates, the United Kingdom, and Venezuela.
IALEIA is the largest professional organization in the world representing law enforcement analysts. It is
based in the United States, and is a non-profit 501-c-3 corporation. IALEIA is managed by an
international Board of Directors made up of seventeen elected IALEIA members. Several board members
are also supported by volunteer committees. IALEIA has a paid administrator, and an Executive Advisory
Board appointed by the President. IALEIA supports chapters throughout the world, in accordance with a
policy manual. IALEIA has a certification program for analysts, a code of ethics and bylaws providing
structure for the organization. We represent law enforcement analysts in a variety of venues, and
provide an environment of community by establishing regional chapters. We also provide liaison to
members worldwide with Regional Directors who sit on the IALEIA Board.
Law Enforcement Intelligence Unit (LEIU) -- http://leiu-homepage.org/index.php
In the mid 1950's, local and state law enforcement agencies in the United States recognized that no
single agency or organization was responsible for receiving, collating, maintaining, and disseminating
information on persons involved in organized crime. These law enforcement agencies surmised correctly
that organized crime would exploit advancing technologies in transportation and communications,
become more mobile, and increase their spheres of influence and criminal activities. As a result, twenty-
six (26) law enforcement agencies met in San Francisco, California on March 29, 1956 to discuss
problems and possible solutions. The most important result of that meeting was the creation of the LEIU
– The LAW ENFORCEMENT INTELLIGENCE UNIT and the development of an organizational purpose that
survives to this day. The purpose of LEIU is to gather, record, and exchange confidential information not
available through regular police channels, concerning organized crime and terrorism. LEIU is an
association of state and local police departments, similar in many respects to numerous other
professional associations serving doctors, attorneys, journalists, and educators. LEIU has no employees
and no capability as an entity to conduct any investigation or law enforcement activity of any kind. Each
member agency is bound by, and acts pursuant to local law and their own agency regulations.
LEO is a 7 days a week, 24 hours a day online (real-time), controlled-access communications and
information sharing data repository. It provides an Internet accessible focal point for electronic Sensitive
But Unclassified (SBU) communication and information sharing for the international, federal, state, local,
and tribal law enforcement agencies. LEO also supports antiterrorism, intelligence, law enforcement,
criminal justice, and public safety communities worldwide. Users anywhere in the world can
communicate securely using LEO.
Lessons Learned Information Sharing (LLIS.gov) is the national network of Lessons Learned, Best
Practices, innovative ideas, and preparedness information for homeland security and emergency
response professionals. By facilitating the sharing of knowledge, LLIS.gov enhances the nation's ability to
prepare for and respond to terrorism, natural disasters, and other incidents. LLIS.gov is not only a
repository for information but also a network that enables homeland security and emergency response
professionals from across the country to share their knowledge and expertise in a secure, online
environment.
Mission - The mission of the MS-ISAC is to provide a common mechanism for raising the level of cyber
security readiness and response in each state and with local governments. The MS-ISAC provides a
central resource for gathering information on cyber threats to critical infrastructure from the states and
providing two-way sharing of information between and among the states and with local government.
The National Counterterrorism Center (NCTC) was established by Presidential Executive Order 13354 in
August 2004, and codified by the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA).
NCTC integrates foreign and domestic analysis from across the Intelligence Community (IC) and
produces a wide-range of detailed assessments designed to support senior policymakers and other
members of the policy, intelligence, law enforcement, defense, homeland security, and foreign affairs
communities. By law, NCTC serves as the USG’s central and shared knowledge bank on known and
suspected terrorists and international terror groups. NCTC also provides USG agencies with the
terrorism intelligence analysis and other information they need to fulfill their missions. NCTC collocates
more than 30 intelligence, military, law enforcement and homeland security networks under one roof to
facilitate robust information sharing. NCTC is a model of interagency information sharing.
The National Criminal Intelligence Resource Center (NCIRC) is sponsored by the Bureau of Justice
Assistance (BJA) for the purpose of providing a secure web-site developed to serve as a "one-stop shop"
for local, state, tribal, and federal law enforcement to keep up with the latest developments in the field
of criminal intelligence. The NCIRC web-site contains information regarding law enforcement
intelligence operations and practices. It provides criminal justice professionals with a centralized
resource information bank to access a multitude of criminal intelligence resources in a secure
environment.
NCIRC can only be accessed through the secure Regional Information Sharing Systems® (RISS) network
(RISSNET™) and the Federal Bureau of Investigation's (FBI) Law Enforcement Online (LEO).
The mission of National Equipment Register, Inc. (NER) is to increase the recovery rate of stolen
equipment and reduce the costs associated with theft for owners and insurers.
NER combines systems, staff and procedures to provide secure, accurate information services to law
enforcement, insurers, equipment owners and the equipment industry. Operations revolve around a
database of stolen equipment, a database of equipment ownership, NER operators, a network of
investigators and training and awareness programs.
Law enforcement, criminal justice, and regulatory agency personnel may obtain online access to ISO’s
ClaimSearch, the insurance industry’s “All Claim Database”, which includes property and casualty claims
data along with vehicle related information through the National Insurance Crime Bureau (NICB).
“Qualified” law enforcement agencies will be able to see all information the ISO ClaimSearch database
contains pertaining to vehicles, casualty claims, and property claims, including individuals’ names,
addresses and the following numeric identifiers:
The National Missing and Unidentified Persons System (NamUs) is a clearinghouse for missing persons
and unidentified decedent records. NamUs is a free online system that can be searched by medical
examiners, coroners, law enforcement officials and the general public to solve these cases.
The mission of NW3C is to provide a nationwide support system for agencies involved in the prevention,
investigation, and prosecution of economic and high-tech crimes and to support and partner with other
appropriate entities in addressing homeland security initiatives, as they relate to economic and high-
tech crimes.
While NW3C has no investigative authority itself, its job is to help law enforcement agencies better
understand and utilize tools to combat economic and high-tech crime.
The Office of the National Counterintelligence Executive (ONCIX) is part of the Office of the Director of
National Intelligence and is staffed by senior counterintelligence (CI) and other specialists from across
the national intelligence and security communities. The ONCIX develops, coordinates, and produces:
OpenSource.gov provides timely and tailored translations, reporting and analysis on foreign policy and
national security issues from the Open Source Center and its partners. Featured are reports and
translations from thousands of publications, television and radio stations, and Internet sources around
the world. Also among the site's holdings are a foreign video archive and fee-based commercial
databases for which OSC has negotiated licenses. OSC's reach extends from hard-to-find local
publications and video to some of the most renowned thinkers on national security issues inside and
outside the US Government. Accounts are available to US Government employees and contractors.
The Overseas Security Advisory Council (OSAC) is a Federal Advisory Committee with a U.S. Government
Charter to promote security cooperation between American business and private sector interests
worldwide and the U.S. Department of State. OSAC currently encompasses the 34-member core Council,
an Executive Office, over 100 Country Councils, and more than 3,500 constituent member organizations
and 372 associates.
RISS is a national program of regionally oriented services designed to enhance the ability of local, state,
federal, and tribal criminal justice agencies to:
Identify, target, and remove criminal conspiracies and activities spanning multijurisdictional,
multistate, and sometimes international boundaries.
Facilitate rapid exchange and sharing of information among the agencies pertaining to known
suspected criminals or criminal activity.
Enhance coordination and communication among agencies that are in pursuit of criminal
conspiracies determined to be inter-jurisdictional in nature.
RISS supports a proactive, preventive approach and offers services, tools, and resources to aid law
enforcement and criminal justice entities to identify, disrupt, and prevent terrorist and criminal
activities.
The RISS Program operates in all 50 states, the District of Columbia, U.S. territories, Australia, Canada,
and England. RISS is the collective effort of six regional centers. While the RISS centers operate
independently and are tailored to support the unique needs of the region served, they also operate as a
collective body to address national criminal justice issues.
The capability displays conventional maps, digital satellite imagery or both, and it can create custom
map overlays. The maps can be configured to display icons for key places.
SENTRY -- http://www.usdoj.gov/ndic/sentry/index.htm
The National Drug Intelligence Center (NDIC) SENTRY is an Internet-based system designed to collect
and disseminate synthetic drug-related data in order to identify new trends at an early stage, evaluate
their likely importance, and track their development.
SENTRY focuses on synthetic drugs that are primarily produced via a chemical process, such as LSD
(lysergic acid diethylamide), MDMA (3,4-methylenedioxymethamphetamine, also known as ecstasy),
and methamphetamine. To be truly effective as an early warning system, however, the system also
monitors prescription drugs, over-the-counter medications, botanical substances and extracts, and
chemicals and products involved in the manufacturing of synthetic drugs.
SENTRY is accessible at www.sentry.usdoj.gov or via the NDIC Internet site. From the SENTRY web site,
authorized users can submit information on a new or unusual synthetic drug-related activity via an
electronic submission form, link to partner agencies and our listserv, search and receive NDIC products,
and view previously reported submissions using the geographic information system capabilities.
The State and Local Anti-Terrorism Training (SLATT) Program is funded by the United States Department
of Justice, Bureau of Justice Assistance. The Program provides specialized training for law enforcement
personnel in combating terrorism and extremist criminal activity. In order to ensure that SLATT training
always delivers the most up-to-date information, terrorism-related topics are constantly researched and
reviewed, and timely information is offered regarding pre-incident preparation, investigation,
prevention, and interdiction training.
The SLATT Program has been proactively involved in anti-terrorism research and training since 1996. It is
entirely separate and fulfills a different need from First Responder and other related Weapons of Mass
Destruction/Nuclear, Biological, and Chemical response training provided to emergency service
personnel. SLATT focuses on the prevention of terrorism in the United States by providing the tools
necessary for state and local law enforcement officers to understand, detect, deter, and investigate acts
of terrorism in the United States by both international and domestic, or homegrown terrorists.
TRIPwire -- https://www.tripwire-dhs.net/
TRIPwire is sponsored by the Department of Homeland Security's Office for Bombing Prevention
(DHS/OBP). TRIPwire is an online network designed to provide the state and local bombing prevention
community with information on terrorist tactics, techniques, and procedures (TTPs) in order to better
identify prevention opportunities involving improvised explosive devices (IEDs). TRIPwire aims to serve
the bombing prevention community as a "one-stop resource" by offering a consolidated and expert-
validated resource of near real-time information on improvised explosives and explosive devices (IEDs),
relevant news, and threat alerts. It also facilitates information sharing and networking by offering
collaboration tools such as community forums and secure e-mail.
The United States Private and Public Partnership (USP3) is a Private Sector collaboration with various
local, state and federal partners. Each USP3 partner participant is self governed, self-vetted and self-
administered. USP3 provides a common network and repository for its members for daily routine
information sharing and 24/7 emergency notifications. Member enrollments are unique to the partners
participating in USP3 and are normally decision makers in both the private and public sectors.
USP3 is designed to serve as a coordination conduit for private and public outreach programs creating a
national cross sector membership. Members in USP3 normally have a key responsibility to prevent and
respond to emergency incidents that can adversely affect their community or commercial interest.
Membership and participation in USP3 is free, upon meeting the enrollment criteria established by the
individual partners which make up USP3 and the USP3 National Governance. Once enrolled, the
members of the various private and public partners are provided with (Horizontal and Vertical) routine
information sharing and 24/7 alert and notification capabilities.
Information used to develop intelligence comes from a variety of sources, with a wide degree of
reliability and credibility. It is the job of the intelligence analyst to use these sources of information to
build an accurate and up-to-date picture of the current situation and operational environment in order
to allow users of produced intelligence products to make informed decisions.
In order to produce accurate intelligence products the information fed into the intelligence cycle must
be evaluated for reliability and accuracy. In intelligence reporting information is evaluated and assigned
an alphanumeric designation which reflects the reliability of the source of the information based on past
experience and the accuracy of the information provided as it relates to other information already
known.
There are two standardized systems of information evaluation: the LEIU Criminal Intelligence File
Guidelines and the NATO STANAG 2022 military guideline.
The LEIU Criminal Intelligence File Guidelines provide the following standard for source / information
evaluation. (http://www.it.ojp.gov/documents/LEIU_Crim_Intell_File_Guidelines.pdf)
"Information to be retained in the criminal intelligence file should be evaluated and designated for
reliability and content validity prior to filing. The bulk of the data an intelligence unit receives consists of
unverified allegations or information. Evaluating the information's source and content indicates to future
users the information's worth and usefulness. Circulating information which may not have been
evaluated, where the source reliability is poor or the content validity is doubtful, is detrimental to the
agency's operations and contrary to the individual's right to privacy. To ensure uniformity with the
intelligence community, it is strongly recommended that stored information be evaluated according to
the criteria set forth below.
Source Reliability:
(A) Reliable - The reliability of the source is unquestioned or has been well tested in the past.
(B) Usually Reliable - The reliability of the source can usually be relied upon as factual. The
majority of information provided in the past has proven to be reliable.
(C) Unreliable - The reliability of the source has been sporadic in the past.
(D) Unknown -The reliability of the source cannot be judged. Its authenticity or trustworthiness
has not yet been determined by either experience or investigation.
Content Validity:
The military uses a similar system of evaluation based on the letters A-F and the numbers 1-6, as
referenced in NATO STANAG 2022, and various other military publications.
Because both the LEIU and the military system are each widely used it is important to differentiate
between the two systems in intelligence reports. Failure to do so can result in confusion. For example is
an evaluation of C3 a fairly reliable source providing possibly true information or an unreliable source
providing doubtful information? To avoid this confusion, evaluation rating is best listed, for example, as
C3 (LEIU) or C3 (MIL).
Intelligence assessments are supported by information that varies in scope, quality, and sourcing.
Consequently, intelligence analysts ascribes high, medium, or low levels of confidence to judgments, as
follows:
-- High confidence generally indicates judgments are based on high-quality information from
multiple sources or from a single highly reliable source and/or the nature of the issue makes it possible
to render a solid judgment.
-- Medium confidence generally means the information is credibly sourced and plausible but can
be interpreted in various ways or is not of sufficient quality or corroborated sufficiently to warrant a
higher level of confidence.
Probability Ratings
After all the available data concerning each risk and its factual circumstances have been gathered, a
probability rating can be assigned to that risk. Ratings will not consider any precaution or
countermeasure that may later be taken to reduce or eliminate the risk. A primary purpose of such
unconditioned ratings is to allow for later priority scheduling in the selection of countermeasures. It may
be enough to be able to say one event is more probable than another. To say this about entire series or
categories of events, it must be possible to assign each to some class that can then be compared with
other classes to arrive at a conclusion of “more likely” or “less likely.” Five categories of probability can
establish useful distinctions among events, as follows:
(A) Virtually Certain — Given no changes, the event will occur. For example, given no changes, a closed
intake valve on a sprinkler riser will prevent water flow in event of fire.
(B) Highly Probable — The likelihood of occurrence is much greater than that of nonoccurrence. For
example, unprotected currency lying visible on a counter is very likely to be taken.
(C) Moderately Probable — The event is more likely to occur than not to occur.
(D) Less Probable — The event is less likely to occur than not to occur. This does not imply impossibility,
merely improbability.
This approximate system of ratings contains wide latitude for variation. Two observers could assign
different probabilities to the same risk, based upon different evaluations of the circumstances. But an
advantage of this technique is that absolute precision is not important. If the correct general label can
be attached, it doesn’t matter that a highly probable risk might have a ratio of .751 or .853. What is
important is to be able to segregate all risks of virtually certain probability from all others, and to make
similar distinctions for each other general class. Even competent professionals may disagree on what is
highly probable and what is moderately probable. To compensate for inexactness, if a rating is in doubt
after all available information has been gathered and evaluated, then the higher of two possible ratings
should be assigned.
Rating Symbols. To save time and space, five levels of probability can be assigned the symbols A, B, C, D,
and E, ranking downward from “Virtually Certain” to “Probability Unknown.” These symbols later will be
combined with symbols representing criticality in the development of priority lists. It should be noted
that the probability rating E, or “Probability Unknown,” is merely a temporary rating pending the
development of all relevant data. In the construction of threat logic patterns, E ratings will be replaced
by one of the definite ratings.
Intelligence Cycle
The intelligence cycle is a five step process of developing unrefined information into an intelligence
product for use by decision makers.
Planning and Direction is the management of the intelligence effort. This ranges from identifying initial
requirements to delivery of the end product to the decision makers.
Collection is the gathering of raw information based on identified requirements. Collection can include
research, investigation, source operations and the use relationships developed through liaison.
Processing and Exploitation takes the large amounts of raw information gathered during collection and
puts it into a form that can be analyzed. When processing information we look at factors such as
accuracy, objectivity, authority, currency and quality. Processing and exploitation may also include
language translation, decryption, and data reduction. This information is then entered into databases
where it can be used in analysis and production.
Analysis and Production take raw processed information and converts it into intelligence. The
information is reviewed for reliability and relevance, put into context and then used to produce
intelligence products. Analysis and production develops both raw intelligence and finished intelligence
products. Raw intelligence consists of individual pieces of analyzed information, which are disseminated
individually, while finished intelligence puts raw intelligence into context, integrates it with other
intelligence products and provides conclusions about its meaning and implications.
Dissemination is perhaps the most important step of the intelligence cycle. Intelligence must be
provided to the decision makers who initiated the intelligence requirements to allow them to make the
best informed decisions. Intelligence that it not disseminated serves no purpose since it is never used by
decision makers. Intelligence can be distributed in many ways, such as Intelligence Information Reports
(IIRs), Intelligence Bulletins, and Intelligence Assessments. These intelligence products provided to
decision makers will often generate new intelligence requirements - feeding back into the planning and
direction step of a continuous intelligence cycle.
What is intelligence?
“Intelligence is the product resulting from the collection, processing, integration, evaluation, analysis,
and interpretation of available information concerning foreign nations, hostile or potentially hostile
forces or elements, or areas of actual or potential operations. The term is also applied to the activity
which results in the product and to the organizations engaged in such activity.”
(Source: Joint Pub 2-0, Joint Intelligence, dtd. 22 June 2007)
Signals Intelligence (SIGINT) is derived from the exploitation of foreign electronic emissions. SIGINT can
be in the form of the actual information content of a signal or in the form of its temporal and spectral
characteristics called signal operating parameters. SIGINT includes both the raw data and the analysis
product of that data. SIGINT breaks down into four sub disciplines: Electronic Intelligence (ELINT),
Communications Intelligence (COMINT), Foreign Instrumentation Signals Intelligence (FISINT), and
weapons-related Command and Control Signals (PROFORMA).
Imagery Intelligence (IMINT) is a product that is the result of processing and exploiting raw imagery
(information) and creating an analyzed product (intelligence). An image alone is only information in the
form of pixels, digits, or other forms of graphic representation and the data behind that portrayal. When
studied for content with an understanding of portrayal, imaging processes, and the place, objects and
time captured by that process, or through comparison to other images and consideration in light of
other information or intelligence, imagery intelligence (IMINT) can be created.
Measurement and Signature Intelligence (MASINT) is scientific and technical intelligence information
obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time
dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the
purpose of identifying any distinctive features associated with the source, emitter, or sender and to
facilitate subsequent identification and/or measurement of the same.
Human-Source Intelligence (HUMINT) is intelligence derived from human beings who may act as both
sources and collectors, and where the human is the primary collection instrument. This includes all
forms of intelligence gathered by humans, from direct reconnaissance and observation to the use of
recruited agents. HUMINT may also encompass interrogation techniques, including the process of
questioning detainees conducted in compliance with U.S. law and regulation, international law,
executive orders, and other operationally specific guidelines. HUMINT can provide a wide range of
information which includes but is not limited to adversary plans and intentions, deliberations and
decisions, research and development goals and strategies, doctrine, leadership, political or military
relationships, weapons systems, physical and cultural infrastructure, and medical conditions. HUMINT
can often collect information that is difficult or sometimes impossible to collect by other, more
technical, means.
Geospatial Intelligence (GEOINT) is the intelligence derived from the exploitation of imagery and
geospatial information to describe, assess, and visually depict physical features and geographically
referenced activities on the Earth.
(Source: Interagency Threat Assessment and Coordination Group - "Intelligence Guide for First Responders")
Extracted from: DHS Information Sharing Environment (ISE), Functional Standard (FS), Suspicious Activity Reporting (SAR), version 1.0 (ISE-FS-
200), Part B – ISE-SAR Criteria Guidance
Testing of Security -- Interactions with, or challenges to installations, personnel, or systems that reveal
physical, personnel, or cyber security capabilities.
Flyover -- Suspected over-flight of a facility/infrastructure; this includes any type of flying vehicle (e.g.,
airplanes, helicopters, unmanned aerial vehicles, hang gliders).
Sector-Specific Incident -- Actions associated with a characteristic of unique concern to specific sectors
(such as the public health sector), with regard to their personnel, facilities.
Recruiting -- Building of operations teams and contacts, personnel data, banking data or travel data.
Appendix A: Ten Key Indicators of Potential Terrorist Associated Insider Threats to the Army.
Commanders must ensure their soldiers are aware of the indicators below and the need to report any
such incidents to their chain of command and the local counterintelligence (CI) office. These indicators
are intended to highlight behaviors or activities that point to potential terrorist insider threats to the
army (i.e. potential national security threats).
The following activities may be indicators of potential terrorist activity and should be reported
immediately to your chain of command:
1. Advocating violence, the threat of violence, or the use of force to achieve goals that are
political, religious, or ideological in nature.
6. Repeated browsing or visiting internet websites that promote or advocate violence directed
against the united states or U.S. forces, or that promote international terrorism or terrorist
themes without official sanction in the performance of duty.
Controlled Unclassified Information is information that while unclassified still requires control
over its distribution and use. This information can fall into several categories, including Department of
Defense "For Official Use Only" information, "Protected Critical Infrastructure Information", "Law
Enforcement Sensitive" information, "Security Sensitive Information", and similar information that may
be exempt from disclosure under the Freedom of Information Act and related state statutes, or that
because of mission requirements, business prudence, legal privilege, the protection of personal or
commercial rights, safety, or security should otherwise be protected from public disclosure. On 9 May
2008, Controlled Unclassified Information was designated by President George Bush as the single
categorical designation for most information previously referred to as "Sensitive But Unclassified" (SBU)
Although the Controlled Unclassified Information designation only officially applies to the
Executive Branch of government, information exists in both the public and private sector that meets the
intent of the Controlled Unclassified Information designation. For example, within the corporate
environment we have proprietary or business sensitive information, that while not consisting of trade
secrets (which would be protected under the Uniform Trade Secrets Act or other state statutes) is
information that should still be protected from public disclosure.
Public information is that information which is lawfully, broadly and generally disclosed to the
public at large. While there may be some restrictions, such as copyrights, on public information there is
no restriction or limitation on who can see or otherwise access public information. Public information is
intended to be disclosed to the public.
We may then define Controlled Unclassified Information as that information which does not
contain national security information (and therefore cannot be classified), does not contain trade
secrets, but which also does not meet the definition of public information and should therefore be
protected against inappropriate disclosure.
The following handling procedures should be used for all Controlled Unclassified Information:
Marking: All Controlled Unclassified Information will be appropriately marked to indicate its
sensitive nature. A coversheet will be the top-most page of all printed Controlled Unclassified
Information.
Storage: When not in your immediate possession, store Controlled Unclassified Information in a
secure environment such as a locked desk drawer or locked container. Do not leave Controlled
Unclassified Information unsecured and unattended.
Transmission --
Hand Delivery: Authorized individuals may hand carry Controlled Unclassified Information as
long as access to the material is controlled while in transit. Controlled Unclassified
Information carried on removable electronic media (i.e. USB Drives or CD-ROM) should be
password-protected.
Mail: United States Postal Service First Class mail or commercial equivalent. Place
Controlled Unclassified Information in an opaque envelope or container, sufficiently sealed
to prevent inadvertent opening and to show evidence of tampering, and then place this
envelope or container in a second envelope that has no marking on it to identify the
contents as sensitive or controlled information. The outer envelope or container must bear
the complete name and address of the sender and addressee. The outer envelope will have no
markings that indicate the contents contain Controlled Unclassified Information and must bear
the following below the return address: “POSTMASTER: DO NOT FORWARD. RETURN TO
SENDER.” Use of 'Delivery Conformation' (PS Form 152, or commercial equivalent) is
recommended.
Fax: Use of a secure fax is encouraged, but not required. When sending via non-secure fax,
coordinate with the recipient to ensure that the faxed materials will not be left unattended or
subjected to unauthorized disclosure on the receiving end.
Telephone: You are encouraged to use a Secure Telephone Unit/Equipment. Use cellular
phones to discuss Controlled Unclassified Information only in exigent circumstances.
Reproduction: Ensure that a copy of a Cover Sheet is the first page of all reproductions
containing Controlled Unclassified Information. Clear copy machine malfunctions and ensure
all paper paths are checked for Controlled Unclassified Information. Destroy all unusable pages
immediately.
Destruction: Destroy (i.e., shred or burn) Controlled Unclassified Information when no longer
needed. For Controlled Unclassified Information on laptops or CPUs, delete file and empty
recycle bin.
OPSEC (Operations Security) is a process used to deny a competitor or adversary information concerning
your intentions and capabilities by identifying, controlling and protecting indicators associated with your
planning processes or operations.
• Assess Threat.
• Analyze Vulnerabilities.
• Analyze Risk.
• Apply Countermeasures.
The goal of threat assessment is to determine the real extent of a threat. A threat requires both intent
and capability. If one or the other is not present, there is no threat.
Analyze Vulnerabilities
Analyze Risk
Risk is the likelihood of an undesirable event occurring and the consequences of that event. Risk analysis
is the process of determining the potential for a threat’s success to acquire, exploit and capitalize on
critical information.
Apply Countermeasures
Countermeasures are anything that effectively negates a threat’s ability to exploit vulnerabilities.
• Changes in procedure
• Controlling dissemination
• Speed of execution
• Awareness training
Criminal intelligence plays a vital role in the safety and security of our country. 28 CFR Part 23 was
issued in 1980 to ensure the privacy and constitutional rights of individuals during the collection and
exchange of criminal intelligence information, and it has since been an important part of the intelligence
landscape.
To facilitate greater understanding of 28 CFR Part 23, the Bureau of Justice Assistance has developed the
Criminal Intelligence Systems Operating Policies (28 CFR Part 23) online training. This training is designed
to help state and local law enforcement understand the guidelines that govern the development and
implementation of policies and systems that facilitate intelligence sharing.
Training Includes:
-- Overview of the Regulation
-- Compliance Requirements
-- Storage Requirements
-- Inquiry and Dissemination Requirements
-- Review and Purge Requirements
28 CFR Part 23 online training is on the National Criminal Intelligence Resource Center (NCIRC) secure
Web site: http://www.ncirc.gov/
http://www.cpe.rutgers.edu/courses/current/ep0601ca.html
The 40-hour certificate program was designed specifically to provide awareness level training to health
officers and administrators, public health nurses, health educators, registered environmental health
specialists, epidemiologists, and planners at municipal, county and regional health departments based
upon needs assessments for those groups.
ACT Online content was developed by the University of Memphis Center for Information Assurance
which is recognized by the US Department of Homeland Security and the National Security Agency as a
National Center of Academic Excellence in Information Assurance Education.
In addition to the in-depth knowledge gained by each online course, ACT Online provides several
advantages over other online learning programs. These include;
There is no cost to you. Since the ACT Online program is funded by the US Department of
Homeland Security, all training is provided free of charge.
The ACT Online courseware allows you to train and take examinations at your own convenience
and pace. You can exit the courseware at any time and resume where you left off, even during
an examination.
Completion of each course provides you with a Certificate of Completion from the Department
of Homeland Security/FEMA but more importantly, we teach you invaluable skills which in turn,
makes you a more valuable member of your company.
This free web-based training is provided as an introduction to Anacapa’s scheduled and on-site courses
in intelligence analysis. Upon completion of all three training modules, you may obtain a certificate of
completion.
Introduction to Intelligence Analysis (1 to 2 Hours)
Data Collection Tradeoffs (2-3 Hours)
Critical Thinking Strategies (2-3 Hours)
This course was created in partnership with the Federal Law Enforcement Training Center (FLETC).
Together, our goal was to offer FLETC's Anti-Terrorism Intelligence Awareness Training course in an
online format, in effort to reach a broader audience that may not otherwise be able to attend this
course in a traditional classroom format. Through federal funding from the Department of Justice, COPS
Office, this course is offered at no charge to participants. This program was developed originally by the
FLETC's Office of State and Local Training (www.fletc.gov/osl) with funding from the Department of
Homeland Security, Office of Grants and Training. This program is designed to give the line officer and
first line supervisor an awareness of terrorism, intelligence, current local trends of intelligence, and pre-
incident indicators.
Department of Defense anti-terrorism awareness training program. The purpose of this training is to
increase your awareness of terrorism and to improve your ability to apply personal protective measures.
Completion of this training meets the annual requirement for Level I antiterrorism training prescribed by
DoDI 2000.16.
Basic Intelligence Analyst Course (Course Revised 16 March 2009)
https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/12132-1/ACCP/301-D15/301-D15.HTM
This US Army Correspondence Course Program (ACCP) Course consists of five (5) sub-courses:
Course material is publically available, however formal enrollment is only available to U.S. Active and
Reserve military officers, warrant officers, and enlisted personnel; Reserve Officers' Training Corps,
National Guard Officer Candidate School, West Point cadets, and authorized federal civilian employees.
The Naval Postgraduate School Center for Homeland Defense and Security offers non-credit, self-study
courses online. These courses are developed by the NPS CHDS teaching faculty and are derived from
course content (lecture material and course readings) from the Center's homeland security master's
degree curriculum. The courses, offered at no cost, are designed for homeland defense and security
professionals who wish to enhance their understanding of key homeland security concepts and require
the flexibility of self-paced instruction.
Self-Study Courses:
Homeland Security in Israel
The Global Jihadi Threat
Technology for Homeland Security: Inspection and Detection Technologies
Critical Infrastructure: Vulnerability Analysis and Protection
Research Process and Methods
The DSS Academy provides security education and training to DoD and other U.S. Government
personnel, DoD contractors, and sponsored representatives of foreign governments. Its professional
staff of instructors, technology professionals, and education support personnel combine expertise to
create, collaborate and facilitate delivery of quality education and training across the security
disciplines.
The DSS Academy offers both resident and on-line courses. On-line courses include:
Antiterrorism Officer (ATO) Level II (GS109.16) Visits and Meetings in the NISP (IS105.16)
The following new e-learning courses have been added to the DSSA February 2010 course catalog:
Detecting Bio-terror provides an overview of forensic epidemiology and the activities of law
enforcement officers, laboratory professionals, and public health personnel in joint investigations of
bioterrorist events. The course provides not only instructional content on a wide variety of bioterrorism-
related concepts, it also dramatizes a bioterrorism investigation in a “mystery movie,” provides case
studies, links, and other instructional tools.
The President's DNA Initiative provides funding, training, and assistance to ensure that forensic DNA
reaches its full potential to solve crimes, protect the innocent, and identify missing persons. The web-
site offers extensive information, including free on-line training.
Drawn directly from joint publications without interpretation, each DOCNET course represents an
authoritative source of information for use by the Armed Forces of the United States and other
Government professionals who require joint doctrine knowledge. DOCNET can be used as an
information source, to supplement Professional Military Education, or for college credit.
Commercial - 410-981-1181
Outreach Requests - 410-981-0127
Toll Free - 877-981-3235
DSN - 622-2595
The Department of Defense Cyber Crime Center (DC3) sets standards for digital evidence processing,
analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect,
enhance, or recover digital media, including audio and video. The center assists in criminal,
counterintelligence, counterterrorism, and fraud investigations of the Defense Criminal Investigative
Organizations (DCIOs) and DoD counterintelligence activities. It also supports safety investigations and
Inspector General and commander-directed inquiries. DC3 aids in meeting intelligence community
document exploitation objectives from a criminal law enforcement forensics and counterintelligence
perspective. DC3 provides computer investigation training to forensic examiners, investigators, system
administrators, and any other DoD members who must ensure Defense information systems are secure
from unauthorized use, criminal and fraudulent activities, and foreign intelligence service exploitation.
DC3 remains on the leading edge of computer technologies and techniques through research,
development, testing, and evaluation applied to digital evidence processing and computer forensic
analysis; and by partnering with governmental, academic, and private industry computer security
officials.
The Defense Cyber Investigations Training Academy (DCITA) develops and delivers cyber investigation
training courses for DoD organizations, Defense Criminal Investigative Organizations, military
counterintelligence agencies, and law enforcement organizations.
The Academy is the only government organization solely dedicated to cyber investigations training,
development, and delivery. Students are trained in the latest digital forensic techniques using state-of-
the-art equipment, classrooms, and technologies. DCITA training includes:
DCITA is accredited through the Council of Occupational Education (COE). Recognized by the
U.S. Department of Education, COE’s mission is to assure quality training in career and technical
development.
DoD Defense Support of Civil Authorities (DSCA) Course -- https://www.usarnorth.org/public/
The DoD Defense Support of Civil Authorities (DSCA) Course focuses on training senior military officers,
Department of Defense (DoD) civilians, and their staff to ensure the DoD’s readiness to support its
Homeland Defense and Civil Support missions.
The course will introduce participants to National, State, Local, and DoD statutes, directives, plans,
command and control relationships, and capabilities with regard to disaster and emergency response.
For general inquiries about the website or the academy, contact Janet Lee at 505-842-7110 or
jlee@eota.energy.gov
The Emergency Operations Training Academy provides state-of-the-art training and education for the
Department of Energy/National Nuclear Security Administration, to enhance the readiness of personnel
in the emergency operations community.
This online training was developed to help law enforcement officers obtain a working knowledge of
Spanish and apply it to law enforcement situations. The course walks viewers through English
translations, phonetic spellings and pronunciations of Spanish words in situations involving interviews,
crime scenes, motor vehicles and domestic violence. Free registration.
The FBI Virtual Academy (FBIVA): a structured, efficient, electronically delivered system of learning that
adds value to the forensic science, law enforcement, and judicial communities by providing a single,
comprehensive learning solution that offers a web-based means of accessing and acquiring the essential
knowledge, skills, and competencies (through relevant and consistent training and materials) needed to
support the worldwide criminal justice community.
The FIAT course was developed by a consortium that included the National White Collar Crime Center
(NW3C), Law Enforcement Intelligence Unit (LEIU), the International Association of Law Enforcement
Intelligence Analysts (IALEIA), and the Regional Information Sharing System (RISS).
FIAT is approved for the use of state DHS/FEMA training funds — course number WV-001-PREV
FIAT Topics:
Language courses developed by the Foreign Service Institute. These courses were developed by the
United States government and are in the public domain.
FSI-language-courses.com is not affiliated in any way with any government entity; it is an independent,
non-profit effort to foster the learning of worldwide languages.
This is an online Spanish program designed specifically for police personnel with limited or no previous
Spanish training; however, intermediate students can continue to improve via the live classroom
sessions. You can register and begin the course at anytime. You can take up to 12 months to complete
all the lessons and work at your own pace.
Paul Kurtzweil is the creator and primary instructor of this course. Paul is a lieutenant with the Polk
County Sheriff's Office in Florida. Paul has spent over 19 years working in an area with a large Spanish-
speaking population (over 90,000 Latinos in the jurisdiction) and he is required to translate on a daily
basis.
Paul Kurtzweil
Lieutenant
Office: 863.297.1100 / Fax: 863.297.1115
PCSO Website: www.polksheriff.org
This course provides individuals an understanding of the information systems security policies, roles,
responsibilities, practices, procedures, and concepts necessary to perform the functions of an
Information Assurance Security Officer (IASO). The lessons presented here will aid the IASO in
developing an effective, overall security approach and in selecting cost-effective controls to meet the
requirements of laws, directives, and regulations. (Course material publically available / Final Exam
requires AKO Log-on)
Infragard - Information Security in the Workplace (On-line Training)
http://www.infragardawareness.com/
The better you are at protecting your own workplace from cybercrime and identity theft, the fewer
opportunities criminals, petty thieves, and even terrorists will have to exploit security vulnerabilities for
their own purposes.
InfraGard Awareness is a FREE information security awareness course that will help you understand how
you can help make your workplace more secure. It will also teach you vital skills to protect yourself and
your family from cybercrime and identity theft.
The course is free to all individuals and small businesses under 50 employees. When you have
completed the course, you can become one of the first in the nation to earn your "Certificate in
Information Security Awareness in the Workplace," an invaluable addition to any resume that will be
welcomed by security conscious employers.
The Counter Terrorism Division (CTD) of the Federal Law Enforcement Training Center (FLETC), Glynco,
Georgia, is home to the Intelligence Analyst Training Program (IATP). CTD is responsible for the training
of intelligence analysts and intelligence associated personnel from Partner Organizations. The program
is open to military, state, and local law enforcement intelligence personnel on a space available basis.
The 76 hour program provides a historical, legal, and conceptual basis for criminal/law enforcement
intelligence. The beginning of the program establishes a firm historical, legal and ethical basis. IATP
contains a practical exercise devoted to critical thinking concepts and the three components of analysis.
IATP is designed around the intelligence process/cycle through the creation of requirements as the basis
of an intelligence plan, devoted to the Planning and Direction phase, followed by the collection and
documentation of information with the Collection Phase. IATP then transitions into the phases of
processing and exploitation, analysis, dissemination and re-evaluation as the baseline process for
transitioning information into intelligence. The program is structured around the Intelligence Cycle,
identifying functions the analyst /research specialist is involved with during each phase. The IATP is
conducted in a student centered learning environment, guided by subject matter experts in various
fields.
The student is evaluated on the basic concepts of analysis, presentation skills, and writing abilities. The
final practical exercise is devoted towards bringing together all teaching points, combining the
fundamentals of analysis with a law enforcement problem area. This practical exercise culminates with
the submission of both a report and presentation of a briefing of the student's findings to the class,
instructors, and interested FLETC staff.
Type: Advanced
Length: The training program encompasses 9.5 days (76 hours).
Curriculum
Senior Instructor
Counterterrorism Division
1131 Chapel Crossing Rd.
Glynco GA 31524
Phone: (912) 267 2347
Fax: (912) 267 3144
fletc-counterterrorismdivision@dhs.gov
(U) The Joint Intelligence Virtual University (JIVU) is the premier collaborative online training
environment, designed especially to meet the needs of the Intelligence Community and to provide easy
access to high-quality e-Learning products, tools, and services. Providing over 4000 courses, JIVU serves
as an online learning platform for the Defense Intelligence Agency (DIA) and approximately 17 other IC
Agencies, Commands and Services. JIVU utilizes the Plateau Learning Management System and the
Centra tool to deliver online learning content. It is accessible 24/7 on the Joint Worldwide Intelligence
Communications System (JWICS) at http://jivu.dodiis.ic.gov, the Secret Internet Protocol Router
Network (SIPRNet) at http://jivu.dse.dia.smil.mil, and StoneGhost at http://www.jivu.us.qlat (Link will
only work when logged onto a native StoneGhost terminal).
Joint Knowledge Online – Internet Public site -- JKO-IP -- is the public access enterprise portal of the Joint
Knowledge Development and Distribution Capability (JKDDC) Training Transformation initiative,
managed by the JKDDC Joint Management Office (JMO) at the U. S. Joint Forces Command Joint
Warfighting Center in Suffolk, Virginia.
JKO-P provides an online source for relevant, operationally focused joint training and knowledge
services and products specifically tailored for access by the general public, multinational partners, and
interagency/intergovernmental supporters.
To access JKO Communities of Interest (COI's) and on-line training courses, you need to register for an
account to log-in to the JKO Members Portal.
The Joint Language University (JLU) is a web based language learning support system. It comprises
various projects and contributors from across the Federal Government including the NSA, DIA, US Navy,
USSOCOM, and DLI. It is open to anyone within the Federal Government through self-registration using
their '.mil' or '.gov' email address.
JLU includes quality foreign language learning and teaching resources. Quality assurance is accomplished
by experts in the specific language and in pedagogy or second language acquisition, who are identified
through relevant national teaching associations and programs at major universities. JLU also includes
cultural and area familiarization materials from such programs as the National Cryptologic School's ICAS
seminars, the Defense Language Institute’s Countries in Perspective and Area Familiarization Guides and
the Navy's Center for Language, Regional Expertise, and Culture (CLREC).
The project goal is to support a wide range of languages, learner proficiency levels, and learning
environments, and to provide access to these resources for language professionals across the Federal,
DoD, and Intelligence language communities. The JLU is working to create a scalable, cost-effective
system that can adapt to changing missions, circumstances, and teacher/learner needs. As the JLU
continues to develop, new features, resources, and tools will be added as they become available.
The JLU has been created with the support of the US Government and is free for all members of the US
Government. Registration is available only to users with a valid .mil or .gov email address and for select
DoD and associated schools. Questions & comments: JLU_Admin@wbtrain.com
Military Police Investigations Course --
https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/8902-1/accp/mp0018/mp0018_top.htm
MP0018 Edition C. August 1994 - (9 credit hours)
Course material is publically available, however formal enrollment is only available to U.S. Active and
Reserve military officers, warrant officers, and enlisted personnel; Reserve Officers' Training Corps,
National Guard Officer Candidate School, West Point cadets, and authorized federal civilian employees.
The Multijurisdictional Counterdrug Task Force Training (MCTFT) program provides unique, tuition-free,
courses covering all aspects of counterdrug law enforcement and training support for community anti-
drug coalitions.
CD-ROM Training
Analytical Investigative Tools
Drugs in America: Lessons for Law Enforcement
Explosives, Booby Traps and Bomb Threat Management
Risk Management and Violence in Undercover Operations
InFocus: A Clear Message About Drugs
On-Line Training
Airport Narcotics Investigations Introduction to Highway & Rural Drug Investigations
Introduction to Clandestine Laboratory Investigations Introduction to Interview & Interrogation
Clandestine Laboratory Recertification Introduction to Money Laundering
Command & Control Overview Introduction to Patrol Drug Investigations
Introduction to Conspiracy Investigations Overdose America
Criminal Street Gangs Overview Police Intelligence
Criminal Street Gangs Overview - Spanish Risk Management and Violence in Undercover Operations
Drug Identification Surveillance Operations Overview
Ethical Issues and Decisions in Law Enforcement
Explosives, Booby Traps & Bomb Threat Management
The National HIDTA Assistance Center offers two CD-ROM based courses:
Both CD-ROM programs are open to Federal, State and Local Law Enforcement Personnel, Criminal
Intelligence Analysts, Crime Analysts, Investigators, Investigative Assistants, Counterdrug Operations
Supervisors at all levels and military personnel – both active and reserve components – assigned to
support counterdrug activities in a HIDTA.
NTPI provides extensive support to our Nation’s War on Terror. This support includes monthly
nationwide, satellite television broadcasts on important training topics for emergency managers and
responders; traditional classroom instruction; training support packages that include student and
instructor guides, video, CD, DVD, and VHS products; mobile training teams; and web- and computer-
based training products.
On-line Courses
1. Force Protection
a - Force Protection Course Introduction
2. Port Security
a - Basic Port Security
b - Access Control
c - Advanced Port Security
d - Intermodal Supply Chain Security
3. General Aviation Security
a - General Aviation Security For Law Enforcement Officers
4. Anti-Terrorism
a - Introduction to Anti-Terrorism
b - Terrorism Awareness for Law Enforcement
c - Law Enforcement Guide to Understanding Islamic Terrorism and Arabic Names
5. Traffic Stops
a - Traffic Stops
6. Planning
a - Planning Considerations for WMD Incidents
Navy and Marine Corps Intelligence Training Center (NMITC) Intelligence Courses
-- Introduction to Intelligence
-- Intelligence Cycle
-- FMF Intelligence Structure
-- Intelligence Disciplines
-- Intelligence Preparation of the Battlespace
-- Intelligence Writing
-- Marking Classified Documents
-- Threat Analysis
-- Targeting Active
Individuals with an official need for this training may enroll in the courses by obtaining a student
account with USMC - MarineNet: https://www.marinenet.usmc.mil/marinenet/
Global Terrorism
First released in early 2001, and revised following the events of September 11, 2001, this course
provides a comprehensive knowledge of the terrorism phenomenon throughout history, culminating in
the present threat posed by transnational terrorism. Its scope is the widest possible and includes
transnational, international and domestic terrorism; terrorist groups; lone terrorists; different forms of
historical terrorism; tactics and strategies such as kill- zones and choke-points; logistics; the terrorist
armoury of weapons and their effects; sponsorship, including political and religious support; terrorism in
the context of guerrilla warfare, criminal assault, and acts of war; the terrorism-media relationship; anti-
and counter-terrorism; and the systematic eradication of terrorism vis à vis emergency suppression.
Motives, victims, targets and types of leadership are also among the many topics covered in this richly
illustrated course, and a broad range of nineteen relevant annexes includes a catalogue of major attacks
spanning many years; a glossary of related terrorism, police, security and intelligence terms; and a brief
profile-table of several hundred terrorist groups. Major case studies and historical terrorist attack briefs
are also included in the course material, which was mentioned by the UN Secretary-General in his report
(UN GA Report A/55/179) to 185 Ambassadors at the UN General Assembly as one of the training
measures to suppress terrorism. Twelve lessons, 552 pages.
COURSE AUTHOR: Paul Medhurst. Ph.D., former Deputy Chief, Security and Safety Section, UN Office,
Vienna.
If you have a .mil email address, register on this website to download your copies of the Tactical Iraqi,
Tactical Pashto, Tactical Dari and Tactical French Language & Culture Training Systems software,
manuals, and trainer materials.
Forensic Science Program 101 ($859.00) Forensic Science Program 201 ($365.00)
101C Criminal Investigation 201F Fundamentals of Forensic Investigation
101M Modus Operandi 201T Trace Evidence & Its Significance
101FI Firearms Identification 201A Fundamentals of Arson & Explosion Investigations
101Q Questioned Documents 201B Significance of Blood in Criminal Investigations
101P Police Photography 201D Forensic Investigations into Drugs & Alcohol
101F Fingerprint Classification and Identification
Analytical Investigation Methods (AIM) -- Our basic one-week course is designed for analysts,
investigators and agents who require analytical techniques for the investigation of complex criminal
activity but not all the techniques and extensive practice provided by the CIA course.
Criminal Intelligence Analysis (CIA) -- This two-week course is designed for dedicated analysts
assigned to intelligence units. It provides training and practice in all the techniques required for the
successful analysis of information related to a wide variety of complex criminal activity. The course
will benefit analysts new to the field as well as those who have skills in the application of computer-
based analytical and presentation tools.
Financial Manipulation Analysis (FMA) -- This one-week course is for investigators and analysts who
are not accountants but who must analyze complex financial manipulations performed to disguise
and transfer money gained from illegal activities.
Each of the five modules in the Professional Training Series is also currently being offered online through
Arapahoe Community College in Colorado as part of a certificate in crime analysis.
This course is designed to teach legal investigation to those interested in pursuing a new career and those presently working in
the legal field. At the end of the course, students will be qualified to assist attorneys, paralegals, insurance companies and
private businesses, as well as state and federal government agencies, in the process of civil and criminal investigation. Students
will also be taught how to create a freelance investigation business. Included subject areas are: arson investigation, products
liability investigation, personal injury and traffic accident forensics, employment accidents, investigation of financial and equity
matters, professional malpractice and negligence, skip-tracing, and the role of a legal investigator in preparing for civil and
criminal litigation.
Lesson 1: Introduction to our legal system, legal and ethical considerations for the investigator, law of agency and coverage of
rules of court and evidence.
Lesson 2: General interviewing and investigation techniques, sources of leads and information, fact analysis, taking witness
statements, forensic photography, proper service of legal process, and surveillance.
Lesson 3: Personal injury investigation techniques, traffic accident reconstruction, premises accidents, employment accidents,
government investigation, document analysis and control, financial and equity analysis, testimony, and case studies. Job search
strategies and placement possibilities will also be discussed.
This work-at-your-own-pace program is designed to provide the student with an in-depth knowledge of
physical security procedures and equipment. The program includes conceptual security considerations,
vulnerability assessments, and familiarization with hardware and procedures. Subject matter also
includes physical security and crime prevention theory, risk assessment, US terrorism, bomb threat
management, security design, perimeter protection, intrusion detection systems, access control,
security lighting, locks and locking devices, closed circuit television (CCTV), controlling workplace
violence, contingency planning and the security survey process. The course consists of 17 Lesson
Modules with accompanying PDF materials and a final exam.
The Registered Investigator, RI program instructs, measures, and assesses knowledge and competency
of investigators in both the public and private sectors. Providing a foundation of forensics basics, this
course creates a measure of standardization in the field of investigation. As the National Academy of
Sciences’ report on the Forensic Sciences reflects, certification for investigators is more crucial than ever
before to fill the gaps in the field. The RI course will cover the following topics:
» Investigation types
» Promoting your case
» Sources
» Evidence
» Crime scene processing
» Interrogations and interviews
» Homicide
» Trial
S2 Safety & Intelligence Institute
Distance Learning Programs
http://www.s2institute.com/index.php
Pinellas, FL - Tel. (727) 461-0066
Hillsborough, FL - Tel. (813) 227-8585
18 Semester Hours
Compose basic and intermediate-level research and provide professional analyses on issues critical to intelligence consumers.
Assess cognitive science principles that underlie human information processing and problem solving such as intelligence
analysis.
INTL500 / RC506 - Research Methods in Security and Intelligence Studies-Intelligence Studies Focus
INTL504 - Analytics I
INTL506 - Analytics II
The Boston University Certificate in Professional Investigation program is ideal for a range of individuals, including current
investigative professionals or those in related fields, as well as those seeking to enter this exciting and rewarding field. This
certificate program offers a unique course of study in the private investigation profession, and is taught by educators who are
also experienced licensed private investigators. Designed to accommodate the busy schedules of working individuals, this
comprehensive curriculum delivers over 100 hours of instruction in six modules. Upon successful completion of the program,
students will be awarded a Certificate in Professional Investigation from Boston University.
This module gives an overview of the investigative profession, and discusses how professional investigators assist attorneys,
businesses, and the public in a variety of cases. It covers the investigative process and the conduct, skills, and traits required of
professional investigators. As the foundation for the certificate program, it focuses on the three primary areas of investigation
(research, interviews, and surveillance) and previews the higher-level modules.
Internet Research
Internet intelligence is one of the newest and vital skills areas for the professional investigator. This cutting-edge curriculum will
expose students to both the tools and the methods for conducting investigative research online. Students will learn best
practices for obtaining reliable information, and class time within a computer lab will enable the student to apply recently
learned skills.
Investigative Research
Traditional library and public record searches are effective and vital aspects of any investigation. Through visits to courthouses
and other public offices, students learn techniques and best practices of Investigative Research, and discover the many types of
information available through this research. Students also learn how best to apply and present the information obtained
through this type of investigation.
Investigative Interviewing
This module focuses on conducting investigative interviews of various subjects, and on planning, conducting, recording,
interpreting, and presenting the results of interviews. The training makes use of video clips and role playing to demonstrate and
reinforce interviewing behaviors and techniques.
Investigative Surveillance
In this module, students learn about a variety of surveillance techniques and practice how to conduct typical surveillance
assignments. The module covers when to use a particular technique and how to use and select the appropriate technology.
Students also learn how to prepare and present the results of surveillance activities to clients.
This module focuses on the role of the investigator within the legal system. Students learn how to apply investigative skills to a
range of legal matters, including civil, domestic, and criminal actions. The module examines how civil and criminal cases
proceed, as well as legal strategies, legal terminology, and laws pertaining to investigative practices. Providing expert testimony
is also covered and practiced in this module.
Graduate Certificate in Applied Intelligence - Mercyhurst College
http://intel.mercyhurst.edu/content/applied_intelligence_graduate_certificate
The Mercyhurst College Certificate in Applied Intelligence is a three course, nine credit hour graduate certificate program.
This challenging and demanding academic experience provides students with a variety of analytical skills and exposure to the
latest technologies in intelligence theory, communications, and research.
The courses are sequential and build on each other. Students must complete the courses listed below in the following
sequence:
The nine graduate credits awarded through the certificate may be used to partially satisfy the degree requirements for the
Master of Science degree in Applied Intelligence offered by the Mercyhurst College Institute for Intelligence Studies.
Course Descriptions
A survey course that introduces the student to the discipline of intelligence and provides the student with an understanding of
how intelligence systems function, how they fit within the policymaking systems of free societies, and how they are managed
and controlled. The course will integrate intelligence theory with the methodology and processes that evolved over time to
assist the intelligence professional. The course will develop in the student a range of advanced research and thinking skills
fundamental to the intelligence analysis process. (3 credits)
The skill most appreciated by the intelligence consumer is the ability to communicate, briefly and effectively, the results of
detailed analytic work. This course, through repetitive application of a focused set of skills to a body of information of
constantly increasing complexity, is designed to prepare intelligence analysts to deliver a variety of written intelligence
products. (3 credits)
This course is designed to provide an opportunity for students to explore techniques emerging from the intelligence community
and physical and social sciences and apply those techniques to intelligence problems. Focusing on a variety of techniques from
a variety of disciplines, this course will expose an advanced student to new and potentially useful methods for conducting
intelligence analysis. (3 credits)
Certificate in Law Enforcement Intelligence - Michigan State University
https://intellprogram.msu.edu/LE_Intell_Cert.php
Students may choose three of the following four classes to help provide some degree of focus for each individual’s interest as
well as to add some flexibility for the enrollment schedule.
CJ 433 Law Enforcement Intelligence Operations – This provides an overview of the intelligence process including current issues
and trends. The course examines intelligence as a tool for law enforcement management as well as relationship to operational
responsibilities. It is designed as a broad-ranging course to provide the student with comprehensive knowledge about different
aspects of the law enforcement intelligence function.
CJ 809 Public/Private Partnerships for Emergency Preparedness and Homeland Security – This particular class is driven largely
by the mandate of Homeland Security Presidential Directive (HSPD) 8 and the National Preparedness Goal, both of which
mandate the ability to have mechanisms in police to prevent and recover from terrorist attacks. In addition, the concept of
Intelligence-Led Policing, the National Criminal Intelligence Sharing Plan, and the Office of Domestic Preparedness Guidelines
for Homeland Security all express the need to establish effective public-private relationships as a means to counter terrorism.
The course examines the issues, opportunities, and processes to accomplish this.
CJ 837 Counterterrorism and Intelligence – The intent of intelligence is to prevent crime and terrorism. Thus, the goal of this
class is to integrate knowledge about both intelligence and terrorism and examine what strategies – both tactical and strategic
– can be used to counter the different types of terrorism. Included is an examination of the nexus between terrorism and
organized crime; challenges of counterterrorism initiatives; and threat assessment.
CJ 838 Terrorism – The course examines the meaning of terrorism, its effects, the different types of terrorism, and the
motivating factors in various international and domestic terrorism ideologies. The course is designed to provide the student
with the motives, methods and targets of different ideological groups.
The Geospatial Intelligence (GI) certificate requires a total of 18 credit hours, or 6 courses. These comprise 5 mandatory core
courses and one elective. The mandatory core courses reflect the three key science concentration areas (CA) of this program,
namely geospatial image analysis, spatial analysis, and information technology, as reflected in the following list:
INFS 590 Program Design and Data Structures (CA: Information technology)
A post-baccalaureate certificate (PBC) is an educational certificate that attests to certain advanced graduate study in an area of
concentration beyond the baccalaureate level. It is graduate-level coursework, but is less than the credit hours necessary to
earn a Master’s degree. The PBC in crime analysis is a 15-credit hour program designed to develop the knowledge, skills, and
abilities for an entry level position as a crime analyst or to enhance the skills of a working analyst. It includes coursework in
environmental criminology, research methods, statistics, crime analysis, and crime mapping. Upon completion of the required
curriculum, the student is awarded the PBC in Crime Analysis.
CRJU 670. Criminal Justice Research Methods (3) - Description: This course is a practical application of basic research methods
developed in the field of criminal justice. The student must conduct a research project or thesis proposal and present their
research in the classroom forum. A review of research methodology will be presented. Computer applications will be
emphasized where appropriate.
CRJU 671. Quantitative Methods in Criminal Justice Research (3) - Description: This course is intended to equip the students
with the ability to calculate and conduct statistical analyses for applied research, to ensure the ability to interpret the results
from statistical analysis, and to apply those results to appropriate situations.
CRJU 672. Applications in Crime Analysis (3) - Description: This course is an introduction to the application of quantitative
methods in the analysis of crime trends, patterns, and series for use in tactical, strategic and administrative situations.
CRJU 673. Crime Mapping (3) - Description: This course develops basic and advanced skills in the tactical and strategic mapping
of crime trends, patterns, and series.
CRJU 676. Environmental Criminology (3) - Description: This course explores the theoretical underpinnings of the temporal and
spatial distribution of crime with attention to prevention, intervention, order maintenance, and policy implications.
Crime Control Strategies ....4 Quarter Credits - An analysis of the methods used to control crime in American society. Emphasis
on understanding the sometimes conflicting goals of the criminal justice system; attention is given to the general categories of
general and specific deterrence, aggressive enforcement, situational and environmental defensive measures, and modification
of the social order. Special attention will be given to how other countries control crime and the problems of comparison
because of political and cultural differences.
Crime Analysis....4 Quarter Credits - An introduction to the basic methods used in analyzing data from criminal justice agencies,
including temporal and spatial analysis of crime patterns, calculation of crime rates, descriptive analyses of victim and offender
characteristics, recidivism, and the identification of offense typologies. Students get hands-on experience coding, analyzing,
interpreting, and presenting crime data from a number of sources like police homicide reports, the FBI, Department of
Corrections, and attitudinal surveys. Prerequisite: basic computing skills.
Criminal Justice Research ....4 Quarter Credits - Introduction to the basic concepts of social science research including
hypothesis testing, research design, causality, sampling, and measurement. Course is intended to provide students with
necessary skills to critically evaluate crime and delinquency research as well as design and implement basic research projects.
Geographic Criminology ....4 Quarter Credits - This course will provide a theoretical background for the geographic study of
crime. Topics covered include criminological theories that address the geographic distribution of crime, an introduction to
commonly used terminology in crime mapping, the use of spatial data in crime prevention efforts, and the ways in which crime
mapping is currently used in criminal justice agencies.
Applied Crime Mapping ....4 Quarter Credits - This course will provide students with the technical and analytical skills used in
crime mapping. Various mapping applications will be made available to students for the geographic examination of crime data.
As this course is an introduction to mapping software, no prior GIS knowledge is required. Students will learn to create useful
maps that convey spatial crime data and the relationships between crime and other geographic features.
Crime, Grime, and Fear ....4 Quarter Credits - Course designed to study the social, economic, political, and physical factors
underlying neighborhood crime and decline. Special attention is given to physical and social incivilities, the “broken windows”
theory, police-community partnerships, and problem-solving. Students will work on neighborhood-centered projects to explore
solutions to neighborhood crime patterns, disorder, and fear of crime, and ideas for strengthening police-citizen relations, and
community building.
The Entry Level Certificate is designed to give the professional in the intelligence analysis field or the student who is considering
getting in the field, a more comprehensive understanding of how to employ sound critical thinking when examining and
assessing the validity of various arguments and the value of diverse sources of information. Students will learn various
techniques for analyzing raw intelligence, evaluating source credibility, distinguishing “signal” from “noise”, and testing
hypotheses. Finally, students will learn to apply principles of sound research and evaluation to a wide spectrum of source
materials, to identify and describe their strengths and weaknesses, and to interpret the material obtained from them properly,
while keeping potentially large amounts of information organized and accessible.
The Mid Level Certificate is designed for the professional who already has some experience in the intelligence analysis field or
the student who has taken the entry level certificate to further learn about the Intelligence Cycle, how intelligence is prepared,
and how it is used to inform decision and policy makers. This program will cover matters of intelligence ethics, privacy issues,
and changes in the intelligence community in the post-9/11 environment. In this program the student will take the role of
terrorist and pick a target for a future terrorist attack and then collect intelligence about that target. And finally, this course will
distinguish counterterrorism (CT) from antiterrorism (AT)/Force Protection (FP) intelligence, strategic CT intelligence from
tactical CT intelligence, and introduce analytical constructs for the field operator and reporter.
The Senior Level Certificate is designed for the intelligence analyst professional who wants to better understand the finer points
of advanced analysis, including how to present briefings geared to the context of the intelligence consumer. The student will
learn to codify and unify relevant information into a comprehensive study that will present an accurate and up to date picture
of the target region’s cultural, political, economic, social, military, geographic, climate, demographic, hydrographic, and
historical data that will support strategic intelligence and tactical operations by the end user. Further, this program teaches the
craft of analyzing leaders, how to review available biographical information in an effort to discern the leader’s personality traits
and skills, and any available information on the leader’s professional record in dealing with a variety of issues. And finally,
students will learn how to weigh a variety of factors influencing how a political situation is likely to develop.
The Intelligence Studies Certificate Program is a structured series of online courses designed to prepare students for positions
that involve problem-solving and analytical thinking in private industry, intelligence analysis, national security and law
enforcement agencies. Through interactive discussions, case studies, group work and hands-on review of sample data,
participants in this program will review large amounts of information, collate it into meaningful groups, evaluate its accuracy
and reliability, and analyze it. Techniques include logic, probability, association matrices, flow charts, link analysis and other
analytical tools. The program is modeled after courses taught at the Federal Law Enforcement Training Center and used by
agencies such as the FBI, DEA, and Homeland Security.
INTEL 300 - BASIC INTELLIGENCE ANALYSIS - 3 CREDITS - In this course, the basic principles of Intelligence Analysis, as practiced
by the CIA, FBI, DEA, U.S. Customs as well as other Federal, state and local law enforcement agencies are presented and
discussed. Students are also taught deductive and inductive logic, formation of premise and inference, probability, hypothesis
development and testing, as well as sources of information and analytical techniques, i.e., association matrix, link analysis,
flowcharting and financial analysis. Throughout the course, practical examples in investigations of organized criminal
enterprises, drug trafficking, political corruption and human smuggling are presented and discussed.
INTEL 301 - STRATEGIC/NATIONAL SECURITY INTELLIGENCE ANALYSIS - 3 CREDITS - The use of force in International Politics is
examined in this course. Areas of study include the use of peacekeeping forces by the United Nations, the use of force by
terrorists, as well as the use of American forces in such places as Somalia, Lebanon, various Middle Eastern states and the
Balkans. During their studies, students examine the planning, research and diplomatic efforts that precede the use of military
force. This course also explores the Military Intelligence system, particularly as that system identifies and analyzes threats, both
real and perceived, to the security of the United States. Students are also required to become experts in a particular area of the
world, including the language, culture, political systems, economic systems, geography, factors that impact political and
economic stability, natural resources, as well as the military strength of the countries in the region.
INTEL 302 - INTELLIGENCE ANALYSIS OF ORGANIZED CRIME - 3 CREDITS - This course investigates the industries that are
susceptible to influence and/or control by organized criminal groups, the methods used to capture the particular industry, and
the economic impact that such a capture has on our society. In addition, the course also explores organized crime’s influence in
the construction, garment, convention, waste removal and waterfront industries. The criminal, civil and administrative methods
which are used to control or remove organized criminal influence from these industries are also presented and examined.
INTEL 303 - INTELLIGENCE ANALYSIS OF TERRORISM - 3 CREDITS - The threat of terrorism against the United States is explored
and analyzed in this course. The primary source of terrorist activity is the Middle East and the primary motivators of Middle
Eastern terrorist groups are American support of Israel, the presence of American troops on Arab soil and the American
invasion of Iraq. This course studies the principal terrorist groups in the Middle East along with the political, religious, economic
and national security concerns of the United States in the region.
INTEL 400 - ELECTRONIC INTELLIGENCE ANALYSIS - 3 CREDITS - In this course, students are taught Analyst Notebook 6, the latest
electronic analytical tool that is available to law enforcement and national security agencies. Students learn how to import
financial information and use Analyst Notebook 6 to create graphic displays of associations and relationships between
individuals, organizations and financial institutions.
FOREIGN LANGUAGE - 3 CREDITS - All students are required to complete a Level II language of their choice.
-- Certification Programs --
Certifications (Security)
Certified Criminal Defense Investigator (CCDI) - Criminal Defense Investigation Training Council --
http://www.defenseinvestigator.com/certification.html
Certified Security Supervisor (CSS) -- http://www.ifpo.com/ -- Now CSSM, the Certified Security
Supervisor (CSS) was the original security supervision certification offered by the International
Foundation for Protection Officers.
SELECTED RESOURCES
Analysis of Competing Hypotheses Software - http://www2.parc.com/istl/projects/ach/ach.html
Analysis of Competing Hypotheses (ACH) is a simple model for how to think about a complex problem
when the available information is incomplete or ambiguous, as typically happens in intelligence analysis.
The software downloadable here takes an analyst through a process for making a well-reasoned,
analytical judgment. It is particularly useful for issues that require careful weighing of alternative
explanations of what has happened, is happening, or is likely to happen in the future. It helps the analyst
overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence
analysis so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and
the scientific method. It helps analysts protect themselves from avoidable error, and improves their
chances of making a correct judgment.
This software was developed by Palo Alto Research Center (PARC) in collaboration with Richards J.
Heuer, Jr.It was developed for use by the U.S. Intelligence Community with funding from the Intelligence
Community's Advanced Research and Development Activity (ARDA) and the Office of Naval Research
(ONR).
In distributing ACH, PARC is making the presently downloadable version of the program available to the
general public at no cost when used for non-commercial or educational purposes subject to the terms
and conditions of its end user license.
Baseline Capabilities for State and Major Urban Area Fusion Centers
A Supplement to the Fusion Center Guidelines (September 2008)
http://it.ojp.gov/documents/baselinecapabilitiesa.pdf (4.66MB)
The CIA releases millions of pages of documents each year and frequently releases items of public
interest on this Web site.
The Library contains a wealth of information, from unclassified current publications to basic references,
reports and maps. The Library features our most popular publication, The World Factbook, and our
online directory of Chiefs of State and Cabinet Members of Foreign Governments. It also features
numerous documents and articles of historical significance, including those found in Studies in
Intelligence.
The "Lean" version is a 32KB html/java-script page that provides encryption/decryption of text
messages, allowing secured communication with anyone with whom you have a shared password.
DataFerrett is a unique data mining and extraction tool. DataFerrett allows you to select a databasket
full of variables and then recode those variables as you need. You can then develop and customize
tables. Selecting your results in your table you can create a chart or graph for a visual presentation into
an html page. Save your data in the databasket and save your table for continued reuse. DataFerrett
helps you locate and retrieve the data you need across the Internet to your desktop or system,
regardless of where the data resides. DataFerrett: lets you receive data in the form in which you need it
(whether it be extracted to an ascii, SAS, SPSS, Excel/Access file); or lets you move seamlessly between
query, analysis, and visualization of data in one package; lets data providers share their data easier, and
manage their own online data.
Decrypto is a fast and automated cryptogram solver by Edwin Olson. It can decode word games often
found in newspapers, including puzzles like cryptoquips and patristocrats. You can also download a
stand-alone version. [We have also found this program useful for quickly breaking simple substitution
ciphers used by some criminal gangs.]
EW is an easy to use tool for protecting sensitive (but not classified) documents, and for protecting files
before transmission via email. It allows a user to encrypt files using a 128-bit implementation of the
Advanced Encryption Standard (AES) with simple drag-and-drop efficiency. Encryption Wizard can
significantly increase an organization’s security posture at little to no cost to protect sensitive data in
transit (E-mail, FTP, or shared web folders) or at rest on a removable storage device. The primary version
for government users utilizes a FIPS 140-2 validated encryption engine licensed from RSA Security.
Researchers should evaluate the quality of information appearing online or in print based on five
criteria--scope of coverage, authority, objectivity, accuracy and timeliness. This guide defines the
criteria, documents incidents of questionable, false or fraudulent information as reported in the news or
trade literature, provides examples of Web sites that illustrate good or bad information, and suggests
strategies that help you detect bad information.
The FBI Law Enforcement Bulletin is published monthly by the Federal Bureau of Investigation, 935
Pennsylvania Avenue, N.W., Washington, D.C. 20535-0001. Contributors' opinions and statements
should not be considered an endorsement by the FBI of any policy, program, or service.
Global Terrorism Database (GTD) is an open-source database including information on terrorist events
around the world from 1970 through 2007 (with annual updates planned for the future). Unlike many
other event databases, the GTD includes systematic data on domestic as well as transnational and
international terrorist incidents that have occurred during this time period and now includes more than
80,000 cases. For each GTD incident, information is available on the date and location of the incident,
the weapons used and nature of the target, the number of casualties, and—when identifiable—the
group or individual responsible.
The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is making the
GTD available via this online interface in an effort to increase understanding of terrorist violence so that
it can be more readily studied and defeated.
The Training Program teaches a series of courses to intelligence analysts that helps them develop their
analytical skills mainly in the field of counterterrorism and against other asymmetric threats. Analysts
receive training and practical application on analytic and data visualization tools including Analyst
Notebook and ArcGIS. The Team delivers tool-specific and methodology-based training to Intelligence
Operations Center/Information Dominance Center Extension analysts and other supported agencies at
any location world-wide, as directed by the Commanding General of INSCOM.
The INSCOM G3 IATP web-site contains Orientation and Sustainment Training Courses. These modules
have been designed to augment the courses currently taught by the Intelligence Analysts Training
Program, preparing analysts for more traditional classroom instruction and allowing them to get the
most out of any training they may attend. While the CBTs are not designed to replace classroom-based
courses - the conventional classroom setting is invaluable for giving students interaction with each other
and with an instructor - completing them will ensure that students get the most out of any given class.
In addition to acting as a supplement to the classroom, there are times and locations when instructors
and classrooms are unavailable. Through CBTs, crucial information can be passed on in a verifiable
manner to students who are not in a position to attend a formal class. The following training modules
are available on the IATP web-site:
What is Intelligence? ArcGIS Data Types
IKN is a Knowledge Management tool that enables Intelligence soldiers all over the world to
communicate, collaborate and investigate. It hosts discussion forums, serves as a single point of entry to
get to USAIC and other Intelligence Community websites, and hosts a variety of public and private web
applications that support the Intelligence Community.
"From the web-site: JavaScrypt runs entirely in your browser--nothing is sent to any Web site when you
use it. You can, if you wish, download JavaScrypt to your own computer and use it when not connected to
the Internet. JavaScrypt's encryption facilities use the Advanced Encryption Standard (AES) adopted by
the United States as Federal Information Processing Standard 197. AES supports key lengths of 128, 192,
and 256 bits; JavaScrypt uses 256 bit keys exclusively."
Joint Electronic Library - http://www.dtic.mil/doctrine/
Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies, 2nd Ed -
- http://www.cops.usdoj.gov/RIC/ResourceDetail.aspx?RID=525 (5.95MB)
-- Mapquest - http://www.mapquest.com/
-- Terrafly - http://www.terrafly.com/
Before any soldier deploys or goes on TDY Outside the Continental United States (OCONUS), they must
complete a Pre-OCONUS travel File (PRO-File).
What is PRO-File?
All of the Geographic Combatant Commands require personnel to complete a Personnel Recovery
Mission Software (PRMS) digital ISOPREP prior to entering their respective geographic areas of
responsibility. However; most Army personnel do not have classified system access on a regular basis
prior to deployment.
HQDA developed the PRO-File program to enables Soldiers, DA Civilians, and DA Contractors to meet
these theater entry requirements. PRO-File is the Army's interface with PRMS. Although a PRO-File
survey is not an ISOPREP, it is the only authorized alternative for use on unclassified networks.
All Soldiers, DA Civilians, and DA Contractors are required to complete a PRO-File survey prior to
departing CONUS for official duty. Army personnel departing for the USPACOM AOR, for official or
unofficial travel, must complete this requirement as well.
Army forces assigned to USSOCOM or USASOC organizations are exempt from this requirement and will
continue to follow USSOCOM guidance for completion of ISOPREPS. Civil Affairs and Psychological
Operations forces operating under the control of a conventional force commander are not exempt from
this requirement. Official PRO-File implementation guidance can be found in All Army Activities Message
(ALARACT) 156/2007.
Problem Analysis Module (PAM) gives you a framework for analyzing any persistent crime and public
safety problem. PAM will ask you to input information concerning every aspect of the problem and then
suggest the kinds of responses you could try.
PAM was developed to assist police problem solving through the asking of specific questions. The
questions come from research into a set of powerful theories within the field of Environmental
Criminology – particularly Routine Activity Theory, Situational Crime Prevention, and Crime Pattern
Theory.
Silobreaker -- http://www.silobreaker.com/
Silobreaker is a search service for news and current affairs that aims to provide more relevant results to
the end user than what traditional search and aggregation engines have been offering so far. Instead of
returning just lists of articles matching a search query, Silobreaker finds people, companies, topics,
places and keywords; understands how they relate to each other in the news flow, and puts them in
context for the user through graphical results in its intuitive user interface.
The site pulls content on global issues, science, technology and business from thousands of news
sources, blogs, multimedia, and other forms of news media from around the world. With the engine’s
focus on finding and connecting related data in the information flow, Silobreaker’s user tools and
visualizations are ideal for bringing meaning to content from either today’s Web or the evolving
Semantic Web, or both.
The program compares two or more courses of action based on two or more evaluation criteria. The
user arranges the evaluation criteria in descending order of importance and tells the program how much
more important each criterion is than the next lower criterion. These importance ratings are used to
calculate weights for each criterion. SquidMat takes user-supplied values for each course-of-
action/criterion combination and converts them to Z scores. Using the criterion weights, the program
calculates weighted sums for each course of action. The course of action with the highest weighted sum
is considered to be the best. SquidMat is designed as a replacement decision matrix program for the
CAS3 program DECMAT.
Statistical Data Resources (Crime Statistics)
The Bureau of Justice Statistics (BJS) is the United States' primary source for criminal justice statistics.
The BJS mission is to collect, analyze, publish, and disseminate information on crime, criminal offenders,
victims of crime, and the operation of justice systems at all levels of government. These data are critical
to Federal, State, and local policymakers in combating crime and ensuring that justice is both efficient
and evenhanded.
The Bureau of Justice Statistics was first established on December 27, 1979 under the Justice Systems
Improvement Act of 1979, Public Law 96-157 (the 1979 Amendment to the Omnibus Crime Control and
Safe Streets Act of 1968, Public Law 90-351). The Bureau of Justice Statistics (BJS) is a component of the
Office of Justice Programs in the U.S. Department of Justice.
The Bureau of Justice Statistics (BJS), through its Federal Justice Statistics Resource Center (FJSRC),
compiles comprehensive information describing suspects and defendants processed in the Federal
criminal justice system. The goal of FJSRC is to provide uniform case processing statistics across all
stages of the Federal criminal justice system. Using data obtained from Federal agencies, FJSRC compiles
comprehensive information that describes person-cases processed through the system. FJSRC applies
uniform definitions to commonly used statistics describing data from each stage of case processing. The
data definitions used by the FJSRC are consistent with definitions used by other BJS programs that
report on case processing in state courts so that comparisons may be made between case processing
statistics between the Federal and state systems.
The mission of the National Archive of Criminal Justice Data (NACJD) is to facilitate research in criminal
justice and criminology, through the preservation, enhancement, and sharing of computerized data
resources; through the production of original research based on archived data; and through specialized
training workshops in quantitative analysis of crime and justice data.
NACJD provides the following services to assist those using our data collections.
The identification of appropriate criminological and criminal justice data collections on specific
topics.
Custom sub-setting of selected data files through our online Survey Documentation and
Analysis.
Assistance with the retrieval and use of files obtained from the archive.
The Sourcebook of Criminal Justice Statistics brings together data from more than 100 sources about
many aspects of criminal justice in the United States. These data are displayed in over 1,000 tables. The
site is updated regularly as new statistics become available. The Sourcebook is supported by the U.S.
Department of Justice, Bureau of Justice Statistics.
The Uniform Crime Reporting (UCR) Program was conceived in 1929 by the International Association of
Chiefs of Police to meet a need for reliable, uniform crime statistics for the nation. In 1930, the FBI was
tasked with collecting, publishing, and archiving those statistics. Today, several annual statistical
publications, such as the comprehensive Crime in the United States, are produced from data provided
by nearly 17,000 law enforcement agencies across the United States. Other annual publications, such as
Hate Crime Statistics and Law Enforcement Officers Killed and Assaulted address specialized facets of
crime such as hate crime or the murder and assaults of law enforcement officers respectively.
Untangling the Web has been produced for official use only. This product is not approved for public
release. The contents of Untangling the Web may not be published on, posted to, or copied to the public
Internet or any other publicly accessible location.
https://www.g357extranet.army.pentagon.mil/DCSExtranet/damopr/
The HQDA G-3 US Army Personnel Recovery (PR) branch is the office of primary responsibility for
executing the Army's Service requirement to develop and implement policy and guidance, which
supports Soldiers, DA Civilians, and DA Contractors, and others as designated by the Secretary of the
Army, in planning, preparation, execution and assessment of the PR program.
1.The Army defines Personnel Recovery as The sum of military, diplomatic, and civil efforts to effect the
recovery and return of US military, DoD civilians, and DoD contractor personnel, or other personnel as
determined by the Secretary of Defense, who are isolated, missing, detained, or captured (IMDC) in an
operational environment.
2.Those military, DoD civilians and contractors who have become IMDC are referred to as "Isolated
Personnel" (IP).
3.Personnel Recovery is an overarching term which covers CSAR, SERE, SAR, NAR, UAR, etc.
Note: NEO is not part of PR, however with any operation, the chance of Isolation is increased, and plans
must address this possibility.
A video teaching series consisting of ten 50-minute presentations from the "History Channel".
1-Blood Splatter
2-Body Clues
3-Bullets and Blood
4-DNA's Debut
5-Fingering the Killer
6-Fire and Metal
7-Invisible Clues
8-The Body Searchers
9-Tracings in Blood
10- Unusual Clues
VIDEO - The Seven Signs of Terrorism (Produced by the Michigan State Police) -
http://www.homelandresponder.org/pages/7signs.html
VIDEO - Radiological Terrorism: Just in Time Training for Hospital Clinicians (17-minutes)
http://www.bt.cdc.gov/radiation/justintime.asp
VineLink -- https://www.vinelink.com/vinelink/initMap.do
VINELink is the online version of VINE (Victim Information and Notification Everyday), the National
Victim Notification Network. This service allows crime victims to obtain timely and reliable information
about criminal cases and the custody status of offenders 24 hours a day. Victims and other concerned
citizens can also register to be notified by phone, email or TTY device when an offender's custody status
changes. Users can also register through their participating state or county toll-free number.
ACRONYMS AND ABBREVIATIONS
AIG Assessments and Information Group – Counterterrorist Center’s analytic arm pre-
September 11. After September 11th this office became the Office of Terrorism Analysis.
IOS Intelligence Operations Specialist - *FBI’s+ Specialists conduct case specific (tactical)
research.
IRS Intelligence Research Specialist- *FBI’s+ Specialists conduct long term (strategic)
research.
JMIP Joint Military Intelligence Program. Inter-service military intelligence programs in the
Department of Defense.
MALICE Money, Anger, Lust, Ideology, Compromise, Ego - An acronym describing the factors
which motivate individuals to commit espionage.
MICE Money, Ideology, Compromise, Ego - An acronym describing the factors which motivate
individuals to commit espionage.
http://it.ojp.gov/documents/min_crim_intel_stand.pdf
http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm
Actionable Intelligence - Intelligence information that is directly useful to customers for immediate
exploitation without having to go through the full intelligence production process; it may address
strategic or tactical needs, close support of US negotiating teams, or action elements dealing with such
matters as international terrorism or narcotics.
Agent - (1) A person who engages in clandestine intelligence activity under the direction of an
intelligence organization but who is not an office, employee, or co-opted worker of that organization. (2)
An individual who acts under the direction of an intelligence agency or security service to obtain, or
assist in obtaining, information for intelligence or counterintelligence purposes. (3) One who is
authorized or instructed to obtain or to assist in obtaining information for intelligence or
counterintelligence purposes.
Analysis - A process in the production step of the intelligence cycle in which intelligence information is
subjected to systematic examination in order to identify significant facts and derive conclusions
therefrom.
Asset - (1) Any resource – a person, group, relationship, instrument installation, supply – at the
disposition of an intelligence agency for use in an operational or support role. (2) A person who
contributes to a clandestine mission but is not a fully controlled agent.
Automated Trusted Information Exchange (ATIX) - Operated by the Regional Information Sharing
Systems®, ATIX is a secure means to disseminate national security or terrorist threat information to law
enforcement and other first responders via the ATIX electronic bulletin board, secure Web site, and
secure e-mail.
C3 - An intelligence application concept initially used by military intelligence that stands for command,
control, and communication as the hallmark for effective intelligence operations.
Classification - The determination that official information requires, in the interest of national security,
a specific degree of protection against unauthorized disclosure, coupled with a designation signifying
that such a determination has been made; the designation is normally termed a security classification
and includes Confidential, Secret, and Top Secret.
Compartmentalization - (1) Formal system of restricted access to intelligence activities, such systems
established by and/or managed under the cognizance of the DCI to protect the sensitive aspects of
sources, methods, and analytical procedures of foreign intelligence information, limited to individuals
with a specific need for such information and who are therefore given special security clearances and
indoctrination in order to have access to it. (2) Establishment and management of an intelligence
organization so that information about the personnel, organization, or activities of one component is
made available to any other component or individual only to the extent required for the performance of
assigned duties.
Counterintelligence - Information gathered and activities conducted to protect against espionage, other
intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers,
organizations, persons, or terrorist activities, but not including personnel, physical, document, or
communications security programs.
Counterterrorism - Offensive measures taken to prevent, deter, and respond to a terrorist act or the
documented threat of such an act.
Covert Action - (1) An operation designed to influence governments, events, organizations, or persons
in support of foreign policy in a manner that is not necessarily attributable to the sponsoring power; it
may include political, economic, propaganda, or paramilitary activities. (2) Operations that are so
planned and executed as to conceal the identity of, or permit plausible deniability by, the sponsor.
Covert Operation - (Preferred term - Clandestine operation). A covert operation encompassing covert
action and clandestine collection.
Critical and Sensitive Information List - Those areas, activities, functions, or other matters that a
facility/organization considers most important to keep from adversaries (DOE 1992).
Critical Infrastructures - Certain national infrastructures so vital that their incapacity or destruction
would have a debilitating impact on the defense or economic security of the United States. These critical
infrastructures include telecommunications, electrical power systems, gas and oil storage and
transportation, banking and finance, transportation, water supply systems, emergency services
(including medical, police, fire, and rescue), and continuity of government (JCS 1997; EO n.d.).
Estimate - (1) An analysis of a foreign situation, development, or trend that identifies its major
elements, interprets the significance, and appraises the future possibilities and the prospective results of
the various actions that might be taken. (2) An appraisal of the capabilities, vulnerabilities, and potential
courses of action of a foreign nation or combination of nations in consequence of a specific national
plan, policy, decision, or contemplated course of action. (3) An analysis of an actual or contemplated
clandestine operation in relation to the situation in which it is or would be conducted in order to identify
and appraise such factors as available and needed assets, and potential obstacles, accomplishments,
and consequences.
Finished Intelligence - (1) The product resulting from the collection, processing, integration, analysis,
evaluation, and interpretation of available information concerning foreign countries or areas. (2) The
final result of the production step of the intelligence cycle; the intelligence product.
Foreign Liaison - Efforts to work with foreign government intelligence services, including law
enforcement agencies that gather or carry out intelligence-related activities. Examples of foreign liaison
include sharing information, joint collection efforts, and the arrest of suspected terrorists by foreign
governments using US-supplied information. Every major US intelligence agency has some form of
liaison relationship with foreign governments.
Intelligence - (1) A body of evidence and the conclusions drawn therefrom acquired and furnished in
response to the known or perceived requirements of customers; it is often derived from information
that is concealed or not intended to be available for use by the acquirer. (2) A term used to refer
collectively to the functions, activities, or organizations that are involved in the process of planning,
gathering, and analyzing information of potential value to decision-makers and to the production of
intelligence as defined above. (3) The product resulting from the collection, collation, evaluation,
analysis, integration, and interpretation of all collected information.
Intelligence Community - The aggregate of the following executive branch organizations and agencies
involved in intelligence activities: the Central Intelligence Agency; the National Security Agency; the
Defense Intelligence Agency; offices within the Department of Defense for the collection of specialized
national foreign intelligence through reconnaissance programs; the Bureau of Intelligence and Research
of the Department of State; intelligence elements of the military services, the Federal Bureau of
Investigation, the Department of the Treasury, and the Department of Energy; and staff elements of the
Office of the Director of Central Intelligence (ICS 1989).
Law Enforcement Sensitive (LES) - Sensitive But Unclassified information specifically compiled for law
enforcement purposes that, if not protected from unauthorized access, could reasonably be expected to
1) interfere with law enforcement proceedings, 2) deprive a person of a right to a fair trial or impartial
adjudication, 3) constitute an unwarranted invasion of the personal privacy of others, 4) disclose the
identity of a confidential source, 5) disclose investigative techniques and procedures, and/or 6)
endanger the life or physical safety of an individual.
Proprietary Information - Material and information relating to, or associated with, a company's
products, business, or activities, including but not limited to financial information; data or statements;
trade secrets; product research and development; existing and future product designs and performance
specifications; marketing plans or techniques; schematics; client lists; computer programs; processes;
and know-how that have been clearly identified and properly marked by the company as proprietary
information, trade secrets, or company confidential information. The information must have been
developed by the company and not be available to the government or to the public without restriction
from another source (NSTISSI 1997).
Restricted Data - All data (information) concerning design, manufacture, or utilization of atomic
weapons; the production of special nuclear material; or the use of special nuclear material in the
production of energy, but not to include data declassified or removed from the Restricted Data category
pursuant to Section 142 of the Atomic Energy Act of 1954, as amended.
Sensitive But Unclassified (SBU) Information - Information that has not been classified by a federal law
enforcement agency that pertains to significant law enforcement cases under investigation and criminal
intelligence reports that require dissemination criteria to only those persons necessary to further the
investigation or to prevent a crime or terrorist act.
Sensitive Homeland Security Information (SHSI) - Any information created or received by an agency or
any local, county, state, or tribal government that the loss, misuse, unauthorized disclosure,
modification of, or the unauthorized access to could reasonably be expected to impair significantly the
capabilities and/or efforts of agencies and/or local, county, state, and tribal personnel to predict,
analyze, investigate, deter, prevent, protect against, mitigate the effects of, or recover from acts of
terrorism.
Sources of data - Materials, conversations and actions that provide information and indicators. The
sources are as follows:
a. Protected sources. Friendly personnel, documents, material and so forth, possessing classified
or sensitive data which are protected by personnel, information, physical, crypto, emission and
computer security measures.
b. Open sources. Oral, documentary, pictorial and physical materials accessible to the public.
c. Detectable actions. Physical actions or entities and emissions or other phenomena that can be
observed, imaged or detected by human senses or by active and passive sensors.
Strategic intelligence - Intelligence required for the formulation of policy and military plans at national
and international levels; it differs primarily from tactical intelligence in level of use, but may also vary in
scope and detail.
2. espionage and other intelligence activities, sabotage, and assassination, conducted by, for, or
on behalf of foreign powers, organizations, or persons;
4. other matters determined by the Attorney General, consistent with Executive Order 12333 or
a successor order.
TIARA: Tactical Intelligence and Related Activities (TIARA) - TIARA encompasses those
programs/activities outside the NFIP and JMIP that: 1) respond to operational commanders’ tasking for
time sensitive information on foreign entities; 2) respond to national intelligence community tasking of
systems whose primary mission is support to operating forces; 3) train personnel for intelligence duties;
4) provide an intelligence reserve; or 5) are devoted to research and development of intelligence or
related capabilities. Specifically excluded are programs that are so closely integrated with a weapon
system that their primary function is to provide immediate-use targeting data. TIARA programs /
activities are funded as part of normal Service budget development, and as a result are often embedded
in larger force structure or weapon system budget lines.
WEB-SITES
The following web-sites provide information which we believe may be of interest to intelligence
officers, analysts, and investigators.
* Anti-Terrorism *
* Encryption *
* VeriSign -
http://www.verisign.com/authentication/individual-authentication/digital-id/index.html
Hushmail
http://www.hushmail.com/
Stealth Message
http://www.stealthmessage.com/
Steganos FreeCrypt
https://www.steganos.com/us/service/freecrypt/overview/
Steganos LockNote
https://www.steganos.com/us/products/for-free/locknote/overview/
TrueCrypt
http://www.truecrypt.org/
* Language Studies *
The U. S. Naval Observatory is charged with maintaining the DoD reference for Precise Time and Time
Interval (PTTI).
Telephone Time
Weather Underground
http://www.wunderground.com/
Books (with links to Amazon.Com)
Better Policing With Microsoft Office by Mark A. Stallo & Christopher W. Bruce
BookSurge Publishing (September 19, 2005) Plastic Comb: 302 pages
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis by Colleen McCue Ph.D.
Butterworth-Heinemann; 1 edition (May 1, 2007) Paperback: 368 pages
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing
Technologies by Christopher Westphal
CRC Press; 1 edition (December 22, 2008) Hardcover: 440 pages
Environmental Criminology and Crime Analysis by Richard Wortley and Lorraine Mazerolle
Willan Publishing (UK); Illustrated Edition (June 2008) Paperback: 294 pages
GIS in Law Enforcement: Implementation Issues and Case Studies by Mark R. Leipnik
CRC Press; 1st Edition (November 7, 2002) Hardcover: 286 pages
Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice by Deborah Osborne and
Susan Wernicke -- Routledge; 1st Edition (September 16, 2003) Hardcover: 156 pages
Investigative Data Mining for Security and Criminal Detection by Jesus Mena
Butterworth-Heinemann; 1 edition (December 30, 2002) Paperback: 272 pages
Process of Investigation, Third Edition: Concepts and Strategies for Investigators in the Private Sector by
Charles A. Sennewald CPP and John Tsukayama CPP CFE PCI
Butterworth-Heinemann; 3 edition (May 29, 2006) Hardcover: 344 pages
Psychology of Intelligence Analysis by Richards J. Heuer Jr.
Nova Science; 1st Edition (August 30, 2005) Paperback: 216 pages
Strategic Intelligence: A Handbook for Practitioners, Managers and Users by Don McDowell
Scarecrow Press; Revised edition (January 30, 2009) Paperback: 272 pages
Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations by Michael R.
Ronczkowski -- CRC Press; 2nd Edition (November 14, 2006) Hardcover: 392 pages