Sunteți pe pagina 1din 118

Guide to Sources of Information

for
Intelligence Officers, Analysts, and Investigators

Compiled by:
Michael E. Chesbro
UPDATE: 1 March 2010
ABOUT THE GUIDE

The "Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators" is compiled
from multiple and various open sources. The information found in the guide was obtained from the
organizations listed herein or from other open sources (i.e. Internet) and may not have been fully
validated.

This guide is not intended to be an exhaustive compilation of all sources of information available to
intelligence officers, analysts, and investigators. There are many other sources of valuable information
that may be useful for intelligence, analytical, and investigative purposes. The specific sources of
information identified in the guide exemplify the types of information available, and that which may
have proven useful in the past.

The inclusion of specific products or services should not be viewed as an endorsement by any agency,
organization, or person.

As a user of this guide, you should be aware that, in many cases, information and sources we cite may
be privileged or restricted and, therefore, you will need to apply for accounts or access to the specific
systems, and databases listed.

The information provided in this guide is current as of the date of publication. The guide was originally
compiled and published in October 2009. The guide is a 'living document' to which I continually make
changes and updates. I request your assistance in updating and improving the guide. Please submit any
updates or suggestions on how the guide can better meet users’ needs, or requests for a copy of the
most current edition of the guide, directly to me by e-mail at michael.chesbro@leo.gov

* If your copy of the Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators
is more than 90-days old, please check with me for the latest update.*

Michael Chesbro, CPO, CSS, CCIA, CFC, CAS, CHS-III, SSI


Criminal Intelligence Specialist / Certified Crime & Intelligence Analyst
Joint Base Lewis-McChord Fusion Center - Police Intelligence / Crime Analysis Unit
DES/Force Protection (Bldg. 2007, MS-55)
Joint Base Lewis-McChord, WA 98433
Tel: 253-966-7303 / DSN: 347-7303
Fax: 253-966-7318
michael.chesbro@us.army.mil
michael.chesbro@leo.gov

* Note: Although I work for DoD, the "Guide to Sources of Information for Intelligence Officers, Analysts, and Investigators" is a
personal project and should not be considered an official government publication, nor is it officially endorsed by any
government agency.
TABLE OF CONTENTS

*Federal Agencies* (Directory)


ATF Field Operations Offices

Bureau of Diplomatic Security - Diplomatic Security Service

Central Intelligence Agency

Crime Records Center (US Army - USACIDC)

Customs and Border Protection (CBP)

DEA Field Offices

FBI Field Offices

FBI - Joint Terrorism Task Forces

Federal Protective Service (FPS)

High Intensity Drug Trafficking Areas

Homeland Security Points of Contact (by State)

Immigration & Customs Enforcement (ICE)


- Detention and Removal Operations Offices
- Office of Intelligence / Field Intelligence Units
- Office of Investigations

National Drug Intelligence Center (NDIC)

National Gang Intelligence Center (NGIC)

National Nuclear Security Administration

Postal Inspection Service

Secret Service Field Offices

Terrorist Screening Center (TSC)

Transportation Security Administration (TSA)

United States Attorneys' Offices

United States Citizenship and Immigration (USCIS) Offices

United States Intelligence Community

US Marshals District Offices

* Information Sharing Networks & Resources*


American Board for Certification in Homeland Security (ABCHS)

Bomb Arson Tracking System (BATS)

Consumer Sentinel

Cybercop

FBI Citizens' Academy

Federal Protective Service Portal

First Observer

High Tech Crime Consortium

High Technology Crime Investigation Association

Homeland Security Information Network (HSIN)

HSIN-Intelligence

Information Assurance Support Environment - Defense Information Systems Agency (DISA)

Information Sharing Environment

Infragard

IntelCenter

Intelink

Intelligence Is The Future Intelligence Applications & Analysis for Law Enforcement

International Association of Crime Analysts

International Association of Law Enforcement Intelligence Analysts

Law Enforcement Intelligence Unit (LEIU)

Law Enforcement Online (LEO)

Lessons Learned Information Sharing Network

Multi-State Information Sharing and Analysis Center (MS-ISAC)

National Counter-Terrorism Center

National Criminal Intelligence Resource Center (NCIRC)

National Equipment Register, Inc. (NER)

National Insurance Crime Bureau

National Missing and Unidentified Persons System (NamUs)

National Technical Investigators’ Association


National White Collar Crime Center (NW3C)

Office of the National Counterintelligence Executive

Open Source Center

Overseas Security Advisory Council (OSAC)

Regional Information Sharing System (RISS)

Regional and State Online Resource for Emergency Management

SENTRY

State and Local Antiterrorism Training (SLATT)

TRIPwire

United States Private and Public Partnership (USP3)

*Standards and Protocols*


Information Evaluation (Source Reliability and Content Validity)

Intelligence Analysis Confidence-Level Definitions

Probability Ratings (ASIS Guideline)

Intelligence Cycle

What is intelligence?

Suspicious Incident Reporting Standards

ALARACT 322/2009 - Force Protection - Ten Key Indicators of Potential Terrorist Associated Insider Threats to the Army.

Controlled Unclassified Information

Operations Security (OPSEC)

* Training and Education*


28 CFR Part 23 Online Training

40 Hour Bioterrorism and Emergency Preparedness Training Certificate Program

ACT Online - Cyber Security Training

Anacapa Web-based Training

Anti-Terrorism Intelligence Awareness Training Program

Anti-Terrorism Level-1 Training

Basic Intelligence Analyst Course


Center for Homeland Defense and Security

Defense Security Service Academy

Detecting Bio-terror

DNA Initiative

Doctrine Networked Education & Training (DOCNET)

DoD Cyber Crime Center (DC3)

DoD Defense Support of Civil Authorities (DSCA) Course

Emergency Management Institute - FEMA Independent Study Programs

Emergency Operations Training Academy

Español for Law Enforcement: An Interactive Training Tool

Evaluation of Information Sources

FBI Virtual Academy

Foundations of Intelligence Analysis Training (FIAT)

FSI Language Courses

Functional Police Spanish - Spanish For Law Enforcement Personnel

Information Assurance Security Officer (IASO) (Management Level 1) - 40-hours

Infragard - Information Security in the Workplace

Intelligence Analyst Training Program (IATP)

Joint Intelligence Virtual University

Joint Knowledge Online

Joint Language University

Military Police Investigations Course

Multijurisdictional Counterdrug Task Force Training

National HIDTA Assistance Center

National Terrorism Preparedness Institute

Navy and Marine Corps Intelligence Training Center (NMITC) Intelligence Courses

Open Source Intelligence Training

Peace Operation Training Institute - Global Terrorism Course

Tactical Language & Culture Training System


University of Military Intelligence

---------- Selected Commercial Courses ----------

Alpha Group Center for Crime and Intelligence Analysis Training

American Institute of Applied Science

Anacapa Sciences, Inc.

Cleveland Institute of Electronics

International Association of Crime Analysts

Legal Investigation Certificate Course

Lockmasters Security Institute - Comprehensive Security Specialist Training

Registered Investigator - ACFEI

S2 Safety Intelligence Institute

USDA Graduate School

---------- Academic Training Opportunities in Intelligence, Investigations and Analysis ----------

Intelligence Analysis Certificate - American Military University

Certificate in Professional Investigation - Boston University

Graduate Certificate in Applied Intelligence - Mercyhurst College

Certificate in Law Enforcement Intelligence - Michigan State University

Geospatial Intelligence Graduate Certificate Program - George Mason University

Post-Baccalaureate Certificate in Crime Analysis - Radford University

Certificate in Advanced Crime Analysis - Portland State University

Intelligence Certificate Programs - Henley-Putnam University

Intelligence Studies Certificate - Neumann University

---------- Certification Programs ----------

*Selected Resources*
Analysis of Competing Hypotheses Software

Baseline Capabilities for State and Major Urban Area Fusion Centers

Central Intelligence Agency (CIA) Library


Crime Analysis Charts (RFFlow)

Criminal Intelligence Systems Operating Policies (28 CFR Part 23)

Cryptography Program

Data Ferrett

Decrypto 8.5 (automated cryptogram solver)

Defense Language Institute Foreign Language Center - Field Support Modules

Encryption Wizard (EW) - DoD Software Protection Initiative

Evaluating the Quality of Information on the Internet

FBI Law Enforcement Bulletin

Federal Law Enforcement Informer

Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era
Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels

Global Terrorism Database

INSCOM G3 Intelligence Analyst Training Program

Integrated Intelligence and Crime Analysis

Intelligence Knowledge Network (IKN)

JavaScript Browser Based Cryptography Tools

Joint Electronic Library

Law Enforcement Analytic Standards

Law Enforcement Intelligence:


A Guide for State, Local, and Tribal Law Enforcement Agencies, 2nd Ed

Law Enforcement Intelligence Resources

Maps, Satellite & Aerial Photos

National Criminal Intelligence Sharing Plan

Open Government Guide

Police Intelligence Operations (FM 3-19.50)

Pre-OCONUS Travel File (PRO-File)

Problem Analysis Module (On-line Program)

Psychology of Intelligence Analysis - by Richards J. Heuer, Jr.

Resource Information Center - COPS Publications, Training & Tools


Silobreaker

Squidmat (Courses of action evaluation program)

Statistical Data Resources (Crime Statistics)


-- Bureau of Justice Statistics
-- Federal Justice Statistics Resource Center
-- National Archive of Criminal Justice Data
-- National Criminal Justice Reference Service
-- Sourcebook of Criminal Justice Statistics
-- Uniform Crime Reports

Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis

Untangling the Web: An Introduction to Internet Research

US Army Personnel Recovery (PR) Branch

VIDEO - Crime Scene Investigation and Forensic Science Videos

VIDEO - History of Bio-Terrorism

VIDEO - The Seven Signs of Terrorism

VIDEO - Recognizing the Eight Signs of Terrorism

VIDEO - Radiological Terrorism: Just in Time Training for Hospital Clinicians

VineLink

*Acronyms and Abbreviations*

*Glossary*

*Web-Sites*
Anti-Terrorism

Country Information / Country Studies

Encryption

Language Studies

Weather, Light & Time Data

*Books (with links to Amazon.Com)*


*FEDERAL AGENCIES*

ATF Field Operations Offices


http://www.atf.gov/field/index.htm

Bureau of Alcohol, Tobacco, Firearms and Explosives


Office of Public and Governmental Affairs
99 New York Ave. NE
Mail Stop 5S144
Washington, DC 20226

The Bureau of Alcohol, Tobacco, Firearms and Explosives field divisions are located throughout the
United States. Some of the field offices have jurisdiction in surrounding states.

Atlanta Field Division: 404-417-2600 Dallas Field Division: 469-227-4300


Baltimore Field Division: 443-965-2000 Denver Field Division: 303-844-7450
Boston Field Division: 617-557-1200 Detroit Field Division: 313-202-3400
Charlotte Field Division: 704-716-1800 Houston Field Division: 281-372-2900
Chicago Field Division: 312-846-7200 Kansas City Field Division: 816-559-0700
Columbus Field Division: 614-827-8400 Los Angeles Field Division: 818-265-2500
Louisville Field Division: 502-753-3400 Phoenix Field Division: 602-776-5400
Miami Field Division: 305-597-4800 San Francisco Field Division: 925-479-7500
Nashville Field Division: 615-565-1400 Seattle Field Division: 206-389-5800
Newark Field Division: 973-413-1179 St. Paul Field Division: 651-726-0200
New Orleans Field Division: 504-841-7000 Tampa Field Division: 813-202-7300
New York Field Division: 718-650-4000 Washington, DC Field Division: 202-648-8010
Philadelphia Field Division: 215-717-4700

Bureau of Diplomatic Security - Diplomatic Security Service

As the Department of State's security and law enforcement arm, the Bureau of Diplomatic Security plays
an essential yet behind-the-scenes role: To provide a safe and secure environment for the conduct of
U.S. foreign policy. Not only is Diplomatic Security a unique organization in the foreign affairs
community--it is the only law enforcement agency with representation in nearly every country in the
world.

Diplomatic Security has offices throughout the United States staffed with special agents and contract
investigators. These agents form the backbone of DS's investigative mission, conducting criminal,
counterterrorism, and background investigations. Agents assigned to field and resident offices assist in
providing support to the protection of the Secretary of State, the U.S. Ambassador to the United
Nations, and visiting foreign dignitaries. In addition, they are charged with security support for resident
foreign diplomats and assistance to the private sector through the Overseas Security Advisory Council.
Liaison with federal and local law enforcement, foreign mission personnel, local officials, and the private
sector complements their major responsibilities.

DS Investigative Field Offices


http://www.state.gov/m/ds/rls/rpt/18892.htm

Atlanta Resident Office Charleston Satellite Office


77 Forsyth St. Suite 320 1269 Holland St., Rm. 228
Atlanta, GA 30303 Charleston, SC 29405
Phone: 404-331-3521 Phone: 843-746-1906
Fax: 404-730-2410 Fax: 843-746-1910

Boston Field Office Chicago Field Office


Thomas P. O'Neill Federal Bldg. Kluczynski Federal Building
10 Causeway St., Suite 1001 230 S. Dearborn Street Suite 2318
Boston, MA 02222 Chicago, IL 60604
Phone: 617-565-8200 Phone: 312-353-6163
Fax: 617-565-8222 Fax: 312-886-7895

Bridgeport Resident Office Dallas Resident Office


Brian McMahon U.S. Courthouse & Federal Bldg. Earle Cabell Federal Bldg.
915 Lafayette Blvd., Rm. 300 1100 Commerce St., Rm. 762
Bridgeport, CT 06604-4706 Dallas, TX 75242
Phone: 203-579-5701 Phone: 214-767-0700
Fax: 203-579-5721 Fax: 214-767-3544
Denver Resident Office Philadelphia Resident Office
3151 South Vaughn Way, 6th Floor 600 Arch Street Rm. 3218
Aurora, CO 80014-3514 Philadelphia, PA 19106
Phone: 303-696 3078 Phone: 215-861-3370
Fax: 303-696 3042 Fax: 215-861-3369

Greensboro Resident Office Phoenix Resident Office


1801 Stanley Rd., Suite 320 Sandra Day O'Connor U.S. Courthouse
Greensboro, NC 27407 Suite 435, 401 W. Washington St., SPC 45
Phone: 336-547-4292 Phoenix, AZ 85003-2151
Fax: 336-547-4298 Phone: 602-364-7842
Fax: 602-364-7845
Honolulu Resident Office
PJKK Federal Bldg. Portsmouth Satellite Office
300 Ala Moana Blvd. 31 Rochester Ave.
Rm. 6-209 Portsmouth, NH 03801
Honolulu, HI 96850 Phone: 603-334-0519
Phone: 808-541-2854 Fax: 603-334-0652
Fax: 808-541-3433
St. Louis Resident Office
Houston Field Office Robert A. Young Federal Bldg.
Mickey Leland Federal Bldg. 1222 Spruce St., Rm. 9107
1919 Smith St., Suite 870 St Louis, MO 63103
Houston, TX 77002 Phone: 314-539-2721
Phone: 713-209-3482 Fax: 314-539-2746
Fax: 713-209-3470
San Diego Resident Office
Los Angeles Field Office 555 W Beech St. Rm. 222
255 E. Temple St. San Diego, CA 92101
Suite 1273 Phone: 619-557-6194
Los Angeles, CA 90012 Fax: 619-557-5919
Phone: 213-894-3290
Fax: 213-894-0914 San Francisco Field Office
235 Pine Street Suite 900
Miami Field Office San Francisco, CA 94104
Claude Pepper Federal Bldg. Phone: 415-705-1176
51 SW 1st Ave., Rm. 404 Fax: 415-705-1187
Miami, FL 33130
Phone: 305-536-5781 San Juan Resident Office
Fax: 305-536-6515 La Torre de la Plaza
525 FD Roosevelt Ave. Suite 1115
New Orleans Resident Office Hato Rey, PR 00918
365 Canal St. Suite 1130 Phone: 787-766-5704
New Orleans, LA 70130 Fax: 787-771-3693
Phone: 504-589-2010
Fax: 504-589-2028 Seattle Resident Office
915 Second Ave., Suite 3410
New York Field Office Seattle, WA 98174
1 Executive Drive Suite 500 Phone: 206-220-7721
Fort Lee, NJ 07024 Fax: 206-220-7723
Phone: 201-346-8100
Fax: 201-944-5106
Washington Field Office
222 Gallows Road, Ste. 300
Dunn Loring, VA 22027
Phone: 571-226-9300
Fax: 571-226-9382

Central Intelligence Agency


Office of Public Affairs
Washington, D.C. 20505
Tel: 703-482-0623
Fax: 703-482-1739

Crime Records Center (US Army - USACIDC) - http://www.cid.army.mil/crc.html

The U.S. Army Crime Records Center is co-located with the USACIDC Headquarters at Fort Belvoir
Virginia. The CRC is a multi-functional center, supporting not only the Army and the command, but also
foreign, federal, state and local law enforcement agencies.

The CRC receives, safeguards, maintains and disseminates information from Army law enforcement
records. The center has accumulated more than 2.5 million reports. It also serves as CID's Freedom of
Information and Privacy Act authority and annually responds to more than 2,000 requests for
information. Another major function of the center is to manage the Army law enforcement Polygraph
Program.

The CRC director is Mr. Phillip McGuire.

Email address: CRCFOIAPA@conus.army.mil

Mailing Address:

Director
U.S. Army Crime Records Center
USACIDC
6010 6th Street
Fort Belvoir, VA 22060-5585
Phone:703-806-0431
DSN: 656-0431

Name Check
Phone: 703-806-0397
DSN: 656-0397
Customs and Border Protection (CBP) - http://www.cbp.gov

 Inquiries 877-CBP-5511

 International Callers 703-526-4200

 TTD 866-880-6582

 Admissibility and Passenger Programs 202-344-1220

 Agriculture Programs and Trade Liaison 202-344-3298

 C-TPAT 202-344-1180

 Importing/Trade Enforcement 202-344-1320

Field Operations Offices - http://www.cbp.gov/xp/cgov/toolbox/contacts/cmcs/

There are 20 Field Operations Offices in the United States that provide centralized management
oversight and operational assistance to 327 U.S. ports of entry and 15 preclearance offices. Established
geographically by region, Field Operations Offices serve as the spokes of a wheel for CBP Headquarters
to distribute key policies and procedures to field staff. Field Operations Offices provide guidance to their
regional ports and ensure the dissemination and implementation of core CBP guidelines. These offices
also provide for mission support functions within their regions; such as, resource management, equal
employment opportunity, labor, employee relations, and other human resources management
functions.

DEA Field Offices


http://www.usdoj.gov/dea/agency/domestic.htm

The DEA has 227 Domestic Offices in 21 Divisions throughout the U.S. and 87 Foreign Offices in 63
countries.

Drug Enforcement Administration


Headquarters, Mailstop: AES
8701 Morrissette Drive, Springfield, VA 22152

DEA Headquarters 202-307-1000 Houston Division 713-693-3000


Atlanta Division 404-893-7000 Los Angeles Division 213-621-6700
Boston Division 617-557-2100 Miami Division 954-660-4500
Caribbean Division 787-277-4700 New Jersey Division 973-776-1100
Chicago Division 312-353-7875 New Orleans Division 504-840-1100
Dallas Division 214-366-6900 New York Division 212-337-3900
Denver Division 720-895-4040 Philadelphia Division 215-861-3474
Detroit Division 313-234-4000 Phoenix Division 602-664-5600
El Paso Division 915-832-6000 San Diego Division 858-616-4100
San Francisco Division 415-436-7900 St. Louis Division 314-538-4600
Seattle Division 206-553-5443 Washington Division 202-305-8500

FBI Field Offices


http://www.fbi.gov/contact/fo/fo.htm

FBI Headquarters 202-324-3000


Federal Bureau of Investigation
J. Edgar Hoover Building
935 Pennsylvania Avenue, NW
Washington, D.C. 20535-0001

The FBI has 56 field offices centrally located in major metropolitan areas across the U.S. and Puerto Rico.
The FBI also maintains about 400 resident agencies in smaller cities and towns across the nation. Each
field office is overseen by a Special Agent in Charge, except our offices in Los Angeles, New York City,
and Washington, D.C., which are managed by an Assistant Director in Charge due to their large size.

Alabama Georgia
FBI Birmingham 205-326-6166 FBI Atlanta 404-679-9000
FBI Mobile 251-438-3674
Hawaii
Alaska FBI Honolulu 808-566-4300
FBI Anchorage 907-276-4441
Illinois
Arizona FBI Chicago 312-421-6700
FBI Phoenix 602-279-5511 FBI Springfield 217-522-9675

Arkansas Indiana
FBI Little Rock 501-221-9100 FBI Indianapolis 317-639-3301

California Kentucky
FBI Los Angeles 310-477-6565 FBI Louisville 502-263-6000
FBI Sacramento 916-481-9110
FBI San Diego 858-565-1255 Louisiana
FBI San Francisco 415-553-7400 FBI New Orleans 504-816-3000

Colorado Maryland
FBI Denver 303-629-7171 FBI Baltimore 410-265-8080

Connecticut Massachusetts
FBI New Haven 203-777-6311 FBI Boston 617-742-5533

District of Columbia Michigan


FBI Washington 202-278-2000 FBI Detroit 313-965-2323

Florida Minnesota
FBI Jacksonville 904-248-7000 FBI Minneapolis 612-376-3200
FBI North Miami Beach 305-944-9101
Mississippi
FBI Tampa 813-253-1000
FBI Jackson 601-948-5000
Missouri Pennsylvania
FBI Kansas City 816-512-8200 FBI Philadelphia 215-418-4000
FBI St. Louis 314-231-4324 FBI Pittsburgh 412-432-4000

Nebraska Puerto Rico


FBI Omaha 402-493-8688 FBI San Juan 787-754-6000

Nevada South Carolina


FBI Las Vegas 702-385-1281 FBI Columbia 803-551-4200

New Jersey Tennessee


FBI Newark 973-792-3000 FBI Knoxville 865-544-0751
FBI Memphis 901-747-4300
New Mexico
FBI Albuquerque 505-889-1300 Texas
FBI Dallas 972-559-5000
New York FBI El Paso 915-832-5000
FBI Albany 518-465-7551 FBI Houston 713-693-5000
FBI Buffalo 716-856-7800 FBI San Antonio 210-225-6741
FBI New York 212-384-1000
Utah
North Carolina FBI Salt Lake City 801-579-1400
FBI Charlotte 704-377-9200
Virginia
Ohio FBI Norfolk 757-455-0100
FBI Cincinnati 513-421-4310 FBI Richmond 804-261-1044
FBI Cleveland 216-522-1400
Washington
Oklahoma FBI Seattle 206-622-0460
FBI Oklahoma City 405-290-7770
Wisconsin
Oregon FBI Milwaukee 414-276-4684
FBI Portland 503-224-4181

FBI - Joint Terrorism Task Forces


Joint Terrorism Task Forces (JTTFs) are small cells of highly trained, locally based, investigators, analysts,
linguists, SWAT experts, and other specialists from dozens of U.S. law enforcement and intelligence
agencies. It is a multi-agency effort led by the Justice Department and FBI designed to combine the
resources of federal, state, and local law enforcement.

Alabama - Joint Terrorism Task Force Arkansas - Joint Terrorism Task Force
Birmingham 205-326-6166 Fayetteville 479-443-3181
Mobile 251-415-3259 Little Rock 479-443-3181
Montgomery 334-263-1691
California - Joint Terrorism Task Force
Alaska - Joint Terrorism Task Force Fresno 559-436-4474
Anchorage 907-276-4441 Long Beach 310-477-6565
Los Angeles 310-477-6565
Arizona - Joint Terrorism Task Force Riverside 951-686-0335
Phoenix 602-279-5511 Sacramento 916-481-9110
San Diego 858-565-1255
San Francisco 415-553-7400 Louisiana - Joint Terrorism Task Force
Santa Ana 714-542-8825 New Orleans 504-816-3000

Colorado - Joint Terrorism Task Force Maine - Joint Terrorism Task Force
Colorado Springs 719-633-3852 Portland 207-774-9322
Denver 303-575-7386
Maryland - Joint Terrorism Task Force
Connecticut - Joint Terrorism Task Force Baltimore 410-265-8080
New Haven 203-777-6311
Massachusetts - Joint Terrorism Task Force
Delaware - Joint Terrorism Task Force Boston 617-742-5533
Wilmington 302-658-4391 Springfield 413-736-0301

District Columbia - Joint Terrorism Task Force Michigan - Joint Terrorism Task Force
Washington, DC 202-278-2000 Detroit 313-313-2323
Grand Rapids 616-456-5489
Florida - Joint Terrorism Task Force
Jacksonville 904-721-1211 Minnesota - Joint Terrorism Task Force
Miami 305-787-6115 Minneapolis 612-376-3397
Orlando 407-875-9976
Pensacola 904-721-1211 Mississippi - Joint Terrorism Task Force
Tampa 813-253-1000 Jackson 601-948-5000
West Palm Beach 561-833-7517
Missouri - Joint Terrorism Task Force
Georgia - Joint Terrorism Task Force Kansas City 816-512-8200
Atlanta 404-679-6339 St. Louis 314-589-2500

Hawaii - Joint Terrorism Task Force Montana - Joint Terrorism Task Force
Honolulu 808-566-4300 Helena 406-443-3617

Idaho - Joint Terrorism Task Force Nebraska - Joint Terrorism Task Force
Boise 208-344-7843 Omaha 402-452-2580
Cour de' Laine 208-664-5128
Nevada - Joint Terrorism Task Force
Illinois - Joint Terrorism Task Force Las Vegas 702-385-1281
Chicago 312-421-6700
New Hampshire - Joint Terrorism Task Force
Springfield 217-757-3580
Bedford 603-472-2224
Indiana - Joint Terrorism Task Force
New Jersey - Joint Terrorism Task Force
Indianapolis 317-639-3301
Newark 973-792-3000
Iowa - Joint Terrorism Task Force
New Mexico - Joint Terrorism Task Force
Des Moines 515-223-4278
Albuquerque 505-889-1341
Kansas - Joint Terrorism Task Force
New York - Joint Terrorism Task Force
Kansas City 816-512-8200
Albany 518-431-7373
Wichita 316-262-0031
Buffalo 716-843-4332
Kentucky - Joint Terrorism Task Force New York 212-384-1000
Covington 859-341-3901 Rochester 585-464-9230
Lexington 859-254-4038
North Carolina - Joint Terrorism Task Force
Louisville 502-569-7138
Charlotte 704-377-9200
Ohio - Joint Terrorism Task Force Brownsville 956-546-6922
Cincinnati 513-421-4310 Bryan 979-776-8894
Cleveland 216-622-6688 Conroe 281-292-3329
Toledo 419-254-8945 Corpus Christi 361-883-8671
Dallas 972-559-5000
Oklahoma - Joint Terrorism Task Force El Paso 915-832-5000
Oklahoma City 405-290-3756 Fresco 214-705-7000
Tulsa 918-664-3300 Houston 713-693-5000
Laredo 956-723-4021
Oregon - Joint Terrorism Task Force
Lubbock 806-765-8571
Portland 503-552-5204
McAllen 956-984-6300
Midland 432-570-0255
Pennsylvania - Joint Terrorism Task Force
San Antonio 210-225-6741
Erie 814-452-4516
Texas City 409-935-7327
Philadelphia 215-418-4500
Pittsburgh 412-432-4000
Utah - Joint Terrorism Task Force
Salt Lake City 801-579-1400
Puerto Rico - Joint Terrorism Task Force
San Juan 787-772-2166
Virginia - Joint Terrorism Task Force
Charlottesville 434-293-9663
Rhode Island - Joint Terrorism Task Force
Norfolk 757-455-0100
Providence 401-272-8310
Richmond 804-627-4624
South Carolina - Joint Terrorism Task Force
Washington - Joint Terrorism Task Force
Charleston 843-722-9164
Everett 425-252-3500
Columbia 808-551-4404
Inland NW 509-892-9945
Greenville 864-232-3807
Seattle 206-262-2421
Tennessee - Joint Terrorism Task Force
West Virginia - Joint Terrorism Task Force
Knoxville 865-544-0751
Charleston 304-346-3232
Memphis 901-747-4300
Clarksburg 304-624-6200
Nashville 615-232-7500
Wisconsin - Joint Terrorism Task Force
Texas - Joint Terrorism Task Force
Madison 608-833-4600
Austin 512-345-1111
Milwaukee 414-291-4821
Beaumont 409-832-8571

Federal Protective Service (FPS)

National Toll Free Number: 1-877-4FPS-411 (1-877-437-7411)

FPS Headquarters is located in Washington, D.C. Regional offices are geographically located in New York,
Boston, Philadelphia, Atlanta, Denver, Chicago, San Francisco, Seattle, Fort Worth, Kansas City, and
Washington, DC. Other sites include the Far East and the Caribbean.
Region 1-Boston, Massachusetts 617-565-6360
Area of Responsibility: Massachusetts, Vermont, New Hampshire, Maine, Rhode Island, and Connecticut

Region 2-New York, New York 212-264-4255


Area of Responsibility: New Jersey, New York, Puerto Rico, and Virgin Islands

Region 3-Philadelphia, Pennsylvania 215-521-2150


Area of Responsibility: Delaware, Maryland, Virginia, Pennsylvania, and West Virginia

Region 4-Atlanta, Georgia 404-893-1500


Area of Responsibility: Alabama, Florida, Georgia, Kentucky, Mississippi, North Carolina, South Carolina,
and Tennessee

Region 5-Chicago, Illinois 312-353-1496


Area of Responsibility: Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin

Region 6-Kansas City, Missouri 816-426-2155


Area of Responsibility: Iowa, Kansas, Missouri and Nebraska

Region 7-Grand Prairie, Texas 817-649-6200


Area of Responsibility: Arkansas, Louisiana, Texas, New Mexico, and Oklahoma

Region 8-Denver, Colorado 303-236-6707


Area of Responsibility: Colorado, Wyoming, South Dakota, North Dakota, Montana, and Utah

Region 9-San Francisco, California 415-522-3440


Area of Responsibility: California, Arizona, Nevada, and Hawaii

Region 10-Federal Way, Washington 253-815-4700


Area of Responsibility: Alaska, Washington, Idaho, and Oregon
National Capital Region (NCR-11) 202-245-2300
Area of Responsibility: Washington DC, Virginia, and Maryland

High Intensity Drug Trafficking Areas

http://www.hidta.org/locations.asp

The High Intensity Drug Trafficking Areas (HIDTA) program enhances and coordinates drug control
efforts among local, State, and Federal law enforcement agencies. The program provides agencies with
coordination, equipment, technology, and additional resources to combat drug trafficking and its
harmful consequences in critical regions of the United States.

HIDTA Locations

Office of National Drug Control Policy 202-395-6752


Executive Office of the President
Bureau of State and Local Affairs
Washington D.C. 20503

Appalachia HIDTA 606-877-2100 California 619-557-5865


London, KY Southwest Border HIDTA
San Diego, CA
Arizona 520-746-4426
Southwest Border HIDTA Central Florida HIDTA 407-585-2687
Tucson, AZ Sanford, FL

Atlanta HIDTA 404-815-4401 Central Valley 559-457-5156


Atlanta, GA California HIDTA
Fresno, CA
Chicago HIDTA 312-603-8000 North Texas HIDTA 972-915-9501
Chicago, IL Irving, TX

Gulf Coast HIDTA 504-840-1401 Northern California HIDTA 415-436-8199


Metairie, LA San Francisco, CA

Hawaii HIDTA 808-356-4400 Northwest HIDTA 206-352-3601


Honolulu, HI Seattle, WA

HIDTA Assistance Center 305-715-7600 Ohio HIDTA 216-739-3501


Miami, FL Brooklyn Heights, OH

Houston HIDTA 281-372-5850 Oregon HIDTA 503-378-5123


Houston, TX Salem, OR

Lake County HIDTA 219-650-2470 Philadelphia/Camden HIDTA 215-560-1666


Crown Point, IN Philadelphia, PA

Los Angeles HIDTA 213-989-6457 Puerto Rico/Virgin Islands 787-474-8701


Los Angeles, CA HIDTA
San Juan, PR
Midwest HIDTA 816-746-4911
Kansas City, MO Rocky Mountain HIDTA 303-671-2180
Denver, CO
Milwaukee HIDTA 414-220-4789
Milwaukee, WI South Florida HIDTA 954-430-4901
Miramar, FL
Nevada HIDTA 702-759-8070
Las Vegas, NV South Texas HIDTA 210-692-7412
San Antonio, TX
New England HIDTA 978-691-2501
Methuen, MA Southeast Michigan HIDTA 313-967-4505
Detroit, MI
New Mexico 505-541-7506
Southwest Border HIDTA Southwest Border HIDTA 915-838-8545
Las Cruces, NM El Paso, TX

New York/New Jersey HIDTA 646-805-6105 Washington/Baltimore HIDTA 301-489-1700


New York, NY Greenbelt, MD

North Florida HIDTA 904-256-5903 West Texas Regional HIDTA 915-532-9550


Jacksonville, FL El Paso, TX

Homeland Security Points of Contact (by State) -- http://www.dhs.gov/xgovt/editorial_0291.shtm

Immigration & Customs Enforcement (ICE)


Headquarters
500 12th St, SW
Washington, DC 20536
Detention and Removal Operations Offices
http://www.ice.gov/about/dro/contact.htm

United States Immigration and Customs Enforcement (ICE) is a component of the Department of
Homeland Security (DHS). The Office of Detention and Removal (DRO) is a division of Immigration and
Customs Enforcement. DRO is the primary enforcement arm within ICE for the identification,
apprehension and removal of illegal aliens from the United States. The resources and expertise of DRO
are utilized to identify and apprehend illegal aliens, fugitive aliens, and criminal aliens, to manage them
while in custody and to enforce orders of removal from the United States. DRO is committed to
enforcing our nation’s immigration laws in a fair, effective, and professional manner.

Atlanta Field Office 404-893-1210 Newark Field Office 973-645-3666


Baltimore Field Office 410-637-4000 New Orleans Field Office 504-599-7800
Boston Field Office 781-359-7500 New York Field Office 212-264-4213
Buffalo Field Office 716-551-4741 Philadelphia Field Office 215-656-7164
Chicago Field Office 312-347-2400 Phoenix Field Office 602-766-7030
Dallas Field Office 214-905-5860 Salt Lake City Field Office 801-313-4260
Denver Field Office 303-371-1067 San Antonio Field Office 210-967-7056
Detroit Field Office 313-568-6049 San Diego Field Office 619-557-6343
El Paso Field Office 915-225-0885 San Francisco Field Office 415-844-5512
Houston Field Office 281-774-4968 Seattle Field Office 206-835-0650
Los Angeles Field Office 213-830-7911 St Paul Field Office 952-853-2550
Miami Field Office 305-207-2001 Washington Field Office 703-285-6301

Immigration & Customs Enforcement (ICE) - Field Intelligence Units


http://www.ice.gov/about/intel/contact.htm
Field Intelligence Units (FIUs) are established to receive intelligence information from the public, law
enforcement agencies and other sources and provide actionable leads and intelligence products to ICE
law enforcement units. These units routinely exchange intelligence with other Department of Homeland
Security (DHS) agencies and other law enforcement and intelligence agencies. The public is encouraged
to provide information relating to known or suspected threats or criminal activities under the
jurisdiction of the DHS. Each FIU has a defined area of responsibility. Law enforcement agencies are
encouraged to contact the FIU director responsible for their area and request materials or intelligence
products that may be beneficial to their mission requirements.

FIU Arizona 520-514-4872 FIU Miami 305-810-5249


FIU Atlanta 404-346-2292 FIU New Orleans 504-599-7915
FIU Baltimore 410-962-4959 FIU New York 646-733-3190
FIU Boston 617-565-6132 FIU Newark 973-954-4692
FIU Buffalo 716-551-4741 FIU Philadelphia 215-717-4899
FIU Chicago 312-983-1400 FIU San Antonio 210-321-2800
FIU Dallas 214-905-5207 FIU San Diego 619-557-6094
FIU Denver 303-721-3152 FIU San Francisco 510-267-3800
FIU Detroit 313-226-0414 FIU San Juan 787-253-4658
FIU El Paso 915-231-3256 FIU Seattle 206-766-6467
FIU Honolulu 808-532-3746 FIU St. Paul 952-853-2718
FIU Houston 281-985-0500 FIU Tampa 813-357-7109
FIU Los Angeles 562-256-8749 FIU Washington DC 703-285-6757
Immigration & Customs Enforcement (ICE)
Office of Investigations
http://www.ice.gov/about/investigations/contact.htm

The Office of Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the
United States. The SAC offices are responsible for the administration and management of all
investigative and enforcement activities within the geographic boundaries of the office. The SACs
develop, coordinate, and implement enforcement strategies to ensure conformance with national
policies and procedures and to support national intelligence programs. SACs coordinate law
enforcement activities with the highest level of Federal, state, and local governments, as well as
intelligence organizations and international law enforcement entities. In addition, SACs supervise all
administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program
is developed.

To efficiently manage their designated geographic regions, SAC offices maintain various subordinate
field offices throughout their areas of responsibility, which support the enforcement mission. These
subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge
(ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing
enforcement activities within the geographic boundaries of the office.

SAC Atlanta SAC Dallas


1100 Centre Parkway 125 E. John Carpenter Freeway, Suite 800
Atlanta, GA 30344 Irving, TX 75062
Main 404-346-2300 Main 972-444-7300
Fax 404-346-2374 Fax 972-444-7461

SAC Baltimore SAC Washington, DC


40 South Gay Street, 3rd Floor 2675 Prosperity Ave
Baltimore, MD 21202 Fairfax, VA 22031
Main 410-962-2620 Main 703-285-6700
Fax 410-962-3469 Fax 703-285-6709

SAC Boston SAC Denver


10 Causeway Street, Room 722 5445 DTC Pkwy, Suite 600
Boston, MA 02222-1054 Englewood, CO 80111
Main 617-565-3100 Main 303-721-3000
Fax 617-565-7422 Fax 303-721-3003

SAC Buffalo SAC Detroit


1780 Wehrle Drive, Suite D 477 Michigan Avenue, Suite 1850
Williamsville, NY 14221 Detroit, MI 48226
Main 716-565-2039 Main 313-226-0500
Fax 716-565-9509 Fax 313-226-6282

SAC Chicago SAC El Paso


1 North Tower Lane, Suite 1600 4191 N. Mesa
Oakbrook Terrace, IL 60181 El Paso, TX 79902
Main 630-574-4600 Main 915-231-3200
Fax 630-574-2889 Fax 915-231-3227
SAC Honolulu SAC Phoenix
595 Ala Moana Boulevard 400 North 5th Street
Honolulu, HI 96850 11th Floor
Main 808-532-3746 Phoenix, AZ 85004
Fax 808-532-4689 Main 602-514-7363
Fax 602-514-7790
SAC Houston
4141 N. Sam Houston Parkway East #300 SAC San Antonio
Houston, TX 77032 40 N. E. Loop 410, Suite 501
Main 281-985-0500 San Antonio, TX 78216
Fax 281-985-0505 Main 210-321-2800
Fax 210-321-2832
SAC Los Angeles
501 West Ocean Boulevard, Suite 7200 SAC San Diego
Long Beach, CA 90802-4213 185 West F Street, Suite 600
Main 562-624-3800 San Diego, CA 92101
Fax 562-590-9604 Main 619-744-4600
Fax 619-557-7275
SAC Miami
11226 NW 20th ST SAC San Francisco
Miami, FL 33172 1500 Broadway, 2nd Floor
Main 305-597-6000 Oakland, CA 94612
Fax 305-597-6227 Main 510-267-3800
Fax 510-267-3870
SAC New Orleans
1250 Poydras Street, Suite 2200 SAC San Juan
New Orleans, LA 70113 Capitol Office Building, 12th Floor
Main 504-310-8800 800 Ponce de Leon Avenue
Fax 504-310-8900 Santurce, PR 00908
Main 787-729-5151
SAC New York Fax 787-729-6646
601 W. 26th Street, 7th Floor
New York, NY 10001 SAC Seattle
Main 646-230-3200 1000 Second Avenue, Suite 2300
Fax 646-230-3255 Seattle, WA 98104
Main 206-553-7531
SAC Newark Fax 206-553-0826
620 Frelinghuysen Avenue
Newark, NJ 07114 SAC Minneapolis/St. Paul
Main 973-776-5500 2901 Metro Drive, Suite 100
Fax 973-776-5652 Bloomington, MN 55425
Main 952-853-2940
SAC Philadelphia Fax 612-313-9045
220 Chestnut Street, Room 200
Philadelphia, PA 19106 SAC Tampa
Main 215-717-4800 2203 North Lois Avenue
Fax 215-597-4200 Suite 600
Tampa, FL 33607
Main 813-357-7000
Fax 813-348-1877
National Drug Intelligence Center (NDIC) -- http://www.usdoj.gov/ndic/

The National Drug Intelligence Center (NDIC) was established by the Department of Defense
Appropriations Act, 1993 (Public Law 102-396) signed into law on October 6, 1992. Placed under the
direction and control of the Attorney General, NDIC was established to "coordinate and consolidate drug
intelligence from all national security and law enforcement agencies, and produce information regarding
the structure, membership, finances, communications, and activities of drug trafficking organizations."

Email: NDIC.Contacts@usdoj.gov

National Drug Intelligence Center


319 Washington Street, 5th Floor
Johnstown, PA 15901-1622
Telephone: (814) 532-4601
FAX: (814) 532-4690

National Drug Intelligence Center


U.S. Department of Justice
Robert F. Kennedy Building, Room 3341
950 Pennsylvania Avenue, NW
Washington, DC 20530-2000
Telephone: 202-532-4040

National Gang Intelligence Center (NGIC) -- http://www.usdoj.gov/criminal/ngic/


Crystal City, VA
Telephone: 703-414-8600
Fax: 703-414-8554

The National Gang Intelligence Center (NGIC) is a multi-agency effort that integrates the gang
intelligence assets of federal, state, and local law enforcement entities to serve as a centralized
intelligence resource for gang information and analytical support.

The mission of the NGIC is to support law enforcement agencies through timely and accurate
information sharing and strategic/tactical analysis of federal, state, and local law enforcement
intelligence focusing on the growth, migration, criminal activity, and association of gangs that pose a
significant threat to communities throughout the United States.

National Nuclear Security Administration -- http://nnsa.energy.gov/index.htm


1000 Independence Ave., SW
Washington, DC 20585
Telephone: 1-202-586-5000
Fax: 1-202-586-4403
E-mail: NNSA.CONTACT@nnsa.doe.gov

NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department
of Energy.

NNSA is responsible for the management and security of the nation’s nuclear weapons, nuclear
nonproliferation, and naval reactor programs. It also responds to nuclear and radiological emergencies
in the United States and abroad. Additionally, NNSA federal agents provide safe and secure
transportation of nuclear weapons and components and special nuclear materials along with other
missions supporting the national security.

NOAA Regional Climate Centers


http://www.ncdc.noaa.gov/oa/climate/regionalclimatecenters.html

NOAA's Regional Climate Centers (RCCs) are a federal-state cooperative effort. The RCC Program is
managed by the NOAA's National Climatic Data Center (NCDC). The six centers that comprise the RCC
Program are engaged in the timely production and delivery of useful climate data, information and
knowledge for decision makers and other users at the local, state, regional and national levels. The RCCs
support NOAA's efforts to provide operational climate services while leveraging improvements in
technology and collaborations with partners to expand quality data dissemination capabilities.

High Plains Regional Climate Center 3310 Holdrege Street


713 Hardin Hall Lincoln, NE 68583-0997
Tel: 402-472-6706 Tel: 225-578-5021
Fax: 402-472-8763 Fax: 225-578-2912

Midwestern Regional Climate Center Southeast Regional Climate Center


2204 Griffith Drive University of North Carolina at Chapel Hill
Champaign, IL 61820 Saunders Hall, Campus Box 3220,
Tel: 217-244-8226 Chapel Hill, NC 27599-3220
Fax: 217-244-0220 Tel: 919-843-9721
mrcc@isws.illinois.edu Fax: 919-843-9060

Northeast Regional Climate Center Western Regional Climate Center


1123 Bradfield Hall, Cornell University 2215 Raggio Parkway
Ithaca, NY 14853 Reno, NV 89512
Tel: 607-255-1751 Tel: 775-674-7010
Fax: 607-255-2106 Fax: 775-674-7001
nrcc@cornell.edu

Southern Regional Climate Center


E328 Howe-Russell Complex
Louisiana State University
Baton Rouge, LA 70803

Postal Inspection Service -- https://postalinspectors.uspis.gov/


Criminal Investigations Service Center
ATTN: Mail Fraud
222 S. Riverside Plaza, Ste. 1250
Chicago, IL 60606-6100
Tel: 1-877-876-2455

Postal Inspectors - Fraud Prevention Videos (Free Downloads)


https://postalinspectors.uspis.gov/pressroom/videos.aspx

Secret Service Field Offices


http://www.ustreas.gov/usss/contact.shtml

The United States Secret Service is a federal law enforcement agency with headquarters in Washington,
D.C., and more than 150 offices throughout the United States and abroad.

Alabama Arizona
Birmingham 205-731-1144 Phoenix 602-640-5580
Mobile 251-441-5851 Tucson 520-622-6822
Montgomery 334-223-7601
Arkansas
Alaska Little Rock 501-324-6241
Anchorage 907-271-5148
California
Fresno 559-487-5204
Los Angeles 213-894-4830 Kansas
Riverside 951-276-6781 Wichita 316-267-1452
Sacramento 916-930-2130
San Diego 619-557-5640 Kentucky
San Francisco 415-744-9026 Lexington 859-223-2358
San Jose 408-535-5288 Louisville 502-582-5171
Santa Ana 714-246-8257
Louisiana
Ventura 805-383-5745
Baton Rouge 225-389-0763
Colorado New Orleans 504-841-3260
Denver 303-850-2700
Maine
Connecticut Portland 207-780-3493
New Haven 203-865-2449
Maryland
Delaware Baltimore 443-263-1000
Wilmington 302-573-6188
Massachusetts
District Of Columbia Boston 617-565-5640
Washington 202-406-8000
Michigan
Florida Detroit 313-226-6400
Fort Myers 239-334-0660 Grand Rapids 616-454-4671
Jacksonville 904-296-0133 Saginaw 989-497-0580
Miami 305-863-5000
Minnesota
Orlando 407-648-6333
Minneapolis 612-348-1800
Tallahassee 850-942-9523
Tampa 813-228-2636
Mississippi
West Palm Beach 561-659-0184
Jackson 601-965-4436
Georgia
Missouri
Albany 229-430-8442
Kansas City 816-460-0600
Atlanta 404-331-6111
Springfield 417-864-8340
Savannah 912-652-4401
St. Louis 314-539-2238
Guam
Montana
Hagatna 671-472-7395
Billings 406-245-8585
Hawaii
Nebraska
Honolulu 808-541-1912
Omaha 402-965-9670
Idaho
Nevada
Boise 208-334-1403
Las Vegas 702-388-6571
Reno 775-784-5354
Illinois
Chicago 312-353-5431
New Hampshire
Springfield 217-726-8453
Manchester 603-626-5631
Indiana
New Jersey
Indianapolis 317-226-6444
Atlantic City 609-487-1300
Newark 973-971-3100
Iowa
Trenton 609-989-2008
Des Moines 515-284-4565
New Mexico South Dakota
Albuquerque 505-248-5290 Sioux Falls 605-330-4565

New York Tennessee


Albany 518-436-9600 Chattanooga 423-752-5125
Buffalo 716-551-4401 Knoxville 865-545-4627
JFK 718-553-0911 Memphis 901-544-0333
Melville 631-293-4028 Nashville 615-736-5841
New York 718-840-1000
Rochester 585-232-4160 Texas
Syracuse 315-448-0304 Austin 512-916-5103
White Plains 914-682-6300 Dallas 972-868-3200
El Paso 915-533-6950
North Carolina Houston 713-868-2299
Charlotte 704-442-8370 Lubbock 806-472-7347
Greensboro 336-547-4180 Mcallen 956-994-0151
Raleigh 919-790-2834 San Antonio 210-308-6220
Wilmington 910-313-3043 Tyler 903-534-2933
Waco 254-741-0576
North Dakota
Fargo 701-239-5070 Utah
Salt Lake City 801-524-5910
Ohio
Akron 330-761-0544 Vermont
Cincinnati 513-684-3585 Burlington 802-651-4091
Cleveland 216-706-4365
Columbus 614-469-7370 Virginia
Dayton 937-222-2013 Norfolk 757-441-3200
Toledo 419-259-6434 Richmond 804-771-2274
Roanoke 540-857-2208
Oklahoma
Oklahoma City 405-810-3000 Washington
Tulsa 918-581-7272 Seattle 206-553-1922
Spokane 509-353-2532
Oregon
Portland 503-326-2162 West Virginia
Charleston 304-347-5188
Pennsylvania
Harrisburg 717-221-4411 Wisconsin
Philadelphia 215-861-3300 Madison 608-264-5191
Pittsburgh 412-281-7825 Milwaukee 414-297-3587
Scranton 570-346-5781
Wyoming
Puerto Rico Cheyenne 307-772-2380
San Juan 787-277-1515
Overseas Offices: Listed By Country
Rhode Island
Brazil (Brasilia) 011-55-613-312-7523
Providence 401-331-6456
Bulgaria (Sofia) 011-359-2-939-5646
South Carolina
Charleston 843-747-7242
Canada
Columbia 803-772-4015
Montreal 1-514-939-8400
Greenville 864-233-1490
Ottawa 1-613-688-5460
Toronto 1-416-640-8661 Mexico (Mexico City) 011-52-55-5080-2212
Vancouver 1-604-689-3011
Netherlands (The Hague) 011-3170-353-1533
Colombia (Bogota) 011-571-315-1318
Romania (Bucharest) 011-40-21-200-3462
China (Hong Kong) 011-852-2841-2524
Russia (Moscow) 011-7495-728-5093
France (Paris) 011-331- 4312-7100
South Africa (Pretoria) 011- 2-712-342-3380
France (Interpol / Lyon) 011-334-7244-7198
Spain (Madrid) 011-34-91-587-2203
Germany (Frankfurt) 011-49-697-535-3763
Thailand (Bangkok) 011-662-255-1959
Italy (Rome) 011-390-64-674-2736
UK (London) 011-44-207-894-0846

Terrorist Screening Center (TSC) - 1-866-872-5678 / 1-866-872-9001


E-mail: tsc@tsc.gov

The Terrorist Screening Center (TSC) maintains the U.S. government’s consolidated Terrorist Watchlist—
a single database of identifying information about those known or reasonably suspected of being
involved in terrorist activity.

By supporting the ability of front line screening agencies to positively identify known or suspected
terrorists trying to obtain visas, enter the country, board aircraft, or engage in other activity, the
consolidated Terrorist Watchlist is one of the most effective counterterrorism tools for the U.S.
government.

TSC is leading significant improvements in counterterrorism information sharing among federal, state,
local, and international agencies by distributing information about encounters with known or suspected
terrorists reported to its 24/7 call center.

Transportation Security Administration (TSA)

To report specific violations and concerns about security, please contact the TSA Contact Center:
Phone: 1-866-289-9673
E-mail: TSA-ContactCenter@dhs.gov

To report suspicious activity at your local general aviation airport, contact the National Response Center.
Phone: 1-866-GA-SECURE or 1-866-427-3287 (24/7)

United States Attorneys' Offices


http://www.justice.gov/usao/offices/index.html
The United States Attorneys serve as the nation's principal litigators under the direction of the Attorney
General. There are 93 United States Attorneys stationed throughout the United States, Puerto Rico, the
Virgin Islands, Guam, and the Northern Mariana Islands. United States Attorneys are appointed by, and
serve at the discretion of, the President of the United States, with advice and consent of the United
States Senate. One United States Attorney is assigned to each of the judicial districts, with the exception
of Guam and the Northern Mariana Islands where a single United States Attorney serves in both
districts. Each United States Attorney is the chief federal law enforcement officer of the United States
within his or her particular jurisdiction.

United States Citizenship and Immigration (USCIS) Offices


https://egov.uscis.gov/crisgwi/go?action=offices

USCIS customer service - 1-800-375-5283


USCIS has established a toll-free military help line, 1-877-CIS-4MIL (1-877-247-4645), exclusively for
members of the military and their families.

United States Intelligence Community -- http://www.intelligence.gov/index.shtml

The IC is a federation of executive branch agencies and organizations that work separately and together
to conduct intelligence activities necessary for the conduct of foreign relations and the protection of the
national security of the United States. These activities include:

 Collection of information needed by the President, the National Security Council, the Secretaries
of State and Defense, and other Executive Branch officials for the performance of their duties
and responsibilities;

 Production and dissemination of intelligence;

 Collection of information concerning, and the conduct of activities to protect against,


intelligence activities directed against the US, international terrorist and international narcotics
activities, and other hostile activities directed against the US by foreign powers, organizations,
persons, and their agents;

 Special activities;

 Administrative and support activities within the US and abroad necessary for the performance
of authorized activities; and

 Such other intelligence activities as the President may direct from time to time.
US Marshals District Offices
http://www.usmarshals.gov/district/index.html

The geographical structure of the U.S. Marshals Service mirrors the structure of United States district
courts. There are 94 federal judicial districts, including at least one district in each state, the District of
Columbia, the Commonwealths of Puerto Rico and the Northern Mariana Islands and the two territories
of the United States -- the Virgin Islands and Guam.

ALABAMA GEORGIA
Northern District of Alabama - 205-776-6200 Northern District of Georgia - 404-331-6833
Middle District of Alabama - 334-223-7401 Middle District of Georgia - 912-752-8280
Southern District of Alabama - 251-690-2841 Southern District of Georgia - 912-652-4212

ALASKA GUAM - 671-477-7827


Anchorage - 907-271-5154
Fairbanks - 907-456-0246 HAWAII - 808-541-3000

ARIZONA IDAHO - 208-334-1298


Flagstaff - 928-213-0135
ILLINOIS
Phoenix - 602-382-8767
Northern District of Illinois - 312-353-5290
Tucson - 520-879-6900
Central District of Illinois - 217-492-4430
Yuma - 928-783-6337
Southern District of Illinois - 618-482-9336
ARKANSAS
INDIANA
Eastern District of Arkansas - 501-324-6256
Northern District of Indiana - 574-236-8291
Western District of Arkansas - 501-783-5215
Southern District of Indiana - 317-226-6566
CALIFORNIA
IOWA
Central District of California - 213-894-6820
Northern District - 319-362-4411
Eastern District of California - 916-930-2030
Southern District - 515-284-6240
Northern District of California - 415-436-7677
Southern District of California - 619-557-6620
KANSAS - 785-295-2775
COLORADO
KENTUCKY
Denver - 303-335-3400
Eastern District of Kentucky - 859-233-2513
Durango - 970-375-2903
Western District of Kentucky - 502-588-8000
Grand Junction - 970-243-5210
LOUISIANA
CONNECTICUT
Eastern District of Louisiana - 504-589-6079
Bridgeport - 203-579-5897
Middle District of Louisiana - 225-389-0364
Hartford - 860-240-3245
Western District of Louisiana - 318-676-4200
New Haven - 203-773-2107
MAINE - 207-780-3355
DELAWARE - 302-573-6176
MARYLAND - 410-962-2220
DISTRICT OF COLUMBIA - 202-353-0600
MASSACHUSETTES - 617-748-2500
FLORIDA
Northern District of Florida - 850-942-8400 MICHIGAN
Middle District of Florida - 813-274-6401 Eastern District of Michigan - 313-234-5600
Southern District of Florida - 786-433-6340 Western District of Michigan - 616-456-2438
MINNESOTA - 612-664-5900 PUERTO RICO - 787-766-6000

MISSISSIPPI RHODE ISLAND - 401-528-5300


Northern District of Mississippi - 662-234-6661
Southern District of Mississippi - 601-965-4444 SOUTH CAROLINA - 803-765-5821

MISSOURI SOUTH DAKOTA - 605-330-4351


Eastern District of Missouri - 314-539-2212
TENNESSEE
Western District of Missouri - 816-512-2000
Eastern District of Tennessee - 865-545-4182
MONTANA - 406-453-7597 Middle District of Tennessee - 615-736-5417
Western District of Tennessee - 901-544-3304
NEBRASKA - 402-221-4781
TEXAS
NEVADA - 702-388-6355 Eastern District of Texas - 409-839-2581
Northern District of Texas - 214-767-0836
NEW HAMPSHIRE - 603-225-1632 Southern District of Texas - 713-718-4800
Western District of Texas - 210-472-6540
NEW JERSEY - 973-645-2404
UTAH - 801-524-5693
NEW MEXICO - 505-346-6400
VERMONT - 802-951-6271
NEW YORK
Northern District of New York - 315-473-7601 VIRGIN ISLANDS - 340-774-2743
Southern District of New York - 212-331-7200
Eastern District of New York - 718-260-0400 VIRGINIA
Western District of New York - 716-551-4851 Eastern District of Virginia - 703-837-5500
Western District of Virginia - 540-857-2230
NORTH CAROLINA
Eastern District of North Carolina - 919-856-4153 WASHINGTON
Middle District of North Carolina - 336-332-8700 Eastern District of Washington - 509-353-2781
Western District of North Carolina - 704-344-6234 Western District of Washington - 206-370-8600

NORTH DAKOTA - 701-297-7300 WEST VIRGINIA


Northern District of West Virginia - 304-623-0486
OHIO Southern District of West Virginia - 304-347-5136
Northern District of Ohio - 216-522-2150
Southern District of Ohio - 614-469-5540 WISCONSIN
Eastern District of Wisconsin - 414-297-3707
OKLAHOMA Western District of Wisconsin - 608-661-8300
Eastern District of Oklahoma - 918-687-2523
Northern District of Oklahoma - 918-581-7738 WYOMING - 307-772-2196
Western District of Oklahoma - 405-231-4206

OREGON - 503-326-2209

PENNSYLVANIA
Eastern District of Pennsylvania - 215-597-7273
Middle District of Pennsylvania - 570-346-7277
Western District of Pennsylvania - 412-644-3351
INFORMATION SHARING NETWORKS & RESOURCES

American Board for Certification in Homeland Security (ABCHS) - http://www.abchs.com/

The American Board for Certification in Homeland Security (ABCHS) serves a diverse membership of
professionals including active and retired military, law enforcement and security experts, first
responders, and others dedicated to the important mission of protecting our nation. The ABCHS is
comprised of some of the world's leading professionals who have significant experience in homeland
security and emergency response.

Our total commitment, together with an extraordinary knowledge base provided by our members,
combined with an in-place organizational structure designed to deliver the highest quality training and
continuing education opportunities for homeland security and emergency response, places the ABCHS in
a pivotal position to make significant contributions to the most pressing issue facing our nation.

Bomb Arson Tracking System -- https://www.bats.gov/batsnet/


ATF United States Bomb Data Center
800-461-8841
USBDC@atf.gov

The Bomb Arson Tracking System (BATS) is a web-based case management system which provides you,
State and local arson & explosives investigators, access to up-to-date arson and explosives investigative
data from across the nation. Unlike anything you may currently use, it's not just limited to your local
jurisdiction or state. BATS provides you access to national arson and explosives incident information.

Consumer Sentinel -- http://www.ftc.gov/sentinel/index.shtm

Consumer Sentinel is the unique investigative cyber tool that provides members of the Consumer
Sentinel Network with access to millions of consumer complaints. Consumer Sentinel includes
complaints about:

-- Identity Theft
-- Do-Not-Call Registry violations
-- Computers, the Internet, and Online Auctions
-- Telemarketing Scams
-- Advance-fee Loans and Credit Scams
-- Sweepstakes, Lotteries, and Prizes
-- Business Opportunities and Work-at-Home Schemes
-- Health and Weight Loss Products
-- Debt Collection, Credit Reports, and Financial Matters

Consumer Sentinel is based on the premise that sharing information can make law enforcement even
more effective. To that end, the Consumer Sentinel Network provides law enforcement members with
access to complaints provided directly to the Federal Trade Commission by consumers, as well as
providing members with access to complaints shared by data contributors, who include:

-- Participating Better Business Bureaus (BBBs)


-- The Internet Crime Complaint Center (IC3)
-- Phonebusters
-- The US Postal Inspection Service (USPIS)
-- The National Fraud Information Center (NFIC)
-- The Identity Theft Assistance Center (ITAC)

Consumer Sentinel has undergone a major overhaul, and is now powered by an enhanced search engine
and user interface, making it easier than ever to find the information that you need. In addition to the
new tools, the system has a spiffy new look and feel, and incorporates new data access and security
features.

Consumer Sentinel is free and available to any federal, state or local law enforcement agency. In
addition, Consumer Sentinel information is also available to select international law enforcement
authorities.

Cybercop -- http://www.cybercopportal.org/

Member Log-in -- https://cybercop.esportals.com/

The CyberCop Portal is designed to bridge system stovepipes between organizations by providing a
separate means to collaborate over the web using the security controls necessary to handle sensitive
but unclassified law enforcement information. The CyberCop Portal created and hosted by The ESP
Group, is entirely Web-based, meaning that no additional software clients need to be downloaded onto
users' machines. That allows CyberCop users to enter the portal from any machine, anywhere. The
Portal allows users to share libraries of documents and case studies, send secure e-mail, participate in
ongoing threaded discussions, create and distribute surveys and share online briefings. The Cybercop
mission is to provide individuals an ultra-secure web-based environment to promote and facilitate the
sharing of sensitive information among a cohesive network of cyber security, law enforcement, first
responders, homeland defense and law enforcement related professionals from all levels of
government; international, federal, state, local and the private sector, regardless of department
affiliation and jurisdictional boundaries. CyberCop is committed to providing a safe and secure
environment where ideas can be freely exchanged to aid individual efforts and foster cooperative efforts
in the fight against crime, terrorism and the security of our homeland.
El Paso Intelligence Center -- http://www.usdoj.gov/dea/programs/epic.htm

Access: https://www.esp.gov

The El Paso Intelligence Center was established in 1974 in response to a study by the Justice
Management Division of the U.S. Department of Justice entitled, "A Secure Border." Recommendation
number 7 of this study suggested the establishment of a southwest border intelligence center to be led
by the Drug Enforcement Administration (DEA) and staffed by representatives of that agency, as well as
the U.S. Customs Service. The initial focus of the Center was to assist in the identification of drug
traffickers and alien traffickers along the U.S. - Mexico border.

In 2001, immediately after the terrorist attacks in New York and Washington, DC, the multiagency
environment of EPIC was called upon to support investigations to find those responsible. EPIC’s mission
evolved from its experience in supporting interdiction efforts and investigations regarding drug
trafficking, alien and weapon smuggling, and other criminal activities, by adding counterterrorism to its
efforts.

EPIC is now staffed with over 300 personnel and liaison officers from 15 agencies. Agencies currently
represented at EPIC include the Drug Enforcement Administration; Department of Homeland Security;
Customs & Border Protection; Immigration & Customs Enforcement; U.S. Coast Guard; Federal Bureau
of Investigation; Bureau of Alcohol, Tobacco, Firearms and Explosives; U.S. Secret Service; U.S. Marshals
Service; National Drug Intelligence Center; Internal Revenue Service; U.S. Department of the Interior;
National Geospatial–Intelligence Agency; U.S. Department of Defense; Joint Task Force–North; Joint
Interagency Task Force–South; Texas Department of Public Safety; Texas Air National Guard; and the El
Paso County Sheriff’s Office.

EPIC’s vision is to continue to provide timely and expeditious support to Federal, State, local, tribal, and
international law enforcement agencies and to remain the premier tactical operational intelligence
center in the nation.

Federal Protective Service Portal (FPS Portal) -- https://niru.esportals.net/

The FPS Portal is a compilation of FOUO products for law enforcement and first responders.

FBI Citizens' Academy -- http://www.fbi.gov/hq/ood/opca/outreach/academy.htm

The FBI Citizen’s Academy is an outreach program of the Federal Bureau of Investigation which affords
business and community leaders an inside look at Federal law enforcement in general and the FBI family
in particular. The Academy allows you to meet and interact with personnel of the FBI in a positive and
informal setting sharing ideas and information.
The FBI Citizen’s Academy creates a closer connection between the FBI and the surrounding community
through an educational process; fosters greater understanding of the role of FBI policies and programs
through frank interactive discussions; and expands the pool of community leaders who understand first-
hand the complex challenges of Federal law enforcement through examination of actual FBI
investigations.

First Observer -- http://www.firstobserver.com/

“First Observer” is a national safety and security program that uses the skills, experiences and "savvy" of
America's transportation professionals to help protect the critical transportation function that moves
the goods and services and people across America.

“First Observer” is operated by Team HMS under a Cooperative Agreement with the Department of
Homeland Security (DHS) Trucking Security Program (TSP). The program's mission is to administer an
anti-terrorism and security awareness program for highway professionals in support of the National
Preparedness Guidelines. A key component of the program is to recruit volunteers from the Trucking,
Motor Coach Carriers and School Bus industries to act as our “First Observer” in reporting suspicious
activities of either a criminal or potential terroristic nature to authorities.

High Tech Crime Consortium -- http://www.hightechcrimecops.org/index.html

The High Tech Crime Consortium is a 501(c) (3) nonprofit organization founded in 1998. It is a
professional organization that assists law enforcement and corporate investigators to obtain the
knowledge and skills needed to combat 21st Century crime where the use or abuse of digital technology
is an element of an offense. Members of HTCC comprise an international cadre of professionals
experienced in detection and investigation of digital crime and forensic examination of digital evidence,
practitioners of international, federal, and state criminal law, digital forensic software development or
information management and security.

HTCC International Headquarters


1506 North Stevens Street
Tacoma, WA 98406-3826
Telephone: 253.752.2427
FAX: 253.752.2430
Email Address: Admin@HighTechCrimeCops.Org

High Technology Crime Investigation Association -- http://www.htcia.org/


The High Technology Crime Investigation Association (HTCIA) is designed to encourage, promote, aid
and effect the voluntary interchange of data, information, experience, ideas and knowledge about
methods, processes, and techniques relating to investigations and security in advanced technologies
among its membership.

Homeland Security Information Network (HSIN) --


http://www.dhs.gov/xinfoshare/programs/gc_1156888108137.shtm

Member Log-in -- http://www.hsin.gov

HSIN is a comprehensive, nationally secure and trusted web-based platform able to facilitate Sensitive
But Unclassified (SBU) information sharing and collaboration between federal, state, local, tribal, private
sector, and international partners. The HSIN platform was created to interface with existing information
sharing networks to support the diverse Communities of Interest (COI) engaged in preventing,
protecting from, responding to, and recovering from all threats, hazards and incidents under the
jurisdiction of the Department of Homeland Security.

A key by-product of HSIN is the ability to provide real-time, interactive connectivity between states and
major urban areas and the National Operations Center (NOC). HSIN is focused on providing a
collaborative environment that interoperates with existing mission area systems developed and
managed by our federal, state and local partners. HSIN is focused on enhancing collaboration rather
than duplicating the capabilities provided by our partners. As a result of its unique perspective, HSIN
facilitates collaboration between mission areas such as Law Enforcement, Emergency Management, and
Critical Sectors.

HSIN-Intelligence -- https://hsin-intel.dhs.gov/

Information Assurance Support Environment - Defense Information Systems Agency (DISA) --


http://iase.disa.mil/

The Department of Defense information assurance portal. Provides a wide range of information
assurance products, information and training in support of the military services and the combatant
commands. Although some material is restricted to Department of Defense personnel, much of the
information and training provided by the Information Assurance Support Environment is available to the
general public.

Information Sharing Environment -- http://www.ise.gov/


Improving information sharing constitutes a cornerstone of our national strategy to protect the
American people and our institutions and to defeat terrorists and their support networks at home and
abroad. The Implementation Plan for the Information Sharing Environment sets forth the following
vision: "A trusted partnership among all levels of government in the United States, the private sector,
and our foreign partners, in order to detect, prevent, disrupt, preempt, and mitigate the effects of
terrorism against the territory, people, and interests of the United States by the effective and efficient
sharing of terrorism and homeland security information."

Infragard -- http://www.infragard.net/

Member log-in -- https://igc.infragard.org/

InfraGard is an information sharing and analysis effort serving the interests and combining the
knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between
the Federal Bureau of Investigation and the private sector. InfraGard is an association of businesses,
academic institutions, state and local law enforcement agencies, and other participants dedicated to
sharing information and intelligence to prevent hostile acts against the United States. InfraGard
Chapters are geographically linked with FBI Field Office territories.

IntelCenter - http://www.intelcenter.com/

The IntelCenter focus is on studying terrorist groups and other threat actors and disseminating that
information in a timely manner to those who can act on it. The IntelCenter looks at capabilities and
intentions, warnings and indicators, operational characteristics and a wide variety of other points in
order to better understand how to interdict terrorist operations and reduce the likelihood of future
attacks.

The results of this work is then disseminated in a variety of Alert, Current Intelligence and Analytical
Resource services. It also provides the foundation for our field books such as the "First Responder Chem-
Bio Handbook." The IntelCenter's primary client base is comprised of military, law enforcement and
intelligence agencies in the US and other allied countries around the world.

Intelink -- https://www.intelink.gov/

Intelink is both an architectural framework and an integrated intelligence dissemination and


collaboration service providing uniform methods for exchanging intelligence among intelligence
providers and users. The Intelink service was patterned after the Internet model in which a variety of
institutions have come together in the context of a global network to share information.
The Intelink intelligence network links information in the various classified databases of the US
intelligence agencies (e.g. FBI, CIA, DEA, NSA, USSS, NRO) to facilitate communication and the sharing of
documents and other resources.

Intelligence Is The Future Intelligence Applications & Analysis for Law Enforcement --
http://www.intelligenceisthefuture.com/

This web page was established for a variety of law enforcement professions, including those with a focus
on analysis, intelligence, research, and investigations. The site may also benefit students and faculty
members in various academic programs, to include Criminal Justice, Political Science, and Intelligence.
Additional products are available related to the intelligence community and the military. All products
available on this website are based on open source information, and does not include any sensitive or
restricted caveats.

International Association of Crime Analysts -- http://www.iaca.net/

The International Association of Crime Analysts was formed in 1990 to help crime analysts around the
world improve their skills and make valuable contacts, to help law enforcement agencies make the best
use of crime analysis, and to advocate for standards of performance and technique within the
profession itself. IACA membership is around 1,500 members and climbing. Members include crime
analysts, intelligence analysts, police officers of all ranks, educators, and students. The majority of our
members (roughly 86%) are from agencies within the United States of America. Non-U.S. members
include analysts from Argentina, Australia, Brazil, Cameroon, Canada, the Cayman Islands, Chile, China,
Cyprus, Fiji, Finland, France, Germany, Greece, Haiti, India, Israel, Italy, Jordan, Kenya, Luxembourg,
Malaysia, Mexico, the Netherlands, New Zealand, Nigeria, Norway, Pakistan, the Philippines, Poland,
Portugal, Russia, Rwanda, South Africa, Spain, Sweden, Switzerland, Trinidad & Tobago, Turkey, the
United Arab Emirates, the United Kingdom, and Venezuela.

International Association of Law Enforcement Intelligence Analysts -- http://www.ialeia.org/

IALEIA is the largest professional organization in the world representing law enforcement analysts. It is
based in the United States, and is a non-profit 501-c-3 corporation. IALEIA is managed by an
international Board of Directors made up of seventeen elected IALEIA members. Several board members
are also supported by volunteer committees. IALEIA has a paid administrator, and an Executive Advisory
Board appointed by the President. IALEIA supports chapters throughout the world, in accordance with a
policy manual. IALEIA has a certification program for analysts, a code of ethics and bylaws providing
structure for the organization. We represent law enforcement analysts in a variety of venues, and
provide an environment of community by establishing regional chapters. We also provide liaison to
members worldwide with Regional Directors who sit on the IALEIA Board.
Law Enforcement Intelligence Unit (LEIU) -- http://leiu-homepage.org/index.php

In the mid 1950's, local and state law enforcement agencies in the United States recognized that no
single agency or organization was responsible for receiving, collating, maintaining, and disseminating
information on persons involved in organized crime. These law enforcement agencies surmised correctly
that organized crime would exploit advancing technologies in transportation and communications,
become more mobile, and increase their spheres of influence and criminal activities. As a result, twenty-
six (26) law enforcement agencies met in San Francisco, California on March 29, 1956 to discuss
problems and possible solutions. The most important result of that meeting was the creation of the LEIU
– The LAW ENFORCEMENT INTELLIGENCE UNIT and the development of an organizational purpose that
survives to this day. The purpose of LEIU is to gather, record, and exchange confidential information not
available through regular police channels, concerning organized crime and terrorism. LEIU is an
association of state and local police departments, similar in many respects to numerous other
professional associations serving doctors, attorneys, journalists, and educators. LEIU has no employees
and no capability as an entity to conduct any investigation or law enforcement activity of any kind. Each
member agency is bound by, and acts pursuant to local law and their own agency regulations.

Law Enforcement Online (LEO) -- http://www.leo.gov

LEO is a 7 days a week, 24 hours a day online (real-time), controlled-access communications and
information sharing data repository. It provides an Internet accessible focal point for electronic Sensitive
But Unclassified (SBU) communication and information sharing for the international, federal, state, local,
and tribal law enforcement agencies. LEO also supports antiterrorism, intelligence, law enforcement,
criminal justice, and public safety communities worldwide. Users anywhere in the world can
communicate securely using LEO.

Lessons Learned Information Sharing Network -- https://www.llis.dhs.gov

Lessons Learned Information Sharing (LLIS.gov) is the national network of Lessons Learned, Best
Practices, innovative ideas, and preparedness information for homeland security and emergency
response professionals. By facilitating the sharing of knowledge, LLIS.gov enhances the nation's ability to
prepare for and respond to terrorism, natural disasters, and other incidents. LLIS.gov is not only a
repository for information but also a network that enables homeland security and emergency response
professionals from across the country to share their knowledge and expertise in a secure, online
environment.

Multi-State Information Sharing and Analysis Center (MS-ISAC) -- http://www.msisac.org/


The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a collaborative state and local
government-focused cyber security entity that is significantly enhancing cyber threat prevention,
protection, and response and recovery throughout the states of our nation. -- http://www.msisac.org/

Mission - The mission of the MS-ISAC is to provide a common mechanism for raising the level of cyber
security readiness and response in each state and with local governments. The MS-ISAC provides a
central resource for gathering information on cyber threats to critical infrastructure from the states and
providing two-way sharing of information between and among the states and with local government.

Major Objectives of the MS-ISAC


-- provide two-way sharing of information and early warnings on cyber security threats
-- provide a process for gathering and disseminating information on cyber security incidents
-- promote awareness of the interdependencies between cyber and physical critical infrastructure as
well as between and among the different sectors
-- coordinate training and awareness
-- ensure that all necessary parties are vested partners in this effort

National Counter-Terrorism Center -- http://www.nctc.gov/

The National Counterterrorism Center (NCTC) was established by Presidential Executive Order 13354 in
August 2004, and codified by the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA).
NCTC integrates foreign and domestic analysis from across the Intelligence Community (IC) and
produces a wide-range of detailed assessments designed to support senior policymakers and other
members of the policy, intelligence, law enforcement, defense, homeland security, and foreign affairs
communities. By law, NCTC serves as the USG’s central and shared knowledge bank on known and
suspected terrorists and international terror groups. NCTC also provides USG agencies with the
terrorism intelligence analysis and other information they need to fulfill their missions. NCTC collocates
more than 30 intelligence, military, law enforcement and homeland security networks under one roof to
facilitate robust information sharing. NCTC is a model of interagency information sharing.

National Criminal Intelligence Resource Center (NCIRC) -- http://www.ncirc.gov/

The National Criminal Intelligence Resource Center (NCIRC) is sponsored by the Bureau of Justice
Assistance (BJA) for the purpose of providing a secure web-site developed to serve as a "one-stop shop"
for local, state, tribal, and federal law enforcement to keep up with the latest developments in the field
of criminal intelligence. The NCIRC web-site contains information regarding law enforcement
intelligence operations and practices. It provides criminal justice professionals with a centralized
resource information bank to access a multitude of criminal intelligence resources in a secure
environment.
NCIRC can only be accessed through the secure Regional Information Sharing Systems® (RISS) network
(RISSNET™) and the Federal Bureau of Investigation's (FBI) Law Enforcement Online (LEO).

National Equipment Register, Inc. (NER) -- http://www.nerusa.com/index.asp

The mission of National Equipment Register, Inc. (NER) is to increase the recovery rate of stolen
equipment and reduce the costs associated with theft for owners and insurers.

NER combines systems, staff and procedures to provide secure, accurate information services to law
enforcement, insurers, equipment owners and the equipment industry. Operations revolve around a
database of stolen equipment, a database of equipment ownership, NER operators, a network of
investigators and training and awareness programs.

National Insurance Crime Bureau - https://claimsearch.iso.com

Law enforcement, criminal justice, and regulatory agency personnel may obtain online access to ISO’s
ClaimSearch, the insurance industry’s “All Claim Database”, which includes property and casualty claims
data along with vehicle related information through the National Insurance Crime Bureau (NICB).

“Qualified” law enforcement agencies will be able to see all information the ISO ClaimSearch database
contains pertaining to vehicles, casualty claims, and property claims, including individuals’ names,
addresses and the following numeric identifiers:

Driver License Number Vehicle Identification Number (VIN)


Social Security Number Tax Identification Number
Telephone Number Vehicle License Plate Number
Policy/Claim Number Law Enforcement Agency Case Number

National Missing and Unidentified Persons System (NamUs)


http://www.namus.gov/

The National Missing and Unidentified Persons System (NamUs) is a clearinghouse for missing persons
and unidentified decedent records. NamUs is a free online system that can be searched by medical
examiners, coroners, law enforcement officials and the general public to solve these cases.

National Technical Investigators’ Association -- http://www.natia.org


NATIA is composed of over 2,500 law enforcement, intelligence officers, and support staff, who provide
the technical operations, surveillance activities, and scientific support for hundreds of federal, state, and
local agencies across the United States, Canada and the United Kingdom.

National White Collar Crime Center (NW3C) -- http://www.nw3c.org/

Member Log-in -- https://members.nw3c.org/login.cfm

The mission of NW3C is to provide a nationwide support system for agencies involved in the prevention,
investigation, and prosecution of economic and high-tech crimes and to support and partner with other
appropriate entities in addressing homeland security initiatives, as they relate to economic and high-
tech crimes.

NW3C is a congressionally-funded, non-profit corporation whose membership primarily comprises law


enforcement agencies, state regulatory bodies with criminal investigative authority, and state and local
prosecution offices.

While NW3C has no investigative authority itself, its job is to help law enforcement agencies better
understand and utilize tools to combat economic and high-tech crime.

Office of the National Counterintelligence Executive -- http://www.ncix.gov/

The Office of the National Counterintelligence Executive (ONCIX) is part of the Office of the Director of
National Intelligence and is staffed by senior counterintelligence (CI) and other specialists from across
the national intelligence and security communities. The ONCIX develops, coordinates, and produces:

 Annual foreign intelligence threat assessments and other analytic CI products.


 An annual national CI strategy for the US Government.
 Priorities for CI collection, investigations, and operations.
 CI program budgets and evaluations that reflect strategic priorities.
 In-depth espionage damage assessments.
 CI awareness, outreach, and training standards policies.

Open Source Center -- http://www.opensource.gov

OpenSource.gov provides timely and tailored translations, reporting and analysis on foreign policy and
national security issues from the Open Source Center and its partners. Featured are reports and
translations from thousands of publications, television and radio stations, and Internet sources around
the world. Also among the site's holdings are a foreign video archive and fee-based commercial
databases for which OSC has negotiated licenses. OSC's reach extends from hard-to-find local
publications and video to some of the most renowned thinkers on national security issues inside and
outside the US Government. Accounts are available to US Government employees and contractors.

Overseas Security Advisory Council (OSAC) -- http://www.osac.gov/

The Overseas Security Advisory Council (OSAC) is a Federal Advisory Committee with a U.S. Government
Charter to promote security cooperation between American business and private sector interests
worldwide and the U.S. Department of State. OSAC currently encompasses the 34-member core Council,
an Executive Office, over 100 Country Councils, and more than 3,500 constituent member organizations
and 372 associates.

 The objectives of the Council as outlined in the Charter are:


 To establish continuing liaison and to provide for operational security cooperation between
State Department security functions and the Private Sector.
 To provide for regular and timely interchange of information between the Private Sector and the
State Department concerning developments in the overseas security environment.
 To recommend methods and provide material for coordinating security planning and
implementation of security programs.
 To recommend methods to protect the competitiveness of American businesses operating
worldwide.

Regional Information Sharing System (RISS) -- http://www.riss.net/

RISS is a national program of regionally oriented services designed to enhance the ability of local, state,
federal, and tribal criminal justice agencies to:

 Identify, target, and remove criminal conspiracies and activities spanning multijurisdictional,
multistate, and sometimes international boundaries.
 Facilitate rapid exchange and sharing of information among the agencies pertaining to known
suspected criminals or criminal activity.
 Enhance coordination and communication among agencies that are in pursuit of criminal
conspiracies determined to be inter-jurisdictional in nature.

RISS supports a proactive, preventive approach and offers services, tools, and resources to aid law
enforcement and criminal justice entities to identify, disrupt, and prevent terrorist and criminal
activities.

Middle Atlantic-Great Lakes Organized Crime Law Enforcement Network (MAGLOCLEN)


RISS Intelligence Center
Suite 100
140 Terry Drive
Newtown, PA 18940
800-345-1322
info@magloclen.riss.net

Mid-States Organized Crime Information Center (MOCIC)


RISS Intelligence Center
Post Office Box 1250
2255 West Sunset Street
Springfield, MO 65801-1250
800-345-1322
info@mocic.riss.net

New England State Police Information Network (NESPIN)


RISS Intelligence Center
Suite 105
124 Grove Street
Franklin, MA 02038
800-343-5682
info@nespin.riss.net

Rocky Mountain Information Network (RMIN)


RISS Intelligence Center
Suite 1000
2828 North Central Avenue
Phoenix, AZ 85004-2320
800-821-0640
info@rmin.riss.net

Regional Organized Crime Information Center (ROCIC)


RISS Intelligence Center
Suite 850
545 Marriott Drive
Nashville, TN 37214
800-238-7985
info@rocic.riss.net

Western States Information Network (WSIN)


RISS Intelligence Center
Post Office Box 903198
Suite 205
1825 Bell Street
Sacramento, CA 94203-1980
800-952-5258
info@wsin.riss.net

The RISS Program operates in all 50 states, the District of Columbia, U.S. territories, Australia, Canada,
and England. RISS is the collective effort of six regional centers. While the RISS centers operate
independently and are tailored to support the unique needs of the region served, they also operate as a
collective body to address national criminal justice issues.

Regional and State Online Resource for Emergency Management -- http://rasor.jsrts.org/

The capability displays conventional maps, digital satellite imagery or both, and it can create custom
map overlays. The maps can be configured to display icons for key places.

SENTRY -- http://www.usdoj.gov/ndic/sentry/index.htm

The National Drug Intelligence Center (NDIC) SENTRY is an Internet-based system designed to collect
and disseminate synthetic drug-related data in order to identify new trends at an early stage, evaluate
their likely importance, and track their development.

SENTRY focuses on synthetic drugs that are primarily produced via a chemical process, such as LSD
(lysergic acid diethylamide), MDMA (3,4-methylenedioxymethamphetamine, also known as ecstasy),
and methamphetamine. To be truly effective as an early warning system, however, the system also
monitors prescription drugs, over-the-counter medications, botanical substances and extracts, and
chemicals and products involved in the manufacturing of synthetic drugs.

SENTRY is accessible at www.sentry.usdoj.gov or via the NDIC Internet site. From the SENTRY web site,
authorized users can submit information on a new or unusual synthetic drug-related activity via an
electronic submission form, link to partner agencies and our listserv, search and receive NDIC products,
and view previously reported submissions using the geographic information system capabilities.

State and Local Antiterrorism Training (SLATT) -- https://www.slatt.org/

The State and Local Anti-Terrorism Training (SLATT) Program is funded by the United States Department
of Justice, Bureau of Justice Assistance. The Program provides specialized training for law enforcement
personnel in combating terrorism and extremist criminal activity. In order to ensure that SLATT training
always delivers the most up-to-date information, terrorism-related topics are constantly researched and
reviewed, and timely information is offered regarding pre-incident preparation, investigation,
prevention, and interdiction training.

The SLATT Program has been proactively involved in anti-terrorism research and training since 1996. It is
entirely separate and fulfills a different need from First Responder and other related Weapons of Mass
Destruction/Nuclear, Biological, and Chemical response training provided to emergency service
personnel. SLATT focuses on the prevention of terrorism in the United States by providing the tools
necessary for state and local law enforcement officers to understand, detect, deter, and investigate acts
of terrorism in the United States by both international and domestic, or homegrown terrorists.

TRIPwire -- https://www.tripwire-dhs.net/

TRIPwire is a comprehensive resource for information on terrorist design, manufacture, and


employment of improvised explosive devices (IEDs). This secure information portal presents detailed IED
research alongside operational terrorist source material to offer a unique perspective on global
terrorism efforts from the terrorists themselves.

TRIPwire is sponsored by the Department of Homeland Security's Office for Bombing Prevention
(DHS/OBP). TRIPwire is an online network designed to provide the state and local bombing prevention
community with information on terrorist tactics, techniques, and procedures (TTPs) in order to better
identify prevention opportunities involving improvised explosive devices (IEDs). TRIPwire aims to serve
the bombing prevention community as a "one-stop resource" by offering a consolidated and expert-
validated resource of near real-time information on improvised explosives and explosive devices (IEDs),
relevant news, and threat alerts. It also facilitates information sharing and networking by offering
collaboration tools such as community forums and secure e-mail.

United States Private and Public Partnership (USP3) -- https://usp3.org/USP3/Default.aspx

The United States Private and Public Partnership (USP3) is a Private Sector collaboration with various
local, state and federal partners. Each USP3 partner participant is self governed, self-vetted and self-
administered. USP3 provides a common network and repository for its members for daily routine
information sharing and 24/7 emergency notifications. Member enrollments are unique to the partners
participating in USP3 and are normally decision makers in both the private and public sectors.

USP3 is designed to serve as a coordination conduit for private and public outreach programs creating a
national cross sector membership. Members in USP3 normally have a key responsibility to prevent and
respond to emergency incidents that can adversely affect their community or commercial interest.

Membership and participation in USP3 is free, upon meeting the enrollment criteria established by the
individual partners which make up USP3 and the USP3 National Governance. Once enrolled, the
members of the various private and public partners are provided with (Horizontal and Vertical) routine
information sharing and 24/7 alert and notification capabilities.

STANDARDS AND PROTOCOLS

Information Evaluation (Source Reliability and Content Validity)

Information used to develop intelligence comes from a variety of sources, with a wide degree of
reliability and credibility. It is the job of the intelligence analyst to use these sources of information to
build an accurate and up-to-date picture of the current situation and operational environment in order
to allow users of produced intelligence products to make informed decisions.

In order to produce accurate intelligence products the information fed into the intelligence cycle must
be evaluated for reliability and accuracy. In intelligence reporting information is evaluated and assigned
an alphanumeric designation which reflects the reliability of the source of the information based on past
experience and the accuracy of the information provided as it relates to other information already
known.

There are two standardized systems of information evaluation: the LEIU Criminal Intelligence File
Guidelines and the NATO STANAG 2022 military guideline.

The LEIU Criminal Intelligence File Guidelines provide the following standard for source / information
evaluation. (http://www.it.ojp.gov/documents/LEIU_Crim_Intell_File_Guidelines.pdf)

"Information to be retained in the criminal intelligence file should be evaluated and designated for
reliability and content validity prior to filing. The bulk of the data an intelligence unit receives consists of
unverified allegations or information. Evaluating the information's source and content indicates to future
users the information's worth and usefulness. Circulating information which may not have been
evaluated, where the source reliability is poor or the content validity is doubtful, is detrimental to the
agency's operations and contrary to the individual's right to privacy. To ensure uniformity with the
intelligence community, it is strongly recommended that stored information be evaluated according to
the criteria set forth below.

Source Reliability:

(A) Reliable - The reliability of the source is unquestioned or has been well tested in the past.

(B) Usually Reliable - The reliability of the source can usually be relied upon as factual. The
majority of information provided in the past has proven to be reliable.

(C) Unreliable - The reliability of the source has been sporadic in the past.

(D) Unknown -The reliability of the source cannot be judged. Its authenticity or trustworthiness
has not yet been determined by either experience or investigation.

Content Validity:

(1) Confirmed - The information has been corroborated by an investigator or


another independent, reliable source.

(2) Probable - The information is consistent with past accounts.

(3) Doubtful - The information is inconsistent with past accounts.

(4) Cannot Be Judged - The information cannot be judged. Its authenticity


has not yet been determined by either experience or investigation.

The military uses a similar system of evaluation based on the letters A-F and the numbers 1-6, as
referenced in NATO STANAG 2022, and various other military publications.

Reliability of Source Accuracy of Information

A – Completely Reliable 1 – Confirmed By Other Source


B – Usually Reliable 2 – Probably True
C – Fairly Reliable 3 – Possibly True
D – Not Usually Reliable 4 – Doubtful
E – Unreliable 5 – Improbable
F – Reliability Cannot Be Judged 6 – Truth Cannot Be Judged

(Re: Appendix B, FM 2-22.3 (FM 34-52) Human Intelligence Collector Operations


http://www.army.mil/institution/armypublicaffairs/pdf/fm2-22-3.pdf )

Because both the LEIU and the military system are each widely used it is important to differentiate
between the two systems in intelligence reports. Failure to do so can result in confusion. For example is
an evaluation of C3 a fairly reliable source providing possibly true information or an unreliable source
providing doubtful information? To avoid this confusion, evaluation rating is best listed, for example, as
C3 (LEIU) or C3 (MIL).

Intelligence Analysis Confidence-Level Definitions

Intelligence assessments are supported by information that varies in scope, quality, and sourcing.
Consequently, intelligence analysts ascribes high, medium, or low levels of confidence to judgments, as
follows:

-- High confidence generally indicates judgments are based on high-quality information from
multiple sources or from a single highly reliable source and/or the nature of the issue makes it possible
to render a solid judgment.

-- Medium confidence generally means the information is credibly sourced and plausible but can
be interpreted in various ways or is not of sufficient quality or corroborated sufficiently to warrant a
higher level of confidence.

-- Low confidence generally means the information’s credibility and/or plausibility is


questionable, the information is too fragmented or poorly corroborated to make solid analytic
inferences, or the analyst has significant concerns or problems with the sources.

Probability Ratings

After all the available data concerning each risk and its factual circumstances have been gathered, a
probability rating can be assigned to that risk. Ratings will not consider any precaution or
countermeasure that may later be taken to reduce or eliminate the risk. A primary purpose of such
unconditioned ratings is to allow for later priority scheduling in the selection of countermeasures. It may
be enough to be able to say one event is more probable than another. To say this about entire series or
categories of events, it must be possible to assign each to some class that can then be compared with
other classes to arrive at a conclusion of “more likely” or “less likely.” Five categories of probability can
establish useful distinctions among events, as follows:

(A) Virtually Certain — Given no changes, the event will occur. For example, given no changes, a closed
intake valve on a sprinkler riser will prevent water flow in event of fire.

(B) Highly Probable — The likelihood of occurrence is much greater than that of nonoccurrence. For
example, unprotected currency lying visible on a counter is very likely to be taken.

(C) Moderately Probable — The event is more likely to occur than not to occur.
(D) Less Probable — The event is less likely to occur than not to occur. This does not imply impossibility,
merely improbability.

(E) Probability Unknown — Insufficient data are available for an evaluation.

This approximate system of ratings contains wide latitude for variation. Two observers could assign
different probabilities to the same risk, based upon different evaluations of the circumstances. But an
advantage of this technique is that absolute precision is not important. If the correct general label can
be attached, it doesn’t matter that a highly probable risk might have a ratio of .751 or .853. What is
important is to be able to segregate all risks of virtually certain probability from all others, and to make
similar distinctions for each other general class. Even competent professionals may disagree on what is
highly probable and what is moderately probable. To compensate for inexactness, if a rating is in doubt
after all available information has been gathered and evaluated, then the higher of two possible ratings
should be assigned.

Rating Symbols. To save time and space, five levels of probability can be assigned the symbols A, B, C, D,
and E, ranking downward from “Virtually Certain” to “Probability Unknown.” These symbols later will be
combined with symbols representing criticality in the development of priority lists. It should be noted
that the probability rating E, or “Probability Unknown,” is merely a temporary rating pending the
development of all relevant data. In the construction of threat logic patterns, E ratings will be replaced
by one of the definite ratings.

(Source: ASIS - General Security Risk Assessment Guideline http://www.asisonline.org/guidelines/guidelinesgsra.pdf)

Intelligence Cycle
The intelligence cycle is a five step process of developing unrefined information into an intelligence
product for use by decision makers.

The five steps of the intelligence process are:

 Planning and Direction


 Collection
 Processing and Exploitation
 Analysis and Production
 Dissemination

Planning and Direction is the management of the intelligence effort. This ranges from identifying initial
requirements to delivery of the end product to the decision makers.

Collection is the gathering of raw information based on identified requirements. Collection can include
research, investigation, source operations and the use relationships developed through liaison.

Processing and Exploitation takes the large amounts of raw information gathered during collection and
puts it into a form that can be analyzed. When processing information we look at factors such as
accuracy, objectivity, authority, currency and quality. Processing and exploitation may also include
language translation, decryption, and data reduction. This information is then entered into databases
where it can be used in analysis and production.

Analysis and Production take raw processed information and converts it into intelligence. The
information is reviewed for reliability and relevance, put into context and then used to produce
intelligence products. Analysis and production develops both raw intelligence and finished intelligence
products. Raw intelligence consists of individual pieces of analyzed information, which are disseminated
individually, while finished intelligence puts raw intelligence into context, integrates it with other
intelligence products and provides conclusions about its meaning and implications.

Dissemination is perhaps the most important step of the intelligence cycle. Intelligence must be
provided to the decision makers who initiated the intelligence requirements to allow them to make the
best informed decisions. Intelligence that it not disseminated serves no purpose since it is never used by
decision makers. Intelligence can be distributed in many ways, such as Intelligence Information Reports
(IIRs), Intelligence Bulletins, and Intelligence Assessments. These intelligence products provided to
decision makers will often generate new intelligence requirements - feeding back into the planning and
direction step of a continuous intelligence cycle.

Source: FBI Directorate of Intelligence - http://www.fbi.gov/intelligence/di_cycle.htm

What is intelligence?

“Intelligence is the product resulting from the collection, processing, integration, evaluation, analysis,
and interpretation of available information concerning foreign nations, hostile or potentially hostile
forces or elements, or areas of actual or potential operations. The term is also applied to the activity
which results in the product and to the organizations engaged in such activity.”
(Source: Joint Pub 2-0, Joint Intelligence, dtd. 22 June 2007)

There are six basic intelligence sources:

Signals Intelligence (SIGINT) is derived from the exploitation of foreign electronic emissions. SIGINT can
be in the form of the actual information content of a signal or in the form of its temporal and spectral
characteristics called signal operating parameters. SIGINT includes both the raw data and the analysis
product of that data. SIGINT breaks down into four sub disciplines: Electronic Intelligence (ELINT),
Communications Intelligence (COMINT), Foreign Instrumentation Signals Intelligence (FISINT), and
weapons-related Command and Control Signals (PROFORMA).

Imagery Intelligence (IMINT) is a product that is the result of processing and exploiting raw imagery
(information) and creating an analyzed product (intelligence). An image alone is only information in the
form of pixels, digits, or other forms of graphic representation and the data behind that portrayal. When
studied for content with an understanding of portrayal, imaging processes, and the place, objects and
time captured by that process, or through comparison to other images and consideration in light of
other information or intelligence, imagery intelligence (IMINT) can be created.

Measurement and Signature Intelligence (MASINT) is scientific and technical intelligence information
obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time
dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the
purpose of identifying any distinctive features associated with the source, emitter, or sender and to
facilitate subsequent identification and/or measurement of the same.

Human-Source Intelligence (HUMINT) is intelligence derived from human beings who may act as both
sources and collectors, and where the human is the primary collection instrument. This includes all
forms of intelligence gathered by humans, from direct reconnaissance and observation to the use of
recruited agents. HUMINT may also encompass interrogation techniques, including the process of
questioning detainees conducted in compliance with U.S. law and regulation, international law,
executive orders, and other operationally specific guidelines. HUMINT can provide a wide range of
information which includes but is not limited to adversary plans and intentions, deliberations and
decisions, research and development goals and strategies, doctrine, leadership, political or military
relationships, weapons systems, physical and cultural infrastructure, and medical conditions. HUMINT
can often collect information that is difficult or sometimes impossible to collect by other, more
technical, means.

Open-Source Intelligence (OSINT) is unclassified information of potential intelligence value that is


available to the general public.

Geospatial Intelligence (GEOINT) is the intelligence derived from the exploitation of imagery and
geospatial information to describe, assess, and visually depict physical features and geographically
referenced activities on the Earth.
(Source: Interagency Threat Assessment and Coordination Group - "Intelligence Guide for First Responders")

Suspicious Incident Reporting Standards

Extracted from: DHS Information Sharing Environment (ISE), Functional Standard (FS), Suspicious Activity Reporting (SAR), version 1.0 (ISE-FS-
200), Part B – ISE-SAR Criteria Guidance

Eliciting Information -- Questioning facility personnel about facility/infrastructure/personnel; this


includes individuals probing employees in person, on or off-site, over the phone, or via the Internet
about particular structures, functions, and personnel procedures at the facility/infrastructure.

Misrepresentation -- Presenting false or misusing insignia, documents, and/or identification, to


misrepresent one’s affiliation to cover possible illicit activity.

Photography -- Taking pictures/video of facility/infrastructure/personnel or surrounding.

Observation -- Showing unusual interest in facility/infrastructure/personnel; for example, observing it


through binoculars, taking notes, drawing maps, or sketches.

Surveillance -- Monitoring the activity of people, facilities, processes or systems.

Theft/Loss/Diversion -- Stealing or diverting something associated with a facility/infrastructure (e.g.,


badges, uniforms, identification, emergency vehicles, technology or documents (classified or
unclassified), which are proprietary to the facility).

Sabotage/Tampering/Vandalism -- Damaging, manipulating, or defacing part of a facility/infrastructure


or protected site.

Testing of Security -- Interactions with, or challenges to installations, personnel, or systems that reveal
physical, personnel, or cyber security capabilities.

Cyber Attack -- Compromising or attempting to compromise or disrupt an organization’s information


technology infrastructure.

Expressed or Implied Threat -- Communicating a spoken or written threat to damage or compromise a


facility/infrastructure.

Flyover -- Suspected over-flight of a facility/infrastructure; this includes any type of flying vehicle (e.g.,
airplanes, helicopters, unmanned aerial vehicles, hang gliders).

Materials Acquisition/Storage -- Acquisition of unusual quantities of precursor material (e.g., cell


phones, pagers, fuel, timers), unauthorized/unlicensed individual/group attempts to obtain precursor
chemicals/agents, or toxic materials, and rental of storage units for the purpose of storing chemicals or
mixing apparatus.
Acquisition of Expertise -- Attempts to obtain or conduct training in security concepts; military weapons
or tactics; or other, unusual, capabilities, such as specialized transport or handling.

Weapons Discovery -- Discovery of weapons or explosives.

Sector-Specific Incident -- Actions associated with a characteristic of unique concern to specific sectors
(such as the public health sector), with regard to their personnel, facilities.

Recruiting -- Building of operations teams and contacts, personnel data, banking data or travel data.

Other -- Incidents not fitting any of the above categories.

ALARACT 322/2009 - Force Protection (DTG 231751Z NOV 09)

Appendix A: Ten Key Indicators of Potential Terrorist Associated Insider Threats to the Army.

Commanders must ensure their soldiers are aware of the indicators below and the need to report any
such incidents to their chain of command and the local counterintelligence (CI) office. These indicators
are intended to highlight behaviors or activities that point to potential terrorist insider threats to the
army (i.e. potential national security threats).

The following activities may be indicators of potential terrorist activity and should be reported
immediately to your chain of command:

1. Advocating violence, the threat of violence, or the use of force to achieve goals that are
political, religious, or ideological in nature.

2. Advocating support for international terrorist organizations or objectives.

3. Providing financial or other material support to a terrorist organization or to someone


suspected of being a terrorist.

4. Association with or connections to known or suspected terrorists.

5. Repeated expressions of hatred and intolerance of American society, culture, government, or


the principles of the U.S. Constitution.

6. Repeated browsing or visiting internet websites that promote or advocate violence directed
against the united states or U.S. forces, or that promote international terrorism or terrorist
themes without official sanction in the performance of duty.

7. Expressing an obligation to engage in violence in support of international terrorism or inciting


others to do the same.

8. Purchasing bomb making materials or obtaining information about the construction of


explosives.
9. Active attempts to encourage others to violate laws, disobey lawful orders or regulations, or
disrupt military activities.

10. Familial ties to known or suspected international terrorists or terrorist supporters.

Controlled Unclassified Information

Controlled Unclassified Information is information that while unclassified still requires control
over its distribution and use. This information can fall into several categories, including Department of
Defense "For Official Use Only" information, "Protected Critical Infrastructure Information", "Law
Enforcement Sensitive" information, "Security Sensitive Information", and similar information that may
be exempt from disclosure under the Freedom of Information Act and related state statutes, or that
because of mission requirements, business prudence, legal privilege, the protection of personal or
commercial rights, safety, or security should otherwise be protected from public disclosure. On 9 May
2008, Controlled Unclassified Information was designated by President George Bush as the single
categorical designation for most information previously referred to as "Sensitive But Unclassified" (SBU)

Although the Controlled Unclassified Information designation only officially applies to the
Executive Branch of government, information exists in both the public and private sector that meets the
intent of the Controlled Unclassified Information designation. For example, within the corporate
environment we have proprietary or business sensitive information, that while not consisting of trade
secrets (which would be protected under the Uniform Trade Secrets Act or other state statutes) is
information that should still be protected from public disclosure.

Public information is that information which is lawfully, broadly and generally disclosed to the
public at large. While there may be some restrictions, such as copyrights, on public information there is
no restriction or limitation on who can see or otherwise access public information. Public information is
intended to be disclosed to the public.

We may then define Controlled Unclassified Information as that information which does not
contain national security information (and therefore cannot be classified), does not contain trade
secrets, but which also does not meet the definition of public information and should therefore be
protected against inappropriate disclosure.

In order to safeguard Controlled Unclassified Information we employ standard procedures


based in part on the requirements in the "Protected Critical Infrastructure Information (PCII) Program
Procedures Manual" (2009). Although these procedures are intended specifically to safeguard only PCII;
adoption of the PCII handling procedures is a best practice that should be used for all Controlled
Unclassified Information.

The following handling procedures should be used for all Controlled Unclassified Information:
Marking: All Controlled Unclassified Information will be appropriately marked to indicate its
sensitive nature. A coversheet will be the top-most page of all printed Controlled Unclassified
Information.

Storage: When not in your immediate possession, store Controlled Unclassified Information in a
secure environment such as a locked desk drawer or locked container. Do not leave Controlled
Unclassified Information unsecured and unattended.

Transmission --

Hand Delivery: Authorized individuals may hand carry Controlled Unclassified Information as
long as access to the material is controlled while in transit. Controlled Unclassified
Information carried on removable electronic media (i.e. USB Drives or CD-ROM) should be
password-protected.

E-mail: Encryption should normally be used. However, when this is impractical or


unavailable, you may transmit Controlled Unclassified Information over regular e-mail
channels. If encryption is not available, send Controlled Unclassified Information as a
password-protected attachment and provide the password under separate cover. Do not
send Controlled Unclassified Information to personal, non-employment related e-mail
accounts. Whenever the recipient forwards or disseminates Controlled Unclassified
Information via e-mail, place that information in a password-protected attachment.

Mail: United States Postal Service First Class mail or commercial equivalent. Place
Controlled Unclassified Information in an opaque envelope or container, sufficiently sealed
to prevent inadvertent opening and to show evidence of tampering, and then place this
envelope or container in a second envelope that has no marking on it to identify the
contents as sensitive or controlled information. The outer envelope or container must bear
the complete name and address of the sender and addressee. The outer envelope will have no
markings that indicate the contents contain Controlled Unclassified Information and must bear
the following below the return address: “POSTMASTER: DO NOT FORWARD. RETURN TO
SENDER.” Use of 'Delivery Conformation' (PS Form 152, or commercial equivalent) is
recommended.

Fax: Use of a secure fax is encouraged, but not required. When sending via non-secure fax,
coordinate with the recipient to ensure that the faxed materials will not be left unattended or
subjected to unauthorized disclosure on the receiving end.

Telephone: You are encouraged to use a Secure Telephone Unit/Equipment. Use cellular
phones to discuss Controlled Unclassified Information only in exigent circumstances.

Reproduction: Ensure that a copy of a Cover Sheet is the first page of all reproductions
containing Controlled Unclassified Information. Clear copy machine malfunctions and ensure
all paper paths are checked for Controlled Unclassified Information. Destroy all unusable pages
immediately.

Destruction: Destroy (i.e., shred or burn) Controlled Unclassified Information when no longer
needed. For Controlled Unclassified Information on laptops or CPUs, delete file and empty
recycle bin.

Operations Security (OPSEC)

OPSEC (Operations Security) is a process used to deny a competitor or adversary information concerning
your intentions and capabilities by identifying, controlling and protecting indicators associated with your
planning processes or operations.

OPSEC is comprised of 5 steps:

• Identify Sensitive/Critical Information.

• Assess Threat.

• Analyze Vulnerabilities.

• Analyze Risk.

• Apply Countermeasures.

Identify Sensitive/Critical Information

Sensitive/critical information is unclassified information that a competitor or adversary could obtain


from openly available sources. This information provides crucial information or clues to your company’s
activities, possessions, strategies and future.
Assess Threat

The goal of threat assessment is to determine the real extent of a threat. A threat requires both intent
and capability. If one or the other is not present, there is no threat.

Threat = intent + capability.

Analyze Vulnerabilities

A vulnerability is an opportunity or weakness in securing information. Indicators are any observable


pattern or activity changes that when looked at by themselves or in conjunction with something else,
allows your competitor to obtain a sensitive piece of information. To analyze vulnerabilities, ask
yourself: Are there things that give away data directly? Are there certain signs that could lead to
deducing the data?

Analyze Risk

Risk is the likelihood of an undesirable event occurring and the consequences of that event. Risk analysis
is the process of determining the potential for a threat’s success to acquire, exploit and capitalize on
critical information.

Risk = Threat x Vulnerability x Impact

Apply Countermeasures

Countermeasures are anything that effectively negates a threat’s ability to exploit vulnerabilities.

There are typically five types of countermeasures:

• Changes in procedure

• Controlling dissemination

• Cover and deception

• Speed of execution

• Awareness training

TRAINING AND EDUCATION

28 CFR Part 23 Online Training

Criminal intelligence plays a vital role in the safety and security of our country. 28 CFR Part 23 was
issued in 1980 to ensure the privacy and constitutional rights of individuals during the collection and
exchange of criminal intelligence information, and it has since been an important part of the intelligence
landscape.

To facilitate greater understanding of 28 CFR Part 23, the Bureau of Justice Assistance has developed the
Criminal Intelligence Systems Operating Policies (28 CFR Part 23) online training. This training is designed
to help state and local law enforcement understand the guidelines that govern the development and
implementation of policies and systems that facilitate intelligence sharing.

Training Includes:
-- Overview of the Regulation
-- Compliance Requirements
-- Storage Requirements
-- Inquiry and Dissemination Requirements
-- Review and Purge Requirements

28 CFR Part 23 online training is on the National Criminal Intelligence Resource Center (NCIRC) secure
Web site: http://www.ncirc.gov/

40 Hour Bioterrorism and Emergency Preparedness Training Certificate Program

http://www.cpe.rutgers.edu/courses/current/ep0601ca.html

The 40-hour certificate program was designed specifically to provide awareness level training to health
officers and administrators, public health nurses, health educators, registered environmental health
specialists, epidemiologists, and planners at municipal, county and regional health departments based
upon needs assessments for those groups.

ACT Online - Cyber Security Training -- https://www.act-online.net/


ACT Online is no longer taking new registrations.
Effective Jan 01 2010, the TEEX Domestic Preparedness Campus will begin hosting ACT Online courses
on their servers located at: http://www.teexwmdcampus.com/index.k2.

ACT Online content was developed by the University of Memphis Center for Information Assurance
which is recognized by the US Department of Homeland Security and the National Security Agency as a
National Center of Academic Excellence in Information Assurance Education.

In addition to the in-depth knowledge gained by each online course, ACT Online provides several
advantages over other online learning programs. These include;

 There is no cost to you. Since the ACT Online program is funded by the US Department of
Homeland Security, all training is provided free of charge.
 The ACT Online courseware allows you to train and take examinations at your own convenience
and pace. You can exit the courseware at any time and resume where you left off, even during
an examination.

 Completion of each course provides you with a Certificate of Completion from the Department
of Homeland Security/FEMA but more importantly, we teach you invaluable skills which in turn,
makes you a more valuable member of your company.

Anacapa Web-based Training -- http://www.anacapatraining.com/company/index.html

This free web-based training is provided as an introduction to Anacapa’s scheduled and on-site courses
in intelligence analysis. Upon completion of all three training modules, you may obtain a certificate of
completion.
Introduction to Intelligence Analysis (1 to 2 Hours)
Data Collection Tradeoffs (2-3 Hours)
Critical Thinking Strategies (2-3 Hours)

Anti-Terrorism Intelligence Awareness Training Program --


http://cop.spcollege.edu/cop/Training/WMDCourses/AIATP-WMD.htm

This course was created in partnership with the Federal Law Enforcement Training Center (FLETC).
Together, our goal was to offer FLETC's Anti-Terrorism Intelligence Awareness Training course in an
online format, in effort to reach a broader audience that may not otherwise be able to attend this
course in a traditional classroom format. Through federal funding from the Department of Justice, COPS
Office, this course is offered at no charge to participants. This program was developed originally by the
FLETC's Office of State and Local Training (www.fletc.gov/osl) with funding from the Department of
Homeland Security, Office of Grants and Training. This program is designed to give the line officer and
first line supervisor an awareness of terrorism, intelligence, current local trends of intelligence, and pre-
incident indicators.

Anti-Terrorism Level-1 Training -- https://atlevel1.dtic.mil/at/

Department of Defense anti-terrorism awareness training program. The purpose of this training is to
increase your awareness of terrorism and to improve your ability to apply personal protective measures.
Completion of this training meets the annual requirement for Level I antiterrorism training prescribed by
DoDI 2000.16.
Basic Intelligence Analyst Course (Course Revised 16 March 2009)
https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/12132-1/ACCP/301-D15/301-D15.HTM

This US Army Correspondence Course Program (ACCP) Course consists of five (5) sub-courses:

IT0426, Weather Support to Tactical Operations (4 credit hours)


IT0462, Intelligence Preparation of the Battlefield (12 credit hours)
IT0565, Preparation of the Intelligence Estimate (6 credit hours)
IT0566, Prepare Analysis of the Battlefield Area (8 credit hours)
IT0550, Introduction to the Intelligence Analyst (6 credit hours)

Course material is publically available, however formal enrollment is only available to U.S. Active and
Reserve military officers, warrant officers, and enlisted personnel; Reserve Officers' Training Corps,
National Guard Officer Candidate School, West Point cadets, and authorized federal civilian employees.

Center for Homeland Defense and Security (CHDS) - https://www.chds.us/


Naval Postgraduate School

The Naval Postgraduate School Center for Homeland Defense and Security offers non-credit, self-study
courses online. These courses are developed by the NPS CHDS teaching faculty and are derived from
course content (lecture material and course readings) from the Center's homeland security master's
degree curriculum. The courses, offered at no cost, are designed for homeland defense and security
professionals who wish to enhance their understanding of key homeland security concepts and require
the flexibility of self-paced instruction.

Self-Study Courses:
Homeland Security in Israel
The Global Jihadi Threat
Technology for Homeland Security: Inspection and Detection Technologies
Critical Infrastructure: Vulnerability Analysis and Protection
Research Process and Methods

Defense Security Service Academy - http://dssa.dss.mil/seta/seta.html

The DSS Academy provides security education and training to DoD and other U.S. Government
personnel, DoD contractors, and sponsored representatives of foreign governments. Its professional
staff of instructors, technology professionals, and education support personnel combine expertise to
create, collaborate and facilitate delivery of quality education and training across the security
disciplines.

The DSS Academy offers both resident and on-line courses. On-line courses include:
 Antiterrorism Officer (ATO) Level II (GS109.16)  Visits and Meetings in the NISP (IS105.16)

 Developing a Security Education and Training  Derivative Classification (IF103.16)


Program (GS104.16)
 Introduction to Information Security (IF011.16)
 DoD Foreign Disclosure Orientation (GS190.06)
 Marking Classified Information (IF105.16)
 Introduction to DoD Foreign Disclosure
(GS200.06)  Original Classification (IF102.16)

 Introduction to U.S Army Foreign Disclosure  Security Classification Guidance (IF101.16)


(GS201.06)
 Transmission and Transportation for DoD
 Risk Management for DoD Security Programs (IF107.16)
(GS102.16)
 DoD Personnel Security Adjudications
 U.S. Army Foreign Disclosure Orientation Independent Study (PS001.18)
(GS202.16)
 Introduction to Personnel Security (PS113.16)
 Business Structures in the NISP (IS051.16)
 JPAS/JAMS Virtual Training for Security
 Essentials of Industrial Security Management Professionals (PS124.06)
(EISM) (IS002.18)
 JPAS/JCAVS Virtual Training for Security
 FSO Role in the NISP (IS021.06) Professionals (PS123.16)

 Industrial Security Facilities Database (ISFD)  Personnel Security Management (PS103.16)


(IS111.06)
 Introduction to Physical Security (PY011.16)
 Industrial Security Facilities Database for DSS
Users (IS110.06)  Physical Security Measures (PY103.16 )

 Introduction to Industrial Security (IS011.16)  DoD Information Assurance Awareness (DS-


IA101.06)
 NISPOM Chapter 8 Requirements for Industry
(IS201.16)  Insider Threat (JC-CI101.06)

 Safeguarding Classified Information in the NISP  OPSEC Fundamentals (IO-OP101.16)


(IS109.16)
 Personally Identifiable Information (PII) (DS-
 Transmission and Transportation for Industry IF101.06)
(IS107.16)

The following new e-learning courses have been added to the DSSA February 2010 course catalog:

 Developing a Security Education and Training Program (GS104.16)

 DoD Foreign Disclosure Orientation (GS190.06)

 Introduction to DoD Foreign Disclosure (GS200.06)

 DoD Personnel Security Seminar (PS202.01)


 Case Adjudication Tracking System (CATS) Seminar (PS133.01)

 Lock and Key Systems (PY104.16)

 Physical Security Measures (PY103.16 )

 SAP 2nd Tier Review Process (SA202.16)

 Integrating CI and Threat Awareness into your Security Program (CI010.16)

Source: DSSA Course Catalog http://dssa.dss.mil/seta/documents/combined_catalog.pdf

Detecting Bio-terror (6-hours)


http://www.ualbanycphp.org/learning/registration/tab.cfm?course=bioterror&s=Register

Detecting Bio-terror provides an overview of forensic epidemiology and the activities of law
enforcement officers, laboratory professionals, and public health personnel in joint investigations of
bioterrorist events. The course provides not only instructional content on a wide variety of bioterrorism-
related concepts, it also dramatizes a bioterrorism investigation in a “mystery movie,” provides case
studies, links, and other instructional tools.

DNA Initiative -- http://www.dna.gov/

The President's DNA Initiative provides funding, training, and assistance to ensure that forensic DNA
reaches its full potential to solve crimes, protect the innocent, and identify missing persons. The web-
site offers extensive information, including free on-line training.

Doctrine Networked Education & Training (DOCNET) - http://www.dtic.mil/doctrine/docnet/

Drawn directly from joint publications without interpretation, each DOCNET course represents an
authoritative source of information for use by the Armed Forces of the United States and other
Government professionals who require joint doctrine knowledge. DOCNET can be used as an
information source, to supplement Professional Military Education, or for college credit.

Examples of courses available include:

Homeland Defense - http://www.dtic.mil/doctrine/docnet/courses/operations/hmdef.htm

Joint Intelligence - http://www.dtic.mil/doctrine/docnet/courses/intelligence/intel.htm

Special Operations - http://www.dtic.mil/doctrine/docnet/courses/operations/sof.htm


DoD Cyber Crime Center (DC3) -- http://www.dc3.mil/

Commercial - 410-981-1181
Outreach Requests - 410-981-0127
Toll Free - 877-981-3235
DSN - 622-2595

The Department of Defense Cyber Crime Center (DC3) sets standards for digital evidence processing,
analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect,
enhance, or recover digital media, including audio and video. The center assists in criminal,
counterintelligence, counterterrorism, and fraud investigations of the Defense Criminal Investigative
Organizations (DCIOs) and DoD counterintelligence activities. It also supports safety investigations and
Inspector General and commander-directed inquiries. DC3 aids in meeting intelligence community
document exploitation objectives from a criminal law enforcement forensics and counterintelligence
perspective. DC3 provides computer investigation training to forensic examiners, investigators, system
administrators, and any other DoD members who must ensure Defense information systems are secure
from unauthorized use, criminal and fraudulent activities, and foreign intelligence service exploitation.
DC3 remains on the leading edge of computer technologies and techniques through research,
development, testing, and evaluation applied to digital evidence processing and computer forensic
analysis; and by partnering with governmental, academic, and private industry computer security
officials.

The Defense Cyber Investigations Training Academy (DCITA) develops and delivers cyber investigation
training courses for DoD organizations, Defense Criminal Investigative Organizations, military
counterintelligence agencies, and law enforcement organizations.

The Academy is the only government organization solely dedicated to cyber investigations training,
development, and delivery. Students are trained in the latest digital forensic techniques using state-of-
the-art equipment, classrooms, and technologies. DCITA training includes:

 Computer search and seizure techniques

 Network intrusion investigations

 Forensic computer media analysis to support criminal, fraud, and counterintelligence


investigations

 Basic and advanced forensic examinations

 Online undercover techniques

 DCITA is accredited through the Council of Occupational Education (COE). Recognized by the
U.S. Department of Education, COE’s mission is to assure quality training in career and technical
development.
DoD Defense Support of Civil Authorities (DSCA) Course -- https://www.usarnorth.org/public/

The DoD Defense Support of Civil Authorities (DSCA) Course focuses on training senior military officers,
Department of Defense (DoD) civilians, and their staff to ensure the DoD’s readiness to support its
Homeland Defense and Civil Support missions.

The course will introduce participants to National, State, Local, and DoD statutes, directives, plans,
command and control relationships, and capabilities with regard to disaster and emergency response.

Emergency Management Institute - FEMA Independent Study Program (ISP) --


http://training.fema.gov/IS/

Emergency Operations Training Academy


http://eota.doeal.gov/EOTA/index.aspx
2201 Buena Vista Dr. SE
Suite 203
Albuquerque, NM 87106

For general inquiries about the website or the academy, contact Janet Lee at 505-842-7110 or
jlee@eota.energy.gov

The Emergency Operations Training Academy provides state-of-the-art training and education for the
Department of Energy/National Nuclear Security Administration, to enhance the readiness of personnel
in the emergency operations community.

EOTC Course Catalog: http://eota.doeal.gov/EOTA/articles/eota_course_catalogue.pdf

Español for Law Enforcement: An Interactive Training Tool --


http://www.ojp.usdoj.gov/nij/pubs-sum/201801.htm

This online training was developed to help law enforcement officers obtain a working knowledge of
Spanish and apply it to law enforcement situations. The course walks viewers through English
translations, phonetic spellings and pronunciations of Spanish words in situations involving interviews,
crime scenes, motor vehicles and domestic violence. Free registration.

Evaluation of Information Sources


Louisiana State University - Evaluation of Information Sources - Tutorial (20 minutes)

Part I, Types of Information Sources - http://www.lib.lsu.edu/instruction/evaluation/evaluation00.html

Part II, Evaluation Criteria - http://www.lib.lsu.edu/instruction/evaluation/evaluation20.html

FBI Virtual Academy -- https://fbiva.fbiacademy.edu

The FBI Virtual Academy (FBIVA): a structured, efficient, electronically delivered system of learning that
adds value to the forensic science, law enforcement, and judicial communities by providing a single,
comprehensive learning solution that offers a web-based means of accessing and acquiring the essential
knowledge, skills, and competencies (through relevant and consistent training and materials) needed to
support the worldwide criminal justice community.

Foundations of Intelligence Analysis Training (FIAT)


http://www.nw3c.org/ocr/courses_desc.cfm?cn=FIAT

The FIAT course was developed by a consortium that included the National White Collar Crime Center
(NW3C), Law Enforcement Intelligence Unit (LEIU), the International Association of Law Enforcement
Intelligence Analysts (IALEIA), and the Regional Information Sharing System (RISS).

FIAT is approved for the use of state DHS/FEMA training funds — course number WV-001-PREV

FIAT Topics:

 The History of Intelligence Analysis


 The Purpose of Intelligence Analysis
 The Intelligence Cycle
 Analytical Thinking Skills
 Using Different Types of Analysis
 The importance of strategic analysis in deterring crime.

FSI Language Courses - http://fsi-language-courses.org/default.aspx

Language courses developed by the Foreign Service Institute. These courses were developed by the
United States government and are in the public domain.

FSI-language-courses.com is not affiliated in any way with any government entity; it is an independent,
non-profit effort to foster the learning of worldwide languages.

Language Courses on the web-site:


Amharic Hindi Russian
Arabic Hebrew Spanish
Bulgarian Hungarian Sinhala
Cambodian Igbo Swahili
Cantonese Italian Swedish
Chinese Kituba Thai
Chinyanja Korean Turkish
Finnish Lao Twi
French Luganda Vietnamese
German Moré Yoruba
Greek Portuguese
Hausa Romanian

Functional Police Spanish - Spanish For Law Enforcement Personnel

To register, go to http://www.spepolice.com and complete the registration form.

This is an online Spanish program designed specifically for police personnel with limited or no previous
Spanish training; however, intermediate students can continue to improve via the live classroom
sessions. You can register and begin the course at anytime. You can take up to 12 months to complete
all the lessons and work at your own pace.

Paul Kurtzweil is the creator and primary instructor of this course. Paul is a lieutenant with the Polk
County Sheriff's Office in Florida. Paul has spent over 19 years working in an area with a large Spanish-
speaking population (over 90,000 Latinos in the jurisdiction) and he is required to translate on a daily
basis.

Paul Kurtzweil
Lieutenant
Office: 863.297.1100 / Fax: 863.297.1115
PCSO Website: www.polksheriff.org

Information Assurance Security Officer (IASO) (Management Level 1) - 40-hours


https://ia.signal.army.mil/IASO/default.asp

This course provides individuals an understanding of the information systems security policies, roles,
responsibilities, practices, procedures, and concepts necessary to perform the functions of an
Information Assurance Security Officer (IASO). The lessons presented here will aid the IASO in
developing an effective, overall security approach and in selecting cost-effective controls to meet the
requirements of laws, directives, and regulations. (Course material publically available / Final Exam
requires AKO Log-on)
Infragard - Information Security in the Workplace (On-line Training)
http://www.infragardawareness.com/

The better you are at protecting your own workplace from cybercrime and identity theft, the fewer
opportunities criminals, petty thieves, and even terrorists will have to exploit security vulnerabilities for
their own purposes.

InfraGard Awareness is a FREE information security awareness course that will help you understand how
you can help make your workplace more secure. It will also teach you vital skills to protect yourself and
your family from cybercrime and identity theft.

The course is free to all individuals and small businesses under 50 employees. When you have
completed the course, you can become one of the first in the nation to earn your "Certificate in
Information Security Awareness in the Workplace," an invaluable addition to any resume that will be
welcomed by security conscious employers.

Intelligence Analyst Training Program (IATP)

The Counter Terrorism Division (CTD) of the Federal Law Enforcement Training Center (FLETC), Glynco,
Georgia, is home to the Intelligence Analyst Training Program (IATP). CTD is responsible for the training
of intelligence analysts and intelligence associated personnel from Partner Organizations. The program
is open to military, state, and local law enforcement intelligence personnel on a space available basis.

The 76 hour program provides a historical, legal, and conceptual basis for criminal/law enforcement
intelligence. The beginning of the program establishes a firm historical, legal and ethical basis. IATP
contains a practical exercise devoted to critical thinking concepts and the three components of analysis.
IATP is designed around the intelligence process/cycle through the creation of requirements as the basis
of an intelligence plan, devoted to the Planning and Direction phase, followed by the collection and
documentation of information with the Collection Phase. IATP then transitions into the phases of
processing and exploitation, analysis, dissemination and re-evaluation as the baseline process for
transitioning information into intelligence. The program is structured around the Intelligence Cycle,
identifying functions the analyst /research specialist is involved with during each phase. The IATP is
conducted in a student centered learning environment, guided by subject matter experts in various
fields.

The student is evaluated on the basic concepts of analysis, presentation skills, and writing abilities. The
final practical exercise is devoted towards bringing together all teaching points, combining the
fundamentals of analysis with a law enforcement problem area. This practical exercise culminates with
the submission of both a report and presentation of a briefing of the student's findings to the class,
instructors, and interested FLETC staff.

Type: Advanced
Length: The training program encompasses 9.5 days (76 hours).

Curriculum

 Introduction to Law Enforcement Intelligence


 The Intelligence Cycle
 Intelligence Analysis: Core Competencies
 Introduction to Intelligence Analysis
 Legal Issues for Intelligence Analysts
 Intelligence Plans
 Digital Officer Safety & Operations Security (OPSEC)
 External Information Sources
 Electronic Sources of Information For Law Enforcement
 Analytical Methods & Techniques
 Report Writing for Analysts
 Introduction to Electronic Worksheets and Graphs
 Financial Aspects of Criminal Investigations
 Geographic Information Systems and Geographical Profiling
 Analytical Products and Presentations
 Practical Exercise Laboratory, Preparation and Presentation

POC for course information

Senior Instructor
Counterterrorism Division
1131 Chapel Crossing Rd.
Glynco GA 31524
Phone: (912) 267 2347
Fax: (912) 267 3144
fletc-counterterrorismdivision@dhs.gov

Joint Intelligence Virtual University

(U) The Joint Intelligence Virtual University (JIVU) is the premier collaborative online training
environment, designed especially to meet the needs of the Intelligence Community and to provide easy
access to high-quality e-Learning products, tools, and services. Providing over 4000 courses, JIVU serves
as an online learning platform for the Defense Intelligence Agency (DIA) and approximately 17 other IC
Agencies, Commands and Services. JIVU utilizes the Plateau Learning Management System and the
Centra tool to deliver online learning content. It is accessible 24/7 on the Joint Worldwide Intelligence
Communications System (JWICS) at http://jivu.dodiis.ic.gov, the Secret Internet Protocol Router
Network (SIPRNet) at http://jivu.dse.dia.smil.mil, and StoneGhost at http://www.jivu.us.qlat (Link will
only work when logged onto a native StoneGhost terminal).

Joint Knowledge Online -- http://jko.cmil.org/

Joint Knowledge Online – Internet Public site -- JKO-IP -- is the public access enterprise portal of the Joint
Knowledge Development and Distribution Capability (JKDDC) Training Transformation initiative,
managed by the JKDDC Joint Management Office (JMO) at the U. S. Joint Forces Command Joint
Warfighting Center in Suffolk, Virginia.

JKO-P provides an online source for relevant, operationally focused joint training and knowledge
services and products specifically tailored for access by the general public, multinational partners, and
interagency/intergovernmental supporters.

To access JKO Communities of Interest (COI's) and on-line training courses, you need to register for an
account to log-in to the JKO Members Portal.

Joint Language University - http://JLU.wbtrain.com

The Joint Language University (JLU) is a web based language learning support system. It comprises
various projects and contributors from across the Federal Government including the NSA, DIA, US Navy,
USSOCOM, and DLI. It is open to anyone within the Federal Government through self-registration using
their '.mil' or '.gov' email address.

JLU includes quality foreign language learning and teaching resources. Quality assurance is accomplished
by experts in the specific language and in pedagogy or second language acquisition, who are identified
through relevant national teaching associations and programs at major universities. JLU also includes
cultural and area familiarization materials from such programs as the National Cryptologic School's ICAS
seminars, the Defense Language Institute’s Countries in Perspective and Area Familiarization Guides and
the Navy's Center for Language, Regional Expertise, and Culture (CLREC).

The project goal is to support a wide range of languages, learner proficiency levels, and learning
environments, and to provide access to these resources for language professionals across the Federal,
DoD, and Intelligence language communities. The JLU is working to create a scalable, cost-effective
system that can adapt to changing missions, circumstances, and teacher/learner needs. As the JLU
continues to develop, new features, resources, and tools will be added as they become available.

The JLU has been created with the support of the US Government and is free for all members of the US
Government. Registration is available only to users with a valid .mil or .gov email address and for select
DoD and associated schools. Questions & comments: JLU_Admin@wbtrain.com
Military Police Investigations Course --
https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/public/8902-1/accp/mp0018/mp0018_top.htm
MP0018 Edition C. August 1994 - (9 credit hours)

Course material is publically available, however formal enrollment is only available to U.S. Active and
Reserve military officers, warrant officers, and enlisted personnel; Reserve Officers' Training Corps,
National Guard Officer Candidate School, West Point cadets, and authorized federal civilian employees.

Multijurisdictional Counterdrug Task Force Training -- http://www.mctft.com/

The Multijurisdictional Counterdrug Task Force Training (MCTFT) program provides unique, tuition-free,
courses covering all aspects of counterdrug law enforcement and training support for community anti-
drug coalitions.

CD-ROM Training
Analytical Investigative Tools
Drugs in America: Lessons for Law Enforcement
Explosives, Booby Traps and Bomb Threat Management
Risk Management and Violence in Undercover Operations
InFocus: A Clear Message About Drugs

On-Line Training
Airport Narcotics Investigations Introduction to Highway & Rural Drug Investigations
Introduction to Clandestine Laboratory Investigations Introduction to Interview & Interrogation
Clandestine Laboratory Recertification Introduction to Money Laundering
Command & Control Overview Introduction to Patrol Drug Investigations
Introduction to Conspiracy Investigations Overdose America
Criminal Street Gangs Overview Police Intelligence
Criminal Street Gangs Overview - Spanish Risk Management and Violence in Undercover Operations
Drug Identification Surveillance Operations Overview
Ethical Issues and Decisions in Law Enforcement
Explosives, Booby Traps & Bomb Threat Management

National HIDTA Assistance Center -- http://www.nhac.org/


Telephone: 305-715-7600

The National HIDTA Assistance Center offers two CD-ROM based courses:

Introduction to HIDTA Analytical Techniques


This no cost informational distance learning CD-ROM was created through a collaborative effort
between the NHAC Training and MultiMedia Units. It was designed to provide the Analyst with
introductory information into the intelligence cycle, the basic graphical techniques used in the analytical
process, and various resources available to the HIDTA Analyst in the course of doing business.

Topics covered in the CD include:


Document Exploitation Intelligence Cycle Intelligence Products Generation
Analytical Techniques USC Title 18
Validity and Reliability Scales Statistical Comparison Formula
Title III Threat Analysis Elements
Criminal Intelligence Process Post Seizure Analysis Reports
Uses of DNR/Pen Register Briefing Techniques

So What’s Next? Analysis & Critical Thinking


This no cost informational distance learning CD-ROM entitled "So What’s Next? Analysis & Critical
Thinking" was created to provide you with introductory information regarding conceptual blockbusting,
problem solving, analysis, reasoning skills, creative thinking and a mixture of games and puzzles to
practice and sharpen your thinking skills.

Both CD-ROM programs are open to Federal, State and Local Law Enforcement Personnel, Criminal
Intelligence Analysts, Crime Analysts, Investigators, Investigative Assistants, Counterdrug Operations
Supervisors at all levels and military personnel – both active and reserve components – assigned to
support counterdrug activities in a HIDTA.

National Terrorism Preparedness Institute -- http://terrorism.spcollege.edu

NTPI provides extensive support to our Nation’s War on Terror. This support includes monthly
nationwide, satellite television broadcasts on important training topics for emergency managers and
responders; traditional classroom instruction; training support packages that include student and
instructor guides, video, CD, DVD, and VHS products; mobile training teams; and web- and computer-
based training products.

On-line Courses
1. Force Protection
a - Force Protection Course Introduction
2. Port Security
a - Basic Port Security
b - Access Control
c - Advanced Port Security
d - Intermodal Supply Chain Security
3. General Aviation Security
a - General Aviation Security For Law Enforcement Officers
4. Anti-Terrorism
a - Introduction to Anti-Terrorism
b - Terrorism Awareness for Law Enforcement
c - Law Enforcement Guide to Understanding Islamic Terrorism and Arabic Names
5. Traffic Stops
a - Traffic Stops
6. Planning
a - Planning Considerations for WMD Incidents

Continuing Education - Several CE programs available, including:


-- Advanced Criminal Intelligence Analysis to Prevent Terrorism
-- The Renewed Fight Against Terrorism: Law Enforcement Intelligence
-- Developing Our Nation’s Future Leaders in Homeland Defense
-- The Intelligence Toolbox Training Course
-- The National Infrastructure Protection Plan
-- Suicide - Homicide Bombers
-- The Psychological Impact of Terrorism
-- Coordination of Intelligence Collection

Navy and Marine Corps Intelligence Training Center (NMITC) Intelligence Courses

The NMITC offers the following on-line, self-study courses in intelligence:

-- Introduction to Intelligence
-- Intelligence Cycle
-- FMF Intelligence Structure
-- Intelligence Disciplines
-- Intelligence Preparation of the Battlespace
-- Intelligence Writing
-- Marking Classified Documents
-- Threat Analysis
-- Targeting Active

Individuals with an official need for this training may enroll in the courses by obtaining a student
account with USMC - MarineNet: https://www.marinenet.usmc.mil/marinenet/

Open Source Intelligence Training -- https://www.intelink.gov/sites/dhs-ose/training/default.aspx

Department Of Homeland Security (Requires Intelink Login)

Module 1 - The Value and Definition of Open Source


Module 2 - Assessing Reliability of Sources
Module 3 - Search Engines
Module 4 - The Deep Web
Module 5 - The Use of RSS
Module 6 - Social Bookmarking
Module 7 - Introduction to Anonymization
Module 8 - Intelink
Module 9 - OpenSource.gov
Module 10 - Non-Internet Open Source
Module 11 - Blogosphere
Module 12 - Virtual Worlds
Module 13 - Research Planning

Peace Operation Training Institute -- http://www.peaceopstraining.org/

Global Terrorism

First released in early 2001, and revised following the events of September 11, 2001, this course
provides a comprehensive knowledge of the terrorism phenomenon throughout history, culminating in
the present threat posed by transnational terrorism. Its scope is the widest possible and includes
transnational, international and domestic terrorism; terrorist groups; lone terrorists; different forms of
historical terrorism; tactics and strategies such as kill- zones and choke-points; logistics; the terrorist
armoury of weapons and their effects; sponsorship, including political and religious support; terrorism in
the context of guerrilla warfare, criminal assault, and acts of war; the terrorism-media relationship; anti-
and counter-terrorism; and the systematic eradication of terrorism vis à vis emergency suppression.
Motives, victims, targets and types of leadership are also among the many topics covered in this richly
illustrated course, and a broad range of nineteen relevant annexes includes a catalogue of major attacks
spanning many years; a glossary of related terrorism, police, security and intelligence terms; and a brief
profile-table of several hundred terrorist groups. Major case studies and historical terrorist attack briefs
are also included in the course material, which was mentioned by the UN Secretary-General in his report
(UN GA Report A/55/179) to 185 Ambassadors at the UN General Assembly as one of the training
measures to suppress terrorism. Twelve lessons, 552 pages.

COURSE AUTHOR: Paul Medhurst. Ph.D., former Deputy Chief, Security and Safety Section, UN Office,
Vienna.

Tactical Language & Culture Training System -- http://support.tacticallanguage.com/

The courses are free of charge to download by members of the US military.

If you have a .mil email address, register on this website to download your copies of the Tactical Iraqi,
Tactical Pashto, Tactical Dari and Tactical French Language & Culture Training Systems software,
manuals, and trainer materials.

University of Military Intelligence -- http://www.universityofmilitaryintelligence.us/main.asp


The University of Military Intelligence (UMI) is not a brick and mortar university but we want you to
think of us as your online training resource for Military Intelligence. At UMI, we provide web-based
training and reference material for Military Intelligence professionals around the globe. Although,
targeted towards the Intelligence community, UMI provides a variety of materials that are both relevant
and useful to all military professionals. UMI consists of three major areas, our public section and UMI’s
two password-protected areas, the UMI Secured Training Network and Self-Paced Training.

-- Selected Commercial Courses --

Alpha Group Center for Crime and Intelligence Analysis Training


P.O. Box 8
Montclair, CA 91763-0008
http://www.alphagroupcenter.com/

Crime Analysis Applications Homeland Security & Terrorism Analysis


Criminal Intelligence Analysis Research Methods in Criminal Justice (Online)
Advanced Criminal Investigative Analysis Statement Analysis, Interview & Interrogation
Criminal Investigative Analysis Techniques
Dynamic Leadership for Law Enforcement

American Institute of Applied Science


http://www.aiasinc.com/

Forensic Science Program 101 ($859.00) Forensic Science Program 201 ($365.00)
101C Criminal Investigation 201F Fundamentals of Forensic Investigation
101M Modus Operandi 201T Trace Evidence & Its Significance
101FI Firearms Identification 201A Fundamentals of Arson & Explosion Investigations
101Q Questioned Documents 201B Significance of Blood in Criminal Investigations
101P Police Photography 201D Forensic Investigations into Drugs & Alcohol
101F Fingerprint Classification and Identification

Anacapa Sciences, Inc.


301 East Carrillo, P. O. Box 519
Santa Barbara, CA 93102-0519
http://www.anacapatraining.com/company/index.html

Analytical Investigation Methods (AIM) -- Our basic one-week course is designed for analysts,
investigators and agents who require analytical techniques for the investigation of complex criminal
activity but not all the techniques and extensive practice provided by the CIA course.
Criminal Intelligence Analysis (CIA) -- This two-week course is designed for dedicated analysts
assigned to intelligence units. It provides training and practice in all the techniques required for the
successful analysis of information related to a wide variety of complex criminal activity. The course
will benefit analysts new to the field as well as those who have skills in the application of computer-
based analytical and presentation tools.
Financial Manipulation Analysis (FMA) -- This one-week course is for investigators and analysts who
are not accountants but who must analyze complex financial manipulations performed to disguise
and transfer money gained from illegal activities.

Cleveland Institute of Electronics


http://www.ciebookstore.com/bookstore/catNO/37/subcategories.asp

-- Crime Scene Investigation DVD Course ($159.00)


-- Introduction to Computer Forensics ($245.00)

International Association of Crime Analysts


9218 Metcalf Avenue, #364
Overland Park, Kansas 66212
http://www.iaca.net/IACATraining.asp

The IACA Professional Training Series comprises five five-day modules:

 Fundamentals of Crime Analysis


 Tactical Crime Analysis
 Problem Analysis
 Crime Mapping
 Computer Applications for Crime Analysis

Each of the five modules in the Professional Training Series is also currently being offered online through
Arapahoe Community College in Colorado as part of a certificate in crime analysis.

Arapahoe Community College


5900 S. Santa Fe Drive
P.O. Box 9002
Littleton, Colorado 80160
http://www.arapahoe.edu/deptprgrms/crj/crimeanalysis.html

Legal Investigation Certificate Course - http://www.legalstudies.com/courses/legalinvestigation.html

This course is designed to teach legal investigation to those interested in pursuing a new career and those presently working in
the legal field. At the end of the course, students will be qualified to assist attorneys, paralegals, insurance companies and
private businesses, as well as state and federal government agencies, in the process of civil and criminal investigation. Students
will also be taught how to create a freelance investigation business. Included subject areas are: arson investigation, products
liability investigation, personal injury and traffic accident forensics, employment accidents, investigation of financial and equity
matters, professional malpractice and negligence, skip-tracing, and the role of a legal investigator in preparing for civil and
criminal litigation.

Lesson 1: Introduction to our legal system, legal and ethical considerations for the investigator, law of agency and coverage of
rules of court and evidence.

Lesson 2: General interviewing and investigation techniques, sources of leads and information, fact analysis, taking witness
statements, forensic photography, proper service of legal process, and surveillance.

Lesson 3: Personal injury investigation techniques, traffic accident reconstruction, premises accidents, employment accidents,
government investigation, document analysis and control, financial and equity analysis, testimony, and case studies. Job search
strategies and placement possibilities will also be discussed.

Lockmasters Security Institute


Comprehensive Security Specialist Training (On-line) - ($625.00)
http://www.lsieducation.com/ecourse/

This work-at-your-own-pace program is designed to provide the student with an in-depth knowledge of
physical security procedures and equipment. The program includes conceptual security considerations,
vulnerability assessments, and familiarization with hardware and procedures. Subject matter also
includes physical security and crime prevention theory, risk assessment, US terrorism, bomb threat
management, security design, perimeter protection, intrusion detection systems, access control,
security lighting, locks and locking devices, closed circuit television (CCTV), controlling workplace
violence, contingency planning and the security survey process. The course consists of 17 Lesson
Modules with accompanying PDF materials and a final exam.

Registered Investigator - ACFEI


http://www.acfei.com/forensic_certifications/ri/

The Registered Investigator, RI program instructs, measures, and assesses knowledge and competency
of investigators in both the public and private sectors. Providing a foundation of forensics basics, this
course creates a measure of standardization in the field of investigation. As the National Academy of
Sciences’ report on the Forensic Sciences reflects, certification for investigators is more crucial than ever
before to fill the gaps in the field. The RI course will cover the following topics:

» Investigation types
» Promoting your case
» Sources
» Evidence
» Crime scene processing
» Interrogations and interviews
» Homicide
» Trial
S2 Safety & Intelligence Institute
Distance Learning Programs
http://www.s2institute.com/index.php
Pinellas, FL - Tel. (727) 461-0066
Hillsborough, FL - Tel. (813) 227-8585

The S2 Institute offers several distance learning programs.


Examples of the courses offered include:

Anti-Terrorism Officer Program


The distance learning version of the S2 Anti-Terrorism Officer (ATO) Program is designed to prepare frontline security and
police officers for deployment in environments where terrorism is a critical threat. This program provides an exploration of
contemporary terrorist methods and basic anti-terrorism skills and knowledge that all officers should possess.

Bomb Security for Executive Protection


The S2 Bomb Security for Executive Protection distance learning course provides students with essential skills for protecting
individual principals against assassination by the use of explosives. In this 12-hour advanced-level course, anti-terrorism expert
Craig Gundry explores IED technology, explosive assassination methods used by professional adversaries, and measures for
preventing, detecting, and mitigating explosive attacks.

Covert Surveillance for Private Investigators


In the S2 Covert Surveillance for Private Investigators course, veteran private investigator Ron Azarello and S2 Staff Instructor
Craig Gundry survey the strategies, tactics, and technology available for use in conducting surveillance operations in private
investigations. Although the core of this course is focused on surveillance technique and technology, considerable attention is
also devoted to important parallel topics such as legal issues, teamwork, report writing, and more.

Defense Against Anti-Vehicle Explosive Attacks


Attacks against vehicles in transit by the use of explosives have emerged in recent years as some of the most popular methods
of assassination by terrorists and professional adversaries. In this two hour distance learning program, bomb security expert
Craig Gundry examines the spectrum of explosive related threats to vehicles in transit and provides effective strategies for
countering these risks.

Human Intelligence for Law Enforcement


The S2 Human Intelligence for Law Enforcement distance learning program is designed to provide new and experienced
homeland security and law enforcement intelligence professionals with a deeper understanding of the HSINT intelligence
process and successful strategies for solving domestic counterterrorism problems through effective use of human intelligence.
The instructor, a former CIA Senior Field Operations Officer, draws on his previous experience in dismantling Al-Qaeda
operations overseas to present students with practical strategies for planning and executing domestic HUMINT operations in
addition to valuable advice about working in collaboration with the US Intelligence Community.

WMD & The Intelligence Function


In today's threat environment, law enforcement and national-level intelligence professionals are increasingly called on to
gather and assess information about chemical and biological terrorism or suspected weapons programs. In this 13-hour
distance learning course, former UN Weapons Inspector Harvey J. McGeorge demystifies the complex world of chemical and
biological WMD and provides effective strategies for identifying, collecting, and analyzing CBW information.

USDA Graduate School -- http://graduateschool.edu/


The USDA Graduate school offers the following courses in terrorism studies, via distance learning:

--Counter - and Anti-Terrorism


--Department of Homeland Security: An Overview
--Global Terrorism
--Introduction to Terror and Terrorism
--Psychology and Culture of Terrorism
--Terrorism and Politics

-- Academic Training Opportunities in Intelligence, Investigations and Analysis --

Intelligence Analysis Certificate - American Military University


http://www.amu.apus.edu/Catalog/09/graduate/degree/certificates/intelligence/intelligence-
analysis.htm

18 Semester Hours

Upon completion of this certificate students will be able to:

Compose basic and intermediate-level research and provide professional analyses on issues critical to intelligence consumers.

Assess cognitive science principles that underlie human information processing and problem solving such as intelligence
analysis.

Produce advanced-level analyses in selected areas critical to intelligence consumers.

Must take the following 12 semester credit hours:

 INTL500 / RC506 - Research Methods in Security and Intelligence Studies-Intelligence Studies Focus

 INTL504 - Analytics I

 INTL505 - Writing Skills for Analysis and Reporting

 INTL506 - Analytics II

Choose 6 semester credit hours (2 courses) from:

 BUSN623 / DM624 - Legal & Ethical Issues in Management

 FINC600 / DM606 - Corporate Finance

 INTL631 / IN608 - Criminal Intelligence Analysis

 INTL637 / IN528 - Intelligence Profiling

 SCMT537 / CR537 - Computer Crime

 SCMT538 / CR538 - Industrial Espionage


Certificate in Professional Investigation - Boston University
http://professional.bu.edu/cpe/investigation.asp

The Boston University Certificate in Professional Investigation program is ideal for a range of individuals, including current
investigative professionals or those in related fields, as well as those seeking to enter this exciting and rewarding field. This
certificate program offers a unique course of study in the private investigation profession, and is taught by educators who are
also experienced licensed private investigators. Designed to accommodate the busy schedules of working individuals, this
comprehensive curriculum delivers over 100 hours of instruction in six modules. Upon successful completion of the program,
students will be awarded a Certificate in Professional Investigation from Boston University.

Foundations of Professional Investigation

This module gives an overview of the investigative profession, and discusses how professional investigators assist attorneys,
businesses, and the public in a variety of cases. It covers the investigative process and the conduct, skills, and traits required of
professional investigators. As the foundation for the certificate program, it focuses on the three primary areas of investigation
(research, interviews, and surveillance) and previews the higher-level modules.

Internet Research

Internet intelligence is one of the newest and vital skills areas for the professional investigator. This cutting-edge curriculum will
expose students to both the tools and the methods for conducting investigative research online. Students will learn best
practices for obtaining reliable information, and class time within a computer lab will enable the student to apply recently
learned skills.

Investigative Research

Traditional library and public record searches are effective and vital aspects of any investigation. Through visits to courthouses
and other public offices, students learn techniques and best practices of Investigative Research, and discover the many types of
information available through this research. Students also learn how best to apply and present the information obtained
through this type of investigation.

Investigative Interviewing

This module focuses on conducting investigative interviews of various subjects, and on planning, conducting, recording,
interpreting, and presenting the results of interviews. The training makes use of video clips and role playing to demonstrate and
reinforce interviewing behaviors and techniques.

Investigative Surveillance

In this module, students learn about a variety of surveillance techniques and practice how to conduct typical surveillance
assignments. The module covers when to use a particular technique and how to use and select the appropriate technology.
Students also learn how to prepare and present the results of surveillance activities to clients.

The Law and the Private Investigator

This module focuses on the role of the investigator within the legal system. Students learn how to apply investigative skills to a
range of legal matters, including civil, domestic, and criminal actions. The module examines how civil and criminal cases
proceed, as well as legal strategies, legal terminology, and laws pertaining to investigative practices. Providing expert testimony
is also covered and practiced in this module.
Graduate Certificate in Applied Intelligence - Mercyhurst College
http://intel.mercyhurst.edu/content/applied_intelligence_graduate_certificate

The Mercyhurst College Certificate in Applied Intelligence is a three course, nine credit hour graduate certificate program.

This challenging and demanding academic experience provides students with a variety of analytical skills and exposure to the
latest technologies in intelligence theory, communications, and research.

The goals of the program are to:

 introduce students to current intelligence theory and application,

 build their intelligence analysis skills,

 improve their intelligence writing abilities,

 and strengthen their team management skills.

The courses are sequential and build on each other. Students must complete the courses listed below in the following
sequence:

 INTL 510 Intelligence Theory and Application

 INTL 580 Intelligence Communications

 INTL 520 Advanced Analytical Techniques

The nine graduate credits awarded through the certificate may be used to partially satisfy the degree requirements for the
Master of Science degree in Applied Intelligence offered by the Mercyhurst College Institute for Intelligence Studies.

Course Descriptions

Intelligence Theory Application (INTL 510)

A survey course that introduces the student to the discipline of intelligence and provides the student with an understanding of
how intelligence systems function, how they fit within the policymaking systems of free societies, and how they are managed
and controlled. The course will integrate intelligence theory with the methodology and processes that evolved over time to
assist the intelligence professional. The course will develop in the student a range of advanced research and thinking skills
fundamental to the intelligence analysis process. (3 credits)

Intelligence Communications (INTL 580)

The skill most appreciated by the intelligence consumer is the ability to communicate, briefly and effectively, the results of
detailed analytic work. This course, through repetitive application of a focused set of skills to a body of information of
constantly increasing complexity, is designed to prepare intelligence analysts to deliver a variety of written intelligence
products. (3 credits)

Advanced Analytical Techniques (INTL 520)

This course is designed to provide an opportunity for students to explore techniques emerging from the intelligence community
and physical and social sciences and apply those techniques to intelligence problems. Focusing on a variety of techniques from
a variety of disciplines, this course will expose an advanced student to new and potentially useful methods for conducting
intelligence analysis. (3 credits)
Certificate in Law Enforcement Intelligence - Michigan State University
https://intellprogram.msu.edu/LE_Intell_Cert.php

Students may choose three of the following four classes to help provide some degree of focus for each individual’s interest as
well as to add some flexibility for the enrollment schedule.

CJ 433 Law Enforcement Intelligence Operations – This provides an overview of the intelligence process including current issues
and trends. The course examines intelligence as a tool for law enforcement management as well as relationship to operational
responsibilities. It is designed as a broad-ranging course to provide the student with comprehensive knowledge about different
aspects of the law enforcement intelligence function.

CJ 809 Public/Private Partnerships for Emergency Preparedness and Homeland Security – This particular class is driven largely
by the mandate of Homeland Security Presidential Directive (HSPD) 8 and the National Preparedness Goal, both of which
mandate the ability to have mechanisms in police to prevent and recover from terrorist attacks. In addition, the concept of
Intelligence-Led Policing, the National Criminal Intelligence Sharing Plan, and the Office of Domestic Preparedness Guidelines
for Homeland Security all express the need to establish effective public-private relationships as a means to counter terrorism.
The course examines the issues, opportunities, and processes to accomplish this.

CJ 837 Counterterrorism and Intelligence – The intent of intelligence is to prevent crime and terrorism. Thus, the goal of this
class is to integrate knowledge about both intelligence and terrorism and examine what strategies – both tactical and strategic
– can be used to counter the different types of terrorism. Included is an examination of the nexus between terrorism and
organized crime; challenges of counterterrorism initiatives; and threat assessment.

CJ 838 Terrorism – The course examines the meaning of terrorism, its effects, the different types of terrorism, and the
motivating factors in various international and domestic terrorism ideologies. The course is designed to provide the student
with the motives, methods and targets of different ideological groups.

Geospatial Intelligence Graduate Certificate Program - George Mason University


http://gigc.cos.gmu.edu/

The Geospatial Intelligence (GI) certificate requires a total of 18 credit hours, or 6 courses. These comprise 5 mandatory core
courses and one elective. The mandatory core courses reflect the three key science concentration areas (CA) of this program,
namely geospatial image analysis, spatial analysis, and information technology, as reflected in the following list:

Mandatory core courses:

 EOS 758 Earth Image Processing (CA: Image analysis)

 GEOG 553 Geographic Information Systems (CA: Spatial analysis)

 INFS 590 Program Design and Data Structures (CA: Information technology)

 EOS 684 Select Topics in Geospatial Intelligence

 EOS 685 Capstone Course in Geoinformatics

List of elective courses:

 EOS 740 Hyperspectral Image Systems


 EOS 747 Satellite Data Reception and Product Generation

 GEOG 631 Spatial Agent-Based Models of Human-Environment Interaction

 GEOG 650 Automated Cartographic Generalization

 GEOG 656 Terrain Mapping

 GEOG 664 Spatial Data Structures

 EOS 771 Algorithms and Modeling in GIS

 EOS 772 Distributed Geographic Information Systems

 EOS 785 Motion Imagery Analysis

Post-Baccalaureate Certificate in Crime Analysis - Radford University


http://gradcollege.asp.radford.edu/crime_analysis.html

A post-baccalaureate certificate (PBC) is an educational certificate that attests to certain advanced graduate study in an area of
concentration beyond the baccalaureate level. It is graduate-level coursework, but is less than the credit hours necessary to
earn a Master’s degree. The PBC in crime analysis is a 15-credit hour program designed to develop the knowledge, skills, and
abilities for an entry level position as a crime analyst or to enhance the skills of a working analyst. It includes coursework in
environmental criminology, research methods, statistics, crime analysis, and crime mapping. Upon completion of the required
curriculum, the student is awarded the PBC in Crime Analysis.

The following describes the 15-credit hour curriculum:

CRJU 670. Criminal Justice Research Methods (3) - Description: This course is a practical application of basic research methods
developed in the field of criminal justice. The student must conduct a research project or thesis proposal and present their
research in the classroom forum. A review of research methodology will be presented. Computer applications will be
emphasized where appropriate.

CRJU 671. Quantitative Methods in Criminal Justice Research (3) - Description: This course is intended to equip the students
with the ability to calculate and conduct statistical analyses for applied research, to ensure the ability to interpret the results
from statistical analysis, and to apply those results to appropriate situations.

CRJU 672. Applications in Crime Analysis (3) - Description: This course is an introduction to the application of quantitative
methods in the analysis of crime trends, patterns, and series for use in tactical, strategic and administrative situations.

CRJU 673. Crime Mapping (3) - Description: This course develops basic and advanced skills in the tactical and strategic mapping
of crime trends, patterns, and series.

CRJU 676. Environmental Criminology (3) - Description: This course explores the theoretical underpinnings of the temporal and
spatial distribution of crime with attention to prevention, intervention, order maintenance, and policy implications.

Certificate in Advanced Crime Analysis - Portland State University --


http://online.ccj.pdx.edu/advanced-crime-analysis/
Portland State University offers an online Certificate of Advanced Crime Analysis that provides hands-on educational training
for those aiming to become a central figure in crime prevention. Program coursework utilizes crime data from sources such as
police homicide reports, the FBI and Department of Corrections. The Certificate of Advanced Crime Analysis is awarded by the
College of Urban and Public Affairs.

Credits 24 Quarter Credits

Core Classes (All courses from the list below)

Crime Control Strategies ....4 Quarter Credits - An analysis of the methods used to control crime in American society. Emphasis
on understanding the sometimes conflicting goals of the criminal justice system; attention is given to the general categories of
general and specific deterrence, aggressive enforcement, situational and environmental defensive measures, and modification
of the social order. Special attention will be given to how other countries control crime and the problems of comparison
because of political and cultural differences.

Crime Analysis....4 Quarter Credits - An introduction to the basic methods used in analyzing data from criminal justice agencies,
including temporal and spatial analysis of crime patterns, calculation of crime rates, descriptive analyses of victim and offender
characteristics, recidivism, and the identification of offense typologies. Students get hands-on experience coding, analyzing,
interpreting, and presenting crime data from a number of sources like police homicide reports, the FBI, Department of
Corrections, and attitudinal surveys. Prerequisite: basic computing skills.

Criminal Justice Research ....4 Quarter Credits - Introduction to the basic concepts of social science research including
hypothesis testing, research design, causality, sampling, and measurement. Course is intended to provide students with
necessary skills to critically evaluate crime and delinquency research as well as design and implement basic research projects.

Geographic Criminology ....4 Quarter Credits - This course will provide a theoretical background for the geographic study of
crime. Topics covered include criminological theories that address the geographic distribution of crime, an introduction to
commonly used terminology in crime mapping, the use of spatial data in crime prevention efforts, and the ways in which crime
mapping is currently used in criminal justice agencies.

Applied Crime Mapping ....4 Quarter Credits - This course will provide students with the technical and analytical skills used in
crime mapping. Various mapping applications will be made available to students for the geographic examination of crime data.
As this course is an introduction to mapping software, no prior GIS knowledge is required. Students will learn to create useful
maps that convey spatial crime data and the relationships between crime and other geographic features.

Crime, Grime, and Fear ....4 Quarter Credits - Course designed to study the social, economic, political, and physical factors
underlying neighborhood crime and decline. Special attention is given to physical and social incivilities, the “broken windows”
theory, police-community partnerships, and problem-solving. Students will work on neighborhood-centered projects to explore
solutions to neighborhood crime patterns, disorder, and fear of crime, and ideas for strengthening police-citizen relations, and
community building.

Intelligence Certificate Programs - Henley-Putnam University


http://www.henley-putnam.edu/761-293.htm

The Entry Level Certificate is designed to give the professional in the intelligence analysis field or the student who is considering
getting in the field, a more comprehensive understanding of how to employ sound critical thinking when examining and
assessing the validity of various arguments and the value of diverse sources of information. Students will learn various
techniques for analyzing raw intelligence, evaluating source credibility, distinguishing “signal” from “noise”, and testing
hypotheses. Finally, students will learn to apply principles of sound research and evaluation to a wide spectrum of source
materials, to identify and describe their strengths and weaknesses, and to interpret the material obtained from them properly,
while keeping potentially large amounts of information organized and accessible.
The Mid Level Certificate is designed for the professional who already has some experience in the intelligence analysis field or
the student who has taken the entry level certificate to further learn about the Intelligence Cycle, how intelligence is prepared,
and how it is used to inform decision and policy makers. This program will cover matters of intelligence ethics, privacy issues,
and changes in the intelligence community in the post-9/11 environment. In this program the student will take the role of
terrorist and pick a target for a future terrorist attack and then collect intelligence about that target. And finally, this course will
distinguish counterterrorism (CT) from antiterrorism (AT)/Force Protection (FP) intelligence, strategic CT intelligence from
tactical CT intelligence, and introduce analytical constructs for the field operator and reporter.

The Senior Level Certificate is designed for the intelligence analyst professional who wants to better understand the finer points
of advanced analysis, including how to present briefings geared to the context of the intelligence consumer. The student will
learn to codify and unify relevant information into a comprehensive study that will present an accurate and up to date picture
of the target region’s cultural, political, economic, social, military, geographic, climate, demographic, hydrographic, and
historical data that will support strategic intelligence and tactical operations by the end user. Further, this program teaches the
craft of analyzing leaders, how to review available biographical information in an effort to discern the leader’s personality traits
and skills, and any available information on the leader’s professional record in dealing with a variety of issues. And finally,
students will learn how to weigh a variety of factors influencing how a political situation is likely to develop.

Intelligence Studies Certificate - Neumann University -


http://www.neumann.edu/academics/contedu/intell_studies.asp

The Intelligence Studies Certificate Program is a structured series of online courses designed to prepare students for positions
that involve problem-solving and analytical thinking in private industry, intelligence analysis, national security and law
enforcement agencies. Through interactive discussions, case studies, group work and hands-on review of sample data,
participants in this program will review large amounts of information, collate it into meaningful groups, evaluate its accuracy
and reliability, and analyze it. Techniques include logic, probability, association matrices, flow charts, link analysis and other
analytical tools. The program is modeled after courses taught at the Federal Law Enforcement Training Center and used by
agencies such as the FBI, DEA, and Homeland Security.

INTEL 300 - BASIC INTELLIGENCE ANALYSIS - 3 CREDITS - In this course, the basic principles of Intelligence Analysis, as practiced
by the CIA, FBI, DEA, U.S. Customs as well as other Federal, state and local law enforcement agencies are presented and
discussed. Students are also taught deductive and inductive logic, formation of premise and inference, probability, hypothesis
development and testing, as well as sources of information and analytical techniques, i.e., association matrix, link analysis,
flowcharting and financial analysis. Throughout the course, practical examples in investigations of organized criminal
enterprises, drug trafficking, political corruption and human smuggling are presented and discussed.

INTEL 301 - STRATEGIC/NATIONAL SECURITY INTELLIGENCE ANALYSIS - 3 CREDITS - The use of force in International Politics is
examined in this course. Areas of study include the use of peacekeeping forces by the United Nations, the use of force by
terrorists, as well as the use of American forces in such places as Somalia, Lebanon, various Middle Eastern states and the
Balkans. During their studies, students examine the planning, research and diplomatic efforts that precede the use of military
force. This course also explores the Military Intelligence system, particularly as that system identifies and analyzes threats, both
real and perceived, to the security of the United States. Students are also required to become experts in a particular area of the
world, including the language, culture, political systems, economic systems, geography, factors that impact political and
economic stability, natural resources, as well as the military strength of the countries in the region.

INTEL 302 - INTELLIGENCE ANALYSIS OF ORGANIZED CRIME - 3 CREDITS - This course investigates the industries that are
susceptible to influence and/or control by organized criminal groups, the methods used to capture the particular industry, and
the economic impact that such a capture has on our society. In addition, the course also explores organized crime’s influence in
the construction, garment, convention, waste removal and waterfront industries. The criminal, civil and administrative methods
which are used to control or remove organized criminal influence from these industries are also presented and examined.
INTEL 303 - INTELLIGENCE ANALYSIS OF TERRORISM - 3 CREDITS - The threat of terrorism against the United States is explored
and analyzed in this course. The primary source of terrorist activity is the Middle East and the primary motivators of Middle
Eastern terrorist groups are American support of Israel, the presence of American troops on Arab soil and the American
invasion of Iraq. This course studies the principal terrorist groups in the Middle East along with the political, religious, economic
and national security concerns of the United States in the region.

INTEL 400 - ELECTRONIC INTELLIGENCE ANALYSIS - 3 CREDITS - In this course, students are taught Analyst Notebook 6, the latest
electronic analytical tool that is available to law enforcement and national security agencies. Students learn how to import
financial information and use Analyst Notebook 6 to create graphic displays of associations and relationships between
individuals, organizations and financial institutions.

FOREIGN LANGUAGE - 3 CREDITS - All students are required to complete a Level II language of their choice.

-- Certification Programs --

Certifications (Security)

 Brainbench Internet Security (BIS) Certification.--


http://www.brainbench.com/xml/bb/common/testcenter/taketest.xml?testId=110 -- This
credential identifies individuals with a good working knowledge of Internet security practices,
principles, and technologies.

 Brainbench Network Security (BNS) Certification. --


http://www.brainbench.com/xml/bb/common/testcenter/taketest.xml?testId=30
-- This program identifies individuals with a good working knowledge of network security
practices, principles, and technologies.

 Certified Anti-Terrorism Specialist (CAS) -- http://www.goatab.org -- Anti-Terrorism


Accreditation Board

 Certified Business Continuity Professional (CBCP) -- https://www.drii.org/certification/index.php

 Certified Confidentiality Officer (CCO) -- http://www.BECCA-online.org -- This credential


identifies individuals who possess management-level expertise in information security,
individuals who can direct security implementations and deployments, and security
professionals who perform such tasks.

 Certified Crime Analyst (CCA) -- http://www.ialeia.org/scca

 Certified Crime & Intelligence Analyst (CCIA) --


http://www.alphagroupcenter.com/Certification_Info.html

 Certified Criminal Defense Investigator (CCDI) - Criminal Defense Investigation Training Council --
http://www.defenseinvestigator.com/certification.html

 Certified Forensic Consultant (CFC) -- http://www.acfei.com/programs_cfc.php


 Certified Fraud Examiner (CFE) -- http://www.acfe.com/

 Certified in Homeland Security (CHS I-V) -- http://www.acfei.com/chs/index.php

 Certified Information Systems Security Professional (CISSP) -- http://www.isc2.org/

 Certified Infrastructure Preparedness Specialist (CIPS) -- http://oip-usa.us/index.htm

 Certified Law Enforcement Analysts (CLEA) -- http://www.iaca.net/Certification.asp

 Certified Medical Investigator (CMI) - American College of Forensic Examiners --


http://www.acfei.com/forensic_certifications/cmi/

 Certified Safety and Health Manager (CSHM) Certification -- http://www.ishm.org/index.html

 Certified Protection Officer (CPO) -- http://www.ifpo.com/

 Certified Protection Professional (CPP) -- http://www.asisonline.org/certification/cpp/index.xml

 Certified Security Consultant (CSC) -- http://www.iapsc.org

 Certified in Security Supervision and Management (CSSM) -- http://www.ifpo.com/

 Certified Security Supervisor (CSS) -- http://www.ifpo.com/ -- Now CSSM, the Certified Security
Supervisor (CSS) was the original security supervision certification offered by the International
Foundation for Protection Officers.

 CompTIA Security+ -- http://certification.comptia.org/security/default.aspx -- CompTIA


Security+ validates knowledge of communication security, infrastructure security, cryptography,
operational security, and general security concepts. It is an international, vendor-neutral
certification.

 OPSEC Associate Professional (OAP) --


http://www.opsecsociety.org/opsec_associate_professional.htm

 OPSEC Certified Professional (OCP) -- http://www.opsecsociety.org/certifications_OCP.htm

 Physical Security Professional (PSP) -- http://www.asisonline.org/certification/psp/pspabout.xml

 Professional Certified Investigator (PCI) --


http://www.asisonline.org/certification/pci/pciabout.xml

 Sensitive Security Information (SSI) Certified -- http://www.acfei.com/ssi.php

SELECTED RESOURCES
Analysis of Competing Hypotheses Software - http://www2.parc.com/istl/projects/ach/ach.html

Analysis of Competing Hypotheses (ACH) is a simple model for how to think about a complex problem
when the available information is incomplete or ambiguous, as typically happens in intelligence analysis.
The software downloadable here takes an analyst through a process for making a well-reasoned,
analytical judgment. It is particularly useful for issues that require careful weighing of alternative
explanations of what has happened, is happening, or is likely to happen in the future. It helps the analyst
overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence
analysis so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and
the scientific method. It helps analysts protect themselves from avoidable error, and improves their
chances of making a correct judgment.

This software was developed by Palo Alto Research Center (PARC) in collaboration with Richards J.
Heuer, Jr.It was developed for use by the U.S. Intelligence Community with funding from the Intelligence
Community's Advanced Research and Development Activity (ARDA) and the Office of Naval Research
(ONR).

In distributing ACH, PARC is making the presently downloadable version of the program available to the
general public at no cost when used for non-commercial or educational purposes subject to the terms
and conditions of its end user license.

Baseline Capabilities for State and Major Urban Area Fusion Centers
A Supplement to the Fusion Center Guidelines (September 2008)
http://it.ojp.gov/documents/baselinecapabilitiesa.pdf (4.66MB)

Central Intelligence Agency (CIA) Library -- https://www.cia.gov/library/index.html

The CIA releases millions of pages of documents each year and frequently releases items of public
interest on this Web site.

The Library contains a wealth of information, from unclassified current publications to basic references,
reports and maps. The Library features our most popular publication, The World Factbook, and our
online directory of Chiefs of State and Cabinet Members of Foreign Governments. It also features
numerous documents and articles of historical significance, including those found in Studies in
Intelligence.

Crime Analysis Charts (RFFlow) -- http://www.rff.com/sample_criminal_analysis.htm


It is often easier to modify an existing chart than to draw a new one. If you haven't done so already,
download the free trial version of RFFlow. Once it is installed, you can open the samples on this page
directly in RFFlow by double-clicking the links to the right of each picture. From there you can zoom in,
edit, and print the sample chart.

Criminal Intelligence Systems Operating Policies (28 CFR Part 23)


Technical Assistance and Training -- http://www.iir.com/28cfr/

Cryptography Program -- JavaScrypt: Browser-Based Cryptography Tools:


http://www.fourmilab.ch/javascrypt/

The "Lean" version is a 32KB html/java-script page that provides encryption/decryption of text
messages, allowing secured communication with anyone with whom you have a shared password.

Data Ferrett -- http://dataferrett.census.gov/

DataFerrett is a unique data mining and extraction tool. DataFerrett allows you to select a databasket
full of variables and then recode those variables as you need. You can then develop and customize
tables. Selecting your results in your table you can create a chart or graph for a visual presentation into
an html page. Save your data in the databasket and save your table for continued reuse. DataFerrett
helps you locate and retrieve the data you need across the Internet to your desktop or system,
regardless of where the data resides. DataFerrett: lets you receive data in the form in which you need it
(whether it be extracted to an ascii, SAS, SPSS, Excel/Access file); or lets you move seamlessly between
query, analysis, and visualization of data in one package; lets data providers share their data easier, and
manage their own online data.

Decrypto 8.5 - http://www.blisstonia.com/software/WebDecrypto/

Decrypto is a fast and automated cryptogram solver by Edwin Olson. It can decode word games often
found in newspapers, including puzzles like cryptoquips and patristocrats. You can also download a
stand-alone version. [We have also found this program useful for quickly breaking simple substitution
ciphers used by some criminal gangs.]

Defense Language Institute Foreign Language Center


Field Support Modules (Language Help) -- http://fieldsupport.lingnet.org/
This site provides country basic information and language support (Headstart) for personnel entering a
new theater of operations.

Encryption Wizard (EW) - http://spi.dod.mil/ewizard.htm


DoD Software Protection Initiative

EW is an SPC implementation of the Advanced Encryption Standard (AES)(Rijndael) augmented with a


file manager Graphical User Interface (GUI) for ease of use. The 128-bit encryption/decryption algorithm
used by Encryption Wizard is considered cryptographically strong and is routinely used in National
Security Agency (NSA) and National Institute of Standards and Technology (NIST) certified products.
Encryption Wizard is designed to protect data at rest and in transit (such as email attachments).

EW is an easy to use tool for protecting sensitive (but not classified) documents, and for protecting files
before transmission via email. It allows a user to encrypt files using a 128-bit implementation of the
Advanced Encryption Standard (AES) with simple drag-and-drop efficiency. Encryption Wizard can
significantly increase an organization’s security posture at little to no cost to protect sensitive data in
transit (E-mail, FTP, or shared web folders) or at rest on a removable storage device. The primary version
for government users utilizes a FIPS 140-2 validated encryption engine licensed from RSA Security.

Evaluating the Quality of Information on the Internet -- http://www.virtualchase.com/quality/

Researchers should evaluate the quality of information appearing online or in print based on five
criteria--scope of coverage, authority, objectivity, accuracy and timeliness. This guide defines the
criteria, documents incidents of questionable, false or fraudulent information as reported in the news or
trade literature, provides examples of Web sites that illustrate good or bad information, and suggests
strategies that help you detect bad information.

FBI Law Enforcement Bulletin -- http://www.fbi.gov/publications/leb/leb.htm

The FBI Law Enforcement Bulletin is published monthly by the Federal Bureau of Investigation, 935
Pennsylvania Avenue, N.W., Washington, D.C. 20535-0001. Contributors' opinions and statements
should not be considered an endorsement by the FBI of any policy, program, or service.

Federal Law Enforcement Informer


Monthly Legal Resource for Federal Law Enforcement Officers
http://www.fletc.gov/training/programs/legal-division/the-informer
Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era
Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels
http://it.ojp.gov/documents/fusion_center_guidelines_law_enforcement.pdf (5.74MB)

Global Terrorism Database -- http://www.start.umd.edu/gtd/

Global Terrorism Database (GTD) is an open-source database including information on terrorist events
around the world from 1970 through 2007 (with annual updates planned for the future). Unlike many
other event databases, the GTD includes systematic data on domestic as well as transnational and
international terrorist incidents that have occurred during this time period and now includes more than
80,000 cases. For each GTD incident, information is available on the date and location of the incident,
the weapons used and nature of the target, the number of casualties, and—when identifiable—the
group or individual responsible.

The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is making the
GTD available via this online interface in an effort to increase understanding of terrorist violence so that
it can be more readily studied and defeated.

INSCOM G3 Intelligence Analyst Training Program - https://www.us.army.mil/suite/page/444525


[Requires AKO Login]

The Training Program teaches a series of courses to intelligence analysts that helps them develop their
analytical skills mainly in the field of counterterrorism and against other asymmetric threats. Analysts
receive training and practical application on analytic and data visualization tools including Analyst
Notebook and ArcGIS. The Team delivers tool-specific and methodology-based training to Intelligence
Operations Center/Information Dominance Center Extension analysts and other supported agencies at
any location world-wide, as directed by the Commanding General of INSCOM.

The INSCOM G3 IATP web-site contains Orientation and Sustainment Training Courses. These modules
have been designed to augment the courses currently taught by the Intelligence Analysts Training
Program, preparing analysts for more traditional classroom instruction and allowing them to get the
most out of any training they may attend. While the CBTs are not designed to replace classroom-based
courses - the conventional classroom setting is invaluable for giving students interaction with each other
and with an instructor - completing them will ensure that students get the most out of any given class.
In addition to acting as a supplement to the classroom, there are times and locations when instructors
and classrooms are unavailable. Through CBTs, crucial information can be passed on in a verifiable
manner to students who are not in a position to attend a formal class. The following training modules
are available on the IATP web-site:
What is Intelligence? ArcGIS Data Types

INSCOM Overview ArcGIS Projection, Datum, & Coordinate


Systems
Intelligence Community
ArcGIS Map Scale
Boolean Logic for Search Engines
Critical Thinking
Arabic Naming Conventions
Counterterrorism Analysis Course (CTAC) - Link
Analysts Notebook Applied Analysis
Visual Analytics CTAC - Biases
ArcGIS Converting Coordinates CTAC - IPB

Integrated Intelligence and Crime Analysis


http://www.cops.usdoj.gov/RIC/ResourceDetail.aspx?RID=433 (567KB)

Intelligence Knowledge Network (IKN) -- https://icon.army.mil/ (Requires AKO Login)

IKN is a Knowledge Management tool that enables Intelligence soldiers all over the world to
communicate, collaborate and investigate. It hosts discussion forums, serves as a single point of entry to
get to USAIC and other Intelligence Community websites, and hosts a variety of public and private web
applications that support the Intelligence Community.

JavaScript Browser Based Cryptography Tools - Fourmilabs Switzerland http://www.fourmilab.ch/is a


web-site developed and maintained by John Walker, founder of Autodesk, Inc. and co-author of
AutoCAD. While this web-site offers many interesting items, from the security viewpoint we are
interested in the ‘Cryptography and Steganography’. The JavaScript Browser Based Cryptography Tools
are easy to use, work on any computer that can handle JavaScript, and offer a good level of security for
e-mail communication. http://www.fourmilab.ch/javascrypt/The encryption program is provided free of
charge and has according to the web-site has been placed into the public domain.

"From the web-site: JavaScrypt runs entirely in your browser--nothing is sent to any Web site when you
use it. You can, if you wish, download JavaScrypt to your own computer and use it when not connected to
the Internet. JavaScrypt's encryption facilities use the Advanced Encryption Standard (AES) adopted by
the United States as Federal Information Processing Standard 197. AES supports key lengths of 128, 192,
and 256 bits; JavaScrypt uses 256 bit keys exclusively."
Joint Electronic Library - http://www.dtic.mil/doctrine/

Law Enforcement Analytic Standards - November 2004 --


http://it.ojp.gov/documents/law_enforcement_analytic_standards.pdf (2.03MB)

Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies, 2nd Ed -
- http://www.cops.usdoj.gov/RIC/ResourceDetail.aspx?RID=525 (5.95MB)

Law Enforcement Intelligence Resources --


http://www.cops.usdoj.gov/files/RIC/CDROMs/LEIntelGuide/index.html

Maps, Satellite & Aerial Photos

-- Google Earth - http://earth.google.com/

-- Google Maps - http://maps.google.com/

-- Live Search Maps - http://maps.live.com/

-- Mapquest - http://www.mapquest.com/

-- NASA World Wind - http://worldwind.arc.nasa.gov/

-- National Atlas - http://nationalatlas.gov/

-- Perry-Castañeda Library Map Collection U. of Texas at Austin - http://www.lib.utexas.edu/maps/

-- Terrafly - http://www.terrafly.com/

-- Terra Server USA - http://terraserver-usa.com/

-- United Nations Cartographic Section - http://www.un.org/Depts/Cartographic/english/htmain.htm

National Criminal Intelligence Sharing Plan (Revised June 2005)


http://it.ojp.gov/documents/National_Criminal_Intelligence_Sharing_Plan.pdf (627KB)
Open Government Guide - http://www.rcfp.org/ogg/index.php-- The Open Government Guide is a
complete compendium of information on every state's open records and open meetings laws. Each
state's section is arranged according to a standard outline, making it easy to compare laws in various
states.

Police Intelligence Operations - FM 3-19.50 - July 2006


http://www.fas.org/irp/doddir/army/fm3-19-50.pdf (3.72MB)

Pre-OCONUS Travel File (PRO-File) -- https://medinah.sed.monmouth.army.mil/PRO-File/


(Requires AKO Log-in)

Before any soldier deploys or goes on TDY Outside the Continental United States (OCONUS), they must
complete a Pre-OCONUS travel File (PRO-File).

What is PRO-File?

All of the Geographic Combatant Commands require personnel to complete a Personnel Recovery
Mission Software (PRMS) digital ISOPREP prior to entering their respective geographic areas of
responsibility. However; most Army personnel do not have classified system access on a regular basis
prior to deployment.

HQDA developed the PRO-File program to enables Soldiers, DA Civilians, and DA Contractors to meet
these theater entry requirements. PRO-File is the Army's interface with PRMS. Although a PRO-File
survey is not an ISOPREP, it is the only authorized alternative for use on unclassified networks.

All Soldiers, DA Civilians, and DA Contractors are required to complete a PRO-File survey prior to
departing CONUS for official duty. Army personnel departing for the USPACOM AOR, for official or
unofficial travel, must complete this requirement as well.

Army forces assigned to USSOCOM or USASOC organizations are exempt from this requirement and will
continue to follow USSOCOM guidance for completion of ISOPREPS. Civil Affairs and Psychological
Operations forces operating under the control of a conventional force commander are not exempt from
this requirement. Official PRO-File implementation guidance can be found in All Army Activities Message
(ALARACT) 156/2007.

Problem Analysis Module -- http://www.popcenter.org/learning/pam/

Problem Analysis Module (PAM) gives you a framework for analyzing any persistent crime and public
safety problem. PAM will ask you to input information concerning every aspect of the problem and then
suggest the kinds of responses you could try.
PAM was developed to assist police problem solving through the asking of specific questions. The
questions come from research into a set of powerful theories within the field of Environmental
Criminology – particularly Routine Activity Theory, Situational Crime Prevention, and Crime Pattern
Theory.

Psychology of Intelligence Analysis - by Richards J. Heuer, Jr.


https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-
monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf

Resource Information Center - COPS Publications, Training & Tools --


http://www.cops.usdoj.gov/RIC/ResourceSearch.aspx

Silobreaker -- http://www.silobreaker.com/

Silobreaker is a search service for news and current affairs that aims to provide more relevant results to
the end user than what traditional search and aggregation engines have been offering so far. Instead of
returning just lists of articles matching a search query, Silobreaker finds people, companies, topics,
places and keywords; understands how they relate to each other in the news flow, and puts them in
context for the user through graphical results in its intuitive user interface.

The site pulls content on global issues, science, technology and business from thousands of news
sources, blogs, multimedia, and other forms of news media from around the world. With the engine’s
focus on finding and connecting related data in the information flow, Silobreaker’s user tools and
visualizations are ideal for bringing meaning to content from either today’s Web or the evolving
Semantic Web, or both.

Squidmat (courses of action evaluation program) --


http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/

The program compares two or more courses of action based on two or more evaluation criteria. The
user arranges the evaluation criteria in descending order of importance and tells the program how much
more important each criterion is than the next lower criterion. These importance ratings are used to
calculate weights for each criterion. SquidMat takes user-supplied values for each course-of-
action/criterion combination and converts them to Z scores. Using the criterion weights, the program
calculates weighted sums for each course of action. The course of action with the highest weighted sum
is considered to be the best. SquidMat is designed as a replacement decision matrix program for the
CAS3 program DECMAT.
Statistical Data Resources (Crime Statistics)

Bureau of Justice Statistics -- http://www.ojp.usdoj.gov/bjs/

The Bureau of Justice Statistics (BJS) is the United States' primary source for criminal justice statistics.
The BJS mission is to collect, analyze, publish, and disseminate information on crime, criminal offenders,
victims of crime, and the operation of justice systems at all levels of government. These data are critical
to Federal, State, and local policymakers in combating crime and ensuring that justice is both efficient
and evenhanded.

The Bureau of Justice Statistics was first established on December 27, 1979 under the Justice Systems
Improvement Act of 1979, Public Law 96-157 (the 1979 Amendment to the Omnibus Crime Control and
Safe Streets Act of 1968, Public Law 90-351). The Bureau of Justice Statistics (BJS) is a component of the
Office of Justice Programs in the U.S. Department of Justice.

Federal Justice Statistics Resource Center -- http://fjsrc.urban.org/

The Bureau of Justice Statistics (BJS), through its Federal Justice Statistics Resource Center (FJSRC),
compiles comprehensive information describing suspects and defendants processed in the Federal
criminal justice system. The goal of FJSRC is to provide uniform case processing statistics across all
stages of the Federal criminal justice system. Using data obtained from Federal agencies, FJSRC compiles
comprehensive information that describes person-cases processed through the system. FJSRC applies
uniform definitions to commonly used statistics describing data from each stage of case processing. The
data definitions used by the FJSRC are consistent with definitions used by other BJS programs that
report on case processing in state courts so that comparisons may be made between case processing
statistics between the Federal and state systems.

National Archive of Criminal Justice Data -- http://www.icpsr.umich.edu/NACJD/

The mission of the National Archive of Criminal Justice Data (NACJD) is to facilitate research in criminal
justice and criminology, through the preservation, enhancement, and sharing of computerized data
resources; through the production of original research based on archived data; and through specialized
training workshops in quantitative analysis of crime and justice data.

NACJD provides the following services to assist those using our data collections.

 The identification of appropriate criminological and criminal justice data collections on specific
topics.
 Custom sub-setting of selected data files through our online Survey Documentation and
Analysis.
 Assistance with the retrieval and use of files obtained from the archive.

National Criminal Justice Reference Service -- http://www.ncjrs.gov/


NCJRS is a federally funded resource offering justice and substance abuse information to support
research, policy, and program development worldwide. NCJRS services and resources are available to
anyone interested in crime, victim assistance, and public safety including policymakers, practitioners,
researchers, educators, community leaders, and the general public.

Sourcebook of Criminal Justice Statistics -- http://www.albany.edu/sourcebook/

The Sourcebook of Criminal Justice Statistics brings together data from more than 100 sources about
many aspects of criminal justice in the United States. These data are displayed in over 1,000 tables. The
site is updated regularly as new statistics become available. The Sourcebook is supported by the U.S.
Department of Justice, Bureau of Justice Statistics.

Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis


https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-
monographs/Tradecraft%20Primer-apr09.pdf

Uniform Crime Reports -- http://www.fbi.gov/ucr/ucr.htm

The Uniform Crime Reporting (UCR) Program was conceived in 1929 by the International Association of
Chiefs of Police to meet a need for reliable, uniform crime statistics for the nation. In 1930, the FBI was
tasked with collecting, publishing, and archiving those statistics. Today, several annual statistical
publications, such as the comprehensive Crime in the United States, are produced from data provided
by nearly 17,000 law enforcement agencies across the United States. Other annual publications, such as
Hate Crime Statistics and Law Enforcement Officers Killed and Assaulted address specialized facets of
crime such as hate crime or the murder and assaults of law enforcement officers respectively.

Untangling the Web: An Introduction to Internet Research --


https://www.intelink.gov/nsa/UTW/index.html (Requires Intelink Login)

Untangling the Web has been produced for official use only. This product is not approved for public
release. The contents of Untangling the Web may not be published on, posted to, or copied to the public
Internet or any other publicly accessible location.

US Army Personnel Recovery (PR) Branch (Requires AKO Log-in)

https://www.g357extranet.army.pentagon.mil/DCSExtranet/damopr/

The HQDA G-3 US Army Personnel Recovery (PR) branch is the office of primary responsibility for
executing the Army's Service requirement to develop and implement policy and guidance, which
supports Soldiers, DA Civilians, and DA Contractors, and others as designated by the Secretary of the
Army, in planning, preparation, execution and assessment of the PR program.

What is Personnel Recovery?

1.The Army defines Personnel Recovery as The sum of military, diplomatic, and civil efforts to effect the
recovery and return of US military, DoD civilians, and DoD contractor personnel, or other personnel as
determined by the Secretary of Defense, who are isolated, missing, detained, or captured (IMDC) in an
operational environment.

2.Those military, DoD civilians and contractors who have become IMDC are referred to as "Isolated
Personnel" (IP).

3.Personnel Recovery is an overarching term which covers CSAR, SERE, SAR, NAR, UAR, etc.

Note: NEO is not part of PR, however with any operation, the chance of Isolation is increased, and plans
must address this possibility.

VIDEO - Crime Scene Investigation and Forensic Science Videos


http://www.free-ed.net/free-ed/SocialScience/CrimJust/default.asp

A video teaching series consisting of ten 50-minute presentations from the "History Channel".

1-Blood Splatter
2-Body Clues
3-Bullets and Blood
4-DNA's Debut
5-Fingering the Killer
6-Fire and Metal
7-Invisible Clues
8-The Body Searchers
9-Tracings in Blood
10- Unusual Clues

VIDEO - History of Bio-Terrorism Video (27-minutes) -- http://www.bt.cdc.gov/training/historyofbt/

VIDEO - The Seven Signs of Terrorism (Produced by the Michigan State Police) -
http://www.homelandresponder.org/pages/7signs.html

VIDEO - Recognizing the Eight Signs of Terrorism - http://thecell.org/wp/8-signs-of-terrorism-video/

VIDEO - Radiological Terrorism: Just in Time Training for Hospital Clinicians (17-minutes)
http://www.bt.cdc.gov/radiation/justintime.asp
VineLink -- https://www.vinelink.com/vinelink/initMap.do

VINELink is the online version of VINE (Victim Information and Notification Everyday), the National
Victim Notification Network. This service allows crime victims to obtain timely and reliable information
about criminal cases and the custody status of offenders 24 hours a day. Victims and other concerned
citizens can also register to be notified by phone, email or TTY device when an offender's custody status
changes. Users can also register through their participating state or county toll-free number.
ACRONYMS AND ABBREVIATIONS

AIG Assessments and Information Group – Counterterrorist Center’s analytic arm pre-
September 11. After September 11th this office became the Office of Terrorism Analysis.

ATIX Automated Trusted Information Exchange

ATOIC Antiterrorism Operations Intelligence Cell

BJA Bureau of Justice Assistance

BOLO Be On the Look Out

CBRNE Chemical, Biological, Radiological, Nuclear, and High-yield Explosives

CCIA Certified Crime and Intelligence Analyst

CFR Code of Federal Regulations

CIASE Criminal Intelligence Analytical Support Element

CLASS Consular Lookout and Support System

CLEA Certified Law Enforcement Analyst

CODIS Combined DNA Index System

CPTED Crime Prevention Through Environmental Design

CRAVED Concealable, Removable, Available, Valuable, Enjoyable, and Disposable - An acronym


describing the characteristics of items most likely to be stolen.

CRIMINT Criminal Intelligence

CUI Controlled Unclassified Information

FBI Federal Bureau of Investigation

FinCEN Financial Crimes Enforcement Network

FOUO “For Official Use Only” information handling caveat

GIS Geographic Information Systems

HIDTA High Intensity Drug Trafficking Areas

HSIN Homeland Security Information Network


HUMINT Human Intelligence

IACP International Association of Chiefs of Police

IAFIS Integrated Automated Fingerprint Identification System

IALEIA International Association of Law Enforcement Intelligence Analysts

INTSUM Intelligence Summary

IOS Intelligence Operations Specialist - *FBI’s+ Specialists conduct case specific (tactical)
research.

IRS Intelligence Research Specialist- *FBI’s+ Specialists conduct long term (strategic)
research.

JITF-CT DIA’s Joint Intelligence Task Force – Combating Terrorism

JMIP Joint Military Intelligence Program. Inter-service military intelligence programs in the
Department of Defense.

JRIES Joint Regional Information Exchange System

JSOC Military’s Joint Special Operations Command

JTTF FBI’s Joint Terrorism Task Force

JWICS Joint Worldwide Intelligence Communication System

LEGAT FBI’s Legal Attaché in foreign countries

LEIU Law Enforcement Intelligence Unit

LEO Law Enforcement Online

LES “Law Enforcement Sensitive” information handling caveat

MALICE Money, Anger, Lust, Ideology, Compromise, Ego - An acronym describing the factors
which motivate individuals to commit espionage.

MICE Money, Ideology, Compromise, Ego - An acronym describing the factors which motivate
individuals to commit espionage.

NCIRC National Criminal Intelligence Resource Center

NCIC National Crime Information Center

NDIC National Drug Intelligence Center


NFIP National Foreign Intelligence Program

NICS National Instant Criminal Background Check System

NIBRS National Incident-Based Reporting System

NIPRNET Nonsecure Internet Protocol Router Network

NOIWON National Operations and Intelligence Watch Officers Network

NW3C National White Collar Crime Center

OSINT Open Source Intelligence

OSIS Open Source Information System

PCII Protected Critical Infrastructure Information

RISS Regional Information Sharing Systems

RISSNET Regional Information Sharing Systems secure intranet

SBU Sensitive But Unclassified

SIG Special Interest Groups

SIGINT Signal Intelligence

SIPRNET Secure Internet Protocol Router Network

SLATT State and Local Antiterrorism Training

TALON Threats and Local Observation Notices

TEDAC Terrorist Explosive Device Analytical Center

TIARA Tactical Intelligence and Related Activities

UCR Uniform Crime Reporting

USACIDC United States Army Criminal Investigation Command

USC United States Code

VPN Virtual Private Network


GLOSSARY
Ref:
http://www.gpoaccess.gov/serialset/creports/pdf/glossary.pdf

http://it.ojp.gov/documents/min_crim_intel_stand.pdf

http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm

Actionable Intelligence - Intelligence information that is directly useful to customers for immediate
exploitation without having to go through the full intelligence production process; it may address
strategic or tactical needs, close support of US negotiating teams, or action elements dealing with such
matters as international terrorism or narcotics.

Agent - (1) A person who engages in clandestine intelligence activity under the direction of an
intelligence organization but who is not an office, employee, or co-opted worker of that organization. (2)
An individual who acts under the direction of an intelligence agency or security service to obtain, or
assist in obtaining, information for intelligence or counterintelligence purposes. (3) One who is
authorized or instructed to obtain or to assist in obtaining information for intelligence or
counterintelligence purposes.

Analysis - A process in the production step of the intelligence cycle in which intelligence information is
subjected to systematic examination in order to identify significant facts and derive conclusions
therefrom.

Asset - (1) Any resource – a person, group, relationship, instrument installation, supply – at the
disposition of an intelligence agency for use in an operational or support role. (2) A person who
contributes to a clandestine mission but is not a fully controlled agent.

Automated Trusted Information Exchange (ATIX) - Operated by the Regional Information Sharing
Systems®, ATIX is a secure means to disseminate national security or terrorist threat information to law
enforcement and other first responders via the ATIX electronic bulletin board, secure Web site, and
secure e-mail.

C3 - An intelligence application concept initially used by military intelligence that stands for command,
control, and communication as the hallmark for effective intelligence operations.

Clandestine Operation - A preplanned secret intelligence collection activity or covert political,


economic, propaganda, or paramilitary action conducted so as to assure the secrecy of the operation;
encompasses both clandestine collection and covert action.

Classification - The determination that official information requires, in the interest of national security,
a specific degree of protection against unauthorized disclosure, coupled with a designation signifying
that such a determination has been made; the designation is normally termed a security classification
and includes Confidential, Secret, and Top Secret.
Compartmentalization - (1) Formal system of restricted access to intelligence activities, such systems
established by and/or managed under the cognizance of the DCI to protect the sensitive aspects of
sources, methods, and analytical procedures of foreign intelligence information, limited to individuals
with a specific need for such information and who are therefore given special security clearances and
indoctrination in order to have access to it. (2) Establishment and management of an intelligence
organization so that information about the personnel, organization, or activities of one component is
made available to any other component or individual only to the extent required for the performance of
assigned duties.

Counterintelligence - Information gathered and activities conducted to protect against espionage, other
intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers,
organizations, persons, or terrorist activities, but not including personnel, physical, document, or
communications security programs.

Counterterrorism - Offensive measures taken to prevent, deter, and respond to a terrorist act or the
documented threat of such an act.

Covert Action - (1) An operation designed to influence governments, events, organizations, or persons
in support of foreign policy in a manner that is not necessarily attributable to the sponsoring power; it
may include political, economic, propaganda, or paramilitary activities. (2) Operations that are so
planned and executed as to conceal the identity of, or permit plausible deniability by, the sponsor.

Covert Operation - (Preferred term - Clandestine operation). A covert operation encompassing covert
action and clandestine collection.

Critical and Sensitive Information List - Those areas, activities, functions, or other matters that a
facility/organization considers most important to keep from adversaries (DOE 1992).

Critical information - Critical information is defined as information important to the successful


achievement of objectives and missions, or which may be of use to an adversary. Critical information
consists of specific facts about friendly capabilities, activities, limitations (includes vulnerabilities), and
intentions needed by adversaries for them to plan and act effectively so as to degrade friendly mission
accomplishment. Critical information is information that is vital to a mission and that if an adversary
obtains it, correctly analyzes it, and acts upon it will prevent or seriously degrade mission success.
Critical information can be classified information or unclassified information. Critical information can
also be an action that provides an indicator of value to an adversary and places a friendly activity or
operation at risk. (AR 530-1)

Critical Infrastructures - Certain national infrastructures so vital that their incapacity or destruction
would have a debilitating impact on the defense or economic security of the United States. These critical
infrastructures include telecommunications, electrical power systems, gas and oil storage and
transportation, banking and finance, transportation, water supply systems, emergency services
(including medical, police, fire, and rescue), and continuity of government (JCS 1997; EO n.d.).
Estimate - (1) An analysis of a foreign situation, development, or trend that identifies its major
elements, interprets the significance, and appraises the future possibilities and the prospective results of
the various actions that might be taken. (2) An appraisal of the capabilities, vulnerabilities, and potential
courses of action of a foreign nation or combination of nations in consequence of a specific national
plan, policy, decision, or contemplated course of action. (3) An analysis of an actual or contemplated
clandestine operation in relation to the situation in which it is or would be conducted in order to identify
and appraise such factors as available and needed assets, and potential obstacles, accomplishments,
and consequences.

Finished Intelligence - (1) The product resulting from the collection, processing, integration, analysis,
evaluation, and interpretation of available information concerning foreign countries or areas. (2) The
final result of the production step of the intelligence cycle; the intelligence product.

Foreign Liaison - Efforts to work with foreign government intelligence services, including law
enforcement agencies that gather or carry out intelligence-related activities. Examples of foreign liaison
include sharing information, joint collection efforts, and the arrest of suspected terrorists by foreign
governments using US-supplied information. Every major US intelligence agency has some form of
liaison relationship with foreign governments.

Intelligence - (1) A body of evidence and the conclusions drawn therefrom acquired and furnished in
response to the known or perceived requirements of customers; it is often derived from information
that is concealed or not intended to be available for use by the acquirer. (2) A term used to refer
collectively to the functions, activities, or organizations that are involved in the process of planning,
gathering, and analyzing information of potential value to decision-makers and to the production of
intelligence as defined above. (3) The product resulting from the collection, collation, evaluation,
analysis, integration, and interpretation of all collected information.

Intelligence Community - The aggregate of the following executive branch organizations and agencies
involved in intelligence activities: the Central Intelligence Agency; the National Security Agency; the
Defense Intelligence Agency; offices within the Department of Defense for the collection of specialized
national foreign intelligence through reconnaissance programs; the Bureau of Intelligence and Research
of the Department of State; intelligence elements of the military services, the Federal Bureau of
Investigation, the Department of the Treasury, and the Department of Energy; and staff elements of the
Office of the Director of Central Intelligence (ICS 1989).

Law Enforcement Sensitive (LES) - Sensitive But Unclassified information specifically compiled for law
enforcement purposes that, if not protected from unauthorized access, could reasonably be expected to
1) interfere with law enforcement proceedings, 2) deprive a person of a right to a fair trial or impartial
adjudication, 3) constitute an unwarranted invasion of the personal privacy of others, 4) disclose the
identity of a confidential source, 5) disclose investigative techniques and procedures, and/or 6)
endanger the life or physical safety of an individual.

Operations Security - 1. A systematic, proven process by which a government, organization, or


individual can identify, control, and protect generally unclassified information about an
operation/activity and, thus, deny or mitigate an adversary's/competitor's ability to compromise or
interrupt said operation/activity (NSC 1988). 2. OPSEC is a process of identifying critical information and
subsequently analyzing friendly actions attendant to military operations and other activities to (a)
identify those actions that can be observed by adversary intelligence systems, (b) determine indicators
adversary intelligence systems might obtain that could be interpreted or pieced together to derive
critical information in time to be useful to adversaries, and select and execute measures that eliminate
or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation (DOD JP
1994; JCS 1997).

Proprietary Information - Material and information relating to, or associated with, a company's
products, business, or activities, including but not limited to financial information; data or statements;
trade secrets; product research and development; existing and future product designs and performance
specifications; marketing plans or techniques; schematics; client lists; computer programs; processes;
and know-how that have been clearly identified and properly marked by the company as proprietary
information, trade secrets, or company confidential information. The information must have been
developed by the company and not be available to the government or to the public without restriction
from another source (NSTISSI 1997).

Raw Intelligence - A colloquial term meaning collected intelligence information that


has not yet been converted into finished intelligence.

Restricted Data - All data (information) concerning design, manufacture, or utilization of atomic
weapons; the production of special nuclear material; or the use of special nuclear material in the
production of energy, but not to include data declassified or removed from the Restricted Data category
pursuant to Section 142 of the Atomic Energy Act of 1954, as amended.

Sensitive But Unclassified (SBU) Information - Information that has not been classified by a federal law
enforcement agency that pertains to significant law enforcement cases under investigation and criminal
intelligence reports that require dissemination criteria to only those persons necessary to further the
investigation or to prevent a crime or terrorist act.

Sensitive Homeland Security Information (SHSI) - Any information created or received by an agency or
any local, county, state, or tribal government that the loss, misuse, unauthorized disclosure,
modification of, or the unauthorized access to could reasonably be expected to impair significantly the
capabilities and/or efforts of agencies and/or local, county, state, and tribal personnel to predict,
analyze, investigate, deter, prevent, protect against, mitigate the effects of, or recover from acts of
terrorism.

SHSI does not include any information that is:

 Classified as national security information pursuant to Executive Order 12958, as amended, or


any successor order.
 Designated by Executive Order 12951, any successor order, or the Atomic Energy Act of 1954
(42 U.S.C. § 2011), to require protection against unauthorized disclosure.

 Protected Critical Infrastructure Information (PCII) as defined in 6 Code of Federal Regulations


(CFR) § 29.2.

 Sensitive Security Information (SSI) as defined in 49 CFR Part 1520.

Sources of data - Materials, conversations and actions that provide information and indicators. The
sources are as follows:

a. Protected sources. Friendly personnel, documents, material and so forth, possessing classified
or sensitive data which are protected by personnel, information, physical, crypto, emission and
computer security measures.

b. Open sources. Oral, documentary, pictorial and physical materials accessible to the public.

c. Detectable actions. Physical actions or entities and emissions or other phenomena that can be
observed, imaged or detected by human senses or by active and passive sensors.

Strategic intelligence - Intelligence required for the formulation of policy and military plans at national
and international levels; it differs primarily from tactical intelligence in level of use, but may also vary in
scope and detail.

Tactical intelligence - Intelligence produced in support of military, intelligence, or other operations, or


that relates to the specific time, date, nature, and other details of events.

Threat to National Security -


1. international terrorism;

2. espionage and other intelligence activities, sabotage, and assassination, conducted by, for, or
on behalf of foreign powers, organizations, or persons;

3. foreign computer intrusion; and

4. other matters determined by the Attorney General, consistent with Executive Order 12333 or
a successor order.

TIARA: Tactical Intelligence and Related Activities (TIARA) - TIARA encompasses those
programs/activities outside the NFIP and JMIP that: 1) respond to operational commanders’ tasking for
time sensitive information on foreign entities; 2) respond to national intelligence community tasking of
systems whose primary mission is support to operating forces; 3) train personnel for intelligence duties;
4) provide an intelligence reserve; or 5) are devoted to research and development of intelligence or
related capabilities. Specifically excluded are programs that are so closely integrated with a weapon
system that their primary function is to provide immediate-use targeting data. TIARA programs /
activities are funded as part of normal Service budget development, and as a result are often embedded
in larger force structure or weapon system budget lines.
WEB-SITES

The following web-sites provide information which we believe may be of interest to intelligence
officers, analysts, and investigators.

* Anti-Terrorism *

Anti-Terrorism Level I Training Website


https://atlevel1.dtic.mil/at/

Army Anti-Terrorism Enterprise Page on AKO (Requires AKO Login)


https://www.us.army.mil/suite/page/605757

Combating Terrorism Center at West Point


http://ctc.usma.edu/default.asp

Counter-Terrorism Training and Resources for Law Enforcement


http://www.counterterrorismtraining.gov/

National Counterterrorism Center


http://www.nctc.gov/

US Department of State - Country Reports on Terrorism


http://www.state.gov/s/ct/rls/crt/

* Country Information / Country Studies *

CIA World Factbook


https://www.cia.gov/library/publications/the-world-factbook/

Library of Congress Country Studies


http://lcweb2.loc.gov/frd/cs/

US Department of State - Travel Information


http://travel.state.gov/

* Encryption *

Digital IDs for Secure Email*


* Comodo -
http://www.comodo.com/business-security/digital-certificates/secure-email-certificates.php

* VeriSign -
http://www.verisign.com/authentication/individual-authentication/digital-id/index.html

Encryption Wizard (EW)


http://spi.dod.mil/ewizard.htm

GnuPG Privacy Guard


http://www.gnupg.org/

Hushmail
http://www.hushmail.com/

JavaScrypt: Browser-Based Cryptography Tools


http://www.fourmilab.ch/javascrypt/

KickNotes - Self-Destructing Online Messages


http://www.kicknotes.com/

Pretty Good Privacy (PGP)


http://www.pgp.com/

- International PGP Homepage


http://www.pgpi.org/

Stealth Message
http://www.stealthmessage.com/

Steganos FreeCrypt
https://www.steganos.com/us/service/freecrypt/overview/

Steganos LockNote
https://www.steganos.com/us/products/for-free/locknote/overview/

TrueCrypt
http://www.truecrypt.org/

* Language Studies *

Defense Language Institute Foreign Language Center


Field Support Modules (Language Help) -- http://fieldsupport.lingnet.org/
Español for Law Enforcement: An Interactive Training Tool
http://www.ojp.usdoj.gov/nij/pubs-sum/201801.htm

FSI Language Courses - http://fsi-language-courses.org

Functional Police Spanish - Spanish For Law Enforcement Personnel -- http://www.spepolice.com

Internet Polyglot: Free Language Lessons Online -- http://www.internetpolyglot.com/

Joint Language University -- http://JLU.wbtrain.com

National Foreign Language Center -- http://www.nflc.org/

National Security Language Initiative (NSLI) -- http://exchanges.state.gov/nsli.html // and //


http://www.ed.gov/about/inits/ed/competitiveness/nsli/index.html

Tactical Language & Culture Training System -- http://support.tacticallanguage.com/

* Weather, Light & Time Data *

National Climate Data Center


http://www.ncdc.noaa.gov/oa/ncdc.html

NOAA Regional Climate Centers


http://www.ncdc.noaa.gov/oa/climate/regionalclimatecenters.html

US Naval Observatory - Light Data


http://aa.usno.navy.mil/data/docs/RS_OneDay.php

US Naval Observatory - Time References

The U. S. Naval Observatory is charged with maintaining the DoD reference for Precise Time and Time
Interval (PTTI).

Web-Based Time Synchronization - http://www.usno.navy.mil/USNO/time/display-clocks

Telephone Time

USNO provides voice announcements of the time:


Time Voice Announcer, Washington, DC:
202-762-1401
202-762-1069
DSN 762-1401
DSN 762-1069
Time Voice Announcer, Colorado Springs, CO:
719-567-6742
DSN 560-6742

(Time may be delayed on long distances calls.)

Weather Underground
http://www.wunderground.com/
Books (with links to Amazon.Com)

Applications in Criminal Analysis: A Sourcebook by Marilyn B. Peterson


Praeger Paperback; 1st Edition (September 30, 1998) Paperback: 332 pages

Applied Crime Analysis by Karim Vellani


Butterworth-Heinemann (January 18, 2001) Paperback: 184 pages

Better Policing With Microsoft Office by Mark A. Stallo & Christopher W. Bruce
BookSurge Publishing (September 19, 2005) Plastic Comb: 302 pages

Crime Analysis: From First Report to Final Arrest by Steven Gottlieb


Alpha (1994) Paperback: 596 pages

Crime Analysis With Crime Mapping by Dr. Rachel L. Boba


Sage Publications, Inc; 2nd edition (November 5, 2008) Paperback: 376 pages

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis by Colleen McCue Ph.D.
Butterworth-Heinemann; 1 edition (May 1, 2007) Paperback: 368 pages

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing
Technologies by Christopher Westphal
CRC Press; 1 edition (December 22, 2008) Hardcover: 440 pages

Environmental Criminology and Crime Analysis by Richard Wortley and Lorraine Mazerolle
Willan Publishing (UK); Illustrated Edition (June 2008) Paperback: 294 pages

Exploring Crime Analysis: Readings on Essential Skills by Christopher Bruce


BookSurge Publishing (October 29, 2004) Paperback: 432 pages
Forecasting Terrorism: Indicators and Proven Analytic Techniques by Sundri K. Khalsa
The Scarecrow Press, Inc. (October 28, 2004) Paperback: 103 pages

GIS and Crime Mapping by Spencer Chainey


Wiley; 1st Edition (August 5, 2005) Paperback: 442 pages

GIS in Law Enforcement: Implementation Issues and Case Studies by Mark R. Leipnik
CRC Press; 1st Edition (November 7, 2002) Hardcover: 286 pages

Intelligence Analysis: A Target-Centric Approach by Robert M. Clark


CQ Press; 3rd edition (September 15, 2009) Paperback: 360 pages

Intelligence-Led Policing by Jerry H. Ratcliffe


Willan Publishing (UK) (February 2008) Paperback: 265 pages

Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice by Deborah Osborne and
Susan Wernicke -- Routledge; 1st Edition (September 16, 2003) Hardcover: 156 pages

Introduction to Intelligence Research and Analysis by Jerome Clauser


Scarecrow Press, Inc.; Revised edition (November 28, 2008) Paperback: 224 pages

Investigative Data Mining for Security and Criminal Detection by Jesus Mena
Butterworth-Heinemann; 1 edition (December 30, 2002) Paperback: 272 pages

Process of Investigation, Third Edition: Concepts and Strategies for Investigators in the Private Sector by
Charles A. Sennewald CPP and John Tsukayama CPP CFE PCI
Butterworth-Heinemann; 3 edition (May 29, 2006) Hardcover: 344 pages
Psychology of Intelligence Analysis by Richards J. Heuer Jr.
Nova Science; 1st Edition (August 30, 2005) Paperback: 216 pages

Strategic Intelligence: A Handbook for Practitioners, Managers and Users by Don McDowell
Scarecrow Press; Revised edition (January 30, 2009) Paperback: 272 pages

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations by Michael R.
Ronczkowski -- CRC Press; 2nd Edition (November 14, 2006) Hardcover: 392 pages

S-ar putea să vă placă și