...Local Law Enforcement Intelligence The world of local law enforcement intelligence has changed significantly since September 11, 2001. State, local, and tribal law enforcement agencies have been given a variety of new responsibilities to handle including intelligence as just one. The intelligence discipline has evolved significantly in recent years since 9/11. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. Law enforcement agencies should consider many new techniques in bettering their intelligence functions. This research paper will discuss law enforcement intelligence history, methods to integrate intelligence into their agency and resources to help with their departments function. To begin this research the first question to be asked should be that of what is law enforcement intelligence? “Law enforcement intelligence is the product of an analytical process that provides an integrated perspective to disparate information about crime, crime trends, crime and security threats and conditions associated with criminality” (Carter). In my opinion the term “law enforcement intelligence” is used and viewed improperly. The majority of people will take this term out of its context and confuse it with national intelligence. Law enforcement intelligence is often viewed as pieces of information about people, places, or events that can be used to provide insight about...
Words: 1188 - Pages: 5
...Terrorism has changed the role of intelligence in law enforcement. Borders have higher security and surveillance. People don’t have as much privacy as they used to. Phone calls, texts, emails are being recorded for safety purposes. Technology has improved. Law enforcement uses high, new technology. Before 9/11 things were different, people weren’t recorded without suspicious acts. For safety purposes the people in United States gave up some of their rights. Travel record is huge and airports have all kind of different scanners and cameras. In general, law enforcement has more control over the people and their daily activities. People are being watched, bank accounts are controlled, and phone calls are recorded, which means American’s way of...
Words: 701 - Pages: 3
...However the JCS J2 can support missions that jeopardize the security of the Nation in combination with Deepwater Horizon’s foreign ownership. The JCS J2 can be called upon to support current crisis events where foreign intelligence collection, analysis, production, and dissemination are needed. The inclusion of the JCS J2 on the Deepwater Horizon incident would provide valuable lessons and post-incident critiques. Improvements on Department of Defense communications and the identification of policy and authority issues can be addressed before the next man-made or natural disaster. The following paragraphs describe the JCS J2 response to the Deepwater Horizon...
Words: 1713 - Pages: 7
...Law Enforcement Today Tammy Sepulveda CJS/200 Version 6 08/26/2012 Charles Musselwhite Law Enforcement Today The major issue facing Police Departments today are all of the budget cutbacks. Many police agencies suffer all the way around the table with less money to work with in a fiscal year. They have had to eliminate certain units that are an important part of crime control and catching criminals. Some of these include; gang units, narcotics unit, mounted patrol, and also eliminating many civilian positions. Not only do the cutbacks affect each unit within the department, but the department as a whole. They have fewer resources to work with when they cannot afford the proper training, equipment and technology. With all of these issue’s they have to deal with, it makes their jobs that much harder. The budget cuts have affected many places across the United States. Crime rates have gone up in many areas; where at one point the crime rate was going down. Newark NJ Police Director Garry McCarthy stated at the Perf’s Summit on the Economy in 2010 that “they had four consecutive years of shooting reductions and murder reductions, but now his shootings are up for the year and so is the murder rate”. “The purpose of the SLFC Program is to establish partnerships with State, local and regional fusion centers that facilitate the lawful sharing of homeland security information and intelligence”. (CONOPS 2008) According to the CONOPS at The Department of Homeland Security; their purpose...
Words: 787 - Pages: 4
...Security, since its inception, has been to consolidate multiple agencies under one department, including: law enforcement, first responders, training, internet technology (IT), human resources, and many other supporting agencies into one organization, capable of providing emergency response, disaster relief, with the fundamental purpose of- protecting this nation, its Critical Infrastructure Key Resources (CIKR), for instance - borders, waterways, airways, along with its citizens from terrorist threats, attacks, and natural disasters. The terrorist attacks on September 11, 2001, were not the only attacks on this country, although to this point, have proven to...
Words: 1680 - Pages: 7
...Session 2 The Intelligence Process Information is material of every description, including that derived from observations, surveillance, reports, rumors, and other sources. The information itself may be true or false, accurate or inaccurate, confirmed or unconfirmed, relevant or irrelevant. Although the intelligence process requires that information be stored, organized, and retrieved, the production of intelligence requires much more. Intelligence is the product resulting from the collection, evaluation and interpretation of information. Thus, intelligence can be viewed as information to which something has been added. The something added is the result of analysis—an explanation of what the information means. Intelligence may be general or specialized in nature. General intelligence focuses on a broad range of criminal activities, typically in smaller agencies or jurisdictions. Specialized intelligence focuses on a particular type of criminal activity or entity, such as narcotics, industrial espionage, or organized crime. Intelligence has both tactical and strategic applications. Tactical intelligence is directed towards a short term law enforcement objective or active case, with an immediate impact in mind—arrest, forfeiture, seizure. Strategic intelligence deals with larger, more long-term issues and goals, such as the identification of major criminal individuals or syndicates, projections of growth in types of criminal activity, and the establishment...
Words: 2395 - Pages: 10
...address the law enforcement transition by disengaging from the philosophy of community police and exploring more aggressive practices. While community policing has been perceived as a tactic that increases public effectiveness through the engagement from members of the community, and law enforcement officers with one goal in mind; public safety. Such method of deploying officers, therefore, produced a bond as well as trust between society and police officers. However, in the past ten years other tactics such as intelligence led policing (ILP) have taken all resources and forced agencies to dismantle Community Policing Officers Units. This project will...
Words: 1852 - Pages: 8
...Major U.S. intelligence agencies differ in responsibilities. Their goals are the same in keeping America safe under their federal protection. “Many Americans aren’t familiar with the nature of each agency’s work beyond a general understanding that they “protect our borders” or “keep America safe” (Levy 1). To try to understand that form of protection, we try to focus on the fundamentals of two different but similar systems that fall under the security category. One of the many federal protectors that will be mentioned throughout this paper is the FBI, short for The Federal Bureau of Investigation. They are a law enforcement agency operating under the Department of Justice. Their primary focus lies on federal criminal investigations...
Words: 1305 - Pages: 6
...These efforts have helped produce preventive strategies, identify victims, raise awareness, increase education, provide victim services, prosecute offenders, and increase data collection and intelligence-sharing. Members of the Task Force and other anti-trafficking organizations have been a part of a paradigm shift within agencies, organizations, and communities. A small sample of the anti-trafficking activities which have occurred across the state since the inception of the Task Force are noted below. Proactively pursuing human trafficking investigations and prosecutions is a top priority. State-level prosecutions can be problematic for a myriad of reasons. Unlike many crimes, victims of human trafficking rarely self-identify. In many cases, it takes the trained eye of state and local law enforcement personnel or service providers to discover a trafficking victim. Even when approached, victims may not identify as victims due to fear of reprisal by their trafficker. The shadowy nature of the crime is only one factor in the relatively low number of...
Words: 922 - Pages: 4
...often clash when applied to everyday. In the most optimal society justice is served by punishing criminals so that law abiding citizens can live their lives in peace. The reality is that criminals receive punishments that are less than justice demands and the non-criminals are cheated. This short paper examines justice theories, the utilitarian view, modern justice view and the security based justice. It is important to consider individual justice, mob justice and societal justice as separate institutions. To better understand these institutions the next section explains justice theories. Justice Theories In this section two types of justice will be discussed: Rawl's Theory of Justice as Fairness and Libertarianism. Rawls focused on a hypothetical model in order to describe his form of justice. In this hypothetical model individuals are required to choose fundamental principles of basic institutions of a given society (Ilstu). The result choices made by the members of this society will be both fair and just. The two principles are as follows: Equal Liberty and Difference. "The Equal Liberty Principle states each person is to have the maximum civil liberties compatible with the same liberty for all (Ilstu)". These would be the principles of the United States Constitution; all American citizens are privileged to receive full civil liberties based on the laws of the land. "The Difference Principle states inequalities are permissible only if (a) they can be expected to...
Words: 1221 - Pages: 5
...Abstract Technology is evolving faster than it can be implemented. Police departments should adapt and use today’s technology to better place them in a position that enables them to adequately and effectively do its job via predictive analyses of crime trends. Integrating information and operations removes information pitfalls, and allows for faster and easier access to relevant information. Predictive policing focuses on developing, managing, and operating an integrated information infrastructure; thus avoiding one of the largest IT pitfalls of any organization: having information isolated with departments. Information needs to be cross-functional and readily accessible. Multiple information sources need to be merged into police analytical systems. Lack of information sharing can prevent effective data-analysis and hinder investigations. Keywords: CompStat, Predictive Policing, Information Systems, ISIT, networking, infrastructure, data analysis, crime prevention, criminal justice Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrol of the streets. To effectively compare and contrast the application of Information Technology (IT) in optimizing police departments’ performance related to crime reduction versus random street patrols, it is important to understand what information technology police have available. ‘Predictive Policing’ refers to “any policing strategy...
Words: 1902 - Pages: 8
...crimes in society today, is generally a new phenomenon. Modern crimes directed against the operation of computer technology itself, presents new crimes that are as new as contemporary technology. The Internet has opened a variety of new rooms for cybercriminals to commit cyber-based terrorist attempts, computer intrusions, and major cyberfrauds. Cyberextortion is an outsider threat designed to obtain money, products, or favorable considerations from an organization or individuals by using illegal means of persuasion related to computer intrusion (Cybercrime Investigation & Intelligence, 2012). This paper addresses the relatively new form of sexual exploitation called “sextortion” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the Internet. Texting has become the modern day method of communication among teens and children, and in the case of “sextortion” these images are displayed online via the new term of “Sexting” that is done via cell phones. Sexual predators that live online, in chat rooms, and on social networking websites eventually coerce their victims into performing sexual...
Words: 2163 - Pages: 9
...carried out intelligence activities since the days of George Washington, but only since World War II have they been coordinated on a government-wide basis. President .Franklin D. Roosevelt appointed New York lawyer and war hero, William J. Donovan, to become first the Coordinator of Information, and then, after the US entered World War II, head of the Office of Strategic Services (OSS) in 1942. The OSS – the forerunner to the CIA – had a mandate to collect and analyze strategic information. After World War II, however, the OSS was abolished along with many other war agencies and its functions were transferred to the State and War Departments. It did not take long before President Truman recognized the need for a postwar, centralized intelligence organization. To make a fully functional intelligence office, Truman signed the National Security Act of 1947 establishing the CIA. The National Security Act charged the CIA with coordinating the nation’s intelligence activities and correlating, evaluating and disseminating intelligence affecting national security. On December 17, 2004, President George W. Bush signed the Intelligence Reform and Terrorism Prevention Act which restructured the Intelligence Community by abolishing the position of Director of Central Intelligence (DCI) and Deputy Director of Central Intelligence (DDCI) and creating the position the Director of the Central Intelligence Agency (D/CIA). The Act also created the position of Director of National Intelligence (DNI)...
Words: 2144 - Pages: 9
...Money laundering and terrorism financing risks in Botswana introDuction Botswana has a relatively good legal foundation to fight financial crime in general. With the second reading of the Financial Intelligence Bill and the regulation of non-financial institutions prone to money laundering, the legal framework will be remarkably enhanced. However, Botswana has not yet undertaken an assessment of its risks and vulnerabilities to money laundering and the financing of terrorism in terms of international requirements. Significantly, Botswana’s legal framework does not recognise the risk of money laundering in either limited- or high-risk situations. This is in spite of the Financial Action Task Force (FATF) espousing a country-specific risk analysis and application of a regulative framework for all forms of business relationships. The rationale for adopting the risk-based approach is that a better understanding of the extent, form, production and disposal or use of the proceeds of crime helps to determine the appropriate interventions. Tentative steps towards establishing trends in money laundering and the financing of terrorism have been taken over the past few years. A team of World Bank experts visited Botswana at the end of 2006 to assess the implementation of the FATF anti-money laundering and counter-financing of terrorism (AML and CFT) standards. In early 2007 the Directorate on Corruption and Economic Crime (DCEC), in collaboration with the Institute for Security Studies (ISS)...
Words: 15688 - Pages: 63
...http://en.wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a...
Words: 6044 - Pages: 25