Isaacpowerpointprintversion.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
1 2 NC ISAAC opened in 2006 as a clearinghouse for information related to terrorism and crime. ISAAC is staffed by members of local, state, and federal law enforcement agencies in NC, including non‐sworn intelligence analysts and sworn agents and officers. 3 ISAAC receives, investigates, and disseminates information concerning homeland security. 4 Mission: To serve as the focal point for the collection, assessment, analysis, investigation, and dissemination of terrorism and criminal information relating to threats and attacks within North Carolina. ISAAC has a “primary responsibility of developing and evaluating information about persons and/or organizations engaged in criminal activity.” Responsibilities can be categorized as follows: 1. The collection, analysis, and sharing of criminal information 2. Terrorist threat assessment and monitoring 3. Terrorist incident response 4. Development and implementation of special projects, strategies, and initiatives 5. Gang‐related activity 6. Selected organized crime drug cases 5 Law enforcement can submit and receive homeland security and criminal information related to: Homeland security Gangs High intensity drug related cases 6 Handout 1: Fusion Centers Following the terrorist attacks of September 11, 2001, our country was forced to take a critical look at the established methods of intelligence and information sharing. It was at this time that fusion centers began to emerge. The emergence of fusion centers was a direct result of our government’s recommending new and more effective sharing plans to increase awareness of potential threats in our communities and to break down barriers to information sharing. There are currently 78 primary and recognized fusion centers in the United States, Puerto Rico, and the US Virgin Islands. Several states have at least 5 regional fusion centers. 7 8 Community brochures, law enforcement brochures, Anti‐Terrorism Quick Reference Guides and homeland security posters are items distributed to assist in the marketing of the center and its services. A monthly law enforcement sensitive and private sector bulletin is distributed to our law enforcement and non‐traditional partners. 9 An inquiry for information is available through ISAAC. The requester must be a valid law enforcement officer or infrastructure partner and must provide a reason for the query that meets with ISAAC mission criteria. 10 Need to Know –Any ISAAC Participant or member of an ISAAC Participating Agency has a need to know when information requested will aid in the assessment of criminal information. 11 Right to Know –Any ISAAC Participant or member of an ISAAC Participating Agency; as well as government officials whose agencies may be involved in incident response and/or consequence management; and managers of businesses and organizations, when their business or organization is specifically identified as a target of criminal activity has a right to know when information received will aid in the assessment of criminal threat information. Lowe’s Bombing 1999 Example: One late September afternoon pipe bombs blew up at Lowe’s home improvement stores in Salisbury and Asheboro. The two explosions wrecked shopping areas and badly injured a customer. A third unexploded pipe bomb turned up a week later at a store in Concord. The media horde descended. Investigators swarmed. It became the FBI’s number one investigation in the nation. Lowe’s managers worried how to protect customers, employees, and the corporate reputation. “Is it safe to shop at Lowe’s?” Fortunately, it ended within weeks. Authorities arrested and imprisoned George Rocha of Greensboro who confessed to the crime. He had claimed he was angry about people being killed and injured in a fatal crash at a Lowe’s Motor Speedway race. He demanded $250,000 in extortion money. Ultimately he admitted his real motive was simple retribution for being caught shoplifting at Lowe’s. 12 Reasonable Suspicion of Criminal Activity –A set of circumstances that establishes sufficient facts to give a trained law‐enforcement or criminal investigative agency, officer, investigator, or employee a basis to believe that there is reasonable possibility that an individual or organization is involved in criminal activities. 13 1. Telephone – Telephone submissions of information may be made by the public and law enforcement. Phone calls into ISAAC will be answered by the Administrative Assistant, who in turn will route them to the appropriate personnel. 2. Electronically – Submissions may be made by e‐mail or into the OMNIXX system. 3. OMNIXX – Information may be submitted through the Criminal Justice Network on an ISAAC submission form and transmitted directly to ISAAC. This is accomplished by opening Omnixx Force (DCI)>Forms>Persons>ISAAC>and complete the NC Information Sharing And Analysis Center (ISAAC) transaction. 4. SBI Web Page – Information may be submitted through the SBI Terrorism Lead Submission form located on the SBI web site. This submission is transmitted directly to ISAAC. Processing Intelligence Information – Once information has been obtained and appropriate follow up has been handled, it will be evaluated and combined with other relevant information. After the proper analysis, it may be determined appropriate to document into SBI Intelligence Files. 14 Handout 2: Terrorism Tip Submission Form Handout 3: ISACC Information Sheet 15 16 1. ISAAC can assist any law enforcement agency that needs help. Above are just some of the resources ISAAC analysts and investigators have available to assist LE. 2. Accurint is a program made by LexisNexis that allows a connection to current public records that can be used in fraud detection and identity verification. The database currently holds over 37 billion records. 3. Omnixx is a platform which allows data access and information sharing between law enforcement agencies. 4. CJLEADS, or Criminal Justice Law Enforcement Automated Data Services, is a “program designed to integrate data found within the state’s various criminal justice applications.” 5. LInX, or Law Enforcement Information Exchange, is an advanced information sharing system conceived and built (but not owned or controlled) by the US Naval Criminal Investigative Service. 6. NCAWARE is the North Carolina Automated Warrant Repository that helps to maintain and track criminal processes and offender information. 17 Criminal Threat Assessment – A secondary, but critical role of ISAAC that is inter‐related with the criminal information collection and analysis process is its terrorist threat assessment function. Occasionally, information reported to ISAAC, or information developed through subsequent investigations and analysis, will indicate that a criminal event may be underway, or imminent. On those occasions, ISAAC personnel use all available resources in an effort to quickly and effectively evaluate the credibility of the information, develop additional relevant information, and notify response agencies and other appropriate entities in hopes of preventing or disrupting the event or, at least, mitigating its consequences. A Three Component Process Identify – identification of persons, groups, or organizations that have the interest, motive, and capability to perpetrate criminal activity. Investigate / Evaluate – assessment of persons, groups, or organizations who are identified as potential criminal threats. Through investigation and research, develop knowledge of relevant issues. 18 Manage – implement an appropriate response to the threat or event (i.e. refer to JTTF, continue to investigate or monitor, disseminate warnings or alerts, etc.). 19 20 Domestic Terrorism is the unlawful use, or threatened use, of force or violence by a group or individual based and operating entirely within the United States or its territories without foreign direction committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. 21 International Terrorism involves violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or any state, or that would be a criminal violation if committed within the jurisdiction of the United States or any state. 22 NC defines a Terrorist Act as “an act which constitutes a crime against the person or against the residence of an individual (1) which is committed with the specific intent of and may reasonably be expected to instill fear into such person or persons or (2) which is committed for the purpose of restraining that person or those persons from exercising their rights under the Constitution and laws of this state and the United States and (3) any illegal act directed at other persons or their property because of those persons’ beliefs or political affiliations.” 23 1983‐ 9/11 Mastermind Khalid Sheikh Mohammed attended Chowan College and after one year at Chowan transferred to NC A&T and graduated in 1986 with a Bachelors of Science in Mechanical Engineering. Khalid Sheikh Mohammed is known as the mastermind of 9/11. He attended school in NC in the mid 1980s (Chowan college and NC A&T); studied engineering. KSM was arrested in 2006 overseas and confessed to his role in the 9/11 attacks in 2008. KSM also played a role in the murder of American Journalist Daniel Pearl. He is currently being held in Guantanamo awaiting his military trial, which could begin as late as 2016. 24 2000 – Hezbollah Cigarette Smuggling case (Iredell Co) Operation Smokescreen was an American