<<

1 2 NC ISAAC opened in 2006 as a clearinghouse for information related to and crime.

ISAAC is staffed by members of local, state, and federal law enforcement agencies in NC, including non‐sworn intelligence analysts and sworn agents and officers.

3 ISAAC receives, investigates, and disseminates information concerning homeland security.

4 Mission: To serve as the focal point for the collection, assessment, analysis, investigation, and dissemination of terrorism and criminal information relating to threats and attacks within .

ISAAC has a “primary responsibility of developing and evaluating information about persons and/or organizations engaged in criminal activity.” Responsibilities can be categorized as follows: 1. The collection, analysis, and sharing of criminal information 2. Terrorist threat assessment and monitoring 3. Terrorist incident response 4. Development and implementation of special projects, strategies, and initiatives 5. Gang‐related activity 6. Selected drug cases

5 Law enforcement can submit and receive homeland security and criminal information related to:  Homeland security

 Gangs

 High intensity drug related cases

6 Handout 1: Fusion Centers

Following the terrorist attacks of September 11, 2001, our country was forced to take a critical look at the established methods of intelligence and information sharing. It was at this time that fusion centers began to emerge.

The emergence of fusion centers was a direct result of our government’s recommending new and more effective sharing plans to increase awareness of potential threats in our communities and to break down barriers to information sharing.

There are currently 78 primary and recognized fusion centers in the , Puerto Rico, and the US Virgin Islands. Several states have at least 5 regional fusion centers.

7 8 Community brochures, law enforcement brochures, Anti‐Terrorism Quick Reference Guides and homeland security posters are items distributed to assist in the marketing of the center and its services.

A monthly law enforcement sensitive and private sector bulletin is distributed to our law enforcement and non‐traditional partners.

9 An inquiry for information is available through ISAAC. The requester must be a valid law enforcement officer or infrastructure partner and must provide a reason for the query that meets with ISAAC mission criteria.

10 Need to Know –Any ISAAC Participant or member of an ISAAC Participating Agency has a need to know when information requested will aid in the assessment of criminal information.

11 Right to Know –Any ISAAC Participant or member of an ISAAC Participating Agency; as well as government officials whose agencies may be involved in incident response and/or consequence management; and managers of businesses and organizations, when their business or organization is specifically identified as a target of criminal activity has a right to know when information received will aid in the assessment of criminal threat information.

Lowe’s Bombing 1999 Example: One late September afternoon pipe bombs blew up at Lowe’s home improvement stores in Salisbury and Asheboro. The two explosions wrecked shopping areas and badly injured a customer. A third unexploded pipe bomb turned up a week later at a store in Concord. The media horde descended. Investigators swarmed. It became the FBI’s number one investigation in the nation. Lowe’s managers worried how to protect customers, employees, and the corporate reputation. “Is it safe to shop at Lowe’s?”

Fortunately, it ended within weeks. Authorities arrested and imprisoned George Rocha of Greensboro who confessed to the crime. He had claimed he was angry about people being killed and injured in a fatal crash at a Lowe’s Motor Speedway race. He demanded $250,000 in extortion money. Ultimately he admitted his real motive was simple retribution for being caught shoplifting at Lowe’s.

12 Reasonable Suspicion of Criminal Activity –A set of circumstances that establishes sufficient facts to give a trained law‐enforcement or criminal investigative agency, officer, investigator, or employee a basis to believe that there is reasonable possibility that an individual or organization is involved in criminal activities.

13 1. Telephone – Telephone submissions of information may be made by the public and law enforcement. Phone calls into ISAAC will be answered by the Administrative Assistant, who in turn will route them to the appropriate personnel.

2. Electronically – Submissions may be made by e‐mail or into the OMNIXX system.

3. OMNIXX – Information may be submitted through the Criminal Justice Network on an ISAAC submission form and transmitted directly to ISAAC. This is accomplished by opening Omnixx Force (DCI)>Forms>Persons>ISAAC>and complete the NC Information Sharing And Analysis Center (ISAAC) transaction.

4. SBI Web Page – Information may be submitted through the SBI Terrorism Lead Submission form located on the SBI web site. This submission is transmitted directly to ISAAC.

Processing Intelligence Information – Once information has been obtained and appropriate follow up has been handled, it will be evaluated and combined with other relevant information. After the proper analysis, it may be determined appropriate to document into SBI Intelligence Files.

14 Handout 2: Terrorism Tip Submission Form Handout 3: ISACC Information Sheet

15 16 1. ISAAC can assist any law enforcement agency that needs help. Above are just some of the resources ISAAC analysts and investigators have available to assist LE.

2. Accurint is a program made by LexisNexis that allows a connection to current public records that can be used in fraud detection and identity verification. The database currently holds over 37 billion records.

3. Omnixx is a platform which allows data access and information sharing between law enforcement agencies.

4. CJLEADS, or Criminal Justice Law Enforcement Automated Data Services, is a “program designed to integrate data found within the state’s various criminal justice applications.”

5. LInX, or Law Enforcement Information Exchange, is an advanced information sharing system conceived and built (but not owned or controlled) by the US Naval Criminal Investigative Service.

6. NCAWARE is the North Carolina Automated Warrant Repository that helps to maintain and track criminal processes and offender information.

17 Criminal Threat Assessment – A secondary, but critical role of ISAAC that is inter‐related with the criminal information collection and analysis process is its terrorist threat assessment function. Occasionally, information reported to ISAAC, or information developed through subsequent investigations and analysis, will indicate that a criminal event may be underway, or imminent. On those occasions, ISAAC personnel use all available resources in an effort to quickly and effectively evaluate the credibility of the information, develop additional relevant information, and notify response agencies and other appropriate entities in hopes of preventing or disrupting the event or, at least, mitigating its consequences.

A Three Component Process Identify – identification of persons, groups, or organizations that have the interest, motive, and capability to perpetrate criminal activity. Investigate / Evaluate – assessment of persons, groups, or organizations who are identified as potential criminal threats. Through investigation and research, develop knowledge of relevant issues.

18 Manage – implement an appropriate response to the threat or event (i.e. refer to JTTF, continue to investigate or monitor, disseminate warnings or alerts, etc.).

19 20 Domestic Terrorism is the unlawful use, or threatened use, of force or violence by a group or individual based and operating entirely within the United States or its territories without foreign direction committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.

21 International Terrorism involves violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or any state, or that would be a criminal violation if committed within the jurisdiction of the United States or any state.

22 NC defines a Terrorist Act as “an act which constitutes a crime against the person or against the residence of an individual (1) which is committed with the specific intent of and may reasonably be expected to instill fear into such person or persons or (2) which is committed for the purpose of restraining that person or those persons from exercising their rights under the Constitution and laws of this state and the United States and (3) any illegal act directed at other persons or their property because of those persons’ beliefs or political affiliations.”

23 1983‐ 9/11 Mastermind attended Chowan College and after one year at Chowan transferred to NC A&T and graduated in 1986 with a Bachelors of Science in Mechanical Engineering.

Khalid Sheikh Mohammed is known as the mastermind of 9/11. He attended school in NC in the mid 1980s (Chowan college and NC A&T); studied engineering. KSM was arrested in 2006 overseas and confessed to his role in the 9/11 attacks in 2008. KSM also played a role in the of American Journalist Daniel Pearl. He is currently being held in Guantanamo awaiting his military trial, which could begin as late as 2016.

24 2000 – Cigarette Smuggling case (Iredell Co) Operation Smokescreen was an American interagency counterterrorist operation to disrupt fundraising by Hezbollah, that took place in early 1995, ending in 2002. The operation involved the Sheriff's Office in Iredell County, North Carolina (SBI), Federal Bureau of Investigation (FBI), Bureau of Alcohol, Tobacco, Firearms and Explosives (BATF), Immigration and Naturalization Service (INS), and the U.S. Department of State's Diplomatic Security Service (DSS). Detective Sergeant Robert Fromme made repeated observations of a group of men purchasing large quantities of cigarettes, often with $20,000 ‐ $30,000 in cash. The joint counterterrorism operation ended the fundraising operation, resulting in the arrest, trial, and conviction of the cell members. The operation led to the creation of the North Carolina Joint Terrorism Task Force (JTTF).

25 2003 – Olympic bomber arrested in Murphy, NC Eric Rudolph was involved in several bombings between 1996 and 1998 including the Centennial Olympic Park in Atlanta, GA in 1996. He eluded capture for 5 yrs by hiding and surviving in the NC woods. He was captured after a Murphy Police Officer found him dumpster diving late one night behind a business. He pleaded guilty in 2005 and received 4 consecutive life sentences w/out the possibility of parole, and is serving out his sentence at the ADX Florence supermax in Florence, .

26 2005 – London Bomber Madgy el‐Nashar studied at NC State

27 Iranian‐American Mohammed Taheri‐azar graduated from UNC‐CH in 2005. In March 2006 he drove a rented SUV through “The Pit” (a common gathering place for students), hitting nine people. Fortunately, no one was killed. After the attack he called police to turn himself in—a letter found at his home revealed that he did not expect to survive his confrontation with the victims and police. During his confession he said his motive was revenge for the alleged mistreatment and deaths of Muslims worldwide. He idolized –one of the 9/11 hijackers. He was sentenced to 26 to 33 years in prison.

28 Samir Khan –was the Pakistani American editor and publisher of Inspire magazine, an English‐language online magazine reported to be published by al‐Qaeda in the Arabian Peninsula (AQAP). A citizen of the United States, he was killed in a in together with Anwar al‐Awlaki. He lived in Charlotte before leaving the country for Yemen in 2009. He reportedly cut off ties with his family when he left the U.S. After Khan's death, a family friend told CNN that Khan's father did not agree with his son's views and had tried seeking help to change his son's radical views on several occasions.

29 On July 27, 2009, agents and analysts with ISAAC assisted the FBI Raleigh Joint Terrorism Task Force with a multi‐agency investigation that resulted in the arrests of a group of suspected terrorists in North Carolina. Seven men were charged with providing material support to terrorists and conspiring to murder, kidnap, maim, and injure people overseas.

From top left: Daniel Patrick Boyd, Hysen Sherifi, Dylan Boyd, Zakariya Boyd, Ziyad Yaghi, Mohammad Omar Aly Hassan, Anes Subasic, and Jude Kenan Mohammad.

30 Items seized from Boyd’s home and vehicle included over 26 weapons, ammunition, gear, gas masks, terrorism response guides, and chemistry books.

31 Jude Kenan Mohammad was arrested in on October 13, 2008 for crossing into restricted territory. He missed his scheduled court appearance in Charsadda (north of ) in September 2009. Mohammad was killed in a U.S. drone strike in Pakistan’s tribal region in 2011

32

The Field Liaison Officer (FLO) Program develops and sustains meaningful integration of a region‐wide network of law enforcement officers in order to combat organized crime, Drug Trafficking Organizations (DTO), gangs and terrorism.

34 Additionally, the program will:  Promote ISAAC

 Provide benefits to selected FLOs (case support, etc.)

35 A Field Liaison Officer (FLO) is an identified person (sworn or non‐sworn) within the law enforcement, emergency services, or private sector community, who is responsible for reporting and disseminating suspicious activity and other criminal information to their local agency and to ISAAC.

36 FLOs must:  Occupy a sworn or non‐sworn position in Law Enforcement, Fire Services/Emergency Medical Services, Public Health, Emergency Management agency, or Private Sector entity

 Maintain an agency or supervisory recommendation to be a participant in the FLO program

 Qualify and pass a US Department of Homeland Security background investigation, and

 Sign an agreement to the Roles and Responsibilities of a FLO

37 The FLO program follows the SBI district layout, and each district has at least one SBI Agent and one Trooper or Sgt. with State Highway Patrol assigned to that area.

These Agents and Troopers are the state’s FLO Coordinators and are responsible for being the liaison between local Police departments/Sheriffs offices and ISAAC.

38 Community Outreach and Engagement Program (COEP) The Mission of COEP is to expand and improve inter‐faith and inter‐cultural dialogue by furthering community engagement efforts, as well as expand cooperative efforts with law enforcement and state and federal entities. COEP also strives to empower communities so that they can help protect themselves and others against violent crimes and violent extremist activities.

39 COEP seeks to:  Create training programs for law enforcement to address gaps in cultural competency as well as best practices for community engagement across the state.

 Provide on‐going forums and programs for the community that address their needs and provide a better understanding of how the government and law enforcement function.

 Build, strengthen and maintain relationships of trust between communities and federal and state government and law enforcement through sustained engagement.

40  Act as a liaison between community leaders, advisory councils—both government and non‐government—to help counter radicalization, violent extremism, and violent criminal behavior through community engagement and education.

 Create youth programs to involve youth with state and federal government and non‐government led programs to enhance their knowledge and involvement within and outside the community.

41 42 43 44