Search
|
Fusion Centers
Principle of Freedom Amendment IV of the Constitution - The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Principle of Collectivism A fusion center is defined as a “collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.” Among the primary focuses of fusion centers are the intelligence and fusion processes, through which information is collected, integrated, evaluated, analyzed, and disseminated. Nontraditional collectors of intelligence, such as public safety entities and private sector organizations, possess important information (e.g., risk assessments and suspicious activity reports) that can be “fused” with law enforcement data to provide meaningful information and intelligence about threats and criminal activity. It is recommended that the fusion of public safety and private sector information with law enforcement data be virtual through networking and utilizing a search function. Examples of the types of information incorporated into these processes are threat assessments and information related to public safety, law enforcement, public health, social services, and public works. Data fusion involves the exchange of information from different sources—including law enforcement, public safety, and the private sector—and, with analysis, can result in meaningful and actionable intelligence and information. The fusion process turns this information and intelligence into actionable knowledge. Fusion also allows for relentless reevaluation of existing data in context with new data in order to provide constant updates. The public safety and private sector components are integral in the fusion process because they provide fusion centers with crime-related information, including risk and threat assessments, and subject-matter experts who can aid in threat identification.
THINK YOU'RE LOST IN THE CROWD? - CHECK THIS OUT
The case OK-SAFE has been building and advancing for three years has finally made it to the mainstream media – the government is monitoring the American people. State and Federal Representatives have steadfastly scoffed at the idea. A Washington Post article entitled Monitoring America offers a window into the deceptive nature of our government.
Local Tribes Chilocco Sign Agreement News 3.24.07 OSU Institutional Biosafety Committee Meetings Minutes 2003-2006 UML SBA DSI Support Services Mod1 UML-OSU 06.30.08 Independent Audit
Fusion Center PowerPoint at 2010 Freedom Action National Conference – by Amanda Teegarden
Vision 2015 – A Globally Networked and Integrated Intelligence Enterprise (10MB)
Strategy: Integrate foreign, military, and domestic intelligence capabilities through policy, personnel and technology actions to provide decision advantage to policy makers, warfighters and homeland security officials and law enforcement personnel.- J.M. McConnell - Director of National Intelligence We live in a dynamic world in which the pace, scope, and complexity of change are increasing. The continued march of globalization, the growing number of independent actors, and advancing technology have increased global connectivity, interdependence and complexity, creating greater uncertainties, systemic risk and a less predictable future. These changes have led to reduced warning times and compressed decision cycles. Although this interconnected world offers many opportunities for technological innovation and economic growth, it also presents unique challenges and threats. In this environment, the key to achieving lasting strategic advantage is the ability to rapidly and accurately anticipate and adapt to complex challenges. Not only will the type of customer change within our existing federal policy-making sets, but the range of customers will broaden to emphasize other federal departments (e.g., Health and Human Services, Agriculture, Commerce), state and local agencies, international organizations, and private sector and non-governmental organizations.
LAS VEGAS — It’s one of the most hostile hacker environments in the country –- the DefCon hacker conference held every summer in Las Vegas. But despite the fact that attendees know they should take precautions to protect their data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader. The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view. It was part of a security-awareness project set up by a group of security researchers and consultants to highlight privacy issues around RFID. When the reader caught an RFID chip in its sights — embedded in a company or government agency access card, for example — it grabbed data from the card, and the camera snapped the card holder’s picture. This year they planned to add data collected from the RFID reader and camera (below) — to raise awareness about a privacy threat that’s becoming increasingly prevalent as RFID chips are embedded into credit cards, employee access cards, state driver’s licenses, passports and other documents. You have probably heard of Radio Frequency Identification (RFID) technology in many different contexts. RFID describes a broad range of technologies that allow the identification and tracking of physical items using radio waves, and have far-reaching implications for processes as wide-ranging as factories, hospitals, airports, battlefields and retail sales. RFID The Right Frequency for Government IBM The integration of RFID technology with other information technology makes a paradigm shift now possible. RFID technology can track patient safety by error-proofing processes for medication, as well as providing global visibility of worldwide shipments, which will improve the flow of commerce and the security of nations. The future role of RFID will dramatically increase its impact over that of its predecessors. The potential of RFID is indeed great. The supply chain management industry refers to the “three V’s of RFID”: visibility, velocity, and value. RFID promises to increase visibility to make earlier and better decisions and actions possible. Second, RFID will enable the flow of goods and information to be accelerated, with a higher certainty of information for decision making. Finally, RFID will enable important enhancement of value, often in new ways. As described by Professor Wyld, RFID offers the potential to provide increased safety for patients, faster movement of automobiles from manufacturer to dealer, and greater national security.
WASHINGTON — The Transportation Department said Tuesday it is prohibiting truck and bus drivers from sending text messages on hand-held devices while operating commercial vehicles. The prohibition, which applies to drivers of interstate buses and trucks over 10,000 pounds, is effective immediately, the department said in a statement. Truck and bus drivers who text while driving commercial vehicles may be subject to civil or criminal penalties of up to $2,750, the department said. LaHood said enforcing restrictions on texting and cell phone use by drivers will be difficult. He urged the wireless industry to work with public officials to come up with a solution. The Transportation Department and safety advocates have also joined forces to create FocusDriven, an organization to campaign against cell phone use or texting on handheld computers while driving.
The next National Fusion Center Conference will be held Feb 23-25, 2010 in New Orleans, LA. The 2010 agenda confirms everything we've been talking about - information sharing, funding, partnering with the private sector, etc. Schedule of Events The conference agenda will provide attendees with an opportunity to learn more about issues directly affecting fusion centers. Featuring both plenary and breakout sessions, the conference will cover a variety of topics, including:
I think to do that requires us at the federal level in our organizational strategy to make clear that Fusion Centers are not just about isolated information-sharing, but they really are about taking information gathered at the state and local level and putting it into an analytical product that can be used at the federal level and that the federal law enforcement agencies are sharing the reverse at the state and local as much as can be done. And second is that the partnerships involved in Fusion Centers need to be looked at very, very broadly. Who is in your Third, have we made sure that through the Fusion Centers, we have created kind of seamless network of information-sharing not just vertically state to Fed, local to state to Fed, but also horizontally across the country at different levels, and have we taken into account all that that sharing can entail?
Transcript of Testimony by Captain Michael Corwin Transcript of KC Police Capt. Michael Corwin's testimony at the August 31, 2009 Missouri House Interim Committee on State Intelligence Analysis Oversight, where public input was sought on the MIAC report (Missouri Information Analysis Center - one of Missouri's federally funded fusion centers). OK-SAFE's Executive Director, Of particular interest in Corwin's statement is the following comment, "The era of intelligence-led policing is upon us." Sounds like a military operation...
The Departments of Defense (DoD) and Homeland Security (DHS) today announced an initiative to grant select state and major urban area fusion center personnel access to classified terrorism-related information residing in DoD’s classified network. Under this initiative, select fusion center personnel with a federal security clearance will be able to access specific terrorism-related information resident on the DoD Secret Internet Protocol Router Network (SIPRNet)—a secure network used to send classified data. This classified data will be accessed via DHS’ Homeland Security Data Network (HSDN). DHS will be responsible for ensuring that proper security procedures are followed. “With this action, DoD continues its work in supporting states and localities who are leading our efforts to secure the nation from domestic terrorism attacks, said Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Paul N. Stockton. “We look forward to exploring other opportunities where DoD can help our state and local partners effectively defeat terrorism.” _______________________________________________________________________________________________________
"What we in America call terrorists are really groups of people that reject the international system..." -- Henry Kissinger, speaking at a conference hosted by AKbank in Istanbul Turkey on May 31, 2007
Fusion Centers Raise Privacy Questions - Tulsa Beacon The director of the Oklahoma State Bureau of Investigation said there is a constant balancing act between the basic rights of Americans and the need to investigate and prevent crime. A controversial aspect to 21st Century crime fighting is the development of “fusion centers” across the country. In fact, the OSBI created such a center in its headquarters in Oklahoma City. A fusion center is defined as a “collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.” Among the primary focuses of fusion centers are the intelligence and fusion processes, through which information is collected, integrated, evaluated, analyzed and disseminated.
10 Simple Steps
Recognize your responsibilities and lead by example Recognize the value of sharing intelligence information within your own agency, and encourage the practice of sharing information with other law enforcement and public safety agencies. Use the guidelines and action steps outlined in the National Criminal Intelligence Sharing Plan (“Plan”) to implement or enhance your organization’s intelligence function.
Canada MOU Guidelines
The terminology used in a MoU must reflect the fact that a MoU has no binding basis in law and is not a legal or contractual document. Specific terminology is reserved for use in contracts or treaties and should, therefore, be avoided in a MoU. While other terms may be used their use is discouraged. The following tables provide examples and alternatives for both cases. CIIA HR5005 Title II Information and Infrastructure EO12958 1995 Classification of Info Clinton EO12968 1995 Access to Classified Info Clinton EO13292 2003 Amends EO12958 Bush FBI Information in Security Clearances IACP Criminal Intelligence Model Policy Privacy and Civil Liberties Policy
INTELLIGENCE OFFICES COLLECT INFORMATION ON PEOPLE SUSPECTED OR CONVICTED
OF CRIMINAL ACTIVITY “Government information-gathering centers intended to thwart domestic terrorist activity could violate individuals’ privacy rights and be used to spy on American citizens, representatives of two groups on both ends of the political spectrum say.”
Due to the many requests for this power point after the 10th Annual Freedom 21 National Conference, OK-SAFE is publishing their presentation in PDF format.
Entitled Fusion Centers, or I Spy for the Intelligence Enterprise, this presentation includes detailed information on the definition of and nature of fusion centers, their goals and objectives, as well homework assignments for concerned citizens:
1) Stop any legislation allowing "direct electronic access to the [state agency, i.e. Dept. of Public Safety, computerized photo or other data], by law enforcement, or any political subdivision of the state, for law enforcement purposes"; in
2) Identify the
The presentation is a work-in-progress and will continue to be updated and modified as appropriate.
POLICY FORUM - Featuring Bruce Fein, Constitutional Attorney, The Lichfield Group; Harvey Eisenberg, Chief, National Security Section, Office of United States Attorney, District of Maryland; and Michael German, Policy Counsel, American Civil Liberties Union. Moderated by Tim Lynch, Director, Project on Criminal Justice, Cato Institute.
Quote from one panelist: "We're not very far from a Stazi..." Source: The Cato Institute
Security Risk!? - April 15, 2009 - Dr. Everett Piper; President of Oklahoma Wesleyan University
The United States Department of Homeland Security (DHS) just identified those US citizens who are focused on "right wing issues" as security risks! Does anyone but me hear the voice of George Orwell echoing through the halls of our Capital, our culture, our corporations, our churches and our Country right now?
Who defines what these dangerous right wing issues are? The Fed? The DHS? The Congress? The President? Or maybe ACORN, the ACLU, NAMBLA, PETA, George Soros, Michael Moore, or even your State's governor or your local police chief? Does it concern you that someone who proudly and myopically wears the label of "Left" is now declaring that those on the "Right" are a security risk because of your ?extreme? and singular focus?
Dear Secretary Napolitano: ".....First, your report states that “rightwing extremists will attempt to recruit and radicalize returning veterans in order to exploit their skills and knowledge derived from military training and combat”. Using the DHS rationale, do you also believe that weapons familiarity and tactical training means local, state and federal law enforcement personnel, and members of the National Guard, are also being recruited? To suggest a soldier returning from combat tour is more prone to join an extremist group is unconscionable and insulting to our brave men and women who risk their lives protecting our freedom. Second, the report states that millions of Americans who believe in the Second Amendment are a potential threat to our national security. Why? Do you have statistics to prove that law-abiding Americans who purchase a legal product are being recruited by so-called hate groups? If so, please present us with DHS’s independent data. Third, the report identifies those individuals who believe in such issues as pro-life legislation, limited government, legal verses illegal immigration and limited federal government as potential terrorist threats. We can assure you that these beliefs are held by citizens of all races, party affiliations and sex, and should not be listed as a factor in determining potential terror threats. A better way to describe them is as citizens exercising their First Amendment rights."
This Cooperative Agreement (Agreement) governs the participation of OK DPS,' hereinafter referred to as Member Agency, and The International Justice and Public Safety Information Sharing Network (Nlets). The purpose of this Agreement is to provide for the Member Agency's membership in Nlets.
Nlets agrees to furnish telecommunications facilities for the exchange of criminal justice related information between the Member Agency and other Nlets members. The parties agree that Nlets is obtaining its telecommunications facilities from third parties and agree that Nlets' obligations hereunder will be suspended during any period which Nlets' access to, or utilization oft such facilities is limited or interrupted.
This document constitutes an agreement between the Oklahoma Department of Public Safety (DPS), State Administrator of the PURPOSE OF AGREEMENT:
The Department of Public Safety agrees to maintain, operate and manage the OLETS Telecommunications and Criminal Justice Information Systems on a 24-Hour, 7 Day per week basis. The OLETS Division further agrees to act as the STATE CONTROL TERMINAL AGENCY (SCTA) to facilitate the exchange of criminal justice information between the USER AGENCY and the following computer interfaces; National Crime
This document constitutes an agreement between the Oklahoma Department of Public Safety (DPS), State Administrator of the PURPOSE OF AGREEMENT: The Department of Public Safety agrees to maintain, operate and manage the OLETS Telecommunications and Criminal Justice Information Systems on a 24-Hour, 7 Day per week basis. The OLETS Division further agrees to act as the STATE CONTROL TERMINAL AGENCY (SCTA) to facilitate the exchange of criminal justice information between the USER AGENCY and the following computer interfaces; National Crime
U) Scope (U//FOUO) This product is one of a series of intelligence assessments published by the Extremism and Radicalization Branch to facilitate a greater understanding of the phenomenon of violent radicalization in the United States. The information is provided to federal, state, local, and tribal counterterrorism and law enforcement officials so they may effectively deter, prevent, preempt, or respond to terrorist attacks against the United States. Federal efforts to influence domestic public opinion must be conducted in an overt and transparent manner, clearly identifying United States Government sponsorship.
U) LAW ENFORCEMENT INFORMATION NOTICE: This product contains Law Enforcement Sensitive (LES) information. No portion of the LES information should be released to the media, the general public, or over non-secure Internet servers. Release of this information could adversely affect or jeopardize investigative activities.
(U) Warning: This document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information and is not to be released to the public, the media, or other personnel who do not have a valid need-to-know without prior approval of an authorized DHS official. State and local homeland security officials may share this document with authorized security personnel without further approval from DHS.
(U) All U.S. person information has been minimized. Should you require the minimized U.S. person information, please contact the DHS/I&A Production Branch at IA.PM@hq.dhs.gov, IA.PM@dhs.sgov.gov, or IA.PM@dhs.ic.gov. * (U) Rightwing extremism in the United States can be broadly divided into those groups, movements, and adherents that are primarily hate-oriented (based on hatred of particular religious, racial or ethnic groups), and those that are mainly antigovernment, rejecting federal authority in favor of state or local authority, or rejecting government authority entirely. It may include groups and individuals that are dedicated to a single issue, such as opposition to abortion or immigration. (U) Reporting Notice: (U) DHS encourages recipients of this document to report information concerning suspicious or criminal activity to DHS and the FBI. The DHS National Operations Center (NOC) can be reached by telephone at 202-282-9685 or by e-mail at NOC.Fusion@dhs.gov. For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by e-mail at NICC@dhs.gov. The FBI regional phone numbers can be found online at http://www.fbi.gov/contact/fo/fo.htm. When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.
Missouri Information Analysis Center
Missouri Information Analysis Center (MIAC) provides a public safety partnership consisting of local, state and federal agencies, as well as the public sector and private entities that will collect, evaluate, analyze, and disseminate information and intelligence to the agencies tasked with Homeland Security responsibilities in a timely, effective, and secure manner.
"Because authenticity of the report was questioned by some, this writer contacted
Rep. Guest stated that he was "shocked and outraged" at the report, which clearly paints him and many other elected state leaders, as a potential threats to law enforcement." - Patrick Wood Glenn Beck on MIAC Report - Video 03-21-09
Glenn Beck and Penn Jillette talk about the MIAC report implicating libertarians as possible members of militias and domestic terrorists.
An Interview with Missouri Rep Jim Guest MIAC Controversy
MIAC is a so-called “Fusion” center that uses Federal Homeland Security money and directives to manage Missouri state personnel. The budget and the MIAC scandal had become intertwined just the day before when Jim Guest introduced a bi-partisan amendment to the monster 2009 budget bill that would de-fund the Department of Public Safety (state law enforcement) and effectively stall the mammoth budget if the amendment was not passed. Guest’s amendment makes it
virtually illegal for state funds to be used for “political profiling”. The amendment passed; a temporary triumph for civil liberties.
DoD PI Implementation Plan August 2006 Public Release 1 An Overview of the Intelligence Community 2009 - Source EPIC Amicus Brief on Fusion Centers - Source Fusion Center Executive Summary 2006 - Source Fusion Center Guidelines 2006 - Source Fusion Centers Guidelines 2005 - Source IC Information Sharing Strategy Feb 2008 National Criminal Intelligence Sharing Plan June 2005 CFR National Strategy for Information Sharing Reporting of Information to Federal Partners—Fusion centers shall develop the processes and protocols, in coordination with the FBI and DHS Office of Intelligence and Analysis (I&A), for ensuring that relevant and vetted priority information is reported to the JTTF and other appropriate federal agencies to support its inclusion into national patterns and trends analysis.
Please send technical comments and problems to: webmaster Fair Use Notice: This site contains copyrighted material, the use of which may not always have been specifically authorized by the copyright owner. Such material is made available for educational purposes, and as such constitutes "fair use" of any such copyrighted material as provided for in Section 107 of the U.S. Copyright Act. In accordance with Title 17 U.S.C. Section 107 the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Our Privacy Policy: The only personal information we give to any third party is the information you provide to us when using your debit or credit card to make a donation or purchase. All other information and correspondence are strictly confidential. We never sell, give away or barter mail lists or other information to any person, business, organization or corporation for any reason. We will not provide any personal information about you to any government or agency or employee of any government, foreign or domestic, except when we are under a court order to do so. |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright ©2007 Oklahomans for Sovereignty and Free Enterprise, Inc. All Rights Reserved |