*There is a tremendous wealth of information within the
corrections community about gangs,
security threat groups, terrorism, and
radicalization efforts.
• There is a significant need to enhance
collection and information-sharing between
law enforcement and the corrections
community & the public.
• There are a number of impediments to
information sharing.


Maintaining Membership to:The Board of Directors

 Identify and address impediments to information/intelligence sharing.

 Identify/review case law, studies and promising practices, standard operating procedure’s, points of authority

 Encourage development of partnership agreements between corrections, law enforcement agencies & organizations that collect/forward information to the government.

 Improve the flow of data  and other information to the state & federal government, local law enforcement & corrections authority.

 Encourage linkages to networks.

 Identify complainants, defendants, respondents, administrative personnel initiatives, rules, regulations, policy.

 Learn what collaboration is, & its occurrence’s.

 initiate, create a exhaustion of state remedies in 2015 & organizational Workshop.

 Identify DOC intelligence officers.

 Identify Federal, state and local law enforcement officials, employees, volunteers at/or in the organization, identify, catarogize offender correspondence for official ease of access, make notice of meetings that are closed to the public to all persons interested.

***Implement a NCOC Corrections Survey  for 2015***

Over 1100 letters were mailed, emailed ,contacted by phone to the prison directors,state prison staff members  & were asked about sexual assault, excessive use of unnecessary use of force, officer on inmate sexual assault.

 35 Jurisdictions responded (information is still being collected as of 8/14/15

We found in the jails, prisons, detention centers, youth corrections facilities that have

 31 Jurisdictions had dedicated full-time intelligence officers

 471 employees dedicated full-time to collecting intelligence/ information,  jail & prison institutional mailrooms are information/intelligence collection agencies.

 376 with other duties

 9 Jurisdictions had a total of 94 intelligence officers monitoring the security threat groups,  officers with rank (sgt or above )testify on the validity of the reports sent by these individuals.
 5 Jurisdictions had NO intelligence officers.(AK, IA, KS, SD, VT)

The Workshops Identify

 Barriers the organization & staff realize on information sharing
 Ways to overcome barriers
 Types of information that needs to be shared
 Laws or regulations that support and hinder
sharing of appropriate information
 How successful information sharing consortiums
can be replicated
 Models to share information quickly and securely

NCOC Workshop Attendance

NCOC’s prior workshop, the Founder/Executive Director & staff discussed Correctional Intelligence Reports, Counterterrorism, Gangs, and Violent Crime.
A total of 38 people attended, including

(Galveston County only)

 13 corrections personnel, (9) citizens
 10 Law Enforcement Officers
 12 County Corrections Officials
 4 County Law Enforcement Officers
 FBI-DEA office. Houston/Galveston, Texas

What Corrections has to share/offer

Civil Liberties, Correctional Intelligence, Counterterrorism, Gangs, and Violent Crimes
 Institutional Corrections:
 Gang intelligence
 Security threat groups/recruting info
 Terrorism and radicalization efforts
 Community Corrections:
 Information on friends, relatives, associates
 Electronic monitoring tracking
 Employment, residences, hangouts
 Access to searching of premises & computers without
warrants, not to violate federally protected civil rights

We have found:

Computerization has developed many databases that are
now capable of being researched and cross referenced;
Much of this information is contained in separate databases,
making inter-organizational information sharing very difficult.
Obtain access to sensitive information and relationships between
the community and those held in confinement.
 The Corrections Community also gather and share: FYI

X Gang Data.
X Telephone conversations and numbers – can be monitored
and data obtained without warrants.

Who is in custody in real time, escape alerts,  Federal lawsuit notifications, justice exchange courts, out of county residence’s,monitoring of narcotics purchases, etc.

 Financial transactions (JAYPAY, Western Union data bases)

X Visitation – who comes to see persons of interest
X Staff/offender telephone numbers & data/ information
 Social networking sites
 Electronic monitoring
 Inmate email systems
 Identification of wanted subjects

X Gathering and documenting intelligence.
 Providing personnel
X Analyzing  data/information/mail for indications of terrorist or other criminal activity

[]Community crime mapping/Telephone mapping

X[] Violence in detention, youth facilities mapping
X[] Training in investigations
X[] Personnel who have prior criminal convictions or pending court cases on the docket.
[] Assist in the exploitation of recovered cell phones

NCOC Anti-Gang initiative

A comprehensive report, fact sheets and training materials that: requires the individual to understand the plain facts & seriousness of “Homegrown Terrorism” & the understanding of individuals mental state

[]Providing Gang activity/information to all civilians, local, state and federal agencies in the United States

[]Offering each agency the opportunity to prevent a senseless murder and to organize intelligence/ information on gangs, gang leaders & members, recruiting, gang constitutions,, initiation procedures, gang signs, colors, territories

[]Enable information to be shared on a basis with all agencies/organizations that are part of the “Zero Tolerance” policy

[]Providing the capability to develop professional, long lasting associations with corrections facilities (wardens /staff) employees, officers

(1) Document lessons learned (Read it, Review it, Know it)

(2) Identify all methodologies that can be duplicated, circumvented & eradicated

NCOC  Weekly Status Report

 Summary of the weeks prior investigations (names ommitted until investigation is concluded) & signed

 Highlight the importance of privacy and civil liberties
 conduct a inventory of valid up to date information/data sharing initiatives including:

 How to obtain the information needed ?
  How staff members respond to giving privileged, Restricted & Confidential data/information to someone outside the organization?
 Who  is the individual receiving the information & what is he/she going to do with it?
 What attachment will be filed with the document,record or information?
 What classification is the document,record or information?

[] who & what authorization is the document,record or information under?




Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s