*There is a tremendous wealth of information within the
corrections community about gangs,
security threat groups, terrorism, and
radicalization efforts.
• There is a significant need to enhance
collection and information-sharing between
law enforcement and the corrections
community & the public.
• There are a number of impediments to
information sharing.
OUR PROJECT GOALS
Maintaining Membership to:The Board of Directors
Identify and address impediments to information/intelligence sharing.
Identify/review case law, studies and promising practices, standard operating procedure’s, points of authority
Encourage development of partnership agreements between corrections, law enforcement agencies & organizations that collect/forward information to the government.
Improve the flow of data and other information to the state & federal government, local law enforcement & corrections authority.
Encourage linkages to networks.
Identify complainants, defendants, respondents, administrative personnel initiatives, rules, regulations, policy.
Learn what collaboration is, & its occurrence’s.
initiate, create a exhaustion of state remedies in 2015 & organizational Workshop.
Identify DOC intelligence officers.
Identify Federal, state and local law enforcement officials, employees, volunteers at/or in the organization, identify, catarogize offender correspondence for official ease of access, make notice of meetings that are closed to the public to all persons interested.
***Implement a NCOC Corrections Survey for 2015***
Over 1100 letters were mailed, emailed ,contacted by phone to the prison directors,state prison staff members & were asked about sexual assault, excessive use of unnecessary use of force, officer on inmate sexual assault.
35 Jurisdictions responded (information is still being collected as of 8/14/15
We found in the jails, prisons, detention centers, youth corrections facilities that have
31 Jurisdictions had dedicated full-time intelligence officers
471 employees dedicated full-time to collecting intelligence/ information, jail & prison institutional mailrooms are information/intelligence collection agencies.
376 with other duties
9 Jurisdictions had a total of 94 intelligence officers monitoring the security threat groups, officers with rank (sgt or above )testify on the validity of the reports sent by these individuals.
duties
5 Jurisdictions had NO intelligence officers.(AK, IA, KS, SD, VT)
The Workshops Identify
Barriers the organization & staff realize on information sharing
Ways to overcome barriers
Types of information that needs to be shared
Laws or regulations that support and hinder
sharing of appropriate information
How successful information sharing consortiums
can be replicated
Models to share information quickly and securely
NCOC Workshop Attendance
NCOC’s prior workshop, the Founder/Executive Director & staff discussed Correctional Intelligence Reports, Counterterrorism, Gangs, and Violent Crime.
A total of 38 people attended, including
(Galveston County only)
13 corrections personnel, (9) citizens
10 Law Enforcement Officers
12 County Corrections Officials
4 County Law Enforcement Officers
FBI-DEA office. Houston/Galveston, Texas
What Corrections has to share/offer
Civil Liberties, Correctional Intelligence, Counterterrorism, Gangs, and Violent Crimes
Institutional Corrections:
Gang intelligence
Security threat groups/recruting info
Terrorism and radicalization efforts
Community Corrections:
Information on friends, relatives, associates
Electronic monitoring tracking
Employment, residences, hangouts
Access to searching of premises & computers without
warrants, not to violate federally protected civil rights
We have found:
Computerization has developed many databases that are
now capable of being researched and cross referenced;
Much of this information is contained in separate databases,
making inter-organizational information sharing very difficult.
Obtain access to sensitive information and relationships between
the community and those held in confinement.
The Corrections Community also gather and share: FYI
X Gang Data.
X Telephone conversations and numbers – can be monitored
and data obtained without warrants.
Who is in custody in real time, escape alerts, Federal lawsuit notifications, justice exchange courts, out of county residence’s,monitoring of narcotics purchases, etc.
Financial transactions (JAYPAY, Western Union data bases)
X Visitation – who comes to see persons of interest
X Staff/offender telephone numbers & data/ information
Social networking sites
Electronic monitoring
Inmate email systems
Identification of wanted subjects
X Gathering and documenting intelligence.
Providing personnel
X Analyzing data/information/mail for indications of terrorist or other criminal activity
[]Community crime mapping/Telephone mapping
X[] Violence in detention, youth facilities mapping
X[] Training in investigations
X[] Personnel who have prior criminal convictions or pending court cases on the docket.
[] Assist in the exploitation of recovered cell phones
NCOC Anti-Gang initiative
A comprehensive report, fact sheets and training materials that: requires the individual to understand the plain facts & seriousness of “Homegrown Terrorism” & the understanding of individuals mental state
[]Providing Gang activity/information to all civilians, local, state and federal agencies in the United States
[]Offering each agency the opportunity to prevent a senseless murder and to organize intelligence/ information on gangs, gang leaders & members, recruiting, gang constitutions,, initiation procedures, gang signs, colors, territories
[]Enable information to be shared on a basis with all agencies/organizations that are part of the “Zero Tolerance” policy
[]Providing the capability to develop professional, long lasting associations with corrections facilities (wardens /staff) employees, officers
(1) Document lessons learned (Read it, Review it, Know it)
(2) Identify all methodologies that can be duplicated, circumvented & eradicated
NCOC Weekly Status Report
Summary of the weeks prior investigations (names ommitted until investigation is concluded) & signed
Highlight the importance of privacy and civil liberties
protections.
conduct a inventory of valid up to date information/data sharing initiatives including:
How to obtain the information needed ?
How staff members respond to giving privileged, Restricted & Confidential data/information to someone outside the organization?
Who is the individual receiving the information & what is he/she going to do with it?
What attachment will be filed with the document,record or information?
What classification is the document,record or information?
[] who & what authorization is the document,record or information under?
{*} ALL INFORMATION/INTELLIGENCE REPORTS MUST HAVE AUTHORIZATION W/ CODE TO BE FORWARDED.