Nationwide Suspicious Activity Reporting Initiative

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States.[1] [2] The Nationwide SAR Initiative (NSI) builds on what law enforcement and other agencies have been doing for years — gathering information regarding behaviors and incidents associated with criminal activity — but without the customary restrictions on collecting data on individuals in the absence of reasonable suspicion or probable cause. The program has established a standardized process whereby SARs can be shared among agencies to help detect and prevent terrorism-related criminal activity. This process is in direct response to the mandate to establish a “unified process for reporting, tracking, and accessing [SARs]” in a manner that rigorously protects the privacy and civil liberties of Americans, as called for in the 2007 National Strategy for Information Sharing (NSIS). [3] Reports of suspicious behavior noticed by local law enforcement or by private citizens are forwarded to state and major urban area fusion centers as well as DHS and the FBI for analysis. Sometimes this information is combined with other information to evaluate the suspicious activity in greater context. The program is primarily under the direction of the US Department of Justice.[2][4]

Background

Suspicious activity is defined in the ISE-SAR Functional Standard (ISE-SAR FS) Version 1.5 [5] as “observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity.” It is important to note that the NSI is a behavior-focused approach to identifying suspicious activity. Factors such as race, ethnicity, national origin, or religious affiliation are NOT considered as factors that create suspicion (except if used as part of a specific suspect description). The behaviors outlined in the ISE-SAR FS were identified by subject-matter experts; validated through implementation in the Los Angeles, California, Police Department and the application of ten years of State and Local Anti-Terrorism Training (SLATT) Program [6] experience; and then adjusted based on input by privacy advocacy representatives. At the completion of this process, in May 2009, the ISE-SAR FS was published, with the entire SAR process anchored on behaviors of suspicious activity, not ethnicity, race, or gender.

The NSI is currently being implemented through a partnership between the national network of fusion centers and key federal agencies that will coordinate with law enforcement officers in their states. This partnership spans the spectrum of customized technology solutions and includes training and the development of comprehensive privacy, civil rights and civil liberties policies at both the federal and fusion center levels. This approach also provides for a decentralized process that respects the state’s unique requirements but maintains national standards that permit the interoperability of information exchanges and the consistent application of a privacy framework, and is consistent with the allocation of responsibilities to the 72 designated State and major urban area fusion centers.

On December 17, 2009, the U.S. Department of Justice was named the Executive Agent to establish and operate the Program Management Office (PMO) for the NSI, taking on responsibility for coordinating existing resources and managing additional support to further develop and deploy the NSI. In March 2010, the PMO was established within the Bureau of Justice Assistance. [7] This interagency office, led by senior staff from the Bureau of Justice Assistance, Department of Homeland Security (DHS), and Federal Bureau of Investigation (FBI), also coordinates closely with other federal, state, local, and tribal partners.

The goal of the PMO is to facilitate the implementation of the NSI across all levels of government, and assist participating agencies to adopt compatible processes, policies, and standards that foster broader sharing of SARs, while ensuring that privacy and civil liberties are protected in accordance with local, state, and federal laws and regulations. Primary functions of the Program Management Office include advocating on behalf of the NSI, providing guidance to participants at all levels, and coordinating various efforts within the NSI. Given the criticality of privacy and civil liberties issues, the PMO works collaboratively with, and is supported by, the DOJ Privacy and Civil Liberties Office.

NSI Training

To ensure that the behavior-focused approach that is outlined in the ISE-SAR Functional Standard is institutionalized, the NSI created a multifaceted training approach designed to increase the effectiveness of federal, state, local, and tribal law enforcement professionals in identifying, reporting, evaluating, and sharing pre-incident terrorism indicators to prevent acts of terrorism. [2] There are currently three briefings/trainings available through the NSI PMO, with several others under development:

Law enforcement executives play a vital role in ensuring that the SAR process is not only successfully implemented but effectively supported. The SAR Executive Briefings focus on executive leadership, policy development, privacy and civil liberties protections, agency training, and community outreach. Fusion centers, law enforcement professional associations, and additional entities conduct these types of briefings in a variety of venues.

Ensuring that SARs are properly reviewed and vetted is critical to promoting the integrity of information submitted; protecting citizens’ privacy, civil rights, and civil liberties; and successfully implementing the SAR process. The SAR Analytic Role Training focuses on the evaluation of SARs to identify behaviors that may be associated with pre-incident terrorism planning and the process for sharing terrorism-related SARs nationwide. Through this curriculum, analysts and investigators are trained to recognize terrorism-related pre-incident indicators and to validate—based on a combination of knowledge, experience, and available information—whether the behavior has a potential nexus to terrorism and meets criteria for submission. The training is delivered in an eight-hour workshop format.

Frontline law enforcement personnel are trained to recognize behavior and incidents that may indicate criminal activity associated with terrorism. Their routine duties position them to observe and report suspicious behaviors or activities. The SAR Line Officer Training focuses on the critical role line officers have in the effective implementation of the SAR process by identifying and documenting suspicious activity. To efficiently deliver training to a large number of line officers in a timely manner, this training is delivered through a 15-minute CD that has been posted to several online/distance-learning formats.

Privacy, Civil Rights, and Civil Liberties Protections

NSI program administrators claim they are aware of the importance of protecting the personal privacy, civil rights, and civil liberties of all Americans, and in response have developed and implemented a comprehensive NSI Privacy Protection Framework that is required for agencies at all levels of government prior to participation in the NSI.[8] Participating agencies must have an approved privacy policy that specifically addresses the SAR process; applies the protections outlined in the ISE-SAR Functional Standard (Version 1.5) [5] and the ISE Privacy Guidelines; and participate in each of the three training programs described above. The NSI PMO also requires that participating fusion centers have policies that address how the center incorporates applicable state laws, agency rules, and regulations into the sharing of terrorism-related SAR information.

NSI Privacy Protection Framework

The NSI requires each site to consider privacy throughout the SAR process by fully adopting the following NSI Privacy Protection Framework prior to NSI participation:

SAR Vetting Process

A key aspect of the NSI is the SAR vetting process. Before an agency can move SARs from the agency systems to the ISE, two forms of vetting must occur. Supervisors who initially receive a SAR from law enforcement officers, public safety agencies, private sector partners, or citizens must initially review the SAR to determine whether it has a nexus to terrorism and whether it includes the behaviors identified in the ISE-SAR FS.[5] Trained analysts must then analyze the SAR against the behaviors identified in the ISE-SAR FS. Throughout the vetting process, privacy, civil rights, and civil liberties are vigilantly and actively protected through the training that analysts receive and through the system attributes that are a part of the NSI.

Community Outreach

The success of the NSI largely depends on the ability of law enforcement agencies to earn and maintain the public’s trust, which is accomplished through a transparent process that addresses the concerns of citizens and by engaging collaboratively with advocacy groups. To support a fusion center’s efforts to interact with its community, as well as local law enforcement, the NSI Program Management Office (PMO) led the development and participation in the Building Communities of Trust (BCOT) initiative.[9] This initiative is designed to assist fusion centers in engaging community leaders in a dialogue about the center’s functions, including the SAR process, the NSI, and the need for interaction with community leaders. Outreach to advocacy groups has served an essential role in shaping the NSI Privacy Protection Framework and will continue to play an important role in the NSI as it moves forward.

System Attributes

In addition to multiple levels of SAR review by trained personnel, there are system attributes that support privacy protections for the gathering, collection, storage, and sharing of SAR information, such as:

Compliance Verification

The U.S. Department of Justice’s (DOJ) Global Justice Information Sharing Initiative [10] Criminal Intelligence Coordinating Council [11] developed the Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise,[12] which is a compliance verification document, for the purpose of assisting intelligence enterprises in complying with all applicable privacy, civil rights, and civil liberties protection laws, regulations, and policies while sharing appropriate intelligence and information needed to safeguard America.

Criticism

According to an investigation by the Washington Post, this program, "by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing." Reports of suspicious behavior noticed by local law enforcement, or even by private citizens, are forwarded to the program, and profiles are constructed of persons who are merely under suspicion, without adjudicated evidence or reasonable suspicion that a crime is being committed.[4] It has been described as "a vast domestic spying network to collect information on Americans".[13] According to the American Civil Liberties Union, the program's fusion centers "raise very serious privacy issues at a time when new technology, government powers and zeal in the "war on terrorism" are combining to threaten Americans' privacy at an unprecedented level."[14]

In 2005 and 2006, fifty-three individuals involved with peace groups, the anti-death penalty movement, and other causes were improperly added to a terrorist and drug trafficking data base by the Maryland State Police. Former Maryland Attorney General Stephen Sachs said the 14 months of covert police surveillance, which took place in 2005 and 2006, was "not predicated on any information indicating that those individuals or groups had committed or planned any criminal misconduct."[15]

References

  1. "Nationwide SAR Initiative webpage". US Department of Justice. Retrieved December 22, 2010.
  2. 1 2 3 "Overview of the Nationwide SAR Initiative" (PDF). US Department of Justice. Retrieved December 22, 2010.
  3. "2007 National Strategy for Information Sharing". Executive Office of the President of the United States. Retrieved December 22, 2010.
  4. 1 2 Dana Priest and William M. Arkin (December 20, 2010). "Monitoring America: How the U.S. Sees You". CBS News.
  5. 1 2 3 4 "Information Sharing Environment, Suspicious Activity Reporting Functional Standard, version 1.5" (PDF). US Department of Justice. Retrieved December 22, 2010.
  6. "State and Local Anti-Terrorism Training Program webpage". US Department of Justice. Retrieved December 22, 2010.
  7. "'US Department of Justice, Bureau of Justice Assistance webpage". US Department of Justice, Bureau of Justice Assistance. Retrieved December 22, 2010.
  8. "Nationwide SAR Initiative Privacy Briefing webpage" (PDF). US Department of Justice. Retrieved December 22, 2010.
  9. "Building Communities of Trust overview" (PDF). US Department of Justice. Retrieved December 22, 2010.
  10. "DOJ Global Justice Information Sharing Initiative webpage". US Department of Justice. Retrieved December 22, 2010.
  11. "DOJ Global Justice Information Sharing Initiative CICC webpage". US Department of Justice. Retrieved December 22, 2010.
  12. "Nationwide SAR Initiative, Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise" (PDF). US Department of Justice. Retrieved December 22, 2010.
  13. "Government builds vast domestic spying network: report". AFP. December 20, 2010.
  14. "What's Wrong With Fusion Centers - Executive Summary". American Civil Liberties Union. December 5, 2007.
  15. Jennifer Broadwater (April 2, 2009). "'Terrorist is a pretty horrible word'". Howard County Times.

See also

This article is issued from Wikipedia - version of the 12/4/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.