The University of North Carolina at Greensboro
Police Department
General Order 3-1.4
Criminal Intelligence Collection
Intelligence Operations
Information gathering is a fundamental and essential element in the all-encompassing duties of any law enforcement agency. Intelligence information is defined as activity related to criminal conduct and other activities that present a potential threat to the community. Areas of concern may include organized crime, vice, illegal drug trafficking, terrorism, gangs, and civil disorders. While information gathered for intelligence purposes may result in or be the result of enforcement action, the intelligence gathering function is meant to be a central collection of information for the department's operational units.
When acquired, information is used to prevent crime, pursue and apprehend offenders, and obtain evidence necessary for conviction. It is the policy of this agency to gather information directed toward specific individuals or organizations reasonably suspected of criminal activity, to gather it with due respect for the rights of those involved, and to disseminate it only to authorized individuals.
Definitions
Criminal Intelligence – Information compiled, analyzed, and/or disseminated in an effort to anticipate, prevent, or monitor criminal activity.
Strategic Intelligence – Information concerning existing patterns or emerging trends of criminal activity designed to assist in criminal apprehension and crime control strategies, for both short- and long-term investigative goals.
Tactical Intelligence – Information regarding a specific criminal event that can be used immediately by operational units to further a criminal investigation, plan tactical operations and provide for officer safety.
Subversive Activity – Any overt or covert activity practiced by groups or associations of persons to achieve goals that are usually contrary and detrimental to the welfare of the community. Such activities often embrace or adopt resolutions to overthrow established political governments and to intimidate or harass ethnic, racial, and religious groups through the use of terrorist acts, civil disorder, or other illegal methods.
Terrorism – Terrorism involves calculated use of violence or threats of violence to attain goals that are political, religious, or ideological in nature. This can be done through intimidation, coercion, the use of violence, or by instilling fear. Terrorism includes a criminal act against persons or property that is intended to influence an audience beyond the immediate victims.
Civil Disorder – Overt acts of defiance by groups or associations of persons, usually against established laws and rules of order; these acts can result in spontaneous outbreaks of violence resulting in personal injuries and loss of property.
Informational Sources
Any officer can submit intelligence information for review by filling out an Intelligence Report Form. In addition, the Support Services Commander will ensure that information from field interviews, investigative reports, arrest reports, and other available sources will be analyzed for relevance to the intelligence gathering function.
Submission of Criminal Intelligence Information
Any employee of the department may submit information concerning organized crime, vice, illegal drug trafficking, terrorism, gangs, and civil disorders, as well as informant information. All such information should be submitted using an Intelligence Report Form.
The collection of information that has no operational value is prohibited. Information will not be gathered or retained solely:
For interest purposes
On the basis of an individual's religion or political affiliations
Because a person supports unpopular causes
Because of a person's ethnicity or race
Responsibility for Intelligence Files
The Support Services Commander is responsible for the maintenance and security of the department's intelligence files. The commander may assign a subordinate to maintain files in an appropriate and secure manner. While criminal intelligence may be assigned to specific personnel within the agency, all members of this agency are responsible for reporting information that may help to identify criminal conspirators and perpetrators.
Dissemination of Information
The Support Services Commander or a designee is responsible for ensuring the legality and integrity of collected intelligence information, with dissemination allowed only to authorized law enforcement officers or agencies on a need-to-know basis.
Collection and submission of intelligence will be accomplished by entering the pertinent information via the records management system and informing the Support Services Commander or designee that new information has been obtained and documented.
Information developed through intelligence will be provided by the Support Services Commander or designee to other members of the department when necessary to increase the effectiveness of enforcement and deterrence efforts. Personnel provided such information will report the information's value, timeliness, and any action taken or recommended. Such report will be maintained in an intelligence file.
Dissemination of information to other members of the department or to other law enforcement agencies will be on a need-to-know basis.
Purging of Information
The Support Services Commander or designee will annually review and purge information stored in the criminal intelligence files to ensure that the file is current, accurate, and relevant to the needs and objectives of the agency. Inaccurate information may be purged upon authorization of the Support Services Commander.
The annual review will be based on the following criteria:
Continued usefulness of the information
Current status of the information
Reliability of the information
Availability of related information
Availability of the information source
Adequacy of the information for identification purposes
Relevancy of the information to police needs
Maintenance of Specialized Equipment
The Support Services Commander or an assigned designee will be responsible for maintaining specialized audio and visual monitoring equipment. Specialized equipment may be assigned to departmental units or other law enforcement agencies at the direction of the Support Services Commander. All specialized equipment will be accounted for and signed out according to departmental procedure. The Support Services Commander will ensure that personnel being assigned specialized equipment are trained in its safe, effective, and legal use.
Departmental equipment and personnel will be used only in conjunction with intelligence-gathering activity authorized by command and/or supervisory personnel and in full compliance with all laws. Personnel will take steps to avoid the indiscriminate collection or distribution of information.
Legal and Privacy Requirements
Dissemination to, and communication with, other law enforcement agencies is authorized in cases where intelligence information appears credible and will benefit an ongoing investigation. Information will be gathered relative only to legitimate investigative objectives relating to the control and prevention of criminal conduct and will be used only for lawful police purposes.
Training of Personnel
For the intelligence process to be fruitful, the correct protections of records, dissemination of information, and review and purging of records is imperative. In order to accomplish this, the department will train all sworn department personnel on an annual basis through either a roll-call based session or via the department's PowerDMS site.
Reporting and Relaying Information
Any officer who observes suspicious activity believed to be linked to possible terrorism shall submit an incident report. The officer shall alert the Support Services Commander for immediate review and assignment. The Criminal Investigations Unit shall then share the information with outside agencies and/or initiate additional internal investigation as appropriate.
If an officer or other employee feels that there is an urgency involved, the on-duty patrol supervisor will be contacted for guidance as to whether a federal or state agency should be immediately notified and/or the Incident Command System be implemented to control a situation.
Liaison for the Exchange of Information
North Carolina has established an Information Sharing and Analysis Center (ISAAC) through the U.S. Department of Homeland Security. ISAAC allows for the exchange of critical information among local, state, and federal law enforcement, fire, EMS, and others responsible for the health, safety, and security of North Carolina. A member of the UNCG PD Criminal Investigations Unit is assigned as a Field Liaison Officer (FLO) with NC ISAAC.
Terrorism Awareness
The Support Services Commander will be responsible for incorporating information on the importance of reporting suspicious activity and terrorism awareness to both community and business groups through established crime prevention programs.
Any release of information involving possible terrorist activity will be processed in accordance with directives established in the "Public Information" section of this policy manual.
Advisory System Alert Codes
The North Carolina Security Advisory System is coordinated with the Federal Homeland Security Advisory System and provides a means to inform the citizens of North Carolina of the relative level of threat of a terrorist act and is comprised of the following five threat conditions or levels.
Severe Condition (Red) – A severe condition reflects that a terrorist attack has occurred or that an attack is imminent.
High Condition (Orange) – This condition is declared when there is a high risk of a terrorist attack.
Elevated Condition (Yellow) – This condition is declared when there is a significant risk of a terrorist attack.
Guarded Condition (Blue) – This condition is declared when there is a general risk of a terrorist attack.
Low Condition (Green) – This condition is declared when there is a low risk of a terrorist attack.