Upload
randolph-warren
View
216
Download
3
Tags:
Embed Size (px)
Citation preview
Community Partnershipsas an Intelligence Resource
Community Partnershipsas an Intelligence Resource
22
Copyright 2005 © Michigan State University
Community Partnership TopicsCommunity Partnership Topics
What do you want to accomplish
Are there special community issues
Are there unique targets Who is the targeted audience Outcomes of the training Who provides the training Structure of the training
Content• Understanding terrorism• What is being done• What can the community do• Business community
Civil liberty issues Challenges in the training Pedagogical tools Resources
33
Copyright 2005 © Michigan State University
Intelligence-Led PolicingIntelligence-Led Policing
Effective intelligence relies on the development and exchange of information
This is not limited to intelligence networks, but includes:• Gathering information from the community• Disseminating appropriate information to the
community
44
Copyright 2005 © Michigan State University
National StandardsNational Standards
Establishing relationships and providing awareness programs to citizens in order to facilitate citizen reporting of information for the intelligence cycle are recommended in the:• National Criminal Intelligence Sharing Plan• Office of Domestic Preparedness Guidelines for
Homeland Security The Office of Community Oriented Policing Services
(COPS) has also funded citizen awareness pilot programs
55
Copyright 2005 © Michigan State University
What Do You Want to AccomplishWhat Do You Want to Accomplish
Fear reduction Develop volunteers Resolve community tensions Give citizens information about terrorism
indicators to aid in prevention Activate the community
66
Copyright 2005 © Michigan State University
Special Community ConsiderationsSpecial Community Considerations
Special community issues• Large Islamic population• History of activity by racist groups• New immigrants that make residents uneasy• Past attacks in community that have made community
tense Unique targets
• Genetics research facility• Large Jewish community• Livestock food processing facility• Environmentally controversial industries
77
Copyright 2005 © Michigan State University
Who Is the Targeted AudienceWho Is the Targeted Audience
General community – whoever wants to attend Students (college, high school, middle school) Business community Civic and church groups Graduates of the Citizens
Police Academy Non-law enforcement
government employees Elected officials Volunteer groups Senior citizens
88
Copyright 2005 © Michigan State University
Outcome of the TrainingOutcome of the Training
Regardless of the targeted audience, the result of the training should give them…• New knowledge/information• Resources to fulfill their needs
Participants must “take something away” from the training
99
Copyright 2005 © Michigan State University
Structure of the Community TrainingStructure of the Community Training
Typically two hours maximum with break• Do not cut off
spontaneous discussion if it exceeds two hours
Must include “Q and A” Explain everything
• No “jargon”• Explain acronyms (e.g.,
JTTF, TTIC, etc.)
Assume lowest common denominator of knowledge
Avoid “doom and gloom” scenarios
Be honest in assessments and responses – not just “PR” answers
Develop the attitude of preparedness, not paranoia
1010
Copyright 2005 © Michigan State University
Structure of the Community TrainingStructure of the Community Training
Provide an ability for citizens to “follow-up” if they have questions after the training session is over
Consider multiple sessions of training in order to cover all issues of concern to the different communities
Each training program should include four elements:• Know how to observe• Know what is suspicious• Know how to report• Know what happens next
1111
Copyright 2005 © Michigan State University
Content: Understanding TerrorismContent: Understanding Terrorism
What is terrorism (defined/explained) Why people commit terrorist acts Perspectives of terrorism
• Asymmetric warfare• An act of terror is defined by the victim
How terrorism can touch your community• As a target• Logistics and support provided to
terrorists• Activities that fund terrorist
organizations
1212
Copyright 2005 © Michigan State University
Content: What is Being DoneContent: What is Being Done
National Level• National threat assessment
by FBI• FBI re-prioritized and re-
organized to aid state, local and tribal law enforcement
• Department of Homeland Security
• New preparedness resources for local emergency services
• National Incident Management System (NIMS)
State, local and tribal level• Participation in Joint
Terrorism Task Forces (JTTF)
• New anti-terrorism training (SLATT)
• New communications and information sharing (ATIX, RISS, LEO) give local law enforcement more access
• New state and local initiatives (have a local law enforcement speaker explain)
1313
Copyright 2005 © Michigan State University
Content: What Can the Public DoContent: What Can the Public Do
Keep informed to know what to look for and report to the police• To accomplish this, local law
enforcement must be prepared for information sharing
Be aware, yet be fair• Be cognizant of threats, but
avoid stereotyping and hyperbole
Explain what “being vigilant” means
Information on how to protect family http://www.ready.gov• Safety checklist• Communications information• What “awareness” means• Explain the Alert System• How to help children cope with
fear• Safety issues• Equipment and resource
checklist Understand the Homeland
SecurityAdvisory System and its effect
1414
Copyright 2005 © Michigan State University
Content: What Can the Public DoContent: What Can the Public Do
Information on how to talk/deal with children regarding terrorism• http://www.ed.gov/admins/lead/safety/emergencyplan/index.html• http://www.fema.gov/kids/• http://www.atf.gov/kids/index.htm
Volunteer (VIPS, CERT, etc.)• http://www.citizencorps.gov/programs/cert.shtm• http://www.policevolunteers.org/• Austin, TX Citizen’s Battalion Model
http://www.ci.austin.tx.us/police/civildb.htm
1515
Copyright 2005 © Michigan State University
Content: Business CommunityContent: Business Community
Enlist support/cooperation for infrastructure protection• 85% of critical infrastructure
owned by private sector Use training to
• Network and develop critical contacts
• Learn new resources, expertise, opportunities
• Learn new problems, potential targets
• Plant the seeds for commitment by businesses
Exchange of information can help in• Threat assessments• Target vulnerabilities
Enlist support for target hardening of potential terrorist targets• Examples: animal research
facility; abortion clinics; etc. Enlist assistance for
information related to terrorism indicators• Examples: suspicious
purchases of explosives or ammonia; observations of delivery/service workers, etc.
1616
Copyright 2005 © Michigan State University
Understand Civil Liberty IssuesUnderstand Civil Liberty Issues
Be prepared to answer questions about civil rights issues• Can the FBI look at the library books I’ve checked out?• Can the police keep records about me?• How much surveillance and information collection are
the police doing with respect to “average citizens”?• Are the police using racial profiling?
Other issues about specific local controversies may be asked
Expect critics to be in a public session
1717
Copyright 2005 © Michigan State University
Challenges in TrainingChallenges in Training
Accept that terrorism could touch your community• As a target• Through logistics supporting terrorist activity• Through fundraising efforts in your community
Taking action and sustaining action by community members and businesses
1818
Copyright 2005 © Michigan State University
Meeting the ChallengesMeeting the Challenges
Use of techniques to “personalize” the threat• Maps• Local anecdotes
Use analogies that audience understands Elicit comments from community members and
integrate this into discussion
1919
Copyright 2005 © Michigan State University
Pedagogical Tools for ContentPedagogical Tools for Content
Model for explaining terrorist groups• Motives• Methods• Targets
Outcomes/actions produced from training• Prevention• Mitigation (target hardening)• Apprehension
2020
Copyright 2005 © Michigan State University
Preparing Your ProgramPreparing Your Program
Research• Learn about local issues• Learn about community concerns
Study• Become familiar with the materials• Information should be “second nature”
Modify• Make the program “local”• Make the program “your own”
2121
Copyright 2005 © Michigan State University
ResourcesResources
FBI Counterterrorism• http://www.fbi.gov/
Office of Domestic Preparedness • http://www.ojp.usdoj.gov/odp
2222
Copyright 2005 © Michigan State University
ResourcesResources
“United for a Stronger America” from the National Crime Prevention Council• http://www.weprevent.org
Terrorism Answers• http://www.terrorismanswers.com
QUESTIONS and COMMENTSQUESTIONS and COMMENTS