SlideShare ist ein Scribd-Unternehmen logo
1 von 11
INTRADEPARTMENTAL CORRESPONDENCE
January 23, 2015 BPC #15-0015
1.0
TO: The Honorable Board of Police Commissioners
FROM: Inspector General, Police Commission
SUBJECT: REVIEW OF SUSPICIOUS ACTIVITY REPORTS, FISCAL YEAR 2013/2014
RECOMMENDED ACTION
REVIEW and APPROVE the Office of the Inspector General’s (OIG) Review of Suspicious
Activity Reports (SARs), Fiscal Year 2013/2014.
DISCUSSION
The OIG reviewed all 215 SARs collected by the Department during Fiscal Year 2013/14.
Fifty-four (54) of these SARs were unfounded by the Department and 161 were sent to the federal
government for sharing with other law enforcement organizations. The primary review objective
was to determine if each SAR sent to the federal government reflected a behavior or activity
reasonably indicative of pre-operational planning or intelligence gathering related to terrorism or
other criminal activity.
I am available to provide any information the Police Commission may require.
E-Copy – Original Signature on File with the Police Commission
ALEXANDER A. BUSTAMANTE
Inspector General
Police Commission
Attachment
Conducted by the
Conducted by the
OFFICE OF THE INSPECTOR GENERAL
REVIEW OF
SUSPICIOUS ACTIVITY REPORTS,
FISCAL YEAR 2013/2014
LL OO SS AA NN GG EE LL EE SS PP OO LL II CC EE CC OO MM MM II SS SS II OO NN
January 23, 2015
ALEXANDER A. BUSTAMANTE
Inspector General
TABLE OF CONTENTS
I. INTRODUCTION ...................................................................................................................1
II. REVIEW OF SARs ..................................................................................................................2
Table No. 1 – Types of Officer Contacts with Involved Persons ............................................2
Table No. 2 – Primary Activities Identified in Affirmed SARs...............................................3
Chart No. 1 – Race/Ethnicity & Gender of Named IPs for SARs Sent to JRIC .....................3
Chart No. 2 – Race/Ethnicity & Gender of IPs for Unfounded SARs ....................................4
III. ISSUES ....................................................................................................................................4
Six SARs Should Have Been Unfounded.................................................................................4
Five SARs Had the Incorrect Activity Type Identified ............................................................5
IV. PRIOR RECOMMENDATIONS ............................................................................................5
Recommendation No.1 .............................................................................................................5
Recommendation No. 2 ............................................................................................................6
V. RECOMMENDATION............................................................................................................6
VI. DEPARTMENT RESPONSE ..................................................................................................6
APPENDICES
APPENDIX A – 16 ACTIVITY TYPES IDENTIFIED IN SPECIAL ORDER NO. 17-2012 ..........................a
APPENDIX B – GEOGRAPHIC DISTRIBUTION MAP OF THE 161 SARS SENT TO JRIC.......................b
REVIEW OF SUSPICIOUS ACTIVITY REPORTS
FISCAL YEAR 2013/2014
I. INTRODUCTION
The United States Government in 2009 established the Nationwide Suspicious Activity
Reporting (SAR) Initiative in response to the findings of the 9/11 Commission. The purpose of
the SAR Initiative is to foster the sharing of SARs across all levels of government. In August
2012, the Los Angeles Police Department (Department) issued Special Order No. 17-2012
revising existing guidelines for the collection of SARs.1
The Department guidelines are based
on existing federal guidelines.2
Police officers or community members can initiate a SAR when they directly observe or
otherwise become aware of a suspicious activity or behavior. A community member can report
that activity or behavior directly to an officer in the field or at an Area station, submit
information via the internet, or call the Department hotline.3
In an effort to educate the public on
suspicious activity reporting, the Department created a community awareness program called
iWatchLA.4
This program is designed to educate community members on the behaviors and
activities that may have connections to terrorism.
In most cases, SARs are initiated by community members who contact their local Area station
and notify a police officer of the suspicious activity or behavior. The officer then completes a
report following the instructions of the Special Order. The Area watch commander (WC) then
reviews the report to determine if the information obtained warrants a SAR designation. If the
WC determines that a SAR is appropriate, the “paper” SAR is faxed or mailed to Major Crimes
Division (MCD), with no copies retained at the Area.5
The MCD enters all SAR data into the Department’s Palantir system.6
The MCD then analyzes
the SAR and determines whether to unfound or affirm the SAR. Two conditions must be present
for MCD to affirm a SAR. First, the observed activity must be “reasonably indicative of
intelligence gathering or pre-operational planning related to terrorism or other criminal
activity.”7
Second, the activity must be one (or more) of 16 specific activities identified in the
Special Order.8
1
Department Special Order No. 17-2012, “Reporting Suspicious Activity Potentially Related to Foreign or Domestic Terrorism -
Revised; and Suspicious Activity Report Notebook Divider, Form 18.30.03 - Revised” (Aug. 28, 2012), first published March 5,
2008, as Special Order No. 11, “Reporting Incidents Potentially Related to Foreign or Domestic Terrorism.”
2
See Nationwide SAR Initiative at nsi.ncirc.gov.
3
The internet URL for reporting is http://www.lapdonline.org/iwatchla/content_basic_view/52267. The LAPD Hotline is
877-LAPD-247 (877-527-3247).
4
http://lapdonline.org/iwatchla.
5
MCD resides within the Department’s Counter-Terrorism and Special Operations Bureau.
6
Palantir is a computerized “platform,” or combination of hardware and software, that collects and organizes data. For additional
information, see www.palantir.com/solutions/law-enforcement.
7
See Special Order (S.O.) No. 17-2012.
8
See Appendix A for definitions of the 16 activity types (based on activities identified by the National SAR Initiative).
Review of Suspicious Activity Reports
Page 2
All SARs which MCD affirms are digitally sent to the Joint Regional Intelligence Center (JRIC),
which then shares the information with other law enforcement agencies.9
All SARs which MCD
unfounds are purged from Palantir and are not digitally sent to JRIC.
Working copies of the affirmed paper SARs are secured in a locked file cabinet at MCD for two
years. Then the working copies are sent to Iron Mountain off-site storage for three years, until
destroyed. Originals of the affirmed paper SARs are sent monthly to Records and Identification
Division (R&I), where they are secured in a locked file cabinet for two years. Then the originals
are sent to Iron Mountain off-site storage for three years, until destroyed.
The unfounded paper SARs (both working copies and originals) are secured in a locked file
cabinet at MCD for one year or until reviewed by the OIG, and then destroyed.10
II. REVIEW OF SARs
The OIG reviewed all 215 SARs collected by the Department during Fiscal Year 2013/14.11
Of
those 215 SARs, 175 (81%) were initiated by community members and 40 (19%) were initiated
by officers. Also, of those 215 SARs, 50 (23%) resulted in officer contact with an involved
person (IP).12
Those 50 SARs are categorized in the table below by the type of officer contact.
Table No. 1 – Types of Officer Contacts with Involved Persons
Type of Officer Contact with IP No. of SARs % of Total
Traffic Stop/Detention13
20 40%
Arrest13
11 22%
Consensual Encounter 7 14%
Pedestrian Stop/Detention13
5 10%
Officer Response to Radio Call 3 6%
Officer Response to Traffic Collision 2 4%
Detention for Mental Evaluation Hold 2 4%
Total 50 100%
The OIG reviewed each of these 50 officer-contact SARs and identified no constitutionally-
related issues.
9
JRIC is collaboration between federal, state, and local law enforcement and public safety agencies. JRIC collects, analyzes, and
disseminates threat intelligence. The JRIC Norwalk, CA facility serves Los Angeles County and six surrounding counties. For
additional information, see https://www.jric.org.
10
This procedure, to destroy unfounded paper SARs after one year or until reviewed by the OIG, was established after the prior
OIG review.
11
FY 2013/14 is July 1, 2013, to June 30, 2014.
12
In 10 instances, an officer had contact with an IP after the community member notified police of the suspicious activity.
13
The suspicious activity was observed or surmised during the detention or arrest but was not the reason for the detention or
arrest. As an example, an officer made a traffic stop for a Vehicle Code violation and then observed something suspicious inside
the vehicle. As another example, a person was arrested for trespassing on private property, and their reason for being on the
property was considered suspicious.
Review of Suspicious Activity Reports
Page 3
The MCD sent 161 affirmed SARs to JRIC and unfounded 54 SARs.14
The 161 affirmed SARs
are categorized in the table below by primary activity type.
Table No. 2 – Primary Activities Identified in Affirmed SARs
Primary Activity No. of SARs % of Total
Expressed or Implied Threat 46 29%
Misrepresentation 26 16%
Observation/Surveillance 21 13%
Photography 20 12%
Testing/Probing of Security 13 8%
Breach/Attempted Intrusion 10 6%
Other Activity 25 16%
Total 161 100%
Of the 161 affirmed SARs sent to JRIC, 99 included information on 109 named involved
persons, categorized in the chart below by race/ethnicity and gender.
Chart No. 1 – Race/Ethnicity & Gender of Named IPs for SARs Sent to JRIC
14
See Appendix B for a geographic distribution (“pin”) map of the 161 SARs sent to JRIC.
Review of Suspicious Activity Reports
Page 4
Of the 54 unfounded SARs, 41 had 46 IPs categorized in the chart below by race/ethnicity and
gender.15
Chart No. 2 – Race/Ethnicity & Gender of IPs for Unfounded SARs
III. ISSUES
Six SARs Should Have Been Unfounded
The OIG found no issues with 209 (97%) of the 215 SARs either affirmed or unfounded. For
only 6 of the 161 SARs affirmed, the OIG believes the SAR should have been unfounded. In
each of these 6 cases, the OIG concurred with MCD that the activity was of concern but
disagreed as to one specific aspect of each case. These 6 SARs are briefly summarized below:
Three SARs resulted from traffic stops for Vehicle Code violations where the IP drivers
identified themselves as members of possible suspected terrorist groups.16
In each stop, the
IP initially attempted to present a non-legitimate form of identification but also subsequently
provided valid identification (e.g., California Driver License). The MCD affirmed each SAR
as a “Misrepresentation.” Because the IP did present valid identification, the OIG believes
there was no actual misrepresentation, even though the initial presentation of non-legitimate
identification would be of concern to a police officer.17
15
The OIG verified that the personal identifying information of all 46 IPs was purged from Palantir.
16
Two drivers were described on the SAR as “Male Black” and one as “Male White.”
17
Misrepresentation is “presenting false or misusing insignia, documents, and/or identification to misrepresent one’s affiliation to
cover possible illicit activity. Impersonation of any authorized personnel (e.g., police, security, or janitor),” (Special Order 17-
2012).
Review of Suspicious Activity Reports
Page 5
Two SARs resulted from traffic stops for Vehicle Code violations where the IP drivers were
found to be on the Terrorist Watchlist.18,19
The officers created SARs which MCD affirmed
and forwarded to JRIC. The OIG agreed that being named on the Watchlist would be a
concern to a police officer but is not one of the specific 16 categories required for a SAR to
be affirmed.
For one SAR, a citizen reported that an unnamed IP espoused a violent extremist philosophy
and support of terrorist attacks reported in the news, but the IP did not make any specific
threats.20
The citizen reported the SAR, which MCD affirmed and forwarded to JRIC. The
OIG noted that espousing violent extremist philosophy or generalized support of terrorism is
not one of the specific 16 categories required for a SAR to be affirmed.21
Five SARs Had the Incorrect Activity Type Identified
As a lesser procedural issue, the OIG determined that 5 (3%) of the 161 SARs MCD sent to JRIC
had the incorrect activity type identified. That is, while the OIG agreed that the behavior or
activity was correctly affirmed as a SAR, the activity was better classified as one of the other 15
activities rather than the original activity chosen.
IV. PRIOR RECOMMENDATIONS
On March 12, 2013, the OIG presented its first report on the Department SAR process to the
Board of Police Commissioners. That report included two recommendations, which are
recounted here to verify what action the Department took in response.
Recommendation No. 1
The OIG recommends that the Department ensure that all SAR reports thoroughly describe the
facts and circumstances surrounding any contact with an individual. The OIG also recommends
that all Department personnel reviewing these SARs focus on the circumstances related to the
contact to ensure that all contacts are constitutional.
Status: Closed. The OIG generally noticed more detail in the narratives for the FY 2013/14
SARs and more articulation as to why or how officer contact was made with involved persons.
The narratives articulated that any detentions or arrests were for the underlying criminal activity
(e.g., traffic code violation or trespassing) and not for the suspicious [non-criminal] activity.
18
Both drivers were described on the SAR as “Male Other.”
19
The Terrorist Screening Center of the National Security Branch of the Federal Bureau of Investigation maintains the Watchlist,
which is “a single database of identifying information about those known or reasonably suspected of being involved in terrorist
activity.” For additional information, see www.fbi.gov/about-us/nsb/tsc.
20
The unnamed IP was described on the SAR as “Male Other.”
21
The Special Order notes that activities “generally protected by the First Amendment to the United States Constitution . . .
should not be reported in a SAR.” In this case, the IP did not make a spoken threat “reasonably indicative of intelligence
gathering or pre-operational planning related to terrorism or other criminal activity.”
Review of Suspicious Activity Reports
Page 6
Recommendation No. 2
The OIG recommends that the Department maintain all SARs in a secure location and restrict
access to these reports. The Department should record each time these documents are viewed.
This recording log should include the time and date the documents were accessed, the
individuals viewing these documents, and a detailed reason for examining these documents.
These controls should be maintained in such a manner as to allow for periodic auditing by the
OIG and Department auditors.
Status: Closed. The OIG found adequate security over the paper SARs. As previously stated,
the affirmed paper SARs are secured in locked file cabinets at both MCD (working copies) and
R&I (originals) for two years, until sent to Iron Mountain and later destroyed. The unfounded
paper SARs are secured in a locked file cabinet at MCD for one year or until reviewed by the
OIG and then destroyed. The MCD management attested that the OIG auditors are the only
outsiders who have accessed and examined the paper SARs. Management also attested that,
internally, the paper SARs at both MCD and R&I have only been accessed and examined by five
MCD officers: the captain and lieutenant, the two detectives assigned to the SAR unit, and the
compliance officer.
V. RECOMMENDATION
The OIG recommends that collaboration and review occur to ensure that MCD’s improvements
to and revisions of the SAR process continue. In this report, the OIG noted improvements to the
process, which serve to enhance constitutional privacy protections while promoting the goal of
coordinating information about potential terrorism-related activity.
VI. DEPARTMENT RESPONSE
The Commanding Officer (C/O) of MCD concurred with the recommendations by the Office of
the Inspector General. In furtherance of the implementation of the recommendations, the C/O
addressed each below reported issue and the related action the Department will take.
In response to the SARs that should have been unfounded due to misrepresentation and
espousing violent extremist philosophy, MCD has unfounded the SARs and has notified the
JRIC. Major Crimes Division has also implemented additional oversight and training to
Department personnel in the deficient areas to ensure compliance with Special Order No. 17-
2012.
In response to the two SARs relating to the Terrorist Screening Center WatchList hits, MCD has
provided additional oversight and training to Department personnel. The Department has also
developed a Department Notice, dated November 12, 2014, to address TSC matters.
page a
APPENDIX A - 16 ACTIVITY TYPES IDENTIFIED IN SPECIAL ORDER NO. 17-2012
Criminal Activity and Potential Terrorism Nexus Activity (7)
• Breach/Attempted Intrusion. Unauthorized individuals attempting to or actually entering a
facility/infrastructure or protected site;
• Misrepresentation. Presenting false or misusing insignia, documents, and/or identification to
misrepresent one’s affiliation to cover possible illicit activity. Impersonation of any authorized
personnel (e.g., police, security, or janitor);
• Theft/Loss/Diversion. Stealing or diverting (obtaining or acquiring) something associated with a
facility/infrastructure (e.g., badges, uniforms, identification, emergency vehicles, technology or
documents [classified or unclassified], which are proprietary to the facility);
• Sabotage/Tampering/Vandalism. Damaging, manipulating, or defacing part of a
facility/infrastructure or protected site;
• Cyber Attack. Compromising or attempting to compromise or disrupt an organization’s information
technology infrastructure;
• Expressed or Implied Threat. Communicating a spoken or written threat to damage or compromise a
facility/infrastructure, protected site, and cyber attacks; or,
• Aviation Activity. Operation or attempted operation of an aircraft in a manner that reasonably may be
interpreted as suspicious or posing a threat to people, buildings/facilities, infrastructures, or protected
sites. Such operation may or may not be a violation of Federal Aviation Administration regulations.
Potential Criminal or Non-Criminal Activity Requiring Additional Fact Information During an
Investigation (9)
• Eliciting Information. Questioning individuals at a level beyond mere curiosity about particular facets
of a facility’s or building’s purpose, operations, security procedures, etc., that would arouse suspicion in
a reasonable person;
• Testing or Probing of Security. Deliberate interactions with, or challenges to, installations, personnel,
or systems that reveal physical, personnel, or cyber security capabilities;
• Recruiting. Building of operations teams and contacts, personal data, banking data, or travel data;
• Photography. Taking pictures or videos of facilities/buildings, infrastructures, or protected sites in a
manner that would arouse suspicion in a reasonable person. Examples include taking pictures or videos
of ingress/egress, delivery locations, personnel performing security functions (e.g., patrol,
badge/vehicle checking), security-related equipment (e.g., perimeter fencing, security cameras), etc.;
• Observation/Surveillance. Demonstrating unusual interest in facilities/buildings, infrastructures, or
protected sites beyond mere casual or professional (e.g., engineers) interest, such that a reasonable
person would consider the activity suspicious. Examples include observations through binoculars,
taking notes, attempting to measure distances, etc.;
• Materials Acquisition/Storage. Acquisition and/or storage of unusual quantities of materials such as
cell phones, pagers, fuel, chemicals, toxic materials, and timers, such that a reasonable person would
consider the activity suspicious;
• Acquisition of Expertise. Attempts to obtain or conduct training in security concepts, military
weapons or tactics, or other unusual capabilities such that a reasonable person could consider the
activity suspicious;
• Weapons Discovery. Discovery of unusual amounts of weapons, explosives, or their components that
would arouse suspicion in a reasonable person; or,
• Sector-Specific Incident. Actions associated with a characteristic of unique concern to specific sectors
(such as the public health sector) with regard to their personnel, facilities, systems, or functions.
Note: These 9 behaviors/activities are generally protected by the First Amendment to the United States
Constitution and should not be reported in a SAR, absent articulable facts and circumstances that
support suspicion that the behavior observed is not innocent, but rather reasonably indicative of
criminal activity associated with terrorism, including evidence of pre-operational planning related to
terrorism. Race, ethnicity, national origin, or religious affiliation should not be considered as factors
that create suspicion (although these factors may be used as specific-involved person descriptors).
page b
APPENDIX B – GEOGRAPHIC DISTRIBUTION MAP OF THE 161 SARS SENT TO JRIC

Weitere ähnliche Inhalte

Ähnlich wie Los Angeles Review of Suspecious Activity Reports

Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
nettletondevon
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
Tiffany Surratt
 
Predictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-PolicingPredictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-Policing
Martin Smith
 
Al-Shahery_-_Iraq_english
Al-Shahery_-_Iraq_englishAl-Shahery_-_Iraq_english
Al-Shahery_-_Iraq_english
Omar Al-Shahery
 
Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636
AnonDownload
 
Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636
RepentSinner
 

Ähnlich wie Los Angeles Review of Suspecious Activity Reports (20)

Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
Crime In Virginia_2012 State Police Report
Crime In Virginia_2012 State Police ReportCrime In Virginia_2012 State Police Report
Crime In Virginia_2012 State Police Report
 
Kyrgyzstan Mutual Evaluation Ratings - 2018
Kyrgyzstan Mutual Evaluation Ratings - 2018Kyrgyzstan Mutual Evaluation Ratings - 2018
Kyrgyzstan Mutual Evaluation Ratings - 2018
 
Report on fraud and waste hotline - June 20 2016
Report on fraud and waste hotline - June 20 2016Report on fraud and waste hotline - June 20 2016
Report on fraud and waste hotline - June 20 2016
 
Analysis of npf complaints response unit's reports
Analysis of npf complaints response unit's reportsAnalysis of npf complaints response unit's reports
Analysis of npf complaints response unit's reports
 
Trends And Aspects Of Policing Models
Trends And Aspects Of Policing ModelsTrends And Aspects Of Policing Models
Trends And Aspects Of Policing Models
 
0. Lecture Series on PNP MC 2018-050.pdf
0. Lecture Series on PNP MC 2018-050.pdf0. Lecture Series on PNP MC 2018-050.pdf
0. Lecture Series on PNP MC 2018-050.pdf
 
Ci ch 3
Ci ch 3Ci ch 3
Ci ch 3
 
Hawaii Supreme Court Majority Opinion Police Misconduct
Hawaii Supreme Court Majority Opinion Police MisconductHawaii Supreme Court Majority Opinion Police Misconduct
Hawaii Supreme Court Majority Opinion Police Misconduct
 
mer-ratings-key-findings
mer-ratings-key-findingsmer-ratings-key-findings
mer-ratings-key-findings
 
Predictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-PolicingPredictive-Preventative-or-Intelligence-Led-Policing
Predictive-Preventative-or-Intelligence-Led-Policing
 
Predictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policingPredictive preventative-or-intelligence-led-policing
Predictive preventative-or-intelligence-led-policing
 
Annual report-of-the-chief-surveillance-commissioner-for-2013-2014-laid-4-sep...
Annual report-of-the-chief-surveillance-commissioner-for-2013-2014-laid-4-sep...Annual report-of-the-chief-surveillance-commissioner-for-2013-2014-laid-4-sep...
Annual report-of-the-chief-surveillance-commissioner-for-2013-2014-laid-4-sep...
 
Al-Shahery_-_Iraq_english
Al-Shahery_-_Iraq_englishAl-Shahery_-_Iraq_english
Al-Shahery_-_Iraq_english
 
Audit of the Honolulu Police Department’s Policies, Procedures, and Controls
Audit of the Honolulu Police Department’s Policies, Procedures, and ControlsAudit of the Honolulu Police Department’s Policies, Procedures, and Controls
Audit of the Honolulu Police Department’s Policies, Procedures, and Controls
 
APG Mutual Evaluation Report Pakistan Ratings - October 2019
APG Mutual Evaluation Report Pakistan Ratings - October 2019APG Mutual Evaluation Report Pakistan Ratings - October 2019
APG Mutual Evaluation Report Pakistan Ratings - October 2019
 
Israel Mutual Evaluation Ratings - 2018
Israel Mutual Evaluation Ratings - 2018Israel Mutual Evaluation Ratings - 2018
Israel Mutual Evaluation Ratings - 2018
 
Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636
 
Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636Dhs privacy and civil liberties assessment report on executive order 13636
Dhs privacy and civil liberties assessment report on executive order 13636
 
5. WAPDA Guide Line for enforcing the responsibility for losses 1982.DOC
5. WAPDA Guide Line for enforcing the responsibility for losses 1982.DOC5. WAPDA Guide Line for enforcing the responsibility for losses 1982.DOC
5. WAPDA Guide Line for enforcing the responsibility for losses 1982.DOC
 

Mehr von Dawn Dawson

Legal Authorities for Isolation and Quarantine
Legal Authorities for Isolation and QuarantineLegal Authorities for Isolation and Quarantine
Legal Authorities for Isolation and Quarantine
Dawn Dawson
 
San Diego Performance Audit of the Office of Homeland Security
San Diego Performance Audit of the Office of Homeland SecuritySan Diego Performance Audit of the Office of Homeland Security
San Diego Performance Audit of the Office of Homeland Security
Dawn Dawson
 
Decision Makers Needs Workshop Report
Decision Makers Needs Workshop Report  Decision Makers Needs Workshop Report
Decision Makers Needs Workshop Report
Dawn Dawson
 
Preparedness In America
Preparedness In America Preparedness In America
Preparedness In America
Dawn Dawson
 

Mehr von Dawn Dawson (20)

Situation report Town of Marshfield EMA
Situation report Town of Marshfield EMASituation report Town of Marshfield EMA
Situation report Town of Marshfield EMA
 
L’Enfant Plaza Metro Station Incident
L’Enfant Plaza Metro Station IncidentL’Enfant Plaza Metro Station Incident
L’Enfant Plaza Metro Station Incident
 
Motion to Suspend Jury Selection
Motion to Suspend Jury Selection Motion to Suspend Jury Selection
Motion to Suspend Jury Selection
 
Critical Issues In Disaster Science And Management
Critical Issues In Disaster Science And Management Critical Issues In Disaster Science And Management
Critical Issues In Disaster Science And Management
 
Detectives Interview Owings Mills Woman Shot by Suspect in NYPD Murders
Detectives Interview Owings Mills Woman Shot by Suspect in NYPD MurdersDetectives Interview Owings Mills Woman Shot by Suspect in NYPD Murders
Detectives Interview Owings Mills Woman Shot by Suspect in NYPD Murders
 
Phillipines 4th Quarter 2014 Survey Typhoon
Phillipines 4th Quarter 2014 Survey TyphoonPhillipines 4th Quarter 2014 Survey Typhoon
Phillipines 4th Quarter 2014 Survey Typhoon
 
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
Resource Guide for Enhancing Community Relationships and Protecting Privacy a...
 
DHS Review Fence Jumper Breach White House
DHS Review Fence Jumper Breach White HouseDHS Review Fence Jumper Breach White House
DHS Review Fence Jumper Breach White House
 
Gov Order re: Unlocking Devices
Gov Order re: Unlocking Devices Gov Order re: Unlocking Devices
Gov Order re: Unlocking Devices
 
State of Maine vs Kaci Hickox
State of Maine vs Kaci Hickox State of Maine vs Kaci Hickox
State of Maine vs Kaci Hickox
 
Legal Authorities for Isolation and Quarantine
Legal Authorities for Isolation and QuarantineLegal Authorities for Isolation and Quarantine
Legal Authorities for Isolation and Quarantine
 
US AFRICOM United Shield Ebola
US AFRICOM United Shield EbolaUS AFRICOM United Shield Ebola
US AFRICOM United Shield Ebola
 
UN Use of Foreign Military Civil Defence Assets Ebola Response West Africa
UN Use of Foreign Military Civil Defence Assets Ebola Response West AfricaUN Use of Foreign Military Civil Defence Assets Ebola Response West Africa
UN Use of Foreign Military Civil Defence Assets Ebola Response West Africa
 
Ebola Pre-Deployment Training Military
Ebola Pre-Deployment Training MilitaryEbola Pre-Deployment Training Military
Ebola Pre-Deployment Training Military
 
Public Health Response to Ebola Statement of Dr. Frieden
Public Health Response to Ebola Statement of Dr. FriedenPublic Health Response to Ebola Statement of Dr. Frieden
Public Health Response to Ebola Statement of Dr. Frieden
 
San Diego Performance Audit of the Office of Homeland Security
San Diego Performance Audit of the Office of Homeland SecuritySan Diego Performance Audit of the Office of Homeland Security
San Diego Performance Audit of the Office of Homeland Security
 
CDC - After-Action Report Anthrax Incident
CDC - After-Action Report Anthrax IncidentCDC - After-Action Report Anthrax Incident
CDC - After-Action Report Anthrax Incident
 
Decision Makers Needs Workshop Report
Decision Makers Needs Workshop Report  Decision Makers Needs Workshop Report
Decision Makers Needs Workshop Report
 
Preparedness In America
Preparedness In America Preparedness In America
Preparedness In America
 
Guidelines Mental Health
Guidelines Mental HealthGuidelines Mental Health
Guidelines Mental Health
 

Kürzlich hochgeladen

一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
F La
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 

Kürzlich hochgeladen (20)

一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 

Los Angeles Review of Suspecious Activity Reports

  • 1. INTRADEPARTMENTAL CORRESPONDENCE January 23, 2015 BPC #15-0015 1.0 TO: The Honorable Board of Police Commissioners FROM: Inspector General, Police Commission SUBJECT: REVIEW OF SUSPICIOUS ACTIVITY REPORTS, FISCAL YEAR 2013/2014 RECOMMENDED ACTION REVIEW and APPROVE the Office of the Inspector General’s (OIG) Review of Suspicious Activity Reports (SARs), Fiscal Year 2013/2014. DISCUSSION The OIG reviewed all 215 SARs collected by the Department during Fiscal Year 2013/14. Fifty-four (54) of these SARs were unfounded by the Department and 161 were sent to the federal government for sharing with other law enforcement organizations. The primary review objective was to determine if each SAR sent to the federal government reflected a behavior or activity reasonably indicative of pre-operational planning or intelligence gathering related to terrorism or other criminal activity. I am available to provide any information the Police Commission may require. E-Copy – Original Signature on File with the Police Commission ALEXANDER A. BUSTAMANTE Inspector General Police Commission Attachment
  • 2. Conducted by the Conducted by the OFFICE OF THE INSPECTOR GENERAL REVIEW OF SUSPICIOUS ACTIVITY REPORTS, FISCAL YEAR 2013/2014 LL OO SS AA NN GG EE LL EE SS PP OO LL II CC EE CC OO MM MM II SS SS II OO NN January 23, 2015 ALEXANDER A. BUSTAMANTE Inspector General
  • 3. TABLE OF CONTENTS I. INTRODUCTION ...................................................................................................................1 II. REVIEW OF SARs ..................................................................................................................2 Table No. 1 – Types of Officer Contacts with Involved Persons ............................................2 Table No. 2 – Primary Activities Identified in Affirmed SARs...............................................3 Chart No. 1 – Race/Ethnicity & Gender of Named IPs for SARs Sent to JRIC .....................3 Chart No. 2 – Race/Ethnicity & Gender of IPs for Unfounded SARs ....................................4 III. ISSUES ....................................................................................................................................4 Six SARs Should Have Been Unfounded.................................................................................4 Five SARs Had the Incorrect Activity Type Identified ............................................................5 IV. PRIOR RECOMMENDATIONS ............................................................................................5 Recommendation No.1 .............................................................................................................5 Recommendation No. 2 ............................................................................................................6 V. RECOMMENDATION............................................................................................................6 VI. DEPARTMENT RESPONSE ..................................................................................................6 APPENDICES APPENDIX A – 16 ACTIVITY TYPES IDENTIFIED IN SPECIAL ORDER NO. 17-2012 ..........................a APPENDIX B – GEOGRAPHIC DISTRIBUTION MAP OF THE 161 SARS SENT TO JRIC.......................b
  • 4. REVIEW OF SUSPICIOUS ACTIVITY REPORTS FISCAL YEAR 2013/2014 I. INTRODUCTION The United States Government in 2009 established the Nationwide Suspicious Activity Reporting (SAR) Initiative in response to the findings of the 9/11 Commission. The purpose of the SAR Initiative is to foster the sharing of SARs across all levels of government. In August 2012, the Los Angeles Police Department (Department) issued Special Order No. 17-2012 revising existing guidelines for the collection of SARs.1 The Department guidelines are based on existing federal guidelines.2 Police officers or community members can initiate a SAR when they directly observe or otherwise become aware of a suspicious activity or behavior. A community member can report that activity or behavior directly to an officer in the field or at an Area station, submit information via the internet, or call the Department hotline.3 In an effort to educate the public on suspicious activity reporting, the Department created a community awareness program called iWatchLA.4 This program is designed to educate community members on the behaviors and activities that may have connections to terrorism. In most cases, SARs are initiated by community members who contact their local Area station and notify a police officer of the suspicious activity or behavior. The officer then completes a report following the instructions of the Special Order. The Area watch commander (WC) then reviews the report to determine if the information obtained warrants a SAR designation. If the WC determines that a SAR is appropriate, the “paper” SAR is faxed or mailed to Major Crimes Division (MCD), with no copies retained at the Area.5 The MCD enters all SAR data into the Department’s Palantir system.6 The MCD then analyzes the SAR and determines whether to unfound or affirm the SAR. Two conditions must be present for MCD to affirm a SAR. First, the observed activity must be “reasonably indicative of intelligence gathering or pre-operational planning related to terrorism or other criminal activity.”7 Second, the activity must be one (or more) of 16 specific activities identified in the Special Order.8 1 Department Special Order No. 17-2012, “Reporting Suspicious Activity Potentially Related to Foreign or Domestic Terrorism - Revised; and Suspicious Activity Report Notebook Divider, Form 18.30.03 - Revised” (Aug. 28, 2012), first published March 5, 2008, as Special Order No. 11, “Reporting Incidents Potentially Related to Foreign or Domestic Terrorism.” 2 See Nationwide SAR Initiative at nsi.ncirc.gov. 3 The internet URL for reporting is http://www.lapdonline.org/iwatchla/content_basic_view/52267. The LAPD Hotline is 877-LAPD-247 (877-527-3247). 4 http://lapdonline.org/iwatchla. 5 MCD resides within the Department’s Counter-Terrorism and Special Operations Bureau. 6 Palantir is a computerized “platform,” or combination of hardware and software, that collects and organizes data. For additional information, see www.palantir.com/solutions/law-enforcement. 7 See Special Order (S.O.) No. 17-2012. 8 See Appendix A for definitions of the 16 activity types (based on activities identified by the National SAR Initiative).
  • 5. Review of Suspicious Activity Reports Page 2 All SARs which MCD affirms are digitally sent to the Joint Regional Intelligence Center (JRIC), which then shares the information with other law enforcement agencies.9 All SARs which MCD unfounds are purged from Palantir and are not digitally sent to JRIC. Working copies of the affirmed paper SARs are secured in a locked file cabinet at MCD for two years. Then the working copies are sent to Iron Mountain off-site storage for three years, until destroyed. Originals of the affirmed paper SARs are sent monthly to Records and Identification Division (R&I), where they are secured in a locked file cabinet for two years. Then the originals are sent to Iron Mountain off-site storage for three years, until destroyed. The unfounded paper SARs (both working copies and originals) are secured in a locked file cabinet at MCD for one year or until reviewed by the OIG, and then destroyed.10 II. REVIEW OF SARs The OIG reviewed all 215 SARs collected by the Department during Fiscal Year 2013/14.11 Of those 215 SARs, 175 (81%) were initiated by community members and 40 (19%) were initiated by officers. Also, of those 215 SARs, 50 (23%) resulted in officer contact with an involved person (IP).12 Those 50 SARs are categorized in the table below by the type of officer contact. Table No. 1 – Types of Officer Contacts with Involved Persons Type of Officer Contact with IP No. of SARs % of Total Traffic Stop/Detention13 20 40% Arrest13 11 22% Consensual Encounter 7 14% Pedestrian Stop/Detention13 5 10% Officer Response to Radio Call 3 6% Officer Response to Traffic Collision 2 4% Detention for Mental Evaluation Hold 2 4% Total 50 100% The OIG reviewed each of these 50 officer-contact SARs and identified no constitutionally- related issues. 9 JRIC is collaboration between federal, state, and local law enforcement and public safety agencies. JRIC collects, analyzes, and disseminates threat intelligence. The JRIC Norwalk, CA facility serves Los Angeles County and six surrounding counties. For additional information, see https://www.jric.org. 10 This procedure, to destroy unfounded paper SARs after one year or until reviewed by the OIG, was established after the prior OIG review. 11 FY 2013/14 is July 1, 2013, to June 30, 2014. 12 In 10 instances, an officer had contact with an IP after the community member notified police of the suspicious activity. 13 The suspicious activity was observed or surmised during the detention or arrest but was not the reason for the detention or arrest. As an example, an officer made a traffic stop for a Vehicle Code violation and then observed something suspicious inside the vehicle. As another example, a person was arrested for trespassing on private property, and their reason for being on the property was considered suspicious.
  • 6. Review of Suspicious Activity Reports Page 3 The MCD sent 161 affirmed SARs to JRIC and unfounded 54 SARs.14 The 161 affirmed SARs are categorized in the table below by primary activity type. Table No. 2 – Primary Activities Identified in Affirmed SARs Primary Activity No. of SARs % of Total Expressed or Implied Threat 46 29% Misrepresentation 26 16% Observation/Surveillance 21 13% Photography 20 12% Testing/Probing of Security 13 8% Breach/Attempted Intrusion 10 6% Other Activity 25 16% Total 161 100% Of the 161 affirmed SARs sent to JRIC, 99 included information on 109 named involved persons, categorized in the chart below by race/ethnicity and gender. Chart No. 1 – Race/Ethnicity & Gender of Named IPs for SARs Sent to JRIC 14 See Appendix B for a geographic distribution (“pin”) map of the 161 SARs sent to JRIC.
  • 7. Review of Suspicious Activity Reports Page 4 Of the 54 unfounded SARs, 41 had 46 IPs categorized in the chart below by race/ethnicity and gender.15 Chart No. 2 – Race/Ethnicity & Gender of IPs for Unfounded SARs III. ISSUES Six SARs Should Have Been Unfounded The OIG found no issues with 209 (97%) of the 215 SARs either affirmed or unfounded. For only 6 of the 161 SARs affirmed, the OIG believes the SAR should have been unfounded. In each of these 6 cases, the OIG concurred with MCD that the activity was of concern but disagreed as to one specific aspect of each case. These 6 SARs are briefly summarized below: Three SARs resulted from traffic stops for Vehicle Code violations where the IP drivers identified themselves as members of possible suspected terrorist groups.16 In each stop, the IP initially attempted to present a non-legitimate form of identification but also subsequently provided valid identification (e.g., California Driver License). The MCD affirmed each SAR as a “Misrepresentation.” Because the IP did present valid identification, the OIG believes there was no actual misrepresentation, even though the initial presentation of non-legitimate identification would be of concern to a police officer.17 15 The OIG verified that the personal identifying information of all 46 IPs was purged from Palantir. 16 Two drivers were described on the SAR as “Male Black” and one as “Male White.” 17 Misrepresentation is “presenting false or misusing insignia, documents, and/or identification to misrepresent one’s affiliation to cover possible illicit activity. Impersonation of any authorized personnel (e.g., police, security, or janitor),” (Special Order 17- 2012).
  • 8. Review of Suspicious Activity Reports Page 5 Two SARs resulted from traffic stops for Vehicle Code violations where the IP drivers were found to be on the Terrorist Watchlist.18,19 The officers created SARs which MCD affirmed and forwarded to JRIC. The OIG agreed that being named on the Watchlist would be a concern to a police officer but is not one of the specific 16 categories required for a SAR to be affirmed. For one SAR, a citizen reported that an unnamed IP espoused a violent extremist philosophy and support of terrorist attacks reported in the news, but the IP did not make any specific threats.20 The citizen reported the SAR, which MCD affirmed and forwarded to JRIC. The OIG noted that espousing violent extremist philosophy or generalized support of terrorism is not one of the specific 16 categories required for a SAR to be affirmed.21 Five SARs Had the Incorrect Activity Type Identified As a lesser procedural issue, the OIG determined that 5 (3%) of the 161 SARs MCD sent to JRIC had the incorrect activity type identified. That is, while the OIG agreed that the behavior or activity was correctly affirmed as a SAR, the activity was better classified as one of the other 15 activities rather than the original activity chosen. IV. PRIOR RECOMMENDATIONS On March 12, 2013, the OIG presented its first report on the Department SAR process to the Board of Police Commissioners. That report included two recommendations, which are recounted here to verify what action the Department took in response. Recommendation No. 1 The OIG recommends that the Department ensure that all SAR reports thoroughly describe the facts and circumstances surrounding any contact with an individual. The OIG also recommends that all Department personnel reviewing these SARs focus on the circumstances related to the contact to ensure that all contacts are constitutional. Status: Closed. The OIG generally noticed more detail in the narratives for the FY 2013/14 SARs and more articulation as to why or how officer contact was made with involved persons. The narratives articulated that any detentions or arrests were for the underlying criminal activity (e.g., traffic code violation or trespassing) and not for the suspicious [non-criminal] activity. 18 Both drivers were described on the SAR as “Male Other.” 19 The Terrorist Screening Center of the National Security Branch of the Federal Bureau of Investigation maintains the Watchlist, which is “a single database of identifying information about those known or reasonably suspected of being involved in terrorist activity.” For additional information, see www.fbi.gov/about-us/nsb/tsc. 20 The unnamed IP was described on the SAR as “Male Other.” 21 The Special Order notes that activities “generally protected by the First Amendment to the United States Constitution . . . should not be reported in a SAR.” In this case, the IP did not make a spoken threat “reasonably indicative of intelligence gathering or pre-operational planning related to terrorism or other criminal activity.”
  • 9. Review of Suspicious Activity Reports Page 6 Recommendation No. 2 The OIG recommends that the Department maintain all SARs in a secure location and restrict access to these reports. The Department should record each time these documents are viewed. This recording log should include the time and date the documents were accessed, the individuals viewing these documents, and a detailed reason for examining these documents. These controls should be maintained in such a manner as to allow for periodic auditing by the OIG and Department auditors. Status: Closed. The OIG found adequate security over the paper SARs. As previously stated, the affirmed paper SARs are secured in locked file cabinets at both MCD (working copies) and R&I (originals) for two years, until sent to Iron Mountain and later destroyed. The unfounded paper SARs are secured in a locked file cabinet at MCD for one year or until reviewed by the OIG and then destroyed. The MCD management attested that the OIG auditors are the only outsiders who have accessed and examined the paper SARs. Management also attested that, internally, the paper SARs at both MCD and R&I have only been accessed and examined by five MCD officers: the captain and lieutenant, the two detectives assigned to the SAR unit, and the compliance officer. V. RECOMMENDATION The OIG recommends that collaboration and review occur to ensure that MCD’s improvements to and revisions of the SAR process continue. In this report, the OIG noted improvements to the process, which serve to enhance constitutional privacy protections while promoting the goal of coordinating information about potential terrorism-related activity. VI. DEPARTMENT RESPONSE The Commanding Officer (C/O) of MCD concurred with the recommendations by the Office of the Inspector General. In furtherance of the implementation of the recommendations, the C/O addressed each below reported issue and the related action the Department will take. In response to the SARs that should have been unfounded due to misrepresentation and espousing violent extremist philosophy, MCD has unfounded the SARs and has notified the JRIC. Major Crimes Division has also implemented additional oversight and training to Department personnel in the deficient areas to ensure compliance with Special Order No. 17- 2012. In response to the two SARs relating to the Terrorist Screening Center WatchList hits, MCD has provided additional oversight and training to Department personnel. The Department has also developed a Department Notice, dated November 12, 2014, to address TSC matters.
  • 10. page a APPENDIX A - 16 ACTIVITY TYPES IDENTIFIED IN SPECIAL ORDER NO. 17-2012 Criminal Activity and Potential Terrorism Nexus Activity (7) • Breach/Attempted Intrusion. Unauthorized individuals attempting to or actually entering a facility/infrastructure or protected site; • Misrepresentation. Presenting false or misusing insignia, documents, and/or identification to misrepresent one’s affiliation to cover possible illicit activity. Impersonation of any authorized personnel (e.g., police, security, or janitor); • Theft/Loss/Diversion. Stealing or diverting (obtaining or acquiring) something associated with a facility/infrastructure (e.g., badges, uniforms, identification, emergency vehicles, technology or documents [classified or unclassified], which are proprietary to the facility); • Sabotage/Tampering/Vandalism. Damaging, manipulating, or defacing part of a facility/infrastructure or protected site; • Cyber Attack. Compromising or attempting to compromise or disrupt an organization’s information technology infrastructure; • Expressed or Implied Threat. Communicating a spoken or written threat to damage or compromise a facility/infrastructure, protected site, and cyber attacks; or, • Aviation Activity. Operation or attempted operation of an aircraft in a manner that reasonably may be interpreted as suspicious or posing a threat to people, buildings/facilities, infrastructures, or protected sites. Such operation may or may not be a violation of Federal Aviation Administration regulations. Potential Criminal or Non-Criminal Activity Requiring Additional Fact Information During an Investigation (9) • Eliciting Information. Questioning individuals at a level beyond mere curiosity about particular facets of a facility’s or building’s purpose, operations, security procedures, etc., that would arouse suspicion in a reasonable person; • Testing or Probing of Security. Deliberate interactions with, or challenges to, installations, personnel, or systems that reveal physical, personnel, or cyber security capabilities; • Recruiting. Building of operations teams and contacts, personal data, banking data, or travel data; • Photography. Taking pictures or videos of facilities/buildings, infrastructures, or protected sites in a manner that would arouse suspicion in a reasonable person. Examples include taking pictures or videos of ingress/egress, delivery locations, personnel performing security functions (e.g., patrol, badge/vehicle checking), security-related equipment (e.g., perimeter fencing, security cameras), etc.; • Observation/Surveillance. Demonstrating unusual interest in facilities/buildings, infrastructures, or protected sites beyond mere casual or professional (e.g., engineers) interest, such that a reasonable person would consider the activity suspicious. Examples include observations through binoculars, taking notes, attempting to measure distances, etc.; • Materials Acquisition/Storage. Acquisition and/or storage of unusual quantities of materials such as cell phones, pagers, fuel, chemicals, toxic materials, and timers, such that a reasonable person would consider the activity suspicious; • Acquisition of Expertise. Attempts to obtain or conduct training in security concepts, military weapons or tactics, or other unusual capabilities such that a reasonable person could consider the activity suspicious; • Weapons Discovery. Discovery of unusual amounts of weapons, explosives, or their components that would arouse suspicion in a reasonable person; or, • Sector-Specific Incident. Actions associated with a characteristic of unique concern to specific sectors (such as the public health sector) with regard to their personnel, facilities, systems, or functions. Note: These 9 behaviors/activities are generally protected by the First Amendment to the United States Constitution and should not be reported in a SAR, absent articulable facts and circumstances that support suspicion that the behavior observed is not innocent, but rather reasonably indicative of criminal activity associated with terrorism, including evidence of pre-operational planning related to terrorism. Race, ethnicity, national origin, or religious affiliation should not be considered as factors that create suspicion (although these factors may be used as specific-involved person descriptors).
  • 11. page b APPENDIX B – GEOGRAPHIC DISTRIBUTION MAP OF THE 161 SARS SENT TO JRIC