Author Topic: What are Suspicious Activity Reports? SARs exposed!  (Read 13262 times)

0 Members and 1 Guest are viewing this topic.

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
What are Suspicious Activity Reports? SARs exposed!
« on: September 24, 2010, 07:10:51 pm »
What are SARs?

The following retrieved from:
http://www.niem.gov/request/SARInitiativeNSI.pdf




Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)NIEM Standards in Action

What Makes an Activity Suspicious?
• A citizen observes or reports to law enforcement authorities that something is alarming, out of the ordinary, or “just not right”
• Law enforcement or government official observes something
• Based on training or experience to recognize behaviors and indicators that are associated with terrorism-related criminal activity
•Knowledge of laws and regulations
•Interactivity with other agencies
•Studies and research done on behaviors leading to crimes and terrorist acts (e.g., LAPD, NCTC, FBI)

What is the Nationwide SAR Initiative (NSI)
•The NSI is based on the ISE-SAR Functional Standard established by the Office of the Program Manager –Information Sharing Environment (PM-ISE)
•The NSI relies upon existing and accepted law enforcement practices―gathering information regarding observed behaviors and incidents associated with crimes
….while being extremely sensitive to privacy concerns
•The NSI establishes a processes and a technology infrastructure whereby information can be shared to detect and prevent criminal activity, including that associated with domestic and international terrorism

What is the Nationwide SAR Initiative (continued)

Key objectives of the NSI
•Ensure that a SAR has been legally gathered and is determined to have a potential nexus with terrorism-related criminal activity
•Ensure that standard policies and procedures are in place to protect citizen privacy and civil liberties
•Support an implementation process that can be accomplished within the agency’s existing framework to gather, process, analyze, and report behaviors and events that are indicative of criminal activity
•Support the institutionalization of standard processes by providing comprehensive SAR training for executives, analysts and street officer personnel
•Establish appropriate technology at participating sites to enable the sharing of terrorism-related SARs across the Information Sharing Environment
•Standardize on NIEM based data exchanges using the LEXS-SR and LEXS-PD standards and the IEPD established by the ISE SAR Functional Standard (FS-200)





NIEM Pilot: ISE-SAR Evaluation Environment
•The ISE-SAR Evaluation Environment (ISE-SAR EE) was established in 2008 to provide an operational NSI infrastructure to enable:
•Operational testing of Common Terrorism Information Sharing Standards (CTISS) and NIEM data exchange standards (LEXS-SR and LEXS-PD)
•Identification of best practices (training, analysis, privacy, technology)
•Effective sharing of SAR data between federal, state and local agencies (14)
•Per PM-ISE guidance the ISE-SAR EE represents a distributed and decentralized solution to allow agencies to locally hold and control SAR data and yet make data easily and securely accessible (viewable) by other authorized law enforcement agencies
•This local repository of suspicious activity reports having a “potential” nexus with terrorism is referred to as an ISE “Shared Space” and collectively as the ISE Shared Spaces
•SAR data in the ISE Shared Spaces is accessible via secure CUI networks by users authorized by the DOJ Trusted Broker technology using a federated search/query tool hosted at www.ncirc.gov

Current ISE-SAR Pilot Status
•Operational Sites
•Florida Department of Law Enforcement
•New York State Intelligence Center
Virginia Fusion Center
•Metropolitan DC Police Department



•Implementation in Progress (completion May 2009)
•Chicago PD             Seattle PD
•Los Angeles PD        Phoenix PD
•Boston PD               Las Vegas PD
•Miami-Dade PD         FBI eGuardian System
•Houston PD             DHS




With all of the frikken acronyms used, makes this presentation almost seem like reading a foreign language.  It's Newspeak at its finest.

Glossary of newspeak acronyms:

ISE = Information Sharing Environment (website: http://www.ise.gov/Pages/NSI.aspx)

NIEM = National Information Exchange Model (website: http://www.niem.gov/)

EE = Evaluation Environment

NSI = National Security Institute = website: http://nsi.org/

NSI = Nationwide Suspicious Activity Reporting Initiative

LEXS = Logical Entity eXchange Specification (website: http://www.lexs.gov/)

JIEM = Justice Information Exchange Model (website: http://www.it.ojp.gov/default.aspx?area=nationalInitiatives&page=1110)

RISS = Regional Information Sharing Systems (website: http://www.riss.net/)

IEPD = Information Exchange Package Documentation (website: http://www.niem.gov/whatIsAnIepd.php)

SME = Security Management Engineering???

HSIN = Homeland Security Information Network (http://www.dhs.gov/files/programs/gc_1156888108137.shtm)

LEO = Law Enforcement Officer (I call 'em peace officers or public servants)

NCIRC = National Criminal Intelligence Resource Center  (ncirc.gov)

RFC = Request For Comments??? (Learn about it here: http://en.wikipedia.org/wiki/Request_for_Comments)

JTTF = Joint Terrorism Task Force (http://www.justice.gov/jttf/)

CUI = Controlled Unclassified Information (http://www.archives.gov/cui/)



This one post I did is almost like a semester long class in Criminal justice!!!!




Please read this thread to understand why SARs integrates in with this Janet "Big Sis" Napolitano Tesitmony:
http://forum.prisonplanet.com/index.php?topic=187519.0







Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #1 on: September 27, 2010, 12:58:36 pm »
A look at the creation of a "snitch culture"


Retrieved from http://www.ise.gov/Pages/NSI.aspx



The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) builds on what law enforcement and other agencies have been doing for years—gathering information regarding behaviors and incidents associated with criminal activity—and establishes a standardized process whereby SAR information can be shared among agencies to help detect and prevent terrorism-related criminal activity. [INSERT: See this thread on agency collaboration: http://forum.prisonplanet.com/index.php?topic=187740.0]

In 2008-2009, the PM-ISE evaluated the policies, procedures, and technology concepts needed to implement a unified SAR process across federal, state, and local governments. The results of the ISE-SAR Evaluation Environment, documented in a series of publically available reports, showed that the unified process not only enhanced counter-terrorism efforts, but also strengthened privacy, civil rights, and civil liberties protections. Moreover, although the evaluation environment was focused on SARs that were indicative of terrorism-related crimes, both the steps in the NSI cycle and the data elements in the ISE-SAR Functional Standard are adaptable to other types of criminal behavior.

In March 2010, the Department of Justice established an NSI Office to facilitate the implementation of the NSI across all levels of government and assist participants in adopting compatible processes, policies, and standards that foster broader sharing of SARs, while ensuring that privacy, civil rights, and civil liberties are protected in accordance with local, state, and federal laws and regulations. Updated information on the NSI can be found on their website: http://nsi.ncirc.gov/default.aspx or email [email protected].

The NSI is one of the ISE’s most significant accomplishments to-date and the best example of the ISE in action: An interrelated set of harmonized policies, mission processes, and systems which leverage ISE core capabilities and enablers to empower the men and women on the frontline to access and share the information they need to keep the country safe.

The role of the PM-ISE is to coordinate and facilitate the development of a network-centric ISE by focusing on standards and architecture, security and access, associated privacy protections, and best practices. The PM-ISE serves as a change agent and center for innovation and discovery in providing ideas, tools, and resources to mission partners who then apply them to their own agencies or communities. In some cases, such as the NSI, the PM-ISE helps sponsor promising mission partner initiatives by providing seed money, subject-matter expertise, or other resources to launch the activity. The aim is always to develop these initiatives in full partnership with mission owners. In addition, as improved business processes and supporting policies and technical solutions are developed and deployed, the PM-ISE helps identify, promote, and spread best practices and, where possible, influences resource allocation decisions to ensure the institutionalization and potential reuse of these mission partner capabilities.



Retrieved from: http://www.mta.info/news/stories/?story=55



If You See Something, Say Something

Over the past eight years, the MTA's "If You See Something, Say Something" campaign has been an integral part of keeping our transit system safe. It is now a key piece of the region's security infrastructure and a simple reminder that we are all the first line of defense. This weekend's events in Times Square underscored the campaign's success in raising public awareness and the importance of remaining vigilant.

The Metropolitan Transportation Authority (MTA) launched the now-famous tag line in 2003. It has licensed its use, free of charge, to 54 organizations around the world for use in public awareness campaigns about security.

"Our customers are the first line of defense and the "If You See Something, Say Something" campaign improves customer awareness and provides the ideal outlet for all New Yorkers to get involved," said William A. Morange, the MTA's Director of Security. "This campaign has been extremely successful and illustrates how the MTA continues to work together with the NYPD and other law enforcement agencies to safeguard our city and our transit system."

Among those who use the phrase are Harvard University, Amtrak, NJ Transit and numerous other public transit agencies, the U.S. Dept. of Homeland Security, the Maryland Dept. of Natural Resources, which uses it for protecting waterways and reservoirs from terrorist attack, the City of Amsterdam, and three Australian states -- Victoria, Queensland and Western Australia.

In 2008, the campaign was recognized by the American Public Transportation Association for excellence in marketing and communications. It was created and developed by Korey Kay & Partners, the MTA's advertising agency.

The vigilance of all New Yorkers has kept MTA buses, subways, and railroads safe. The MTA thanks our passengers and reminds them to:

    * Be alert to unattended packages.
    * Be wary of suspicious behavior.
    * Take notice of people in bulky or inappropriate clothing.
    * Report exposed wiring or other irregularities.
    * Report anyone tampering with surveillance cameras or entering unauthorized areas.
    * Learn the basics of safe train evacuation

And remember, if you see something, say something. Alert a police officer, MTA employee or call 888-NYC-SAFE (888-692-7233).



Please visit this thread to learn about how the "See Something, Say Something" is being applied at Sports Stadiums:
http://forum.prisonplanet.com/index.php?topic=168226.0






Offline okay

  • Member
  • **
  • Posts: 65
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #2 on: September 28, 2010, 08:39:58 am »
http://snapscouts.org/        See it, Snap it, Send it.

Offline Overcast

  • Member
  • *****
  • Posts: 4,133
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #3 on: September 28, 2010, 10:46:47 am »
The Gestapo is Born

    Although the Gestapo is generally associated with SS Leader Heinrich Himmler, it was actually founded by Hermann Göring in April 1933.

    Upon becoming Chancellor of Germany, Adolf Hitler had appointed Göring as Minister of the Interior for the State of Prussia, Germany's biggest and most important state, which controlled two thirds of the country, including the capital, Berlin, and the big industrial centers. As Minister of the Interior, Göring thereby had control of the police.

    The first thing he did was to prohibit regular uniformed police from interfering with Nazi Brownshirts out in the streets. This meant that innocent German citizens had no one to turn to as they were being beaten up by rowdy young storm troopers drunk with their newfound power and quite often drunk on beer. These young Nazi toughs took full advantage of police leniency to loot shops at will and terrorize Jews or anyone else unfortunate enough to be caught in the wrong place at the wrong time.

    Next, Göring purged the Berlin police department of politically unreliable cops and had 50,000 storm troopers sworn in as special police auxiliaries (Hilfspolizei). Now the storm troopers had actual power of arrest and they relished its use. Jails were soon overflowing with people taken into "protective custody" resulting in the need for large outside prison camps, the birth of the concentration camp system.

    Having compromised the uniformed divisions, Göring next turned his attention to the plain-clothes police. On April 26, 1933, a decree was issued creating the Secret Police Office (Geheime Polizei Amt) which quickly became known as the GPA. But this abbreviation was far too similar to the GPU abbreviation used by the Soviet Political Police in Russia. Thus, the name was changed to Secret State Police (Geheime Staats Polizei). The actual term 'Gestapo' was supposedly created by a Berlin postal official who wanted a name that would fit on a regulation-sized postal rubber stamp. Gestapo was derived from seven letters within the full name Geheime Staats Polizei. Unknowingly, the postal official had invented one of the most notorious names in history.

    Göring promptly began using the Gestapo to silence Hitler's political opponents in Berlin and surrounding areas and also to enhance his own personal power. Much to his delight, Göring discovered that the old Prussian state police had kept many secret files on the private lives of top Nazis, which he studied with delight.

    Göring appointed Rudolf Diels as the first Gestapo chief. Although Diels was not a Party member, he had been a member of the Prussian Ministry of the Interior since 1930 and had served as a senior adviser in the police. Göring took full advantage of Diels' knowledge on how to operate a political police force. He also encouraged Diels to maintain and expand the secret files on Nazi leaders. The cunning and ambitious Göring would use that information to help solidify his own position within the Nazi Party.

    Another ambitious Nazi, SS-Reichsführer Heinrich Himmler, soon set his sights on the Gestapo. A fierce rivalry then developed between Himmler and Göring, with both men working against each other to curry favor with Hitler as to who would actually run the Gestapo. On April 20, 1934, after much infighting, Göring decided to cede the Gestapo to Himmler and his associate, Reinhard Heydrich, who took over as Gestapo chief two days later.

    The ever-ambitious Göring had set his sights on something much bigger than being a policeman. The former World War I flying ace and recipient of the prestigious Pour le Mérite medal fancied himself as a military leader. He wanted to take charge of a rejuvenated German Air Force. His interest in police matters and the Gestapo had diminished as Hitler's plans for a huge military buildup became apparent.

    Within a few years, Himmler became Chief of the German Police in addition to his duties as SS leader. Heydrich, his number two man, proved to be something of a genius in creating a hugely efficient national intelligence system that kept tabs on everyone. No one was exempt from Gestapo snooping, no matter how high up in the Nazi hierarchy.

    On February 10, 1936, the Nazi Reichstag passed the 'Gestapo Law' which included the following paragraph: "Neither the instructions nor the affairs of the Gestapo will be open to review by the administrative courts." This meant the Gestapo was now above the law and there could be no legal appeal regarding anything it did.

    Indeed, the Gestapo became a law unto itself. It was entirely possible for someone to be arrested, interrogated and sent to a concentration camp for incarceration or summary execution, without any outside legal procedure.

    Justice in Hitler's Germany was completely arbitrary, depending on the whim of the man in power, the man who had you in his grip. The legal policy as proclaimed by Hitler in 1938 was: "All means, even if they are not in conformity with existing laws and precedents, are legal if they subserve the will of the Führer."

    Surprisingly, the Gestapo was never actually a very big organization. At its peak it employed only about 40,000 individuals, including office personnel and the plain-clothes agents. But each Gestapo agent operated at the center of a large web of spies and informants. The problem for the average citizen was that no one ever knew for sure just who those informants were. It could be anyone, your milkman, the old lady across the street, a quiet co-worker, even a schoolboy. As a result, fear ruled the day. Most people realized the necessity of self-censorship and generally kept their mouths shut politically, unless they had something positive to say.

    Anyone foolish enough to say something risky or tell an anti-Nazi joke in mixed company might get a knock on the door in the middle of the night or a tap on the shoulder while walking along the street. Letters were also sent out demanding an appearance at No. 8 Prinz Albrecht Strasse, the Gestapo headquarters in Berlin, to answer a few questions. The Gestapo prison center in Berlin (the Columbia-Haus) became notorious as a place where pedestrians strolling outside the building could hear screaming coming from inside.

    Gestapo interrogation methods included: repeated near drownings of a prisoner in a bathtub filled with ice-cold water; electric shocks by attaching wires to hands, feet, ears and genitalia; crushing a man's testicles in a special vice; securing a prisoner's wrists behind his back then hanging him by the arms causing shoulder dislocation; beatings with rubber nightsticks and cow-hide whips; and burning flesh with matches or a soldering iron.

    As the SS organization rapidly expanded in the late 1930s, the super-ambitious Heydrich acquired immense powers and responsibilities. One of his main accomplishments was the reorganization and bureaucratic streamlining of the entire Nazi police state. In September 1939, just after the outbreak of war, he created the Reich Main Security Office (RSHA). This new organization had seven main branches. The Gestapo was designated as the fourth branch and was now headed by Heinrich Müller (nicknamed as Gestapo Müller). Back in 1931, as a member of the Munich police, Müller had successfully hushed-up the scandal surrounding the suicide of Hitler's niece Geli Raubal. Thus he had proven himself to be a very dependable man.

    Section B4 of the Gestapo dealt exclusively with the "Jewish question" and came under the permanent control of Adolf Eichmann. This energetic and efficient organizer would keep the trains running on time from all over Europe to Nazi death camps located in occupied Poland during the Final Solution of the Jewish question.

    The Gestapo followed Hitler's armies into every country during the conquest of Europe. By pitting neighbor against neighbor, Gestapo agents established the same kind of terror mechanism in each occupied country that had worked so well back in Germany.

    In 1942, the Gestapo took things a step further via Hitler's Night and Fog Decree. Suspected anti-Nazis would now vanish without a trace into the misty night never to be seen again. The desired effect as stated by Himmler was to "leave the family and the population uncertain as to the fate of the offender." The victims were mostly from France, Belgium and Holland. They were usually arrested in the middle of the night and whisked off to far away prisons for torture-interrogation, eventually arriving at a concentration camp in Germany if they survived.

    From the very beginning of Hitler's regime, the ever-present threat of arrest and indefinite confinement in a concentration camp robbed the German people of their personal freedom and left them as inhibited, dutifully obedient subjects.

    But even this was not enough. The Nazis wanted to change people's thinking. And so, just as they had purged their hated political enemies, they began a campaign to purge hated "unGerman" ideas. That effort started in May 1933 with the worst of all crimes against human thought and culture – the burning of books.


[From a series - More here if you wish to read...]


It's important to understand the beginnings of the Nazi movement...
And dying in your beds, many years from now, would you be willin' to trade ALL the days, from this day to that, for one chance, just one chance, to come back here and tell our enemies that they may take our lives, but they'll never take... OUR FREEDOM!

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #4 on: September 28, 2010, 12:42:41 pm »
http://snapscouts.org/        See it, Snap it, Send it.


"Nearly all children nowadays were horrible. What was worst of all was that by means of such organizations as the Spies they were systematically turned into ungovernable little savages, and yet this produced in them no tendency whatever to rebel against the discipline of the Party. On the contrary, they adored the Party and everything connected with it... All their ferocity was turned outwards, against the enemies of the State, against foreigners, traitors, saboteurs, thought-criminals. It was almost normal for people over thirty to be frightened of their own children."
- George Orwell, 1984, Book 1, Chapter 2
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #5 on: September 28, 2010, 02:27:09 pm »
LOL, while researching Suspicious Activity Reports in the DHS power structure, I came across a reporting form for the Internal Revenue Scam.

If you want to be a "snitch" fill out this form and mail it off to the IRS.

http://www.irs.gov/pub/irs-pdf/ffc109.pdf

It would be funny if a thousand of us filled out this form and put in Rahm Emmanuel.
http://www.prisonplanet.com/rahm-emanuel-doesn%E2%80%99t-pay-taxes-so-why-should-you.html

Offline okay

  • Member
  • **
  • Posts: 65
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #6 on: October 01, 2010, 01:39:47 pm »
Knowledge of Laws and Regulations? They EXPECT you to know the Laws of every state you cross over to.

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: What are Suspicious Activity Reports? SARs exposed!
« Reply #7 on: October 08, 2010, 08:22:22 pm »
8 signs of terrorism presentation:

http://info.publicintelligence.net/NJ-SARS.pdf

Quote
Activity or person may not be criminal BUT may be suspicious