ResearchPDF Available

Understanding law enforcement information sharing for criminal intelligence purposes

Authors:

Abstract and Figures

Criminal intelligence has become a central tool to support modern crime control (Ratcliffe 2016; Rickards 2016). Law enforcement efforts have focused on improving criminal intelligence to understand the nature and extent of criminality and ultimately to prevent, detect and disrupt crime. Such criminal intelligence relies on the building blocks of raw data and information generated internally by a law enforcement agency or shared by a partner. In a world characterised by increasingly sophisticated crime, it is increasingly important to draw together the fragments of information available from multiple sources. As Bigo (2000: 84) has noted: 'A large amount of police work now concerns patrolling the data in order to spot connections between criminals, and much of this goes beyond the merely local or even national.' This might include 'patrolling' information from (among others) law enforcement agencies, intelligence agencies, government departments, financial institutions and telecommunications providers, each of which may provide a different insight into the activities of a criminal group. Abstract | Criminal intelligence has become a central tool in modern crime control that is used by law enforcement to understand rapid changes in crime and criminality. The development of intelligence relies on the sharing of information between agencies-including law enforcement, other government agencies and private sector entities. However, there are a number of legislative, technical and cultural barriers that limit the free flow of information. This report examines those barriers and develops an information sharing matrix that explains the barriers associated with different types of information sharing. The matrix develops a typology of information sharing based on two dimensions: the level of interaction and the level of connectivity.
Content may be subject to copyright.
Trends & issues in crime and criminal jusce
ISSN 0817-8542
Understanding law
enforcement information
sharing for criminal
intelligence purposes
Rick Brown
Criminal intelligence has become a central tool to support
modern crime control (Ratclie 2016; Rickards 2016). Law
enforcement eorts have focused on improving criminal
intelligence to understand the nature and extent of criminality
and ulmately to prevent, detect and disrupt crime. Such
criminal intelligence relies on the building blocks of raw data and
informaon generated internally by a law enforcement agency
or shared by a partner. In a world characterised by increasingly
sophiscated crime, it is increasingly important to draw together
the fragments of informaon available from mulple sources.
As Bigo (2000: 84) has noted: ‘A large amount of police work
now concerns patrolling the data in order to spot connecons
between criminals, and much of this goes beyond the merely
local or even naonal.’ This might include ‘patrolling’ informaon
from (among others) law enforcement agencies, intelligence
agencies, government departments, nancial instuons and
telecommunicaons providers, each of which may provide a
dierent insight into the acvies of a criminal group.
Abstract | Criminal intelligence has
become a central tool in modern
crime control that is used by law
enforcement to understand rapid
changes in crime and criminality. The
development of intelligence relies on
the sharing of informaon between
agencies—including law enforcement,
other government agencies and
private sector enes.
However, there are a number of
legislave, technical and cultural
barriers that limit the free ow of
informaon. This report examines
those barriers and develops an
informaon sharing matrix that
explains the barriers associated with
dierent types of informaon sharing.
The matrix develops a typology of
informaon sharing based on two
dimensions: the level of interacon
and the level of connecvity.
No. 566 December 2018
Trends & issues in crime and criminal justice
Australian Institute of Criminology
2
No. 566 December 2018
This paper explores some of the ways in which informaon is shared between law enforcement
agencies to help create aconable criminal intelligence. It addresses the benets of and barriers
to eecve informaon sharing and outlines a way of assessing the maturity of informaon
sharing arrangements.
Terminology
As a starng point, it is important to dene what is meant by informaon and intelligence and
to clarify how the two are dierent. Although there is no naonally agreed denion of criminal
intelligence in Australia, it is dened here as ‘informaon that is collected about crime and criminals
and evaluated, analysed and disseminated’ (Parliamentary Joint Commiee on Law Enforcement
2013: 5). Informaon is the raw material used to create intelligence. This can come in many forms
including unprocessed data (eg telecommunicaons metadata), details of criminal records, or
informaon reports entered into a law enforcement intelligence database (eg a sighng of an
individual at a parcular locaon). Informaon may also include material processed by another law
enforcement agency to produce a knowledge product that provides further understanding about a
parcular type of criminality or criminal group. Informaon, oen from mulple sources, is collated
and analysed to provide intelligence, which is typically aconable and intended to inuence decision
making about how to tackle crime or criminals. While Ratclie (2016) describes data, informaon,
knowledge and intelligence as being on a connuum, the rst three are characterised here as building
blocks for the laer.
In this paper, informaon sharing is discussed in the context of law enforcement. It may also include
sharing with those working in a naonal security or private sector seng, but this is not an essenal
requirement. Further, informaon may be shared without an immediate intent but rather for some
future unknown requirement, it may be shared in support of a specic operaon or invesgaon, or
it may be shared in response to an urgent request.
Benets of informaon sharing
Sharing informaon to improve criminal intelligence serves rst and foremost to increase knowledge
available for decision making. This can help not only to idenfy which criminal groups to target,
but also, in an age of resource constraints, to triage out lower risk cases (Ratclie 2016). It can also
help to prevent ‘linkage blindness’, where informaon available in one jurisdicon is not available in
other jurisdicons. This can result in the full extent of criminality that transcends law enforcement
boundaries remaining hidden (Jackson & Brown 2007; Sheptycki 2004). Linkage blindness was a
problem idened by the 9/11 Commission in the United States, which found that a number of
intelligence agencies held informaon on the acvies of those involved but failed to connect
the dots (Naonal Commission on Terrorist Aacks Upon the United States 2004). Similarly, in the
United Kingdom the Bichard inquiry into the murder of two children by a school caretaker idened
failings in intelligence sharing between police forces and child protecon services resulng in
linkage blindness. The report of the inquiry recommended the implementaon of a naonal police
intelligence system as a maer of urgency (Bichard 2004). In each case, improved informaon sharing
between jurisdicons could have resulted in an enhanced intelligence picture.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
3
No. 566 December 2018
Informaon sharing also helps to support deconicon (Mapel 2014; Police Foundaon 2016), which
aims to prevent what might be considered the opposite of linkage blindness—when more than one
law enforcement agency is simultaneously invesgang the same individual or group. Informaon
sharing under these circumstances can result in savings in me and resources for each agency
concerned by prevenng duplicaon of eort (Parliamentary Joint Commiee on Law Enforcement
2013). This is pernent in Australia, where criminal intelligence on an enty may be held in mulple
databases. A 2013 parliamentary inquiry into Australian criminal intelligence found that such
informaon might be held on more than 30 separate systems operated by mulple law enforcement,
policing and government agencies (Parliamentary Joint Commiee on Law Enforcement 2013).
Law enforcement informaon sharing can also result in greater outcomes than would be possible for
a single agency working alone. For example, in the context of drug law enforcement invesgaons
insgated by the US Drug Enforcement Administraon, Lemieux (2010) found a posive correlaon
between the number of police agencies involved and the average size of a drug seizure. Further,
invesgaons involving mulple overseas law enforcement agencies tended to result in signicantly
more arrests and greater seizures than solo invesgaons.
Risks of informaon sharing
While there are clear benets to informaon sharing, there are also risks. Maintaining and
transming informaon securely is a signicant task for law enforcement agencies. It requires
trusng that recipient agencies handle and share their informaon securely. This means that those
operang within an informaon sharing network are expected to abide by a common set of security
standards governing the storage and disseminaon of informaon. Sheptycki (2017) has noted that
this may demarcate ‘insiders’—those with whom the police will share informaon—from ‘outsiders’,
with whom they will not. This can be parcularly pernent when dealing with some foreign
jurisdicons, where trust may be eroded by high levels of public sector corrupon.
Yet even within a trusted environment there can be informaon leakage from internal sources (eg
corrupt employees), or external sources (eg data the resulng from hacking). This can reduce
the level of trust that other members of the network have in those subject to leaks, which in turn
may impede informaon ows. As a result, there is a constant trade-o between the need to share
informaon and the need to ensure that, when it is shared, it is held securely.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
4
No. 566 December 2018
Barriers to eecve informaon sharing
While signicant benets can be derived from informaon sharing, there remain a number of barriers
that prevent informaon from being shared with others who might use it to generate intelligence.
These can be divided into legislave, cultural and technological barriers.
Legislave barriers
Across Australia, there is no agreed legal denion of criminal intelligence among the eight states
and territories and the Commonwealth (Parliamentary Joint Commiee on Law Enforcement 2013).
Rickards (2016) noted that each Australian state and territory has its own legislave framework
governing informaon sharing between agencies, with a further set of frameworks to negoate at
the Commonwealth level. One example of Commonwealth informaon sharing restricons can be
found in secon 59 of the Australian Crime Commission Act 2002, which places strict limits on whom
the Australian Criminal Intelligence Commission (ACIC) can share informaon with, due to concerns
over the security and privacy of that informaon. For example, telecommunicaons intercept
material can only be shared with a small number of specied enes. Further, telecommunicaons
companies may provide details of the same subscriber’s phone records to mulple law enforcement
agencies under separate disseminaon processes due to dierent laws in each state/territory
and the Commonwealth. Each agency receiving the informaon may be unaware that others
have also requested and received it under their own legal powers, thereby creang ineciencies
(Parliamentary Joint Commiee on Law Enforcement 2013).
In the context of terrorist events, the inquest in the wake of the Lindt Café siege raised quesons
about the limits placed on informaon sharing by privacy legislaon and recommended a review of
informaon sharing arrangements between agencies during terrorist events (State Coroner of New
South Wales 2017).
Cultural barriers
Creang a culture of informaon sharing has previously been idened as a crical success factor
in implemenng an Australian criminal intelligence management strategy (Commonwealth of
Australia 2017). Here, ‘culture’ is dened as the rituals, values and behaviours (Schein 2017) of the
overall criminal intelligence community (rather than its constuent parts) that give rise to the overall
framework that shapes the willingness of individual enes to share informaon. The literature on
this issue has idened signicant cultural barriers that can inhibit the ow of informaon between
agencies. Some of these relate to the organisaonal structures that shape the operang environment,
such as by creang silos. Organisaons, and indeed secons or teams within organisaons, oen
gain specialist knowledge about parcular crime problems or criminal groups as a result of invesng
resources or using designated legal powers to target issues of concern to the agency. There can
be a tendency to focus internally on building intelligence holdings, rather than cooperang with
other agencies (Sales 2010). This can create a network of siloed intelligence holdings (also known
as ‘stovepipes’) and reduce opportunies for informaon from mulple sources to be synthesised
(Occhipin 2010).
Trends & issues in crime and criminal justice
Australian Institute of Criminology
5
No. 566 December 2018
Many cultural atudes to informaon sharing are a result of relaonal properes that determine
how agencies interact (Whelan 2016). These include:
ego—an agency can develop an ego that seeks to control. Intelligence can act like a currency,
with power derived from sharing, trading or withholding informaon. Organisaons may be
inhibited from sharing informaon if they believe there will be addional gain from holding onto
that informaon (Carter & Carter 2009). Ego can also lead to conict between law enforcement
agencies over who should take the credit for successful outcomes in mul-jurisdiconal
invesgaons (Guille 2010; Lemieux 2010);
compeon—organisaonal concern with sharing credit may extend to direct compeon with
other law enforcement agencies over achieving posive outcomes. If sharing informaon is
expected to enhance the reputaon of another agency, which could ulmately result in addional
resources for that agency, a decision may be made to withhold the informaon (Aviram & Tor
2003; Jackson & Brown 2007; Sales 2010);
ltering—agencies may lter the informaon they provide to others, thereby providing only some
of that which is available (Jackson 2014);
distrust—agencies may not provide informaon because they distrust the recipient agency. This
can be due to concerns over whether the informaon will be held securely, or how it will be used
(Monahan & Palmer 2009);
mutuality—informaon sharing may be inhibited in circumstances where a degree of reciprocity is
expected. An agency may provide informaon on the expectaon that it will receive something in
return, whether that be informaon, intelligence or recognion of the contribuon made by that
agency to any subsequent successful outcome. Failure to reciprocate can lead to a ‘once bien,
twice shy’ mentality (Sales 2010);
competence—informaon may not be shared because it raises embarrassing quesons about the
quality of the informaon, in terms of its accuracy, its meliness, or the method by which it was
obtained (Jackson & Brown 2007; Taylor & Russell 2012);
need-to-know—there may be a culture of not sharing informaon widely because of a belief
in a need-to-know policy, as opposed to a need-to-share policy (Carter & Carter 2009; Naonal
Commission on Terrorist Aacks Upon the United States 2004). This means that an agency may
judge whether its informaon has ulity for another agency, rather than the recipient agency
having an opportunity to evaluate that informaon for itself; and
culture of secrecy—associated with the need-to-know ethos, there may be a general fear of
sensive informaon that could do harm to society geng into the wrong hands, leading to a non-
sharing default posion (Connery 2016).
Trends & issues in crime and criminal justice
Australian Institute of Criminology
6
No. 566 December 2018
Technological barriers
Technological problems have long plagued law enforcement agencies’ aempts to share informaon.
Incompable IT systems that inhibit the transfer of informaon between enes have posed
signicant problems (Jackson & Brown 2007; Monahan & Palmer 2009; Plecas et al. 2011; Rickards
2016). In Australia, each of the eight states and territories has its own IT infrastructure for managing
criminal intelligence, with systems that evolved at dierent mes, with dierent operang systems.
This has resulted in there being ‘…no single and complete “point-of-truth” for Australian criminal
intelligence holdings nor an automated process for searching across all such systems simultaneously’
(Parliamentary Joint Commiee on Law Enforcement 2013: 38).
Other technical issues can also inhibit sharing. For example, dierences in the way that names and
other details are captured can mean that links between systems are missed, or duplicate records
created when matching data between systems (Plecas et al. 2011).
Modes of informaon sharing
Despite the benets of informaon sharing noted earlier, it remains decepvely dicult to achieve as
a roune way of doing business. So what can be done to improve the way in which law enforcement
agencies share informaon in a secure and mutually benecial way? One small rst step to answering
this queson is to understand the dierent approaches to sharing informaon and to recognise
their inherent strengths and weaknesses. Indeed, there are mulple forms of sharing, some of
which are context dependent and not all of which achieve the same outcome. The remainder
of this paper therefore seeks to develop a typology of informaon sharing which can be used to
assess the sophiscaon of informaon sharing processes within a law enforcement environment.
Sophiscaon is determined here by the ease with which informaon is shared and the complexity of
establishing the informaon sharing system. This assumes there is a hierarchy of intelligence sharing
approaches with, by denion, some forms of sharing being superior to others. This is not to suggest
that all informaon sharing should seek to achieve the same standard, but rather to acknowledge
that decisions made about how informaon is shared shape subsequent approaches to working with
that informaon.
Figure 1 introduces a prototype informaon sharing matrix. This takes into account the type of
interacon and type of connecvity involved in the informaon sharing process. Movement along
either axis in the matrix represents an increase in the sophiscaon of informaon sharing. In this
context, ‘interacon’ relates to how the provider and the recipient of the informaon relate to each
other. This can range from no interacon beyond the transmission of the informaon through to
regular, direct interacon. Connecvity refers largely to the method of sharing.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
7
No. 566 December 2018
Figure 1: Informaon sharing matrix
Type of interacon
The inclusion of interacon in Figure 1 is recognion that informaon sharing is a means to an
end that is dened by the provision of beer intelligence. At some point, there needs to be a
degree of processing applied to the informaon before it can inform decision making. The term
‘interacon’ therefore situates informaon processing at the me the informaon is shared or at
some later point. In the informaon sharing matrix, interacons are described as either connected
or collaborave, although these should be considered as opposite ends of a connuum, rather than
discrete categories.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
8
No. 566 December 2018
Connected interacon
Connected interacons involve the delivery of intelligence from one law enforcement agency to
another. This may be associated with a ‘push’ approach to informaon sharing whereby one agency
passes informaon to another agency, or a ‘pull’ approach where informaon is requested (Jackson
2014). However, a key feature of connected interacons is limited communicaon between enes
beyond the sharing of informaon. This communicaon may include limited context about how or
why the informaon was collected or requested and there may be limited joint acvity between the
two enes beyond the informaon sharing. Examples include law enforcement ocers entering
informaon reports into a centralised intelligence database without knowing who might use such
informaon and for what purpose (Ratclie & Walden 2010). In fact, these interacons are likely to
constute the majority of intelligence sharing.
Collaborave interacon
Collaborave interacon refers to intelligence sharing that is characterised by greater reciprocity
among two or more agencies. Informaon may lead collaborang agencies to ask new quesons
that require addional intelligence gathering, thereby creang an iterave process of collecon
and analysis.
Type of connecvity
‘Connecvity’ refers to the way in which informaon is shared between enes. At its simplest,
informaon sharing involves an exchange between just two enes (bilateral connecvity). This
can be as simple as one law enforcement ocer phoning another to obtain a parcular piece
of informaon.
Bilateral connecvity
In cases of bilateral connecvity, the provision of informaon is oen narrowly dened between two
enes. This may be based on a request for specic informaon, or it may be unsolicited informaon
that is sent out to a receiving agency. Bilateral connecvity may also involve more person-to-person
transfer of informaon than other forms of connecvity. This may parcularly be the case where the
goal of the informaon sharing is to share knowledge and experience between individuals (Jackson
2014). Liaison ocers and mul-agency task forces both share informaon in a way that could
typically be described as bilateral connecvity.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
9
No. 566 December 2018
Liaison ocers are outposted, or seconded from one law enforcement agency to another. On an
internaonal scale, they may be co-located with a diplomac mission and are somemes given
diplomac status. They act as representaves for the home law enforcement agency and are the
conduit for informaon to ow between agencies. They operate by building networks of trusted
bilateral relaonships that are intended to be used when either the home or host agency requires
informaon, dialogue or support from the other agency. As such, they can act as ‘facilitator, broker,
negoator and trustor’ (den Boer 2010: 58). In some cases (as with Interpol and Europol), liaison
ocers will be located in units with liaison ocers from other countries. While this may create
mulple opportunies for collaboraon, those relaonships remain bilateral, between the home law
enforcement agency and the one with whom the liaison ocer is collaborang. Liaison ocers will
also oen avoid involvement in invesgaons, instead focusing on more strategic liaison acvies
(Bigo 2000).
On the informaon sharing matrix, liaison ocers will oen play a Connected-Bilateral role, but might
also be more collaborave in some instances. The benet of this approach is the relave simplicity of
implementaon, relying on individual ocers rather than technological soluons. The disadvantage
from an informaon sharing perspecve is that connecvity is constrained by the personal
relaonships between liaison ocers and their contacts. The ‘bandwidth’ for informaon sharing
transacons will be narrow for even the best of liaison ocers.
Task forces have been recognised as an eecve means of sharing informaon with other law
enforcement agencies (McGarrell & Schlegel 1993; Parliamentary Joint Commiee on Law
Enforcement 2013; Perras & Lemieux 2010; Rickards 2016). They typically involve ocers from
mulple law enforcement agencies seconded to a host agency to address a parcular form of
criminality. As seconded members, they are able to access the IT systems of their home agencies
and can legally share informaon with other members of the task force, thereby enabling a more
comprehensive understanding of criminality to be developed. This informaon sharing within a
task force seng is oen made possible through a formal memorandum of understanding between
the agency hosng the task force and the agencies seconding ocers.
Task forces dier from liaison ocers in that the former are typically focused on operaons and
invesgaons and work together over a limited me, while the targeted criminality remains a
concern. Such task forces will typically play a Collaborave-Bilateral role, although the nature of the
sharing may also push them towards a more centralised role. As with liaison ocers, task forces
are easy to implement and rely on the deployment of ocers. They also overcome some of the
cultural barriers to informaon sharing, parcularly those associated with compeon, distrust and
mutuality, as members of the task force will work towards a common goal. However, as with liaison
ocers, task forces typically share informaon among a small group of individuals, resulng in
siloing—those outside of the task force working on similar issues may be unaware of the informaon
gathered by the task force.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
10
No. 566 December 2018
Centralised connecvity
Centralised connecvity describes an informaon sharing structure in which mulple agencies
send informaon to a central storage facility where it can be combined and analysed. This analysis
may be undertaken by any one of the agencies providing the informaon, as is the case with the
ACIC’s Australian Criminal Intelligence Database (ACID), which holds criminal intelligence from all
jurisdicons in Australia (Parliamentary Joint Commiee on Law Enforcement 2013). Alternavely,
analysis may be undertaken solely by the central authority receiving the informaon, which
subsequently disseminates the derived intelligence products. This is a model oen used by US Fusion
Centers, which draw informaon from mulple sources to produce intelligence with the aim of
prevenng terrorism (Chermak et al. 2013; Monahan & Palmer 2009). Data hubs of this kind, which
allow for informaon to be provided but not used by those providing it, can best be described as
a Connected-Centralised model (Figure 1). In contrast, databases such as the ACIC’s ACID can be
described as a Collaborave-Centralised model in that several agencies may provide informaon, the
informaon is visible to all and agencies can work together.
A benet of centralised connecvity is that, by joining together data from mulple sources, it may
help to address the linkage blindness that can result from siloing. Centralised connecvity can be
achieved through technological soluons that automate data capture and collaon (Plecas et al.
2011). However, these automated processes can be burdensome if they share so much data that
it cannot be analysed (Jackson 2014), although this can also be exaggerated and used as an excuse
for not sharing (Markle Foundaon 2003). Centralised systems can also be cricised as being ‘black
holes’ that suck in data but return lile intelligence to the agencies providing the original informaon.
Networked connecvity
A third form of connecvity involves networked arrangements in which each law enforcement
agency in the network stores its own informaon but allows other agencies in the network to access
its holdings, essenally creang a ‘free market’ in informaon exchange between law enforcement
agencies (Anderson 1989). This approach could involve any agency in the network accessing
data holdings of each of the other agencies to view informaon pernent to its own operaonal
requirements. This could be a passive form of interacon, as described by a Connected-Networked
model, in which the agency uses informaon made available by others but produces its own
intelligence products without the acve involvement of others in the network. Alternavely, it could
be a more acve form of interacon, as described by a Collaborave-Networked model, in which
access to devolved data may subsequently lead to further engagement from network partners. This is
the model envisaged by the Markle Foundaon (2002) in support of US naonal security in the wake
of 9/11.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
11
No. 566 December 2018
In pracce, law enforcement informaon sharing relying on fully networked connecvity is rare,
although the ACIC’s planned Naonal Criminal Intelligence System appears to be a hybrid between a
centralised and networked system. The system would give all law enforcement jurisdicons a search
capacity but would rely on data being sent by each jurisdicon to a secure cloud (Hendry 2017). The
benets of such systems are that they potenally provide real-me access to informaon across
jurisdicons, thereby prevenng siloing and the problems associated with mulple jurisdicons
following the same lines of inquiry. However, such approaches are likely to be dicult to implement
because of both the legislaon and the technology required. From a cultural perspecve, they may
also require a rebalancing of control over informaon, away from the centre of the network and
towards those working at the edge—oen in operaonal roles (Alberts & Hayes 2003). The focus
therefore shis from how to collect and store informaon to how to use it.
Comparing connecvity
The key dierence between the three types of connecvity is how the informaon is accessed by the
user. In the case of bilateral arrangements, the informaon will be provided on request by the owner
of the informaon—described as retail sharing by Sales (2010). In the case of centralised systems, the
supplier of the data will typically deposit the data in advance for use by the end user. The informaon
supplied may be a set of data agreed with the central agency (warehouse sharing), or informaon
may be provided in the expectaon that it will be of use to others, known as volunteer sharing (Sales
2010). For networked conguraons, the user will extract the informaon directly from the other
agencies’ systems. While access controls exist at each level, these will typically be more signicant in
bilateral arrangements than in networked arrangements, although in each case decisions are made
about what informaon to disclose.
In general, informaon sharing varies from the least sophiscated, in the boom le segment of
Figure 1 (the Connected-Bilateral model), through to the most sophiscated in the top right segment
(Collaborave-Networked). It should be noted, however, that the choice of informaon sharing
model is context dependent. For an immigraon ocer who needs further informaon on a traveller
agged as being of interest, a call to a contact in the country of origin (the Connected-Bilateral
model) may be the most ecient method of obtaining informaon. In contrast, a Collaborave-
Networked model may be more desirable when building mul-jurisdiconal regional, naonal or
internaonal informaon sharing arrangements where large volumes of data are used to produce
mely intelligence products. Therefore, the most appropriate level of sophiscaon will depend on
the desired outcome of sharing the informaon.
Trends & issues in crime and criminal justice
Australian Institute of Criminology
12
No. 566 December 2018
Discussion and conclusions
Recognising the desired end-state for an informaon sharing arrangement will help to idenfy
the legislave, technical and cultural barriers that need to be addressed to achieve success. These
barriers will vary according to the types of interacon and connecvity involved. For example, in the
case of an outposted liaison ocer playing a Connected-Bilateral role, technical barriers are likely to
be minimal, extending no further than the need for remote access to the home agency’s systems.
Depending on with whom the informaon is shared, legislave barriers may also be minimal if the
sharing is covered by the organisaon’s exisng legislaon. In contrast, cultural barriers may be
signicant where the informaon sharing is rst dependent on building a relaonship of trust and
reciprocity.
At the other end of the spectrum, agencies that aspire to Collaborave-Networked informaon
sharing are likely to experience legislave, technical and cultural barriers. The ability to freely share
informaon within the network may be restricted by the legislaon governing each agency in the
network. Dierent agencies may have dierent laws specifying how informaon can be disseminated
and to whom, requiring legislave changes to be negoated on a case-by-case basis. One advantage
of this approach, however, is that the failure of one jurisdicon to change the necessary legislaon
does not preclude others in the network from sharing. Technical issues will focus on how nodes in the
network can be connected, while cultural issues will focus on how to get law enforcement agencies to
work together more interacvely, once the informaon is made available.
Concluding remarks
This paper has demonstrated the benets of law enforcement informaon sharing for criminal
intelligence purposes, yet many hurdles to improving informaon ows remain. One small step
towards addressing the legal, technical and cultural barriers to informaon sharing is to understand
the nature of the informaon sharing mechanism, as dened by its level of interacon and
connecvity. This helps to understand on the one hand the restricons imposed by the informaon
sharing context, and on the other hand the increasingly complex issues that are likely to be
experienced as the level of sophiscaon grows.
References
URLs correct as at October 2018
Alberts DS & Hayes RE 2003. Power to the edge: Command and control in the informaon age.
Command and Control Research Program Publicaon Series. US Department of Defense. hp://www.
dc.mil/docs/citaons/ADA457861
Anderson M 1989. Policing the world: Interpol and the polics of internaonal police co-operaon.
Oxford: Clarendon Press
Aviram A & Tor A 2003. Overcoming impediments to informaon sharing. Harvard Law and Economics
Discussion Paper no. 427. hps://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600
Trends & issues in crime and criminal justice
Australian Institute of Criminology
13
No. 566 December 2018
Bichard M 2004. The Bichard inquiry. London: Staonery Oce. hp://dera.ioe.ac.uk/6394/1/report.
pdf
Bigo D 2000. Liaison ocers in Europe: New ocers in the European security eld, in Sheptycki JWE
(ed), Issues in transnaonal policing. London: Routledge: 67–99
Carter D & Carter J 2009. The intelligence fusion process for state, local, and tribal law enforcement.
Criminal Jusce and Behaviour 36(12): 1323–1339
Chermak S, Carter J, Carter D, McGarrell E & Drew J 2013. Law enforcement’s informaon sharing
infrastructure: A naonal assessment. Policy Quarterly 16(2): 211–244
Commonwealth of Australia 2017. Australian criminal intelligence management strategy 2017–20:
Intelligence partnerships for a safer Australia. hps://www.afp.gov.au/about-us/publicaons-and-
reports/australian-criminal-intelligence-model-acim-strategy
Connery D 2016. For the right reasons, in the right ways (Part 1): A four-naon survey of informaon
sharing about organised crime. Canberra: Australian Strategic Policy Instute
den Boer M 2010. Towards a governance model of police cooperaon in Europe: The twist between
networks and bureaucracies, in Lemieux F (ed), Internaonal police cooperaon: Emerging issues,
theory and pracce. Cullompton, Devon: Willan Publishing: 42–61
Guille L 2010. Police and judicial cooperaon in Europe: bilateral versus mullateral cooperaon, in
Lemieux F (ed), Internaonal police cooperaon: Emerging issues, theory and pracce. Cullompton,
Devon: Willan Publishing: 25–41
Hendry J 2017. Naonal real-me intelligence sharing system edges closer. IT News, 13 Nov. hps://
www.itnews.com.au/news/naonal-real-me-intelligence-sharing-system-edges-closer-477101
Jackson AL & Brown M 2007. Ensuring eciency, interagency cooperaon, and protecon of civil
liberes: Shiing from a tradional model of policing to an intelligence-led policing (ILP) paradigm.
Criminal Jusce Studies 20(2): 111–129
Jackson BA 2014. How do we know what informaon sharing is really worth? Exploring
methodologies to measure the value of informaon sharing and fusion eorts. RAND Corporaon.
hps://www.rand.org/pubs/research_reports/RR380.readonline.html
Lemieux F 2010. Tackling transnaonal drug tracking eecvely: Assessing the outcomes of
the Drug Enforcement Administraon’s internaonal cooperaon iniaves, in Lemieux F (ed),
Internaonal police cooperaon: Emerging issues, theory and pracce. Cullompton, Devon: Willan
Publishing: 260–280
Mapel M 2014. Protecng those who protect us: Federal law enforcement deconicon (Master’s
thesis). Naval Postgraduate School, Monterey, California
Markle Foundaon 2003. Creang a trusted network for Homeland Security: Second report of the
Markle Foundaon Task Force. hps://www.markle.org/publicaons/666-creang-trusted-network-
homeland-security
Trends & issues in crime and criminal justice
Australian Institute of Criminology
14
No. 566 December 2018
Markle Foundaon 2002. Protecng America’s freedom in the informaon age: A report of the Markle
Foundaon Task Force. hps://www.markle.org/publicaons/667-protecng-americas-freedom-
informaon-age
McGarrell E & Schlegel K 1993. The implementaon of federally funded muljurisdiconal drug
task forces: Organizaonal structure and interagency relaonships. Journal of Criminal Jusce 21(3):
231–244
Monahan T & Palmer NA 2009. The emerging polics of DHS Fusion Centers. Security Dialogue 40(6):
617–636
Naonal Commission on Terrorist Aacks Upon the United States 2004. The 9/11 Commission Report:
Final report of the Naonal Commission on Terrorist Aacks upon the United States. hp://govinfo.
library.unt.edu/911/report/
Occhipin JD 2010. Parallel paths and producve partners: The EU and US on counter-terrorism, in
Lemieux F (ed), Internaonal police cooperaon: Emerging issues, theory and pracce. Cullompton,
Devon: Willan Publishing: 167–185
Parliamentary Joint Commiee on Law Enforcement 2013. Inquiry into the gathering and use of
criminal intelligence. Canberra: Australian Parliament
Perras C & Lemieux F 2010. Convergent models of police cooperaon: The case of an-organized
crime and an-terrorism in Canada, in Lemieux F (ed), Internaonal police cooperaon: Emerging
issues, theory and pracce. Cullompton, Devon: Willan Publishing: 126–143
Plecas D, McCormick AV, Levine J, Neal P & Cohen IM 2011. Evidence-based soluon to informaon
sharing between law enforcement agencies. Policing: An Internaonal Journal of Police Strategies &
Management 34(1): 120–134
Police Foundaon 2016. Best pracces in event deconicon. hps://www.calea.org/sites/default/
les/EventDeconicon_PoliceFoundaon.pdf
Ratclie JH 2016. Intelligence-led policing, 2nd ed. Abingdon: Routledge
Ratclie JH & Walden K 2010. State police and the Intelligence Centre: A study of intelligence ow to
and from the street. Internaonal Associaon of Law Enforcement Intelligence Analysts Journal 19(1):
1–19
Rickards C 2016. What are the barriers to gathering and sharing organised crime intelligence: An
Australian perspecve. European Review of Organised Crime 3(1): 78–104
Sales NA 2010. Share and share alike: Intelligence agencies, informaon sharing and naonal security.
George Washington Law Review 78(2): 279–352
Schein EH 2017. Organizaonal culture and leadership, 5th ed. Hoboken, NJ: John Wiley and Sons
Sheptycki J 2017. The police intelligence division-of-labour. Policing and Society 27(6): 620–635
Sheptycki J 2004. Organisaonal pathologies in police intelligence systems: Some contribuons to the
lexicon of intelligence-led policing. European Journal of Criminology 1(3): 307–332
General editor, Trends & issues in crime and criminal jusce series: Dr Rick Brown, Deputy
Director, Australian Instute of Criminology. Note: Trends & issues in crime and criminal jusce
papers are peer reviewed. For a complete list and the full text of the papers in the Trends &
issues in crime and criminal jusce series, visit the AIC website at: aic.gov.au
ISSN 0817-8542
©Australian Instute of Criminology 2018
GPO Box 1936
Canberra ACT 2601, Australia
Tel: 02 6268 7166
Disclaimer: This research paper does not necessarily
reect the policy posion of the Australian Government
Trends & issues in crime and criminal justice
Australian Institute of Criminology
aic.gov.au
Dr Rick Brown is the Deputy Director
of the Australian Instute of
Criminology and Vising Fellow of
Policing and Criminal Jusce at the
University of Derby.
State Coroner of New South Wales 2017. Inquest into the deaths arising from the Lindt Café siege:
Findings and recommendaons. Glebe, NSW: Coroners Court of New South Wales. hp://www.
lindnquest.jusce.nsw.gov.au/
Taylor RW & Russell AL 2012. The failure of police ‘fusion’ centers and the concept of a naonal
intelligence sharing plan. Police Pracce and Research 13(2): 184–200
Whelan C 2016. Organisaonal culture and cultural change: A network perspecve. Australian and
New Zealand Journal of Criminology 49(4): 583–599
... In a study that seeks to understand law enforcement information sharing for criminal intelligence purposes, Brown (2018) stated that crime information is central to modern crime control. The sophistication of crime information depends on the sharing of the same between and amongst stakeholders. ...
... Failure to share crime information among stakeholders may also result in what could lead to blind spots in law enforcement. It could also lead to a waste of time and resources as agencies duplicate each other's efforts which obstructs the ability of law enforcement to respond with urgency or even prevent crimes more serious crimes from occurring (Brown 2018). Most countries have found value in constantly reviewing how crime data is stored and shared to ensure that stakeholders and law enforcement officials can easily collaborate, assess success, and fight crime more efficiently. ...
... It is also essential that this information is protected so that crime prevention policies do not trump the right to privacy. Information sharing networks must be bound by the same standards for storing and disseminating information to avoid leakage or mishandling of such information (Brown 2018). Data collection and analysis should be predicated on a strategic plan that outlines the agency's needs, the peculiarities of the communities they serve, and the available funding. ...
Article
Full-text available
When measures for crime management seem inefficient, it suggests something is wrong with the performance of the security stakeholders. The current study used a rational choice model to examine how the various security agencies and stakeholders access crime information and whether or not such information is shared between and among the various stakeholders, and how the same is preserved and used in managing crime in Sabon Tasha. The aim is to explain the seeming ineffectiveness of crime management in Sabon Tasha. The study utilized an in-depth interview supplemented with a research questionnaire to obtain data from the respondents. The study findings indicate that security stakeholders in Sabon Tasha access crime information primarily through reports and non-forensic investigations and that a tradition of information sharing exists amongst stakeholders. Still, crime information in Sabon Tasha is poorly preserved. The study also reveals that stakeholders are using crime information inefficiently as the area's crime rate increases. It is the position of this study that information is vital in any attempt at managing crime. However, it brings attention to the more critical issue of the sophistication and reliability of the source(s) of crime information and how it is shared, processed, preserved, and utilized. The competency of security stakeholders is central here as this determines their ability to source reliable information, adequately share, preserve, analyze, and use the same against criminals. Considering the primacy of security in the wellbeing of every community, this study recommends the sincere tackling of the obstacles against the proper access, preservation, and the effective use of crime information in Sabon Tasha, as revealed by the study.
... Giving careful though to fear resulting from increment in criminal activities, awareness of danger in Nigeria viz terrorists, armed robbery and other crimes connected either logically, casually or by shared characteristics, easily available by individuals who created groups with related sense of concern and curiosity with networks having power greater than expected as their aim is as a result of crime which presents the lack of power by government to perform towards giving what is desired; security to lives, properties and economic activities conduct. [10] posits that Crimes are a social nuisance and cost the society extremely in many ways.As such, information sharing and effective agencies collaboration is the key to any success story behind every State security architecture in the fight against crime. According to [11], Criminal Intelligence has become a central tool in modern crime control that is used by Law Enforcement to understand rapid changes in crime and criminality. ...
Article
Full-text available
Crime detection, investigation and prosecution are usually carried out by the various law enforcement agencies saddled with such responsibilities. In this study, an integrated web based unified system was developed and implemented for the five (5) agencies (Nigerian Police Force, National Drug Law Enforcement Agency, Economic Financial Crime Commission, Independent Corrupt Practices Commission, Department of State Services) to enhance domiciliation of crime data into one system for effective information sharing among the five agencies. The methodology adopted for the system design is Object Oriented Analysis and Design Methodology (OOADM) and the tools used are HTML, CSS, JavaScript, MySQL. The result obtained shows that with the integration of the five agencies, accurate records of suspects and victims were timely shared by the various agencies. There is also an effective collaboration among the various agencies in crime detection, investigation and prosecution of suspects.
Article
Full-text available
Managing offenders released from prison requires a multiteam system (MTS) approach, with teams from across police, probation, and other criminal justice agencies. However, public inquiries highlight current approaches are impaired by poor information sharing that compromises risk assessment and recall decisions, which can allow serious further offences to occur. Little research has focused on the causes of these information sharing difficulties. The current study draws on the perspectives and experiences of probation and police officers to improve understanding of causes of information sharing difficulties. The research is conducted within the context of a new enhanced information sharing ‘Direct Access’ initiative implemented in one region of the UK (Devon and Cornwall) that permits probation to directly access police information technology systems. This provides a novel opportunity to cross validate MTS theory to the real-world context of offender management and considers what works in practise to overcome information sharing challenges. Eleven semi-structured interviews were conducted with police (N = 4) and probation (N = 7) officers. Thematic analysis revealed six themes: i) information sharing difficulties and impact; ii) causes of information sharing difficulties; iii) impact of ‘Direct Access’ on information sharing practices; iv) workload inequality; v) training; and vi) evolution of ‘Direct Access’. Overall, findings highlight that information sharing difficulties are causes by not knowing what information to request or share, limited resources, lack of clarity about General Data Protection Regulation and concern about consequences of breaching this. These barriers can result in delays and failures to share information, which hinders the accuracy of risk assessments and ability to safeguard. Findings also highlight that providing statutory partners with ‘Direct Access’ to I.T systems can improve the relevance and timeliness of information. However, ‘daring to share’ is not enough to address trust issues without also clarifying expectations regarding information use and perceived workload inequalities.
Article
Full-text available
The September 11 attacks impacted society generally, and law enforcement specifically, in dramatic ways. One of the major trends has been changing expectations regarding criminal intelligence practices among state, local, and tribal (SLT) law enforcement agencies and the need to coordinate intelligence efforts and share information at all levels of government. In fact, enhancing intelligence efforts has emerged as a critical issue for the prevention of all threats and crimes. To date, an increasing number of SLT law enforcement agencies have expanded their intelligence capacity, and there have been fundamental changes in the national, state, and local information sharing infrastructure. Moreover, critical to these expanding information sharing expectations is the institutionalization of fusion centers (FCs). Despite these dramatic changes, an expanding role, and the acknowledgement that local law enforcement intelligence is critical to the prevention and deterrence of threats and crimes, very little research exists that highlights issues related to the intelligence practices of SLT law enforcement agencies and FCs.1 This research describes what agencies are doing to build an intelligence capacity and assesses the state of information sharing among agencies. Specifically, a national survey was developed to examine the experiences of SLT agencies and FCs for building an intelligence capacity as well as to understand critical gaps in the sharing of information regarding intelligence.
Article
Full-text available
Intelligence fusion centers have grown rapidly in the last few years as state, local, and tribal law enforcement agencies have attempted to find the best way to share information about threats to their communities. The Department of Homeland Security and the Information Sharing Environment of the Office of the Director of National Intelligence embraced fusion centers as being an important mechanism to aid them in their missions to share terrorism information among law enforcement, the private sector, and the intelligence community. The development and management of fusion centers have received significant guidance from the Justice Department, via the Global Intelligence Working Group, by developing standards for structure and processes. Critics, however, are concerned that the centers have inadequate protections for privacy and civil rights. This article examines issues in the development of fusion centers and provides an examination of the support for and criticisms of such agencies.
Book
Full-text available
The globalization of threats and the complexity of international security issues represents a greater challenge for international policing in (re)shaping inter-agency interaction, and makes effective international police cooperation more necessary than ever before.
Article
During the 1990s serious and organized crime moved to the top of the agenda for policing internationally. This shift took place during the same period that new information and communications technologies were being adopted across the policing sector in most European countries, a shift known in some places as the rise of ‘intelligence-led policing’. Discussion of intelligence-led policing against serious and organized crime has tended to focus on formal models of intelligence systems. The purpose of this paper is to contribute to the vocabulary of intelligence-led policing by providing the terms for describing the organizational problems that bedevil the organization of police information systems. It is based on original empirical research in the United Kingdom and a number of other countries and provides a lexicon of 11 organizational pathologies. The paper ends by arguing that strategic intelligence forecasts about future trends in organized and serious crime that emanate from the police sector are not as strategic or as comprehensive as they appear to be.
Article
This article explores public concerns about the US Department of Homeland Security’s data ‘fusion centers’. These centers, which are proliferating across all US states, coordinate data-sharing among state and local police, intelligence agencies, and private companies. The primary goal of fusion centers is to engage in intelligence-sharing for counter-terrorism purposes. However, they have been used for a variety of other purposes, such as basic policing, spying on social movement organizations, or restricting legal public activities such as taking photographs. Drawing upon a comprehensive analysis of media publications from 2002 to 2008, we identify and discuss three primary categories of concern with fusion centers: (1) their ineffectiveness, particularly given the financial expense, the statistical unlikelihood of terrorist attacks, and the pressing need for other law enforcement support; (2) the potential for mission creep, where the functions of fusion centers expand beyond their originally intended purposes to encompass things like all-hazards preparedness; and (3) the violation of civil liberties, especially through racial profiling or First Amendment violations.
Article
In an attempt to address the criticism of a lack of interagency cooperation among law enforcement agencies, police agencies are being forced to adopt an intelligence-led policing (ILP) paradigm. While there is consensus on the need for better intra- and interagency cooperation among law enforcement agencies to prevent future attacks on the USA, there is debate over the best approach to implementing paradigmatic change at the local level. Although the ILP paradigm is an acceptable model, it is not without limitations. Therefore, the goal of this paper is to describe the ILP model and outline some major challenges that an ILP model presents for policing in a post-9/11 world and highlight current measures to address shortcomings. It is concluded that in order to overcome the shortcomings in efficiency and cooperation, and to enhance the protection of civil liberties, law enforcement agencies must take advantage of training initiatives and adhere to existing intelligence policies.