31
Security Threat Groups Identification and Management

Security Threat Groups Identification and Management

Embed Size (px)

Citation preview

Security Threat GroupsIdentification and Management

Introduction

DOC believes that Security Threat Group activity creates a clear and present danger to DOC security and public order.

The policy of DOC is to prohibit and eliminate any Security Threat Group criminal activity.

DOC policy regarding Security Threat Groups is directly influenced by Colorado State Statutes, in particular C.R.S. 17-1-109.

Security Threat Group (STG)

“A group of three or more individuals with a common interest, bond, or activity characterized by criminal or delinquent conduct, engaged in either collectively or individually, with the potential to create a security threat within DOC. This shall include, but not be limited to: gangs, disruptive, and deviant groups.”

(A.R. 1150-02RD and CRS 17.1.109)

Unified Intelligence Team (UNIT)

OUR PURPOSE

The gathering of information and intelligence in

order to assist in the identification,

management, and threat assessment of

Security Threat Groups and members.

The UNIT

Ties together all facility intelligence and investigative information.

Provides intelligence support and assistance in the management of Security Threat Groups (STG).

The UNIT works closely with: Facilities; Central classification; Private Prison Monitoring Unit; Parole; Outside law enforcement; Crime and intelligence analysts

The UNIT

DOC Security Threat Groups (STG)

Beyond just “Gangs”

Security Threat Group

Let’s Simplify: A group of three or more individuals

dedicated to common interests or activities with a criminal intent.

They may act individually or in consort.

They often act to the exclusion of others.

Level 1Level 1GroupingsGroupings SimilaritiesSimilarities

Home town / neighborhood / geographical Home town / neighborhood / geographical areaarea

Cultural / racialCultural / racial

Common enemyCommon enemy

Level 2Level 2Cliques Cliques

Unstructured – no rules, constitutions, etc.Unstructured – no rules, constitutions, etc.

Acceptance by peersAcceptance by peers

No commitmentNo commitment

No rules for acceptanceNo rules for acceptance

Level 3Level 3Protective GroupsProtective Groups

Self IdentitySelf Identity

Existence of simple, general rulesExistence of simple, general rules

Recognition by peersRecognition by peers

Level 4Level 4Predator GroupsPredator Groups

Discussion of formalizing rulesDiscussion of formalizing rules Beginning to realize strengthBeginning to realize strength Weeding out undesirable or unwilling Weeding out undesirable or unwilling

membersmembers Peer intimidationPeer intimidation Retaliation & assaultsRetaliation & assaults Initial entry into illegal activities as a group Initial entry into illegal activities as a group

Level 5Level 5Security Threat GroupsSecurity Threat Groups

Well defined, structured rules and/or Well defined, structured rules and/or constitution (by-laws)constitution (by-laws)

Same goals and philosophiesSame goals and philosophies Ongoing criminal enterpriseOngoing criminal enterprise Possible external influences in prison and on Possible external influences in prison and on

the streets.the streets.

We may generalize and call them gangs.

Gangs vs. STGs

Street Gang Prison Gang

Terrorist Cartels Disruptive Group

Classification of the STG Offender

Identifiers

Example of By-laws

By-laws (cont)

We believe in the teachings of our honorable chairman. All Laws & policies are set forth by our Chairman and our executive staff. In the concept of ideology & organization; I shall Aid & Assist all Brothers of struggle in ALL Righteous endeavors.

utilizing & standing on our six points; socially, politically & econonomically we shall become a more reckoning Power of people throughout boundaries, without measures.

STG Validation System

This system is utilized to identify and track STG affiliates, and manage them accordingly.

Access is restricted to appropriate personnel. Information is reviewed and validated by the

Facility Intel Officer and the UNIT. Used as management and classification tool

Management Variables

Policy Behavior driven We have a clear guideline for processing

STG affiliates into our most secure environment in the corrections system (Administrative Segregation status) due to the negative behavior or they pose a security concern.

Requires that validation be a direct link to classification / investigations

Behavioral Management

STG members are classified based on behavior, not STG validation

We do not separate by races We do not segregate rival STG’s We allow offenders to interact We allow offenders to become inactive

Combating STG Activity

Identify, track, monitor, and counsel Zero tolerance Strict enforcement of dress code and allowable

property regulations Enforcement of applicable administrative

regulations Criminal prosecution

DOC External Partnerships

FBI Joint Terrorism Task Force Federal Bureau of Prisons

State Fusion Center Colorado Intelligence Analysis Center

Communication with Corrections Agencies in other states

Federal, State, and Local Law Enforcement Agencies

DISCLOSURE

The CDOC does not classify offenders solely based on STG identification. The CDOC stance is, it is not a crime to be a STG member. However, the policy is driven to prohibit or eliminate any negative behavior or security risks that often occur with STG affiliation. 

THANK YOU

Building a Safer Colorado for Today and Tomorrow