Guide icon

Guide

Intelligence

Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Web Address Icon
Suspicious Activity Reporting (SAR) Line Officer Training
The Suspicious Activity Reporting (SAR) Line Officer Training was developed to assist law enforcement line officers in understanding what kinds of suspicious behaviors are associated with pre-incident terrorism activities, documenting and reporting suspicious activity, and protecting privacy, civil rights, and civil ...
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Cover Page
A Call To Action: A Unified Message Regarding the Need to Support Suspicious Activity Reporting and Training
This Unified Message was created to help clarify a unified approach to the process of reporting and sharing of information related to suspicious activity.