Page:Protective Intelligence and Threat Assessment Investigations - A Guide for State and Local Law Enforcement Officials.pdf/39

 prepared to conclude whether the letter writer poses a threat to the Governor.

Information about the persons who are subjects of threat assessment investigations should be organized and maintained in a manner that permits search capabilities, efficient retrieval, and analysis. Some individuals come to the attention of the authorities more than once, sometimes months and even years after the initial investigation was completed and the case closed. In these cases, prompt retrieval of case materials fosters an informed decision of what additional investigation, if any, is needed.

Developing a database also permits later analysis of behavior patterns that come to the attention of threat assessment investigators. A database containing both anecdotal and statistical information about individuals who have been investigated could promote future development of training materials and teaching programs for agencies with protective intelligence and physical protection responsibilities.

Creating a database of threat assessment cases is also useful for interagency cooperation. Attackers and would-be attackers often consider multiple targets, who may live in different jurisdictions with various law enforcement agencies and security organizations responsible for physical protection and protective intelligence. To facilitate the detection of patterns of behavior in known would-be attackers, law enforcement agencies should implement information-sharing programs with other such organizations. Under most circumstances, law enforcement organizations are permitted to share such information. In many cases, law enforcement organizations can receive information, even though they may not provide information to other agencies. Other organizations and individuals often understand these restrictions and may be willing to give information that may help prevent attacks. Rh