Fusion Centers

Principle of Freedom


Amendment IV of the Constitution - The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


Principle of Collectivism


A fusion center is defined as a “collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.” Among the primary focuses of fusion centers are the intelligence and fusion processes, through which information is collected, integrated, evaluated, analyzed, and disseminated. Nontraditional collectors of intelligence, such as public safety entities and private sector organizations, possess important information (e.g., risk assessments and suspicious activity reports) that can be “fused” with law enforcement data to provide meaningful information and intelligence about threats and criminal activity. It is recommended that the fusion of public safety and private sector information with law enforcement data be virtual through networking and utilizing a search function. Examples of the types of information incorporated into these processes are threat assessments and information related to public safety, law enforcement, public health, social services, and public works.


Data fusion involves the exchange of information from different sources—including law enforcement, public safety, and the

private sector—and, with analysis, can result in meaningful and actionable intelligence and information. The fusion process turns this information and intelligence into actionable knowledge. Fusion also allows for relentless reevaluation of existing data in context with new data in order to provide constant updates. The public safety and private sector components are integral in the fusion process because they provide fusion centers with crime-related information, including risk and threat assessments, and subject-matter experts who can aid in threat identification. 

   December 20, 2010 
In The News  

The case OK-SAFE has been building and advancing for three years has finally made it to the mainstream media – the government is monitoring the American people.

State and Federal Representatives have steadfastly scoffed at the idea.

A Washington Post article entitled Monitoring America offers a window into the deceptive nature of our government. 

   September 11, 2010 
In The News  

   August 15, 2010 
In The News  

   February 14, 2010 - Read this and then ask if Fusion Centers aren't destined as part of a Global System
In The News  
ARTICLEVision 2015 – A Globally Networked and Integrated Intelligence Enterprise (10MB)


Integrate foreign, military, and domestic intelligence capabilities through policy, personnel and technology actions to provide decision advantage to policy makers, warfighters and homeland security officials and law enforcement personnel.- J.M. McConnell - Director of National Intelligence


We live in a dynamic world in which the pace, scope, and complexity of change are increasing. The continued march of

globalization, the growing number of independent actors, and advancing technology have increased global connectivity, interdependence and complexity, creating greater uncertainties, systemic risk and a less predictable future. These changes have led to reduced warning times and compressed decision cycles. Although this interconnected world offers many opportunities for technological innovation and economic growth, it also presents unique challenges and threats. In this environment, the key to achieving lasting strategic advantage is the ability to rapidly and accurately anticipate and adapt to complex challenges.


Not only will the type of customer change within our existing federal policy-making sets, but the range of customers will broaden to emphasize other federal departments (e.g., Health and Human Services, Agriculture, Commerce), state and local agencies, international organizations, and private sector and non-governmental organizations. 
         RFID DATA

   February 7, 2010 

LAS VEGAS — It’s one of the most hostile hacker environments in the country –- the
DefCon hacker conference held every summer in Las Vegas.

But despite the fact that attendees know they should take precautions to protect their
data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader.

The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and
other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view.

It was part of a security-awareness project set up by a group of security researchers and
consultants to highlight privacy issues around RFID. When the reader caught an RFID chip in its sights — embedded in a company or government agency access card, for example — it grabbed data from the card, and the camera snapped the card holder’s picture.

This year they planned to add data collected from the RFID reader and camera (below) — to raise awareness about a privacy threat that’s becoming increasingly prevalent as RFID chips are embedded into credit cards, employee access cards, state driver’s licenses, passports and other documents.


You have probably heard of Radio Frequency Identification (RFID) technology in many different contexts. RFID describes a broad range of technologies that allow the identification and tracking of physical items using radio waves, and have far-reaching implications for processes as wide-ranging as factories, hospitals, airports, battlefields and retail sales.

RFID The Right Frequency for Government IBM

The integration of RFID technology with other information technology makes a paradigm shift now possible.
RFID technology can track patient safety by error-proofing processes for medication, as well as providing global visibility of worldwide shipments, which will improve the flow of commerce and the security of nations. The future role of RFID will dramatically increase its impact over that of its predecessors.

The potential of RFID is indeed great. The supply chain management industry refers to the “three V’s of RFID”:
visibility, velocity, and value. RFID promises to increase visibility to make earlier and better decisions and actions possible. Second, RFID will enable the flow of goods and information to be accelerated, with a higher certainty of information for decision making. Finally, RFID will enable important enhancement of value, often in new ways. As described by Professor Wyld, RFID offers the potential to provide increased safety for patients, faster movement of automobiles from manufacturer to dealer, and greater national security.

   February 7, 2010 

WASHINGTON — The Transportation Department said Tuesday it is prohibiting truck and bus drivers from sending text messages on hand-held devices while operating commercial vehicles.

The prohibition, which applies to drivers of interstate buses and trucks over 10,000 pounds, is effective immediately, the department said in a statement. Truck and bus drivers who text while driving commercial vehicles may be subject to civil or criminal penalties of up to $2,750, the department said.

LaHood said enforcing restrictions on texting and cell phone use by drivers will be difficult. He urged the wireless industry to work with public officials to come up with a solution.

The Transportation Department and safety advocates have also joined forces to create FocusDriven, an organization to campaign against cell phone use or texting on handheld computers while driving.


   December 31, 2009 

The next National Fusion Center Conference will be held Feb 23-25, 2010 in New Orleans, LA.


The 2010 agenda confirms everything we've been talking about - information sharing, funding, partnering with the private sector, etc.

Schedule of Events

The conference agenda will provide attendees with an opportunity to learn more about issues directly affecting fusion centers.  Featuring both plenary and breakout sessions, the conference will cover a variety of topics, including:

  • Funding and Sustainment
  • Baseline Capabilities
  • Suspicious Activity Reporting Projects
  • Threats/Alerts/Warnings
  • Developing an Intelligence Capability                
  • Federal Initiatives
  • Security and Privacy Issues                                 
  • Sharing of Best Practices and Success Stories
  • Protecting Sensitive Case Material
  • Fusion Center Resources                                           
  • Fusion Center Training and Technical Assistance
  • National Intelligence Information Sharing Tools
  • Integration Efforts                                              
  • And more!

   December 31, 2009 

I think to do that requires us at the federal level in our organizational strategy to make clear that Fusion Centers are not just about isolated information-sharing, but they really are about taking information gathered at the state and local level and putting it into an analytical product that can be used at the federal level and that the federal law enforcement agencies are sharing the reverse at the state and local as much as can be done.

And second is that the partnerships involved in Fusion Centers need to be looked at very, very broadly. Who is in your Fusion Center? Do you have representatives from the relevant federal authorities in your locality? Do you have representation from your state, from your local police departments, tribal, if you are in an area of the country that has tribes? In short, are the relevant players all there and co-located in the right way? And are those players undergoing some things that will give them some commonality, training, exercising, things of that sort, so that a building filled with individuals becomes a real active and vibrant center for thinking, analysis, exchange of information?

Third, have we made sure that through the Fusion Centers, we have created kind of seamless network of information-sharing not just vertically state to Fed, local to state to Fed, but also horizontally across the country at different levels, and have we taken into account all that that sharing can entail?

   September 15, 2009 

Transcript of Testimony by Captain Michael Corwin

Transcript of KC Police Capt. Michael Corwin's testimony at the August 31, 2009 Missouri House Interim Committee on State Intelligence Analysis Oversight, where public input was sought on the MIAC report (Missouri Information Analysis Center - one of Missouri's federally funded fusion centers).


OK-SAFE's Executive Director, Amanda Teegarden, gave testimony to the committee and presented copies of OK-SAFE's power point on "Fusion Centers, or I Spy for the Intelligence Enterprise"


Of particular interest in Corwin's statement is the following comment, "The era of intelligence-led policing is upon us."

Sounds like a military operation...

   September 14, 2009 

The Departments of Defense (DoD) and Homeland Security (DHS) today announced an initiative to grant select state and major urban area fusion center personnel access to classified terrorism-related information residing in DoD’s classified network.


Under this initiative, select fusion center personnel with a federal security clearance will be able to access specific terrorism-related information resident on the DoD Secret Internet Protocol Router Network (SIPRNet)—a secure network used to send classified data. This classified data will be accessed via DHS’ Homeland Security Data Network (HSDN). DHS will be responsible for ensuring that proper security procedures are followed.


“With this action, DoD continues its work in supporting states and localities who are leading our efforts to secure the nation from domestic terrorism attacks, said Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Paul N. Stockton. “We look forward to exploring other opportunities where DoD can help our state and local partners effectively defeat terrorism.”  _______________________________________________________________________________________________________ 

"What we in America call terrorists are really groups of people that reject the international system..." -- Henry Kissinger, speaking at a conference hosted by AKbank in Istanbul Turkey on May 31, 2007

   September 10, 2009 

The director of the Oklahoma State Bureau of Investigation said there is a constant balancing act
between the basic rights of Americans and the need to investigate and prevent crime.

A controversial aspect to 21st Century crime fighting is the development of “fusion centers”
across the country.

In fact, the OSBI created such a center in its headquarters in Oklahoma City.

A fusion center is defined as a “collaborative effort of two or more agencies that provide
resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.” Among the primary focuses of fusion centers are the intelligence and fusion processes, through which information is

collected, integrated, evaluated, analyzed and disseminated.


   August 30, 2009 
      DOJ - 09-2008

   August 30, 2009 
10 Simple Steps

Recognize your responsibilities and lead by example

Recognize the value of sharing intelligence information within your own agency, and encourage the practice of sharing information with other law enforcement and public safety agencies. Use the guidelines and action steps outlined in the National Criminal Intelligence Sharing Plan (“Plan”) to implement or enhance your organization’s intelligence function.

Canada MOU Guidelines

The terminology used in a MoU must reflect the fact that a MoU has no binding basis in law and is not a legal or contractual document. Specific terminology is reserved for use in contracts or treaties and should, therefore, be avoided in a MoU. While other terms may be used their use is discouraged. The following tables provide examples and alternatives for both cases.

Chiefs Resolution

CIIA HR5005 Title II Information and Infrastructure

EO12958 1995 Classification of Info Clinton

EO12968 1995 Access to Classified Info Clinton

EO13292 2003 Amends EO12958 Bush

FBI Information in Security Clearances

FDLE Manual

IACP Criminal Intelligence Model Policy

IACP Facility Model

LEIU Audit Checklist

NIST Contingency Plan

Personnel Checklist

Privacy and Civil Liberties Policy


   August 24, 2009 
Oklahoma Agency Spurs Privacy Concerns - By Michael McNutt; Oklahoman Newspaper



“Government information-gathering centers intended to thwart domestic terrorist activity could violate individuals’ privacy rights and be used to spy on American citizens, representatives of two groups on both ends of the political spectrum say.” 

   August 17, 2009 - Updated October 31, 2009 
Due to the many requests for this power point after the 10th Annual Freedom 21 National Conference, OK-SAFE is publishing their presentation in PDF format. 
Entitled Fusion Centers, or I Spy for the Intelligence Enterprise, this presentation includes detailed information on the definition of and nature of fusion centers, their goals and objectives, as well homework assignments for concerned citizens:
1) Stop any legislation allowing "direct electronic access to the [state agency, i.e. Dept. of Public Safety, computerized photo or other data], by law enforcement, or any political subdivision of the state, for law enforcement purposes"; in Oklahoma, this would include 2009's SB 483.
2) Identify the Fusion Center in your state; contact your elected officials to express our concerns with these facilities; seek defunding of these facilities.
The presentation is a work-in-progress and will continue to be updated and modified as appropriate.

   June 22, 2009 

POLICY FORUM - Thursday, June 11, 2009

Featuring Bruce Fein, Constitutional Attorney, The Lichfield Group; Harvey Eisenberg, Chief, National Security Section, Office of United States Attorney, District of Maryland; and Michael German, Policy Counsel, American Civil Liberties Union. Moderated by Tim Lynch, Director, Project on Criminal Justice, Cato Institute.

Quote from one panelist: "We're not very far from a Stazi..."



The Cato Institute
1000 Massachusetts Avenue, NW
Washington, DC 20001

   June 8, 2009 
Security Risk!? - April 15, 2009 - Dr. Everett Piper; President of Oklahoma Wesleyan University
The United States Department of Homeland Security (DHS) just identified those US citizens who are focused on "right wing issues" as security risks! Does anyone but me hear the voice of George Orwell echoing through the halls of our Capital, our culture, our corporations, our churches and our Country right now?

Who defines what these dangerous right wing issues are? The Fed? The DHS? The Congress? The President? Or maybe ACORN, the ACLU, NAMBLA, PETA, George Soros, Michael Moore, or even your State's governor or your local police chief? Does it concern you that someone who proudly and myopically wears the label of "Left" is now declaring that those on the "Right" are a security risk because of your ?extreme? and singular focus? 


   April 22, 2009 

Dear Secretary Napolitano:


".....First, your report states that “rightwing extremists will attempt to recruit and radicalize returning veterans in order to exploit their skills and knowledge derived from military training and combat”. Using the DHS rationale, do you also believe that weapons familiarity and tactical training means local, state and federal law enforcement personnel, and members of the National Guard, are also being recruited? To suggest a soldier returning from combat tour is more prone to join an extremist group is unconscionable and insulting to our brave men and women who risk their lives protecting our freedom.    


Second, the report states that millions of Americans who believe in the Second Amendment are a potential threat to our national security. Why? Do you have statistics to prove that law-abiding Americans who purchase a legal product are being recruited by so-called hate groups? If so, please present us with DHS’s independent data.


Third, the report identifies those individuals who believe in such issues as pro-life legislation, limited government, legal verses illegal immigration and limited federal government as potential terrorist threats. We can assure you that these beliefs are held by citizens of all races, party affiliations and sex, and should not be listed as a factor in determining potential terror threats. A better way to describe them is as citizens exercising their First Amendment rights."

   April 22, 2009 
This Cooperative Agreement (Agreement) governs the participation of OK DPS,' hereinafter referred to as Member Agency, and The International Justice and Public Safety Information Sharing Network (Nlets). The purpose of this Agreement is to provide for the Member Agency's membership in Nlets. 
Nlets agrees to furnish telecommunications facilities for the exchange of criminal justice related information between the Member Agency and other Nlets members. The parties agree that Nlets is obtaining its telecommunications facilities from third parties and agree that Nlets' obligations hereunder will be suspended during any period which Nlets' access to, or utilization oft such facilities is limited or interrupted.

Oklahoma DPS & Oklahoma LETS & FBI Terminal User Agreement

This document constitutes an agreement between the Oklahoma Department of Public Safety (DPS), State Administrator of the Oklahoma Law Enforcement Telecommunications Systems (OLETS) Division and the Federal Bureau of Investigation.


The Department of Public Safety agrees to maintain, operate and manage the OLETS Telecommunications and Criminal Justice Information Systems on a 24-Hour, 7 Day per week basis. The OLETS Division further agrees to act as the STATE CONTROL TERMINAL AGENCY (SCTA) to facilitate the exchange of criminal justice information between the USER AGENCY and the following computer interfaces; National Crime Information Center (NCIC); the National Law Enforcement Telecommunications System (NLETS); the Department of Public Safety State Computer Files (SCOM); the Oklahoma Tax Commission Vehicle Registration Files (VREG); the Oklahoma State Bureau of Investigation Files (OSBI); the Office of Juvenile Affairs Data Base, (JOLTS) and other data bases that may be implemented in future applications of information available to qualified users.

Oklahoma DPS & Oklahoma LETS & OKCPD Terminal User Agreement

This document constitutes an agreement between the Oklahoma Department of Public Safety (DPS), State Administrator of the Oklahoma Law Enforcement Telecommunications Systems (OLETS) Division and the Oklahoma City police department.



The Department of Public Safety agrees to maintain, operate and manage the OLETS Telecommunications and Criminal Justice Information Systems on a 24-Hour, 7 Day per week basis. The OLETS Division further agrees to act as the STATE CONTROL TERMINAL AGENCY (SCTA) to facilitate the exchange of criminal justice information between the USER AGENCY and the following computer interfaces; National Crime Information Center (NCIC); the National Law Enforcement Telecommunications System (NLETS); the Department of Public Safety State Computer Files (SCOM); the Oklahoma Tax Commission Vehicle Registration Files (VREG); the Oklahoma State Bureau of Investigation Files (OSBI); the Office of Juvenile Affairs Data Base, (JOLTS) and other data bases that may be implemented in future applications of information available to qualified users.   


   April 12, 2009 

U) Scope

(U//FOUO) This product is one of a series of intelligence assessments published by the Extremism and Radicalization Branch to facilitate a greater understanding of the phenomenon of violent radicalization in the United States. The information is provided to federal, state, local, and tribal counterterrorism and law enforcement officials so they may effectively deter, prevent, preempt, or respond to terrorist attacks against the United States. Federal efforts to influence domestic public opinion must be conducted in an overt and transparent manner, clearly identifying United States Government sponsorship. 
U) LAW ENFORCEMENT INFORMATION NOTICE: This product contains Law Enforcement Sensitive (LES) information. No portion of the LES information should be released to the media, the general public, or over non-secure Internet servers. Release of this information could adversely affect or jeopardize investigative activities.
(U) Warning: This document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information and is not to be released to the public, the media, or other personnel who do not have a valid need-to-know without prior approval of an authorized DHS official. State and local homeland security officials may share this document with authorized security personnel without further approval from DHS.

(U) All U.S. person information has been minimized. Should you require the minimized U.S. person information, please contact the DHS/I&A Production Branch at,, or


* (U) Rightwing extremism in the United States can be broadly divided into those groups, movements, and adherents that are primarily hate-oriented (based on hatred of particular religious, racial or ethnic groups), and those that are mainly antigovernment, rejecting federal authority in favor of state or local authority, or rejecting government authority entirely. It may include groups and individuals that are dedicated to a single issue, such as opposition to abortion or immigration.


(U) Reporting Notice:

(U) DHS encourages recipients of this document to report information concerning suspicious or criminal activity to DHS and the FBI. The DHS National Operations Center (NOC) can be reached by telephone at 202-282-9685 or by e-mail at For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by e-mail at The FBI regional phone numbers can be found online at When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. 


   March 21, 2009 
Missouri Information Analysis Center

Missouri Information Analysis Center (MIAC) provides a public safety partnership consisting of local, state and federal agencies, as well as the public sector and private entities that will collect, evaluate, analyze, and disseminate information and intelligence to the agencies tasked with Homeland Security responsibilities in a timely, effective, and secure manner.

MIAC – Strategic Report

"Because authenticity of the report was questioned by some, this writer contacted Missouri state Representative Jim Guest (R-King City) who had personally verified that the report had indeed been issued. Rep. Guest is chairman of the Personal Privacy Committee and is a prominent leader in the national Blowback against the Real ID Act of 2005 that requires states to issue uniform driver's licenses containing personal biometric data. (See Guest warns against Big Brother, Real ID)

Rep. Guest stated that he was "shocked and outraged" at the report, which clearly paints him and many other elected state leaders, as a potential threats to law enforcement." - Patrick Wood 

Glenn Beck on MIAC Report - Video 03-21-09
Glenn Beck and Penn Jillette talk about the MIAC report implicating libertarians as possible members of militias and domestic terrorists.
An Interview with Missouri Rep Jim Guest MIAC Controversy
MIAC is a so-called “Fusion” center that uses Federal Homeland Security money and directives to manage Missouri state personnel. The budget and the MIAC scandal had become intertwined just the day before when Jim Guest introduced a bi-partisan amendment to the monster 2009 budget bill that would de-fund the Department of Public Safety (state law enforcement) and effectively stall the mammoth budget if the amendment was not passed. Guest’s amendment makes it

virtually illegal for state funds to be used for “political profiling”. The amendment passed; a temporary triumph for civil liberties.

         SHARE DATA        

   March 8, 2009 - Updated June 9, 2009-

An Overview of the Intelligence Community 2009 - Source

EPIC Amicus Brief on Fusion Centers - Source

Fusion Center Executive Summary 2006 - Source

Fusion Center Guidelines 2006 - Source

Fusion Centers Guidelines 2005 - Source

IC Information Sharing Strategy Feb 2008

National Criminal Intelligence Sharing Plan June 2005

28 CFR Sample MOU

CFR National Strategy for Information Sharing 

Reporting of Information to Federal Partners—Fusion centers shall develop the processes and protocols, in coordination with the FBI and DHS Office of Intelligence and Analysis (I&A), for ensuring that relevant and vetted priority information is reported to the JTTF and other appropriate federal agencies to support its inclusion into national patterns and trends analysis. 

Please send technical comments and problems to: webmaster

Fair Use Notice: This site contains copyrighted material, the use of which may not always have been specifically authorized by the copyright owner. Such material is made available for educational purposes, and as such constitutes "fair use" of any such copyrighted material as provided for in Section 107 of the U.S. Copyright Act. In accordance with Title 17 U.S.C. Section 107 the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Our Privacy Policy: The only personal information we give to any third party is the information you provide to us when using your debit or credit card to make a donation or purchase. All other information and correspondence are strictly confidential. We never sell, give away or barter mail lists or other information to any person, business, organization or corporation for any reason. We will not provide any personal information about you to any government or agency or employee of any government, foreign or domestic, except when we are under a court order to do so.

Other Resources

Supporting Documents

The Bill Of Rights:
(Outside Document)

Oklahoma Constitution:
(Outside Document)

The United States Constitution:
(Outside Document)

The Declaration of Independence:
(Outside Document)

The NAFTA Agreement:
(Outside Document)

(OK-Safe Document)

SAFETEA-LU Public Law 109-59:
(OK-Safe Document)

USDOT Corridors of the Future Program:
(OK-Safe Document)

Participants in USDOT Corridors of the Future Program:
(OK-Safe Document)

State of Oklahoma 

Oklahoma's Official Website


Oklahoma Governor's Office


Oklahoma Lieutenant Governor's Office


Oklahoma Secretary of State


Oklahoma Agency Directory


Oklahoma Office of State Finance


Oklahoma Open Books


OklahomaState Legislature


OklahomaState Courts Network


OklahomaState Constitution


OklahomaState Statutes


OklahomaState Election Board


Find Your Legislators


Links To Other Organizations 

Corridor Watch


Freedom 21


American Policy Center:


Eco-Logic Powerhouse:

Sovereignty International, Inc.

Conservative News:

Judicial Watch:

The August Review:

Trans-Texas Corridor:
(OK-SAFE Document)

WorldNet Daily:

Texans for Immigration Reform


The Conservative Caucus:

The John Birch Society :

The Minuteman Civil Defense Corps:

Coalition for a Prosperous America:

State Legislators for Legal Immigration:

Owasso Taxpayer Alliance:


Liberty Ark Coalition:


Farm and Ranch Freedom Alliance:




Arkansas Animal Producers:

The Arizona Sentinel:


Parental Rights:







Vicky Davis of Channeling Reality:

Joan Veon of

Joan Veon of

Charlotte T. Iserbyt of

Charlotte T. Iserbyt of

AxXiom for Liberty








Copyright ©2007 Oklahomans for Sovereignty and Free Enterprise, Inc. All Rights Reserved