Policy Text
\n\n--- Page 1 ---\n\nTALLAHASSEE POLICE DEPARTMENT
GENERAL ORDERS
SUBJECT
Criminal Intelligence Protocols
CHIEF OF POLICE
Signature on File
Proudly Policing Since 1826 Nationally Accredited 1986
NUMBER ORIGINAL ISSUE CURRENT REVISION TOTAL PAGES
30 07/15/1985 05/28/2025 12
AUTHORITY/RELATED REFERENCES
Florida Department of Education Comprehensive School Threat Assessment Guidelines
FSS Chapter 119, Public Records
FSS 1001.212, Office of Safe Schools
General Order 8, Mentally Ill Persons
General Order 17, Records Management
General Order 42, Impounding and Controlling of Property and Evidence
General Order 77, Computer, Cellular Telephone and Data Utilization
Special Order 10, Building Security and Evacuation
Title 28, Code of Federal Regulations, Part 23, U.S. Department of Justice
ACCREDITATION REFERENCES
CALEA Chapters 40, 82
CFA Chapter 19
KEY WORD INDEX
Access, Utilization and Release Procedure II
General Guidelines Procedure I
Mandatory Division Report Procedure VI
Requests for Criminal Intelligence Procedure IV
Retention Protocols Procedure III
Threat Assessments Procedure V
POLICY
The Department shall establish protocols for the collection, correlation, analysis and
dissemination of criminal intelligence in compliance with state and federal laws and
procedures. Members shall adhere to established protocols when involved in any part
of the criminal intelligence process.\n\n--- Page 2 ---\n\nTALLAHASSEE POLICE DEPARTMENT
DEFINITIONS
Criminal Intelligence: Information collected by a criminal justice agency relating to an
identifiable person, group of persons, vehicle, crime gun evidence, location, or business
in an effort to anticipate, prevent, or monitor possible criminal activity when such
information has been evaluated and determined to: 1) be relevant to the identification of
criminal activity engaged in by an individual or organization reasonably suspected of
involvement in criminal activity, and 2) meet criminal intelligence system submission
criteria of the Department.
Crime Gun: A firearm recovered by law enforcement after being used in or suspected
of being used in a crime, or where the possession of the gun itself is a crime.
Criminal Justice Agency: Any law enforcement agency, correctional agency, court or
prosecutor. The term also includes any other agency charged by law with criminal law
enforcement duties, or any agency having custody of criminal intelligence for the
purpose of assisting other criminal justice agencies in conducting active criminal
investigations or prosecutions.
Criminal Predicate: A level of suspicion established by information and sufficient facts
leading a trained law enforcement officer to believe there is a reasonable possibility an
individual or organization is involved in a definable criminal activity or enterprise.
High-Level Threat: A direct, specific, and plausible threat to physically injure, kill,
sexually assault, shoot, or injure someone with a weapon, and steps have been taken to
carry out the threat.
Low-Level Threat: A rhetorical or vague remark to physically injure, kill, sexually
assault, shoot, or injure someone made during a temporary feeling of anger or
frustration, lacking detail or plausibility, and it is unlikely to be carried out.
Mass Violence: An intentional, planned, premeditated, violent criminal act or killing
resulting in physical, emotional, or psychological injury to three or more people, not
including the perpetrator.
Medium-Level Threat: A threat expressing the intent to physically injure, kill, sexually
assault, shoot, or injure someone beyond the immediate situation and there is some risk
the subject will carry out the threat.
Targeted Violence: An intentional, planned, premeditated, and violent criminal act
resulting in physical, emotional, or psychological injury to a specific person or group of
persons.
Threat Assessment: The identification, and evaluation, of the seriousness of a threat
and danger it poses to others.
GENERAL ORDER 30 PAGE 2 of 12
CRIMINAL INTELLIGENCE PROTOCOLS MAY 28, 2025\n\n--- Page 3 ---\n\nTALLAHASSEE POLICE DEPARTMENT
PROCEDURES
I. GENERAL GUIDELINES
A. The Criminal Intelligence Unit (CIU) has the primary responsibility for gathering,
analyzing, disseminating and maintaining criminal intelligence for the
Department.
B. No criminal intelligence may be gathered or maintained in the absence of an
established criminal predicate or an identifiable threat to the community.
C. All criminal intelligence shall comply with the standards set forth in Title 28,
Code of Federal Regulations, Part 23 (U.S. Department of Justice).
D. The Criminal Intelligence and Analysis Section Commander is responsible for
the oversight, coordination, assignment and supervision of all CIU activities.
E. Criminal intelligence concerning particular individuals, vehicles, crime gun
evidence, locations, business entities, groups or enterprises may be collected
when:
1. There are circumstances which reasonably tend to indicate the information
obtained may be directly related to unlawful activity or activities that present
a threat to the community, including any act of terrorism,
2. Reasonable suspicion or criminal predicate exists that would lead a
reasonable and prudent person to believe a crime has been, is being, or will
be committed, by the person, group of persons or business entities, or
3. It is received from other criminal justice agencies.
F. Criminal intelligence can be submitted to the CIU in one of the following ways:
1. Criminal Intelligence can be submitted to TPDIntelUnit@talgov.com, with
the designation of “Criminal Intelligence” in the subject of the email.
2. Direct entry into the CrimeNtel software program (members must receive
training on software use and intelligence protocols prior to being granted user
access to the system), or
3. Direct contact with a CIU member.
G. CIU members or the High-Risk Offender (HRO) Bureau Commander, or
designee, shall assess all incoming criminal intelligence and disseminate it to
the appropriate entities.
GENERAL ORDER 30 PAGE 3 of 12
CRIMINAL INTELLIGENCE PROTOCOLS MAY 28, 2025\n\n--- Page 4 ---\n\nTALLAHASSEE POLICE DEPARTMENT
H. CIU members or the HRO Bureau Commander shall ensure the criminal
intelligence collected meets the definition of criminal intelligence set forth in this
policy.
II. ACCESS TO, UTILIZATION AND RELEASE OF CRIMINAL INTELLIGENCE
A. CIU files shall be kept separate and secure from all other files. These files shall
be located in a secure manner dedicated to intelligence file storage.
B. Collation and analysis of criminal intelligence shall occur in a secure
environment, and CIU member shall:
1. Follow the computer security protocols of General Order 77 (Computer,
Cellular Telephone and Data Utilization) and security protocols assigned
and maintained by the City of Tallahassee Technology & Innovation
Department when working with criminal intelligence, and
2. Collate and analyze criminal intelligence in a secure environment only.
C. Access to and use of criminal intelligence shall be strictly limited to authorized
members who have a demonstrated need for particular information.
D. Members shall only view or enter into the CrimeNtel database at or below their
respective access level. The levels are:
1. Top Secret – Reserved
2. Secret – Highly sensitive criminal intelligence records/wiretap information
3. Confidential – Sensitive criminal intelligence records/active criminal
investigations
4. Restricted – Entry-level criminal intelligence
5. Unclassified – Members shall not utilize this access level
E. Security measures to protect unauthorized attempts to access, modify, remove
or destroy stored information, whether electronic or physical, include:
1. Physical security protocols as outlined in Special Order 10 (Building
Security and Evacuation),
2. Software security protocols as outlined in General Order 77 (Computer,
Cellular Telephone and Data Utilization), and
GENERAL ORDER 30 PAGE 4 of 12
CRIMINAL INTELLIGE