Legal Document View

Unlock Advanced Research with PRISMAI

- Know your Kanoon - Doc Gen Hub - Counter Argument - Case Predict AI - Talk with IK Doc - ...
Upgrade to Premium
[Cites 0, Cited by 0] [Entire Act]

State of Bihar - Section

Section 6 in Bihar Anti Terrorist Squad Rules, 2014

6. Intelligence related functions of the Squad.

(1)Intelligence related functions of the Anti Terrorist Squad shall be according to the following:
(a)Collection, collation and analysis of intelligence related to terrorism;
(b)Exchange and dissemination of intelligence with the State Special Branch and other units or agencies of other states and the Central Government and to conduct secret verifications;
(c)Identification of sensitive spots within the state in the context of internal security where terrorists and anti-national elements can hide, operate or find logistic support;
(d)Deployment of sources and agents for the purpose of surveillance or gathering information about the terrorist outfits, their supporters, harbourers, and such elements who spread terrorism through indoctrination, etc.
(e)Monitoring of suspected communications, interactions, and financial transactions of terrorists or such elements within and outside the country;
(f)Identification and tracking of offenders indulged in the smuggling of FICNs, narcotics, automatic firearms, explosives, etc. or indulging in Hawala transactions and money laundering etc. for carrying out acts of terrorism; etc.
(2)The Deputy Superintendents, Inspectors and Sub-Inspectors will be entrusted with the work of collection of intelligence and conducting field verifications and the Assistant Sub-Inspectors, Havildars and Constables will assist them.
(3)Supervisory Officers shall reduce all secret inputs as "Intelligence Report" in the prescribed format (referred to in appendix III). All verified intelligence reports (covert and overt) pertaining to the prevention or detection of terrorism shall be entered in the data-bank of the Squad.
(4)For the purpose of collecting intelligence, Secret Service Fund shall be allocated to the Squad that will be disbursed by the Inspector General as per the requirement.
(5)Open sources of intelligence, such as newspapers, television, library, internet, reports from various government departments, etc. shall be regularly filtered and evaluated.
(6)The true identity or nature of the intelligence source shall not be revealed and no personnel of the Squad shall be forced to divulge his source of human intelligence.
(7)The product of secret surveillance and undercover operations, where the sensitivity or perceived need for confidentiality is attached to the technique, personnel, or circumstances surroundings the activity, shall not be made public and immunity from disclosure may be sought in judicial or quasi-judicial proceedings.
(8)The Inspector General shall develop an internal mechanism of regulating sources and agents such as, dual reference in the Confidential Source Register, cross-verification, debriefing, periodical evaluation of the agent, etc. The procedures shall not be disclosed to anybody outside the Squad.
(9)The Inspector General shall develop standard operating procedures for handling and dissemination of intelligence material such as sanitization before uploading the content of intelligence reports, coding before sharing, grading for security classification and risk assessment prior to dissemination. The procedures shall not be disclosed outside the Squad.
(10)The Inspector General shall publish a monthly Secret Digest based on the input of intelligence and transmit it in a sealed cover to the Director General and Home Department. No other personnel shall, in any case, divulge intelligence reports or any information which they have gathered in the course of their duty.
(11)The Inspector General shall constitute an "Integrated Information Technology Cell" under a Nodal officer not below the rank of an Additional Superintendent for the purpose of obtaining telephone records or other records or intercepting communications, etc. as per the procedure prescribed under law. One or more personnel deputized by the Inspector General will receive data on authorized e-mail addresses and telephone numbers and every data so obtained shall be properly logged.