You are on page 1of 24

9/11 Classified Information

--C-eiNftriEttrtfct-
-CONFIDENTI-At
Event: Overview of the Terrorist Threat Integration Center (TTIC)
Type of Event: Briefing
Date: July 18, 2003
Special Access Issues: None
Prepared by: Gordon Lederman
TeamNumber: 2
Location: George Bush Center for Intelligence (GBCI)

Participants non-Commission: John Brennan, Director of TTIC; JimBernazzani,
.... .........
............ V ...... g711 Closed by Statute
Principal De ut Director Chief-of-Staff
eg
l ........
Adviser; Director- PlanS- & Administration.
Participants Commission: Chris Kojm, Kevin Scheid, Barbara Grewe, Betty Swope,
Mike Jacobson, Peter Rundlet, Kevin Shaeffer, Lance Cole, Gordon Lederman
c c ) - Summary:
(1) TTIC's role in the U.S. Government's overall counterterrorismeffort is
unclear. TTICappears to be in competition with CTC, the Department of
Homeland Security's Information Analysis and Infrastructure Protection
Directorate, and the FBI's SIOC.
(2) Information-sharing within TTICis dependent upon the judgment of
TTIC's staff, who are assignees fromparticipating departments and
agencies. TTIClacks the authority to transfer documents fromone agency
to another. Instead, TTICfacilitates information-sharing amonTTIC's
assignees, who can then informtheir parent agencies of what documents to
request fromfellow agencies.
(3) TTICis a purely analytic operation. It has no tasking authority and will
not engage in intelligence collection or operations.
(4) TTIChas neither appropriations nor permanent staff. It currently has
assignees and is located at the GBCI. By May 2004, TTICwill hav
people and will be co-located with CTCand the FBI's CTD at a building
Imma
L ai em 115 2 . 4 ,
. L . IL V1. 4 4 14 A1
7
By go) tiKf,:',,1,121 9
(5) TTIChas no responsibility for siiiiring_information with State and:focal
government.


CONFIDENtIAL-
(C) Mr. Brennan distributed a Powerpoint presentation classified at the Confidential
level (see Exhibit 1) and Director of Central Intelligence Directive 2/4, classified as For
Official Use Only, which provides guidance concerning TTIC(see Exhibit 2).
(05 Mr. Brennan is former Deputy Executive Director of the Central Intelligence
Agency (CIA) and also served'
9/11 Classified Information
,In addition, he was the
DCI's Chief of Staff and is a career analyst:
(e) Following President Bush's January 2003 State of the Union Address announcing
TTIC, an interagency steering group was formed to establish TTIC. TTICwas created
because the scope and complexity of the terrorist threat against the United States requires
the U.S. Government's intelligence, law enforcement, homeland security, defense, and
diplomatic components to join forces and combine their knowledge. TTICis a "joint
venture" an "independent establishment" that is not part of any government department
in order to integrate information, expertise, analysis, and the missions across the federal
Government. The Director of TTICreports to the Director of Central Intelligence (DCI).
(C5 TTICwill focus on international terrorist threats against the U.S. homeland and
installations outside of the United States. In contrast, TTICwill not focus on purely
domestic terrorist threats such as domestic extremist groups; domestic terrorismremains
the FBI's responsibility. Mr. Brennan justified TTICbeing under the DCI's authority
because of the DCI's orientation toward foreign intelligence, which is the source ofthe
overwhelming amount of threat-related information. It was unclear whether he meant
that foreign intelligence produces the overwhelming amount of threat-related information
because of (I) the inherent nature of such threat-related information, or (2) the possible
lack of a domestic intelligence infrastructure to produce significant amounts of threat-
related information.
(C) TTIChas no tasking authority and will not engage in any intelligence collection
or operations it will be a purely analytic operation. In the course of performing
analysis, TTICwill identify gaps in counterterrorismknowledge across the U.S.
Government.
(CI TTICdoes not have an appropriation, nor will it have its own staff. It will
develop strong relations with the CIA, the Department of Homeland Security ("DHS"),
the FBI, DoD's intelligence components (i.e., the Defense Intelligence Agency [DIA], the
National Imagery and Mapping Agency [NIMA], and the National Security Agency
[NSA]), and other agencies such as the Departments of Health and Human Services,
Agriculture, and Energy. TTICwill not deal directly with State and local governments
and the private sector; these entities will interact with DHS and other federal agencies.
However, TTICwill consider how information it generates can be composed in such a
manner to facilitate sharing of that information by other federal agencies with State and
local governments and the private sector.
(Cc
TTICis composed of "assignees" fromvarious agencies. The assignees' agencies
must continue to pay their salaries. Mr. Brennan indicated that
assignees maintain their
CONFIDricITTATh
9
'-GeNFIDErNTTAL--
authorities fromtheir home agencies when they are assigned to TTIC, although the
practical implications are unclear. Mr. Brennan can reject an agency's proposed assignee
and order an assignee to leave TTIC. He noted that assignees frequently learn for the
first time about the capabilities of other agencies. TTICis working on a training
curriculumand process to assist assignees in acclimating to TTICand learning about
other agencies' capabilities. Mr. Brennan does not believe TTIC's existence or structure
should be enshrined by statute.
I'S In essence, TTICserves as a protected space in which assignees fromvarious
agencies share information with each other concerning terrorist threats. TTIC's assignees
have access to various databases fromeach relevant agency, although not every TTIC
assignee has access to every database. (The FBI's "ACS" systemis piped into TTIC
except for databases concerning public corruption and espionage; non-FBI assignees have
access to that system.) Such information-sharing is not considered "dissemination" by
the assignees' agencies. And TTICdoes not transmit information obtained fromone
agency to other agencies. Accordingly, if a CIA assignee introduces a particular CIA
document into TTIC, and an FBI assignee believes that the document would be of interest
to an FBI component, that FBI assignee cannot send the document to the FBI but rather
must request that the CIA disseminate that document to the FBI. As Mr. Bernazzani
indicated, TTICrequires a high degree of trust between the agencies, and any violation of
TTIC's information-sharing rules will harmTTICsignificantly.
(S,) The DHS Secretary, the Attorney General, and the DCI signed a lengthy
memorandumof understanding ("MOU") concerning infoimation-sharing among their
entities. Certain parts of this MOU are subject to various interpretations. In any event,
just because DHS, the FBI, or the CIA have shared information with TTICdoes not
relieve themof information-sharing responsibilities set forth in the MOU among DHS,
the FBI, and the CIA.
(C), According to DOD 2/4, the top two officials of TTICcannot be fromthe same
agency, although DOD 2/4 does not require that the top slots be rotated among interested
agencies. TTIC's Director - Mr. Brennan - is fromCIA, while his deputy is fromFBI.
TTICcurrently has an Associate Director for Homeland Security fromDHS and an
Associate Director for Defense Issues fromDIA. TTICcurrently has three units:
(1) Threat Monitoring, Integration & Analysis, led by an NSA official. This
section has three parts: (a) Threat Integration, responsible for drafting
threat matrices and other situation reports; (b) Threat Analysis, responsible
for more in-depth analytical products, assessments, and advisories; and (c)
Threat Database, which will build a national terrorismdatabase.
(2) Community CounterterrorismBoard ("CCB"). The CCB was formerly the
Executive Secretary for the Interagency Intelligence Committee on
Terrorism(IICT). This unit will eventually be folded into the Threat
Monitoring, Integration & Analysis unit.
j9/11 Classi fi ed Inform ati on
(3) Plans & Administration. Focusing on budgets,finance, etc. TTICalso
has a counterintelligence office.
(C) TTICwill apparently become a line itemin the" Community Management Staff's
budget. TTICdoes not have its own appropriation,"although this issue is apparently
being or will soon be debated.
TTICcurrently has l includingl -1 Fifty percent of these
analysts are fromCIA, with the rest fromDHS (including Customs, the /Coast Guard, the
Secret Service, and the Transportation Security Administration), FBI, ILIA, NSA, NIMA,
the Capitol Police, the Departments of Energy and State, and the Nuclear Regulatory
Commission. Half of the analysts would be fromCIA because TTIChad assumed
responsibility for CTCanalytic products such as the threat matrices. The FBI has
disbanded its counterterrorismstrategic analysis group and given the .mission and
analysts to TTIC- although Mr. Brennan noted that thel !affected analysts at
FBI were actually CIA, employees detailed to the 14BI.
9/11 Classi fi ed Inform ati o
9/11 Classi fi ed Inform ati on
articles for the Senior Executive Intelligence
Brief (SEIB); (4) daily situation reports and commentaries; and (5) community
assessments, which are coordinated with other agencies. Mr. Brennan attends weekly
CounterterrorismSecurity Group (CSG) meetings and briefs the CSG on threats.
(C) Counterterrorism-related information is currently shared among relevant agencies
9/11 Classi fi ed Inform ati or
i i ICwill develop an electronic
r a7o-r9 nd to provide "one-stop shopping" for counterterrorism
products, including unclassified products.
(C)
TTICwill also create a new watchlist database to supersede the 15-odd databases
currently used among relevant agencies. Mr. Brennan called it the "National Terrorist
Identities Database." In addition, TTICwill exploit cutting-edge data exploitation tools -
he mentioned DoD's Total Information Awareness (TIA) project - to mine data for
counterterrorismpurposes.
(C) As of May 1, 2003, TTICI land is located at the GBCI. By
May 1, 2004, 'TTICwill have land will movel
9/11 Classi fi ed Inform ati on 1
9/11 Classi fi ed Inform ati on
people. CTCand,the- FBI's CounterterrorismDivision (CTD) are supposed to relocate to
that building as: vell so that TTIC, CTC, and FBI-CTD will be co-located.
9/11 Classified Information

4



CONFIDENTIAI,
C) TTICproduces various analytic products, including I S
`threat matrices
OS& Mr. Brennan noted that the National Intelligence Council recently considered
creating the position of National Intelligence Officer (NIO) for Terrorism. However,
TTICwas concerned about overlap between an NIO for Terrorismand TTIC, so the NIC
ultimately created the position called NIO for Transnational Threats.
Mr. Brennan noted a number of challenges facing TTIC, including:
(1) Howis "threat" defined? In other words, how broad is TTIC's mandate
for information-sharing and analysis given that TTICis limited to "threat"
integration? Mr. Brennan indicated that he favored a broad interpretation
of the term"threat" to include information more generally concerning
terrorismsuch as information concerning terrorist finances.
(2) What is the division of responsibilities between 'TI C and relevant
agencies? Mr. Brennan said that Dick Kerr, former Deputy DCI, will lead
a teamto provide an independent assessment and recommendation
regarding the proper division of labor between agencies and TTIC.
(3)
More generally, what is the division of labor for counterterrorism among
agencies? There is significant redundancy across the federal government
concerning counterterrorism, which wastes resources and may cause gaps
in coverage.
(4) Howcan the federal government develop new"business practices?" Mr.
Brennan cited the need for a new dissemination process and that analysts,
not collectors, should own data underlying analyses.
(5)
Howshould information concerning U.S . persons be minimized? The
different minimization procedures for U.S.-person information across the
federal government must be rationalized.
(6) Howshould the U.S . Government's counterterrorism infrastructure
interact with the private sector?
'CC-) Many of the Commission staff's questions to Mr. Brennan focused on TTIC's
relationship to DHS's Information Analysis and Infrastructure Protection (IAIP)
Directorate. Mr. Brennan noted that some individuals on Capitol Hill are concerned that
TTICwill undercut IAIP. However, he stressed that IAIP will still have a prominent
mission even with TTIC's success, as IAIP will be responsible for conducting in-depth
analyses concerning vulnerability. In other words, IMP will take threat-related
information fromTTICand compare it with detailed vulnerability information in DHS's
possession. He said that DHS would still have a need for a 24x7watch center despite
TTIC's existence and planned establishment of an operations center.
CONFIDENTIAL 5
CONFIDENTL--
i
r- Mr. Brennan's response to another question indicated that the federal
government's process of conducting warning still needs clarification. He could not
identify one individual responsible for warning of future attacks the United States.
elk 6
'
C
O
N
F
I
D
E
N
T
-
F
A
L
-


e
c
t
i
o
n

o
r

o
p
e
r
a
t
i
o
n
s

C
0
-w
U )
2
( / )
o
2
I
>
m
.
0--
c
2
-0
n
0
c Ea
t t i
( 1 3
E
o
E) a) o

-4-;
.= E 0a)

E.
.4-.
o ,
0) 0)
-1 -- /)
i U .= -.0
CD
I

c 6
a)
i-::) t
E
a
w
L.
a)
0 0
8
>,
c o
w
< c c
6
L
) ) "Cn 2
a3 .
>, 0
2
I Q 0 .
x .
if,
( 1 3
a) o
o_
(f)
o
4? ,
E( 1 ( 3 c
-
ac
o
--I
c a
)
o
6
a) CO> c

0
C D
W
0

,.,,
c o
c o
0
>,
E. )
. . . ,,

CD 0) ' " C . - 0
8
0...
=
n
4-
1 /4..)
U

F ._

C
0
e- r 1 / 4 '1 '1 -
5

CN

CT"
c
O
ti
(
-
-
-
-

S
t
a
t
e

&

D
I
A

F
B
I

_
_
_
_
-
-
-
-
-
-
-
-
-
-
-
L
o
c
a
l

G
o
v
t
,

N
S
A
D

L
a
w

E
n
f
,

P
r
i
v
a
t
e

N
I
M
A

'
c
S
)

D
H
S


S
e
c
t
o
r

N
v

1

T
T
I
C

>
C
)
t
h
e
r

G
o
v
t

A
g
e
n
c
i
e
s
*

*

e
.
g
.
,

H
H
S
,

U
S
D
A
,

S
T
A
T
E

E
P
A
,

D
O
E

rq M

C
I
A

C
W
h
i
t
e


D


_
-
-
-
-
R
e
q
u
e
s
t
s
/
T
h
r
e
a
t

I
n
f
o
r
m
a
t
i
o
n

H
o
u
s
e

_
_
_
_
_
>
.

T
T
I
C

P
r
o
d
u
c
t
s
/
W
e
b
s
i
t
e

4- .........
C
0
C
0
2
L)
C
0
f2
0)
a )
C
C
.................. .......................... 171
Classified Information
.. ........ ....
.............
. . . . . 0
LL
- 0
C
m
g
:c07- - 7c- 07- -
0) a:=,'
U) CI) LL
IP 0,'
....
.......
C
O
N
F
I
D
E
N
T
I
A
L

0
c o :
:
>: c o
-0
4
c
- .
a)
0,6 72

D
C.)
t ci Cr 0:1 2
( 1 ) 0
cn
:7 -.=c
c t 7)
-4- o
. 0

- 1 0
c / 5 2 co-
'el C
CIZS ,,.
C0 (13
CD '-
0 if
a. c

. o
u)
C) al
co
c o c T5
...= C
N 1.). a)
-- . =,. o
c . . . ,. . .
0 i 70
CD 03
< K.-) c-4.1
-1Z) Z
cf )
co
0
co
CU
0
a )
cc)
1:
9/11 Classified Information
4N E1
a)
E
0
0)
c
C
a) 1 3 1
C 0 ( 1 3
0
( /)
CC3
4( 7 .5 1
a3
m
--o
C
O
N
F
I
D
E
N
T
I
A
L
'

in ( 1 3 0- 4E1
Cl)
n O C
< <
(0
J
0 W
I 0
--, <
0
<
crii
<
1-
< <
-- w 0 < 02

ct
C.) Li.0 0 u ) Z 0 c) a_ Z Z
9 I 0 0 I 0 0 0 I I
S
e
c
r
e
t

S
e
r
v
i
c
e

a
n
d
C
o
a
s
t

G
u
a
r
d

>7;
' c
n
U
a)
(/)
C
O
c3
t
0
0_
u)
C
sc.9.
F-
6-
E
O
-rn
m
(..)
m
a)
-o
C5-
C
Cf)
I
a
C
O
N
F
I
D
E
N
T
I
A
L

C o
0
N.- -
R:
T-
N
CO
CN

T"-

C
O
N
F
I
D
E
N
T
I
A
L

;(-11. Classified Information
0
Cl)
C
- o
Co
r t ,
a.
Cl)
Co

0
Cl)
Cl)
0)
9/11 Classified Information
9/11 Classified Information

C
O
N
F
I
D
E
N
T
I
A
L

Cl)
0
0
_ 0
4
( L,
5 1

( i )
a)
C
>1
1 1 -a
0 ( /)
o 0
C
O
C
O
N
F
I
D
E
N
T
I
A
L

C
-C
-4-1
4C/5
C
"
B
0 <

"r :
0
a)
U)
L-.

t
...,
F _
CD -
CC1 3 0
0) C
CD
c u
"4 72-1
0
.

u)
CD : 4
c o
0
as -
0-) 2
0
E
c "0
c ...c

0
0
.
8
0
rt
0_
f ul)
F --
m =
x
H. z
0 0 0
c
SD
f
r
a
m
e
w
o
r
k

/9/11 Classified Information


C
o
o
r
d
i
n
a
t
i
n
g

n
e
w

b
u
s
i
n
e
s
s

p
r
o
c
e
s
s
e
s


a
m
o
n
g

p
a
r
t
n
e
r

a
g
e
n
c
i
e
s


a
r
c
h
i
t
e
c
t
u
r
e

0
Information
a)
- 4 - 0
O r )
C
C". 7 )
C
( 1 0



9/11 Classified

UNCL ASSIFIE D//FOR OFFICIAL USE ONL Y
DIRE CTOR OF CE NTRAL INTE L L IGE NCE DIRE CTI 2 /4
TE RRORIST THRE AT INTE GRATION CE NTE R
(E ffecti ve 1 May 2 003)
Thi s di recti ve i s prom ulgated pursuant to the Nati onal Securi ty
Act of 194 7, as am ended; the Hom eland Securi ty Act of 2 002 ; the
Uni ti ng and Strengtheni ng Am eri ca by Provi di ng Appropri ate Tools
Requi red to Intercept and Obstruct Terrori sm Act of 2 001; the
Central Intelli gence Agency Act of 194 9, as am ended; E xecuti ve
Order 12 333; the di recti on of. the Presi dent, as arti culated i n
hi s State of the Uni on Address on 2 8 January 2 003, i n hi s rem arks
at Federal Bureau of Investi gati on (FBI) Headauarters on
14 February 2 003, and i n - the related Whi te House Fact Sheets; and
the Mem orandum of Understandi ng . (MOU) between the Intelli gence
Com m uni ty, Federal L aw E nforcem ent Agenci es and the Departm ent of
Hom eland Securi ty Concerni ng Inform ati on Shari ng dated
4 March 2 003 (the MOU on Inform ati on Shari ng).
A. Purpose
Thi s di recti ve provi des gui dance i n carryi ng out the
di recti on of the Presi dent to establi sh a Terrori st Threat
Integrati on Center (TTIC).
B. Mi ssi on
1. The Terrori st Threat Integrati on Center's m i ssi on i s to
enable full i ntearati on of US Governm ent terrori st threat- related
i nform ati on and analysi s. The Terrori st Threat Integra0en
Center wi ll be an i nteragency joi nt venture that wi ll i ntegrate
and analyze terrori st threatrelated i nform ati on, collected -
dom esti cally or abroad, and di ssem i nate such i nform ati on to
appropri ate reci pi ents. Speci fi cally, TTIC wi ll:
a. Make full use of avai lable terrori st threat- related
i nform ati on (collected dom esti cally or llroad), exm erti se,
and capabi li ti es to conduct threat analysi s and i nform
collecti on strategi es.
b. Create a structure to i nsti tuti onali ze shari ng
across appropri ate federal acercy li nes of terrori st threa -
related i nform ati on, collect=- r' dom esti cally or abroad,
i n
order to form the m ost com - orsi v poss i ble threat
pi cture
and m i ni m i ze any seam s between analysi s of terrori st threat-
related i nform ati on collected dom esti cally or
abroad.
UNCL ASSIFIE D//FOR OFFICIAL USE ONL Y
c. Serve as the pri nci pal m anager of i nteragency
form ulati on of DCI terrori sm threat warni ng (wi thout
affecti ng exi sti ng responsbi li ti es, authori ti es, or
- Procedures for warni ngs retardi ng threats to hom eland
securi ty) i n collal7orati on wi th the Com m uni ty
Counterterrori sm Board, the Warn Fi ve Agenci es (FBI, the
Central Intelli gence Agency [CIA], the Defense Intelli gence
Agency [D- 11A], the Nati onal Security Agency [NSA], and the
Bureau of Intelli gence and Research of the Departm ent of
State [State/INR]), the Nati onal Im agery and Mappi ng Agency
(NIMA), and the Departm ent of Hom eland Securi ty (DE S).
d. Along wi th other organi zati ons, provi de
com prehensi ve, all- source terrori st threat analysi s and
assessm ents to US nati onal leadershi p;
e. Play a. lead role, along wi th other organi zati ons,
i n overseei ng a nati onal terrori st' threat taski ng and
requi rem ents system :
f. Mai ntai n an ut- to- date data:nage of known and
suspected terrori sts accessi ble to appropri ate governm ent
offi ci als.
2 . The TTIC i tself wi ll have no new or i ndependent
authori ty to engage i n the collecti on of i ntelli gence or to
m andate the conduct of such collecti on. Nevertheless,
departm ents and agenci es wi th em ployees assi gned to TTIC (TTIC
m em bers) , under procedures agreed upon between the Di rector of
TTIC (D/TTIC) and TTIC m em bers, m ay uti li ze i ndi vi dual em ployees
assi gned to TTIC to carry out, under the authori ty and di recti on
of the assi gni ng TTIC m em ber, any lawfully authori zed functi on of
the assi gni ng TTIC m em ber.
3. The TTIC m em bers i nclude, but are not li m i ted to, the
Departm ent of Justi ce/FBI, DE S, CIA, NSA, NINA, DIA, and - the
Departm ent of State.
C. Responsibilities
1. The DC:, as head of the US Intelli gence Com m uni ty, wi ll
oversee the acti vi ti es of TTIC.
2 . The D/TTIC wi ll report to the DCI as head of. the US
Intelli gence Com m uni ty and wi ll m anage TTIC on a day- to- day
basi s.
UNCL ASSIFIE D//FOR OFFICIAL USE ONL Y
D. Organi zati on
1. The TTIC wi ll be headed by a seni or US Governm ent
offi ci al appoi nted by the DCI i n consultati on wi th the Di rector
of the FBI, the Attorney General, and the Secretari es of Hom eland
Securi ty and Defense. . The D/TTIC, i n coordi nati on wi thTTIC
m em bers and wi th the concurrence of the DCI, shall desi gnate the
Pri nci pal Deputy Di rector of TTIC (PDD/TTIC), who shall not com e
from the sam e departm ent or agency as D/TTIC. The D/TTIC wi ll
consult wi th other TTIC m em bers on the desi gnati on of other TTIC
deputi es.
2 . The TTIC m em bers m ay assi gn em ployees to TTIC i n support
of the TTIC m i ssi on, consi stent wi th other provi si ons herei n.
3. The TTIC m em bers wi ll retai n ulti m ate responsi bi li ty
for, and authori ty over, thei r em ployees assi gned to TTIC. Such
assi gnees wi ll be under the general day- to- day . m anagem ent and
coordi nati on of D/TTIC for purposes of TTIC functi ons.
4 . The TTIC m em bers wi ll be responsi ble for all personal
servi ces expendi tures (such as salari es and benefi ts) relati ng to
thei r em ployees assi gned to TTIC. Personnel adm i ni strati on
(e. g. , pay accounti ng, prom oti on, and di sci pli nary acti ons) of
TTIC assi gnees wi ll be the responsi bi li ty of the parent
departm ent or agency wi th i nput from TTIC, as appropri ate.
Substanti ve i nput for perform ance evaluati on of TTIC assi gnees
wi ll be provi ded by TTIC under arrangem ents wi th each TTIC
m em ber.
5 . To the extent perm i ssi ble by law, the capabi li ti es and
legal authori ti es of TTIC m em bers, as approved by the heads of
TTIC m em ber departm ents and agenci es, i ncludi ng by delegati on to
thei r assi gnees, wi ll be used i n such a way as to m ost
effecti vely carry out TTIC's m i ssi on. Nevertheless, TTIC! _
assi gnees wi ll rem ai n subject to any legal li m i tati ons aA rd_
restri cti ons appli cable to thei r assi gni ng TTIC m em bers. Under
secti on 103(d) of the Nati onal Securi ty Act, CIA wi ll provi de
hum an resource, securi ty, contracti ng, i nform ati on m anagem ent,
and other adm i ni strati ve support and servi ces to TTIC- - Such
support m ay be provi ded by other TTIC m em bers upon agreem ent
between D/TTIC and the heads of such other TTIC Mem bers wi th
appropri ate legal authori ti es. When a CIA em ployee serves as
D/TTIC, he i s hereby authori zed to exerci se all lawfully
delegable DCI and CIA authori ti es to award m onetary and non-
m onetary awards to all personnel assi gned to TTIC, as authori zed
by law.
3
UNCL ASSIFIE D/ /FOR OFFICIAL USE ONL Y
6. The TTIC m em bers shall ensure that assi gned em ployees
com ply wi th securi ty clearance requi rem ents for background
i nvesti gati ons and polygraph exam i nati ons as needed for
appropri ate access to classi fi ed i nform ati on wi thi n TTIC.
Personnel assi gned to TTIC wi th access to i nform ati on at the TOP
SE CRE T/SE NSITIVE COMPARTME NTE D INFORMATION level m ust have
appropri ate securi ty clearances and accesses for such
i nform ati on, i ncludi ng a counteri ntelli gence polygraph
exam i nati on. Processi ng for assi gnm ent to TTIC wi ll be
consi stent wi th FBI and CIA procedures for assi gnm ent to thei r
counterterrori st elem ents of personnel from other agenci es.
Appropri ate com ponents of the FBI, Defense Departm ent, and CIA
wi ll provi de securi ty and counteri ntelli gence support to TTIC, as
needed. In coordi nati on wi th TTIC m em bers, D/TTIC shall also
desi gnate a focal poi nt for securi ty. In coordi nati on wi th TTIC
m em bers, the securi ty focal poi nt shall be responsi ble for
securi ty m atters relati ng to TTIC assi gnees and advi si ng D/TTIC
on securi ty m atters.
7. Requi rem ents for personnel to report on trai ni ng or
com pli ance wi th regard to acti vi ti es not undertaken as part of
TTIC's m i ssi on such as ethi cs, Intelli gence Oversi ght Board
reporti ng, and Inspector General m atters wi ll conti nue to be
adm i ni stered by the assi gni ng TTIC m em bers. Such acti vi ti es wi th
regard to the TTIC m i ssi on wi ll be handled i n accordance wi th
paragraph F. 1. below.
8. The D/TTIC, or desi gnees, wi ll exerci se the fi nal revi ew
and approval authori ty for TTIC- generated products, after
appropri ate consultati on or coordi nati on wi th TTIC m em bers. For
nati onal- level analyti c products produced outsi de TTIC, the
ori gi nati ng departm ent's or agency's exi sti ng revi ew processes
and procedures should be followed unti l D/TTIC and appropri ate
seni or offi ci als of those departm ents or agenci es agree on other
arrangem ents. All nati onal- level analysi s on terrori sm . 4 . treat
m atters wi ll be di ssem i nated i n accordance wi th the MOU- Gn-
InfoL luati on Shari ng, or appropri ate consultati on or coordi nati on
procedures establi shed i n agreem ent wi th D/TTIC that m andate
equal or greater i nform ati on shari ng than that requi red by the
MOU on Inform ati on Shari ng, and are not otherwi se i nconsi stent
wi th the MOU on Inform ati on Shari ng.
E . Inform ati on
1. The TTIC analysts wi ll have access to terrori st threat-
related i nform ati on collected dom eti cally or abroad. Terrori st
Threat: Integrati on Center i nform ati on shari ng shall be governed
by the MOU on Inform ati on Shari ng, except that TTIC Mem bers m ay
agree to i nform ati on shari ng arrangem ents that provi de for
UNCLA SSIFIED/ /FOROFFICIA L USE ONLY
grea ter inf orma tion sha ringtha n those ma nda tedbythe MOU.TTIC
members not pa rties to the MOUon Inf orma tion Sha ringwill enter
into a greements witha ll TTIC members f or sha ringinf orma tion
theyorigina te, providedtha t sucha greements ma nda teecua l or
grea ter inf orma tion sha ringtha n tha t recuiredbythe MOUon
Inf orma tion Sha ring, a nda re not otherwise inconsistent withtha t
MOU.Terrorist Threa t Integra tion Center a ssignees witha need-
to- know(a s determinedbyD/TTIC) will ha ve unf ettereda ccess to
terrorist threa trela tedinf orma tion, collecteddomestica llyor
a broa d, providedto TTIC byTTIC members or otherwise, a ndma y
dissemina te suchinf ozia a tion ba ckto their a ssigningTTIC members
onlyin a ccorda nce withprocedures esta blishedbya greement
between D/TTIC a ndthe TTIC members, providedtha t a nysuch
a greement is strictlyconsistent withthe MOUon Inf orma tion
Sha ringa ndthe other a uthorities citedherein.Dissemina tion of
suchinf orma tion, includingto sta te a ndloca l of f icia ls, will be
done in a ccorda nce withthe MOUon_Inf ozma tion Sha ring.A s used
in this DCID, terrorist threa t- rela tedinf oiwa tion includes .
"terrorisminf ozia a tion"def inedin section 2(r) a nda mplif iedin
section 3(e) of the MOUOn Inf orma tion Sha ring, whichincludes ,
but is not limitedto, everythingf romra wreports to f inished
a na lytica ssessments, however def ineda ndwhether collected
domestica llyor a broa d.Sucha ccess will be esta blishedin
consulta tion withoria ina tingdepa rtments a nda gencies a ndin
a ccorda nce witha ppropria te personnel, physica l, a ndinf orma tion
technologysystemsecurityprocedures.Senior TTIC a ssignees,
including, a t a minimum, D/TTIC; PDD/TTIC; the DeputyDirector
f or Threa t Monitoring, Integra tion, a ndA na lysis;the Deputy
Director f or P la ns a ndA dministra tion;a ndthe A ssocia te
Directors f or Homela ndSecuritya ndDef ense Issues, will ha ve
a ccess to terrorist threa t- rela tedinf otilta tion no less tha n tha t
of the Chief s of the DCI Counterterrorist Center a ndthe FBI
CounterterrorismDivision.
2. The TTIC's inf orma tion technologyimplementa tion progra m
will a dhere to Intelligence Communitya ndcommercia l sta nda rds
a ndpra ctices.The TTICis inf orma tion technologystra tegy_a nd
implementa tion will be ma na gedbythe TTIC Chief Inf orma tion
Of f icer (TTIC CIO) .The TTIC CIO will coordina te this
implementa tion progra mwitha ll TTIC Members a ndwith:t_5e
Intelligence CommunityCIO Executive Council.
3. The TTIC a ssignees will continue to be boundbya ll
a pplica ble sta tutes a ndExecutive Orders, includingthose
rela tingto the protection of Constitutiona l rights a ndpriva cy.
TTIC a ssignees will a lso continue to be boundbya pplica ble
provisions of regula tions, interna l guidelines a ndprocedures,
a ndmemora ndums of understa ndinga nda greement tha t a re not
inconsistent withthe MOUon Inf orma tion Sha ringor a ny
P residentia l guida nce.
07:77- r (" 7 ONLY
UNCL ASSIFIE D//FOR OFFICIAL USE ONL Y
4 . To the m axi m um extent possi ble, TTIC assi gnees shall
faci li tate the assi gni ng departm ent or agency Processes to
downgrade or declassi fy TTIC m em ber- ori gi nated i nfolui ati on and to
di ssem i nate such i nform ati on free of use restri cti ons. These
determ i nati ons, and all deci si ons to provi de, downgrade,
declassi fy, and di ssem i nate i nform ati on provi ded to TTIC, wi ll be
m ade consi stent wi th the MOU on Infoi fflati on Shari ng, E xecuti ve
Order 12 95 1, as am ended, E xecuti ve Order 12 95 8, as am ended, and
other appli cable E xecuti ve Orders and Presi denti al gui dance.
5 . For purposes of the Federal Records Act, the Freedom of
Inform ati on Act, the Pri vacy Act, and the Mandatory
Declassi fi cati on Revi ew provi si ons of E xecuti ve Order 12 95 8, as
am ended, and for all other purposes (unless otherwi se agreed upon
by D/TTIC and TTIC m em bers):
a. Records created by TTIC assi gnees at the request of
D/TTIC or a desi gnee shall be consi dered CIA records that
are housed i n a CIA records system , unless and unti l other
arrangem ents are m ade by D/TTIC i n coordi nati on wi th TTIC
m em bers.
b. Records ori gi nated by departm ents or agenci es,
i ncludi ng TTIC m em bers, that are used by TTIC shall be
consi dered records of the ori gi nati ng departm ent or agency.
F. Other
The D/TTIC, i n coordi nati on wi th TTIC m em bers, shall
desi gnate focal poi nts consi stent wi th exi sti ng statutory and
regulatory responsi bi li ti es who shall be responsi ble for legal,
Congressi onal, and Inspector General (IG) m atters relati ng to
TTIC. Such focal poi nts wi ll address such m atters i n
consultati on, or, as appropri ate, coordi nati on, wi th TTIC m em bers
and other organi zati ons, and i n accordance wi th thei r res, 1;ecti ve
responsi bi li ti es. E ach TTIC m em ber's legal offi ce wi ll. 9
responsi ble for provi di ng legal gui dance to the TTIC m em ber's
assi gnees on m atters relati ng to the use of the TTIC m em ber
- s
authori ti es. Counsel for the DCI shall be responsi ble for
coordi nati ng such advi ce when necessary and appropri ate_
14 May 2 003

Di re for o_ ent 1 Intelli gence
Date

You might also like