Professional Documents
Culture Documents
~------~~---
..
I
-~-
-----.:-----..-,
~--------,
>
FEDERAL BUREAU
BUREAU OF
OFINVESTIGATION
INVESTIGATION'
COUNTERTERRORISM DIVISION
DIVISION
:
,.
:
ForceOffl
cer Orientation
Orientation-
Task Force
Officer
'.
0/-1
'~. ,r...
Joint Terrorisrki
Terrorism Task Force
II
i:/
\
\
Volume 1
Revision 1
December 2009
.'-
'.
ACLURM005478
'i..
IP
a
a
TAB.L
E OF
0 F CONTENTS
CON TEN T S
TABLE
a
a
a
a
a
S
a
a
a
a
a
a
a
a
.
Tab 1: INTRODUCTION..........................,~ ........ .......................................... 1
1
Heraldry of the FBI Seal
FBI Priorities
Thumbnail History of the FBI
Where the FBI Got its Name
Where the Title "Special Agent" Came Frhm
From
FBI Organizational Chart
I
FBI Field Offices and Resident Agencies!
Agencies! .
.............{......................................................
Tab 2:
IN-PROCESSING
Tab
2: ~~6~i~~~~~?s~~i~~.Li~~
TFO/TFA In-Processing List
I
Security
MOD,
MOU, Reimbursement Arreement,
Agreement, Vendors Forms
RA Access Badge / Publi;c
PUbl,c Key
Key Infrastructure
Infrastructure (PKI)
1..
Deputation
.
Credentials;
Credentials
Photograph
,
Computer Access
I
JTTF Vehicle and Gas C~d
Card
it
Equipment Issues
Radio Frequencies/Call Sign
S~gn
TFO's Chain of Comman4
Command
TURK
TURK
\
Electronic Equipment Sec~rity
Security Form
EnforcementOn-Linea
On-Line! (LEO)
Law Enforcement
Internet Access
Outside facility Access Badges and Briefings
Personnel Security Polygraph Program
14
16
o 0 0 0 0 0
ACLURM005479
i:
S
S
S
S
S
S
S
S
S
S
S
S
S
'-~
'".
oJ'
..
Facility Security
Information Security/Computers
Threats to National Security
Telephone and Facsimile Machine
"Security
Security Incident Program
Proper Handling of Federal Taxpayer Information (FTI)
Security
Security. Awareness
Awareness Certification
Statutes
Title 8
Title18
Title 31
31
1 .
Title 42
Title 49
Title 50
Investigative Guidelines
Conclusion
I
I.
Tab 4: DOCUMENTATION
DOCUl\l.lENTATION ...........................................................................39
Required J?ocumentation
Documentation
Opening a Threat Assess ent
Request Training
.
Reporting an Interview
Reporting a Trash Cover
ACLURM005480
ato
a
a
is
i.
II
0
ID
ID
411
ID
II
II
ID
ID
ID
ID
ID
ID
fa
Reporting a Collision
Submitting General Evidence
Submitting Film for Processing
Submitting Electronic.
Evidence to be Analyzed
Electronic Evidence
Submitting Toll Records to be Entered into Telephone Apps.
41
Investigative Reports .............................................................................. 41
EC (Electronic Communication)
FD-542
FD-542(Statistical
(StatisticalAccomplishment)
Accomplishment)
'
FD-71 (Complaint Fonn),'
Form)
FD-302 (Report Discoverable
Discovera~le Information)
FD-320 (Notification to DOJ)
FD-515 (Statistical Accomplishment)
FD-930 (Violent Gang and Terrorist Organization File)
LHM (Letterhead Memorandum)
Memofrj.ndum)
I
It
ACLURM005481
:.
i.
(ElectroniC Communications):
Conununications):
EC (Electronic
Threat Assessment
Preliminary Inquiry
Full Field Investigation
Criminal Case
Leads
Evidence
Title HI
m
Request Assistance
Asset
Asset
FD-S42 .................................................66
FD-542
Surveillance
National
NationalSecurity
Security Letter
L,etter
Participating in an Event
Miscellaneous
FD-302 ......................................................................................67
RFPA Finap.cial
Financial Records
Ponies
Miscellaneous ................................................. 68
EXTRA RESOURCES
4111
,.
I.
ACLURM005482
.-.
w.
j"
-""
,-/
(,
to JTTFs
JTTFs
As a Task Force Officer (TFO), you represent an indispensable asset to
Your specialized
specialized training and localized expertise
and the FBI as a whole.
whole. Your
represent a window into your community that could not be duplicated by any
Together with
with the
the FBI
FBI and
and the participating agencies
government department.
department. Together
of your JTTF, you will provide resources and regional proficiency that ensure
the safety of the United States, your state, your neighborhood and your family
friends.
and friends.
~ \
"
0 - " __
a
a
This orientation manual is provided to assist your transition from local, state,
We anticipate-that
anticipate-that your time
or federal official to ITTF
JTTF Task Force Officer.
Officer. We
ITTF will be rewarding, and trust that your presence will greatly
with the JTTF
contribute to the mission of the FBI
FBI Counterterrorism
Counterterrorism Division.
Division. Thank you for
your service.
..-,
,.-.
-.
.:.' , ',I
Michael J. Heimbach
~ . \;~~:~ "~
,.
, ,
,/
.f
Assistant Director
Counterterrorism Division
S
S
a
S
S
S
,'-
.,
:-1
"
7"
-',"I " .~
';'l::,', \~
, , ~- -r ,
':I,
',:',4,1
--
ACLURM005483
ACLURM005484
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005485
11
--------------
so
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005486
r S S rS SS S t S S SS S
I.!.
:.
I.
I
'.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Under Hoover, the Bureau also began to emphasize service to other law
The Identification
Identification Division
Division was
was created in 1924 to provide U.S.
enforcement agencies.
agencies. The
U.S.
police a means to identify criminals
criminals across
across jurisdictional
jurisdictional boundaries.
boundaries. The Technical
1932, provided forensic analysis and research for law
Crime Laboratory, created in 1932,
enforcement, and the FBI National Academy, opened in 1935, provided standardized
professional training for America's law enforcement communities.
In answer to the violent crime of the 1930's,
1930's, Congress began to assign and expand
The kidnapping
kidnapping and
and murder
murder of
of the Lindbergh baby in
new authorities
authorities to the Bureau.
Bureau. The
1932 led to the passage of the Federal Kidnapping Act, which allowed the Bureau to
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005487
fl
lb
ED
lb
I.I.
S
In the 1950's, civil rights violations and organized crime became matters of
As in
in the
the past,
past, lack
lack of
of jurisdiction hindered the Bureau from .
increasing concern.
concern. As
effectively responding to these problems
problems when
when they
they first
first emerged
emerged as
as national
nationalissues.
issues. It
was under the 1964 Civil Rights Act and the 1965 Voting Rights Act that the Bureau
legislative authority to
to investigate
investigate Civil
Civil Rights
Rights violations.
violations. Under existing laws,
received legislative
the Bureau's efforts against organized crime
crime also
also started
started slowly.
slowly. Then, with the 1968
Omnibus Crime Control and Safe Streets Act and the1970 Organized Crime Control Act,
Congress gave the Bureau effective weapons with which to attack organized criminal
ill warrants for wiretaps and the Racketeering and Corrupt
enterprises, Title III
Organizations Act [RICO].
UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
Y
ACLURM005488
ID
ID
ID
ID
ID
111
ID
ID
ID
ID
ID
UNCLASSIFIEDJIFOR
UNCLASSIFIEDI/FOR OFFICIAL USE ONLY
During the 1990's, criminal and security threats to the United States evolved as
conununism in the Soviet
new technology and the fall of communism
Soviet bloc changed the known
1993 bombing of the World Trade Centers and the 1995 bombing
geopolitical world. The 1993
of the Oklahoma City federal building highlighted the potentially catastrophic threat of
both international
international and
and domestic
domestic terrorism.
terrorism. The FBI responded
responded to
to the
the emerging
emerging .
international face of crime by aggressively building bridges between U.S. and foreign law
enforcement. Under
Under Director
Director Louis
Louis J.
1. Freeh
Freeh [1993-2001],
[1993-2001], the Bureau expanded its Legat
enforcement.
Program [39 offices by fall-2000]; provided professional law enforcement education to
foreign nationals through the International Law Enforcement Academy [ILEA] in
Budapest [opened in1994] and other international education efforts; and created working
groups and other structured liaisons with foreign law enforcement.
IP
UNCLASSIFJEDJIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005489
1111 8 811 011 1111 M O SII IIII M OS O SS IIII II S OS O OSOS IOSS IIIIO S S
tightened its protocols for evidence control, instituted organizational changes to optimize
research specialization, and earned national accreditation.
On September 4,
4,2001,
[2001 to
2001, former U.S. Attorney Robert S. Mueller III [2001
present] was sworn in as Director with a mandate to address a number of steep Challenges:
challenges:
upgrading the Bureau's information technology infrastructure; addressing records
management issues; and enhancing FBI foreign counterintelligence analysis and security
in the wake of the damage done by former Special Agent and convicted spy Robert S.
S.
Hanssen.
Then within days of his entering on duty, the September 11
11 terrorist attacks were
Director Mueller led the FBI's massive
launched against New York and Washington.
Washington. Director
investigative efforts in partnership with all U.S.
U.S. law enforcement, the federal government,
On October
October 26,
26,2001,
the President signed into law the U.S.
and our allies overseas.
overseas. On
2001, the
U.S.
Patriot Act, which granted new proviSions
provisions to address the threat of terrorism, and Director
Mueller accordingly accepted on behalf of the Bureau responsibility for protecting the
American people against future
On May 29,
29. 2002, Attorney General
future terrorist
terrorist attacks.
attacks. On
John Ashcroft issued revised investigative guidelines to assist the Bureau's
counterterrorism efforts.
To support the Bureau's change in mission and to meet newly articulated strategic
priorities, Director Mueller called for a reengineering of FBI structure and operations that
will closely focus the Bureau on prevention of terrorist attacks, on countering foreign
intelligence operations against the U.S., and on addressing cyber crime-based attacks and
addi,tign, the
the Bureau
Bureau remains dedicated to protecting
other high technology crimes.
crimes. In
In addition,
civil rights, combatting public corruption, organized crime, white-collar crime,
crime, and major
also strengthening
strengthening its support to federal, county, municipal,
acts of violent crime.
crime. ItIt isis also
And it is dedicated to upgrading its
and international law enforcement
enforcement partners.
partners. And
technological infrastructure to successfully meet each of its priorities.
At the start
start of
of the
the new
new millennium,
millennium,the
the1~73I
FBI stands
standsdedicated
dedicated to
to high
high values
values and
Commitment to
to these
these values
values and
and standards ensures that the FBI
ethical standards.
standards. Commitment
effectively carries out its mission: Protect and defend the United States against terrorist
and foreign intelligence threats; uphold and enforce the criminal laws of the United States;
States;
and provide and enhance assistance to its federal, state, municipal, and international
partners.
UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005490
in
in
'.
ED
I.
I'
I
Ever 'wonder
wonder how the FBI got its name?
It's more
more confusing
confusing than you
you might think.
It's
1908 when Attorney General Charles Bonaparte created
First, it had no name. In 1908
He simply
simply referred to the group
the entity that would become the FBI;
FBI, he did not name
name it.
it. He
as a "special agent force" when he announced his work to Congress in the 1908 Attorney
General's Annual Report.
Second,it
oflnvestigation
Second,
it was named the Bureau of
Investigation but, sometimes, called the
Division of
ofInvestigation.
In
1909,
Attorney
General Wickersham formally named
1909,
Investigation.
Bonaparte's "force"
"force" the
Bureau
of
Investigation
At the
the time,
time, the
the Bureau was
the Bureau of Investigation[BOI].
[30I]. At
Over the
the next
next several
several years
years the Bureau was
composed of less than seventy employees.
employees. Over
also referred to as the Division ofInvestigation.
of Investigation, but
but this
this title
title did
did not
not stick.
stick. Between 1913
1933 it was named the
and 1933, the Bureau remained the Bureau
Bureau of Investigation.
Investigation. In 1933
ofInvestigation.
United States Bureau of
Investigation.
Finally, the FBI. By default, the Bureau of Investigation had become the
This was
was confusing
confusing as
as there
there were
were several
several "Divisions of
Di vision of Investigation. This
Division
Director Hoover,
Hoover. therefore,
therefore. asked
Investigation" in the federal government at that time.
time. Director
I.
'
ACLURM005491
ID
ED
111111
CD
UNCLASSIFJEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ID
1879, the DOJ title was changed to General Agent, a supervisory role [this
By 1879,
position was abolished in 1907]. In
In 1894
1894 aa "special
"special agent"
agent" was
was assigned to work under
the General Agent, investigating violations
violations of the
the Indian
Indian Intercourse
Intercourse Act.
Act. The bulk of
1879 and 1908 were handled by Secret Service
Department investigations between 1879
personnel who were borrowed on
1907, the year before the
on a case-by-case
case-by-case basis.
basis. In 1907,
Bureau of Investigation (the FBI's precursor) was created, one DOJ special agent
investigated antitrust matters, one handled investigations related to the Government's
defense of suits before the Spanish Treaty Claims Commission, and one special agent
handled Indian Intercourse Act violations.
In 1908 when Attorney General Charles Bonaparte reorganized the Department's
"special agent
agent force," he hired 9 Treasury agents as special agents and
investigators into a ''special
put them together with 13 peonage investigators,
investigators, and
and 12
12 bank.
bank examiners.
examiners. Whether all or
some of the peonage investigators were called
called special
special agents
agents isis not
not known.
known. The bank
examiners were accountants and were usually
usually called
called "special
"special examiners."
examiners." A distinction
agents and special
immediately arose between special agents
special accountants.
accountants. This distinction
existed into the 1930's; at which point, it was decided that all investigative agents-Special Agents.
Agents. It was around this time that
agents and accountants--were to be called Special
the convention of capitalizing "Special Agent" became uniform in the Bureau.
UNCLASSIFJEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005492
Or RCS OF
ILCUD AFRVAS
CHIEF OF STAFF 1,
DIRECTOR
unceoF
CONGRESSIONAL AFFAIRS
DEPUTY DIRECTOR
OFFICE DEEM.
EMMEN OINVITUNTY
ORICEOF PROFESSONAL
FIESPCNSENITY
RESOURCE
ASSOCIATE
DEPUTY DIRECTOR
OFFICE OF INTENSITY
AND COmPLIPNCE
.
,111
,
EXECUTIVE ASSISTANT
DIRECTOR FOR NATym,
SECURITY RRAtICR
ASSOCIATE ONCUTIVE
ASSSTANT ERECTOR FOR
RATIONAL SECoNNIBRANCN
EXECUTIVE ASSISTANT
DIRECTOR FOR
CRIMINAL, CYBER,
RESPONSE AND
SERVICES BRANCH
SClEI(:EAIID
SOMME AND
TECIflOl.OGV
BRANOi
TECIVOLOGY ERANCH
CRLINAL MEANS WI
ODUNIENERRONSII
OMSON
COtNINzELUSIME
EXECUTIVE ASSISTANT
EXECUTIVE
ASSISTANT
OIREGTOO FOR
DIRECTOR
-I
COESIDVSION
DIRECTORATE OF
WIEJJORIcE
CRECAL WOCefr
REVOKE CFOS
vo&OONS OF
WSS DESTRUC101
OIRCI
INTERNATOW
0:ERAIIONS
re=im
EXEcume ASSISTlNI
EXECUTIVE
ASSISTANT
~CTOORlR
DIRECTOR FOR
INFCflMATION AND
INFORMATION
TEClftJlOGV
TECFNOLOGY IIAAIICIi
BRANCH
F.xECUTl\lE
EXECUTIVE ASSISTANT
OIIlfCTOR
DIRECTOR f()R
FOR ~MAH
HUMAN
RESW'ICes
RESOURCES BlWICH
BRANCH
HOMOLOGY CNNION
OFFICE OF IT PROGRAM
A.41.051.1E15
011011Areett tonal,/
MICE OF IT SYS,T,3 I
GEVELOP4Eiff
OPERATIONAL
OfV60i
PureauccfncE
MAW 44570E
...I OF EraMNINGIO.Y6T
OFR:ICI
005)4IT TOM
f ICE Of IA
ENfORUIFNT
COMMAIION
ACLURM005493
1RANNO PINSON
-1
11110.11 RESOURCES
MON
FAUNIESAISILOOGROS
Soma ONStCN
01.10N
FECONOSNAHASSIENT
OPASION
SECUFEIV OMEN
FBI/CounterterrorismaTTF Organization
COUNTERTERRORISM DIVISION
AS
SISTANT DiPECfOR
ASSISTANT
DIRECTOR
OPERATIONS
imuci 1
(Ors BRANCH 0
OPFRATIONS
DI4 II
COPS BRANCH
MATZO%
COMMUNICATION
AND POLICY
MANAGEMENT OFFICE
(SUMO)
CPDIATIONAL
SUPPORT BRANCH
(0P5 5PT BKANcH)
Cl
0
TIALICUMIED
CrOICRO
UNO (tWI
La known"
(rAth
IL=
Um OVA
troakui
108All
MOO
AM COI MO!
7M0111
Tau= Pmamma
KNOMNioliOST
woH1211
ColM100111
UN= 11/3137
ICOMI
COLVOTIOWDODI
!MMS Axon=
TOM 101111
0201000
Aat 1100/1
Ham= Stumm
Wins ONTD.
OSA( tt
Commloa
%um huts VI
ITTNET171
RuscoaSsinm
Mom Curtail
MKT'
COMOODOZOMM
Roceccm
Wot4CRIDI
ha.= 00A
ri DI Ctrawcas TAttaxan
LS MO= ETD SZEILMAXITS
ACLURM005494
Ituausr Inlay
Emulanza
Uar JAM
itnar MremTicto
NcIr cOnli
tri
P00112 10
Ccumaurr
VADI)
Turns Roscv
171,14
J ~ \
1111111111111111111111111111111111111111111111111110111111111111111111111111111MOSSIO
I
AWS48111.4EZANE
CAGPALIEEDINE
.EASPaiantmE
34 tom.11
;41.1.313
~Ii~
-A:4IlJ.CImllW\llt::a
_._.
ACLURM005495
~WJ.~
mIns
Plol
...nreumag
Program
Management
NJTTF Management
;UTE' Policy &
Program Management
Intelligence
Nati( nal Threat Identification
& Development
Analysis & Production
Intelligence Sharing Program
Support
Operations
Operations Case Support
Crisis Support
Special Projects
UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED/IFOR OPPICIAL
ACLURM005496
Transportation
Security Program
Management of ALA, MLA, &
RLA sub-programs
National polices and strategies
related to transportation domain
12
a
S
aa
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
ACLURM005497
1\:
40
a)
Photograph
6) Photograph
a) One Photograph is used for both Access Badge and Credentials
a)
b) Contact office photographer to schedule photograph
ComputerAccess
Access (Access
(AccessEC
ECand
andSecurity
Security Forms)
7) Computer
FBIData
DataBase
BaseAccess
Access (Access
(AccessEC
Eeand
and Security
Security Forms)
a) FBI
111
ACLURM005498
14
S S
12) TFO's
TFO's Chain of Command at their agency
a) Provide
ProvideInformation
Information to
to Coordinator
Coordinator
13) TURK
TURK (Time Utilization Record Keeping)
Keeping)
a)
a) Forms are maintained by Administrative Assistant
b) Complete form weekly
b)
14)
14) Electronic
Electronic Equipment
Equipment Security Form
a) Obtain forms from Coordinator
a)
b) Read and sign Acknowledgment Form
c) Fill out Electronic Equipment Registration Form and return
return to Coordinator
c)
15)Law
15)
Law Enforcement
Enforcement On-Line (LEO)
a)
a) Obtain form from Coordinator
b)
from your supervisor
b) Complete form and obtain appropriate signature from
c)
c) Return form to LEO Coordinator
16) Internet
Internet Access
a)
a) Obtain form from Coordinator
b)
b) Complete form
form and return to
to Coordinator
17) AirportlTransportation
Airport/Transportation Infrastructure
Infrastructure Access
Access badge
badge and
and Briefing
Briefing (where applicable)
applicable)
18) Request
Request for
for military
military base access
access pass
pass (where
(where applicable)
applicable)
ACLURM005499
15
15
>
~
>
~
DEFINITIONS
Information:
Any knowledge
knowledge that
that can
can be
be communicated
communicated or documentary material that is
Information: Any
owned by, produced by or for, or is under the control of the U.S. Government.
Government.
That process
process used
used by
by an
an Original
Original Classification Authority to determine
Classification:
Classification: That
what information should be classified and at what level.
level.
Classified National
National Security Information:
Information: Information that has been determined to
require protection against unauthorized disclosure and is marked to indicate its classified
status when in documentary form~
form.
National Security Information:
Information, which
which if
if disclosed, would cause harm to the
Information: Information,
National Security or foreign relations of the United States.
States.
CLASSIFICATION
There are three levels of Classifications:
Classifications:
may cause
cause DAMAGE
DAMAGE to
to National
:gJ4Iprrru;> Unauthorized disClosure
disClosure may
1. MNVH3131s7
Security.
: Unauthorized disclosure
2.~:_unaUthOrized
disclosure may
may cause
caus~ SERIOUS DAMAGE to National
Security.
3. .....:::=-.=:.=.:==
WEP:Stre: Unauthorized disclosure may cause EXCEPTIONALLY
3.
GRAVE DAMAGE to National Security.
Terms
Terms such
such as
as
"For Official
Use Only"
Only"
"For
Official Use
or
Or
"Law Enforcement
Sensitive"
Enforcement Sensitive"
Do not
not refer
to
refer to
Levels
Levels of
of Classification
Classification
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005500
16
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
a
a
a
a
a.
a
a
a
''ForOfficial
OfficialUse
UseOnly"
Only"isisaacaveat
caveatregarding
regarding the
the dissemination
dissemination of
of intelligence
"For
information.
For Official
Official Use
Use Only
Only information
information can only
only be disseminated to other
information. For
official US government agencies that have a need to know.
know.
"Law Enforcement
EnforcementSensitive"
anothercaveat
caveatregarding
regarding the
the dissemination
dissemination of
"Law
Sensitive" isisanother
Law Enforcement
Enforcement Sensitive information
illformation can only be
intelligence information.
information. Law
disseminated to other local, state or federal law enforcement agencies.
agencies.
ORCON -.Originator
- Originator Controlledj
Cohtrolled; Dissemination
and Extraction of Intelligence information is
is
controlled by the Originator of the Information
V NOFORN - Not
to Foreign
Foreign Nationals
Nationals
Not releasable
releasable to
SAFEGUARDING
Protection of Classified Information from
Unauthorized Disclosure
>
>- Access
Access
>-Marking
>
Marking
>- Transmission
>
>- Storage
>
is
ED
>- CLEARANCE
NEED TO
ACCESS
>
CLEARANCE + NEED
TO KNOW
KNOW = ACCESS
i.
a
a
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
--------~=====----------------
ACLURM005501
17
17
ID
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
S
S
tpileL
~
S
S
S
PORTION MARKINGS
MARKINGS
Indicate classification level
level of
of each
portion of the document.
document.
~ Subject
Subject
>
~ Title
>
~ Paragraphs
Paragraphs
>
~ Graphics
D
Graphics
S
S
S
S
S
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005502
18
18
11 11 1111 11 11 1M O SS IIII IIIIM III II IIII IIII S S110 11 1111 11 11 9 1111 11 1111 11 11
METHODS OF TRANSMISSION
~ U.S.
U.S. Postal
Postal Service
A.
~ Contracted Service
>
>
~ Authorized DOJ, DOD, DOS,
DOS, or
or component courier service/system
~ Cleared
Clearedand
anddesignated
designatedgovemment
employee
A
government employee
~ Authorized
Authori~edcryptographic
cryptographic system
system
A
Preparation of Material for Transmission
./ Envelopes or containers
The outer
./
out~r envelope or container for classified material will be
addressed to an official government activity or to a DOD
appropnate storage
contractor with a facility clearance and
and appropriate
will show
show the
the complete
complete return address
address of the sender.
capability. ItIt will
sender.
The
The outer envelope will not be
be addressed
addressed to
to an
an individual.
individual. Office
codes or phrases such as "Attention:
"Attention: SA Smith may be used.
used.
./
The inner envelope or container will show the address of the
receiving activity, the address of the sender and the highest
classification of the contents.
contents.
./
The outer envelope or single container will not bear a classification
marking or any other unusual marks that might invite special
attention to the fact that the contents are
are clllssified.
classified.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005503
19
19
so
'.
UNCLASSIFIED//FOR
OFHCIAL USE
UNCLASSIFJED//FOR OFFICIAL
USE ONLY
Attorney General
12333 Pennsylvania Ave
Washington, D.C.
D.C.
Washington,
Attorney General
General
12333 Pennsylvania
Pennsylvania Ave
Ave
Washington,
Washington, D.C.
D.C.
Austin
FBI
Austin FBI
9420
9420 Research Blvd
Blvd
Austin, TX
Austin FBI
FBI
Austin
Research Blvd
Blvd
9420 Research
Austin, TX
A\Jstin,
Transporting
./
When being hand carried outside an activity, a locked briefcase or
locked bag may serve as the outer wrapper, but not when hand
carried aboard a commercial airline.
airline.
S
S
I:
ACLURM005504
20
20
;,.
\'`'
http://www.intelink.sgov.gov/siteslssc:Jcapco/marking_refsiMarking%20References%20DocumentslCAPCO%20Implementation
http://www.intelink.sgov.govisites/seckapco/marking_refsiMarking%20References%20Documents/CAPC0%20Implementation
%20Manual_2.1_5%20January"l0202009.pdf
Net system.)
.
%20Manual_2.1_5%20January%202009.pdf(This
(ThisURL
URLIsison
onthe
the FBI
FBINet
system.)
format for
The Intelligence Community fOrmat
for marking
marking classified
classified inlormation
information requires
requires a banner
banner line
line and
and portion
portion markings
markings on
on every
every p~ge,
page, and a classilication
classification authority block
block on
on the
the lace
face
01 each document or media. The format for banner lines and portion markings consists
consisls of eight calegories
Ie format also specifies
of
categories (as described in gray box below). The IC
specifies how
how to
to
series of
of markings
markings within
within them.
them. The
The categories
categories must
musl be
be listed in the
Ihe order shown
separate the categories
categories'and
andseries
shown in the
the Authorized Classification and Control Markings
Markings Register.
Register. Use
Use
(see yellow
yellow arrow) is an example of the formatting
formatling and ordering of the most
only categories and markings required to protect the inlormation.
information. The banner line
line below' (see
most frequently
frequently
I not intended
inlended to re.resent aa correct
correct overallI classification
I ft
k'
unctuation. ItI is
markin
used cate ories and r .uired DUI1CIIJa[lilon.
------- - ,------DISSEMINATION
DISSEMINATION CONTROLS.
CONTROLS.
Inthe
the REL
REL TO marking,
I\ In
marking, always
always list
list USA
USAfirst,
first,
i&EP)S6410414M
When
followed by other countries' ISO
ISO 3166
3166 trigraphs
When using
using multiple
multiple
trigraphs
485Pieit - OIA2Mi fil40.811
l'AVR
markings, separate
separate them
them with
with 1 I listed in alphabetical order by country name. Then
Then
markings,
Peratoa.ITINErEcvaaalevociirlecol onogimca.
,41004-iaa'6,
1
aa single
: list Annex
Annex A
tetrasraphs in alphabetical
single slash.
slash. LIst
List in order
A tetragraphs
alphabetical order
order.
(ROM (.&n.,-irticoceOlt
Wft,,q=c110). crica...reasWatieworole
cgq
, -ricoxcet
shown
ne .
Register.
Separate
shown In
in Markings Register_
orl30-ocralOCPOrVelnlid,
Separate tngraphsltetragraphs
trigraphs/tetragraphs with a comma and
and aa
1
space. The
Thewo~
word :and"
"and" has been el~~I~ated.
eliminated.
.
ANoareqouty
\ spac~
_
q.100.1X11-4r,eoracn-alsob:w Gr.,A..*.zuaL,
~--
,.
-----
FOREIGN GOVERNMENT
FOREIGN
GOVERNMENT INFORMATION.
INFORMATION.
Identify source
aourceof
ofFG.t
FGl in
Identify
in aa US-originated
US-originated
document. In
In banner
banner line,
line,use
useFGI
FGI o.
+
trigraph country code in alphabetical
alphabetical
order,
order, separated by a single space;
space; e.g.:
e.g.:
FGI GBR.
FGI
GBR. InInportion
portion markings,
markings, use
use
trigraph -toe portion
portion marking
marking for.
for
classtncation
VIGBR S).
S).
classification level;
level; e.g::
e.g (//GBR
6}100(00r
141 11gr;i! NOT ALL
0kb,
140''&-d.klifi
i flee
glakT-AOPriA
coaiimiowor .
Ili
qtaLtri-aroligeare
44r. ttin
JO a I C 41E1
6.
5. Foreign
Foreign Govemmanllnformallon
GOVORMIent Intonation
7. OlsS~mlnatl~
Dissemination Controls
Controls
7.
88. Non.lntellgence
Nontintelligence Communitv
Community foAarklngs
Maikmos
itytl
rt _Clas f cation
If
os'AcE.O.Jaarrri
o akT.,00n .
44.561
SCI Control
Control System
System
S.
6. Foreign Government
Government Information
Information
Example: Canadian
Canadian Secret
Secret InformaUon
Information
Banner line: //FGI
flFGI CAN
CAN
Portion Marking:
(/JCAN S).
S). Use
Use FGI and
Portion.
Marking: (//CAN
claSSification
levelONLY
ONLY (//FGI
(IIFGI S) when
classification level
when
ba concealed.
concealed.
origin country must be
7. Dissemination Controls
FOUO
(FOUO)
ORCON (OC)
IMCON
(IMC)
NOFORN (NF)
PROPIN (PR)
Authorized for Release to... (REL TO)
RELIDO (new marking)
(RELIDO)
DEA Sensitive
(DSEN)
FISA
(FISA)
Law Enforcement Sensitive (LES)
(NOTE: In classified documents, LES
is not included in the banner line. See
http://www.intelink.sgov.govisites/ssc/cap
co/marking_rets/Marking%20References%
20Documents/LES%20Interim%20IC%20M
arking%20Guidance.doc for IC Guidance.)
-
40-611(.0
)11Xte1061).0.1!95iq
1Jitto*,-,4417ifteiiic.40#;9v4Itoli#60#00/04',.
F8VSecD/5PCAU Updated
FEII/SecD/SPCAU
UpdatedJul
Jul 2009lhma
2009/hma
ACLURM005505
!.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY'
ONLY
if
\,.
)I
el
PERSONNEL SECURITY
1) Must uphold values of
of reliability, trustworthiness, honesty, and integrity.
1)
integrity.
2)
2) Must be entirely frank and cooperative in answering inquiries of an administrative
nature.
nature.
3) Must not falsify information and/or
andlor documents for purposes of fraud
3)
fraud or personal
gain.
4)
4) Must not engage in illegal activities, criminal conduct, dishonest conduct, or
insubordination.
5)
5) Must report to the FBI any occurrence or activity which might reflect adversely
on the FBI or bring discredit to the Bureau.
Bureau.
6)
6) You are proscribed from managing any business or sales
sales activity inside FBI space
that you might have in connection with any other employment(s) in which you
might be involved.
7)
7) It is improper to engage in
in any
any illegal
illegal gambling
gambling activities.
activities. You should not
participate in lotteries, pools, betting, bookmaking, etc.,
etc., while in official duty
status or government property occupied by
by the Bureau.
Bureau.
8) You are accountable for your on/off duty alcohol-related misconduct whether or
8)
not you are specifically
specifically charged
charged with
with an
an alcohol-related
alcohol-relatedoffense.
offense. Never cause
yourself to be unfit for duty
UI
duty due
due to
to excessive
excessive alcohol
alcoholconsumption.
consumption. A first D
DUI
infraction, whether established by a conviction in court or as the result of an
administrative inquiry, will cause you to be suspended from duty
duty without
without payfor
pay for
If aggravating circumstances exist, you
a period of not l~ss
less than
than 30
30 calendar
calendar days.
days. If
may be terminated from employment.
employment.
9)
9) You may not solicit or collect contributions for any purpose while in Bureau
space without prior FBI approval.
approval.
10)
Gifts,
discounts, benefits, reduced memberships, etc.,
10)
etc., are prohibited if it was
offered as a result of your employment.
gratuities might be acceptable if
employment. Such gratuities
they are offered to all
all FBI
FBI employees,
employees, not
notjust
just you.
you. These gratuities may not be
accepted if offered by a "prohibited source" or if a conflict of interest exists.
exists.
11) You may give employment recommendations or act as
as a character reference for
Bureau personnel so long as your response is not based on FBI files or on any
information or data that you
you acquired
acquired by
by virtue
virtue of
of your
yourfederal
federal employment.
employment. Do
not use Bureau stationary, letters with the FBI seal,
seal, Or
or your official title or
posidon
Your response
response is your personal opinion and not the
position in your response.
response. Your
opinion of the FBL
FBI.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005506
22
i.
SI
el
lb
ID
FACILITY SECURITY
1) Do not permit your Security Access Control System (SACS) badge to be
1)
photographed or photocopied at any time.
2) Safeguard your SACS badge at all times and do not leave it unattended.
ACLURM005507
23
b7E
INFORMATION SECURITY/COMPUTERS
EM_securityclearance;
clearance;but
butnot
not all
all FBI
1) All FBI
FBI employees
employeeshave
havea~p
aZgrra3t.security
employees have a need-to-know
need-to-know what
what you
you are
are working
working on.
on. An appropriately
cleared individual may have a legitimate need-to-know if they require information
you possess in order to perform their
their official
official duties.
duties. You have the authority and
are empowered to grant or deny
deny others
others access
access to
to information
information you
youpossess.
possess. It is
your responsibility to conflfm
confirm the requestor's official Bureau need to obtain
information about your case in
in order
order to
to accomplish
accomplish his/her
his/herjob.
job. Inquire about the
other person's request for information.
information. If
Ifhe/she
he/she cannot
cannot convince you of the
official Bureau need for
for access,
access, you
you should
should deny
deny the
the request.
request. Curiosity is not a
valid justification for any attempt to gain access to Bureau information or space.
Do not disclose information to other persons who do not have a need-to-know
thi includes
'nc
.and
.
(this
even your closest relatives
friends).
__________________________
____
______
2)
2)~
~~
-.::::::=-:::::
b7E
ecurity
clearancedoes
doesnot
notautomatically
automaticallygrant
grantyou
you access
access to all
A tapo3t,t_security
clearance
FBI office space and to all FBI information.
UNCLASSIFlEDIIFOR
UNCLASSII-IED//FOR OFFICIAL USE ONLY
ACLURM005508
2244
a
a
a
a
aa
a
a
a
a
a
a
a
II
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
3) The security of FBI space and information, the nature of FBI work, and the
3)
security ofofFBI
personnel
and and
their their
Bureau-issued
propertyproperty
are ~aSDl....in
security
FBI
personnel
Bureau-issued
are min
nature and should not be discussed with individuals who do not have a
need-to-know.
4)
4) Employees should not needlessly identify themselves as FBI employees,
particularly in restaurants and other public spaces where they might easily be
within earshot of representati
ves of Foreign Intelligence Services
representatives
Services or other
criminal organizations.
Neither should
should employees
employees discuss Bureau work at
organizations. Neither
luncheons, in car pools, or in Qther
other areas outside the working space, even with a
social group consisting solely of Bureau employees.
employees.
5)
5) Do not allow unauthorized persons to use Bureau computers.
computers.
6)
6) Do not leave your work area if you
you are
are still
still logged
logged onto
onto the
the computer.
computer. Exit all
programs (especially FBINET) before you leave your computer unattended.
unattended.
7)
do not
not leave
leave itit on
on aa post-it where people can see it, i.e., on
7) Computer password:
password: do
the computer,
computer, under
under your
your desk,
desk, etc.
etc. Do not share it with others.
others.
8) All FBI information is categorized as
8)
as Classified or Unclassified but Sensitive (the
latter being equivalent to Law Enforcement Sensitive).
Sensitive).
9)
9) From 1985 to 1999, seventy-five federal employees were convicted of espionage.
espionage.
Only two of the 75 employees sought employment with the sole intent to commit
espionage. Also,
Also, approximately
approximately 80% of espionage
espionage.
espionage is
is conurutted
committed by
byinsiders.
insiders. In
almost every case, these insiders gained access to information not pertinent to
their jobs by circumventing
circumventing the
the need-to-know
need-to-know principle.
principle. They were able to do so
because their co-workers failed to properly restrict access to classified
classified and/or law
enforcement sensitive information under their control.
.
control.
10)
Working
copies
of
official
Bureau
documents
are
for
official
business
and not for
10)
personal use.
use.
11) Unsolicited telephone inquiries for FBI information should not be disclosed if the
11)
identity of the caller is unknown and/or if the caller does not have a need-to-know.
need-to-know.
Classified information cannot be discussed over non-secure
telephone
non-secure telephone lines.
lines.
12)
Official,
unclassified
Bureau
trash
must
be
disposed
of via the use
12)
use of
white-rimmed wastebaskets. These wastebaskets are to be emptied each day at the
close-of-business.
13) Whenever Bureau mail of any type is carried on elevators, in corridors, or in other
13)
public spaces, the material should be covered.
covered.
14)
Bureau
work should not be taken into restrooms
14)
restrooms or lounges
lounges at any
any time.
time.
15)
You
are
not
allowed
to
take
home
investigative
files
or
serials.
serials.
15)
fib
Thepossibility
possibilityexists
existsthat
thatyou
you could
could become
become aa target
target of
of recruitment from various
1) The
groups/entities who seek information
information from
from the
theFBI.
FBI. Why are you
you a target?
target?
a) Your
Youremployment
employment with
with the FBI;
FBI;
Youare
areperceived
perceivedas
ashaving
having access
access to
to an
an intelligence
intelligence agency; and
b) You
c) You
Youhave
haveaccess
accessto
toaalaw
law enforcement
enforcement agency.
agency.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005509
25
25
II.
GO
0
.
in
O
O
UNCLASSIF1ED//FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
2) Who
Who may
may target
target you?
a) Organized drug rings
a)
b)
b) Gangs
c)
c) Mafia organizations
d) Individual drug dealers
d)
. e)
-White collar
e) -White
collar criminals
f)
f) International and domestic terrorist groups
g)
g) Radical militant groups
h)
h) Foreign intelligence serviCes
services
Howcould
could you
you be
be targeted?
targeted?
3) How
a) Recruitment:
Your cooperation
cooperation can
can be
be actively
actively solicited by any of the
a)
Recruitment: Your
aforementioned groups;
groups;
b)
Your willingness
willingness to
to provide
provide information,
information, of
of your own volition,
b) Volunteer:
Volunteer: Your
motivated by factors such as greed, discontentment, dissatisfaction, revenge,
revenge,
etc.
c) Coercion:
Using extortion
extortion tactics
tactics to
to exert
exert pressure on you as a means to force
c)
Coercion: Using
you to cooperate;
d)
Attempts to
to put
put you
you in
in aa situation that could jeopardize your
d) Compromise:
Compromise: Attempts
affiliation with the FBI if you do not cqoperate
cooperate with them, such as sex,
sex, drugs,
drugs,
prostitution, criminal acts, etc.
4) You
Youhave
havean
anaffirmative
affirmativeobligation
obligation to
to notify
notify the
the Bureau
Bureau in writing if
if you become
a target, or suspect that you may have become a target.
youobserve
observesomething
somethingcontrary
contrary to
to good
good security,
security, contact
contact the Division Security
5) IfIfyou
Officer.
youare
areexperiencing
experiencingfinancial
financial difficulty,
difficulty, emotional
emotional stress,
stress, personal problems,
6) IfIfyou
etc., contact your EAP Counselor and/or seek professional counseling.
. Ifyou
youhave
haveany
anyquestions,
questions, call
call the
the Division
Division Security Officer
7) If
TELEPHONE AND FACSIMILE MACHINE
1) Telephones are
are not considered
considered secure.
secure. Any classified conversation should be
1)
conducted on a STU or STE telephone.
2) Facsimile machines are not considered secure and should not be used for
2)
Classified documents
documents should be faxed on secure fax
classified information.
information. Classified
fax
machines and those clearly marked for the transmittal of classified information.
information.
SCI information may only be sent from and received in an approved SCIF by an
authorized person
person maintaining
maintaining the
the appropriate
appropriateaccesses.
accesses. SCIF
SOF locations vary, but
the presence of FBI personnel does not necessarily indicate the presence of a
SCIF.
ACLURM005510
26
;e
I:
ID
ID
.
a
a
el
4111
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
securityincident
incidentisisaafailure
failuretotosafeguard
safeguard FBI
FBI material
material in
in accordance
<l;ccordance with FBI
2) AAsecurity
policies and other IC directives and is categorized as a violation or an infraction.
infraction.
A security violation is any incident that results in the actual loss, compromise,
or suspected compromise of classified national security information or
unclassified information. For example, if an employee transmits a classified
document over an unclassified facsimile machine, the incident would be
determined to be a security violation, due to the real possibility for electronic
interception and transcription of the classified document. A security infraction
of security and that does
is any other incident that is not in the best interest of
not involve the loss, compromise, or suspected compromise of classified
national security information. For example, at the end of a workday, an
, employee leaves a security container unlocked and unattended, containing
classified information, in an area approved for storage of classified information.
information.
No unauthorized entry took place.
This incident
incident would
would be determined to be a
place. This
security infraction because Bureau policy requires that classified material be
secured properly after hours, even though no actual compromise occurred in this
case.
Whenaasecurity
securityincident
incidentoccurs,
occurs,swift
swiftand
andefficient
efficientattention'
attention' must be afforded to
3) When
ensure the minimization of any possible damage through notification to
to the
authorities. Security
Security incidents
incidents should
should be reported immediately
appropriate authorities.
utilizing the SIP form located on
on the
the Security
Security Division
Division Website.
Website. Instructions are
included with the form, which is prompting, based on the information provided by
the reporting individual.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR oFFICIAL
OFFICIAL USE ONLY
ACLURM005511
27
27
'
__________________~(D~o~n=o~t~sl=gn~.~T.h~I~s~~~an~ex~a~m~p~l~e~o~n~ly~)
(Do not sign. This is an example only)___________________
(Individual Briefed / Print Name)
(Signature)
(Date)
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005512
2288
ACLURM005513
11 II II II II
II II II II II II II IIIIII 11II11 IIII II II II II II II II
II 11 11 11II 11 II1
1 II
II
TERRORISM 1
CRIMINALIZING TERRORISM1
The United States Constitution recognizes the inviolable right to free expression
and free association, and the right to be free from deprivations of liberty or property
law." As
As interpreted
interpreted by
by American
American courts, persons in the United
without "due process of law."
States cannot be prosecuted for their thoughts alone, nor can the United States criminalize
As aa result,
result, our
our criminal jurisprudence
conduct protected by the First Amendment.
Amendment. As
acts, rather
rather than
than thoughts
thoughts or speech unattached to particular conduct.
stresses definable acts,
of terrorism crimes prosecuted in the United States follows this
The structure of
Thereisis no
no crime
crime of
of"being
"being aa terrorist"
terrorist" or "thinking
"thinking terrorist
tradition. There
terrorist thoughts."
thoughts." While
Code defines
defines the
the "federal
"federal crime
crime of
ofterrorism".
terrorism". (Title 18, United States
the United States Code
Code, Section 2332b (g)(5)), as an offense that is calculated to influence or affect the
of government by intimidation or coercion, or to retaliate against government
conduct of
conduct; and it then simply lists all the terrorism-related crimes for ease of reference.
convicted of
of the "federal
"federal crime of terrorism," because there is no such
Persons cannot be convicted
Title18
18does
doesdefine
define"international
"international terrorism"
terrorism" and
and "domestic
"domestic terrorism" in section
crime. Title
Bothpertain
pertainto
to activities
activities that
that involve
involve acts
acts that
that are
are dangerous
dangerous to human life, that
2331. Both
of federal or state criminal law, that appear to be intended to intimidate or
are a violation of
to influence the policy of a government by intimidation or
coerce a civilian population; to
coer~ion; or to affect the conduct of
of a government by mass destruction, assassination, Or
coercion;
or
kidnapping. The
Themajor
majordistinction
distinction isis that
that international
international terrorism
terrorism occurs primarily outside
lCounterterrorism Enforcement:
Enforcement: AA Lawyer's
Lawyer's Guide by Jeff
'Counterterrorism
Breinholt, Office
Office of
of Legal
L.egal Education,
Education, U.
u. S.
S. Department of
Breinholt,
Justice, May 2004.
2004.
Justice,
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005514
29
the territorial jurisdiction of the United States and domestic terrorism occurs primarily
within the United States.
Terrorism crimes have developed in the same manner as other law enforcement
areas. Policyrnakers
Policymakers determine what negative results should be prevented, and then craft
criminal laws that take into
into account how
how such
such results
results are
are generally
generally achieved.
achieved. On
sho~ld necessarily be discouraged, if
occasion, acts that are criminalized are not ones that should
~ ".-.-~.
ACLURM005515
30
UNCLASSIFIED/FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
STATUTES
Title 8
1324
1324
Alien smuggling .
1325
1325
megal entry by an
an alien
aiien
Illegal
1326
1326
of aa deported alien
Unlawful reentry of
1328
GI
Title 18
32
37
43
81
112
113
175
175b
229
231
231
Civil disorders
232
Definitions
351
351
373
373
831
831
842
ID
411
flb
UNCLASSIFlEDJIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
ACLURM005516
31
31
844
844
878
878
922
930
951
951 et
Neutrality violations
violations
et seq
seq Neutrality
956
956
960
1028A
1028A
1030
1038
1038
1114
1116
1201
419
1203
Hostage taking*
1362
1363
1363
1365
1366
1366
1751
1751
1956
Money
Money laundering
laundering
1957
1957
Unlawful monetary
monetary transaction
transaction
1960
I.!-
i.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE
USE ONLY
\-
ACLURM005517
32
so
SS
S
lb
11
ID
S
S
S
S
S
S
S
S
S
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
UNCLASSIFIED//FOR
1958
1958
1992
1992
trains*
Wrecking trains*
1993
1993
of violence
violence against
against mass transportation
Terrorist attacks
attacks and
and other
other acts
acts of
Terrorist
systems*
systems*
2101
Riots
2102
Definitions
2155
of national-defense
national-defense materials, national-defense premises, or
Destruction of
utilities*
national-defense utilities*
2280
2280
2281
2331
Terrorism definitions
2332
2332a
2332b
2332b
2332d
Financial transactions
2332f
2332f
Bombings of places of
of public use, Government facilities, public
transportation systems and infrastructure facilities*
facilities*
2339
2339
Harboring terrorists*
terrorists*
2339A
2339A
2339B
2339B
2339C
2339C
Relating to financing
financing terrorism*
terrorism*
2340A
2340A
Torture*
Torture*
2384
2384
Seditious
Seditious conspiracy
conspiracy
2381
2381
Treason
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
ACLURM005518
33
33
i S
Title 42
2284
22~4
Title 49
46502
46502
Aircraft piracy*
46504
46504
46505
46505
46506
46506
46507
46507
60123
60123
Title 50
1701
1701
INVESTIGATIVE GUIDELINES
The United States Attorney General has established Guidelines to have a
specified matters and to enable agents to perform their duties with
consistent policy in the specified
greater certainty, confidence and effectiveness, and assure the American public that the
Two separate
separate and
and distinct
distinct Guidelines have been
FBI is acting properly under the law.
law. Two
One, "The
"TheAttorney
Attorney General's
General'sGuidelines
Guidelines on
on General
General Crimes,
Crimes, Racketeering
established. One,
ACLURM005519
34
a
a
I
I"
S
S
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
InvestigatIons (TEI)"
(TEl)" section and are
(DT) investigations using the "Terrorism Enterprise Investigations
b7E
S
S
S
S
S
S
S
S
S
S
S
S
S
investigative activity, allowing the FBI the necessary flexibility to act well in advance of
the commission of planned terrorist
terrorist acts
acts or
or other
other federal
federal crimes.
crimes. The three levels of
(1) Threat
Threat Assessment
Assessment (TA),
(TA), the prompt and extremely limited
investigative activity are:
are: (1)
checking of initial leads, (2) Preliminary Investigation (PI), and (3) Full Field
The conduct
conduct of
of investigations
investigations authorized
authorized under the Guidelines may
Investigation (FFI).
(FFI). The
present
preSent choices
choices between
between the
the use
use of information
information collection methods
methods that are more or less
intrusive, considering such factors as the effect on the privacy of individuals and potential
As Executive
Executive Order
Order 12333
12333 2.4 provides, "the least intrusive
damage to
to reputation.
reputation. As
S
S
S
S
S
S
S
with all requirements for use of a technique set by statute, Department regulations and
'The
The applicable
b7E
.137E
S
S
S
S
S
S
S
guideline provides specific authority for the investigations and should be reviewed and
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005520
35
35
O
4111
ED
Assessments:
The lowest level of investigative activity is the "prompt and extremely limited
checking out of initial leads," which should be undertaken whenever information is
received of such a nature that some follow-up as to the possibility of criminal activity is
This limited
limitedactivity
activity should
should be
be conducted
conducted with
with an
an eye toward promptly
prompt:ly
warranted. This
fib
ID
ID
ID
ePD:
Preliminary Investigation (PI):
Approvals for
for Investigative Techniques" in Tab 6).
ACLURM005521
3366
!They,
They, of course will be available once the
L _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.....
Classification 266) and Terrorism Enterprise Investigations (FBI Classification 100), will
The choice
choice of
ofthe
the type
type of
ofinvestigation
investigation depends
depends on the information and
be discussed. The
A general
general crimes
crimes investigation
investigation may
may be initiated where facts or
investigative focus.
focus. A
circumstances reasonably indicate that a federal crime has been, is being, or will be
Preventingfuture
future criminal
criminal activity,
activity, as
as well
well as
as solving
solving and
and prosecuting crimes
committed. Preventing
"reasonable indication".
UNCLASSIFIEDJIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005522
37
electronic surveillance, pen registers and trap and trace devices, accessing stored wire and
electronic communications and transactional records, consensual electronic monitoring,
of such methods under the
All requirements
requirements for
for the
the use
use of
and searches and seizures. All
CONCLUSION
The United States counterterrorism enforcement mission was permanently altered
One of
ofthe
the most
most significant
significant changes
changes was
was the role of the federal
on September 11, 2001. One
prosecutor and the enforcement of federal
federal laws
laws relating
relating to
to terrorism.
terrorism. Immediately after
task of the Department
the 9111
9/11 attacks, the Attorney General announced that the primary task
identifying, preventing, and deterring acts of terrorism within the United States.
ACLURM005523
38
S
S
S
S
S
S
S
S
S
S
S
S
S
S
SS
SS
SS
SS
SS
SS
SS
SS
SS
ACLURM005524
(11
ID
lb
411
ID
el
411
ID
ID
411
411
411
411
411
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
REQUIRED DOCUMENTATION
>
Opening"an Assessment
Opening-an
./
Open a Guardian Assessment
>
Closing an Assessment
./
v Closing EC
,>
>
111
ACLURM005525
39
39
~ Extending
ExtendingaaFull
FullField
Field Investigation
Investigation
>
if
v" Extension EC
>
~ Annual Summary for a Full Field Investigation
if
Annual Summary EC
if Annual Summary LHM
>~
~ Reporting
ReportingGrand
GrandJury
JurySubpoena
Subpoena Return
Return
>
'. if
FD-302
>
~
./
ED 542
b7E
Form
if FD-542
FD-S42 (Requesting Surveillance)
~ Reporting
ReportingSurveillance
SurveillanceConducted
Conducted by SSG
>
if FD-542 (Surveillance Conducted)
~ Reporting
ReportingSurveillance
SurveillanceConducted
Conducted by JTTF
>
if FD-302 or Surveillance Log
~
>
Request Training
if FD-878
if
Training Request Form (TRF)
~ Reporting
Reportingan
anInterview
Interview
>
if FD-302
~ Reporting
ReportingaaTrash
Trash Cover
Cover
>
if FD-302
if FD-S42
FD-542 (to document analysis of and claim statistical accomplishment)
ACLURM005526
40
v'" SF-91
v"
ST-3 (Completed by Police Officer on scene)
v" Police Report (Completed by Police Officer on scene)
v" An FBI Agent must respond to scene as he/she will need to complete
EC/302.
.
):>
Submitting
General
Evidence
>
v" FD-302
v"
FD-l92
FD-192 (Evidence Submission Form)
v"
Chain of Custody
):> Submitting Film for Processing
>
v" FD-523 (AIRTEL)
v"
Coor~inator for applicable contact)
(See contact list or JTTF Coordinator
):> Submitting Electronic Evidence to be Analyzed
>
v" FD-302 (if
(if not already documented on evidence/surveillance logs, etc)
v"
FD-597
(Evidence
Log)
v"
FD-192
(Evidence
Submission Form)
v"
Chain
of
Custody
v" EC tothe
Investigative Reports
EC (Electronic Communication):
Communication):
The purpose of the Electronic Communication (EC)
(EC) is
is to
to communicate
information within the FBI.
FBI.
EC applications:
applications: (examples)
):>
> Open and close cases
):>
> Document results of a lead
):>
> To report the status of your investigation
):>
> Document investigative activity
):>
... ).
> To request investigative assistance (SSG,
(SSG, SOG,
SOG, etc
etc...).
):>
> To request action to
to be
be taken
taken
):>
> Sending information to
to your file
file
**Can
Accomplishment**
**Can not claim a statistical Accomplishment**
UNCLASSIFIED/fFOR
UNCLASSIFIED//FOR OFFICIAL USE
USE ONLY
ONLY
ACLURM005527
41
41
a
a
a
a
UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
When an EC is communicating information outside of the originating division,
division,
two
First, your EC must contain a "TO:" line,
two components
components are
are necessary.
necessary. First,
indicating the
the division(s)
division(s) receiving
receiving the
the EC.
EC. It is important to remember that if
more than one division is listed, they must appear in alphabetical order (with
Headquarters divisions listed first).
*see Example
Example 1I
first). *see
Example 1
(F".GIJI.1D3)
(F..0131-203)
FEDERAl. BUREAU
FEDERAL
BUREAU OF
OF INVESTIGATION
INVESTIGATION
Preced~.ce: ROUTINE
ROUTI HE
Precedence:
~..,:
nate:
03/3112005
Date:'. 03/31/200S
A
Attn: STFSO
SSA
Attn:
Attn: SFO .
Att.:
Counterterroris1L.
Counterterrorism.
Atlanta
Hou.ton
Houstonn
itt.:
..."Drn:oe~---I
Attn: SA
SA .l::an::::
ane
oe
b6
b6
b7C
b7C
b7E
b7E
Froa:
San Antonio
An tenie
From: San
Squad 11/CTIJITFlAnetin
Squad
fl/CTIJITFrAnstjp. Pecident
Re 5id ent Agency
Agencv
Contact:
Co.
tact: TFO
;;
====~
Approved BV:
By: :=1
lppraved
Drafted BV:
By: I,
Drafted
'IttlD1n
*S.
Case
ID I: ....
, -'======r,..I(pendin9)
Case ID
((Pending)
S: I
Title:
IT THREAT
TIIREAT ASSESSMENT
ASSESSHENT
Title: IT
Synopsis: To
To provide
pro9ilie infornation
informatioll in
1D reference
reference to
to interview
iDter~iev of
of
Synopsis:
captioned subject.
subject.
captioned
*NOTE:
*NOTE: The
The "To:" section must correspond
correspondwith
withthe
the "Lead"
"Lead" section.
section. That is to
say that
that/or
for every Division listed as a receiving division,
division, a corresponding Lead
division.
must be set/or
set for that division.
Following are the three approved Lead types:
types:
1)
1) "Action Required"
Required" - This type of lead will be used if the sending office requires
the receiving office to do some action (interview victim, locate person, etc.).
etc.).
2)
Action 11 -- This type of lead will be used if the sending office has
2) "Discretionary Action"
SOme information that may be of importance
some
importance to
to the
thereceiving
receivingoffice.
office. It mayor
may or
may not require action by the recipient and the recipient will decide what, if any,
any,
UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005528
42
--------------------------------:---------------,
.-.-.
UNCLASSIFIEDIIFOR OFFICIAL
UNCLASSIFIED//FOR
OFFICIALUSE
USEONLY
ONLY
Forexample:
example: Tampa
Tampa receives
receives some
some information
information regarding a crime
action to take. For
Tampa forwards
forwards the
the information to San
that allegedly happened in San FranCisco.
Francisco. Tampa
a~y action deemed appropriate.
Francisco to take any
3) "Information Only" - This type of lead will be used for information only and no
specific action is required or necessary (administrative type matters, change in
leave policy, etc.).
Example 2
b7E
To.
To:
Re:
Re:
L
Icry'Ptnrt,rrorier
Fro.: San
San Antonio
Antonio
From:
.03/31/2005
03r31/2005
I.E.IoD( .. ):
IEAD(s):
ISe~ Lead
(Info)
'Set
Lend 1:
1: (Info)
CQUNTERTERRORISH
COUNTERTERRORIS4
AT UASHINGTON.
VASHIMGTOH
AT
DC
Read and
and clear.
clear.
Read
ISet ~cad
(DiscxetionGrY)
iSet
Lead 2:
2: (Discretionary)
ATLANTA
AT ATI.AnTA
vA
AT
ATLANTA GA
For vhatevor
vh.o.tevelzo action
oct ion deemed
deeaed necessary.
neeO~\3a%'y.
For
ISet lend
Lead 3:
3: (Action)
(~etion)
'Set
HOUSTON
AT HOUSTON
IX
.AT
HOUSTON TX
Locate and
and intervicv
int~~vi=v Joe
Jee Terrorist.
Te~rori~t. residing
rc~iding at
at 123
123
Locate
, Hain
Main Street,
St:reet. Houston,
Houston. TX:
TX; and
and repo:rt
of interviev
interviev to
to
report :results
results of
.Aust.in.
Austin.
UNCLASSIFlEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005529
43
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Example 3
a
a
a
.-
ID
lb
I.
I.
(R.e\r.
0 IJ 12003)
Mar.0111.7='
IFEDERAL
FEDERAL BUREAU
BUREAU OF
OF INVESTIGATION
INVESTIGATION
Precedence:
ROUTINE
Precedence:
ROUTINE
of
Date:
02/08/2005
Date: 02/08/2005
To:
San Antonio
Antonio
To: San
From: 115:n
vCn Antonio
Prom:
11/CTVTTTv
Squad 11/C
Contact: TFO
Contaot:
TFO
aM
. Approved By:
By:
Drafted
Drafted By:
By:
as
~:!!
4Z
D.'
I
_I
II--------...,rrrmmJ~
Wg-IT1
t Agenoy
Agency
b6
b6
b7C
b7C
b7E
Case
It: ,,_ _ _ _ _ _ _.....1 (Pending)
(Pending)
Case ID
ID 1:
. Title:
.Title:
IT GASE:
IT
CASE
SAMPLE EC
SAMPLE
~
4
,3
Synopsis: This
is aa sample EC.
EG.
Synopsis:
This is
~~r
dofl
Details: On
a sample EC
llC to
to be usec
use<
Details:
On 02/08/2005,
02/08/2005, writer
writer completed a
for training
training purposes.
The following
following person
person is
is fictional
fiotional and
and
for
purposes. The
been created
created for
forthe
to "Index"
- the purpose
purpose of
of demonstrating
demonstrating how
how to
'Index"
information so
that it
be searchable
searohable in the FBI
FBI databse.
databse.
information
so that
it may
may be
***IMPORTANT***
Your classification
classification should
should be
be the
the only
only Case
CaseID
ID listed
listedon
onthe
theFD-S42.
FD-542. If a nonnonvalid classification (for example, administrative or criminal
criminal classification) is listed
in addition to the valid classification, this would prevent the FD-S42
FD-542 from being
uploaded.
FD-S42
FD-542 applications: (examples)
~ Dissemination of information
>
~ Participating in Command Post/Major Case/Special Event
>
Event
~
ParticipatingasasaaMember
Memberof
ofaaWMD
WMD Working
Working Group/Task
GrouplTask Force
> Participating
~ Participation in WMD exercise
>
~
WMDAssistance
AssistanceProvided
Providedto
to State/Local/Federal
StateILocallFederal Agency
> WMD
~ Request Surveillance (SSG only)
>
ACLURM005530
44
/ S
I:
it
an
Example 4
To:
To:
R~:
G>~
qa
San A.nton'io
From.: San
San.An
tonic
San
Antonio From:
Antonio
300C-SA-C50792. 04/19/2005
3000-SA-CS0782,
04/18/2005
'AccoIplish.ent
Accomplishment Inforaation:
Information:
b6
b7C
RUl!\ber:
Humber: I1
'Tvpe: POSITIVE
POSITIVE
INTEllIGENCE(DISSEMINATED
(DISSEMINATED OUTSIDE
OUTSIDE FBI)
'Type:
INTELLIGENCE
ITU:
IIA I SONBITE
9ITH
OTS ERAGENCY
AGENCY
ITU: LIAISON
OTHER
Claimed By:
By:
Claimed
5,5H: 123456789
~~~:
j21mm
~ Squad:
Squa.d: ~lnrT!------I
an
OMMEM1101Hans;
lOBi 1 i(02 "I!tb
+.4+108j1402.AM
ACLURM005531
45
go
a
IR
011
OFFICIAL USB
UNCLASSIFIED//FOR OFFICIAL
USE ONLY
FD-7l Copy Count: 1 (Same as EC
BC above)
FD-71
(Report Discoverable Information):
FD-302 (Report
of the FD-302 is
is to
to document
document discoverable information (i.e.
The purpose of
information that
that you may have to testify to in court)
fib
411
lb
ID
ID
First copy
./'
V" White paper: Clean with no markings (i.e.
(i.e. no initials or copy count)
This copy is for the U.S.
U.S. Attorney's Office
It can be mailed to:
to:
U.S.
U.S. Attorney
Attorney's~ Office
Attn:
XXXXXXX
Atm: AUSA XMVXXXX
Address:
Address:
go
ACLURM005532
46
------------------
a
a
a
4111
VI
4111
ID
4111
.'
411
41
411
of
(*copy count includes your Case ID, your typed initials and the number of
copies.)
Example copy count: 266F-NY-55619
PAH:pah (use
(use your
your initials)
(3)
(3)
- FD-515
FD-SIS (Statistical Accomplishment)
of the FD-515 is to claim what is referred to as a "hard stat."
stat. "
The purpose of
**The FD-515 MUST be completed within 30 days of the event**
FD-515 applications:
~ Complaint/Information/Indictment
ComplaintlInformationlIndictment
>
~ Arrest
>
~ Conviction
~ Sentencing
>
~ Asset seizure
>
~ Other
>
FD-515 Copy Count:
Count: I1
e-form'
below)
.
./ After completion, validate the FD-930 e-form
e-fonn by clicking on the
screen."Validate Form"
Form" button at the top of the screen.
*If the form was completed with valid data and all required fields have
tum to a green
been populated, the red 'NOT VALID' indicator will turn
'VALID' indicator. If
If the form was not completed with valid data and/or
allrequired
havenot
all
required fields have
not been populated, the red 'NOT VALID'
ACLURM005533
47
UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
indicator will remain and a window will appear listing all invalid data
and/or omitted fields that need to be addressed by the Case Agent before
,the
the form
form is
is submitted to
to the
the TREX
TREX Unit.
Unit. Field Offices should not upload
either 'VALID' or 'NOT VALID'
VALID' FD-930s
FD-930s into
into ACS.
ACS. The TREX Unit
will be responsible for function
function..
Save the completed FD-930 to a file/folder of your choice.
./
choice.
Prepare an e-mail to HQ_DIV13_TREX, with the subject line of the e./
mail being your substantive investigative case file
file number,
number, and attach the
completed FD-930 e-form.
Based on
on the 'Type of Request', the following
e-form. Based
to the e-mail submitted to
documents must be sent as attachments to
HQ_DIV13_TREX: .
HCLDIV13_TREX:
Request' isis 'Initial
'Initial Submission':
Submission': FD-930 and
If the 'Type of Request'
opening case EC and NO!
NOI or LHM.
LHM.
is 'Remove Individual from ALL Watch If the 'Type of Request' is
and Supported
Supported Systems':
Systems': FD-930 and closing case Ee.
listing .and
EC.
If the Type
'Type of
of Request'
Request' is 'Add Data to Existing Record' or
'Modify or Delete Data
Data From
From Existing
Existing Record':
Record': FD-930 and EC
clearly stating what is to be added to, deleted from or modified in
record.
the existing record.
TREX Unit will review the nbmination for thoroughness
./
thoroughness and accuracy,
reconcile all conflicting issues, and make appropriate notifications (TSC,
NCTC, etc.). The
The TREX
TREXUnit
will then
then send an e-mail to the Case Agent
Unit will
containing a copy of the completed FD-930 that has been uploaded to
to the
substantive investigative case file, and the serial number of that document.
document.
'/Print
Print one (1) hard copy of the e-mail for uploading/serializing into the
substantive case file.
file.
./
Print two (2) copies of the FD-930, one (1) for the substantive case file
file
and one (1) for the VGTOF control file.
file.
UNCLASSIFIED//FOR OH-'ICIAL
OFFICIAL USE ONL
Y
ONLY
ACLURM005534
48
48
MI
~--"""--"-~
fib
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
When certain conditions are created on the form, pop-up windows will
If aa subject
appear advising the
the Case
Case Agent
Agent of
of aaconflict.
conflict. For example:
example: If
has been determined to be Armed and Dangerous and the Armed and
Dangerous caveat is entered as a Caution and Medical Condition, the
Law enforcement
subject may not be issued a Silent Hit Handling
Handling Code.
Code. Law
officer safety is paramount; therefore, initial eligibility criteria for an
individual to be issued a Silent Hit Handling Code is that the individual
may not pose a safety or violence threat to law enforcement.
Policy and procedural ECs cited on the form may be directly accessed by
clicking on the communication's reference link.
uNCLASSIFIEDllFOR
UNCLASSIFTEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ACLURM005535
49
:----------..............111111
ACLURM005536
'.
INVESTIGATIVE PLAN:
,.
ALL INVESTIGATIONS
INVESTIGATIONS MUST BE APPROVED /
I
ASSIGNED BY THE SQUAD SUPERVISOR AND
CONDUCTED IN ACCORDANCE WITH THE ATTORNEY
GENERAL GUIDELINES.
GUIDELINES.
RECEIVECOMPLAINT:
COMPLAINT:Complaints
Complaints
cancome
comefrom
frommany
manysources
sources including,
including,
1. RECEIVE
can
but not limited to:
~
>
~
>
~
~
>
~
>
~
>
~
>
FD-71
FD-71
Electronic Communication I/ Lead
Telephone call
E-mail
Local Police Department Report
Guardian
*Assessment
*Assessment
.:. Priority
Priority
- 72
72 hours
hours
.:. Routine
Routine
- 60
60 days
days
CREATEAAWORKING
WORKINGFOLDER:
FOLDER:AsAs
youbegin
beginconducting
conductingan
aninvestigation
investigation
2. CREATE
you
the volume of information
information can be
be overwhelming.
overwhelming. A good working folder is vital
to maintaining and organizing this
this information
information as
as itit comes
comes in.
in. Although there are
no rules on what can be'maintained in a working folder, some examples of
information that should be included are:
~ Results of Data-Base Searches
>
~ Photos
Documentation (EC's,
(EC's, FD-542's,
FD-542's, FD-302's, Surveillance
Logs)
~ Copies of all Subpoenas /I National Security Letters
>
~ Information on Related Cases
>
ACLURM005537
50
UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
3. CONTACT
CONTACTCOMPLAINANT:
COMPLAINANT:(if
(ifappropriate)
appropriate)Although
Althoughthe
the original
original
3.
complaint should contain all necessary information, the reality is that this may
not always be
Ifthe
the original
original complaint
complaint is
is lacking necessary or sufficient
be the
the case.
case. If
information, now is the time to re-contact the complainant and "fill in the blanks".
blanks".
Examples of relevant information that may not have been included in the original
complaint are:
are:
~
>
~
>
~
>
~
D
~
D
~
D
(See your
your lTTF's
Investigative Check
Check
4. CONDUCT DATABASE CHECKS:
CHECKS: (See
JITF's Investigative
List,
List, if applicable) A Standard of Investigation is required to ensure that each and
The Standard
Standard of
of Investigation will vary,
every complaint is
is properly
properly investigated.
investigated. The
but may include approximately 25 investigative databases, and every Investigator
should utilize each and every database when applicable.
It should also be noted that this checklist (if applicable) is not all inclusive and
should be considered a minimum. Investigators should feel
feel free to incorporate
other relevant database checks that may not be included on their JTTF
Investigative Check List.
~
>
~
>
Include both positive and negative results within your working folder.
folder.
Although
5. DISCUSS COMPLAINT STATUS WITH SENIOR TFO/AGENT:
TFO/AGENT: Although
you may already have a good idea of the complaints case potential at this
this point,
you should discuss the results of the database checks with a Senior TFOI
Agent.
TFO/Agent.
This will provide an outside perspective, which can be invaluable, but will also
insure that you have not overlooked a tool or technique that could or should have
been utilized.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005538
51
51
a)
I-II-I-a)
UNCLASSIFIED/!FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Important Considerations when Discussing Complaint Status:
Status:
>
>
>
>
Detennine
Determine the validity of the complaint
Discuss additional tools or techniques that could be utilized at this
this stage
Detennine
Determine if the Subject of the complaint should be contacted arid
and
.
interviewed
Determine if the Lead or complaint is sufficiently covered
Detennine
Determine if a Preliminary Investigation or Full Field Investigation should
be initiated
*Ifit
*If it is determined that the Guardian lead is not sufficiently covered and that
further
further investigation is warranted,
warranted, continue
continue with
with "INVESTIGATIVE
"INVESTIGATIVE PLAN",
PLAN", step
6,
6, below.
4B
ED
>
>
>
Periodically,during
duringthe
thecourse
courseof
ofthe
theinvestigation,
investigation, brief
brief your Supervisor
> Periodically,
regarding the case status and direction.
direction.
0
0
UNCLASSIFIED/!FOR
OFFICIAL USE
UNCLASSINEDHFOR OFFICIAL
USE ONLY
ACLURM005539
52
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED/FOR
*Preliminary Investigation:
Standard - There is information or an allegation indicating that a threat to
National Security may exist.
"Legal
Authorized Techniques - A general summary is provided
provided in Tab
Tab 33-"Legal
Application". (See
(See Attorney
AttorneyGeneral
General Guidelines
Guidelinesfor
for complete
authorization)
Duration - Six months (with extensions granted under certain
circumstances)
Approval Authority - SSA
SSA grants
grants initial
initial opening.
opening . SAC may grant an
of one year
extension for
for an additional
additional six
six months.
months. Extensions in excess of
require FBI HQ approval.
it
'.
For study materials related to the Domestic Investigation and Operations Guide, see the
following link:
http://home.fbinet.fbilfonns/fdl028IDIOGIDIOGTrainingrTrainee%20Materiais/Fonns/AIIItems.aspx
http://horne.fbinetibi/forms/fd1028/DIOG/DIOGTraining/Trainee%20Materials/Forms/AILItems.aspx
ACLURM005540
5533
ACLURM005541
II
ID
GI
lb
UNCLASSIFIED//FOR
OFFICIAL USE ONLY
OfU.Y
UNCLASSIFIED/FOR OFFICIAL
A.
A.
Polygraph Matters:
Matters: Authority granted by the ASAC, unless unusual or special
circumstances exist, i.e. a request to polygraph a minor, etc, for which approval
would be granted by the SAC..
SAC.' For your Division polygrapher(s) see your contact
list or JTTF Coordinator
B.
Monitoring: Approval
Consensual (telephonic) Monitoring:
Approval granted
granted by
by ASAC.
ASAC. If sensitive
circumstances exist, as defined on from FD-759, approval will be granted
granted by the
SAC.
Consenting party must sign FD-472
1.
Obtain concurrence from your AUSA that recording is legal and no
2.
entrapment issues exist. Document same on an FD-320 (for CW's obtain
the authority prior to opening and gain concurrence for the duration of the
investigation)
3.
Draft FD-759 (now a macro)
macro) and forward
forward to
to ASAC
ASACfor
for authority.
authority. In the
the
event that consensual recording needs to take place
place immediately
immediately contact,
contact,
SSA and ask that he/she call
call the
the ASACfor
ASAC for verbal
verbal authority.
authority. Once verbal
authority is granted, document same on the original FD-759.
FD-759.
4.
Two Agents or an Agent and a TFOITFA
TFO/TFA must be present during the
recording.
recording.
Record a preamble on the tape (date, time, witnesses, number called and
5.
name of the subject called)
.
Record a post amble at the conclusion (time call ended, call not
6.
answered!answered! answering machine, etc)
answered/answered/
7.
Label
Label the tape
8.
tape to ELSUR
ELSUR within
within 10
10 days.
days. Use the FD-504(b) evidence
Must submit tapeto
envelope (1D
(ID evidence), fill it out and submit it to your ELSUR contact. If
a CW is utilized to place the call, hislher
his/her true name is listed on the subject
intercepted line along with the intended interceptee.
interceptee.
Document the consensual calion
9.
call on an
an FD-302.
FD-302. The FD-302 will essentially
be your debrief of the CW following the call (briefly include the pertinent
content), document that the call was a consensual recording and the tape
Remember that
that the tape is the evidence and the
submitted into evidence.
evidence. Remember
transcript is your guide for the jury to follow the conversation word for
word.
C.
c.
ACLURM005542
54
aa
a
UNCLASSIFIED//FOR
UNCLASSIFIED/IFOR OFFICIAL USE ONLY
Consensual monitoring
monito~ing outside of
of your division may be conducted only after prior
notification to and concurrence obtained from the SAC of each division where
monitoring will occur.
occur. You must document
document the
the concurrence.
concurrence. An AUSA
AUSA
advisement that the monitoring is legal and appropriate is necessary only in the
judicial district which
which encompasses the
the office
office of
of origin of
of the investigative case.
1.
Consenting party must sign FD-473 .
2.
Obtain concurrence
conCUrrence from your AUSA that recording is legal and no
entrapment issues exist. Document same on an FD-320 (for CW's obtain
conCUrrence for the duration of the
the authority prior to opening and gain concurrence
investigation) .
3.
Draft FD-759 (now a macro)
macro) and forward
forward to
to ASAC
ASAC for
for authority.
authority. In the
event that consensual recording needs to take place immediately contact
SSA and ask that he/she call the
the ASAC
ASAC for
for verbal
verbal authority.
authority. Once verbal
authority is granted, document same on the original FD-759.
4.
4.
Two Agents or an Agent and a TFO/TFA
TForrFA must be present during the
recording.
5.
5.
Record a preamble on the tape/digital recording device-F-bird, Eagle(date, time, witnesses, number called and name of the subject being
recorded)
6.
Record a post amble at the conclusion (time recording ended, etc)
Label the tape at the conclusion.
If using
using aa digital
digital recording device
7.
conclusion. If
download the recording onto a CD-ROM.
8.
Must submit tape andlor
and/or CD-ROM
CD-ROM to
to ELSUR
ELSUR within
within 10
10 days.
days. Use the
(lD evidence), fill it out
out and submit it to your
FD-504 evidence envelope (1D
CW isis aa recorded
recorded party,
party, use
use his/her
hislher true name on the
ELSUR contact. IfIfaa CW
subject intercepted line along with the intended interceptee.
9.
Document the consensual recording
recording on
on an
an FD-302.
FD-302. The FD-302 will
essentially be your debrief of the CW following the recording (brief,
include the pertinent content; who, when, where, what was discussed),
dQcument that the call was a consensual recording and the tape/CD-ROM
document
Remember that
that the
the tape/CD-ROM
tape/CD-ROM is the
submitted into evidence.
evidence. Remember
evidence and the transcript is your guide for the jury to follow the
conversation word for word.
ID
ID
a
a
ID
ID
II
ID
ID
ID
D.
E.
Closed Circuit Television (CCTV): All consensual CCTV authorization (FDFollow the
the procedure
procedure listed above in #2 and
759) will be approved by the ASAC.
ASAC. Follow
#3 for handling the evidence and documenting the recording.
F.
ID
ID
UNCLASSIFIEDIIFOR
OFEICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL
ACLURM005543
55
1\:
a
a
a
a
aa
a
2.
Agent.
See your
your contact
contact list
list or
or JTTF
JTTF Coordinator
Coordinator regarding these
Agent. See
Afteryou
you complete
complete the
the request,
request, the
the form
form will automatically
submissions. After
be generated and forwarded the tech agents so they can make their
preparations. Route the original to the CDC and SAC for signature (noted
Retain aa copy for your file.
on the bottom of the
the FD-871).
FD-871). Retain
file.
Do a site survey for the Tech Agents.
Relay any
any safety issues and
Agents. Relay
counter-surveillance concerns associated with your subject.
sUbject.
G.
G.
Group II UCO:
UCO: Will be reviewed by the Division Undercover Review
Committee and signed
Signed by the Division UC Coordinator, CDC, and the appropriate
approval.
ASAC prior to submission to the SAC for approval.
H.
H.
1.
I.
J.
J.
K.
K.
Mail Cover:
Cover: Approval is with the SAC or in his/her
hislher absence, the Acting SAC.
SAC.
(Review Ponies for Mail Cover)
L.
L.
a
a
302).
Following the transaction, the receipt must be returned and filed (consult
your JTTF Coordinator or SSA for
for division-specific
division-specific procedures).
procedures). Keep
Keep a
copy of the receipt for your records.
records.
ACLURM005544
56
ID
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
4.
5.
ID
6.
7.
0
ii
ID
8.
8.
ID
9.
1I
II
IMake
IM
ak esure
surethe
thedata
dataisiscaptured
captured by
by your
your pen
1
.
an FD-302.
register and
document
register and document
same
in same
an in
FD-302.
ID.
M.
Title III
III Electronic
ElectronicSurveillance
Surveillance(Non-Sensitive):
(Non-Sensitive): Approval
Approvalwill
will be
be granted
granted by
the SAC (via EC)
EC) or in
in hislher
his/her absence,
absence, the
the Acting
Acting SAC.
SAC. The authority cannot be
delegated lower that an ASAC serving as Acting SAC.
1.
1.
Pen Register(s) should be up and running unless you are requesting
emergency authority.
Analyze the
the raw data routinely; use the
authority. Analyze
information to identify individuals possibly involved in the specified
illegal activity.
.
2.
2.
Before you draft an Affidavit, make sure that you have exhausted all other
investigative techniques
techniques and have
have specific
specific examples
examples of
of why
why aa Title
Title ill
Ill is
the only technique that
will
meet
your
investigative
goals.
Make
a
copy
of
that will meet your investigative goals.
an FD-699 (Title ill
Checklist)
IlI
3.
Draft EC seeking approval from your SAC (See pony).
3.
4.
Draft Affidavit (See pony).
Make sure
sure that your
your AUSA is on board and
4.
pony). Make
the United States Attorney's Office supports the technique.
5.
Tech Request (FD-871).
Follow the
the same
same procedure for getting the
5.
(FD-871). Follow
request form to the Tech Agent..
.
6.
EC requesting Pre Title ill
ELSUR
checks
(See
pony).
Make
sure that all
6.
III ELSUR checks (See pony).
target telephone numbers, target subscriber addresses, ESN'S, etc., as well
as Named Interceptees
Interceptees are
are checked
checked through
through the
the databases.
databases. Remember that
the ELSUR checks are only good for 45 days.
days. Do not do them too early in
the process and do not do them to late, DEA and BICE have a 5 day
window to conduct the searches.
7.
When your Affidavit is complete, provide a copy to your SSA, the CDC
7.
Make appropriate
appropriate changes,
changes, additions
additions and/or
andlor.,
and your AUSA for review.
review. Make
deletions as needed to your Affidavit.
Affidavit. The AUSA will draft the
Application and Order (send copies of the drafts
drafts to your CDC, for ELSUR
ELSUR
purposes)
purposes)..
8.
8.
When the Affidavit, Application, and Order have been reviewed and
approved by
by the
the CDC
CDC and
and AUSA,
AUSA, they
theywill
willbe
beforwarded
forwardedtotoOEO
0E0 for the
When approved,
approved, an
an Action Memo will be drafted and
next approval.
approval. When
Make sure
sure your
your Tech Agent knows where you are in the
approval granted.
granted. Make
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ID
ID
ACLURM005545
57
57
b7E
II:
UNCLASSIFlEDllFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
9.
process and the appropriate equipment has been installed before you have
the Order signed by the Judge.
ope.ned.
Draft an EC requesting that appropriate subfiles are opened.
a.
a.
b.
b.
c.
c.
d.
d.
10.
11.
12.
N.
O.
0
. ELA---ELSUR Administrative
-ELA---ELSUR
ELl----ELSUR Original Log
EL1----ELSUR
ELlA--ELSUR Copies of Log
EL1A--ELSUR
ELlB~-ELSUR Transcripts
EL1B--ELSUR
Set up
up aa meeting with all
AUSA will draft Minimization Instructions.
Instructions. Set
monitors, AUSA, SSRAISSA,
SSRA/SSA, and Case
Case Agent.
Agent. Everyone must read the
Go over
over minimization
minimization instructions and
Affidavit, Application and Order.
Order. Go
everyone will sign a copy of a log documenting same.
Application, Order, Mfidavit
Affidavit to Federal.Judge
Federal-Judge for
for signature.
signature. Make sure
copies make their way to the substantive file, Tech Agents, ELSUR, etc.
tapes/CD's at the
AUSA will
will draft
draft a Sealing
Seal tapes/CD's
the conclusion
conclusion of
of Title
Titlem.
DI AUSA
Order and you, the AUSA, and the original tapes/CDs will go to the Judge
Make sure
sure the
the original
original evidence is submitted
for sealing of the evidence. Make
Make sure
sure aa copy
copy of
of the
the Sealing Order makes
to ELSUR within 10 days.
days. Make
its way to the appropriate sub-file.
IL."
ACLURM005546
b7E
58
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
5.
5.
b7E
6.
6.
P.
1.
~------------------------~
Initiate the
the FISA
FISA process
process through
throughthe!L..
th4 _ _ _ _ _....IIDuring
'During this process,
you rna
eet the following
. tasks:
may ex
expect
b7E
.b7E
a.
a.
b.
b.
c.
c.
d.
d.
e.
e.
of these steps.
*Expect a two or more month lead-time in the completion
steps.
\
.
2.
When the Application and Order make it through the gauntlet, fill out a
Woods Form.
When the
the appropriate
appropriate checks have been conducted secure
Form. When
fax the document to FBIHQ.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005547
59
I~.:
'.
aa
aa
a
a
a
a
a
S
a
S
a
UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
3,
3.
FBllIQ will usually send supplemental orders to the division where the'
1-BIHQ
the
service provider is located. Make sure that copies make it to the
substantive file and your Tech
Tech Agent.
Agent. The Tech Agent should ensure that
the appropriate personnel get an unclassified document requesting that
they upload the raw data into Telephone Applications.
Applications.
4.
4.
Open a subfile for your pen register raw data (See the Pen Register
summary).
a.
UNCLASSIFlEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005548
60
60
S
S
S
S
S
S
S
S
S
S
S
SS
SS
SS
S
SS
SS
SS
SS
.'
ACLURM005549
UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/5'0R OFFICIAL
Intelligence Community
c.,tepeedentAgeek,
Central
IntelOgences
Agency Defense
Department
Intelligence
of Slate
Agency
oN
:Cit
,:
no.rtiTont
en
r
Ir
it pepoement
Ir
pith
Treasury
' fcckessi
knew of
nvensfeation
Director
of Central
Intelligent* (DCI)
An
Intelligence
. .
DOCl/ naknol
Community !mergence
Monager Coma
rhea
Mtn7
Infelliganas
'" Naaenci
Ah Force
cconnaissonce
lenslagence
Offko
/Nizeonol
Marino
/ rmagner
Coeps
/ond nieppmg
Intol4gonto
Agcncy
O
PURPOSE
As a result of
of 09/11/2001,
09/1112001, the FBI has massively intensified its intelligence
dissemination effort.
The FBI
FBI has
has historically
historically limited its intelligence sharing through
effort. The
established Intelligence Information Reporting channels normally used by
IS-member
by the 15-member
United States Intelligence Community
Community (USIC).
(USIC). As the leading domestic criminal,
counterintelligence and counterterrorism agency, the FBI has adapted its reporting to
facilitate the rapid dissemination of
of its raw intelligence. The Intelligence Information
Report (IIR) is the primary vehicle for this dissemination.
dissemination.
The IIR is the standard through which all"raw"
all "raw" or unevaluated intelligence
information is shared with national policy makers, the USIC and law enforcement
of national intelligence priorities and the needs
community in support of
needs of law enforcement
consumers. These
These reports
reports are
are primarily
primarily used
used by analysts and agents, along with other
available sources, to identify threats or trends, and produce finished intelligence products
for consumers. As
As aa result
result of
ofthis
this reporting
reporting and eventual analysis, national strategies and
action may be affected.
A significant benefit to analysts and agents using the IIR as
as a dissemination tool
tool is
the ability to protect the source of
of the information while providing essential
essential raw
intelligence. This
This information
infonnation sharing
sharing will
will also
also enhance the FBI's collection efforts and
support the war on terrorism in accordance with national directives:
directives:
UNCLASSIFIEDIIFOR
Y
UNCLASSIFIED//FOR OFFICIAL USEONL
USE ONLY
ACLURM005550
61
61
I.
'.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
It is the responsibility of
of the FBI.
FBI to share terrorism intelligence and it is
mandated by the National Security Act of
of 1947, Executive Order 12333,
USA Patriot
12333, the USA
Act, the Homeland
Security Act of
of 2002,
2002, and the Attorney General's Guidelines for
for FB1
FBI National
National Security
Security
Investigations and Foreign Intelligence Collection.
Collection.
r
Historically, counterintelligence and counterterrorism asset reporting primarily
fueled the IIR process.
However, criminal
criminal and
and cyber source reporting is now being
process. However,
incorporated to broadly share information across all FBI investigative program lines.
lines.
Intelligence harvested through investigative techniques such as Foreign Intelligence
Surveillance Act (FISA) and Title III overhears, consensual monitoring, physical
. surveillance, as well as other sophisticated techniques, can also
also be the
the basis for
for raw
intelligence disseminated through IIRs.
IIRs.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005551
.62
I)
I)
'.'.
I.
I.
lb
ID
ID
ID
ID
Officers identifying information suitable for IIR dissemination should follow the below
listed protocol.
PROTOCOL
1. All agents should review every document 13,
~roducefor
1.
1 1 roduce for intelligence value and
and
th~ information to the LJfor
consider submitting the
for review.
2.
(E
2. All agents should forward documents (E<fs-E11-71s,
-71s, FD 302s, FD 542s) they
believe have IIR potential to their divisi0rL...Pr
divisio4
r JTTF IA.
thLJupervisor
must be
be contacted
contacted by
by phone if
if the data
3. The IIR Manager or thl
3.
.upervisor must
contains specific threat information which must be reported within two hours
the information
information contains
contains specific
specific threat data, both the
(IMMEDIATE IIR). IfIfthe
reporting agent and their supervisor must remain available until the report has
been received at FBIHQ and then either published or rejected by FBIHQ.
b7E
thUm
4. While
While theIjwill prepare
prepare
IIRs,
assessmentsand
andbulletins
bulletinsusing
usingthe
the intelligence
intelligence
4.
IIRs,
assessments
and supervisor is still responsible for preparing Urgent
you provide, each agent and
(if necessary) and contacting other divisions, squads, Legats, or agencies
Reports (if
persorinel regarding the information;
to alert appropriate personnel
information.
5. The IIR Manager
Manager will review the HR
IIR material and determine which program it
5.
The IIR
IIR will
will then be assigned to an
addresses (CT, FCI, CRIM, or Cyber).
Cyber). The
Analyst(IA)
Intelligence Analyst
(IA) for action in accordance with division protocols.
6. The.
The IA
6.
IA will
will draft
draft an
an IIR
IIR on-line,
on-line, using
using the
the FBI
FBI Intelligence
Intelligence Information Report
Dissemination System (FIDs) and examine the IIR for content, format, and
of US
The IA
IA will
will also redact names of
compliance with FBIHQ procedures.
procedures. The
Persons, ensure sources and methods are protected, and correlate the reported
information with the FBI's !ntelligence
Intelligence Requirements.
TheIA
IAwill
wille-mail
e-mailaaPDF
PDFversion
versionof
ofthe
the Draft
Draft IIR
IIR to
to the
the agent
agent and the squad
7. The
message:
supervisor, with the following message:
ID
Aspart
partofofthe
thereview
reviewand
andapproval
approvalprocess,
process, itit isis the
the agent's
agent's responsibility to:
8. As
to:
a. Ensure that information in the IIR will not jeopardize any sources or
a.
methods or adversely affect an ongoing case.
b. Have his supervisor review and approve the IIR, or recommend changes.
b.
ID
Theagent
agentcan
caneither
eitheraccept
acceptthe
the draft
draft or
or request
request changes.
changes~ Any
Any changes
changes to the IIR
9. The
Corrections should be addressed
must be coordinated with the squad supervisor.
supervisor. Corrections
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR
ACLURM005552
63
e-maiTfo~~t
no corrections
corrections are
are needed,
needed, paragraph 11 applies.
in an e-mail
format to the IA.
IA. IfIfno
10. If
If corrections are requested, the IA will make the corrections and e-mail a
of the
t.he IIR to the agent and supervisor for approval.
corrected copy of
ID
lb
11. The agent and squad supervisor should e-mail the IA once the IIR is approved.
An IIR will not be submitted to FBIHQ without the agent's and supervisor's
Inexigent
exigentcircumstances,
circumstances, verbal
verbal approvals
approvals are
are acceptable,
acceptable, but must be
approval. In
followed up with a confirmation e-mail.
Through FIDS,
FIDS, the
the IA
IA will
will forward
forward the
the approved
approvedcopy
copyto
tothcl
thDsupervisor,
12. Through
'supervisor, who
will be the final approval authority in the Division for ROUTINE and PRIORITY
IMMEDIATE IIRs
IIRs must
must be
be approved
approved by
by an ASAC.
IIRs. IMMEDIATE
SI
13. The IIR will then be transmitted to the appropriate FBIHQ component, using
FIDS. After
Afterforwarding
forwarding the
the IIR
IIRfor
for approval
approval in
in FIDS,
FIDS, the
the IA
IA will
will e-mail
e-mail the agent
the final copy of
of the IIR, in a text format for uploading into ACS.
14. The agent should then save the renamed text version final IIR to his draft folder.
15.
15. The agent will print copies (one copy for each file referenced in the admin portion
of the IIR,
HR, and one copy for indexing of
of the IIR), have his supervisor initial the
of
bottom of
of the IIR, and forward the IIR to his SST for uploading.
16.
If an IIR was produced with information provided by a source or asset, one copy
16. If
of the IIR should be blind copied to the source or asset main file only, not the subof
copy of
ofthe
the IIR
IIR should
should also
also be
be e-mailed
e~mailed to either
either the blue or green file.
A. AA copy
file.
..
17.
17. The agent should claim a Statistical Accomplishment using the FD-542, and FDif the information within the IIR was obtained by a Source.
209 if
lb
ofIIRs
****
* * Further guidance on the production and dissemination of
IIRs can be found by
Domain and
and Collection
CollectionManagement
ManagementBranch*
Branch~
searching the
the Directorate
Directorateofoflntelligence~
searching
Intelligence> Domain
Reports Section on FBInet, or by consulting your FIG.
ONLY'
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
UNCLASSIFIED//FOR
..
ACLURM005553
64
b7E
11
e.
ACLURM005554
)1.
ID
ID
411
... orby
by doing
doing an
an Intranet
Intranet search
search for
for "ponies".
"ponies".
...or
*IMPORTANT: Please do not alter original Ponies or Resource documents,
inthe
thecommon
common (S:)
(S:) drive,
drive, as
as this
this will
will make
make them unusable to other
contained in
Before making any changes, you must first re-save the document to your
personnel. Before
personal folder, under a different name.
EC (Electronic Communications):
Preliminary Investigation
~ Opening Preliminary Investigation
~ Extension of
of a Preliminary Investigation
~ Annual Summary
Criminal Case
~ Opening Criminal Case
Leads
~
Evidence
~
Destruction of Evidence
Explanation for Late Submission of Evidence
Return of Evidence
OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL
ACLURM005555
65
I
I
Title III
ill
Request Assistance
>- Request CART Assistance
Asset
>
>
>
>>
Approval
Cover
ITTF-TFO
JTTF-TFO Authorization
Opening
Undisclosed Participation
Miscellaneous
FD-542:
Surveillance
b7E
ACLURM005556
66
I-.
I-
'a Member
Member of
of aa WMD
WMD Working
Working Grouprrask
Group/Task Force
Miscellaneous
~ Dissemination of information
~ LEA Liaison
FD-302:
FD-302:
Miscellaneous
~
> Receiving Evidence
~
> Receiving Subpoena Results
~ Conducting Interview
~ Conducting Surveillance
~ Making an Arrest
~ ArrestLog
Arrest Log
ACLURM005557
67
67
11111111111111111111111 11111111111111111111
UNCLASSlFIED//FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
A Checklist
> ECP
ECPA
Toll EC
.
FCRA Checklist .
Experian NSL
FCRA Financial Institutions
FCRA Checklist
> Credit (a) EC
> Experian Ee
EC
RFP
A Financial Records
RFPA
RFPA Checklist
>
BankEC
Bank EC
> BankNSL
Bank NSL
Miscellaneous Forms:
Forms:
Search Warrant
ACLURM005558
68
68
lb
:.
;.
ie
0
I
:.
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED//FOR
~
>~
Warrant
Seizure Warrant
~ Seizure
Seizure Warrant Cover
~ Seizure
SeizureWarrant
WarrantAffidavit
Affidavit
D
~ Seizure
SeizureWarrant
WarrantApplication
Application
D
Surveillance
SOG Request Form
>~ SOG
>~ Surveillance Log
ie
FISA .. ,.,..
~ FISA Request Form PRTT
>~ FISA Request Form
i-
Title ill
IR
~ ECTIII
ECTill Approval
~ TM
Till Affidavit
!.
:.!.
I
a
a
a
I.
I/
41
ea
Miscellaneous
~ ECPRTT Authority
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
ACLURM005559
69
. 69
UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
~ Translation
Translation Request
Request Form
Form (TRF)
(IRF)
~ Woods
Woods form
form
Subpoenas
Subpoenas
~ Airlines
Airlines
~ Automobile
Automobile Dealerships
Dealerships
~ Bail
Bail Bond
Bond companies
companies
.~ Bank
Bank ACcount
AG'count Information
~ Bank
Bank Comprehensive
Comprehensive
~ Bank
Bank Financial
Financial Records
Records
~ Bank
Bank General Records
~ Casinos
~ Corporation-Detailed
~ Corporation
COrporation General
-
~ Credit Bureau
~ Credit
Credit Card Records
~ Escrow Company
~ Hotel Records
~ Insurance Companies
~ Retail
Retail Stores
Stores .
~ Securities Broker
~ Telephone Company-Cellular
~ Telephone Company-General
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
ACLURM005560
70
70
ED
ID
a
a
18 U.S.C. 35
18 U.S.C. 37
18 U.S.C. 43
18 U.S.C. 115
18 U.S.C. 175
175 -178
178
CHEMICAL WEAPONS
210l'
18 U.S.C. 231, 21012
'.
a
a
4111
18 U.S.C. 241'
2413
18 U.S.C. 245
24544
18 U.S.C. 2475
247'
fi
18 U.S.C. 248
2486
CONSPIRACY
18 U.S.C. 373
The statutes listed are those involving crimes frequently committed by terrorists.
2 Attorney
Attorney General
General approval
approval isis required
required to
to conduct
conduct investigations
investigations under these violations, see MIOG, Part I,
section 157 et seq.
3
3
Although a violation of this statute is generally investigated as a civil rights crime, if the group
committing the offense does so to intimidate or coerce the government or civilian population in furtherance
of political or social objectives, the violation may be considered an act of terrorism.
[d.
4 Id.
[d.
55 Id.
66 [d.
Id
ACLURM005561
71
71
I.
OFTHE
THE STATE
STATE AND
AND PRIVATE
PRIVATE ENTITIES
SECURITIESOF
SECURIIMS
18 U.S.C. 514
FICTITIOUS OBLIGATIONS
18 U.S.C. 641
18
64177
EMBEZZLE.
STEAL. SELL OR CONVERT PUBLIC MONEY, PROPERTY
EMBEZZLE, STEAL,
OR RECORDS OF THE UNITED STATES OR ANY DEPARTMENT OR
AGENCY
PROHIBITED TRANSACTIONS INVOLVING
lNVOLVING NUCLEAR MATERIALS
18 U.S.C. 831
831
8
18 U.S.C.
U.S.C. 832
832
8449
18 U.S.C.
U.S.C. 8449
930 10
18 U.S.C. 921 -_ 93010
ACTIVITY; FIREARMS
UNLAWFUL ACTIVITY:
NEUTRALITY
U.S.c. 1001
18 U.S.C.
18 U.S.C. 1014
18 U.S.C. 842(p)
11
18 U.S.C. 1028
102811
7See
Alberico, 604
604F.2d
F.2d1315
1315 (10th
(lOth Cir.
Cir. 1979)
1979) (defendant
(defendant was
was a United States Army
7 See e.g., United States v. Alberico
of plastic explosives from an Army arsenal, sold them to individuals he
Captain, who stole large quantities of
crimin~ls, and would use these explosives in acts of
of terrorism).
believed to be criminals,
8 This criminal violation
violation was
was enacted by the
the Intelligence Reform And Terrorism Prevention Act of 2004.
2004, Pub. L.
No. 108-458,
108458, 118
118 Stat. 3638 (2004).
9 Although
Although the
the FBI
FBIhas
hasconcurrent
concurrentjurisdiction
jurisdiction with
with the
the Bureau
Bureau of
ofAlcohol
Alcohol Tobacco & Firearms and the Postal
by virtue
virtue of
ofJurisdictional
Jurisdictional Guidelines
Guidelines- published
published in the United States
Inspection Service under this section, by
1973 for the FBI,
FBI. ATF,
AU, and
and Postal
Postal Inspection
Inspection Service
Service which became effective
Bulletin on
on April
April 13,
13, 1973
Attorney's Bulletin
March 1,
1, 1973
1973 (commonly
(commonly referred
referred to
to as
as the
the April 13,
13, 1973
1973 MOU) - the FBI will exercise primary jurisdiction
aIJ alleged violations
violations of
ofsection
section844
844 which
which appear
appear at
at the
the outset
outset to
to have
have been perpetrated by
over all
terrorist/revolutionary groups or individuals.
The FBI
FBI also
also is
is given
given primary
primary jurisdiction over several other 844
individuals. The
violations even without a terrorism nexus, e.g., offenses involving possession of explosives in buildings owned,
aIJeged offenses directed against foreign diplomatic facilities; and alleged
leased. used, etc., by the United States; alleged
leased,
offenses against colleges and universities.
10
242. Opinion of the Office of Legal Counsel, U.S. Department of Justice.
H3 See 20 U.S. Op. OLC 242,
Justice, FBI
INVESTIGATE VIOLATIONS OF
OF SUBTITLE
SUBTITLE E
E OF
OF "ITILE
TITLE 26 OR 18 U.S.C. SECTIONS
AUTHORITY TO INVESTIGATE
1996 (finding where the FBI has a reasonable expectation that if an investigation involves a
921-930, June 21, 1996
crime of terrorism over which a statute or Presidential Decision Directive 39 [issued June 21, 1995, but has since
been superseded by a National Security Presidential Directive] has granted primary responsibility to the'FBI, the
FBI's lead role may be extended to cover crimes as to which lead responsibility would otherwise reside
elsewhere).
II Under
Underthe
theFRAID
FRAIDStatute
Statute(18,
(18,USC,
USC, 1028),
I028),j~risdiction
has been
been divided
divided by
by the
the DOJ
DOJ between
between the FBI, U.S.
jurisdiction has
defrauded or investigating Federal agency, if
if said agency has civilian criminal investigative
Secret Service or the defrauded
MlOG Part I, sections 253-2.3 & 253-2.4 Q!
authority or a Statutory Inspector General, see MIOG
or MOU between FBI
of 1984,
1984, dated September 15, 1989.
and U.S. Secret Service Pursuant to the Comprehensive Crime Control Act of
ACLURM005562
72
,.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
18 U.S.C. 102912
102912
U.s.C. 103013
10301~
18 U.S.C.
1038"
18 U.S.C. 103814
18 U.S.C. 1074
15
18 U.S.C. 1091
109115
18 U.S.C. 1117
CONSPIRACY TO MURDER
18 U.S.C. 1119
18
18 U.S.C. 1201
KIDNAPPING
KIDNAPPING
120316
18 U.S.C. 120316
18 U.S.C. 1341
18 U.S.C. 1343
18 U.S.C. 1344
BANK FRAUD
U;S.C. 1361
18 U.S.C.
1361
GOVERNMENT
CONTRACTS
GOVERNMENT PROPERTY'OR
PROPERTYOR CONTRACTS
18 U.S.C. 1362
COMMUNICATION LINES,
LINES, STATIONS
STATIONS OR
OR SYSTEMS
SYSTEMS
18 U.S.C. 1363
. 18
18U.S.C.
U.S.C. 1364
18 U.S.C:
U.S.C, 1365
18 U.S.C. 1366
18 U.S.C. 1367
18 U.S.C. 1521
RETALIATING
RETALIATING AGAINST
AGAINST A
A FEDERAL
FEDERAL JUDGE
RIDGE OR FEDERAL
FEDERAL LAW
..,.,,..,""' (IPPIT'PR RV
I!>. T <::~
Tl\iI ()P
<::T I!>.
NTYPP ()j:;
TITT j:;
PINTMRCFMFMT
RV ~
FAT
cP rT
CT I!>.ATM
np CT
ANTIPP
Or TTTT
P
See MOU between FBI and U.S. Secret Service Pursuant to the Comprehensive Crime Control
12 See
Control Act of
seq., for
1984, dated September 15, 1989, Q!
or MIOG, Part I, section 258 -1
-1 et seq.,
for investigative jurisdiction
jurisdiction
relating t()
to this statute.
See MOU between FBI and U.S. Secret Service Pursuant to the Comprehensive
13 See
Comprehensive Crime Control
Control Act
Act of
1984, dated September 15, 1989, for investigative jurisdiction
jurisdiction relating to this statute.
statute.
Thiscriminal
criminal violation
violationwas
was enacted
enacted by
by the
the Intelligence
Intelligence Reform
Reform and Terrorism Prevention
Preventi()n Act of 2004,
14 This
2004,
Pub. L. No. 108-458, 118 Stat. 3638 (2004).
(2004).
IS The
TheUnited
United States
States Attorneys'
Attorneys' Manual,
Manual, 9-2.136,
9-2.136, Investigative
Investigative and
and Prosecutive
Prosecutive Policy for International
13
Terrorism Matters (September 1997 Edition), recognizes genocide as an
an international
international terrorism offense.
offense.
See also National Security Presidential Directive - 12, UNITED STATES CITIZENS
16 See
CITIZENS TAKEN
TAKEN
HOSTAGE ABROAD, dated February 18,
18,2002,
..
2002, which outlines the FBI's
FBI's responsibilities
responsibilities..
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005563
73
73
a
a
I
I
I
18 U.S.C. 1951
18 U.S.C.
U.S.C. 1952
1952 .'
18 U.S.C. 1956
18 U.S.C. 1959
U.s.C. 1960
18 U.S.C.
PROHIBITION
OFILLEGAL
ILLEGALMONEY
MONEYTRANSMITTING
TRANSMITTING BUSINESSES
BUSlNESSES
PROHIBMON OF
18 U.S.C. 1962
18 U.S.C. 1991
18 U.S.C. 1992
TERRORIST ATTACKS
ATIACKS AND OTHER VIOLENCE AGAINST MASS
TRANSPORTATION SYSTEMS ON LAND,
LAND,ON
ON WATER, OR THROUGH
THE AIR
SABOTAGE
18 U.S.C. 1957
18 U.S.C. 2151
2151 et
et seq.
18 U.S.C. 2237
18 U.S.C. 2261A
18 U.S.C. 2284
18 U.S.C. 2291
2291
18 U.S.C. 2292
18 U.S.C. 2332
18 U.S.C. 2332a
18
U.S.C. ,
2332b
18U.S.C.
,2332b
18 U.S.C. 2332d"
2332d17
FINANCIAL TRANSACTIONS
l5
18 U.S.C. 2332f
2332f'5
I
I
a
I
I
18 U.S.C. 2283
18 U.S.C.
U.S.C. 2332gl~
2332g"
I
TheFBI
FBIhas
has concurrent
concurrentjurisdiction
jurisdiction with
with the
the Department
Department of
of Treasury, and Customs, see United States
17 The
Manual, 9-4.000
9-4.000 -- Statutes
Statutes Assigned by Citation.
Attorneys' Manual,
IBSeesupra
IgSee supra note 14.
ACLURM005564
74 ,
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
2U
18 U.S.C. 2332h
2332h2
18 U.S.C. 2339~1
233921
18 U.S.C. 2339A
18 U.S.C. 23398
2339B
22
18 U.S.C. 2339C
2339C22
23
18 U.S.C. 2339D
2339D23
18 U.S.C. 2340A
RECEIVING MlLITARY
MILITARY TYPE TRAINING FROM A FOREIGN
TERRORIST ORGANIZATION
ORGANlZATION
TORTURE
U.s.C. 2381
18 U.S.C.
2381 et
et seq.
18 U.S.C. 2441
2441
WAR CRIMES
18 U.S.C. 3286""
328624 .
21 U
.S.C. 846
U.S.C.
21 U.S.C. 863
DRUG PARAPHERNALIA
21 U.S.C. 960a
22 U.S.C. 611
611 - 621
621
22 U.S.C. 2712~
271225
22 U.S.C. 2778
26 U.S.C.
U.S.C. subtit.
subtit. E, ch. 53'b
5326
19This
19
This criminal violation was enacted by the Intelligence Refonn
Reform and
and Terrorism
Terrorism Prevention
Prevention Act of 2004,
2004,
108-458,118
Pub. L.
L. No. 108-458,
118 Stat. 3638 (2004)
20
20
!d.
Id.
21 This
This criminal
criminal violation
violation was
was enacted
enacted by
by the
the USA PATRIOT Act,
21
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, 115 Stat. 272
(2001).
2?
22 This criminal violation was enacted by the Suppression of the Financing of Terrorism Convention
Implementation Act of 2002, Pub. L. No. 107-197, 116 Stat. 724 (2002).
(2002).
23.
23
As amended
amended by
bythe
theUSA
USAPATRIOT
PATRIOTAct,
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, Title VIII, 809(a),
809(a). 115 Stat. 272, 379As
380 (2001) (provided no statute of
of limitation for certain terrorism offenses; and expressly provided that
"[t]he amendments made
made by
by this
this section
section shall apply to the prosecution of any offense committed
"[t]he
committed before, on,
on,
or after the date of the enactment of this section
section [October 26,
26, 2001]."
2001]."
24
. 2522,
"[t]he Attorney General and
2522, U.S.C. 2712(f)(2), which pertains to investigations, states, "Mlle
and the Secretary
shaH have authority to investigate violations of regulations
of Treasury shall
regulations under this
this section."
section."
26See
26See supra note 10.
ACLURM005565
75
75
I.
UNCLASSIFIED//FOR
UNCLASSIFIEDlfFOR OFFICIAL USE ONLY
U.S.C. 533227
5332z7
31 U.S.C.
42 U.S.C. 2011
2011-- 2284
49 U.S.C. 46314
49 U.S.C. 60123(b)
49 U.S.C. 80501
80501
28 U.S.C. 538
U.S.c. 552a(e)(7)
5 U.S.C.
3414(S)(A)U
12 U.S.C. 3414(5)(A)28
FlNANCIAL
FINANCIAL INSTITUTIONS.SHALL COMPLY WITH FBI REQUEST FOR A
FlNANCIAL RECORDS.
CUSTOMER'S OR ENTITY'S FINANCIAL
15 U.S.C. 1681b(b)(4)
U.S.C. 1681u29
1681u29
15 U.S.C.
S
S
'.
S
S
Thiscriminal
criminalviolation
violationwas
was enacted
enacted by
by the
the USA
USA PATRIOT
PATRIOT Act,
Act, Pub.
Pub. L. No.
27 This
107-56,115
107-56,
115 Stat. 272 (2001).
Asamended
amended by
by the
theUSA
USA PATRIOT
PATRIOTAct,
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, Title
Title III,
III, 358(f)(2),
35&(f)(2), Title V,
28 As
29
29
Director's designee
designee must certify that written request for information is sought for the cbnduct
The FBI Director or Director's
conduct of
an authorized investigation to protect against international terrorism or clandestine intelligence activities.
S
ACLURM005566
76
76
26 U.S.C. 6103(i)(2)
26 U.S.C. 6t03(i)(3)
6103(i)(3)
26 U.S.C. 6103(i)(7)
.28
28 U.S.C. 530C(a)(S)
530C(a)(5)
31 U.S.C. 5318(g)(4)(B)
.
42 U.S.C. 5197g
'
3Z
50 U.S.C. 402a
402a32
403-5a~~
50 U.S.C. 403-5a33
30
31The
31
The "Attorney General exemption"
This statute
statuterequires
requires that
that the
the head
head of
ofeach
each department
department or
or agency
agency within
within the executive branch to advise the FBI
32 This
. immediately of
of any information which indicates that classified information is being, or may have been, disclosed in an
unauthorized manner to a foreign agent or an agent of a foreign power.
33 Elements
Elements of
ofthe
theintelligence
intelligencecommunity
community may,
may. upon
upon request
request of
of aa United
United States
States law
UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED//FOR 01-.FICIAL
ACLURM005567
77
77
so U.S.C. 43634
43634
50
SO U.S.C. 1802
50
SO U.S.C. 1822
50
SO U.S.C. 1842
50
SO U.S.C. 1861
50
SO U.S.C. 1881a
50
SO U.S.C. 1881b
50
50 U.S.C. 188Ie
1881c
SO U.S.C. 1881d
50
38235
10 U.S.C. 38235
10 U.S.C. 256436
2564J6
"4 Any
Any authorized
authorized investigative
investigativeagency
agency may
may request
request from
from any
any financial
financial agency,
agency, financial
financial institution, or holding company, or from any
"
consumer reporting agency,
agency. such financial
financial records,
records. other financial information,
infonnation. and consumer
COnsumer reports as may be necessary in order to
investigation. counterintelligence inquiry,
inquiry. or security determination.
conduct any authorized law enforcement investigation,
Thisstatute
stalute provides
provides that
thaI "[Ole
"[l]he Secretary
Secretary of Defense.
Attorney General,
General,may
may provide
provide assistance
assistance in support
This
Defense,upon
upon request
request of the Attorney
175 [biological weapons)
. chemical weapons)
of Justice activities relating to the enforcement of section 175
of Department of
weapons] and [229
[229 et seq
seq.,
weapons]
18 during an emergency situation involving a biological or chemical weapon
of title 18
weapon of mass destruction."
destruction."
,S
35
36 This
Thisstatute
statuteprovides
providesthat
that"(alt
"[a)tthe
therequest
requestof
ofaaFederal,
Federal. State,
State. or
or local
local government
government agency responsible for providing law
36
security services,
services. or
or safety services,
services. the Secretary of Defense or the commander of a military
enforcement services, security
military installation
installation or
or
of Defense or the commander of a specified or unified combatant command
of the Department of
other facility of
command to
to provide assistance
assistance for
Soccer Games,
Games. the
the Goodwill
Goodwill Games,
Games. the Olympics,
Olympics. and any other civilian sporting event in support of essential
the World Cup Soccer
safely at
at such
such event,
event. but
bUlonly
Attorney General certifies that
thaI such assistance is necessary to meet essential security
security and safety
only ifif the Attorney
and safety needs." See also MOU Between the Department of Justice and the Department of Defense Concerning Support for Security
(dated(dated
February
10, 199B),
and8 DoD
Directive
2000.15,
"Support
totoSpecial
for
Sporting
Events
forCivilian
Civilian
Sporting
Events
February
10, 199
) , and
DoD Directive
2000.15,
"Support
Special
Events,
datedNovember
November 21,
1994.
Events," dated
21, 1994.
ACLURM005568
78
78
18 U.S.C. 981(a)(I)(G)
981(a)(1)(G) &
&
(H)37
(H)37
28 C.F.R. 8.23S
8.238
CIVIL FORFEITURE
DESIGNATION OF
OF FBI
FBI OFFICIALS
OFFICIALS HAVING.
HAVING SEIZURE AUTIIORlTY
AUTHORITY IN
FORFEITURE MATTERS
U.S.C;. 2516
18 U.S.C.
18 U.S.C. 2709
COUNTERlNTELLIGENCE
COUNTERINTELLIGENCE ACCESS TO TELEPHONE TOLL AND
TRANSACTIONAL RECORDS
"RELEVANT TO AN
RECORDS THAT ARE ''RELEVANT
AUTHORlZED INVESTIGATION TO PROTECT AGAINST
AUTHORIZED
INTERNATIONAL TERRORISM
TERRORlSM OR CLANDESTINE INTELLIGENCE
ACTIVITIES."
20 U.S.C. 1232g
28 C.F.R. 0.85
28 C.F.R. 0.89
IS
.
S
S
a
S
S
S
S
S
S
Thesestatutory
statutory sections
sections provide
providecivil
civil forfeiture
forfeiture authority
authority relevant
relevant to
to acts of
of domestic
37 These
or international
terrorism.
terrorism.
38
38The
The FBI is authorized to seize property subject to seizure pursuant to statutes identified in 8.I,e.g.
8.1, e.g. 22
U.S.C. 401, Illegal Exportation of War Materials.
.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
S
S
ACLURM005569
79
33 C.F.R. 233.3
45 C.F.R. 164.512(k)(2)
counterinu~lligence and
counterintelligence
domestic security matters.
39See
U.S.c., 5311 note, pursuant to USA PATRIOT Act, October 26,
26,2001,
39See Title 31, U.S.C.,
2001, the Secretary of
Treasury is required to "adopt regulations to encourage further cooperation among financial institutions,
their regulatory authorities, and law enforcement authorities, with the specific purpose of encouraging
regulatory authorities and law enforcement authorities to share with financial institutions information
regarding individuals, entities, and organizations engaged in, or reasonably suspected based on credible
evidence .of
of engaging in, terrorist acts or money laundering activities."
40
40
According to this Order, the FBI is responsible for providing a response to foreign counterintelligence
and domestic security and
and terrorism
terrorism threats:
threats. This includes:
(1) Directing and coordinating, as circumstances allow, urgent and expanded efforts
(1)
required by Congressional enactments and executive branch directives to detect and deter hostile activities
directed against the United States by foreign or domestic elements;
(2) Disseminating information, to the extent that conditions permit, concerning hostile
(2)
intentions and activities toward government officials and agencies; and
ACLURM005570
80
,.
I.
I,.
S
S
S
S
".
ATTORNEY GENERAL
ORDER NO;
NO: 2857-2007
ORDER
.
.........
~.:....
ATTORNEY GENERAL
ORDER NO.
NO. 2654-2003
ORDER
'
'
ATTORNEY GENERAL
NO. 2737-2004
2737-2004
ORDER NO.
.... .
411
41
41This
This order sets fonh,
forth, that, the Director of the FBI is delegated the authority
authority to
to provide
provide reasonable
assistance to foreign national security agencies
agenCies cooperating with the FBI in the execution of the FBI's
counter-terrorism and counter-intelligence duties, and federal, state, local or foreign
foreign law enforcement
agencies, to assist any such agency in the lawful execution of any authorized function.
function.
This Order provides that pursuant to Attorney General procedures which will be put into place when
necessary to prevent or respond to terrorist attacks, the JTTFs
JTTFs can call
call upon all
all Depanment
Department law
enforcement resources for assistance, including agents and other resources of the FBI, DEA, ATF, and
TheDirector
Directorof
ofthe
the FBI
FBIand
and the
the FBI
FBI Special
Special Agents
Agents in
in Charge
Charge (SAC) or Assistant Directors in
USMS. The
Charge (ADIC)
(ADIC) serve
serve as
asheads
headsof
ofthe
theJTTFs.
It tFs.
42
43
43This
This Order delegates to the FBI Director the Attorney General's authority and responsibilities under
of the Public Health Security and Bioterrorism Preparedness and Response Act
sections 201, 212, and 221 of
Stat.594
.
of 2002, Pub. L. No. 107-188, 116 Stat.
594 (2002)
111
S
ACLURM005571
81
81
~""
.'
r KVIV.1 APuSatiLr.
ft
v .1VJ...ft ituN vr
All iUN V.CSIIGAIIUN blVIANALINU 1'x0m
VIOLA
Or
THIS ORDER INVOLVING OR REVEALING A POSSmLE
POSSIBLE VIOLATION OF
U.S.c., 229 SHALL BE REFERRED TO THE FBI.
18, U.S.C.,
f'U".l 11' V.l:.,;).1.
d11~\J'
HV1~
44Title
44Title 50, USC, 401a, defines "foreign intelligence" as "information relating to the capabilities, intentions,
or activities of foreign governments or elements thereof, foreign organizations.
organizations, or foreign persons, or
international terrorist activities."
45See
(Desig~ation of United States National Authority Pursuant to the
45See generally, Title 22, USC, 6711 (Designation
Chemical Weapons Convention).
ACLURM005572
82
a
a
a
a
a
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
EXECUTIVE ORDER
ORI,lER
13388 (FURTHER
STRENGTHENING THE
SHARING OF
TERRORISM
TERRORISM '
6
INFORMATIONt
INFORMATION)"
EXECUTIVE ORDER
13491 (ENSURING
LAWFUL
INTERROGATIONS)
3, "STANDARDS
"STANDARDS AND PRACTICE FOR INTERROGATION OF
SECTION 3,
INDIVIDUALS IN THE CUSTODY OR CONTROL OF THE UNITED STATES
CONFLICTS"
IN ARMED CONFLICTS"
(b) INTERROGATION TECHNIQUES AND INTERROGATION-RELATED
TREATMEN"r7See
H.R. Rep.
Rep. No. 111-89, 111th
111'" Cong., 1"
I" Sess. 2009,
TREATMENt'See H.R.
of Inquiry Requesting that the President and Directing that the
"Resolution of
Infonnation in
Attorney General Transmit to the House of Representatives All Information
Their Possession Relating to Specific Communications Regarding Detainees and
Foreign Persons Suspected of Terrorisrn,"
Terrorism," June 26,2009.
26, 2009.
4~ote
Intelligence Reform and Terrorism Prevention Act of 2004 for
46Note that this EO refers to section 1016(a)(4) of the Intelligence
the definition of "terrorism information." This
This section
section of
ofthe
theAct
Act is
is codified
codified in
in Title
Title 6,
6, USC,
USC, section 485, Information
sharing..
sharing.
47Section
of this EO
EO states that
that nothing
nothing in this
this section shall preclude the FBI, or other Federal law enforcement
47Section 3(b) of
use authorized, non-coercive techniques
teChniques of
of interrogation that are designed to elicit
agencies, from continuing to use
voluntary statements and do not involve the use of force, threats, or promises.
Dec. 30, 2005, 119
Note that the Detainee Treatment Act of 2005, Pub. L. 109-148, Div. A, Title X, 1004, Dec.
U.S.c. 2000dd-1(a)
2000dd-1 (a) (Protection
(Protection of
of United
United States Government personnel Engaged in
Stat. 2740, codified at Title 42 U.S.C.
Authorized Interrogations) provides that:
in any civil or criminal prosecution against an officer, employee, member of
of the Armed Forces, or other agent of
of the
who is a United States person, arising out of the officer, employee, member of the Armed
United States Government who
practices. that involve detention and interrogation of alien
alienss
Forces, or other agent's engaging in specific operational practices,
who the President or his designees have determined are believed to be engaged in or associated with international
terrcrist activity that poses a serious threat to the United States, its interests, or its allies, and that were officially
terrorist
conducted,ititshall
shall be
be aa defense
defense that
that such officer,
authorized and determined to be lawful at the time that they were conducted
of the Armed Forces, or other
o~her agent did not know that the practices were uruawful.
employee, member of
unlawful.
Also note that the National Defense Authorization Act for Fiscal Year 2010, Pub. 1.
L. 111-84, Title X, 1040
28.2009,123
2190,2454,
U.S.c.
(No Miranda Warnings for Al Qaeda Terrorists), October 28,
2009, 123 Stat. 2190,
2454, codified at Title 10 U.S.C.
'
801 note, provides that:
Absent a court order requiring the reading of such statements, no member of the Armed Forces and no official of the
of the intelligence community (other than the Department of
of Justice) may read to
Department of Defense or component of
a foreign national who is captured or detained outside the United States as an enemy belligerent and is in the custody or
effecti ve control of
of the
the Department of
of Defense or otherwise under detention in a Department of Defense
under the effective
facility the statement required by Miranda v. Arizona (384 U.S. 436 (1966)), or otherwise inform such an individual of
Individual may
mayor
to counsel
counselor
any rights that the individual
or may not have to
or remain silent consistent with Miranda v. Arizona (384
U.S. 436 (1966)).
Regarding the practice of Mirandizing terrorist suspects overseas, in a June 12, 2009 letter from FBI Director
Robert Mueller to U.S. Congressman Frank Wolf, Director Mueller confirmed that "there has been no policy change
Furthermore, the
the Director noted in
and no blanket instruction issued for FBI agents to Mirandize detainees
detainees overseas."
overseas." Furthermore,
his letter, that FBI agents have occasionally given Miranda warnings to persons captured overseas, at Bagram Air Base
(Afghanistan) and elsewhere, but only when "a determination was made that a prosecution in an Article III court may
desirable to
to maximize
maximize the
be in the interest of
of national
national security
securityand
andthat
thatproviding
providingMiranda
Mirandawarnings
warnings.....' was
was ...
... desirable
likelihood that any resulting statements would be admissible at trial."
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005573
83
a
a
a
a
S
S
NSPD 46fHSPD-IS
46/HSPD-15
48
ANNEXn
ANNEX
1148
Additionally, see
e.g., Department of Justice,
Office of Legal Counsel
opinion, FBI AUTHORITY
TO INVESTIGATE
VIOLATIONS OF
SUBTITLE E OF TITLE 26
OR 18 U.S.C. SECTIONS
921-930, June 21, 1996 (the
FBI has lead investigative
responsibility over crimes of
terrorism pursuant to statutes
or Presidential Decision
Directive 39 that have
granted authority to the FBI
in these matters).
matters). Note that
PDD 39 was superseded by a
National Security
Presidential Directive.
MARITIME STRATEGY
FOR MARITIME
SECURITY: MARITIME
MARITIME
SECURITY:
OPERATIONAL
THREAT RESPONSE
(MOTR)
S
S
48By
of historical background, National Security Decision Directive Number 30, MANAGING
48By way of
10, 1982,
1982, and National Security Decision Directive Number 207,
TERRORIST INCIDENTS, dated April 10,
THE NATIONAL PROGRAM FOR COMBATTING TERRORISM, dated January 20, 1986, were the first
Presidential national security directives to grant the FBI lead agency authority to investigate terrorism
matters.
As the lead agency to investigate terrorism incidents, the FBI also has authority to investigate
See Department of Justice, Office of Legal Counsel
terrorism incidents on US
US Capitol grounds. See
Memorandum for Theodore M. Cooperstein, Counsel to the Deputy Attorney General Re:
Re: FBI
Investigative Jurisdiction, dated June 7, 2004.
S
S
ACLURM005574
84
j:
UNCLASSIFIED//FOR
UNCLASSIHED//FOR OFFICIAL USE ONLY
DHS, SMALL VESSEL
SECURITY STRATEGY,
APRIL 2008,
APPENDIX A - U.S.
FEDERAL
GOVERNMENT
RESPONSIBILITIES
NATIONAL STRATEGY
FOR AVIATION
SECURITY
THE NATIONAL
STRATEGY TO SECURE
CYBERSPACE .
CYBERSPACE
NATIONAL RESPONSE
A GUIDE TO HOW THE NATION CONDUCTS
THE NRF IS AGUIDE
FRAMEWORK (U.S.
ALL-HAZARDS RESPONSE.
RESPONSE.
.
DEPARTMENT OF
HOMELAND SECURITy)
SECURITY) CHAPTER 1: ROLES
LAW ENFORCEMENT:
ENFORCEMENT:
ROLES AND
AND RESPONSIBILITIES, LAW
HOMELAND SECURITY
PRESIDENTIAL
(HSPD) 5
DIRECTIVE (HSPD)
.HSPD 749
49This
DirectivelNSC-63 of May 22,1998
49This Directive supersedes Presidential Decision Directive/NSC-63
22, 1998 ("Critical
Infrastructure"), and any Presidential directives issued prior to this directive to the extent of any
. inconsistency.
UNCLASSIFIEDffFOR
UNCLASSIFIED//FOR OFFICIAL
OFHCIAL USE ONLY
ACLURM005575
85
85
MEMORANDUM OF
AGREEMENT
BETWEEN THE DOJ
AND DHS
DHS CONCERNING
CONCERNING
TERRORIST
FINANCING
INVESTIGATIONS,
13 2003
SIGNED MAY 13,
ACLURM005576
86
'.
a
a
a
a
a
a
S
.
a
COMMON FBI
FBI ACRONYMS
ACRONYMS
COMMON
AlSAC
A/SAC
AN
NV
AA
AAG
AAG
AAR
AAR
ACD
ACS
AD
ADA
ADC
ADIC
ADNET
ADP
ADPT
ADR
AFB
AFGE
AFID
AFIS
AFO
AFOR
AFOSI
AFOSI
Annual
Annual Field
Field Office
Office Report
of. Special
Air Force Office of.
Special
Investigations
Attorney General
General
Attorney General
General Guidelines
i.'.
AudioNideo
AudioNideo
Ankara
a
a
S
Acting SAC
AG
AG
AGG
AGG
Athens
Assistant Inspector or Artificial
Artificial
Intelliflence
Intelligence
AI-Ittihad
AI-Ittihad al-Islami
al-Islami aka
aka Islamic Union
Union
lSomalia)
(Somalia)
Agency
Agency for International Development
Assistant Inspector in
in Place
AH
AH
AI
Al
AlAI
AIAI
AID
AID
AIIP
Alias
Alias or Also-Known-As
Albany Field
Field Office
Office or Alabama or
Annual
Annual Leave
Assistant Legal
Legal Attache
AKA
AL
ALAT
I:
S
ACLURM005577
87
87
I.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
.'
O
S
O
ALF
ALU
Animal
Animal Liberation
Liberation Front
Administrative
Unit (OGG)
Administrative Law Unit
(OGC)
AM
AN.
AN
Amman
ANSIR,
Anchorage Field
Field Office
AO
AOAC
AOB
AOB
AOL
America
America Online
Online (Internet
(Internet Service
Service
Provider)
Provider
Act
Act of
of Terrorism
Terrorism
Applicant
Applicant Program
Program
AOT
AP
AQ
ARC
ASAC
A-SAC
ASCII
ASD
ASG
ASOS
ASOS
Abu
(Philippines)
Abu Sayyat Group (Philippines)
Aviation
and
Surveillance
Aviation and Surveillance Operations
Operations
Section (CIRG)
(CIRG)
Atlanta Field Office
AT
ATCC
ATF
Air
AirTraffic
TrafficControl
ControlCenter
Center
Bureau of
of Alcohol,
Alcohol,Tobacco,
Tobacco, Firearms
Firearms
and Explosives
Asynchronous Transfer Mode or
Automated Teller Machine
ATM
AUC
United
United SEllf
Self Defense
Defense Forces of
ColombiaiAutodefensas
Colombia/Autodefensas Unidos
Unidos de
Colombia,
Colombia, a foreign
foreign terrorist
organization
Assistant United
United States Attorney
Attorney
S
S
AUSA
AVP
AWOL
AY
AVITU
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005578
88
i.i.
\:
'.
I.
S
a
a
S
a
aa
aO
S
S
S
a
S
S
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
BA
BATF
BAU
Alcohol, Tobacco,
Bureau of Alcohol,
Tobacco, Firearms
and Explosives
Behavioral Analysis
Behavioral
Analysis Unit
Unit (CIRG)
(CIRG)
BB
Bridgetown
BC
BICS Administration
Administration Group
BD
Budapest ILEA
BDC
BE
Buenos Aires
BF
BG
Bogata
BH
BI
Brasilia
BIA
BK
BL
Brussels
BN
Berlin
BO
Bucharest
BOLO
BOP
Lookout
Be On the Lookout
Bureau of Prisons
BPMS
BR
Bureau Personnel
Personnel Management
Bureau
~stem.
System
Bern
BS
BUDED
Bureau Deadline
BICE
BICS
)
BW
Biological Warfare
Biological
Warfare
BZ
Beijing
C
C/PTDs
'
Confidential
Convictions/P retrial Diversions
Convictions/Pretrial
CAC
CACU
CAFRA
CAFRA
Civil Asset
Civil
Asset Forfeiture
Forfeiture and Reform Act of
2000
Communications Assistance
Assistance to
to Law
CALEA
ACLURM005579
89
0 11 .111 11 1111 1111 110111111 10 11 11 11 0 00 101111 1111 0 10 0111 11 1111 11 111 111 11 11 11 00 11 11
CART
CASMIRC
CAT
CATS
CBP
CBR
Can Be Reached
CBW
CCP
CCR
CCTV
Closed Circuit TV
CD
Counterintelligence Division or
Compact Disc
Chief Division Counselor
Counsel or Centers for
Disease Control and Prevention
CDC
COL
CDL
COMA
CDMA
CDPD
CE
CEAU
CEI
CEIP
CFC
CFG
CFG,
CFR
CG
CGR
CH
CIA
CIC
Copenhagen
Cincinnati Field Office or Confidential
Informant
Central Intelligence Agency
Counterintelligence Center (CIA)
CID
CI
ACLURM005580
90
90
.,
;e
a
a
a
a
aa
CIMS
CIO
CIP
CIPA
CIRG
CISP
CJIS
CLEA
CLEIG
CMU
CN
Canberra
CNC
CNN
CNU
CO
COB
COBB
COG
Continuity of Government
COL
Color of Law
COMSAT
Communications Satellite
COMSEC
Close 'of
'of Business
,\
Communications Security
CONOP(S)
CONUS
Concept of Operation(s)
COOP
COP
COPS
COS
COTR
COTS
CP
CPU
ACLURM005581
91
91
a
a
a
,.:.
a
a
Caracas or
orCivil
Civil Rights
Caracas
Rights
Civil
Civil Rights
Rights Program
Program
Cathode Ray
Ray Tube
Tube (Terminal)
(Terminal) or Crisis
Cathode
Response Team
Crisis Response
ResponseUnit
Unit (ITD)
(lTD)
CRU
CS
Specialist or
or Confidential
C0!lfidential
Computer Specialist
Source
Civil Service
Civil
Service Retirement
Retirement System
System
Counterterrorism
Counterterrorism
Counterterrorism Threat
Threat Assessment
Assessment
and Warning
Warning Unit
Unit
Counter
Center (CIA)
(CIA)
Counter Terrorist Center
Counterterrorism Division
Division (FBI)
(FBI)
Counterterrorism
Computer Telephony Integration
Cyber Technology Section
Section (ITD)
(lTD)
Field Office
Cleveland Field
Chemical Warfare or Cooperative
Witness
Cybercrime Division
Division
Cairo
CSRS
CT
CTAWU
CTC
CTD
CTI
_CTS
CTS
CV
CW
CYD
CZ
D1
D10
D11
D11
Division
DivisionOne
One -- CJIS
CJIS
Inspection Division
Division (INSD)
Security Division
Division
Security
D12
D13
D14
Finance Division
Division (FD)
Counte~errorism Division
Division (CTD)
Counterterrorism
Investigative Services
Services Division
Division
(defunct)
Cybercrime
Division (CYD)
(CYD)
Cybercrime Division
Records Management
ManagementDivision
Division
(RMD)
Investigative Technology
Technology Division
Division
(lTD)
(ITD)
Training Division
Division (TD)
Administrative
Division
Administrative Services
Services Division
(ASD)
Information
Division
Information Resources
Resources Division
(IRD)
Counterintelligence
Division (CD)
(CD)
Counterintelligence Division
Criminal
Division
Criminal Investigative
Investigative Division
(CID)
Laboratory
Division (LAB)
(LAB)
Laboratory Division
D16
D17
D18
D2
D3
D4
D5
D6
D7
ACLURM005582
92
.'
j.
!.
S
S
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
D9
DAD
DAG
DAP
DARPA
DAWY
DCI
DCI
Director of Central
Central Intelligence
DCID
DD
DDN
DDO
DE
DEA
Administration
Drug Enforcement Administration.
DES
DCIS
DEST
DHS
DI
DI
DIA
DIDO
Designated Intelligence
Disclosure Official
Official
Defense Intelligence
Intelligence Summary
DINSUM
DISA
D1SA
DISC
DISCO
DISN
DISSEM
DITU
DJ
DK
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
S
S
ACLURM005583
93
."
'.
DL
DLA
Defense
Logistics Agency
Defense Logistics
DLAT
Deputy Legal
Legal Attache
Attache or
or Defense
Defense
Language Aptitude
Aptitude Test
Cybercrimes Division
Division (CYD)
(CYD)
Cybercrimes
,\
,,
DM
DMA
Mapping Agency
Defense Mapping
Department
of Motor Vehicles
Department of
Denver Field Office
Office
Deoxyribonucleic Acid
Di
rector's Office
Director's
Date
of Birth
Birth
Date of
Department of Commerce
Exploitation
Document Exploitation
Department of
of Defense
Department of Energy
Department of Education
Interior
Department of the Interior
Department of
of Justice
Justice
Department of Labor
Domestic Terrorism
Department of
of State
State
Date of Theft or Department
of
Department of
Transportation
Investigative Technology
TechnologyDivision
Division (ITD)
(lTD)
Date, Place
Place of
of Birth
Birth
DMV
DN
DNA
DO
DOB
DOC
DOCX
DOD
'DOE
DOEd
DOl
DOI
DOJ
DOL
DOMTERR
DOS
DOT
DP
DPOB
DRSN
DS&T
Defense Red
Red Switch
Switch Network
Network
Directorate of
of Science
& Technology
Science &
(CIA)
Switched Network
Network
Defense Switched
Defense Integrated Secure
Secure Network
Network
Diplomatic
Diplomatic Security
Security Service
Service (USDS) or
Defense
Security Service
Service (DOD)
(DOD)
Defense Security
DSN
DSNET
DSS
DST
c("
Daylight Savings
Daylight
Savings Time
Domestic Terrorism
Date-Time Group
DT
DTG
DTO
Drug
Drug Trafficking
Trafficking Organization
Organization
DTRA
DTSA
ACLURM005584
94
94
.l
a
a
S
a
S
a
S
a
S
S
a
Electronic mail
Executive Assistant Director
Employee Assistance Program or
Emergency Assault Plan
EARS
EAS
EBR
EC
ECF
ECR
EDI
EDSP
EEl
EEO
EFT
ELF
ELN
ELSUR
EM
EO
EOC
EOD
S
a
a
S
S
a
EOP
EOUSA
EP
EPA
EPIC
ERF
ERL
ERT
ERTU
ET
ETA
Electronics Technicians
Estimated Time of Arrival or Basque
Fatherland and Liberty, aka Euzkadi Ta
Askatasuna
<
S
a
ACLURM005585
95
95
:.I:
UNCLASSIFIED//FOR
USE ONLY
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE
EU
EU
European Union
Union
EVP
Evidence Program
Program
FA
Financial Analyst
Analyst or Financial
Financial Assistant
Assistant
FAA
Federal Aviation
Aviation Administration
Administration
FAG
Fraud Against
Against the
the Government
FAM
FAM
FAMA
FAR
Federal Acquisition
Acquisition Regulations
Regulations
FARC
FAST
Revolutionary Armed
Revolutionary
Armed Forces
Forces of
Colombia
Forfeiture and Asset
Asset Seizure
Seizure Team
Team
FBIHQ
FBI Headquarters
FBI
FBIRA
Recreation Association
FBI Recreation
Association
FBIS
FCC
FCI
FCI
Foreign Counterintelligence
FD
Finance Division
Division
FDA
Fed
Reserve System
Federal Reserve
Front End Distribution
Distribution System
System
FEDS
FEDSIM
FEDSIM
FEGLI
FEGLI
FEMA
FGI
FGI
FI
Fl
FIF
Full Investigation
Investigation
Financial Institution Fraud
Fraud
FIS
FISA
FERC
FERS
FEST
[
'
FISC
ACLURM005586
87E
7E
96
:.'.
FISUR
FM
FMU
Financial Manager
I
FOIA
FOIPA
FOUO
Freedom of Information/Privacy
Acts
For Official Use Only
FSL
FTO
FTS
FTTTF
FTX
FUG
Fugitive
FY
Fiscal Year
FYI
GAO
GATT
S
S
a
GF
GIA
GITMO
GMT
GOU
GIWG
FNU
GPO
GPRA
GPS
GRC
GS
General Schedule
GSA
HAMAS
HAZMAT
Hazardous Materials
HC
Hate Crime
HCF
ACLURM005587
97
HHS
Health
Health and Human Services
Services
HIDTA
HK
Hong
Hong Kong
Kong
HMRT
S
S
HMRU
HN
Hazardous Materials
Materials Response
Response Unit
(LAB)
(LAB)
Honolulu Field
Field Office
HO
HR
Human
Human Resources
HRMS
S
S
HRT
Human Resources
Resources Management
Section
Section
Hostage Rescue Team
Team
HTML
HUD
HUMINT
HZ
Hermosillo, Mexico
Hermosillo,
Investigative Assistant or Investigative
Analyst
International Association
Association of Auto
Auto Theft
Theft
Investigators
International Association of Chiefs
Chiefs of
of
Police
Police
Dulles
Dulles International Airport
IA
IAATI
IACP
lAD
IAD
,
IAFC
!AFC
IAFIS
IB
IBIS
IC
S
S
Integrated Automated
Automated Fingerprint
Identification System
System
Intelligence Base
Base
Interagency Border Inspection
Inspection System
System
Indian Country or Intelligence
Community or Internet Cafe
Cafe
Intercontinental Ballistic Missile
ICBM
ICE
ICM
I-CON
Information Control
Control
I
lED
IED
IG
Inspector General
General
ACLURM005588
98
98
b7
b- E
S S
:.
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
IliA
111A
IINI
liP
IIP
IIR
ILEA
----
1M
IM
IMA
IMINT
!MINT
IN
INMARSAT
INS
INSD
INTERPOL
INTERR
INTSUM
10
lOB
10B
lOS
IOS
IP
IR
IR ,\
IRD
IRS
IS
ISDN
ISP
ISRAA
IT
ITC
lTD
ITD
ITL
ITM
ACLURM005589
99
International Terrorism
Terrorism Operations
Operations
Section
Section
Interstate Transportation
Transportation of Stolen
Stolen
Motor Vehicles
Interstate Transportation
Transportation of Stolen
Stolen
Property
Interactive Voice
Voice Response
Joint Chiefs of Staff
lTSMV
1TSMV
ITSP
IVR
.,
JCS
JDIG
JEH
JEM
..
- . Jaish-e-Mohammed (Army of
Mohammed)
Mohammed) (Pakistan)
(Pakistan)
John F,
F. Kennedy International
International Airport
Airport
JFK
JI
JK
IN
JN
JOC
JSOC
.
JTF-6
JTFTF
JTTF
Joint Terrorism
Terrorism Task Force
JointWorldwide
Joint Worldwide Intelligence
Communications System
Kansas City Field Office
Retirement-eligible, Special
Retirement-eligible,
Special Agent
Agent
Knowledge, Skills and
Knowledge,
and Ability
JWICS
KC
KMA
KSA
KV
Kiev
KX
Knoxville Field
Field Office
LA
LAN
LAN
Los Angeles
Angeles Field
Field Office or Language
Language
Analyst
Laboratory Division
Division
Local Area Network
LANL
LCN
LCN
La Cosa Nostra
LAB
LD
LD
Division
Laboratory Division
LEA
Legat
Legal Attache
Legal
Attache
LEO
100
--
ACLURM005590
---
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
LES
LG
LHM
Letterhead Memorandum
LLNL
, LNO
LNU
Unknown
Last Name Unknown
LO
LR
LS
LTTE
LV
LWOP
.
.
MAOP
MC
MD
ME
Madrid
Memphis Field Office
MGMT
Management
MH
Manila
MIOG
MLAT
MLO
Liaison Officer
Military Liaison
MM
MO
MOA
Memorandum of Agreement
MOU
Msg
Understanding
Memorandum of Understanding
Minneapolis Field Office or Military
Police
Tupac Amaru Revolutionary Movement
(Peru)
(Peru)
Message
MTTCU
MW
Major TheftlTransportation
Theft/Transportation Crimes Unit
Milwaukee Field Office
MX
Mexico City
NA
MP
MRTA
UNCLASSIFIED//FOR OFFICIAL
USE ONLY
UNCLASSIFIED//FOR
OFNCIAL USE
ACLURM005591
101
101
:.
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
NAACP
National
National Association
Association for
for the
the
Advancement of
of Colored
Colored People
People
NAC
New
New Agents
Agents Class
Class
NALC
National
National Association
Association of
of Letter
Letter Carriers
Carriers
NAS
National
National Alert
Alert System
System
NATA
North
North Atlantic
Atlantic Treaty
Treaty Organization
Organization
NATO
NATU
NCAVC
NCIC
National
National Center for the Analysis of
Violent
Violent Crime
National
National Crime
Crime Information
Information Center
Center
NCIS
Naval
Naval Criminal
Criminal Investigative
Investigative Service
Service
NCMEC
NCTC
National
National Center
Center for Missing
Missing and
and
Exploited Children
National
National Counterterrorism
Counterterrorism Center
Center
NDIC
National
National Drug
Drug Intelligence
Intelligence Center
Center
NDPO
National
Office
National Domestic
Domestic Preparedness
Preparedness Office
NE
Ft.
lTC
Ft. Monmouth ITC
NEOB
NF
NFIB
No
or Norfolk
Norfolk
No Foreign Dissemination or
Field Office
Not
Not Further
Further Identified
Identified or
or No
No Further
Further
Information
Information or
or National
National Foreign
Intelligence
National
National Foreign
Foreign Intelligence Board
NFIP
National
National Foreign
Foreign Intelligence
Intelligence Program
NGS
NH
National
National Gang
Gang Strategy
Strategy
New Haven Field Office
NI
Nairobi
NIBIN
National
Ballistic Information
National Integrated
Integrated Ballistic
Network
National
National Insurance
Insurance Crime
Crime Bureau
Bureau
NFl
NFI
NICB
NICS
NIH
National
Criminal Background
National Instant Criminal
Background
Check System .
National
National Institutes of Health
NIMA
National
National Imagery and Mapping Agency
NIPC
National
National Infrastructure
Infrastructure Protection
Center
National
National Infrastructure
Infrastructure Protection
Protection and
and
Computer Intrusion Program
NIPCIP
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ACLURM005592
102
:.;.
NIPRNET
NJTTF
National JTTF
NK
NL
NLETS
.
NMCC
NO
NOC
NOFORN
NOIWON
NORAD
NPO
Defense
North American
American Aerospace Defense
-Command
-Command
Northern Command,
Command, Colorado Springs,
Springs,
CO
Office, FBIHQ
National Press Office,
NPTL
NRC
NRO
S
S
S
S
NSA
NSC
National
National Security Agency or National
Association
Sheriff's Association
National Security Council
Council
NSLU
NSTL
NTWS
NVG
Night
Night Vision Goggles
NWS
NY
OADR
OC/D
OC/DP
OCA
OCDETF
NORTHCOM
OGE
OCE
ACLURM005593
103
aa
a
a
aa
aa
aa
a
a
aa
a
a
aa
a
a
aa
aa
aa
aa
a
a
aa
a
a
a
a
a
a
a
a
a
i.i.
I
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
OCIO
OCIS
OCONUS
OCR
Optical
Optical Character Reader/Recognition
Reader/Recognition
OEEOA
OEO
0E0
OEOB
OFAC
OGA
OGC
OIA
01A
Office of International
International Affairs
Affairs (DOJ)
(DOJ)
Office of Inspector General
General
OIG
010
OlEC
OLEC
OM
OM
OMB
Office
Office of Management and Budget
Office of National
National Drug Control
Control Policy
Office of Origin
Origin
ONDCP
00
00
OPA
OPM
OPORD
OPR
OPS
OPSEC
ORCON
ORCON
OSC
OSHA
OSIRIS
OT
OTU
Overtime
Operations and Training
Training Unit, CIRG
CIRG
PA
ACLURM005594
104
I.
I.
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
PAC
Probationary A,gent
Agent Program
PAP
PAR
Performance Appraisal
Appraisal Report
Report
PAS
Performance Appraisal
Appraisal System
System
PC
PCOR
PO
PD
PDA
POD
PDD
PFI
PFI
PFLP
PG
PG
PH
PH
~ield Office
Philadelphia Field
PI
PI
PIC
Preliminary Investigation
PIJ
PIJ
PIN
PIN
PKK
PLF
Pilots in Command
Command
PLO
PM
PM
Program Manager
Program
PNG
PNG
POC
Point of Contact
POE
Point of Entry
POV
PP
PPMS
PR
PRAU
PRAU
Recognition and
Performance Recognition
and Awards
Awards
Unit (PRAU)
(PRAU)
Personnel Resource List
PRL
PSOBO
PSTN
PSTN
USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
ACLURM005595
105
105
aa
a
a
a
a
a
a
a
a
a
a
a,
a
a
:.
,
USE ONLY
UNCLASSIFJEDIIFOR OFFICIAL USE
UNCLASSIFIED//FOR
ONLY
PT
Physical Training
Pretoria or Physical
Training
PX
QSI
QS!
RA
Resident Agency
RAC
RCMP
RDLU
RDLU
RDOC
REI
Racketeering Enterprise
Enterprise Investigation
investigation
REL
Releasable
Radical Fundamentalist Unit (CTD)
(CTD)
Radical
RFU
RH
'
RICO
RISS
RMA
RMAB
RMD
RO
Rome
ROM
RSO
RY
~
ZOci..
SA
SAA
SAAC
SABT
SAC
SACS
SAMBA
RSIMS
a
a
.\.'
a
Mutual Benefits
Special Agents Mutual
Association
Special Agent Mid-Level
Mid-Level Management
(System) or (Board)
Selection (System)
(Board)
SAMMS
UNCLASSIFIED/IFOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED/NOR
ACLURM005596
106
I.
'.
UNCLASSIFIEDIIFOR OFFICIALUSE
UNCLASSIREDHFOR
01-1
-4CIAL.USE ONLY
SAMNET
SAR
SAS
SAUSA
.
SBA
SC
SCI
SCIF
SCI Facility
SCION
SCOPE
(I
SCS
..
SD
SDNY
SE
SEAS
Supervisory EAS
SEATO
SEC
iI
SEMU
SERL
SES
SF
SG '
SG
Singapore
SHAC
SI
SIGINT
Signals Intelligence
SIOC
SIPRNET
SISG
SITREP
SIU
SJ
ACLURM005597
107
UNCLASSIFIED//FOR
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
St. Louis Field Office or Sick Leave
Leave or
Sendero Luminoso - aka Shining Path
Path
(Peru)
(PerLJl
Mission, Execution,
Execution,
Situation, Mission,
Control
Administration, Command & Control
SL
SMEAC
SMR
SMTP
..
SN
Santiago
SO
SOD
SOG
SOP
SRU
SSA
Supervisory Special
SpeCial Agent
SSAN
SSG
SSGU
SSS
(VCMOS,
Safe Streets and Gangs Unit (VCMOS,
CID)
CIDl
Supervisory Senior Resident Agent
Support Services Section
Section
SST
ST
STAT!;
STATE
STE
STU
SU
Field Office
Salt Lake City Field
SVTS
System
Secure Video Teleconferencing System
SWAT
SWB
Southwest Border
SWS
SIOC Watch
Watch Supervisor
T&A
SSRA
T1
T1
T3
TA
TACSAT
Tactical Satellite
ACLURM005598
108
I.
a
!.
Butte ITC
TC
TO
TD
Transportation Crimes
Telecommunications Services
Services Unit
(lRD)
(IRD)
Training Division
Training
TOO
TDD
TOY
TDY
TE
Temporary Duty
Tel Aviv
TECS
Treasury Enforcement
System
Communications System
Terrorist Enterprise
Enterprise Investigation
TCU
TEl
TEI
a
a
a
a
a
a
a
a
TFIS
Theft from
from Interstate Shipment
Task Force Officer
Terrorist Financing Operations
Section
Technical
Information Specialist
Technical Information
Specialist.
Tallinn
TFO
TFOS
TIS
TL
Telecommunications Manager
Telecommunications
Threat Management Unit (CTD)
(CTD)
TM
TMU
TO
Tokyo
Tactical Operations
Operations Center
TOC
Technical
Technical Operations
Operations Section
Section (ITO)
(ITD)
Tampa Field Office
TOS
TP
TREAS
Department o~
of the Treasury
Terrorist Reports and
and Requirements
Section
... POL
It..or nr
Savannah
1--:::Savannah ITC
ITC or
Telecommunications
Telecommunications Specialist
TRRS
TS
TSA
TSC
TSL
TSP
LAN
TS/SCI LAN
TTA
TTIC
TTX
TTX
TTY
TU
TU
TURK
ACLURM005599
109
,.!.
a
a
a
a
a
a
a
TZ
TZ
Tijuana, Mexico
Unclassified
UACB
UAE
UAV
UBLU
UC
UCA
UCFN
UCMJ
Undercover Agent
Universal Case File Number
Uniform Code of Military Justice
UCO
UCR
Undercover Operation
Uniform Crime Report
UFAP
UI
Unidentified
UNI
UNSUB
Universal Index
Unknown Subject
UPS
UR
URL
USAF
USAO
USA()
USBP
USC
USCG
USA
USACID
USCS
USDA
USDAO
USDC
USDJ
ACLURM005600
110
'.
!.i.
UNCLASSINEDHFOR
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE
USE ONLY
USDS
USG
USIA
USIC
USMC
USMS
USN
USOU
USPER
USPIS
USPP
USPS
USSS
VA
Veterans
Veterans Administration
Administration
Vehicle-Borne Improvised Explosive
Explosive
Device
Virtual Case File
VBIED
VCF
VCFU
VCFU
VCMO
VCMOP
VCMOS
VCR
VCTF
VG
VGTOF
VIC
VICAP
VICAR
VIN
VIP
VLTP
VN
Voluntary Leave
Leave Transfer
Transfer Program
Program
Vienna
Virtual Private Network
VPN
VTC
Video Teleconferencing
Teleconferencing
ACLURM005601
111
111
WAN
WCC
WCCP
WE
. WF
WF
Pocatello ITC
Washington Field Office
WFO
WHCA
WHOA
Communications
White House Cbmmunications
Agency
WHSR
WIGI
WMDOU
WR
Warsaw
WMD
- Witness Security/Protection
WSP
WWW
WWW
X
Z
ZULU
ACLURM005602
112
a
a
UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
NJTTF MASTER
MASTER PERSONNEL
PERSONNEL ROSTER
ROSTER
NJTTF
Official Bureau
Bureau Name
Name
Official
(Last, First,
First, Ml)
MIL
(Last,
Aqency
Agency
Seat
Seat
Assignment
AssifLnment
Secure
Secure
NJTTF
NJTIF
Office
Office
18-476
1S
- 476
1S
435
18 -435
1S-442
18442
18438
1S-438
1S-408
18408
1S
18 - 473
1S482
is
- 482
18-465
1S-465
18 - 433
1S
18-460
1S-460
18446
1S
- 446
1S
- 489
1S-489
18 - 413
1S
18-484
1S
- 484
"
18-456
1S-456
18402
1S - 402
1S - 430
18-430
I I
1S-451
1S-451
l
1S-429
1S-429
1&461
1S-461
I1-'
III-
tr--
ttr-r-
I-
b6
b6
b7C
b7C
rrr-
t-
I-
18-488
18-488
1S-487
1S-487
1S - 470
470
1S
181S - 471
471
1S416
1S - 416
18-477
1S-477
18
1S -- 447
447
465
181S-465
18448
1S - 448
t-
1S-450
1S-450
S
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIALUSE
USEONLY,
ONLY
ACLURM005603
113
113
I.
UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
18-843
1S
- 843
18 -- 427
427
1S
18-440
1S
- 440
18-467
1S
- 467
18-408
1S-408
18-438
1S
- 438
18-410
1S
- 410
18- 462
462
1S18-411
1S-411
18-409
1S-409
18-434
1S
- 434
18-415
1S-415
18-442
1S
- 442
18-444
1S-444
18-475
1S-475
15-430
1s-430
18-478
1S
- 478
b6
18-481
1S
- 481
b7C
18-443
1S-443
18 - 468
1S
18-412
1S
- 412
18-418
1S
- 418
18
13 - 445
18-431
1S - 41
18-420
1S - 420
18-480
1S-480
18-458
1S - 458
18-411
1S - 411
18
1S -- 479
479
18-423
1S-423
18-424
13 - 424
18-469
1S - 469
18-403
1S - 403
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
ACLURM005604
114
114
I.
'.
UNCLASSIFIED//FOROFFICIAL
USE ONLY
ONLY
UNCLASSIFIED//FOR
OFFICIAL USE
15-441
1S-441
1S
15 --455
455
15 -- 483
483
1S
15449
1S
- 449
-<;:~ ..._~~:~: e~ -:''1'~:40if:---~ .~.,.
:.~
'.
- . ,_.
-" ...
15'417
1S
I- 417
15414
1S
- 414
b6
b6
b7C
b7C
1S
15 -- 425
425
1S
15 -- 466
466
1S
15 -- 426
426
15-428
1S
- 428
15-- 486
486
IS
15-434
1S-434
15 - 485
1S
15472
1S
- 472
15-452
1S-452
15-474
1S
- 474
1r
15437
1S
- 437
.,
a
a
UNCLASSIFIED//FOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
a
a
ACLURM005605
115
115
Appendix A
A
116111101111110SSIIIIIIIIISSIIIIIIS111111111111111111119111111111191111111111
ACLURM005606
:.
(Rev. 01-31-2003)
FEDERAL BUREAU
FEDERAL
BUREAU OF INVESTIGATION
,.
Precedence:
Precedence:
To:
To:
ROUTINE
Date:
Date:
Attn:
Attn:
Counterterrorism
Counterterrbrism
Attn:
Attn:
11/24/2009
ADIC/SAC
JTTF/CT ASACs
JTTF/CT SSAs/SSRAs
JTTF Coordinators
CoordinatOrs
DAD Tracy A./North
A.,North
DAD Virginia L.
L. Bollinger
Counterterrorism
DT
DIATfS/. NationaJ ,roj nt Terrorj
Contact:
Contact: IA _
From:
From:
Approved By:
By:
SID
Task Force
McJunkin,
McJunkin, James W
W
Ward, Michael B
Ward,
ninlinn
Gipliano Mark
b6
b7C
b7c
Drafted By:
By:
Case ID #:
#: 415A-HQ-C1432188-DR
Title:
Title:
(pending)
(Pending)
FORCE;
NATIONAL JOINT TERRORISM TASK FORCE;
DATABASE/RESOURCE SUPPORT
Administrative: Field
Administrative:
FieldJTTF
JTTF members are encouraged to coordinate
with their local
local JTTF federal,
federal, state and local representatives
prior to contacting the NJTTF.
.
NJTTF.
Details:
Details: The NJTTF's mission is focused on providing support
support.to
to
other Counterterrorism
Counterterrorism Division
Division Sections
Sections and
and field
field JTTFs.
JTTFs. The
NJTTF
NJTTF does
does this
this thro
thro llrT: :cce~l tol
to
I
available through its
i tslplu
s Task
'I'ask Force
Force ?fb.cers
plus
utticers ('I'F'Os)
(mos)
from federal,
oca government
government agencies.
agenc~es_
from
federal, state
stateanan oca
ACLURM005607
b7E
'.
I
To: All
All Field
Field Offices
Offices From:
From: Counterterrorism
Counterterrorism
To:
Re: 415A-HQ-C1432188-DR,
415A-HQ-C1432188-DR, 11/24/2009
11/24/2009
Re:
\
facilities, special
special interest
interest country travel,
travel, equipment,
equipment, weapons,
facilities,
weapons,
communication, and finances).
finances).
communication,
b7E
b6
b7C
b7C
b7E
ACLURM005608
Appendix 8
II IP II I
II II II III II II II
ACLURM005609
To: All
All Field
Field Offices
Offices From:
From: Counterterrorism
Counterterrorism
To:
Re: 415A-HQ-C1432188-DR,
415A-HQ-C1432188-DR, 11/24/2009
11/24/2009
Re:
LEAD(s) :
LEAD(s):
Set Lead
(Action)
Set
Lead 1:
1: (Action)
ALL RECEIVING OFFICES
is
Ensure the information contained in this communication is
distributed to all personnel assigned to JTTF and/or
Counterterrorism in their respective divisions.
divisions.
(~ :
46
46
ACLURM005610