You are on page 1of 133

--

~------~~---

..
I

-~-

-----.:-----..-,

~--------,

>

OS OSS O S O MOS SOS OM O111111 111111 116 11 10 1111 SOS S

FEDERAL BUREAU
BUREAU OF
OFINVESTIGATION
INVESTIGATION'

COUNTERTERRORISM DIVISION
DIVISION

:
,.
:

ForceOffl
cer Orientation
Orientation-
Task Force
Officer

A reference guide for ,new


new
JTTF Task Force
Force Officers
Offiters

'.

0/-1
'~. ,r...

Joint Terrorisrki
Terrorism Task Force
II
i:/

\
\

Volume 1
Revision 1
December 2009

.'-

'.

ACLURM005478

'i..

IP

a
a

TAB.L
E OF
0 F CONTENTS
CON TEN T S
TABLE

a
a
a

a
a
S
a

a
a
a

a
a

a
a

.
Tab 1: INTRODUCTION..........................,~ ........ .......................................... 1
1
Heraldry of the FBI Seal
FBI Priorities
Thumbnail History of the FBI
Where the FBI Got its Name
Where the Title "Special Agent" Came Frhm
From
FBI Organizational Chart
I
FBI Field Offices and Resident Agencies!
Agencies! .

.............{......................................................

Tab 2:
IN-PROCESSING
Tab
2: ~~6~i~~~~~?s~~i~~.Li~~
TFO/TFA In-Processing List
I
Security
MOD,
MOU, Reimbursement Arreement,
Agreement, Vendors Forms
RA Access Badge / Publi;c
PUbl,c Key
Key Infrastructure
Infrastructure (PKI)
1..
Deputation
.
Credentials;
Credentials
Photograph
,
Computer Access
I
JTTF Vehicle and Gas C~d
Card
it
Equipment Issues
Radio Frequencies/Call Sign
S~gn
TFO's Chain of Comman4
Command
TURK
TURK
\
Electronic Equipment Sec~rity
Security Form
EnforcementOn-Linea
On-Line! (LEO)
Law Enforcement
Internet Access
Outside facility Access Badges and Briefings
Personnel Security Polygraph Program

14

Security Classification Guide ............................


Definitions
Classification
Methods of Transmission

16

o 0 0 0 0 0

Security Awareness Briefing ..................................................................... 22


Personnel Security

ACLURM005479

i:

S
S
S

S
S

S
S

S
S

S
S

S
S

'-~

'".

oJ'

..

Facility Security
Information Security/Computers
Threats to National Security
Telephone and Facsimile Machine
"Security
Security Incident Program
Proper Handling of Federal Taxpayer Information (FTI)
Security
Security. Awareness
Awareness Certification

Tab 3: LEGAL APPLICATION ................... !, ....................................................29


Criminalizing Terrorism

Statutes
Title 8
Title18
Title 31
31
1 .
Title 42
Title 49
Title 50
Investigative Guidelines
Conclusion

I
I.

Tab 4: DOCUMENTATION
DOCUl\l.lENTATION ...........................................................................39
Required J?ocumentation
Documentation
Opening a Threat Assess ent

Closing a Threat Assess ent

Convert Threat Assessm nt to a Preliminary Invest.


Invest. or Full Field Invest.
Invest.
Opening a Preliminary I vestigation

Closing a Preliminary In estigation

Extending a Preliminary nvestigation

Converting a Preliminary Investigation to a Full Field Investigation

Opening a Full Field Inve


hive tigation

Closing a Full Field Inves igation


.
Extending
Extending a Full
Full Held
Field Inv
Inv stigation

Annual Summary for a Ful\


Fun Field Investigation

Issuing aa Grand Jury


Jury Subpc\ena
Subp~ena

Reporting Grand Jury Subpoena Return

Issuing a National Security Letter

Serving National Security Letter Return

Requesting Surveillance by SSG

Reporting Surveillance Conducted by SSG

Reporting Surveillance Conducted by JTTF

Request Training
.

Reporting an Interview
Reporting a Trash Cover

ACLURM005480

ato
a
a

is

i.

II
0

ID
ID
411

ID
II

II

ID
ID

ID

ID
ID

ID

fa

Reporting a Collision
Submitting General Evidence
Submitting Film for Processing
Submitting Electronic.
Evidence to be Analyzed
Electronic Evidence
Submitting Toll Records to be Entered into Telephone Apps.

41
Investigative Reports .............................................................................. 41
EC (Electronic Communication)
FD-542
FD-542(Statistical
(StatisticalAccomplishment)
Accomplishment)
'
FD-71 (Complaint Fonn),'
Form)
FD-302 (Report Discoverable
Discovera~le Information)
FD-320 (Notification to DOJ)
FD-515 (Statistical Accomplishment)
FD-930 (Violent Gang and Terrorist Organization File)
LHM (Letterhead Memorandum)
Memofrj.ndum)
I

It

Tab 5: INVESTIGATION ........................ 1~ ..................................................... 50


'
Investigative Plan

Tab 6: INVESTIGATIVE TECHNIQUES ...!.......................................................54


54
Polygraph Matters
I
Consensual (telephonic) Monitoring
Consensual (non-telephonic) Monitoring
of Interviews and/or
and/or ConfessionS
Confession~
Taping of
,
Closed Circuit Television (CCTV)
ViewingJPole Cameras
Public Area Viewing/Pole
Group II Under-Cover Operation
Group I Under-Cover Operation
Purchase of Drug Evidence
Administrative Subpoenas
Mail Cover
Pen Registers I/ Trap and Trace
ill Electronic Surveillance (non-sensitive)
Title DI
Federal Grand Jury Subpoenas
National Security Letter
FISA Procedures

Tab 7: INTELLIGENCE REPORTING ....................... , ...................................... 61


Intelligence Information Report (IIR)
Purpose
Protocol
Tab 8: PONIES, FORMS, AND RESOURCES .....................................................65

ACLURM005481

:.

i.

(ElectroniC Communications):
Conununications):
EC (Electronic
Threat Assessment
Preliminary Inquiry
Full Field Investigation
Criminal Case
Leads
Evidence
Title HI
m
Request Assistance
Asset
Asset

FD-S42 .................................................66
FD-542
Surveillance
National
NationalSecurity
Security Letter
L,etter
Participating in an Event
Miscellaneous

FD-302 ......................................................................................67

LHM (Letter-Head Memorandum) ........................67

NSL (National Security Letter) ........................... 67


Request for Emergency Disclosure of Information
ECPA E-mail Subscriber
ECPA E-mail Transactional Records
ECPA Telephone Subscriber
ECPA Toll Billing
FCRA Consumer Identifying and Financial Institutions Info.
Consumer Identifying
Identifying Information
FCRA Consumer.
. FCRA Financial Institutions
FCRA Full Credit Report

RFPA Finap.cial
Financial Records

Ponies

Miscellaneous ................................................. 68

EXTRA RESOURCES

Terrorism Statutes ...................................... : ............................... 71


Common FBI Acronyms ...............................................................87
NJTTF Personnel Roster ............................................................... 113

4111

Appendix A: NJTTF Resources EC


.....................................................116
116
EC...
Appendix B: DIOG Reference Slides .......................................... , ...... 163

,.

I.

ACLURM005482

.-.

w.

j"

-""

,-/
(,

The mission of the National Joint Terrorism Task


Task Force,
Force, and
and the
the NJTTF's
NJTTF's
vision for the more than 100 JTTFs nationwide, is to enhance communications,
coordination and cooperation between federal, state, and local government
agencies representing the intelligence, law enforcement, defense, diplomatic,
public safety and homeland security community by providing a point of fusion
investigations ..
for terrorism intelligence and investigations.

to JTTFs
JTTFs
As a Task Force Officer (TFO), you represent an indispensable asset to
Your specialized
specialized training and localized expertise
and the FBI as a whole.
whole. Your
represent a window into your community that could not be duplicated by any
Together with
with the
the FBI
FBI and
and the participating agencies
government department.
department. Together
of your JTTF, you will provide resources and regional proficiency that ensure
the safety of the United States, your state, your neighborhood and your family
friends.
and friends.

~ \

"

0 - " __

a
a

This orientation manual is provided to assist your transition from local, state,
We anticipate-that
anticipate-that your time
or federal official to ITTF
JTTF Task Force Officer.
Officer. We
ITTF will be rewarding, and trust that your presence will greatly
with the JTTF
contribute to the mission of the FBI
FBI Counterterrorism
Counterterrorism Division.
Division. Thank you for
your service.

..-,

,.-.

-.

.:.' , ',I

Michael J. Heimbach
~ . \;~~:~ "~

,.

, ,

,/

.f

Assistant Director
Counterterrorism Division

S
S
a

S
S
S

,'-

.,

:-1

"

7"

-',"I " .~

';'l::,', \~

, , ~- -r ,

':I,

',:',4,1

--

ACLURM005483

ACLURM005484

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

and was adopted in


. The
The actual FBI
FBI Seal is in
in color and
in 1940.
in the
the FBI
FBISeal
Seal has
has special
Each symbol and color
color in
significance.
The dominant
dominant blue
blue field
field of
ofthe
theSeal
Seal and
and the
significance. The
scales on
on the
the shield
shield represent
represent justice. The
The circle
circle of 13
scales
13 stars
stars
as exemplified
exemplified by
by the
the 13
13 original
original
unity of
of purpose as
denotes unity
The laurel
laurel leaf symbolizes
states. The
states.
symbolizes academic honors,
in the two
two
distinction, and fame.
distinction,
fame. There
There are 46 leaves in
branches, since there
there were
were 46 states
statesin
in the
the Union
Union when
when the
the
FBI
for
FBIwas
was founded
founded in
in 1908.
1908. Red
Red parallel
parallel stripes
stripes stand for
while the
convey
courage, valor,
valor, and
and strength, while
the white
white stripes
stripes convey
truth, and
and peace. As
cleanliness, light,
light, truth,
As in
in the American
American
the white
white by
by one. The motto,
mollo,
Flag,
Flag, the
the red
red bards exceed the
"Fidelity,
Bravery, and
and Integrity,"
Integrity," describes
describes the motivating
motivating
"Fidelity, Bravery,
bevelled edge surrounding
surrounding
force behind
behind the FBI.
FBI. The
force
The peaked bevelled
the Seal symbolizes
and the
the
symbolizes the
the challenges
challenges facing
facing the FBI
FBI and
ruggedness of
of the
gold color
color in
the agency, and the gold
in the
the seal
seal
conveys its
its overall
overall value.
value.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005485

11

--------------

so

UNCLASSIFIED//FOR OFFICIAL USE ONLY

2. Protect the United States against foreign Intel


operations and espionage

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005486


r S S rS SS S t S S SS S

I.!.
:.
I.
I

'.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

THUMBNAIL HISTORY OF THE FBI


On July 26, 1908, Attorney General Charles J. Bonaparte ordered a small force of
permanent investigators (organized a month earlier) to report to the Department of
Justice's Chief Examiner, Stanley Finch.
All Department
Department of
of Justice [DOJ]
[DOJ] investigative
Finch. All
matters except certain bank frauds, Bonaparte declared, were to be reported to this
this new
group of detectives for handling. At first, little seemed to come of Bonaparte's
.
reorganization.
In
fact,
this
small
special
agent
force
evolved
into
the
FBI,
the
primary
reorganization. In fact, this small special agent force evolved
federal law enforcement agency in the United States.

In 1909, this agent force


force was
was named the
the Bureau
Bureau oflnvestigation
of Investigation [BOI).
[BOI]. At this
time, it investigated antitrust matters, land fraud, copyright violations, peonage, and
twenty other matters. Over the next decade, federal criminal authority and Bureau
1910 "White-Slave Traffic" Act that put
jurisdiction were extended by laws like the 1910
responsibility for interstate prostitution under the Bureau for a time and the 1919 Dyer
Dyer
entry'into
Act that did the same for interstate auto-theft.
auto-theft. U.S. entry
into WWI in April 1917
Congress and
and President
President Wilson assigned the
increased the Bureau's jurisdiction
jurisdiction too.
too. Congress
BOI's three hundred employees responsibility for espionage, sabotage, sedition, and
selective service matters.
Rising prosperity and a growing
growing criminal
criminal threat
threat characterized
characterized the
the 1920's.
1920's. With
the advent of the automobile and Prohibition, bank robbers, bootleggers, and kidnapers
crossed state lines to elude capture because
because of
of jurisdictional
jurisdictional boundaries.
boundaries. A flourishing
flourishing
criminal culture marked by violent gangsters arose as no federal law gave the BOI
authority to tackle their crimes
crimes and other law
law enforcement
enforcement efforts
efforts were
were fragmented.
fragmented. The
B~reau addressed these matters as its jurisdiction permitted throughout the 1920's.
Bureau
In 1924, Attorney General Harlan Stone appointed John Edgar Hoover as Director.
Director.
Director Hoover [1924-1972] implemented a number of reforms to clean up what had
become a politicized
politicized Bureau
Bureauunder
underthe
theleadership
leadershipofofWilliam
WilliamJ. J.Bums
Burns[1921-1924].
[1921-1924].
Hoover reinstated merit hiring, introduced professional training of new agents, demanded
regular inspections of all Bureau operations, and required a strict professionalism in the
Bureau's work.

Under Hoover, the Bureau also began to emphasize service to other law
The Identification
Identification Division
Division was
was created in 1924 to provide U.S.
enforcement agencies.
agencies. The
U.S.
police a means to identify criminals
criminals across
across jurisdictional
jurisdictional boundaries.
boundaries. The Technical
1932, provided forensic analysis and research for law
Crime Laboratory, created in 1932,
enforcement, and the FBI National Academy, opened in 1935, provided standardized
professional training for America's law enforcement communities.
In answer to the violent crime of the 1930's,
1930's, Congress began to assign and expand
The kidnapping
kidnapping and
and murder
murder of
of the Lindbergh baby in
new authorities
authorities to the Bureau.
Bureau. The
1932 led to the passage of the Federal Kidnapping Act, which allowed the Bureau to
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005487

fl
lb

ED

lb

UNCLASSIFIED//FOR OFFICIAL USE ONLY


UNCLASSIFIEDIIFOR
The 1933
1933 Kansas
Kansas City
City Massacre
Massacre spurred the passage
investigate interstate kidnappings.
kidnappings. The
These laws
laws gave
gave the
the Bureau
Bureau authority
authority to act in many
of the 1934 May/June Crime Bills. These
new areas, to make arrests,
Renamed "Federal
"Federal Bureau of
arrests, and to
to carry
carry weapons.
weapons. Renamed
1935, the FBI dealt with gangsters severely, earning its anonymous
Investigation" in 1935,
agents the sobriquet of ''G-Man."
"G-Man."

I.I.
S

As the gangster threat subsided,


subsided, a threat
threat of aa different
different nature
nature emerged.
emerged. In 1936,
President Roosevelt directed the FBI to investigate potential subversion by Nazi and
In 1940,
1940, he
he tasked
tasked the
the Bureau
Bureau with
with responsibility for foreign
Communist organizations.
organizations. In
intelligence in the western hemisphere and
and domestic
domestic security
security in
in the
the United
UnitedStates.
States. In
response, the Bureau created a Special Intelligence Service [SIS] Division in June 1940.
the Western
Western Hemisphere.
Hemisphere. These Agents
The SIS sent undercover FBI Agents throughout the
successfully identified
identifjed some 1,300
1,300 Axis intelligence agents [about 10%
lO% of whom were
prosecuted]. When
When President
President Truman
Truman ordered
ordered the
the program's
program's end in
in 1947,
1947, several former
SIS offices became the backbone of
of the FBI's foreign liaison efforts, now serving as
Attach6 Offices
Offices [Legat Offices].
Offices]. FBI efforts also thwarted many espionage,
Legal Attache
sabotage, and propaganda attempts on the home front including Frederick Duquesne's spy
ring in 1941 and George Dasch's band of saboteurs in 1942.
When Germany and Japan surrendered in 1945, concern about the threat of
foreign intelligence did not end.
end. Revelations
Revelations that
that year
year from
from former Soviet intelligence
agents like Igor Guzenko and Elizabeth Bentley, information gleaned from FBI
traffjc called
investigations during and after the war, and decrypted/decoded Soviet cable traffic
"Venona" [available to the Bureau from 1947] convinced the FBI of the seriousness of
the Soviet intelligence threat long before Senator Joseph McCarthy made his 1950 speech
Under the
the Hatch
Hatch Act
Act [1940]
[1940] and Executive Orders issued in
about communist "moles."
"moles." Under
1947 and 1951, the Bureau exercised responsibility for ensuring the loyalty of those who
government. The
The FBI
FBI played
played aa critical role in U.S. handling of the
sought to work in the government.
Cold War.

In the 1950's, civil rights violations and organized crime became matters of
As in
in the
the past,
past, lack
lack of
of jurisdiction hindered the Bureau from .
increasing concern.
concern. As
effectively responding to these problems
problems when
when they
they first
first emerged
emerged as
as national
nationalissues.
issues. It
was under the 1964 Civil Rights Act and the 1965 Voting Rights Act that the Bureau
legislative authority to
to investigate
investigate Civil
Civil Rights
Rights violations.
violations. Under existing laws,
received legislative
the Bureau's efforts against organized crime
crime also
also started
started slowly.
slowly. Then, with the 1968
Omnibus Crime Control and Safe Streets Act and the1970 Organized Crime Control Act,
Congress gave the Bureau effective weapons with which to attack organized criminal
ill warrants for wiretaps and the Racketeering and Corrupt
enterprises, Title III
Organizations Act [RICO].

During the 1960's, subversion remained


remained aa central
central focus
focus of
of Bureau
Bureau efforts.
efforts. The
counter-cultural revolution turned the Bureau's attention towards violent student
movements as criminal groups like the Weather Underground and the Black Panthers
engaged in both legitimate political
political action
action and
and illegal
illegal crime.
crime. The Bureau responded to

UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
Y

ACLURM005488

ID

ID

ID

ID
ID

111
ID

ID
ID

ID

ID

UNCLASSIFIEDJIFOR
UNCLASSIFIEDI/FOR OFFICIAL USE ONLY

the threat of subversion with Counterintelligence Programs, COINTELPRO, first against


the Communist Party [1956], later against other violent/subversive groups like the Black
Panthers and the Ku Klux Klan [1960's].
.
During the 1970's, Bureau actions, which were publicly revealed through a
ofInformation
strengthened Freed9m
Freedom of
Information Act [1966, amended in 1974], resulted in
congressional investigations like the Church Committee and the Pike Committee hearings
In response
response to
to criticisms
criticisms emerging
emerging from these revelations, the Bureau worked
in 1975. In
with Attorney General Levi to develop guidelines for its domestic counterintelligence
investigations:
investigations.
In the wake of Director Hoover's death in May 1972, Director Clarence M. Kelley
.
[1973-1977] refocused FBI investigative priorities from the qUailtity
quantity of results to the
Working with
with the
the Bureau
Bureau and
and Congress in 1976,
1976, Attorney
quality of cases handled. Working
General Edward Levi issued
issued aa set
set of
of investigative.
investigative guidelines
guidelines to address the concerns of
of having public, legal authority behind
Bureau critics and to give the FBI the confidence of
behind
its use of irreplaceable investigative techniques like wiretaps, informants, and undercover
These investigative
investigative techniques
techniques were
were used
used to
to great effect in cases like ABSCAM
agents. These
[1984], and UNIRAC
1983, as concerns about terrorist
[1980], GREYLORD
GREYLORD [1984],
UNIRAC [1978].
[1978]. In 1983,
acts grew, Attorney General William French Smith revised the Levi Guidelines to adjust
the Bureau's ability to prevent violent radical acts.
DirectorWilliam
built upon
upon Director
Director Kelley's emphasis
Director.William H.
H. Webster
Webster [1977-1987]
[107-1987] built
on investigative "quality" cases by focusing Bureau efforts on three Priority Programs -White Collar Crime, Organized
Organized Crime,
Crime, and
and Foreign
Foreign Counterintelligence.
Counterintelligence. Later illegal
Illegal
Drugs [1982], Counterterrorism [1982], and Violent Crimes [1989] were identified as
of resources brought great success against
priority programs too.
This concentration
concentration of
too. This
Soviet and East Bloc intelligence as more than 40 spies were arrested between 1977 and
The FBI
FBI also
also made
made breakthroughs
breakthroughs against
against white-collar crime in investigations
investig~tions like
1985. The
ILLWIND [1988] and LOST TRUST [1990], and in organized crime cases like BRILAB
BRILAB
[1981] and the PIZZA CONNECTION [1985].

During the 1990's, criminal and security threats to the United States evolved as
conununism in the Soviet
new technology and the fall of communism
Soviet bloc changed the known
1993 bombing of the World Trade Centers and the 1995 bombing
geopolitical world. The 1993
of the Oklahoma City federal building highlighted the potentially catastrophic threat of
both international
international and
and domestic
domestic terrorism.
terrorism. The FBI responded
responded to
to the
the emerging
emerging .
international face of crime by aggressively building bridges between U.S. and foreign law
enforcement. Under
Under Director
Director Louis
Louis J.
1. Freeh
Freeh [1993-2001],
[1993-2001], the Bureau expanded its Legat
enforcement.
Program [39 offices by fall-2000]; provided professional law enforcement education to
foreign nationals through the International Law Enforcement Academy [ILEA] in
Budapest [opened in1994] and other international education efforts; and created working
groups and other structured liaisons with foreign law enforcement.

IP

UNCLASSIFJEDJIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005489

1111 8 811 011 1111 M O SII IIII M OS O SS IIII II S OS O OSOS IOSS IIIIO S S

UNCLASSIFIED//FOR OFFICIAL USE ONLY


The Bureau also strengthened its
its domestic
domestic agenda.
agenda. Responding to criticism of its
actions in the 1993 standoffs at Waco, Texas, and Ruby Ridge, Idaho, the Bureau
to law enforcement service
revamped its crisis response
The FBI's
FBI's commitment
commitment to
response efforts.
efforts. The
was strengthened by the computerization of its massive fingerprint collection database,
enhancements in the National Crime Information Center [NCIC] and in NCIC 2000,
2000, and
In 1997,
1997, the Bureau hired its first
by the revitalization of the
the FBI Laboratory.
Laboratory. In
professional
professional scientist
scientist to
to head
head the
the Lab.
Lab. The Lab

tightened its protocols for evidence control, instituted organizational changes to optimize
research specialization, and earned national accreditation.
On September 4,
4,2001,
[2001 to
2001, former U.S. Attorney Robert S. Mueller III [2001
present] was sworn in as Director with a mandate to address a number of steep Challenges:
challenges:
upgrading the Bureau's information technology infrastructure; addressing records
management issues; and enhancing FBI foreign counterintelligence analysis and security
in the wake of the damage done by former Special Agent and convicted spy Robert S.
S.
Hanssen.
Then within days of his entering on duty, the September 11
11 terrorist attacks were
Director Mueller led the FBI's massive
launched against New York and Washington.
Washington. Director
investigative efforts in partnership with all U.S.
U.S. law enforcement, the federal government,
On October
October 26,
26,2001,
the President signed into law the U.S.
and our allies overseas.
overseas. On
2001, the
U.S.
Patriot Act, which granted new proviSions
provisions to address the threat of terrorism, and Director
Mueller accordingly accepted on behalf of the Bureau responsibility for protecting the
American people against future
On May 29,
29. 2002, Attorney General
future terrorist
terrorist attacks.
attacks. On
John Ashcroft issued revised investigative guidelines to assist the Bureau's
counterterrorism efforts.
To support the Bureau's change in mission and to meet newly articulated strategic
priorities, Director Mueller called for a reengineering of FBI structure and operations that
will closely focus the Bureau on prevention of terrorist attacks, on countering foreign
intelligence operations against the U.S., and on addressing cyber crime-based attacks and
addi,tign, the
the Bureau
Bureau remains dedicated to protecting
other high technology crimes.
crimes. In
In addition,
civil rights, combatting public corruption, organized crime, white-collar crime,
crime, and major
also strengthening
strengthening its support to federal, county, municipal,
acts of violent crime.
crime. ItIt isis also
And it is dedicated to upgrading its
and international law enforcement
enforcement partners.
partners. And
technological infrastructure to successfully meet each of its priorities.
At the start
start of
of the
the new
new millennium,
millennium,the
the1~73I
FBI stands
standsdedicated
dedicated to
to high
high values
values and
Commitment to
to these
these values
values and
and standards ensures that the FBI
ethical standards.
standards. Commitment
effectively carries out its mission: Protect and defend the United States against terrorist
and foreign intelligence threats; uphold and enforce the criminal laws of the United States;
States;
and provide and enhance assistance to its federal, state, municipal, and international
partners.

UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005490

in

in

'.

ED

I.
I'
I

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

Ever 'wonder
wonder how the FBI got its name?
It's more
more confusing
confusing than you
you might think.
It's
1908 when Attorney General Charles Bonaparte created
First, it had no name. In 1908
He simply
simply referred to the group
the entity that would become the FBI;
FBI, he did not name
name it.
it. He
as a "special agent force" when he announced his work to Congress in the 1908 Attorney
General's Annual Report.
Second,it
oflnvestigation
Second,
it was named the Bureau of
Investigation but, sometimes, called the
Division of
ofInvestigation.
In
1909,
Attorney
General Wickersham formally named
1909,
Investigation.
Bonaparte's "force"
"force" the
Bureau
of
Investigation
At the
the time,
time, the
the Bureau was
the Bureau of Investigation[BOI].
[30I]. At
Over the
the next
next several
several years
years the Bureau was
composed of less than seventy employees.
employees. Over
also referred to as the Division ofInvestigation.
of Investigation, but
but this
this title
title did
did not
not stick.
stick. Between 1913
1933 it was named the
and 1933, the Bureau remained the Bureau
Bureau of Investigation.
Investigation. In 1933
ofInvestigation.
United States Bureau of
Investigation.

Third, and most confusingly, the Bureau became the Division of


of 1933,
1933, newly elected President Franklin Roosevelt
Investigation. In the spring of
This reorganization
reorganization grew out of
of the end of
reorganized the Department of Justice [DOJ].
[DOJ]. This
Prohibition: In 1919,
1919. the 18th
18th Amendment had been passed, outlawing the sale and
of alcohol and enforced by the Treasury Department's Bureau of Prohibition
manufacture of
In1929,
1929.the
theBOP
BOPwas
was transferred
transferred to
to the
the DOJ
DOJ from
from the
the Treasury Department. But
[BOP]. In
what does this have to do with the FBI?
Well...inJune
Juneof
of1933,
1933, President
President Roosevelt
Roosevelt ordered
ordered the
the formation of
of a Division
Well...in
of the Bureau of Investigation and the Bureau of Prohibition.
of Investigation composed of
Director Hoover was appointed as Director of Investigation but also remained Director of
the BOr.
1301. The leadership of the BOP was left largely to John S. Hurley as Assistant
of the BOP. Hoover maintained a stark separation
separation- between the two
Director in charge of
[For more on this
Bureaus and he refused to integrate. BOP personnel into
into the
the BOr.
BOI. [For
of History on Elliot Ness and the Bureau."]
confusing period, see the "Byte Out of
of 1933,
1933. the 18th
18th Amendment was repealed and the Bureau of
In the fall of
Its enforcement
enforcementfunctions
functions were
were ended so its Agents were
Prohibition withered and died. Its
transferred or fired; a very small number
number became
became FBI
FBI Agents.
Agents. BOP property was
transferred throughout the government (we kept a lot of cars, most of the boats and
airplanes went to other departments) and its tax law enforcement authority was
Thefew
few remaining
remaining enforcement
enforcement functions related to crimes
transferred back to Treasury. The
committed under the old prohibition laws were handled by the Division of Investigation.

Finally, the FBI. By default, the Bureau of Investigation had become the
This was
was confusing
confusing as
as there
there were
were several
several "Divisions of
Di vision of Investigation. This
Division
Director Hoover,
Hoover. therefore,
therefore. asked
Investigation" in the federal government at that time.
time. Director

I.

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

'

ACLURM005491

ID

ED

111111

CD

UNCLASSIFJEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

that his Division be given a distinctive name.


Attorney General
General Cummings
Cummings broached the
name. Attorney
issue with President Roosevelt and Congress
Congress and
and they
they agreed.
agreed. In the 1935 the
Department of Justice appropriation, Congress officially recognized the Division as the
Almost immediately,
immediately, Inspector W. Drane
Federal Bureau of Investigation, the FBI.
FBI. Almost
It was
was quickly adopted
Lester coined the FBI's motto - Fidelity,
Fidelity, Bravery,
Bravery, and
and Integrity.
Integrity. It
and published in The Investigator for all Bureau
Bureau employees
employees to
to see.
see. The name became
effective on March 22, 1935, when President Roosevelt
Roosevelt signed
signed the
the appropriation
appropriationbill.
bill. We
have been known under this distinguished name ever since.

Where did the title "Special Agent" come from?


from?
The bottom line: no sources say why the term "special agent" was first used in the
... and evolved into today's FBI
1870's by the Department of Justice,
Justice, only
only that
that itit was
was used
used...and
Special Agent.
Here are the facts:
facts:
1870, after Congress appropriated $50,000 for the detection and prosecution of
In 1870,
crimes, Attorney General George Williams appointed a "special agent" in the Department
of Justice and paid him with monies
monies from
from this
this appropriation.
appropriation. This agent conducted
"special" investigations for the Attorney General, i.e. the Attorney General assigned
which cases his agent was to investigate. Other government law enforcement agencies
may have also used a similar title from time to time, but none used it for an extended
period of time.

ID

1879, the DOJ title was changed to General Agent, a supervisory role [this
By 1879,
position was abolished in 1907]. In
In 1894
1894 aa "special
"special agent"
agent" was
was assigned to work under
the General Agent, investigating violations
violations of the
the Indian
Indian Intercourse
Intercourse Act.
Act. The bulk of
1879 and 1908 were handled by Secret Service
Department investigations between 1879
personnel who were borrowed on
1907, the year before the
on a case-by-case
case-by-case basis.
basis. In 1907,
Bureau of Investigation (the FBI's precursor) was created, one DOJ special agent
investigated antitrust matters, one handled investigations related to the Government's
defense of suits before the Spanish Treaty Claims Commission, and one special agent
handled Indian Intercourse Act violations.
In 1908 when Attorney General Charles Bonaparte reorganized the Department's
"special agent
agent force," he hired 9 Treasury agents as special agents and
investigators into a ''special
put them together with 13 peonage investigators,
investigators, and
and 12
12 bank.
bank examiners.
examiners. Whether all or
some of the peonage investigators were called
called special
special agents
agents isis not
not known.
known. The bank
examiners were accountants and were usually
usually called
called "special
"special examiners."
examiners." A distinction
agents and special
immediately arose between special agents
special accountants.
accountants. This distinction
existed into the 1930's; at which point, it was decided that all investigative agents-Special Agents.
Agents. It was around this time that
agents and accountants--were to be called Special
the convention of capitalizing "Special Agent" became uniform in the Bureau.
UNCLASSIFJEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005492

11111111111111111111MOSSII1111111111111111111111911111111111111 1111111111 1110

Or RCS OF
ILCUD AFRVAS
CHIEF OF STAFF 1,

DIRECTOR

unceoF
CONGRESSIONAL AFFAIRS

DEPUTY DIRECTOR

OFFICE DEEM.
EMMEN OINVITUNTY
ORICEOF PROFESSONAL
FIESPCNSENITY
RESOURCE

ASSOCIATE
DEPUTY DIRECTOR

OFFICE OF INTENSITY
AND COmPLIPNCE

.
,111
,

EXECUTIVE ASSISTANT
DIRECTOR FOR NATym,
SECURITY RRAtICR
ASSOCIATE ONCUTIVE
ASSSTANT ERECTOR FOR
RATIONAL SECoNNIBRANCN

EXECUTIVE ASSISTANT
DIRECTOR FOR

CRIMINAL, CYBER,
RESPONSE AND
SERVICES BRANCH

SClEI(:EAIID
SOMME AND
TECIflOl.OGV
BRANOi
TECIVOLOGY ERANCH

CRLINAL MEANS WI

ODUNIENERRONSII
OMSON
COtNINzELUSIME

EXECUTIVE ASSISTANT
EXECUTIVE
ASSISTANT
OIREGTOO FOR
DIRECTOR

-I

COESIDVSION

DIRECTORATE OF
WIEJJORIcE

CRECAL WOCefr
REVOKE CFOS

vo&OONS OF
WSS DESTRUC101

OIRCI
INTERNATOW
0:ERAIIONS

re=im

EXEcume ASSISTlNI
EXECUTIVE
ASSISTANT

~CTOORlR
DIRECTOR FOR
INFCflMATION AND
INFORMATION
TEClftJlOGV
TECFNOLOGY IIAAIICIi
BRANCH

F.xECUTl\lE
EXECUTIVE ASSISTANT

OIIlfCTOR
DIRECTOR f()R
FOR ~MAH
HUMAN
RESW'ICes
RESOURCES BlWICH
BRANCH

HOMOLOGY CNNION

OFFICE OF IT PROGRAM
A.41.051.1E15

011011Areett tonal,/

MICE OF IT SYS,T,3 I
GEVELOP4Eiff

OPERATIONAL

OfV60i

OFFICE OF THE OMBUDSMAN

PureauccfncE

MAW 44570E

NOP MAT ON SENCES


6144a1
...I SEGUE TECMOLOGE$
MD PRKA110.617.10E

...I OF EraMNINGIO.Y6T
OFR:ICI
005)4IT TOM

f ICE Of IA
ENfORUIFNT
COMMAIION

ACLURM005493

1RANNO PINSON

-1

11110.11 RESOURCES
MON

FAUNIESAISILOOGROS
Soma ONStCN

01.10N

FECONOSNAHASSIENT
OPASION

SECUFEIV OMEN

FBI/CounterterrorismaTTF Organization

H OFFICE UTNE GENERAL


COUNSEL

0 II III III III II II III SS IIIIII111

111 II 111 111 IIIII II 1111 IP II II I

COUNTERTERRORISM DIVISION
AS
SISTANT DiPECfOR
ASSISTANT
DIRECTOR

OPERATIONS
imuci 1

(Ors BRANCH 0

OPFRATIONS
DI4 II
COPS BRANCH

MATZO%
COMMUNICATION
AND POLICY
MANAGEMENT OFFICE
(SUMO)

CPDIATIONAL
SUPPORT BRANCH
(0P5 5PT BKANcH)

Cl
0

TIALICUMIED

CrOICRO

UNO (tWI

La known"
(rAth

IL=

Um OVA
troakui
108All
MOO
AM COI MO!

7M0111

Tau= Pmamma
KNOMNioliOST
woH1211
ColM100111

UN= 11/3137
ICOMI

COLVOTIOWDODI
!MMS Axon=
TOM 101111

0201000
Aat 1100/1

Ham= Stumm
Wins ONTD.
OSA( tt

Commloa
%um huts VI
ITTNET171

RuscoaSsinm
Mom Curtail
MKT'

COMOODOZOMM

Roceccm
Wot4CRIDI

ha.= 00A

ri DI Ctrawcas TAttaxan
LS MO= ETD SZEILMAXITS

ACLURM005494

Ituausr Inlay
Emulanza
Uar JAM

itnar MremTicto
NcIr cOnli

tri
P00112 10
Ccumaurr
VADI)

Turns Roscv
171,14

J ~ \
1111111111111111111111111111111111111111111111111110111111111111111111111111111MOSSIO

I
AWS48111.4EZANE

CAGPALIEEDINE

.EASPaiantmE

34 tom.11

;41.1.313

Slatled Feld Office Resident Agency


catmt as of 743.2004:197

~Ii~

-A:4IlJ.CImllW\llt::a

_._.

ACLURM005495

~WJ.~

UNCLASSIFIED//FOR OFFICIAL USE ONLY

mIns

Plol
...nreumag

s es s e ss e s sesses s e s se s e ses s e ss e se s s ees s ee s

UNCLASSIFIED//FOR OFFICIAL USE ONLY

NJTTF Organization and Function


Domestic
Section
DomesticTerrorism
Terrorism Strutegic
Strategic Operations Section
Sectioll
Section Chief

NJTTT Unit Chief

Deputy Unit Chief DoD

Deputy Unit ChiefDMS

Program
Management
NJTTF Management
;UTE' Policy &
Program Management

Intelligence
Nati( nal Threat Identification
& Development
Analysis & Production
Intelligence Sharing Program
Support

Operations
Operations Case Support
Crisis Support
Special Projects

UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED/IFOR OPPICIAL

ACLURM005496

Program Mgt. Coord.

Transportation
Security Program
Management of ALA, MLA, &
RLA sub-programs
National polices and strategies
related to transportation domain

12

a
S

aa

S
S

S
S
S
S

S
S

S
S
S

S
S

S
S
S
S
S
S
S
S
S

S
S

ACLURM005497

UNCLASSIFIED//FOR OFFICIAL USE ONLY

1\:

40

TFO/TFA IN-PROCESSING LIST


1) Security
Security
1)
SF-86(Category
(CategoryI I- -Full
FullTop
TopSecret
SecretBackground
Background must
must cover
eover 10
10 years)
a) SF-86
InitialFD-857
FD-857and
andFD-868
FD-868(retained
(retainedatatuntil
until Official
Official Security
Security Clearance comes
b) Initial
back. Initial
Initial must
must be
be destroyed).
destroyed).
back.
Final'Set
Setofofnoted
notedforms
formsare
aresent
sentwith
withEC
ECrequesting
requesting Computer
Computer Access and RA
c) Final
"
Access Badges.
i) Security Clearance Brochure
ii) PSI
ii)
iii) NCIC Checks
ACS Checks
iv) ACS
v) IA
IA Checks
Checks
v)
vi) Local Involvements
vii) NADDIS Checks
viii) Fingerprints
Fingerprints
viii)
SCIIndoctrination
Indoctrination (if
(if applicable)
applicable)
d) SCI
Forindividuals
individualspossessing
possessingaaSecurity
Security Clearance
Clearance from
from their
their "home" agency,
agency. they
e) For
must have it passed from their agency to FBIHQ.
FBIHQ, Security Office.
2) MOU, Reimbursement Agreement, Venders Forms
2)
SendEC
ECtotoNJTTF
NJTTFvia
viaSAHQ
SAHQ(Coordinator's
(Coordinator's responsibility)
responsibility)
a) Send
3) RA Access Badge/Public
BadgelPublic Key Infrastructure (PKI) - (See Coordinator)
3)
a) FD-889
FD-889
a)
b) FD-857
FD-857
b)
c) FD-868
d) SF-312
d)
SecurityAwareness
Awareness
e) Security
PKIregistration
registrationform
formand
andsubscriber
subscriber agreement
agreement
f) PKI
Deputatio'n (TFO's
(TFO's only)
only)
4) Deputation
a) USM-3R
USM-3R
a)
b) FD-739
FD-739
b)
c) Photo
d) Appropriate EC must be forwarded to NJTTF (Coordinator's responsibility)
Credentials- -(Must
(Musthave
haveFD-281/1-BI
FD-2811FBI Hand Receipt)
5) Credentials
FD-281isisturned
turnedinto
intoFBI
FBIProperty
Property Management
Management Unit with EC
a) FD-281

a)

Photograph
6) Photograph
a) One Photograph is used for both Access Badge and Credentials
a)
b) Contact office photographer to schedule photograph
ComputerAccess
Access (Access
(AccessEC
ECand
andSecurity
Security Forms)
7) Computer
FBIData
DataBase
BaseAccess
Access (Access
(AccessEC
Eeand
and Security
Security Forms)
a) FBI

UNCLASSIFIED//FOR OFFICIAL USE ONLY

111

ACLURM005498

14

S S

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
FBIComputer
ComputerSecurity
SecurityTraining
Training (InfoSec,
(InfoSec, etc)
b) FBI
BiographicSheet
Sheet(Bio-Sheet)
(Bio-Sheet) (May
(May be
be required)
required)
8) Biographic
a) Obtain form from Coordinator
a)
b) Complete form and return 3 copies to Coordinator
JTTFVehicles
Vehicles & Gas Cards (See Coordinator)
9) JTTF
(FD-28I FBI Hand Receipt) (Issued equipment varies by Division)
10) Equipment Issue (FD-281
a) Vehicle/Gas Card (see 9 above)
a)
b) Pager
c) Vest
d) Hand-held Radio
e) Cell Phone
e)
f) Car Radio Packet
f)
g) Portable Police Emergency Lights
g)
h) Blackberry
Frequencies/Call Signs
Signs
- See
11) Radio Frequencies/Call
SeeJTTF
JTTFCoordinator
Coordinator or
or appropriate
appropriate POC
POC

12) TFO's
TFO's Chain of Command at their agency
a) Provide
ProvideInformation
Information to
to Coordinator
Coordinator
13) TURK
TURK (Time Utilization Record Keeping)
Keeping)
a)
a) Forms are maintained by Administrative Assistant
b) Complete form weekly
b)
14)
14) Electronic
Electronic Equipment
Equipment Security Form
a) Obtain forms from Coordinator
a)
b) Read and sign Acknowledgment Form
c) Fill out Electronic Equipment Registration Form and return
return to Coordinator
c)
15)Law
15)
Law Enforcement
Enforcement On-Line (LEO)
a)
a) Obtain form from Coordinator
b)
from your supervisor
b) Complete form and obtain appropriate signature from
c)
c) Return form to LEO Coordinator

16) Internet
Internet Access
a)
a) Obtain form from Coordinator
b)
b) Complete form
form and return to
to Coordinator
17) AirportlTransportation
Airport/Transportation Infrastructure
Infrastructure Access
Access badge
badge and
and Briefing
Briefing (where applicable)
applicable)
18) Request
Request for
for military
military base access
access pass
pass (where
(where applicable)
applicable)

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY
ONLY

ACLURM005499

15
15

S MO SS IIIIIIII II S SOS S O S OSS OOS OO S S OO MOS S OS SII M

UNCLASSIFIED//FOR OFFICIAL USE ONLY


Personnel Security Polygraph Program
19) Personnel
Allpersonnel
personnel detailed
detailed to the FBI JTTF are required to submit to a polygraph
a) All
examination prior to obtaining a security clearance.
clearance.

SECURITY CLASSIFICATION GUIDE


Background: On
On October
October 31,
31,2008,
President Bush
Bush issued
issued Executive Order 12333,
12333, which
2008, President
set forth the most current procedures for dealing with classified information,
information, including:
including:

>
~

Safeguarding National Security Information


Information
Levels of Classification
> Declassification
~

>
~

DEFINITIONS
Information:
Any knowledge
knowledge that
that can
can be
be communicated
communicated or documentary material that is
Information: Any
owned by, produced by or for, or is under the control of the U.S. Government.
Government.
That process
process used
used by
by an
an Original
Original Classification Authority to determine
Classification:
Classification: That
what information should be classified and at what level.
level.
Classified National
National Security Information:
Information: Information that has been determined to
require protection against unauthorized disclosure and is marked to indicate its classified
status when in documentary form~
form.
National Security Information:
Information, which
which if
if disclosed, would cause harm to the
Information: Information,
National Security or foreign relations of the United States.
States.

CLASSIFICATION
There are three levels of Classifications:
Classifications:

may cause
cause DAMAGE
DAMAGE to
to National
:gJ4Iprrru;> Unauthorized disClosure
disClosure may

1. MNVH3131s7
Security.

: Unauthorized disclosure
2.~:_unaUthOrized
disclosure may
may cause
caus~ SERIOUS DAMAGE to National
Security.

3. .....:::=-.=:.=.:==
WEP:Stre: Unauthorized disclosure may cause EXCEPTIONALLY
3.
GRAVE DAMAGE to National Security.
Terms
Terms such
such as
as
"For Official
Use Only"
Only"
"For
Official Use
or
Or
"Law Enforcement
Sensitive"
Enforcement Sensitive"
Do not
not refer
to
refer to
Levels
Levels of
of Classification
Classification
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005500

16

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

a
a

a
a

a.
a

a
a

''ForOfficial
OfficialUse
UseOnly"
Only"isisaacaveat
caveatregarding
regarding the
the dissemination
dissemination of
of intelligence
"For
information.
For Official
Official Use
Use Only
Only information
information can only
only be disseminated to other
information. For
official US government agencies that have a need to know.
know.
"Law Enforcement
EnforcementSensitive"
anothercaveat
caveatregarding
regarding the
the dissemination
dissemination of
"Law
Sensitive" isisanother
Law Enforcement
Enforcement Sensitive information
illformation can only be
intelligence information.
information. Law
disseminated to other local, state or federal law enforcement agencies.
agencies.

RESTRICTIVE HANDLING CAVEATS AND CONTROL MARKINGS


MARKINGS
vORCON

ORCON -.Originator
- Originator Controlledj
Cohtrolled; Dissemination
and Extraction of Intelligence information is
is
controlled by the Originator of the Information
V NOFORN - Not
to Foreign
Foreign Nationals
Nationals

Not releasable
releasable to

SAFEGUARDING
Protection of Classified Information from
Unauthorized Disclosure
>
>- Access
Access
>-Marking
>
Marking
>- Transmission
>
>- Storage
>

is
ED

>- CLEARANCE
NEED TO
ACCESS
>
CLEARANCE + NEED
TO KNOW
KNOW = ACCESS

>- OVERALL DOCUMENT MARKING


>
MARKING - A document's overall classification is

determined by the HIGHEST classification level of information contained on any


page of that document.

i.

a
a

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

--------~=====----------------

ACLURM005501

17
17

ID

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

S
S

tpileL
~

a document contains more than


If a
one page,
page, place the overall
overall
classification marking
conspicuously at the top and
bottom of the front
front cover,
cover, on
all documents pages,
pages, and at the
top and bottom of the outside
outside of
of
cover.
the back cover.

S
S
S

PORTION MARKINGS
MARKINGS
Indicate classification level
level of
of each
portion of the document.
document.
~ Subject
Subject
>
~ Title
>
~ Paragraphs
Paragraphs
>
~ Graphics
D
Graphics

S
S

S
S
S

PORTION MARKING PART II


II
level
Indicate classification level
(including caveats)
caveats) in (
( )
)
(including
following
immediately preceding or following
the portion to which it applies.
applies.
Top S
(S) Se
onfident
(U) Unclassified

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005502

18
18


11 11 1111 11 11 1M O SS IIII IIIIM III II IIII IIII S S110 11 1111 11 11 9 1111 11 1111 11 11

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIKE,DHFOR

METHODS OF TRANSMISSION
~ U.S.
U.S. Postal
Postal Service
A.

~ Contracted Service
>

>
~ Authorized DOJ, DOD, DOS,
DOS, or
or component courier service/system
~ Cleared
Clearedand
anddesignated
designatedgovemment
employee
A
government employee

~ Authorized
Authori~edcryptographic
cryptographic system
system
A
Preparation of Material for Transmission
./ Envelopes or containers

./ When classified information is transmitted, it will be enclosed in

two opaque, sealed envelopes, wrappings, or containers, durable


enough to properly protect the material from accidental exposure
and to ease in detecting tampering.
Addressing
Addressing

The outer
./
out~r envelope or container for classified material will be
addressed to an official government activity or to a DOD
appropnate storage
contractor with a facility clearance and
and appropriate
will show
show the
the complete
complete return address
address of the sender.
capability. ItIt will
sender.
The
The outer envelope will not be
be addressed
addressed to
to an
an individual.
individual. Office
codes or phrases such as "Attention:
"Attention: SA Smith may be used.
used.
./
The inner envelope or container will show the address of the
receiving activity, the address of the sender and the highest
classification of the contents.
contents.
./
The outer envelope or single container will not bear a classification
marking or any other unusual marks that might invite special
attention to the fact that the contents are
are clllssified.
classified.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005503

19
19

so

'.

UNCLASSIFIED//FOR
OFHCIAL USE
UNCLASSIFJED//FOR OFFICIAL
USE ONLY

Attorney General
12333 Pennsylvania Ave
Washington, D.C.
D.C.
Washington,

Attorney General
General
12333 Pennsylvania
Pennsylvania Ave
Ave
Washington,
Washington, D.C.
D.C.

Austin
FBI
Austin FBI
9420
9420 Research Blvd
Blvd
Austin, TX

Outer opaque wrapping/cover

Austin FBI
FBI
Austin
Research Blvd
Blvd
9420 Research
Austin, TX
A\Jstin,

Inner opaque wrapping

Transporting
./
When being hand carried outside an activity, a locked briefcase or
locked bag may serve as the outer wrapper, but not when hand
carried aboard a commercial airline.
airline.

S
S

I:

UNCLASSIFIED//FOR OFFICIAL USE ONLY


ONLY

ACLURM005504

20
20

1111111111111111111111111001111111111111111111111111111111111111 1111111111111 1111 11 1111111 118


Desk Reference
Intelligence Community Classification Markings

;,.
\'`'

http://www.intelink.sgov.gov/siteslssc:Jcapco/marking_refsiMarking%20References%20DocumentslCAPCO%20Implementation
http://www.intelink.sgov.govisites/seckapco/marking_refsiMarking%20References%20Documents/CAPC0%20Implementation
%20Manual_2.1_5%20January"l0202009.pdf
Net system.)
.
%20Manual_2.1_5%20January%202009.pdf(This
(ThisURL
URLIsison
onthe
the FBI
FBINet
system.)
format for
The Intelligence Community fOrmat
for marking
marking classified
classified inlormation
information requires
requires a banner
banner line
line and
and portion
portion markings
markings on
on every
every p~ge,
page, and a classilication
classification authority block
block on
on the
the lace
face
01 each document or media. The format for banner lines and portion markings consists
consisls of eight calegories
Ie format also specifies
of
categories (as described in gray box below). The IC
specifies how
how to
to
series of
of markings
markings within
within them.
them. The
The categories
categories must
musl be
be listed in the
Ihe order shown
separate the categories
categories'and
andseries
shown in the
the Authorized Classification and Control Markings
Markings Register.
Register. Use
Use
(see yellow
yellow arrow) is an example of the formatting
formatling and ordering of the most
only categories and markings required to protect the inlormation.
information. The banner line
line below' (see
most frequently
frequently
I not intended
inlended to re.resent aa correct
correct overallI classification
I ft
k'
unctuation. ItI is
markin
used cate ories and r .uired DUI1CIIJa[lilon.
------- - ,------DISSEMINATION
DISSEMINATION CONTROLS.
CONTROLS.
Inthe
the REL
REL TO marking,
I\ In
marking, always
always list
list USA
USAfirst,
first,
i&EP)S6410414M
When
followed by other countries' ISO
ISO 3166
3166 trigraphs
When using
using multiple
multiple
trigraphs
485Pieit - OIA2Mi fil40.811
l'AVR
markings, separate
separate them
them with
with 1 I listed in alphabetical order by country name. Then
Then
markings,
Peratoa.ITINErEcvaaalevociirlecol onogimca.
,41004-iaa'6,
1
aa single
: list Annex
Annex A
tetrasraphs in alphabetical
single slash.
slash. LIst
List in order
A tetragraphs
alphabetical order
order.
(ROM (.&n.,-irticoceOlt
Wft,,q=c110). crica...reasWatieworole
cgq
, -ricoxcet
shown
ne .
Register.
Separate

shown In
in Markings Register_
orl30-ocralOCPOrVelnlid,
Separate tngraphsltetragraphs
trigraphs/tetragraphs with a comma and
and aa
1
space. The
Thewo~
word :and"
"and" has been el~~I~ated.
eliminated.
.
ANoareqouty
\ spac~
_
q.100.1X11-4r,eoracn-alsob:w Gr.,A..*.zuaL,

~--

UNCLASSIFIED//FOR OFFICIALUSE ONLY

,.

-----

TOP SECRETHHCS/COMINT-GAMMA/TIV/FGI CAN GSRRORCON/PROPIN/REL TO USA, FRA, FVEY


SCI CONTROL SYSTEMS/SAP. Identify the SCI control
systems and subsystems. Use a single slash (no space) to
separate SCI control systems. SCI subsystems. Use a
hyphen (no space) between the SCI control system
identifier (e.g., COMINT) and the SCI subsystem (e.g.
GAMMA). SI and COMINT are synonymous; may use SI or
COMINT in banner, but must use SI in portion markings.

FOREIGN GOVERNMENT
FOREIGN
GOVERNMENT INFORMATION.
INFORMATION.

Identify source
aourceof
ofFG.t
FGl in
Identify
in aa US-originated
US-originated
document. In
In banner
banner line,
line,use
useFGI
FGI o.
+
trigraph country code in alphabetical
alphabetical
order,
order, separated by a single space;
space; e.g.:
e.g.:
FGI GBR.
FGI
GBR. InInportion
portion markings,
markings, use
use
trigraph -toe portion
portion marking
marking for.
for
classtncation
VIGBR S).
S).
classification level;
level; e.g::
e.g (//GBR

6}100(00r
141 11gr;i! NOT ALL
0kb,

140''&-d.klifi
i flee
glakT-AOPriA
coaiimiowor .

Ili

qtaLtri-aroligeare

44r. ttin
JO a I C 41E1

55. Special Access Program


Program

6.
5. Foreign
Foreign Govemmanllnformallon
GOVORMIent Intonation

7. OlsS~mlnatl~
Dissemination Controls
Controls
7.

88. Non.lntellgence
Nontintelligence Communitv
Community foAarklngs
Maikmos

itytl

4. SCI Control Systems/Subsystems


HCS (HCS)
COMINT (SI)
-GAMMA (-GI (Requires ORCON)
-ECI [3-letter designator]
TALENT KEYHOLE (TK)
5. Special Access Program
SPECIAL ACCESS REQUIRED[program identifier] (SAR-BP)

rt _Clas f cation
If
os'AcE.O.Jaarrri
o akT.,00n .

44.561
SCI Control
Control System
System

S.
6. Foreign Government
Government Information
Information
Example: Canadian
Canadian Secret
Secret InformaUon
Information
Banner line: //FGI
flFGI CAN
CAN
Portion Marking:
(/JCAN S).
S). Use
Use FGI and
Portion.
Marking: (//CAN
claSSification
levelONLY
ONLY (//FGI
(IIFGI S) when
classification level
when
ba concealed.
concealed.
origin country must be

7. Dissemination Controls
FOUO
(FOUO)
ORCON (OC)
IMCON
(IMC)
NOFORN (NF)
PROPIN (PR)
Authorized for Release to... (REL TO)
RELIDO (new marking)
(RELIDO)
DEA Sensitive
(DSEN)
FISA
(FISA)
Law Enforcement Sensitive (LES)
(NOTE: In classified documents, LES
is not included in the banner line. See
http://www.intelink.sgov.govisites/ssc/cap
co/marking_rets/Marking%20References%
20Documents/LES%20Interim%20IC%20M
arking%20Guidance.doc for IC Guidance.)
-

8. Non-Intelligence Community Markings


Special Category (SC)
Sensitive Information (SINFO)
Limited Distribution (DS)
Exclusive Distribution (XD)
No Distribution (ND)
Sensitive But Unclassified (SBU)
SBU-NOFORN

40-611(.0

)11Xte1061).0.1!95iq
1Jitto*,-,4417ifteiiic.40#;9v4Itoli#60#00/04',.

F8VSecD/5PCAU Updated
FEII/SecD/SPCAU
UpdatedJul
Jul 2009lhma
2009/hma

ACLURM005505

!.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY'
ONLY

SECURITY AWARENESS BRIEFING FOR FBI


EMPLOYEES AND TASK FORCE OFFICERS

if
\,.

)I

el

All FBI employees are expected to abide by the standards of onduct


conduct set forth
forth in Title 5,
CFR, Section 2635, as supplemented by DOJ
DO] regulations, and by the rules and
regulations of the FBI pursuant to authorization set forth in Title 28,
28, CFR,
CFR, Section 0.137.
0.137.

PERSONNEL SECURITY
1) Must uphold values of
of reliability, trustworthiness, honesty, and integrity.
1)
integrity.
2)
2) Must be entirely frank and cooperative in answering inquiries of an administrative

nature.
nature.
3) Must not falsify information and/or
andlor documents for purposes of fraud
3)
fraud or personal
gain.
4)
4) Must not engage in illegal activities, criminal conduct, dishonest conduct, or
insubordination.
5)
5) Must report to the FBI any occurrence or activity which might reflect adversely
on the FBI or bring discredit to the Bureau.
Bureau.
6)
6) You are proscribed from managing any business or sales
sales activity inside FBI space
that you might have in connection with any other employment(s) in which you
might be involved.
7)
7) It is improper to engage in
in any
any illegal
illegal gambling
gambling activities.
activities. You should not
participate in lotteries, pools, betting, bookmaking, etc.,
etc., while in official duty
status or government property occupied by
by the Bureau.
Bureau.
8) You are accountable for your on/off duty alcohol-related misconduct whether or
8)
not you are specifically
specifically charged
charged with
with an
an alcohol-related
alcohol-relatedoffense.
offense. Never cause
yourself to be unfit for duty
UI
duty due
due to
to excessive
excessive alcohol
alcoholconsumption.
consumption. A first D
DUI
infraction, whether established by a conviction in court or as the result of an
administrative inquiry, will cause you to be suspended from duty
duty without
without payfor
pay for
If aggravating circumstances exist, you
a period of not l~ss
less than
than 30
30 calendar
calendar days.
days. If
may be terminated from employment.
employment.
9)
9) You may not solicit or collect contributions for any purpose while in Bureau
space without prior FBI approval.
approval.
10)
Gifts,
discounts, benefits, reduced memberships, etc.,
10)
etc., are prohibited if it was
offered as a result of your employment.
gratuities might be acceptable if
employment. Such gratuities
they are offered to all
all FBI
FBI employees,
employees, not
notjust
just you.
you. These gratuities may not be
accepted if offered by a "prohibited source" or if a conflict of interest exists.
exists.
11) You may give employment recommendations or act as
as a character reference for
Bureau personnel so long as your response is not based on FBI files or on any
information or data that you
you acquired
acquired by
by virtue
virtue of
of your
yourfederal
federal employment.
employment. Do
not use Bureau stationary, letters with the FBI seal,
seal, Or
or your official title or
posidon
Your response
response is your personal opinion and not the
position in your response.
response. Your
opinion of the FBL
FBI.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005506

22

UNCLASSIFIEOIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

i.

SI

el

lb
ID

12) You are expected


expected to maintain
maintain aa satisfactory
satisfactory credit
credit repUtation
reputation and promptly pay all
12)
of your debts.
13) It is incumbent upon you to stay current on any court-ordered obligations, such as
13)
child support, alimony, etc.
14) The following must be reported to your Division
Oi vision Security Officer:
14)
a) Requests to engage in outside employment.
You may
may not accept any other
a)
employment. You
SACIFBIHQ approval.
approvaL
employment without prior SAC/FBIHQ
b) Requests to have a roommate (a non-family member residing with you for
more than 30 days)
60 days
days prior
prior to
to the
the marriage date;
c) Marriages: 60
d) All types of arrests and civil
civ!llitigations
d)
litigations (i.e., divorce, separation, annulment,
etc.);
Aggravatedtraffic
traffic violations;
violations;
e) Aggravated
f) If you become a subject/suspect in a criminal matter;
f)
g) Financial problems:
g)
Filingfor
forbankruptcy
bankruptcy
i) Filing
Accounts placed
placed for
for collection
collection
ii) Accounts
iii) Property repossessed
Liens placed
placed against
against you,
you, including
including wage garnishments
garnisbments
iv) Liens
v) Civil judgments
v)
vi) Foreclosures
vi)
h) Foreign
Foreigntravel:
travel:3030days
daysprior
priortotoyour
yourtravel
travel(this
(this includes
includes official/unofficial
official/unofficial
foreign travel and any short excursions or day trips to other countries);
i) All contact with foreign nationals residing abroad or in the United states;
i)
States;
j) Gifts received from a foreign government.
15) An EAP counselor is available for consultation and guidance should you
experience emotional stress, personal problems, etc.
16) If
If you
you have been issued a Government Credit Card, it is for official use only.
Personal use to obtain goods, services, cash, etc., and nonpayment for'
for undisputed
andlor revocation of your security
balances may be cause for suspension and/or
clearance.
17) ALL FBI-owned, rented, or leased vehicles are to be used for official business
only.
18) No family members are permitted in any vehicle utilized by the Bureau without
18)
SAC approval.
19) The loss or destruction of certain Bureau property has security ramifications and
19)
Any loss
loss of
of Bureau
Bureau property must be immediately
must be vigilantly avoided.
avoided. Any
reported to your supervisor and to
to the
the Division
Division Security
Security Officer.
Officer. Any loss of
personal property within Bureau space should also be reported to the SO.

FACILITY SECURITY
1) Do not permit your Security Access Control System (SACS) badge to be
1)
photographed or photocopied at any time.
2) Safeguard your SACS badge at all times and do not leave it unattended.

UNCLASSIFIEOIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005507

23

119 11 11 11 11 1111 1111 S OO S II M OS,OS SO M SO OO SIIII II III II M S

UNCLASSIFlEDllFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
Immediatelynotify
notifythe
theDivision
DivisionSecurity
SecurityOfficer
Officer ifif your
your SACS
SACS badge is lost,
3) Immediately
stolen, or misplaced.
yourSACS
SACSbadge
badgeisistotobe
bevisibly
visiblyworn
worn at
at all
all times
times while
while in
in FBI space; do not
4) Your
openly display it in public areas.
Employeeshave
havethe
theright,
right,and
andresponsibility,
responsibility, to
to challenge
challenge (ID)
(ill) anyone in FBI
5) Employees
identi,fied.
space who is not properly identified.
Donot
notshare
share-yourSACS
your SACSbadge
badgeororaccess
accesscode
codenumber
numberwith
with any
any other
other person (not
6) Do
employee), '
even another FBI employee).
DoorCode:
Code: Do
Donot
notshare
shareititwith
withanyone.
anyone. IfIfyou
youdo,
do,your
your door
door code
code will be
7) Door
deleted, and you will not have electronic access to FBI space until after you have
met with your Division Security Officer.
" the various tvnes of had PPS'
8) B
Become familiar with
a)
a)
b)
b)
c)
c)
d)
~~~~-=~--~~~--~------.--------~----~
When
enteringFBI
FBIspace,
space,take
takenotice
notice of
ofthose
those around
around you
you as
as aa precautionary
precautionary
9) When
entering
If you do
method in preventing unauthorized persons
persons from
from entering
entering FBI
FBI space,
space. If
not know an individual
individual attempting
attempting to
to enter
enter FBI
FBI space,
space, ill
ID them.
them. Make sure the
door closes behind you, thus preventing someone from gaining unauthorized
access to FBI space
space..
be escorted
escorted at
at all
aJl times while
while in Bureau space and wear an
10) Visitors
Visitors m,st
mist be
appropriate
appropriat~
11) The
The last employee to leave a work area at the close-of-business must ensure the
area is secure and classified material is appropriately stored.

b7E

INFORMATION SECURITY/COMPUTERS
EM_securityclearance;
clearance;but
butnot
not all
all FBI
1) All FBI
FBI employees
employeeshave
havea~p
aZgrra3t.security
employees have a need-to-know
need-to-know what
what you
you are
are working
working on.
on. An appropriately
cleared individual may have a legitimate need-to-know if they require information
you possess in order to perform their
their official
official duties.
duties. You have the authority and
are empowered to grant or deny
deny others
others access
access to
to information
information you
youpossess.
possess. It is
your responsibility to conflfm
confirm the requestor's official Bureau need to obtain
information about your case in
in order
order to
to accomplish
accomplish his/her
his/herjob.
job. Inquire about the
other person's request for information.
information. If
Ifhe/she
he/she cannot
cannot convince you of the
official Bureau need for
for access,
access, you
you should
should deny
deny the
the request.
request. Curiosity is not a
valid justification for any attempt to gain access to Bureau information or space.
Do not disclose information to other persons who do not have a need-to-know
thi includes
'nc
.and
.
(this
even your closest relatives
friends).
__________________________
____
______
2)
2)~

~~

-.::::::=-:::::

b7E

ecurity
clearancedoes
doesnot
notautomatically
automaticallygrant
grantyou
you access
access to all
A tapo3t,t_security
clearance
FBI office space and to all FBI information.
UNCLASSIFlEDIIFOR
UNCLASSII-IED//FOR OFFICIAL USE ONLY

ACLURM005508

2244

a
a

a
a

aa

a
a

a
a
a

a
a

II

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
3) The security of FBI space and information, the nature of FBI work, and the
3)
security ofofFBI
personnel
and and
their their
Bureau-issued
propertyproperty
are ~aSDl....in
security
FBI
personnel
Bureau-issued
are min
nature and should not be discussed with individuals who do not have a
need-to-know.
4)
4) Employees should not needlessly identify themselves as FBI employees,
particularly in restaurants and other public spaces where they might easily be
within earshot of representati
ves of Foreign Intelligence Services
representatives
Services or other
criminal organizations.
Neither should
should employees
employees discuss Bureau work at
organizations. Neither
luncheons, in car pools, or in Qther
other areas outside the working space, even with a
social group consisting solely of Bureau employees.
employees.
5)
5) Do not allow unauthorized persons to use Bureau computers.
computers.
6)
6) Do not leave your work area if you
you are
are still
still logged
logged onto
onto the
the computer.
computer. Exit all
programs (especially FBINET) before you leave your computer unattended.
unattended.
7)
do not
not leave
leave itit on
on aa post-it where people can see it, i.e., on
7) Computer password:
password: do
the computer,
computer, under
under your
your desk,
desk, etc.
etc. Do not share it with others.
others.
8) All FBI information is categorized as
8)
as Classified or Unclassified but Sensitive (the
latter being equivalent to Law Enforcement Sensitive).
Sensitive).
9)
9) From 1985 to 1999, seventy-five federal employees were convicted of espionage.
espionage.
Only two of the 75 employees sought employment with the sole intent to commit
espionage. Also,
Also, approximately
approximately 80% of espionage
espionage.
espionage is
is conurutted
committed by
byinsiders.
insiders. In
almost every case, these insiders gained access to information not pertinent to
their jobs by circumventing
circumventing the
the need-to-know
need-to-know principle.
principle. They were able to do so
because their co-workers failed to properly restrict access to classified
classified and/or law
enforcement sensitive information under their control.
.
control.
10)
Working
copies
of
official
Bureau
documents
are
for
official
business
and not for
10)
personal use.
use.
11) Unsolicited telephone inquiries for FBI information should not be disclosed if the
11)
identity of the caller is unknown and/or if the caller does not have a need-to-know.
need-to-know.
Classified information cannot be discussed over non-secure
telephone
non-secure telephone lines.
lines.
12)
Official,
unclassified
Bureau
trash
must
be
disposed
of via the use
12)
use of
white-rimmed wastebaskets. These wastebaskets are to be emptied each day at the
close-of-business.
13) Whenever Bureau mail of any type is carried on elevators, in corridors, or in other
13)
public spaces, the material should be covered.
covered.
14)
Bureau
work should not be taken into restrooms
14)
restrooms or lounges
lounges at any
any time.
time.
15)
You
are
not
allowed
to
take
home
investigative
files
or
serials.
serials.
15)

THREATS TO NATIONAL SECURITY

fib

Thepossibility
possibilityexists
existsthat
thatyou
you could
could become
become aa target
target of
of recruitment from various
1) The
groups/entities who seek information
information from
from the
theFBI.
FBI. Why are you
you a target?
target?
a) Your
Youremployment
employment with
with the FBI;
FBI;
Youare
areperceived
perceivedas
ashaving
having access
access to
to an
an intelligence
intelligence agency; and
b) You
c) You
Youhave
haveaccess
accessto
toaalaw
law enforcement
enforcement agency.
agency.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005509

25
25

II.

GO

0
.

in

O
O

UNCLASSIF1ED//FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

2) Who
Who may
may target
target you?
a) Organized drug rings
a)
b)
b) Gangs
c)
c) Mafia organizations
d) Individual drug dealers
d)
. e)
-White collar
e) -White
collar criminals
f)
f) International and domestic terrorist groups
g)
g) Radical militant groups
h)
h) Foreign intelligence serviCes
services
Howcould
could you
you be
be targeted?
targeted?
3) How
a) Recruitment:
Your cooperation
cooperation can
can be
be actively
actively solicited by any of the
a)
Recruitment: Your
aforementioned groups;
groups;
b)
Your willingness
willingness to
to provide
provide information,
information, of
of your own volition,
b) Volunteer:
Volunteer: Your
motivated by factors such as greed, discontentment, dissatisfaction, revenge,
revenge,
etc.
c) Coercion:
Using extortion
extortion tactics
tactics to
to exert
exert pressure on you as a means to force
c)
Coercion: Using
you to cooperate;
d)
Attempts to
to put
put you
you in
in aa situation that could jeopardize your
d) Compromise:
Compromise: Attempts
affiliation with the FBI if you do not cqoperate
cooperate with them, such as sex,
sex, drugs,
drugs,
prostitution, criminal acts, etc.
4) You
Youhave
havean
anaffirmative
affirmativeobligation
obligation to
to notify
notify the
the Bureau
Bureau in writing if
if you become
a target, or suspect that you may have become a target.
youobserve
observesomething
somethingcontrary
contrary to
to good
good security,
security, contact
contact the Division Security
5) IfIfyou
Officer.
youare
areexperiencing
experiencingfinancial
financial difficulty,
difficulty, emotional
emotional stress,
stress, personal problems,
6) IfIfyou
etc., contact your EAP Counselor and/or seek professional counseling.
. Ifyou
youhave
haveany
anyquestions,
questions, call
call the
the Division
Division Security Officer
7) If
TELEPHONE AND FACSIMILE MACHINE
1) Telephones are
are not considered
considered secure.
secure. Any classified conversation should be
1)
conducted on a STU or STE telephone.
2) Facsimile machines are not considered secure and should not be used for
2)
Classified documents
documents should be faxed on secure fax
classified information.
information. Classified
fax
machines and those clearly marked for the transmittal of classified information.
information.
SCI information may only be sent from and received in an approved SCIF by an
authorized person
person maintaining
maintaining the
the appropriate
appropriateaccesses.
accesses. SCIF
SOF locations vary, but
the presence of FBI personnel does not necessarily indicate the presence of a
SCIF.

SECURITY INCIDENT PROGRAM


Thegoal
goa!of
ofthe
theSecurity
SecurityIncident
Incident Program
Program (SIP)
(SIP) is to reduce the number of
1) The
security incidents on the part of FBI personnel and associates (JTTF, contractor,
vendor,
This can
can largely
largely be accomplished
accomplished through education ofthe
vendor, detailee).
detailee). This
of the FBI
population, whiCh
which will lead to committed vigilance to protect FBI and IC equities.
equities.
UNCLASSIFIEDflFOR
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY

ACLURM005510

26

;e

I:

ID

ID
.
a
a

el

4111

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
securityincident
incidentisisaafailure
failuretotosafeguard
safeguard FBI
FBI material
material in
in accordance
<l;ccordance with FBI
2) AAsecurity
policies and other IC directives and is categorized as a violation or an infraction.
infraction.
A security violation is any incident that results in the actual loss, compromise,
or suspected compromise of classified national security information or
unclassified information. For example, if an employee transmits a classified
document over an unclassified facsimile machine, the incident would be
determined to be a security violation, due to the real possibility for electronic
interception and transcription of the classified document. A security infraction
of security and that does
is any other incident that is not in the best interest of
not involve the loss, compromise, or suspected compromise of classified
national security information. For example, at the end of a workday, an
, employee leaves a security container unlocked and unattended, containing
classified information, in an area approved for storage of classified information.
information.
No unauthorized entry took place.
This incident
incident would
would be determined to be a
place. This
security infraction because Bureau policy requires that classified material be
secured properly after hours, even though no actual compromise occurred in this
case.
Whenaasecurity
securityincident
incidentoccurs,
occurs,swift
swiftand
andefficient
efficientattention'
attention' must be afforded to
3) When
ensure the minimization of any possible damage through notification to
to the
authorities. Security
Security incidents
incidents should
should be reported immediately
appropriate authorities.
utilizing the SIP form located on
on the
the Security
Security Division
Division Website.
Website. Instructions are
included with the form, which is prompting, based on the information provided by
the reporting individual.

PROPER HANDLING OF FEDERAL TAXPAYER INFORMATION (FTI)


1) Internal Revenue Code (IRC) prescribes felony penalties for Federal employees
1)
who make illegal disclosures
disclosures of Federal
Federal Tax
Tax returns
returns and
and return
return information.
information. IRC
makes unauthorized inspection of FTI by a Federal employee a misdemeanor
offense, plus discharge from federal employment. IRC prescribes civil damages
for unauthorized inspection or disclosure of FT1.
FTI. The FBI is authorized t~
to receive
FTI but must have adequate programs in place to protect the information received.
received.
2)
2) Oversight of the safeguarding of FTI is delegated to the Security Compliance Unit,
Security Operations Section, Security Division, and FBIHQ. Each field office
must establish and maintain uniform safeguard standards consistent with
with IRS
guidelines. A
A Taxpayer's
Taxpayer's Information
Information field
field has
has been
been established in ACS,
therefore, all FTI entered should be appropriately marked.
3) FBI is required to establish a permanent system of standardized records of
3)
requests made, by or to them, for disclosure of FTI, including requestS
requests among
Authorized employees must be
employees, as well as from
from outside
outside agencies.
agencies. Authorized
responsible for securing magnetic tapes/cartridges containing FTI before,
before, during
and after processing.
processing.
4) FBI is required to restrict access to FTI only to persons whose duties or
4)
responsibilities
responsibilities require access
access on
on a need-to-know
need-to-know basis.
basis. FTI should be clearly

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR oFFICIAL
OFFICIAL USE ONLY

ACLURM005511

27
27

'

UNCLASSIFIED/IFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
It is
is recommended that FTI be kept
marked "Federal Taxpayer Information."
Information." It
otherinformation to avoid inadvertent disclosure. In cases where
separate from other
separated. the file should be clearly labeled
the information may not be physically separated,
to indicate that FTI is contained in the file.
5) FTI will be furnished by the IRS to state tax agencies only for administration
Furtherdisclosure
disclosure by
by authorized
authorized receiving
receiving state
state agency
agency is not permitted.
purposes. Further
6) Granting an employee access to FTI should
should be preceded by certifying each
6)
employee understands the FBI's.policyand
FBI's policy and procedures for safeguarding FTI.
7) FTI,
FTI,including
7)
including any copies made, must be returned to the IRS or render the
"un-Disclosable." If
Ifinformation
information is returned
returned to IRS, use a receipt
information "un-Disclosable."
Otherwise, FTI
ErI should
should be
process and maintain'IlJAftdcI~of
rnaintainD3rfoicrif4X4Lof information.
information. Otherwise,
mulching. pulping, shredding or disintegrating.
diSintegrating.
destroyed by burning, mulching,

SECURITY AWARENESS CERTIFICATION


I acknowledge that I have been afforded a Security Awareness Briefing regarding my
responsibilities as an employee of the FBI.
My signature
signature below
below asserts
asserts that I fully comprehend
FBI. My
my security related duties/responsibilities and affirms my commitment to the FBI's security
regulations. and procedures
policies, regulations,

__________________~(D~o~n=o~t~sl=gn~.~T.h~I~s~~~an~ex~a~m~p~l~e~o~n~ly~)
(Do not sign. This is an example only)___________________
(Individual Briefed / Print Name)
(Signature)
(Date)

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005512

2288

ACLURM005513

11 II II II II
II II II II II II II IIIIII 11II11 IIII II II II II II II II

II 11 11 11II 11 II1
1 II

II

OS S1111 11 11 1111 111111S OO SS OS S OS SO ISS OS SIB O O S SII II MI1 11 11 11

UNCLASSIFIED//FOR OFFICIAL USE ONLY

TERRORISM 1
CRIMINALIZING TERRORISM1
The United States Constitution recognizes the inviolable right to free expression

and free association, and the right to be free from deprivations of liberty or property
law." As
As interpreted
interpreted by
by American
American courts, persons in the United
without "due process of law."

States cannot be prosecuted for their thoughts alone, nor can the United States criminalize
As aa result,
result, our
our criminal jurisprudence
conduct protected by the First Amendment.
Amendment. As
acts, rather
rather than
than thoughts
thoughts or speech unattached to particular conduct.
stresses definable acts,
of terrorism crimes prosecuted in the United States follows this
The structure of
Thereisis no
no crime
crime of
of"being
"being aa terrorist"
terrorist" or "thinking
"thinking terrorist
tradition. There
terrorist thoughts."
thoughts." While
Code defines
defines the
the "federal
"federal crime
crime of
ofterrorism".
terrorism". (Title 18, United States
the United States Code

Code, Section 2332b (g)(5)), as an offense that is calculated to influence or affect the
of government by intimidation or coercion, or to retaliate against government
conduct of

conduct; and it then simply lists all the terrorism-related crimes for ease of reference.
convicted of
of the "federal
"federal crime of terrorism," because there is no such
Persons cannot be convicted
Title18
18does
doesdefine
define"international
"international terrorism"
terrorism" and
and "domestic
"domestic terrorism" in section
crime. Title
Bothpertain
pertainto
to activities
activities that
that involve
involve acts
acts that
that are
are dangerous
dangerous to human life, that
2331. Both
of federal or state criminal law, that appear to be intended to intimidate or
are a violation of
to influence the policy of a government by intimidation or
coerce a civilian population; to
coer~ion; or to affect the conduct of
of a government by mass destruction, assassination, Or
coercion;
or

kidnapping. The
Themajor
majordistinction
distinction isis that
that international
international terrorism
terrorism occurs primarily outside

lCounterterrorism Enforcement:
Enforcement: AA Lawyer's
Lawyer's Guide by Jeff
'Counterterrorism
Breinholt, Office
Office of
of Legal
L.egal Education,
Education, U.
u. S.
S. Department of
Breinholt,
Justice, May 2004.
2004.
Justice,
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005514

29

SO O OS S O SO S S O CIS SID O O SS O OS IMINI S 11 1111 1141 1111 O S S II S

UNCLASSIFIED//FOR OFFICIAL USE ONLY

the territorial jurisdiction of the United States and domestic terrorism occurs primarily
within the United States.
Terrorism crimes have developed in the same manner as other law enforcement

areas. Policyrnakers
Policymakers determine what negative results should be prevented, and then craft
criminal laws that take into
into account how
how such
such results
results are
are generally
generally achieved.
achieved. On
sho~ld necessarily be discouraged, if
occasion, acts that are criminalized are not ones that should

th'e offensive conduct sought to be


committed by persons not otherwise involved in the
In such
such cases,
cases, laws
laws are
are crafted
crafted to
to criminalize
criminalize such
such conduct only when
prevented. In
A good
good example is title 31 U.S.C. 5324,
committed in particular circumstances.
circumstances. A
Congress .crafted
Structuring
this -statute
to target persons who
..Currency Transactions. Congress .crafted
.
.....
"'-"," "

~ ".-.-~.

make large sums of cash by illegal


illegal means;
means; drug
drug dealers,fences,
dealers, fences, etc.
etc. The law prohibits
conduct that is not inherently offensive (making several large cash deposits in a single
day) in those circumstances that separate the
the innocent
innocent from
from the
the guilty.
guilty. A legitimate cash
businessman, has no problem filing the required report while the criminal attempts to
businessman

avoid the report to keep from coming to the attention of authorities.


Some of the various crimes that may be utilized in investigating "terrorism" are
listed below. In
line with
with our
our legal
legal tradition,
tradition, these
these crimes
crimes are
are based on the recognition of
In line
. how terrorists behave, rather than what they believe and who they are as the emphasis is
on acts rather than status or beliefs.
An asterisk
asterisk (*)
(*) next to
to the title of
of the offense denotes
beliefs. An
that it is listed as a "Federal crime
crime of
of terrorism"
terrorism" within
within 18
18U.S.c.
U.S.C.2332b
2332b(g)
(g)(5).
(5). These
offenses apply to "international terrorism"
terrorism" or
or "domestic
"domestic terrorism"cases
terrorism" casesor
ortotoboth.
both. Not
Not
.

c0II!-e within the jurisdiction of the FBI but may be applicable


all of the following statutes come
.associated
to other agencies
associated
with the JTTF, nor is the list inclusive.
.
.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005515

30

UNCLASSIFIED/FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
STATUTES

Title 8

1324
1324

Alien smuggling .

1325
1325

megal entry by an
an alien
aiien
Illegal

1326
1326

of aa deported alien
Unlawful reentry of

1328

Importation of aliens for immoral purposes

GI

Title 18
32

of aircraft or aircraft facilities*


Destruction of

37

Violence at international airports*

43

Animal enterprise terrorism

81

Arson within special maritime and territorial jurisdiction*

112

of foreign officials, official guests, and internationally protected


Assaults of
persons

113

Assaults within special maritime and territorial jurisdiction

175

Prohibitions with respect to biological weapons*

175b

Possession by restricted persons*

229

Prohibited activities (relating to chemical weapons)*


weapons)*

231
231

Civil disorders

232

Definitions

351
351

Congressional, Cabinet, and Supreme Court assassination, kidnapping and


assault*

373
373

Solicitation to a crime of violence

831
831

Prohibited transactions involving nuclear materials*


materials*

842

Unlawful acts (relating to


to explosives)*
explosives)*

ID

411

flb

UNCLASSIFlEDJIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL

ACLURM005516

31
31

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

844

844

Penalties (regarding to arson and bombing)*

878
878

against foreign officials, official guests, or


Threats and extortion against
.
internationally protected persons

922

Unlawful possession of a firearm

930

Possession of firearms and dangerous weapons in federal facilities*

951
951 et
Neutrality violations
violations

et seq
seq Neutrality

956
956

Conspiracy to murder, kidnap, or maim persons abroad*

960

Expedition against a friendly nation

1028A
1028A

Aggravated identity theft

1030

Fraud and related activity in connection with computers*

1038
1038

False information and hoaxes

1114

Protection of officers and employees of the United States*

1116

Murder or manslaughter of foreign officials, official guests, or


internationally protected persons*
persons*

1201

Kidnapping of foreign officials, official guests,


guests, or internationally protected
persons

419

1203

Hostage taking*

1362

Communication lines, stations or systems*


systems*

1363
1363

Buildings or property within special maritime


maritime and
and territorial
territorial jurisdiction*
jurisdiction*

1365

Tampering with consumer products


products

1366
1366

Destruction of an energy facility*


facility*

1751
1751

Presidential and Presidential staff assassination,


assassination, kidnapping,
kidnapping, and assault*
assault*

1956

Money
Money laundering
laundering

1957
1957

Unlawful monetary
monetary transaction
transaction

1960

Operating an unlicensed money


money transmitting business
business

I.!-

i.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE
USE ONLY

\-

ACLURM005517

32

so

SS
S

lb

11
ID

S
S
S

S
S
S
S

S
S

UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY
UNCLASSIFIED//FOR

1958

1958

Murder for hire


Murder

1992
1992

trains*
Wrecking trains*

1993
1993

of violence
violence against
against mass transportation
Terrorist attacks
attacks and
and other
other acts
acts of
Terrorist
systems*
systems*

2101

Riots

2102

Definitions

2155

of national-defense
national-defense materials, national-defense premises, or
Destruction of
utilities*
national-defense utilities*

2280
2280

Violence against maritime navigation*

2281

Violence against maritime fixed platforms*

2331

Terrorism definitions

2332

Terrorism criminal penalties*

2332a

Use of certain weapons of mass destruction*

2332b
2332b

Acts of terrorism transcen.ding


transcending national boundaries
boundaries**.

2332d

Financial transactions

2332f
2332f

Bombings of places of
of public use, Government facilities, public
transportation systems and infrastructure facilities*
facilities*

2339
2339

Harboring terrorists*
terrorists*

2339A
2339A

Providing material support to


to terrorists*
terrorists*

2339B
2339B

Material support to terrorist organization*


organization*

2339C
2339C

Relating to financing
financing terrorism*
terrorism*

2340A
2340A

Torture*
Torture*

2384
2384

Seditious
Seditious conspiracy
conspiracy

2381
2381

Treason

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

ACLURM005518

33
33

i S

UNCLASSIFIED//FOR OFFICIAL USE ONLY


Title 31
5324(a)(3)
(3) Structuring
Structuringtransaction
transactionto
to evade
evade reporting
reporting requirements
5324(a)

Title 42
2284
22~4

Sabotage of nuclear facilities or fuel*

Title 49

46502
46502

Aircraft piracy*

46504
46504

Interference with flight crew members and attendants*

46505
46505

Carrying a weapon or explosive on an aircraft*

46506
46506

Application of certain crimi?allaws


criminal laws to acts on aircraft*

46507
46507

False information and threats

60123
60123

Destruction of interstate gas or hazardous liquid pipeline facility*

Title 50

1701
1701

illegal transactions with prohibited groups or individuals


Illegal

INVESTIGATIVE GUIDELINES
The United States Attorney General has established Guidelines to have a
specified matters and to enable agents to perform their duties with
consistent policy in the specified

greater certainty, confidence and effectiveness, and assure the American public that the
Two separate
separate and
and distinct
distinct Guidelines have been
FBI is acting properly under the law.
law. Two
One, "The
"TheAttorney
Attorney General's
General'sGuidelines
Guidelines on
on General
General Crimes,
Crimes, Racketeering
established. One,

Enterprise and Terrorism Enterprise Investigations" govern the circumstances under


which general criminal and criminal intelligence investigations are conducted by the FBI.
The investigations pursuant to these Guidelines are applicable to Domestic Terrorism

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005519

34

a
a

I
I"

S
S

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
InvestigatIons (TEI)"
(TEl)" section and are
(DT) investigations using the "Terrorism Enterprise Investigations

worked by the JITF


JTTF

b7E

S
S

S
S
S
S

S
S
S
S
S
S
S

In their general structure, both Guidelines provide graduated levels of

investigative activity, allowing the FBI the necessary flexibility to act well in advance of
the commission of planned terrorist
terrorist acts
acts or
or other
other federal
federal crimes.
crimes. The three levels of
(1) Threat
Threat Assessment
Assessment (TA),
(TA), the prompt and extremely limited
investigative activity are:
are: (1)

checking of initial leads, (2) Preliminary Investigation (PI), and (3) Full Field
The conduct
conduct of
of investigations
investigations authorized
authorized under the Guidelines may
Investigation (FFI).
(FFI). The
present
preSent choices
choices between
between the
the use
use of information
information collection methods
methods that are more or less

intrusive, considering such factors as the effect on the privacy of individuals and potential
As Executive
Executive Order
Order 12333
12333 2.4 provides, "the least intrusive
damage to
to reputation.
reputation. As

collection techniques feasible"


feasible" are to
to be
be used
used in
in such
such situations.
situations. It is recognized,
recognized,

S
S
S

however, that the choice of techniques


techniques is
is aa matter
matter of
ofjudgment.
judgment. The FBI must comply

S
S

policies, and Attorney General


General Guidelines.
Guidelines. The following general descriptions of

S
S

investigations apply to both DT and IT investigations.

with all requirements for use of a technique set by statute, Department regulations and

'The
The applicable

b7E
.137E

S
S

S
S
S
S
S

guideline provides specific authority for the investigations and should be reviewed and

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005520

35
35

O
4111

ED

UNCLASSIFIED//FOR OFFICIAL USE ONLY


relied upon. These
These general
general descriptions
descriptions are
are provided
provided to
to assist
assist aa new
new task force member
upon initial assignment to the JTTF.

Assessments:
The lowest level of investigative activity is the "prompt and extremely limited
checking out of initial leads," which should be undertaken whenever information is
received of such a nature that some follow-up as to the possibility of criminal activity is

This limited
limitedactivity
activity should
should be
be conducted
conducted with
with an
an eye toward promptly
prompt:ly
warranted. This

fib

determining whether further investigation (either a Preliminary Investigation or Full Field

Investigation) should be conducted.

ID

ID

ID

ePD:
Preliminary Investigation (PI):

The next level of investigation is the Preliminary


Preliminary Investigation.
Investigation. A PI is short of a
Full Field Investigation and
and,.allows the government to respond in a measured way to
ambiguous or incomplete information, with as little intrusion as the needs of
of the situation
permit. Such
Suchinquiries
inquiries are
are carried
carried out
out to
to obtain
obtain the
the information
information necessary to make an
informed judgment as to whether a Full Field
Field Investigation
Investigation isis warranted.
warranted. A PI is not a
required step. When
When facts
facts or
or circumstances
circumstances reasonably
reasonably indicating
indicating criminal activity are
already available, a Full Field Investigation can
can be
be immediately
immediately opened.
opened. Where a PI fails
to disclose sufficient information to justify a Full Field Investigation, the FBI shall

terminate the investigation and make a record of the closing.


All lawful investigative
mail openings,
investigative techniques
techniques may'be
maybe used in a PI except mail
non-consensual electronic surveillance or any other
other investigative technique covered in
Title 18, United States Code, '2510-2552.
2510-2552. (See the current DIOG, and "Use and

Approvals for
for Investigative Techniques" in Tab 6).

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005521

3366

UNCLASSIFIEDJIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
Full Field Investigation (FFI):
of Full Field Investigations conducted by ~he
There are several types of
the FBI.
b7E

!They,
They, of course will be available once the

L _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.....

TFO has his clearance.


For DT
DT investigations
investigations two,
two, general
general crimes
crimes investigations (FBI
clearance. For

Classification 266) and Terrorism Enterprise Investigations (FBI Classification 100), will
The choice
choice of
ofthe
the type
type of
ofinvestigation
investigation depends
depends on the information and
be discussed. The
A general
general crimes
crimes investigation
investigation may
may be initiated where facts or
investigative focus.
focus. A

circumstances reasonably indicate that a federal crime has been, is being, or will be
Preventingfuture
future criminal
criminal activity,
activity, as
as well
well as
as solving
solving and
and prosecuting crimes
committed. Preventing

that have already occurred, is an explicitly authorized objective of general crimes


The "reasonable
"reasonable indication"
indication" threshold
threshold for
for undertaking
undertaking such an
investigations. The

investigation is substantially lower than probable cause.


TEl is the second type of FFI in a DT investigation and is a criminal
A TEI
ofcriminal
criminal intelligence
intelligence investigations is the group
The focus
focus of
intelligence investigation. The

or enterprise, rather than just


just individual
individual participants
participants and
and specific
specific acts.
acts. The immediate
purpose of such an investigation is to obtain information concerning the nature and
enterprise-including information relating
structure of the enterpriseincluding
relating to
to the
the group's membership,

finances, geographical dimensions, past and future activities, and goals-with


goalswith a view
toward detecting, preventing, and prosecuting the
the enterprise's criminal activities.
of a long-term nature, may provide vital
Criminal intelligence investigations, usually of
The threshold
threshold is
is the same
same as for general crimes,
intelligence to help prevent terrorist acts.
acts. The

"reasonable indication".

UNCLASSIFIEDJIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005522

37

UNCLASSIFIED//FOR OFFICIAL USE ONLY


among. others,
All lawful investigative techniques may be used in a FFI including, among

use of confidential informants, undercover activities and operations, interviews and


pretext interviews of the subject and others, mail covers, physical, photographic, and
video surveillance, polygraph examination, grand jury subpoenas, nonconsensual

electronic surveillance, pen registers and trap and trace devices, accessing stored wire and
electronic communications and transactional records, consensual electronic monitoring,
of such methods under the
All requirements
requirements for
for the
the use
use of
and searches and seizures. All

Constitution, applicable statutes, and Department regulations or polices must; of course,


" Use and
and Approvals for Investigative Techniques" in Tab 6).
be observed.
observed. (See "Use

CONCLUSION
The United States counterterrorism enforcement mission was permanently altered
One of
ofthe
the most
most significant
significant changes
changes was
was the role of the federal
on September 11, 2001. One
prosecutor and the enforcement of federal
federal laws
laws relating
relating to
to terrorism.
terrorism. Immediately after
task of the Department
the 9111
9/11 attacks, the Attorney General announced that the primary task

of Justice would be preventing future terrorist attacks before they occur.


This was not necessarily a new concept, as federal prosecutors have long been
The true
true significance of this
involved in the early stages of criminal investigations.
investigations. The
position stems from the urgency of the mission, the clarity of the mandate, and other

systemic changes that followed


followed the Attorney
Attorney General's
General's announcement.
announcement. The new priority
is on prevention of attacks rather than investigation and prosecution after an attack.
Criminal prosecution is just one of the many tools available to realize the mission of

identifying, preventing, and deterring acts of terrorism within the United States.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005523

38

S
S

S
S

S
S

S
S

S
S

S
S
S
S
SS
SS
SS
SS
SS
SS
SS
SS
SS

ACLURM005524

(11

ID

lb

411

ID

el
411
ID
ID
411

411

411

411
411

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

REQUIRED DOCUMENTATION

>

Opening"an Assessment
Opening-an
./
Open a Guardian Assessment

>

Closing an Assessment
./
v Closing EC

,>

Converting an Assessment to a Preliminary Investigation or Full Field


Investigation
./
(sameasasOpening
OpeningPreliminary
PreliminaryInvestigation
Investigation or
or Full
Full Field Investigation
V (same
above)

Opening a Preliminary Investigation


>
EC(Includes
(IncludesOpening
Openinginformation,
information,Notification
Notification of
of Initiation
Initiation and VGrOF
1./EC
VGTOF
entry)
./
Opening LHM (enclosed as an attachment)
'./
VGrOF Form/FD-930
FormIFD-930
V VGTOF
Closing
Closinga aPreliminary
Preliminary Investigation
Investigation
>
./
*Must include
include justification for closing case
v Closing EC *Must
./
ClosingLHM
LHM(enclosed
(enclosed as
a~ an
an attachment)
attachment)
V Closing
./
VGrOF Removal Form (FD-930)
VGTOF
./
NotificationtotoDepartment
Department of
of Justice
Justice (FD-320)
(FD-320)
V Notification
*Only if case is opened by
United
by United States
States Attorney's
Attorney's Office
Extending a Preliminary Investigation
>
./ Extension EC
.4

>

Converting a Preliminary Investigation to a Full Field Investigation


./
v Conversion BC
EC
./LHM
LHM

Opening a Full Field Investigation


>
./
N7 EC (Includes Opening information, Notification of Initiation and VGrOF
VGTOF
entry)
./
Opening LHM (enclosed as an attachment)
./
VGrOF
VGTOF FormJFD-930
Form/FD-930

> Closing a Full Field Investigation


./
ClosingEC
BC*Must
*Mustinclude
include justification
justification for
for closing case .
V Closing
./
ClosingLHM
LHM(enclosed
(enclosed as
as an
an attachment)
attachment)
V Closing
./
VGrOF
VGTOF Removal Form (FD-930)
./ Notification to Department of Justice (FD-320)
v
(FD-320)
*Only if case is
is opened by
by United
United States
States Attorney's
Attorney's Office

UNCLASSIFIED/IFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

111

ACLURM005525

39
39

UNCLASSIFIED//FOR OFFICIAL USE ONLY

~ Extending
ExtendingaaFull
FullField
Field Investigation
Investigation
>
if
v" Extension EC

>
~ Annual Summary for a Full Field Investigation
if
Annual Summary EC
if Annual Summary LHM

>~

~ Reporting
ReportingGrand
GrandJury
JurySubpoena
Subpoena Return
Return
>
'. if
FD-302

>
~

Issuing a Grand Jury Subpoena


if
Subpoena Request Form
if FD-302

Issuing a National Security Letter


if NSL
NSL(LHM)
(LHM)
if NSL EC (Created within FISAMS)

./

ED 542

b7E

~ Serving National Security Letter Return


>
if
FD-S42 (Serving NSL)
FD-542

~ Requesting Surveillance by SSG


>
if Surveillance Request Ponn

Form
if FD-542
FD-S42 (Requesting Surveillance)

~ Reporting
ReportingSurveillance
SurveillanceConducted
Conducted by SSG
>
if FD-542 (Surveillance Conducted)

~ Reporting
ReportingSurveillance
SurveillanceConducted
Conducted by JTTF
>
if FD-302 or Surveillance Log

~
>

Request Training
if FD-878
if
Training Request Form (TRF)

~ Reporting
Reportingan
anInterview
Interview
>
if FD-302

~ Reporting
ReportingaaTrash
Trash Cover
Cover
>
if FD-302
if FD-S42
FD-542 (to document analysis of and claim statistical accomplishment)

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005526

40

11 10 0 9 11 11 118 11 11 911 0S OS S 11 11 1111 11 11 11 111111 11 8 11

UNCLASSIFIEDlfFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
):> Reporting a Collision
>
v" Collision EC

v'" SF-91

v"
ST-3 (Completed by Police Officer on scene)
v" Police Report (Completed by Police Officer on scene)

v" An FBI Agent must respond to scene as he/she will need to complete

EC/302.
.
):>
Submitting
General
Evidence
>
v" FD-302

v" FD-597 (Evidence Log)

v"
FD-l92
FD-192 (Evidence Submission Form)
v"
Chain of Custody
):> Submitting Film for Processing
>
v" FD-523 (AIRTEL)

v"
Coor~inator for applicable contact)
(See contact list or JTTF Coordinator
):> Submitting Electronic Evidence to be Analyzed
>
v" FD-302 (if
(if not already documented on evidence/surveillance logs, etc)

v"
FD-597
(Evidence
Log)

v"
FD-192
(Evidence
Submission Form)

v"
Chain
of
Custody

v" EC tothe

to'the Computer Analysis Response Team Requesting Analysis


):>
>

Submitting Toll Records to be entered into Telephone Apps.


Apps.
v" Enclose in FD-340 (1A)
(lA) and send to (See contact list or JTTF Coordinator

for applicable contact)

Investigative Reports
EC (Electronic Communication):
Communication):
The purpose of the Electronic Communication (EC)
(EC) is
is to
to communicate
information within the FBI.
FBI.
EC applications:
applications: (examples)
):>
> Open and close cases
):>
> Document results of a lead
):>
> To report the status of your investigation
):>
> Document investigative activity
):>
... ).
> To request investigative assistance (SSG,
(SSG, SOG,
SOG, etc
etc...).
):>
> To request action to
to be
be taken
taken
):>
> Sending information to
to your file
file
**Can
Accomplishment**
**Can not claim a statistical Accomplishment**

UNCLASSIFIED/fFOR
UNCLASSIFIED//FOR OFFICIAL USE
USE ONLY
ONLY

ACLURM005527

41
41

a
a
a
a

UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
When an EC is communicating information outside of the originating division,
division,
two
First, your EC must contain a "TO:" line,
two components
components are
are necessary.
necessary. First,
indicating the
the division(s)
division(s) receiving
receiving the
the EC.
EC. It is important to remember that if
more than one division is listed, they must appear in alphabetical order (with
Headquarters divisions listed first).
*see Example
Example 1I
first). *see
Example 1

(F".GIJI.1D3)
(F..0131-203)

FEDERAl. BUREAU
FEDERAL
BUREAU OF
OF INVESTIGATION
INVESTIGATION

Preced~.ce: ROUTINE
ROUTI HE
Precedence:

~..,:

nate:
03/3112005
Date:'. 03/31/200S

A
Attn: STFSO
SSA
Attn:
Attn: SFO .
Att.:

Counterterroris1L.
Counterterrorism.
Atlanta
Hou.ton
Houstonn

itt.:
..."Drn:oe~---I
Attn: SA
SA .l::an::::
ane
oe

b6
b6
b7C
b7C
b7E
b7E

Froa:
San Antonio
An tenie
From: San
Squad 11/CTIJITFlAnetin
Squad
fl/CTIJITFrAnstjp. Pecident
Re 5id ent Agency
Agencv
Contact:
Co.
tact: TFO

;;

====~

Approved BV:
By: :=1
lppraved
Drafted BV:
By: I,
Drafted

'IttlD1n

*S.

Case
ID I: ....
, -'======r,..I(pendin9)
Case ID
((Pending)
S: I

Title:
IT THREAT
TIIREAT ASSESSMENT
ASSESSHENT
Title: IT

Synopsis: To
To provide
pro9ilie infornation
informatioll in
1D reference
reference to
to interview
iDter~iev of
of
Synopsis:
captioned subject.
subject.
captioned

The second requirement is a "Lead"


"Leac/' section. Setting a Lead is a function of the
EC macro and if selected, the Lead will automatically be placed at the end of your
EC. ItItisis important
importantto
to remember
remember that
that if
if more
more than one division is receiving the EC,
a separate lead must be set for each division,
division, and they also
also must appear in
alphabetical order (with Headquarters divisions listed first).
*see Example
Example 2
first). *see

*NOTE:
*NOTE: The
The "To:" section must correspond
correspondwith
withthe
the "Lead"
"Lead" section.
section. That is to
say that
that/or
for every Division listed as a receiving division,
division, a corresponding Lead
division.
must be set/or
set for that division.
Following are the three approved Lead types:
types:
1)
1) "Action Required"
Required" - This type of lead will be used if the sending office requires
the receiving office to do some action (interview victim, locate person, etc.).
etc.).
2)
Action 11 -- This type of lead will be used if the sending office has
2) "Discretionary Action"
SOme information that may be of importance
some
importance to
to the
thereceiving
receivingoffice.
office. It mayor
may or
may not require action by the recipient and the recipient will decide what, if any,
any,
UNCLASSIFIED/IFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005528

42

--------------------------------:---------------,

.-.-.

UNCLASSIFIEDIIFOR OFFICIAL
UNCLASSIFIED//FOR
OFFICIALUSE
USEONLY
ONLY
Forexample:
example: Tampa
Tampa receives
receives some
some information
information regarding a crime
action to take. For
Tampa forwards
forwards the
the information to San
that allegedly happened in San FranCisco.
Francisco. Tampa
a~y action deemed appropriate.
Francisco to take any

3) "Information Only" - This type of lead will be used for information only and no
specific action is required or necessary (administrative type matters, change in
leave policy, etc.).
Example 2
b7E
To.
To:
Re:
Re:

L
Icry'Ptnrt,rrorier

Fro.: San
San Antonio
Antonio
From:
.03/31/2005
03r31/2005

I.E.IoD( .. ):
IEAD(s):
ISe~ Lead
(Info)
'Set
Lend 1:
1: (Info)

CQUNTERTERRORISH
COUNTERTERRORIS4
AT UASHINGTON.
VASHIMGTOH
AT
DC

Read and
and clear.
clear.
Read

ISet ~cad
(DiscxetionGrY)
iSet
Lead 2:
2: (Discretionary)

ATLANTA
AT ATI.AnTA
vA
AT
ATLANTA GA

For vhatevor
vh.o.tevelzo action
oct ion deemed
deeaed necessary.
neeO~\3a%'y.
For
ISet lend
Lead 3:
3: (Action)
(~etion)
'Set

HOUSTON
AT HOUSTON
IX
.AT
HOUSTON TX

Locate and
and intervicv
int~~vi=v Joe
Jee Terrorist.
Te~rori~t. residing
rc~iding at
at 123
123
Locate
, Hain
Main Street,
St:reet. Houston,
Houston. TX:
TX; and
and repo:rt
of interviev
interviev to
to
report :results
results of
.Aust.in.
Austin.

EC Copy Count: 2 (*unless one of the


Attachments, Enclosures or
the following:
following: Attachments,
covering a Lead outside of
of our Division.)
First copy (Original) *see Example 3
./ Red Ink Check mark by the "From: Your Division"

./ Red Ink Check mark by the "Case ID:"


ID;"

./ Initial in Black Ink by your name next to "Drafted by:"

**The Typed initials next to your name indicate who actually


typed the document, in some cases this may be different from the
person who drafted it**

UNCLASSIFlEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005529

43

a
a
a

a
a

a
a
a
a

a
a
a

a
a
a
a

a
a
a

. UNCLASSIFIED//FOR OFFICIAL US~


USE ONLY

Example 3

a
a
a

.-

ID

lb

I.
I.

(R.e\r.
0 IJ 12003)
Mar.0111.7='

IFEDERAL
FEDERAL BUREAU
BUREAU OF
OF INVESTIGATION
INVESTIGATION

Precedence:
ROUTINE
Precedence:
ROUTINE
of

Date:
02/08/2005
Date: 02/08/2005

To:
San Antonio
Antonio
To: San
From: 115:n
vCn Antonio
Prom:
11/CTVTTTv
Squad 11/C
Contact: TFO
Contaot:
TFO

aM

. Approved By:
By:
Drafted
Drafted By:
By:

as
~:!!
4Z

D.'

I
_I
II--------...,rrrmmJ~
Wg-IT1

t Agenoy
Agency

b6
b6
b7C
b7C
b7E

Case
It: ,,_ _ _ _ _ _ _.....1 (Pending)
(Pending)
Case ID
ID 1:

. Title:
.Title:

IT GASE:
IT
CASE
SAMPLE EC
SAMPLE

~
4
,3

Synopsis: This
is aa sample EC.
EG.
Synopsis:
This is

~~r
dofl

Details: On
a sample EC
llC to
to be usec
use<
Details:
On 02/08/2005,
02/08/2005, writer
writer completed a
for training
training purposes.
The following
following person
person is
is fictional
fiotional and
and
for
purposes. The
been created
created for
forthe
to "Index"
- the purpose
purpose of
of demonstrating
demonstrating how
how to
'Index"
information so
that it
be searchable
searohable in the FBI
FBI databse.
databse.
information
so that
it may
may be

FD-542 (Statistical Accomplishment):


Accomplishment):
The purpose of the FD-542
FD-S42 is to communicate information within the FBI and
claim a statistical accomplishment.
**An FD-542
FD~S42 can be substituted for an BC
accomplishment. **An
EC in
situations where you are communicating information and claiming a statistical
accomplishment
accomplishment at the same time**

***IMPORTANT***
Your classification
classification should
should be
be the
the only
only Case
CaseID
ID listed
listedon
onthe
theFD-S42.
FD-542. If a nonnonvalid classification (for example, administrative or criminal
criminal classification) is listed
in addition to the valid classification, this would prevent the FD-S42
FD-542 from being
uploaded.
FD-S42
FD-542 applications: (examples)
~ Dissemination of information
>
~ Participating in Command Post/Major Case/Special Event
>
Event
~
ParticipatingasasaaMember
Memberof
ofaaWMD
WMD Working
Working Group/Task
GrouplTask Force
> Participating
~ Participation in WMD exercise
>
~
WMDAssistance
AssistanceProvided
Providedto
to State/Local/Federal
StateILocallFederal Agency
> WMD
~ Request Surveillance (SSG only)
>

UNCLASSIFIED//FOR OFFICIAL USB


USE ONLY

ACLURM005530

44

/ S
I:

it

UNCLASSIFIED//FOR OFFICIAL USE ONLY


;.
D Conducting Surveillance (SSG only)
;.
CreatingiIssuing a National Security Letter
D Creating/Issuing
;.
D Serving a National Security Letter

The "Accomplishment Information" section on an FD-542 is a function of the


macro. If
Ifthe
the FD-542
FD-542 is selected, the "Accomplishment Information" will
macro.
automatically be placed on the last page of the document and consists of; the
of accomplishment, investigative
number of accomplishments claimed, type of
technique used, and information on the person claiming the accomplishment(s).
FD~542 Copy Count: (Same as EC above)
FD-542
".542"
*Note: Document type on an FD-542 is ".542"

an

Example 4

To:
To:
R~:

G>~
qa

San A.nton'io
From.: San
San.An
tonic
San
Antonio From:
Antonio
300C-SA-C50792. 04/19/2005
3000-SA-CS0782,
04/18/2005

'AccoIplish.ent
Accomplishment Inforaation:
Information:

b6
b7C

RUl!\ber:
Humber: I1
'Tvpe: POSITIVE
POSITIVE
INTEllIGENCE(DISSEMINATED
(DISSEMINATED OUTSIDE
OUTSIDE FBI)
'Type:
INTELLIGENCE
ITU:
IIA I SONBITE
9ITH
OTS ERAGENCY
AGENCY
ITU: LIAISON
OTHER
Claimed By:
By:
Claimed
5,5H: 123456789

~~~:

j21mm

~ Squad:
Squa.d: ~lnrT!------I
an
OMMEM1101Hans;
lOBi 1 i(02 "I!tb
+.4+108j1402.AM

FD-71 (Complaint Form):


The purpose of the FD 71 is to document complaints received via:
;.
D Telephone
;.
D Walk-in
Letters
.,;.
D Letters
;. Faxes
D
;.
D E-mail
;.
D Other agencies
***ITIDT complaints are handled through the Guardian system.
***IT/DT

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005531

45

go
a

IR
011

OFFICIAL USB
UNCLASSIFIED//FOR OFFICIAL
USE ONLY
FD-7l Copy Count: 1 (Same as EC
BC above)
FD-71
(Report Discoverable Information):
FD-302 (Report
of the FD-302 is
is to
to document
document discoverable information (i.e.
The purpose of
information that
that you may have to testify to in court)

fib

FD-302 applications: (examples)


~ Documenting when
when accepting
accepting or providing evidence
>
~ Documenting
Documentinginterviews
interviews
>
~ Documenting results of
of surveillance
>
~
Documenting
subpoena
results
> Documenting subpoena results
~
Document
results
of
trash
> Document results of trash runs
~ Document
Document arrest
arrest
>

411

FD-302 Copy Count: 2

First copy (same as BC


EC above)-

lb

ID
ID

Second copy (clean! i.e. No initials, No Red marks, No Julian date, No


indexing)
FD-320 (Notification to DOJ):
DOl):
The purpose of
of the FD-320 is to notify the Department of Justice of a case closure.
It is completed after approval from the JTTF Supervisor and consultation with the
Assistant United States Attorney assigned to the case.
FD-320 Copy Count: 3

First copy
./'
V" White paper: Clean with no markings (i.e.
(i.e. no initials or copy count)
This copy is for the U.S.
U.S. Attorney's Office
It can be mailed to:
to:

U.S.
U.S. Attorney
Attorney's~ Office
Attn:
XXXXXXX
Atm: AUSA XMVXXXX

Address:
Address:

go

It can also be given to your JTTF AUSA


Second copy (Original)
./'
This copy must be on Yellow
Yellow paper with *copy count on lower
lower
left corner.
corner.
./'
Put Check mark in Red Ink next to the Case ID
ID
./'
Initialed in Black Ink next to
to your
your typed
typed initials.
initials.
UNCLASSIFIED//FOR OFFICIAL USB
USE ONLY

ACLURM005532

46

------------------

a
a

a
4111

VI

4111

ID
4111

.'

411

41
411

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Third copy (Your Serialized Copy)


./
Thiscopy
copymust
must be
be on
on Yellow paper
with *copy count on lower
V This
paper with
left corner.
corneL
./ Same as Serialized Copy on EC, FD-542, Etc. above

of
(*copy count includes your Case ID, your typed initials and the number of
copies.)
Example copy count: 266F-NY-55619
PAH:pah (use
(use your
your initials)
(3)
(3)

- FD-515
FD-SIS (Statistical Accomplishment)
of the FD-515 is to claim what is referred to as a "hard stat."
stat. "
The purpose of
**The FD-515 MUST be completed within 30 days of the event**
FD-515 applications:
~ Complaint/Information/Indictment
ComplaintlInformationlIndictment
>
~ Arrest
>
~ Conviction

~ Sentencing
>
~ Asset seizure
>
~ Other
>
FD-515 Copy Count:
Count: I1

FD-930 (Violent Gang and Terrorist Organization File)


The purpose of
of the FD-930
PD-930 is to nominate a subject of International or Domestic
Terrorism for inclusion on the Terrorist Watch-list.
FD-930 applications:
~ Nominate a subject for inclusion on the Terrorist Watch-List
>
Watch-List.
~ Remove a previously nominated subject from the Terrorist Watch-list.
>
FD-930 Procedures:
./ Complete FD-930 e-form (*See 'Tips for completing the FD-930 e-fonn'

e-form'
below)
.
./ After completion, validate the FD-930 e-form
e-fonn by clicking on the

screen."Validate Form"
Form" button at the top of the screen.
*If the form was completed with valid data and all required fields have
tum to a green
been populated, the red 'NOT VALID' indicator will turn
'VALID' indicator. If
If the form was not completed with valid data and/or
allrequired
havenot
all
required fields have
not been populated, the red 'NOT VALID'

UNCLASSIFIEDlfFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005533

47

s11, S 1H1S1111111/ U/111 1/ 1111/ 111111S 111.1S

UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
indicator will remain and a window will appear listing all invalid data
and/or omitted fields that need to be addressed by the Case Agent before
,the
the form
form is
is submitted to
to the
the TREX
TREX Unit.
Unit. Field Offices should not upload
either 'VALID' or 'NOT VALID'
VALID' FD-930s
FD-930s into
into ACS.
ACS. The TREX Unit
will be responsible for function
function..
Save the completed FD-930 to a file/folder of your choice.
./
choice.
Prepare an e-mail to HQ_DIV13_TREX, with the subject line of the e./
mail being your substantive investigative case file
file number,
number, and attach the
completed FD-930 e-form.
Based on
on the 'Type of Request', the following
e-form. Based
to the e-mail submitted to
documents must be sent as attachments to
HQ_DIV13_TREX: .
HCLDIV13_TREX:
Request' isis 'Initial
'Initial Submission':
Submission': FD-930 and
If the 'Type of Request'
opening case EC and NO!
NOI or LHM.
LHM.
is 'Remove Individual from ALL Watch If the 'Type of Request' is
and Supported
Supported Systems':
Systems': FD-930 and closing case Ee.
listing .and
EC.
If the Type
'Type of
of Request'
Request' is 'Add Data to Existing Record' or
'Modify or Delete Data
Data From
From Existing
Existing Record':
Record': FD-930 and EC
clearly stating what is to be added to, deleted from or modified in
record.
the existing record.
TREX Unit will review the nbmination for thoroughness
./
thoroughness and accuracy,
reconcile all conflicting issues, and make appropriate notifications (TSC,
NCTC, etc.). The
The TREX
TREXUnit
will then
then send an e-mail to the Case Agent
Unit will
containing a copy of the completed FD-930 that has been uploaded to
to the
substantive investigative case file, and the serial number of that document.
document.
'/Print
Print one (1) hard copy of the e-mail for uploading/serializing into the
substantive case file.
file.
./
Print two (2) copies of the FD-930, one (1) for the substantive case file
file
and one (1) for the VGTOF control file.
file.

Tips for completing the e-form FD-930:


FD-930:
~
> Mandatory fields
fields are highlighted
highlighted by
by red
red asterisks
asterisks or
orred
redborders.
borders. Some
fields become mandatory when a condition is created, i.e., when the 'Type
of Request' is 'Initial Submission' or based on the subject's U.S.
U.S. Person
status.
> Holding the cursor over some fields will display a window with tips for
~
properly completing the field.
field.
> Drop-down menus/pick-lists may be accessed by clicking on the
~
downward arrow
arrow located on the
the right
right side
side of
of the
the field
field... (The first line in all
drop-down menus is blank and should be selected if the field is
This will
will depopulate the field.)
inadvertently populated.
populated. This
field.)
~
AdditionaL' lines are directly below base fields for any biographical
> Add Additional...'
data element for which multiple entries are accepted. i.e., date of birth,
social security account number, scars/marks/tattoos/other characteristics,
etc. By
By single
single clicking
clicking on
on the
the 'Add
'Add Additional...'
Additional .. : line another field will
appear and allow for additional data elements to be entered.
entered.

UNCLASSIFIED//FOR OH-'ICIAL
OFFICIAL USE ONL
Y
ONLY

ACLURM005534

48
48


MI

~--"""--"-~

fib

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

When certain conditions are created on the form, pop-up windows will
If aa subject
appear advising the
the Case
Case Agent
Agent of
of aaconflict.
conflict. For example:
example: If
has been determined to be Armed and Dangerous and the Armed and
Dangerous caveat is entered as a Caution and Medical Condition, the
Law enforcement
subject may not be issued a Silent Hit Handling
Handling Code.
Code. Law
officer safety is paramount; therefore, initial eligibility criteria for an
individual to be issued a Silent Hit Handling Code is that the individual
may not pose a safety or violence threat to law enforcement.
Policy and procedural ECs cited on the form may be directly accessed by
clicking on the communication's reference link.

LHM (Letterhead Memorandum)

of the LHM is to notify various departments, including the


The purpose of
of Intelligence Policy and Review (OIPR) and FBIHQ, of
Department of Justice, Office of
The initial
initial LHM
LHM must
must be
be accompanied
accompanied by an
your intent to open an intelligence case.
case. The
Ee.
Opening EC.
LHM Copy Count: 2
First Copy
./
Whitepaper:
paper: clean!
clean! (i.e. No initials, No Red marks, No Julian date,
V White
No indexing) For the file attached to the Ee.
EC.

Second Copy (with attached EC to FBIHQ substantive desk SSA)


./
Initialed in Black Ink next to your typed initials.

uNCLASSIFIEDllFOR
UNCLASSIFTEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY

ACLURM005535

49

:----------..............111111

ACLURM005536

'.

UNCLASSIFIEDIIFOR OFFICIAL USE


UNCLASSIFIED//FOR
USE ONLY

INVESTIGATIVE PLAN:

,.

ALL INVESTIGATIONS
INVESTIGATIONS MUST BE APPROVED /
I
ASSIGNED BY THE SQUAD SUPERVISOR AND
CONDUCTED IN ACCORDANCE WITH THE ATTORNEY
GENERAL GUIDELINES.
GUIDELINES.

RECEIVECOMPLAINT:
COMPLAINT:Complaints
Complaints
cancome
comefrom
frommany
manysources
sources including,
including,
1. RECEIVE
can
but not limited to:
~
>
~
>
~

~
>
~
>
~
>
~
>

FD-71
FD-71
Electronic Communication I/ Lead
Telephone call
E-mail
Local Police Department Report
Guardian
*Assessment
*Assessment

of information concerning threats to


(*An Assessment
Assessment is a proactive collection of
National Security,
Security, including information
infimnatiolJ. on individuals, groups and
ofpossible investigative interest)
organizations of

A complaint is marked based on the deadline by which it must be completed:


.:. Immediate
Immediate
- 24
24 hours
hours

.:. Priority
Priority
- 72
72 hours
hours

.:. Routine
Routine
- 60
60 days
days

CREATEAAWORKING
WORKINGFOLDER:
FOLDER:AsAs
youbegin
beginconducting
conductingan
aninvestigation
investigation
2. CREATE
you
the volume of information
information can be
be overwhelming.
overwhelming. A good working folder is vital
to maintaining and organizing this
this information
information as
as itit comes
comes in.
in. Although there are
no rules on what can be'maintained in a working folder, some examples of
information that should be included are:
~ Results of Data-Base Searches
>
~ Photos

~ Copies of all Documentation

Documentation (EC's,
(EC's, FD-542's,
FD-542's, FD-302's, Surveillance
Logs)
~ Copies of all Subpoenas /I National Security Letters
>
~ Information on Related Cases
>

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005537

50

11 111111 1111 11 9 10 111111 M O IISSO OS OOS SO O O S M O11 11 11111

UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
3. CONTACT
CONTACTCOMPLAINANT:
COMPLAINANT:(if
(ifappropriate)
appropriate)Although
Althoughthe
the original
original
3.
complaint should contain all necessary information, the reality is that this may
not always be
Ifthe
the original
original complaint
complaint is
is lacking necessary or sufficient
be the
the case.
case. If
information, now is the time to re-contact the complainant and "fill in the blanks".
blanks".
Examples of relevant information that may not have been included in the original
complaint are:
are:
~
>

~
>
~
>
~
D
~
D

~
D

Subject's Full Name


Physical Description
Identifying Numbers (Social Security, Drivers License, Passport)
Telephone Numbers
Complete Address
Other Relevant Details of the Specific Incident

(See your
your lTTF's
Investigative Check
Check
4. CONDUCT DATABASE CHECKS:
CHECKS: (See
JITF's Investigative
List,
List, if applicable) A Standard of Investigation is required to ensure that each and
The Standard
Standard of
of Investigation will vary,
every complaint is
is properly
properly investigated.
investigated. The
but may include approximately 25 investigative databases, and every Investigator
should utilize each and every database when applicable.
It should also be noted that this checklist (if applicable) is not all inclusive and
should be considered a minimum. Investigators should feel
feel free to incorporate
other relevant database checks that may not be included on their JTTF
Investigative Check List.

Important Considerations when Conducting Database Checks:


Checks:
~ Investigators should seek the assistance of other Task Force Officers,
>
Special Agents, Intel Research Specialists (IRS), Investigative Assistants
(IA), and/or Intelligence ~nalysts
Analysts (IA) to run these checks.

~
>

When checking Local Law Enforcement involvement, Investigators are


reminded to also run checks with the Agency that has jurisdiction
jurisdiction where
the subject resides, to include past or historical residences.

~
>

Include both positive and negative results within your working folder.
folder.

Although
5. DISCUSS COMPLAINT STATUS WITH SENIOR TFO/AGENT:
TFO/AGENT: Although
you may already have a good idea of the complaints case potential at this
this point,
you should discuss the results of the database checks with a Senior TFOI
Agent.
TFO/Agent.
This will provide an outside perspective, which can be invaluable, but will also
insure that you have not overlooked a tool or technique that could or should have
been utilized.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005538

51
51

a)

I-II-I-a)

UNCLASSIFIED/!FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Important Considerations when Discussing Complaint Status:
Status:

>
>

>

>

Detennine
Determine the validity of the complaint
Discuss additional tools or techniques that could be utilized at this
this stage
Detennine
Determine if the Subject of the complaint should be contacted arid
and
.
interviewed
Determine if the Lead or complaint is sufficiently covered
Detennine
Determine if a Preliminary Investigation or Full Field Investigation should
be initiated

*If it is determined that the Guardian lead is sufficiently covered,


closed,
covered, it cari
can be closed,
within Guardian.
Guardian.

*Ifit
*If it is determined that the Guardian lead is not sufficiently covered and that
further
further investigation is warranted,
warranted, continue
continue with
with "INVESTIGATIVE
"INVESTIGATIVE PLAN",
PLAN", step
6,
6, below.

6. INITIATE PRELIMINARY INVESTIGATION OR FULL FIELD


INVESTIGATION:
INVESTIGATION: Before opening a case, you must first determine whether a
*Preliminary Investigation (PI) or *Full Field Investigation (FFI)
(FFI) is
is warranted.
warranted.
Once the case level is determined, complete the appropriate paperwork as outlined
under "REQUIRED DOCUMENTATION"
".
DOCUMENTATION" in
in Tab
Tab 44".

4B

ED

Important Considerations when Opening a PI or FFI:


FFI:

>
>

>

You must obtain approval from your Supervisor to


to open
open a case
Determine if a Co-Case Agent should be assigned
assigned .
Begin to develop a detailed investigative plan, based on the Criminal
Activity suspected

> Assign support duties and responsibilities when needed (i.e.


(i.e. assistance
completing opening paper-work, issuing subpoenaslNSLs,
subpoenas/NSLs, sending Leads
to other field offices, Surveillance requests/planning/conduction,
requests/planning/conduction, etc.)
etc.)
> Make necessary changes to your working folder.
folder. (Your complaint
complaint
working folder
folder may not be sufficient for the volume of information
associated with a PI or FFl)
FFI)

Periodically,during
duringthe
thecourse
courseof
ofthe
theinvestigation,
investigation, brief
brief your Supervisor
> Periodically,
regarding the case status and direction.
direction.

0
0

UNCLASSIFIED/!FOR
OFFICIAL USE
UNCLASSINEDHFOR OFFICIAL
USE ONLY

ACLURM005539

52

UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED/FOR
*Preliminary Investigation:
Standard - There is information or an allegation indicating that a threat to
National Security may exist.
"Legal
Authorized Techniques - A general summary is provided
provided in Tab
Tab 33-"Legal
Application". (See
(See Attorney
AttorneyGeneral
General Guidelines
Guidelinesfor
for complete
authorization)
Duration - Six months (with extensions granted under certain
circumstances)
Approval Authority - SSA
SSA grants
grants initial
initial opening.
opening . SAC may grant an
of one year
extension for
for an additional
additional six
six months.
months. Extensions in excess of
require FBI HQ approval.

*Full Field investigation:


*Full
Investigation:
Standard
andarticulable
articulablefacts
Standard -- There
Thereare
arespecific
spec* and
facts giving reason to
believe that a threat to National Security may exist.
Authorized Techniques - A general summary is provided
"Legal
provided in Tab
Tab 33-"Legal
Application". (See
(SeeDIOG
DIOGreference
reference slides
slides below,
below, or
or full DIOG on FBInet)
Duration
Indefinite, with aa required
required Annual Letter Head
Head Memorandum
Memorandum
Duration - Indefinite,
(LHM).
(LHM).
Approval Authority - SAC is the approval authority.

it

'.

For study materials related to the Domestic Investigation and Operations Guide, see the
following link:
http://home.fbinet.fbilfonns/fdl028IDIOGIDIOGTrainingrTrainee%20Materiais/Fonns/AIIItems.aspx
http://horne.fbinetibi/forms/fd1028/DIOG/DIOGTraining/Trainee%20Materials/Forms/AILItems.aspx

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005540

5533

ACLURM005541

II

ID

GI

lb

UNCLASSIFIED//FOR
OFFICIAL USE ONLY
OfU.Y
UNCLASSIFIED/FOR OFFICIAL

USE AND APPROVALS


APPROVALS FOR
INVESTIGATIVE TECHNIQUES

A.
A.

Polygraph Matters:
Matters: Authority granted by the ASAC, unless unusual or special
circumstances exist, i.e. a request to polygraph a minor, etc, for which approval
would be granted by the SAC..
SAC.' For your Division polygrapher(s) see your contact
list or JTTF Coordinator

B.

Monitoring: Approval
Consensual (telephonic) Monitoring:
Approval granted
granted by
by ASAC.
ASAC. If sensitive
circumstances exist, as defined on from FD-759, approval will be granted
granted by the
SAC.
Consenting party must sign FD-472
1.
Obtain concurrence from your AUSA that recording is legal and no
2.
entrapment issues exist. Document same on an FD-320 (for CW's obtain
the authority prior to opening and gain concurrence for the duration of the
investigation)
3.
Draft FD-759 (now a macro)
macro) and forward
forward to
to ASAC
ASACfor
for authority.
authority. In the
the
event that consensual recording needs to take place
place immediately
immediately contact,
contact,
SSA and ask that he/she call
call the
the ASACfor
ASAC for verbal
verbal authority.
authority. Once verbal
authority is granted, document same on the original FD-759.
FD-759.
4.
Two Agents or an Agent and a TFOITFA
TFO/TFA must be present during the
recording.
recording.
Record a preamble on the tape (date, time, witnesses, number called and
5.
name of the subject called)
.
Record a post amble at the conclusion (time call ended, call not
6.
answered!answered! answering machine, etc)
answered/answered/
7.
Label
Label the tape
8.
tape to ELSUR
ELSUR within
within 10
10 days.
days. Use the FD-504(b) evidence
Must submit tapeto
envelope (1D
(ID evidence), fill it out and submit it to your ELSUR contact. If
a CW is utilized to place the call, hislher
his/her true name is listed on the subject
intercepted line along with the intended interceptee.
interceptee.
Document the consensual calion
9.
call on an
an FD-302.
FD-302. The FD-302 will essentially
be your debrief of the CW following the call (briefly include the pertinent
content), document that the call was a consensual recording and the tape
Remember that
that the tape is the evidence and the
submitted into evidence.
evidence. Remember
transcript is your guide for the jury to follow the conversation word for
word.

C.
c.

Consensual (non-telephonic) Monitoring:


Monitoring: ASAC will approve authority via
FD-759 for routine monitoring and for emergency m09-itoring
monitoring (sensitive
circumstances) when a designated DOl
DOJ official cannot be reached for approval.
approval.
When sensitive circumstances exist, routine non-telephonic authority is granted
by DOJ seven days prior to the monitoring.
monitoring. .
UNCLASSIFIED/IFOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR
'j.-

ACLURM005542

54

aa
a

UNCLASSIFIED//FOR
UNCLASSIFIED/IFOR OFFICIAL USE ONLY
Consensual monitoring
monito~ing outside of
of your division may be conducted only after prior
notification to and concurrence obtained from the SAC of each division where
monitoring will occur.
occur. You must document
document the
the concurrence.
concurrence. An AUSA
AUSA
advisement that the monitoring is legal and appropriate is necessary only in the
judicial district which
which encompasses the
the office
office of
of origin of
of the investigative case.
1.
Consenting party must sign FD-473 .
2.
Obtain concurrence
conCUrrence from your AUSA that recording is legal and no
entrapment issues exist. Document same on an FD-320 (for CW's obtain
conCUrrence for the duration of the
the authority prior to opening and gain concurrence
investigation) .
3.
Draft FD-759 (now a macro)
macro) and forward
forward to
to ASAC
ASAC for
for authority.
authority. In the
event that consensual recording needs to take place immediately contact
SSA and ask that he/she call the
the ASAC
ASAC for
for verbal
verbal authority.
authority. Once verbal
authority is granted, document same on the original FD-759.
4.
4.
Two Agents or an Agent and a TFO/TFA
TForrFA must be present during the
recording.
5.
5.
Record a preamble on the tape/digital recording device-F-bird, Eagle(date, time, witnesses, number called and name of the subject being
recorded)
6.
Record a post amble at the conclusion (time recording ended, etc)
Label the tape at the conclusion.
If using
using aa digital
digital recording device
7.
conclusion. If
download the recording onto a CD-ROM.
8.
Must submit tape andlor
and/or CD-ROM
CD-ROM to
to ELSUR
ELSUR within
within 10
10 days.
days. Use the
(lD evidence), fill it out
out and submit it to your
FD-504 evidence envelope (1D
CW isis aa recorded
recorded party,
party, use
use his/her
hislher true name on the
ELSUR contact. IfIfaa CW
subject intercepted line along with the intended interceptee.
9.
Document the consensual recording
recording on
on an
an FD-302.
FD-302. The FD-302 will
essentially be your debrief of the CW following the recording (brief,
include the pertinent content; who, when, where, what was discussed),
dQcument that the call was a consensual recording and the tape/CD-ROM
document
Remember that
that the
the tape/CD-ROM
tape/CD-ROM is the
submitted into evidence.
evidence. Remember
evidence and the transcript is your guide for the jury to follow the
conversation word for word.

ID

ID

a
a

ID
ID
II

ID

ID
ID

D.

of Interviews and/or Confessions: Approval to tape interviews and or


Taping of
If taping
taping will be done without the
confessions may be granted by
by the ASAC.
ASAC. If
consent of the interviewed party, authorization must be documented on an FD-759,
with the interviewing agent being the consenting party.

E.

Closed Circuit Television (CCTV): All consensual CCTV authorization (FDFollow the
the procedure
procedure listed above in #2 and
759) will be approved by the ASAC.
ASAC. Follow
#3 for handling the evidence and documenting the recording.

F.

ViewingIPole Cameras: Authorization (FD-677) in which a court


Public Area Viewing/Pole
order is not required will be approved by the SAC or the Acting SAC.
1.
An FD-871 must be submitted for the assignment of a Technically Trained

ID

ID

UNCLASSIFIEDIIFOR
OFEICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL

ACLURM005543

55

1\:

a
a

a
a
aa
a

UNCLASSIFIED//FOR OFFICIAL USE ONLY

2.

Agent.
See your
your contact
contact list
list or
or JTTF
JTTF Coordinator
Coordinator regarding these
Agent. See
Afteryou
you complete
complete the
the request,
request, the
the form
form will automatically
submissions. After
be generated and forwarded the tech agents so they can make their
preparations. Route the original to the CDC and SAC for signature (noted
Retain aa copy for your file.
on the bottom of the
the FD-871).
FD-871). Retain
file.
Do a site survey for the Tech Agents.
Relay any
any safety issues and
Agents. Relay
counter-surveillance concerns associated with your subject.
sUbject.

G.
G.

Group II UCO:
UCO: Will be reviewed by the Division Undercover Review
Committee and signed
Signed by the Division UC Coordinator, CDC, and the appropriate
approval.
ASAC prior to submission to the SAC for approval.

H.
H.

UCO: Will be reviewed by the Divisions Undercover Review


Group I UCO:
Committee and submitted to the SAC with recommended
reconunended action (Group I UCOs
inClude U.S. Attorney approval letter)
submitted to the SAC should include

1.
I.

Purchase of Drug Evidence:


Evidence: Approval granted by the ASAC via Ee.
EC.
1.
Fill out FD-794 requesting "drug
"drug purchase funds" and forward with
1.
rovalEC.
aapproval
EC.
2.
2.
b7E
b7E

Document this in your FD-302--In ad=


Document this
this in
in your
your FDFDr....".=-----------------' Document
3.

J.
J.

Administrative Subpoenas (Title 21 Investigations ONLY--Drug Cases):


Cases):
Authority to compel attendance and testimony of witnesses, and require
require records
production relevant to controlled substance investigations may be granted by your
SSRA, OCIDP
OC/DP SSA, or ASAC.

K.
K.

Mail Cover:
Cover: Approval is with the SAC or in his/her
hislher absence, the Acting SAC.
SAC.
(Review Ponies for Mail Cover)

L.
L.

Pen Registers/Trap and Trace:


Trace: Approval granted by the ASAC (Court order or
consent of user is required).
1.
Identify the subscriber prior to seeking approval (if possible) via Federal
1.
Grand Jury (FGJ) Subpoena, Administrative Subpoena or National
Security Letter (NSL).
2.
Draft Approval EC (See pony)
2.
3.
Tech Request FD-871, follow procedure in #6, sub a
3.

a
a

302).
Following the transaction, the receipt must be returned and filed (consult
your JTTF Coordinator or SSA for
for division-specific
division-specific procedures).
procedures). Keep
Keep a
copy of the receipt for your records.
records.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005544

56

ID

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

4.

Draft Application and Order (See


Allow AUSA to review, have
(See pony).
pony). Allow
Orders signed by Magistrate Judge. File with the Clerk of Courts
Copy to substantive case sub-file (will be opened by your rotor).
rotor).
Copy to Tech Agent--will be faxed to service provider
Additional copies, as applicable, along with a signed copy of approval EC.
EC.
The appropriate personnel receiving these copies should upload your call
data into Telephone Applications and send you a hard copy of the pen raw
data.
Open a sub-file for your raw
Name it "Rawdata
"Rawdata 1",
1", or
Or something
raw data.
data. Name
along those ljnes
lines.

5.

ID

6.
7.

0
ii

ID

8.
8.

ID

9.

1I

II

IMake
IM
ak esure
surethe
thedata
dataisiscaptured
captured by
by your
your pen
1
.
an FD-302.
register and
document
register and document
same
in same
an in
FD-302.

ID.

M.

Title III
III Electronic
ElectronicSurveillance
Surveillance(Non-Sensitive):
(Non-Sensitive): Approval
Approvalwill
will be
be granted
granted by
the SAC (via EC)
EC) or in
in hislher
his/her absence,
absence, the
the Acting
Acting SAC.
SAC. The authority cannot be
delegated lower that an ASAC serving as Acting SAC.
1.
1.
Pen Register(s) should be up and running unless you are requesting
emergency authority.
Analyze the
the raw data routinely; use the
authority. Analyze
information to identify individuals possibly involved in the specified
illegal activity.
.
2.
2.
Before you draft an Affidavit, make sure that you have exhausted all other
investigative techniques
techniques and have
have specific
specific examples
examples of
of why
why aa Title
Title ill
Ill is
the only technique that
will
meet
your
investigative
goals.
Make
a
copy
of
that will meet your investigative goals.
an FD-699 (Title ill
Checklist)
IlI
3.
Draft EC seeking approval from your SAC (See pony).
3.
4.
Draft Affidavit (See pony).
Make sure
sure that your
your AUSA is on board and
4.
pony). Make
the United States Attorney's Office supports the technique.
5.
Tech Request (FD-871).
Follow the
the same
same procedure for getting the
5.
(FD-871). Follow
request form to the Tech Agent..
.
6.
EC requesting Pre Title ill
ELSUR
checks
(See
pony).
Make
sure that all
6.
III ELSUR checks (See pony).
target telephone numbers, target subscriber addresses, ESN'S, etc., as well
as Named Interceptees
Interceptees are
are checked
checked through
through the
the databases.
databases. Remember that
the ELSUR checks are only good for 45 days.
days. Do not do them too early in
the process and do not do them to late, DEA and BICE have a 5 day
window to conduct the searches.
7.
When your Affidavit is complete, provide a copy to your SSA, the CDC
7.
Make appropriate
appropriate changes,
changes, additions
additions and/or
andlor.,
and your AUSA for review.
review. Make
deletions as needed to your Affidavit.
Affidavit. The AUSA will draft the
Application and Order (send copies of the drafts
drafts to your CDC, for ELSUR
ELSUR
purposes)
purposes)..
8.
8.
When the Affidavit, Application, and Order have been reviewed and
approved by
by the
the CDC
CDC and
and AUSA,
AUSA, they
theywill
willbe
beforwarded
forwardedtotoOEO
0E0 for the
When approved,
approved, an
an Action Memo will be drafted and
next approval.
approval. When
Make sure
sure your
your Tech Agent knows where you are in the
approval granted.
granted. Make
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ID
ID

ACLURM005545

57
57

b7E

011 11 110 11 60 1111 11 11 811SO M OS SO 1111 11 011118 11 11-11 8SOO S S110 11 11

II:

UNCLASSIFlEDllFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

9.

process and the appropriate equipment has been installed before you have
the Order signed by the Judge.
ope.ned.
Draft an EC requesting that appropriate subfiles are opened.
a.
a.
b.
b.
c.
c.
d.
d.

10.

11.
12.

N.

O.
0

. ELA---ELSUR Administrative
-ELA---ELSUR
ELl----ELSUR Original Log
EL1----ELSUR
ELlA--ELSUR Copies of Log
EL1A--ELSUR
ELlB~-ELSUR Transcripts
EL1B--ELSUR

Set up
up aa meeting with all
AUSA will draft Minimization Instructions.
Instructions. Set
monitors, AUSA, SSRAISSA,
SSRA/SSA, and Case
Case Agent.
Agent. Everyone must read the
Go over
over minimization
minimization instructions and
Affidavit, Application and Order.
Order. Go
everyone will sign a copy of a log documenting same.
Application, Order, Mfidavit
Affidavit to Federal.Judge
Federal-Judge for
for signature.
signature. Make sure
copies make their way to the substantive file, Tech Agents, ELSUR, etc.
tapes/CD's at the
AUSA will
will draft
draft a Sealing
Seal tapes/CD's
the conclusion
conclusion of
of Title
Titlem.
DI AUSA
Order and you, the AUSA, and the original tapes/CDs will go to the Judge
Make sure
sure the
the original
original evidence is submitted
for sealing of the evidence. Make
Make sure
sure aa copy
copy of
of the
the Sealing Order makes
to ELSUR within 10 days.
days. Make
its way to the appropriate sub-file.

Federal Grand Jury Subpoenas: Open a case predicated upon allegations of


criminal activity. Fill in a FGJ request form (See Pony) and forward to your
hislher secretary. .
AUSA or his/her
1.
1.
Sign your 6e letter (drafted by the
the USAO)
USAO) and
and return.
return. Maintain a copy for
your records.
.
2.
SUbpoena. Fill
Fill out
out the
the back
back of
of the
the subpoena that is to returned to
2.
Serve the subpoena.
there. Maintain
Maintain aa copy
copy for
for your
your file (GJ
(GJ subfile in
the USAO
USA() and get it there.
your case--will be opened by your rotor).
3.
Pick up the requested documents and/or information and document the
3.
receipt via FD-302.
4.
4.
Make your returns through the USAO.
5.
If
TFOs. TFA, or Agents, make sure
5.
If the records will be reviewed by other TFOs,
"that everyone has
Send the original to the USAO
has signed
signed aa 6e
6e letter.
letter. Send
USA() and
copies of the letters to your GJ sub-file.
6.
6.
Some service providers
providers will
will accept FGJ
FGJ Subpoenas
Subpoenas via
via fax.
fax. If
If not, set a
lead for the appropriate division to serve the subpoena.
NatjonalNeenritv
SecurjtyT,ettgar.i
letter"
National

-:-:--:-:----;~:::---~-::--___;_=_;__-.....l Approval authority granted by SAC

IL."

(Acting SAC cannot sign an NSL).


1.
Draft NSL and EC through
2.
2.
Populate pertinent
pertinen
orm m
orma on .'jA~"'-~
Storm
information
t
SL.
routed to
to
33.
EC and NSL will be automatically generated b
d drouted
approval ..
your SSA, ASAC, CDC, and SAC for review and approval..
4.
FD-S42 claiming statistical accomplishments for drafting and
Type an FD-542
approval of NSL.
UNCLASSIFlEDllFOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR

ACLURM005546

b7E

58

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

5.
5.

b7E

6.
6.

P.

Foreign Intelligence Surveillance Act (FISA) procedures: Download a FISA


Request Form from the
the OGC/1-1SA
OGCIFISA Unit
Unit webpage
webpage in
in FBlnet
FBInet (business records,
Pen Register/Trap
Registerffrap and
and. Trace
FISA . The request
re uest form must be downloaded
Trace, Full FISA).
and
completed.(Nrte:
(Tel
and comoleted.

1.

~------------------------~

Initiate the
the FISA
FISA process
process through
throughthe!L..
th4 _ _ _ _ _....IIDuring
'During this process,
you rna
eet the following
. tasks:
may ex
expect
b7E
.b7E

a.
a.
b.
b.
c.
c.
d.
d.
e.
e.
of these steps.
*Expect a two or more month lead-time in the completion
steps.
\
.

THE FBI FISA PROCESS: FFI


FFI INITIATION
INITIATION APPLICATION
APPLICATION
PACKAGE
FISC REVIEW
REVIEW HEARING
HEARING COURT
COURTORDER
ORDER
PACKAGE FISC

2.

When the Application and Order make it through the gauntlet, fill out a
Woods Form.
When the
the appropriate
appropriate checks have been conducted secure
Form. When
fax the document to FBIHQ.

*In addition to the existing "Sub FISA"


FISA" created for each investigation,
investigation, a
sub-file containing the materials relied upon to verify the items on the
"Woods" checklist must also be created and maintained by the.case
the case agent.
agent.
This sub-file must be created for each FISA application submitted and
named "Sub Woods
will contain
contain the results of
of all material
Woods Checks".
Checks". ItIt will
relied upon in the "Woods" verification procedures.
**Application prepared by OIPR and signed by the AG
**Declaration sworn to by FBI agent from FBIHQ substantive unit
**Certification signed by the FBI Director.
**Electronic surveillance order
**Supplemental order to service provider
**Supplemental minimization procedures (rare)

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005547

59

I~.:

'.

aa

aa

a
a

a
a
a

S
a
S
a

UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/FOR OFFICIAL
3,
3.

FBllIQ will usually send supplemental orders to the division where the'
1-BIHQ
the
service provider is located. Make sure that copies make it to the
substantive file and your Tech
Tech Agent.
Agent. The Tech Agent should ensure that
the appropriate personnel get an unclassified document requesting that
they upload the raw data into Telephone Applications.
Applications.

4.
4.

Open a subfile for your pen register raw data (See the Pen Register
summary).

a.

FISA RENEWAL REQUESTS


i)
Draft a request form, type in the Docket Number from your
i)
original order and
and check
check the
the renewal
renewalbox.
box. Provide
information that you have developed during the 90 days of
operating (PRTT
(pRIT analysis, surveillance, etc) in the body.
body.
ii)
the,FISA
ii)
The signature authority needed for the
FISA Request
Form.
iii)
Upload your request into the FISA Management System on
iii)
the Intranet.
Intranet.

UNCLASSIFlEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005548

60
60

S
S
S

S
S
S
S
S
S
S
S
SS
SS
SS
S
SS
SS
SS
SS

.'

ACLURM005549

UNCLASSIFIEDIIFOR
OFFICIAL USE ONLY
UNCLASSIFIED/5'0R OFFICIAL

INTELLIGENCE INFORMATION REPORT

Intelligence Community
c.,tepeedentAgeek,
Central
IntelOgences
Agency Defense
Department
Intelligence
of Slate
Agency

oN

:Cit
,:
no.rtiTont

en

r
Ir

it pepoement

Ir

pith
Treasury

' fcckessi
knew of
nvensfeation

Director
of Central
Intelligent* (DCI)

An

Intelligence

. .

DOCl/ naknol
Community !mergence
Monager Coma
rhea

Mtn7

Infelliganas

'" Naaenci

Ah Force
cconnaissonce
lenslagence
Offko
/Nizeonol
Marino
/ rmagner
Coeps
/ond nieppmg
Intol4gonto
Agcncy
O

PURPOSE
As a result of
of 09/11/2001,
09/1112001, the FBI has massively intensified its intelligence
dissemination effort.
The FBI
FBI has
has historically
historically limited its intelligence sharing through
effort. The
established Intelligence Information Reporting channels normally used by
IS-member
by the 15-member
United States Intelligence Community
Community (USIC).
(USIC). As the leading domestic criminal,
counterintelligence and counterterrorism agency, the FBI has adapted its reporting to
facilitate the rapid dissemination of
of its raw intelligence. The Intelligence Information
Report (IIR) is the primary vehicle for this dissemination.
dissemination.
The IIR is the standard through which all"raw"
all "raw" or unevaluated intelligence
information is shared with national policy makers, the USIC and law enforcement
of national intelligence priorities and the needs
community in support of
needs of law enforcement
consumers. These
These reports
reports are
are primarily
primarily used
used by analysts and agents, along with other
available sources, to identify threats or trends, and produce finished intelligence products
for consumers. As
As aa result
result of
ofthis
this reporting
reporting and eventual analysis, national strategies and
action may be affected.
A significant benefit to analysts and agents using the IIR as
as a dissemination tool
tool is
the ability to protect the source of
of the information while providing essential
essential raw
intelligence. This
This information
infonnation sharing
sharing will
will also
also enhance the FBI's collection efforts and
support the war on terrorism in accordance with national directives:
directives:

UNCLASSIFIEDIIFOR
Y
UNCLASSIFIED//FOR OFFICIAL USEONL
USE ONLY

ACLURM005550

61
61

I.

'.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

It is the responsibility of
of the FBI.
FBI to share terrorism intelligence and it is
mandated by the National Security Act of
of 1947, Executive Order 12333,
USA Patriot
12333, the USA
Act, the Homeland
Security Act of
of 2002,
2002, and the Attorney General's Guidelines for
for FB1
FBI National
National Security
Security
Investigations and Foreign Intelligence Collection.
Collection.
r
Historically, counterintelligence and counterterrorism asset reporting primarily
fueled the IIR process.
However, criminal
criminal and
and cyber source reporting is now being
process. However,
incorporated to broadly share information across all FBI investigative program lines.
lines.
Intelligence harvested through investigative techniques such as Foreign Intelligence
Surveillance Act (FISA) and Title III overhears, consensual monitoring, physical
. surveillance, as well as other sophisticated techniques, can also
also be the
the basis for
for raw
intelligence disseminated through IIRs.
IIRs.

Intelligence collection is the responsibility of all personnel who


who investigate or
investigations. These
These include
include agents,
agents, task force members, language specialists,
support investigations.
specialists,
--Intelligence
Intelligence Analysts (lA's),
(IA's), financial
financial analysts
analysts and
and surveillance
surveillance group
groupmembers.
members. To
facilitate the IIR process, these personnel must become familiar with the National Humint
Collection Directives (NHCD's) and the FBI's Intelligence Collection Requirements
Requirements
(ICR's) pertinent to the programs
programs and
and countries
countries they
they are
are working.
working. The NHCD's list the
exact issues of
of interest to.
to. the USIC and establish parameters for
for positive or foreign
foreign
intelligence reporting.
The ICR's
ICR's focus
focus the
the FBI's
FBI's intelligence collection
reporting. The
collection efforts and fill
fill
intelligence gaps.
The aforementioned
aforementioned investigative
investigative personnel must be vigilant and
gaps. The
identify relevant intelligence derived from asset reporting, intercepts, surveillance
observations and information uncovered from other sophisticated technique collection
platforms.
Task force members who produce IIRs based on information available to them
through their task force assignment should follow the below protocol to process
process their IIRs.
IIRs.
These IIRs need to go through FBI channels with a notation made on the administrative
"tickler" page giving the task force member and their respective agency credit.
credit.
Additionally, task force members should coordinate with their agency to
to ensure their
efforts are credited within their organization.
organization.
Ynur
b7E

To further facilitate the timely entry and dissemination of information deemed


suitable for IIR dissemination, Senior Reports Officer positions have been established
These Intelligence
Intelligence Analysts
Analysts have
have the
the capability to bypass approving
within field offices.
offices. These
officials at HQ and directly
directly disseminate
disseminate timely
timely IIRs.
IIRs. All agents or Task Force

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005551

.62

I)

I)

'.'.
I.
I.
lb

ID

ID
ID

ID

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

Officers identifying information suitable for IIR dissemination should follow the below
listed protocol.

PROTOCOL
1. All agents should review every document 13,
~roducefor
1.
1 1 roduce for intelligence value and
and
th~ information to the LJfor
consider submitting the
for review.

2.
(E
2. All agents should forward documents (E<fs-E11-71s,
-71s, FD 302s, FD 542s) they
believe have IIR potential to their divisi0rL...Pr
divisio4
r JTTF IA.
thLJupervisor
must be
be contacted
contacted by
by phone if
if the data
3. The IIR Manager or thl
3.
.upervisor must
contains specific threat information which must be reported within two hours
the information
information contains
contains specific
specific threat data, both the
(IMMEDIATE IIR). IfIfthe
reporting agent and their supervisor must remain available until the report has
been received at FBIHQ and then either published or rejected by FBIHQ.

b7E

thUm

4. While
While theIjwill prepare
prepare
IIRs,
assessmentsand
andbulletins
bulletinsusing
usingthe
the intelligence
intelligence
4.
IIRs,
assessments
and supervisor is still responsible for preparing Urgent
you provide, each agent and
(if necessary) and contacting other divisions, squads, Legats, or agencies
Reports (if
persorinel regarding the information;
to alert appropriate personnel
information.
5. The IIR Manager
Manager will review the HR
IIR material and determine which program it
5.
The IIR
IIR will
will then be assigned to an
addresses (CT, FCI, CRIM, or Cyber).
Cyber). The
Analyst(IA)
Intelligence Analyst
(IA) for action in accordance with division protocols.
6. The.
The IA
6.
IA will
will draft
draft an
an IIR
IIR on-line,
on-line, using
using the
the FBI
FBI Intelligence
Intelligence Information Report
Dissemination System (FIDs) and examine the IIR for content, format, and
of US
The IA
IA will
will also redact names of
compliance with FBIHQ procedures.
procedures. The
Persons, ensure sources and methods are protected, and correlate the reported
information with the FBI's !ntelligence
Intelligence Requirements.
TheIA
IAwill
wille-mail
e-mailaaPDF
PDFversion
versionof
ofthe
the Draft
Draft IIR
IIR to
to the
the agent
agent and the squad
7. The
message:
supervisor, with the following message:

"Attached is your draft IIR for review and approval." .

ID

Aspart
partofofthe
thereview
reviewand
andapproval
approvalprocess,
process, itit isis the
the agent's
agent's responsibility to:
8. As
to:
a. Ensure that information in the IIR will not jeopardize any sources or
a.
methods or adversely affect an ongoing case.
b. Have his supervisor review and approve the IIR, or recommend changes.
b.

ID

Theagent
agentcan
caneither
eitheraccept
acceptthe
the draft
draft or
or request
request changes.
changes~ Any
Any changes
changes to the IIR
9. The
Corrections should be addressed
must be coordinated with the squad supervisor.
supervisor. Corrections
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR

ACLURM005552

63

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

e-maiTfo~~t
no corrections
corrections are
are needed,
needed, paragraph 11 applies.
in an e-mail
format to the IA.
IA. IfIfno
10. If
If corrections are requested, the IA will make the corrections and e-mail a
of the
t.he IIR to the agent and supervisor for approval.
corrected copy of

ID
lb

11. The agent and squad supervisor should e-mail the IA once the IIR is approved.
An IIR will not be submitted to FBIHQ without the agent's and supervisor's
Inexigent
exigentcircumstances,
circumstances, verbal
verbal approvals
approvals are
are acceptable,
acceptable, but must be
approval. In
followed up with a confirmation e-mail.

Through FIDS,
FIDS, the
the IA
IA will
will forward
forward the
the approved
approvedcopy
copyto
tothcl
thDsupervisor,
12. Through
'supervisor, who
will be the final approval authority in the Division for ROUTINE and PRIORITY
IMMEDIATE IIRs
IIRs must
must be
be approved
approved by
by an ASAC.
IIRs. IMMEDIATE

SI

13. The IIR will then be transmitted to the appropriate FBIHQ component, using
FIDS. After
Afterforwarding
forwarding the
the IIR
IIRfor
for approval
approval in
in FIDS,
FIDS, the
the IA
IA will
will e-mail
e-mail the agent
the final copy of
of the IIR, in a text format for uploading into ACS.

14. The agent should then save the renamed text version final IIR to his draft folder.

15.
15. The agent will print copies (one copy for each file referenced in the admin portion
of the IIR,
HR, and one copy for indexing of
of the IIR), have his supervisor initial the
of
bottom of
of the IIR, and forward the IIR to his SST for uploading.
16.
If an IIR was produced with information provided by a source or asset, one copy
16. If
of the IIR should be blind copied to the source or asset main file only, not the subof
copy of
ofthe
the IIR
IIR should
should also
also be
be e-mailed
e~mailed to either
either the blue or green file.
A. AA copy
file.

..

17.
17. The agent should claim a Statistical Accomplishment using the FD-542, and FDif the information within the IIR was obtained by a Source.
209 if

lb

ofIIRs
****
* * Further guidance on the production and dissemination of
IIRs can be found by
Domain and
and Collection
CollectionManagement
ManagementBranch*
Branch~
searching the
the Directorate
Directorateofoflntelligence~
searching
Intelligence> Domain
Reports Section on FBInet, or by consulting your FIG.

*If an agent elects to disseminate a hard copy of


of the IIR to a local agency with
*If
appropriate clearance, the administrative section of the IIR
IIR must be removed.

ONLY'
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
UNCLASSIFIED//FOR
..

ACLURM005553

64

b7E

11

e.

ACLURM005554

)1.

ID

ID

411

UNCLASSIFIED//FOR OFFICIAL USE ONLY

PONIES, FORMS, and EXTRAS


The -Following
and 'Resources'
'Resources' are
are lists
lists of
of documents
documents you
you may need in the
Following 'Ponies' and
course of your duties. Field
Field Division-specific
Division-specific ponies
ponies may
may be found on your office's
share drive. You can also search for particular ponies at:

Production Services Unit (PSU)- Includes guidance on understanding


underStanding and

producing intelligence products.


http://home.tbinet.tbiINSBIDllab/fipsIPSUlPagesIDefault.aspx
http://homeibinet.fbi/NSB/DJJabifips/PSU/Pages/Default.aspx
immerous
International Terrorism Operations Section I (ITOS I)- Includes numerous
ponies for the most common CT documents.
http://home.tbinet.tbiINSB/CTD/ITOSlIPages/OPtemplates.aspx
http://homeibinet.fbi/NSB/CTD/ITOSUPages/OPtemplates.aspx

... orby
by doing
doing an
an Intranet
Intranet search
search for
for "ponies".
"ponies".
...or
*IMPORTANT: Please do not alter original Ponies or Resource documents,
inthe
thecommon
common (S:)
(S:) drive,
drive, as
as this
this will
will make
make them unusable to other
contained in
Before making any changes, you must first re-save the document to your
personnel. Before
personal folder, under a different name.
EC (Electronic Communications):
Preliminary Investigation
~ Opening Preliminary Investigation

~ Opening Preliminary Investigation (TEI)


(TEl)

~ Extension of
of a Preliminary Investigation

~ Convert Preliminary Investigation to Full Field Investigation


.~
Closing Preliminary Investigation
Full Field Investigation
~ Opening full Field Investigation
~ Closing Full Field Investigation

~ Annual Summary

Criminal Case
~ Opening Criminal Case

~ Closing Criminal Case

Leads
~

Reporting Lead Covered


Sending Lead Outside Your Division

Evidence
~

Destruction of Evidence
Explanation for Late Submission of Evidence
Return of Evidence
OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL

ACLURM005555

65

UNCLASSIFIED//FOR OFFICIAL USE ONLY

I
I

Title III
ill

>- Title III


ill Approval

>- Title ill


Ill Authority
>- Title III-ELSUR
ill-ELSUR Checks

Request Assistance
>- Request CART Assistance

>- Request Communication Analysis Unit Assistance

>- Request for Information from NSA

>- Request IRS Information


>- Request Laboratory Assistance

>- Request Polygrapher

Asset

>
>
>
>>

Approval
Cover
ITTF-TFO
JTTF-TFO Authorization
Opening
Undisclosed Participation

Miscellaneous

>- After Action Report

>- Change Title/Case ID

>- Mail Cover


>- Opening a Sub-File

>- Operational Plans

>- PRTT Authority

>- Reporting Accident

>- Sending Documents to the File

>- Source Canvas


>- Submitting Letter-Head Memorandum

>- Transfer a Case to Another Agent/TFO


AgentITFO

>- Travel Outside Division

>- VGTOF Entry

FD-542:
Surveillance

>- Request Surveillanc


Surveillancq I
>- Conducting Surveillanc
Surveill~L.._ _ _"'"

b7E

National Security Letter

>- Preparation and Approval of a National Security Letter

>- Serving a National Security Letter

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005556

66

I-.

1111 111111 0111111 111 11 8S SO SIOS S O OS OS OIM M O O SOM M O II II

I-

UNCLASSIFIED//FOR OFFICIAL USE ONLY


Participating in an Event
D Participating
~
ParticipatingininCommand
Command Post/Major
Post/Major Case/Special
Case/Special Event
~ Participating as 'a

'a Member
Member of
of aa WMD
WMD Working
Working Grouprrask
Group/Task Force
Miscellaneous
~ Dissemination of information

~ LEA Liaison

FD-302:
FD-302:
Miscellaneous
~
> Receiving Evidence
~
> Receiving Subpoena Results
~ Conducting Interview

~ Conducting Surveillance

~ Conducting Trash Cover

~ Making an Arrest

~ ArrestLog

Arrest Log

LHM (Letter-Head Memorandum):


Memorandum):
Asset
~
> LHM
~ Notification LHM
>
Miscellaneous
~
> Annual Summary
~
D IRS Information Request
~
D Opening an Asset
D Opening FulllPreliminary
~
Full/Preliminary Investigation
~
> Request for Access
~
> Request Information
~
> Subpoena Service

NSL (National Security Letter):


Letter):
Request for Emergency Disclosure of Information
ECPA E-mail Subscriber
~ ECPA Checklist
>
~ E-mailEC
>
E-mail EC
~
> E-mail NSL
ECPA E-mail Transactional Records
Records
~ ECAP Checklist
>
~ Transactional EC
>
~
> Transactional NSL

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005557

67
67

11111111111111111111111 11111111111111111111

UNCLASSlFIED//FOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ECPA Telephone Subscriber


> ECP
A Checklist
ECPA
> Subscriber EC
Subscriber NSL

ECPA Toll Billing


ECPA
Billing

A Checklist
> ECP
ECPA

Toll EC

> Toll NSL

FCRA Consumer Identifying and Financial Institutions Info.


Info.
FCRA Checklist

> Combination Credit EC

> Combination Credit NSL


Experian EC
FCRA Consumer Identifying Information

.
FCRA Checklist .

> Credit (b) EC

> Credit (b) NSL


Experian EC

Experian NSL
FCRA Financial Institutions

FCRA Checklist
> Credit (a) EC

> Credit (a) NSL

> Experian Ee
EC

> Experian NSL

FCRA Full Credit Report

> Credit Report Checklist

> Credit Report EC


Credit Report NSL
> Credit Report
Report Instruction EC

RFP
A Financial Records
RFPA
RFPA Checklist
>

BankEC
Bank EC

> BankNSL
Bank NSL
Miscellaneous Forms:
Forms:

Search Warrant

> Search Warrant Cover


UNCLASSIFIED//FOR OFFICIAL
UNCLASSll-qh.DHFOR
OFFICIAL USE
USE ONLY
ONLY

ACLURM005558

68
68

lb

:.
;.

ie
0

I
:.

UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED//FOR
~

>~

Search Warrant Affidavit


Search Warrant
Warrant Application
Application
Search

Warrant
Seizure Warrant
~ Seizure
Seizure Warrant Cover

~ Seizure
SeizureWarrant
WarrantAffidavit
Affidavit
D
~ Seizure
SeizureWarrant
WarrantApplication
Application
D

Surveillance
SOG Request Form
>~ SOG
>~ Surveillance Log

ie

FISA .. ,.,..
~ FISA Request Form PRTT
>~ FISA Request Form

i-

Title ill
IR
~ ECTIII
ECTill Approval

~ TM
Till Affidavit

!.
:.!.
I

a
a
a

I.

I/
41

ea

Miscellaneous
~ ECPRTT Authority

~ Case Status Form (FD-320)


~ Case Update Example
>
~ Notification
NotificationofofAuthority
Authority to
to use
use Monitoring
MOnitoring Equipment (FD-759)
(FD-7S9)
A
~
TaxReturn
Return Application
Application
A Tax
~
> Technical Request Form (FD-871)
(FD-871)
~
> NCIC Initial Entry (FD-65)
(FD-65)
~
Non-Compulsory Letter
~
Pen-Trap Application and Order
~
Urgent Report-Guidelines
Report-Guidelines & Format
~
> Arrest Plan
~ Arrest Warrant
~
> Attestation of Authenticity
Authenticity of Foreign Public
Public Documents
Documents
~ Attestation with Respect
Respect to
to Seized Articles
Articles
~
Certificate of Authenticity
Authenticity of Business
Business Records
Records
~
Complaint Affidavit
A Complaint
~
Criininal Complaint
Complaint
A Criminal
~
> Evidence Description
~
Evidence Records
Records Access
Access Sign
Sign IniOut
In/Out Log
Log
~
> FD-930Niolent
FD-930/Violent Gang
Gang and
and Terrorist
Terrorist Organization
Organization File
File (e-form)
(e-form)
~
FISA
FISA Request
Request Form
Form PRTT
PRTT
~
> FISA
FISA Request
Request Form
Form
~
Investigative Support Specialist
Specialist Information
Information Request
Request Form
Form
> Investigative
~
Request
Request for
for Emergency
Emergency Disclosure
Disclosure of
of Information
Information
~
Room Access
Access Sign InI0ut
In/Out Sheet
Sheet
Room

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

ACLURM005559

69
. 69

UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

~ Translation
Translation Request
Request Form
Form (TRF)
(IRF)
~ Woods
Woods form
form
Subpoenas
Subpoenas
~ Airlines
Airlines

~ Automobile
Automobile Dealerships
Dealerships

~ Bail
Bail Bond
Bond companies
companies
.~ Bank
Bank ACcount
AG'count Information

~ Bank
Bank Comprehensive
Comprehensive

~ Bank
Bank Financial
Financial Records
Records

~ Bank
Bank General Records

~ Casinos

~ Corporation-Detailed

~ Corporation
COrporation General
-
~ Credit Bureau

~ Credit Card Records-Detailed

~ Credit
Credit Card Records

~ Electronic Records Request-General

~ Escrow Company

~ Hotel Records

~ Insurance Companies

~ Lawyer Fee Records

~ Real Estate Broker

~ Retail

Retail Stores
Stores .
~ Securities Broker

~ Telephone Company-Cellular

~ Telephone Company-General

Telephone Long Distance Provider


~
~ Travel Agency

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

ACLURM005560

70
70


ED
ID

a
a

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

TERRORISM STATUTES THAT GRANT


INVESTIGATIVE JURISDICTION
INVESTIGATIVE
JURISDICTIONTO
TOTHE
THEFBIl
FBI1 A broad, comprehensive list was favored over a more restrictive,
narrow one. ItIt isis hoped
ho ed that
that such
such an
an approach
approach will
will benefit
benefit agents working these matters.
81, 113,
113, 114,
WlTHlN THE SPECIAL MARITIME AND
18 U.S.C.
81,
CRIMES COMMITTED WITHIN
1111, 1112, 1113, 1201, 1363,
TERRITORIAL JURISDICTION OF THE UNITED STATES
2111
2111
1114, &
& CRIMES AGAINST SELECTED UNITED STATES OFFICIALS
18 U.S.C.
111,
111, 351,
351,1114,
1751
1116, &
& CRIMES AGAINST INTERNATIONALLY
lNTERNATIONALLY PROTECTED PERSONS
18 U.S.C.
112,878,
112, 878,1116,
1201(a)(4)
....
18 U.S.C. 32
AIRCRAFT SABOTAGE
AIRCRAFf
18 U.S.C. 33

18 U.S.C. 35

DESTRUCTION OF MOTOR VEHICLES OR MOTOR VEHICLES


FACILITIES
IMPARTING OR
ORCONVEYING
CONVEYING FALSE INFORMATION

18 U.S.C. 37

VIOLENCE AT INTERNATIONAL AIRPORTS

18 U.S.C. 43

ANllv:lAL ENTERPRISE TERRORISM


ANIMAL

18 U.S.C. 115

CRIMES AGAINST FAMILY MEMBERS OF A FEDERAL OFFICIAL

18 U.S.C. 175
175 -178
178

PROHIBITION WITH RESPECT TO BIOLOGICAL WEAPONS

18 U.S.C. 229 et seq.

CHEMICAL WEAPONS

210l'
18 U.S.C. 231, 21012

CIVIL DISORDERS; RIOTS

'.

a
a

4111

18 U.S.C. 241'
2413

CIVIL RIGHTS CONSPIRACIES


\

18 U.S.C. 245
24544

FEDERALLY PROTECTED ACTIVITIES

18 U.S.C. 2475
247'

DAMAGE TO RELIGIOUS PROPERTY

fi

18 U.S.C. 248
2486

FREEDOM OF ACCESS TO CLINIC ENTRANCES

18 U.S.C. 371, 372

CONSPIRACY

18 U.S.C. 373

SOLICITATION TO COMMIT A CRIME OF VIOLENCE

The statutes listed are those involving crimes frequently committed by terrorists.

2 Attorney
Attorney General
General approval
approval isis required
required to
to conduct
conduct investigations
investigations under these violations, see MIOG, Part I,
section 157 et seq.
3
3

Although a violation of this statute is generally investigated as a civil rights crime, if the group
committing the offense does so to intimidate or coerce the government or civilian population in furtherance
of political or social objectives, the violation may be considered an act of terrorism.

[d.
4 Id.

[d.
55 Id.

66 [d.
Id

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005561

71
71

I.

OS O SS II 11 110 11 11 8911111 11 011 11 11 11 11 11 11 9 611 1111 .9 11

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
18 U.S.C. 513
18
513

OFTHE
THE STATE
STATE AND
AND PRIVATE
PRIVATE ENTITIES
SECURITIESOF
SECURIIMS

18 U.S.C. 514

FICTITIOUS OBLIGATIONS

18 U.S.C. 641
18
64177

EMBEZZLE.
STEAL. SELL OR CONVERT PUBLIC MONEY, PROPERTY
EMBEZZLE, STEAL,
OR RECORDS OF THE UNITED STATES OR ANY DEPARTMENT OR
AGENCY
PROHIBITED TRANSACTIONS INVOLVING
lNVOLVING NUCLEAR MATERIALS

18 U.S.C. 831
831
8
18 U.S.C.
U.S.C. 832
832

8449
18 U.S.C.
U.S.C. 8449

PARTICIPATION IN NUCLEAR AND WEAPONS OF MASS


DESTRUCTION THREATS TO THE UNITED STATES
TEACHING, DEMONSTRATING, OR DISTRIBUTION OF
EXPLOSNES, DESTRUCTIVE
DESTRUCfNE DEVICES
INFORMATION RELATIVE TO EXPLOSIVES,
AND WEAPONS OF MASS DESTRUCTION
EXPLOSNE
EXPLOSIVE MATERIALS

18 U.S.C. 872 - 880

EXTORTION AND THREATS

930 10
18 U.S.C. 921 -_ 93010

ACTIVITY; FIREARMS
UNLAWFUL ACTIVITY:

18 U.S.C. 952 - 970

NEUTRALITY

U.S.c. 1001
18 U.S.C.

FRAUD AND FALSE STATEMENTS

18 U.S.C. 1014

LOAN AND CREDIT APPLICATIONS GENERALLY; RENEWALS AND


DISCOUNTS; CROP INSURANCE
FRAUD AND RELATED ACTNITY
ACTIVITY IN CONNECTION WITH
IDENTIFICATION DOCUMENTS AND INFORMATION

18 U.S.C. 842(p)

11
18 U.S.C. 1028
102811

7See
Alberico, 604
604F.2d
F.2d1315
1315 (10th
(lOth Cir.
Cir. 1979)
1979) (defendant
(defendant was
was a United States Army
7 See e.g., United States v. Alberico
of plastic explosives from an Army arsenal, sold them to individuals he
Captain, who stole large quantities of
crimin~ls, and would use these explosives in acts of
of terrorism).
believed to be criminals,
8 This criminal violation
violation was
was enacted by the
the Intelligence Reform And Terrorism Prevention Act of 2004.
2004, Pub. L.
No. 108-458,
108458, 118
118 Stat. 3638 (2004).
9 Although
Although the
the FBI
FBIhas
hasconcurrent
concurrentjurisdiction
jurisdiction with
with the
the Bureau
Bureau of
ofAlcohol
Alcohol Tobacco & Firearms and the Postal
by virtue
virtue of
ofJurisdictional
Jurisdictional Guidelines
Guidelines- published
published in the United States
Inspection Service under this section, by
1973 for the FBI,
FBI. ATF,
AU, and
and Postal
Postal Inspection
Inspection Service
Service which became effective
Bulletin on
on April
April 13,
13, 1973
Attorney's Bulletin
March 1,
1, 1973
1973 (commonly
(commonly referred
referred to
to as
as the
the April 13,
13, 1973
1973 MOU) - the FBI will exercise primary jurisdiction
aIJ alleged violations
violations of
ofsection
section844
844 which
which appear
appear at
at the
the outset
outset to
to have
have been perpetrated by
over all
terrorist/revolutionary groups or individuals.
The FBI
FBI also
also is
is given
given primary
primary jurisdiction over several other 844
individuals. The
violations even without a terrorism nexus, e.g., offenses involving possession of explosives in buildings owned,
aIJeged offenses directed against foreign diplomatic facilities; and alleged
leased. used, etc., by the United States; alleged
leased,
offenses against colleges and universities.

10
242. Opinion of the Office of Legal Counsel, U.S. Department of Justice.
H3 See 20 U.S. Op. OLC 242,
Justice, FBI
INVESTIGATE VIOLATIONS OF
OF SUBTITLE
SUBTITLE E
E OF
OF "ITILE
TITLE 26 OR 18 U.S.C. SECTIONS
AUTHORITY TO INVESTIGATE
1996 (finding where the FBI has a reasonable expectation that if an investigation involves a
921-930, June 21, 1996
crime of terrorism over which a statute or Presidential Decision Directive 39 [issued June 21, 1995, but has since
been superseded by a National Security Presidential Directive] has granted primary responsibility to the'FBI, the
FBI's lead role may be extended to cover crimes as to which lead responsibility would otherwise reside
elsewhere).
II Under
Underthe
theFRAID
FRAIDStatute
Statute(18,
(18,USC,
USC, 1028),
I028),j~risdiction
has been
been divided
divided by
by the
the DOJ
DOJ between
between the FBI, U.S.
jurisdiction has
defrauded or investigating Federal agency, if
if said agency has civilian criminal investigative
Secret Service or the defrauded
MlOG Part I, sections 253-2.3 & 253-2.4 Q!
authority or a Statutory Inspector General, see MIOG
or MOU between FBI
of 1984,
1984, dated September 15, 1989.
and U.S. Secret Service Pursuant to the Comprehensive Crime Control Act of

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005562

72

1111 11 SS M0 S S IP O OS IM 0 SSS IS SIIIII II M 00 S SO 0SS O O111 11 11

,.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
18 U.S.C. 102912
102912
U.s.C. 103013
10301~
18 U.S.C.
1038"
18 U.S.C. 103814

18 U.S.C. 1074

FRAUD AND RELATED


RELATED ACTIVITY IN CONNECTION
CONNECTION WITH
WITH ACCESS
ACCESS
DEVICES
DEVICES
FRAUD AND RELATED ACTIVITY IN CONNECTION WITH
WITH
COMPUTERS
COMPUTERS
FALSE INFORMATION AND
AND HOAXES
HOAXES

15
18 U.S.C. 1091
109115

VOID PROSECUTION FOR DAMAGING OR DESTROYING


FLIGHT TO A
AVOID
ANY BUILDING OR OTHER REAL OR PERSONAL PROPERTY
GENOCIDE

18 U.S.C. 1117

CONSPIRACY TO MURDER

18 U.S.C. 1119
18

FOREIGN MURDER OF UNITED STATES


STATES NATIONALS
NATIONALS

18 U.S.C. 1201

KIDNAPPING
KIDNAPPING

120316
18 U.S.C. 120316

18 U.S.C. 1341

ACT FOR THE PREVENTION AND PUNISHMENT OF THE CRIME OF


HOSTAGE TAKING
MAIL FRAUD

18 U.S.C. 1343

FRAUD BY WIRE, RADIO,


RADIO, OR TELEVISION

18 U.S.C. 1344

BANK FRAUD

U;S.C. 1361
18 U.S.C.
1361

GOVERNMENT
CONTRACTS
GOVERNMENT PROPERTY'OR
PROPERTYOR CONTRACTS

18 U.S.C. 1362

COMMUNICATION LINES,
LINES, STATIONS
STATIONS OR
OR SYSTEMS
SYSTEMS

18 U.S.C. 1363

BUILDINGS OR PROPERTY WITHIN SPECIAL MARITIME


MARITIME AND
AND
TERRITORIAL JURISDICTION
INTERFERENCE WITH FOREIGN COMMERCE BY
BY VIOLENCE
VIOLENCE

. 18
18U.S.C.
U.S.C. 1364
18 U.S.C:
U.S.C, 1365

TAMPERING WITH CONSUMER PRODUCTS


PRODUCTS

18 U.S.C. 1366

DESTRUCTION OF AN ENERGY FACILITY

18 U.S.C. 1367

INTERFERENCE WITH THE OPERATION


OPERATION OF A
A SATELLITE

18 U.S.C. 1521

RETALIATING
RETALIATING AGAINST
AGAINST A
A FEDERAL
FEDERAL JUDGE
RIDGE OR FEDERAL
FEDERAL LAW
..,.,,..,""' (IPPIT'PR RV
I!>. T <::~
Tl\iI ()P
<::T I!>.
NTYPP ()j:;
TITT j:;
PINTMRCFMFMT
RV ~
FAT
cP rT
CT I!>.ATM
np CT
ANTIPP
Or TTTT
P

See MOU between FBI and U.S. Secret Service Pursuant to the Comprehensive Crime Control
12 See
Control Act of
seq., for
1984, dated September 15, 1989, Q!
or MIOG, Part I, section 258 -1
-1 et seq.,
for investigative jurisdiction
jurisdiction
relating t()
to this statute.
See MOU between FBI and U.S. Secret Service Pursuant to the Comprehensive
13 See
Comprehensive Crime Control
Control Act
Act of
1984, dated September 15, 1989, for investigative jurisdiction
jurisdiction relating to this statute.
statute.
Thiscriminal
criminal violation
violationwas
was enacted
enacted by
by the
the Intelligence
Intelligence Reform
Reform and Terrorism Prevention
Preventi()n Act of 2004,
14 This
2004,
Pub. L. No. 108-458, 118 Stat. 3638 (2004).
(2004).
IS The
TheUnited
United States
States Attorneys'
Attorneys' Manual,
Manual, 9-2.136,
9-2.136, Investigative
Investigative and
and Prosecutive
Prosecutive Policy for International
13
Terrorism Matters (September 1997 Edition), recognizes genocide as an
an international
international terrorism offense.
offense.

See also National Security Presidential Directive - 12, UNITED STATES CITIZENS
16 See
CITIZENS TAKEN
TAKEN
HOSTAGE ABROAD, dated February 18,
18,2002,
..
2002, which outlines the FBI's
FBI's responsibilities
responsibilities..

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005563

73
73

a
a

UNCLASSIFIED//FOR OFFICIAL USE ONLY

I
I
I

18 U.S.C. 1541 - 1546


18 U.S.C. 1651
1651-1661
- 1661

CRIMES BASED UPON IMPROPER ACQUISITION OR MISUSES OF


PASSPORT, VISA, OR ENTRY DOCUMENTS
PIRACY AND PRIVATEERING
PRIVATEERING

18 U.S.C. 1951

INTERFERENCE WITH COMMERCE BY THREATS OF VIOLENCE

18 U.S.C.
U.S.C. 1952
1952 .'

INTERSTATE AND FOREIGN TRAVEL OR TRANSPORTATION IN AID


OF RACKETEERING ENTERPRISES
MONEY LAUNDERING AS IT RELATES TO TERRORISM OFFENSES

18 U.S.C. 1956

18 U.S.C. 1959

ENGAGING IN MONETARY TRANSACTIONS IN PROPERTY DERIVED


FROM SPECIFIED UNLAWFUL ACTIVITY
VIOLENT CRIMES IN AID OF RACKETEERING ACTIVITY

U.s.C. 1960
18 U.S.C.

PROHIBITION
OFILLEGAL
ILLEGALMONEY
MONEYTRANSMITTING
TRANSMITTING BUSINESSES
BUSlNESSES
PROHIBMON OF

18 U.S.C. 1962

PROHIBITED ACTIVITIES RELATING TO RICO

18 U.S.C. 1991

ENTERING TRAIN TO COMMIT A CRIME

18 U.S.C. 1992

TERRORIST ATTACKS
ATIACKS AND OTHER VIOLENCE AGAINST MASS
TRANSPORTATION SYSTEMS ON LAND,
LAND,ON
ON WATER, OR THROUGH
THE AIR
SABOTAGE

18 U.S.C. 1957

18 U.S.C. 2151
2151 et
et seq.
18 U.S.C. 2237
18 U.S.C. 2261A

18 U.S.C. 2284

DESTRUCTION OF VESSELS; VIOLENCE AGAINST MARITIME


NAVIGATION
TRANSPORTATION OF EXPLOSIVES, BIOLOGICAL, CHEMICAL, OR
MATERIALS
RADIOACTIVE OR NUCLEAR MA
TERlALS
TRANSPORTATION OF TERRORISTS

18 U.S.C. 2291
2291

DESTRUCTION OF VESSEL OR MARITIME FACILITY

18 U.S.C. 2292

IMPARTING OR CONVEYING FALSE INFORMATION

18 U.S.C. 2332

TERRORIST ACTS ABROAD AGAINST UNITED STATES NATIONALS

18 U.S.C. 2332a

USE OF WEAPONS OF MASS DESTRUCTION

18
U.S.C. ,
2332b
18U.S.C.
,2332b

ACTS OF TERRORISM TRANSCENDING NATIONAL BOUNDARlES


BOUNDARIES

18 U.S.C. 2332d"
2332d17

FINANCIAL TRANSACTIONS

l5
18 U.S.C. 2332f
2332f'5

BOMBINGS OF PLACES OF PUBLIC USE, GOVERNMENT FACILITIES,


PUBLIC TRANSPORTATION SYSTEMS AND INFRASTRUCTURE
FACILITIES
MISSll..E SYSTEMS DESIGNED TO DESTROY AIRCRAFT
MISSILE

I
I
a

I
I

18 U.S.C. 2271 - 2282B

CRIMINAL SANCTIONS FOR FAILURE TO HEAVE TO, OBSTRUCTION


OF BOARDING, OR PROVIDING FALSE INFORMATION
INTERSTATE STALKING

18 U.S.C. 2283

18 U.S.C.
U.S.C. 2332gl~
2332g"

I
TheFBI
FBIhas
has concurrent
concurrentjurisdiction
jurisdiction with
with the
the Department
Department of
of Treasury, and Customs, see United States
17 The
Manual, 9-4.000
9-4.000 -- Statutes
Statutes Assigned by Citation.
Attorneys' Manual,
IBSeesupra
IgSee supra note 14.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005564

74 ,

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
2U
18 U.S.C. 2332h
2332h2

RADIOLOGICAL DISPERSAL DEVICES


DEVICES

18 U.S.C. 2339~1
233921

HARBORING OR CONCEALING TERRORISTS


TERRORISTS

18 U.S.C. 2339A

PROVIDING MATERIAL SUPPORT TO TERRORISTS

18 U.S.C. 23398
2339B

PROVIDING MATERIAL SUPPORT OR RESOURCES TO DESIGNATED


DESIGNATED
FOREIGN TERRORIST ORGANIZATIONS
PROHIBITIONS AGAINST THE FINANCING OF TERRORISM

22
18 U.S.C. 2339C
2339C22
23
18 U.S.C. 2339D
2339D23

18 U.S.C. 2340A

RECEIVING MlLITARY
MILITARY TYPE TRAINING FROM A FOREIGN
TERRORIST ORGANIZATION
ORGANlZATION
TORTURE

U.s.C. 2381
18 U.S.C.
2381 et
et seq.

TREASON, SEDITION, AND SUBVERSNE


SUBVERSIVE ACTNITlES
ACTIVITIES

18 U.S.C. 2441
2441

WAR CRIMES

18 U.S.C. 3286""
328624 .
21 U
.S.C. 846
U.S.C.

EXTENSION OF STATUTE OF LIMITATION FOR CERTAIN


TERRORISM OFFENSES
ATTEMPT AND CONSPIRACY

21 U.S.C. 863

DRUG PARAPHERNALIA

21 U.S.C. 960a
22 U.S.C. 611
611 - 621
621

FOREIGN TERRORIST ORGANIZATIONS,


ORGANIZATIONS, TERRORIST PERSONS, AND
GROUPS
FOREIGN AGENTS REGISTRATION ACT

22 U.S.C. 2712~
271225

CONTROLS OVER CERTAIN TERRORISM -- RELATED


RELATED SERVICES

22 U.S.C. 2778

CONTROLS OF ARMS EXPORTS AND lMPORTS


IMPORTS (SEE 22 C.F.R.,
C.F.R., PART
PART
127 FOR VIOLATIONS AND PENALTIES)
PENALTIES)
MACHINE GUNS, DESTRUCTNE
DESTRUCTIVE DEVICES,
DEVICES, AND CERTAIN OTHER
FIREARMS

26 U.S.C.
U.S.C. subtit.
subtit. E, ch. 53'b
5326

19This
19
This criminal violation was enacted by the Intelligence Refonn
Reform and
and Terrorism
Terrorism Prevention
Prevention Act of 2004,
2004,
108-458,118
Pub. L.
L. No. 108-458,
118 Stat. 3638 (2004)
20
20

!d.
Id.

21 This
This criminal
criminal violation
violation was
was enacted
enacted by
by the
the USA PATRIOT Act,
21
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, 115 Stat. 272
(2001).

2?
22 This criminal violation was enacted by the Suppression of the Financing of Terrorism Convention
Implementation Act of 2002, Pub. L. No. 107-197, 116 Stat. 724 (2002).
(2002).
23.
23

See supra note 18.


See

As amended
amended by
bythe
theUSA
USAPATRIOT
PATRIOTAct,
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, Title VIII, 809(a),
809(a). 115 Stat. 272, 379As
380 (2001) (provided no statute of
of limitation for certain terrorism offenses; and expressly provided that
"[t]he amendments made
made by
by this
this section
section shall apply to the prosecution of any offense committed
"[t]he
committed before, on,
on,
or after the date of the enactment of this section
section [October 26,
26, 2001]."
2001]."
24

. 2522,
"[t]he Attorney General and
2522, U.S.C. 2712(f)(2), which pertains to investigations, states, "Mlle
and the Secretary
shaH have authority to investigate violations of regulations
of Treasury shall
regulations under this
this section."
section."
26See
26See supra note 10.

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005565

75
75

I.

UNCLASSIFIED//FOR
UNCLASSIFIEDlfFOR OFFICIAL USE ONLY
U.S.C. 533227
5332z7
31 U.S.C.

BULK CASH SMUGGLING INTO OR OUT OF THE UNITED STATES

42 U.S.C. 2011
2011-- 2284

ATOMIC ENERGY ACT

49 U.S.C. 46501 - 46507

CRIMES ABOARD AN AIRCRAFT; FALSE INFORMATION AND


THREATS
ENTERING AIRCRAFT OR AIRPORT AREA IN VIOLATION OF
SECURITY REQUIREMENTS
DAMAGING OR DESTROYING AN INTERSTATE GAS PIPELINE OR
INTERSTATE HAZARDOUS LIQUID PIPELINE FACILITY
DAMAGE TO TRANSPORTED PROPERTY

49 U.S.C. 46314
49 U.S.C. 60123(b)
49 U.S.C. 80501
80501

.OTHER AUTHORITIES RELATING TO THE


TilE FBI's
INVESTIGATIVE JURISDICTION
JURISDicnON IN TERRORISM CASES
FBI'S INVESTIGATIVE
U.s.C. 533
28 U.S.C.

CONFERS ON THE ATTORNEY GENERAL BROAD GENERAL


INVESTIGATIVE AUTHORITY WITH RESPECT TO FEDERAL CRIMINAL
TIllS STATUTE,
STATUTE, THE ATTORNEY GENERAL "MAY
UNDER THIS
OFFENSES. UNDER
APPOINT OFFICIALS TO DETECT AND PROSECUTE CRIMES AGAINST
THE UNITED STATES."

28 U.S.C. 538

FBI IS AUTHORIZED TO INVESTIGATE ANY VIOLATION OF 49 U.S.c.


U.S.C.
46314 AND VIOLATIONS OF CHAPTER 465 OF TITLE 49 U.S.c.
U.S.C. (SPECIAL
AIRCRAFT JURISDICTION OF THE UNITED STATES).

U.S.c. 552a(e)(7)
5 U.S.C.

THE FBI SHALL MAINTAIN NO RECORD DESCRIBING HOW ANY


INDIVIDUAL EXERCISES RIGHTS GUARANTEED BY THE FIRST
AMENDMENT UNLESS EXPRESSLY AUTHORIZED BY STATUTE OR BY
THE INDIVIDUAL ABOUT WHOM THE RECORD IS MAINTAINED OR
UNLESS PERTINENT TO AND WITIDN
WITHIN THE SCOPE OF AN AUTHORIZED
LAW ENFORCEMENT ACTIVITY.

3414(S)(A)U
12 U.S.C. 3414(5)(A)28

FlNANCIAL
FINANCIAL INSTITUTIONS.SHALL COMPLY WITH FBI REQUEST FOR A
FlNANCIAL RECORDS.
CUSTOMER'S OR ENTITY'S FINANCIAL

15 U.S.C. 1681b(b)(4)

CONDITIONS FOR FURNISHING AND USING CONSUMER REPORTS FOR


EXCEPTION FOR NATIONAL SECURITY
EMPLOYMENT PURPOSES:
PURPOSES: EXCEPTION
INVESTIGATIONS (FAIR CREDIT REPORTING ACT).

U.S.C. 1681u29
1681u29
15 U.S.C.

DISCLOSURE TO FBI FOR COUNTERlNTELLIGENCE


COUNTERINTELLIGENCE PURPOSES (FAIR
CREDIT REPORTING ACT)

S
S

'.

S
S

Thiscriminal
criminalviolation
violationwas
was enacted
enacted by
by the
the USA
USA PATRIOT
PATRIOT Act,
Act, Pub.
Pub. L. No.
27 This

107-56,115
107-56,
115 Stat. 272 (2001).

Asamended
amended by
by the
theUSA
USA PATRIOT
PATRIOTAct,
Act, Pub.
Pub. L.
L. No.
No. 107-56,
107-56, Title
Title III,
III, 358(f)(2),
35&(f)(2), Title V,
28 As

404, 115 Stat. 272, 327.


327
(2001) (FBI Director or the Director's designee must certify in writing to the financial institution that records sought are
for foreign counterintelligence purposes to protect against
against international
international terrorism
terrorism or
or other
other clandestine
clandestine activities).
activities). Also,
No.1108-177,
08-177, Title III, Subtitle E, 374,
the Intelligence Authorization Act for Fiscal Year 2004, Pub. L. No.
117 Stat. 2599, 2628 (2003) significantly expanded the definition of "financial institution" for National Security Letters
of 1978, e.g., entities now include pawnbrokers, travel agencies,
obtained under the Right to Financial Privacy Act of
telegraph companies, security dealers and brokers, and commodity futures transactions.

29
29

Director's designee
designee must certify that written request for information is sought for the cbnduct
The FBI Director or Director's
conduct of
an authorized investigation to protect against international terrorism or clandestine intelligence activities.

UNCLASSIFIEDlfFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

S
ACLURM005566

76
76

UNCLASSIFIED//FOR OFFICIAL USE ONLY


1681Vlo
15 U.S.C. 1681v3

DISCLOSURES TO GOVERNMENTAL AGENCIES FOR


COUNTERTERRORISM PURPOSES (FAIR CREDIT REPORTING ACT)

26 U.S.C. 6103(i)(2)

DISCLOSURE OF RETURN INFORMATION OTHER THAN TAXPAYER


RETURN INFORMATION FOR USE IN CRIMINAL INVESTIGATIONS

26 U.S.C. 6t03(i)(3)
6103(i)(3)

DISCLOSURE OF RETURN INFORMATION TO APPRISE APPROPRIATE


OFFICIALS OF CRIMINAL OR TERRORIST ACTIVITIES OR EMERGENCY
CIRCUMSTANCES

26 U.S.C. 6103(i)(7)

DISCLOSURE UPON REQUEST OF INFORMATION RELATING TO


TERRORIST ACTIVITIES

.28
28 U.S.C. 530C(a)(S)
530C(a)(5)

"ATIORNEY GENERAL EXEMPTION" PROVISION


APPROPRIATIONS RE "ATTORNEY
FOR UNDERCOVER OPERATIONS
OPERATIQNS CONDUCTED BY THE FB1310ctober
FBI31 0ctober 6,
10C5 Stat.1.838,
Stat. 1838, as incorporated by Public Law 104-132, Antiterrorism and
1992, 106
VIII, 815(d).
1996. 110 Stat.
Effective Death Penalty Act of 1996, Title VIII,
815(d), April 24.
24, 1996,
1315. as amended, which is set out as a note under 28 U.S.C. 533.
1315,
SECRETARY OF TREASURY'S DESIGNEE SHALL REFER ANY REPORT
OF A SUSPICIOUS TRANSACTION TO ANY APPROPRIATE LAW
ENFORCEMENT, SUPERVISORY AGENCY, OR UNITED STATES
INTELLIGENCE AGENCY FOR USE IN THE CONDUCT OF
INTELLIGENCE OR COUNTERINTELLIGENCE ACTIVITIES, INCLUDING
ANALYSIS. TO PROTECT AGAINST INTERNATIONAL TERRORISM.
ANALYSIS,

31 U.S.C. 5318(g)(4)(B)

.
42 U.S.C. 5197g

'

FBI IS AUTHORIZED TO INVESTIGATE ESPIONAGE, SABOTAGE, AND


49. U.S.C.,
U.S. C., CHAPTER 68
SUBVERSIVE ACTS PURSUANT TO TITLE 49,
(DISASTER RELIEF), SUBCHAPTER IV-B (EMERGENCY
PREPAREDNESS).
.

3Z
50 U.S.C. 402a
402a32

THE FBI MAY INVESTIGATE TO DETERMINE THE SOURCE OF AN


UNAUTHORIZED DISCLOSURE OF CLASSIFIED INFORMATION AFTER
CONSULTING WITH THE EXECUTIVE DEPARTMENT OR AGENCY
INVOLVED.

403-5a~~
50 U.S.C. 403-5a33

ASSISTANCE TO UNITED STATES LAW ENFORCEMENT AGENCIES

30 As amended by the USA


usA PATRIOT Act.
10756. Title III, 358(g)(l)(B).
327328
Act, Pub. L. No. 107-56,
358(g)(1)(B), 115 Stat. 272, 327-328
.
(2001).

30

31The
31
The "Attorney General exemption"

(a)(5). means section 102(b) of


in subsection (a)(5),
Public Law 102-395, Department of Justice and Related Agencies Appropriations Act.
Act,

This statute
statuterequires
requires that
that the
the head
head of
ofeach
each department
department or
or agency
agency within
within the executive branch to advise the FBI
32 This
. immediately of
of any information which indicates that classified information is being, or may have been, disclosed in an
unauthorized manner to a foreign agent or an agent of a foreign power.
33 Elements
Elements of
ofthe
theintelligence
intelligencecommunity
community may,
may. upon
upon request
request of
of aa United
United States
States law

enforcement agency, collect


information outside the United States
States about
about individuals
individuals who
who are
are not
not United
United States
States persons.
persons. Such elements may collect
such information notwithstanding that law enforcement agency intends to use the information collected for purposes of
Authority for
for DoD
DoD assistance
assistance is
is restricted
restricted to
to (1)
(1) the National
a law enforcement or counterintelligence investigation.
investigation. Authority
Security Agency; (2) the National Reconnaissance
Reconnalssance Office; (3) the National Imagery and Mapping Agency; and (4) the
Assistance provided
provided under
under this
this section by elements of
of DoD may not include direct
Defense Intelligence Agency.
Agency. Assistance
participation of a member of the Army, Navy, Air Force, or Marine Corps in an arrest or similar activity.
.

UNCLASSIFIED//FOR
OFFICIAL USE ONLY
UNCLASSIFIED//FOR 01-.FICIAL

ACLURM005567

77
77

UNCLASSIFIED//FOR OFFICIAL USE ONLY

so U.S.C. 43634
43634
50

REQUESTS BY AUTHORIZED INVESTIGATIVE AGENCIES FOR


FINANCIAL RECORDS OR CONSUMER REPORTS

SO U.S.C. 1802
50

AUTHORIZATION FOR ELECTRONIC SURVEILLANCE FOR FOREIGN


INTELLIGENCE PURPOSES

SO U.S.C. 1822
50

AUTHORIZATION OF PHYSICAL SEARCHES FOR FOREIGN


INTELLIGENCE PURPOSES. SEE ALSO EXECUTIVE ORDER 12949,
DATED FEBRUARY 9, 1995.

SO U.S.C. 1842
50

INSTALLATION AND USE OF PEN REGISTERS


REGISTERS AND TRAP AND TRACE
DEVICES FOR FOREIGN INTELLIGENCE AND
AND INTERNATIONAL
INVESTIGATIONS: BASED ON ATTORNEY GENERAL
TERRORISM INVESTIGATIONS:
APPROVAL OR DESIGNATED ATTORNEY FOR THE GOVERNMENT FOR
FBI TO CONDUCT INVESTIGATIONS UNDER SUCH GUIDELINES AS THE
AG APPROVES PURSUANT TO EXECUTIVE ORDER 12333, OR A
SUCCESSOR ORDER.

SO U.S.C. 1861
50

ACCESS TO CERTAIN BUSINESS RECORDS


RECORDS FOR FOREIGN
INTELLIGENCE PURPOSES

SO U.S.C. 1881a
50

PROCEDURES FOR TARGETING CERTAIN PERSONS


PERSONS OUTSIDE THE
UNITED STATES OTHER THAN UNITED STATES PERSONS

SO U.S.C. 1881b
50

CERTAIN ACQUISITIONS INSIDE THE UNITED STATES TARGETING


UNITED STATES PERSONS OUTSIDE THE UNITED STATES
OTHER ACQUISITIONS TARGETING UNITED STATES PERSONS
OUTSIDE THE UNITED STATES

50 U.S.C. 188Ie
1881c
SO U.S.C. 1881d
50

JOINT APPLICATIONS AND CONCURRENT AUTHORIZATIONS

10 U.S.C. 371 note

MILITARY JOINT TASK FORCES HAVE AUTHORITY TO PROVIDE


SUPPORT TO LAW ENFORCEMENT AGENCIES
AGENCIES CONDUCTING
COUNTER-TERRORISM ACTIVITIES

38235
10 U.S.C. 38235

EMERGENCY SITUATIONS INVOLVING CHgMICAL


CHEMICAL OR BIOLOGICAL
WEAPONS OF MASS DESTRUCTION (MILITARY ASSISTANCE)
\t

10 U.S.C. 256436
2564J6

PROVISION OF SUPPORT FOR CERTAIN SPORTING EVENTS (MILITARY


ASSISTANCE)

"4 Any
Any authorized
authorized investigative
investigativeagency
agency may
may request
request from
from any
any financial
financial agency,
agency, financial
financial institution, or holding company, or from any
"
consumer reporting agency,
agency. such financial
financial records,
records. other financial information,
infonnation. and consumer
COnsumer reports as may be necessary in order to
investigation. counterintelligence inquiry,
inquiry. or security determination.
conduct any authorized law enforcement investigation,
Thisstatute
stalute provides
provides that
thaI "[Ole
"[l]he Secretary
Secretary of Defense.
Attorney General,
General,may
may provide
provide assistance
assistance in support
This
Defense,upon
upon request
request of the Attorney
175 [biological weapons)
. chemical weapons)
of Justice activities relating to the enforcement of section 175
of Department of
weapons] and [229
[229 et seq
seq.,
weapons]
18 during an emergency situation involving a biological or chemical weapon
of title 18
weapon of mass destruction."
destruction."
,S
35

36 This
Thisstatute
statuteprovides
providesthat
that"(alt
"[a)tthe
therequest
requestof
ofaaFederal,
Federal. State,
State. or
or local
local government
government agency responsible for providing law
36
security services,
services. or
or safety services,
services. the Secretary of Defense or the commander of a military
enforcement services, security
military installation
installation or
or
of Defense or the commander of a specified or unified combatant command
of the Department of
other facility of
command to
to provide assistance
assistance for
Soccer Games,
Games. the
the Goodwill
Goodwill Games,
Games. the Olympics,
Olympics. and any other civilian sporting event in support of essential
the World Cup Soccer
safely at
at such
such event,
event. but
bUlonly
Attorney General certifies that
thaI such assistance is necessary to meet essential security
security and safety
only ifif the Attorney
and safety needs." See also MOU Between the Department of Justice and the Department of Defense Concerning Support for Security
(dated(dated
February
10, 199B),
and8 DoD
Directive
2000.15,
"Support
totoSpecial
for
Sporting
Events
forCivilian
Civilian
Sporting
Events
February
10, 199
) , and
DoD Directive
2000.15,
"Support
Special
Events,
datedNovember
November 21,
1994.
Events," dated
21, 1994.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005568

78
78

UNCLASSIFIED//FOR OFFICIAL USE ONLY


32 C.F.R. 623.2(6)

LOAN POLICIES OF THE ARMY RELATING TO REQUESTS BY


FBI DIRECTOR OR SENIOR FBI OFFICIAL FOR MILITARY RESOURCES
RESOURCES
NEEDED FOR TERRORlSM
TERRORISM RELATED MATTERS
MATTERS

18 U.S.C. 175a, 229E,


& (e)(1)
(e)(l) &
& 2332e
831(d) &

REQUESTS FOR MILITARY ASSISTANCE TO ENFORCE PROHIBITION IN


CERTAIN EMERGENCIES
EMERGENCIES

18 U.S.C. 981(a)(I)(G)
981(a)(1)(G) &
&
(H)37
(H)37
28 C.F.R. 8.23S
8.238

CIVIL FORFEITURE
DESIGNATION OF
OF FBI
FBI OFFICIALS
OFFICIALS HAVING.
HAVING SEIZURE AUTIIORlTY
AUTHORITY IN
FORFEITURE MATTERS

U.S.C;. 2516
18 U.S.C.

18 U.S.C. 2709

COUNTERlNTELLIGENCE
COUNTERINTELLIGENCE ACCESS TO TELEPHONE TOLL AND
TRANSACTIONAL RECORDS
"RELEVANT TO AN
RECORDS THAT ARE ''RELEVANT
AUTHORlZED INVESTIGATION TO PROTECT AGAINST
AUTHORIZED
INTERNATIONAL TERRORISM
TERRORlSM OR CLANDESTINE INTELLIGENCE
ACTIVITIES."

20 U.S.C. 1232g

DISCLOSURE OF EDUCATIONAL RECORDS RELATING TO


INVESTIGATION AND PROSECUTION OF TERRORlSM
TERRORISM ("BUCKLEY
AMENDMENT")

28 C.F.R. 0.85

UNDER THIS REGULATION, THE ATTORNEY GENERAL HAS


HAS
DELEGATED INVESTIGATIVE AUTHORlTY
AUTHORITY TO THE FBI FOR ALL
CR1MES
CRIMES NOT OTHERWISE ASSIGNED BY CONGRESS TO ANOTHER
IT ALSO
ALSO PROVIDES
PROVIDES THAT THE FBI SHOULD "EXERCISE
AGENCY.
AGENCY. IT
LEAD AGENCY RESPONSmILITIES
RESPONSIBILITIES IN INVESTIGATING ALL CRlMES
CRIMES
FOR WHICH IT HAS PRIMARY OR CONCURRENT JURlSDICTION
JURISDICTION AND
WHICH INVOLVE TERRORIST ACTIVITIES WITHiN
WITHIN THE STATUTORY
JURISDICTION OF THE UNITED STATES."

28 C.F.R. 0.89

THE FBI DIRECTOR IS AUTHORlZED


AUTHORIZED TO EXERCISE AUTHORlTY
AUTHORITY
RELATING TO THE SEIZURE OF ARMS ANDMUNITIONS
AND MUNITIONS OF WAR,
WAR, AND
OTHER ARTICLES AS WELL AS SEIZING AND DETAINING ANY VESSEL,
VESSEL,
VEHICLE, OR AIRCRAFT CONTAINING SUCH ITEMS
ITEMS PURSUANT TO 22
22
U.S.C. 401 (ILLEGAL EXPORTATION OF WAR MATERIALS).
MATERIALS).

IS
.

S
S

a
S
S

AUTHORIZATION (BY ATTORNEY GENERAL OR DESIGNATED DOJ


OFFICIAL) FOR FBI INTERCEPTION OF WIRE, ORAL, OR ELECTRONIC
COMMUNICATIONS THAT MAY PROVIDE OR HAS PROVIDED
EVIDENCE OF VIOLATIONS
VIOLATIONS OF E.G., SECTION 175 (RELATING TO
TO
BIOLOGICAL WEAPONS); SECTION 229 (RELATING TO
TO CHEMICAL
WEAPONS); OR SECTIONS 2332, 2332a, 2332b, 2332f, 2339A, 2339B,
2339B, or
2339C of TITLE 18 (RELATING TO TERRORISM)

S
S

S
S

Thesestatutory
statutory sections
sections provide
providecivil
civil forfeiture
forfeiture authority
authority relevant
relevant to
to acts of
of domestic
37 These

or international

terrorism.
terrorism.
38
38The

The FBI is authorized to seize property subject to seizure pursuant to statutes identified in 8.I,e.g.
8.1, e.g. 22
U.S.C. 401, Illegal Exportation of War Materials.
.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

S
S

ACLURM005569

79

UNCLASSIFIED//FOR OFFICIAL USE ONLY


103.100J~
31 C.F.R. 103.10039

INFORMATION SHARING BETWEEN FEDERAL LAW ENFORCEMENT


AGENCIES AND FINANCIAL INSTITUTIONS
A FEDERAL LAW ENFORCEMENT AGENCY INVESTIGATING
TERRORIST ACTIVITY OR MONEY LAUNDERING MAY REQUEST THAT
FinCEN SOLICIT, ON THE INVESTIGATING AGENCY'S BEHALF,
CERTAIN INFORMATION FROM A FINANCIAL INSTITUTION OR A ..
GROUP OF FINANCIAL INSTITUTIONS BASED ON CREDmr:.EEVIDENCE
CREDIBLE
EVIDENCE
C:::::.,
CONCERNING
"""<'.. ' ...
ACTNITY OR MONEY LAUNDERING.
TERRORIST ACTIVITY

33 C.F.R. 233.3

45 C.F.R. 164.512(k)(2)

CHIEF POSTAL INSPECTOR OF US POSTAL SERVICE MAY ORDER A


MAIL COVER UPON WRITTEN REQUEST FROM THE HEAD OF A LAW
ENFORCEMENT AGENCY SPECIFYING REASONABLE GROUNDS
GROUNDS THAT
DEMONSTRATE THE MAIL COVER IS NECESSARY TO "PROTECT THE
NATIONAL SECURITY OF THE uNITED
UNITED STATES" (E.G., ACTUAL OR
POTENTIAL THREATS TO OUR SECURITY; AN ATTACK OR OTHER
GRAVE HOSTILE ACT; SABOTAGE OR INTERNATIONAL TERRORISM;
AND CLANDESTINE INTELLIGENCE ACTIVITIES).
USES AND DISCLOSURES OF HEALTH INFORMATION FOR
SPECIALIZED GOVERNMENT FUNCTIONS, NATIONAL SECURITY AND
U.S.c.,
INTELLIGENCE ACTIVITIES: AUTHORIZING STATUTE TITLE 42, U.S.C.,
J320d-2 NOTE
1320d-2

NATIONAL SECURITY EMERGENCY PREPAREDNESS PROGRAM AND


DEPARTMENT OF
RESPONSIBILITIES (SEPTEMBER
JUSTICE ORDER
RESPONSIBILITIES
(SEPTEMBER 12,
12, 2003).
2003). THE FBI'S
OSTED IN THIS ORDER
1900.5B 4o
1900.5B4
RESPONSIBILITIES ARE LISTED
(3) Responding to
specific requests from senior
government officials and
agencies for FBI information
related to foreign

counterinu~lligence and
counterintelligence
domestic security matters.

39See
U.S.c., 5311 note, pursuant to USA PATRIOT Act, October 26,
26,2001,
39See Title 31, U.S.C.,
2001, the Secretary of
Treasury is required to "adopt regulations to encourage further cooperation among financial institutions,
their regulatory authorities, and law enforcement authorities, with the specific purpose of encouraging
regulatory authorities and law enforcement authorities to share with financial institutions information
regarding individuals, entities, and organizations engaged in, or reasonably suspected based on credible
evidence .of
of engaging in, terrorist acts or money laundering activities."
40
40

According to this Order, the FBI is responsible for providing a response to foreign counterintelligence
and domestic security and
and terrorism
terrorism threats:
threats. This includes:
(1) Directing and coordinating, as circumstances allow, urgent and expanded efforts
(1)
required by Congressional enactments and executive branch directives to detect and deter hostile activities
directed against the United States by foreign or domestic elements;
(2) Disseminating information, to the extent that conditions permit, concerning hostile
(2)
intentions and activities toward government officials and agencies; and

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005570

80

,.

I.
I,.

S
S

S
S

".

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
ATTORNEY GENERAL
2954-200841
ORDER NO. 2954-200841

DELEGATION TO THE DIRECTOR OF THE FBI CERTAIN AUTHORITY


RELATING TO THE PROVISION OF TECHNICAL ASSISTANCE TO
FEDERAL, STATE, LOCAL, AND FOREIGN LAW ENFORCEMENT
AGENCIES

ATTORNEY GENERAL
ORDER NO;
NO: 2857-2007
ORDER
.
.........

DELEGATION TO THE DIRECTOR OF THE FBI OF AUTHORITY TO


GRANT REWARDS FOR INFORMATION CONCERNING TERRORIST ACTS
ACTS
3071-77).
THE FBI
FBI DIRECTOR
DIRECTOR IS ALSO AUTHORIZED TO
(18 U.S.C.
3071-77). THE
FBI
OFFICIALS.
DELEGATE
OFFICIALS.
';'--..
..
..
.. ......_ THE AUTHORITY TO APPROPRIATE

~.:....

DELEGATION OF AUTHORITY TO AUGMENT THE FBI'S


42
JOINT TERRORISM TASK FORCES
FORCES42

ATTORNEY GENERAL
ORDER NO.
NO. 2654-2003
ORDER

DELEGATION OF AUTHORITY TO CONDUCT SECURITY CHECKS


CHECKS AND
~CTIONS PURSUANT TO THE PUBLIC HEALTH
TO TAKE OTHER ACTIONS
SECURITY AND BIOTERRORISM PREPAREDNESS AND RESPONSE ACT
43
OF 2002
(specific sections codified at 42 U.S.C.
200243(specifie
U.S.C. 262a,
262a, 7 U.S.C.
U.S.C. 8401.
8401, and
and 7
U.S.C. 8411), to receive names and other identifying information submitted by
individuals requesting access to specified agents or toxins; utilize electronic
databases and other sources of information to conduct background checks and
security risk assessments of such individuals; and consult with appropriate officials
of the Department of Health and
and Human Services and the
the Department of
Agriculture as to whether certain
cenain individuals specified in the above cited statutory
provisions should be denied access to or granted limited access to specified agents.
agents.

'

'

ATTORNEY GENERAL
NO. 2737-2004
2737-2004
ORDER NO.

.... .

PURSUANT TO THE FISA, DIRECTOR AND DEPUTY DIRECTOR OF THE


EXECUTIVE ORDER
12139 (Foreign Intelligence FBI ARE AUTHORIZED TO MAKE THE CERTIFICATIONS REQUIRED BY
Surveillance)
Electronic Surveillance)
SECTION 104(a)(6) OF THE ACT IN SUPPORT OF APPLICATIONS
APPLICATIONS TO
CONDUCT ELECTRONIC SURVEILLANCE
PURSUANT TO THE FISA, DIRECTOR AND DEPUTY DIRECTOR OF THE
EXECUTIVE ORDER
12949 (Foreign Intelligence FBI ARE AUTHORIZED TO MAKE THE CERTIFICATIONS REQUIRED BY
Physical Searches)
SECTION 303(a)(6) OF THE ACT IN SUPPORT OF APPLICATIONS
APPLICATIONS TO
CONDUCT PHYSICAL SEARCHES
SEARCHES

411

41
41This
This order sets fonh,
forth, that, the Director of the FBI is delegated the authority
authority to
to provide
provide reasonable
assistance to foreign national security agencies
agenCies cooperating with the FBI in the execution of the FBI's
counter-terrorism and counter-intelligence duties, and federal, state, local or foreign
foreign law enforcement
agencies, to assist any such agency in the lawful execution of any authorized function.
function.

This Order provides that pursuant to Attorney General procedures which will be put into place when
necessary to prevent or respond to terrorist attacks, the JTTFs
JTTFs can call
call upon all
all Depanment
Department law
enforcement resources for assistance, including agents and other resources of the FBI, DEA, ATF, and
TheDirector
Directorof
ofthe
the FBI
FBIand
and the
the FBI
FBI Special
Special Agents
Agents in
in Charge
Charge (SAC) or Assistant Directors in
USMS. The
Charge (ADIC)
(ADIC) serve
serve as
asheads
headsof
ofthe
theJTTFs.
It tFs.
42

43
43This

This Order delegates to the FBI Director the Attorney General's authority and responsibilities under
of the Public Health Security and Bioterrorism Preparedness and Response Act
sections 201, 212, and 221 of
Stat.594
.
of 2002, Pub. L. No. 107-188, 116 Stat.
594 (2002)

111
S

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005571

81
81

~""

.'

UNCLASSIFIED//FOR OFFICIAL USE ONLY


EXECUTIVE ORDER
12333 as amended (United
States Intelligence
Activities )44
Activities)"
Additionally, Title
50, USC, 401a, defines
"counterintelligence" as
"information gathered, and
activities conducted, to
protect against
against'espionage,
espionage,
other intelligence activities,
sabotage, or assassinations
conducted by or on behalf or
foreign governments or
elements thereof, foreign
organizations, or foreign
persons, or international
terrorist activities."

SECTION 1.3(b)(20)(A) - DIRECTOR OF NATIONAL INTELLIGENCE


TIlE FBI SHALL
THIS SUBSECTION STATES THE DIRECTOR OF THE
COORDINATE CLANDESTINE COLLECTION OF FOREIGN
INTELLIGENCE COLLECTED THROUGH HUMAN SOURCES OR
THROUGH HUMAN-ENABLED MEANS AND COUNTERINTELLIGENCE
ACTIVITIES INSIDE THE UNITED STATES
1.7(g).- INTELLIGENCE COMMUNITY ELEMENTS, FBI
SECTION 1.7(g)
THIS SUBSECTION AUTHORIZES THE INTELLIGENCE ELEMENTS
OF THE FBI TO (1) COLLECT (INCLUDING THROUGH CLANDESTINE
MEANS), ANALYZE, PRODUCE, AND DISSEMINATE FOREIGN
INTELLIGENCE AND COUNTERINTELLIGENCE TO SUPPORT NATIONAL
AND DEPARTMENTAL MISSIONS; (2) CONDUCT
COUNTERINTELLIGENCE ACTIVITIES; AND (3) CONDUCT FOREIGN
INTELLIGENCE AND COUNTERINTELLIGENCE LWSON
LIAISON
RELATIONSHIPS WITH INTELLIGENCE, SECURITY, AND LAW
ENFORCEMENT SERVICES OF FOREIGN GOVERNMENTS OR
INTERNATIONAL ORGANIZATIONS.
ORGANIZATIONS,

SECTION 1.13, THE FBI


FBI - AUTHORIZES THE DIRECTOR OF THE FBI TO
PROVIDE TECHNICAL ASSISTANCE, WITHIN OR OUTSIDE THE UNITED
STATES, TO FOREIGN INTELLIGENCE AND LAW ENFORCEMENT
SERVICES.
EXECUTIVE ORDER
12656 (ASSIGNMENT OF
12656
EMERGENCY
PREPAREDNESS
RESPONSIBILITIES)
EXECUTIVE ORDER
12947 (PROHIBITED
TRANSACTIONS WITH
TERRORISTS WHO
THREATEN TO
DISRUPT THE MIDDLE
EAST PEACE PROCESS)
k..At.c.Ai Mfg Otu)Ek
13128
(IMPLEMENTATION OF
THE CHEMICAL
WEAPONS
CONVENTION AND THE
CHEMICAL WEAPONS
CONVENTION
IMPLEMENTATION
ACT)45
ACT)45
J~~YJ!,

AMONG ITS LEAD AGENCY RESPONSmILITIES,


RESPONSIBILITIES, DOJ SHALL
COORDINATE FEDERAL GOVERNMENT DOMESTIC LAW
ENFORCEMENT ACTIVITIES RELATED TO NATIONAL SECURITY
EMERGENCY PREPAREDNESS
ANY INVESTIGATION EMANATING FROM A POSSmLE
POSSIBLE VIOLATION OF
THIS ORDER MUST BE COORDINATED WITH THE FBI, AND ANY
MATIERINVOLVING
MATTER
INVOLVING EVIDENCE OF A CRIMINAL VIOLATION SHOULD
BE REFERRED TO THE FBI.

r KVIV.1 APuSatiLr.
ft
v .1VJ...ft ituN vr
All iUN V.CSIIGAIIUN blVIANALINU 1'x0m
VIOLA
Or
THIS ORDER INVOLVING OR REVEALING A POSSmLE
POSSIBLE VIOLATION OF
U.S.c., 229 SHALL BE REFERRED TO THE FBI.
18, U.S.C.,
f'U".l 11' V.l:.,;).1.

d11~\J'

HV1~

44Title
44Title 50, USC, 401a, defines "foreign intelligence" as "information relating to the capabilities, intentions,
or activities of foreign governments or elements thereof, foreign organizations.
organizations, or foreign persons, or
international terrorist activities."

45See
(Desig~ation of United States National Authority Pursuant to the
45See generally, Title 22, USC, 6711 (Designation
Chemical Weapons Convention).

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005572

82


a
a

a
a
a

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
EXECUTIVE ORDER
ORI,lER
13388 (FURTHER
STRENGTHENING THE
SHARING OF
TERRORISM
TERRORISM '
6
INFORMATIONt
INFORMATION)"
EXECUTIVE ORDER
13491 (ENSURING
LAWFUL
INTERROGATIONS)

STATES THAT THE HEAD OF EACH AGENCY THAT POSSESSES OR


ACQUIRES TERRORISM INFORMATION SHALL PROMPTLY GIVE
ACCESS TO THE TERRORISM INFORMATION TO THE HEAD OF EACH
OTHER AGENCY THAT HAS COUNTERTERRORISM FUNCTIONS.

3, "STANDARDS
"STANDARDS AND PRACTICE FOR INTERROGATION OF
SECTION 3,
INDIVIDUALS IN THE CUSTODY OR CONTROL OF THE UNITED STATES
CONFLICTS"
IN ARMED CONFLICTS"
(b) INTERROGATION TECHNIQUES AND INTERROGATION-RELATED
TREATMEN"r7See
H.R. Rep.
Rep. No. 111-89, 111th
111'" Cong., 1"
I" Sess. 2009,
TREATMENt'See H.R.
of Inquiry Requesting that the President and Directing that the
"Resolution of
Infonnation in
Attorney General Transmit to the House of Representatives All Information
Their Possession Relating to Specific Communications Regarding Detainees and
Foreign Persons Suspected of Terrorisrn,"
Terrorism," June 26,2009.
26, 2009.

4~ote
Intelligence Reform and Terrorism Prevention Act of 2004 for
46Note that this EO refers to section 1016(a)(4) of the Intelligence
the definition of "terrorism information." This
This section
section of
ofthe
theAct
Act is
is codified
codified in
in Title
Title 6,
6, USC,
USC, section 485, Information
sharing..
sharing.

47Section
of this EO
EO states that
that nothing
nothing in this
this section shall preclude the FBI, or other Federal law enforcement
47Section 3(b) of
use authorized, non-coercive techniques
teChniques of
of interrogation that are designed to elicit
agencies, from continuing to use
voluntary statements and do not involve the use of force, threats, or promises.
Dec. 30, 2005, 119
Note that the Detainee Treatment Act of 2005, Pub. L. 109-148, Div. A, Title X, 1004, Dec.
U.S.c. 2000dd-1(a)
2000dd-1 (a) (Protection
(Protection of
of United
United States Government personnel Engaged in
Stat. 2740, codified at Title 42 U.S.C.
Authorized Interrogations) provides that:
in any civil or criminal prosecution against an officer, employee, member of
of the Armed Forces, or other agent of
of the
who is a United States person, arising out of the officer, employee, member of the Armed
United States Government who
practices. that involve detention and interrogation of alien
alienss
Forces, or other agent's engaging in specific operational practices,
who the President or his designees have determined are believed to be engaged in or associated with international
terrcrist activity that poses a serious threat to the United States, its interests, or its allies, and that were officially
terrorist
conducted,ititshall
shall be
be aa defense
defense that
that such officer,
authorized and determined to be lawful at the time that they were conducted
of the Armed Forces, or other
o~her agent did not know that the practices were uruawful.
employee, member of
unlawful.
Also note that the National Defense Authorization Act for Fiscal Year 2010, Pub. 1.
L. 111-84, Title X, 1040
28.2009,123
2190,2454,
U.S.c.
(No Miranda Warnings for Al Qaeda Terrorists), October 28,
2009, 123 Stat. 2190,
2454, codified at Title 10 U.S.C.
'
801 note, provides that:

Absent a court order requiring the reading of such statements, no member of the Armed Forces and no official of the
of the intelligence community (other than the Department of
of Justice) may read to
Department of Defense or component of
a foreign national who is captured or detained outside the United States as an enemy belligerent and is in the custody or
effecti ve control of
of the
the Department of
of Defense or otherwise under detention in a Department of Defense
under the effective
facility the statement required by Miranda v. Arizona (384 U.S. 436 (1966)), or otherwise inform such an individual of
Individual may
mayor
to counsel
counselor
any rights that the individual
or may not have to
or remain silent consistent with Miranda v. Arizona (384
U.S. 436 (1966)).
Regarding the practice of Mirandizing terrorist suspects overseas, in a June 12, 2009 letter from FBI Director
Robert Mueller to U.S. Congressman Frank Wolf, Director Mueller confirmed that "there has been no policy change
Furthermore, the
the Director noted in
and no blanket instruction issued for FBI agents to Mirandize detainees
detainees overseas."
overseas." Furthermore,
his letter, that FBI agents have occasionally given Miranda warnings to persons captured overseas, at Bagram Air Base
(Afghanistan) and elsewhere, but only when "a determination was made that a prosecution in an Article III court may
desirable to
to maximize
maximize the
be in the interest of
of national
national security
securityand
andthat
thatproviding
providingMiranda
Mirandawarnings
warnings.....' was
was ...
... desirable
likelihood that any resulting statements would be admissible at trial."

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005573

83

a
a

a
a

S
S

UNCLASSIFIED//FOR OFFICIAL USE ONLY


NATIONAL SECURITY
PRESIDENTIAL
(NSPD) --12
12
DIRECTIVE (NSPD)
NSPD 28
NSPD

ASSIGNS THE FBI LEAD AGENCY RESPONSIBILITIES


RESPONSmILITIES RELATING TO
UNITED STATES CITIZENS TAKEN HOSTAGE ABROAD.

NSPD 46fHSPD-IS
46/HSPD-15
48
ANNEXn
ANNEX
1148
Additionally, see
e.g., Department of Justice,
Office of Legal Counsel
opinion, FBI AUTHORITY
TO INVESTIGATE
VIOLATIONS OF
SUBTITLE E OF TITLE 26
OR 18 U.S.C. SECTIONS
921-930, June 21, 1996 (the
FBI has lead investigative
responsibility over crimes of
terrorism pursuant to statutes
or Presidential Decision
Directive 39 that have
granted authority to the FBI
in these matters).
matters). Note that
PDD 39 was superseded by a
National Security
Presidential Directive.
MARITIME STRATEGY
FOR MARITIME
SECURITY: MARITIME
MARITIME
SECURITY:
OPERATIONAL
THREAT RESPONSE
(MOTR)

RESPONSmILlTY CONCERNING UNITED


ADDRESSES FBI'S PRIMARY RESPONSIBILITY
STATES NUCLEAR WEAPONS COMMAND AND CONTROL, SAFETY,
AND SECURITY.
LEAD JURISDICTIONAL RESPONSIBILITIES
RESPONSmn..ITlES IN
OUTLINES THE FBI'S LEAD
IN.
RELATION TO TERRORISM.
"

THE DEPARTMENT OF JUSTICE, ACTING THROUGH THE FBI, IS THE


LEAD MOTR AGENCY FOR INVESTIGATIONS OF TERRORIST ACTS OR
TERRORIST THREATS BY INDIVIDUALS OR GROUPS INSIDE THE
UNITED STATES, OR DIRECTED AT U.S. CITIZENS OR INSTITUTIONS
ABROAD, WHERE SUCH ACTS ARE WITHIN THE FEDERAL
JURISDICTION OF THE U.S.
THE DEPARTMENT OF JUSTICE, ACTING THROUGH THE FBI, IS THE
LEAD MOTR AGENCY FOR INTELLIGENCE COLLECTION IN THE
UNITED STATES.

S
S

48By
of historical background, National Security Decision Directive Number 30, MANAGING
48By way of
10, 1982,
1982, and National Security Decision Directive Number 207,
TERRORIST INCIDENTS, dated April 10,
THE NATIONAL PROGRAM FOR COMBATTING TERRORISM, dated January 20, 1986, were the first
Presidential national security directives to grant the FBI lead agency authority to investigate terrorism
matters.
As the lead agency to investigate terrorism incidents, the FBI also has authority to investigate
See Department of Justice, Office of Legal Counsel
terrorism incidents on US
US Capitol grounds. See
Memorandum for Theodore M. Cooperstein, Counsel to the Deputy Attorney General Re:
Re: FBI
Investigative Jurisdiction, dated June 7, 2004.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

S
S

ACLURM005574

84

j:

UNCLASSIFIED//FOR
UNCLASSIHED//FOR OFFICIAL USE ONLY
DHS, SMALL VESSEL
SECURITY STRATEGY,
APRIL 2008,
APPENDIX A - U.S.
FEDERAL
GOVERNMENT
RESPONSIBILITIES

THE DEPARTMENT OF JUSTICE, ACTING THROUGH THE FBI,


FBI, IS
IS THE
THE
LEAD MOTR AGENCY FOR INVESTIGATIONS
INVESTIGATIONS OF TERRORIST ACTS
ACTS OR
TERRORIST THREATS BY INDIVIDUALS OR GROUPS
GROUPS INSIDE THE
AT U.S.
U.S. CITIZENS
CITIZENS OR
OR INSTITUTIONS
INSTITUTIONS
UNITED STATES, OR DIRECTED'
DIRECTED-AT
ABROAD, WHERE SUCH ACTS ARE WITHIN THE FEDERAL
JURISDICTION OF THE U.S.
U.S.
THE DEPARTMENT OF JUSTICE, ACTING THROUGH THE FBI,
FBI, IS THE
THE
AGEtiCY FOR INTELUGENCE
LEAD MQTR
MOTR AGENCY
INTELLIGENCE COLLECTION IN
IN THE
THE
U
N I T E-D
. : '- S i A T E S
- : :-- - " "" .--UNITEDSTATES.
THE ATTORNEY GENERAL, ACTING THRU THE FBI,
FBI, IS
IS RESPONSIBLE
FOR: (1)
(1) INVESTIGATING
INVESTIGATING TERRORIST
TERRORIST ACTS OR TERRORIST THREATS
BY INDIVIDUALS OR GROUPS INSIDE 1HE
THE UNITED
UNITED STATES,
STATES, OR
U.S. CITIZENS OR INSTITUTIONS
INSTITUTIONS ABROAD;
ABROAD; AND
AND (2)
(2)
DIRECTED AT
ATU.S.
INVESTIGATE CRIMINAL VIOLATIONS WITHIN ITS
ITS JURISDICTION
THAT OCCUR IN THE AIR DOMAIN.
DOMAIN.
THE FBI HAS THE LEAD ROLE TO INVESTIGATE CYBERCRIME

NATIONAL STRATEGY
FOR AVIATION
SECURITY

THE NATIONAL
STRATEGY TO SECURE
CYBERSPACE .
CYBERSPACE
NATIONAL RESPONSE
A GUIDE TO HOW THE NATION CONDUCTS
THE NRF IS AGUIDE
FRAMEWORK (U.S.
ALL-HAZARDS RESPONSE.
RESPONSE.
.
DEPARTMENT OF
HOMELAND SECURITy)
SECURITY) CHAPTER 1: ROLES
LAW ENFORCEMENT:
ENFORCEMENT:
ROLES AND
AND RESPONSIBILITIES, LAW

HOMELAND SECURITY
PRESIDENTIAL
(HSPD) 5
DIRECTIVE (HSPD)

- THE ATTORNEY GENERAL, ACTING THROUGH THE FBI, HAS


HAS THE
LEAD RESPONSIBILITY FOR (1) CRIMINAL INVESTIGATIONS OF
TERRORIST ACTS OR TERRORIST 1HREATS
THREATS BY INDIVIDUALS OR
GROUPS INSIDE THE UNITED STATES OR DIRECTED
DIRECTED AT U.S.
U.S. CITIZENS
OR INSTITUTIONS ABROAD; AND (2) COORDINATING ACTIVITIES
ACTIVITIES OF
THE OTHER MEMBERS OF THE LAW ENFORCEMENT COMMUNITY TO
TO
DETECT, PREVENT.
PREVENT, AND DISRUPT TERRORIST ATTACKS
ATTACKS AGAINST
AGAINST THE
UNITED STATES.
SECRETARY OF HOMELAND SECURITY IS
IS THE PRINCIPAL FEDERAL
OFFICIAL FOR COORDINATING DOMESTIC INCIDENT
INCIDENT MANAGEMENT.
MANAGEMENT.
THE ATTORNEY GENERAL HAS LEAD RESPONSIDILITY
RESPONSIBILITY FOR CRIMINAL
INVESTIGATIONS OF TERRORIST ACTS OR THREATS
THREATS BY INDIVIDUALS
INDIVIDUALS
OR GROUPS INSIDE THE UNITED STATES, OR DIRECTED AT U.S.
U.S.
CITIZENS OR INSTITUTIONS ABROAD.
ABROAD.

.HSPD 749

THE FBI HAS LEAD ROLE FOR COORDINATING THE


THE ACTIVITIES
ACTIVITIES OF
OF
OTHER MEMBERS OF THE LAW ENFORCEMENT COMMUNITY TO
TO
PREEMPT. AND DISRUPT TERRORIST ATTACKS
DETECT, PREVENT, PREEMPT,
ATTACKS
AGAINST THE UNITED STATES.
**ANNEX II TO NSPD-46IHSPD-I5
NSPD-46/HSPD- 15 (U.S.
(U.S. POLICY
POLICY AND
AND STRATEGY
STRATEGY IN
IN THE
WAR
WAR ON TERROR)
TERROR) CLARIFIES THE FBI ROLES AND
AND RESPONSIBILITIES.
RESPONSIBILITIES.
FBI RESPONSIBLE
RESPONSIDLE FOR REDUCING DOMESTIC TERRORIST THREATS,
THREATS,
AND INVESTIGATING ACTUAL OR ATTEMPTED
ATTEMPTED TERRORIST ATTACKS
ATTACKS
OF CRITICAL INFRASTRUCTURE AND
AND KEY RESOURCES.
RESOURCES.

49This
DirectivelNSC-63 of May 22,1998
49This Directive supersedes Presidential Decision Directive/NSC-63
22, 1998 ("Critical
Infrastructure"), and any Presidential directives issued prior to this directive to the extent of any
. inconsistency.

UNCLASSIFIEDffFOR
UNCLASSIFIED//FOR OFFICIAL
OFHCIAL USE ONLY

ACLURM005575

85
85

110 1011 OS OS 0 OSS OS SIIIIM IP OO S 0 M OO S SO OS O OS 0 M

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
ATTORNEY'S
GENERAL'S
GUIDELINES FOR
DOMESTIC FBI
OPERATIONS

THESE GUIDELINES APPLY TO INVESTIGATIVE


INVESTIGATNE ACTIVITIES
CONDUCTED BY THE FBI WITHIN THE UNITED STATES OR OUTSIDE
THEY DO NOT APPLY TO
THE TERRITORIES OF ALL COUNTRIES.
COUNTRIES. THEY
INVESTIGATNE ACTIVITIES
ACTNITIES OF THE FBI IN FOREIGN COUNTRIES,
INVESTIGATIVE
WHICH ARE GOVERNED BY THE ATTORNEY GENERAL'S
GENERALS GUIDELINES
FOR EXTRATERRITORIAL FBI OPERATIONS.
**NOTE THESE GUIDELINES WENT INTO EFFECT
DECEMBER I,
DECEMBER
1, 2008.

MEMORANDUM OF
AGREEMENT
BETWEEN THE DOJ
AND DHS
DHS CONCERNING
CONCERNING
TERRORIST
FINANCING
INVESTIGATIONS,
13 2003
SIGNED MAY 13,

DESIGNATES THAT THE FBI WILL LEAD TERRORIST FINANCING


INVESTIGATIONS AND OPERATIONS USING NATIONAL JOINT
TERRORISM TASK FORCE (NJTTF) AND JOINT TERRORISM TASK
FORCES (1TTF).
(JTTF).

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005576

86

'.

a
a

a
a

a
a
S

.
a

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

COMMON FBI
FBI ACRONYMS
ACRONYMS
COMMON
AlSAC
A/SAC

AN
NV
AA
AAG
AAG
AAR
AAR
ACD
ACS
AD
ADA
ADC
ADIC
ADNET
ADP
ADPT

Assistant Attorney General


General
After Action
Action Report
Automatic
Automatic Call
Call Distribution
Distribution
Automated
Automated Case Support
Assistant Director
Americans with
with Disabilities Act
Associate
Associate Division
Division Counsel
Counsel
Assistant Director in
in Charge
Antidrug Network
Automated
Automated Data Processing
Processing
Automated
Automated Data Processing and
and
Telecommunications
Alternative
Alternative Dispute
Dispute Resolution
Resolution
Air Force Base
American
American Federation
Federation of Government
EIT!~loyees
Employees
Alias/False
Alias/False Identification
Automated
Automated Fingerprint Identification
Identification
System
System
Assault
Assault on
on a Federal
Federal Officer

ADR
AFB
AFGE
AFID
AFIS
AFO

AFOR
AFOSI
AFOSI

Annual
Annual Field
Field Office
Office Report
of. Special
Air Force Office of.
Special
Investigations
Attorney General
General
Attorney General
General Guidelines

i.'.

AudioNideo
AudioNideo
Ankara

a
a
S

Acting SAC

AG
AG
AGG
AGG

Athens
Assistant Inspector or Artificial
Artificial
Intelliflence
Intelligence
AI-Ittihad
AI-Ittihad al-Islami
al-Islami aka
aka Islamic Union
Union
lSomalia)
(Somalia)
Agency
Agency for International Development
Assistant Inspector in
in Place

AH
AH
AI
Al
AlAI
AIAI
AID
AID
AIIP

Alias
Alias or Also-Known-As
Albany Field
Field Office
Office or Alabama or
Annual
Annual Leave
Assistant Legal
Legal Attache

AKA
AL
ALAT

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

I:

S
ACLURM005577

87
87

I.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

.'
O

S
O

ALF
ALU

Animal
Animal Liberation
Liberation Front
Administrative
Unit (OGG)
Administrative Law Unit
(OGC)

AM
AN.
AN

Amman

ANSIR,

Awareness of National Security


Issues and
and Res
Response
onse
Administrative Officer or Auxiliary
Auxiliary
Office
Administrative
Administrative Officers Advisory
Advisory
Committee
Average on Board

Anchorage Field
Field Office

AO
AOAC
AOB
AOB
AOL

America
America Online
Online (Internet
(Internet Service
Service
Provider)
Provider
Act
Act of
of Terrorism
Terrorism
Applicant
Applicant Program
Program

AOT
AP
AQ
ARC
ASAC
A-SAC
ASCII

Albuquerque Field Office


American
American Red
Red Cross
Cross
Agent in
in Charge
Charge
Assistant Special Agent
Associate SAC
American
American Standard
Standard Code for
Information
InformationInterchanqe
Interchanse
Administrative
Division
Administrative Services
Services Division

ASD
ASG
ASOS
ASOS

Abu
(Philippines)
Abu Sayyat Group (Philippines)
Aviation
and
Surveillance
Aviation and Surveillance Operations
Operations
Section (CIRG)
(CIRG)
Atlanta Field Office

AT
ATCC
ATF

Air
AirTraffic
TrafficControl
ControlCenter
Center
Bureau of
of Alcohol,
Alcohol,Tobacco,
Tobacco, Firearms
Firearms
and Explosives
Asynchronous Transfer Mode or
Automated Teller Machine

ATM

AUC

United
United SEllf
Self Defense
Defense Forces of
ColombiaiAutodefensas
Colombia/Autodefensas Unidos
Unidos de
Colombia,
Colombia, a foreign
foreign terrorist
organization
Assistant United
United States Attorney
Attorney

S
S

AUSA

AVP

AudioNideo Investigative Technology


Technology
Unit (1TD)
(lTD)
.
Availability
Availability Pay
Pay

AWOL
AY

Absent Without Official


Official Leave
Leave
Almaty

AVITU

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005578

88

i.i.
\:
'.
I.

S
a
a
S

a
aa
aO
S

S
S

a
S
S

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
BA

Baltimore Field Office

BATF
BAU

Alcohol, Tobacco,
Bureau of Alcohol,
Tobacco, Firearms
and Explosives
Behavioral Analysis
Behavioral
Analysis Unit
Unit (CIRG)
(CIRG)

BB

Bridgetown

BC

BICS Administration
Administration Group

BD

Budapest ILEA

BDC

Bomb Data Center (LAB)


Bomb

BE

Buenos Aires

BF

Buffalo Field Office

BG

Bogata

BH

Birmingham Field Office


Birmingham

BI

Brasilia

BIA

BK

Bureau of Indian Affairs (Interior


Department)
D~artmen!l
Immigration and Custom
Bureau of Immigration
Enforcement
Background Investigation Contract
Service
Bangkok

BL

Brussels

BN

Berlin

BO

Bucharest

BOLO
BOP

Lookout
Be On the Lookout
Bureau of Prisons

BPMS
BR

Bureau Personnel
Personnel Management
Bureau
~stem.
System
Bern

BS

Boston Field Office


Boston

BUDED

Bureau Deadline

BICE
BICS
)

BW

Biological Warfare
Biological
Warfare

BZ

Beijing

C
C/PTDs

'

Confidential
Convictions/P retrial Diversions
Convictions/Pretrial

CAC

Crimes Against Children

CACU

Crimes Against Children


Children Unit

CAFRA
CAFRA

Civil Asset
Civil
Asset Forfeiture
Forfeiture and Reform Act of
2000
Communications Assistance
Assistance to
to Law

CALEA

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY
ONLY

ACLURM005579

89

0 11 .111 11 1111 1111 110111111 10 11 11 11 0 00 101111 1111 0 10 0111 11 1111 11 111 111 11 11 11 00 11 11

UNCLASSIFIED//FOR OFFICIAL USE ONLY


Enforcement Act
CAPWIN

Capital Wireless Integrated Network

CART

Computer Analysis and Response


(ITO)
Team (ITD)
Child Abduction and Serial
Serial Murder
Investigative Resource Center

CASMIRC
CAT

Crisis Action Team


Consolidated Asset Tracking System

CATS
CBP

Customs and Border Protection

CBR

Can Be Reached

CBW

Chemical and Biological Warfare

CCP
CCR

Cyber Crime Program


Computerized Criminal Record

CCTV

Closed Circuit TV

CD

Counterintelligence Division or
Compact Disc
Chief Division Counselor
Counsel or Centers for
Disease Control and Prevention

CDC
COL
CDL
COMA
CDMA

Commercial Driver's License


Code Division Multiple Access (wireless
technology standard)

CDPD

Cellular Digital Package Data

CE

Charlotte Field Office or Critical


Element
Cryptographic and Electronic Analysis
(ITO)
Unit (ITD)
Criminal Enterprise Investigations

CEAU
CEI
CEIP

Criminal Enterprise Investigations


ProQram
Program
Combined Federal Campaign

CFC

CFG
CFG,
CFR

Confidential Funding Guide


Confidential File Room or Code of
Federal Regulations
Chicago Field Office

CG
CGR

Crime on Government Reservations

CH

CIA
CIC

Copenhagen
Cincinnati Field Office or Confidential
Informant
Central Intelligence Agency
Counterintelligence Center (CIA)

CID

Criminal Investigative Division


Division (FBI)

CI

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005580

90
90

.,

;e

a
a

a
a
aa

UNCLASSIFrEDllFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR
CIITAC

Computer Investigations and


Infrastructure Threat Assessment
Center
Crimil"!al Informant Management
Criminal
System
S
stem
Chief Information Officer

CIMS
CIO

CIP

Criminal Informant Program


Classified Information Protection Act

CIPA
CIRG

Critical Incident Response Group


Program
Criminal Intelligence Support Program

CISP
CJIS

Criminal Justice Information Services


Division
Criminal Law Enforcement Application

CLEA
CLEIG
CMU

Combined Law Enforcement


Intelligence Group
Crisis Management Unit (CIRG)

CN

Canberra

CNC
CNN

DCI Crime and Narcotics Center

CNU

Crisis Negotiations Unit (CIRG)

CO
COB

Columbia Field Office

COBB

Carry Over Briefing Book

COG

Continuity of Government

COL

Color of Law

COMSAT

Communications Satellite

COMSEC

Close 'of
'of Business

,\

Communications Security

CONOP(S)
CONUS

Concept of Operation(s)

COOP

Continuity of Operations Plan

COP

Chief of Police or Community


Outreach Program
Community Oriented Policing Services
(DOJ)
(Dal)
Chief of Station (CIA)

Continental United States

COPS
COS

COTR

COTS

CP
CPU

Cable News Network

Contract Officer's Technical


Representative
Commercial off-the-shelf (software)
Command Post
Central Processing Unit

UNCLASSIFIEDlfFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005581

91
91

a
a
a

,.:.

a
a

UNCLASSIFIED//FOR OFFICIAL USE ONLY


CR
CRP
CRT

Caracas or
orCivil
Civil Rights
Caracas
Rights
Civil
Civil Rights
Rights Program
Program
Cathode Ray
Ray Tube
Tube (Terminal)
(Terminal) or Crisis
Cathode
Response Team
Crisis Response
ResponseUnit
Unit (ITD)
(lTD)

CRU
CS

Specialist or
or Confidential
C0!lfidential
Computer Specialist
Source
Civil Service
Civil
Service Retirement
Retirement System
System
Counterterrorism
Counterterrorism
Counterterrorism Threat
Threat Assessment
Assessment
and Warning
Warning Unit
Unit
Counter
Center (CIA)
(CIA)
Counter Terrorist Center
Counterterrorism Division
Division (FBI)
(FBI)
Counterterrorism
Computer Telephony Integration
Cyber Technology Section
Section (ITD)
(lTD)
Field Office
Cleveland Field
Chemical Warfare or Cooperative
Witness
Cybercrime Division
Division
Cairo

CSRS
CT
CTAWU
CTC
CTD
CTI
_CTS
CTS
CV
CW
CYD
CZ
D1
D10
D11
D11

Division
DivisionOne
One -- CJIS
CJIS
Inspection Division
Division (INSD)
Security Division
Division
Security

D12
D13
D14

Finance Division
Division (FD)
Counte~errorism Division
Division (CTD)
Counterterrorism
Investigative Services
Services Division
Division
(defunct)
Cybercrime
Division (CYD)
(CYD)
Cybercrime Division
Records Management
ManagementDivision
Division
(RMD)
Investigative Technology
Technology Division
Division
(lTD)
(ITD)
Training Division
Division (TD)
Administrative
Division
Administrative Services
Services Division
(ASD)
Information
Division
Information Resources
Resources Division
(IRD)
Counterintelligence
Division (CD)
(CD)
Counterintelligence Division
Criminal
Division
Criminal Investigative
Investigative Division
(CID)
Laboratory
Division (LAB)
(LAB)
Laboratory Division

D16
D17
D18
D2
D3
D4

D5
D6

D7

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005582

92

.'

j.

!.

S
S

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
D9

Office of the General Counsel


Counsel
, (OGC)
(OGC)
Deputy Assistant Director

DAD
DAG

Deputy Attorney General


General

DAP

Deliberate Assault Plan

DARPA
DAWY

Defense Advanced Research


Research
Projects Agency
Direct Agent Workyear

DCI
DCI

Director of Central
Central Intelligence

DCID

DD

Director of Central Intelligence


Directive
Defense Criminal
Criminal Investigative
Service
Deputy Director

DDN

Defense Data Network

DDO
DE

Deputy Director of Operations


(CIA)
(CIA)
Detroit Field
Field Office

DEA

Administration
Drug Enforcement Administration.

DES

Data Encryption Standard


Standard

DCIS

, Domestic Emergency Support


Team
Department of Homeland
Security
Directorate of Intelligence

DEST
DHS
DI
DI
DIA

Defense Intelligence Agency


Agency

DIDO

Designated Intelligence
Disclosure Official
Official
Defense Intelligence
Intelligence Summary

DINSUM

Defense Information Systems


Agency
Defense Intelligence Summary
Cable
Industrial Security
Defense InduStrial
Contracting_Office
Contracting Office
Defense Information Systems
Network
Dissemination
Dissemination

DISA
D1SA
DISC
DISCO
DISN

DISSEM

Data Intercept Technology Unit


(ITD)
(lTDl
Security Division
Division

DITU

DJ

DK

Records Management Division


Division
(RMQ)
(RMD)

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY

S
S

ACLURM005583

93

."

'.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

II Dallas Field Office

DL
DLA

Defense
Logistics Agency
Defense Logistics

DLAT

Deputy Legal
Legal Attache
Attache or
or Defense
Defense
Language Aptitude
Aptitude Test
Cybercrimes Division
Division (CYD)
(CYD)
Cybercrimes

,\
,,

DM
DMA

Mapping Agency
Defense Mapping
Department
of Motor Vehicles
Department of
Denver Field Office
Office
Deoxyribonucleic Acid
Di
rector's Office
Director's
Date
of Birth
Birth
Date of
Department of Commerce

Exploitation
Document Exploitation
Department of
of Defense
Department of Energy
Department of Education
Interior
Department of the Interior
Department of
of Justice
Justice
Department of Labor
Domestic Terrorism
Department of
of State
State
Date of Theft or Department
of
Department of
Transportation
Investigative Technology
TechnologyDivision
Division (ITD)
(lTD)
Date, Place
Place of
of Birth
Birth

DMV
DN
DNA
DO
DOB
DOC
DOCX
DOD

'DOE
DOEd
DOl
DOI
DOJ
DOL
DOMTERR
DOS

DOT
DP
DPOB

DRSN
DS&T

Defense Red
Red Switch
Switch Network
Network
Directorate of
of Science
& Technology
Science &
(CIA)
Switched Network
Network
Defense Switched
Defense Integrated Secure
Secure Network
Network
Diplomatic
Diplomatic Security
Security Service
Service (USDS) or
Defense
Security Service
Service (DOD)
(DOD)
Defense Security

DSN
DSNET
DSS
DST

c("

Daylight Savings
Daylight
Savings Time
Domestic Terrorism
Date-Time Group

DT
DTG
DTO

Drug
Drug Trafficking
Trafficking Organization
Organization

DTRA

Defense Threat Reduction


Reduction Agency

DTSA

Defense Technology Security


Administration

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005584

94
94

.l

a
a

S
a

S
a
S
a

S
S
a

UNCLASSIFIED//FOR OFFICIAL USE ONLY


ONLY
E-mail
EAD
EAP

Electronic mail
Executive Assistant Director
Employee Assistance Program or
Emergency Assault Plan

EARS
EAS
EBR
EC
ECF
ECR
EDI

ELSUR Automated Records System


Emergency Action Specialist
Executive Briefing Room (SIOC)
Electronic Communication
Electronic Case File
Executive Conference Room (SIOC)
(SlOG)
Executive Development Institute

EDSP

Executive Development and Selection


Program
Essential Elements of Information
Equal Employment Opportunity
Electronic Funds Transfer

EEl
EEO
EFT
ELF

Earth Liberation Front


Colombian National Liberation Army
Electronic Surveillance
Executive Management
Executive Order
Eurasian Organized Crime
. Entry on Duty or Explosive Ordnance
Disposal
Executive Office of the President
Executive Office of U.S. Attorneys
(DOJ)
(Dal)
EI Paso Field Office
El
Environmental Protection Agency
EI Paso Intelligence Center
El
Engineering Research Facility Quantico
Electronic Reference Library

ELN
ELSUR
EM
EO
EOC
EOD

S
a
a

S
S
a

EOP
EOUSA
EP
EPA
EPIC
ERF
ERL
ERT
ERTU
ET
ETA

Emergency Response Team


Emergency Response Team Unit (LAB)
<-

Electronics Technicians
Estimated Time of Arrival or Basque
Fatherland and Liberty, aka Euzkadi Ta
Askatasuna

<

S
a

UNCLASSIFIED//FOR OFFICIAL USE ONLY


ONLY

ACLURM005585

95
95

1111111 1111 11 111 011 110 11 11 11 1111 MO SSIP OSS O MMOS SI SM O S S O

:.I:

UNCLASSIFIED//FOR
USE ONLY
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE

EU
EU

European Union
Union

EVP

Evidence Program
Program

FA

Financial Analyst
Analyst or Financial
Financial Assistant
Assistant

FAA

Federal Aviation
Aviation Administration
Administration

FAG

Fraud Against
Against the
the Government

FAM
FAM

Federal Air Marshal


Marshal

FAMA

Federal Air Marshal


Marshal Association
Association

FAR

Federal Acquisition
Acquisition Regulations
Regulations

FARC
FAST

Revolutionary Armed
Revolutionary
Armed Forces
Forces of
Colombia
Forfeiture and Asset
Asset Seizure
Seizure Team
Team

FBIHQ

FBI Headquarters
FBI

FBIRA

Recreation Association
FBI Recreation
Association

FBIS

Foreign Broadcast Information


Information Service
Service

FCC

Federal Communications Commission


Commission

FCI
FCI

Foreign Counterintelligence

FD

Finance Division
Division

FDA

Food and Drug


Drug Administration
Administration

Fed

Reserve System
Federal Reserve
Front End Distribution
Distribution System
System

FEDS

FEDSIM
FEDSIM

Federal Computer Performance


Performance
Evaluation and
and Simulation
Simulation Center

FEGLI
FEGLI

Federal Employees Government Life


Life
Insurance

FEMA

FGI
FGI

Federal Emergency Management


Federal
Agency
Federal Energy Regulatory
Commission
Commission
Federal Employees Retirement
Federal
System
Foreign Emergency Support
Team
Foreign Government Information
Foreign
Information

FI
Fl
FIF

Full Investigation
Investigation
Financial Institution Fraud
Fraud

FIS
FISA

Foreign Intelligence Service


Foreign Intelligence Surveillance
Act
Foreign Intelligence Surveillance

FERC
FERS
FEST

[
'

FISC

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

ACLURM005586

87E
7E

96

:.'.

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
Court
Physical Surveillance

FISUR
FM
FMU

Financial Manager
I

First Name Unknown

FOIA

Freedom of Information Act

FOIPA
FOUO

Freedom of Information/Privacy
Acts
For Official Use Only

FSL

Funded Staffing Level

FTO

Foreign Terrorist Organization

FTS

Federal Telephone System

FTTTF
FTX

Foreign Terrorist Tracking Task


Force
Field Training Exercise

FUG

Fugitive

FY

Fiscal Year

FYI

For Your Information

GAO

General Accounting Office

GATT

General Agreement on Tariffs


and Trade -(UN)
(UN)
Government Fraud

S
S
a

GF
GIA

Global Index Application

GITMO

GMT

USMC Base, Guantanamo Bay,


Cuba
Global Intelligence Working
Group
Greenwich Mean Time (Zulu)

GOU

Global Operations Unit

GIWG

Facility Management Unit (ASD) .

FNU

GPO

Government Printing Office

GPRA
GPS

Government Performance and


Results Act
POSitioning System
Global Positioning

GRC

Government Reservation Crimes

GS

General Schedule

GSA

General Services Administration

HAMAS

Islamic Resistance Movement

HAZMAT

Hazardous Materials

HC

Hate Crime

HCF

Health Care Fraud

UNCLASSIFIEDIIFOR OFFICIAL USE ONLY


UNCLASSIFIED//FOR

ACLURM005587

97

UNCLASSIFIEDIIFOR OFFICIAL USE


UNCLASSIFIED//FOR
USE ONLY
ONLY
HEPA
NEPA

High Efficiency Particulate


High
Particulate Air
Filters
Filters

HHS

Health
Health and Human Services
Services

HIDTA

High Intensity Drug Trafficking Area


Area

HK

Hong
Hong Kong
Kong

HMRT

Hazardous Materials Response


Response Team
Team

S
S

HMRU
HN

Hazardous Materials
Materials Response
Response Unit
(LAB)
(LAB)
Honolulu Field
Field Office

HO

Houston Field Office


Office

HR

Human
Human Resources

HRMS

S
S

HRT

Human Resources
Resources Management
Section
Section
Hostage Rescue Team
Team

HTML

Hypertext Markup Language


Language

HUD

Housing and Urban Development

HUMINT

Human Resources Intelligence

HZ

Hermosillo, Mexico
Hermosillo,
Investigative Assistant or Investigative
Analyst
International Association
Association of Auto
Auto Theft
Theft
Investigators
International Association of Chiefs
Chiefs of
of
Police
Police
Dulles
Dulles International Airport

IA

IAATI

IACP

lAD
IAD
,

IAFC
!AFC
IAFIS

IB
IBIS
IC

S
S

Integrated Automated
Automated Fingerprint
Identification System
System
Intelligence Base
Base
Interagency Border Inspection
Inspection System
System
Indian Country or Intelligence
Community or Internet Cafe
Cafe
Intercontinental Ballistic Missile

ICBM
ICE
ICM

Immigration and Customs


Customs Enforcement
Enforcement
(DHS)
(DHS)
Investigative Case Management

I-CON

Information Control
Control

International Association of Fire


Fire Chiefs
Chiefs

I
lED
IED

Improvised Explosive Device


DeVice

IG

Inspector General
General

UNCLASSIFIEDIIFOR OFFICIAL USE


UNCLASSIFIED//FOR
USE ONLY
ONLY

ACLURM005588

98
98

b7
b- E

S S

:.

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
IliA
111A

IINI
liP
IIP
IIR
ILEA

----

1M
IM
IMA
IMINT
!MINT
IN
INMARSAT
INS
INSD
INTERPOL

INTERR
INTSUM
10
lOB
10B
lOS
IOS
IP

Integrated Intelligence Information


Application
Application
Innocent Images National Initiative
Inspector in Place
Intelligence Information Report
International Law Enforcement
Academy.
Academy, Budapest
Instant Messaging
Information Management Assistant
Imagery Intelligence
Interpol
International Maritime Satellite
Immigration and Naturalization Service
Inspection Division
International Criminal Police
Organization
International Terrorism
Terrorism
Intelligence Summary
Int~lIigence Officer
Intelligence
Intelligence Oversight Board
Board
Intelligence Operations Specialist
Indianapolis Field Office or Internet
Protocol
CIRG
Information Resources Division
Intelligence Research
Research Specialist or
intelligence
Internal Revenue Service
Islamabad
Integrated Services Digital NetworkNetwork capacity is 128 kbps
Internet Service Provider
Integrated Statistical Reporting and
and
Application
Analysis Application
Information Technology or Interstate
Theft or International Terrorism
Information Technology Center
Investigative Technology
Technology.Division
Division
Internet Tip Line
Information Technologies Manager

IR
IR ,\
IRD
IRS
IS
ISDN
ISP
ISRAA
IT
ITC
lTD
ITD
ITL
ITM

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY

ACLURM005589

99

UNCLASSIFIEDIIFOR OFFICIAL USE


Y
UNCLASSIFIED//FOR
USE ONL
ONLY
ITOS

International Terrorism
Terrorism Operations
Operations
Section
Section
Interstate Transportation
Transportation of Stolen
Stolen
Motor Vehicles
Interstate Transportation
Transportation of Stolen
Stolen
Property
Interactive Voice
Voice Response
Joint Chiefs of Staff

lTSMV
1TSMV
ITSP
IVR
.,

JCS

JDIG

JEH
JEM

Joint Drug Intelligence Group


J,
J. Edgar Hoover Building
Building

..

- . Jaish-e-Mohammed (Army of
Mohammed)
Mohammed) (Pakistan)
(Pakistan)
John F,
F. Kennedy International
International Airport
Airport

JFK

JI
JK

Jemaah Islamiya (Southeast Asia)


Asia)

Jacksonville Field Office

IN
JN
JOC

Jackson Field Office


Joint Operations Center

JSOC
.
JTF-6

Joint Special Operations


Operations Command
Command or
Joint Special
Special Operations Center
Joint Task Force-6
Joint Terrorist Financing
Financing Task
Task Force
Force

JTFTF
JTTF

Joint Terrorism
Terrorism Task Force
JointWorldwide
Joint Worldwide Intelligence
Communications System
Kansas City Field Office
Retirement-eligible, Special
Retirement-eligible,
Special Agent
Agent
Knowledge, Skills and
Knowledge,
and Ability

JWICS
KC
KMA
KSA
KV

Kiev

KX

Knoxville Field
Field Office

LA

LAN
LAN

Los Angeles
Angeles Field
Field Office or Language
Language
Analyst
Laboratory Division
Division
Local Area Network

LANL

Los Alamos National


National Laboratory

LCN
LCN

La Cosa Nostra

LAB

LD
LD

Division
Laboratory Division

LEA

Law Enforcement Agency

Legat

Legal Attache
Legal
Attache

LEO

Law Enforcement Online

100

UNCLASSIFIEDIIFOR OFFICIAL USE


UNCLASSIFIED//FOR
USE ONLY
ONLY

--

ACLURM005590

---

s as s sss ss ss ss ss s ss ss ss sss s s as s sss s sss

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
LES
LG

Law Enforcement Services or Law


Enforcement Sensitive
Lagos

LHM

Letterhead Memorandum

LLNL

Lawrence Livermore National


National
Laboratory
Liaison Officer

, LNO
LNU

Unknown
Last Name Unknown

LO

Office(r) or Lookout or Legat


Liaison Office(r)
London
Little Rock Field Office
Office

LR
LS
LTTE
LV
LWOP

Louisville Field Office or Language


Specialist
S~ecialist
(Sri
Liberation Tigers of Tamil Eelam (Sri
Lanka)
Lanka)
Las Vegas Field Office
Leave Without Pay .

.
.

MAOP
MC

MD

Manual of Administrative Operations


and Procedures
Moscow

ME

Madrid
Memphis Field Office

MGMT

Management

MH

Manila

MIOG

Manual of Investigative Operations and


and
Guidelines
Mutual Legal Assistance Treaty

MLAT
MLO

Liaison Officer
Military Liaison

MM
MO

Miami Field Office

MOA

Memorandum of Agreement

MOU

Msg

Understanding
Memorandum of Understanding
Minneapolis Field Office or Military
Police
Tupac Amaru Revolutionary Movement
(Peru)
(Peru)
Message

MTTCU
MW

Major TheftlTransportation
Theft/Transportation Crimes Unit
Milwaukee Field Office

MX

Mexico City

NA

FBI National Academy

Mobile Field Office or Modus Operandi


Operandi

MP
MRTA

UNCLASSIFIED//FOR OFFICIAL
USE ONLY
UNCLASSIFIED//FOR
OFNCIAL USE

ACLURM005591

101
101

:.

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY
NAACP

National
National Association
Association for
for the
the
Advancement of
of Colored
Colored People
People

NAC

New
New Agents
Agents Class
Class

NALC

National
National Association
Association of
of Letter
Letter Carriers
Carriers

NAS

National
National Alert
Alert System
System

NATA

North
North Atlantic
Atlantic Treaty
Treaty Organization
Organization

NATO
NATU

New Agent Training Unit (TD)

NCAVC
NCIC

National
National Center for the Analysis of
Violent
Violent Crime
National
National Crime
Crime Information
Information Center
Center

NCIS

Naval
Naval Criminal
Criminal Investigative
Investigative Service
Service

NCMEC
NCTC

National
National Center
Center for Missing
Missing and
and
Exploited Children
National
National Counterterrorism
Counterterrorism Center
Center

NDIC

National
National Drug
Drug Intelligence
Intelligence Center
Center

NDPO

National
Office
National Domestic
Domestic Preparedness
Preparedness Office

NE

Ft.
lTC
Ft. Monmouth ITC

NEOB

New Executive Office


Office Building
Building

NF

NFIB

No
or Norfolk
Norfolk
No Foreign Dissemination or
Field Office
Not
Not Further
Further Identified
Identified or
or No
No Further
Further
Information
Information or
or National
National Foreign
Intelligence
National
National Foreign
Foreign Intelligence Board

NFIP

National
National Foreign
Foreign Intelligence
Intelligence Program

NGS
NH

National
National Gang
Gang Strategy
Strategy
New Haven Field Office

NI

Nairobi

NIBIN

National
Ballistic Information
National Integrated
Integrated Ballistic
Network
National
National Insurance
Insurance Crime
Crime Bureau
Bureau

NFl
NFI

NICB
NICS
NIH

National
Criminal Background
National Instant Criminal
Background
Check System .
National
National Institutes of Health

NIMA

National
National Imagery and Mapping Agency

NIPC

National
National Infrastructure
Infrastructure Protection
Center
National
National Infrastructure
Infrastructure Protection
Protection and
and
Computer Intrusion Program

NIPCIP

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005592

102

:.;.

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY
ONLY

NIPRNET

Unclassified But Sensitive Internet


Protocol Router Network

NJTTF

National JTTF

NK

Newark Field Office


New Delhi
Delhi

NL

National Law Enforcement


System
Telecommunications System
National Military Command
Command Center
New Orleans Field
Field Office

NLETS
.
NMCC
NO
NOC

Negotiations Operations Centeror


Center or
Network Operations Center

NOFORN

Not Releasable to Foreign Nationals

NOIWON

National Operations and Intelligence


Watch Officers Network

NORAD

NPO

Defense
North American
American Aerospace Defense
-Command
-Command
Northern Command,
Command, Colorado Springs,
Springs,
CO
Office, FBIHQ
National Press Office,

NPTL

National Priority Target List

NRC

N"uclear Regulatory Commission


Nuclear
Commission

NRO

National Reconnaissance Office


Office

S
S
S
S

NSA
NSC

National
National Security Agency or National
Association
Sheriff's Association
National Security Council
Council

NSLU

National Security Law Unit (OGC)


(OGC)

NSTL

National Security Threat List

NTWS

National Threat Warning System


System

NVG

Night
Night Vision Goggles

NWS

National Weather Service

NY

New York City Field Office

OADR
OC/D

Originating Agency's Determination


Determination
Required
Organized Crime/Drug
Crime/Drug

OC/DP

Organized Crime/Drug Program


Program

OCA

Original Classification Authority or


Office of Congressional Affairs
Affairs

OCDETF

Organized Crime Drug Enforcement


Task Force
Organized Criminal Enterprises

NORTHCOM

OGE
OCE

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY
ONLY

ACLURM005593

103

aa
a

a
aa
aa
aa
a
a
aa
a
a
aa
a
a
aa
aa
aa
aa
a
a
aa
a
a
a
a
a
a
a

a
a

i.i.
I

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
OCIO
OCIS

Office of Chief Information


Information Officer
Organized Crime Information
Information System
System
Outside CONUS

OCONUS
OCR

Optical
Optical Character Reader/Recognition
Reader/Recognition

OEEOA

Office of Equal Employment


Opportunity_
Opportunity Affairs
Affairs
Office of Enforcement Operations
Operations
(DOJ)
(DOJ)
Old Executive Office Building
Office of Foreign
Foreign Asset Control
Control (Treas)
(Trees)

OEO
0E0
OEOB
OFAC
OGA

Other Government Agency

OGC

Office of General Counsel


Counsel

OIA
01A

Office of International
International Affairs
Affairs (DOJ)
(DOJ)
Office of Inspector General
General

OIG

010
OlEC
OLEC

Office of International Operations


Operations
Office of law
Law Enforcement
Coordination
Coordination
Omaha Field
Field Office

OM
OM
OMB

Office
Office of Management and Budget
Office of National
National Drug Control
Control Policy
Office of Origin
Origin

ONDCP
00
00
OPA
OPM

OPORD

Office of Public Affairs


Affairs
Office of
of Personnel Management
Operations
Operations Order
Order
Office of Professional Responsibility
Responsibility
Operations
Operational
Operational Security
Dissemination and Extraction of
of
Information Controlled
Controlled by Originator or
or
Originator Controlled
Controlled
On-Scene Commander
Occupational
Occupational Safety and
and Health
Health
Administration
Administration
Online
Online Searchable Integrated
Reference Information System
Reference
System

OPR
OPS
OPSEC
ORCON
ORCON

OSC
OSHA
OSIRIS

OT
OTU

Overtime
Operations and Training
Training Unit, CIRG
CIRG

PA

Paris or Probationary Agent or


Program Analyst

UNCLASSIFIED//FOR OFFICIAL USE


USE ONLY
ONLY

ACLURM005594

104

I.

I.

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY
PAC

Public Access Center (SlOG)


(SIOC)

Probationary A,gent
Agent Program

PAP
PAR

Performance Appraisal
Appraisal Report
Report

PAS

Performance Appraisal
Appraisal System
System

PC

Panama City or Public Corruption


Corruption or
Personal Computer
Program Coordinator

PCOR

Portland Field Office or Police


Department .
Personal Digital Assistant
Presidential Decision Directive

PO
PD
PDA

POD
PDD

PDF

Portable Document File - viewable


viewable with
with
Adobe Acrobat software

PFI
PFI

Principal Firearms Instructor

PFLP

PG
PG

Popular Front for the Liberation


Liberation of'
of
Palestine
Pittsburgh Field
Field Office
Pittsburgh

PH
PH

~ield Office
Philadelphia Field

PI
PI
PIC

Preliminary Investigation

PIJ
PIJ
PIN
PIN

Palestine Islamic Jihad


Jihad

Personal Identification Number

PKK

Kurdistan Workers' Party (Turkey)


(Turkey)

PLF

Palestine Liberation Front

Pilots in Command
Command

PLO

Palestine Liberation Organization


Organization

PM
PM

Program Manager
Program

PNG
PNG

Persona Non Grata

POC

Point of Contact

POE

Point of Entry

POV
PP

Privately Owned Vehicle


Pay Period
Period

PPMS

Procurement and Property


Management Section (FD)
(FD)
Prague

PR

PRAU
PRAU

Recognition and
Performance Recognition
and Awards
Awards
Unit (PRAU)
(PRAU)
Personnel Resource List

PRL

Public Safety Officer'sBenefits


Officer's Benefits Office
. (DOJ)
(DOJ)
Public Switched Telephone Network

PSOBO

PSTN
PSTN

USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE
ONLY

ACLURM005595

105
105

aa

a
a
a
a
a
a
a
a

a
a

a,
a
a

:.
,

USE ONLY
UNCLASSIFJEDIIFOR OFFICIAL USE
UNCLASSIFIED//FOR
ONLY
PT

Physical Training
Pretoria or Physical
Training

PX

Phoenix Field Office

QSI
QS!

Quality Step Increase


Increase

RA

Resident Agency

RAC

Agent in. Charge


Resident Agent
Charge

RCMP

Royal Canadian Mounted Police

RDLU
RDLU

Rapid Deployment and


and Logistics
Logistics Unit
CIRG
(CIRG)
Rapid Deployment Operations Center
(Aquia)

RDOC

REI

Racketeering Enterprise
Enterprise Investigation
investigation

REL

Releasable
Radical Fundamentalist Unit (CTD)
(CTD)
Radical

RFU
RH

'

RICO
RISS

RMA
RMAB

Richmond Field Office

Racketeering Influenced and Corrupt


Organization
Information Sharing
Regional Information
Sharing System
System
Resource Management and
and Allocation

RMD

Resource Management and


and Allocation
Allocation
Board
Records Management Division

RO

Rome

ROM

RSO

RY

Read Only Memory


Rapid Start Information Management
System
Regional Security Officer (U.S.
(U.S.
Embassy)
Riyadh

~
ZOci..

SA
SAA

Special Agent or San


Special
San Antonio Field
Office
Special Agent Accountant

SAAC
SABT

Special Agent Advisory Committee


Special
Special Agent Bomb
Special
Bomb Technician
Technician

SAC

Special Agent in Charge

SACS
SAMBA

Secure Access Control


Control System
System

RSIMS

a
a

.\.'
a

Mutual Benefits
Special Agents Mutual
Association
Special Agent Mid-Level
Mid-Level Management
(System) or (Board)
Selection (System)
(Board)

SAMMS

UNCLASSIFIED/IFOR OFFICIAL
OFFICIAL USE ONLY
UNCLASSIFIED/NOR

ACLURM005596

106

S SS S SSSS SS S S SSSS SSS SS SS S SS SSS S SSS S OS S

I.

'.

UNCLASSIFIEDIIFOR OFFICIALUSE
UNCLASSIREDHFOR
01-1
-4CIAL.USE ONLY
SAMNET

Secure Automated Message Network

SAR

Suspicious Activity Report

SAS

Supervisory Administrative Specialist


Special Assistant United States
Attorney
Small Business Administration

SAUSA
.
SBA
SC

Sacramento Field Office or Section


Chief or South Carolina

SCI

Sensitive Compartmented Information

SCIF

SCI Facility

SCION

Sensitive Compartmented Information


Operational Network

SCOPE

(I

SCS

..

Secure Counterterrorism Operational


Prototype Environment
~

SD

Supervisory Computer Specialist

SDNY

San Diego Field Office or Security


Division
Southern District of New York

SE

Seattle Field Office

SEAS

Supervisory EAS

SEATO

Southeast Asia Treaty Organization


Securities and Exchange Commission

SEC

iI

SEMU

Special Events Management Unit


(CTD)

SERL
SES

Special Events Readiness Level


Senior Executive Service

SF

San Francisco Field Office

SG '
SG

Singapore

SHAC

Stop Huntingdon Animal Cruelty - an


animal rights extremist group

SI

Springfield Field Office

SIGINT

Signals Intelligence

SIOC
SIPRNET

Strategic Information and Operations


Center
~InternetProtocol
ProtocolRouter
Router Network
Network
5Die-Internet

SISG
SITREP

SIOC Information Support Group


Situation Report

SIU
SJ

Sensitive Investigation Unit


San Juan Field Office

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

ACLURM005597

107

UNCLASSIFIED//FOR
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE ONLY
St. Louis Field Office or Sick Leave
Leave or
Sendero Luminoso - aka Shining Path
Path
(Peru)
(PerLJl
Mission, Execution,
Execution,
Situation, Mission,
Control
Administration, Command & Control

SL

SMEAC
SMR
SMTP

..

SIOC Morning Report


Single Mail Transfer Protocol
Protocol

SN

Santiago

SO

Seoul or Sheriff's Office

SOD

Special Operations Division,


Division, Drug
Drug
Section (CID)
Special Operations Group or
Surveillance Observation Group

SOG
SOP

Standard Operating Procedure

SRU

Resources Unit (ITD)


(lTD)
Strategic Resources

SSA

Supervisory Special
SpeCial Agent

SSAN

Social Security Account Number

SSG

Special Surveillance Group

SSGU

SSS

(VCMOS,
Safe Streets and Gangs Unit (VCMOS,
CID)
CIDl
Supervisory Senior Resident Agent
Support Services Section
Section

SST

Support Services Technician


Technician

ST
STAT!;
STATE

United States Department of State

STE
STU

Secure Telephone Equipment


Secure Telephone Unit

SU

Field Office
Salt Lake City Field

SVTS

System
Secure Video Teleconferencing System

SWAT

Special Weapons and Tactics

SWB

Southwest Border

SWS

SIOC Watch
Watch Supervisor

T&A

Time and Attendance


1.54 Megabits per Second Throughput
(Data Line)
jData
Line).

SSRA

Santo Domingo or State

T1
T1

T3
TA

44.3 Megabits per Second


Throughput (Data Line)
Line)
Telephone Application
Application

TACSAT

Tactical Satellite

UNCLASSIFIEDIIFOR OFFICIAL USE


UNCLASSIFIED//FOR
USE ONLY
ONLY

ACLURM005598

108

I.
a

!.

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY
TB

Butte ITC

TC

TO
TD

Transportation Crimes
Telecommunications Services
Services Unit
(lRD)
(IRD)
Training Division
Training

TOO
TDD

Training and Development Division


Division

TOY
TDY
TE

Temporary Duty
Tel Aviv

TECS

Treasury Enforcement
System
Communications System
Terrorist Enterprise
Enterprise Investigation

TCU

TEl
TEI

a
a

a
a
a

a
a
a

TFIS

Theft from
from Interstate Shipment
Task Force Officer
Terrorist Financing Operations
Section
Technical
Information Specialist
Technical Information
Specialist.
Tallinn

TFO
TFOS
TIS
TL

Telecommunications Manager
Telecommunications
Threat Management Unit (CTD)
(CTD)

TM
TMU
TO

Tokyo
Tactical Operations
Operations Center

TOC

Technical
Technical Operations
Operations Section
Section (ITO)
(ITD)
Tampa Field Office

TOS
TP
TREAS

Department o~
of the Treasury
Terrorist Reports and
and Requirements
Section
... POL
It..or nr
Savannah
1--:::Savannah ITC
ITC or
Telecommunications
Telecommunications Specialist

TRRS
TS
TSA

Transportation Security Administration


Administration
Terrorist Screening Center

TSC
TSL

TSP
LAN
TS/SCI LAN

TTA

Technically Trained Agent


Terrorist Threat Integration
Integration Center
Center

TTIC

TTX
TTX

Table Top EXercise


Exercise
Teletype

TTY

TU
TU

TURK

Targeted Staffing Level


Level
Sa~gs Plan
Thrift Savings
I~t""""":
.
e t/Sensitive
Sensitive Compartmented
Compartmented
Information local area network

Transfer Unit (ASD)


(ASD)
Time Utilization and Record
Record Keeping

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

ACLURM005599

109

,.!.

a
a
a
a
a
a
a

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
TVA
TWWU

Tennessee Valley Authority


Terrorist Watch and Warning Unit

TZ
TZ

Tijuana, Mexico

Unclassified

UACB
UAE

Unless Advised to the Contrary by the


Bureau
United Arab Emirates

UAV

Unmanned Aerial Vehicle

UBLU

Usama bin Laden Unit


Unit Chief

UC

UCA

UCFN
UCMJ

Undercover Agent
Universal Case File Number
Uniform Code of Military Justice

UCO
UCR

Undercover Operation
Uniform Crime Report

UFAP

Unlawful Flight to Avoid Prosecution

UI

Unidentified

UNI
UNSUB

Universal Index
Unknown Subject

UPS

Uninterruptible Power Supply or


United Parcel Service
Urgent Report

UR
URL

USAF

Uniform Resource Locator.


United States of America or United
States Attorney or United States
Army
United States Army Criminal
Investigative Division
United States Air Force

USAO
USA()

United States Attorney's Office

USBP
USC

United States Border Patrol


United States Code

USCG

United States Coast Guard


United States Customs Service

USA

USACID

USCS
USDA

United States Department of


Agriculture
United States Defense Attache Office

USDAO
USDC

United States District Court


United States District Judge

USDJ

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR

ACLURM005600

110

'.

!.i.

UNCLASSINEDHFOR
ONLY
UNCLASSIFIEDIIFOR OFFICIAL USE
USE ONLY
USDS

United States Department of State

USG

United States Government

USIA
USIC

United States Information


Information Agency
United States Intelligence Community

USMC

United States Marine Corps

USMS

United States Marshals


Marshals Service

USN
USOU

United States Navy


Undercover and Special
Special Operations
(CID)
Unit (CID)
United States Person
Person

USPER

USPIS

United States Postal


Postal Inspection
Service
United States Park Police

USPP
USPS

United States Postal Service


United States Secret Service

USSS
VA

Veterans
Veterans Administration
Administration
Vehicle-Borne Improvised Explosive
Explosive
Device
Virtual Case File

VBIED
VCF
VCFU
VCFU

Violent Crimes/Fugitive Unit (CID)


(CID)

VCMO

Violent Crimes and


and Major
Offenders
Violent Crimes and Major
Offenders Program
Violent Crimes and Major
Offenders Section (CID)
(CID)
Video Cassette Recorder

VCMOP
VCMOS
VCR

Violent Crimes Task Force


Violent Gangs

VCTF
VG
VGTOF

Violent Gangs and Terrorist


Ort:lanizations
Organizations File
Violent Incident Crime

VIC
VICAP
VICAR

Violent Criminal Apprehensi.on


Apprehension
ProQram
Program
Vehicle Identification
Identification Number
Very Important Person

VIN
VIP
VLTP
VN

Voluntary Leave
Leave Transfer
Transfer Program
Program
Vienna
Virtual Private Network

VPN
VTC

Video Teleconferencing
Teleconferencing

UNCLASSIFIEDIIFOR OFFICIAL USE


USE ONLY
UNCLASSIFIED//FOR
ONLY

ACLURM005601

111
111

111111/ 111111111111111111/1/11/1/1/11111/ 111

UNCLASSIFIED//FOR OFFICIAL USE ONLY


VWAP

Victim Witness Assistance Program

WAN

Wide Area Network


White Collar Crime

WCC
WCCP

White Collar Crime Program

WE
. WF
WF

Pocatello ITC
Washington Field Office

WFO

Washington Field Office

WHCA
WHOA

Communications
White House Cbmmunications
Agency

White House Situation Room


Within Grade Increase

WHSR
WIGI

WMDOU

Weapons of Mass Destruction


WMD Operations Unit (CTD)

WR

Warsaw

WMD

- Witness Security/Protection

WSP

WWW
WWW

World Wide Web

X
Z

Exempted from Ten Year


Declassification
Zulu Time (Greenwich Mean TiMe)
Time)

ZULU

Greenwich Mean Time

UNCLASSIFIED//FOR OFFICIAL USE ONLY

ACLURM005602

112

a
a

UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

NJTTF MASTER
MASTER PERSONNEL
PERSONNEL ROSTER
ROSTER
NJTTF

Official Bureau
Bureau Name
Name
Official
(Last, First,
First, Ml)
MIL
(Last,

Aqency
Agency

Seat
Seat
Assignment
AssifLnment

Secure
Secure

NJTTF
NJTIF
Office
Office

18-476
1S
- 476

1S
435
18 -435
1S-442
18442
18438
1S-438

1S-408
18408

1S
18 - 473
1S482
is
- 482

18-465
1S-465

18 - 433
1S
18-460
1S-460

18446
1S
- 446

1S
- 489
1S-489
18 - 413
1S
18-484
1S
- 484

"

18-456
1S-456

18402
1S - 402

1S - 430
18-430

I I

1S-451
1S-451
l

1S-429
1S-429

1&461
1S-461

I1-'

III-

tr--

ttr-r-

I-

b6
b6

b7C
b7C

rrr-

t-

I-

18-488
18-488
1S-487
1S-487

1S - 470
470
1S
181S - 471
471
1S416
1S - 416
18-477
1S-477

18
1S -- 447
447
465
181S-465
18448
1S - 448

t-

1S-450
1S-450

S
UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIALUSE
USEONLY,
ONLY

ACLURM005603

113
113

I.

UNCLASSIFIED//FOR
UNCLASSIFIEDIIFOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

18-843
1S
- 843
18 -- 427
427
1S
18-440
1S
- 440
18-467
1S
- 467
18-408
1S-408
18-438
1S
- 438
18-410
1S
- 410
18- 462
462
1S18-411
1S-411
18-409
1S-409
18-434
1S
- 434
18-415
1S-415
18-442
1S
- 442
18-444
1S-444
18-475
1S-475
15-430
1s-430
18-478
1S
- 478

b6

18-481
1S
- 481

b7C

18-443
1S-443
18 - 468
1S
18-412
1S
- 412
18-418
1S
- 418

18
13 - 445
18-431
1S - 41
18-420
1S - 420
18-480
1S-480
18-458
1S - 458
18-411
1S - 411
18
1S -- 479
479
18-423
1S-423
18-424
13 - 424
18-469
1S - 469
18-403
1S - 403

UNCLASSIFIEDIIFOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

ACLURM005604

114
114

I.

'.

UNCLASSIFIED//FOROFFICIAL
USE ONLY
ONLY
UNCLASSIFIED//FOR
OFFICIAL USE

15-441
1S-441
1S
15 --455
455

15 -- 483
483
1S
15449
1S
- 449
-<;:~ ..._~~:~: e~ -:''1'~:40if:---~ .~.,.
:.~

'.

- . ,_.

-" ...

15'417
1S
I- 417
15414
1S
- 414

b6
b6
b7C
b7C

1S
15 -- 425
425
1S
15 -- 466
466
1S
15 -- 426
426

15-428
1S
- 428
15-- 486
486
IS
15-434
1S-434
15 - 485
1S
15472
1S
- 472
15-452
1S-452
15-474
1S
- 474

1r

15437
1S
- 437

.,
a
a

UNCLASSIFIED//FOR
UNCLASSIFIED//FOR OFFICIAL
OFFICIAL USE
USE ONLY
ONLY

a
a

ACLURM005605

115
115

Appendix A
A

116111101111110SSIIIIIIIIISSIIIIIIS111111111111111111119111111111191111111111

ACLURM005606

:.

(Rev. 01-31-2003)

FEDERAL BUREAU
FEDERAL
BUREAU OF INVESTIGATION

,.

Precedence:
Precedence:

To:
To:

ROUTINE

Date:
Date:

All Field Offices

Attn:
Attn:

Counterterrorism
Counterterrbrism

Attn:
Attn:

11/24/2009

ADIC/SAC
JTTF/CT ASACs
JTTF/CT SSAs/SSRAs
JTTF Coordinators
CoordinatOrs
DAD Tracy A./North
A.,North
DAD Virginia L.
L. Bollinger

Counterterrorism
DT
DIATfS/. NationaJ ,roj nt Terrorj
Contact:
Contact: IA _

From:
From:

Approved By:
By:

SID

Task Force

McJunkin,
McJunkin, James W
W
Ward, Michael B
Ward,
ninlinn
Gipliano Mark

b6
b7C
b7c

Drafted By:
By:
Case ID #:
#: 415A-HQ-C1432188-DR
Title:
Title:

(pending)
(Pending)

FORCE;
NATIONAL JOINT TERRORISM TASK FORCE;
DATABASE/RESOURCE SUPPORT

Synopsis: To inform Joint Terrorism Task Forces (JTTFs)


(JTTFs) on the
Synopsis:
(NJTTF)
availability of National Joint Terrorism Task Force's (NJTTF)
resources.
databases and resources.

Administrative: Field
Administrative:
FieldJTTF
JTTF members are encouraged to coordinate
with their local
local JTTF federal,
federal, state and local representatives
prior to contacting the NJTTF.
.
NJTTF.

Details:
Details: The NJTTF's mission is focused on providing support
support.to
to
other Counterterrorism
Counterterrorism Division
Division Sections
Sections and
and field
field JTTFs.
JTTFs. The
NJTTF
NJTTF does
does this
this thro
thro llrT: :cce~l tol
to
I
available through its
i tslplu
s Task
'I'ask Force
Force ?fb.cers
plus
utticers ('I'F'Os)
(mos)
from federal,
oca government
government agencies.
agenc~es_
from
federal, state
stateanan oca

Supported units gain unique assistance for


investigations and
and intelligence
intelligence analysis by leveraging the
investigations
NJTTF's information sharing and access to unique information
to possible
Supported units
units do
do this
this by
related to
possible threats.
threats. Supported
submitting request
request for
for information
information to
to the
the NJTTF.
NJTTF. The
The NJTTF TFOs,
TFOs,
RFIs, coordinate to provide a
a collaborative response
in answering RFIs,
that includes name checks and searches for terrorism-related
information (i.e.
(i.e. groups and organizations associations,
associations, events,
events,
information

ACLURM005607

b7E

'.
I

To: All
All Field
Field Offices
Offices From:
From: Counterterrorism
Counterterrorism
To:
Re: 415A-HQ-C1432188-DR,
415A-HQ-C1432188-DR, 11/24/2009
11/24/2009
Re:
\

facilities, special
special interest
interest country travel,
travel, equipment,
equipment, weapons,
facilities,
weapons,
communication, and finances).
finances).
communication,

SACs, and ASACs


CTD Section and Unit Chiefs as well as SACs,
ASACs
are encouraged to highlight the FBI's NJTTF'
NJTTF existence and
encourage its
encourage
its use
use to
to enhance
enhance ongoing
ongoing investigations.
investigations. The NJTTF
NJTTF
website, found
found at
at http://ctd.fbinet.fbi/n-jttf/,
http://ctd.fbinet.fbi/njttf/, can be
FBI website,
following information:
information:
accessed to provide the following
a. JTTFs member contact information
a.
b.
b. NJTTF Task Force Officers'
Officers' agency information
c. JTTF operation policy documents
c.

b7E

b6

b7C
b7C
b7E

ACLURM005608

Appendix 8

II IP II I

II II II III II II II

ACLURM005609

To: All
All Field
Field Offices
Offices From:
From: Counterterrorism
Counterterrorism
To:
Re: 415A-HQ-C1432188-DR,
415A-HQ-C1432188-DR, 11/24/2009
11/24/2009
Re:
LEAD(s) :
LEAD(s):
Set Lead
(Action)
Set
Lead 1:
1: (Action)
ALL RECEIVING OFFICES

is
Ensure the information contained in this communication is
distributed to all personnel assigned to JTTF and/or
Counterterrorism in their respective divisions.
divisions.
(~ :

46
46

ACLURM005610

You might also like