U Terrorism investigation 1117 Ito investigate or collect
Transcript of U Terrorism investigation 1117 Ito investigate or collect
information reiati q to National Securitvl 1117
U Terrorism investigation ..The investigation can be opened as a result of a complaint or other Information. The TFO may
Ito investigate or collect lithe 415 Policy (i.e., Case Classification for Terrorist
s
b7E
JTFF CBT
Page 1 of 1
—(380141(ALAOECIEN
JOINT TERRORISM
Introduction To The TASK FORCE (3TTF)
FBI ORIENTATION
Bureau Operations (U) The FBI is America's lead terrdrlsM federal inuczUgativpflew enforcement agency. It conducts many and varied investigations that are derived primarily through Congressional Legislation or authcrizatlan. The Bureau also assists state and local entities when help is requested.
Invest! ation) are The SSA can aut orize The SAC can au orize after that
• FBIHQ has to authoriz
QUIT :: PREVIOUS:: NEXT PAGE: 13 OF 17
--SseBBOAtoolcORN-
file://D:\jttfoV2\modulel\m1_120.htm 8/8/2011
FBI020624 ACLURM020833
JTFF CBT Page 1 of 1
JOINT TERRORISM TERRORISM Introduction To The TASK FORCE (3TTF) FBI
ORIENTATION
Bureau -Operations (Can't) (u) Doczt!,c Investigations and Operations Guide (DIOG)
m predicate the type of Investigative techniques authorized I I Evcry'
investigation has its own case identification (ID) number. The first part of the case ID is a numeric classification and an alphabetic sub-classification. This numeric classification code stands for a distinct type of investigation. Common case classifications involved with 3TTEs are 266 (Domestic Terrorism) and 415 (International Terrorism). Examples are 266H = Anarchist Extremist and 414 t Each case ID also has a two-letter Field office designation. For example: NY Indicates the New York Field Office or Division. Finally, a case ID has a unique computer generated number. Example: 123456.
(U) An International Terrorism investigation originating out of the New York Office with ani !nexus would look like: 414aNY-123456. Field Offices have pocket size, hard copies of this FBI Investigative Classifications for investigators and staff. The updates to the hard copy are made on a yearly basis.
QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 17
--SEeRflf44.130E03N-
b7E
b7E
file://D:\jttfoV2\modulel \m1_130.htm 8/8/2011
FBI020625 ACLURM020834
JTFF CBT Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
0 RIENTATIO N
Bureau Operations (Con't)
Introduction To The FBI
(U) Investigations within the Bureau are commonly referred to as cases. 3ITTF cases are opened to investigate or collect information relating to threats to National Security. Opening of a case usually involves a communication, most often the Bureau's standardized Electronic Communication (EC). This gives information regarding the predicating offense, information regarding subjects of the case, and other administrative information. The case agent drafts this communication and receives the appropriate approvals. An FBI support employee opens the case in the Bureau's Automated Case Support (ACS) computerized case management system, and assigns a case number.
(U) There are several other terms regarding a case that need to be explained:
• Pending • Pending Inactive • Closed
QUIT :: PREVIOUS :: NEXT
PAGE: 15 OF 17
file://bAjttfoV2\modulel\m1_140.htm 8/8/2011
FBI020626 ACLURM020835
JTFF CBT
Page 1 of 1
—eretereiyttePeFel
JOINT TERRORISM
Introduction To The TASK FORCE (JTTF)
FBI
ORIENTATION
Bureau Operations {con't) (U) Pending indicates that the case Is open and being worked by the FBI. There are occasions when a case is pending, but no investigation or other activity on the case is expected to occur for an extended pericd of time. These investigations may be placed in Pending Inactive (PI) status by the SSA.
(U) A case is closed upon successful resolution of the investigation, prosecution, or exhausting of all investigative avenues. Closing of the case is documented on an EC.
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 17
--"Mrefteie,Lis
file://D:\jttfoV2\modulel\m1_150.htm 8/8/2011
FBI020627 ACLURM020836
JTFF CBT Page 1 of 1
—SEVAB94111:20813
JOINT TERRORISM
Introduction To The TASK FORCE (3TTF)
FBI ORIENTATION
Nodule Review (U) FBI Priorities:
• List of ten priorities of the Bureau - with the number one being preventing a terrorist attack on the United States.
(U) The FBI has a long and extensive history of fighting crime and the new emphasis on the ten priorities.
(U) The FBI is divided into Headquarters and Field Divisions:
. There are many Headquarters divisions and entities and 56 Field Offices • Foreign FBI Offices are known as Legats.
(U) Bureau investigations are known as cases.' A case can alsol
(U) The FBI has its own language demonstrated by the use of abbreviations and case classifications.
PREVIOUS :: FINISH MODULE
PAGE: 17 OF 17 ---11643Par44:1QIEQE
file://DAjttfoV2\modulel\m1_160.htm 8/8/2011
b7E
FBI020628 ACLURM020837
Overview Of Instructional Goal And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the types of written Communications: and administrative pAlicirs and procedures employed by the FBI in the fight against domestic and international terrorism.
(U) Objectives:
1. Read and review the types of written communications used within the FBI. 2. Gain a basic understanding of the FBI's administrative policies and procedures.
EXIT MODULE :: NEXT PAGE: 1 OF 14
—eacciutal.,Oimunt
file://DAjttfoVamodule2V/12_000.htm 8/8/2011
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DIM/ stp/ lsg ON 10-14-2011
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
0 RIENTATIO N
FBI Written Communications And Administrative Details
FBI020629 ACLURM020838
JTFF CBT Page 1 of 1
LOPZBY-ANGPeFal
JOINT TERRORISM TASK FORCE OTTO
ORIENTATION
Operational And Investigative Writing (U) Electronic Communication
FBI Written Communications And Administrative Details
(U) The Electronic Communication (EC) is the Bureau's standardized internal communication for investigative tasking (leads) and disseminating information. ECs are how ITTF agents and Field Offices receive and send important case information. An EC must be written when an investigation is opened. An EC is a macro (an automated template) that can be accessed from the Corel WordPerfect software application icon found on the computer desktop.
• Importance of Setting Leads • Drafting an EC • Approvals . Uploading an EC • FD-302
o Example • Drafting an FD-302 . Approval • Procedure for Indexing ACS
QUIT :: PREVIOUS :: NEXT
PAGE: 2 OF 14 --SSCRES41MCIELMIL
file://DAjttfoV2\module2\m2010.htm 8/8/2011
FBI020630 ACLURM020839
Ce aclurntations- , Ad,linistitive- Details'
JTFF CUT -Windows Internet Explorer ,
(120 e Itelottforneodle2tm2_010.htm
Pie Edt Mow Fayortas To Help
Favorites I t;;;) PEI Intranet
.4 717F CBT
1.4 X Fps,.-
- Etee • Safety. Toth • le'
JOIN T, ERRORTSM * t r li
* V
TASK FORCE. (,Vj F)
„ 'ORIENTATION
Operational
(u) Electronic
(U) The Electra investigative tar receive and sen Is a macro (an I icon found on t
At internal communication for e how Yri-F agents and Field Offices n when an investigation is opened. An EC Corel WordPerfect software application
- - - - (U) It is necessary to set leads so that other Field Offices or FBI HQ Divisions can assist with the Investigation of the case or track outgoing communications from your office.
Importance of Setting Leads Cte•ic _ - • •
• jmoortang • Drafting at rfrAgranuriklg
.1; • • F1:1-3077..
o I .--4-piiafturarq1)-302 \\_
-• tt_asionntal-
procedure-forndexinn ArRs-,\
k
/ ••■ , .
X•N
s , / 1 • 1 \
ormlnir eysvair•-• ti Ply Casette, •: 4t weir: • -
1=11 a),FF "'
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED
b 7 E DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg b 7 E
b 6 b7C
FBI020631 ACLURM020840
`e.. 4t X 13.0;,—; :r Isf DtInfoRtmodule4m2_010.hn
Fla Edt Now Freon/as Tools Hob
*Deviates LIVIntronet
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg
gin+ CBT
.1,7--.31:1/14T.TERFLORIS, t TASK FORC,E.C3Vhi
ORIENTATION. (1-
- 0 v cira - pew • Safety • Took. al. "
9frin19.flica 1,905 An Admlibstrative Detalis
Deakin° an EC
Information on how to draft an EC can be found in the Flertrnnir. Communication Reference Guide
ad internal communication for e how IITF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application
• Imoortang • oraftina at 1,,,Aporovlif,
••• ..,p0-307e ' o
'pratincran•Eb-302"•.<"\\ Approval- -
-1: procedure-for Indexi g
g Ply Canada fa 5' 4'. Ito% • ,•
Operational-
fu) Km-ironic (•
(U) The Electro, Investigative tat receive and serf Is a macro (an f icon found on t-
E7E
b6 b7C
g.JT IT CDT - Windows. Internet hpInter
•
FBI020632 ACLURM020841
4. 9 My Carrplat
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
.JIFF CUT Windows Internet Explorer
.0 51, DARIfee2tmodde200010.htrn
Fie Vle., Favorites To He
LC Favodes I .4 ty FM laranst
JIFF ®r
vj 41, X FP cw:
as Con-runtcattpns And .. *Ad n fratiir,6,Details
Operational (U) Electronic <
(U) The Electra' Investigative tm receive and sed, Is a macro (an I icon found on t
▪ Important . praitina al
Aonrovais
sewn:muds
The EC macro has an Approved Information prompt that reflects the official Bureau name(s) of Individuals) responsible for approving the EC. There are lines for multiple approvals that may be necessary.
SIFF 9:V•PM
d internal communication for e how JTTF agents and Field Offices n when an Investigation N opened. An.EC Corel WordPerfect software application
fr
--,
. lkaTnran.p -sa 4 <-4„\
Pli i-4 -1:' i-f4Indexina A;Et-'\ ,.. ,,..
..:"‹ •.' / "\,, ." \ '" \
▪ 0
.1)7 E
b6 b7C
FBI020633 ACLURM020842
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
b7E
(r ,JIFF CST - Windows Internet Explorer
gg. Fie Eck View Favorites To* He •
I'
*Favorites I ,•,:3 di Fal Intranet
iSJIFF CDT
- 0 - Ps- 5ddy ■ TOth CO.
r Uploading an EC 00714 " A!! r.:prv:cd CC up:zzdzsi the .g :t Sy..":!= (ACE). The ACS has 3 components: investigative Case Management (ICM), Electronic Case File (ECF), and Universal Index (UNI).
• ECF Is the Electronic Case File. It serves as the central electronic repository for the FBI's official Investigative textual and non-textual documents.
• ICM is the Investigative Case Management function. The ICM Includes: opening, assigning, and closing of administrative and investigative cases; setting, assigning, and covering of leads; setting record checks; and setting, completing, and tracking of ticklers.
• UNI is the Universal Index Application that serves as the FBI's General Index repository of records processing functions for the FBI's Investigative and administrative cases.
ECs are uploaded either through FBINET or through the Web-based Automated Case Support (WAGS) application found on the FBI Intranet.
Ri cars•Asi
'tfgeR '110gmu ,esvar "°%
FBI020634 ACLURM020843
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10714-2011 BY 65179 DMH/ stp/ lsg
C.JTFF CBT - Windows Internet Explorer
v.,4r x. fp Lv•
Fie Edit View Fawkes To* Heb
*Famites 54 g; Fentaxxt
FF car 111 • 0 0 6, • Pane • Moir. Tod, • 0.
CorprijuNga ions An rd inlS .time Detai15.
FD-301
The FD-302 is a form used to record the results of any Investigative activity that may result In testimony being given. The purpose of the FO-302 Is to provide an accurate and complete record of all evidence developed during an investigation.
Das
0 Examilh„,̀■.=-1,j,
••• • A1211Mi11-1 .--1. Procedure-f0Indexing A_ _;\
C . •
. .. • •i ss.
r=r-i-517F:5?„,,W
vz; V :P.., DARti0V2V110d1k741112010111311
Operational jul Flectrnnlr e
(U) The Electra investigative tat receive and sen is a macro (an z Icon found on r
• Important; • °ratline al
al internal communication for e how 3TTE agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application
FBI020635 ACLURM020844
-M - Pork, Safety • tads "
IP- ‘4,,, V fie, DdIttroMmodulann2010.htm
Flo Edt Kew Favates Tab 11±
FRIIntranit
:03TFParr
• Nfs
4 • AIM g hrOnoutor
fAetgia;# GOEVATIKi 460064 _ Gil JIFF CET
.b7E
exampl. (;"4•K The FD-302 can be used to document the results of the following investigative activity:
• When accepting or providing evidence
• Interviews • Surveillance results • Subpoena results
Trash cover results • Arrests
Click here to see an example of an FD-7K;
mi internal communication for e how ITTF agents and Field Offices n when an investigation is opened, An EC Corel WordPerfect software application
• % o —71--Errantncran,F1S-302
Apneoval--4 A" ....A procidure-fOr Indexing Atg-
-
'I • :tiireDadils:
Operational
Ito Electronic P
(U) The Eiectro; investigative tat receive and ser( Is a macro (an z Icon found on t
• Imnortanq • Drafting a(
..lu,Yr• jI1zi
a.,ITFF,C13T-.Windows Internee Explorer CR
(
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED. DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
FBI020636 ACLURM020845
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMHJ stp/ 1sg FD-302 (Rev. 10-6-95)
FBI020637
-1-
FEDERAL BUREAU OF INVESTIGATION
Date of transcription 06/02/2006
File a 266H-CE-123456 Date dictated
JOHN D. SMITH; white male, born: January 1, 1975, B$A!T: 123-45-6789, 123 First Street, Anytown, N.C. 54321, (704) 987-6543, was advised of the identity of the investigating agent and the purpose of the interview. He provided the following information:
XXXXXXXXXXXXXXXXXXXXXX2CCX.XXMXXXXXXXX=XXXXXXXXXXXXXXX=( xxxxxxxxx.xx XXXXXXX •
XXXXXXXXXXX XXX XXXX.
Investigation on 06/01/2006 at Anytown, N.C,
by SA JANE C. DOE
This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.
ACLURM020846
s • iffl • Page • Safety • icon. FO. "
• Importang • Drafting a( ,..Auprovals
7. ...s, , _.• Egzsg2e. . t )'.. - Ekamoie.)--" -.4,v, ■ ...-
•
--ii-praftinran.F0-30% \--\4\\
__„....-ii. procAdure-fli Indexinn rt..1-:.,,,\ .., •
'ii: '
. - ''r-... . ••<*s 'i \ -1. ,...\/ 'a
3DdgeoV2Into4te200_010.1tal
no Edt View Favonica Icon It* -
14- Pandas 1 14 a; Minton!!
- - - - - -- J WiTIFCBT
*tyo 7-7k .40INT,TERRA) RN A! * ra 1:7 slll ,TASK FORW3TTF)
. _
Operational f Ul Electronic
(U) The Electra Investigative tea receive and sea Is a macro (an icon found on r
Drafting an FD-302
One FD-302 Is written for each Investigative action.
There should be no more than five working days between the date of obtaining the information and the date the FD-302 Is written.
AI Internal communication for e how ITTF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application Information on how to prepare an FD-
302 can be found on the FBI Intranet at: htto://home.fblnet,fbliformsifd302
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
ail-FF CDT; t/indows Internet Explorer
• g MY CainKter es • trier ni • •
b7E
FBI020638 ACLURM020847
Badcground The purpose of the FD-302 is to report information that may become the subject of testimony.
Help
FD-302 User's Guide
FD-302 FAO
.form link*
Word Perfect version 12 has been deployed to all NGW machines, and indudes the original macros used prior to the NGW conversion. These macros should be utilized to create new7D-302s for the time being. These macros will be replaced over the coming months. Once we are certain that we have new versions of these forms that are acceptable for use in the field, Word Perfect will be removed from all users' desktops. Thank you for your patience during this transition period.
If you have created an FD-302 in InfoPath during the period when it was the only available option under NGW, the resources to the right are still available for support.
Submit Feedback
CPO Contact jnformation
Problems Using a Form? Start with Our Troubleshooting Guide.
Hdp
Weimer
Fie Edt Yew Fund= To
Favaites .4.3 12. FBI Intranet .
gifliare -FD-302
Fn-qn, jTocime 1
YieurttSte Conlon Documents Lists
!Discussions !Sites;
ipeopleand Groups
-21 0:p • Yam.. Safety. Reis. 9. b6 b 7 C
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-1472011 BY 65179 DNB/ stp/ lsg
.107E
a_ Home - FD-302 - Wincicnvs Internet Explorer
v 41.. !X !Pt,. __:e..
P ,-
recall-turret
es • Atom -
1*.kirar, OW^ *MP irt BE '-5-4.D 1__
FBI020639 ACLURM020848
0 • et • Pow, Seiety • Tools • if). ONFF CDT :
g pvcc.putet • 4': quo" '2
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
•b 7 E
0.1EFF CDT. Windows Internet Explorer
!p_, ovrommockezvie_moten
rre au View Fevets, Tools Help t'eFavailas I t:43 tiF011arenet
Operational. (u1 Electronic q
(U) The Electra investigative tat receive and sen Is a macro (an icon found on t
• IMDILMIne . Drafting al
- •
TASK-FORCE-4(4,V!) -S'ORIENTATIO N. Approval
A Task Force Officer's Supervisory Special Agent on the ITTF approves the FD-302.
Id Internal communication for a how JTTF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application
lipreadinku‘. Dow - 0-30W' • 0 &A/wi /N.
tfanrintal—"" • ,-"Te ProcOtire-fdr 'Indexing
.""
•''. tw.
FBI020640 ACLURM020849
41' X" IPIc2Si:r:.
- 0 - Pape - sake,- Tools-
...-. Eck New Favorites Tools tizIp
.yr Favoribn 11'4 FBS Irtianet
.4nwart
g PrOxrcater Pa Atm -
Q. JIFF. CBI•lyintlows Internet Explorer .
Procedure for Indecing ACS
The-Indexing Guidelines can on the FBI Intranet at: http://homeibinet.fbl/DO/OGC/LB/ESIDU 200ocuments/EC-Uoloading-Indexing-Documents.pdf.
This document Is maintained by the Office of the General Counsel.
Co m rruf-qta tions' And Ad j.tratlye:petails •
td internal communication for e how 3TTF agents and Field Offices n when an investigation Is opened. An EC Corel WordPerfect software application
, TASK FORCK(.3,TT, ORIENTATIOR.
Fes_w_sp.re
• jmnortand • Drafting a( t•IUMPS5119'
Dow
Operational (U) Electronic <
(U) The Electra investigative tar receive and sen is a macro (an t icon found on t.
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMHJ stpJ lsg
b7E
'ecirrE/ /IFF
FBI020641 ACLURM020850
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED
(RevA1.31-201:0) DATE 10-14-2011 BY 65179 DNB/ stp/ 1s4
FEDERAL BUREAU OF INVESTIGATION
Precedence: ROUTINE Date: 06/12/2009
To: All Divisions
From: kecords Management RPAS/5334 Contact:
Approved By: Murphy Timothy P b6
Hooton William L b7C
Drafted By:
Case ID #: 319W-HQ-A1487624
Title: RECORDS MANAGEMENT MATTERS UPLOADING AND INDEXING DOCUMENTS
Synopsis: Reiterates current policy regarding the indexing of subjects and references. The current policy will remain in effect until such time that Sentinel is at full operating capacity with .automated indexing (anticipated in FY2010).
Details: The Manual of. Administrative Operations and Procedures (MAOP), Part 2, Section 2-3, requires the indexing of subjects and references of FBI investigations. This communication reiterates the MAOP policy for indexing and reinforces the need to upload FBI-generated documents.
The purpose of indexing is to record individual names; non individual names, such as corporations; and property which are relevant to FBI investigations so that this information can be retrieved to support an efficient and effective case management system for current and future investigations.
Indexing of subjects and references into the Automated Case Support (ACS) system's Universal Indices (UNI) application creates a central repository of file information that can be searched to identify relevant records. UNI is the only searchable source that contains information about both paper and electronic records. Full text queries of the ACS system's Electronic Case File (ECF) only searches for information that is available electronically.
Properly indexing new records is a critical step in using and managing FBI information on an enterprise level. Many legacy applications still use UNI searches as the basis for identifying relevant records in support of both internal and external investigations. Failure to properly index new records compromises the
FBI020642 ACLURM020851
To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009
FBI's ability to identify all administrative and case information connected with an individual or organization. Information missed during a search is often referred to as a false negative result.
To illustrate the importance of a complete records index, Executive Branch agencies request name searches against UNI as a part of their investigations to determine suitability for employment; trustworthiness for access to'classified information by U.S. government employees, contractors, licensees, grantees, military personnel and other individuals with an officially determined need for access; or, in the case of aliens, eligibility to remain in the United States. Therefore, failure to properly index subjects and references could produce a false negative search result that is then communicated to other federal agencies. Internally, false negative results may compromise investigations, analytical work, and the FBI's Freedom of Information/Privacy Act operation.
Recipients of this communication are advised to consult MAOP Part 2, Section 2-3, for specific indexing criteria, guidelines and requirements. In addition. the Indexing Guidelines located at
1 1 provide specific guidance on searching and entering data into UNI.
In order to be searchable, retrievable, and shareable through automated means, the text of FBI-generated documents must be uploaded into the ECF component of ACS. Computer-generated documents (WordPerfect, Microsoft Word, Excel, etc.), are capable of being uploaded into ACS. Delays in the uploading of documents may impede the progress of related investigations or delay the FBI's ability to comply with Executive Orders or statutes governing the use and reporting of FBI information. In addition, uploaded documents are readily available to all authorized personnel and eliminates the need for the originating office to provide copies or summaries of the document(s). Monthly reports summarizing the efforts of each division, field office, and Legat regarding uploading activity can be found on the Information Technology Operations Division's (ITOD) website at 1 1
Offices are advised that uploading a document into ACS does not negate the originator's responsibility to index subjects and references into UNI. While the text of uploaded documents may be searched, such queries will not identify any paper records relevant to the search criteria. Indexing and uploading are accomplished through the use of ACS or Web-based ACS.
The indexing capability in Sentinel will not be available until the end of fiscal year 2010. Therefore, all FBI employees must continue to adhere to the current indexing policy, criteria, guidelines, and requirements using ACS or Web-based ACS.
b7E
FBI020643 ACLURM020852
'derived from the updated Attorney General Guidelines of December 2006.1 b7E
To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009
For records related to Confidential Human Sources, recipients are directed to the Directorate of Intelligence and the
1website at: 1
) Uploading the text of documents and proper indexing saves .
time, money, and personnel resources, and provides immediate access of data to collaborating partners through the information sharing initiative. RMD appreciates the effort of all offices in ensuring
. that the FBI's records are accurately. indexed and uploaded making them readily identifiable And available as needed.
3
FBI020644 ACLURM020853
To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009
LEAD(s):
Set Lead 1: (Action)
ALL RECEIVING OFFICES
Advise all employees of the contents of this communication.
• •
4
FBI020645 ACLURM020854
JTFF CBT
Page 1 of 1
sECRsr&sesaas-
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
FBI Written Communications And Administrative Details
Overview Of Instructional Goal And Objectives
WI inserts
(U) An Insert is a blank sheet for recording the results of investigative activity that is not testimonial. The purpose of an Insert Is to document an investigation in a manner suitable for being included (inserted) into a report.
(U)Click here to see an example.
QUIT:: PREVIOUS:: NEXT
PAGE: 3 OF 14 —96€1480046Kilgoliai
file://D:\jttfoV2kmodule2\m2_020.htm 8/8/2011
FBI020646 ACLURM020855
182A-DE-36894 LWL:cbl
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ .stp/ lsg
1
The following investigation was conducted by SA at Inkster, Michigan:
On February 3, 2004, a review of the DOWNRIVER SHERATON HOTEL guest registry for December 20, 2003, revealed no information identifiable with
or
On February 6, 2004, a records check at the INKSTER POLICE DEPARTMENT revealed received a traffic citation for a minor traffic violation ini I.
On February 6, 2004, a records check at the INKSTER POLICE DEPARTMENT revealed no information identifiable with
or
b6 b 7 C
FBI020647 ACLURM020856
JTFF CBT
Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (3TTF)
ORIENTATION
FBI Written Communications And Administrative Details
Overview Of Instructional. Goal And Objectives
b7E
"It is the responsibility of the FBI to share terrorism intelligence and it is mandated by the National Security Act of 1947, Executive Order 12333, the USA Patriot Act, the Homeland Security Act of 2002, and the Attorney General's Guidelines of FBI National Security Investigations and Foreign Intelligence Collection."
b7E
Click here to see an example.
QUIT:: PREVIOUS:: NEXT
PAGE: 4 OF 14 —080HIPPHifereRK
file://D:\jttfoV2\module2\m2_030.htm 8/8/2011
FBI020648 ACLURM020857
TIFF CBT Page 1 of 1
-eseterfhttrepeat:
• JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Written Communications And Administrative Details
Overview Of Instructional Goal And Objectives (U) Letter Head Memo (LHM)
(U) The purpose of LHM is to. notify various departments, including the Department of justice, Office of Intelligence Policy and Review (OIPR) and FBIHQ, of the intent to open an intelligence case. An Opening EC must accompany the initial LHM. An LHM is used:
• In those instances when it is not necessary to conceal the FBI as a source; . When the field furnishes information to FBIHQ in the belief that it is of possible Interest to other
government agencies and when it is desired to provide a communication suitable for dissemination other than an investigative report;
. In applicant (except Bureau applicant), Office of Personnel Management security referral (140A and 140C), and security-type cases, to report the reliability and evaluation of sources;
• To set fourth Information qecessary for conducting investioationp abroad; • To transmit information tol and • To submit significant data to FBIHQ in nonprosecutable espionage and nationalistic tendency cases
(65 and 105 classifications).
(U) Click here to see an example.
QUIT:: PREVIOUS:: NEXT PAGE: 5 OF 14
91343ESSAL1101i1OPS
file://D:\jttfoV2\module2\m2_040.htm 8/8/2011
b7D
FBI020649 ACLURM020858
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 ONH/ stp/ lsg
U.S. Department of Justice
Federal Bureau of Investigation
In Reply, Please Refer to File No.
Newark, N.J..07101 May 17, 2002
UNKNOWN SUBJECT; THREAT TO BOMB
WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY,
MAY 1, 2002
Start, typing the text here.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxmaxxxxxxx xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxx)pcx • xxxxxxxxxxxx xxxxx XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXxxxxxXXXXXXxxxxxxxxxxxxxxxxxxxX
xxxxxxxx xxxxxxxxxx xxxxxxxxxx XXXXXXXXXXXXXXXXXXXXXXXXXX .
XXXXXXXXXXXXXXXXXXXXXXXXMXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXX
1-U.S. Secret Service, Newark, NJ 1-Newark (174-550) JJS/def (2) (THE COPY COUNT AND BELOW NOTATION GO ON NEWARK'S COPY ONLY)
This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.
13
FBI020650 ACLURM020859
UNKNOWN SUBJECT; THREAT TO BOMB WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY; May 1, 2002
Continue typing text here.
XXXXXX2CXXXXXXXXX X XX xxxxxxxxxxxxkxxxxxxxx XXXXXXXXXXXXXXXXXXX XX3CXXX3C3CXXXXXXXXXXXXXXXXXXXXXXXXX=C=CX XXXXXXX
XXXXXXXXXXXXXXXXXXXX3OCXXXXXXXXX XXXXXX.XXX3OCXXX
XXXXXXXXXXXXXXXXX3CXX XXXXXXX3CXXXXXX3CXXXXXXXXXXX XXXXXXXXXXXXXXXXX3CXXXXXX.
2
FBI020651 ACLURM020860
UNKNOWN SUBJECT; THREAT TO BOMB WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY; May 1, 2002
3
FBI020652 ACLURM020861
JTFF CBT
Page 1 of 1
TEtErrfrtiteseFaT
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Written Communications And Administrative Details
Overview Of Instructional Goal And Objectives
b7E
QUIT:: PREVIOUS :: NEXT PAGE: 6 OF 14
---SECRBW-ANGIMAN
file://DAjttfoV2\module21m2_050.htin 8/8/2011
FBI020653 ACLURM020862
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
--nrcrirr7ALSM
FBI Written Communications And Administrative Details
Overview Of Instructional Goal And Objectives
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 7 OF 14 —szettertiffereas-
file://DAjttfoV2\module2Am2_060.htm 8/8/2011
FBI020654 ACLURM020863
FBI020655
FBI Written Communications And Administrative Details
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://D:\jttfoV2\module2\m2_070.htm 8/8/2011
JTFF CBT Page 1 of 1
SHEINPIWNIereRN
Overview Of Instructional Goal And Objectives
FD-515 and FD-542
(U) The FD-515 is an Accomplishment Report used by personnel to claim statistics on arrests, indictments, convictions, disruptions and dismantiements of Organized Crime/Drug Program organizations, Violent Crime and Major Offender criminal enterprises, and Domestic and International Terrorism Investigations.
Click here to see an FD-515 example.
(U) The FD-542 is an Investigative Accomplishment Report macro used by personnel to claim investigative accomplishments involved in the counterintelligence or counterterrorism investigative process.
(U) Click here to see an FD-542 example.
QUIT :: PREVIOUS :: NEXT
PAGE: 8 OF 14
ACLURM020864
Accomplishment involves: (check all that apply)
Drugs
A Fugitive Bankruptcy Fraud Computer Fraud/Abuse Corruption of Public Official Money Laundering
trme. esce.
Asst. FO(s)
A. B. C. D.
Task Force
Assisting Agencies x •
1.
2.
File Number
Stat Agent Soc. Sec. No.
Stat Agent Name
RA
Squad
Assisting Agents Soc. Sec. No. 2c
1.
Name:
2.
Name:
FD-515 (Rev. 8-30-2010)
Squad supervisor approval (please initial)
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
Accomplishment Report Date Prepared
(Accomplishment must be reported and loaded into Date Loaded ISRAAwithin 30 days from data of accomplishment) Date Loader's Initials
Investigative Assistance or Technique Used
1. Used, but did not help 3. Helped, substantially
2. Helped, minimally 4. Absolutely essential For Sub. Invest.AssisL by other FO(s) indicate A,13, C, D for corresponding FO
Rate FO IAT Rate FO IAT Rate FO IAT Rate FO IAT
Mn. Analyst Lab. Field Sup UCO - Methods Vict-Wiln Coor
Aircraft AssL Pen Registers NCAVC./ VI-CAP *Wanted Flyer
Computer Photo Cover Care/NS Istel Asti SARs
........... M.... "It..7.7' '7iati. Novi - Fat CART
Asset FBS Prog ELSUR / F1SC Search Warrant filth Neg.-Local
ELSUR / T. III Show Money ERTAssL Fort Support Pro(
Eng. Reid SM. SOG Asst. Butte - OSC TFOSJCTD
Eng. Tape Ex. Swat Team Say. - OSC CXSICTD
Legate Asst. Tech.AglEquip. Poo-SC InfraGard/CyD
avid. Purchase Phone Toll Ree Tech Rasp Unit OFC/CID
Inf/CW Info UCO - Group I For. Lang Asst. PPP
Lab. Die Exam UCO Group II Non FBI Lab Es Fusion Centers
A. Complaint I information/ indictment
['Federal [Iota! ['International
Complaint Date*
Check if CMI Rico Complaint
Information Date*
Indictment Date:
B. Locate I Arrest
Federal ['Local [lintemational
Subject Priority: DA EIB De Locate Date:
Arrest Date:
0 Subject Resisted Arrest
El Subject Arrested was Armed
C. Summons Date:
❑ Federal 0 Local
D. Recovery I Restitution i PELP X [IFederal 0 Local 0 International
Recovery Date: Code
-
✓ Amount
Code ../ Amount $
Restitution Date' 0 Court Ordered OPretrial Diversion
Code
-
Amount $ PELP Date*
Code
-
Amount S
E. Hostages(e) Released Date'
Released by:OTerroristO Other
Number of Hostages:
F. Conviction
1:1 Federal ['Local DIntemational
Conviction Date'
Subject Description Code-. ( )9
For SF, G. H-Include Agency Code
['Felony or 0 MISCIOM02110f
0 Plea or El Tdal State: Judicial District
G. U.S. Code Violation Required for sections A, B, F and J (Federal Only)
Tffie Section II Counts
H. Sentence Date'
Sentence Type:_ •
In Jai: Years_ Months_
Suspended: Years Months
Probation: Years Mont s
Fines:
1. Disruption/Dismantlement ."
Disruption Date:
Dismantlement Date'
Completion of FD-515a Side 2 Mandatory
J. Civil Rico Matters Date' Also complete 'Section G'
Other Civil Matters Date:
Judgment-
Judicial Outcome •5
Amount $
Suspension: Years- Months
K. Administrative Sanction Date* Subject Description Code
•
UType: Length:
Suspension ['Permanent Debarment or Injunction Year_ Months_
L Asset Seizure Date* Asset Forfeiture Date' CATS # Mandatory Circle below one of the three asset forfeiture:
Admin. Civil Judicial, or Criminal
Do not indicate $ value in Section D
M. Acquittal/ Dismissal/ Pretrial Diversion
(Circle one) Date:
N. Drug Seizures ✓ Date:
Drug Code • Weight Code • FDIN Do not Indicate $ In Section D
0. Child Victim Information
Chid located / identified Date'
Erving ODeCeased
P. Subject information - Required for all blocks excluding block D (Recovery/PELP), blocks E, I, L and N
Name
Race.
Sex
Date of Birth
Social Security No. Of available)
For Indklmontaroanvoliona ay:
El!Lupo:trollied to an LCN. Alba °Nankai Cam. (AOCL Ulan Onmatrad Odom fOCt RonalanlEastam European, Clubmen. a Nowlin Organized CA= CoonO - ComPlato 50416a. Side 1 Blocks /OE mandatory, F-11 as appropnNo.
0 Subject misted to an OC/Deug onsanktallon. a VCMO ProommNatbnal Gene 86amporoN Noopov o IMMO PnpnwNaomi Pam* IN•alke MOM Mou•- CamPlano FL311a. Mel Blocks MC only.
x Additional information may be added by attaching another form or a plain sheet of paper for additional entries. Serial No. of FD-515
• See codes on reverse side. 1 Requires that an explanation be attached and loaded Into ISRAA for recovery over $1 m and PELP over $5 m, disruption, dismantlement, and drug seizures.
FBI020656 ACLURM020865
Continuation of GOVERNMENT SUBJECTS
Sire Roseanne State Law Enforoxnent Officer Stare-All Odra Maser Load Legislator Local Judge/Magian& Local Prosecutor Local Law Enforeanent Officer Local-AU Others County Commissioner City Cotasalman
BANK EMPLOYEES
7A Bank Officer 7B Bank Employee
MZ
PA
Sta
For Further Instructions See: MAOP, Part II, Sections 3-5 thru 3-5.3. Revised 12-19-2006
AG BR. CC DC Fl PI PR PS RN SP YR Of
PROPERTY CODES
01 Cash 02 Stocks, Bwds or Nagar. bsonsinants 03 General Retail Merchandise 04 Vehicles 05 Heavy Machinery et Equipment
07 lewehy . 011
Vessels 09
An, Antiques or Rare Collections I t Rani Pmnertv 20
All Other
SENTENCE TYPES
CP Capital Punishment IS
Jail Sentence LP Life Parole LS Life Sentence NS No Sentence (Sullied Is a Fugitive,
Insane, has ried, is a Corporation or must pay fine only)
PB Probation SI
Suspension of Jail Sentence YC Youth Croatian Act
PELP CODES
22 Counterfeit StocksillandslCurrrigf Negotiable Insuuments
23 Counterfeit/Pirated Samd Recordings or Motion Picturo
24 Bank Theft Scheme Aborted 25 Ransom, Extortion or Bribe
Demand Aborted 26 Theft From or Prod Against
GINCRUIWIl Same Aborted 27 Commercial or Industrial .
Theft Scheme Aborted 30 All Other
RACE CODES
A
ArianIPacifie Wander B
Black InefianlAmerierat Unknown White Noninttividual
JUDICIAL OUTCOME
Agreement BarreeVReurved , civil Contempt Disciplinary Charges Fur Preliminary Injunction Tempanuylitestraining Order Profiling Seidman Ambition Suspender Voluntary Resignation Lttber
SUBJECT PRIORITY
A Subject wanted terrines of violence (Le, murder, manslaughter, forcible rape) against another Inerwldual or convicted of such a crime in the put five yens.
B Subject wanted for crimes involving loss or destruction of property valued in mess dS25,000 or convicted of suds a oboe in the part five teat.
• C All other mkjectx
DRUG CODES
COC Cocaine HER Heroin HSH Hashish KAT IOW LSD LSO MAR Marijuana MDM MedsykamEmeymetharapbetamine MET Medaraphroznine MOR Moiphine OPM Opium DID Other &up
DRUG WEIGHT CODES
GM Gram(e) KO 1070Bran(s)
Liter(s) MI. P
Mantis) DU DosageUnk(s)
AGENCY CODES
AFOSI
Air Force Office of Special Investigations ACIS
Array Criminal Investigative Service BATT,
Bummer Alcohol, Tobacco & Firearms BIA
Bureau of holm Affairs CEIP
Custone and Border Protection DCAA Defense Courant Ault Agency DCIS
Defame Criminal Investigative Service DEA
Drug Enforcement Administration DOC
Deputment of Corrections DOI
Dept. of ineties Lina EPA
Environmental Protection Agency FAA
Federal Aviation Administration FDA
Food and Drug Administration HHS
Dept. of Health & Hannan Swim HUD
Dep. °Mousing & Urban Development ICE
lowimation and Customs Enforcement IRS
Internal Revenue Service NASA
Nall Aeronautics & Space Admits NBIS
Nat NARC Border Interaction NCIS
Naval Criminal Investigative Service RCMP
Royal Cariatian Mounted Pollee SBA
Small Bothnia Adadnistratbn USCG
U.S. Coast Gird USDS
U.S. Department of Stale USMS
US. Marshals Service USES
U.S Postal Service USSS
US. &ere:Senate USIA U.S. Tremr, LOC
Local anr
City COON County ST
Stain OTHR Other
JUDGMENTCODZS
CI Consent Issignseer CO Cows Ordered Settlemem OF Default Judgment DI Dismissal IN Judgment Notwideconfing MV Mined Warta SI Summary Judgmene VD Ventiet for Defendant VP Verdi:I for Plaintiff
SUBJECT DESCRIPTION CODES
5D SB IF 50 511 51 5.1 5K 5L Ref 5N 5P 5Q 5R 5S 5T 5U
UNION MEMBERS
President Vice•Plesident Tress= Secretor/Dean= Executive Board Member Business Agent -Representative Organizer Business Mutaga Kmancial &MOP/ Reeotting Secretary Office Manager Clerk Shop Stewani Member Trustee Other
GOVERNMENT SUBJECTS OTIIERg
8A All Odra Subjects 80 Conorwor Canonising
CHILD PREDATORS
(67, 60, 6H- Include Agency Code)
6A Presidential Appointee 6B U.S. Sasaki/Staff 6C U.S. Remeatertivataff 6D Federal Judge/Magistrate 9A Child Care provider 613 Federal Prosecutor 9B Clergy 6P Federal Law Enforcement Meer 9C Added° Conk 643 Federal Employee-GS J3 & Above 9D TeaduirfAide 6H Federal Employee -GS 12 & Below 9E Law Enforcement Perronnel 6J Governor 9F Coombe 6K Lt. Governor 9G Relative 61. State Legislator 9H Stranger 6M State Judge/Magisnre 91 Other
ORGANIZED CRIME SUBJECTS
IF Doss 10 Underboss IN Gansigtiere IJ Acting Boss 1K Capodecina IL, Soldier
KNOWN CRIMINALS
2A
Top Ten or LO. Fugitive 2B
Top Thief ' 2C
Top Con Man
FOREIGN NATIONALS
3A Legal Allen 3D Illegal Alien 3C Foreign Official Whet
Diplomatic Immunity 3D U.N. Employee Wart
Diplomatic hnmunity IS Foreign Student IF All Ochre
TERRORISTS
4A Known Member of a Terrorist Oegmization
4B Possible Terrorist Member or Sympathizer
FBI020657 ACLURM020866
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED
FD-542 (Rev. 01-31-2003)
DATE 10-14-2011 BY 65179 DMH/ stpl lsg
FEDERAL BUREAU OF INVESTIGATION
Precedence: ROUTINE Date: 09/10/2004
To: XXXXXX
From: AAJOIAA. Squad CT-3 Contact: SA XXXXXX XXXXXX, 000-000-0000
Approved By: XXXXXX XXXXXX X
Drafted By: XXXXX XXXXXX X:ced
Case ID #: XXXB-XX-XXXXXX (Pending)
Title: CIVIL AVIATION MATTERS; INTERNATIONAL AIRPORT(IA)
Synopsis: Document operational activity at International Airport and claim statistical accomplishments.
Details: On 08/26/2004, a day long security operation was implemented at IA. The writer and SA XXXX XXXXX, with assistance from SA's XXXX XXXXX and XXXX XXXXX, CT-3, supported the following agencies which have various levels of search authority at the airport: Port Authority Police Department (PAPD); the Transportation Security Administration (TS); US Customs and Border Protection (CBP); and US Immigration and Customs Enforcement (ICE). The operation targeted both pedestrian and vehicular entrances for employees. Passenger screening checkpoints were not within the scope of the security sweep.
'Aside from a number of motor vehicle summons which were issued by PAPD, along with a number of airport identification/airport escort violations (called "breach of rules" or "B-O-R's" by the Port Authority), there were two • reported instances of rampside employees taking prohibited knives onto the ramp. Both items, of course, were seized. Most noteworthy, however, were two reported instances of airport employees escorting either other employees or contract employees onto to ramp to board flights, without having gone through mandatory security screening. Both of these instances were brought to the attention of TSA investigators.
Several NCIC checks of truck drivers, without airport IDs making rampside deliveries, revealed drivers with felony convictions; however, these drivers are permitted access to the ramp area with airport-approved escorts.
FBI020658 ACLURM020867
To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004
A large number of immigration status checks were performed by CBP personnel, however, no airport employees were found to be here in the US illegally.
Although PAPD and CBP and TSA personnel perform occasional searches as individual agencies, no such multi-agency security operation has been undertaken in the seven years that ' this writer has been assigned to IA: All involved agencies were in agreement that the operation had been "successful" in terms of demonstrating tighter security enforcement at both the pedestrian and vehicular entrances. It was further agreed that such security sweeps should be conducted on a regular basis. Writer notes that although he FBI had only a support role in the operation, the Bureau presence was not only. appropriate, but also contributory.
2
FBI020659 ACLURM020868
To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004
Accomplishment Information:
Number: 1 Type: OPERATIONALLY CONTROLLED MEETING ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITWTN FBI ITU: SEARCH (NON-CONSENSUAL) ITU: WMD COUNTERMEASURES Claimed By:
SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3
Number: 1 Type: WMD RELATED LIAISON ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD COUNTERMEASURES Claimed By:
SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3
Number: 1 Type: WMD PREPAREDNESS CONTACT DEVELOPED ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD ITU: WMD COUNTERMEASURES Claimed By:
SSN: XXXXXXXXX Name: XXXX XXXXX Squad: CT3
Number: 1 Type: WMD - ASSISTANCE PROVIDED TO LOCAL/STATE/FEDERAL AGENCY ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD ITU: WMD COUNTERMEASURES Claimed By:
SSN: XXXXXXXXX Name: XXXX XXXXX Squad: CT3
Number: 1 Type: PREVENT/INTERDICT CRIMINAL ACT ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI
FBI020660 ACLURM020869
To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004
Claimed By: SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3
Number. 20 Type: POSITIVE INTELLIGENCE (DISSEMINATED OUTSIDE YEI) ITU: AGENT INTERVIEW ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI Claimed By:
SSN: XXXXXXXXX Name: XXXX XXXXXX . Squad: CT3
Number: 1 Type: PARTICIPATE IN DEVELOPMENT OF OPERATIONAL PLAN ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI Claimed By:
SSN: XXXX XXXXXX Name: XXXX XXXXX Squad: CT3
• •
4
FBI020661 ACLURM020870
JTFF CBT Page 1 of 1
SeettaTHSGSCSIN
JOINT TERRORISM TASK FORCE OTTO
0 RIENTATIO N
FBI Written Communications And Administrative Details
Administrative Details 1W Time Utilization and Rgccrd !seeping CTURKIRequirements/Registers
(U) TURK Is a system for tracking Agent work effort by program.
QUIT ;: PREVIOUS :: NEXT
PAGE: 9 OF 14 -seetesTriserotet
file://DAjtifoV2\module2\m2_080.htm 8/8/2011
FBI020662 ACLURM020871
JTFF CBT Page 1 of 1
-3BeRESY-MeiFORIT
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Administrative Details introduction to Basic Overt:firm- Reimheirsnmentprocedures
FBI Written Communications And Administrative Details
cu)I
QUIT :: PREVIOUS :: NEXT PAGE: 10. OF 14
STCRETHMOIPORN
file://DAjttfoV2\module2\m2_090.htm 8/8/2011
b7E
FBI020663 ACLURM020872
JTFF CBT
Page 1 of 1
SBeRBILMIBEIBBN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Written Communications And Administrative Details
Administrative Details (if) DIOG
(U) The Domestic Investigatives and Operations Guide (DIOG) has been designed to assist investigative employees in the performance of their duties. Its purpose is to standardize policy so that criminal, national security, and foreign intelligence investigative activities are accomplished in a consistent manner. The DIOG is divided into seventeen parts:
• Scope and Purpose . General Authorities and Principles . Core Values, Roles and Responsibilities . Privacy and Civil Liberties and Least Intrusive
Methods
b7E
.
▪
Foreign Intelligence
(U) The DIOG can be found on the FBI Intranet at I b7E
QUIT:: PREVIOUS:: NEXT PAGE: 11 OF 14
-Ssr-Bagyi,stierettig
file://DAjttfoV2\module2\m2_100.htm 8/8/2011
. Sensitive Investigative Matter / Academic Nexus
• Investigative Methods • Assistance to Other Pgencies . Extraterritorial Provisions . Retention and Sharing of Information . Intelligence Analysis and Planning . Undisclosed Participation . Otherwise Illegal Activity
FBI020664 ACLURM020873
JTFF CBT
Page 1 of 1
SECTrilitte•PBRIT
JOINT TERRORISM TASK. FORCE (JTTF)
ORIENTATION
FBI Written Communications And Administrative Details
Administrative Details (t)) MAOP
(U) The Manual of Administrative Operations and Procedures (MAOP) is divided into two parts:
. Part 1 contains rules and regulations pertaining to personnel issues.
. Part 2 contains information pertaining to the administrative operations of a Field Office and contains some instructions for FBI Headquarters.
(U) The MAOP can be found on the FBI Intranet at
1
b7E
(U) The MAOP is in the process of being reviewed and replaced by Corporate Policy Office (CPO) Directives and Policy Implementation Guides, as mandated by EC 319W-HQ-A1487698, Serial 451. As new policy documents are approved, the appropriate sections of the MAOP will be updated in the CPO Policy and Guidance Library. Superseded sections will be maintained in the CPO Policy and Guidance Archive.
QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 14
-sseless#024eaostm
file://D:\jttfoV2\module2\m2_110.htm 8/8/2011
FBI020665 ACLURM020874
Page 1 of 1 JTFF CBT
FBI Written Communications And Administrative Details
• JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
I b7E
Administrative Details National cl / enntMrsal arggram tianual (NFIPM)
(U) The NFIPM details the FBI's National Foreign Intelligence program.
CU) The NFIPM can be found on the FBI Laripet at:
FBI020666
—3Etliztrfiseaoas
QUIT :: PREVIOUS :: NEXT
PAGE: 13 OF 14 -soemaseester
file://D:\jttfoV2\module2\m2_120.htm 8/8/2011
ACLURM020875
JTFF CBT
Page 1 of 1
--311:3terHuclaQUI
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Written Communications And Administrative Details
Module Review
(U) This module introduced the neW IFTF Tao!: Force Officer to the following written types of communication used within the FBI:
• Electronic Communication • FD-302 • Inserts
•
▪
I Letter Head Memo b7E
• • FD-515 and FD-542 • Administrative details including TURK, Basic Overtime Reimbursement Procedures, the MIOP, MAOP
and NFIPM were also introduced.
PREVIOUS :: FINISH MODULE
PAGE: 14 OF 14 Szetsys,l4mapRN
file://DAjttfoV21module2\m2_130.htm
8/8/2011
FBI020667 ACLURM020876
Page 1 of 1 DECLASSIFIED BY 65179 DM/ stp/ 1sg
JTFF CBT ON 10-14-2011
Security Briefing
SECAErINGIPORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Overview Of Instructional Goal And Objectives (U) Goal: The goal of this orientation is to introduce the new task force member to security requirements, clessificetion types, end leuels of access and security interviPm•
(U) Objectives:
1. Read and review the importance of protecting national security information. 2. Gain a basic understanding of the FBI's document classification types and other security concerns. 3. Read of the importance of a security exit interview.
EXIT MODULE :: NEXT
PAGE: 1 OF 27 McityrhiticalaSkL-
file://DAjttfoV2\module3\m3_000.htm 8/8/2011
FBI020668 ACLURM020877
JTFF CBT Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (ITTF)
ORIENTATION
Security Briefing
Security Overview (U) Safeguarding Classified Information—Everyone's Responsibility
(U) Safeguarding classified national security information is imperative to prevent unauthorized disclosure of Information that will cause harm to the national defense or foreign relations of the United States. When safeguarding classified information it is your responsibility to:
. Protect national security and FBI information and assets
. Alert others to the classification of the information
. Ensure protection of information classified by others
QUIT :: PREVIOUS:: NEXT PAGE: 2 OF 27
file://D NttfoV2\module3 \m3_010.htm 8/8/2011
FBI020669 ACLURM020878
JTFF CBT Page 1 of 1
-sweltrrtttverefai
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Security Overview (U) Classification Guidance Executive Order 12958, Classified National Security Information
(U) The Bush Administration Order set forth a uniform system for classifying, declassifying, and otherwise safeguarding National Security Information (NSI).
(U) By ensuring its classification, this Executive Order protects NSI, which, if disclosed, would cause harm to the nation's security or foreign relations of the United States.
QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 27
--8BefalititiMEOW-
file://DAjttfoV2\module3\n3_020.htm 8/8/2011
FBI020670 ACLURM020879
JTFF CBT Page 1 of 1
--SECRES6HNOLVAN
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Security Overview (U) Classification
(U) Classification is the element of information security that provides the policy for properly identifying classified information. This policy defines:
. The criteria and limitations of classifying information
. Who has authority to classify documents
. The levels of classification
. The criteria for declassifying NS!
QUIT:: PREVIOUS:: NEXT PAGE: 4 OF 27
SEC RN
file://DAjttfoV2 \module3 \m3_030.htm 8/8/2011
FBI020671 ACLURM020880
Page 1 of 1 J'TFF CBT
Security Briefing JOINT TERRORISM TASK FORCE ()TTF)
ORIENTATION
• Confidential—Damage • Secret—Serious damage • Top Secret—Exceptionally grave damage
(U) Terms such as "For Official Use Only" or "Law Enforcement Sensitive" do not refer to Levels of Classification.
FBI020672
srucauNWirrifon:
Security Overview (U) Classification -Noes
(U) Information is classified by the degree of damage its unauthorized disclosure would cause to national security:
QUIT:: PREVIOUS :: NEXT PAGE: 5 OF 27
-SEL"RerMIGEMiol-
\jttfoV2 Nmodule31m3_040.htm 8/8/2011
ACLURM020881
JTFF CBT Page 1 of 1
SEC/P21#419EQ813.
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Security Briefing
Security Overview
(U) Sensitive Comoartmented Information (SCI)
(U) SCI is not a classification. It is a restricted access control system used to safeguard a special class of classified information, most commonly related to intelligence sources and methods.
(U) SCI involves sensitive sources and/or methods and can be classified Confidential, Secret, or Top Secret.
QUIT :: PREVIOUS:: NEXT
PAGE: 6 OF 27 —SEISMOILAICIEL212N.
file://InjttfoV2\module3\m3_060.htm 8/8/2011
FBI020673 ACLURM020882
JTFF CBT
Page 1 of 1
SOGIM114410.ECISMT
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Security Overview
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 7 OF 27
SZeR99/411QEORIii
flle://D:\jttfoV2\module3\m3_070.htrn 8/8/2011
FBI020674 ACLURM020883
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Handling Classified Material (U) Public Release of Classified Information
(U) Classified information must not be publicly released.
(U) You must not release unclassified information publicly without specific approval from the Office of Public and Congressional Affairs (OPCA) or the Security Program Manager and Local Security Officer.
(U) All written, electronic, and oral material intended for public release must go through a pre-publication security review by OPCA and/or the Security Program Manager and Local Security Officer.
QUIT:: PREVIOUS:: NEXT PAGE: 8 OF 27
—weasel-Merest,
file://DAjttfoV2\module31m3_080.htm 8/8/2011
JTFF CBT Page 1 of 1
sEcitEilimurvXN
FBI020675 ACLURM020884
JTFF CBT
Page 1 of 1
-simaviviHseseas
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Handling Classified Material (U) Non-Authorized Disclosure
(U) The consequences of ignoring clearance and access rules are dangerous. If classified information is disclosed, the results could lead to a potential compromise of FBI information and assets, as well as disrupt ongoing investigations, and damage national security.
(U) In addition to harming national security and the FBI, unauthorized disclosures can also result in administrative/disciplinary action against and/or prosecution of the individual making the unauthorized disclosure.
QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 27
VikedMVERNerePS
file://D:\jttfoV2\module3\m3_090.htm 8/8/2011
FBI020676 ACLURM020885
JTFF CBT DECLASSIFIED BY 65179 DNH/ stp/ lsg Pagel of 1 ON 10-18-2011
SEeRLPTHIISBOBAI.
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Handling Classified Material (u) Mishandling Classified Material
(U) Inappropriate spills of classified information can:
. Damage national security
. Disclose highly sensitive sources or methods
. Disrupt ongoing operations
. Lead to prolonged and expensive investigations and damage assessment
(U) Classified material violations must be reported within 24 hours to the designated Security Officer (SO). The SO, Security Compliance Unit, and Supervisory Security Officer (S50) investigate such violations. Full cooperation is essential to these investigations.
(U) The FBI is required to report any damage assessment regarding SCI violations determined as "significant"- to the Director of National Intelligence (DNI).
SEVICBTf-nfeFeRtf
file://DAjttfoV2\module3\m3_110.htm 8/8/2011
FBI020677 ACLURM020886
JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ lsg Page 1 of 1 ON 10-18-2011
--9BeieW4HAMPai-
JOINT TERRORISM
Security Briefing TASK FORCE (3TTF)
ORIENTATION
Sharing Information With Parent Agency (U) Two questions to ask regarding sharing information with the parent agency:
1. Is the person cleared for that level of information? 2. Is there a need for that person to know the information?
(U) If either question is answered with a "no," then the information cannot be passed to the parent agency.
VELltrthhglioN12/113_
file://1DAjttfoV2\module3\m3_120.htm 8/8/2011
FBI020678 ACLURM020887
JTFF CBT DECLASSIFIED BY 65179 DM E/ stp/ lsg ON 10-18-2011
-sztitr2Huoscom.
Page 1 of 1
JOINT TERRORISM
Security Briefing TASK FORCE (3TTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Procedures to Protect against Unauthorized Disclosure
(U) Five procedures protect classified information from unauthorized disclosure:
1. Access 2. Marking 3. Transmission 4. Storage 5. Destruction
szeszTHrieveng
file://13:\jttfoV2\module3\m3_130.htm 8/8/2011
FBI020679 ACLURM020888
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Non-Disclosure Rules And Procedures ftfl Access—Confidential, Secret. and TOP Secret Material
(U) Access may be granted to people requesting classified material AS LONG AS they legitimately hold the clearance level commensurate with or above the classification level of the information to be disseminated AND an authorized holder in possession of the classified information determines their "Need-to-Know" BEFORE granting them access.
-ssesasAUlorsatt
file://D:\jttfoV2\module3\m3_140.htrn 8/8/2011
JTFF CBT DECLASSIFIED BY 65179 DNB/ stp/ log ON 10-10-2011
Page 1 of 1
SIIGRBBY-Meeefiff
FBI020680 ACLURM020889
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 D1111/ stp/ 1sg ON 10-18-2011
SECRIWA4EORIL--
JOINT TERRORISM Security Briefing. TASK FORCE (JTTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Access—Need-to-Know
(U) Need-to-Know is defined as "...a determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function." Thus, access is based on need—not position. Coworkers may not possess a valid "need-to-know."
—sseessWsegigabi-
file://DAjttfoV2\module31m3_150.htm 8/8/2011
FBI020681 ACLURM020890
3OINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
—seem eiymemea-
Security Briefing
DECLASSIFIED BY 65179 DtiE/ stp/ lsg ON 10-18-2011
JTFF CBT
Non-Disclosure Rules And Procedures (U) Markings—Essential Markings for Classified Documents
(U) It is essential that documents be marked with their classification and access, if applicable, so that people handling them can determine how to safeguard them. Classified documents and other media should have overall markings according to the following criteria:
• The overall classification must match the highest classification level of any information contained in the document and other classified communication media.
• A cover sheet indicating specific classification must accompany every classified document. The overall classification and access marking should appear:
1. At the top and bottom of the front cover, 2. On all document pages, and 3. All TS and SCI documents must be marked and attached to an FD-501.
FBI020682
• At the top and bottom of the outside of the back over.
(U) (U) Click here to see a page marking example. .
39€3666440E0211-
file://D AjttfoV2 \module3 \m3_170.htm
ACLURM020891
4- two* •
k ra75r- 10..Q9t. 9 mycamuter
WeirA24,- raftwik,
FBI020683
Of
A
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
0: "ITT COT.- Windows Internet Explorer a tel b7E
;A •
a - Q OP Page • Safety • Tois "
o [IL InttfaMooddonto3_170.11to
Fitt ES VieV4 Favorites Tools tiAp
Li Favorites Rrol FM Intend
03IFF
p
ACLURM020892
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DBH/ stp/ lsg ON 10-18-2011
JOINT TERRORISM TERRORISM TASK FORCE ()TTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Markings—Essential Markings for Classified Documents
Security Briefing
(U) Each portion or paragraph of the document should be marked to indicate its classification level. Thus, in the document where 99% of the information is unclassified and 1% is classified as Secret, anyone having access to it will know exactly which part of the document is classified.
(U) Classification levels of the text (Including SCI accesses and handling caveats) are indicated in parentheses, i.e., (TS) or (U), immediately preceding or following the portion to which it applies.
(U) Click here to see a portion marking example.
QUIT :: PREVIOUS :: NEXT PAGE: NAN OF NAN
—3LTIZET7474D990941.
file://DAjttfoV2\rnodule3\m3_180.htm 8/8/2011
FBI020684 ACLURM020893
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-19-2011 HY 65179 DMH/ stp/ 1sg
.1:4LP • X IP v.% LE, DAltrOV2lMOdlialp0_1813,hbA
Fit Ede blew Fawkes Tools Pulp
Fevceites pEd towed
TIT CBT 0 0 • Page • Safety. Teets • 4, r Portion Marking . _
avtiveara„ gotovaw, &MR% " TIFF :
FBI020685
r a 14.
JTFT CBT Windows Internet Explorer
SECRET
a DEPARTMENT OP GOOD WORKS w.unk.immos Chapter 1•Amdinn (U)
(LB This is parapaph I and contains unclassified Infennatico. Therefore. this portionwIll be marked whit ibe designation Yr la parenthesen
• 2. (Si Ibis is nano* 2 and contains "Sauer Ife0111131100. Thcrefole. this punka will be rearkertwhis an designation "S" la pa:ends:eel.
.3.
SECRET
ACLURM020894
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DMH/ stpl lsg ON 10-18-2011
---MallETTATOPBBN
JOINT TERRORISM
Security Briefing TASK FORCE (3TTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Restrictive Handling Caveats and Control Markings
(U) Other types of restrictive handling caveats and control markings that may be seen when working with classified information include:
ORCON—Originator Controlled (which means that dissemination and extraction of the information is controlled by the originator and dissemination outside the FBI is allowed ONLY with the originating agency's approval.)
PROPIN—Caution: Proprietary Information Involved
NOFORN—Not Releasable to Foreign Nationals
REL—Authorized for release to the country or international organization named (i.e., REL INTERPOL)
—sErazo,44;everer-
file://D:\jttfoV2\module3\m3_190.htm 8/8/2011
FBI020686 ACLURM020895
UNCLASSIFIED
V F. a.m... 'm on"' 41
QUIT:: PREVIOUS:: NEXT
FBI020687
PAGE: NAN OF NAN
file://DAjttfoV2\module31m3_200.htm
JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg Pagel of 1 ON 10-18-2011
JOINT TERRORISM TERRORISM Security Briefing TASK FORCE (JTTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Transmission—Secret and Confidential Material
(U) When sharing Confidential and Secret classified material, remember to always check the classification level of the reciplent(s) to be sure they hold the same classification clearance or above and verify their need-to-know. Also, Confidential and Secret information should not be discussed over non-secure telephone lines.
(U) You may handle Secret and/or Confidential Material in open storage facilities—for example, a field office that has been officially declared as such, but it must be locked in an approved safe at the end of the workday. Make sure the materials are accompanied by the appropriate classification cover sheet or label.
CLASSIFIED SCI •
IN. N...
SECRET II.1.1111170 ealmoolll*Gaa.now MM. MOW. 1.1,01.1 non.
CONFIDENTIAL C-•■•-•••••••■•■,
ACLURM020896
JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ 1sg Page 1 of 1 • ON 10-18-2011
ITCRETHBOE2ai
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Transmission—Secret and Confidential Material (con't)
Security Briefing
(U) You may send Confidential and Secret material via the following means:
. Secure fax machine
. Approved teletype
. Approved FBI or DCS courier
. U.S. Postal Service (registered mail) or Federal Express (If a waiver is granted by the Office of Security at the FBI)—in both cases, the package must also be return-receipt required and addressed to a specific, addressee who has been determined in advance to have the requisite security clearance to receive the information.
■
(U) You must transport all Confidential and Secret material in a double-wrapped wrapping, marking the inner wrapping with the classification and keeping the outer wrapping free of classification markings. You may also send Secret and Confidential material using an FBI internal mail-routing wrapping.
(U) Make sure all materials are accompanied by the appropriate classification cover sheet or label.
• lleteTi-AION
file://DAjttfoV2\module3lin3_210.htm 8/8/2011
FBI020688 ACLURM020897
JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ lsg Page 1 of 1 ON 10-18-2011
JOINT TERRORISM TERRORISM Security Briefing TASK FORCE (3TTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Transmission—Too Secret Material (TS)
(U) When sharing TS material, remember to always check the classification and access level of the recipient(s) to be sure they hold the clearance level commensurate with or above the classification level of the information to be disseminated and verify their need-to-know. Also, never discuss any classified or sensitive information over non-secure telephone lines.
(U) With a classification coversheet or label and an FDS01, Top Secret material may be sent by approved DCS Courier or hand carried between Sensitive Compartmented Information Facilities (SCIFs) in an opaque double-wrapped wrapping. Mark the inner wrapping with the classification; then insert this wrapping inside a wrapping that has no classification markings.
(U) If you need to discuss classified or sensitive information, you must do so on a secure line. Also, copy or fax classified or sensitive materials only on authorized, secure copiers and to authorized, secure fax machines.
(U) FBINet cannot store, process, or transmit TS information. TS information can be processed only on a TS/SCI Local Area Network (LAN) computer in a SCIF.
(U) Finally, you must store TS materials in approved safes whenever you are not using them, as well as, at the end of the workday.
Eatril'ONOEQM
file://DAjttfoV2\rnodule3\m3_220.htm 8/8/2011
FBI020689 ACLURM020898
y:e Fayed= t a,:,4 g; FBI Intranet
103TFFCBT 0 :7, Page Safely. Tads.
0.JTFIF CDT:Windows Internet Explorer
16 CetelfelfAmoddeAre3,220.1te
FEs BST YT;TFavorees 1095 Help
v
b7 E
37Fr- .14 -.SU .10:1: sit
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
FBI020690 ACLURM020899
bse. Ohre.
luntaitntilt
Care all 110:04wyeat Capon
• Vbeakaa■
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
CDT. Windows Internet Explorer
‘_4 • KitdoVArtiockialink,22il.htm — _
Flo Edit Mew Favates Tools. tido
fir Families I i;',15 tarring
'AIME CBT r yOenSp1.0114
WPIIIXAUte
mieewma. rem TOP &COMM
taseraverdrotintortcoacromunoutwxi xeswCOOMO
%lowly lamorOunrent elf es•v•war.0.4111100.14.1.101211 CoUng
Wtpm all...114•414 eitrukamo odea,amdr,
NonsagOdeo •
Mowlm ICwMCM.CYIMM on10111•04 Aretcao■ fa eF tuft oManewK OM. • s yr1,0 CUM
• 4411i6(41I—----WI ENNixst zy. ioeffor' 9",̀ "" • ea7.4t im%
FBI020691 ACLURM020900
JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-18-2011 Page 1 of 1
JOINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
Non-Disclosure Rules And Procedures CU) Classified Material storage
SEarIrrinctrorac
Security Briefing
(U) You are responsible for securing all classified material at the end of the workday in a GSA certified safe with a spin-dial, combination lock. SCI material must be secured in a GSA certified safe inside a SCIF when not in use.
(U) Combinations to safes should be memorized and restricted only to those with an authorized need-to-know of the information stored In the safe. Safe combinations should be protected at the level of the information stored in it.
(U) You may NOT take home classified material at any level without approval from the FBI Director, the relevant FD/HQ Security Programs Manager, or your SAC or Assistant Director.
(U) Floppy disks must be marked with appropriate classification media labels and handled according to the highest level of classification ever processed on the disk.
(U) Computers are classified at the highest level of information that has ever been entered into, stored on, or produced by the system.
fi le://DAjttfoV2\modulenn3_230.htm 8/8/2011
FBI020692 ACLURM020901
JTFF CBT DECLASSIFIED . BY 65179 DMH/ stp/ lsg Page 1 of 1 ON 10-18-2011
--Imtneri6H44030381:1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Security Briefing
Non-Disclosure Rules And Procedures (U) Destruction of Classified Material
(U) All classified material should be destroyed whenever the operational or historical need for the information ceases to exist. Place Secret and/or Confidential documents in classified trash bags or in an approved crosscut shredder.
(U) Do not place TS or SCI material in classified trash bags. TS or SCI material must be destroyed either by shredding in an approved crosscut shredder or disintegrated in an incinerator to a white ash.
(U) When destroying TS or SCI material you must have:
▪ Two-person integrity—an official and a witness fully controlling the destruction for its duration and
. Both witnesses must have clearances commensurate with the material being destroyed.
MEREThtfereall-
file://DAjttfoV2\module31m3240.htm 8/8/2011
FBI020693 ACLURM020902
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DM/ stp,/ lsg ON 10-18-2011
cprprmg4,080RE
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Non-Disclosure Rules And Procedures (U) Record of Destruction—the FD-501
(U) You must maintain an FD-501, Record of Destruction, for a minimum of two years. Headquarters personnel should return this record to the Special File Room 5334, FBIHQ, immediately after destroying a document. The destroying official and witness must sign and date the form after the document's destruction. Field offices maintain the FD-501 at the field office. Field offices should contact their local Security Officer.
(U) All classified information destruction records will contain the following information:
• Identification of document destroyed • Destruction method used • Time and place of destruction • Reason for destruction • Name of destroying official and witness
(U) Click here to see an FD-501
BIlefellel-MOBABN
file://D:\ittfoV2\module3\m3_250.htm 8/8/2011
FBI020694 ACLURM020903
,•••■•--0".. 00IttfotArrodltayrtusoine
• — - 4_— Ea Vim Faratas Toe , Heb
Favabis 114 F01 Intranet
tell JIFF 037
r FD-S01@)
v .X Vp;.:
- „ .--......
• 0 (43 • Fes. Safety • Ted" n
•- *100% ■ .••
d
.10 7E mar
C„SEFF...CI3T, Windows Internet Explorer
Oft Mats*
ItaniAppaMe
ONV tall
111e0faVerst
GPM
Cm. 4.114.141
or WomMWTo nst.W6WO, fts..11%.
sMINI ar.e5.~
71./4111.1.710,
1[0•01.1111117
1011:01101101.1001 IlWia1111f0/1
moms cowmparrceracasunon0e0 NOWN103011lgo WW16
rovftempenvIonneowaSiwarger/r11.1111040 eses.405
asav1Meatea
101)m 0110/9.111.4e Cloaleafte 0.0.11VIAL101 /bow. Tow Oftweel00.<
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
FBI020695 ACLURM020904
JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ lsg Page 1 of 1 ON 10-18-2011
sacialetintaran
3OINT TERRORISM
Security Briefing TASK FORCE (3TTF)
ORIENTATION
Exit Interviews (U) Each individual who leaves as a member of the 3TTF is to be interviewed and debriefed by their respective Chief Security Officer. The exit intervieW should be conducted prcmptly after thft individual advises of his/her intended resignation or separation.
b6 b7 C
ITCTIETr/tioroRN
file://DAjttfoV2\module3\m3260.htm 8/8/2011
FBI020696 ACLURM020905
JTFF CBT DECLASSIFIED BY 65179 DNB/ stp/ lsg Page 1 of 1
ON 10-18-2011
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
—§ZeRrrtoulasoax_
Security Briefing
Module Review
• (U) Safeguarding classified national security information is everybody's responsibility. • (U) Proper handling of classified documnntl and information is critical to protecting the nation. ▪ (U) There are specific non-disclosure procedures to ensure unauthorized release of classified
information. • (U) If there is uncertainty about handling or dealing with classified information contact your
Division's Security Officer.
file://DAjttfoV21module3\m3270.htm 8/8/2011
FBI020697 ACLURM020906
.1TFF CBT 1 Of 1 DECLASSIFIED BY 65179 DM/ stp/ lsg ON 10-18-2011
_-0BeimpTrn115nris
JOINT TERRORISM
Security Briefing TASK FORCE (JTTF)
ORIENTATION
Overview Of Instructional Goal And Objectives (U) Goal: The goal of this orientation is to introduce the new task force member to security requirements, claSSifiCatien types, and levels of access and cccurity intcntiews.
(U) Objectives:
1. Read and review the importance of protecting national security information. 2. Gain a basic understanding of the FBI's document classification types and other security concerns. 3. Read of the importance of a security exit interview.
_sszaaernfornTir
4
file://DAjttfoV2\module3\m3_000.htm 8/8/2011
FBI020698 ACLURM020907
JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DMH/ stpl lsg ON 10-14-2011
FBI Computer Investigative Resources And Networks
-sseamitwereas- JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI020699
Overview Of Instructional Goal And Objectives (U) Goal: The goal of this module is to introduce the new task force officer to the computer Investigative resources and networks employed by the FBI in the fight against domestic and international terrorism.
(U) Objectives:
1. Gain a basic understanding of the FBI's unclassified network (UNet) and its databases, applications, and systems.
2. Gain a basic understanding of the FBI's classified network (FBINet) and its databases, applications, and systems.
3. Read and review the functions and features of thel
EXIT MODULE :: NEXT PAGE: 1 OF 21
-STCRLPTISANOBORN.
odvta I•1
file://D:\jttfoV2\module4\m4_000.htm 8/8/2011
I b7E
ACLURM020908
Page 1 of 1 JTFF CBT
emelerrnwerenew-
FBI Computer Investigative Resources And Networks
JOINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
FBI020700
8/8/2011 file://DAjttfoV21module4\m4_010.htm
UNET
(U) The Unclassified Network (UNet) System is a Sensitive But Unclassified (SBU) inforniation system designed to provide the Federal Bureau of Investigations (FBI) with mission essential, unattributable (does not identify system users as FBI), secure high-speed access to the public Internet and other unclassified open sources of information available from other agencies and organizations within the Executive Branch.
(U) These sources include among others:
.b7E
(U) Click here to see a screen capture of UNET.
(U) Click here to see a screen capture of) I .b7E
QUIT :: PREVIOUS :: N EXT PAGE: 2 OF 21.
-SWZRE10.410EQBN--
ACLURM020909
- - Sdoty Tools - 4). "
b7E
r oWet Ort2,45i-
Fl. Eck New Awakes Tools Hob
at) Search r Riverton •
Address 44 4
Links
Department of Justice
• 00J Intranet • poi E-Mail Directory
• DOJ Momentum • DOJ Travel
FBI
• FBI UNet Webmall •- •
UNET ALERTS OWA
OW4 should be available from any Internet computer through
When logging on UNet users are reminded to put 'FB' in front of their user name. Non-UNet users
are not required to use "FBA" when logging in through OWA.
UNet Workstation Log Off Procedures
Please restart vouy UNet workstations @ laptops and leave
UNet
Documentation
▪ Bigffx Troubleshooting Flow Chart, 07/20/09 (HM., MS Word. Vislo)
. FBI UNet Policy (PDF, 190k)
• UNet FBI Domain MIstration and
ALL INFORMATION CONTAINED
HEREIN IS UNCLASSIFIED
DATE 10-14-2011 BY 65179 DMIii stpi isg
SIT F. CI3T - Windows Internet Explorer.
Intedf2Voodde4Hel_010.hlso
Re Eck New Favonles Took Hek _
1,? Favorbzi j Fanokonot
j an" art
b7E
V t+, Compass 4- Pion
"gleartqco,..- C5T
FBI020701 ACLURM020910
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 DY L65179 DI411/ stp/ Isg
1r h fa.
oca
a.1717F [BT.- Windows Internet Explorer
its!, ONttfoenrcduleetrnejutttitrn
Fie Edt Hew. Paved= Tools Help
Finceites i5;;;$ W,F811nbanet
AMFFCBT
%)7" 61Mtttla . iFF CGT .F7 4) 151'..
FBI020702 ACLURM020911
JTFF CBT Page 1 of 1
FBI Computer Investigative Resources And Networks
—szcsilwafttferoler
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
(U) Click here to see a screen shot oil
PAGE: 3 OF 21
file://MttfoV2\module4\m4020.htrn 8/8/2011
QUIT :: PREVIOUS :: NEXT
—§ECTILPVINGEou__
UNet
b7E
FBI020703 ACLURM020912
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ Stp/ 1sg
N. In, DAStdoV2Vnadde4VM 020.htrn
Fie Edit New Favortes Teak Help
Favcdes i 4 4 L FIHIntranet
Onno on
4.x x t:P.-
JIFF CBI q)13 5P',11 Z11:17e,,
h.rm Isa.•
g _FITE CBT -Windows Internet Explorer
FBI020704 ACLURM020913
socRETtliwontRer
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
UNet
.b7E
(U) Click here to see a screen shot ofl
QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 21
--BBERBRY-MCITORN
file://DAjttfoV21module4\m4_030.htrn 8/8/2011
JIFF CBT
Page 1 of 1
FBI020705 ACLURM020914
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg
C.-JTFF CDT - Windows Internet Explorer
.414 x. ipLY:f:vn tg1/4&" • II-Arto— Moodie!. ‘m1_030.htro Ha E Ww Fayette Tools Help I.? Roma= .rea ki FBI Irtraret tamp CBT
JIFF • iz
FBI020706 ACLURM020915
JTFF CBT
Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
UNet
b7E
Click here to see a screen shot oti
QUIT:: PREVIOUS NEXT PAGE: 5 OF 23.
—BleeRSTH+1099R1+-
file://D:\jttfoV2\module4\m4040.htm
8/8/2011
FBI020707 ACLURM020916
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
UNet Open Source Search Ermines
(U) Open source search engines such as G000le are available through UNet.
QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 21
--FE-3111277SOPOBN-
file://D:\jttfoV2\module4\m4050.htm 8/8/2011
JTFF CBT
Page 1 of 1
vsemeAtucas2E_
FBI020708 ACLURM020917
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
SEseariLHNeveRN
FBI Computer Investigative Resources And Networks
FBINet (U) FBINet is the FBI's classified network. Google is FBINet's search engine. The following applications are available en FBINet.
:1 • Automated Case Summit (AM
• HQ Division/Field Office Web Sites . Sentinel • Intranet Resources • Outlook
QUIT:: PREVIOUS :: NEXT PAGE: 7 OF 21
ser.ps.w,Waososai
file://DAjttfoV21module4m4_060.htm 8/8/2011
b7E
FBI020709 ACLURM020918
FBINet Automated Case Support (ACS)
(U) ACS is available through FBINet. ACS consists of:
b7E
QUIT:f PREVIOUS :: NEXT PAGE: 8 OF 21
—Mem-himmum
file://DAjttfoV2\module4\m4_070.htm 8/8/2011
JTFF CBT
Page 1 of 1
--earerem
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
FBI02071 0 ACLURM020919
. 4ti. X IP trri o inttlotiAroodillerVM_070.titin
Flo Edit View Fayed:es Toth Help
1,4 Favorites Fill rthetht . _
g13111. CDT . • Ej t3ele • Pop. Stfety Took • say "
FBI020711
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg
JIFF CBT - Windows Internet Exptorcr d'o
b7E
b7E
01/Coinputar
027F ...
• to t00% •
ACLURM020920
11 DARIdov2W0daddlrnil_070.htto v 41 X rPtt,se-,r:”
L
He Edt Wm condo Emits Help
*ftwam 1 ,,,4cnnwiema
la JIFF CBT . _
0 -0 m4- Paw • Safety • Toob 4)). "
9 My Ccraputer eft qtmos - , JIFF ;
107E
.aJTEF.C13T- Windows Internet Explorer
137 E
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 55179 DMH/ stp/ lsg
FBI02071 2 ACLURM020921
aSEFF CDT - Windows Internet Explorer
re; ONttroVneodJeltmi_070.htal FP Li..1 sr.-■
He Edt View Favortes Rob Help
1,-.r Rambo I ci.4 0_, FBI Intramt
03114. CDT
g HeCmpter
FBI02071 3
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNH/ stp/ lsg
ACLURM020922
Page 1 of 1 JTFF CBT
FBI Computer Investigative Resources And Networks
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://D:\jttfoV2\module4\m4_080.htm 8/8/2011
FBI02071 4
FBINet (U) Automated Case Support (ACS) (Con't)
. Reports
• Tables
▪ Employee7Self Search
QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 21
SECRETTriTCRFORN
b7E
ACLURM020923
Cataelter 4- eltoo. -
b7E
;C DAlttfalatpaduleetinesse.hem — -
Fie Erit Vtert Fanatics Tools WO . _-',4•Faveriess 15. C FM Intranet
. _ _ JIFF Or
—•
X . - . .....---
• 0 n t - Ace. sereo• Tads . 9. "
FI • •
b7E
rasa is
aJTIT COT- Windows Internet Explorer tm,
ALL .INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ 'stp/ 1sg
FBI02071 5 ACLURM020924
f p
irFF CBT Windows Internet Explorer EN a X. D:Unforaooile4m4_00.thn
File Ed* NW Papaw Toth Help
Favorites I c,4 FEIN:and
I 097rFF CBI • CI J P&P Sdety. Took. 0. calfiR
JTFF CDT gid, e.,,,*12.1 •
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
FBI02071 6 ACLURM020925
FBI02071 7
JTFF CBT Page 1 of 1
FBI Computer Investigative Resources And Networks
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://DAjttfoV21moduleAm4090.htm 8/8/2011
Si...111FritfeECOIN
FBINet
(U) Click here to see a screen shot DI
b7E
QUIT:: PREVIOUS :: NEXT PAGE: 10 OF 21
----greiZER77ROITolte
ACLURM020926
‘fses 14 •
a Windows Internet Explorer
ifL3, lAtifoVAnsxkieetat4_090.1tas . _ .
fie ELIS Meer Pansies Tools Help
v ip
•
•
CI 1.3 Pace Safety Tools • 0.
1„,} Favorites yas wart
— - - _ ia TIT CST
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stpl lsg
b7 E.
S-1 MyCcIextaa itiorm _ . . JIFF CUT ..
FBI02071 8 ACLURM020927
b 7E
JTFF CBT
Page 1 of 1
----sterar7sarairN )DINT TERRORISM TASK FORCE (7TTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
FBINet
QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 21
--aseteleftHeBeiga.
file://DAjttfoV2\module4\m4100.htrn 8/8/2011
FBI02071 9 ACLURM020928
JTFF CBT
Page 1 of 1
StPeRETHICITURN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
FBINet
b7E
(U) Click here to see a screen shot ofi
QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 21
file://DAjttfoV2\module4\m4110.htm 8/8/2011
FBI020720 ACLURM020929
4t- x 19 s. VP!. kr DAEttorknadde4to4_110.htm Fes Edt New Favorked To* lidp
V My Caroller ea — 4111:0%
1Z• Payette( I iad ki FBI kismet tialiFF CET CI 4 - Page • Eddy Toth.
Go*
e.JTFF CDT - Windows Internet Explorer
b 7E
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg
FBI020721 ACLURM020930
JTFF CBT
Page 1 of 1
—STCRW/611110960PAI
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
FBINet
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 13 OF 21
---W3mArneresir-
file://D:\jttfoV21module4\m4120.htm 8/8/2011
FBI020722 ACLURM020931
:b7E
JTFF CBT
spavig1/21-/aerpavel.
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Page 1 of 1
FBI Computer Investigative Resources And Networks
FBINet
(U) Click here to see a screen shot of)
QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 21
arZeTHOGROSS
file://DAjttfoV2\moduleLlAm4_130.htm
8/8/2011
FBI020723 ACLURM020932
• •z. aiksit1:0_ JTFF CDT -11/indows Internet Explorer
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg
v outfarninockfrom_130.hbn v 4 x Flo Eat Naw Favorites Toob 11.1;
Favorites FBI Irkranet •
j$31FcT - -
J1FP CbT .„ 07:)41 ,1
FBI020724 ACLURM020933
(U) Click here to see a screen capture of the FBI Intranet.
PAGE: 15 OF 21 ThigetrtLeHtfesena
file://D:\ittfoV2\module4\m4_140.htm
JTFF CBT Page 1 of 1
sranrrtmereRN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
FBINet
(U) FBINet is an Internal FBI web-based computer network that is capable of carrying information classified up to tile SECRET level. It is one a the primary backbones for FRI communications and information. FBINet provides access to investigative and datibase applications including Automated Case Support (ACS), Sentinel,' I
(U) FBIHQ division and Field Office web sites can be accessed from the FBI Intranet homepage.
QUIT :: PREVIOUS :: NEXT
FBI020725 ACLURM020934
FBI020726
C.JEFE CBT Windows Internet Explorer
. - x DARIToTTbnadolegto4_140.11m
nt •al ,NJ, • Pane • Safety • Tools • tet,
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 D}/ stpl lsg
b6
•'
b7C b7E
9 Rs, caTotat
Filo Eck Vim Fonda" Toab Help
te:r Favorbes 1.1:4 a: RN Intranet
TIFF CBT
_ •
ACLURM020935
JTFF CBT Page 1 of 1
SECREW/Imury
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
:b7E
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 21
file://D AjttfoV2\module4\m4_150.htm 8/8/2011
FBI020727 ACLURM020936
JTFF CBT
Page 1 of 1
suers,! i JOINT TERRORISM TASK FORCE (JTTF) . ORIENTATION
FBI Computer Investigative Resources And Networks
.b7E
(U) Click here to see a screen shot ofi
QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 21
—szcazzAirgeseivi-
file://D:\jttfoV2\module4\m4_160.htm 8/8/2011
FBI020728 ACLURM020937
P: • v!4r: - . .
66 • qt. 10014 • g ON Costa
48i06;41;..
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB/ stp/ 1sg
hi DeUttrorilmochkentrd_161).htin
FBI020729
r rr _
F CI37. Windows fntcrnet Explorer tEg
Fts Edt Vim Favcdos Tod Hek3
Ravabn 3 FE Trirartet - - - - - —
• i331PF CBT - P. Safety • Took - 0.
Gti75.•
b7E
ACLURM020938
JTFF CBT
emeterTt7ROORiT
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Page 1 of 1
FBI Computer Investigative Resources And Networks
b7 E
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 21
file://DAjttfoV2\moduleAm4_170.htm 8/8/2011
FBI020730 ACLURM020939
JTFF CBT
Page 1 of 1
SECRL11111■70FORN-
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 21
$SCRET//norcm
file://D NttfoV2 \module4\m4_180.htrn
8/8/2011
FBI020731 ACLURM020940
Page 1 of 1 JTFF CBT
FBI Computer Investigative Resources And Networks
JOINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
8/8/2011 file://D:\jttfoV2\module4\m4190.htm
FBI020732
srewitAM0EQES.
QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 21
-ssessisAinorLoas
b7E
ACLURM020941
JTFF. CBT
Page 1 of 1
SECRET//NOFORN
3OINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
FBI Computer Investigative Resources And Networks
Module Review • CU) The FBI's unctak-sified network is liNct. It's databases, applications, and systems include: and Google.
• (U) The FBI's classified network is FBINet. da bases, applications, and systems include: Google, ACS,I
b 7E
PREVIOUS:: FINISH MODULE PAGE: 21 OF 21
--eseimerni060Stif
file://DAjttfoV2\module4\m4 200.htm
8/8/2011
FBI020733 ACLURM020942
JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg ON 10-14-2011
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
—seetanii Introduction To Foreign Intelligence And Terrorism
Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the Intelligence Community, FBI intelligence /softy, and FBI Intelligens* Analystsf-
(U) Objectives:
1. Gain a basic understanding of the Intelligence Community. 2. Read and review the FBI's intelligence policies. 3. Gain a basic understanding of the Field Intelligence Group and the role of Intelligence Analysts within
the FBI.
EXIT MODULE :: NEXT
PAGE: 1 OF 25 seCteVe.,9346001311
file://11\jttfoV21module5\m5_000.htm 8/8/2011
FBI020734 ACLURM020943
FBI020735
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://13:\jttfoV21module5\m5_010.htm 8/8/2011
JTFF CBT Page 1 of 1
Intelligence Community Overview (U) The United States Intelligence Community (MC) is a 17-member federation of Federal Government agencies, services; bureaus; and othrr prgani3ations within the executive branch that play a role in the -
collection and dissemination of national intelligence.
(U) The Director of National Intelligence (DNI) leads the Intelligence Community. The DNI is the President of the United States' principal advisor for national security intelligence matters. The DNI is assisted by the Principal and Deputy Directors of National Intelligence and the National Intelligence Council (NIC). The Office of the Director of National Intelligence (ODNI) manages the Intelligence Community.
QUIT :: PREVIOUS :: NEXT PAGE: 2 OF 25
SECRET//NOPORN
ACLURM020944
Intelligence Community Overview (Cont)'
(U) 17 Members of the Intelligence Community inciudet
• Intelligence and Counterintelligence elements of the Air Farce
• Intelligence and Counterintelligence elements of the Army • Central Intelligence Agency • Intelligence and Counterintelligence elements of the Coast
Guard • Defense Intelligence Agency • Department of Energy (Office of Intelligence and
Counterintelligence) • Department of Homeland Security (Office of Intelligence and
Analysis) • Department of State (Bureau of Intelligence and Research) • Department of Treasury (Office of Intelligence and Analys Is) • Drug Enforcement Administration (Office of National
Security Intelligence) • Federal Bureau of Investigation • Intelligence and Counterintelligence elements of the Marine
Corps • National Geospatlal Intelligence Agency • National Reconnaissance Office • National Security Agency • Intelligence and Counterintelligence elements of the Navy • Office of the Director of National Intelligence
QUIT:: PREVIOUS:: NEXT PAGE: 3 OF 25
szeuBsyluereau
file://DAjttfoV2\module5\m5015.htm
8/8/2011
JTFF CBT Page 1 of 1
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI020736 ACLURM020945
NSB
JTFF CBT
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Intelligence Community Overview The FBI's National Security Branch (NSB)
(U) The NSB combines the missions, capabilities, and resources of the counterterrorism, counterintelligence, and intelligence elements of the FBI under the leadership of a senior FBI official. The components of NSB include:
• Counterintelligence Division (CD) • Counterterrorism Division (CTD) • Directorate of Intelligence (DI) • Weapons of Mass Destruction Directorate
(WMDD)
(U) In the graphic to the right, click on the boxes under NSB fora detailed description of each component.
Page 1 of 1
Introduction To Foreign Intelligence And Terrorism
QUIT :: PREVIOUS :: NEXT
PAGE: 4 OF 25 sftssumagem-
file://DAjttfoV2\module5\m5_020.htm
8/8/2011
FBI020737 ACLURM020946
JTFF CBT Page 1 of 1
SECREillay.va
Introduction To Foreign Intelligence And Terrorism
Intelligence Community Overview
Executive Order 12333
(U) Executive Order 12333 focuses activities of the Intelligence Community almost exclusively on the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents.
JOINT TERRORISM TASK 'FORCE (3TTF)
ORIENTATION
QUIT:: PREVIOUS:: NEXT PAGE: 5 OF 25
Ssi.xxx//Nurvux
8/8/2011 file://DAjttfoV2\modulenm5_030.htm
FBI020738 ACLURM020947
• t!. 1.1) '4e 4i:r.;51.7
1.' ,...LAXIVI1 I
•
•
JTFF CBT Page 1 of 1
SECR.........1111.411;GRY113
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues The First Amendment
(U) The First Amendment of the United States Constitution protects Freedom of Religion, Freedom of Speech, Freedom of the Press, and Freedom of Assembly.
(U) No FBI investigations are to be conducted solely based upon activities protected by the First Amendment or other Constitutional rights. In order to conduct an investigation, a nexus to violence, criminal activity, or permissible foreign intelligence or law enforcement purpose must be present.
QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 25
--BLTABV-MOKURI
file://D:\jttfoV2\module5\m5040.htm 8/8/2011
FBI020739 ACLURM020948
JTFF CBT Page 1 of 1
a,W4GEGRIT
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues Attorney General (AG) Guidelines
(U) AG Guidelines regulating the conduct of FBI investigative activity in the domestic context have existed since the 1970s in order to protect First Amendment rights. Following the September 11, 2001 attacks/the AG Guidelines were updated: AG Guidelines on General Crimes, Racketeering Enterprise, and Terrorism Enterprise Investigations (General Crime Guidelines) were reissued in May 2002, and AG Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (National Security Guidelines) were reissued in October 2003.
(U) Both the General Crime Guidelines and the National Security Guidelines require that investigative techniques be used in a manner that protects the rights of Americans and complies with constitutional and statutory restrictions. In addition, each set of Guidelines prohibits the collection, maintenance, and dissemination of information without a sound law enforcement basis.
QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 25
-SECRIMIONOFORN-
file://DAjttfoV2\module5\m5_060.htm
8/8/2011
FBI020740 ACLURM020949
FBI020741
JTFF CBT Page 1 of 1
SECRE971-14,101PORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues
Attendance and Surveillance at Public Events
(U) Agents may not conduct surveillance of individuals or groups solely for the purpose of monitoring the exercise of rights protected by the First Amendment. Generally, FBI personnel may only attend public events and conduct surveillance of persons in attendance for an established investigative purpose as set forth in the AG Guidelines. An established investigative purpose exists only if the agent can articulate objective facts and inferences that satisfy the Guideline's criteria. As with any investigative measure, the justification for this activity should be supported by appropriate documentation. Agents must always be mindful of the provision of the Guidelines that requires consideration of whether a less intrusive technique is available that could achieve the desired investigative results.
(U) There are two broad categories of investigative purposes established under AG Guidelines, either of which could justify attendance and surveillance at public events:
1. plonitorina an individual or group currently under investigation 2. Conducting an Assessment
(U) The Guidelines do not limit an agent to the original purpose of his/her attendance at a public event if unfolding circumstances provide additional bases for other investigative activity.
QUIT :: PREVIOUS :: NEXT PAGE: 8 OF 25
file://DAjttfoV2\module5\m5_070.htin
ACLURM020950
ipo $
(,._`_JIFF CUT- Windows Internet Explorer
• •••1,4t;' X, u DkittfeVArnodulegteg_070.1tm
Flie El View RIVIAOS Tonle Help
a - Q - peg.- sae*. Tca - • " *Fenceltes 1:6 FBI Wend
j,43Trro3r
• gt*Coroder rleg - •4,100% ,,•••
0 TIFF CEIT wiC_ire5c,) .a11,1:11 MDR 12047%.7''Inittsir
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg
00w: Monitoring an Individual or Group Currently Under Investigation _ - __ _ . ___ __ ___ ...
If c.:1 int:iv:du:: cr grccp currcrd...17 1.::....dic* i-cvcCiliCti-c !- -..,_.t.,,,,j tz ,ti.:,,n1 % pvi,ue Lat!eani• onr.i pnriann In unlawful activity, incite violence, or engage in any other activity of evidentiary or investigative significance, agents may attend the event for the purpose of monitoring that activity.
FBI020742
b7E
ACLURM020951
g ObCcepibx ea -
0.JTIT 97: Windows Internet Explorer • )71
CAW "
*(4 k& V IC DllIttroMmockieSisdidoheg Flo Edit How Payola Tools He *Fricritos hf:a r fignereeet
mp cur
r Conducting an Assessment
.:4r. 5) tp.. s_
b7E
•
a-c, 3 a•Page. Safety. Tocb •
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
b7E
FBI020743 ACLURM020952
FBI020744
JTFF CBT Page 1 of 1
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
ID7E
• Law Enforcement Unit Records • Disclosure to Immigration Authorities • Volunteered Information
file://DAjttfoV2\module5\m5_080.htm 8/8/2011
SECMa 7NOTOIRT
Attorney General Guidelines: First Amendment And Privacy Act Issues
Collecting, Maintaining. and Disseminating Information
(U) Specific legal requirements apply to collecting, maintaining, and disseminating information obtained from the following sources:
QUIT :: PREVIOUS :: NEXT
PAGE: 9 OF 25 613GBSOMIGFORN---
• Surveillance
ACLURM020953
JTFF CBT
718ZET'ffiteRiall
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues
Surveillance
(U) Information derived from surveillance of subject individuals or groups at public events pursuant to an open investigation should be collected, maintained in FBI records, and disseminated in compliance with the Privacy Act and departmental policy. If an agent conducts surveillance of persons underl
I personal identifying information obtained about individuals or groups through that surveillance may not be maintained in FBI records - absent some established law enforcement basis.
(U) Attendance by an agent undeA I should be
documented in some retrievable fashion. That documentation should be entered In the appropriate control file and should not include identifying information about individuals or groups in attendance, absent a valid investigative basis as discussed above.
Identifying information (e.g., cannot be temporarily collected for the sole purpose of determining
wwhef ea person of investigative interest is in attendance. However, identifying information can be collected if the presence of the individual at the event in question has independent investigative significance.
QUIT :: PREVIOUS :: NEXT
PAGE: 10 OF 25 ■ 43BORMISWHOrt
file://D:\jttfoV2\module5\m5_090.htm 8/8/2011
FBI020745 ACLURM020954
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: Firit Amendment And Privacy Act Issues
QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 25
file://DAjttfoV21module5\m5_100.htm 8/8/2011
FBI020746 ACLURM020955
JTFF. CBT Page 1 of 1
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
8/8/2011 file://DAjttfoV2\module5\m5_110.htm
—sBeciss4innEIEN
Attorney General Guidelines: First Amendment And Privacy Act Issues
. b7E
QUIT ::PREVIOUS :: NEXT PAGE: 12 OF 25
SECIMPTHHABOVAL-
FBI020747 ACLURM020956
d effg rEk:DAIttfoMmodileAm5_110.1tin 41-- X 15..)::::• -J.:er. •
waives:sr es • Alpo.
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10714-2011 HY 65179 DMH/ stp/ lsg
, 0.."4,0324 • (5, ]IFF ,_BT
FBI020748
b7E
C..fJTFE CBT Windows Inlernet Explorer
t. •
E. Mem Famxtes To* He
1.jr Fault= 1 v,4 CFEIIIrtromt _
iZIMCBT
b 7 E
- Pep.. SAO. Thais, co. "
ACLURM020957
JTFF CBT Page 1 of 1
--szclIVIT/StIPORN
JOINT TERRORISM TASK FORCE OTTO
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues Law Enforcement Unit Records
(U) In accordance with a 2002 Department of Education Memo, a Law Enforcement Unit is officially authorized or designated to enforce laws and maintain the security of the school. Law Enforcement Unit records may be released to anyone without consent or court order if they:
. Have been created for law enforcement purposes • Are maintained by the Law Enforcement Unit • Do not include records obtained by the Law Enforcement Unit from other educational institutions
QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 25
-szcsarTlyaerele#
file://lnjttfoV2\module5\m5_120.htm 8/8/2011
FBI020749 ACLURM020958
FBI020750
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
8/8/2011 file://DAjttfoV2\module5\m5_130.htm
JIFF CBT Page 1 of 1
saeRnefittoroRN
Attorney General Guidelines: First Amendment And Privacy Act Issues
Disclosure to Immigration Authorities
b 7E
QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 25
--lilitettErnIffrORN
ACLURM020959
JTFF CBT Page 1 of 1
szLxsT/inuruica
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues Volunteered Information (March 1996 FBI Airtel)
(U) FBI policy is not to accept volunteered information that on face value would appear to violate the Buckley Amendment. However, it is permissible to accept information, other than protected educational records, from sources (i.e., personal observations, etc). The FBI must return protected information that is acquired mistakenly and cannot make use of that information.
QUIT :: PREVIOUS :: NEXT
PAGE: 15 OF 25 L.tosT1/NUFORN
file://DAjttfoV2\module5\m5_140.htm
8/8/2011
FBI020751 ACLURM020960
JTFF CBT Page 1 of 1 .
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign. Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues Privacy Act Limitations
(U) The FBI Is prohibited from collecting, maintaining, using or disseminating a "record describing how an.
. individual exercises rights guaranteed by the First Amendment ... unless pertinent to and'within the scope of an authorized law enforcement activity." Where information describes only the exercise of First Amendment rights unconnected to an authorized law enforcement activity, no record may be made of this information.
(U) Do not index the names of individuals in FBI files who may be participating in any group activity where First Amendment concerns exist unless the individuals are also subjects of a criminal or intelligence investigation or you can delineate a specific criminal or intelligence purpose for putting that person's name in the file.
(U) It is not the mere passive receipt of information concerning the exercise of First Amendment rights that violates the Privacy Act; The Privacy Act applies when information is collected and recorded in an Agent's notes, report of investigation or other medium. When information is thus recorded, the FBI must be able to demonstrate it Is "pertinent to and within the scope of an authorized law enforcement activity." If public source printed material is retained and put into a file, the Agent must make a handwritten notation explaining why it was retained.
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 25
--secteriy.oixacatt
file://DAjttfoV2\module5\m5_150.htm 8/8/2011
FBI020752 ACLURM020961
FBI020753
Introduction To Foreign Intelligence, And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://D:\jttfoV2\module5\m5_160.htm 8/8/2011
JTFF CBT Page 1 of 1
"SECRErt/NCEPORN
Attorney General Guidelines: First Amendment And Privacy Act Issues
Disclosure of Information
(U) "No agency shall disclose any record contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to who the record pertains, unless..."
(U) Common exceptions applicable to FBI investigations include:
• Written request, by a domestic government agency, for civil or criminal law enforcement purpose, specifying what and why, signed by the agency head or designee
• Compelling circumstances affecting the health and/or safety of a person (must notify the person) • Order of court of competent jurisdiction • Any published "routine use" or "blanket routine use" for the system of records in which the
information is maintained.
(U) Records must be kept of all dissemination of information, including to whom, the date, nature of information disclosed, and purpose for which information was disseminated. Knowing/willful disclosure of information not covered by a Privacy Act exception is a criminal misdemeanor. •
(U) Form FD-999, Liaison with External Organizations, may be used for this purpose.
QUIT :: PREVIOUS :: NEXT
PAGE: 17 OF 25 SBERBOILIZOBOBIL____
ACLURM020962
JTFF CBT
Page 1 of 1
SECRET/1110MM
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Attorney General Guidelines: First Amendment And Privacy Act Issues References
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 25
file://DAjttfoV21module5\m5_170.htm
8/8/2011
:b7 E
FBI020754 ACLURM020963
(Rev.0141-2003)
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM) stp) 1sg
FEDERAL BUREAU OF INVESTIGATION
Precedence: ROUTINE Date: 09/08/2005
To: All Divisions Attn: ADIC AD bAC CDC FBIHQ, Manuals Desk 0
From: General Counsel
Approved By: Caproni Valerie E' Thomas Julie F
Drafted By: b6 b7c
Case ID #: 62F-HQ-C1413697 (Pending) 66F-HQ-C1384970
Title: PROTECTION OF CIVIL LIBERTIES -- UPDATE
Synopsis: To update FBI policy guidance, provided on March 19, 2004, on the protection of civil liberties during criminal and national security investigations.
Reference: 62F-HQ-C1413697 Serial 30 66F-HQ-C1384970 Serial 8139
Details: On March 19, 2004, we provided policy guidance that emphasized established FBI policy on the protection of civil liberties during Criminal and national security investigations. It addressed several important issues in an effort to assist FBI personnel in meeting the challenge of aggressively pursuing legitimate investigative goals without infringing on the exercise of constitutional freedoms.
One of the, issues previously addressed was the FBI's retention of personally identifying information obtained by surveillance.conducted during threat assessments under the Attorney General's National Security Guidelines (NSIG). The following updates that previous, guidance with more detailed comments regarding this specific issue.
The previous guidance stated that, to be retained in FBI records, such personally identifying information obtained during threat assessments "must be relevant to an existing investigation
FBI020755 ACLURM020964
To: All Divisions From: General Counsel Re: 62F-HQ-C1413597, 09/08/2005
I; by itself or in combination with I other known information, justify a new inquiry or investigation; or relate to another law enforcement activity the FBI is authorized by law or regulation to conduct." The underlying b7E intent was to ensure that those who retain such intorffiation do so for valid purposes. The intent was certainly not to restrict those who employ threat assessments as a legitimate tool to prevent terrorist attacks by
The introductory language of the NSIG's Part II, "National Security Investigations," discusses "critical information needed for broader analytic and intelligence purposes authorized by Executive Order 12333 and these Guidelines to protect national security." It then expressly states that "filnformation obtained
b7E
accordingly to be retained and disseminated for these purposes as provided in these Guidelines, or in FBI policy consistent with these Guidelines, regardless of whether it furthers investigative objectives in a narrower or more immediate sense."
Even if information obtained during a threat assessment
[ those who possess personally identifying. 1
information derived from the threat assessment may retain it for the national security purposes stated above. In that regard, the informationl
In addition, the information may possibly assist FBI personnel int
One cautionary point in this regard must be emphasized. This type of information--i.e., information obtained during a threat assessment that has insufficient value to justify further investigative activity (at least at the time it is obtained)--is often' 1 b7E I If it is retained for the purposes addressed above, measures-should be taken to identify it accurately as threat assessment information, to protect it from inadvertent disclosure, and to preclude its use as a basis for any further investigative activity unless and until such action is authorized by the NSIG or other applicable regulations.
2
b7E
FBI020756 ACLURM020965
To: All Divisions From: General Counsel Re: 62F-HQ-C1413697, 09/08/2005
Set Lead 1: (Discretionary)
ALL RECEIVING OFFICES
Read and disseminate as appropriate.
CC: Director Mueller Deputy Director Pistole EAD Bald EAD Ashley
b6 b7c
• •
3
FBI020757 ACLURM020966
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
Main Law Library
FBI > Directors Office > Office of the General Counsel
Main. Law Library
• Training Guide to Materials on the OGC Law Library Website (pdf)
• •
'
Attorney General Attorney General
• Aviation-Related • Border Searches • Buckley Amendment • CDC Team Site
[restricted - contact'
• CDC Conference • Church Committee • Department of
Law Enforcement • Digital Evidence
Investigations • Director of Central • DoD Operational • DO) IG Reports • DO] Memorandums • DO) Office of Investigative • DO) Orders
o OBD Orders • DO) USABook • Electronic Communications • Enemy Combatants
Commissions • Espionage Violations • Executive Orders • Export Controls • Extraterritorial • Fair Credit Reporting • FBI Chief Division
Manual • FBI Guidance/Policy. • Federal Rules of
Guidelines Orders Matters
• Foreign Terrorist Organizations • Homeland Security Presidential Directives • Immigration Issues • Information Sharing Environment • Inspector General Procedures • International Issues • Intelligence Community/National Security
Related Directives • Legal Handbook for Special Agdnts (pdf) • Legislative History of U.S. Public Laws
'or access]
Presentations Reports
Defense Assistance to U.S.
and Computer Related
Intelligence Directives Law Handbook
Agency Policies
Privacy Act and Military
and Authorities
Matters Act (pdf)
Counsel Critical Incident
ECs Criminal Procedure
• Maritime-Related Matters • MOU List (pdf)
• Model Memorandums of Understanding (MMOU)
• Memorandums of Understanding (MOU)
National Response Framework (pdf) • National Security Act of 1947 (amended
12/2007) (pdf) (Title 50. War and National Defense, Chapter 15— National Security)
• National Security Directives •
Office of the Director of National Intelligence Documents
• PATRIOT Act • PATRIOT Reauthorization Act.
• Probable Cause (ppt? (presentation by AUSA
• Right to Financial Privacy Act (pdf) (Title 12, United States Code, Sections 3401-3422)
• State Electronic Surveillance Procedures and Laws
• Terrorism Related • Treaties • United States Attorney's Manual • United States Public Laws
For questions or oonwnenls, OGC) (FEW) last modified on 7P/20119:10:12 AM
FBI020758 ACLURM020967
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
0I=1 IN. 40.n.
SAO.
FEDERAL DIUREAD eV irwesnaxnox
imam
masoluwannatormsmexcvntomugummontrm)
Omar. Aseta2.74
LOOMNVIolfrb
641611.110.4. ...1+4 44.16 wa «411.1
FBI020759
JTFF CBT Page 1 of 1
SEtaa.r//Numvard
National Foreign Intelligence Policy
National Foreign Intelligence Policy Manual (NFIPM)
The NFIPM details the FBI's National Foreign Intelligence Program. The NFIPM can be found on the FBI
Inn .....11141...4 ."•-•••
I.. ..1.4•11 .11■ OW,
M. • • a ...1,-061•
QUIT:: PREVIOUS:: NEXT PAGE: 19 OF 25
. -Sztettiffil4B6ir4PAT-
nranet at:1 b7E
file://DAjttfoV2Imodule51m5_180.htm 8/8/2011
ACLURM020968
JTFF CBT Page 1 of 1
-88098IPHIMPORN
JOINT TERRORISM TASK FORCE OTTO
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Foreign Intelligence Surveillance Act (FISA) (U) The Foreign Intelligence Surveillance Act (FISA) of 1978 prescribes procedures for requesting judicial authorization for electronic curve:nonce end physical search of persons engaged in espionage or international terrorism against the U.S. on behalf of a foreign power. A special eleven-member court, appointed by the Chief Justice of the U.S. Supreme Court, called the Foreign Intelligence Surveillance Court adjudicates FISA requests.
(U) Section 6001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004, known as the "lone wolf" amendment, broadened FISA to allow surveillance of any person, other than a U.S. person, who "engages in international terrorism or activities in preparation therefore." The expanded definition allows the government to use FISA for surveillance of a non-U.S. person who has no known ties to a group or entity.
(U) Recent changes to FISA as a result of the USA PATRIOT Improvement and Reauthorization act of 2005 and the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 can be found b7E
QUIT:: PREVIOUS:: NEXT PAGE: 20 OF 25
IELIcrrtOaeaoaa.
file://D:\ittfoV2\module51m5_190.htm
8/8/2011
FBI020760 ACLURM020969
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED ,DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg
(Rev. 01-31-2003)
FEDERAL BUREAU OF INVESTIGATION
Precedence: PRIORITY
To: All Divisions
From: Office of the General Counsel Contact:
Date: 04/07/2006
Approved By: Caproni Valerie E Thomas Julie F b6
b7C
Drafted By:
Case ID #: 319X-HQ-A1487720-OGC
Title: (U) USA PATRIOT ACT RENEWAL - NEW LEGISLATIVE CHANGES TO FCl/IT LEGAL AUTHORITIES.
Synopsis: (U) Summarizes recent changes to national security legal authorities as a result of the "USA PATRIOT Improvement and Reauthorization Act of 2005 (Public Law 109-177) and the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006" (Public Law 109-178), and describes the preliminary implementation procedures.
Details: The President signed the "USA PATRIOT Improvement and Reauthorization Act of 2005" (USA PATRIOT IRA) and the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006" on March 9, 2006. The USAPA IRA makes permanent many of the sunseting provisions of the USA PATRIOT Act.' Additionally, both laws make significant changes to many national security legal authorities, including National Security Letters (NSLs) and certain FISA-related provisions, and impose new reporting requirements. Moreover, the new laws make changes in several substantive criminal laws, some of which may have implications in national security investigations.
The National Security Law Branch of the Office of General Counsel is issuing preliminary guidance on those portions of the two laws relating to national security operations. The following summarizes authorities contained in'sections of the bills, to include a summary of potential changes in FBI operational procedures. Recipients should note that this is only initial guidance; more detailed explanations and procedures may follow in subsequent communications
The USA PATRIOT Act refers to the "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001," which was signed into law on October 26, 2001.
FBI020761 ACLURM020970
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
The USA PATRIOT Act Improvement and Reauthorization Act of 2005 is organized into the seven titles. Title I, which carries the same title as the overall bill, contains the significant changes to the FBI's national security tools.2 Titles II through VII contain several other Acts and miscellaneous provisions:
• Title I - USA PATRIOT Imprevement and Reauthorization Act
Title I makes most of the original sunset provisions of the original USA PATRIOT Act permanent, though it creates new sunsets for the authorities in section 206 (FISA roving authority) and section 215 (FISA access to business records) of the USA PATRIOT Act, and section 6001 (Lone Wolf provision) of the Intelligence Reform and Terrorism Prevention Act of 2004. It also extends the duration of several FISA tools. Additionally, it makes significant changes to the National Security Letter statutes Finally, the USAPA IRA requires new Congressional reporting of the use of national security tools.
• Title II - Terrorist Death Penalty Enhancement
This portion of the USAPA IRA entitled the "Terrorist Death Penalty Enhancement Act of 2005" makes adjustments to the death penalty procedures for federal cases, including certain air piracy cases.
• Title III - Reducing Crime and Terrorism at America's Seaports Act of 2005
This Title amends certain criminal statutes to strengthen maritime and seaport safety.
• Title W - Combating Terrorism Financing Act of 2005
This Title increases the penalties for terrorism financing, and adds new terrorism-related provisions to the specified unlawful activities that serve as money laundering predicates (including operating an illegal money transmitting business, such as the common "hawala" network).
• Title V - Miscellaneous Provisions
As recommended by the WMD Commission, this Title creates a National Security Division within the U.S. Department of Justice, which is to be led by an Assistant Attorney General for National Security.
2 Congress drafted the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 after the USA PATRIOT Improvement and Reauthorization Act of 2005. Congress used the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 to make additional adjustments to the nondisclosure provisions of FISA Business Records and National Security Letters contained in the USA PATRIOT IRA, and to add the "Privacy Protections for Library Patrons."
2
FBI020762 ACLURM020971
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
• - Title VI - Secret Service Authorization and Technical Modification Act of 2005
As the Title suggests, it modifies certain authorities of the Secret Service.
Title VII - Combat Methamphetamine Epidemic Act of 2006
This Title creates regulations for the control of precursor chemicals and enhances the criminal penalties for methamphetamine production.
TITLE I - USA PATRIOT IMPROVEMENT and REAUTHORIZATION ACT of 2005.
This EC will not address the new sections of the USAPA IRA in sequence; instead, the sections will be organized by national security tools.
SUNSET PROVISIONS
Sec. 102. USA PATRIOT Act Sunset Provisions.
Section 102 repeals section 224 of the USA PATRIOT Act, making most of the original sunset provisions permanent. This section adopts a new 4-year sunset (December 31, 2009) for sections 206 (roving authority) and 215 (business records) of the USA PATRIOT Act. The now permanent provisions of the USA PATRIOT Act are the following:
USA PATRIOT Act 2001 Provision
Description of Provision • .
Sections 201 & 202 Expanded Title III predicates.
Section 203(b) & (d) Information sharing of foreign intelligence obtained in Title III and criminal investigations.
Section 204 Clarification of Intelligence Exceptions from Limitations on Interception and Disclosure of Wire, Oral and Electronic Communications.
Section 207 Extended duration of certain FISAs.
Section 209 Seizure of voice mail with a search warrant.
Section 212 Emergency disclosures of e-mail and records by ISPs.
Section 214 PISA pen/trap authority.
Section 217 Interception of computer trespasser communications.
Section 218 Change in the probable cause ("significant purpose") standard of FISA.
Section 220 Nationwide search warrants for electronic evidence.
FBI020763 ACLURM020972
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Section 223 Civil liability for certain unauthorized disclosures.
Section 225 Immunity for compliance with FISA wiretap.
Procedural Changes: None at this time. If necessary, additional guidance may be -issued in the future.
Provision New Sunset Date
FISA Roving Authority December 31, 2009
FISA Business Records Authority December 31, 2009
Sec. 103. Extension of Sunset Relating to Individual Terrorists as Agents of a Foreign Power.
Section 6001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) addressed the "lone wolf' terrorist by broadening the definition of the "agent of a foreign power" for any person other than a United States person to include a person who "engages in international terrorism or activities in preparation thereof." The USAPA IRA extends the sunset of this provision 4 years (until December 31, 2009).
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Provision
New Sunset Date
FISA "Lone Wolf'
December 31, 2009
FISA DURATION CHANGES
Sec. 105. Duration of FISA Surveillance on Non-United States Persons under Section 207 of the USA PATRIOT Act.
Section 105 extends the duration of both initiations and renewals of electronic surveillance (FISA § 105(e)), physical search (PISA § 304(d)), and pen register/trap and trace surveillance (FISA § 402(e)) for agents of a foreign power who are not U.S. persons.
Procedural Changes Related to the New FISA Durations: Dal Office of Intelligence Policy and Review will implement these changes to the FISA process. The new durations for non-United States persons are reflected in the chart below. Overall, the new durations should translate into considerable savings in FBI and OIPR resources.
FBI020764 ACLURM020973
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
FISA Technique
The initiations and renewals for United States persons will remain the same. b7E
FBA Technique
FISA BUSINESS RECORD CHANGES'
Sec. 106. Access to Certain Business Records Under Section 215 of the USA PATRIOT Act.
Section 106 makes the following changes to Sections 501 and 502 of the Foreign Intelligence Surveillance Act (FISA) regarding access to 215 Business Records.
Procedural Changes Related to PISA Business Records: FISA Business Records, which have been the subject of much debate, have been modified to contain more safeguards to protect civil liberties and privacy. include special procedures and approvals for b7E certain types of tangible things (i.ePese"safemal, a directive to develop "minimization procedures," the recipient's right to seek judicial review of an order, and a recipient's right to disclose an order for the purpose of obtaining legal advice or for assistance in complying with the order. The following charts summarize significant provisions in the new law.
Scope of FISA Business Records authority.
The changes included in this section also include the changes made by section 3 and 4 of the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006."
5
b7E
FBI020765 ACLURM020974
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
Special Categories of Tangible Things,
Congress designated particular categories of records for special procedures and approvals. The FBI will adjust procedures to account for the special designation.
• Special Categories.
• Approval Level for special categories:
The Director of the FBI may delegate the authority to either - • the Deputy Director of the FBI; or • the Executive Assistant Director (EAD) for National Security (or any successor position).
No further delegation is allowed.
• Congressional Oversight of special categories:
•
Attorney General must provide annual report (April) to the House Judiciary Committee (HJC), the House Pennanent Select Committee on Intelligence (HPSCI), the Senate Judiciary Committee (SJC), and the Senate Select Committee on Intelligence (SSCI).
• Rumber of FISA business record orders granted, modified, or denied for the special categories of tangible things.
FISA Business Record Standard- Relevance:
- . ..
The FBI's facts must show that there are "reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation." .
• Presumptive Relevance The tangible things are presumptively relevant if the facts show Test: they pertain to -
"(i) a foreign power or an agent of a foreign power, (ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or (iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigations..."
FISA Business Record Order
• The order must describe the tangible things with sufficient particularity to permit them to be fairly identified. • Date for return - the order will contain a date on which the tangible things must be provided. • Recipient must have a reasonable period of time to produce. • The Order may only require production of tangible things that would be available with a grand jury subpoena or a District Court order (in other words, privileges under the law will apply to Business Record orders).
b7E
6
FBI020766 ACLURM020975
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1467720-0GC, 04/07/2006
FISA Business Record Non-Disclosure Provision:
No person shall disclose the fact that the FBI has sought tangible things.
• Exceptions to non- A recipient may disclose a FISA Business Record Order to — diaclumuc. . (1) pcnon5 to whom disclosure is necessary to comply:
(2) an attorney to obtain legal advice or assistance with respect to the production; (3) a person as permitted by the FBI Director (or designee).
• Extension of • If the recipient discloses to another person (see exceptions nondisclosure to others: above), the recipient shall notify the person of the nondisclosure
requirement. • The person to whom disclosure is made shall be subject to the nondisclosure requirement. • The FBI director (or designee) may ask the recipient to identify the other persons to whom disclosure of the Business Record order will be made (except that the recipient does not have to identify the attorney).
Judicial Challenge of FISA Business Record authority:
The recipient of a PISA Business Record order may challenge the legality of the order in the Foreign Intelligence Surveillance Court
• Challenging the order • Recipient may move to modify or set aside the order. • FISC may grant the motion only if the order does not meet the requirements of FISA or is otherwise =lawful.
7
FBI020767 ACLURM020976
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
• Challenging the non- • Not less than 1 year afier the order, the recipient may move to disclosure provision: modify or set aside the nondisclosure order.
• FISC may grant such a motion only if there is no reason to believe that disclosure may endanger the national security of the U.S., interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person. • The FISC will treat as conclusive a certification by the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI that a disclosure may endanger the national security of the U.S. or interfere with diplomatic relations.
• Security: • Filings shall be under seal •Chief Justice of the U.S., in consultation with the AG and the DNI, will establish security measures.
Minimization Procedures for FISA Business Records:
-
Within 180 days of enactment, the Attorney General shall adopt specific minimization procedures governing the retention and dissemination of FISA Business Record information.
•U.S. Person information: The minimization procedures should minimize the retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting U S persons consistent with the U.S. intelligence community need to obtain, produce and disseminate foreign intelligence information.
• Evidence of a crime: The procedures should allow for the retention and dissemination of information that is evidence of a crime.
Procedural Changes Related to Congressional Oversight of FISA Business Records: The new law beefs up the Congressional reporting requirements for the FISA Business Record authority. OIPR will have the responsibility for reporting the FISA Business Record statistics to Congress.
Reporting Cycle: Attorney General will report on an annual basis (April of each year).
Congressional Committees:
•House Permanent Select Committee on Intelligence •House Judiciary Committee •Senate Select Committee on Intelligence •Senate Judiciary Committee
8
FBI020768 ACLURM020977
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
Reporting Categories: (1) Total number of applications for FISA Business Records. (2) Total number of orders granted, modified, or denied. (3) Total number of orders granted, modified, or denied for the, special cate2ories of tangible things.
Additional unclassified report
Annually (April of each year), the Attorney General shall make an unclassified report on the total number of FISA Business Records applications, and the total number of orders granted, modified, or denied.
Sec. 106A Audit on Access to Certain Business Records for Foreign Intelligence Purposes.
Section 106A directs the Inspector General of the Department of Justice to perform a comprehensive audit of the effectiveness and use, including improper or illegal use, of the FISA Business Records authority. The audit will take place in two phases, covering the years of 2002 to 2006.
Procedural Changes Related to the Audit of FISA Business Records: The Inspector General's Office of the Department of Justice (DOJ IG) started the audit process in January 2006, in anticipation of the new USA PATRIOT Improvement and Reauthorization Act. It will be incumbent upon the FBI to cooperate with the DOJ IG to complete the two-phased audit. Per established procedures, the FBI's Inspection Division will be the primary point of contact for the DOJ IG. Additional guidance may be published as the audit process continues.
Scope of Audit .
The IG will perform a comprehensive audit of the effectiveness and use, including any improper or illegal use, of the investigative authority.
Timing of Audit For 2002, 2003, and 2004, the audit should be completed within one year of enactment (March 9, 2007).
For 2005 and 2006, the audit should be completed by December 31, 2007.
Report results to Congress: The IG shall submit the audit reports to —
• House Judiciary Committee. • House Permanent Select Committee on Intelligence. • Senate Judiciary Committee. • Senate Select Committee on Intelligence. _
FBI020769 ACLURM020978
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Examine effectiveness of the tool:
Audit will look at the following for effectiveness —
• Categories of records obtained. • The importance to the FBI and the IC of the information obtained. • The manner it which the information is collected, retained, analyzed, and disseminated by the FBI (this will include an examination of the access to "raw data" provided by the FBI to other agencies of the Federal, State, local, or tribal governments, or private sector agencies). • The minimization procedures adopted by the AG. • Whether, and'how often, the FBI used information to produce analytical intelligence products for the FBI, the IC, or other Federal, State, local, or tribal government agencies. • Whether, and how often, the FBI provided the information to
• law enforcement authorities for criminal proceedings.
Examine the process: The audit process will look at the following:
• How often the FBI requested DOJ to submit an application and the request was not submitted to the court (including the basis for the decision). • Whether the court granted, modified, or denied the application. • The justification for the failure of the AG to issue implementing procedures governing the requests in a timely
• fashion, including whether the delay harmed national security. • Whether bureaucratic or procedural impediments prevent the FBI from fully using the authority.
FISA ROVING SURVEILLANCE CHANGES
Sec. 108. Multipoint Electronic Surveillance Under Section 206 of the USA PATRIOT Act.
This section modifies FISA sections 104(a) and 105(c), to clarify the amount of detail the FBI must provide to obtain a FISA roving surveillance order.
Procedural Changes Related to FISA Roving Surveillance:
The application must now include a description of the "specific" target when the target is identified by description rather than by name. The section also adds a return requirement on the FBI in national security investigations. This is consistent with Congress' intent to provide an extra layer of judicial review and to prevent the potential abuse of this investigative authority.
OIPR will implement the new requirements for the FISA roving surveillance. OIPR and FBI OGC may develop more specific guidance on the new process for obtaining this authority in the future.
10
FBI020770 ACLURM020979
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Standard for roving surveillance:
b7E
Consistent with Congress' intent to provide more oversight, the reporting requirements for FISA roving surveillance have been changed.
Procedural Changes Related to FISA Roving Surveillance Congressional Oversight: OIPR will maintain responsibility for reporting on the FISA roving surveillance.
Reporting cycle: The Attorney General will report on a semi-annual basis.
Congressional Committees:
• • House Permanent Select Committee on Intelligence • Senate Select Committee on Intelligence • Senate Judiciary Committee
Reporting categories: • Total number of applications made for orders and extensions. • Each criminal case in which information has been authorized for use at trial, during the period covered by such report. • Total number of emergency employments and total number of subsequent orders approving or denying surveillance.
FISA OVERSIGHT CHANGES
In section 109 of the USA PATRIOT Act Improvement and Reauthorization Act, Congress has implemented additional reporting requirements for the use of FISA physical search authority and FISA pen registers and trap and trace authority. This section modifies the reporting requirements in FISA sections 306 and 406(b).
FBI020771 ACLURM020980
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Congressional Reporting on FISA Physical Search authority:
Reporting cycle: Attorney General will report on a semiannual basis.
Congressional • House Permanent Select Committee on Intelligence Committees: - House Judiciary Coma-littcc,
• Senate Select Committee on Intelligence • Senate Judiciary Committee
Reporting categories: Report the following regarding emergency physical searches — • Total number of applications. • Total number of orders granted, modified, or denied. • Number of physical searches involving the residences, offices, or personal property of U.S. persons, and the number of occasions the AG provided notice. • Total number of emergency authorizations, and total number of subsequent orders approving or denying the physical searches.
Congressional Reporting on FISA Pen Register and Trap and Trace authority:
Reporting cycle: Attorney General will report on a semiannual basis.
Congressional Committees:
• House Permanent Select Committee on Intelligence • House Judiciary Committee • Senate Select Committee on Intelligence • Senate Judiciary Committee
Reporting categories:
.
Report the following regarding pen registers/trap and trace — • Total number of applications. • Total number of orders granted, modified, or denied. • Total number of emergency authorizations, and total number subsequent orders approving or denying the pen registers/trap and trace.
Procedural Changes Related to Enhanced Congressional Oversight If necessary, OIPR and FBI OGC will publish guidance in response to the new provisions. OIPR will retain responsibility for reporting to Congress on FISA related activities.
FISA PEN REGISTER/TRAP AND TRACE CHANGES
Sec. 128. PATRIOT Section 214; Authority for Disclosure of Additional Information in Connection with Orders for Pen Register and Trap and Trace Authority under FISA.
Congress modified the FISA pen register and trap and trace devices authority to give the FBI access to more information through this authority. The pertinent portion of the new statute describing the information available to the FBI is reproduced here (highlights added):
FISA § 402 [50 U.S.C. § 1842]. Pen registers and trap and trace devices for foreign intelligence and international terrorism investigations.
12
FBI020772 ACLURM020981
.b7E
b 7E
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
(C) shall direct that, upon the request of the applicant, the provider of a wire or electronic service shall disclose to the Federal officer using the pen register or trap and trace device covered by the order —
13
FBI020773 ACLURM020982
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
The chart below summarizes the information available through the new adjustments to the FISA tool.
b7E
The chart below summarizes the Congressional reporting requirements for the use of the FISA pen register and trap and trace authority.
Reporting cycle: Attorney General shall report on a semiannual basis.
Congressional Corrimittees:
• House Permanent Select Committee on Intelligence • House Judiciary Committee • Senate Select Committee on Intelligence . • Senate Judiciary Committee
Reporting categories: Use of pen registers and trap and trace.
Procedural Changes Related to Pen Registers/Trap and Trace: OIPR will retain the reporting responsibilities for the FISA pen register/trap and trace authority.
The FBI will now be able to obtainj b7E with a FISA pen register/trap and trace, without having to couple the request witli a FISA Business Record request. This provision should make this investigative tool more useful to
14
FBI020774 ACLURM020983
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
the FBI. OIPR has already made the changes to its pen register/trap and trace format to take advantage of the new provision.
EMERGENCY DISCLOSURES
Sec. 107 Enhanced Oversight of Good-Faith Emergency Disclosures Under Section 212 of the USA PATRIOT Act.
The emergency disclosure provision, codified at 18 U.S.C. § 2702(b)(8) & (c)(4), provides law enforcement with the ability to gain quick access tc under emergency conditions. The USA PATRIOT Act created the emergency disclosure provision which explicitly permits, but does not require, a service provider I Ito voluntarily disclose to law enforcement information, including in emergencies involving a risk of death or serious physical injury. Such disclosures are outside of the compulsory process — subpoena, court order, and search warrant — that is generally required before law enforcement can obtain such information from a service provider. See, 18 U.S.C. § 2703.
Section 107 makes changes to the emergency disclosure provision of 18 U.S.C. Section 2702, including the requirement for more Congressional reporting, to deal with the concern that this authority was not subject to sufficient Congressional, judicial or public oversight.
Procedural Changes Related to Good-Faith Emergency Disclosures: The Attorney General must now report annually to Congress on the number of accounts subject to disclosure, and the Attorney General must report the basis for the voluntary disclosures in investigations that are closed without filing criminal charges.
The FBI will need to track the use of this investigative authority for reporting purposes. The FBI will publish additional guidance on this issue as necessary.
Voluntary disclosure by provider:
If the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay.
Reporting cycle: Attorney General shall report on an annual basis.
Congressional Committees:
• House Judiciary Committee • Senate Judiciary Committee
Reporting categories: • Number of accounts from which voluntary disclosures were received. • Summary of the basis for disclosure where the investigation was closed without criminal charges.
15
b7E
FBI020775 ACLURM020984
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
NATIONAL SECURITY LETrERS4
Sec. 115. Judicial Review of National Security Letters.
Title 18, Chapter 223 of the United States Code (Witnesses and Evidence) is amended to include a new section 3511 which provides for the judicial review of NSLs.
Procedural Changes Related to the Judicial Review of NSLs: This new section modifies the NSL authorities under the-Electronic Communications Privacy Act (ECPA)(18 U.S.C. § 2709), the Fair Credit Reporting Act (FCRA)(15 U.S.C. § 1681u and 15 U.S.C. § 1681v), and the Right to Financial Privacy Act (RFPA)(12 U.S.C. § 3414), to make it clear that the recipient may seek the help of an attorney, and may challenge the legality of an NSL order and its non-disclosure provision in Federal District Court. A Federal District Court can modify or set aside an NSL if it is unreasonable, oppressive, or otherwise unlawful. It continues to be important for the FBI to serve NSLs only if the information sought falls within the statutory categories, and which are not overly broad or oppressive.
Future practice will give the FBI an idea of how many NSL challenges can be expected in a calendar year. If Federal grand jury practice is any indication, the number of NSLs challenged on a yearly basis should be small. Regardless, the FBI Field Office will need to work with local Assistant United States Attorneys when a recipient challenges the legality of an NSL or the non-disclosure provision. Additionally, FBI Field Offices should immediately notify FBI OGC if they receive notice of any challenge to an NSL or the NSL's nondisclosure provision. The following chart breaks down the new provisions (including jurisdictional issues).
The new law also gives the U.S. government a mechanism to address the situation where a recipient fails to comply with the NSL, which has been missing from the investigative tool in the past. Again, this procedure will require the assistance of a local United States Attorney's Office.
Judicial review of NSL (Recipient may challenge the request):
• Jurisdiction: In the U.S. District in which the recipient resides or does business.
• Recipient may ask court to set aside or modify request.
• Court will grant the recipient's motion if the NSL is unreasonable, oppressive, or otherwise unlawful.
4 The changes listed in this section also include the changes made by sections 4 and 5 of the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006."
16
FBI020776 ACLURM020985
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
Judicial review of NSL nondisclosure provision
• Jurisdiction: In the U.S. District in which the recipient resides or does business.
(Recipient may challenge the nondisclosure • Filed within one year of NSL request - provision):
4 Court may modify/set aside the non-disclosure if... "no reason to believe that disclosure may endanger the national security of the U.S., interfere with criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person." • Certification/Authority level: Court will treat as conclusive the certification by the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI that disclosure may endanger the national security of the United States or interfere with diplomatic relations (unless made in bad faith).
• Filed one year or more after the NSL -
•
• Within 90 days of recipient's petition, designated government officials must either terminate the nondisclosure requirement or recertify that the disclosure "may result in a danger to the national security of the U.S., interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." • Termination/Recertification Authority level: The Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI, or his designee in a position not lower than Deputy Assistant Director at FBI headquarters or a SAC in an FBI field office designated by the Director shall either terminate the nondisclosure requirement or recertify that disclosure "may result in a danger to the national security of the U.S., interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." • Conclusive: Certification by the AG, DAG, an Assistant Attorney General, or the Director of the FBI that disclosure may endanger the national security of the United States or interfere with diplomatic relations shall be treated as conclusive (unless made in bad faith).
17
FBI020777 ACLURM020986
Libraries and 18 U.S.C. § 2709 (telephone toll and transactional records):
A library is not a wire or electronic communications service provider unless the library is providing the services defined in 18 U.S.C. § 2510(15)(electronic communication service).
To: All Divisions From: - Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Failure to Comply: • The Attorney General may invoke the aid of a Federal District Court. • Jurisdiction: U.S. District in which the investigation is carried on, or the person or entity resides or does business or may be found. • Court may compel by ordering personientity to comply. • Failure to obey is punishable by contempt.
Court Proceedings. & Security:
• Court must close hearings to the extent necessary to prevent an unauthorized disclosure of NSL. • Petitions, filings, records, orders, and subpoenas must be kept under seal to the extent and as long as necessary to prevent unauthorized disclosure. • At government's request, ex parte and in camera review of government's submissions which may contain classified material.
Sec. 116. Confidentiality of National Security Letters.
Section 116 makes changes to the National Security Letter authorities contained in the Electronic Communications Privacy Act (ECPA) (18 U.S.C. § 2709), the Right to Financial Privacy Act (RFPA)(12 U.S.C. §3414), and the Fair Credit Reporting Act (FCRA) (15 U.S.C. §§ 1681u and 1681v).
For example, Congress used this section to clarify the application of NSLs [18 U.S.C. § 2709 - telephone toll and transactional records] to libraries. A library is subject to an NSL only if it falls within the definition of a wire or communications provider.
Additionally, this section is used to statutorily establish the NSL nondisclosure requirements and the exceptions to the nondisclosure requirement available to a recipient.
I Si. 'I.: Procedural Changes Related overstepping this authority. the FBI b7E
I If you have any questions regarding the application of this provisions I please direct your questions to FBI OGC NSLB.
The other significant changes to NSLs regarding confidentiality are common to all NSLs used by the FBI. In order to activate the nondisclosure requirement, the NSLs must contain a certification from the Director of the FBI, or a Special Agent in Charge in an FBI field office. This new legislation allows designation of this certification to the SACs in field offices "designated by the Director." This language reflects Congress' intention that the delegation not occur automatically, but that the Director must choose which offices needed, and were properly
18
FBI020778 ACLURM020987
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
prepared to exercise, the delegated authority. The Director has made delegations to FBI Field Offices in a separate communication. Field Offices with delegated authority will receive . instructions on the process of preparing and issuing NSLs (instructions and updated forms will be posted on the FBI OGC National Security Law Branch website). The remaining changes are summarized in the chart below. FBI OGC NSLB will publish additional guidance on this authority as n.....,20.ary.
. Nondisclosure activated by FBI Certification:
• FBI certification: There may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, if a recipient discloses that the FBI has sought or obtained access to information or records under NSL statutes.
• Authority level: Director of the FBI, or his designee in a position not lower than DAD at FBI headquarters, or a Special Agent in Charge in a Bureau field office designated by the Director.
Exceptions - Recipient may disclose NSL request
• Recipient may disclose to persons necessary to comply with NSL request -
• Attorney: Recipient may disclose to an attorney to obtain legal advice or legal assistance regarding any NSL request
Notice: • The NSL shall notify the recipient of the nondisclosure requirement.
• Recipient disclosing NSL to an individual necessary to comply or, to an attorney, shall inform them of the applicable nondisclosure requirement.
FBI request for identity of persons to whom recipient plans to disclose NSL:
• Only activated at the request of the FBI Director or Director's designee.
• Recipient of NSL shall identify the persons to whom disclosure will be made or was made.
• EXCEPT: Nothing requires the person to identify an attorney to whom disclosure was made or will be made to obtain legal advice or legal assistance.
Sec. 117. Violations of Nondisclosure Provisions of National Security Letters.
This section makes it a federal crime for an individual to knowingly and with the intent to obstruct an investigation or judicial proceeding violate the nondisclosure provision of an NSL.
Procedural Changes Related to Violations of National Security Letter Non-disclosure: None at this point.
19
FBI020779 ACLURM020988
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Obstruction of an Investigation (18 U.S.C. § 1510):
• Individual must have been notified of the nondisclosure provision. •
• Individual must knowingly and with the intent to obstruct an investigation or judicial proceeding vic..lete the nondigelocure provision.
• Punishable by up to five years imprisonment, a fine, or both.
Sec. 118. Reports on National Security Letters.
Section 118 of the USA PATRIOT Improvement and Reauthorization Act of 2005 outlines a new reporting scheme for National Security Letters.
Procedural Changes Related to National Security Letter Reporting: This section now requires that NSL statistics be reported to the House and Senate Judiciary Committees, in addition to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence. Additionally, Congress has directed that the NSL requests made pursuant to the 15 U.S.C. § 1681v [Fair Credit Reporting Act] be reported semi-annually to the House Committee on Financial Services and the Senate Committee on Banking, Housing and Urban Affairs, in addition to the House and Senate intelligence committees. These provisions are consistent with Congress' desire for more oversight of the national security investigative tools. Finally, Congress has directed that the Attorney General provide an unclassified report annually (April) which will report the aggregate numbers of NSL requests concerning different U.S. persons. With the unclassified report, Congress intends for the public to have a better view of the material Congress sees in conducting its oversight responsibilities.
The FBI OGC's National Security Law Branch and OIPR will provide future guidance on the FBI's role in the reporting of NSLs.
Current NSL Reports: • AG reports on a semi-annual basis.
• Reports will now also be made to the House Judiciary Committee, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, and the Senate Select Committee on Intelligence.
Enhanced Oversight of 15 U.S.C. § 168Iv NSLs (for credit agency consumer records):
• AG reports on a semi-annual basis. .
• Reports will now also be made to the House Judiciary Committee, the House Committee on Financial Services, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, the Senate Housing and Urban Affairs Committee, and the Senate Select Committee on Intelligence.
FBI020780 ACLURM020989
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1467720-0GC, 04/07/2006
Aggregate Report of NSL requests:
• AG reports annually (April).
• Total number of NSL (excluding NSL's for subscriber information) requests for information concerning different U.S. persons.
• Unclassified report.
Sec. 119. Enhanced Oversight of National Security Letters.
Consistent with Congress' theme of more oversight, Congress has directed that the Inspector General of the Department of Justice shall perform an audit of the effectiveness and use, including any improper or illegal use, of national security letters issued by the Department of Justice.
Procedural Changes Related to the Audit of National Security Letters: This DOJ IG audit of the use of NSLs, which began in January of 2006, will require the cooperation of the FBL Congress' goal in this audit is to obtain detail on the specific functions and characteristics of NSLs and an analysis of the necessity of this national security investigative tool. As with DOJ IG's audit of the FISA Business Record authority, the FBI's Inspection Division will be the primary point of contact for the DOJ IG (per established procedures). The FBI OGC NSLB may issue additional guidance as the audit process continues.
Requirements of DOJ ICI Audit:
Comprehensive audit of -
• Use of NSLs for 2003 through 2006. • Description of noteworthy facts/circumstances, including any improper or illegal use of NSLs.
Timing of Audit: • For 2003 and 2004, must be completed not later than one year after enactment (March 9, 2007). .
• For 2005 and 2006, must be completed not later than December 31, 2007.
Congressional Committees:
• House Judiciary Committee and House Permanent Select Committee on Intelligence. • Senate Judiciary Committee and Senate Select Committee on Intelligence.
21
FBI020781 ACLURM020990
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Examine Effectiveness of NSLs:.
The audit will examine:
• Importance of the information acquired by DOJ to the intelligence activities of DOJ and other members of the IC. • How information is collected, retained, analyzed, and disseminated (including access to raw data) to members of the IC community, and other Federal, State, local or tribal governments, or private sector entities. • How often NSL information was used to produce an analytical intelligence product for distribution to the IC community, and to other Federal, State, local or tribal governments. • Whether, and how often, NSL information was provided to law enforcement authorities for use in criminal investigations. • Following enactment of the USA PATRIOT IRA, the number of NSLs issued without the certification necessary to create a nondisclosure obligation. • Types of electronic communications and transactional information obtained under § 2709, and the procedures DOJ, used if content information is obtained.
Feasibility of •Not later than February 1, 2007, or upon completion of the Minimization Procedures: 2003/2004 audit, the Attorney General and the Director of
National Intelligence shall jointly submit a report on the feasibility of applying rninimi7ation procedures to protect the constitutional rights of U.S. persons.
• Report goes to the House Judiciary Committee, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, and the Senate Select Committee on Intelligence.
DELAYED NOTICE SEARCH WARRANTS
Sec. 114. Delayed Notice Search Warrants.
The section changes the procedural requirements for the warrants and increases the oversight of the delayed notice search warrants (18 U.S.C. § 3103a). A major change is the implementation of a 30 day notice requirement, as opposed to the former requirement of "within a reasonable period" of the warrant's execution.
Procedural Changes Related to Delayed Notice Search Warrants: In applicable cases, the FBI (through the U.S. Department of Justice trial attorney or Assistant United States Attorney) must provide the facts to a court to show there is "reasonable cause to believe that providing immediate notification of the execution of the warrant may have an adverse effect." The showing will have to be updated for each extension.
22
FBI020782 ACLURM020991
To: All Divisions From: 'Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Notification Delay No more than 30 days (or a later date certain if facts justify). •undue delay of trial is not a basis for a delayed notice.
Extensions of Delays 90 days (unless the facts justify longer)-- -granted upon an updated showing of the need for further delay.
Reporting Annual reporting to Congress by Court (starting with the fiscal year ending September 30, 2007).
OTHER LAW ENFORCEMENT/CRIMINAL RELATED PROVISIONS
Sec. 104. Section 2332b and the Material Support Sections of Title 18, United States Code.
This section makes permanent the material support of terrorism provisions in section 6603 of the Intelligence Reform and Terrorism Prevent Act of 2004 (18 U.S.C. §§ 2332b and 2339B).
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 110. Attacks Against Railroad Carriers and Mass Transportation Systems.
This section merges wrecking trains (18 U.S.C. § 1992) and attacks on mass transit (18 U.S.C. § 1993) into one section - 18 U.S.C. § 1992. The new law expands the law to cover the planning for such attacks, so it is now a federal crime to surveil, photograph, videotape, diagram, or collect information as part of a plan for an attack.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 111. Forfeiture.
This section expands the authorization to confiscate property located within the United States when it constitutes proceeds used in or derived from trafficking in nuclear, chemical, biological, or radiological weapons technology or material.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 112. Section 2332b(g)(5)(B) Amendments Relating to the Definition of Federal Crime of Terrorism.
This section adds drug trafficking in support of terrorism (21 U.S.C. § 960A) and receiving foreign military-type training from a foreign terrorist organization (18 U.S.C. § 2339D) to the definition of federal crimes of terrorism (18 U.S.C. § 2332b(g)(5)(B)).
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
23
FBI020783 ACLURM020992
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Sec. 113. Amendments to Section 2516(1) of Title 18, United States Code (Title III).
This section adds 20 federal crimes related to terrorism to the list of predicate offenses that may be used as a basis to intercept wire, oral, or electronic communications (18 U.S.C. § 2516(1)). The new wiretap predicates include the following:
• 18 U.S.C. § 37 [violence at international airports] • 18 U.S.C. § 43 [animal enterprise terrorism] • 18 U.S.C. § 81 [arson within special maritime and territorial jurisdiction] • 18 U.S.C. §§ 175, 175b, and 175c [biological agents] • 18 U.S.C. § 832 [nuclear and weapons of mass destruction threats] • 18 U.S.C. § 842 [explosive materials] • 18 U.S.C. § 930 [possession of weapons in Federal facilities] . • 18 U.S.C. § 956 [conspiracy to harm persons or property overseas] • 18 U.S.C. § 1028A [aggravated identity theft] • 18 U.S.C. § 1114 [killing or attempted killing of Federal employees, including any
member of the uniformed services] • 18 U.S.C. §1116 [killing or attempted killing of certain foreign officials, including
internationally protected persons] • 18 U.S.C. § 1992 [attacks on mass transit] • 18 U.S.C. § 2340A [torture] • 18 U.S.C. § 2339 [harboring terrorists] • 18 U.S.C. § 2339D [receiving military-type training from a foreign terrorist
organization] • 18 U.S.C. § 5324 [structuring transactions to evade reporting requirements] • 49 U.S.C. §46504 [assault on a flight crew member with a dangerous weapon] • 49 U.S.C. §46505(b)(3) or (c) [weapons offenses on board an aircraft]
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 122. Prohibition of Narco-Terrorism.
This section makes it a federal crime to engage in drug trafficking to benefit terrorism (amended the Controlled Substance Import and Export Act - 21 U.S.C. §§ 951 et seq.). To prove this crime, the evidence must show that a defendant had knowledge that the person or organization has engaged or is engaging in terrorism.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 123. Interfering with the Operation of an Aircraft.
This section makes it a federal crime to interfere with or disable a pilot or navigation facility operator with the intent to danger or with reckless disregard for human safety (e.g., aiming lasers at pilots) (18 U.S.C. § 32).
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
24
FBI020784 ACLURM020993
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
Sec. 124. Sense of Congress Relating to Lawful Political Activity. .
Congress uses this section to express the sense of Congress that federal investigations should not be based solely upon an American citizen's membership in a non-violent political organization or their otherwise lawful political activity.
Procedural Changes: None at this time. All employees are reminded, however, that neither criminal nor national security investigations of U.S. persons may be predicated solely on the exercise of First Amendment rights.
Sec. 127. Sense of Congress.
Congress uses this section to express its sense that the victims of terrorist attacks should have access to the forfeited assets of terrorists under 18 U.S.C. § 981.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
DATA-MINING ACTIVITIES
Sec. 126. Report on Data-Mining Activities.
This section requires the Attorney General to report to Congress on any Department of Justice (including the FBI) initiative that uses pattern-based data-mining or is developing pattern-based data-mining. Among several topics, the report is to explain how any pattern-based data-mining initiatives collect, review, gather, and analyze information, and how the initiatives will ensure the accuracy of information and protect the privacy and due process rights of individuals.
The statute defines pattern-based data-mining as follows in section 126(b)(1):
(1) Data-Mining.—The term "data-mining" means a query or search or other analysis of one or more electronic databases, where—
(A) at least one of the databases was obtained from or remains under the control of a non-Federal entity, or the information was acquired initially by another department or agency of the Federal Government for purposes other than intelligence or law enforcement
(B) the search does not use personal identifiers of a specific individual or does not utilize inputs that appear on their face to identify or be associated with a specified individual to acquire information; and
(C) a department or agency of the Federal Government is conducting the query or search or other analysis to find a pattern indicating terrorist or other criminal activity.
Procedural Changes:
FBI will participate in preparing the report.
25
FBI020785 ACLURM020994
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
TITLE II - TERRORISM DEATH PENALTY ENHANCEMENT
Among several provisions, this Title adjusts the Sentencing Guidelines to create a term of post-incarceration supervision in connection with a conviction for a federal terrorism crime for any term of years or for life and makes legal counsel available for death-penalty defendants.
Procedural Changes Related to the Terrorism Death Penalty Enhancement: None at this time.
TITLE III - REDUCING CRIME AND TERRORISM AT AMERICA'S SEAPORTS ACT of 2005
This Title strengthens statutes related to seaport and maritime safety. For example, the Title prohibits the maritime transportation of weapons of mass destruction for use in a federal terrorism crime (18 U.S.C. § 2283). Additionally, it prohibits the maritime transportation of , terrorists (18 U.S.C. § 2284). The following highlights some of the new provisions in Title DI.
Sec. 305. Transportation of Dangerous Materials and Terrorists.
This section makes it a federal crime to transport aboard a vessel an explosive, biological agent, chemical weapon, or radioactive or nuclear material with the intent that the material will be used to commit a federal crime of terrorism (as defined in 18 U.S.C. § 2332b(g)(5)(B)).
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 309. Bribery Affecting Port Security.
This section makes it a federal crime to give or take a bribe with the intent to commit international or domestic terrorism affecting port security.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
Sec. 311. Smuggling Goods from the United States.
This creates a new federal crime for illegally smuggling goods from the United States.
Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.
TITLE W - 'COMBATING TERRORISM FINANCING ACT of 2005.
The U.S. Department of Justice indicated that this Title carries forward the overall strategy to stop terrorist-fmancing by making several adjustments to criminal statutes. It accomplishes this goal by enhancing penalties for terrorism financing and prohibiting terrorism financing through informal money networks, including hawalas. Illegal money laundering transmissions (18 U.S.C. § 1960) are now predicates for racketeering (RICO predicate list at 18 U.S.C. § 1961(1). Terrorism financing (18 U.S.C. § 2339C) and the receipt of foreign military
26
FBI020786 ACLURM020995
To: All Divlsions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006
training (18 U.S.C. § 2339D) are now added to the money laundering predicate offense list (18 U.S.C. § 1956(c)(7)(D)). Finally, the Title authorizes the U.S. to confiscate the U.S. property related to certain acts of international terrorism against a foreign government or international organization (18 U.S.C. § 981(a)(1)(G)).
TITLE V - MISCELLANEOUS.
The Title creates a U.S. Department of Justice National Security Division which will be headed by a statutory Assistant Attorney General.
Sec. 506. Department of Justice Intelligence Matters.
This new section establishes a National Security Division (NSD) within the DOJ, headed by an Assistant Attorney General for National Security (AAGNS). This reorganization of DOJ is consistent with a recommendation by the WMD Commission that the "Department of Justice's primary national security elements - the Office of Intelligence Policy and Review, and the Counterterrorism and Counterespionage sections - should be placed under a new Assistant Attorney General for National Security."
On March 2, 2006, the U.S. Department of Justice stated the following: This reorganization would bring together under one umbrella the attorneys from the Criminal Division's Counterterrorism and Counterespionage Sections and the attorneys from the Office of Intelligence Policy and Review (OIPR), with their specialized expertise in the Foreign Intelligence Surveillance Act and other intelligence matters. The new Assistant Attorney General will thus have all three core national security components under his or her control. He or she will lead a dedicated team acting in concert to accomplish their shared mission of protecting the national security while simultaneously safeguarding Americans' civil liberties. The Assistant Attorney General will also serve as the Department's primary liaison to the new Director of National Intelligence, and the new Division will gather expertise from across the Department to create a focal point for providing advice on the numerous legal and policy issues raised by the Department's national security missions.
Procedural Changes: The new Division will contain the Office of Intelligence Policy and Review, the Counterterrorism Section and the Counterespionage sections. The FBI's working relationships with these components will continue as normal. If the U.S. Department of Justice issues specific guidance at a future date, the guidance will be communicated to the FBI.
TITLE VI - SECRET SERVICE AUTHORIZATION AND TECHNICAL MODIFICATION ACT OF 2005.
The Title confirms that the Secret Service is a distinct entity within the U.S. Department of Homeland Security (DHS). Among several provisions, the Title establishes a "rolling" no trespass zone for individuals under Secret Service protection. It also prohibits fraud in connections with U.S. identification documents issued for a presidentially designated nationally significant event.
Procedural Changes Related to the Secret Service Act: None at this time. If necessary, additional guidance may be issued in the future.
27
FBI020787 ACLURM020996
To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006
TITLE VII - COMBAT METHAMPHETAMINE EPIDEMIC ACT OF ' 2005.
Congress meant to provide a comprehensive approach toward controlling the methamphetamine problem. This Title increases the regulation of domestic and international commercial transactions in mothamplactamine precursor chemical and enhances the criminal sanctions for methamphetanaine related crimes, including the smuggling and selling of methamphetamine. For example, the Title requires sale of products containing ephedrine, pseudoephedrine, and phenylpropanolamine be limited to a 3.6 grams per customer per day, and the products be available only "behind the counter" at sales locations.
Procedural Changes Related to the Combat Methamphetamine Epidemic Act of 2005: None at this time. If necessary, additional guidance may be issued in the future.
Questions and Additional Information: 6
The National Security Law Branch is available to answer questions about b bC
this legislation. In addition, materials relating to the new legislation will be posted on the NSLB FBI Intranet website, which can be found through the FBI Office of General Counsel website.
LEAD(s):
Set Lead 1: (Action)
ALL RECEIVING OFFICES
Read and Clear
.•
28
FBI020788 ACLURM020997
lb 7E
(U) Additional information about 415 policy cambia found on the FBI Intranet at: (SI
JTFF CBT
Page 1 of 1
sTCOTTrtraretw-
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
415 Policy
(U) International Terrorism investigations are classified as 415 investigations. 415 investigations are national security invaaUgadona that auppert. the FBI's priority t' protpct the United States from terrorist attack. This goal drives the Counterterrorism Division's (CTD's) mission to prevent, disrupt, and defeat terrorist operations. The nature of International Terrorism investigations must focus on:
QUIT:: PREVIOUS:: NEXT PAGE: 21 OF 25
.saumasio,Lizosoax
file://DAjttfoV2\modulenm5200.htm 8/8/2011
FBI020789 ACLURM020998
JTFF CBT.
JOINT TERRORISM TASK FORCE (7TTF)
ORIENTATION
bst.tcz177 Nurutum
Introduction To Foreign Intelligence And Terrorism
266 Policy (U) Criminal Domestic Terrorism investigations are classified as 266 investigations. The 266 classification includes any imestigationn cf a criminal act which involves an indlYidual(s) who seeks to further political and/or social goals through activities that involve the use of force or violence and violate federal law. The 266 classification was developed to focus on the specific criminal activity of domestic terrorists. If a criminal violation on the part of a person(s) affiliated with a domestic terrorist group is determined to have occurred, is occurring, or is about to occur, then a criminal investigation should be opened under this classification.
QUIT:: PREVIOUS :: NEXT PAGE: 22 OF 25
szeasaVotseiteas.
.b7 E
file://DAjttfoV2\module5\m5_210.htm
FBI020790 ACLURM020999
JTFF CBT Page 1 of 1
SECItrittirereem-
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
Field Intelligence Group (U) The Field Intelligence Group (FIG) oversees a field office's analytical program. The FIG constitutes a mechanism for providing oversight of int-6111gal= collection, analysis, and dissemination. The FIG provides direction as to collection requirements, analysis that crosses multiple operational squads, and dissemination of Information and analysis.
QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 25
-srenTrtsoresti
file://D:\jttfoV2\module5\m5220.htrn 8/8/2011
FBI020791 ACLURM021000
JTFF CBT
Page 1 of 1
—seelerrttiverem-
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Introduction To Foreign Intelligence And Terrorism
FBI Intelligence Analysts (U) Intelligence analysts provide both strategic and tactical support to investigations. Analysts are charged with identifying intelligence gap:, and dcvdcping strategies for filling those gaps. Analysts can help acienti make connections between their cases and developments within the intelligence community'
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 25
SIMIZSrfritiegeat
file://DAjttfoV21module5\m5_230.htm 8/8/2011
FBI020792 ACLURM021001
b7E
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
LEDdltddattodule5tm5_130.htm — — — — — Flo Edt Van Fowles Tools Help
•$;,. Paved:es ,`,4 RE Intranet . . _
003ffor - - Pas" 51e0 Tod" ft•
4. X FPLI.estDr..,
'4k. tt00% My Ccaptter
6" JIFF cra "1-14w1b; txitia."
afifF CBT- Windows Internet Explorer
FBI020793 ACLURM021002
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg-
JTFF CDT - Windows Internet Explorer b7E
DARRoVEtroodtk5tro5_2:30.httn 4.0 I.1" X 135•7.: ari LP . . .
Re EcR Mew Favccies To Help — - •
t„? Fermatas d, FEE Intranet 431FF CDT -0 - Paps • Sictr., Tees. ca-
b7E -
rt,
9 mr ccarder
tt00% - •
TIFF asT r2;;;12..rigil,
FBI020794
ACLURM021003
r.,:,JTFF CDT - Windows Internet Explorer nag
j 311R3 CDT al • CI t"7 ( - Pap • may • Talc • e•
" Cam:tier 68. goon -
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB/ stp/ 1sg
-,•—•t•••■ 091_,DAltdordinoddoEWL,230.11bn
Ho Ea Mow Rocas' Toob Help
* Favodes I •,,4 iR31Inkranet
b7E
BFF CUT f<::ra'ft.:7 -40 T. •ci
b 7E
FBI020795 ACLURM021004
v1.414 X4.10 vms..et-. MUttforitmodule5bn5,23o.htin
tit • Page. Wet), Tcob • re.
Fib C4 Haw Favortos Toob Hob
*Fawkes 443 CFINIntranet
gt3TFF011
'siagrai.; N4, JIFF air , . it,r4w...rgrpuf, 111D=1111C,
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ otp/ lsg
b7E
tkatComoubs 4's •, *Jam -
r I_
aJTFF CET-Windows Internet Explorer ,
b7E
Ti
be.
FBI020796 ACLURM021005
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
a - 0 0 - Safety -
DARdoMmodule51,m5,130.1Arn
Fie Edit View Pewits Took Help
Fmordes i t, FBI Menet
SJIFF CBT
gPlYtefroder 4 - 4Ftton
b 7 E aJTFF COT • WindowsInternet Explorer
1 b 7 E
3TFF CGT., t.,; '';
FBI020797 ACLURM021006
FBI020798
JTFF CBT Page 1 of 1
Introduction To Foreign Intelligence And Terrorism
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://DAjttfoV21module5\m5_240.htm 8/8/2011
smart/7'VMM'
Module Review (U) The Intelligence Community is a federation of Federal Government agencies, services, bureaus, and other organizations within the executive branch that play a role In the collection end dissemination of national intelligence.
FBI intelligence policy includes:
• AG Guidelines • National Foreign Intelligence Policy • I I • DIOG • 315 Policy • 266 Policy
(U) Intelligence Analysts provide both strategic and tactical support to investigations.
PREVIOUS :: FINISH MODULE PAGE: 25 OF 25
—66G1i6134.44160104-
b E
ACLURM021007
JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ 1sg ON 10-14-2011 Page 1 of 1
r..tatc, tytiereeN
JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance
ORIENTATION
Overview Of Instructional Goals And Objectives (u) Goal: The goal of this module is to introduce the new task force member to the physical surveillance techniques utilized by the FBI In the fight against domestic and International terroriam-
(U) Objectives:
1. Read and review an overview of physical surveillance. 2. Read and review an overview of) 3. Gain a basic understanding of enemy surveillance techniques.
EXIT rODULE :: NEXT PAGE: 1 OF 31
SEMEMICIRMIN
file://D:\jttfoV2\moduleam6_000.htm 8/8/2011
b7E
FBI020799 ACLURM021008
JTFF CBT
Physical Surveillance
--fs36PRALAILIEW2L
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
b7E
FBI020800
file://a\jttfoV2\module6\m6_010.htm
Bureau Surveillance Overview PhjElsaiiurveillance
(U) Physical surveillance is a proactive investigative technique utilized to develop intelligence vital to the detection and prevention of acts of terrorism and espionage, as well as provide evidence needed in the prosecution of parties responsible for criminal activity. Surveillance coverage can be used for the following purposes:
QUIT:: PREVIOUS:: NEXT PAGE: 2 OF 31
• SUUZIf/NVVVUM
ACLURM021009
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
SEE
Physical Surveillance
Bureau Surveillance Overview Physical Surveillance (Con't)
PAGE: 3 OF 31 secgrrh410FJ2LN •
file://DAjttfoV2\module6\m6020.htm
FBI020801 ACLURM021010
JTFF CBT
Page 1 of 1
JOINT TERRORISM
Physical TASK FORCE (inn
Surveillance
ORIENTATION
Bureau Surveillance Overview Surveillance Restrictions
(U) There are to be no surveillances conducted in unless specific authority is obtained from the Assistant Director of the FBIHQ Division responsible for the investigation. Assistant Directge in Charge. SACS. or ASACs. WFO. may anorove on an emeraency basic a surveillance to be conducted in' J with written notification within 24 hours to the Assistant Director of the appropriate FBIHQ Division. If a surveillance is authorized, there are not to be contacts with the individual(s) being surveilled, other law enforcement personnel or other individuals in the area.
1D7E
QUIT:: PREVIOUS NEXT
PAGE: 4 OF 31
SEC an—
file://DAjttfoV2\module6\m6_030.htm 8/8/2011
FBI020802 ACLURM021011
JTFF CBT
Page 1 of 1
stemTvtarnrORN
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Bureau Surveillance Overview
b 7E
QUIT :: PREVIOUS :: NEXT PAGE: 5 OF 31
—3EtErrtfrteremer-
file://DAjttfoV2\module6\m6_040.htm 8/8/2011
FBI020803 ACLURM021012
JTFF CBT
Page 1 of 1 •
MECIterhtteretiff
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Bureau Surveillance Overview
b 7 E
QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 31
—3=1TE1777/13FORR
file://DAjttfoV2\module61m6_060.htm 8/8/2011
FBI020804 ACLURM021013
JTFF CBT
Page 1 of 1
S1031/INUNUEN
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
Bureau Surveillance Overview
:b7E
QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 31
SECRET//NOFORN
file://DAjttfoV2\module6\m6_070.htm
8/8/2011
FBI020805 ACLURM021014
8/8/2011 file://D:\jttfoV2\moduleam6_080.htm
JTFF CBT Page 1 of 1
Physical Surveillance
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
.b7 E
Bureau Surveillance Overview
QUIT :: PREVIOUS :: NEXT
PAGE: 8 OF 31 —szeftermievress.
FBI020806 ACLURM021015
JTFF CBT
Page 1 of 1
LECRZWILONerettN
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Bureau Surveillance Overview
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 9 OF 31
—13Bererf-fRffaill
file://DNttfoV2\module6\m6090.htm 8/8/2011
FBI020807 ACLURM021016
JTFF CBT
ntraff-ftteeePal
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Bureau Surveillance Overview
QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 31
file://DAjttfoV2\mociule6\m6_100.htm
FBI020808
Physical Surveillance
ACLURM021017
FBI020809
Page 1 of 1 JTFF CBT
Physical Surveillance
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
b7E
file://DAjttfoV2\module6Arn6_110.htm 8/8/2011
Bureau Surveillance Overview
QUIT:: PREVIOUS :: NEXT PAGE: 11 OF 31
bZUVSTI/NOFORN
ACLURM021018
JTFF CBT
SECUVAIGEARN
JOINT TERRORISM TASK FORCE (JTTF)
0 RIENTATIO N
Bureau Surveillance Overview
file://DAjttfoV2\module61m6_120.htm
QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 31
-19BeEtWILHINNERMI-
FBI02081 0
Physical Surveillance
ACLURM021019
JTFF CBT
Page 1 of 1
3OINT TERRORISM
Physical TASK FORCE (3TTF)
Surveillance ORIENTATION
Bureau Surveillance Overview
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 31
--EMEIREW-ANOVOiel
file://D:\jttfoV2\module6\m6_130.htm 8/8/2011
FBI020811 ACLURM021020
.1TFF CBT
Page 1 of 1
AmrpRT//NOFORN
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
Bureau Surveillance Overview
lb 7E
QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 31
—00:::termtemaN
file://DAjttfoV2\module6\m6_140.1itm
8/8/2011
FBI02081 2 ACLURM021021
JTFF CBT
-srmr-MtlFORIT JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Bureau Surveillance Overview
Physical Surveillance
QUIT:: PREVIOUS :: NEXT PAGE: 15 OF 31
SE
file://D:\ittioV2\moduleam6150.htm
FBI02081 3 ACLURM021022
JTFF CBT
Page 1 of 1
JOINT TERRORISM TERRORISM Physical TASK FORCE (JTTF) Surveillance
ORIENTATION
Bureau Surveillance Overview
137E
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 31
--smeRLPTHNeumus
file://D:\jttfoV2\module6\m6_160.htm 8/8/2011
FBI02081 4 ACLURM021023
J 11-T CBT
Page 1 of 1
--sagipartmurm
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Bureau Surveillance Overview
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 31
"Eintrrii-AiGEORN
file://DAjttfoV21module6\m6_170.htm 8/8/2011
FBI02081 5 ACLURM021024
JTFF CBT
Page 1 of 1
SsesePHIPaPORN
JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance
ORIENTATION
Bureau Surveillance Overview Survcillancr.LLcris
(U) A surveillance log should be maintained for the purpose of documenting observations made during surveillance. The log is a chronological narrative detailing the observations noted during the surveillance. Prior to initiating the surveillancera team member should be assigned to writing the log. At the end of the shift each individual should initial on the log the notations of the activities he/she observed. Completed logs should be Incorporated into the case file and indexed. Original notes should be permanently retained in a 1A envelope (FD-340a). Logs should be concise and factual. When reporting locations, be as specific as possible. Avoid over-reporting or including unnecessary information since logs are subject to scrutiny in legal proceedings. All surveillance logs should be reviewed for accuracy since inaccuracies could be used by the defense to potentially discredit testimony.
(U) See this note regarding the alternative use of the FD-302.
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 31
-7-7ECitrrrtfraSOSN
file://DAjttfoV2\module6\m6_180.htm 8/8/2011
FBI02081 6 ACLURM021025
OBSERVATIONS TIME INITIALS
FBI02081 7
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
DATE DAY WEATHER CASE #
A Photographic/Physicd1 surveillance W?3=1 conducted in the vicinity of
by the following agents:
During this surveillance, the following observations were noted:
PAGE OF
ACLURM021026
,p '71 .71 it:. X • p leo Cs, DAjttfonlmodule6Wm6_180.htin
Fie Edd View Favorites Toole He
1:1 Favorites j T,4 FBI [rennet
- _ _ ,16 JIFF COT 0 ms pace- Safety • Tods ■
JTFF CDT - Windows Internet Explorer
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
b7E
bquia (U) Some field offices prefer to have the log Incorporated Into a FD-302. The AU Is maiaied i,1 C.,d;:ztleg the purpose of the surveillance, the names of the subjects or targets and any other pertinent activities to be surveilled. Followed by a listing in a chronological order of the times with a short or brief notation of the observation or description of the event. This will be followed by the name of the SA (s) who made the observation. Eventually the 302 is initialed by each member of the surveillance team after each one has reviewed the 302. This is done because the 302 will eventually becomes part of the prosecutive package and it Is also entered into ACS for future reference. Once the 302 Is entered into ACS, there Is an official record of the surveillance results. The original notes are kept in the 1A Envelope as any interview done by the Agent.
is*
My Carcoter
fttozi, ,:c6i0;7; a • qk loos,
FBI02081 8 ACLURM021027
JTFF CBT Page 1 of 1
Physical Surveillance
JOINT TERRORISM TASK FORCE (JTTF) • ORIENTATION
b7E
8/8/2011 file://DAjttfoV2\module6\m6_190.htm
FBI02081 9
S 1.../SCA 1 Mtn
Bureau Surveillance Overview
QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 31
• Bettrth°147070107
ACLURM021028
JTFF CDT - Window, Internet Explorer
tp
dog! DARtkertifood4e606_190.htm
Edd View Fatal:es Took Help
1,:t• Fayostes c:74 Fal Intranet
jgglIFFarr ci - Pew Safety Took ■ Q-
oc 60;
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg
FBI020820 ACLURM021029
.44 Favorites I 4, Liu Intranet ---
J1613TFF CST a • sz tip Papa safety. Tools. 41.),•
MyCoropttar fa .0 Atom
FBI020821
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 EY 65179 DMS/ stp/ Isg
b7E
0_1-FEE CBT- Windows Werner Explorer
v cobttroVArrodiagro6_190.1vso
Fla Ed View Favorkos Tools Help
b7E
• MIFF ,:(11 p-; • 74;12"51"1"1::
4-1- X.
ACLURM021030
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Bureau Surveillance Overview
b 7E
QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 31
SECEESIAMEWORW--
file://D:\jttfoV2\module6\m6220.htm 8/8/2011
JTFF CBT
Page 1 of 1
SEC FORK
FBI020822 ACLURM021031
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 31
—3ELVILPT7'74143VEGGI
file://D:\jttfoV2\module6\m6_230.htm 8/8/2011
JTFF CBT
Page 1 of 1
SHeRBIWiterazer
FBI020823 ACLURM021032
FBI020824
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
• ORIENTATION
Physical Surveillance
b 7E
file://D:\jtifoV2\module6\m6240.htm 8/8/2011
SEETWIYYMPOEN
QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 31
ACLURM021033
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
b7E
QUIT PREVIOUS :: NEXT PAGE: 23 OF 31
-8Befilif#4391;GAN
file://DAjttfoV2\module6\m6_250.htm 8/8/2011
JTFF CBT )
Page 1 of 1
—§ZETEEIMstrropar
FBI020825 ACLURM021034
JTFF CBT
Page 1 of 1
seeme7y,mross
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
Enemy Surveillance Techniques
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 31
SECRET//Nomomi
file://attfoV2\module6\m6_260.htm 8/8/2011
FBI020826 ACLURM021035
JTFF CBT
Page . 1 of 1
—SECTMT7YNAPARN•
JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance ORIENTATION
Enemy Surveillance Techniques
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 25 OF 31
—61MTI-tmesoss
file://D:\jftfoV2\module6\m6_270.htm 8/8/2011
FBI020827 ACLURM021036
JTFF CBT
Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
Physical Surveillance
Enemy Surveillance Techniques
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 26 OF 31
—saeasstfaerelar
file://DAjttfoV2\module6\m6280.htm 8/8/2011
FBI020828 ACLURM021037
JTFF CBT
Page 1 of 1
szewrriPMECIREr
JOINT TERRORISM
Physical TASK FORCE ()TTF)
Surveillance
ORIENTATION
Enemy Surveillance Techniques
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 31
—SECaseHtioNOIN
file://DAjttfoV2\module6Am6_290.htm 8/8/2011
FBI020829 ACLURM021038
JIFF CBT
Page 1 of 1
—SErwrfluepess JOINT TERRORISM
Physical TASK FORCE (JTTF)
Surveillance
ORIENTATION
Enemy Surveillance Techniques
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 31
99€ROVHINK:6141--
file://D:\jttfoV2\module6\m6_300.htm 8/8/2011
FBI020830 ACLURM021039
JTFF CBT
Page 1 of 1
SBOARGOONOVORN
JOINT TERRORISM
Physical TASK FORCE (3TTF)
Surveillance
ORIENTATION
Enemy Surveillance Techniques
.1D7E
QUIT :: PREVIOUS :: NEXT •
PAGE: 29 OF 31 —saannetHwenronm-
file://D:\jttfoV2\module6\m6_310.htm 8/8/2011
FBI020831 ACLURM021040
Page 1 of 1 JTFF CBT
Physical Surveillance
JOINT TERRORISM TASK FORCE (7TTF)
ORIENTATION
Enemy Surveillance Techniques
8/8/2011 file://D:\ittfoV2\module6\m6_320.htm
FBI020832
seemiphimumabt
.b7E
QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 31
-SBESIBESLAIGEORN
ACLURM021041
Page 1 of 1 JTFF CBT
8/8/2011 file://DAjttfoV2\module6\m6_330.htm
FBI020833
-affeaseftwereettr
JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance
ORIENTATION
Module Review • Physical curve:Hence is a prOaCtlYe investigative technique utilized to develop intelligence vital to the
detection and prevention of acts of terrorism and espionage, as well as prcv:dc evidence. needed in the prosecution of parties responsible for criminal activity.
•
• b7E
PREVIOUS :: FINISH MODULE PAGE: 31 OF 31
L'Etztes4,0ICCLE2N
ACLURM021042
JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg Page 1 of 1 ON 10-14-2011
Met HeiGEGJAN
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
Overview Of Instructional Goals And Objectives ai) Zeal: The goal gf this module is to introduce the new task force member to the investigative techniques that may be used when developing] and/or coiled:1Po information/intelligence and gvidence!
Objectives:
1. Read and review the investigative techniques:
2. Lad and review the policies and procedures of Subpoena, and an Administrative Subpoena.
3. Read and review! 4. Read and review the policies and procedures off 5. Gain a basic understanding of! 6. Read and review the FBI's policies and procedures Tgardingl
7. Gain a basic understanding of who can assist inl 8. Read and review the units that comprise! 9. Gain a basic understanding of how to
10. Read and review!
EXIT MODULE :: NEXT PAGE: 1 OF 37
—Breftrrhlif0908111—
I a Grand Jury
b7E
b7E
file://DAjttfoV2\module71m7_000.htm 8/8/2011
FBI020834 ACLURM021043
JTFF CBT
Page 1 of 1
ralatb 011.1 UISLY
JOINT TERRORISM
Investigative TASK FORCE OTTO
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 2 OF 37
"riERETAMOZON
file://DAjttfoV2\module7\m7_010.htm 8/8/2011
FBI020835 ACLURM021044
-seemehittereittr
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 37
sffelZIMMoseter
file://1):\jttfoV2\module7m7_020.htm 8/8/2011
JTFF CBT
Page 1 of 1
FBI020836 ACLURM021045
JTFF CBT
Page 1 of 1
--szeteBoAisozsm_
QUIT:: PREVIOUS:: NEXT PAGE: 3 OF 37
aLLuNL/fnurvalm
file://DAjttfoV2\module7\m7020.htm 8/8/2011
b7E
FBI020837 ACLURM021046
. 4 tt.*ST Sres ILS; DAit tforZsoodiono7_020.11tso
Q a pa,e• sdely. Tod,. e.
Flo Ea VIM Favortos Tools Help
Lc Favodes I 4 FR Intrestot
0311.F aBT
g FyCanptker 4- Aloft • :TIFF CGT .„ ititserR' lfZ471,0:"‘,C,
ALL INFORMATION CONTAINED . HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg
JIFF CDT -Windows Internet Explorer
1b7E
FBI020838 ACLURM021047
FBI020839
JTFF CBT Page 1 of 1
Investigative Techniques
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
b7E
file://DAjttfoV2\module71m7_030.htm 8/8/2011
—sremintHiwaalial
QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 37
SECRETI-MOPORN
ACLURM021048
JTFF CBT
Page 1 of 1
1EMZET174064:08g
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS:: NEXT
PAGE: 5 OF 37 streRZTrinoretel
file://D:\jttfoV2\module7\m7_040.htm 8/8/2011
FBI020840 ACLURM021049
)DINT TERRORISM
Investigative TASK FORCE ()TTF)
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 37
—SzeRrthitiescas
file://DAjttfoV2\module7\m7_050.htm 8/8/2011
JTFF CBT
Page 1 of 1
SELVETtnI0Feati
FBI020841 ACLURM021050
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Investigative Techniques
b7E
FBI020842
-13961:1B1PhiNGUARIT
QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 37
••666RDWALIMiefai•
file://DAjttfoV21module7\m7_060.htm 8/8/2011
ACLURM021051
b 7 E
C-A,01)
V MyCaroder 4.- title%
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMHY stp/ lsg
b 7 E
• 7TFF.r.61'•7.1., 12.•;'P.M
PC: v'r4r:, X. FDIVItioV2Vaoctie7lra7._050.1131
Flo Edit View Favortes Tools Itip
ys Favorites I g; F1311rtranst
SNIP CU 0 • 0 3 j - Pape. Sdrly • Tads • $.
I i • MEMINION
C JIFF CBT Windows Internet Exptorer nom,
FBI020843 ACLURM021052
JTFF CBT
Page 1 of 1
—SECRIGEORN
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 8 OF 37
—9BeREPIHNOPOrel-
file://D:\jttfoV2\module7\m7_070.htm 8/8/2011
FBI020844 ACLURM021053
QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 37
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Investigative Techniques Techniques
—szczczw,i744Gxesei
b 7E
.file://D:\jttfoV21module7\m7_080.htm 8/8/2011
FBI020845 ACLURM021054
JTFF CBT Page 1 of 1
--grcrtriWiwacaz JOINT TERRORISM Investigative TASK FORCE ()TTF) Techniques
ORIENTATION
QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 37
file://DAjttfoV2\module71m7_090.htm 8/8/2011
FBI020846 ACLURM021055
b7
ITFF CBT Page 1 of 1
--SECKETHifeEIORDI
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Investigative Techniques
QUIT:: PREVIOUS :: NEXT PAGE: 11 OF 37
-szeitesHaoscall
file://DAjt-IfoV2\module7\m7_100.htm 8/8/2011
FBI020847 ACLURM021056
QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 37
JTFF CBT
Page 1 of 1
-seeterrtMerolui
JOINT. TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
—seemefrrnormar
file://attfoVamodule71m7_110.htm 8/8/2011
b7 E
FBI020848 ACLURM021057
JTFF CBT Page 1 of 1
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
b7 E
QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 37
-- •,BeRelPiLHOeigNahl•
file://D:\jttfoV2\module7\m7_130.htm 8/8/2011
FBI020849 ACLURM021058
.1TFT CBT
Page 1 of 1
—SECHETfttieFGRII.
JOINT TERRORISM
Investigative TASK FORCE (3TTF)
Techniques ORIENTATION
'b7 E
(U) Click here to see an example off
QUIT :: PREVIOUS :: NEXT PAGE: 15 OF 37
"SSCREThctiogoim-__
file://D:\jttfoV2\module7\m7_140.htm
8/8/2011
FBI020850 ACLURM021059
TTFF CBT Page 1 of 1
seeivaipiat
JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques
ORIENTATION
(U) Grand Jury Subpoena (U) Grant Jury Subpoenas are issued in criminal matters and obtained from the USA's Office. Service of the Grand Jury. Subpoena is done either by the case Agent, ahother law enftitcernent officer or an Investigative Analyst. Document the serving of the Grand Jury Subpoena and the results of serving the subpoena on the same communication - for example, a FD 302 andLor an EC.I b7E
(U) If utilizing Grand Jury Subpoenas, do not! b7E . The Case. Agent may share the results of a Grand Jury Subpoena only with individuals who are on the 6(e) list with the case. To get on the 6(e) list, the Case Agent contacts the AUSA assigned to the case.
(U) While conducting an investigation, once an indictment has been returned, Grand Jury Subpoenas can no longer be used.
(U) Reminder: The use of certain investigative techniques may require disclosure to the subject, such as
Law Branch Federal Grand JurySrooenas. Investigators should consider and consult with thi USA's Office, National Security and/or Chief Division Counsel, and the substantive unit in the Counterterrorism Division regarding these potential disclosure requirements when selecting an investigative technique.
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 37
—0ECREMAMBEORN
file://DAjttfoV2\module71m7_150.htm 8/8/2011
FBI020851 ACLURM021060
JTFF CBT
Page 1 of 1
—StlI2LKWHOPEAUT
JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques
ORIENTATION
(U) Administrative Subpoena (U) Administrative Subpoenas (FD-617) are used only in criminal investigations involving violations of the Controlled Substances Act (Title 21), Health Cera Fraud, and Child Pornography.
(U) Restraint should be exercised in the use of the Administrative Subpoena, as it is not al Primary use of the Administrative Subooena will be
(U) The Administrative Subpoena is printed in two copies, original and attested copy. The original with executed return of service will be kept in the case file. The attested copy should be served to the person named on the subpoena. A copy of the Administrative Subpoena is 'electronically" placed in the respective division subfiles. The Program Supervisory Special Agent or the ASAC signs Administrative Subpoenas.
(U) A FD-302 should be prepared on the service and results of the Administrative Subpoena. An Investigative Analyst (IA) can prepare and serve the Administrative Subpoena when provided with the appropriate information from the Case Agent. Further, the IA will prepare a FD-302 on the results on the Administrative Subpoena.
QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 37
SECREIHROPORN
file://DAjttfoV2\module71m7_160.htm 8/8/2011
b7E
FBI020852 ACLURM021061
JTFF CBT
Page 1 of 1
MR611.'4140E0=
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
(U) Administrative Subpoena (Cont)'
(U) Information acquired as a result of an Administrative Subpoena is not 6(e) material. Like Grand Airy subpoenas, once an indictment is returned, Administrative Subpoenas can no longer be used to acquire records. Trial subpoenas or court orders remain the only options post Indictment. Authority to compel attendance and testimony of witnesses, and require records production relevant to controlled substance investigations may be granted by the SSRA, OC/DP SSA, or ASAC.
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 37
file://DAjttfoV21module7\m7_170.htm 8/8/2011
FBI020853 ACLURM021062
JTFF CBT
Page 1 of 1
LA.& x/ biuruittv
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 37
--SECTerrHNOVefill
file://DAjttfoV2\module7\m7_180.htm 8/8/2011
FBI020854 ACLURM021063
CBT Page 1 of 1
SEeRRTNNOPOIDI
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
file://DAjttfoV2\module7\n7_190.htm 8/8/2011
FBI020855
QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 37
ACLURM021064
b 7E
gJTFF CBT Windows Internet Explorer
.71011/111111111111111111Mil YMN
Mr Cormier fa - Alm
FBI020856
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stp/ lsg
v FE. rottlforapoduleAre_190.atm
Fie Edit View Favortes Tools Hdp
*Pavates I 1;o FBI gitianet
ii43TFF CDT
L
-0 Page • Sdety • Toole • 0. " (t11) Eacample
t. T7j
b7 E
3TFF WI., • )7 ' ,
X
ACLURM021065
JTFF CBT Page 1 of 1
Investigative Techniques
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
.1D7E
8/8/2011
FBI020857
file://DAjttfoV2\module71m7200.htm
-1366Pailili-PECZOML
QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 37
tzetesehitievem
ACLURM021066
Page 1 of 1 JTFF CBT
Investigative Techniques
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
b7E
file://DAjttroVamodule7\m7_210.htm 8/8/2011
FBI020858
seeterri-/MonT
QUIT :: PREVIOUS :: NEXT PAGE 22 OF 37
szeturrfittereftif
ACLURM021067
p JTFF CBT - %yin(lows Internet Explorer
64,70° 0[7:71tfor4mockieno),,210.bee
No Extt View Fevortes Tads Help
FBI020859
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMIL/ stp/ 1sg
* Favorites I'7;4 1L FBI totienot _ j ORM ® r r
- Q 0 6 - Peas • Sidi • To* ■ 0 •
b7E
.12 Hy Carlotta
(....1TFF • Vi
fa - Ion •
b7E
ACLURM021068
.TTFF CBT
Page 1 of 1
szerarryymeeem
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques
ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 37
szcrarrtenterem-
file://DAjttfoV2\module7\m7_220.htm 8/8/2011
FBI020860 ACLURM021069
t ‘ ; DAlttfoVnmoddennT,220.htro
Fie EA Hew Fowles To Fklp
*Fawkes V,13 CRilltnlronet
*NIT or
La.s S•re.1
0 • 0 • Paps. Safety. Tools
g ltiCarouter • (ra • tICOS4 -
FBI020861
0-1TFF CBT -rindows Internet Explorer
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stp/ 1sg
b7E
b7E
ACLURM021070
JTFF CBT
Page 1 of 1
seenterfryitgerette
JOINT TERRORISM
Investigative TASK FORCE (3TTF)
Techniques 0 RI ENTATIO N
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 37
file://D:\jttfoV2\module7\m7_230.htm 8/8/2011
FBI020862 ACLURM021071
JTFF CBT
Page 1 of 1
—SLITICEOSORIL
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques
ORIENTATION
1137E
QUIT :: PREVIOUS :: NEXT
PAGE: 25 OF 37 –SECRETI-tiffireati
file://DAjttfoV21module7\m7_240.htm 8/8/2011
FBI020863 ACLURM021072
JTFF CBT Page 1 of 1
Investigative Techniques
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
.b7E
(U)
(U)
file://DNitfoV2\module7m7_250.htm 8/8/2011
FBI020864
(See Note)
QUIT :: PREVIOUS :: NEXT PAGE: 26 OF 37
—seeRETtttrortmer
ACLURM021073
.TTFF CBT Page 1 of 1
file://D:\jttfoV2\module7\m7260.htm 8/8/2011
FBI020865
-szaRrrtmerrefef
JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques
ORIENTATION
QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 37
ACLURM021074
JTFF CBT Page 1 of 1
file://DAjttfoV21module7\m7_270.htm 8/8/2011
FBI020866
—szeRRTHeeizawq
JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques
ORIENTATION
QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 37
ACLURM021075
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-16-2011 BY 65179 Diel/ stp/ 1sg
r
• Q Q t - Pace.. Safety. Tods• *
(g_Mteceetaimileno.pahtm Edt Vlon Pavortas Torts Hob
rowdies I PDt /*and .
JIFF 03T
JTEr EDT• Windows Internet Explorer
b 7 E
pt, Corata eg • ! ft,100% •
*.let riff fk.Z2).2A, I At v,;
FBI020867 ACLURM021076
C JTFF COT - Windows Internet Explorer
ksv v Et, IntifeArArrcctier,ratrtahtat
FTe Edt Men Fawkes loots Help
*SyncIto y3 tj FBI Lima
faJIR.CEIT - 0 (92 - pap - Safety Teals "
x: rprve 5:414
WrirZilaMZET21 4 loon -
b7E
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stpJ lsg
FBI020868 ACLURM021077
JIFF CBT
Page 1 of 1
teeRBESYNGFAA11-
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
(U)
CU)
CU)
b 7 E
QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 37
—sHeassAmosolaa-
file://DAjttfoV2\module7Nre 280.htm 8/8/2011
FBI020869 ACLURM021078
9 Ft/CoXttef - ea •- Al0f01.
. ra ■ :2,5 3 .$1411azgh;:, "GROASW,
FBI020870
DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-21-2011
a_ITFE CETI -IlintiowE Internet Explorer
ogvz ,41, e DeLlttfoVAroodrie7ya7,/801bn
Fib Frit New Favorites Tack Help
*Revokes 1.7,4 .t,FetInbarost
gi3IFF CBT
ID) r X
(11) -- X
-- -- x
CU)
b7E
.V•
Par. Safety. Teak.
ACLURM021079
JTFF CBT
Page 1 of 1
szaaaityyrtoraraT
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques ORIENTATION
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 37
394:0464114410.1=1
file://D:\jttfoV2\module7\m7 290.htm 8/8/2011
FBI020871 ACLURM021080
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Investigative Techniques Techniques
.b 7E
QUIT :: PREVIOUS :: NEXT PAGE: 31 OF 37
WeRviikANGEOEIL
file://D:\jttfoV2\module7km7__300.htm 8/8/2011
FBI020872 ACLURM021081
of 1 Page 1 JTFF CBT
b7 E
FBI020873
sECP"P4(.1"181347
QUIT :: PREVIOUS :: NEXT PAGE: 32 OF 37
F) TATION
JOINT TERRORISM TASK FORCE (3TT
ORIE
Investigative Techniques
—SECRLATHOGEOIN
file://D:\jttfoV2\module7\m7_310.htm 8/8/2011
ACLURM021082
JOINT TERRORISM
Investigative TASK FORCE (3TTF)
Techniques ORIENTATION
(U) Analysis (U) Intelligence Analyst and Financial Anclyzts are available to review and analyze:
QUIT :: PREVIOUS :: NEXT PAGE: 33 OF 37
bck.itz.i.//rtun
••■
, file://DAjttfoV2\module7Vn7_320.htm 8/8/2011
(U) An EC must be prepared setting a lead for their assistance.
.1)7E
JTFF CBT • Page 1 of .1
—t3BEFIE1674/1080IiN
FBI020874 ACLURM021083
-szeiteehtilesons
JOINT TERRORISM
Investigative TASK FORCE (3TTF)
Techniques ORIENTATION
(U)
(U)
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 34 OF 37
SEMBISLAMEaRN
file://D:\ittfoV2\module7\m7_330.htm 8/8/2011
JTFF CBT
Page 1 of 1
FBI020875 ACLURM021084
int • cl • Page • Sehty • Teak. (O.
JTFF CDT • ylindows Internet Explorer
fgv73v OMW0AWOJenra_MOJIM
He &It %Sim Famdas Mob Firdp
Feriontes la FM Wand
MP CST
4. twos - - Iticaaxter
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED • DATE 10-21-2011 BY 65179 DMH/ stp/ 1sg
b7E
=linrirfc rrItIral acnartc of tarrnrIcrn InvactInal-lva offortc In rwran1- and future mainr COAI".
Pei
taSPq
11 47) 4.1q.
FBI020876 ACLURM021085
FBI020877
lAttfoVArnock1enm7330.1tss
Re EcEt View Favorlbss Tools He
FsroxItes 1;4 FBI Intranet
I TEM OBI -at - - Paps Safety. 'Ws. 4), "
4.• x LS4.1
•ea - 41,100% • V Pt/Computer
b 7 E
DECLASSIFIED BY 65179 DMH/ stpj 1sg ON 10-25-2011
milminmenimmemiemmurgr- niM aJTFF CDT - Slindows Iniernet Cxploter
Vi 1.2t)PVI
ACLURM021086
L__
*4g/wean tet ky FBI Intranet — - _ _
u WITFF CBT a • 0 C3 a - 5efety• Toals ■
bl
g WO:crater - %gm -
Intc 0. )TFE -414.65.47 . CiblaN1...• ofteA;n.tT
.b7E
a.ITFF CDT • 1,!/inclows Internet Explorer
rit; 0:HUrolarada7a17_,330.11tm
Fie Exit View Favorites • Tads Help
x1557Welem
O
'Namara.
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
DATE: 10-21-2011 CLASSIFIED BY 65179 D1111/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-21-2036
FBI020878 ACLURM021087
v i'41•!. X OID:WfolatroWliena_Xtelltm pt:.y,
03rFF cer - Page • safety- Togs "
'4 14Y Ccoixter 4 - ',tom •
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-21-2011 BY 65179 DNB/ stp/ Isg
C JTFr CBT Vinthws Internet rxitIerer
Fie Ea View Favertes Togs Hie *Favorites I e.',4 FBI irviame
. . . ( TIFF CET— DIW...iintfe; • gte o :1,26 Prt
b7E
b7E
FBI020879 ACLURM021088
• JTFF CBT
Page 1 of 1
IrrarrhgttePAMT
JOINT TERRORISM
Investigative TASK FORCE (JTTF)
Techniques
ORIENTATION
b7 E
QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 37
file://DAjttfoV2\module7\m7340.htm 8/8/2011
FBI020880 ACLURM021089
-seesrrilsoross
JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques
ORIENTATION
Undercover Activities And Operations (U) An undercover activity is any investigative acUvity invciving the use of an assumed name or cover identity.
CID
(1.3) ----- (See Note)
QUIT :: PREVIOUS :: NEXT
PAGE: 36 OF 37 SECItri`f7gtfereSn-
ai)
b7E
file://DAjttfoV2\module7\rn7350.htm. 8/8/2011
JTFF CBT
Page 1 of 1
FBI020881 ACLURM021090
Lt, outforzwahava_350,win - no Ecit Hew Favortes Tools He
FBI020882
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-21-2011 BY 65179 DMH/ stp/ Isg
per.
(4. JIFF CDT - L'findows Internet Explorer
*Favorites I. Fit/wan -
: 511, CBT
Pi- (U) Crimp X UCO @XF■sl'• A -13 me- Pace • sziety • Tads *
b7E
b7E
E4=1105. HYCanlx_Iter 4 • AID"
b6 1:!1
b7C
ACLURM021091
b7E
Cg 131C„9 1.11: MitroViVrake7pn7_150.htm
Fie Edt l%cw Rendes To* Heb
*Riyadh,' I 4 FEIIIrtranet
Avrw. 61,- - Page Safety Tools • re•
4t. X EQtt rse f.
DECLASSIFIED BY 65179 DMHI stp/ 1sg ON 10-21-2011
b7E
d My Comder - %son - 2
FBI020883
aJIFF CUT - Windows Internet Explorer
(U)
(U)
Croup U UCO
ACLURM021092
°';4t'' X FP L5ei
• Pao- Mgr,' Ws. • 0 C3
MY Compass "01174 •
DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-21-2011
CJTFF CBT-Sciindeva Internet Explorer
Wt& ° DittlinV2IiriodieAre7_350.11On
—Fie Erit Mew FeY1A03 Tads Help
*Favorites I '14 ei Milano& . — - -
b7E
b7E
FBI020884 ACLURM021093
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE OTTO
ORIENTATION
Investigative Techniques
b7E
_sEcaBefittifOrtn
(1.17 Module Review . I !are investigative
techniques used the FB information/intelligence and evidence
▪ peci is po icies an proce ures must be used when obtaining and using Grand Jury Subpoenas. and Adminis ative Subpoenas.
are investigative techniques used tol . specific policies and procedures mu be adhered to when using!
. Specific policies and procedures must be adhered to when!
1(U) Intelligence Analysts and Financial Analysts are available!
. Specific policies and orocedures must be used when obtaininci
PREVIOUS :: FINISH MODULE •
PAGE: 37 OF 37 SECF&WILANWEBBI--
file://DAjttfoV2\tnodule7\m7_360.htm 8/8/2011
FBI020885 ACLURM021094
T1IT CBT ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
JOINT TERRORISM TASK FORCE (JTTF)
0 RI ENTATION
DATE: 10-21-2011 CLASSIFIED BY 65179 DMH/ stpi lsg Page 1 ofl REASON: 1.4 (c) DECLASSIFY ON: 10-21-2036
T//NOFORN
Asset/Source Recruitment And Management
(U) Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the asset/source recruitment and management policies and procedures employed by the FBI in the fight against domestic and international terrorism.
Objectives:
1. Read and review an overview of International Terrorism Interviewing. 2. Read and review the type of information that should be obtained during a 415 interview. 3. Gain a basic understanding of the policies and procedures of source development and tasking. 4. Gain a basic understanding of asset administration. 5. Gain a basic understanding off
b7E
EXIT MODULE :: NEXT
PAGE: 1 OF 38
file://D:\jttfoV2\module8\m8_000.htm 8/8/2011
FBI020886 ACLURM021095
JTFF CBT Page 1 of 1
Asset/Source Recruitment And Management
.."51aCV/NOPORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
(ID X
15m4(/Nopogs PAGE: 2 OF 38
FBI020887
Overview Of International Terrorism (IT) Interviewing (NFIPM Section 19-03, Part N)
There are many instances when the Bureau receives information about an individual that neither relates to a threat to national security nor alleges clear criminal conduct.
QUIT :: PREVIOUS NEXT
file://DAjttioV2lmodule8\m8_010.htm 8/8/2011
CU)
(U)
b7E
b7E
ACLURM021096
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
JTFF CBT
(U) Overview Of International Terrorism (IT) Interviewing
QUIT :: PREVIOUS:: NEXT PAGE: 3 OF 38
file://attfoV2\module8\m8_020.htm
FBI020888 ACLURM021097
JTFF CBT Page 1 of 1
FBI020889
0<//NOFORN
) Overview Of International Terrorism (IT) Interviewing CTD Approval Authority
13.7E
(S) (U1
----------------
(U)
bl b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 4 OF 38 jtbsaRt//Nosoler
file://DAjttfoV2\module8\rn8030.htm 8/8/2011
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
ACLURM021098
Page 1 of 1 JTFF CBT
Asset/Source Recruitment And Management
jOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI020890
Ti/NOFORN
(u) ><Overview Of International Terrorism (IT) Interviewing
CTD Approval Authority (Con't1
(U) b7E
CU)
QUIT PREVIOUS :: NEXT PAGE: 5 OF 38
1></NOFORN
file://DAjttfoV2\module8\m8_040.htm 8/8/2011
ACLURM021099
JTFF CBT Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
Overview Of International Terrorism (IT) Interviewing
QUIT:: PREVIOUS:: NEXT PAGE: 6 OF 38 .
>NO/ /NOFORN
file://DAjttfoV2\module81m8_050.htm 8/8/2011
FBI020891 ACLURM021100
FBI020892
Page 1 of 1 JTFF CBT
Asset/Source Recruitment And Management
/NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
b7E
174//NOPORN PAGE: 7 OF 38
file://DAjttfoV2\module8Vn8_060.htm 8/8/2011
(U) Interview Guide For 415 Cases
QUIT :: PREVIOUS:: NEXT
ACLURM021101
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
(U) Interview Guide For 415 Cases (Con't)
. obtain knowledge of any suspicious individuals, to include those who are:
b7 E
. Obtain knowledge ofl
. Obtain knowledge of anyone Involved in the planning of attacks against the U.S.
QUIT :: PREVIOUS :: NEXT
PAGE: 8 OF 38 31:41114/1NOFORN
file://DAjttfoV2\module8\m8_070.htm 8/8/2011
FBI020893 ACLURM021102
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
(U) Source Development And Tasking
:b 7E
JTFF CBT
Page 1 of 1
//xo•oxx
QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 38
file://DAjttioV2\module81m8_080.htm 8/8/2011
FBI020894 ACLURM021103
JTFF CBT Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Source Development And Tasking
Asset/Source Recruitment And Management
s) bl b7E
QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 38
40R4/ /NOFORN
file://attfoV2\module8\m8_090.htm 8/8/2011
FBI020895 ACLURM021104
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 13g REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036
)rrF c... MY Coaster
'ki°116 b 6 b 7 C cl,016:47" Oa; eteriir
CI JIFF CUT- Windows Internet Explorer
lb 7E
---------
Safety Tools . tv. fl c is; Page.
DAy7oV21facetieSlatl_090.htfa
Fte Edt Vim Favatas bas tieb * Raman t F1311ntranot
• ATIFFON
.
fv.
v: i4t , )(
b1
FBI020896 ACLURM021105
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE "SHOWN OTHERWISE
DATE: 10-27-2011 CLASSIFIED BY 65179 DNB/ stp/ lsg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036
b7E
v j muttrevztmeileavne_ogoilem fib Edt Vow Favartes Tads ride
*Favaites C, FBI Intranet
203IFPCEIT
(S) b1
E3 CI - pop • sem,— Ica' • eft. "
b6 b7C
FBI020897
,V■
41,
I'm( I
Tr JIFF COT - Windows Internet Explorer
ACLURM021106
JTFF COT - Windows Internet Explorer
R1 ) a
g
DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN. OTHERWISE
43. x P
- 0 - Paw, Safety 'fools C S)
DAIttioMnodde8Urd_090-hlra Fie Edt Yew Favortes Tool; Hdp *Favorites 1 .4 R3I Intranet
1VSJWFOIT x x
eZ1r5;:',;;',-",i10. • ••.:, t pr?
FBI020898
1.21fflitt.; 7o v
ACLURM021107
age • Safely, Tools • 40• 311Tait
41
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-25-2036
JTFF CDT - rindows. fnlerriet Explorer
g$ DA.W0T24nockiefkno_090.hbo xi ,P'-; p Edt View Favortes Tools Help
*Favarlos FBI ami&
j11221111MtaadW*; OM*g5;: MY Cargter aA; Am% -
h i
.b 7E
FBI020899 ACLURM021108
FBI020900
r--
b7E
b7E ridercever Agent
6-74 v Fie Erlt Hen Fayortes To* Me
Fayertes ;;;;; gi Fig !Amid
_031FECErt
Pr
SIXICareato Pa- tiom -
Nai7;;4i
DECLASSIFIED BY 65179 DMH/ stp/ 1sg ON 10-21-2011
T1I' CBT Windows Internet Explorer
CU)
":1,4t, X' IP ttry5:721
a • 0 ^J - Page. Safety • T006. da•
IT1 Agzr.t. :r tr:cr c2:22:!tyl
lr
ACLURM021109
b7E
JTFF CBT
Page .1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
Source Developing And Tasking
QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 38
9,116//NOFORN
file://D:\jttfoV2\module8\m8_100.htm 8/8/2011
FBI020901 ACLURM021110
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
JTFF CBT
Page 1 of 1
T//NOFORN •
(U)
Source Development And Tasking Obtainina Ynfermatinn
.b 1
QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 38
1,16//NOFORN
file://DAjttfoV2\module8\m8_110.htm 8/8/2011
F B1020902 ACLURM021111
JTFF CBT Page 1 of 1
gr)
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Administration A royal to Operate p
FBI020903
//mom=
.b7E (U)
QUIT :: PREVIOUS :: NEXT PAGE: 13 OF 38
jPZ!/ /NOFORN
file://DAjttfol/2\module81m8_120.htm 8/8/2011
ACLURM021112
JTFF CBT Page 1 of 1
CU)
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Administration Notification of Approval
CU)
CU)
CM
CU)
After approval of an asset: b 7E
PAGE: 14 OF 38
//NOFORN
QUIT :: PREVIOUS :: NEXT
file://D:\jttfoV2\module8\m8140.htm 8/8/2011
F B1020904 ACLURM021113
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 16-i--2036
:Pt-1 [8 MtittforAmaddeeVoLVIO.htro
Fie Eat View Females rook He
Eh- Q m- - Page Safely.- Tools • (0 "
* rewrites V.: FBI Intranet
311F• CBT
b7E,
bl
Pt/Carobs 411-: 4L 103% •
P
a et
0:JTIF CBT • Windows Internet Explorer
FBI020905 ACLURM021114
(S)
file://D:\jttfoV2\module8\m8_150.htm
JTFF CBT
,...§)bc(f//NOFORN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
(U) Administration
Opening Assets
(U)
requires the following: ust be completed prior to opening the source.
(U) lAZ/NF) Visit thel
PAGE: 15 OF 38
for more detaili:
FBI020906 ACLURM021115
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
Administration CU)
(5) b 1
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 38
!Pg(TI/NOFORN
file://D:\jttfoV2\module8\m8_160.htm
8/9/2011
FBI020907 ACLURM021116
Refer to thel
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
(U)
1,11 //NOIFORN PAGE: 17 OF 38
) Administration Special Approval Requirements are needed to open and operate the following types of sources:
b7E
.file://DAjttfoV2\module81m8_170.htm
JTFF CBT
'For more details:
qpN(E//NOTORN
FBI020908 ACLURM021117
CU) Administration
C S )
JTFF CBT
Page 1 of 1
//mFoRN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
b1
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 38
file://DAjttfoV2\module8\m8_180.htrn
8/9/2011
F B1020909 ACLURM021118
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
JTFF CBT
Page 1 of 1
//NOFORN
(U) Administration
C U) .b7E
QUIT:: PREVIOUS:: NEXT PAGE: 19 OF 38
T//NOFORN
file://DAjttfoV21module8\m8_190.htm
8/9/2011
FBI02091 0 ACLURM021119
Page 1 of 1 JTFF CBT
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
RD Administration
bl b7E
i4T//NOFORN PAGE: 20 OF 38
FBI020911
T//NOFORN
QUIT :: PREVIOUS :: NEXT
file://DAjttfoV2\module8\m8200.htin 8/9/2011
ACLURM021120
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
JTFF CBT
Page 1 of.1
ET//NOFORN
(U) Administration
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 21 OF 38
)04//NOFORN
file://D:\jttfoV2\module8\m8210.htm 8/9/2011
FBI02091 2 ACLURM021121
*rewrites I CFR Intranet
Re Edt 16ew raved:es Toots Help •
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
%. fn. oNuia-4.4.kAne_vo.ht.
Er) DATE: 10-26-2011 CLASSIFIED BY 65179 DMH/ sCp/ 1ogg REASON: 1.4 (c) DECLASSIFY ON: 10-26-2036
n 47 :X,Leth,f17-sn
0 • (131 - Peer, Sat*. Tools. ra.
IceektoMmanteeleesterel
FBI02091 3
ant) 02ITFF CLIT-Vlindows Internet Explorer
ACLURM021122
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOUN OTHERUISE
DATE: 10-26-2011 CLASSIFIED BY 65179 DMH/ otp/ log REASON: 1.4 (c) DECLASSIFY ON: 10-26-2036
'P:-
papa- SAO. To*. 0.
qe DAlttherAmorkieetwe_ZIO.htm
Flo Cdt *VI Fovorkes Tech Het,
*Favorites .674 tint Intranet
JIFF CEIT
Aim 'Y *compd. Wk.) ET,, A4 9 ou AM
JTFF Cl3T - %/linilows Internet Explorer
b1
lb 7E
FBI02091 4 ACLURM021123
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
(U) Administration
b1
QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 38
file://DAjttfoV21module8\m8220.htm
8/9/2011
FBI02091 5 ACLURM021124
JTFF CBT Page 1 of 1
//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
(U) Ariminictratinn
QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 38
E m//NOFORN
file://DAjttfoV21module81m8_230.htm 8/9/2011
FBI02091 6 ACLURM021125
• JTFF CBT Page 1 of 1
Asset/Source Recruitment And Management
T//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
33941/NOFORN PAGE: 24 OF 38
file://DAjt-tfoV2\module81m8240.htm 8/9/2011
FBI02091 7
Administration CU)
lb 1
QUIT :: PREVIOUS :: NEXT
ACLURM021126
Administration (U)
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (JTFF)
ORIENTATION
.1o1 b7E
Asset/Source Recruitment And Management
QUIT :: PREVIOUS :: NEXT
PAGE: 25 OF 38 ,IN14//NOFORN
file://D:\jttfoV2\module8\m8_250.htm 8/9/2011
FBI02091 8 ACLURM021127
JTFF CBT Page 1 of 1
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
For the latest information on human source validation. check with thel
I b7E
Administration Evaluation EC
FBI02091 9
QUIT :: PREVIOUS :: NEXT
PAGE: 26 OF 38 T//NOFORN
file://DAjttfoV21module8\m8260.htin 8/9/2011
ACLURM021128
JTFF CBT Page 1 of 1
(U) Administration
b1
(S)
>ilk/imports PAGE: 27 OF 38
T//NOFORN
QUIT :: PREVIOUS :: NEXT
file://D:\jttfoV2\module8\m8_270.htm 8/9/2011
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
FBI020920 ACLURM021129
JTFF CBT Page 1 of 1
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Administration
(S)
74//NOVORN PAGE: 28 OF 38
8/9/2011 file://D:\jttfoV2\module8\m8_280.htm
SE Ti/NOFORN
QUIT :: PREVIOUS :: NEXT
b1
CU)
FBI020921 ACLURM021130
JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ lsg ON 10-27-2011
Page 1 of 1
4/NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
(IT) Administration Payments
(LT)
QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 38
SE T//NOFORN
8/9/2011
F B1020922 ACLURM021131
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
Administration Disclosure
bl
QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 38
j it //NOrORN
tile://DAjttfoV2\module81m8_300.htm
8/9/2011
FBI020923 ACLURM021132
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
i*I/NOFORN
Asset/Source Recruitment And Management
(U) Administration JTTF
11)7E
QUIT :: PREVIOUS :: NEXT PAGE: 31 OF 38
>1*/NOFORN
file://DAjttfoV2\module8\rn8_310.htm 8/9/2011
F B1020924 ACLURM021133
1 Atiminictratinn
JTFF CBT
Page 1 of 1
SE T//NOFORN
(U)
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION N
Asset/Source Recruitment And Management
QUIT :: PREVIOUS :: NEXT PAGE: 32 OF 38
S):0M0//NOFOEN
file://D:\jttfoV2\module8\m8_320.htm
8/9/2011
FBI020925 ACLURM021134
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Asset/Source Recruitment And Management
JTFF CBT
Page 1 of 1
EET/
Administration
QUIT :: PREVIOUS :: NEXT PAGE: 33 OF 38
›likS//NOFORN
file://DAjttfoV2\module8\m8_330.htm 8/9/2011
FBI020926 ACLURM021135
Administration (U)
CS
lb 1
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Asset/Source Recruitment And Management
QUIT :: PREVIOUS :: NEXT
PAGE: 34 OF 38 ...44511114T//NOFORN
file://D:\ji-tfoV2\module8\m8_340.htm 8/9/2011
FBI020927 ACLURM021136
JTFF CBT Page 1 of 1
Asset/Source Recruitment And Management
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
SUM Administration
b7E
8/9/2011 file://DAjttfoV2\module8\m8_350.htm
FBI020928
T//NOFORN
Assets andl
0 If voitsuspect that a subject may have connections or associates with I trained or otherwis conside
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 38
T//NOFORN
(U) An EC will be prepared with a summary of your case and'
ACLURM021137
JOINT TERRORISM TASK FORCE (JTTF) .
ORIENTATION
Asset/Source Recruitment And Management
JUT CBT
Page 1 of 1
SE T//NOFORN
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 36 OF 38 T/ /NOFORN
file://DAjttfoV2\module8\m8_360.htm 8/9/2011
F B1020929 ACLURM021138
b7E
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
Asset/Source Recruitment And Management
QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 38
Spii//woroRN
file://D:\jttfoV2\module8\m8_370.htm 8/9/2011
FBI020930 ACLURM021139
JTFF CBT Page 1 al
Asset/Source Recruitment And Management
9:111t//NOFORN
30I NT TERRORISM TASK FORCE (3TTF)
ORIENTATION
b7E
bl
(U)
C S)
Module Review . When conducting Inteknetional Ferrari= interviewina follow proper approval authority.
interviews are thorarh in order toy
• The FBI's policies and procedures for source development and tasking must be followed. Thq FIXT'e neklh.imm_ rwrao•eaA, fem.. ftem_Aai• min r-IFIeftHnek mute+ het frillosuraril
FBI020931
PREVIOUS :: FINISH MODULE
PAGE: 38 OF 38 jtotis6J/Noroarr
file://a\ittfoV2\module8\m8_380.htm 8/9/2011
ACLURM021140
JTFF CBT DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ sCp/ lsg REASON: 1.4 (c) DECLASSIFY ON: 10-25-2036
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT Page 1 of 1 WHERE SHOWN OTHERWISE
sE //NOFOEN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations.
ORIENTATION
(U) Overview Of Instructional Goals And Objectives , (U) Goal: The goal of this module Is to introduce the new task force officer to FBI international operations that suppert the FBI's fight against sismectic and international terrorism.
Objectives:
1. Gain a basic understanding of the FBI's overseas theater operations. 2. Gain a basic understanding of role of the Legal Attache. 3. Read and review the FBI's policies and procedures regarding foreign travel. 4. Read and review information regarding pre-deployment planning.
EXIT MODULE :: NEXT PAGE: 1 OF 53
T//NOFORN
file://DAjttfoV2\module9\m9_000.htm 8/9/2011
F B1020932 ACLURM021141
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
International Operations
.1D7E
041:1</NOWORN PAGE: 2 OF 53
AjttfoV2\module9\m9_010.htm 8/9/2011
FBI020933
EZ Ti/NOEVEN
(U) Overseas Theatre Operations
QUIT :: PREVIOUS :: NEXT
ACLURM021142
JTFF CBT Page 1 of 1
SE Ti/NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
CU) ) Overseas Theatre Operations
bl b7E
QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 53
;)4!NOFORN
file://D:\ittfoV2\module9\m9_020.htm 8/9/2011
F B1020934
International Operations
ACLURM021143
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg
REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036
■•_1:41-: o ColettoVAneddeetm9_020.htm
Fie Edit View Fowles Tools He
Faeotte I {.3 raz mt.& OMIT car
PL.1.52-uel
0 - Pooe • Met!. Tools. 0.
4 • Am% g MY corpse. - • •o,., I - „." ly JTFF CE1 -Winckm;
b7E
JTF.F. CDT lyinclows Internet Explorer
:dtW tlooK1Westori
bl
FBI020935 ACLURM021144
gj3TFF CBT a • a = • Pap • Safety. Tholo •
CS)
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE
5 JEFF CBT- lklindows Interne! Explorer
vitiMWioftnortioplimmhth no Edd Naw Females Toth tloka
4'Favonlee 154 LPN trirenet
DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036
te; S Hy Computer
..V019‘4*;;;; JIFF CEi - Wl-dowr
4 - - g) • 0,70:.0
X
b 7 E
■
FBI020936 ACLURM021145
x 1.35 L.rek:e.f.
FBI020937
DECLASSIFIED BY 65179 DM/. stp/ lsg ON 10-25-2011
b E
0...1TF.E -CDT Viindows Internet Explorer
/ ° rt. EMPF0V211101U09(r119-020.Mrm Fds Ult liftm Famartas Tods 1,42
TT
Fa/° 105 Wang
(), 43mmor
b 7 E
L.,
N.
0 a Fes. Safety. Tools-
CU)
. vie compubm 4 • Age% ;6;12005 ./:.
ACLURM021146
International Operations
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Overseas Theatre Operations
(S)
bl b7E
QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 53
file://D:\ittfoV2\module9\m9030.htrn 8/9/2011
JTFF CBT
Page 1 of 1
FBI020938 ACLURM021147
JTFF CBT Page 1 of 1
S5)M6//NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
International. Operations
(lb Overseas Theatre Operations
bl b7E
F B1020939
QUIT :: PREVIOUS:: NEXT PAGE: 5 OF 53
Tflaorom
file://DAjttfoV2\module91m9040.htm 8/9/2011
ACLURM021148
Overseas Theatre Operations
X
PAGE: 6 OF 53 SE Ti/NOFORN
file://DAjttfoV2\module91m9050.htm
JTFF CBT
THNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
F B1020940 ACLURM021149
Page 1 of 1
1/124//NOFORN
b1 b7E
JTFF CBT
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
) Overseas Theatre Operations (U)
QUIT:: PREVIOUS :: NEXT PAGE: 7 OF 53
SE TI/NOFORN
file://DAjttfoV2\module9\m9_060.htm 8/9/2011
FBI020941 ACLURM021150
Overseas Theatre Operations
x
x
JTFF CBT
Page 1 of 1.
EZ T//NOEORN
3OINT TERRORISM
International TASK FORCE (3TTF)
Operations
ORIENTATION
b1 b7E
QUIT :: PREVIOUS:: NEXT PAGE: 8 OF 53
...›(<//NOSORN
file://D:\jttfoV2\module9\m9070.htm 8/9/2011
F B1020942 ACLURM021151
JTFF CBT
Page 1 of 1
SE T/A10FORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations ORIENTATION
(U) Overseas Theatre Operations
b7E
QUIT :: PREVIOUS:: NEXT PAGE: 9 OF 53
";<‘//zroFoRN
file://D:\jttfoV2\module9\m9_080.htm 8/9/2011
F B1020943 ACLURM021152
Page 1 of 1 JTFF CBT
International Operations
2>%/NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
PAGE: 10 OF 53
8/9/2011 file://DAjttfoV21module9\ni9_090.htrn
F B1020944
Overseas Theatre Operations
b1 b7E
QUIT :: PREVIOUS :: NEXT
ACLURM021153
JTFF CBT Page 1 of 1
UNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) ) Overseas Theatre Operations
b1 b7E
QUIT :: PREVIOUS:: NEXT PAGE: 11 OF 53
Ti/NOFORN
8/9/2011
F B1020945 ACLURM021154
ITFF CBT Page 1 of I
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
International Operations
Overseas Theatre Operations Intelligence Sharing
X
QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 53
!,42//NOFORN
file://DAjttfoV2\module9\m9110.htm 8/9/2011
CU)
C S)
CS)
bl
F B1020946 ACLURM021155
b7D b7E
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
(U) Overseas Theatre Operations
QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 53
T//NOFORN
file://DAjttfoV2\module9\m9_120.htm 8/9/2011
F B1020947 ACLURM021156
3)
JTFF CBT
Page 1 of 1
Ti/NOFORN
JOINT TERRORISM
International TASK FORCE (3TTF)
Operations ORIENTATION
(U) Overseas Theatre Operations
QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 53
_SITARZT//NOFORN
file://D:\jttfoV2\module9\m9_130.htm 8/9/2011
bl b7E
F B1020948 ACLURM021157
JTFF CBT Page 1 of 1
International Operations
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
CS)
bl b7E
F B1020949
Overseas Theatre Operations
QUIT:: PREVIOUS :: NEXT PAGE: 15 OF 53
T//NOFORN
file://D:\jttfoV2\module9\m9_140.htm 8/9/2011
(U)
ACLURM021158
JTFF CBT Page 1 of 1
T//NOFORN
JOINT TERRORISM
International TASK FORCE (3TTF)
Operations ORIENTATION
(U) Legat Operations Leoats
(U) A Legat is the FBI's reoraspntative stationed in an American Embassy abroad who is responsible for liaison with) 'Intelligence agencies In matters of interest between those agencies and the b7D FBI. Legat personnel respond to the FBI's domestic and extraterritorial investigative needs. Thev can b7E accomplish this because!
QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 53
i3pRt//molloRm
file://DAjttfoV2\module91m9_150.htm 8/9/2011
F B1020950 ACLURM021159
JTFF CBT
Page 1 of 1
E T//NOFORIT
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Legat Operations Leoat Services
(U) The services of the Legat should be utilized by domestic field offices and FBIHQ personnel requiring investigative assistance abroad as the Legat is qualified to handle the full range of FBI matters overseas. Legats' territories cover all nations in which the U. S. Government (USG) maintains diplomatic relations. Legats are expected tcl
(U) Each agent must utilize the Legate in all of his/her overseas contacts. In instances where ongoing or continuous contacts for Toended periods of time become necessary, direct contact between the FBI domestic employees and must be approved by and coordinated through the appropriate Legat.
QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 53
)1:00;fT//NOFORN
file://DAjttfoV2\module91m9_160.htm 8/9/2011
b 7D b7E
FBI020951 ACLURM021160
JTFF CBT Page 1 of 1
SE THNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Legat Operations Leads to Foreign Countries
(U) Leads for all foreign countries should be submitted to the Legat covering the region, with informational copies to the Office of International Operations (OW) and substantive desk(s) at FBIHQ. Leads submitted
through must include an information copy for the respective Legat. b7E
QUIT :: PREVIOUS NEXT PAGE: 18 OF 53
T//NOE'ORN
file://D:\jttfoV2\module9\m9170.htm 8/9/2011
F B1020952 ACLURM021161
JTFF CBT
Page 1 of 1
/NOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
(U) Legat Operations Legat Responsibilities
(U) In addition to the Legat's responsibility to the host country, Legats are also responsible to the U.S. Ambassadors overseas. The FBI is obligated by a MOU between the Departments of Justice, State, and Treasury to keep the Chief of Mission "fully and currently informed" with respect to all activities and operations of FBI employees in that country. The Legats must be completely aware of all FBI activities in their territories so that they can meet their obligations to both the host country and the U.S. Ambassador.
QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 53
//NOFORN
file://DAjttfoV2\module9\m9180:htm 8/9/2011
F B1020953 ACLURM021162
JTFF CBT
Page 1 of 1
S gfT//NOFORN
JOINT TERRORISM
International TASK FORCE (3TTF)
Operations
ORIENTATION
(U) Bureau Policy And Procedures Foreian Travel and Country Clearance
(U) In accordance with the requirements of the above MOU, all official foreign travel must be coordinated with the Legat Office covering the country concerned and the Office of International Operations (OM). The Legat should be kept informed as to contemplated activity to ensure! The Legat will also be able to comment as to any other current activity or political circumstances in the foreign country, which may have some effect on the travel activity.
b7D b7E
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 53
..30agt.(/NOFORN
file://DAjttfoV21module9\m9_190.htrn 8/9/2011
F B1020954 ACLURM021163
JTFF CBT
Page 1 of 1
SE OT/INOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations ORIENTATION
(U) Bureau Policy And Procedures Foreign Travel Ec
b7D b7E
QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 53
g"147//NOFORN
file://D:\jttfoV2\module9\m9_200.htm 8/9/2011
F B1020955 ACLURM021164
JTFF CBT
Page 1 of 1
T//NOFORN
3OINT TERRORISM
International TASK FORCE (3TTF)
Operations ORIENTATION
(U) Bureau Policy And Procedures
lb 7E
QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 53 .......161‹//NOFORN
file://DAjttfoV2\module91m9__210.htm
8/9/2011
F B1020956 ACLURM021165
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
International Operations
(U) Bureau Policy And Procedures
lo7E
QUIT :: PREVIOUS:: NEXT PAGE: 23 OF 53
SE //NOFORN
file://D:\jttfoV2\module9\m9_220.htm 8/9/2011
F B1020957 ACLURM021166
JTFF CBT
Page 1 of 1
//NOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
(U) Bureau Policy And Procedures
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 53
>Oki/140VMM
file://13:\jttfoV2\module9\m9230.htm 8/9/2011
F B1020958 ACLURM021167
JOINT TERRORISM
International TASK FORCE 1)TTF)
Operations ORIENTATION
(U) Bureau Policy And Procedures
:137E
QUIT:: PREVIOUS:: NEXT PAGE: 25 OF 53
3>ECTI/NOFORN
file://DAjttfoV2\module91m9240.htm 8/9/2011
JTFF CBT
Page 1 of 1
T//NOFORN
F B1020959 ACLURM021168
Page 1 of 1 JTFF CBT
International Operations
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
(U) Bureau Policy And Procedures
PAGE: 26 OF 53
F B1020960
Ti/NOFORN
b7E
QUIT:: PREVIOUS:: NEXT
file://DAjttfoV2\module9\rn9250.htm 8/9/2011
ACLURM021169
al)
(U)
JTFF CBT Page 1 of 1
T/rNOPORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
International Operations
/NOFORN) Bureau Policy And Procedures Additional Travel Instructions
b7E
QUIT:: PREVIOUS:: NEXT PAGE: .27 OF 53
8,11//NOFORN
file://D:\jttfoV2\module9\m9_260.htm 8/9/2011
FBI020961 ACLURM021170
Attorney General Guidelines for FBI Foreign Intelligence Collection and
Foreign Counterintelligence Investigations (FCIG)
I Presented by: I
Office of the General Counsel National Security Law Unit
AIL INFORMATION CONTAINED
DATE: 10-25-2011 HEREIN IS UNCLASSIFIED EXCEPT
CLASSIFIED BY 65179 DHH/ spt/ lsg WHERE SHOWN OTHERWISE
REASON: 1.4 (c, d) DECLASSIFY ON: 10-25-2036
b6 b7C
F B1020962 ACLURM021171
Presentation Overview
• Lesson Objectives • Introduction to the Guidelines • Definitions • Counterintelligence & Counterterrorism
Investigations • Dissemination • Reporting Requirements
J
2
F B1020963 ACLURM021172
Lesson Objectives -- By the end of the session you should:
• understand the basic purpose, scope, and organization of the FCIG
• be able to apply the "least intrusive means" principle
• know how to apply the U.S. Person presumption
• be familiar with the key definitions
F B1020965 ACLURM021174
• know'
Lesson Objectives -- By the end of the session you should:
• know what investigative steps can be taken
• understand which investigative techniques are available'
• know the rules for disseminating and reporting information
.b7E
5
FB1020966 ACLURM021175
Introduction • • E.O. 12333 requires the FBI to:
— conduct and coordinate counterintelligence activities within the United States
— Coordinate counterintelligence activities outside the United States with the CIA
— Collect foreign intelligence — Produce and disseminate foreign
intelligence and counterintelligence
F B1020968 ACLURM021177
Introduction
• E.0 12333 provides that the FBI's responsibilities will be conducted in accordance with "such regulations as the Attorney General may establish"
• The FCIG are these regulations • Most recent version is March 8, 1999
F B1020969 ACLURM021178
Introduction
• The FCIG are the basic rules of the road that give the FBI its direction for conducting counterintelligence and counterterrorism investigations
• They also provide guidance on foreign intelligence collection andl
b7D 1)7E
9
FBI020970 ACLURM021179
Least Intrusive Means • Required by Section 2.4 of E.O. 12333
and Section III.A.1 of the FCIG. • The FBI should collect information
under the FCIG using the least intrusive means that will provide the quality, scope and timeliness required in a manner consistent with the laws and policies of the United States
`13
FBI020971 ACLURM021180
I • U.S. Person Presumption
• in which the status of a subject is not known, the subject shall be treated as a U.S. person
•
b7 E
15
F B1020972 ACLURM021181
FCIG Structure
• Scope • Definitions • Collection of FCI information. • Special Techniques • Dissemination • Reporting
FBI020973 ACLURM021182
ViT oz. 4,
-Y- -4. osaf
,,, -k * z
2, t
ki t1) .• c' ** IP, &,„,....-X 0. Ai, NO4113 or 1-1 la
seAr/CPLII3v
...
17
F B1020974 ACLURM021183
WA<
Subjects
• Subjects of counterintelligence investigations are divided into: — foreign powers
— foreign visitors
— U.S. persons
F B1020979 ACLURM021188
Foreign Power
• A foreign government or any component regardless of whether recognized by U.S.
• A faction of a foreign nation, not substantially composed of U.S. persons
• Entity•openly acknowledged by a foreign government
• Group engaged in international terrorism
• Foreign-based political organization, not substantially composed of U.S. persons
• Entity directed and controlled by a foreign government
23
FBI020980 ACLURM021189
Pre-investigative Activities (Cont.)
• Examine FBI records, review publicly available reference material I
lin order to obtain identifying data concerning an unknown person for indexing purposes
b7E
30
FBI020985 ACLURM021194
Pre-Investigative Activities (Cont.)
• Examine FBI records and review publicly available reference material in order to obtain identifying data concerning a known person for indexing purposes
31
FBI020986 ACLURM021195
Pre-investigative Activities (Cont.) '
• Conduct background inquiries concerning consenting individuals!
I
.b7D b7E
32
FBI020987 ACLURM021196
Operations Outside the U.S.
• DCI (or designee) and Attorney General (delegated to section chief) approval is necessary for investigative activity conducted outside the United States
• b7E
63
FBI020990 ACLURM021199
Dissemination
• In General • To Federal Authorities • To State and Local Government
Authorities • • To Congressional Committees •
F B1020992 ACLURM021201
Dissemination in General
• Transmission of information within DOJ is not dissemination
• Can disseminate publicly available information that doesn't identify U.S. persons for any lawful purpose
70 .
FBI020993 ACLURM021202
it
Dissemination in General (cont.)
Non-publicly available information can be disseminated within the intelligence community
• Non-publicly available information identifying U.S. persons may be disseminated outside the intelligence community if the identities may reasonably become necessary to understand or assess the importance of the information
71
F B1020994 ACLURM021203
Dissemination to Federal Authorities
• FBI may disseminate information to other federal authorities when it: — relates to a crime or violation of regulation
within that agency's jurisdiction — relates to the other agency's authorized
responsibilities — is required to be disseminated by statute
or other directive
72
FBI020995 ACLURM021204
Dissemination to State and Local Authorities
• The FBI may disseminate facts or information relating to crimes to state and local governments if the dissemination is consistent with the interests of U.S. national security
73
FBI020996 ACLURM021205
Dissemination to Congressional Committees
• The FBI can provide briefings and testimony on maters of general intelligence interests to the appropriate Congressional committees
• Any further dissemination requires Attorney General approval
• The FBI must consult with any other agency with a stake in the information prior to dissemination
75
MEW
FBI020997 ACLURM021206
Visited States .elmerica
JTFF CBT
Page 1 of 1
>11610/NOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures Passports
(U) Diplomatic passports do not automatically confer any diplomatic privileges or immunities (P&Is) from search, seizure or arrest in a foreign nation. In order for the bearer of a diplomatic passport to have diplomatic P&Is in the host nation, the bearer must be a USG employee permanently assigned to the US Embassy and be named on the diplomatic list of the nation. Diplomatic passports are issued through liaison between the OW and State. The issuance of diplomatic passports is within the sole purview of the Department of State and their issuance is strictly controlled. An official passport is the standard requirement for FBI employees traveling abroad on official business.
(U) The 0I0 recommends that the official traveler also carry a valid U.S. tourist passport as a back up for a diplomatic or official passport to be used under certain limited situations. The use of a tourist passport must not be presented to enter or depart from the foreign nation or in connection with other USG official duties or business.
QUIT :: PREVIOUS:: NEXT PAGE: 28 OF 53
)11<//NOFORTI
file://D:\jttfoV2\module9\m9_270.htm 8/9/2011
FBI021002 ACLURM021211
JTFF CBT
Page 1 of 1
...):412/NOPORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures Passports (Con't)
lAn official passport is not to be used for personal or pleasure travel, and any loss should be reported at once to the division head and the OM. Since official passports and visas provide no immunity for the bearer, he/she (the bearer) can be held fully liable for all actions while abroad. This liability is both civil and criminal under the laws of the host country, which are often different from those in the United States.
b7E
QUIT:: PREVIOUS :: NEXT PAGE: 29 OF 53
T//NOFORN
file://DAjttfoV21module9\m9_275.htm 8/9/2011
FBI021003 ACLURM021212
JTFF CBT
Page 1 of 1
//NoFowl
JOINT TERRORISM International TASK FORCE (3TTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures Visas
(U) Most foreign nations will not issue a visa if the diplomatic or official passport will expire in six months or less of the travel date.
(U) A visa is a permit, entered on the passport of a national of one country, by the consulate of another. This permit allows the bearer entry to or transit through, the country issuing the permit. On request, and with proper notice, the 0/0 will obtain visas necessary for official travel. A valid diplomatic or official passport with an expiration date greater than six months after the requested travel dates is required to be sent to the 010 when applying for a visa.
(U) The time for which visas are issued usually depends on the length of the trip. Applications, pictures International Health Cards, and other certified documents may be required before visas are issued. Official travel to most countries requires a visa. The visa is stamped in the U.S. passport used for travel. Visas are obtained from that country's Embassy or Consulate in the U.S. Foreign diplomatic establishments require a DOS, Washington, D.C., Passport Office letter before they will issue a visa for official travel. Note that most foreign Embassies in the US have specified time frames required for the issuance of a visa. Three to five workdays are commonly required; however, select nations may require weeks to issue a visa. The OM should be consulted at the earliest time when international travel is planned.
QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 53
//NOFORN
file://D:\jttfoV2\module9\m9 280.htm 8/9/2011
FBI021004 ACLURM021213
JTFF CBT
'740//NOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures Investigations
(U) FBI Agents have no jurisdiction in foreign countries. Agents do not have arrest powers, subpoena powers, or the authority to conduct investigations, including foreign national interviews, in other countries without the approval of the COM and the host government' FBI credentials must be carried while on official travel abroad; however, use and/or display of credentials in a foreign country except for identification in an official capacity is inappropriate.
QUIT :: PREVIOUS :: NEXT PAGE: 31. OF 53
....iB4*//NOFORN
file://DAjttfoV2\module9\m9_290.htm
FBI021005 ACLURM021214
JTFF CBT
Page 1 of 1
01:101e//NOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures National Sovereignty
(U) National sovereignty of the foreign nation prohibits FBI Agents from exercising law enforcement or peace officer status. Notwithstanding the extraterritorial reach of some US statutes, no U.S. law can override a foreign country's right to protect the integrity of its sovereignty. A foreign nation may; however, agree to permit the FBI to perform limited law enforcement functions when in the company of a counterpart host nation law enforcement or intelligence official when the FBI has joint investigative jurisdiction. Though not limited to terrorist activity, such investigations generally have been conducted in the aftermath of terrorist attacks. The FBI's role in these shared investigations requires COM/Legat, 010 and FBIHQ approvals, in addition to host nation approval and are usually limited to victim/witness interviews and routine forensic examinations.
(U) Unless the above approvals have been granted, FBI Agents from domestic offices may not independently conduct investigations in foreign countries, including foreign national interviews without concurrence of the host government. Exceptions to this prohibition are authorized when a foreign national appears at an embassy or consulate voluntarily (walk-ins) or when an American citizen voluntarily appears for interview on these diplomatic premises. However, the interview of an American citizen or foreign national in-country, not on U.S. diplomatically protected premises, requires the above approvals and host nation authority. Such off-premises interviews would normally be conducted by the host government authorities.
QUIT :: PREVIOUS:: NEXT PAGE: 32 OF 53
4:04//NOFORN
file://D:\jttfoV2\module9\m9_300.htm 8/9/2011
FBI021006 ACLURM021215
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE OTTO
ORIENTATION
International Operations
0
(U) Bureau Policy And Procedures . Interviewing Persons in Police Custody in a Foreign Country
(U) Persons interviewed by FBI Agents while in police custody in a foreign country must be given the usual warning of rights under American Federal law provided there is no objection from the foreign police officer. If he/she objects, feeling the warning is not consistent with the law of his/her country and might work unfavorably on prosecution of the subject there, the officer should be requested to give the warning as required by the law of his/her country. Record the wording of this warning and the time and circumstances of its issuance.
QUIT:: PREVIOUS :: NEXT PAGE: 33 OF 53
dtP9//rioroaN
file://DAjttfoV2\module9\m9_310.htm 8/9/2011
FBI021007 ACLURM021216
b7E
JTFF CBT Page 1 of 1
4,112//NOFORN 3OINT.TERRORISM TASK FORCE (3TTF)
ORIENTATION
International Operations
(U) Bureau Policy And Procedures Counterintelligence Activities
QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 53
S)(T//NOFCRN
file://DAjttfoV2\module91m9_350.htrin 8/9/2011
FBI021008 ACLURM021217
JTFF CBT
Page 1 of 1
>12kY/NOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
(U) Bureau Policy And Procedures Routine Leads in Foreign Countries
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 38 OF 53
• .›RT//NOFORN
file://D:\jttfoV2\module9\m9_360.htm 8/9/2011
FBI021009 ACLURM021218
sp , r ► _s • L.<
aJTFFC.I3T • SIlindows Internet Exp(orcr
- it. comodu 4k , two,. " • eqS ekt
. . _
b7E
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-25-2011 BY 65179 DMH/ spt/ lsg
otttfoMnottlestow370.htrn ••• ■.47. X. IP t',15nrvi
Fl, Erk Mar Favertes Tads Help
*Favades 1/4k Flambe:et _ . . ifampan ta - Pecx, Safety To*. (0.
FBI021010 ACLURM021219
JTH CUT- 'findows Internet Explorer
:P1-i pit*Sa.vols
• Page• Safety. Tools.
fie Uk View Fawn= rod) WO
*Fend= 1:4 CFBILtronet
j WIN ®T
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-25-2011 BY 65179 DMH/ spt/ lsg
• Olio": Amgettee4; 1111111111111MIZIEM. a
• Ply caw. -:
b7E
4t x
Aw. t`6
lOa taMearill4Restoret
FBI021011 ACLURM021220
JTFF CBT Page 1 of 1
Ti/NOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Bureau Policy And Procedures Extradition
(U) International extradition is the formal process by which a person found in one country is surrendered to another country for trial or punishment. The process is regulated by treaty and conducted between the U.S. government and the government of a foreign country. It differs considerably from Interstate extradition or Interstate rendition. Extradition, in most instances, may be granted only pursuant to a treaty. Responsibility for extradition matters lies with the DO] and the DOS. A simple telephone call to a foreign police agency will not result in having a subject arrested and returned to the U.S. by host nation law enforcement officials.
QUIT :: PREVIOUS :: NEXT PAGE: 40 OF 53
sE Ti/N0FoRN
file://DAjttfoV2\module9\m9_380.htm 8/9/2011
FBI021012 ACLURM021221
JTFF CBT Page 1 of 1
sE TUNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
• ORIENTATION
(U) Bureau Policy And Procedures Subpoenas
(U) It is possible, pursuant to U.S. law, to have a subpoena issued for a national or resident of the U.S. in a foreign country, directing the witness to appear before a U.S. court. However, Legats cannot automatically serve subpoenas in other countries. It may be a violation of sovereignty. Foreign laws may restrict the serving of such subpoenas. U.S. Attorney's Offices work closely with the Department of Justice's Office of International Affairs to select a method of obtaining the witness's presence in the U.S. In tome cases this may be done in concert with an American consular official acting on a request by the DOS. b7E
QUIT:: PREVIOUS:: NEXT PAGE: 41 OF 53
file://D:\jttfoV2\module9\m9_390.htm 8/9/2011
FBI021013 ACLURM021222
Page 1 of 1 JTFF CBT
International Operations
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
(U) Bureau Policy And Procedures
PAGE: 42 OF 53
FBI021014
T//NOFORN
b7E
QUIT:: PREVIOUS:: NEXT
file://DAjttfoV21rnodule9\m9400.htm 8/9/2011
ACLURM021223
JTFF CBT
Page 1 of 1
SE i/NOPORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations
ORIENTATION
(U) Bureau Policy And Procedures Other Investigative Techniques: Consult Legat in Host Natiorl
.b7E
QUIT :: PREVIOUS :: NEXT PAGE: 43 OF 53
T//NOFORN
file://DAjttfoV2\module91m9_410.htm 8/9/2011
FBI021015 ACLURM021224
JTFF CBT
Page 1 of 1
T//NOFORN
JOINT TERRORISM
International TASK FORCE (JTTF)
Operations ORIENTATION
(U) Bureau Policy And Procedures Leqat Responsibilities
(U) Legats are responsible for conducting and coordinating all investigative matters overseas, including cases where domestic FBI Agents are deployed from the extraterritorial squads. The Legat is there to ensure that the anticipated investigation proposed by the office of origin does not raise sovereignty issues with the host government and that all matters have been coordinated with the embassy in accordance with the COM MOU. The Legate must be part of the investigative planning and decision making in order to fulfill the Director's expectations with respect to their role in overseas investigations.
QUIT:: PREVIOUS :: NEXT PAGE: 44 OF 53
T//NOFORN
file://D:\jttfoV2\rnodule9\m9_420.htm 8/9/2011
FBI021016 ACLURM021225
..•••• •
• —••• •■••••• • • ••• ••,- • .
Afro8ANISTN4
F. NT of S CATE
'Titan I tIch, Alliiiima._tnAtp11triffSTAIL
•••
TAMIL Yr,s'ir ,;(11,
JTFF CBT Available on the Internet
Page 1 of 1
sa6//soroRs
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) U.S. Department Of State Information And Updates Travel Advisories
(U) Travel advisories are issued by the DOS for countries where potential terrorist threats and potential unrest exist. Visit http://www.travel.state.govitravelicis_pa_tw/twitw_1764.html for a current list of travel advisories. (Note: The DOS refers to travel advisories as "Travel Warnings" on their website. The terms are interchangeable.)
QUIT:: PREVIOUS :: NEXT PAGE: 45 OF 53
Ti/NOFORN
file://DAjttfoV21module9\m9_430.htm 8/9/2011
FBI021017 ACLURM021226
No•
%11•4•ZIMZOINKIA•1•4•LbtlLICSIPIfirmaMUSUZ•coftliliglililbWheii1inCii• IM•oorOmMOMmtl•••Mil MOM
M2111111 ifew4 Itota "footslog'
=ISM Co•••••••••1
=== PRWIE
4111•31•00C xatZtacitausas
■••••••• ■••••0•11 04 eft r/SMI M•Orr.••••14•rs
=311 Ge••••■■01/0414 .W.a••••••••••••••■1•*"■•••••••••••••••%***•••••••••••••••0%.111.. •VMa.....•••••10.11,*4....6410116.•••••■1401, Ow. •••••••toommom•m*••• •••••mi••••••••■•••••••••M •••• • •••••••••••.•••• m•••••••om•Mm •.
x.•mmoi•mm•••Olvemommlomitmommmom•MmoMemdommomMo•II•••• ••••••••••••to p•••••••—•.•• m•■•••••••■••••••firo• we omo odral.....sommerg wali•olWato•••! woo ■••••••••■••••• Ow. ,....■•■••••.7•••••■■■•ft Mia.•01110•VNA
QUIT :: PREVIOUS :: NEXT
1011:6V/NOPORN
==11111
JTFF CBT Available on the nternet
Page 1 of 1
E Ti/NOEDER
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
International Operations
(U) U.S. Department Of State Information And . Updates Post Reports
(U) Post Reports provide information regarding countries in which U.S. Embassies are located. The information provided includes a brief history and description of the country's area, geography, climate, population, public institutions, arts, science, education, commerce and industry, transportation, communication, health and medicine, housing, food, clothing, supplies and services, education, recreation and social life, official functions, pets, etc. (Note: The DOS refers to post reports as "Background Notes" on their website. The terms are interchdngeable.)
Visit www.state.gov/r/pa/el/bgn/ for a full list of countries.
PAGE: 46 OF 53
•
file://D:\jttfoV2\module9\m9_440.htm 8/9/2011
FBI021018 ACLURM021227
JTFF CBT Page 1 of 1
T//NOPORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
International Operations
(U) Temporary Duty Pre-Deployment Planning Personal Property
(U) Household maintenance issues, household security issues, and automotive needs should be reviewed and addressed prior to deployment.
QUIT:: PREVIOUS:: NEXT PAGE: 47 OF 53
0M021/NOFORN
file://DAjttfoV21module9\m9450.htm 8/9/2011
FBI021019 ACLURM021228
JTFF CBT
Page 1 of 1
THNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Temporary Duty Pre-Deployment Planning Personal and Family Matters
(U) The pre-separation period Is stressful for all family members, especially for parents and children. Communication between yourself and loved ones is of vital importance, and can help alleviate the stress and tension often associated with deployment The key to successful and authentic communication with family members is to be honest Prior to deployment, is the time to open up lines of communication between you and family members. Honestly discuss with family members feelings about the assignment or deployment, and identify fears and expectations. Discuss any contingencies or unforeseen changes you might imagine. Personalities might change, especially those of the children. By the time you return home, goals may have changed for either you or your spouse or partner.
QUIT:: PREVIOUS :: NEXT
PAGE: 48 OF 53
file://D:\jttfoV2\module9\m9_460.htm 8/9/2011
FBI021020 ACLURM021229
Page 1 of 1 JTFF CBT
T//NOFORN PAGE: 49 OF 53
FBI021021
TUNOPORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Temporary Duty Pre-Deployment Planning Medical
(U) An important pre-deployment responsibility is to visit the Health Care Programs Unit (HCPU).1
.b7E
QUIT:: PREVIOUS:: NEXT
file://D:\jttfoV2\module9\m9_470.htm 8/9/2011
ACLURM021230
•••■ 44.4
b6 b7c
JTFF CBT
Page 1 of 1
JOINT TERRORISM
."4//NOPORN
International TASK FORCE (JTTF)
Operations ORIENTATION
(U) Temporary Duty Pre-Deployment Planning -cm:
(U) During deployment there may be times when legal matters must be taken care of in your absence. Consult an attorney for any legal questions concerning your particular situation. Wills and Powers of Attorney are just as critical for a single FBI employee as it is for his/her married employee.
QUIT :: PREVIOUS :: NEXT PAGE: 50 OF 53
T//NOPOPI1
file://D:\ittfoV2\module9\m9_480.htm 8/9/2011
FBI021022 ACLURM021231
JIFF CBT
Page 1 of 1
,B4T//1.10FoRN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Temporary Duty Pre-Deployment Planning 'Financial and Insurancp.
(U) Your insurance carrier may provide worldwide assistance with traveler's medical insurance and terrorism coverage for FBI employees. Be sure to review how your Federal and Bureau benefits and insurance coverage work while you are overseas serving the FBI.
QUIT :: PREVIOUS :: NEXT PAGE: 51 OF 53
..s.)04e//NoroRN
file://D NttfoV2\module9\m9490.htm 8/9/2011
FBI021023 ACLURM021232
JTFF CBT Page 1 of 1
?)164THNOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Temporary Duty Pre-Deployment Planning bcclowrent Rriofinct
(U) After an employee has been identified as a candidate for deployment, management may•hold a briefing. The Deployment Briefing will accomplish several objectives by communicating the following:
• The nature and objective of the deployment. • All relevant, available intelligence. • Potential dangers involved, and discussion regarding physical security during the deployment. • Necessary precautions. • Anticipated time frame and schedules. • Chain-of-command. • Emergency contacts and plans for deployment termination/emergency evacuation. • EAP facilitated education relating to separations, stress and coping skills. • Support services available via EAP, Health Services, Office of General Counsel, Office of International
Operations, etc, • Dissemination of pre-deployment checklists, tips, and family support information. • Establish a time-period for candidates to prepare and set tentative dates for the next briefing.
QUIT :: PREVIOUS :: NEXT PAGE: 52 OF 53
>114//NOFORN
file://DAjttfoV2\module9\m9_500.htm 8/9/2011
FBI021024 ACLURM021233
JTFF CBT
Page 1 of 1
,11V/NOFORN
JOINT TERRORISM International TASK FORCE (JTTF) Operations
ORIENTATION
(U) Module Review
b 7D I. A Legat. an FBI rqwesentative stationed in an American Embassy abroad, is responsible for liaison b 7E and Intelligence agencies in matters of interest between these agencies and
FBIHQ. FBIHQ personnel and domestic field offices requiring investigative assistance abroad should utilize the services of the Legat.
• Specific policies and procedures should be followed when planning to travel outside the United States.
PREVIOUS :: FINISH MODULE PAGE: 53 OF 53
file://DAjttfoV2\module9\m9510.htm 8/9/2011
FBI021025 ACLURM021234
JTFF CBT
DECLASSIFIED BY 65179 DMH I stp/ 1sg
Page 1 of 1 ON 10-14-2011
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
"SneWthlitetPeetti-
Middle East/Arab Culture And Familiarization
Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to Introduce the new task force officer to Middle East/Arab culture.
(U) Objectives:
1. Read and review a history of the Middle East. 2. Gain a basic understanding of Islamic religion and society. 3. Read and review an overview of radical fundamentalist terrorist groups.
QUIT :: PREVIOUS :: NEXT PAGE: 1 OF 61
.ascarai-merelot--
file://D:\jttfoV2\module10\m10_000.htm
8/9/2011
FBI021026 ACLURM021235
JOINT TERRORISM TASK FORCE (J_TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
History Of The Middle East (U) The Beginning of the Middle East
(U) The earliest civilizations in the region now known as the Middle East were founded in Mesopotamia and Ancient Egypt The Sumerians, Babylonians, Assyrians and others built important states. From about 500 B.C. onward, several empires dominated the region.
(U) In the 1st Century B.C., the Roman Republic absorbed the entire eastern Mediterranean area, and under the Roman Empire, the region was united with most of Europe and North Africa in a single political and economic unit; this unity facilitated the spread of Christianity. The rule of Rome was succeeded in the 4th Century A.D. by the rule of the Byzantine Empire centered in Constantinople, which ruled from the Balkans to the Euphrates River. The Persian Empire controlled much of the Middle East beyond the Byzantine Empire. Until the 7th Century, Anatolia (Turkey), Syria, Palestine, and Egypt were all Christian and Greek speaking, united culturally and politically under the rule of the Byzantine Empire, while Mesopotamia (modern Iraq) formed a buffer zone between the Byzantine and Persian Empires.
QUIT :: PREVIOUS :: NEXT
PAGE: 2 OF 61 —ll'llettEuthitter0B21
file://DAjttfoV2\module10\m10_010.htm 8/9/2011
4
u Mess of Mecumlulls • Cities of Usupeternia
Bordot of mOdetn Iraq
JTFF CBT
Page 1 of 1.
—SECRVPH14944aRN
FBI021027 ACLURM021236
JIFF. CBT Page 1 of 1
—000ftlYtilVelPeRN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
History Of The Middle East (U) The Rise of Islam
(U) The rise of Islam in the Arabian Peninsula was a decisive event in the creation of the Middle East as a distinct cultural region. The followers of Muhammad occupied Palestine, Mesopotamia (Iraq), Syria, and Egypt. The Byzantines succeeded in preventing the Arabs from seizing Anatolia, which remained Christian until the arrival of the Turks 400 years later. The majority of the population in the areas conquered by the Arabs converted to Islam within two generations, creating a permanent cultural frontier between Europe and the Muslim world.
(U) During the 9th and 10th Centuries, the Arabs remained unchallenged in the zone between the Nile and the Tigris Rivers as well as in North Africa and most of Spain. The Arab cities of Cairo, Alexandria, Basra, Damascus and Baghdad, supported a large population, a prosperous trading economy, and a rich cultural life.
QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 61
--SEt9B114,(Z)ZORN.
file://DAjttfoV2\module10\m10_020.htm 8/9/2011
FBI021028 ACLURM021237
JTFF CBT
Page 1 of 1
—eseRsehitoepem
JOINT TERRORISM Middle East/Arab
TASK FORCE (JTTF) Culture And
ORIENTATION Familiarization
History Of The Middle East (I!) Thst nice of Emnires
(U) By the mid-11th Century, the Seljuk Turks had migrated south from central Asia, and conquered Persia, Iraq, Syria, Palestine and the Hejaz, defeating the Byzantines and conquering Anatolia and later Egypt. The Seljuk Turks ruled most of the region for several hundred years, until the empire began breaking up. The fragmentation of the region allowed the Christian west to re-enter the region during the European-led Crusades. The Crusaders, however, where unable to establish a permanent presence in the area.
(U) By the 15th Century, a new empire had arisen in western Anatolia, ruled by the Ottomans who united the entire Middle Eastern region under one rule. The Ottomans continued by conquering Greece, the Balkans, and most of Hungary; however by 1700, the Ottomans had been driven out of Hungary and began a cultural and technological decline. The Middle East began looking to the west for money in order to build up the region.
QUIT:: PREVIOUS :: NEXT PAGE: 4 OF 61
-SrettrrHtf0PERIN
file://D:\jttfoV2\module10\m10_030.htm 8/9/2011
FBI021029 ACLURM021238
JTFF CBT Page 1 of 1
"SETRETHNOWQRN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
History Of The Middle East
(U) British and French Involvement
(U) When the Ottoman Empire collapsed in the 1900s, the British and the French enacted a secret treaty (Sykes-Picot Agreement) to partition the Middle East between them. Thus, the British and French established a permanent presence in the area. Great Britain, fearful of potential threats to their economically critical trade with India, began occupying the Middle Eastern counties of Egypt, Sudan, and Somalia. During World War I, the British took over Palestine and Mesopotamia, and freed Arabia from the Turks, ensuring their independence under pro-British rulers. Post-war settlements between the Allies left Britain in control of the Middle East in the 1920s. It was during this time of British control that territories on the Arabian Peninsula came together as Saudi Arabia and gave rise to Arab nationalism as a strong influence. In addition, the British implemented the Balfour Declaration.
(U) The Balfour Declaration put in writing Britain's Foreign Secretary, Arthur Balfour's, promise to ^view with favor" the creation of a Jewish homeland, should the Jews support Britain in the war effort. Soon after World War I, Jews known as Zionists began their campaign to return Israel to "Ancient Israel." Jews by the thousands began immigrating to Palestine, buying land from absentee Arab owners, and settling in virtually independent, self-contained settlements. Balfour's Declaration created an ethnic and religious divide that is still a major cause of conflict in the area today.
QUIT:: PREVIOUS :: NEXT
PAGE: 5 OF 61 szczamalmatorer
file://D:\jttfoV2\module10\m10_040.htm 8/9/2011
FBI021030 ACLURM021239
THE PALESTINE
17=1=-1 POST .•••■■•0110.
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
History Of The Middle East jU) Independence in the Middle East
(U) During the 1920s and 1930s, Iraq, Syria and Egypt moved toward independence. In Palestine, the conflict between the forces of Arab nationalism and Zionist colonization was exacerbated by the 1947 United Nations plan to partition Palestine to create both a Jewish state and a Palestinian state. The Palestinians rejected the plan, and the Zionist settlers declared Israel a state in 1948, sparking a war in which the Palestinians, supported by neighboring Arabs, were defeated.
(U) The departure of European powers from direct control of the region, the increasing importance of the oil industry, and the establishment of Israel marked the creation of the modem Middle East.
STATE OF ISRAEL IS BORN A.. tr. roma Mi.• • dr ftemo;
{o.• •■•••■••■•■•••■•••=11.1.(••••••
•
QUIT PREVIOUS :: NEXT PAGE: 6 OF 61
STATLPT7180909.9
file://13:\jttfoV21module101m10050.htm 8/9/2011
JTFF CBT Page 1 of 1
—SEcRLFMNUE111214
FBI021031 ACLURM021240
JTFF CBT
Page 1 of 1
-tre0641:4410FORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) The Founding of Islam
Muhammad is the founder of the religion of Islam, and considered by Muslims to be the final prophet from God. Muhammad, at the age of 40 in 610 A.D. went on a retreat to Mecca and purportedly began hearing the voice of God telling him new, pure scripture. Muhammad recited the scripture to family, friends, and, later, growing numbers of believers. The scriptures were later put into a holy book called the Quran. Muhammad followed the scriptures absolutely, without deviation, and expected those who believed in Islam to do the same. To help him interpret the meaning of the scriptures, Muhammad gathered a group of close relatives, friends, and confidants, who become his Al Shura Council.
(U) When Muhammad started preaching in 612 A.D., he brought to the Arabian Peninsula a unifying influence. Islam, in effect, unified the Arabian Peninsula as a nation, by giving the inhabitants a:
• Common name - Muslim • One leader to follow - Muhammad • A common goal in life - to worship God and spread his word (Islam) to others • A single language for all to use - classic Arabic
QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 61
—SreltirtH6604001-
file://D:\jttfoV2\module10\m10_060.htm .8/9/2011
FBI021032 ACLURM021241
JTFF CBT
Page 1 of 1
arelt0S,L/NOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society
lUi The Founding of Islam (Cont)
(U) Not all people in Mecca, especially the rich merchants, welcomed Muhammad's revelations regarding Allah's desire for social justice among humans and prostration before him (Allah). When Muhammad's clan leader died, Muhammad lost his protection in Mecca. In 622 A.D., Muhammad fled to Medina, a city north of Mecca, where he and his followers found protection from the two Arab tribes living there. Muhammad's departure from Mecca is called Hijrah, and the Hijrah is considered the official beginning of Islam and the start of the Muslim calendar.
(U) Muhammad and his followers settled in Medina, where Muhammad continued his preaching. At first, Muhammad preached unity under one God with the Medini Jews, but the Jews wanted nothing to do with Muhammad or Islam. As time passed, the Jews became intolerant of Muhammad's message and the spread of Islam. The Medini Jews joined with the Meccan Arabs, who pursued Muhammad to Medina to stop Muhammad's spread of Islam. In 630 A.D., Muhammad marched an army to Mecca and retook the city.
QUIT:: PREVIOUS:: NEXT PAGE: 8 OF 61
—60Q0304140000014-
file://DAjttfoV2\moduie10\m10_070.htm 8/9/2011
FBI021033 ACLURM021242
CBT
Page 1 of 1
ZETET6400FORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Islamic Religion And Society (U) Islam after Muhammad's Death
Middle East/Arab Culture And Familiarization
(U) After Muhammad died in 632 A.D., the senior leaders of Muhammad's Al Shura Council fearing that the community could easily fall apart without strong leadership, moved quickly to decide the following:
. The Islamic government would consist of a khalifa (caretaker) or caliph, and
. A representative council could override the caliph if he overstepped his bounds. •
(U) The Council elected the oldest member, Abu Bakr el-Saddeq, as the leader, however, many followers were unhappy with the Al Shura Council's decision and believed that All ibn Abi Talib, Muhammad's cousin and son-in-law, as the blood relative, should be the first caliph. All eventually became the fourth and final caliph.
Two years into All's rule, a rival tricked All and seized power. This event set off vendettas and counter-vendettas that triggered three events:
. All's assassination
. The challenge against All's son Hassan as leader
. The murder of All's second son Hussain in a battle at Karbala (Iraq)
QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 61
ascasal4Nororer
file://aAjttfoV2\module10\ml0_080.htrn 8/9/2011
FBI021034 ACLURM021243
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Islam after Muhammad's Death (Can't)
(U) All's followers calling themselves Shies, considered these three acts treasonous, and they permanently split from the main group, which was later called Sunni.
QUIT:: PREVIOUS:: NEXT PAGE: 10 OF 61
-sreiesettiaoFoeN
file://DAjttfoV2\modulelain10_090.htm 8/9/2011
FBI021035 ACLURM021244
JTFF CBT Page 1 of 1
SER QRN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society
(U) Shia Muslims
(U) Shia Muslims' follow All's secular interpretation of Islam. All and his followers, as seculars, believed that if God wanted people to enter Islam by force or sword, he would have used the word youdkhloun (meaning "being pushed or forced") in the Quran. Instead, he used yadkhloun (meaning "by their own free will"). Thus, All believed that Abu Bakr was too militant, and his actions would prevent Jews, Christians, and pagans from freely flocking into Islam. Shia Muslims:
. Strongly believe in the tenets of Islam; however, they follow a less stringent (literal) interpretation of the Quran.
. Label as sinners all who do not believe that only blood descendants of Muhammad (and Ali) should be caliph.
. Follow a complete legal code called the 3afari School of Thought.
. Believe in the sinlessness and infallibility of their Imams (religious leaders).
. Dominate only in Iran, though they also have a significant presence in Iraq, Lebanon, and Saudi Arabia.
. Tactically, the Shia are more apt to cooperate with any other entity, including the West, if doing so will give them an advantage against the Sunnis.
. Comprise approximately 10-15% of the Muslim community.
QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 61
SBER1004140FORN
file://DAjttfol/2\module101m10_100.htm 8/9/2011
FBI021036 ACLURM021245
JTFF CBT Page 1 of 1
szcsaa,cmePess
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Sunni Muslims
(U) Sunni Muslims' follow Abu Bakr's fundamentalist interpretation of Islam. Abu Bakr believed that no one could repent without being pushed. Thus, people must "be repented" by force. Abu Bakr did not think All and his Shia followers were capable of effectively leading the Muslim armies against the idol worshipers, Jews, and Christians. Sunni Muslims:
• Believe that elections should determine caliphs. • Have a conservative, traditionalist view of Islam. • Believe in a literal interpretation of the Quran, and believe that anything outside of what the Quran
teaches is unacceptable. • Follow the Sharia law. • Control how the Quran is printed and distributed. • When Sunni's hear Muhammad's name they must speak the following phrase: Sallailahu alayhi wa
sallam, meaning "the peace and blessings of God be upon him." • Consider the Sunnah of Muhammad the second most important source of Islamic doctrine. The Sunnah
is written using the filter of Muhammad's words, actions, and experiences. • Comprise 85-90% of the Muslim community. • Have been prolific in spawning numerous and varied fundamentalist extremist terrorist organizations.
Sunni core doctrine and end state have remained the same and they continue to strive for Sunni Islamic domination of the world to prove a key Quranic assertion that no system of government or religion on earth can match the Quran's purity and effectiveness for paving the road to God.
QUIT :: PREVIOUS :: NEXT
PAGE: 12 OF 61 SECRET TRIVORR--
file://1D:\jttfoV2\module10\ml0_110.htm 8/9/2011
FBI021037 ACLURM021246
JTFF CBT
Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) (Wow — The Holy Book of Islam
(U) The Quran is the principal source of every Muslim's faith and practice, and it consists of 114 surah (recitations) with a total of 6236 ayat (verses).
(U) The surah are arranged by length, which is believed by Muslims to be divinely inspired. The major themes of the Quran include:
• The absolute authority of God. • The accountability of humans for their deeds. • The impermanence of this life. . The importance of following the examples and teachings of Muhammad.
(U) The Quran is viewed as a legal document containing the doctrines that must be followed to behave acceptably, in, order to find salvation on the Day of Judgment. It governs every aspect of life—politics, government, economics, education, child-rearing practices, male/female relationships, family structure, values, jobs, friendships, hobbies, and interests.The Quran requires those who practice Islam to embrace and follow the Arkan al Islam!, or Five Pillars of Islam. The actions required by the Five Pillars of Islam are integrated into every Muslim's daily and yearly routines.
(U) The Five Pillars are Shahadah, Salat, Zakat, Saum/Sivan, and Hajj.
QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 61
SgERIEThVABGEN
file://DAjttfoV2lmodule101m10_120.htm 8/9/2011
FBI021038 ACLURM021247
JTFF CB T Page 1 of 1
ZEURET7914460/11
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic. Religion And Society
(U) Shahadah - Declaration of Faith
(U) Also known as the Muslim Creed, the Shahadah (witnessing) is a declaration of the two founding principles of Islam spoken in a specific formula. Translated, the Shahadah means, "I declare there is no god except God," and "Muhammad Is the Messenger of God."
U) Muslims recite the Shahada a minimum of 17 times every day in their daily prayers. The first pillar eminds Muslims about the reality of dedicating their lives to God who is the only one worthy of devotion,
praise, and worship. The first Islamic pillar also helps Muslims remember their pledge to practice what Muhammad, as God's last Prophet, preached.
QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 61
—srertrytmeiretei-
file://DAjttfoV2\module10\m10_121.htm
8/9/2011
FBI021039 ACLURM021248
JTFF CBT Page 1 of 1
---"MelINCIL01=9RN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Salat - Prayer
(U) In addition to personal supplications to God spoken or thought throughout the day, Muslims must pray (perform a specific religious ritual) five times each day at specific prayer times.
. Fajr—before sunrise
. Zuhr—just after noontime • `Asr—in late afternoon . Maghrib—just after sunset . Isha—at night
(U) Muslims must ensure that they meet the following seven requirements:
. Pray only at prayer time
. Perform the ritual of wudu— the washing of hands, face, and feet with water to become ritually pure
. Wear clean clothes
. Be in a clean place
. Wear pants, a shirt, scarf or veil over hair (women only) and/or robe to cover the body
. Face the direction of. Mecca
. Have the proper focus for prayer
QUIT :: PREVIOUS :: NEXT PAGE: 15 OF 61
SEC RN
file://pNtif0V2\module10\m10_122.11tin 8/9/2011
FBI021040 ACLURM021249
JTFF CBT Page 1 of 1
L'Lztb1//1UJ IJ
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab ' Culture And Familiarization
Islamic Religion And Society
(U) Zakat — Almsgiving
(U) Islam fights the temptation of avarice by requiring its practitioners to give up a fixed portion of their annual savings to be distributed to the poor. The third pillar is a 2.5% religious tax. Muslims must pay the tax to help them overcome the human natural tendency toward greed.
(U) According to Surah 59:9 of the Quran, "Those who are saved from the greed of their own selves, they are the ones who will prosper.;' Fulfilling a desire for material possessions can distract Muslims from their real purpose in life, which is surrendering themselves to God.
• QUIT :: PREVIOUS:: NEXT PAGE: 16 OF 61
sITT01777sams
file ://D AjttfoV2\module10 \ m 1 0_123 .htm 8/9/2011
FBI021041 ACLURM021250
JTFF CBT
Page 1 of 1
' sacasahLMesees
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Saum/Sivan - Fasting
(U) Because God despises gluttony as a terrible sin, the fourth pillar helps Muslims overcome gluttonous desires. Islam requires Muslims to fast as a means of self-purification and self-restraint. Such fasting allows them to focus on the purpose of life by bringing constant awareness of God's presence.
(U) Physically able Muslims must fast from sunrise to sunset (during the daylight hours) every day during the month of Ramadan. Fasting means abstaining from:
. All food and liquids
. Inhaled substances
. Sexual activity
. Nutritional or non-essential oral medicines
(U) In addition to abstaining from ingesting or inhaling anything during the daylight hours, fasting also requires Muslims to refrain from all normally undesirable behaviors. Thus, they cannot fight, curse, argue, lie, gossip, or commit other such sins.
QUIT:: PREVIOUS:: NEXT PAGE: 17 OF 61
—SECRBILWBORGIRR
file://D:\jttfoV2\module10\m10__124.htm 8/9/2011
FBI021042 ACLURM021251
JTFF CBT Page 1 of 1-
SEGREALAKIEM.
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society
(U) Hail - Pilgrimage
(U) Even before Islam, hajj was an Arab custom. Arabs from all over the Arabian Peninsula would travel to the heart of Mecca to perform customary rituals at the Kabah, an ancient cube-shaped shrine. The fifth pillar continues a customary practice.
(U) All Muslims must make a pilgrimage to Mecca during the pilgrimage month, the twelfth month of the Islamic lunar calendar, at least once or twice in their life. However, they must do this only if they can afford the trip without depriving their families.
QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 61
rot---secizETTIERTIZ
file://D:\jttfoV2\module10\m10125.htm 8/9/2011
FBI021043 ACLURM021252
JTFF CBT Page 1 of 1
-szenstesaiN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (W Islamic Place of Worship: MasiId or Mosque
(U) The focal point of the Islamic community, the masjid is far more than simply the Muslim place of worship. Muslims routinely congregate at their masjid for prayer (especially the five daily prayers), teaching, meditation, reading, study, and reflection. Many mosques also go by the title Markaz al Islam! (Islamic Center).
QUIT ::PREVIOUS :: NEXT PAGE: 19 OF 61
szclar NOEORN
file://D:\jttfoV2\module10\m10_130.htm
8/9/2011
FBI021044 ACLURM021253
FBI021045
JTFF CBT Page 1 of 1
Middle East/Arab Culture And Familiarization
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
file://DAjttfoV2\module101m10_140.htm 8/9/2011
—SECIIMeHlieTWORN
Islamic Religion And Society rUl Islarn_and Arab/Middle Eastern Culture
(U) Culture and the Islamic religion are closely linked because Muslims believe that God controls all things in life; Islam affects a Muslims whole way of living.
(U) Arabs and Middle Easterners believe a religious affiliation is essential for every person irrtheir society. Mainstream Arabs place a great value on piety.
QUIT :: PREVIOUS :I NEXT PAGE: 20 OF 61
—911eRBSHNOFGH
ACLURM021254
JTFF CBT Page 1 of 1
SZERVI1430FORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Islamic Religion And Society ftil Arab Men and Women
Middle East/Arab Culture And Familiarization
(U) Arab men and women are careful about appearances when they meet, and Arab and Middle Eastern women go out of their way to avoid situations in which they would be alone with a man who is not a close relative. When men and women, other than close family relatives, do interact together for personal reasons, they do so with others present and generally at some kind of shared activity or social event. Women always attend mixed social events with their husband or other male relative.
(U) Arab and Middle Easterners consider it improper for a man and woman who are not closely related to be alone in a room together with the door shut or to travel with one another.
(U) Societal norms for Interactions between men and women vary among Arab countries, with the more fundamentalist Islamic countries being stricter in enforcing "proper behavior."
QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 61
rirertaT/4110,Epai
file://DAjttfoV2\module101m10_150.htm 8/9/2011
FBI021046 ACLURM021255
• JTFF CBT
Page 1 of 1
srerriWtgereim
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) interactions Between Western Men and Arab or Middle Eastern Women
(U) Foreigners must be aware of the restrictions that pertain to contact between Arab men and women and consider their own appearance In front of others.
. Arabs gain a negative impression when too much familiarity is shown toward a person of the opposite sex, and in turn, they may interpret that you are a person of low moral standards.
. Western men may greet Arab women at a social gathering, but they should include other people in the greeting.
. In many Arab countries men and women separate into their own conversation groups at social gatherings.
• Married Western women may greet and visit with Arab men if accompanied by their husbands. • Westerners can expect to spend much of their social time in all-male or all-female groups.
QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 61
seetterhtietreter
file://DAjttfoV2\module10\m10_160.htrn 8/9/2011
FBI021047 ACLURM021256
JTFF CBT
Page 1 of 1
4BeitlYrfint12111214
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Societal Structure
(U) Most Arab and Middle Eastern counties have three social classes assigned varying degrees of privilege:
. (U) Ulmer class • (U) Middle class • (U) Lower class
Nomadic Bedouin, who remain independent from the general society, don't fit into any of the social class structures. .
QUIT:: PREVIOUS:: NEXT PAGE: 23 OF 61
—SEZRETHNOVEGIII
file://D:\jttfoV2\module10\m10_170.htm 8/9/2011
FBI021048 ACLURM021257
n-Fix if tor i .i
JTFF CDT - 1;:vinclows Internet Explorer
[13, DO:foV24soclut401,m10_170.hbe v'..0.1 X , ^ _•- _____ • - _ • I• I.-- Fee Fa %eve Favortes Toots He
Favorites 114 FBI trtranst . -
:feXFF03T - El 6 - pao;. saw. Toils-
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DEB / stp/ lsg
b 7E
(1.1) Upper dose
(U) The Arab and igliddletaSternupPer class cun~isi. u.. r
4(wov. SJ My ono.
• Royalty • Large and Influential families • Some wealthy individuals
Foreign residents of Arab and Middle Eastern countries generally gain the privileges and esteem of the upper class.
Society in general expects certain kinds of behavior in public from members of the upper class who wish to keep their good Image and standing. Upper class persons generally do not:
• Perform manual labor In front of others • Dress and groom themselves when out in public • Intimately socialize with people from other classes • Mix people of different social classes at their parties or events
Cc) g; gjt 9'.001
FBI021049 ACLURM021258
1p or. it. / v• 011.: DiUttfoV2tmodiel5m10_170.hbo
rie Edt Mew Favorites Tads Help
5:z Favorites 1 4 b. FBI Intranet - .
- 4 • slum • ,.:
(9,,•-d7j7G,,Ai V Mr Corroder
6).1=41 JrFF CET- Window;
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB stp/ lsg
b7E
(U) Middle dass
The middle class comprises of:
. Government employees • Military officers • Teachers . Moderately prosperous landowners • Moderately prosperous merchants . Clerics
r
k.u.ortr
JTFECDT - y/indows Internet Explorer a
fl -0 tRr awe sdaty • iccir. 9.
FBI021050 ACLURM021259
man I
0 JIFF CBT •Windows Internet Explorer
,̀44? X' 17)1...,,iSisrei
- Page- saiaty• 'rods 4). *
Lit reUtdorAmoduktonmte_170.1trn
Fie Edit View Farad= Toth Hey
Fawthes I e,..) FeUrtranet
03114.cor
• Atom g My Cateuter
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH stp/ Isg
b7E
(U) Lower class
Other than the nomadic bedouln, anyone noi. in we upper dass. Such groups include:
• Peasant farmers • Urban poor . Village poor • Servants/manual laborers
GAELs1c,'' Fall 1nFn Itho Inwor
FBI021051 ACLURM021260
JTIF CDT - Windows Internet Explorer LEI '41. X! p IkoYST OVioV24rock1e 10010_17011km
Fde Edt View Fevorkes Tools Help Rondos MI Wend
faxvr CIX The Bedouin
la- Pegs. Sidi Tads- 40- "
0.00(2
gr.V Ccaputer - two%
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg
1. pp r
Nomadic Bedouin, who remain independent from Ute yeuelai bud=ty, %twat ft tcw arq :f tint scct'.! structures.
The functional social unit In Bedouin society is the wandering group - a number of extended families, all of who usually trace their descent to one common patrilineal ancestor. Such a unit camps together, wanders together in search of pasture for Its animals, practices endogamy, atcLhasz-strangty developed feeling of cohesion. Oa lieeder;seiRestore Bedouins comprise about 10% of the Arab population.
- 9:41
b7E
FBI021052 ACLURM021261
JTFF CBT
Page 1 of 1
-SECRSirmLataEZRN
JOINT TERRORISM TASK FORCE (iTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society
LUIFamily Structure
(U) Arab society is built around the extended family system with strong relationships evident with both the immediate and extended family. Extended families who live together have a definitive structure according to status and control with the adult male head of the household having the highest status and daughters of the head of the household having the lowest status.
(U) The Quran dictates that men should be the head of the family. Many Arab men often remain in their father's household, while Arab women always move to live and raise their children within their husband's household.
(U) Men are the public face of a family, making all decisions that affect the family's welfare. Women have a clearly defined place in the family that exists "behind the scenes" or out of the public eye, and publicly women are always expected to defer to the wishes of the males in their family.
QUIT:: PREVIOUS :: NEXT
PAGE: 24 OF 61 TECRISTHIWZOBN
file://D:\jttfoV2\module,10\m10_180.htm 8/9/2011
FBI021053 ACLURM021262
JIFF CBT Page 1 of 1
SECrrilt4GEOW
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Islamic Religion And Society (U) Family Obligations
(U) To Arab and Middle Easterners, family loyalty is second only to Islam, and adult men are responsible for caring for all family members, including the extended family.
QUIT :: PREVIOUS :: NEXT
PAGE: 25 OF 61 ---Strffr707F0P31
file://D:\jttfoV2\module10\ml0_190.htm 8/9/2011
FBI021054 ACLURM021263
JTFF CBT Page 1 of 1
SZelifiris401QMRN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
(U) Al-Qa'ida
(U) Formed in 1988, by Usama bin Laden to unite the Arabs in Afghanistan, Al-Qa'ida is the first multi-national terrorist group of the 21st century. Al-Qa'ida, comprising all extremist fundamentalist Sunni Muslims, has the following goals:
1. Establish Islamic states throughout the world 2. Overthrow non-Islamic states throughout the world 3. Expel U.S. and western influences from the Persian Gulf region
(U) Al-Qa'ida allies itself with other Islamic extremist groups, including the National Islamic Front and the Iranian Shiite organization, Hizballah, to achieve its goals. Bin. Laden, as Al-Qa'ida's leader, follows the original concepts of Muhammad as written in the. Quran, Sharia, and Hadith.
(U) Bin Laden does not make excuses for using terrorism because he believes he has Allah's blessings to commit violent acts and engage in mass casualty and catastrophic terrorism. Bin Laden promotes the belief that those who martyr themselves for Islam will go straight to heaven, with all sin forgotten. Because not all Muslims are assured a place in heaven, this belief accounts for the number of suicide operations Al-Qa'ida and other terrorists are willing to take. The broad-based ideology followed by Al-Qa'ida appeals to the young and continues to draw supporters, even in its currently weakened state.
QUIT :: PREVIOUS :: NEXT
PAGE: 26 OF 61 "JETIELMVHOPOBB
file://D:\jttfoV2\module10\m10_200.htrn 8/9/2011
FBI021055 ACLURM021264
b7E
JTFF CBT
Page 1 of 1
--s>"emuziOFORN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups ° (U) Al-Oa'Ida (Con't)
(U) In 1998, bin Laded announced the formation of a new organization called "Islamic World Front" for the Struggle Against the Jews and the Crusaders, making all non-Islamic nations and peoples a potential target for Al-Qa'ida. Under this banner, he issued a fatwa (contract) stating that "it is the duty of all" Muslims to kill U. S. citizens, both civilian and military, and their allies everywhere, and they can do so without fear of reprisal from Allah. In fact, some Muslims believe that they will face Allah's wrath on the Day of Judgment if they do not carry out fatwas issued by the religious leaders.
QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 61
SECRET/ NO
file://D:\jttfoV2\module10\m10_210.htm 8/9/2011
FBI021056 ACLURM021265
JTFF CBT
Page 1 of 1
sa.m.i.r/iitava4
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
137 E
QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 61
s.
file://D:\jttfoV2\module10\m10_220.htm 8/9/2011
FBI021057 ACLURM021266
JTFF CBT
—SECREIWUCCOliti
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 61
SVCRErntalrelt11—
file://D:\jttfoV2\module10\m10230.htrn
FBI021058 ACLURM021267
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT PREVIOUS :: NEXT PAGE: 30 OF 61
file://DAjttfoV21module101m10_240.htm 8/9/2011
FBI021059 ACLURM021268
JTFF CBT
Page 1 of 1
SEtTePhitieFGAIT-
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 31 OF 61 -SELIMI,LONWORN.-
file://DAjttfoV2\module10\tn10_250.htm 8/9/2011
FBI021060 ACLURM021269
JTFF CBT
-SEGRETALUOZOBN.
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Terrorist Groups
Middle East/Arab Culture And Familiarization
QUIT ::.PREVIOUS :: NEXT PAGE: 32 OF 61
Bgenth:LA=OP
file://D:\jttfoV2\module10\m10_260.htm
FBI021061 ACLURM021270
JTFF CBT Page 1 of 1
JOINT TERRORISM TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
LUI_Almgalda Command and Control
(U) Usama bin Laden is-widely recognized as Al-Qa'ida's founder and leader. His consultative council, the Majlis al-Shura, has a rotating membership. Bin Laden appoints individuals he trusts to key positions (basing such decisions on family ties, friendship, and nationality).
(U) Al-Qa'ida's organizational headquarters has operated out of Afghanistan, Sudan and Egypt. After the Taliban was removed from power in Afghanistan, members of AI-Qa'ida dispersed into small groups. Al-Qa'Ida is now spread across South Asia, Southeast Asia, and the Middle East. It may also have a presence in Mexico and the tri-border area of South America.
QUIT :: PREVIOUS:: NEXT PAGE: 33 OF 61
FEMPIVROLFORN
file://DAjttfoV2\module101m10_270.htm 8/9/2011
FBI021062 ACLURM021271
JTFF CBT
Page 1 of 1
—saanao/441evem
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
(U) Al-Oacida Activities
(U) Major terrorist attacks include:
. Bombing U.S. Embassies in Nairobi, Kenya and Dar es Salamm, Tanzania (August 1998). At least 301 people were killed and more than 5,000 were wounded.
. Directing the attack on the USS Cole In the port of Aden, Yemen (October 2000). Seventeen U.S. Navy personnel were killed and 39 were wounded.
• Hijacking and flying four airplanes. Two of the airplanes crashed into the • World Trade Center's twin towers. One airplane crashed into the Pentagon in Arlington, VA, and one airplane that was targeting either the capital or the White House in Washington, D.C., crashed into a field in Shanksville, PA (September 11, 2001). Over 3,000 individuals were killed/missing and thousands were wounded.
. Firebombing a synagogue In Tunisia (April 11, 2002). Nineteen people were killed and 22 were wounded.
. Bombing a hotel in Mombasa, Kenya where at least 15 individuals were killed and 40 were wounded (November 28, 2002).
QUIT:: PREVIOUS:: NEXT
PAGE: 34 OF 61 -sEcrcrrtfirerevet
file://D:\jttfoV2 \ module10 \ m 1 0280.htm 8/9/2011
FBI021063 ACLURM021272
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 61
-seesset4410ECalN
file://DAjttfoV2\module10\m10_300.htm 8/9/2011
FBI021064 ACLURM021273
Page 1 of 1 JTFF CBT
Middle East/Arab Culture And Familiarization
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Terrorist Groups
FBI021065
SERAIII‘HtteMPORN
b7 E
QUIT :: PREVIOUS :: NEXT PAGE: 36 OF 61
—SEeRet,HOOSOPai
file://DAjttfoV2\ module10\ml 0_310.htm 8/9/2011
ACLURM021274
Page 1 of 1 JTFF CBT
Middle East/Arab Culture And Familiarization
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Terrorist Groups
file://D:\ittfoV2\module10\m10_320.htm 8/9/2011
FBI021066
://mymvxm
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 61
SECRET•hitietweeti-
ACLURM021275
JTFF CBT
Page 1 of 1
bECRUL/MUkUAN
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 38 OF 61
-Mem/14740MM
file://D:\ittfoV2\module10\m10_330.htm 8/9/2011
FBI021067 ACLURM021276
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg
aJTFF 1.1,Jindows Internet Explorer
X pl'• DdEdeVAroxkielAm10_330.htm _ _
1;to Edt Woo Favertos Help
b7E *Favoribu I #2, FBI Intranet
I falIFFCBT a • 0 • Pap • Safety Tods "
h.
: rec.:013ml ; 4 • 4:103% •
JIFF CET • Yihrlow efr
FBI021068 ACLURM021277
fa 4t100% • 4:
wirt,),Poz‘
g MY COMPItei
jr.
'■ ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DME / StP, iSg
Help b7E
• €3
.672; o L4; otteforztmoduatovalo_33o.htm
Fie Etht Mew reveries Tools
Favates j' FBI
'03TFPCBT
4t.: X P (p.
Pepi• Safety • Teak •ge).
pur i Ls
Cliff CRT- Windows Internet Explorer
FBI021069 ACLURM021278
a CJTFF CEtT • Windows Internet Explorer
b 7 E
K--). rt: Dtttrov2vneddaimn._330.ht. Us Ea....Vlavo Routes Tools Yelp 1.4. Root= I te3 FM Intranet *rap am
x: - •
a • - Page Way • Teds
ALL INF OPEATI ON C OBTAINED HERE IN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DIM / stp/ 1s
4 compaer - • ALM% •
=1C JrFr CP • W1,16:05
FBI021070 ACLURM021279
a JTFF CDT Internet Explorer
x tp r:irn .cto tr:DAstd.,2unodukomio330.,,m Re Eck New Few:ekes Tools I.*
iR1 'E! E3 page Safety ■ To* •
Fevoaes I IA di FBI Irerarlet
I OMIT cur
- Mr! Calleuter 4 • Awn • ,
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg
.b7E
FBI021071 ACLURM021280
JTFF CBT
Page 1 of 1
BYCIRLPTHHOW3.12N
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b 7 E
QUIT :: PREVIOUS :: NEXT PAGE: 39 OF 61
SECRhx/ /FICIFORN
file://D:\jttfoV2\module10\m10_340.htm 8/9/2011
FBI021072 ACLURM021281
Page 1 of 1 JTFF CBT
Middle East/Arab Culture And Familiarization
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Terrorist Groups
8/9/2011 file://DAjttfoV2\module101m10350.htm
FBI021073
SE PORN
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 40 OF 61
SECREWAMOPORN
ACLURM021282
b7E
JTFF CBT
Page 1 of 1
SECRET111,0FORN
JOINT TERRORISM TASK FORCE ()TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT :: PREVIOUS :: NEXT PAGE: 41 OF 61
-SreggiS4140ZORN
file://D:\jttfoV2\module10\m1 0_360.htm 8/9/2011
FBI021074 ACLURM021283
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT:: PREVIOUS :: NEXT PAGE: 42 OF 61
51843RBIYINOVVRN
file://a\jttfoV2\module10\m10370.htm 8/9/2011
JTFF CBT
Page 1 of 1
-esensaftstwoRta
FBI021075 ACLURM021284
JTFF CBT Page 1 of 1
4seawhi0;49Peaul
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 43 OF 61 —SztnerfilimozoigN._
file://D:\ittfoV2\module10\m10_380.htrn 8/9/2011
FBI021076 ACLURM021285
Page 1 of 1 JTFF CBT
Middle East/Arab Culture And Familiarization
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Terrorist Groups
8/9/2011 file://DAjttfoV2\module10\m10390.htm
FBI021077
7EvarrttneveRN
'Jo 7E
QUIT :: PREVIOUS :: NEXT PAGE: 44 OF 61
--szanniftlieveaw
ACLURM021286
EMM C'...ITFF y/indows Internet Explorer
3TFF CE:T -Wf,r1O,••• lOyawAdesq*
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ lsg
o ONtifoVArneduloiCkm10 390.htm.
Edt New Puts Mob Rep
Fates I 14 Fal Intranet
_r 077 an
.;i X 1757,..e Sorrel
• 0 • Pogs• Safety. Tods • fit.
g WC:repute?
• r,por
FBI021078 ACLURM021287
J 11-T CBT
Page 1 of 1
trevrOMereRN
JOINT TERRORISM Middle East/Arab
TASK FORCE (3TTF) ORIENTATION
Radical Fundamentalist Terrorist Groups
Culture And Familiarization
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 45 OF 61
SE WALATOPOTCR
file://DAjttfoV2\module10\m10_400.htm
8/9/2011
FBI021079 ACLURM021288
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
_ggraiiiefiRinreRN
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
.b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 46 OF 61 Noisa• J.l IL1VC
file://D:\jttfoV2\module10\ml 0_410.htm
8/9/2011
JTFF CBT
Page 1 of 1
FBI021080 ACLURM021289
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT PAGE: 47 OF 61
sprn‘ml/NOFORN
file://D: \jttfoV2 \module10 \rn 1 0_420.htm 8/9/2011
JTFF CBT
Page 1 of 1
FBI021081 ACLURM021290
JTFF CBT
Page 1 of 1
---ETETEMTIYMOIPARN
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 48 OF 61
SECRBOORN
file://D: \ittfoV2 \ module10 \ m 1 0_430.htm 8/9/2011
FBI021082 ACLURM021291
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT:: PREVIOUS:: NEXT PAGE: 49 OF 61
file://D:\jttfoV2\module10\m10440.htm 8/9/2011
FBI021083 ACLURM021292
:b7E
QUIT:: PREVIOUS :: NEXT PAGE: 50 OF 61
biSL.V.Z.L
file://D:\jttfoV2\module10\m10_450.htm
8/9/2011
JTFF CBT
Page 1 of 1
_saaaasyYmerens
JOINT TERRORISM Middle East/Arab
TASK FORCE (JTTF) Culture And
ORIENTATION Familiarization
Radical Fundamentalist Terrorist Groups
FBI021084 ACLURM021293
JTFF CBT
Page 1 of 1
--SLPCROP-64140E011N
)DINT TERRORISM TASK FORCE (ITTF)
ORIENTATION
Middle East/Arab Culture. And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 51. OF 61 -919e1610/14110g0.11111-
file://DAjttfoV2\modulel01m10 460.htm 8/9/2011
FBI021085 ACLURM021294
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT:: PREVIOUS:: NEXT PAGE: 52 OF 61
—esemaght,imosous-
file://D:\jttfoV2\module10\m10_470.htm 8/9/2011
JTFF CBT
Page 1 of 1
--ILTRirrhvereabr.
FBI021086 ACLURM021295
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg
p 1.1.p Sevti o /#1- DAp.HoVArroduklOVn10470.1fts Flo Edk Vlo Favorites Took Help
Favatros I fq3 F0! Wreak
• WIMP arr - alb - Poos Sdety • Took 1.
g Carvukc
FBI021087
• f.t)"10,1_57:• 4Zit• • • • .affr- z0=, .M 3TFF CET - yrrdw,li .„
pp I • CJTEF CBT Windows Internet Explorer
Po, a
ACLURM021296
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB / stp/ lsg
I pit- • t4
C JTFF CBT -1i,Vindows Internet Explorer
b7E
Ip troisevn v Lg; oNttforAmodutelulmituan.htet
Fie Ecit %ow Fawkes Tank HCIP
f4e Ftwentes 114 FEllIntranet
Ira•E3 ca, Faie• Safer Tads.. 00.
FBI021088 ACLURM021297
b7E - • -
v IktliorAnod1lalOW110170.1tro
Ile Eck Vim Favates TccEs Help
*Feytettee I cf,a, el Feuneraec<
9 *lama., Pe • ‘100% -
Ft kJ *El V. Ni .•l= MIT CET • W1,10,Z „.
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH stp/ 1sg
m. peps • Wyly • To*, "
, r Cif-FE COT • !aindows Internet Explorer
j
FBI021089 ACLURM021298
FBI021090
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg
b7E
aJTIF COT - Windows Internet Explorer
vslit o InttlroMmodaistoVa10_470.htm
Fie Eck Nero Pelotas Tads Nip
Favoitcs I krill Intranet
03wr car Ca • CI C3 • Page • Sorely • laic ■
PL
ACLURM021299
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT:: PREVIOUS :: NEXT
PAGE: 53 OF 61
file://D:\jttfoV2\module10\m10480.htm 8/9/2011
FBI021091 ACLURM021300
.b7E
JTFF CBT
Page 1 of 1
-SSCRSVILNOSOS11-
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT :: PREVIOUS :: NEXT PAGE: 54 OF 61
nutvRII
file://a\jttfoV2\module10\m10_490.htm 8/9/2011
FBI021092 ACLURM021301
JTFF CBT Page 1 of 1
spcurm//mnynom
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b 7E
QUIT :: PREVIOUS :: NEXT PAGE: 55 OF 61
SECEIVILAANGEGIDT
file://DAjttfoV2\module10\m10500.htm 8/9/2011
FBI021093 ACLURM021302
b7E
JTFF CBT Page 1 of 1
EAL•1cZ. J. / (MORS
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
QUIT :: PREVIOUS :: NEXT
PAGE: 56 OF 61 "ECEIETHEMEOUN
file://D:\jttfoV2\module10\ml 0_510.htm 8/9/2011
FBI021094 ACLURM021303
JTFF CBT Page 1 of 1
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Radical Fundamentalist Fundamentalist Terrorist Groups
Middle East/Arab Culture And Familiarization
b7E
QUIT :: PREVIOUS:: NEXT PAGE: 57 OF 61
-3ZERerfrisesess
file://DAjttfoV21module10\m10_520.htm
8/9/2011
FBI021095 ACLURM021304
JTFF CBT
Page 1 of 1
—saeaseHtterePaq
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 58 OF 61 —6BEIREITHMIPOItlf
file://D:\jttfoV2\module10\m10_530.htm 8/9/2011
FBI021096 ACLURM021305
JTFF CBT Page 1 of 1
—RECRErhitfePORN
]DINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Radical Fundamentalist Terrorist Groups
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 59 OF 61 --1:1139RBW,14410EORN
file://D:\jttfoV2\module10\m10_540.htm 8/9/2011
FBI021097 ACLURM021306
JTFF CBT Page 1 of 1
soememeeirorea
JOINT TERRORISM TASK FORCE (3TTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Module Review (U) The Middle East has a complex blithe,/ that impact:, national and International relationships today.
(U) The religion of Islam plays a significant role in Middle Eastern/Arab society.
(U) The following radical fundamentalist terrorist groups operate in the Middle East and worldwide:
b7E
QUIT :: PREVIOUS :: NEXT
PAGE: 60 OF 61 szeitsei-AlicEORX
file://DAjttfoV2\module10\m10_550.htm 8/9/2011
FBI021098 ACLURM021307
JTFF CBT
Page 1 of 1
.racamaylitterem
JOINT TERRORISM TASK FORCE (JTTF)
ORIENTATION
Middle East/Arab Culture And Familiarization
Module Review Congratulations, you have completed the"Joint Terrorism Task Force Orientation" course." After completing the attached EMITSAY 121eDEP select "Finish Module" at the bottom of the page to return to the course menu.
The purpose of this survey is to to gain a better understanding of your views concerning the overall effectiveness of the online course you have just completed. Please take the time to write comments, particularly if you disagree or strongly disagree with an item, since this type of feedback is especially useful in improving future training.
All responses are anonymous and the results will be compiled, analyzed, and reported as group data.
Thank you for your participation.
b7E
PREVIOUS FINISH MODULE
PAGE: 61 OF 61 . SBeftEMLYAK60211
file://D:\jttfoV2 \ module10 \ m 1 0_560.htm 8/9/2011
FBI021099 ACLURM021308