T5 B52 Watch Lists 2 Of 3 Fdr- Fbi Docs Responsive To Request 13-7 140

  • Uploaded by: 9/11 Document Archive
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View T5 B52 Watch Lists 2 Of 3 Fdr- Fbi Docs Responsive To Request 13-7 140 as PDF for free.

More details

  • Words: 1,266
  • Pages: 6
(Wi£f'!'i

£=;:*»£v.> •,-.-.• •

.-.-

-.-.

; •

|^!lw;-:-:; ' : \;i-\''~;•'•'•.*.' '•"•• "• '

:'•- •'..-

llllfoRIST IDENTITY PROJECT

fflilPONSIVE to #13-7

istsn.!fti/IK-i-,.:,; 'V-' " • • • • ,™.V;:-• Kip

»v*#VH v..;; •:-' ' ; ..

COMMISSION COPY "fl ?*»•!&

^^EfSS&';:

I/I 995)

FEDERAL BUREAU OF INVESTIGATION Precedence: 'irradiate

To:

Date:

All Field Offices

Attn:

01/10/2002

ADICs SACs DT/IT SSAs

CJIS From: Counter-terrorism Division /. Domestic Terrorism / Counterterrorism Planning Section Contact: SSA [

Approved By:

Mueller Robert S / ..-•' Watson Dale L / ..--"' McChesney Kathleen L / .,--"" Parkinson Larry /x.--'" Caruso James T /9/11 Law Enforcement Privacy Bowman M E Jarboe James F Davis Todd

Drafted By: I Case ID #:

Title:

1

66F-HQ-A1255362 (Pending) 66F-HQ-C1321794 (Pending)

SAFE STREETS VIOLENT CRIME INITIATIVE VIOLENT GANG AND TERRORIST ORGANIZATIONS FILE (VGTOF)

Reference: 66F-HQ-A1255362, serial 12, dated 11/20/2001, EC from the Office of the General Counsel (OGC). Synopsis: Instructions to all Field Offices to locate, identify and compile all names and identifying information from Counterterrorism Program subjects for placement into VGTOF. Details- As all recipients are aware, a conference for all FBI senior management was held on January 08 and 09, 2002. During this conference a presentation was made by CTD, CJIS and OGC concerning the use of the Safe Streets Violent Crime Initiative, Violent Gang

000000001 Req 13-7

Vll Law Enforcement Sensitive To,: All Field Offices Re:' •\66F-HQ-A1255362

From: Counterterrorism Division Date: 01/10/2001

and Terrorist Organizations File (VGTOF) throughout the time set for the 2002 Olympic Winter Games. The Counterterrorism Divison and Salt Lake City Division have identified the need to increase officer safety in che geographical regions surrounding Salt Lake City, and also provide a method for tracking and notification prior to a subject's arrival in-the region. Based upon the -need for increased safety for the Olympic Games and the necessity for increased information sharing with our law enforcement partners, senior FBI management personnel concluded that due to the substantial ris.k imposed upon the 2002 Winter Olympic Games that each field division would search their files to compile a list of subjects from the Counterterrorism program who could pose a threat to the Olympic Games. Therefore, all field offices are directed to immediately compile a list of all Counterterrorism Program subjects from open Domestic Terrorism and International Terrorism cases (Preliminary Inquiries and-. Ful.l Investigations). All assigned personnel are to immediately access and retrieve the names, dates of birth, social security numbers and other relevant unclassified identifying information, such as descriptive data (height, weight, eve color, hair color, etc.), miscellaneous numbers (passport numbers, etc.) , operator license numbers, and, vehicle : information, of ALL investigative classifications for'-Domestic and ^International Terrorism, including cases concerning any I | I and then task your NCIC operators to load all names and identitying information into the NCIC VGTOF file by COB February 1, 2002. Additional information concerning details for entry into the VGTOF can be found in the NCIC Operating ManualtVGTOF Chapter. Not all states have the capability to enter records into the VGTOF. The field divisions in the following states, due to a lack of programming for this function in those respective states, must submit their record entry requests with a cover EC and a completed FD-930 for each individual entry, assigning the appropriate Terrorist Organization Classification (outlined on page 3 of this document) with all relevant data, to the CJIS Division, Programs Development Section, Attention: Unit chiaf-f j. The affected states are: / .,...-•"" J If you submit--aft'" entry request to the CJIS Division, you must also submit any'record updates, i.e., modification, rar.cellation, etc.,-,-""to the CJIS Division.

9/11 Law Enforcement

Req 13-7

Privacy

000000002

11 Law Enforcement Sensitive

To:""-A.ll Field Offices Re: 66F-HQ-A1255362

From: Date:

Counterterrorism Division Cl/10/2001

J have the capability to enter Since only |_ photographs into the NCIC, ALL field divisions are asked to submit any photographs you have of these subjects to the CJIS Division, along with a copy of your NCIC record entry. The CJIS Division will add these photographs to your record. If the CJIS Division is making your record entry, submit any photographs with the initial record entry request. All field offices who have the capability to enter information into the NCIC VGTOF file must use the following Terrorist Organization Classifications and corresponding codes prior to entering individual subject information. For Domestic Terrorism subjects, the Terrorist Organization Classifications are:|

The following information will be programmed within the NCIC VGTOF as directions to state and local law enforcement officers: "WARNING - APPROACH WITH CAUTION. HOWEVER, MAKE NO EFFORT TO ARREST INDIVIDUAL UNLESS THERE IS EVIDENCE OF A VIOLATION OF FEDERAL, STATE, OR LOCAL .STATUTE(S). ONCE AN INDIVIDUAL IS IDENTIFIED WITHIN THIS SYSTEM, CONDUCT ALL LOGICAL INVESTIGATION UTILIZING TECHNIQUES AUTHORIZED IN YOUR JURISDICTION. DO NOT ALERT THE INDIVIDUAL TO THE FBI'S INTEREST AND CONTACT YOUR LOCAL FBI FIELD OFFICE AT THE EARLIEST OPPORTUNITY." All receiving offices are to notify all personnel of the following procedures to be followed during the time period of January 24, 2002 until February 25, 2002. After an office is notified from state, local or other law enforcement agencies that a subject listed in the VGTOF file has been stopped and identified in their jurisdiction, then that office will collect ALL information obtained

Req 13-7

OOOOOOOC3

11 Law Enforcement Sensitive

To: Ali. Field Offices Re: 66F-HQ-A1255362

From: Counterterrorism Division Date:' 01/10/2001

by the state or local, law enforcement official and immediately convey that information to th'V-..f oil owing entities: 1} The Salt Lake City Division; 2) The Office of-Orinin fOO) for the identified subject; and 3) FBIHQ SIOC Olympics at I ~J. The Counterterrorism Division realizes that there must be a balance between reducing the possible threat to the Olympic Games and the comprehensive investigative interests of the Counterterrorism Program. Therefore, all recipients are reminded that if there is a particular subject of a Domestic or International Terrorism investigation whose identity is so sensitive that the possibility of that subject's identity becoming known could compromise current or future FBI investigative operations, then that subject can be placed on the "silent hit" notification program discussed at the SAC Conference. Such capability for this type of entry into NCIC is currently unavailable for field offices. Therefore, all subject information, to include primarily first and last name, date of birth, and numeric identifiers capable of being retrieved in NCIC (i.e. drivers license or DMV numbers, passport numbers and social security numbers) for all silent hit requests, should be forwarded to CJIS, Programs Development Section for entry. However, utilizing the "silent hit" capability of the VGTOF system will forego the intelligence a state or local law enforcement officer can gather during the course of a field interview. Finally, please be advised that a Law Enforcement NLETS message will be sent out simultaneously with the transmission of this EC notifying all state and local law enforcement agencies that the VGTOF system will be utilized throughout the 2002 Olympic Games for the identification and tracking of current terrorism subjects. Thus, each field office liaison should coordinate with their state and local law enforcement partners to ensure consistent application of the system.

Req 13-7

000000004

T6: All Field OffiooS Re: 66F-HQ-A1255362

From: Date:

Counterterrorism Division 01/10/2001

LEAD (s): Set Lead 1: ALL RECEIVING OFFICES Immediately assign personnel to access and retrieve the names and all identifying information of ALL invesrigative classifications for domestic and international terrorism, including cases concerning any diplomats from state sponsors of terrorism and then task your NCIC operators to load all names and identifying information into the NCIC VGTOF system by COB February 1, 2002.

Req 13-7

000000005

Related Documents


More Documents from "9/11 Document Archive"