National Counterterrorism Center, Watchlisting Guidance, 2013
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
UNCLASSifIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMAITON March 2013 WATCH LISTING GUIDANCE ** UNCLASSIFIED//fOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMAITON WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons without a "need to know", as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transportation Security Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For U.S. government agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and 1520. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 2013 WATCHLISTING GUIDANCE TABLE OF CONTENTS CHAPTER 1: WATCHLISTING PROCESS AND PROCEDURES ...................................... 5 I. INTRODUCTION ............................................... ............................................................ 5 II. WATCHLISTING AUTHORITIES ............................................................................... 6 111. CONSTITUTIONALLY PROTECTED ACTIVITIES ............................. ............... .... I 0 IV. WATCHLISTING POLICIES ...................................................................................... 11 V. WATCHLISTING STANDARD: IDENTIFYING AND SUBSTANTIVE DEROGATORY CRITERIA ......................... ............................. ................ ................ 12 VI. WATCHLISTING PROCESS OVERVIEW ..................... ......... ... ....... .......... ...... ...... 13 VII. ROLES AND RESPONSIBJLITES FOR THE WATCHLISTJNG AND SCREENING COMMUNITY ..·............................................................................................ ... ............ . 16 VITT. QUALITY CONTROL MEASURES ............ ......................... ...... ... ... ... .............. ... .... 17 IX. NOMINATION PROCEDURES ......... .. ...... ....... ........................................................ 20 X. PROCEDURES TO REMOVE AN INDIVIDUAL FROM THE WATC HLIST ... 27 XI. REDRESS PROC EDURES .............................. ............................................ ...... ......... 28 XII. PERIODIC REVIEW OF THE WATCHLISTING GUIDANC E ............................ 29 CHAPTER 2: MINIMUM IDENTIFYING CRITERIA ......................................................... 30 I. BIOMETRIC NOMINATIONS .................................................................................... 30 JI. MINIMUM BIOGRAPHIC NOMINATION REQUIREMENT ... ... .... ................. ..... .. 30 lll. MINIMUM BIOGRAPHIC INFORMATION REQUIRED FOR EXCEPTIONS TO THE UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 11 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION MINIMUM SUBSTANTIVE DEROGATORY STAN DARDS FOR TERRORIST WATC HLI STING ............................. ...... ..................... ....... ........ .................. ..... .. ......... 32 CHAPTER 3: MINIMUM SUBSTANTIVE DEROGATORY CRITERIA ......................... 33 I. INTRODU CTION AND PURPOSE ....................... ..................................................... 33 II. REAS ONABLE SUSPICION ......... ................................ .............................................. 33 111. KNOWN TERRORISTS ..................... .......................................................................... 35 IV. SUSPECTED TERRORISTS ............................ ............ ..................... ...... .................... 37 V. EXCEPTIONS TO SUPPORT IMMIGRATION AND VISA SCREENING ACTIVITIES BY DI-IS AND DOS ........... ............... .. .......................................................................... 42 VI. SPEC IAL CONSIDERATIONS ....................... ... .... ............................... ...................... 45 Vll. EXAMPLES OF TERRORISM AND/OR TERRORIST ACTlVITIES ................. .... .47 CHAPTER 4: NO FLY, SELECTEE AND EXPANDED SELECTEE LISTS IMPLEMENTATION GUIDANCE .......................................................................................... 50 I. BACKGROUND ...................... ..................................................................................... 50 11. PRE-CONDITIONS FOR PLACEMENT ON THE NO FLY OR SELECTEE LIST. 50 III. NO FLY LIST CRITERIA ............................................................................................ 5 1 IV . FURTHER CLARIFICATION OF NO FLY CRITERIA ............................................ 51 V. SELECTEE LIST CRITERIA .................. .................... ................... ............................. 54 VI. EX PAND ED SELECTEE LIST CRITERIA .................................... ............................ 54 V II. ACTIONS BASED UPON POSITIV E MATCHES TO THE NO FLY, SELECTEE, OR EXPANDED SELECTEE LISTS ................................................................................. 54 VIII. IMPLEM ENTATION GUIDELINES .......................................................................... 5 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 12 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION IX. SPECIAL S ITU A TIONS .............................................................................................. 56 X. NOMINATIONS THAT ARE INELlGlBLE/NOT SUITABLE FOR E1TIIER TllE NO FLY OR THE SELECTEE UST ..................................................... ..................... ........ 57 CHAPTER 5: ENCOUNTER MANAGEMENT AND ANALYSIS ...................................... 58 l. INTRODUCTION AND PURPOSE ............ ... ........ .................................... ................. 58 Il. PROCESSING TERRORISM INFORMATION FROM ENCOUNTERS WITH POSTTIVEL Y IDENTIFTED KNOWN OR SUSPECTED TERRORTSTS ................. 59 Ill. CATEGORIES OF TERRORlSM INFORMA TfON FROM ENCOUNTERS WITH POSITIVELY IDENTfFIED KNOWN OR SUSPECTED TERRORISTS OF POTENTlAL INTEREST ............................................................................................. 65 IV. ENCOUNTER MANAGEMENT ACTIONS ................. .............. ................. ...... ........ 69 V. ROLES AND RESPONSlBlLITIES FOR UPDATING EXISTING KNOWN OR SUSPECTED TERRORIST RECORDS AND NOMINATING NEW KNOWN OR SUSPECTED .TERRORISTS BASED ON INFORMATION FROM POSITIVE ENCOlJNTERS ..................................................... .............. ..... .................................. .. 71 VI. RESPONSIBIUTY TO COORDINATE ANY ACTIONS CONTEMPLATED BASED ON 1NFORMATION FROM ENCOUNTERS W1TH A KNOWN OR SUSPECTED TERRORIST .................................................... ................ ...... ............ ............... ............ 73 VII. EXAMPLES OF TERRORISM INPORMATTON TYPICALLY AVAILABLE FROM ENCOUNTERS ............................................................................................................ 74 vm. OBTAINING ENCOUNTER lNFORMATION THROUGH TSC'S DAIL y ENCOUNTER REPORTS ............................................................................................ 77 PPENDIX 1: DEFINITIONS APPENDIX 2: HSPD-6 APPENDIX 3: TSC MOU APPENDIX 4: ADDENDUM B TO TSC MOU UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 13 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION APPENDIX 5: INFORMATION SHARING MOU APPENDIX 6: EXECUTIVE ORDER 13388 APPENDIX 7: DOJ PROTOCOL ON TERRORIST NOMINATIONS APPENDIX 8: REDRESS MOU APPENDIX 9: PRESIDENTIAL MEMORANDUM REGARDING 12/25/2009 TERRORIST ATTACK APPENDIX 10: ACRONYMS AND ABBREVIATIONS APPENDIX 11: SUMMARY OF CHANGES AND UPDATES FROM THE 2010 WATCHLISTING GUIDANCE UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 14 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION CHAPTER 1: WATCHLISTING PROCESS AND PROCEDURES I. INTRODUCTION 1.1 A key foundation for TERRORI ST 1-related screening is the U.S. Government's TERRORIST watchlisting process managed by the Terrorist Screening Center (TSC). The TSC was established by the Attorney General, acting through the Director of the Federal Bureau of Investigation (FBI), and in coordination with the Secretary of State, the Secretary of Homeland Security, and the then Director of Central Intelligence for the Intelligence Community (lC). The TSC is supported by the National Counterterrorism Center (NCTC), the Department of State (DOS), the Department of Homeland Security (DI-IS), the IC, the FBI, Law Enforcement Agencies, Regulatory Agencies and Diplomatic Bureaus. The TSC has created and maintains the Terrorist Screening Database (TSDB) or Terrorist Watchlist to serve as the U.S. Government's consolidated watchlist for TERRORISM SCREEN ING INFORMATION. 1.2 The current TERRORTSTwatchlisting process supports the U.S. Government's efforts to combat TERRORISM by: (1) consolidating the U.S. Government's Terrorist Watchlist in the TSDB; (2) helping SCREENERS and intelligence agencies accurately identify individuals on the Terrorist Watchlist; (3) providing SCREENERS with information to help them respond appropriately during ENCOUNTERS with KNOWN or SUSPECTED TERRORISTS; and, (4) subsequently collecting information about the KNOWN or SUSPECTED TERRORIST for use in assessing threats and conducting investigations. 2 The collected information may be incorporated into the Terrorist Identities Datamart Environment (TIDE) and TSDB to enhance the records of KNOWN or SUSPECTED TERRORISTS and may be made available to the wider watchlisting and screening communities. Today, the TSDB also includes information about certain foreign nationals who are associated with TERRORISM, TERRORIST ACTIVITY, or KNOWN or SUSPECTED TERRORJST(S) but for whom there is insufficient DEROGATORY INFORMATION to be independently watchlisted. This may include certain immediate famiJy members of KNOWN or SUSPECTED TERRORISTS, or known associates of KNOWN or SUSPECTED TERRORISTS. These additional categories of records (also known as exceptions to the REASONABLE SUSPICION standard) are maintained to support immigration and screening activities primarily conducted by DOS and DHS . 3 1 See Appendix 1, Definitions for words or phrases appearing in all capitalized letters throughout thi s Watch listing Guidance. 2 A SCREEN ER is a Department or Agency that is authorized to conduct TERRORISM screening to determine if an individual is a possi ble match to a KNOWN or SUSPECTED TERRORIST in the TSDB . The term "SCREENER" is used throughout this document as a general reference to a government official who compares an individual's information with information in the TSDB to determine if an individual is in the TSDB. Certain SCREENERS have components which perform both screen ing and law enforcement duties and law enforcement officials who engage in such activities may normally describe their targeting or other actions in this context as other than "screening." For ease of reference, government officials who compare an individual's information with information in the TSDB will be referred to in the Guidance as "SCREENERS." The internal guidance set forth herein is not intended to create or confer any rights, privileges, or benefits in any matter, case, or proceeding. See United States v. Caceres, 440 U.S. 741. See Chapter 3, Section V, infra, for more details. Aside from these limited exceptions, references to the TSDB in this Watchlisti ng Guidance denote the TSDB as containing information about KNOWN or SUSPECTED TERRORISTS. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 15 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.3 This Watchlisting Guidance has been developed to help standardize the watchlisting community's nomination and screening processes. It is important to remember, however, that watchlisting is not an exact science. There are inherent limitations in any primarily namebased system and analytic judgments may differ regarding whether subjective criteria have been met. Given these realities, the U.S. Government's watchlisting process attempts to safeguard the American people from a TERROR1ST attack while safeguarding privacy, civil rights and civil liberties. 1.4 Thus, when reasonable minds could disagree on a record, a NOMINATOR will make a determination in favor of sending the nomination to NCTC for consideration and additional review. The TSC has the final decision authority regarding watchlisting determinations and will add an individual 's name to the TSDB, consistent with TSC Actions and Processes as further described in Paragraph 1.56. II. WATCHLISTING AUTHORITIES 1.5 On September 16, 2003, the President issued Homeland Security Presidential Directive 6 (HSPD-6), which directed the Attorney General to "establish an organization to consolidate the U.S. Government's approach to TERRORfSM SCREENING and provide for the appropriate 4 and lawful use of TERRORIST INFORMATION in screening processes." TERRORIST INFORMATION was specifically defined to mean " information about individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM." HSPO-6 also directed the heads of Executive Departments and Agencies to provide to NCTC on an on-going basis, "all appropriate TERRORIST INFORMATION in their possession, custody, or control," to the extent permitted by law. 1.6 The intent ofHSPO-6 was to consolidate all TERRORISM INFORMATION at the Terrorist Threat Integration Center (TTIC) - whose functions were assumed by NCTC 5 - in a classified database that would then extract Unclassified, For Official Use Only (U//FOUO) TERRORI ST IDENTI FIERS for passage to the new organization created by the Attorney General. Thus, concurrent with the issuance of HSPD-6, the TSC was established via the Memorandum of Understanding on the Integration and Use of Screening Information to Protect Against Terrorism (TSC MOU), which was signed by the Attorney General, the Secretaries of State 6 and Homeland Security, and the Director of Central Intelligence (on behalfofthe IC). 4 See Appendix 2, HSPD-6. See FN 8, infra. "See Appendix 3, TSC MOU; see also Appendix 4, Addendum B to the TSC MOU. In 2004, the Secretaries of State, Treasury, and Defense also became signatories to the Memorandum of Understanding between the Intelligence Community, Federal Law Enforcement Agencies, and the Department of Homeland Security Concerning Information Sharing, dated March 4, 2003 (Information Sharing MOU). By doing so, they agreed that all provisions of the TSC MOU and the Information Sharing MOU apply to all entities that are or become a pa1t of their respective Departments. 5 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 16 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.7 Under HSPD-6, consistent with the U.S. Constitution and applicable laws, including those protecting the rights of all Americans, the TSC was to develop and maintain an unclassified database containing the most thorough, accurate, and current identity information possible about KNOWN or SUSPECTED TERRORISTS. The TSC created the TSDB to meet these goals. 7 The TSDB is also known as the Terrorist Watchlist. The TSDB receives TERRORIST IDENTIFIERS from two sources: NCTC's TIDE provides information concerning KNOWN or SUSPECTED international TERRORISTS and the TSC's Terrorist Review and Examinations Unit (TREX) provides the identities of KNOWN or SUSPECTED domestic TERRORfSTS who have no link to international TERRORISM. NCTC's TIDE contains identifying and substantive DEROGATORY fNFORMATION on KNOWN or SUSPECTED international TERRORISTS and the FBI's Sentinel system contains supporting information regarding purely domestic TERRORISTS. 1.8 Pursuant to Paragraph (2) of HSPD-6, the NCTC is mandated to "provide [TSC] with access to all appropriate information or intelligence in the [NCTC's] custody, possession, or control that [TSC] requires to perform its functions." NCTC fulfills this function by providing TSC's TSDB with U//FOUO information about KNOWN or SUSPECTED TERRORISTS from NCTC's TIDE and by providing access to TIDE Online, a read-only copy of the TIDE database, to those in the watchlisting community who require access. 1.9 NCTC's establishment by the President was codified by section 1021 of the intelligence Reform and Terrorism Prevention Act of2004 (IRTPA). 8 Pursuant to TRTPA, NCTC shall "serve as the central and shared knowledge bank on KNOWN and SUSPECTED TERRORJSTS and international terror groups." In addition, NCTC "may, consistent with applicable law, the direction of the President, and guidelines referred to in [the statute], receive intelligence pertaining exclusively to domestic counterterrorism from any Federal, State, or local government or other source necessary to fulfill its responsibilities and retain and disseminate such intelligence." 9 1.9.1 All Departments and Agencies are required to provide NCTC with all TERRORISM fNFORMA TfON. Due to the amount of information involved, only a subset of this information is provided in the NCTC prescribed format designed to facilitate direct ingestion into the TIDE. NOMINATING DEPARTM ENTS and AGENCIES, however, should remain focused on reviewing and watchlisting TERRORISM INFORMATION from datasets most likely to contain information about KNOWN or SUSPECTED TERRORISTS. Addendum B to the TSC MOU, which superseded Addendum A, incorporates by reference all provisions of the Information Sharing MOU. See Appendix 5. 7 The TSDB consolidates the U.S. Government's TERRORI SM screening and lookout databases into a single integrated TERRORJST identities database. 8 NCTC initially was created by Executive Order 13354 (August 27, 2004) to serve as the primary organization in the U.S. Government for analyzing and integrating all intelligence possessed or acquired by the U.S. Government pertaining to TERRORISM and counterterrorism, excepting purely domestic counterterrorism information . Executive Order 13354 was revoked by Executive Order 13470 (July 30, 2008) after NCTC was codified in IRTPA section I 021. 9 In addition to the provision of domestic KNOWN or SUSPECTED TERRORISTS directly to the TSC, the TSC's TREX unit also provides the identities of international KNOWN or SUSPECTED TERRORISTS to NCTC for inclusion in TIDE. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 17 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.10 On August 27, 2004, the President issued Homeland Security Presidential Directive 11 (HSPD-11), which "builds upon HSPD-6," to enhance TERRORIST-related screening to more effectively detect and interdict SUSPECTED TERRORISTS and TERRORIST ACTIVITIES. HSPD-11 defines "SUSPECTED TERRORISTS" as "individuals known or reasonably suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM ... and TERRORIST ACTIVITIES." 1.11 To enhance information sharing, another key component of the consolidated terrorist watchlisting system, the President issued Executive Order 13388, which provides that the head of each Agency that possesses or acquires TERRORISM INFORMATION shall promptly give access to that information to the head of each other Agency that has counterterrorism functions. 10 1.12 On June 5, 2008, the President issued Homeland Security Presidential Directive 24 (HSPD24) to further build upon the TERRORIST screening policies announced in HSPD-6 and HSPD1 I to protect the nation from TERRORISTS by enhancing the use of biometrics. In HSPD-24, the President directed that" ... agencies, shall, to the fullest extent permitted by law, make available to other agencies all biometric and associated biographic and contextual information associated with persons.far whom there is an articulable and reasonable basis for suspicion that they pose a threat to national security" (emphasis added). HSPD-24 underscores the value of biometrics in achieving effective TERROR ISM screening and emphasizes the need for a layered approach to identification and screening of individuals, as no single mechanism is sufficient. 1.13 The relevant TERRORISM screening Presidential Directives use words and phrases to describe a KNOWN or SUSPECTED TERRORIST subject to TERRORIST screening without defining them: "TERRORIST INFORMATION" (HSPD-6), "TERRORISM" (HSPD-6), "appropriately suspected" (HSPD-6), "reasonably suspected" (HSPD-11 ), and "articulable and reasonable basis for suspicion" (HSPD-24). Thus, previous watchlisting guidance supplied definitions of key terms and the standard that would apply to terrorist watch listing decisions. 1.14 Neither HSPD-6 nor HSPD-11 defines "TERRORISM and/or TERRORIST ACTIVITIES." While federal law contains numerous definitions of"terrorism" 11 , for watch listing purposes under this Guidance, "TERRORISM and/or TERRORIST ACTIVITIES" combine elements from various federa l definitions and are considered to: 1.14.1 10 involve violent acts or acts dangerous to human life, property, or infrastructure Appendix 6, Executive Order 13388. 50 U.S.C. I80 I (c) (Foreign Intelligence Surveillance Act (FISA) definition of"intemational terrorism"); Immigration and Nationality Act (INA)§ 2 I2(a)(3)(B)(iii) [8 U.S .C. 1182(a)(3)(B)(iii)] (defining "terrorist activity"); INA§ 212(a)(3)(B)(iv) [8 U.S.C. I I82(a)(3)(B)(iv)] (defining to "engage in terrorist activity"); 18 U.S.C. 233 l(I) (defining "international terrorism"); 18 U.S.C. 2332(b) (defining "federal crime of terrorism"); Executive Order 13224, 66 Fed. Reg. 49079 (September 23, 2001) (defining "terrorism"). 11 See See UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 18 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION which may be a violation of U.S. law, or may have been, if those acts were committed in the United States; and, 1.14.2 appear to be intended- 1.14.2.1 to intimidate or coerce a civilian population; 1.14.2.2 to influence the policy of a government by intimidation or coercion; or, 1.14.2.3 to affect the conduct of a government by mass destruction, assassination, kidnapping, or hostage-taking. 1.15 This includes activities that facilitate or support TERRORI SM and/or TERRORIST ACTIVIT[ES such as providing a safe house, transportation, communications, funds , transfer of funds or other material benefit, false documentation or identification, weapons (including chemical, biological, or radiological weapons), explosives, or training for the commission of an act of TERRORISM and/or TERRORIST ACT1VITY. 1.16 HSPD-24 speaks in terms of"articulable and reasonable basis for suspicion" to describe a KNOWN or SUSPECTED TERRORIST who should be watchlisted and represents the President' s most recent explanation concerning U.S. policy regarding the individuals who pose a threat to national security and should be screened to better protect the American people. Accordingly, that standard has been adopted and is clarified in this Watchlisting Guidance in Chapter 3, Section II. 1.17 On December 16, 2005, in accordance with section 1016 of IRTPA, the President issued a Memorandum for the Heads of Executive Departments and Agencies prescribing the guidelines and requirements in support of the creation and implementation of the Information Sharing Environment (lSE). In Guideline 5 of that Memorandum, the President directed, as he had earlier in Executive Order 13353 12 , that the information privacy rights and other legal rights of Americans must be protected and that guidelines be developed and approved to ensure that "such rights are protected in the development and use of the TSE." In December 2006, the President approved for issuance the ISE Privacy Guidelines by the Program Manager. 13 1.18 A second addendum to the TSC MOU, Addendum B 4 , which supplements and incorporates by reference all provisions of the TSC MOU, superseded Addendum A and became effective on January 18, 2007. The Directors of National Intelligence, NCTC, and the TSC joined as signatories in Addendum B. Paragraph 7 of Addendum B introduces the term TERRORIST IDENTIFI ERS to more clearly describe the type of TERRORIST identity elements that are deemed 12 See Executive Order 13353, Establishing the President's Board on Safeguarding Americans' Civil Liberties (August 27, 2004). 13 See Guidelines to Ensure that Information Privacy and other Legal Rights of Americans are Protected in the Development and Use of the Information Sharing Environment (December, 2006). 14 See Appendix 4, Addendum B to the T'SC MOU. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 19 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION U//FOUO, without regard to the classification of the source material from which it is drawn. TERRORIST IDENTIFI ERS include those listed in Addendum B (i.e ., names and aliases; dates of birth; places of birth; unique identifying numbers; passport information; countries of origin and nationality; physical identifiers; known locations; photographs or renderings; fingerprints or other biometric data; employment data; license plate numbers; and any other TERRORIST IDENTJFI ERS that ORIGINATORS specifically provide for passage to the TSC). For example, email addresses and phone numbers are increasingly useful for screening purposes. ORIGINATORS should mark email addresses and phone numbers as U//FOUO whenever possible and pass these TERRORIST IDENTIFIERS to NCTC to forward to the TSC for inclusion in TSDB. ORIGINATORS are encouraged to provide all relevant and unclassified information, to include social media information when appropriate. III. CONSTITUTIONALLY PROTECTED ACTIVITIES 1.19 First Amendment. First Amendment protected activity alone shall not be the basis for nominating an individual for inclusion on the Terrorist Watchlist. 15 The following are examples of protected Constitutional activities: 1.19.1 Free Speech. The exercise of free speech, guaranteed by the U.S. Constitution, includes more than simply speaking on a controversial topic in the town square. It includes such symbolic or other written, oral and expressive activities as carrying placards in a parade, sending letters to a newspaper editor, wearing a tee shirt with a political message, placing a bumper sticker critical of the President on one's car, and publishing books or articles. The common thread in these examples is conveying a public message or an idea through words or deeds. Speech that may be repugnant to ideas of the majority may still be protected by the U.S. Constitution. For the purpose of this Watch listing Guidance, the right of protected free speech under the U.S. Constitution applies to U.S. PERSONS wherever they are located and to non- U.S. PE RSONS located inside the United States. The right of protected free speech, however, is not unlimited and may not extend to some lawless action. 1.19.2 Exercise of Religion. The free exercise ofreligion covers any form of worship ofa deity - even forms that are not widely known or practiced - as well as the right not to worship any deity. Protected religious exercise also extends to dress that is worn or food that is eaten for a religious purpose, attendance at a facility used for religious practice, observance of the Sabbath, raising money for evangelical or missionary purposes, and proselytizing. l.19.3 Freedom of the Press. Freedom of the press includes such matters as reasonable access to news-making events, the making of documentaries, and the posting of "biogs." 15 The First Amendment does not apply to non-u.s. PERSONS outside the United States. Before submitting nominations, a specific person is a U.S. NOMINATORS may consult with their Department or Agency counsel to determine whether PERSON and whether the questioned activity is entitled to First Amendment protection. UNCLASSIFIED//FOR OFFICIAL USE ONLY /SENSITIVE SECURITY INFORMATION Page j 10 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.19.4 Freedom of Peaceful Assembly. Freedom of peaceful assembly, often called the right to freedom of association, includes gathering with others to protest government action, or to rally or demonstrate in favor of, or in opposition to, a social cause. The right to peaceful assembly includes more than just public demonstrations - it includes, as well, the posting of group websites on the Internet, recruiting others to a lawful cause, marketing a message, and fundraising, which all are protected First Amendment activities if they are conducted in support of an organizational, political, religious, or social cause. 1. I 9.5 Petition the Government for Redress of Grievances. The right to petition the government for redress of grievances includes, for example, writing letters to Congress, carrying a placard outside the city hall that delivers a political message, recruiting others to one's cause, and lobbying Congress or an Executive Agency for a particular result. l.20 Equal Protection. The Equal Protection Clause of the U.S . Constitution provides in part that: "No State shall make or enforce any law which shall ... deny to any person within its jurisdiction the equal protection of the laws." The U.S. Supreme Court has made it clear that this applies as well to the official acts of U.S. Government personnel. Nominations, therefore, shall not be based solely on race, ethnicity, national origin, or religious affi liation. Any activities relating to this Guidance that are based solely on such considerations are invidious by definition, and therefore, unconstitutional. IV. WATCHLISTING POLICIES 1.21 Watchlisting Disclosures. The general policy of the U.S. Government is to neither confirm nor deny an individual's watchlist status. In addition to the provisions in Addendum B to the TSC MOU, which require NOMINATOR approval before TSDB information can be used in any process that might result in public disclosure, the 2007 Memorandum of Understanding on Terrorist Watch/isl Redress Procedures (Redress MOU) 16 requires SCREENERS Lo wnlact the TSC if it receives a request for information or records that might reveal an individual's watchlist status. Approval would also be required from any entity which provided information used by a NOMINATOR during a nomination. Per the Redress MOU, ORIGINATJNG and NOMlNATING AGENCIES are obligated to support SCREENER determinations - both at the administrative level and in litigation - and provide appropriate information, including unclassified substitutes as necessary. TSC, in conjunction with NCTC, the NOMINATORS, and the Department of Justice (DOJ), as appropriate, will ensure that representations regarding an individual's potential watchlist status are properly coordinated and approved. 1.22 Legal or Use Restrictions. Because information in the TSDB comes overwhelmingly from intelligence sources and methods or sensitive law enforcement techniques, Paragraph 12 of 16 See Appendix 8, Redress MOU. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 11 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Addendum B to the TSC MOU17 requires that any recipient of information from the TSDB seeking to use TERRORIST identity information in any legal or administrative process or proceeding obtain NOMINATOR approval before doing so. Approval from the entity which provided the information, if other than the NOMINATOR, is also required. Additionally, information from Foreign Intelligence Surveillance Act (FISA) collections may only be used in a proceeding with the advance authorization of the Attorney General. Therefore, any SCREENER seeking to use TSDB information in any process or proceeding must contact TSC so that TSC can assist in obtaining approval from the NOMINATOR, owner of the information, or Attorney General, as required. 1.23 In addition to the foregoing restrictions, there are restrictions on sharing information with foreign governments. Any TERRORIST IDENTIFIER (as described in Addendum B to the TSC MOU) will be deemed U//FOUO and shared with the watchlisting community and foreign governments for watchlisting purposes pursuant to the terms of the TSC MOU. Accordingly, NOMINATORS sho uld include, as appropriate, TERRORIST IDENTIFIERS in documents that contain non-releasable warnings (e.g., a report is not releasable to xxx/yyy/zzz countries), unless the TERRORJST IDENTIFI ERS are restricted by some other authority that limits dissemination. If U.S. PERSON information is otherwise authorized for release to the foreign government, the nonreleasable warning is disabled to allow dissemination of the information. V. WATCHLISTING STANDARD: IDENTIFYING AND SUBSTANTIVE DEROGATORY CRITERIA I .24 Before a KNOWN or SUSPECTED TERRORIST is added to the Terrorist Watchlist, TSC reviews the nomination to determine whether it meets the following minimum identifying criteria and minimum substantive derogatory criteria for inclusion in the TSDB. 1.24.1 Minimum Identifying Criteria. Each nomination must contain minimum identifying criteria for inclusion into the TSDB. Without this minimum identifying data, the nomination is not eligible for inclusion into the TSDB, or any of the TSC 's supported systems. Chapter 2 sets forth gu idance regarding both the minimum identifying biometric and biographic criteria for inclusion into the TSDB. Although TIDE accepts records containing less than these minimum criteria, such records will not be exported either to the TSDB for watch listing or to the various supported systems used by the SCREENER.B absent an exception described in the Watchlisting Guidance. 1.24.2 Minimum Substantive Derogatory Criteria. In addition to the minimum identifying criteria, nominations to the TSDB are accepted based on a REASONABLE SUSPICION that the individual is a KNOWN or SUSPECTED TERRORJST derived from the 17 See Appendix 4, Addendum B to the TSC MOU. UNCLASSIF1ED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 112 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION totality of the information reviewed for nomination. 18 To demonstrate that the nomination has sufficient indicia of reliability to suppo1t this REASONABL E SUSPrCION determination, NOMINATING AGENCIES should implement processes designed to ensure that nominations are free from errors, that recalled or revised information is reviewed regularly, and that necessary corrections to nominations based on those revisions/retractions are made. NOMINATING AGENCIES should, to the extent possible given the nature of the reporting, verify the accuracy and reliability of the information included in nominations. In some cases, the NOMINATING AGENCY may not be able to evaluate the reliability of the information received; however, in such situations, the NOMINATING AGEN CY can ensure that the information provided is an accurate representation of the information obtained. Chapter 3 sets forth further guidance · regarding the application of the REASONABLE SUSPICION standard to TSDB nominations. VI. WATCHLISTING PROCESS OVERVIEW 1.25 The authorities referenced in Section I1 of this Chapter created the framework for the watch listing enterprise by combining various functions of existing government entities and joining them to new organizations with counterterrorism responsibilities. The resulting watch listing enterprise consists of ORIGINATORS, NOMINATORS, AGGREGA TORS, SCREENERS and encountering agencies that are supported by the community-wide collection, nomination, and consolidation processes. 1.26 ORIGINATORS, NOMINATORS, AGGREGATORS, and SCREENERS. All Executive Departments and Agencies have responsibility for collecting, collating, and sharing TERRORISM INFORMATION to support the watchlisting process. They are called ORIGINATORS because they initially collect and identify information supporting the conclusion that an individual is a KNOWN or SUSPECTED TERRORIST. An ORIGINATOR is the Department or Agency that has appropriate subject matter interest and classification authority and collects TERRORISM INFORMATION (i.e., raw information) and disseminates it or T ERRORIST IDENTIFI ERS to other U.S. Government entities via an intelligence report (i.e. , finished intelligence) or other mechanism. In general, when an ORIGINATOR has identified international TERRORISM INFORMATION and determines that information should be provided to NCTC, the ORIGINATOR takes on the NOMINATOR role. A NOMINATOR is a Federal Department or Agency that has information to indicate that an individual meets the criteria for a KNOWN or SUSPECTED TERRORIST and nominates that individual to TIDE and the TSDB based on information that originated with that Agency. 1.27 While all NOMINATORS have the duty of upholding informational standards, the NCTC and TSC are distinctly responsible for ensuring data quality and the integrity of their respective repositories. NCTC and TSC are themselves potential NOMINATORS. Analysts from the 18 Please note that there are also certain exceptions to the minimum biographic information and minimum substantive derogatory criteria required for Terrorist Watch list nominations that support immigration and visa screening activities conducted by DHS and DOS . See Chapter 2, Section l1J and Chapter 3, Section V. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 13 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION NCTC may discover an individual who is eligible for watchlisting while reviewing all-source information. In these cases, NCTC analysts will request that the ORlGINATOR submit a nomination for inclusion into TIDE; or, on a limited basis or during exigent circumstances, NCTC analysts may update TIDE directly with a disseminated report and notice to the ORIGINATOR(S). In instances where disseminated reporting is used to enhance TIDE, NCTC will provide notice back to the collecting agency via TIDE. TSC may also nominate TERRORISM TNFORMATION received pursuant to TERRORISM screening conducted by foreign governments. 1.28 NCTC and TSC are responsible for reviewing both newly nominated individuals, as well as subsets of existing records, to determine if additional and/or enhancement (research) is required to locate missing information critical to the watchlisting process. In some cases, this will require research to locate additional DEROGATORY INFORMATION to meet the minimum substantive derogatory criteria for watchlisting. In other cases, this will require research to locate additional biographic or biometric identifiers, in order to provide a comprehensive record maximizing the probability of confirming a POSITIVE MATCH to an identity contained in theTSDB. 1.29 AGGREGATORS are those who receive and hold TERRORISM INFORMATION and certain other non-TERRORISM INFORMATION they are authorized to receive and retain. For example, two of NCTC's main statutory missions are to serve as the (1) central and shared knowledge bank on KNOWN or SUSPECTED TERRORISTS and (2) primary organization in the U.S. Government for analyzing and integrating all intelligence information possessed or acquired by the U.S. Government pertaining to TERRORISM and counterterrorism. 19 1.30 TSC takes on the role of an AGGREGATOR when a KNOWN or SUSPECTED TERRORIST is encountered and the individual 's record is enhanced or updated with ENCOUNTER-related information. As noted in Paragraphs 1.1 and 1.7, the TSC manages the watchlisting process and plays a key role in helping Departments and Agencies determine whether an ENCOUNTER with a member of the public is one with a KNOWN or SUSPECTED TERRORIST. Additional TERRORISM INFORMATION or TERRORIST IDENTIFIERS are generated during ENCOUNTERS and the Encounter Management Application (EMA)2° uses that information to update records of KNOWN or SUSPECTED TERRORISTS. 1.31 SCREENERS vet against the TSDB to determine if an individual is a possible match to a KNOWN or SUSPECTED TERRORIST in the TSDB. SCREENERS can include federal , state, local, tribal, territorial, or foreign governments and certain private entities. Screening officials include homeland security officers, consular affairs officers, transportation safety personnel, and officials of foreign governments with whom the United States has entered into a TERRORISM SCREENING INFORMATION sharing agreement pursuant to HSPD-6. Ce1tain Departments and Agencies have components which perform both screening and law enforcement duties. If a 19 20 See 50 U.S.C. §4040. EMA is an application used by the TSC to administer ENCOUNTER information. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 14 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION believes an individual may be on the Watchlist, the screener contacts the TSC 's Terrorist Screening Operations Center (TSOC). The TSOC wi ll determine w hether the indi vidual the SCREE1 ER has encountered is, in fact, a POSITIVE MATCH to the individual who is on the Terrorist Watchlist. The TSOC may also notify the FBT's Counterterrorism Divi sion (CTD) that there has been a positive ENCOUNTER with a watchlisted subject. TSC' s Terrorist Screening Operations Unit (TSOU) coordinates the appropriate operational response to the ENCOUNTER. Based on the TERRORI SM INFORMATION made available by the ORIGINATING AGENCY, the SCREEN ER wil l take action based upon its specific authorities (e .g., req uiring additional screening at an airport checkpoint, denying a visa app lication, determin ing admi ss ibility into the Uni ted States) and fo llow appropriate ENCOUNTER procedures, as set forth in Chapter 5. SCREEN ER 1.32 Collection, Nomination, Consolidation and the Use of the Terrorist Watchlist to Perform Screening Processes. The following is a chart de picting the collection, TERROR IST nomination, consolidation and screening processes: Immigration Screenlng • Domestic Terrorism N1tfon1I Crime lnfonnaUon center Borders Terrorist Screening Database (TSDB) U.S Cuslornsand Border Protcct,oo r• Fly/S,1,ae,/T SOI Transp01'1ation Security Administration PmeortlVISA International Terrorism Departmentof State Consulllrlookoot& Support System FBI Sentinel Foreign Partners Department of Defense UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 15 I UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.33 The arrows fade inside the 1 SDB cylinder because not every nomination from NCTC (for international TERRORISM) or the FBI (for domestic TERRORISM) is exported from the TSDB to 21 SCREENERS (represented by the multi-colored blocks at the far right of the chart). For examp le, certain categories of individuals that do not meet the minimum identifying criteria (see Chapter 2, Section II) or the REASONABLE SUSPICION standard (see Chapter 3, Section If) can be watchlisted to support immigration and visa screening activities by OHS and DOS (see Chapter 3, Section V) but are not exported to state/local/tribal SCREENERS or foreign partners. Similarly, when ORIGINATORS provide FRAGMENTARY INFORMATION to NCTC for inclusion in TlDE, such information will not be exported from TIDE to the TSDB, unless the NOMINATING AGENCY believes there is REASONABLE SUSPJCION to believe that the individual is a KNOWN or SUSPECTED TERRORIST. FRAGMENTARY INFORMATION is provided to NCTC where it can be further analyzed, connected to existing information, and added to TIDE for export to TSDB because NCTC, and not individual ORIGINATORS, has access to all the information available to the U.S. Government on a KNOWN or SUSPECTED TERRORIST. VII. ROLES AND RESPONSIBILITES FOR THE WATCHLISTING AND SCREENING COMMUNITY 1.34 Delineation ofroles and responsibilities of NOMINATING AGENCIES, SCREENERS, NCTC, and the TSC is critical to provide for an effective and efficient integrated Terrorist Watchlist enterprise. While HSPD-6 describes the broad mandate of developing an integrated watch list system, and the TSC MOU provides a level of detail needed to fulfill that mandate, further clarification is required to ensure there are neither gaps in the nomination process, nor wasteful redundancies. 1.35 Pursuant to HSPD-6, Departments and Agencies in the Executive Branch are required, to the extent permitted by law, to provide TERRORISTlNFORMATION to NCTC. This process will be accomplished either through direct nomination to NCTC, or through a specific component designated by a Federal Department or Agency head for doing so (e.g., all DOJ components are directed to nominate through the FBI; DHS Intelligence and Analysis (l&A) has oversight responsibi lity for all DHS nominations). Except as detailed in the sections applicable to expedited nominations (see Paragraphs 1.58 and 1.59), NOMINATING AGENCIES will endeavor to provide comprehensive nominations and include the maximum amount of identifying and 22 DEROGATORY INFORMATION. NOMINATING DEPARTMENTS AND AGENCIES should prioritize 21 The Terrorist Screening Database Annex D to the FBI Memorandum of Understanding with Department of Defense (DoD), signed February 22, 2012, established DoD as a screening agency customer of the TSC. The dashed line in the latter chart represents that DoD is finalizing procedures to receive and use infonnation from the TSDB for its screening grocesses. 2 In May 2010, the Deputies asked that NO MINA TING AGENCIES "ensure that nominations are comprehensive and include the maximum amount of identifying and DEROGATORY INFORMATION." In 2012, the Interagency Policy Committee (IPC), in coordination with NOMI NA TORS, SCREENERS, NCTC and TSC, developed a prioritized list of data identifiers that are critical to screening and identity resolution activities. This Identity Resolution and Enhancement Tiers document is available on NCTC's Watch listing Community oflnterest portal on the Joint Worldwide Intelligence Communications System (JWlCS). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 16 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION the identification of new KNOWN or SUSPECTED TERRORISTS who meet the REASONABLE SUSPICION standard, along with the identifying and DEROGATORY INFORMA TlON most useful to watchlisting, and screening effort, as well as assisting in identity resolution. 1.36 Each Department or Agency that nominates a KNOWN or SUSPECTED TERRORIST to NCTC for watch listing is under a continuing obligation to provide NCTC with newly identified DEROGATORY INFORMATION or exculpatory information obtained by that Department or Agency. Each Department or Agency also has the responsibility to provide NCTC with newly identified identifying and DEROGATORY INFORMATION obtained from their Department or Agency, regardless if they were the original NOMINATING AGENCY. 1.37 With the noted exception of the Visa Viper Program, Departments and Agencies should not nominate KNOWN or SUSPECTED TERRORISTS to NCTC based on information that they do not originate without first coordinating with the ORIGINATOR. Vlll. QUALITY CONTROL MEASURES 1.38 In order to produce and maintain the most reliable and accurate information in TIDE, TSDB, and screening databases, quality control is considered a responsibility of all entities. NOMINATING DEPARTMENTS AND AGENCIES must establish and maintain processes, including appropriate training and guidance, to ensure information transm itted to NCTC is consistent with the source of the information. 1.39 HSPD-6 Requirements. HSPD-6 requires the TSC to maintain thorough, acc urate, and current information concerning KNOWN or SUSPECTED TERRORISTS. For watch li sting purposes, "current" means information that the NOMINATING AGENCY reasonably believes is valid and accurate. The requirement that information be current does not necessarily preclude information that is several years old from being included in the TSDB if there is no reason to believe the information may have changed (e.g., information regarding an individual's date of birth or TERRORIST ACTIVITY was collected 20 years ago but has not been superseded by additional information is still relevant). NOMINATORS shou ld consider the date of the DEROGATORY INFORMATION in the context of analyzing the overal I quality of the data, as well as the severity of the threat, to determine whether the individual warrants watchlisting. The date of the DEROGATORY INFORMATION may refer to both the date the information is collected (such as a report that was collected 50 years ago) as well as the date of the information that is referenced in the reporting (such as a recent report that references an event that occurred 50 years ago). 1.40 TSC MOU Obligations. Paragraph 15 of the TSC MOU provides that the TSC "wi ll determine, according to criteria established jointly with the entity responsible for each supported system, which supported screening processes will query that entry in the consolidated TERRORIST screening database." Pursuant to that paragraph, the TSC is required to "make these determinations based on criteria and procedures developed in coordination with the Parties to this Memorandum and in consultation with the heads of appropriate Federal UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page J 17 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Depatiments and Agencies based on factors, including but not limited to, the following: 1.40.1 the nature of the person's association with TERRORISM; 1.40.2 the quality of the data, including credibility, reliability, and extent of corroboration; and, 1.40.3 the extent of uniquely identifying data .... " 23 1.41 Provide Guidance and Training. Each Agency will provide guidance on the watchlisting business process. Analysts will receive periodic refresher training, as needed . 1.42 NOMINATING AGENCY Procedures. Each NOMINATOR providing international TERRORIST watch listing nominations to NCTC is responsible for the accuracy of its information and has a continuing responsibility to notify NCTC or any changes that affect the validity or reliabi lity of such information. 24 NCTC analysts wiII review each nomination for TERRORIST watchlisting prior to its inclusion into TIDE and its export to the TSDB. 1.43 Each NOM INATING AGENCY should implement processes designed to ensure that nominations are free from errors, that recalled or revised information is reviewed regularly, and that necessary corrections to nominations based on those revisions/retractions are made. NOMJNATING AGENCIES should, to the extent possible given the nature of the reporting, verify the accuracy and reliability of the information included in nominations. The fo llowing represents the type of processes that each NOMINATING AGENCY shall develop that are tailored to each Agency 's particular mission and operational environment: 1.43.1 Develop Adequate Factual Predicate. Each NOMINATING AGENCY wi ll seek to obtain as much DEROGATORY INFORMATJON and identifying information as practicable concerning the KNOWN or SUS PECTED TERRORIST who is being nominated. l.43.2 Provide Guidance and Training. Each NOMINATING AGENCY will provide guidance on the TERRORIST watchlisting nomination process and ensure that analysts involved in the nomination process are trained on a periodic basis. 1.43.3 Require Quality Assurance Review. Each NOMINATING AGENCY will use a quality ass urance process to review nominations for accuracy prior to forward ing the information to NCTC. 1.43.4 23 Heightened Review for U.S. PERSONS. The nominations of U.S. PERSONS require See Appendix 3, TSC MOU. 24 PURELY DOMESTIC TERROR ISM INFORMATION is provided directly to TSC by the FBI and is subject to the same conditions app licable to the nomination procedures for those associated with international TERRORISM . UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 118 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION special considerations and procedures. 25 See Paragraph 3.15. 1.43.5 U.S. PERSON Determinations. NOMINATORS must take reasonable steps to determine whether an individual is a U.S. PERSON. 1.43.6 U.S. PERSON Review and Confirmation. Nominations of U.S. PERSONS to the Terrorist Watchlist shall be reviewed by the NOMINATING AGENCY'S legal counsel or a designated reviewer to confirm that the REASONABLE SUSPICION standard has been met or that the nomination meets an exception to the REASONABLE SUSPICION standard, and to ensure that the nomination conforms to Agency specific U.S. PERSON authorities and guidelines. 1.43.7 Reliability and Accuracy Limitations. Nominations will include any limitations on the reliability or accuracy of the information. 1.43 .8 Periodic Reviews. The NOMlNATJNG AGENCY will conduct peri.o dic reviews of their nominations of U.S. PERSONS to the Terrorist Watchlist, at minimum on an annual basis, when there is no corresponding FBI investigation to ensure that the U.S. PERSON continues to meet watchlisting criteria. 1.43.9 Redress Procedures. As per the establishment of a formal watch list redress process (see Chapter 1, Section XT), entities involved in the watchlisting process shall establish internal reviews and redress procedures. 1.44 Each NOMJNATlNG AGENCY will have procedures that facilitate the prevention, identification, and correction of any errors in information that is shared as part of the watch listing process. Procedures will include the review ofretractions and/or corrections of information that may have been used to support a nomination. In cases where a retraction or other information has become available, the NOMINATING AGENCY will promptly send a watchlist removal request or modification, as appropriate, to NCTC. Each NOMINATING AGENCY must provide notice of any errors or outdated information to NCTC immediately unless there is an articulated reason why such notification could not be made immediately. NCTC will process and transmit to TSC such corrections upon receipt. 1.45 NCTC Review. Tn addition to review by NCTC analysts, NCTC will employ a quality control process to ensure that all standards and appropriate procedures have been employed, the data is accurate, and the presentation of the material is clear, concise, and complies with established definitions and conventions. NCTC must also have processes and procedures in place to ensure the information documented in TIDE and provided to the TSC is accurately transcribed. NCTC shall ensure there is a process in place for review and/or auditing of TIDE records. 25 See Executive Order 12333, as amended, and 5 U.S.C. 552a(e)(7). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 119 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.46 TSC Review. TSC personnel will review the nominations received as described in Paragraph 1.56. TSC personnel evaluate whether nominations meet watchlisting standards and weigh, as appropriate, all-source analysis before accepting or rejecting a nomination. The TSC has a critical role to play in quality control, as the TSC review is the last step before any record (including a biometric nomination where no name is available) is sent to various screening systems. As with NCTC, the TSC should ensure there is a process in place for review and/or auditing of TSC nominations and TSC records. NOMINATION PROCEDURES TX. 1.4 7 Distinctions between U.S. PERSONS under Executive Order 12333 and Aliens under the Immigration and Nationality Act. This Watchlisting Guidance generally adopts the definition of U.S. PERSON from Executive Order 12333 (as amended) for nomination procedures. Executive Order 12333 defines a U.S. PERSON as "A United States citizen, an alien known by the inteJligence element concerned to be a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed or controlled by a foreign government or governments." The Watchlisting Guidance also contains certain exceptions to the minimum substantive derogatory standards for TERRORIST watchlisting that support immigration and visa screening activities by the OHS and DOS to determine whether ineligibilities exist for admission to the United States or visa adjudication pursuant to the ImnJi'gration and Nationality Act (INA). Because the INA defines "aliens" as any person not a citizen or national of the United States, the TNA admissibility provisions also apply to Lawful Permanent Residents (LPRs), in certain circumstances, who are considered U.S. PERSONS under Executive Order 12333. Consequently, NCTC developed a mechanism in TIDE to identify and distinguish U.S. citizens from non-U .S. citizens in order to further distinguish between "aliens" under the INA and U.S. PERSONS under Executive Order 12333. 26 1.48 ORIGINATOR'S Nominations Procedures. As mentioned in Paragraph l.26, when an ORIGINATOR becomes a NOMINATOR, it prepares a nomination document and forwards NCTC through the NOMINATOR tool. it to 1.48.1 As a general rule, NCTC will attach all disseminated communications (cables or forms) to the TERRORIST identities record as a "source" document, which will be available on NCTC Current or the Joint Worldwide Intelligence Communications System (JWICS) to individuals who have been granted access to TIDE. l .48.2 Because NCTC is the conduit for passing international TERRORISM INFORMATION to TSC for TERRORISM screening purposes, there is no longer a need to send watchlist requests to multiple Government Agencies. By sending a Terrorist Watchlist nomination cable to NCTC, all potential U.S. Government TERRORISM screening 26 See INA § I0l(a)(3) [8 U.S.C. I 10l(a)(3)]. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 20 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION responsibilities should be accounted for. 1.48.3 The DOJ has approved a Protocol to govern TERRORIST nominations for its non-FBI components, which requires components to provide the FBI with all TERRORISM 27 INFORMATION. The FBI is responsible for submitting watchlisting nominations based on information received from other DOJ components pursuant to the FBI's nomination procedures. 1.48.4 OHS has designated the Under Secretary for I&A as the Executive Agent for DHS ' centralized TERRORIST watchlisting process and he/she shall be responsible for providing a OHS wide-mechanism for nominating all identifying or DEROGATORY lNFORMATTON about KNOWN or SUSPECTED TERRORISTS to TIDE. OHS l&A is also responsible for providing training/certification programs to the components. 1.49 In providing information to NCTC for inclusion into TIDE, the ORIGINATOR is responsible for determining whether it may, by law, provide the information to NCTC, in accordance with section 1021 (d)(6) ofIRTPA. This information shall be provided with any applicable caveats or dissemination controls, which will be reflected in TIDE. The biographic and biometric identifiers derived from this information will be deemed U//FOUO for passage to TSDB unless the ORIGfNATORdesignates them as "TIDE Restricted," as outlined in Addendum B to the TSC MOU. 1.50 NCTC Actions and Processes. NCTC reviews TERRORIST nominations from Federal Departments or Agencies (NOMINATORS) as described in Paragraph 1.28. 1.51 In determining whether an individual is a KNOWN or SUSPECTED TERRORIST, NCTC will rely on the designation of "KNOWN TERRORIST" provided by the NOMINATOR as presumptively valid. This presumption can be overcome ifNCTC has specific and credible information within its possession that such designation is not appropriate, at which point NCTC will provide such information to the NOMINATOR. 1.52 In reviewing whether to include the TERRORISM INFORMATION about the KNOWN or SUSPECTED TERRORIST in TIDE, NCTC reviews the totality of information. The totality of information is evaluated based on the experience of the reviewer, and the facts and rational inferences that may be drawn from those facts, including past conduct, current actions, and credible intelligence concerning future conduct. As part of this review, NCTC will determine if the information pertains to, or is related to, TERRORISM. TIDE includes TERRORISM INFORMATION on KNOWN or SUSPECTED TERRORISTS and may include additional TERRORISM INFORMATION beyond what meets the minimum substantive derogatory and identifying criteria required for nominations to the TSDB, as described in Paragraph 1.24. Upon conclusion ofNCTC's review, NCTC will either accept or reject the nomination: 27 See Appendix 7, DOJ Protocol on Terrorist Nominations. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 121 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.52.1 Accept Nomination. lf a nomination contains TERRORISM lNFORMA.TlON, NCTC will create or enhance the associated TIDE record with the data contained in the nomination. If the minimum substantive derogatory and identifying criteria are met, NCTC will forward the TERRORIST IDENTIFIERS to the TSC for placement in TSDB with the NOMINATOR'S watchlist recommendation. 1.52.2 Reject Nomination . If a nomination does not contain TERRORISM INFORMATION, NCTC may reject the nomination. NCTC will review rejected nominations and search holdings for additional data that may support a TERRORISM INFORMATION finding. If no information is found to support the nomination, NCTC will notify the NOMINATING AGENCY of the rejection. 1.53 Types of records in TIDE. There are two types of records in TIDE: 1.53.] TERRORIST Records. The vast majority of records in TIDE are for KNOWN or SUSPECTED international TERRORISTS. These records are labeled "TERRORISTS." Only a small percentage of TERRORIST records in TIDE concern U.S. PERSONS. 1.53.2 Non-TERRORIST Records. A small percentage of records in TJDE are identified and labeled "Non-TERRORISTS." 28 These records are generally of familial family members or associates of KNOWN or SUSPECTED TERRORISTS and assist DOS and OHS in, for example, adjudicating visas and immigration processing, or assist the IC in tracking KNOWN TERRORISTS. These "Non-TERRORISTS" include: 1.53 .2.1 Alien Spouses and Children of TERRORISTS. Based on section 212(a)(3)(B)(i)(IX) of the INA, alien spouses and children of TERRORISTS may be inadmissible to the United States. 29 TIDE exports records pertaining to alien spouses and children of alien international TERRORISTS (also known as TIDE Category Code 17) to support immigration and visa screening activities by DOS and DHS; 1.53.2.2 Other Relatives. TIDE also includes "non-TERRORIST" records of individuals who have a close relationship to a KNOWN or SUSPECTED international 28 TIDE records for non-U.S. citizens, including LPRs, with insufficient DEROGATORY tNr:QRMATION to meet the standard (TIDE Category Code 99) and records relating to an individual who has a defined relationship with the KNOWN or SUSPECTE D TERRORI ST, but whose involvement with the KNOWN or SUSPECTED TERRORIST' S activities is unknown (TIDE Category Code 50) are exported to the TSDB as TSDB exceptions to the REASONABL E SUSPI CION standard. Additionally, individuals described by sources as " TERRORI STS", "extremists", ''jihadists", " militants", " mujahideen" or "insurgents" (TIDE Category Code 03, also referred to as a " labels plus" nomination) will be accepted into the TSDl3 as exceptions for export to OHS and DOS for immigration and border processing. See Paragraph 3.14.6. A complete list of TIDE Category Codes can found under the " Watch listing Criteria Guidance" section on the Intel ink website at http ://www.intelink .gov/tsc/ legal.htm . 29 " Any alien who . . . . is the spouse or child ofan alien who is inadmissible under this subparagraph, if the activity causing the alien to be found inadmissible occurred within the last 5 years, is inadmissible." See INA § 2 12(a)(3)(B)(i)(IX) [8 U.S.C. 1182(a)(3)(B)(i)(IX)]. REASONABLE SUSPICION UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 122 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION TERRORIST but are not alien spouses or children of a TERRORIST. For instance, the father or brother of a TERRORIST could have a record in TJDE (also known as TIDE Category Code 160). Thus, these "other relatives" could be U.S. PERSONS or nonU.S. PERSONS. Identifiers for these other re lations reside in TIDE but are not exported to the TSC for watchlisting, absent independent DEROGATORY INFORMATION. Instead, these records may be retained in TJDE for analytic purposes; 1.53.2.3 Passports. Unrecovered lost or sto len passports in the hands of international (also known as TIDE Category Code 89); TERRORISTS Associates. Individuals who have a defined relationship with the KNOWN SUSPECTED TERRORIST, but whose involvement with the KNOWN or SUSPECTED TERRORIST'S activities is unknown (also known as TIDE Category Code 50); l .53.2.4 or 1.53.2.5 Individuals with a Possible Nexus to TERRORISM. Individuals with a possible nexus to TERRORISM and/or TERRORIST ACTIVITY but for whom additional DEROGATORY INFORMATION is needed to meet the REASONABLE SUSPICION standard (also known as TIDE Category Code 99). 1.54 Identification of U.S. PERSON Status in TIDE. NCTC analysts will review the totality of information available on a subject to discern U.S. PERSON status prior to creating or enhancing a record in TIDE, whenever possible. For existing TIDE records, this status is available to the analyst in the first field of the TIDE record. In case of external nominations or ENHANCEMENTS from the IC, the standard nomination template provides a means for NOMINATORS to identify U.S. PERSON status pursuant to Executive Order 12333 and the Agency's specific guidelines. The U.S. PERSON status field on the standard nomination template is a required field and it is the responsibility of each NOMINATING AGENCY to ensure the field is properly annotated in accordance with established policy. 1.55 Types of Records in TIDE and the TSDB. Not all records in TIDE are included in the TSDB. For example, records with FRAGMENTARY INFORMATION that do not meet the minimum derogatory standard or records that do not meet identifying information criteria remain in TIDE and are not included in the TSDB, absent direction for temporary, threat based categories pursuant to Paragraph 1.59. 30 The nominations process for TIDE records that will be considered for entry in the TSDB begins with an automated data transfer process that moves an individual TIDE record containing the identity of a KNOWN or SUSPECTED TERRORIST or other exportable category or record nominated for watch listing to the TSDB. 1.56 TSC Actions and Processes. The TSC's Single Review Queue (SRQ) enables the TSC's Nominations and Data Integrity Unit (NDIU) to review each KNOWN or SUSPECTED TERROIUST 3 ° Certain categories ofnon-TERRORlST records (see Paragraph 1.53.2) or nomination s to the No Fly and Selectee List based on an expedited waiver of"full date of birth" requirement (see Paragraph 4.18) may also be eligible for inclusion in the TSDB. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 23 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION record nomination to ensure it meets the watchl.isting standard. 31 The SRQ also helps ensure that all qualified records are made available to the appropriate SCREENERS for use in TERRORISM screening. During the SRQ process, every request to add, modify, or delete a TSDB record is reviewed by a TSC analyst to ensure the accuracy of watch listing records and the removal of inaccurate records from TSDB. 1.56.1 Within the TSC's NDTU, experienced analysts and/or designated Agency representatives serve as Subject Matter Experts (SMEs) with respect to specific databases (e.g. , No Fly or Selectee List) that receive TSDB data for TERRORI SM screening purposes. The NDIU currently has four types of SMEs who specialize in the information/systems from their respective organizations: DI-IS/Transportation Security Administration (TSA) for the No Fly, Selectee and Expanded Selectee Lists, FBI for National Crime Information Center (NCIC)/KNOWN or SUSPECTED TERRORIST File (KSTF), DOS for the Consular Consolidated Database (CCD)32 and DHS for TECS (and its components) and the Automated Targeting System (ATS). SMEs provide guidance regarding their specific information/systems to the TSC and watchlisting standards to their Agencies. ln some cases, the SME coordinates the data export to the supported system, provides feedback to NOMINATORS, and responds to inquiries regarding their supported system from other TSC customer Agencies. 1.56.2 Upon the conclusion of TSC's review, TSC will either accept or reject the nomination: 1.56.2.1 Accept Nomination. Consistent with Paragraphs (7) and (8) of Addendum B to the TSC MOU, if a nomination contains the minimum substantive derogatory criteria and the minimum identifying information, TSC will create a TSDB record, include the TERROR!ST IDENTIFIERS from the TIDE record , and export the TSDB record to its supported systems (i.e., databases and systems eligible to receive records from the TSDB) for the benefit of SCREENERS that conduct TERRORISM screening. The current supported systems include, but are not limited to, the following: 1.56.2.1.J NCIC/KSTF ; 1.56.2.1.2 DOS Consular Lookout and Support System (CLASS)-VISA and CCD; 31 32 1.56.2.1.3 OHS Watchlisting Service (WLS) (e.g. , TECS, ATS, Secure Flight); 1.56.2.1.4 TSA Transportation Security Vetting Center; 1.56.2.1.5 TSA-Office oflntelligence Analysis (OIA); 1.56.2.1.6 Tipoff United States Canada (TUSCAN); See Chapter l , Sccti.on VU I, supra. CCI) is an application used by DOS to administer its visa and passport applications. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 24 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.56.2.1.7 Tipoff Australia Counterterrorism Jnformation Control ystem (TACTICS). 1.56.2.2 Reject Nomination. If a nomination lacks either the minimum substantive derogatory criteria or the minimum identifying information, and is not an exception to those requirements (e.g., TJD Category Codes 50 or 99 as described in Paragraph 1.53.2), TSC will reject the nomination and notify NCTC directly of its determination or coordinate with NCTC to notify the NOMINATOR of its determination. Records nominated to TID that are ineligible for TERRORIST watchlisting may remain in TlD until additional information is obtained to warrant either watchlisting or removal from TIDE. NCTC analysts will review al lsource information for additional identifying or substantive DEROGATORY INFORMATION. If additional information is discovered, NCTC wi ll enhance the TIDE record and submit the record to T C for inclusion in the TSDB. The TIDE record will be reviewed again by the T C to determine whether it is eligib le for watchlisting in TSDB and export to certain supported screening systems. 33 1.57 The number of T C' s supported systems will continue to grow a · TSC, OHS , and DOS expand their domestic and international outreach efforts and finalize additional agreements to exchange TERRORISMS REENING INFORMATION. T Chas modified the TSDB so that certain customers may query the TSDB remotely instead ofreceiving exports ofTSDB data to their own systems. 1.58 Expedited Nomination Procedures for Individual Nominations. If exigent circumstances exist (imminent travel and/or threat) where an individual nomination into the T DB needs to be expedited after normal duty hours, a NOMINATOR, with coordination from NCTC, may contact the TSC's TSOC directly. If a NOMINATOR coordinated with NCTC, the nomination will be received by the TSC via the SRQ in TSDB and the TSO Watch Commander will coordinate with a NDJU Senior Analyst to process the nomination . A NOMINATOR may also contact the TSC directly and provide all relevant information using the following process : 1.58.1 The NOMINATOR must first contact the T O at 866-at571-- (toll free number) or 1.58.2 The NOMTNATOR will be instructed by a TSOC Specialist on how to telephonieally complete a Terrorist Screening Center Expedited Nomination Request Form. 1.58.3 ln addition to ba ic identifying information, the NOMINATOR will be requested to provide a 24/7 point of contact should the KNOWN or SUSPECTED TERRORIST he encountered by a s REENER. 33 See Paragraph 1.24.2 supra. UNCLASSIFIED//FOR OFFICIAL U E ONLY/SENSITIVE SECURITY INFORMATION Page I 25 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.58.4 Within 72 hours of contacting the TSOC, the NOMINATOR must provide appropriate follow-up documentation that articulates, through either classified or unclassified means, the substantive DEROGATORY INFORMATION used to establish the basis for TERRORIST watchlisting. 1.59 Expedited Nomination Proccdur·cs for Temporary, Threat-Based Categories. This provision is intended to enable categories of individuals to be temporarily upgraded in watchlist status based on current and credible intelligence information or a particular threat stream that indicates a certain category of individuals may be used to conduct an act of domestic or international TERRORISM. This temporary, threat-based expedited upgrade (TB U) is made at the direction of the Assistant to the President for Homeland Security and Counterterrorism or his/her designee (Appropriate Official) and should be narrowly tailored to address the threat. 1.59.1 The goal of this provision is to fashion a watch listing response that is appropriate to the nature, specificity, and severity of the threat. To achieve this goal, in addition to verifying the credibility of the threat intelligence, due consideration should be given to: 1.59 .1.1 The harm to public safety posed by the threat; 1.59.1.2 The clarity and specificity of the information giving rise to the threat as to time, place, method, and identity of the suspected perpetTators; 1.59.1.3 The anticipated impact on international and domestic travel, civil liberties, and foreign relations; and, 1.59.1.4 The best available screening tools, other than the No Fly or Selectee Lists, given the type and specificity of identifiers and travel data. 1.59.2 When necessitated by exigent circumstances, and where there is current and credible intelligence information or a particular threat stream that indicates a certain category of individuals may be used to conduct an act of domestic or international TERRORISM, the Appropriate Official may direct the TSC and NCTC to place categories of individuals from TIDE or TSDB on the No Fly List, Selectee List, or into the TSDB for up to 72 hours before concurrence is obtained from the Deputies or Principals Committee. To the extent practicable, the initial direction to NCTC and TSC from the Appropriate Official will be in writing. Absent DEROGATORY INFORMATION supporting individual nomination or watchlist upgrade, if written concurrence is not obtained within 72 hours of the initial direction to TSC and NCTC, the TSC will automatically remove any individuals added to the No Fly List, Selectee List, or TS DB pursuant to the TBU, .until such written direction is received. 1.59.3 The addition of categories of individuals to the No Fly List, Selectee List, or TSDB pursuant to Paragraph 1.59.2 shalJ be effected for a period oftime, consistent with the UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 26 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION nature of the threat involved, not to exceed 30 days but may be renewed for additional 30-day periods upon written approval of the Deputies or Principals Committee. A TBU is valid until the threat no longer exists. To the extent that such threat recedes or is otherwise mitigated prior to the expiration of 30 days or during any extension approved by the Deputies or Principals Committee, TSC and NCTC and members of the watch listing community shall immediately request of the Deputies or Principals Committee to downgrade these TB Us to their original or appropriate status. All threatbased records transmitted through automated mechanisms (i.e., WLS, CCD) will include a "TBU indicator" at the message level to differentiate this category of records from non-TBU records and to provide the TBU directive for which the record is upgraded. 1.59.4 Until such time as the Deputies or Principals provide additional, written guidance, DOS will defer visa actions with respect to these expedited upgrades in watch list status. 1.59.5 Departments and Agencies will advise the Deputies or Principals of other consequences that may result from a change in watchlist status and seek guidance as to how to proceed . 1.59.6 After these categorical moves are accomplished or renewed, there will be an expedited procedure for the review of all u . s. PERSONS that are part of the TBU to ensure their watch listing status is appropriate (including whether continued categorical watch listing may be warranted based on the nature of the threat). 1.60 Arbitration of Watch listing Disputes. If a NOMINATOR wishes to dispute TSC's watchlisting determination, it may contact NCTC (for international TERRORlST nominations) to discuss the watchlisting status and/or submit additional substantive derogatory and identifying information to support its initial nomination. Additional information provided to NCTC by a NOMINATOR will be passed to the TSC for review and final watchlisting determination. In the case of an FBI dispute over the TSC' s watch listing determination of an international TERROIUST'S nomination, a case agent must contact the TSC. 1.61 In the case of domestic TERRORIST nominations, if the FBl wishes to dispute TSC 's watch listing determination, it may contact the TSC to discuss the watchlisting status and/or submit additional substantive derogatory and identifying information to support its initial nomination. X. PROCEDURES TO REMOVE AN INDIVIDUAL FROM THE W ATCHLIST 1.62 A NOMINATOR desiring to remove an international TERRORIST identity record previously nominated to TIDE should contact NCTC and provide written justification for the request. NCTC will promptly process the request when received. NCTC will be the final arbiter of whether the identity is removed from TIDE and TSC will be the final arbiter of whether TERRORIST IDENTIFI ERS are removed from TSDB. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 127 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 1.63 If the NOMINATOR requesting removal of an international TERRORIST identity record from TIDE is the only NOMINATOR to have provided information on that record, the removal request will be immediately processed by NCTC. The removal information is then sent to the TSC, which, in turn, makes a determination regarding removal of the TERRORIST identity from the TSDB. 1.64 If multiple NOMINATORS have provided information on an international TERRORIST identity record, NCTC will coordinate with all relevant parties in an attempt to reach a consensus on the TERRORI ST identity' s most appropriate watchlisting status. I .64.1 If the multiple NOMINATORS arrive at a consensus that the watchlisted identity is not reasonably suspected of engaging in TERRORISM and/or TERRORIST ACTIVITIES, or an applicable exception, the identity is removed from the TSDB and TIDE. In certain circumstances, NCTC may retain records in TIDE to prevent inappropriate rewatchlisting. 1.64.2 If the multiple NOMINATORS cannot arrive at a consensus regarding the watchlisting status of an identity, TSC may decide to remove the identity from the TSDB, but NCTC may retain the identity in TIDE. 1.64.3 For cases in which the FBI has conducted an investigation on an individual (independently nominated by another NOMINATOR) and has concluded that the watchlisted individual is not a KNOWN or SUSPECTED TERRORIST, the individual may be removed from the TSDB. 34 In such cases, the TERRORIST IDENTIF IERS from the FBI's investigation may be used to supplement the TIDE record. 1.65 The FBI will review domestic TERRORIST identity removal requests according to applicable FBI procedures. l .66 TSC has an established, on-going process to review every record in the TSDB in accordance with Paragraph (8)(b) of the TSC MOU and its mission under HSPD-6 to maintain the most thorough, accurate, and current information in the TSDB. If TSC determines that the watch listing standards arc not met for an individual record, TSC will remove the record from the TSDB, in coordination with the NOMINATING AGENCY. XI. REDRESS PROCEDURES 1.67 In January 2005, the TSC established a formal watchlist redress process that allows Agencies 34 After an FBI determination that the individual is not a KNOWN or SUSPECTED TERRORIST, NCTC may determinebased on a NOMINATOR'S independent nomination- that the individual should remain in TIDE as records that have been fully vetted and shou ld not be screened against (TIDE Category Code 140), the individual be watchlisted based upon the NOM INATOR'S independent determination that the individual is a KNOWN or SUSPECTED T ERRORIST or that the individual warrants watchlisting based upon an exception to the REASONABLE SUSPICION standard. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 28 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION that use TSDB data during a TERRORISM screening process to refer individuals' complaints to the TSC if it appears the complaints may be related to the watch listing process. The goal of the watchlist redress process is to provide for timely and fair review of individuals' complaints and to identify and correct any errors in the TSDB. 1.68 The watchlist redress process is a multi-Agency process involving the DHS, TSC, NCTC, NOMINATORS, and SCREENERS. On September 19, 2007, Agencies participating in the watchlist redress process executed the Redress MOU to set forth a coordinated redress process to respond to individual complaints about adverse screening experiences. 35 1.69 TSC's Redress Office is responsible for receiving, tracking, and researching watchlist-related complaints that SCRE ENERS refer to TSC. For each redress complaint received, the Redress Office conducts an in-depth analysis to determine if the person's complaint is related to a TSDB record, including a determination of whether the complainant is the watch listed individual or merely a near-match to a watchlist record. If the complainant is the watch listed individual, the TSC ' s Redress Office will determine whether the watchlisted individual still meets all the watchli sting criteria. 1.70 For each complaint, the TSC Redress Office coordinates with the NOMINATOR (via NCTC when the NOMINATOR is not the FBI), who assists in the evaluation of the complaint to ensure the most current, accurate, and thorough information available is used to review the person ' s watchlist status. Where appropriate and warranted by the current information and applicable criteria, a person ' s watchlist status may be adjusted (e.g. , downgraded from the No Fly to Selectee List or the person ' s identity may be removed entirely from the TSDB). lf the redress complaint was referred to the TSC from the DHS Traveler Redress Inquiry Program (DHS TRIP), the individual ' s adjusted watchlist status will be provided to OHS TRIP for issuance of an appropriate response. I .71 OHS TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experience during their travel screening or inspection at, for example, transportation hubs like airports, or when crossing U.S. borders. The DHS TRIP website is www.dhs.gov/trip. OHS TRIP ensures a thorough review is completed by consulting and sharing information with other OHS Components and other Agencies, as appropriate, to address the issues identified by the complainant. XII. PERIODIC REVIEW OF THE WATCHLISTING GUIDANCE 1.72 This Watchlisting Guidance shall be reviewed no less than every two years following the conclusion of the previous review, or as needed. 35 See Appendix 8, Redress MO U; see also FN 16, supra. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 129 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION CHAPTER 2: MINIMUM IDENTIFYING CRITERIA I. BIOMETRIC NOMINATIONS 2.1 II. Biometric information refers to the measurable biological (anatomical or physiological) and behavioral characteristics that can be used for recognition. Examples include facial photographs, fingerprints, iris scans, digital images, latent prints, DNA and gait. A biometric is sufficient to meet the minimum identifying criteria for nominations to the NCTC's TIDE and/or the TSC ' s TSDB, provided that the nomination also meets the minimum substantive derogatory criteria, or one of the exceptions. Biometric nominati.ons without minimum biographic information will be provided only to those SCREENERS that have the technical capability to screen against or otherwise make assessments using the biometrics. Notwithstanding the above, all NOMINATORS are encouraged to include all available associated biographic information with any biometric nomination. MINIMUM BIOGRAPHIC NOMINATION REQUIREMENT 2.2 TIDE. shall provide NCTC, for inclusion into TIDE, FRAGMENTARY that suggests an individual may have a nexus to T ERRORISM and/or T ERRORIST ACTIVITI ES and any additional information that will facil itate identification of these individuals. Nominations to TIDE under this section will be considered for inclusion in the TSDB if the NOMJNATING AGENCY believes there is REASONABLE SUSPICION to believe that the individual is a KNOWN or SUSPECTED TERRORI ST. NOMI NATORS IN FORMATION 2.2. 1 Nominations of individuals based on FRAGMENTARY IN FORMATION who fail to meet the minimum identifying criteria for nomination to TSDB should be provided to NCTC for inclusion in TJDE when there is DEROGATORY INFORMATlON suggesting that the individual is associated with TERRORISM and the NOMINATING AGENCY determines that there are sufficient identifiers for possibly facilitating a match to existing TIDE records. Unless otherwise directed, NOMINATING AGENCIES should prioritize the nominations of individuals who satisfy the minimum identifying criteria before addressing nominations based on FRAG MENTARY INFORMATION . 2.3 SCREENER Discretion. 2.4 TSDB. Nominations to the TSDB must include a last name. NOMINATlNG AGENCIES should also provide any additional identifying information available. In addition to a last name, nominations must include: As appropriate, SC REENERS have the discretion to decide not to include in their screening systems common names received from the TSDB, where insufficient identifying information exists for identification. 2.4.1 first name; UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 30 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 2.4.2 Or any one of the following additional identifiers: 2.4.2.1 Full date of birth (eight digit "mm/dd/yyyy" format); 2.4.2.2 Passport number (with or without country of issuance); 2.4.2.3 Unique identifying numbers such as alien registration numbers, visa numbers, and social security numbers; 2.4.2.4 Telephone number(s) 36 ; 2.4.2.5 E-mail address(es) 37 ; 2.4.2.6 License plate number(s). 2.4.3 Or any two of the following additional identifiers 38 : 2.4.3. l Country of citizenship, if different from place of birth; 2.4.3.2 Place of birth (city or country), if different from country of citizenship; 2.4.3.3 Circa or partial date of birth (partial: e.g., 1960; or range: e.g., 1960-1965); 2.4.3.4 Full name of an immediate family member (e.g., parent, spouse, sibling, or children); 2.4.3.5 Occupation or current employer; 2.4.3.6 Specific degrees received; 2.4.3.7 Schools attended; 2.4.3.8 Physical identifiers such as race, height, or weight; 2.4.3.9 Unique physical identifiers such as scars, marks or tattoos; 2.4.3.10 Street address or other suffici ently specific location information. 36 Only unclassified phone numbers that are authorized for passage to TSC pursuant to Paragraph 7(m) of Addendum B to the TSC MOU, will be included in TSDB. See Appendix 4. Unclassified phone numbers will only be provided to those SCREENERS that have the technical capability to receive this data. 37 Only unclassified email addresses that are authorized for passage to TSC pursuant to Paragraph 7(m) of Addendum Il of the TSC MOU will be included in TSDB. See Appendix 4. Unclassified email addresses will only be provided to those SCREENERS that have the technical capability to receive this data. 38 As required here, there must be two distinct identifiers that must be sufficiently specific to account for the large number of possible matches common identifiers may produce. For example, if one identifier is rather common (e.g. , physical identifiers), the other identifier must be more specific to permit the screening official to successfully match a record with an individual. As a further example, a nomination with the last name listed as Khan, location listed as Kabul, Afghanistan, and occupation listed as a baker alone would be insufficient for screening purposes because it is highly unlikely a successfu l match could be made against such data. However, a nomination with the name listed as R. Khan, location li sted as residence of 123 Sunshine Street, Kabul, Afghanistan, and occupation listed as a baker at ABC Bakery, would be sufficient for screening purposes. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 31 UNCLASSIFIED//FOR OFFICIAL USE ONLY /SENSITIVE SECURITY INFORMATION III. MINIMUM BIOGRAPHIC INFORMATION REQUIRED FOR EXCEPTIONS TO THE MINIMUM SUBSTANTIVE DEROGATORY STANDARDS FOR TERRORIST WATCHLISTING 2.5 There are certain exceptions to the minimum substantive derogatory standards for TERRORIST watch listing that support immigration and visa screening activities by DHS and DOS. 39 Examples of these categories of records include, but may not be limited to, records relating to an individual who has a defined relationship with the KNOWN or SUSPECTED TERRORIST, but whose involvement with the KNOWN or SUSPECTED TERRORIST'S activities is unknown (TIDE Category Code 50) and those with insufficient DEROGATORY INFORMATION TO meet the REASONABLE SUSPlClON standard for watchlisting (TIDE Category Code 99). 2.6 NOMINATING AGENCIES should provide all additional identifying information available. All nominations under this section must include a full name (first name, last name) and one of the following identifiers: 2.6.1 Full date of birth; 2.6.2 Full passport number (with or without country of issuance); 2.6.3 Unique identifying numbers such as alien registration numbers, visa numbers, and social security account numbers; 2.6.4 Telephone number(s); 2.6.5 Email address(es); 2.6.6 License plate number(s); 2.6. 7 Biometrics, such as facial image, iris scans or fingerprints. 39 See Chapter 3, Section V. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 32 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION CHAPTER 3: MINIMUM SUBSTANTIVE DEROGATORY CRITERIA I. INTRODUCTION AND PURPOSE 3.1 TSC issued an updated U.S. Government Protocol Regarding Terrorist Nominations on February 25, 2009, that included an appendix identifying the minimum substantive derogatory criteria for acceptance of KNOWN or SUSPECTED TERRORIST nominations into the TSDB. Based on the attempted terror attack of December 25, 2009, the Watchlisting Guidance was reviewed to determine whether adjustments were needed. The revised guidance was approved by the White House Deputies Committee on May 25, 2010 and issued to the watchlisting community on July 16,2010, after a multi-agency classification review. 3.2 This Chapter of the Watchlisting Guidance has been updated to reflect the watch listing community's experiences with the Guidance since issuance in July of2010 by the Deputies Committee. One of the more notable changes of this updated version of the Watch listing Guidance is the restructuring of instances for when PARTICULARIZED DEROGATORY INFORMATION is required. Another notable change includes the re-introduction of guidance relative to the TERRORIST facilitators or supporters from an earlier version of the Watchlisting Guidance and the inclusion of additional exceptions to the minimum substantive derogatory standards for TERRORIST watchlisting that support immigration and visa screening activities of the DOS and DHS. II. REASONABLE SUSPICION 3.3 For purposes of watch]isting an individual to the TSDB, the NOMINATOR should determine whether there is REASONABLE SUSPICION that an individual is a KNOWN or SUSPECTED TERRORIST. 3.4 40 REASONABLE SlJSPICION. To meet the REASONABLE StJSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts , reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITIES. There must be an objective factual basis for the NOMINATOR to believe that the individual is a KNOWN or SUSPECTED TERRORIST. Mere guesses or hunches are not sufficient to constitute a REASONABLE SUSPICION that an individual is a KNOWN or SUSPECTED TER RORIST. Reporting of suspicious activity alone that does not meet the REASONABLE SUSPICION standard set forth herein is not a sufficient basis to watchlist an individual. The facts, however, given fair consideration, should sensibly lead to the conclusion that an individual is, or has, engaged in TERRORISM and/or TERRORIST ACTIVITIES. 40 In instances where REASONABLE SUSPICION is not found, NOMINATORS should also determine whether the individual should be nominated to support immigration and visa screening by OHS and DOS (see Chapter 3, Section V). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 133 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.5 Due Weight. In determining whether a REASONABLE SUSPICION exists, due weight should be given to the specific reasonable inferences that a NOMINATOR is entitled to draw from the facts in light of his/her experience and not on unfounded suspicions or hunches. Although irrefutable evidence or concrete facts are not necessary, to be reasonable, suspicion should be as clear and as fully developed as circumstances permit. For additional guidance regarding the nomination of U.S. PERSONS, see Paragraph 3.15. 3.6 NOMINATORS 3.7 Criteria and Data Quality. To demonstrate that the nomination has sufficient indicia of reliability to support a REASONABLE SUSPICION determination, NOMINATlNG AGENCIES should incorporate processes designed to ensure that nominations are free of errors, and to the extent possible given the nature of the reporting, have not come from sources known or determined to be unreliable. NOMINATING AGENCIES should, to the extent possible, verify the accuracy and reliability of the information included in nominations. In addition to ensuring that nominations are free from errors, NOMINATING AGENCIES should implement procedures designed to ensure that recalled or revised information is reviewed regularly, and that necessary corrections to nominations based on those revisions/retractions are made. 3.8 PARTICULARIZED DEROGATORY INFOKMATION. PARTICULARIZED DEROGATORY lNFORMATION is the type of information relied on to determine whether REASONABLE SUSPICION is met. This is information that demonstrates the nature of an individual's or group's association with TERRORISM and/or TERRORIST ACTIVITIES that is descriptive and shall not nominate an individual based on source reporting that NOMINAT ING personnel identify as, or know to be, unreliable or not credible. Single source information, including but not limited to "walk-in", "write-in", or postings on social media sites, however, should not automatically be discounted merely because of the manner in which it was received. Instead, the NOMINATING AGENCY should evaluate the credibility of the source, as well as the nature and specificity of the information, and nominate even if that source is uncorroborated, assuming the information supports a REASONABLE SUSPICION that the individual is a KNOWN or SUSPECTED TERRORIST or there is another basis for watchlisting the individual. specific to an event or activity, and is more than a label. For example, "S ubject X provides false travel documentation for AI-Qaida operatives" is PARTICULARIZED DEROGATORY INFORMATION, whereas "Subject Y is a supporter," standing alone, is not considered PARTICULARIZED DEROGATORY INFORMATION. 3.9 Potential Behavioral Indicators. In making a REASONABLE SlJSPlC LON determination, NOMINATORS should consider behavioral indicators known to be associated with particular KNOWN or SUSPECTED TERRORISTS. The following is a list of a few examples of those indicators. It is not an exclusive list and it includes activity that may have innocent explanations wholly unrelated to TERRORISM. Furthermore, some activities conducted by U.S. PERSONS or activities taking place within the United States, may be an exercise of rights guaranteed by the First Amendment. Watchlisting an individual for engaging solely in UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 34 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION constitutionally protected activities is prohibited. 41 For these reasons, it is critical that each of these activities- as with all possible indicators of TERRORIST ACTIVITY- not be judged in isolation. Each must be viewed in the context in which it occurs and considered in combination with all other known information to ensure that any nomination based in whole or in part on this behavior comports with the standards set forth above: 3.9.1 Attendance at training camps known to the JC as facilitating TERRORIST ACTIVITIES 42 ; 3.9.2 Attendance at schools/institutions identified by the re as teaching an ideology that includes the justification of the unlawful use of violence or violent extremism; 3.9.3 Repeated contact with individuals identified by the IC as teaching or espousing an ideology that includes the justification of the unlawful use of violence or violent extremism; or, 3.9.4 Travel for no known lawful or legitimate purpose to a locus of TERRORIST ACTIVITY. III. KNOWN TERRORISTS 3. JO Definitions. 3.10.1 KNOWN TERRORIST. A KNOWN TERRORIST is an individual whom the U.S. Government knows is engaged, has been engaged, or who intends to engage in TERRORISM and/or TERRORIST ACTIVITY, including an individual (a) who has been charged, arrested , indicted, or convicted for a crime related to TERRORISM by U.S. Government or foreign government authorities; or (b) identified as a TERRORIST or member of a designated foreign terrorist organization pursuant to statute, Executive Order or international legal obligation pursuant to a United Nations Security Council Resolution. 3.10.2 TERRORISM and/or TERRORIST ACTIVITIES. In general, TERRORISM and/or TERRORIST ACTIVITIES are acts that: (a) involve violent acts or acts dangerous to human life, property, or infrastructure that may be a violation of U.S. law, or may have been, if those acts were committed in the United States; and, (b) appear intended to intimidate or coerce a civilian population, influence the policy of a government by intimidation or coercion, or affect the conduct of government by mass destruction, assassination, kidnapping, or hostage-taking. This includes activities that facilitate or support 41 See Chapter l , Section III. Attendance at TERRO RIST training camps alone meets the REASONABLE SUSPICION standard. Note that under the INA section 212 (a)(3)(B)(i)(VIII)[8 U.S.C. l 182(a)(3)(B)(i)(VIII)], an alien who has received military-type training (as defined in section 233 9D(c )(1) of Title 18, United States Code) from or on behalfof any organization that, at the time the training was received, was a terrorist organization as defined in clause (vi), is inadmissible. Note also that 18 U.S.C. section 233 9D criminalizes receiving military type training from a designated foreign terrorist organization. 42 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 35 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION TERRORISM and/or TERRORLST ACTIVITIES. 43 3.11 Types of KNOWN TERRORISTS for Whom REASONABLE SUSPICION is Established by Recognized Authority and for Whom Particularized Derogatory Information is Not Required. 3 .11.1 Arrested or Convicted TERRORISTS. 44 Individuals who have been arrested or convicted for TERRORIST ACTIVITY are considered KNOWN TERRORISTS who should be nominated. The arrest or conviction is presumed to meet the REASONABLE SUSPICION standard for watchlisting unless there is reason to believe that the information is questionable (e.g., faulty or erroneous), of dubious origin (e.g., poison pen, source known to be unreliable, or politically motivated) or the result of an unreliable process (e.g., conviction by a court that does not adhere to minimally acceptable due process standards). Nominations should include the charge, location, and date of the arrest or conviction, if available. 3.1 1.2 Individuals Identified Pursuant to Statute or Executive Order. 45 Pursuant to Executive Order 13224, as amended, "Blocking Property and Prohibiting Transactions with Persons who Commit, Threaten to Commit, or Support Terrorism," Executive Order 12947, as amended, "Prohibiting Transactions with Terrorists Who Threaten to Disrupt the Middle East Peace Process," and section 302 of the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA), the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) publishes, updates, and maintains an integrated and comprehensive list of designated parties with whom U.S. PERSONS are prohibited froi:n providing services or conducting transactions and whose assets are blocked. The names on this list include persons designated under country-based and list-based economic sanctions programs, as well as individuals and entities designated under the various Executive Orders and Statutes aimed at TERRORISM. Persons designated under Executive Order 13224, Executive Order 12947, or the AEDPA are included on this integrated and comprehensive list and are 'Specially Designated Global Terrorists' (SDGTs), 'Specially Designated Terrorists' (SDTs), or 'Foreign Terrorist 43 TERRORISM and/or TERRORIST ACTIVITI ES include acts that the actor knows or reasonably should know affords material support to any individual who the actor knows or reasonably should know, has committed or plans to commit a terrorist activity, to a terrorist organization or to any member of such an organization. Material support includes providing a safe house, transportation, communications, funds, transfer of funds or other material benefit, fa lse documentation or identification, weapons (including chemical, biological, or radiological weapons), explosives, or training for the commission of an act of TERRORISM and/or TERRORIST ACTIVITY. 44 See Paragraph 3.13. I for situations involving individuals who are acquitted or against whom charges are dismissed for a crime related to TERRORISM. 45 These authorities generally authorize the Secretary of State (in consultation with either the Secretary of the Treasury, the Attorney General, the Secretary of Homeland Security, or a combination thereof) to designate and block the assets of foreign individuals and entities that commit, or pose a significant risk of committing, acts of TERRORISM that threaten the security of U.S. nationals or the national security, foreign policy, or economy of the United States. Additionally, leaders or members of a Foreign Terrorist Organization (FTO), an Specially Designated Global Terrorist (SDGT) under Executive Order 13224, or an organization named to the Terrorist Exclusion List (TEL) may be designated as a terrorist organization by the Secretary of State for immigration purposes pursuant to INA section 212(a)(3)(B)(vi)(ll) [8 U.S.C . 1189(a)(3)(B)(vi)(ll)]. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 36 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Organizations' (FTOs), respectively, and should be nominated accordingly. 46 NOMINATORS should regularly check the Specially Designated Nationals List (SDNL) as individuals are added and dropped as new information becomes available. 3.11.3 Individuals Identified as TERRORISTS Pursuant to a United Nations Security Council Resolutions (UNSCR) Concerning Al-Qaida and Associated Individuals and Entities. Under UNSCR resolution 1267 (1999), modified and strengthened by subsequent resolutions, including resolutions 1333 (2000), 1390 (2002), 1445 (2003), 1526 (2004), 1617 (2005), 1735 (2006), 1822 (2008), 1904 (2009), and resolution 1989 (2011 ), sanctions measures now apply to designated individuals and entities associated with AI-Qaida, wherever located. The names of the targeted individuals and entities are placed on the AI-Qaida Sanctions List. 47 Under the UNSCR sanctions regime, the United States has an international legal obligation to prevent the entry into or transit through its territory of designated individuals listed on the Al-Qaida Sanctions List. 48 NOMINATORS should regularly check the AI-Qaida Sanctions List as individuals are added and dropped as new information becomes available. 3.11.4 Individuals Identified as TERRORISTS Pursuant to the National Intelligence Priorities Framework of Counterterrorism. Members of groups (not support entities) that are identified on the National Intelligence Priorities Framework of Counterterrorism, (NIPF-CT) are presumed to meet the REASONABLE SUSPICION standard so long as the group name is not just a regional or activity-based characterization. Neutral associations such as janitorial, repair, or delivery services of commercial goods do not meet the REASONABLE SUSPICION standard. IV. SUSPECTED TERRORISTS 3.12 Definition. 3.12.1 A SUSPECTED TERRORIST is an individual who is REASONABLY SUSPECTED to be, or has been, engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITI ES based on an articulable and REASONABLE SUSPICION. 3.13 Types of SUSPECTED TERRORISTS. 46 The comprehensive list ofSDGTs and SDTs is accessible through the OFAC website at the following URL: http://www .treasury .gov/resource-center/sanction s/S DN-L ist/ Pages/ d efau lt.aspx 47 Narrative summaries of the reasons for li sting individuals, groups, unde11akings and entities on the Al-Qaida Sanctions List (where available) can be found at the following URL: http ://www. un .org/sc/comm ittces/ I ?..67/narrati vc.shtm I. 48 Many persons designated under UNSCR 1267 and Executive Order 13224 are or have been engaged in financial support, facilitation , and other activities in support of TERRORI SM. They often, however, do not meet the current criteria for placement on the No Fly List. OHS and DOS will review the information provided about these individuals and take actions, as appropriate. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 37 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.13.1 Individuals Who are Acquitted or for Whom Charges are Dismissed. An individual who is acquitted or agains whom charges are dismissed for a crime related to TERRORISM may nevertheless meet the REASONABLE SUSPICION standard and appropriately remain on, or be nominated to, the Terrorist Watchlist. 49 Each case should be evaluated based on the facts of the underlying activities, the circumstances surrounding the acquittal or dismissal, and all known DEROGATORY lNFORMATION to determine if the individual should remain on the Terrorist Watchlist. 3.13.2 Individuals Identified as TERRORISTS Pursuant to Other Internal Department or Agency Processes. Departments or Agencies that nominate individuals associated with a terrorist group that is not designated by Statute or Executive Order (see Paragraph 3.11.2) or groups that fall outside of the NIPF-CT construct (see Paragraph 3.11.4) must have internal processes to review the activities of TERRORISTS and terrorist organizations. So long as a Department's or Agency's internal process has determined that a group is engaging in TERRORISM and/or TERRORIST ACTIV ITIES, REASONABLE SUSPICION can be met for members of the group, or active participants in, that gro up 's TERRORIST ACTIVITIES. Departments and Agencies that use this clause to recommend subjects for watchlisting are required to provide written notice to NCTC and TSC (an email will suffice) of the Department or Agency's determination. While members or active participants of such groups may be nominated without PARTICULARIZED DEROGATORY INFORMATION, the watchlisting of an individual pursuant to this clause must be based on the determination by a Department or Agency's internal processes that the group is engaging in TERRORISM and/or TERRORIST ACTIVITIES. Neutral associations like janitorial, repair, or delivery services of commercial goods do not meet the REASONABLE SUSPICION standard. 3.13.3 Individuals Identified as TERRORISTS Pursuant to Agreements by U.S. Government Agencies/Foreign Governments for Sharing of TERRORIST Identity Data. The U.S. Government may enter into agreements with foreign governments for the sharing of TERRORIST identity information. Pursuant to such agreements, data will be provided to the TSC for TERRORIST screening, as required under HSPD-6. The Information Sharing and Access (ISA) Jnteragency Policy Committee (IPC) or an IPCdesignated interagency body, will make a determination, country by country, prior to the final agreement on whether the data provided will (1) be presumed to meet the standard for inclusion in TSDB; or (2) undergo the Foreign Partner Vetting Process. 3.13.4 Individuals Identified as Associates or Affiliates of KNOWN or SUSPECrED TERRORISTS or TERRORIST Cells or Networks. so Individuals who are associated affiliated with a KNOWN or SUSPECTED TERRORIST, or TERRORIST cells or networks should be nominated when there is PARTICULARIZED DEROGATORY INFORMATION or 49 Because the REASONABL E SUSPICION standard required for watchlisting is lower than that required for a criminal conviction (i.e., beyond a reasonable doubt), an individual that is acquitted or for whom charges are dismissed may qualify for watch listing based on the facts and circumstances surrounding the acquittal or dismissal. 50 This section applies as well to persons "linked to," "related" and other similar descriptors to a KNOWN or SUSPECTED TERRORIST, TERRORIST cell s or networks. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 38 UNCLASSIFIEDI/FOR OFFICIAL USE ONLY /SENSITIVE SECURITY INFORMATION regarding the context of the relationship that gives rise to a REASONABLE SUSPICION that the individual is engaging or has engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACT1VITIES. Neutral associations such as janitorial, repair, or delivery services of commercial goods are not sufficient. Information about the pe1tinent activities of the KNOWN or SUSPECTED TERR.ORlST, TERRORIST cell or network should be included in the nomination. These nominations should include context or content to demonstrate the membership, association, or affiliation to the KNOWN or SUSPECTED TERRORIST, TERRORIST cell or network. Individuals who merely "may be" members, associates or affiliates to a terrorist organization may not be accepted into the TSDB, unless the REASONABLE SUSPICION standard is met and PARTICULARIZED DEROGATORY INFORMATION accompanies the nomination. 3.13.4.J Inferences that Support REASONABLE SUSPICION. REASONABLE SUSPICION may be rationally inferred from the context of the relationship with the KNOWN or SUSPECTED TEl{RORIST. The following factors should be considered when determining whether REASONABLE SUSPICION may be inferred: 3. 13.4.1.1 The nature of the activity engaged in with the KNOWN or SUSPECTED TERRORIST; 3.13.4. 1.2 The frequency, duration, or manner of their contact; 3.13.4. 1.3 A close, continuing, or direct relationship with a KNOWN or that reasonably suggests the individual is knowingly involved in or willfully supporting the KNOWN or SUSPECTED TERRORIST'S TERRORIST ACTIVITIES; or, SUSPECTED TERRORIST 3.13.4.1.4 Other malevolent or illicit factors that can be articulated that would support a REASONABLE SUSPICION that the individual is engaging in TERRORISM and/or TERRORIST ACTIVITIES. 3. J3.5 Individuals Identified as TERRORIST Facilitators. TERRORIST facil.itators are presumed to meet the REASONABLE SUSPICION standard. The nomination should include PARTICULARIZED DEROGATORY INFORMATION concerning the type of "facilitation" involved and the role of the facilitator when this information is known. Individuals who are considered facilitators include, but are not limited to, financial fundraisers, document forgers, travel facilitators, money launderers, and arms merchants. There must be REASONABLE SUSPICION that the facilitator knew that his or her actions would aid in the furtherance of TERRORISM and/or TERRORIST ACTIVITIES. 3.13.5.1 Criminal Activity Supporting TERRORISM. If intelligence or information indicates that the individual is engaging in criminal activity related to smuggling, providing safe houses, forging documents, or any other support to TERRORISTS or terrorist groups, NOMINATORS should presume that the individual is knowingly engaging in criminal activity that supports TERRORISM and/ or TERl'WRIST UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Pagel39 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION ACTlVlTlES. In these circumstances, REASONABLE SUSPICION is based on TERRORIST criminal activity and should be described in the nomination . the 3.13 .6 Individuals who Incite Others to Commit Acts of TERRORISM. 51 Inciting an individual to commit an act of TERRORISM and/or TERRORIST ACTIVITIES under circumstances that indicate an intention to cause death or serious bodily harm is considered engaging in TERRORIST ACTIVITY and is sufficient to meet the REASONABLE SUSPICION standard. The nomination should include PARTICULARIZED DEROGATORY INFORMATION concerning the type of " incitement" involved and the role of the individual when this information is known. Normally, speech will not rise to the level of "inciting" unless there is a clear link between the speech and an actual effort to undertake the TERRORIST ACTIVITY. The individual may have incited TERRORIST ACTIVITY, even if a terrorist attack does not actually occur (e.g., because an attempt to commit such activity is thwarted). Speech advocating a violent or dangerous TERIWRIST ACTIVITY is incitement if such advocacy is directed to inciting or producing imminent lawless action and is likely to incite or produce such action. 52 3.13.7 Individuals Who Solicit Others to Engage in TERRORIST ACTIVITIES. In an individual capacity or as a member of an organization, any individual who solicits another to engage in a TERRORIST ACTIVfTY and/or for membership in a terrorist organization is considered to be engaging in TERRORIST ACTIVITY. Nominations that include PARTICULARIZED DEROGATORY INFORMATION concerning the type of solicitation involved and the role of the individual are sufficient to meet the REASONABLE SUSPICION standard. An individual may fall outside the scope of engaging in the solicitation of an individual for membership in a terrorist organization if there is information that demonstrates that the individual did not know and should not have reasonably known that the organization was a terrorist organization. 3.13.8 Individuals Identified as Sympathizers and Supporters of a Designated Terrorist Organization. 53 Sympathizers and suppotters of a designated terrorist organization (DTO) (see Paragraph 3.11 .2) may be watchlisted when the REASONABLE SUSPICION standard is met, and the nomination includes PARTICULARIZED DEROGATORY INFORMATION concerning the how the individual 's activities warrant watchlisting, as opposed to information about why the organization is a DTO. 3.13 .8 .1 A sympathizer or supporter of TERRORISM should be nominated if the support is operational in nature. lf support is merely ideological , the individual should not be nominated. 51 For situations where there is no PARTIC ULARIZED DEROGATORY INFORMATION, individuals may be watch listed as an exception to the REASON ABLE SUSPICION standard. See Paragraph 3. 14.3. 52 Ashcroft v. Free Speech Coalition, 535 U.S. 234, 122 S.Ct. 1389 (2002); 9 FAM 40.32 N2.5, "Advocacy of Terrorism Not Always Exclusionary." 53 For situations where there is no PARTI C ULARIZED DEROGATORY INFORMATION , supporters of a designated terrorist organization (OTO) may be watchlisted as an exception to the REASONABLE SUSPIC ION standard. See Paragraph 3.14.4. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 40 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.13.9 Individuals Identified as FOREIGN FIGHTERS. roREIGN FIGHTERS are defined as nationals of one country who travel or attempt to travel to another country to participate in TERRORISM and/or TERRORIST ACTIVITIES, and to the extent possible, the nomination should include PARTICULARIZED DEROGATORY INFORMATION. Behavior that qualifies as PARTICULAR1ZED DEROGATORY INFORMATION is the travel to a foreign country to participate in TERRORISM and/or TERRORIST ACTIVITIES. 3.13.9.1 A person is not considered a FOREIGN FIGHTER when he or she traveled from Country A to Country B for non-TERRORIST reasons (e.g. , enrolling in school). Inferences that someone is a FOREIGN FIGHTER may not be drawn solely from biographic facts that indicate a person was born in one country and is found in a different country and suspected to be participating in TERRORISM and/or TERRORIST ACTIVITIES. 3.13.10 Special Consideration for Individuals Involved with TERRORIST-Associated Weapons. Individuals who possess, handle, use, manufacture, sell, or transfer Improvised Explosive Devices (IEDs), Explosively Formed Penetrators (EFP), Radiological Dispersion Devices (RDD), or improvised chemical, biological, radiological, or nuclear (CBRN) devices, are presumed to meet the REASONABLE SUSPICION standard due to the inherently dangerous nature of these items or when it can reasonably be inferred from the context that there is a connection to TERRORISM and/or TERRORIST ACTIVITIES (e.g., Iraq, presence of other KNOWN or SUSPECTED TERRORISTS, previous attacks on or threats to U.S. Forces). 3.13.11 Targets of Raids Conducted by the U.S. Military or the Intelligence Community. REASONABLE SUSPICION is presumed where an individual was identified as the target of a raid to disrupt a FTO. When an individual is identified by discovery of information found during the course of such a raid conducted by the U.S. Military or the IC, however, REASONABLE SUSPICION is met where the available PARTICULARIZED DEROGATORY INFORMATION explains why he or she can be reasonably suspected of engaging or having engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITY. If there is no PARTICULARIZED DEROGATORY INFORMATION on the individual for whom information was discovered during the raid, he or she should not be nominated. 3.13.12 Individuals Identified as TERRORISTS via Documentation or Media Exploitation Efforts. Any individuals identified in documents or media otherwise captured by U.S. or allied forces or obtained from a NOMINATING AGENCY must have a connection to TERRORISM and/or TERRORIST ACTIVITlES in order to be nominated to the Terrorist Watchlist. REASONABLE SUSPICION for an individual to be nominated from document and media exploitation (DOM EX) materials may be established either by the content or context of the DOMEX, or other sources. Nominations under this section must include PARTICULARIZED DEROGATORY INFORMATION. For example, REASONABLE SUSPICION for watch listing can be met based on the acquisition of documents/media identifying a person from the counterterrorism operation that targeted the residence of Al-Qaida UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 141 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION leader Usama bin Laden on May 2, 2011. 54 Likewise, individuals Iisted on a roster of an IED cell could be nominated solely on the presence of their name on the list. An identity from a captured passport, however, would only be watchlisted if additional reporting documents REASONABLE SUSPlCION to believe that the individual is connected to TERRORISM and/or TERRORIST ACTIVITY. 3.13.13 LONE WOLVES. Because the focus is on the individual's TERRORISM-related conduct, "LONE WOLF" TERRORISTS should be nominated when PARTICULARIZED DEROGATORY INFORMATION and their actions support a REASONABLE SUSPICION that they are engaged in, or have engaged in, TERRORISM and/or TERRORIST ACTIVITIES. No present known affiliation with a terror group, organization, or cell is required but prior affiliations, if they exist, may be taken into account for supporting a rational inference that the individual is reasonably suspected of engaging in TERRORlSM and/or TERRORIST ACTIVITIES. V. EXCEPTIONS TO SUPPORT IMMIGRATION AND VISA SCREENING ACTIVITIES BY OHS AND DOS 3.14 TSDB Minimum Substantive Derogatory Exceptions to Support Immigration and Visa Screening Activities by the DHS and DOS. The Watchlisting Guidance contains certain exceptions to the minimum substantive derogatory criteria for TERRORIST watchlisting that support immigration and visa screening activities by the OHS and DOS to determine whether grounds exist to deny admission of aliens to the United States (including denials of visas) or to deny other immigration benefits pursuant to the INA. 55 PARTICULARIZED DEROGATORY INFORMATION is not required for nominations made pursuant to the following sections. Because the INA defines "aliens" as "any person not a citizen or national of the United States" 56 , the INA admissibility provisions also apply to LPRs, in certain circumstances including those described in INA section 10l(a)(13)(C)[8 U.S.C. 1101(a)(13)(C)], who are considered as U.S. PERSONS under Executive Order 12333. Consequently, NCTC developed a mechanism in TIDE to identify and distinguish U.S. citizens from non-U.S. citizens in order to further distinguish between "aliens" under the INA and U.S. PERSONS under Executive Order 12333 . The following subsections are exceptions to the REASONABLE SUSPICION standard and will only be transmitted to DOS's CLASS (via the DOS CCD) and DHS 's WLS to support immigration and visa screening processes. 54 Such documents/media, however, sti ll need to be reviewed to ensure that innocent individuals are not erroneously watch listed. 55 INA section 2 12(a)(3)(8)[8 U .S.C. I I 82(a)(3)(8)] sets forth several grounds for inadmissibility based on terrorist activities, which is defined in lNA section 212(a)(3)(B)(ii i)[8 U.S.C. 1182(a)(3)(B)(iii)]. For example, LNA section 212(a)(3)(B)(i)(Vlf) states that any alien who "endorses or espouses terrorist activity or persuades others to endorse or espouse terrorist activity or support a terrorist organization" is inadmissible to the United States. 8 U.S.C. 1182(a)(3}(8Xi)(VIT)]. All other uses of the term "terrorist activities" within this Watchiisting Guidance that do not specifically reference the INA follow the definition outlined in Chapter I and Appendix 1. 5 See 1NA § 101 (a)(3)[8 U.S.C. 110 l(a)(3)]. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 42 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Spouses and Children. Spouses and children 57 of a KNOWN or SUSPECTED alien TERRORIST cannot be considered TERRORISTS without a R EASONABLE SUSPICION that they are engaging or have engaged in conduct constitutini, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVTTTES. The TNA provides that the alien spouse or alien child of an alien who is inadmissible for certain specified reasons relating to terrorist activities, if the activity causing the alien to be found inadmissible occurred within the last five (5) years, is inadmissible.59 An alien spouse or child of an alien who is believed to be inadmissible under the INA for terrorist activities should be nominated. No additional DEROGATORY INFORMATION (in addition to familial relation) is required for nomination under this section, if the individual meets the below qualifications. 3.14. l 3.14.1.1 To qualify for watch listing, alien spouses and children of a must: KNOWN or SUSPECTED TERRORIST 3. 14.1.1.1 Be an alien (not a U.S. citizen or national), which includes LPRs; and, 3 .14.1 . 1.2 Be an unmarried child under the age of 21 or a spouse of an alien. 3.14.1.2 Ex-spouses, widows, or widowers should not be nominated unless there is a to believe that they themselves are engaging or have engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITIES. Deceased spouses should not be nominated unless they are specifically covered in Paragraph 3 .17. REASONABLE SUSPIClON 3.14.1.3 Once a spouse or child no longer meets the definitional requirements under this section, such an individual should no longer be watchlisted unless there is a REASONABLE SUSPICION to believe that the individual is engaging in TERRORISM and/or TERRORIST ACTIVITIES. For example, if a child reaches the age of2l and there is REASONABLE SUSPI CION to believe he or she was knowingly involved in TERRORIST ACTIVITY by providing material support to a FTO, he or she can remain watchlisted based upon this DEROGATORY IN FORMATION. On the other hand, once a child of a KNOWN or SUSPECTED TERRORIST turns 21 years of age, the individual should no longer be watchlisted under this exception because he or she is not considered a child of the KNOWN or SUS PECTED TERRORI ST and additional DEROGATORY INFORMATION would be needed to meet the REASONABLE SUSPICION standard. 57 The lNA defines "child" as "an unmarried person under 21 years of age . .. ." INA § 10 I (b )( I )(8 U.S.C. I IO I (b )( 1)] . The discussion in Paragraph 3.14. 1 is limited exclusively to spouses and children; all other family members (including mothers, fathers, sisters and brothers) should be nominated for inclusion in the TSDB only ifthere is DEROGATORY INFORMATION that the individual has a close connection to a KNOWN or SUS PECTED TERRORIST and that connection meets the REASONABLE SUSPICION standard. Absent independent DEROGATORY INFORMATION, records for these individuals may be retained in TIDE for analytic purposes. See Paragraph 1 .53.2.2 for treatment of these other family members as " non-TERRORIST" records that may reside in TIDE for analytic purposes but are not exported to the TSDB (known a s TIDE Category Code 160). 59 See INA § 2 12(a){3)(B)(i){IX)[8 U.S.C. 1 l 82(a)(3)( B)(i){I X)]. While this provis ion does not a pply when the activity caus ing the alien to be found inadmissible occurred more than 5 years before the spouse or child's admissibility is being considered, the analysis of the time limit's application will be detennined by SCREENERS upon ENCOUNTER. 58 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 43 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.14.2 Endorsers and Espousers. An alien who endorses or espouses TERRORIST ACTIVITY or persuades others to endorse or espouse TERRORIST ACTIVITY or support a terrorist organization may be inadmissible under the INA and should be nominated. 3.14.3 Incitement. Inciting an individual to commit an act ofTERRORlSM and/or TERRORIST ACTIVlTY under circumstances that indicate an intention to cause death or serious bodily harm is considered engaging in TERRORIST ACTlVJTY . The individual may be inadmissible under the INA and should be nominated. 3.14.4 Supporters of a Designated Terrorist Organization. Supporters of a DTO may be inadmissible under the INA and should be nominated if the support is operational in nature. If support is merely ideological, the individual should not be nominated. 3.14.5 Representatives. Representatives of terrorist organizations and representatives of any political, social or other group that endorses or espouses TERRORIST ACTIVITY may be inadmissible under the INA and should be nominated. Representatives include an officer, official, or spokesman of an organization, and any person who directs, counsels, commands, or induces an organization to engage in TERRORIST ACTIVITY. Neither membership in, nor association with, the organization or group is required. 3.14.6 TERRORISTS, Extremists, Jihadists, Militants, Mujahideen or Insurgents. 60 Nominations of individuals described by sources as "TERRORISTS" , "extremists", "jihadists", "militants", "mujahideen" or "insurgents" 61, (an exclusive list) will be accepted into the TSDB as exceptions for export to DHS' WLS and DOS' CLASSVISA and CLASS-PASSPORT for immigration and border processing when the following four conditions apply: 3.14.6.1 The individual is a not a U.S. Citizen or National (e.g. , the individual is a foreign national or a LPR); 3.14.6.2 The context suggests a nexus to TERRORISM; 3.14.6.3 Adequate identifiers are available to permit identification 62 ; and, 3.14.6.4 The information has been evaluated as being credible. 3 .14.6.5 It is important to recognize that some activities associated with extreme political or religious views expressed by aliens in the United States may constitute the exercise of rights guaranteed by the First Amendment (e.g. , the rights to free speech, assembly and religious exercise). 63 Therefore, someone so labeled based 60 This exception is commonly referred to as "label plus" nomination. Insurgency is defined as an "organized movement" aimed at the overthrow of a constituted government through the use of subversion and armed conflict. 62 An adequate identifier is a biometric, or a last name, first name and any one of the additional identifiers listed in Chapter 2, Section II. 63 See Chapter 1, Section III concerning constitutionally protected activities. 61 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 144 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION in part on this type of constitutionally protected activity, must have other substantive DEROGATORY lNFORMATION indicative of TERRORIST intent. As previously noted, nominations may not be made based solely on protected activity. 3.14.7 Additional Derogatory Information Required (TIDE Category Code 99s and 50s). NCTC will retain a record in TIDE if it is determined that the information pertains to, or is related to, TERRORTSM. 64 However, if a record involving an alien, which includes LPRs, does not contain sufficient DEROGATORY INFORMATION to meet any of the aforementioned exceptions to the TSDB's REASONABLE SUSPICION standard for inclusion, NCTC will generally designate the record as a Category Code 99 (the TIDE category code "applied when DEROGATORY INFORMATION does not meet the REASONABLE SUSPICION standard for watchlisting because it is very limited or of suspected reliability but there is a possible nexus to TERRORISM") or a Category Code 50 (the TIDE category code applied when an individual has a defined relationship with the KNOWN or SUSPECTF,I) TERRORIST, hut whose involvement with the KNOWN or SUSPECTED 65 TERRORIST'S activities is unknown) , making it available for export to TSDB for use by DOS and OHS for visa adjudication and immigration processing. VI. SPECIAL CONSIDERATIONS 3.15 Nominations of U.S. PERSONS. Nominations of U.S. PERSONS, in accordance with the Attorney General approved procedures applicable to each element of the IC 66, will be made pursuant to the procedures set forth below to ensure compliance with this REASONABLE SUSPJCIO standard. Nominations of U.S. PERSONS shall be made based on information from sources of known reliability or where there exists additional corroboration or context supporting REASONABLE SUSPICION. NOM INATING AGENCIES will review information on U.S. PERSONS pursuant to procedures set forth below consistent with the nature of the reporting supporting the nomination and the protection of sources and methods. 3.15.1 Special handling is warranted for U.S. PERSONS nominated for watchlisting, especially by an Agency other than the FBI. To ensure compliance with the Watch listing Guidance that the REASONABLE SUSPICION standard exists for U.S. PERSONS in the TSDB, as well as to ensure proper interagency coordination, a formal process has been implemented that: 3.15.1.1 Ensures the FBI is aware of U.S. PERSONS nominated by any other Department or Agency ; 64 65 See Paragraph 1.26. See FN 28, supra. 66 The referenced procedures are those approved for each element of the JC pursuant to Executive Order 12333, as amended, which states in relevant part, "Elements of the Intelligence Community are authorized to collect, retain, or disseminate information concerning United States persons only in accordance with procedures established by the head ofthc fntelligence Community element concerned or by the head of a Department containing such element and approved by the Attorney General, consistent with the authorities provided by part J.of this Order after consultation with the Director." See Executive Order 12333, Paragraph 2.3, as amended by Executive Order 13618 (July 6, 2012). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 45 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.15.1 .2 Requires review of the watch list nomination decision and concurrence by the TSC that REASONABLE SUSPfCION exists for watchlisting; 3.15.1.3 Ensures there is interagency awareness of all U.S. PERSON nominations (FBI or otherwise); and, 3.15.1 .4 Ensures there is U.S. Government coordination in the investigation and/or intelligence gathering on these individuals, including strategies for engagement with foreign partners if required . 3.15.2 NCTC should include in TIDE U.S. PERSONS who are under International TERRORISM Preliminary Investigation by the FBI but who have not been deemed to meet the REASONABLE SUSPICION standard and U.S. PERSONS with a nexus to TERRORISM, but for whom there is insufficient DEROGATORY INFORMATION to support entry in TSDB. These TIDE records on U.S. PERSONS will not be provided to TSC for export via the TSDB unless approved of as an exception to the REASONABLE SUSPICION standard pursuant to Section Vin this Chapter of the Watchlisting Guidance, infra, or as part of a TBU pursuant to Paragraph 1.59 of the Watchlisting Guidance. 3.15.3 For U.S. PERSONS nominated by other Government Agencies who are not under FBI investigation, NCTC analysts receive, process, and export these subjects for inclusion in the TSDB, as appropriate under current procedures. As part of the processing, NCTC analysts identify and share these U.S. PERSON identifiers with the FBI's Foreign Terrorist Tracking Task Force (FTTTF) for assessment, and notifying the FBI case agent of the inclusion. 3 .16 Political Figures or Purposes. Heads of State or other Government officials should be nominated when there is PARTICULARIZED DEROGATORY INFORMATION to support a REASONABLE SUSPICION to believe the individual is engaging or has engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTJVlTIES. Waivers or other appropriate action can be requested from U.S. Customs and Border Protection (CBP) in coordination with DOS to facilitate the travel of a properly watchlisted Head of State or other government officials to the extent necessary. 3.16. l Watchlisting an individual is prohibited based on political purposes, retaliation, or any other reason unconnected to the REASONABLE SUSPICION standard. 3.17 Identities of Deceased Individuals. 3.17. l The TSDB will not include identity information of KNOWN or SUSPECTED that are confirmed dead 67 unless: TERRORISTS 67 Subjects are considered "confirmed dead" under the following circumstances: a. The subject's death became a high profile case in the public sphere (e.g. , media footage confirming suicide bombers' deaths, 9/11 hijackers, death of Abu Musaq al Zarqawi); or, b. Reporting on the subject's death has been corroborated by at least two credible sources (e.g., United States or "friendly" foreign government, fully-vetted asset). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 46 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.17.1.1 PARTICULARIZED DEROGATORY INFORMATION supports a REASONABLE SUSPICION that an existing KNOWN or SUSPECTED TERRORIST is using that identity information; or, 3.17.1.2 A recognized terrorist organization 68 collects KNOWN or SUSPECTED TERRORIST identity information for use by its members in preparing for or committing TERRORIST acts and identity or travel documents (e.g., related to a deceased KNOWN or SUSPECTED TERRORIST of that organization) have not been recovered. "Trusted travel documents" include all documents used for border crossings. 3. 17.2 NOMINATING AGENCIES will share information regarding a watchlisted or nominated individual's deceased status under Addendum B of the TSC MOU, section (7)(m) ("Any other TERRORISM INFORMATION that ORIGINATORS specifically provide for passage to the TSC"). NCTC will export deceased status to the TSC, and the TSC will export deceased status to end user screening systems. NOMINATING AGENCIES will mark deceased status information "TIDE Restricted" in cases where the status, because of sensitive sourcing, should not be forwarded to the TSC. TIDE restricted information will not be exported to the TSC. When a nomination is made on a deceased person in accordance with this paragraph, the status indicator within TIDE that is exported to the TSC will be marked to reflect that the person is deceased. VII. EXAMPLES OF TERRORISM AND/OR TERRORIST ACTIVITIES 3.18 Examples of TERRORISM and/or TERRORIST ACTIVITIES may generally include conduct intended to intimidate, coerce, influence, or affect civilian populations or government policy consisting of: 3.18.1 destruction of aircraft or aircraft facilities (18 U.S.C. 32); 3.18.2 violence at international airports (l8 U.S.C. 37); 3.18.3 biological weapons (18 U.S.C. 175 or 175b); 3.18.4 variola virus (18 U.S.C. 175c); 3. I 8.5 chemical weapons (18 U.S.C. 229); 3.18.6 assassination and kidnapping of Congressional Members, Cabinet Officials, and Supreme Court Justices(l 8 U.S.C. 35 1 (a)(b)(c) or (d)); 3.18.7 nuclear materials(] 8 U.S.C. 831); 3.18.8 participation in nuclear and weapons of mass destruction threats to the United States (18 U.S.C. 832); 3.18.9 plastic explosives (18 U.S.C. 842(m) or (n) footnote 1.); 3.18. 10 arson and bombing of Government property risking or causing death (18 U.S.C. 844(f)(2) or (3)); 3.18.11 arson and bombing of property used in interstate commerce (18 U.S .C. 844(i)); 68 A classified list of recognized terrorist organiz.ations that are known to reuse TERRORIST identity information is available on the Watchlisting Community oflnterest portal on NCTC Current. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 147 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.18.12 killing or attempted killing during an attack on a Federal facility with a dangerous weapon (18 U.S.C. 930(c)); 3.18.13 conspiracy to murder, kidnap, or maim persons abroad (18 U .S.C. 956(a)( I)); 3 .18.14 damaging a protected computer used in interstate or foreign commerce or that is used exclusively by a financial institution or the United States Government (18 U.S.C. 1030(a)(1 ); 18 U.S.C. 1030(a)(5)(A)(i) resulting in damage as defined in 1030(a)(5)(B)(ii) through (v)); 3.18.15 killing or attempted killing of officers and employees of the United States (18 U.S.C. 1114); 3 .18.16 murder or manslaughter of foreign officials, official guests, or internationally protected persons (18 U.S.C. 1116); 3.18.17 hostage taking (I 8 U.S.C. 1203); 3.18.18 damage to Government property (18 U.S.C. 1361 ); 3.18.19 destruction of communication lines, stations, or systems (18 U.S.C. 1362); 3.18.20 injury to U.S. aircraft or vessels (18 U.S.C. 1363); 3.18.21 injury to U.S. diplomatic, consular, military, or other property (18 U.S.C. 1363); 3.18.22 destruction of an energy facility (J 8 U.S.C. 1366(a)); 3.18.23 Presidential and Presidential Staff assassination and kidnapping (18 U.S.C. 175l(a), (b), (c), or (d)); 3.18.24 acts of violence against railroad carriers and against mass transportation systems on land, on water, or through the air (18 U.S.C. 1992); 3.18.25 destruction of national defense materials, premises, or utilities (18 U.S.C. 2115; 18 u.s.c. 2156); 3.18.26 violence against maritime navigation (seizing a ship by force, destroying a ship or damaging its navigation systems) (18 U.S.C. 2280); 3.18.27 violence against maritime fixed platforms (an artificial island, installation or structure permanently attached to the sea-bed for the purpose of exploration or exploitation of resources or for other economic purposes (18 U.S.C. 2281 ); 3.18.28 homicides and other violence against U.S. nationals occurring outside of the United States(] 8 U.S .C. 2332); 3.18.29 the use of weapons of mass destruction (18 U.S.C. 2332a); 3.18.30 acts of TERRORISM transcending national boundaries (18 U.S.C. 2332b); 3.18.31 bombing of public places and facilities (18 U.S .C. 2332f); 3.18.32 producing, transferring, or threatening to use missile systems designed to destroy aircraft (18 U.S.C. 2332g); 3.18.33 producing, transferring, or threatening to use radiological dispersal devices (18 U.S.C. 2332h); 3.18.34 harboring TERRORISTS (18 U.S.C. 2339); 3.18.35 providing material support to TERRORISTS (18 U.S.C. 2339A); 3.18.36 providing material suppmt to terrorist organizations (18 U.S.C. 2339B); 3.18.37 financing TERRORISM (18 u.s.c. 2339C); 3.18.38 receiving military-type training from a FTO (18 U.S.C. 23390); 3.18.39 torture (18 U.S.C. 2340A); 3.18.40 developing, transferring, possessing, or threatening to use atomic weapons (42 u.s.c. 2122); UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 148 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3.18.41 sabotage of nuclear facilities or fuel (42 U.S.C. 2284); 3.18.42 aircraft piracy (49 U.S.C. 46502); 3.18.43 assault on a flight crew with a dangerous weapon (49 U.S.C. 46504); 3.18.44 carrying a weapon or explosive aboard an aircraft (49 U.S.C. 46505(b) or (c); 49 U.S.C. 46506 if homicide or attempted homicide is involved); 3.18.45 damaging or destroying an interstate gas pipeline facility, an interstate hazardous liquid pipeline facility, or either an intrastate gas pipeline facility or intrastate hazardous liquid pipeline facility (49 U.S.C. 60123(b)); or 3.18.46 manufacturing, distributing, or possessing controlled substances intending to provide anything of pecuniary value to a FTO, member, or group (Section IO 1OA (iv) of the ControJled Substances Import and Export Act). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 149 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION CHAPTER 4: NO FLY, SELECTEE AND EXPANDED SELECTEE LISTS IMPLEMENTATION GUIDANCE BACKGROUND I. 4.1 On October 21, 2004, the Deputies Committee established the criteria for the No Fly and Selectee Lists. On January 10, 2005, the DI-IS released the No Fly and Selectee Lists lmplementation Guidance (Implementation Guidance) to provide direction on how to implement the No Fly and Selectee List criteria. The Implementation Guidance was updated and supplemented on July 25, 2006. 4.2 On February 8, 2008, the Deputies Committee approved the addition of a third and fourth criterion to the No Fly List. The Terrorist Screening Center Policy Board Working Group6 9 revised the Implementation Guidance on March 5, 2008, to provide direction on how to implement these new criteria. 4.3 Following the attempted TERRORIST attack on December 25, 2009, the President directed that a review of the current No Fly and Selectee List criteria be conducted and recommendations be made regarding whether any adjustments were needed. The Terrorist Screening Center Policy Board Working Group, in conjunction with the Information Sharing Access IPC, recommended certain changes in the lists' criteria and implementation guidance. Those recommendations were approved by the Deputies Committee on July 16, 2010. U. PRE-CONDITIONS FOR PLACEMENT ON THE NO FLY OR SELECTEE LIST 4.4 Generally, in order to be included on either the No Fly or Selectee List, two pre-conditions must both be met: 4.4. l Minimum Identifying Criteria. Absent a Special Situation as described below 7°, minimum identifying biographic criteria consisting of .First Name, Last Name, Full Date of Birth are required; and, 4.4.2 Minimum Substantive Derogatory Criteria. The minimum substantive derogatory criteria for inclusion must be met. 71 69 Th is Working Group included representatives from Department of State, Department of Justice, Department of Homeland Security, Federal Bureau oflnvestigation, Central Intelligence Agency, Transportation Security Administration, National Counterterrorism Center, Terrorist Screening Center, Department of Treasury, and U.S. Customs and Border Protection. 10 See Chapter 4, Section lX, for additional information regarding the full date of birth requirement and applicable exceptions. 71 See Paragraph 1.58 for expedited nominations procedures. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page/ 50 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION III. NO FLY LIST CRITERIA 4.5 Any person, regardless of citizenship, who represents: 4.5.1 a threat of committing an act of "international TERRORJSM" (as defined in 18 U .S.C. 2331 (1 )) or "domestic TERRORTSM" (as defined in 18 U.S.C. 2331 (5)) with respect to an aircraft (including a threat of air piracy, or a threat to airline, passenger, or civil aviation security); or, 4.5.2 a threat of committing an act of "domestic TERRORISM" (as defined in 18 U.S.C. 2331 (5)) with respect to the homeland 72 ; or, 4.5.3 a threat of committing an act of "international TERRORISM" (as defined in 18 U.S.C. 2331(1)) against any U.S. Government facility abroad and associated or supporting personnel, including U.S. embassies, consulates and missions, military installations (as defined by 10 U.S.C. 280l(c)(4)), U.S. ships, U.S . aircraft, or other auxiliary craft owned or leased by the U.S. Government; or, 4.5.4 a threat of engaging in or conducting a violent act of TERRORISM and who is 73 OPERATTONALLYCAPABLE of doing so. 4.6 IV. Detainees at the Naval Station, Guantanamo Bay, Cuba. Any individual who was a "detainee" held at the Naval Station, Guantanamo Bay, Cuba, unless the President certifies in writing to Congress that the detainee poses no threat to the United States, its citizens, or its allies. For purposes of this subparagraph, the term "detainee" means an individual in the 74 custody or under the physical control of the United States as a result of armed conflict. FURTHER CLARIFICATION OF THE NO FLY CRITERIA 4.7 Third No Fly List Criterion. Prior to the addition of the third No Fly List criterion (see Paragraph 4.5.3), a concern over the breadth of the No Fly List arose when KNOWN or SUSPECTED TERRORISTS who posed a threat to a U.S. military base overseas did not meet the criteria for inclusion on the No Fly List. Despite national interests, the threat to the overseas military base did not involve either civil aviation (as set forth in the first No Fly List criterion) or an act of domestic TERRORISM to the homeland (as set forth in the second No Fly List criterion). "Domestic Terrorism" requires that a subject's TERRORIST ACTIVITIES occur primarily within the territorial jurisdiction of the United States. " Homeland" does not include bases and embassies located abroad. Even in those instances when the JC had identified a KNOWN or SUSPECTED TERRORIST'S specific target, KNOWN or SUSPECTED TERRORISTS maintained the advantage of operational flexibility. The third No Fly List criterion addresses 72 Domestic acts ofTERRORISM are those that primarily occur "within the territorial jurisdiction of the United States." See 18 U.S.C. 2331 (5)(C). 73 See Paragraph 4.8.2, infra, that defines "OPER/\TIONALL Y CAPABLE." 74 See 49 U.S.C. 44903U)(2)(C)(v). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 51 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION this specific vulnerability and counters the ability of KNOWN or SUSPECTED TERRORISTS to target U.S. Government facilities outside of the "homeland" (e.g., the October 12, 2000 attack upon the U.S. Navy guided missile destroyer USS Cole while it was harbored in the Yemeni pott of Aden). 4.8 Fourth No Fly List Criterion. 4.8.1 Enable Flexibility. The fourth No Fly List criterion (see Paragraph 4.5.4) is intended to enable flexibility for nominations to the No Fly List of OPERA Tl ON ALLY CAPABLE KNOWN or SUSPECTED TERRORISTS who pose a threat of committing an act of international TERRORISM abroad, but who do not meet the first, second or third No Fly List criterion because they do not pose a threat to civil aviation, a threat to the homeland, or a threat to U.S. facilities and their associated or supporting personnel. Previously, the No Fly List criteria did not prevent KNOWN or SUSPECTED TERRORISTS from traveling aboard aircraft, even though they may have had the intent and OPERATIONAL CAPABILITY to commit a TERRORIST act against U.S. nationals abroad (outside of the "homeland") or against a target with no nexus to the United States or its nationals. The fourth No Fly List criterion now addresses these two vulnerabilities. 4.8.2 OPERATIONALLY CAPABLE Defined. An individual is "OPERATIONALLY CAPABLE" if, based on credible intelligence, he or she, acting individually or in concert with others, reasonably appears to have the ability, knowledge, opportunity, and intent or is actively seeking the opportunity to engage in a violent act of TERRORISM consistent with 18 U.S.C. 2331 or 18 U.S.C. 2332b. For example, attempting to obtain an TED would indicate an individual is OPERATIONALLY CAPABLE of committing an act ofTERROIUSM. However, simply conducting internet research concerning IEDs would not be sufficient without additional activity. Depending on the circumstances, and in combination with other facts, scouting potential targets or traveling for no legitimate purpose to places that have TERRORIST training grounds, regardless of whether the person is presently capable of using an lED, might also indicate an individual is OPERATlONALL Y CAPABLE of committing an act of TERRORISM. 4.8.3 Possible Indicators of Being OPERATIONALLY CAPABLE. In determining whether an individual is OPERATIONALLY CAPABLE, consideration should be given to the following indicators regarding ability, knowledge, opportunity, and/or intent: 4.8.3.1 Subject has undergone TERRORIST training or been provided some instruction, to include receiving military training by a designated terrorist group; 4.8.3.2 Subject has indicated intent to participate in planning/conducting an attack; 4.8.3.3 Subject has expressed desire to martyr him/herself; 4.8.3.4 Subject is in repeated contact with a KNOWN TERR0RfST facilitator who recruits or facilitates travel of operatives; 4.8.3 .5 Subject is planning an attack either alone or as part of a group; or, UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 52 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 4.8.3.6 Subject is associated with a TERRORIST group/cell and the subject is accumulating weapons/explosives. 4.9 OPERATIONALLY CAPABLE Scenarios. The three scenarios set forth below serve as some examples of No Fly List nominations that would fall under the fourth No Fly L ist criterion: 4.9.1 There is credible information that the planning or preparation for a TERRORIST attack against the interests of the United States or a foreign government is ongoing and there is an indication that an individual is OPERATIONALLY CAPABLE; 4.9.2 There is credible information that an individual is linked with an organization known to target U.S. interests. The actual target may be unknown but indicated to be a commercial facility frequented by U.S. citizens abroad. Intelligence identifies an operational or pre-operational capability of this individual whose cell is planning a nearterm attack on a target (e.g., a plot to kill U.S. nationals residing in a foreign hotel or frequenting a foreign nightclub); or, 4.9.3 There is credible information that an individual is linked with an organization known to target foreign governments. The actual target may be unknown but indicated to be a foreign government facility such as an embassy, consulate, mission or military installation. Intelligence identifies an operational or pre-operational capability of this individual whose cell is planning a near-term attack on a target (e.g., a plot to bomb the British Parliament or the March 11 , 2004, Madrid bombing). 4.10 One-Time Waiver Policy. 4.10.1 TSA regulations prohibit U.S. flagged air carriers and foreign flagged air carriers from transporting individuals, who pose the level of threat required for No Fly status, on regulated commercial flights, including all flights operated by U.S. air carriers regardless of the location, and flights operated by foreign air carriers to, from , or over the United States. This prohibition applies regardless of the individual's status as a U.S. PERSON. 4.10.2 When necessary, the U.S. Government may authorize and grant a One Time Waiver (OTW) to an air carrier permitting the carrier to transport an individual on a specified itinerary under controlled conditions. OTWs are coordinated with DRS (including CBP and TSA), FBI, DOS and DOJ as appropriate, prior to being authorized by TSC. Once authorized by TSC, TSA will review the conditions of transport and may grant the waiver, permitting the air carrier to transport the individual. If the itinerary changes, or the conditions of transport of the individual change, TSA will deny boarding to the individual until such time as satisfactory conditions are present. 4.10.3 u.s. PERSONS Encountered Overseas. 4.10.3.1 While placement on the No Fly List does not legally bar a U.S . PERSON from UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 53 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION returning to the United States, the U.S. Government has adopted a policy to review all cases in which a U.S. PERSON on the No Fly List is denied boarding on a commercial flight bound for the United States to determine whether an OTW may be appropriate. TSC will initiate this assessment immediately, and may approve an OTW in advance. TSA will not review or authorize an OTW until such time as an acceptable itinerary is available. 4.10.3.2 In order to facilitate communication with such an individual, the U.S. Government has determined, as a matter of policy, that U.S. Citizens denied boarding on a commercial flight returning to the United States should be referred to the consular section of the nearest U.S. Embassy or Consulate, which will facilitate communication with the individual, including providing the individual with instructions in the event an OTW is authorized. In keeping with the U.S. Government's traditional policy of neither confirming nor denying whether an individual is on the Terrorist Watchlist, the individual is not informed of his or her watchlist status or that he or she would be traveling under a waiver. V. SELECTEE LIST CRITERIA 4.1 I Sclcctee List Criteria. Any person regardless of citizenship, who does not meet the criteria for inclusion on the No Fly List and who: is a member of a foreign or domestic TERRORIST organization75 (including a "foreign TERRORIST organization" designated pursuant to Statute or Executive Order, as described in Paragraph 3.11.2); and , 4.11.1 4.11.2 is associated with "TERRORIST ACTIVITY" (as such term is defined in section 212(a)(3)(B) of the INA [8 U.S.C. 1182(a)(3)(B)]); unless information exists that demonstrates that the application of secondary screening to such person is not necessary, in which case such persons may be excluded from the Selectee List. VI. EXPANDED SELECTEE LIST CRITERIA 4.12 The Expanded Selectee List (ESEL) includes records in the TSDB that contain a full name and full date of birth, regardless of the citizenship of the subject, who do not meet the criteria to be placed on either the No Fly or Selectee Lists, excluding exceptions to the REASONABLE SUSPICION standard. VII. ACTIONS BASED UPON POSITIVE MATCHES TO THE NO FLY, SELECTEE, OR EXPANDED SELECTEE LISTS 75 Members of a defunct terrorist group are included in this criterion if the person was a member of the group when it participated in TERRORIST ACTIVITY. UNCLASSIFIED//FOR OFFICIAL USE ONL ¥/SENSITIVE SECURITY INFORMATION Page J 54 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 4.13 The actions resulting from inclusion on the No Fly, Selectee, or Expanded Selectee List are generally as follows: 4.13 .1 Individuals that are POSITIVE MATCHES to the No Fly List are prohibited from boarding an aircraft; 4.13.2 Individuals that are POSITIVE MATCHES to the Selectee List undergo enhanced screening prior to boarding an aircraft; 4.13.3 Individuals that are POSITIVE MATCHES to the Expanded Selectee List undergo enhanced screening prior to boarding an aircraft. 4.14 Selectee, Expanded Selectee, and random screening all result in the same operational response of receiving enhanced screening by Transportation Security Officers prior to boarding an aircraft. TSA will notify the TSC of all No Fly, Selectee, and Expanded Selectee ENCOUNTERS. VIII. IMPLEMENTATION GUIDELINES 4.J 5 General Guidelines. The watchlisting community has developed six general guidelines regarding the No Fly and Selectee Lists that should be reemphasized in order to effectively implement the No Fly List and Selectee List criteria. The six general guidelines are: 4.15.1 When evaluating the significance, relevance and validity of a threat, careful consideration should be given to the extent to which the threat is current, specific and credible. 4.15 .2 The Selectee List is not a default position for those who do not qua Iify for inclusion on the No Fly List and has distinct elements that must be met before an individual may be included. 4.15.3 The purpose of the No Fly List is to protect against acts of TERRORISM; inclusion on the No Fly List has consequences that are operational, legal, economic, and diplomatic. 4.15.4 Except for expedited nominations made pursuant to Paragraph 1.58 of the Watchlisting Guidance, the decision to include a person on the No Fly List or Selectee List must include substantive DEROGATORY INFORMATlON that satisfies the aforementioned criteria and thus justifies inclusion on either list. In cases where nominations contain no substantive DEROGATORY INFORMATION, or contain insufficient substantive DEROGATORY INFORMATION, the individual will not be included on either the No Fly List or Selectee List. 4. J5.5 In accordance with determinations made pursuant to Paragraph 1.59 of the Watch listing Guidance, the White House may direct the TSC to place categories of individuals on the No Fly List or the Selectee List on a temporary basis based on current UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 55 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION and credible intelligence information or a particular threat stream that indicates a certain . category of individuals may conduct an act of domestic or international TERRORISM. 4.15.6 Under exigent operational circumstances, when DEROGATORY INFORMATION may not be widely disseminated or stored in TIDE, individual watchlist status determinations can be made by the Director of the TSC, in accordance with the relevant criteria 76 contained in the Watchlisting Guidance. Coordination should occur with relevant NOMINATING AGENCIES and SCREENERS. 4.16 Totality of the Information. The foregoing guidance is neither intended to be determinative nor intended to serve as a checklist. Rather, it is intended to guide the watchlisting community in assessing whether the established criteria are satisfied for a specific record, based on the totality of available information, a current threat stream, and/or the current threat environment. SPECIAL SITUATIONS 77 lX. 4.17 Requirement for Full Names and Complete Dates of Birth. Generally, TERRORIST identities nominated to either the No Fly or the Selectee List must have both a full name and a complete date of birth. Identities without both will usually not be included on either list. Dates of birth shall not be fabricated. 78 4.17 .1 There is, however, a narrow exception to the requirement for full names and complete dates of birth for individuals from non-Visa Waiver Program countries for international TERRORIST nominations. If a non-Visa Waiver Program country 79 has issued a travel document with only a year of birth, or a verified government-issued identification document with only a year of birth, then it is permissible to use only that year of birth. The NOMINATING AGENCY, however, should, whenever possible, specify the type of document containing the year of birth, and the passport number (if the document is a passport). Otherwise, a year of birth alone will not be accepted for nominations to the No Fly or Selectee Lists. The NOMINATING AGENCY has a continuing obligation to attempt to determine the complete date of birth. 4.18 Expedited Waiver of "Full Date of Birth" Requirement for No Fly or Selectee Nominations. When necessitated by exigent circumstances, a NOMINATOR may nominate an individual or individuals to the No Fly or Selectee List with only a partial date of birth, but for whom there is additional identifying information. This provision is intended to enable nominations based on current and credible intelligence information or a particular threat 76 Determinations made under this section apply to the No Fly, Selectee and Expanded Selectee List criteria. See Paragraph 1.59 for a complete discussion of expedited nomination procedures for temporary, threat-based categories. 78 The dates of birth of January I (01/01/xxxx), July 1 (07/01/xxxx), November 11 (11/11/xxxx), and December 31 ( 12/3 1/xxxx) are examples of dates that may be fabricated and as such, should receive additional scrutiny at all stages of the reporting, nomination, and watchlisting process. 79 Visa Waiver Program countries include a complete date of birth in their passports. 11 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 56 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION stream that indicates the subject(s) may be used to conduct an act of domestic or international terrorism as defined in 18 U.S.C. 2331 (1 ), or as a Federal crime of terrorism as defined in 18 U.S.C. 2332b(g)(5). The goal of this provision is to fashion a watch listing response that is appropriate to the nature, specificity, and severity of the threat. To achieve this goal, in addition to the credibility of the threat intelligence, due consideration should be given to: 4.18.1 The harm to public safety posed by the threat; 4.18.2 The clarity and specificity of the information giving rise to the threat as to time, place, method, and identity of the suspected perpetrator(s); 4.18.3 The anticipated impact on international and domestic travel, civil liberties, and foreign relations; and, 4.18.4 The best available screening tools, other than the No Fly or Selectee Lists, given the type and specificity of identifiers and travel data. 4.19 This waiver should be utilized in limited circumstances when extreme DEROGATORY INFORMATION has been identified demonstrating the threat. The waiver should be valid as long as the threat remains. X. NOMINATIONS THAT ARE INELIGIBLE/NOT SUITABLE FOR EITHER THE NO FLY OR THE SELECTEE LIST 86 4.20 Nominations based on exceptions to the minimum substantive derogatory criteria contained in Paragraph 3.14, including immediate family members of TERRORISTS (i.e ., spouses or children of a KNOWN or SUSPECTED TERRORTST) 81 are ineligible/not suitable for inclusion on either the No Fly or Selectee List,absent independent DEROGATORY INFORMATION; 4.21 Subjects of lost or stolen passports or travel documents are ineligible/not suitable for inclusion on either the No Fly or Selectee List, absent independent DEROGATORY INFORMATION ; 4.22 Deceased individuals are ineligible for inclusion on either the No Fly or Selectee List unless they meet the exceptions set forth in Paragraph 3 .17, Identities of Deceased Individuals. 80 This section can be overridden in the event of an expedited, threat-based categorical nomination procedures, pursuant to Paragraph 1.59. 81 See INA § 212(a)(3XB)(i)(lX)[8 U.S.C. 1182(a)(3)(B)(i)(IX)). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Pagel57 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION CHAPTER 5: ENCOUNTER MANAGEMENT AND ANALYSIS I. INTRODUCTION AND PURPOSE 5.1 This guidance addresses the collection, processing, and analysis of TERRORISM lNFORMATION collected by the SCREEN ERS during an ENCOUNTER with a watch listed subject. As described below, all information gathered during an ENCOUNTER with a KNOWN or SUSPECTED 82 TERRORlST is referred to as an ENCOUNTER PACKAG E. This guidance does not create any new authorities for the collection of any information during ENCOUNTERS with KNOWN or SUSPECTED TERRORI STS. Rather, it identifies the types of information that a Department or Agency should consider collecting during an ENCOUNTER with a KNOWN or SUSPECTED TERRORIST if it possesses the authority to collect such information, and should share with the interagency community consistent with their legal authorities and executive policy. 83 5 .2 Definitions. 5.2.1 ENCOUNTER. An ENCOUNTER is defined as an event in which an individual is identified during a screening process to be a " POSITIVE MATCH," " POTENT IAL MATCH," or "INCONCLUSIVE MATCH," to an individual who has been designated in the TSDB as a KNOWN or SUSPECTED TERRORIST. An ENCOUNTER can be a face-to-face meeting with a KNOW N or SUSPECTED TERRORIST, electronic or a paper-based ENCOUNTER (e.g. , the KNOWN or SUSPECTED TERRORIST has submitted an application for a benefit liked a visa, Electronic System for Travel Authorization (ESTA) application, or information is provided to the United States by a foreign government, aircraft operator, or other private entity). Chapter 5 is only concerned with POSITIVE MATCHES, which occur when the TSC determines that information about a subject encountered by a SCREENER matches a TSDB record. 5.2.2 in this chapter includes purely domestic terrorism as defined in the TSC MOU and incorporates the definition found in in section 1016 of the IRTPA (6 U.S.C 485), as amended. The term " TERRORISM INFORMATION" means - TERRORISM INFORMATION . TE RRORISM INFORMATION 5.2.2.1 all information, whether collected, produced, or distributed by intelligence, law enforcement, military, homeland security, or other activities relating t 5.2.2.1.1 the existence, organization, capabilities, plans, intentions, vulnerabilities, means of finance or material support, or activities of foreign or international terrorist groups or individuals, or of domestic groups or 82 Sharing infonnation fo r reasons not related to KNOWN or SUS PECTED TERRORIST categories should be limited to updating biographi c identifiers, and the sharing of relevant information that may assist in making deci sions re lated to a change in a person' s status in the TSDB and/or TE RROR1SM INFORMATION . 83 Obligations include those imposed by TRTPA section 102 1 or by interagency agreement (e.g., the Information Sharing MOU (Appendix 5), the TSC MOU (Appendix 3) and Addendum B to the TSC MOU (Appendix 4)). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 158 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION individuals involved in transnational TERRORISM ; threats posed by such groups or individuals to the United States, U.S. PERSONS, or U.S. interests, or to those of other nations; 5.2.2.1.2 5.2.2.1.3 communications of or by such groups or individuals; or, 5.2.2.1.4 groups or individuals reasonably believed to be assisting or associated with such groups or individuals; and 5.2.2.2 includes weapons of mass destruction information. 5 .2.2.2.1 Weapons of Mass Destruction Information. Tnformation that could reasonably be expected to assist in the development, proliferation, or use of a weapon of mass destruction (including a chemical, biological, radiological, or nuclear weapon) that could be used by a TERRORIST or a terrorist organization against the United States, including information about the location of any stockpile of nuclear materials that could be exploited for use in such a weapon that could be used by a TERRORIST or a terrorist organization against the United States. II. PROCESSING TERRORISM INFORMATION FROM ENCOUNTERS WITH POSITIVELY IDENTIFIED KNOWN OR SUSPECTED TERRORISTS 5.3 This section describes the major types of ENCOUNTERS by various Departments and Agencies. ENCOUNTER PACKAGES obtained from a KNOWN or SUSPECTED TERRORIST ENCOUNTER will be processed as follows: 5.4 Department of Homeland Security ENCOUNTERS. DHS has more ENCOUNTERS with KNOWN or SUSPECTED TERRORI STS than any other U.S. Government component. The descriptions below provide information for the majority of DHS ENCOUNTERS, although it is not an exhaustive list of ENCOUNTER opportunities or the types of TERRORISM lNFORMATlON available for collection. When lawful and available, both biographic and biometric information will be collected as part of the ENCOUNTER PACKAGE. 5.4.1 U.S. Customs and Border Protection. CBP ENCOUNTERS occur at ports of entry (POE), between POEs, or at the last point of departure to the United States at foreign airports through CBP programs like Pre-Clearance and the Immigration Advisory Program (IAP). Information available for collection from these ENCOUNTERS may include, but is not limited to, pocket litter, travel information, identification documents, travel companions, legal documents, and other information gathered during interviews and the examination process. CBP receives international travel reservation information of KNOWN or SUSPECTED TERROlUSTS for commercial air travel to and from the United States (which may include travel companion information) and international private and UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 59 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION commercial flight manifests, as well as, commercial vessel manifest for travel to and from the United States. With the exception of passenger information required by law to be transmitted to OHS prior to a passenger's arrival, most information is generally collected by CBP when the person is interviewed or apprehended. The National Targeting Center - Passenger (NTC-P) and NTC-Cargo (NTC-C) are CBP entities responsible for communicating with the TSC regarding ENCOUNTERS with KNOWN or 84 SUSPECTED TERRORJSTS, to include providing relevant ENCOUNTER information. NTCp and NTC-C also provide a copy of the examination results to the TSOU for dissemination to the appropriate investigating Agencies. 5.4.2 Transportation Security Administration. TSA generally encounters KNOWN or SUSPECTED TERRORJSTS through screening commercial aircraft passengers against subsets of the TSDB and during the application process for a credential or benefit in the transportation or critical infrastructure environment (e.g., Transportation Worker Identification Credential (TWIC)). When an airline encounters subjects who are possible matches to the No Fly or Selectee List, the air carriers are required to supply the passenger' s name and one piece of identifying data (in the form of a government-issued photo identification that contains a date of birth) to the TSA' s Office oflntelligence and Analysis (OIA). TSA OJA submits that information, along with information regarding the carrier, flight number, time of departure, and destination to the TSC. 5.4.2.1 Absent an arrest warrant, or unless probable cause arises during the are reminded that placement on the No Fly or Selectee List is not a legal basis to detain a KNOWN or SUSPECTED TERRORIST. To the extent legal authority exists to question a KNOWN or SUSPECTED TERRORIST, encounters with No Fly subjects at the airport may provide an additional opportunity to lawfully obtain ENCOUNTER PACKAGE information. For No Fly subjects who have made a domestic reservation, DHS will notify TSC in advance as well as when the No Fly subject presents at the airport ticket counter. TSC will then notify the TSOU who will notify both the FBI case agent and the airport liaison agent to coordinate the appropriate operational response. ENCOUNTE R, SCREENERS 5.4.2.2 For KNOWN or SUSPECTED TERRORJST ENCOUNTERS as a result of an individual applying for a TSA benefit or credential, ENCOUNTER PACKAGE information can include any supporting documents or information collected as a part of the application process. The ENCOUNTER, and any corresponding information, is communicated to the TSC and other Government Agencies, as appropriate through TSA OIA. 5.4.3 United States Citizenship and Immigration Services. U.S. Citizenship and Immigration Services (USC[S) interact with millions of individuals every year and 84 CBP may al so encounter such individuals in the course of processing an application and/or conducting an interview of an applicant for a trusted traveler program (e.g., NEXUS , Free and Secure Trade (FAST), Global Entry, SENTR[, etc.). UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page J 60 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION or SUSPECTED TERRORISTS who file petitions or applications for immigration benefits internationally and domestically.85 The USCIS official contacts the TSC to report an ENCOUNTER with a KNOWN or SUSPECTED TERRORIST. Before making a decision on the immigration application or benefit, USCfS contacts the ORIGINATOR/NOMINATOR to obtain additional information that may help determine whether the individual is eligible or ineligible to receive the immigration benefit. In such cases, USCIS seeks further information from the record owner or case agent and may seek de-classification of information relating to the application. fn addition, USCIS contacts the ORIGINATOR/NOMINATOR to discuss whether the USCIS decision to grant or deny the application or benefit would interrupt or negatively affect any ongoing investigation. ENCOUNTERS KNOWN 5.4.3.l USCIS maintains a presence at law enforcement and intelligence Agency entities to further information sharing regarding KNOWN or SUSPECTED TERRORISTS. USCIS maintains information, including the subject's Alien File (AFile) and other records. The type of information that may be contained in USCIS files, including the A-File, could be biometric data (fingerprints and photographs); identity documents; information relating to the application; addresses, as well as family and work history information; immigration benefit application information ; and records of previous ENCOUNTERS that OHS has had with the subject. Other SC REENERS - as well as other appropriate organizations who are considering nominating a potential KNOWN or SUSPECTED TERRORIST or who have ENCOIB\TERS with a person who is a POSITJVE MATCH to a KNOWN or SUSPECTED TERRORIST- are advised that they can request, on a case-by-case basis, a copy of the KNOWN or SUSPECTED TERRORJST'S A-File from USCIS if the KNOWN or SUSPECTED 86 TERRORIST has applied for immigration or citizenship benefits. 5.4.4 U.S. Immigration and Customs Enforcement. Immigrations and Customs Enforcement (ICE) is the principal investigative arm of OHS. ICE is also the federal law enforcement organization responsible for immigration and customs-related investigations and detention within the interior and at the borders of the United States. ICE frequently ENCOUNTERS potential KNOWN or SUSPECTED TERRORISTS during enforcement activities under its purview. Such ENCOUNTERS are documented within ICE Enforcement and Removal Operations (ERO) via the Known Suspected Terrorist Encounter Protocol and reported to the TSC and ICE's Homeland Security lnvestigations (HSI). ICE HSI Special Agents frequently encounter KNOWN or SUSPECTED TERRORISTS internationally, domestically, at U.S. POEs, and when KNOWN or SUSPECTED TERRORISTS are the subjects of an ICE investigation. These ENCOUNTERS are 85 For example, a U.S. PERSON who is a KNOWN or SUSPECTED TERRORIST may file a petition for a foreign national or a U.S. PERSON who is not a KNOWN or SUSPECTED TERRORJST may file a petition for a foreign national who is a KNOWN or SUSPECTED TERRORIST. 86 Because USCIS is the custodian of information acquired through the immigration process relating to an individual and because the A-File is not routinely attached to the TSDB or TIDE, a specific request to USCIS is necessary in order to obtain information from the A-File. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 161 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION documented by HSI Special Agents in Reports of Investigation (ROI). All RO Is documenting ENCOUNTERS/interviews with a KNOWN or SUSPECTED TERRORIST are shared with the JC. 5.4.4.1 In addition, under section 428 of the Homeland Security Act, the Secretary of Homeland Security has the authority to refuse visas in accordance with the law and to assign employees of DHS to diplomatic and consular posts to review visa applications and conduct investigations. 87 ICE, through the Visa Security Program, exercises this authority. Reviews of visa applications and interviews with applicants can result in the encounter of KNOWN or SUSPECTED TERRORISTS, facilitators, and associates as well as reveal previously unknown information relating to KNOWN or SUSPECTED TERRORISTS. HSI personnel assigned to the Visa Security Program, and to U.S. Embassies and Consulates abroad, work closely with their DOS counterparts to identify KNOWN or SUSPECTED TERRORISTS and report findings through established processes. Finally, ICE may encounter KNOWN or SUSPECTED TERRORISTS awaiting immigration hearings who are housed in service processing/detention centers. These detention facilities can document interactions with the al.icns while they are detained in the facility, as well as document materials found on the individual at the time of processing. For all immigration and enforcement activities, ICE will communicate with the TSC regarding encounters with watchlisted individuals, and will submit relevant ENCOUNTER information to the TSC. 5.4.5 United States Coast Guard. The U.S. Coast Guard's Coastwatch branch screens crew and passenger information on vessel manifests, which are required by regulation to be transmitted to the National Vessel Movement Center (NVMC) prior to a vessel's arrival in a U.S. port. Coastwatch communicates with the NTC-P and TSC regarding any KNOWN or SUSPECTED TERRORIST ENCOUNTERS during this process. The Coast Guard physically encounters few KNOWN or SUSPECTED TERRORISTS, and such ENCOUNTERS could occur from random and regular inspections of vessels and port facilities, ship boardings, investigations, or Coast Guard licensing activities. The type of information available for collection is dependent on the type of ENCOUNTER. The ENCOUNTER, and any corresponding information, is communicated to the TSC through Coast Guard Office of Intelligence and Criminal Investigations. Based on the encountering situation, intelligence reporting will be written to provide situational awareness to the JC. 5.4.6 United States Secret Service. Although United States Secret Service (USSS) does not encounter many KNOWN or SUSPECTED TERRORISTS, such ENCOUNTERS usually involve KNOWN or SUSPECTED TERRORISTS with a domestic nexus to TERRORISM. Such encounters can be the result of investigations or for event screening (e.g. , National Security Special Events, political events, large scale sporting events). These 87 Consistent with section 428 of the Homeland Security Act and the Memorandum of Understanding between the Secretaries of State and Homeland Security Concerning Implementation of Section 428 of the Homeland Security Act of 2002, the Secretary of Homeland Security may direct a consular officer to refuse or revoke a visa. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page j 62 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION ENCOUNTERS will be coordinated with the FBI, who will FBI KNOWN or SUSPECTED TERRORIST ENCOUNTERS. handle them as they do alJ other 5.4.7 Department of Homeland Security Intelligence & Analysis. OHS I&A provides end products and analytical reports, which are generally available to the NCTC and the broader counterterrorism analytic community, including fusion centers. DHS I&A works closely with OHS components to ensure non-traditional streams of information are fused with traditional sources of information from other members of the TC to give a complete picture of potential threats to the nation. OHS I&A "connects the dots" for intelligence reporting and ENCOUNTERS of the OHS components, and as such, has limited opportunity for ENCOUNTERS with KNOWN or SUSPECTED TERRORISTS . 5.5 Department of State ENCOUNTERS. For DOS MATCH ENCOUNTERS with a person who is a POSITTVE to a KNOWN or SUSPECTED TERRORIST, the DOS unit at the TSC will do the following: 5.5.1 Visa Applications. DOS/TSC will upload the electronic visa application from the CCD to the individual ' s EMA record. DOS/TSC will coordinate with the overseas posts to scan in CCD all other available DOS documents associated with the individual. DOS information about whether a visa is issued is currently available in individual case records in the CCD; DOS is currently investigating upgrades to the CCD's report function that will make the visa decision data more easily accessible to TSC and other users . 5.5 .2 Visa Revocations. DOS/TSC will upload the electronic visa application from the CCD to the individual ' s EMA record. 5.5.3 Passports. After encounters with KNOWN or SUSPECTED TERRORISTS possessing passports issued by the United States, the TSOC will upload the Passport Information Electronic Records System (PIERS) application forms from the CCD to the individual's EMA record. DOS/TSC will coordinate with the overseas posts to scan in CCD all other available DOS documents associated with the individual. 5.6 United States Agency for International Development ENCOUNTERS. United States Agency for International Development (USAID) works in agriculture, democracy and governance, economic growth, the environment, education, health, global partnerships, and humanitarian assistance in more than l 00 countries. When USAID receives an application seeking financial assistance, prior to granting, these applications are subject to vetting by USATD intelligence analysts at the TSC. If USAIDffSC finds that an application relates to a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST in the TSDB, USAID/TSC will provide any TERRORISM INFORMATION concerning the application and follow standard TSC procedures for processing TERRORISM INFORMATION , to include logging the ENCOUNTER in EMA. 5.7 Foreign Partner ENCOUNTERS. After each ENCOUNTER by a foreign partner, DOS/TSC will ask the respective country for the subject's photo, additional biographic data and any UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page I 63 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION TERRORISM INFORMATION on the ENCOUNTER Information List gathered during the ENCOUNTER. Provision of any material collected by the foreign partner depends on the arrangement with, and legal authorities of, the particular foreign partner involved. Therefore, gathering and sharing this TERRORISM INFORMATION will be done on a case-by-case, countryby-country basis. 5.8 Federal Bureau of Investigation/Law Enforcement be subdivided into three categories: ENCOUNTERS. These ENCOUNTERS can 5.8.1 Name-Based Queries. Name-based transaction queries by law enforcement personnel (e .g., traffic stops) made to the FBI's National Crime Information Center at the Criminal Justice Jnformation Services (CJJS) Division that match a name in the KSTF (a sub-file ofNCIC) are deemed to be POTENTIAL MATCHES. They are routed electronically to TSC for confirmation and subsequent processing as an ENCOUNTER. 5.8.2 Fingerprint-Based Queries. Fingerprint-based queries submitted for criminal identification purposes (e.g., an arrest/booking) or for civil identification purposes (e.g., an employment background check) are made to the Integrated Automatic Fingerprint Identification System (IAFIS). For POSITIVE MATCHES to records flagged as KNOWN or SUSPECTED TERRORIST records, the CJIS Division's Special Identities Unit notifies the TSC and the FBI case agent (or the Agency that identified the subject as a possible TERRORJST). In similar fashion, CJIS Division's Global Initiatives Unit coordinates positive fingerprint hits from its foreign submissions with the Legal Attache. lt should be noted that IA FIS and NCIC are separate systems that are not fully synchronized at the present time. 5.8.3 National Instant Criminal Background Check System. All background checks resulting from attempts to buy firearms or to obtain explosive permits submitted to the National Instant Criminal Background Check System (NICS) at CJIS are run against the KSTF. The TSC is immediately notified of all KSTF "hits." NICS consults with TSC to confirm the POSITIVE MATCH ES and the FBI case agent to determine whether there is available information about the prospective purchaser to disqualify him or her from possessing a firearm or explosive as a matter of law. Regardless of whether the purchase is denied or permitted to proceed, all available information is obtained and provided to the TSC and, in turn, CTD, as TERRORISM INFORMATION and processed as an ENCOUNTER. 5.9 Department of Defense ENCOUNTERS. The Department of Defense (DoD) has force protection, operational capture/apprehend, and intelligence responsibilities and on occasion encounters KNOWN or SUSPECTED TERRORISTS. To the extent DoD knowingly encounters a KNOWN or SUSPECTED TERRORlST, DoD will repo1t the ENCOUNTER in intelligence channels or to the FBI in cases described in the MOU between the FBI and DoD Governing Information Sharing, Operational Coordination and Investigative Responsibilities signed August 2, 2011 where the FBI is the lead. In cases where the FBI is not the lead for the ENCOUNTE R, the UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 164 UNCLASSIFIED//FOR OFFICIAL U E ONLY/SENSITIVE SECURITY INFORMATION Defense Intelligence Agency (DIA) will be responsible for providing extracted information from the ENCOUNTER to NCTC via standard DIA national T ·RRORIST watchlisting procedures, which utilize community accepted standards. DoD law enforcement ENCOUNTER will be handled in accordance with established law enforcement standards that provide notification to the FBl. 5.10 All other Departments or Agencies. Any other Department or Agency that has TERRORISM INFORMATION from an ENCOUNTER will contact the TSC/TSOC at 866to arrange a mutually acceptable transmission method. III. CATEGORIES OF TERRORISM INFORMATION FROM ENCOUNTERS WITH POSITIVELY IDENTIFIED KNOWN OR SUSPECTED TERRORISTS OF POTENTIAL INTEREST 5. 11 ENCOUNTER Information List. The fo llowing ENCOUNTER Information List identifies categories ofT RRORI SM INFORMATION from EN OUNT ·RS with positively identified KNOWN or SUSPECTED TERRORIST that are of potential interest to NOMINATOR , other counterterrori sm ana lysts, or the watch listing community. The items identified are not intended to be an exclusive or exhaustive list of what constitutes TERRORISM INFORMATION. 5.11.1 E OUNT R information identified for collection in Addendum B to the TSC MOU 88 when there is a PO ITIVE MATCI I to a KNOWN or u PECTED TERROR IST: 1. 2. 3. 4. 5. Photographs Fingerprints Pocket litter Written data Reports of TERRORISM INFORMATION 5.11.2 Additional items of potential interest when lawfully collected during an ENCOUNTER with a KNOWN or SPE TED TERRORIST: I. Contemporaneous reports including the impressions or observations recorded by an official involved in the ENCOUNTER: a) b) c) d) e) Reason/circumstances of ENCOUNTER ICE Intel Reports FB I Reports ofinvestigations CBP Incident Reports CBP Secondary Exam Report f) USCIS app lications or petitions g) Non-immigrant Vi sa (NIV) Applications (including CCD notes) 88 ee Appendix 3, TSC MOU. U CLASSIFIED//FOR OFFICIAL USE O LY/SENSITIVE SECURITY INFORMATION Page j 65 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION h) State, Local, Tribal, Territorial Police Report i) TSA OTA No Fly and Selectee Reports j) TSA OlA ENCOUNTER Reports (Vetting Match Reports) on transportation workers and other popu lations vetted by TSA against the TSDB k) Spot Reports I) Suspicious Activity Reports m) Impounded vehicle inventory n) Any inventory record o) Any pictures, video or recording of or from the actual ENCOUNTER p) Biometric or biographic identifiers of traveling associates 2. Surveillance-related documents: a) Maps b) Pictures c) Visitor or site information d) Plans or diagrams (e.g. , architectural drawings, blueprints, schemas) 3. Context regarding areas of potential interest or possible targets of KNOWN or SUSPECTED TERRORIST interest: a) Information regarding any high profile events taking place in geographic area of ENCOUNTER b) Any critical infrastructure sites near the geographic area of ENCOUNTER c) Unique characteristics or facts about your domain/area of responsibility/geographic area of ENCOUNTER d) Event tickets (e.g., sporting events, concerts, designated National Security Special events) e) Building access passes, electronic cards, fobs, keys 4. Mode of transportation used by the person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST, along with identifying information: a) Vehicle information (e.g., Vehicle registration, Vehicle identification number (VIN), Title, Driver's license, Car insurance cards or information) b) Pilot medical license c) Pilot certificates d) Aircraft registration e) Marine registration f) EZ Pass or electronic vehicle payment system 5. Travel-related information: a) Passpo1t exit/entry stamps indicating places of travel b) Any visa application or denial information from other countries UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 166 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION c) d) e) f) g) h) i) j) k) l) m) n) o) p) Travel itineraries Tickets (e.g., plane, train, boat) Hotels (e.g., reservation confirmation, receipts) Rental cars (e.g., reservation confirmation, agreement, receipts) Reservation method (e.g., via travel agency or travel website) PNR data Travel manifests Luggage or baggage tags (e.g., airport check-in tags, identification tags, lost bag bar code tags) Claim checks Storage locker keys Shipping documents and receipts Automated Identification System (AIS) information for maritime shipping Foreign airport security check stickers or labels Conference/seminar materials (e.g., invitation, brochure, schedule) 6. Information about gold and jewelry worn by person at time of ENCOUNTER (e.g., receipts) 7. General items information : a) Business cards b) Phone numbers c) Address books d) Email addresses e) Any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards) f) Pre-paid phone cards g) Insurance cards h) Medical/Health insurance information i) Prescription information (e.g., doctor, pharmacy information) j) Sales receipts k) Any additional biographic or biometric identifiers to enhance identity matching of associates or family members with a person who is a POSITIV E MATCH to a KNOWN or SUSPECTED TERRORIST (as well as associates or family members referenced in interviews or documents carried by a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORlST) I) Copies of identification documents obtained during the ENCOUNTER with a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST (e.g., passports, Seaman's Papers, Airman Certificates, driver's licenses, state identification cards, and similar government identification documents) m) Any computer, uniform resource locator (URL), or Internet protocol (IP) address information n) Calendars/schedulers UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 167 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 8. Licenses, permits, membership cards, and application information: a) Membership cards (including library cards) b) Gun show applications, firearms license, concealed weapons permit, shooting club memberships c) HAZMAT license d) Explosives permit 9. Tools or equipment information: a) Scuba gear b) Multiple cell phones c) Binoculars d) Peroxide e) Ammunition f) Camping fuel tabs g) Any dual use material that could be used for TERRORIST ACTJVITY 10. Financial information: a) Check book/individual or loose checks, including cashier's checks b) Bank account numbers c) Credit cards, especially those issued by U.S. banks and carried by non- U.S. PERSONS d) e) f) g) h) i) j) k) Tax records Business financial records Bank statements Credit card or billing statements Utility bills Anything with an account number Wire transfer information, including receipts from Money Service Businesses Denominations of money being carried (i.e., what country(ies) currency(ies) are they carrying), including, if possible, the serial numbers of currency carried I) Automated teller machine (A TM) receipts m) Ledgers 11. Electronic media/devices observed or copied: a) Cell phone li st and speed dial numbers b) Laptop images c) GPS d) Thumb drives e) Disks f) iPod or MP3 g) PDAs (e.g., Palm Pilots, Trios) h) Kindle or iPad (electronic books) i) Cameras j) Video and/or voice recorders UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 168 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION k) Pagers I) Any electronic storage media IV. 12. E mployment information: a) Pay stubs b) Employment applications c) Want ads d) Employer correspondence e) Access cards, badges 13 . Professional papers/Academic information: a) Resumes b) Academic transcripts 14. Legal document information: a) Birth certificates b) Immigration and naturalization documents c) Marriage licenses d) Divorce decrees e) Adoption papers t) Living Wills g) Last Will and Testament h) Parking tickets i) Speeding tickets j) Property records (deeds) k) Summons I) Criminal documents or civil lawsuit information 15. Miscellaneous item information: a) Long term storage facilities (e.g., access keys, codes) b) Social networking accounts (e.g., Facebook, Twitter, MySpace, LinkedTn, ICQ) c) Titles of books, DVD/CD, brochures being carried and their condition (e.g. , new, dog-eared, annotated, unopened, professional journals) d) Letters, envelopes e) Letters oflntroduction f) Animal information (e.g. , vet or chip information) ENCOUNTER MANAGEMENT ACTIONS 5.12 Handling of ENCOUNTER PACKAGES. This section outlines the processes for handling and sharing ENCOUNTERPACKAGEs by SCREENERS, the TSC and NCTC . 5.13 FBI/Law Enforcement ENCOUNTERS. TSOU coordinates the U.S. Government's response to an ENCOUNTER with a KNOWN or SUSPECTED TERRORIST. All collection of TERRORISM UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 169 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION INPORMATION during law enforcement ENCOUNTERS (e.g., traffic violations, investigations, arrests) are coordinated between the NOMINATING AGENCY and the ENCOUNTERING AGENCY via TSOU. 5. J3 .1 For domestic and international ENCOUNTERS with a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST, TSOU will do the following: After receiving notification of an ENCOUNTER from the TSC, TSOU will disseminate and coordinate information to FBI operational entities and federal, state, and local law enforcement Agencies. TSOU simultaneously coordinates with the appropriate FBI Field Division(s) and Case Agent(s); Joint Terrorist Task Forces (JTTFs); Airport Liaison Agents and Attaches (ALAs); ;Legal Attaches (LEGATs); U.S. Embassies and/or other appropriate law enforcement officials, including ICE and CBP (specifically, NTC-P and NTC-C as appropriate); and appropriate members of the IC. For outbound ENCOUNTERS, or ENCOUNTERS involving subjects who have certain DEROGATORY INFORMATION, TSOU contacts (via phone and electronic notification) the appropriate counterterrorism element(s). Especially sensitive ENCOUNTERS often require coordination and situational updates with the White House, Northern Command (NORTHCOM), and FBI's Counterterrorism-Watch. 5.14 TSC Actions. TSC will update existing KNOWN or SUSPECTED TERRORIST records with new TERR.ORI.ST IDENTIFIERS and TERRORISM INFORMATION and will provide the broader counterterrorism analytic community with as much new information as possible stemming from an ENCOUNTER with a KNOWN or SUSPECTED TERRORIST. TSC's primary methods for sharing TERRORISM INFORMATION with the broader counterterrorism analytic community will be through its EMA application and the use of Intelligence Information Repo1is (llRs), as described further in Section V, infra. TSC will also coordinate with Fusion Centers on law enforcement and other ENCOUNTERS impacting their Area of Responsibility. This coordination will include a request for record enhancing information from the Fusion Center, which if received, will be added to the subject's KNOWN or SUSPECTED TERRORIST record. 5.14. l Any new TERRORISM INFORMATION recorded in, or attached to an EMA record by TSC will be provided to NCTC via an automated ingest process. 89 Such daily ingests of EMA records update NCTC's TIDE to reflect the fact of the ENCOUNTER, any new identifiers used to confirm the KNOWN or SUSPECTED TERRORIST POSlTIYEMATCHES, or those identified in an TIR. Once TIDE has been updated, an automated ingest from TIDE to TSDB is used to update the various TSDB subsets (e.g., No Fly or Selectee Lists). At this point, the process is complete and the watchlisting, screening and law 89 An "automated ingest" is one where the contents ofTSC's EMA records are incorporated into NCTC's TIDE database via a system-to-system transfer of in formation that identifies new or changed information. This process allows NCTC to spot KNOWN or SUSPECTED TERRORIST records that have been amended or updated. This process also accommodates the transfer of attached ENCOUNTER PACKAGES received from SCREENERS. In those instances, the ENCOUNTER PACKAGES appear as attachments to the KNOWN or SUSPECTEDTERRORlST record. ENCOUNTER PACKAGE attachments must be moved to another system in order to give the broader counterterrorism community access to the TERRORISM INFORMATION. That process is described in Section V, infra. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page J 70 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION enforcement communities have the most current and thorough TERRORISM INFORMATION available about a KNOWN or SUSPECTED TERRORIST. Most- but not all-of that TERRORJSM INFORMATION is available in a structured format as part of the KNOWN or SUSPECTED TERRORIST record (e .g., discrete elements such as a date of birth, country of origin). The unstructured TERRORISM INFORMATION , while also in digitized format (e.g. , a computer disk, a scanned image of a business card, an encountering officer's report), is handled by NCTC. 5. l 5 NCTC Actions. NCTC will post to TIDE Online any digitized ENCOUNTER PACKAGE it receives from TSC or directly from a SCREENER. ENCOUNTER PACKAG ES can be found under the subject's main page. V. ROLES AND RESPONSIBILITIES FOR UPDATING EXISTING KNOWN OR SUSPECTED TERRORIST RECORDS AND NOMINATING NEW KNOWN OR SUSPECTED TERRORISTS BASED ON INFORMATION FROM POSITIVE ENCOUNTERS 5.16 This section describes the roles and responsibilities of the watchlisting, screening, and counterterrorism communities for exploitation and analysis of the TERRORISM INFORMATION lawfully collected and shared when there is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST. In this context the following definitions apply: 5.16.1 " INITIAL REVfEW" means a quick review of the ENCOUNTER PACKAGE to identify obvious, new TERROR[ST IDENTIFIERS about the KNOWN or SUSPECTED TERRORIST. 5.16.2 " ADVANCED ANALYSIS" means a thorough review of the TERRORISM INFORMATION contained in an ENCOUNTER PACKAGE obtained as a result of the ENCOUNTER with the KNOWN or SUSPECTED TERRORIST. ADVANCED ANALYSIS includes the adding of TERRORIST IDENTIFIERS to existing KNOWN or SUSPECTED TERRORIST records and identifying new KNOWN or SUSPECTED TERRORISTS who should be nominated through the existing nomination process. In this context, ADVANCED ANALYSIS is being done on a tactical matter related to the specific KNOWN or SUSPECTED TERRORTST to identify information useful in "connecting the dots" between and among that KNOWN or SUSPECTED TERRORIST and other KNOWN or SUSPECTED TERRORISTS or potential KNOWN or SUSPECTED TERRORISTS. It is also when the need for foreign language translation services will be identified. 5.16.3 means further exploitation of a targeted set of ENCOUNTER and ADVANCED ANALYSIS products to assist in identifying TERRORIST trends and changes to methods, tactics, and practices. ENCOUNTERS for TARGETED ANALYS IS are selected using contemporaneous threat criteria and research in additional repositories. Contemporaneous threat criteria includes association with a priority terrorist group (e.g., NIPF Tier I or II); ENCOUNTERS with KNOWN or SUSPECTED "TARGETED ANALYSIS" PACKAGES UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 171 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION designated as No Fly or associated with violent activity; or at the request of any Department or Agency that identifies a need . TERRORI STS 5.17 Results of INITIAL REVIEW, ADVANCED ANALYSIS, and TARGETED ANALYSIS efforts (collectively, "Exploitation") by Departments or Agencies wiJI be reported to the watchlisting, screening and counterterrorism communities using standard templates when available. 5.17.1 TSC Actions . 5.17.1. l First Stage Review. TSC actions with KNOWN or SUSPECTED TERRORIST occur in two stages. The first stage occurs when the ENCOUNTERING AGENCY and TSC exchange TERRORIST IDENTIFIERS to determine whether the individual is watchlisted (i.e., a POSITIVE MATCH to a TSDB record). TSC records any new TERRORIST IDENTIFIERS provided during this stage in TSC's EMA application. ENCOUNTERS 5.17.1.2 Second Stage Review. The second stage occurs after TSC has confirmed there is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST. For each POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST, the TSC's Office of Intelligence (TSC/O1) will generate an HR for dissemination to the counterterrorism community that provides a summary about the KNOWN or SUSPECTED TERRORIST ENCOUNTER (e.g. , basic facts about the ENCOUNTER such as date, time, and place). If available at the time the initial IIR is prepared, TSC/OI will conduct an INITIAL REVIEW of the ENCOUNTE R PACKAGE and provide a thumbnail summary of the TERRORISM INFORMATION. For example, a summary might highlight the existence of a new KNOWN or SUSPECTED TE RRORIST ("KNOWN or SUSPECTED TERRORIST was traveling with three other associates not previously identified in the car where the explosives were found in a hidden compartment") or the possibility that new TERRORIST IDENTI FIERS are available ("approximately 80 pages carried by the KNOWN or SUSPECTED TERRORIST were converted to electronic documents ranging from the KNOWN or SUSPECTED TERRORIST'S calendar/address book to bank account and credit card numbers"). 5.17.2 National Media Exploitation Center Actions. Much of the TERRORISM generated by ENCOUNTERS from a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST is expected to be in a foreign language that may hinder prompt exploitation. The National Media Exploitation Center (NMEC) has the capability to translate foreign language information and the experience necessary to understand the efforts used to hide their activities. When TSC receives ENCOUNTER PACKAGES with information in a foreign language, or when NCTC receives them directly from an F.NCOUNTERING AGENCY, TSC or NCTC will forward/notify NMEC that it has the action to translate the ENCOUNTER PACKAGE. Once the ENCOUNTER PACKAGE has been translated and returned to TSC and NCTC, the assigned roles and responsibility for exploitation will apply. INFORMATION UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 172 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION FBI Actions. The majority of the FBI's ENCOUNTERS with KNOWN or SUSPECTED occur in the United States. The FBI has ADVANCED ANALYSIS responsibility for ENCOUNTER PACKAGES on KNOWN or SUSPECTED TERRORISTS for whom the FBI has an open investigation, no matter where the individual is encountered. If the FBI does not have an open investigation on a KNOWN or SUSPECTED T ERRORIST encountered in the United States, or if the KNOWN or SUSPECTED TERRORIST is a U.S. PERSON, then TSOU will send a lead directing the appropriate FBI field office to conduct an assessment of the individual and the ENCOUNTER circumstances to determine whether to open a preliminary or full investigation. 90 This assessment includes ADVANCED ANALYSIS packages when provided by ENCOUNTERING AGENCLES. If no investigation is opened, an HR will be sent to the NOMINATING AGENCY and NCTC which will be used to enhance the TIDE record with additional FBI-derived information. 5.17.3 TERRORISTS DHS I&A Actions. DHS l&A has ADVANC ED ANALYSIS responsibility for ENCOUNTER PACKAGES where the KNOWN or SUSPECTED TERRORIST is denied entry, denied ESTA, denied boarding, or is subject to a no board recommendation at a foreign location, or identified through JCE' s visa security processes. 5.17.4 5.17.5 NCTC Actions. On occasion, DOS, USAID, and foreign governments have ENCOUNTERS with KNOWN or SUSPECTED TERRORISTS, usually in the form of a record ENCOUNTER (e.g., the KNOWN or SUSPECTED TERRORIST has submitted an application for a benefit like a visa or grant or information is provided to the United States by a foreign government). NCTC has ADVANCED ANALYSIS responsibility for ENCOUNTER PACKAGES in these instances. 5.17.5 . l For TARGETED ANALYSIS, NCTC offers this capability for a ENCOUNTER PACKAGES based on internal or interagency tasking. select set of Since all ADVANCED ANALYSIS products created by FBI, OHS, orNCTC will be disseminated to the U.S. Government via an HR, these materials are available to any organization seeking to further exploit specific ENCOUNTERS. NCTC will leverage these ADVANCED ANALYSIS products as part of its typical intelligence analytic process to highlight emerging threats, issues or concerns. 5.17.6 A chart depicting the roles and responsibilities by Department or Agency may be found at the end of this Chapter. VI. RESPONSIBILITY TO COORDINATE ANY ACTIONS CONTEMPLATED BASED ON INFORMATION FROM ENCOUNTERS WITH A KNOWN OR SUSPECTED TERRORIST 90 Under governing authorities, the FBI can conduct "assessments" for an authorized purpose, such as obtaining information about a threat to national security, without a particular factual predication. To open an investigation whether a "preliminary" or "full" investigation - there must be a specific factual predication. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 173 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 5.18 Information Sharing MOU Requirements. Departments and Agencies are reminded of their agreement to provide transparency between and among them with regard to their "activities to preempt, prevent, and disrupt TERRORIST attacks against U.S. PERSONS and interests. 91 " As a practical matter, that type of transparency demands, to the greatest extent possible, prior coordination with affected Departments or Agencies before action within a Department or Agency's authorities is taken based on TERRORISM INFORMATION from a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST. For example, FBI, Central Intelligence Agency (CIA) or DOD, as lead counterterrorism Agencies in their respective domains, must be consulted prior to taking any action based on ENCOUNTERS with a person who is a POSITIVE MATCH with KNOWN or SUSPECTED TERRORIST. This guidance is subject to existing policies and coordination procedures when action against or pertaining to the KNOWN or SUSPECTED TERRORIST is contemplated. 5.19 Requests for Withholding of Action. ln certain circumstances, law enforcement or the IC may request that a SCREENER not take action (e.g., not to refuse the visa, to allow individual to enter the United States, to not deny an individual to obtain an immigration benefit or access to the secure area of an airport) although action may be taken under the law. This request, to the extent practicable, shall be in writing, by a senior official, and include a statement of justification and risk mitigation. Departments and Agencies will establish mutually acceptable processes and procedures to implement a detailed plan. VII. EXAMPLES OF TERRORISM INFORMATION TYPICALLY AVAILABLE FROM ENCOUNTERS 5 .20 The following examples of various types of ENCOUNTERS and the type of information typically generated from those ENCOUNTERS is offered to assist Departments and Agencies in understanding what additional or new information may become available as a result of following the guidance provided in this document. 5.20.l Ports of Entry. Types of documents that could be included in the ENCOUNTER typical1y include: 1. Business cards 2. Copies of passport and visa entries PACKAGE 91 See Paragraph 3(b) of the Information Sharing MOU (Appendix 5): "Reciprocity and Transparency. All infonnation collected by any entity relevant to the missions and responsibilities of any other covered entities should be shared, to the greatest extent possible, between and among all covered entities. Likewise, the parties agree that, to the greatest extent possible, there should be transparency between and among the covered entities with regard to their activities to preempt, prevent, and disrupt TERRORIST attacks against U.S. PERSONS and interests. Except as otherwise specified in this Agreement, or mandated by relevant Federal statutes or Presidential Directives, procedures and mechanisms for information sharing, use, and handling shall be interpreted and implemented consistently and reciprocally regardless of the role a particular covered entity plays as a provider or recipient of covered information. In other words, for example, international TERRORTSM TNFORMJ\TION collected by the Border Patrol should be shared by DHS with the IC to the same extent foreign intelligence information on TERRORlSM is shared by the lC with DHS." UNCLASSIFIED//FOROFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 174 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Driver's license Resumes Conference literature Correspondence not in possession of the U.S. Postal Service. Letters of introduction Checks, bank deposit slips , Calendar/schedule Address book Notepad entries Mariner's certificates Telephone data Location and duration of previous travel stops on current or past travel itinerary Law Enforcement ENCOUNTERS. Information collected from law enforcement ENCOUNTERS with a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST can include any information that would be collected when a law enforcement officer speaks with a KNOWN or SUSPECTED TERRORIST. Typically information that 5.20.2 could be included in the ENCOUNTER PACKAGE can include, but is not limited to: 1. Associates 2. Telephone numbers (home, business, ceH, pager, or fax) 3. Other forms of identification 4. Physical descriptors 5. Family members 6. Occupation and work history 7. Travel plans or history 8. Vehicle information Visa Applications. A typical DOS ENCOUNTER PACKAGE with a person who is a to a KNOWN or SUSPECTED TERRORIST will be a visa application for entry to the United States, which identifies basic information about the encountered KNOWN or SUSPECTED TERRORIST and the ENCOUNTER. Types of documents that could be included in the ENCOUNTER PACKAGE typically include: 1. Home and work address 2. Copies of passport and visa entries 3. National Identification Number (if applicable to the country) 4. Phone numbers (home, business, cell, pager, or fax) 5. Sponsorship information (when available, to include individual 's name/Company/Government, address and contact information) 6. Family member names (e.g., spouse, parents, children) 7. Police Certificates (if applicable) 8. Biometrics (Photos and Fingerprint Identification Number (FIN)) 9. Resumes (when applying for business visas) 10. Letters of introduction 5.20.3 POSITIVE MATCH UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 175 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 11. 12. I 3. 14. 15. J 6. 17. Military related documents Education Prior travel Occupation and work history Financial information used to support visa application including bank statements, salary slips/letters, property records Photos Email addresses 5.20.4 Applications or Petitions for Immigration Benefits. USCIS may receive an application from an alien for immigration benefits or petitions. Depending on the completed form, USCIS may have information from the following non-exhaustive categories : I. Residences domestic and foreign 2. Family Members (often extended family) 3. Occupation 4. Bank account information 5. Biometrics 6. Gender 7. Identity documents 8. Travel document information (and 1-94) 9. Civil documents- POB , COC data 10. Employer/Prospective Employer 11. Religious Affiliations 12. Resumes 13. Educational Background 14. Past marriages or divorces I 5. Biographical Information 5.20.5 ENCOUNTERS by HSPD-6 Foreign Partners. On some occasions, and based on the arrangement with and legal authorities of the particular foreign partner involved, an ENCOUNTER PACKAGE may include the KNOWN or SUSPECTED TERRORIST'S visa application to a foreign partner. One such student visa/permit application to a foreign partner could include information provided from the KNOWN or SUSPECTED TERRORIST in the following categories: 1. 2. 3. 4. 5. 6. 7. Name as shown in passport Other names known by or ever known by Name in ethnic script Gender Date of birth Town/city of birth Country of birth UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 176 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 8. 9. l 0. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. VIII. Passpo1t number, country, expiration date Country of citizenship Other citizenships held Residential address and telephone number in home country Local residential address and telephone number (if a lready in country) Name and address for communication about this application Name and address of friends, relatives, or contacts you have in the country (if applicable) All periods of employment, including self-employment (to/from dates, name of employer, location, type of work/occupation/job title) Financial information used to support visa application including bank statements, salary slips/letters, and property records Length of planned stay in country Questions concerning the person's character (e.g., whether the person has ever been convicted, charged, or under investigation for any offense(s) against the law in any country; ever deported, excluded or refused a visa by/removed from any country; and police certificates (as evidence of character) from home country or countries of citizenship and from all countries where the person has lived for five or more years since age 17) Whether the application is for a student visa, a student permit, or a limited purpose visa Whether the application is for a variation of conditions to work Course of study and details of the course(s) enrolled Arrangements for outward travel from host country Name of legal guardian, other names legal guardian is known by, and relationship (e.g., mother, father, legal guardian) Any national identity number or other unique identifier issued by a government Any completed military service (e.g., from/to dates, rank, unit name or number, role) Whether presently subject to military service obligation in any country Any association with any intelligence agency or group, or law enforcement agency Any association with any group or organization that has used or promoted violence to further their aims Any involvement in war crimes, crimes against humanity, and/or human rights abuses Payment method for application fee (e.g., bank check/draft, credit card, or personal check) OBTAINING ENCOUNTER INFORMATION THROUGH TSC'S DAILY ENCOUNTER REPORTS 5.21 In addition to the aforementioned TSC/01 IIRs following an ENCOUNTER with a person who is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST, Agencies can obtain the Daily UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 177 UNCLAS IFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Summary Report (DSR) to assist them in identifying NCOUNTERS of interest to their organizational missions. DSRs will contain as much information as legally permissible. DSRs are available from the following locations: 5.21 . l On the Secret Internet Protocol Router Network (SIPRNET), www.fbi.sgov.gov/, click on the "TS Intel Daily Summary Reports" link on the right side. 5.21.2 On Law Enforcement Online (LEO) via www.leo .gov 5.21.3 On Regional Information Sharing Systems via www.ri ss.net 5.21.4 On HS SLIC (for access contact state or local fusion center) or email: ~ 5.21.5 Two sources on BINet: 5.21.5.1 TSC's homepage at http://home.fbinet.fbi/nsb/t c/Pages/Default.aspx 5.21.5.2 Current Intelligence Report at http://di.tbinet.fbi/ims/ciu/ciro/ UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 178 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Encounter Roles and Responsibilities :i~, -- ~ -, -, ' . •• ~-• •- I ,' ' ·:•' '. • •~r,~, " ,' • !, 1T--::-"" ~>1,' ~.•,;;; ,Allit-11:". ... ' . . ' -~ . .. - ·, Enc.ount•r Entity Type Rec ipients Data ForM•t Re$ pons lble Entity lnform• tlon and new Identifiers entered Into EMA Aes ponsJb .. 11:ntltv A•spo n s lbl• E ntity Apprehension Detention APIS Query ESTA Pre-Flight In spection DHS/CBP/NTC L•nd Bord • r Crossing Encounter Packaae v e,._1 Manlfe:n Car go S hipme nt. .:1.. NCTC (post.s to .J.. TSOU• Operatfono l NOL# NOL •J, NOL - SJ Notlflcarlon 2. TSC~OI (IIRJ-Comrnunlty 3. DHS Notification 2. FBI FDI (Open cos~s. VSPER • or the KSTls TSC/TSTOC (A•c.alves Elect ronic odrnltt•d/ls In th,r U .S. ) Referral) DHS/1&./\ (Is responslbl t!!! for d#Jtnled ~nules) NCTC FBI (Opt!!n COSt'!S., USPER, or the KST Is ad,nltied/ls. In the U .S. ) DHS/l &A (/$ responsible for dt11t1led cntrlC$) NCTC Flight: M a nifest s {Inbound a nd Outbound lntern~tlon•f, Remov a l lnvestlg aUon E xtradition (In coordln•tlon with DOS and OOJ) SE VIS A ecurr-ent Vet.ti ng OHS National Security OHS/ICE Encounter Package .t. NCTC (1'0StS to l. , TSOU-Opt11rotlonol NOL, NOL- J. N OL- SJ Not(flcatlon 2 . FOf 2. TSC- 01 (IIR)-COrnrnunlty Norl/lcarlon 3 . D IIS TSC/TSTOC (Aevle w s Ele.ctronlc Referral) Overat ■ y lnlt f ■ t.lv• Secure Flla ht C n tde ntl a Una (OIA) Pra- Fllght. In s pecti on Flight M a nifesu• Oth er DHS/TSA Appllc■ nt Appllcat1on/ Previous Visa Appl Icat.Ions DHS/USCIS Pet.ft.toner B e neficiary OHS/US Coast APIS Qu•rv Vessel Manifest Maritime Credent1 a lln e Vessel & Port Ins p ections lnve5tlga tlon s law E nf'orcem*nL Gui,rd Encounter Packaaa OHS/US Secret lnvenlgAt l on s Service P o llt lco,t .iind S pec.l;, I E v e nts Encovnter Package Encounter Packaa:e l.. NCTC (posts to .l. TSOU- Operationa l NOi . NOl...J, NOL - SJ NOrl/lt:arlon Notification ~;,_~~~;,s:::,~-S) Notifkotlon 2. TSC- 01 ( ORJ-COmmunlty Notification 1 . NCTC (posts to .t. TSOU- Operational NOi , NOI...J, NOL- SJ Notlflcorlon 2 . FBI 2. TSC• OI (IJR) Comrnunlly 3 . OHS Notification 1 . NCTC (posts to :J. . 'fSOU- Operotlonal NOL., NOl •S) Notlflcarlon 2. FBI 2, TSC- 01 (IIR) - Comrnunl ty .3. OHS Notification NOL-.J, NCTC (posts ro Current/Previous ;~~INOL-.J, NOL-SJ Appllcatlons 3 , OOS 4 . TSC .I, NCTC (po•t• DOS Vls,i A.evocat ion s Current/P rovlous Appl1catlons ;.a;o,NOI-.J~ to NOi -SJ !I.. ODS 4 . TSC Passport App1tc111 1.lon t":1 1f'r,:.nf/Pf'.,_ul,-.,1~ Appnc.a\lons l . NCTC (posu to N OL, NOL •.J, NOL -SJ 2 . FOi 3 , 00S 4 . 1SC l , NCTC (poS t s to Appllcatlon USAID ;:;u Foreign Government PO C .I . N CTC (po!ll's to Ro rerral/ A!)pllcatlon NOL, NOL ..J, NOL -SJ 2. TSC (When Available) Foreign Gover-nment .1 . TSOU-Operotlonol Notification 2 . TSC- OI (IIR)-Communlty Notification .1. TSOU- Op,ttrotlonal Notification 2 . TSC- 01 (IIR)- Cornmunlty Notification .I . TSOU- Op#rrotlonol No,-/fl~o ,-/on 2 . TSC- 01 (JJR)- COmrnunlry Notl/Jcatlon FBI (O~n coses, USPER, TSC/TSTOC or the KST Is (R eceives Etectronlc admitted/is In the U .S. ) Referral) DHS/l&A (l!l responslblt11 for denied entrltts) TSC/ C IS (Reviews Appllc.atlon) I tJI (OfH!n Ca$~S, USPEH, ortM KSTls odrnlt:ted/ls In the U .S.) DHS/J&A (/$ r,u;ponslble for dcnl.:d entries) NcrC NCTC FBI (Opttn C0$11S, USPER, TSC/TSTOC or the KSTls admlttod/ls In rh e U .S. ) NC1"C DH~l/t;A (Is rt1sponslblc for denied entries) TSC/TSTOC TSC/DOS (Reviews Vi sa Appllca ,lon) TSC/DOS (Rovlews Vi sa Appllcallon) TSC/TSTOC (Reviews Passport Appllcetlon} FBI {Open coses, USPER, or the KST/s admitted/ls In the U .S. ) Ncrc FOi Ncrc FBI NCTC FBI NCTC Ncrc NCTC NCTC l. TSOU-Operotlonol NOL,. NOL P.J, NOL ~S) Notification (When Av.&llable) : : Remot e Qu•rv lnt•rn a tlonal .I. TSOU·OPt11rotlonol 2 _ FB, 3 . DHS 4 . TSC :z.. Visa Appllcat. lon 2. TSC-01 (IIR)- Cornrnunlty 2 . FBI !J. OHS rsc-01 2. (IIR) - Communlty Not{flcotlon .l, TSOU-Operatlonol Notlflcotlon 2. TSC- OI (IIR)- Communlty Natl/lcot/or, TSC/USA ID (Receives El•ctronlc Referra l) TSC/TSTOC (Aeviewt: Electronic Aeforro l) TSC/OO5 ( Reviews E lec tron ic Referral) Legacy &. Other COuntrle.s NCTC FBI (Open C0S*S, USPER, ortlie KST/s admitted/ls In the U .S. ) Ncrc NCTC Ncrc FBI (Opt11n cases~ USPER. or the KST/s odmltttuJ/ls In the U .S.) N CTC NcrC NatJo nal Ins tant Background Checks / Traffic Vfol.t1t.lon / DoO Law Enforc•ment ...,.., Enforcement Investigation Ja11 Related Domestic D ispute Arres t l!wtradltlon .... Sect:lon lnh1r•s t Lo 11 , FBI C A/JTff forwards .1 , FBI 0lornelric•. 2. NCTC Poll ce Report (When Available) J . TSOU-O~ratlonol Notification 2. TSC- 01 {IIR)-Comrnunlty Notification TSC/TSTOC (Via Telephon• Ca ll) FBI (Open coses, USPEU, or the l<STI• odrnlru:d/ls In l'hfl U .S. ) NcrC NCTC Infra, ld•ntifles cat.rgorhtlli or Tlll'tRORISM I Nl' OAMATION from •ocounters with po,;;ltlve lv Identified l(NOWN or 5U5P([CTl:OTCl'UIOAIST5 that art, o f polentlal olhe f' couJ'1tertorrh:rn analysts , or the \Natchlltalna commvnhy, Cncou,it.•r'lng •ntltlu• •hovld collect and shaf'e wht,n it. ls wllhln thul r lutJ.o l NOM I NATOHS, aulhorllles to ,.~lain and llh&re "Tt!RAOfllSM INl'O KMAYION. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Page 179 . /·' UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION A. B. is a thorough review of the TERRORISM INFORMATlON contained in an ENCOUNTER PACKAGE obtained as a result of the ENCOUNTER with the KNOWN or SUSPECTED TERRORIST. ADVANCED ANALYSIS includes the adding of TERRORIST IDENTIFIERS to existing KNOWN or SUSPECTED TERRORIST records and identifying new KNOWN or SUSPECTED TERRORISTS who should be nominated through the existing nomination process. In this context, ADVANCED ANAL vsrs is being done on a tactical matter related to the specific KNOWN or SUSPECTED TERRORIST to identify information useful in "connecting the dots" between and among that KNOWN or SUSPECTED TERRORIST and other KNOWN or SUSPECTED TERRORISTS or potential KNOWN or SUSPECTED TERRORISTS. It is also when the need for foreign language translation services will be identified. ADVANCED ANALYSIS: are those who receive and hold TERRORISM INFORMATION and certain other non-TERRORISM INFORMATION they are authorized to receive and retain. AGGREGATORS: C. DEROGATORY INFORMATION: is intelligence or information that demonstrates the nature of an individual's or group's association with TERRORISM and/or TERRORIST ACTIVITIES. D. ENCOUNTER: is an event in which an individual is identified during a screening process to be a "POSITIVE MATCH," "POTENTIAL MATCH," or "INCONCLUSIVE MATCH," to an ind ividual who has been desi gnated in the TSDB as a KNOWN or SUSPECTED TERRORIST. An ENCOUNTER can be a face-to-face meeting with a KNOWN or SUSPECTED TERRORIST, electronic or a paper-based ENCOUNTER (e.g., the KNUWN or SUSPECTED TERRORIST has submitted an appli cation for a benefit liked a visa, ETSA grant, or information is provided to the United States by a foreign government, aircraft operator, or other private entity). E. ENCOUNTERING AGENCY: is a Department or Agency of the U.S. Government with TERRORIST screening or law enforcement responsibilities that comes into contact with a KNOWN or SUSPECTED TERRORIST (whether in a face-to-face situation or via an electronic or written submission such as an application for a benefit) that the TSC determines is a POSITIVE MATCH to a KNOWN or SUSPECTED TERRORIST. F. ENCOUNTER PACKAGE: is all information gathered during an ENCOUNTER with a KNOWN or SUSPECTED TERRORIST. G. ENHANCEMENT: is the addition of new TERRORIST IDENTIFIERS or DEROGATORY INFORMATION on a KNOWN or SUSPECTED TERRORIST. H. are nationals of one country who travel or attempt to travel to another country to participate in TERRORISM and/or TERRORISTACTIVlTlES. I. is information that suggests an individual may have a nexus to TERRORISM and/ or TERRORIST ACTIVITIES but the information available to the NOMINATOR does not meet either or both the minimum identifying criteria that will facilitate identification of these individuals or the substantive DEROGATORY INFORMAT10N to meet the REASONABLE SUSPICION standard but does qualify as information that should be provided to NCTC pursuant to HSPD-6. FOREIGN FIGHTERS: FRAGMENTARY INFORMATION: UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION ► -0 -0 ~ ::s ..... 0. X ...... UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION J. is the final determination by TSC that limited information in the subject data set matches TSDB data in a TSDB record and no additional identifiers are available to verify the match. K. INITIAL REVIEW: is a quick primary review of the ENCOUNTER PACKAGE to identify obvious, new TERRORIST IDENTIFIERS about the KNOWN or SUSPECTED TERRORIST. L. KNOWN TERRORlST: is an individual whom the U.S. Government knows is engaged, has been engaged, or who intends to engage in TERRORISM and/or TERRORIST ACTIVI TY, including an individual (a) who has been, charged, arrested, indicted, or convicted for a crime related to TERRORISM by U.S. Government or foreign government authorities; or (b) identified as a terrorist or member of a designated foreign terrorist organization pursuant to statute, Executive Order or international legal obligation pursuant to a United Nations Security Council Resolution . INCONCLUSIVE MATCH: M. LONE WOLF: an individual motivated by one or more extremists ideologies, who operates alone and supports, or engages in acts of violence in furtherance of that ideology or ideologies that may involve direction, assistance, or influence from a larger terrorist organization of a foreign actor. N. NOMINATOR or NOMINATING DEPARTMENT OR AGENCY: is a Federal Department or Agency that has information to indicate that an individual meets the criteria for a KNOWN or SUSPECTED TERRORIST and nominates that individual to TlDE and the TSDB based on information that originated with that Department or Agency and/or a third Department or Agency. 0. OPERATIONALLY CAPABLE: as described in Chapter 4, an individual is "OPERATrONALLY CAPABLE" if, based on credible intelligence, he or she, acting individually or in concert with others, reasonably appears to have the ability, knowledge, opportunity, and intent or is actively seeking the opp01tunity to engage in a violent act of TERRORISM consistent with 18 U.S.C. 2331 or 18 U.S.C. 2332b. For example, attempting to obtain an IED would indicate an individual is OPERAT10NALLY CAPABLE of committing an act of TERRORISM. However, simply conducting internet research concerning IEDs would not be sufficient without additional activity. Depending on circumstances, and in combination with other facts, scouting potential targets or traveling for no legitimate purpose to places that have TERRORIST training grounds, regardless of whether the person is presently capable of using an IED, might also indicate an individual is OPERATIONALLY CAPABLE of committing an act of TERRORISM. P. ORIGINATOR: is the Department or Agency that has appropriate subject matter interest and classification authority and collects TERRORISM INFORMATrON (i.e., raw information) and disseminates it or TERRORIST IDENTJFIERS to other U.S. Government entities in an intelligence report (i.e., finished intelligence) or other mechanism . Q. PARTICULARIZED DlmOGATORY INFORMATION: is the type of information relied on to determine whether REASONABLE SUSPICION is met. This is information that demonstrates the nature of an individual 's or group's association with TERRORISM and/or TERRORIST ACTIVITIES UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION that is descriptive and specific to an event or activity, and is more than a label. For example, "Subject X provides false travel documentation for AI-Qaida operatives" is PARTICULARIZED DEROGATORY lNFORMATION, whereas "Subject Y is a supporter," standing alone, is not considered PARTICULARIZED DEROGATORY INFORMATION. R. POSITIVE MATCH: occurs when the TSC determines that information about a subject encountered by a SCREENER exactly or reasonably matches a record in the TSDB. S. occurs when an ENCOUNTERING AGENCY believes it has a match with a or SUSPECTED TERRORIST record in the TSDB. An ENCOUNTERING AGENCY may attempt to resolve POTENTIAL MATCHES first through its review process. If an ENCOUNTERING AGENCY'S review process cannot resolve the individual's status as not a match to a TSDB record, the ENCOUNTERING AGENCY will refer the POTENTIAL MATCH to TSC for final adjudication. POTENTIAL MATCH: KNOWN T. PURELY DOMESTIC TERRORISM INFORMATION: is defined in the TSC MOU as information about U.S. PERSONS that has been determined to be PUil.ELY DOMESTIC TERRORISM INFORMATION with "no link to foreign intelligence, counterintelligence, or international TERRORISM." U. REASONABLE SUSPICION: is the standard that must be met in order to include an individual in the TSDB, absent an exception provided for in the Watchlisting Guidance. To meet the REASONABLE SUSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts, reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and/or TERRORIST ACTIVITIES. There must be an objective factual basis for the NOMINATOR to believe that the individual is a KNOWN or SUSPECTED TERRORIST. Mere guesses or hunches are not enough to constitute a IIBASONABLE SUSPlCION that an individual is a KNOWN or SUSPECTED TERRORIST. Reporting of suspicious activity alone that does not meet the IIBASONABLE SUSPICION standard set forth herein is not a sufficient basis to watch list an individual. The facts, however, given fair consideration, should sensibly lead to the conclusion that an individual is, or has, engaged in TERRORISM and/or TERRORIST ACTIVITIES. V. SCREENER: a Department or Agency that is authorized to conduct TERRORISM screening to determine if an individual is a possible match to a KNOWN or SUSPECTED TERRORlST in the TSDB. SCREENERS can include Federal Departments or Agencies, state, local, tribal, territorial, or foreign governments and certain private entities. The term 'SCREENER' is used throughout this document as a general reference to a government official who compares an individual's information with information in the TSDB to determine if an individual is in the TSDB. Law enforcement officials who engage in such activities may normally describe their targeting or other actions in this context as other than "screening." For ease of reference, government officials who compare an individual's information with information in the TSDB will be referred to in the Watchlisting Guidance as a "SCREENER." w. SUSPECTED TERRORIST: is an individual who is REASONAl:lLY SUSPECTED to be, or has been engaged in conduct constituting, in preparation for, in aid of, or related to TERRORlSM and/or TERRORIST ACTIVITIES based on an articulable and REASONABLE SUSPICION. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION X. TARGETED ANALYSIS: is further exploitation of a targeted set of ENCOUNTER PACKAGES and ADVANCED ANALYSJS products to assist in identifying TERRORIST trends and changes to methods, tactics, and practices. ENCOUNTERS for TARGETED ANALYSTS are selected using contemporaneous threat criteria, and research in additional repositories. Contemporaneous threat criteria include association with a priority terrorist group (e.g., NJPF Tier [ or JI); ENCOUNTERS with KNOWN or SUSPECTED TERRORISTS designated as No F ly or associated with violent activity; or at the request of any Department or Agency that identifies a need. Y. is a combination of definitions because none of the federal law definitions of "terrorism" or "terrorist activities" were directly applicable to the consolidated approach to watch listing. For terrorist watchlisting purposes under this Watch listing Guidance, "terrorism and/or terrorist activities" combine elements from various federal definitions and are considered to: (a) involve violent acts or acts dangerous to human life, property, or infrastructure that may be a violation of U.S. law, or may have been, if those acts were committed in the United States; and, (b) appear intended to intimidate or coerce a civilian population, influence the policy of a government by intimidation or coercion, or affect the conduct of government by mass destruction, assassination, kidnapping, or hostage-taking. This includes activities that facilitate or support TERRORISM and/or TERRORIST ACTIVITIES, such as providing a safe house, transportation, communications, funds, transfer of funds or other material benefit, false documentation or identification, weapons (including chemical, biological, or radiological weapons), explosives, or training for the commission of act of terrorism and/or TERRORISM AND/OR TERRORIST ACTIVITIES: TERRORIST ACTIVITY. Z. TERRORISM INFORMATION: applies, where appropriate, to purely domestic terrorism as defined in the TSC MOU and incorporates the definition found in in section 1016 of the [RTPA (6 U.S.C. 485), as amended . The term "TERRORISM INFORMATION" means 1. all information, whether collected, produced, or distributed by intelligence, law enforcement, military, homeland security, or other activities relating t a) the existence, organization, capabilities, plans, intentions, vulnerabilities, means of finance or material support, or activities of foreign or international terrorist groups or individuals, or of domestic groups or individuals involved in transnational TERRORISM; b) threats posed by such groups or individuals to the United States, U.S. PERSONS, or United States interests, or to those of other nations; c) communications of or by such groups or individuals; or d) groups or individuals reasonably beli.eved to be assisting or associated with such groups or individuals; and 2. includes weapons of mass destruction information. a) Weapons of Mass Destruction Information: information that could reasonably be expected to assist in the development, proliferation, or use of a weapon of mass destruction (including a chemical, biological, UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION radiological, or nuclear weapon) that could be used by a TERRORIST or a terrorist organization against the United States, including information about the location of any stockpile of nuclear materials that could be exploited for use in such a weapon that could be used by a TERRORIST or a terrorist organization against the United States. AA. TERRORISM SCREENING INFORMATION: is defined in the standard HSPD-6 agreement to mean unclass ified identifying information about KNOWN or SUSPECTED TERRORI STS. BB. TERRORIST: please see KN OWN TERRORIST or SUSPECTED TERRORIST. CC. TERRORIST JDENTIFIERS: are referred to in the TSC MOU as U//FOUO data for inclusion into the TSDB. TERRORIST IDENTIFIER S are data points about a particular identity that include names and aliases, dates of birth, places of birth, unique identifying numbers, passport information, country of origin and nationality, physical identifiers, addresses, photographs or renderings of the individual, fingerprints or other biometric data, employment data, license plate numbers, and any other TERRORJSM IN FORMATION that ORIGINATORS specifically provide for passage to the TSC. DD. TERRORlST INFORMATION: as defined in HSPD-6 is "information about individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM. " EE. U.S. PERSON: is defined in Executive Order 12333 (as amended) as "a United States citizen, an alien known by the intelligence element concerned to be a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments." The Watchlisting Guidance contains certain exceptions to the minimum substantive derogatory standards for TERRORIST watchlisting that support immigration and visa screening activities by the DHS and DOS to determine whether ineligibilities exist for admission to the United States or visa adjudication pursuant to the INA. Because the INA defines "aliens" as any person not a citizen or national of the United States, the INA admissibility provisions also apply to LPRs, in certain circumstances, who are considered as U.S. PERSONS under Executive Order 12333. Consequently, NCTC developed a mechanism in TIDE to identify and distinguish U.S . citizens from non-U.S. citizens in order to further distinguish between "aliens" under the INA and U.S. PERSONS under Executive Order 12333. See INA§ 10l(a)(3) [8 U.S.C. 110l(a)(3)]. UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION ► 'O '"Cl fl> ::3 0- For Immediate Release Office of the Press Secretary September 16. 2003 Homeland Se urtty Pre ,df_ntial Direc iv~JHspd-6 Subject: Integration and Use of Screening Information To protect against ter orism i is the policy of the United States to ( 1) develop, integrate, and maintain thorough. accurate, a d current information about individuals known or appropriately suspected to be or have been engaged in conduct constituting. in preparation for. in aid of. or related to terrorism (Terronst Information); and (2) use that information as appropriate and to the full extent permitted by law to support (a) Federal. State. local, territorial. tnbal, foreign -government. and private-sector screening processes. and (b) diplomatic. military. intelligence, law enforcement. immigration, visa, and protective processes. This directive shall be implemented in a manner consistent with the provlsions of the Constitution and applicable laws, including those protecting the rights of all Americans. To further strengthen the ability of the United States Government to protect the people, property, and territory of the United States against acts of terrorism, and to the full extent permitted by law and consistent with the policy set forth above: ( 1) The Attorney Ge eral shall establish an organization to consolidate the Government's approach to terrorism screening and provide for the appropriate and lawful use of Terrorist Information in screening processes. (2J The heads of executive departments and agencies shall, to the extent permitted by law. provide to the Terrorist Threat Integration Center (TTIC} on an ongoing basis all appropriate Terrorist Information in their possession, custody. or control. The Attorney General , in coordination with the Secretary of State, the Secretary of Homeland Security, and the Director of Central Intelligence shall implement appropriate procedures and safeguards with respect to all such information about United States persons. The TTIC will provide the organization referenced in paragraph (1) with access to all appropriate information or intelligence in the TTIC's custody, possession , or control that the organization requires to perform its functions . (3) The heads of executive departments and agencies shall conduct screening using such information at all appropriate opportunities, and shall report to the Attorney General not later than 90 days from the date of this directive, as to the opportunities at which such screening shall and shall not be conducted. (4) The Secretary of Homeland Security shall develop guidelines to govern the use of such information to support State, local, territorial, and tribal screening processes. and private sector screening processes that have a substantial bearing on homeland security . (5) The Secretary of State shall develop a proposal for my approval for enhancing cooperation with certain foreign governments, beginning with those countries for which the United States has waived visa requiremen ts, to establish appropriate access to terrorism screening information of the participating governments. This directive does not alter existing authorities or responsibilities of department and agency heads to carry out operational activities or provide or receive information This directive is intended only to improve the internal management of the executive branch and rs not intended to, and does not, create any right or Pagel of2 ~N benefit enforceable at law or in equity by any party against the United States. its departments, agencies. entities. officers. employees or agents, or any other person. The Attorney General. in consultation with the Secretary of State, the Secretary of Homeland Security, and the Director of Central Intelligence, shall report to me through the Assistant to the President for Homeland Security not later than October 31 . 2003. on progress made to implement this directive and shall thereafter report to rne on such progress or any recommended changes from time to time as appropriate. GEORGE W . BUSH ### Page 2 of 2 THE SECRETARY OF STATE THEATTORNEYGENER~L THE SECRETARY OF HOMELAND SECURITY TUE DIRECTOR OF CENTRAL INTELLIGENCE MEMORANDUM OF UNDERSTANDING ON THE lNTEGRATION AND USE OF SCREENING INFORMATION TO PROTECT AGAINST TERRORISM (1) This memorandum represents the consensus view of the Secretary of State, the Attorney General, the Secretary of Homeland Security, and the Director of Central Intelligence-regarding the implementation of Homeland Security Presidential Directive-6 (HSPD-6), dated September 16. 2003. entitled "Integration and Use of Screening Information to Protect Against Terrorism ." (U) (2) Consistent with the President's direction, the Parties to this Memorandum will develop and maintain, to the extent pennitted by law, the most thorough, accurate, and current information possible about individuals known or appropriately suspected to be or have been involved in 3ctivities constituting, in preparation for, in aid of, or related to terrorism ("Terrorist Information"), and will, as described in this Memorandum: (a) use that ~nformation to support screening processes at all appropriate opportunities; (b) make accessible appropriate information to State, local, territorial, and tribal authorit;es to support their screening processes and otherwise enable them to identify, or assist in identifying, such individuals; (c) host mechanisms, to the extent permined by law, to support appropriate private sector screening processes that have a substantial bearing on homeland security; (d) host mechanisms, to the extent pennitted by law, to support appropriate foreign government screening processes that have a substantial bearing on homeland security; (e) provide or make accessible appropriate infonnation to foreign governments cooperating with the United States in the war on terrorists of global reach; and (f) ensure that these activities are carried out in a manner consistent with the Constitution and applicable laws. (U) Page \ of & Terrorist Screening Center i, P) To implement the President's directive, the Attorney General, acting through the Director of rhe FBI, and in coordination with the Secretary of State, the Secretary of Homeland Security, and the Director of Central lncelligence, will establish the Terrorist Screening Center to consolidate the Government's approach to terrorism screening and provide for the appropriate and lawful use of Terrorist Information, in screening processes. (U) (4) The Terrorist Screening Center will: (a) maintain a consolidated terrorist screening database that is a continuousry updated, sensitive but unclassified subset of the Terrorist Information possessed by the TIIC, and the Purely Domestic Terrorism Information (i.e,, infonnation about U.S. persons that has been determined to be purely domestic terrorism information with no link to foreign intelligence, counterintelligence, or international terrorism) possessed by the FBI: (b) determine, for each entry in the consolidated terrorist screening database. which supported screening processes shall query that entry, as described in paragraphs (15) through (24); ·· (c) ensure, consistent with applicable law, that appropriate information possessed by State, local, territorial, and tribal governments, which is available to the Federal government, is considered in determinations made by the Terrorist Screening Center~ (d) host mechar.isrns to support appropriate screening processes; and (e) provide continual operational support to assist in the identification of persons screened and, when an individual known or appropriately suspected to be involved in activities constituting, in preparation for, in aid of, or related to terrorism, has been identified through a screening process, facilitate, to the extent pem1ined by law, appropriate and lawful actions to be taken by appropriate departments and agencies. (U) (5) The Terrorist Screening Center will be headed by a senior U.S . Government official (the Director of the Terrorist Screening Center), who will report to the Attorney General through the Director of the FBI. The Director of the Terrorist Screening Center will be appointed by the Anomey General, in consultation with the Secretary of Homeland Security, the Secretary of State, the Director of the FBJ, and the Director of Central lotelligence. The Principal Deputy Director of the Terrorist Screening Center will be a senior official from the Department of Homeland Security. (U) (6) The Terrorist Screening Center will be staffed with assignees and other officials from the Department of State, the Department of Justice, the Depar1ment of Homeland Security, and other Federal departments and agencies that the Terrorist Screening Center supports. The Director of Central Intelligence, acting in his capacity as statutory head of the Intelligence Community, may Page 2 of 8 also cieterrnine that assignees of other appropriate agencies. within the Intelligence Community, will be made available to perform appropriate duties at the Terrorist Screening Center. (U) (7) Personnel assigned to the Terrorist Screening Center will have appropriate access to the TTJC database and any relcvanl intelligence information necessary to perform the Terrorist Screening Center's functions. To the extent required by law, the Panics to this Memorandum may jointly determine the circumstnnces under which personnel from the Intelligence Community, assigned to the Terrorist Screening Center in accordance with paragraph (6), may participate in the functions of the Terrorist Screening Center relating to U.S. persons. (U) (8) The Director of the Terrorist Screening Center will establish necessary procedures and safeguards to ensure the Terrorist Screening Center's functions are carried out in a manner consistent with the Constitution and applicable laws, including, but not limited to, procedures to : (a) address the repeated misidentification of persons in any U.S. Government screening process; (b) regularly review information, and to promptly adjust or delete erroneous or outdated information; and (c) protect personal privacy, (U) (9) Consistent with the President's directive, the Secretary of State, in consultation with the Secretary of Homeland Security, the Attorney General, and the Director of Central Intelligence, and working with the Director of the Terrorist Screening Center, not later than 180 days from today, will recommend to the President through the Assistant to the President for Homeland Security and the Assistant to the President for National Security Affairs, a proposal for cooperating with certain foreign governments (beginning with those countries for which the United States has waived visa requirements) to establish appropriate access to terrorist screening infom1ation of the participating governments, in a manner consistent with each government's laws, and to provide operational support to the participating governments. (U) Terrorist Threat Integration Center (TfIC) Identities Database (10) The TTIC database will include, to the extent permitted by law, all information the U.S . government possesses reloted ro the identities of individuals known or appropriately suspected to be or have been involved in activities constituting, in preparation for, in aid of, or related to terrorism, with the exception of Purely Domestic Terrorism Information. (U) ( 11) As directed by the President. and to the extent permitted by law, Federal departments and agencies wilt provide to the TTIC on an ongoing basis all relevant Terrorist Information in their possession, custody, or control, with the exception of Purely Domestic Terrorism Information, which will instead be provided directly to the FBI. Departments and agencies will continue to Page 3 of 8 provide new or updated information, and adjust or retract mformation as needed, in as near to real -time as possible. To this end, the Parties to this Memorandum will automate, to the maximum extent possible while providing for necessary review, their processes and mechanisms for securely sharing this information, including, but not limited to, the following: (a) The Secretary of State, the Attorney General, the St::cretary of Homeland Security, and the Director of Central [nlelligence, in coordination with other relevant department and agency heads, not later than I 80 days from today, will jointly recommend to the President through the Assistant to the President for Homeland Security, in consultation with the Assistant to the President for National Security Affairs, improvements, if any, to the existing cable-based system of sharing terrorism-related information with other depar1ments and agencies. (b) The Attorney General will ensure that the FBI's information technology modernization programs incorporate automated means of sharing appropriate information with the l71C and other departments and agenc ies, while providing for necessary review, in near real=-time. (U) (12) The TTJC identities database, and the FBI's database containing Purely Domestic Terrorism Information, will incorporate, to the extent permitted by law, available biometric data, including data on persons who even if otherwise unidentified are known or appropriately suspected to be or have been involved in activities constituting, in preparation for, in aid of, or related to terrorism. The databases will have the capability of periodically incorporating advancements in biometric technology. (U) Relationship of the TTIC and FBI Databases to the Terrorist Screening Center Terrorist Screening Dara base (13) The ITIC identities database will serve, with the exception described in paragraph (10), as the s ingle source for the Terrorist Screening Center terrorist screening database. The Director of the FBI will serve as the source for the Terrorist Screening Center terrorist screening database with regard to Purely Domestic Terrorism Information. The Terrorist Screening Center terrorist screening database will be a continuously updated, sensitive but unclassified subset of the Terrorist Information possessed by the TTIC, and the Purely Domestic Terrorism lnfonnation possessed by the FBI. (U) Terrorist Screening Center Terrorist Screening Database (14) The Director of the TTIC, the Director of the Terrorist Screening Center, and the heads of Federal departments and agencies, or their designees, may nominate persons for inclusion in the terrorist screening database, with notification, as appropriate, to the Director of the TTIC and/or the Director of the FBL (U) Page 4 of8 (15) The Terrorist Screening Center will determine, according to criteria established jointly with the entity responsible for each supported screening process, which supported screening processes will query that entry in the consolidated terrorist screening database. The Terrorist Screening Center will make these determinations bnsed on criteria and procedures developed in coordination with the Parties to this Memorandum 3nd in consultation with the heads of appropriate Federal departments and agencies, based on factors including, but not limited to, the following: (a) the nature of the person's association with terrorism~ (b) the qua! ity of the data, including credibility, reliability, and extent of corroboration; ( c) the extent of uniquely identifying data; (d) the authority or authorities under which the data was obtained, and any restrictions on how it may be shared or used; ( e) the authority or authorities of the screening entity; (f) the circumstances, including changes in the Homeland Security Alert Level, under which screening will occur; and (g) the action the screening entity will take if a person is identified as a person in the terrorist screening database. (U) ( l 6) The Director of the Terrorist Screening Center, in coordination with the Parties to this ~emorandum and in consultation with the heads of appropriate Federal departments and agencies, will establish procedures to review the continued inclusion of a person in the terrorist screening database, and to review the inclusion of that person in particular screening processes as described in paragraph (15) above, whenever new infonnation about that person is developed . (U) (17) Except upon written direction from the President, determinations to include U.S. persons in the terrorist screening database based solely on information concerning the domestic activities of such persons will be made as appropriate by the Secretary of State, the Attorney General, and the Secretary of Homeland Security, or their designees. (U) (18) The Attorney General, acting through the Director of the Terrorist Screening Center, will review each nomination and determine whether to include that person in those records that can be queried by law enforcement authorities through the NCJC database; for aliens. the Attorney General will do so in consultation with the Secretary of Homeland Security, acting through Lhc Secretary of Homeland Security's representative assigned to the Terrorist Screening Center. (U) Page 5 of 8 ( 19) The Secretary of Homeland Security, acting through his representative assigned to the Terrorist Screening Center, will review each nomination and dclcnninc whether to include that person in those records that can be queried by. or made accessible by appropriate means, to other State, local , territorial, and tribal officials for homeland security purposes, including, but nol limited to, screening persons when they apply for driver's licenses or other forms of identification . (U) (20) The Secretary of Homeland Security, acting through his representative assigned to the Terrorist Screening Center, will review each nomination and determine whether to include that person in those records that will be subject to queries submitted by appropriate private sector critical infrastructure operators or organizers of large events. The Secretary of Homeland Security, in consultation with the other Parties to this Memorandum, and working with the Director of the Terrorist Screening Center, will establish necessary guidelines and criteria to: (a) govern the mechanisms by which private sector entities can submit such queries; and (b) initiate appropriate law enforcement or other governmental action, if any, when a person submitted for query by a private sector entity is identified as a person in the terrorist screening database. (U) (21) The Secretary of State in consultation with the Attorney General, the Secretary of Homeland Security, and the Director of Central Intelligence, acting through their representatives assigned to the Terrorist Screening Center, will review each nomination and determine whether to include that person in those records that can be queried by, or made accessible by appropriate means to, foreign governments cooperating with the United States in the war on terrorists of global reach. (lf) [Paragraphs (22) - (24) are classified and therefore redactedl (25) The terrorist screening database will be accessible to screening processes on a real -time basis . Screening processes will only be able to access those records that have been identified and approved for such screening, as described in paragraphs (15) through (24) above. The Director of the Terrorist Screening Center will strictly Ii mil, to the maximum extent possible, the need to provide U.S. Government terrorist screening data in list form to supported entities. (U) Additionnl Implementation Provisions (26) Per the President's direction, and consistent with guidelines developed by the Anorney General in coordination with the other Parties to this Memorandum, the heads of Federal departments and agencies will conduct screening using the Terrorist Screening Center database at all appropriate opportunities, and shall report to the Attorney General not later than 90 days Page 6 of8 from today the screening opportunities at which such screening shall and shall not be conducted . (U) (27) The Attorney General and the Secretary of Homeland Security wi-ll conduct a review of the erganization, structure and progress of the Terrorist Screening Center at an appropriate time, and report to the President through the Assistant to the President for Homeland Security. The report will include a recommendation on whether any modifications to the Terrorist Screening Center should be made. (U) (28) To the extent permitted by law, the Director of the TfiC will promptly assume responsibil.i ty for the functions and personnel of the Department of State's TIPOFF . counterteri;orist program, less those components devoted to providing operational support to T IPOFF users and will ensure that all terrorist identity infonnation contained within the TIPOFF database is fully integrated into the TTIC database. The functionality of the TIPOFF program, whereby consular officials receive near real-time feedback to hits to TIPOFF entries, will be maintained or !mproved upon .. A ~enanir,- AnrieY to this Memnranrlum will be promntlv a11reerl to regarding the modalities of TIPOFF relocation to the ·rr1c, ana me spectt1c responsibilities of each r-arty. t U) · (29) Beginning with the standup of the Terrorist Screening Center, Federal departments and agencies will discontinue or transfer to the Terrorist Screening Center, to the extent permitted by law and with appropriate consultation with the Congress. those operations that are duplicative of the Terrorist Screening Center's mission to provide continuous operational support to users of the terrorist screening database, including but not limited to : (a) those components of the Department of State's TIPOFF counterterrorist program devoted to providing operational support to TIPOFF users (with the exception of a small element that will remain at the Department of State to facilitate intelligence support to the Bureau of Consular Affairs); (b) the FBl's Watchlist Unit; and (c) the Transportation Security Agency's No-Fly and Se}ectee list program . (U} (30) Consister.t with HSPD-6 and other presidential directives, this Memorandum does not alter existing authorities or responsibilities of the heads of Federal departments and agencies to carry out operational activities or provide or receive information. (U) (31) To the extent that existing notices are not sufficient, the Panies to this Memorandum. which will provide information to the TTlC. the FBl, and/or the Terrorist Screening Center under HSPD-6 and this Memorandum, will publish in the Federal Register, prior to the standup of the Terrorist Screening Center, "routine use•· notices under the Privacy Act sufficient to indicate that such information will be provided . (U) Page 7 of 8 (~ ~) Th, s M e rnor.:!ndum of Understanding i!; effective from the date of signatu;-e by al l Parties. An~ Party may submit, through the Assistant to the Presice:,t for Homeland Security, ""Titten requests for revisions . amendments, modifications, annexes and supplementary understanding to thi s Memornm.lurr. at any lime. Such changes sh;:!11 become ef:'ecrive upon the date of approva l bv ~ a il Parties. Tne Parties shall review this Me;-norandum not late:- than one ,vcar from -its effective date . (U) Colin L. Powell ~-•.-TV nf State: •' .. . . ::• . _. ·. \: ·.-_ _--_ _ :_ m.·..~-: . · .-,: :.~-:~·. ·L ·._·':_ :_. : · ;:_ .:~ .: . . _. . _. _: . .~~ ~ .· ·. ·.· ,·_ · .. : ~ f t. .:A~iney .9enera( . ·._. -.. ··:-- ·-· _·· j . · : ·" -.-· · :,· ..,. _. ·: · .·. - .•.:-:·:.:·. ·::~•-::·.:_:· · . ·.:· :_. . ·....:;,_-... ·.· ·., ·: . : . . · : · .· · ..· Septtmber 16,2003 :,. :~- ·-·:_·. ,.: .:· ;· .._. ··; · . :: .; •, . .. -. ~ Thoma,s 1. Rid .. . . ·s-eae~.or~OD\eland Security • S:gnatures are consolidated from classified version of the original TSC MOU. Page 8 of 8 2 . ;, ·. . _. · . : · ..:··· , ., THE SECRKTAR.V OP STATE T8E SECRETARY OF THE TIUtASUR.Y 111EmcllETARY OF DEl'ENSE TIIEATTOltNEY GENERAL 111ESFCRE'l'ARY OFHOMEUNOSECmllTY TBEDIIEC'l'Oll OP NATIONAL INTEI.UGENCE THE DDlF..Cl'OR 01' THE Cl?.NTRAL IN'TRLLIGDlCE AGENCY TBEDIRECTOlt OF 'IIIENA.TIONAL COUN'l'BRTERROUSM CENTER TD D!RECTOR 01' THE TER.RORISTSCREENING CENrER ADDENDUMB TOTHB MEMORANDUM OF UNDERSTANDlNGON11mINTBGRATION AND use OF saumNJN'G INPORMATION TO PROTP.Cr AGAINST Tt?.R.R0RISM Badqr-4 (l) "Ibis Addeadmn. ("Addendum B•) sapptemenu bMtmcrudumo!Uzsdcnran4ini on the Inrqracion and Use of ScreeainglaformaUoa to Pro~Apinlt Tem,aun. ~ Septe:mbec 16, 2003, ("'lbe TSC MOU") and ~ Addendum A. ef&cti¥e Alll'Ut 21 2004. T<> cbe cxteot that Adkndzrm B il incortsl£wit with tbc TSC MOU, Addc:aadm.DB supen:icdcs the TSCMOU. ln lddldm.Addcedma B ~ lhe TIPOW-T.!R.R.OR~of~, dated Juoe 4, 2002. bc(wuii the ~ t of State. die Deft.aSe loteJJt..c,,Jw: Agency, ~ NatioMI Secmiiy Agt::DJ;y. !ht Federal Barean of l . D ~ IDd lhoCcntnl~ At,cn,t:y or my other imcriJn agreemait iatended t.c &ddtw the me of dincmtnlle4S Tettorism InftvD~ (2) AddeadamB ~ b!f rotereace an provfsiocu of tbe Mcmcnndozn of Undemanding between~ ~Ovrnuut)', Federal Law Enfarcemeaat.Apncies. and lhe J:>eparcmeat of Homt.land Secmity ~ IDfomwion Shadnc. dad Mm:h 4, 2003 ~ l.aformllion Sbanog MOU'') .md the TSC MOU. By tbt.ir iigtwuros on ~ddendum A. ! h e ~ of Swe., die Set.retM)' of dlt. Treuury, and die ~wy of Dcfeose becaml! sfpatories Gf ~ Infonurion ShadnJMOU IDd die TSCMOU a!Ml agrcc thatatl pnm.dans of thoseMOUs apply to Ill entitie& that are. cc become, 'fr'holly or mpert. pan ct. lC:Sp0Cdvely, 1he ~ of swe., t h e ~ of !he Tn:aswy and che Depanmeni of Defeue. To lbt. exunt dwtbe TSC MOU and AMendum B pro\id8 f« pcaterW'omation sbaringtbm tbal ~ t e d by1hc .fntomation Sltadag MOU, the ptovisuw a!cht TSC MOU and Mdtodam B shall eonuol the P~' actioaa. In all other ~peccs. to die exit.at diu promioDs of lho TSC MOU atJJJ/or Add=dam B are inconsistt.at with the Information Shariftr MOU.~ provisioas of the Infocmation Sha.ring MOU shall conttol the actions of 11\e Parties to chis Addendum. Purpose (3) The purposes of Addendum B am~ (a) to ensure 1be full impl~tazion of subparapaph Cl} of HomtJIDd Se.eurity Presldendal Direetive~ {HSP~. ~ Sepiember 16. 2003. entitled ''Jntegranon and U.se <,f Scmcning Infomwion to Pr0Ceet AJai&t Terrorism:11 and (b) tQ ~alize the Parties• agreement tbatthey will. to~ mwnmm ennt permitted by lAw and consi.sc.ent with 1he Pr=deat•a direction for t h e ~ of dJc Tarorltt Threat Integration Cent«, now dsc Nation,! ~ m ~ (NCI'C) and me IJlformatian Sbarint MOU. provide to me NCTC on an ongoing bws all Terrorism lnfoonatiOll {IS defined in the Intelligence Rcfonn and Temxism Prcvcnlicm kt (DlTPA) of 2004. Socdon I 016(~)(4)) in their possetSion. eustody. or coottol ProcedllttS (4) The hniet will. LO the tnlXml1U2l ex1=t pmni~ by law and COMlite'Dt with the egtahlisbineat of !Ile NC1'C. me lllformatioa Sbarin& MOU. IJ\d ia funherurc.e of the information dlaMf mmdales in lRTP.A. provick to the NCI"C, OD ID ooiamz basis. all T«rarian Infomsatiall. iD lbcir poq;essioo, c:unody. or control. lf additicrw proc:edma u,d mcchani AN are Deeded b6yond dlOSe directed iii 1be lnfoaDfltioll Sbadng MOU and IR'IPA to accomplish . this inclucfq. bot Dot Jimmd to. ~ ptQ&:l'IIDS. 1bc NCJ'C. in ooordinlSioc. with the Putit:5 diasCTQnu1ting the Tcrmrism lnformation r'Originar.on;"). $hall ~tish p-ooedures 10 guide lbe s,rovilloo of such iDfcxmltiaa.. and the. Panies shlU establish procedwe! and mec:h31lis!M 10 provide socb information. {S) A. wcb.ba&ed-.eaioo o! tbeNCIC Idenaties Database. tbe Tenodst Identities Dar.ama.n & ~ t (TIDE-OaliDe). IS man~ In cbe TSC MOU, will be aYlilable to all individuals who h a ~ ~ tnIC ~ for a,;«.ii k> NCIC OaliDe CNoi). fomwly known as ~ whidi is a O>n:mmnicy of lDtete.at ~ JNTELINIC.. 1'he NCTC lril1 ma\:.e available to ~ Pai1ies upon rcqncst. dJC aames ud ~ of ptaOIIDel with 1cce&1 to T.IDE-Onlinc:. Ail USCl1 will be respansible. foe c:omp!yinc wi1h me C04ditioaa set for aacct$ t.p nt>S-Onllne. (6) 'Whcb the Partie.J provide disseminated Tmorism Joi'o«m#ic,p co lhc NCfC. no spccffic DOlfficadOG will OCc:tlf between the NCTC and cb.c Orlgim.tor Jdeaeifying the hcl: tbat Temxism Inlormarln11 ~ e d in chose eommmlcationt were placed ill TID,E:(7) The Parties authorire the NCTC Cud d>eFBl for Putely~ Tcnorismlntormation., as ddined .in Gle TSC MOU) to provide 10 the TSC du~ fullov.>ing d a t a ( ~ to u, --Z-errorist Ideatifiers"). in lmxdanoc with 1be provisions of parqraph (I} below. forinclusioo in. the TSCs ccmsolidaUd tmorist scruning databue (TSDB): (a} NllmeS an4 'Illas~: (b} ~tes of bh1h; (~) PIIA:es o(bmh; (d) Unique idcndfylng WDbers Heb u alien registration~ wa nnmbcn. •ocial sc.cority ICCOQIU numbers: (~) Pwport i n f ~ includiftB puspon numbers, c::ountms of ismmce. datts and locations or issuance, expiration dates. JWSPOff pbor.os, and other rdevant ~ (f) Com)tries of origin and nltion•li~ 2 (g) Phys1cal identifit.rS, such as sex, race. height, wei~ eye color, hair color; s ~ IIlJ.rb,. or tattoos; (h) Kilown locations, i.e. addre&ses: (i} Photo~ph& or rmdcrings of the individual; (i) Finaexprints or other biomeuie data: (le) Employi:nc:nt data; (l) License plate numbcr:I; (m) Any o1her Terroiura ~ that Origjnatocs ;pt.cifie&lly provide for passage to lhc TSC. (8) ~ providt:d to the NCTC (or the FBI for Pmdy Domesde Tetrorism Infoanation.). the Parties agree tbAt ~ NCTC (or tbe FBI for Purely Domestic Tenodsm Infomia.rioo) will deem the 'terrorist ldenrlfim liltod in. pa.ng:raph (7) For Officitl U~ ODly (FOUO) for 1bc pwposes of providing the &,.ta to the TSC for lnolusian in TSDB. ~ Terrorist Idcatiftcn passed to the TSC andrcuined in lSDB will be dem)M POUO. (9) The Originator mlY prohibit the NCI'C !roPi passing the Tcaorist f.dc:mfia(s.) ide:iufiod in {a) - (m) above 10 the TSC as FOOO 6ata for inclusiM in 1'SDB if an apprc,priatc official w tUtb.om:es. '&ch O r i ~ .U idt.ctifyits Tcrrcrist ldennfia(s) wt are to be prahibucd tram bcingpa.ued 10 tbe TSC fer inclmion in TSl)1l bymarlcing those items, "'TIDB .re,trictcd." 'Restrictions ou me shall be imposed only to the e.7!U:Dt strid1y nccemty to provcmt the unauthorized disclosure cf imormition that clcaiy idcorifi~ or 'IIOuld rcuon&hly petmlt ready identiflOation oi; intellieenoe or ~tive law enforcemcDt ~ md.hods. ~ or cxyptology that are pardcularly l\lSCept1l,lb to ~ tut would nwlify oc mcasun.bly reduce their effectiveness. (10) The Putlcs agree that aubject to en Origjnatar's ability to prohibit q,eclfi.e Tett'Offlt ldeDtitien; from being included in TSDB, all Tett41ist Idmtifia:s listed lA (7) JQ!ly be passed to UlC TSC. r~gardlcss ofthe data or classification of th.a di,wminatod TCSTOrism lnfommion. (11) Nothing in Addtlidum B w1l mlu'bit or delay the provision ofTarori&m lnformation to the NCTC. (li) Absent prior approval by tbe Origml\Or. tnfro:matjoo (inolu~ all information ~ classified or FOUO in TIDE and lnformatian in TSDB) may JlOt be UJed in any lepl or administrative proceeding or proce:s$, incluclinc ltlYjudieitl or quasi-judicial prows, prc&entation to p.D.d or potitju:rles. f\lbmiwoil u part o! m application w subpoenas, orders for electronic surve,1Janu, ~cb or amst wlr1'6Dt5. prcscnw:ion a.s cvidc:nu, or any use that oould result mpublic disclosure. fufolmadou from PISA collection. or derived w:tfrom Jllay ~nly be used in lepl or admulistratiw:prooudll\C «~with the advanc.e amhom.mon of the Attorney General. Jmy recipient of infonnation from TSDB intC?CISted in obtaining authoriza1ion ~ use that infmmation iii. a legal or ldministrative proceeding or process snus.t contact the TSC to obtain the approval of the Qrisimtor. 1f TSDB ioformalion ~ fmm FlSA collection, er derived there!rom.1he TSC duoogh FBI Headquartm, will t>btam the n~sary l Attotney Gmtnl a».thorizwon. Any rcprod~ di,u:znjaation. or commm:dc.arion (mcluding. but not limit~ to, orAl briefings) of tny information funn TSDB 1!JIUt be acmmpanied by a &tateme:ot of these restrictions. Noihina in this para,nsph shall inhibit the sb.uing of1. limhed set of l'cm)M Jdentifil'.t's; name; dale ofbinh; pas;pon number: pa.sspon co\Ul%Xy of orlgin/~p. \llilh state, local ml tribal authoritie$., or foreign govrmmc:nta for ten"Orism ~ , pa?})OSC.S. u permitted by law, tegu!Uion, Of agreement tlf the Parties. (13) Whtl1 im indrvidual in TSDB ~ been. positively idci:ni1ied during a screc:o:ing QC01Jnler, the :hrties will provide tht. NCTC with TCffQl'Wll lnfotmation Ci)[loded during lh.e r.DCO'Ollta, such as photographs. fingezprims, copies ot'pocb:t liaer. copia ofwritten data. any rcpo.ns of Terrorism Im'armaticm pro~ded by Chit mdMdual. or OflltZ item1 of pot=tfal in~ for in.clusion in TIDE. The NCTC '-ENor the TSC will, in partntt'ship trith departmeats aDd agCDCits wb!cl\ a1"e not Parties to Addendmn B. but whicb ~ct~~ TS:OB, cstahlishprocedures to cmure-that. wbmu individual in Ts.DB bu been po~identified during a saunmi ttlOOUllter, t h o s e ~ and a,=dcs will provide the NCtC and all appropriate agencies that have a mmio.n, with Tettnrism Information countetterramm dcscnbed above. as (14} The Director of the TSC &hall establhb proeedura1 &at~. ineludin& but DOC lmwd to, tra.in1nJ. lt&ndani operating pro¢edurcs. &Dd caller autbtntication ~ . ed. wl1 impltmem ~JoJjc.al safquar~, i D ~ but not limiled to1 tht use of firewalls c4 public k e y ~ 1n mirnize t h e ~ disclosure of" in.fonnuion.. ~ f.o ~ me wlncrahility ofTSOB to unmtboriied ww or cxploimion. ~ estahlisbmem i)f fbeso s a f ~ shJ.11 in no way iDbibit C1f delly th~ prowion otinfonnation 10 the NCTC or the TSC. (lS) Addmdum.B amen& Direciorof Cetitral ~ DirectiYb l/4 (DClD 214) by replacing the 1etm '"lcfforist threat-related~.. whcteverit ~ in DCID 214. with the teem Tenorism Jnfomwian. BA defined in the lRTPA. Implementation Mdt.:Ddum B is e:ffedive from the date of sianaturc by all 'Parties and awlles to all disseminated Tcaarirm !Dfotmation,, recvdle,is of the daU of t h e ~ mlfl\idl it is cowmed ~ B may be s i ~ in coumcipm,. (16) (17) The NCTC. the TSc,. wl the Parties, in coordinatioa with~~ Originator&. shall n:pon to the Homeland Soc:mity Advuor- from time f.O time~ appropriar.e. on the proircss I?Ulde to impl~ Adda,dum B. (18) Nothing in Addendum B alten, or jmpedts the ability or authority of f.eder&l depL~ and agencies to pafonn thciT- rcspOtlSl"bilities undt: law. consistent with applicable legal 1\Xthcritics wt Presidential guidanu. Spedtical!y. nothing iD AddtndumB alten the info~on SnJ.rUllrequirrmcma of'thc HomdHl4 SCC\Jrity Act or'lhc r ~ of the IR.TPA. MAY Date Sectetary of the Treasury Date Secretary of Defense Date Attorney General Secretary of Homeland Security Date Director of National lntellige.nce Dire.ctor",_Central Intelligence A3encY Date Date 4 2006 . -- ·. - -........... _ - ... No.136 .P.6 ~~ of·State.'. -~~~ v · Daie ·1 . · A.r.tiJd,,iiy~ · Date Date .· ... ; • •I I i l i s N0 . 821 .. APR. 28 . 2006 ....• 4: 55PM-- -· . ... ... . Se.crewy of Stare Sec:rcaary of the Trcasnry Semetaly of Defense Date A.Uorney Gciu:tal Seactaty ofFronrland Scanity Date s P . 2/2 •• • • r • • • . , .., • • •• • - • • - • •• , ,. •--•••••••• • • •• • 0 •" • • Secrecary of State Secidaiyoflhe'I'lasury Secretary of Defense AuomeyGeaera.l Secretary of Homeland Security Date Date Dimctor._Central .lnte.lligeace Aaeacy Date 5 P.02 >R-18-2005 ~ 19:49 - 3.2006 1 : 09PM :g (1) ;:l p.. :>< • .j:>.. Seon:aryofState Date Sea.eamyof tll& 1msmy Dea, Dita Dlnscmr~ 0:mm1 lnteillpaoe AIJll1CT Dire --- ·--- . Data :~ DtDl NOV 9 /.1114 r ·eI . ·-. CiNC!.ASSicE:li/FO?. OF:IC!>.l. US, ONT-Y 1HE DIR.ECTOR OF CE."-IRAL li'r!'ELL~GENCE WASHlNc:'ON. O.C. ~ ·-·· DAC-nJSS-Ol I MEJ«)RANDUM FOR: ·4 M.. rch 2003 National Foreign I.ete.llig-~ce Program Principals SUBJECT: l. (U//FOUOJ Homeland Security :!nformation Sharing Memorandum Qf Understanding (U//FOUO) The Ac:orney Genex:-al , s.acreta.ry of Homeland Security, a.::id I have j:i.st signed the .ate.ached Me.morandu.'11 of U:iderstanding on !nformation Sh~i:cg (MOO) imple!lleI?'ting information. sha.rin!.' requirer.er.ts o"! t:.be Eomeland SeC'..iricy Act: (Act) . It is effec.:ive imn:ediat:ely. As you )en.ow, che Depa::;;ment of Homeland Se=ri t.y (Depa.rt.me::-.t.> 1'...as tlOW reached critical mass . cr.u: corresponcin~ i!!~elligence su~port function t..as also ir.a ::.u.red . 2. (U/ /FOUO) AS wit;h nn:c.li recent hc:me!and sec-.;=-ity=el~ted work, the ~---afti.ag process on t:.!::is high priority w'"hit:e F.ouse i~iciative .moved quickly. suc=essive dra:.:s were to each ot. your agencies, with ~J.l comment..s forwarded directly to Che White House draf::ill!. t:eam . The resul ti.:1g MOO is a fair expression of whac t:he >.ct: requires. I expect each oi you to hold those you s~--vise a.ccowita.l:>le £0::- gi.vi.::lg full effect: to each of the MOU's provisians. sen~ Note t:ha.t the MOO makes Associate Di=ector of Central I~telli~enee fo::- Homeland Security, Winston P . Wiley my :representa.ti ve for in£o=ination sharing under t:he MOO. Re ba.s my proxy and full suppqr'C . 3. (0//FOUO) Full and efficient i~lementation of the MOO will l:lene.!it: not only t:.he Depa.rt:ment, l:>~t al.so i..:lcelligence and law enforcement: agencies . As wi t::!l the Terrorist Threat Integra~ion Cencer, we w~l~ e."1\brace the opportuoities anc challenc;es it :;::esents . q~~ cc : I.OCI/H:S, W:.ns::.,m P. Wi!ey ;.1:1;.achrneLt: ; ~u en :.:n=orc.a:.ion S:!:liifing f MEMORANDUM OF UNDERSTAl'\JOTNG BETWEEN THE rNTELUGENCE COMMUNITY. FEDERAL LAW ENFORCEMENT AGBICJES. AND THE DEPARTMENT OF HOMELAND SECURlTY CONCERNING INFORMATION SHARING This Agreement provides a framework and guidance to govern infonnation sharing, use. and handling between; the Secretary of Homeland Security, on behalf of the Department of Homeland Security (OHS), including all entities that arc or become, wholly or in part. elements of OHS; the Director of Central Intelligence (DCl), on behalf of all entities that are, or become, wholJy or in part, elements of the Uruted States Intelligence Community (JC), other than those that are to become part of OHS; and the Attorney General, on behalf of the Department of Justice (DOJ). including the Federal Bureau oflnvestigation, and all entities that are, or become, wholly or in part, elements of 001, and any other department, agency, or entity having federal law enforcement responsibilities, other than those that are to become part of OHS. l. Scope of Application. This Agreement shall be binding on all such departments. agencies, and entities on whose behalf the Secretary of Homeland Security, the DC(, and the Attorney General agree herein. This Agreement is intended to mandate minimum requirements and procedures for infonnation sharing, use~ and handling. and for coordination and deconfliction of anal}1ic judgmenL-.. Departments and agencies are encouraged to devt:lop additional procedures and mechanisms to provide for greater infonnation sharing and coordination than required herein, consistent with lhe OHS Legislation and other relevant statutory authorities, Presidential Directives, the President's announced policies for protecting ag-dinst terrorist threats to the homeland, and 1his Agreement, including, but not limited to: (a) (b) (c) (d) (e) (f) (g) (h) • the Homeland Security Acl of2002; the National Security Act of 1947, as amended; the: Uniting and Strengthening America by Providing Appropriate Tools Required to Jntcrcept and Obstruct Terrorism Act of 2001; the Foreign Intelligence Surveillance Act, as amended; Executive Order 12333, as amended, and any subsequent Executive Orders on Intelligence Activities; Executive Order 1323 l . as amended, and any subsequeot Executive Orders on Homeland Security, Guidelines Regarding Disclosure to the Director of Central intelligence and Homeland Security Officials of Foreign Intelligence Acquired in the Course of a Criminal Investigation, dated September 23. 2002; and Guidelines for Disclosure of Grand Jury and Electronic. Wire. and Oral Interception Information Identifying United States Persons, dated September 23 , 2002 . To the extent thar this Agreement provides for more expansive infonnation sharing than othc:r authorities or agreements, with dtc exception of statules. or Presidential Directives including, but not limited to. Executive Orders, ("Presidential Directives"), the more expansive provisions of this Agreemenr shall be foUowed . - I • 2. Definitiogs..~or purposes of this Agreement: (a) "Analytic conclusion" m~ns the product of an~ysis of one or rttore pieces · of information in which inferences are drawn from the 1riformation ~ing analyzed to arrive at a determination about a fact - such as, for example, a potential threat'"" that is not explicit or apparent from the face of the original information itself. It does not include, for example, a swnmary of the factual content of a piece of intelligence information, a report of an interview, or a report or other document that merely collects and summarizes information from multiple sources abQut the same or related topics, or other types of communication which do not include analytic conclusions as describ(!() above. · (b) "Attorney General" means the Attorney General of the United StatcS or the Attom~y General's designcc, except ns otherwise provided herein. (c) "Classified infonnation" means information that has been deterrnin~d pursuant to Executive Order No. 12958,.or a_ny successor order, Executive: Order NQ. · 12951, or any successor order, or the Atomic Energy Act of 1954 {42 U.S.C. 201 I), to require protection against unauthorized disclosure. • (d} "Covered entity" means~ any department, agency, bureau, office.or other entity lhal is, or becomes, wholly or in par1, an element of the Depanmenl of tt:omeland Security (including the Department itself); any department, agency, bureau, office or other entity that is, or becomes, wholly or in part, an el~ent of lhe United Sta~es Intemgence Community or the Departmcnl of Justice; ~d any other depamnent, agency, or entity having federal law.enforcement responsibilities. (c) "Covered information" means terrorism infonnation, weapons of mass destruction (WMD) infonnation, vulnerabilities infonnation. and other information relevant lo the duties of the Department of Homeland Security, as well as analy~es based wholly or i_n part on such covered information. (f) "Department" or ..OHS" shall mean the Department of Homeland Security and any entity that is, or becomes, an element of that Department. · (g) "DHS Legislntion" means the Homeland Security Act of2002 (H.R. 5005 , l 07th Congress, 2d Session) (November 26, 2002), as it may be amended from'. time to time:. (h) "OCI" means lhe Director of Central Intelligence, or, except as 9therwise provided herein, the Del's designee, in his or her capaeily as bead of the lntelligence Community, and as head of the Central Intelligence Ag!!ncy. • (i.) "Foreign intelligence" has the meaning given to that tenn in sec~ion 3 of the Nacional Security Act of 1947, as amended (50 U.S.C. 40 I a), as that statutory term m3y be amended from time to time. ' 2 (j) "Homeland" means the United States as defined in the OHS Legislation. (k) \'Infrastructure'' means the basic systems, assets, facilities, services, and installations needed for the functioning of our society. The tenn includes, but is not limited to, critical infrastructure, meaning systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on United States national security. economic security, national public health or safety, or any combination of these. Critical infrastructure includes, but is not limited to, agriculture, food, water, public health, emergency services, government, defense industrial base, infonnation and telecommunications, energy, transportation, banking and finance, chemical industry and hazardous materials, postal and shipping, and national monuments and icons. ·· (I) "'Infrastructure information" means all information related to the identification. status, security, criticality, risk assessment, vulnerability to all means of attack, interdependency, and attack consequences (including potential impact on public health or safely, the economy, national ~curity, govemance and public confidence) of the infrastructure of the United States. (m) "Jntelligence Community" has the meaning given it in section 3(4) of the National Security Act of 1947 (50 U.S.C. 401a(4))~as it may be amended from time lo time. (n) "Need-to-know" means a detennination made by an authorized holder of classified infonnation, or sensitive law enforcement information, that a prospective recipient requires access to a specific piece, or category of information in order to perform or assist in a lawful and authorized governmental function . • (o) "Parties" means the signatories to this Agreement and their successors, on behalf of all covCTcd entities they head, supervise or represent. (p) "PATRIOT Act" means the Uniting and Strengthening America by Providing Appropriate Tools Req\lired to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 , Pub. L. 107~56, 115 Stat. 272, 278-81. (q) "Secretary" means the Secretary of Homeland Security or the Secretary's · dcsigncc. except as otherwise provided herein. (r) "Terrorism information" means all information relating to the existence, organizaLion, capabilities, plans, intentions, vulnerabiJities, means of finance or material support, or activities of foreign or international terrorist groups or individuals, domestic groups or individuals involved in terrorism , to threats posed by such groups or individuals to the United States, United Stares persons, or United Stales interests, or to those of other nations, or to communications between such groups or individuals, and to 3 • I • information relating to groups or individuals reasonably believed to be assisting or associated with them. (s) ..Vulnerabilities information" means all information relating to ~he susceptibility- actual, perceived, or conceptual - of the United States, including any portion, sector~population, geographic area, or industry, to terrorist attack. (t) "Weapons of Mass Destruction infonnation" or "WMD information" means terrorism information or wlncrabiHties infonnation relating to conventi~nal explosive w~pons and non-conventional weapons capable of causing mass casualties and damage, including chemical or biological agents, radioactive or nuclear materials, and the means to deliver them. 3. Policies and Procedures for Information Sharing, Handling and Use. Consistent with the DHS Legislation, and except as otherwise specifically provided in this Agreement, the following agreed-upon policies and procedures shall apply to the provision of covered information by any covered entity to any other covered entity, to the interpretation of aJI provisions of this Agreement, and to the resolution of all issues related to informatioo sharing, handling and use, and the coordination and deconfliction of operations and analytic ·c onclusions: • •• (a) Priority on Preemption. Prevention. a,rd Disruption. All procedures, guidelines, and mechanisms under this Agreement shall be designed and implemented, · and a11 detenninations with [egard to sharing infonnation covered by this Agreement shall be made, with the understood, overriding priority of preventing, preempting, arid disrupting terrorist threats to our homeland. The partic:'s recognize and agree that, in some cases, this priority shall dictate infonnation sharing even where doing so may affect criminal prosecutions or ongoing law enforcement or intellige11ce operations. · · . Nonetheless, the covered entities shal1 act under this Agreement in a manner to·protect, to the greatest extent possible, these other significant interests, including the protection of intelligence and sensitive law enforcement sources and methods, other classified information, and sensitive operational and prosecutorial infonnation. (b) Reciprocity and Transparency. All information collected by any covered entity relevant to the missions and responsibilities of any other covered entities,should be shared, to the greatest extent possible. b~ween and among all covered entities. Likewise. the parties agree that, to the greatest extent possible, there should be transparen~y between and among the covered entities with regard to their activities to preempt, prevent, and disrupt terrorist attacks against .U.S. persons and interests. Except as otherwise specified in this Agreement, or mandated by relevant Federal statutes or Presidential Directives, procedures and mechanisms for infonnation sharing, use, and handling shall be interpreted and implemented consistently and reciprocally regardless of the role a particular covered entity plays as a provider or recipient of covered information. Jn other words, for example, international terrorism information collected by the Border Patrol should be shared by DHS with the IC to the same extent foreign intelligence information on terrorism is shared by the IC with DRS. · 4 (c) Scope of "Covered Information." Consistent with the priority established in Section 3(a}, information relating to terrorism, Weapons of Mass Destruction, vulnerabilities, or other functions of the Department of Homeland Security shall be presumed to be ..covered information" under this Agreement. If, after applying this presumption, disagreement remains between covered entities about whether particular infonnation is "covered infonnation," such disagreement shall be resolved pursuant to Section 4(d). (d) Effective date ofinformation sharing obligations. Notwithstanding provisions of this Agreement mandating further agreement on mechanisms, procedures, or other issues, the parties recognize that the obligation to promptly begin the full 'range of information sharing mandated by the DHS Legislation came into force on January 24, 2003, and that obligations under this Agreement will be in force upon the signature of all parties. (e) Sharing Requiremems Based on Substance Only. Consistent with the DHS Legislation and other relevant statutory authorities, Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, anti this Agreement, the parties agree that this Agreement requires that covered information, including, but not limited to, terrorism infonnation, WMD infonnation, infrastructure, and vu[nerabilities information, be provided by any covered entity that collects or anelyzes that infonnation to any other covered entity that has a necd-to•know that infonnation (or information relating to that subject matter), based on a broad interpretation of the mission of the other covered entity, regardless of: • (i) The tyPe of communication in which the infonnation is incorporated. Covered information must be provided as required in this Agreement regardless of the type of communication in which it is originally reported by the providing agency. The fact that particular covered information may he contained originally in a particular type of communication shall not, under any circumstances, be grounds either to withhold or delay the sharing of any covered information. As illustrative examples only, covered information must be provided by CIA, within the time frames agreed to, whether such information is contained originally in communications referred to as "TDs." ..intel cables," ''ops cables," or any other t)'pe of communication. Likewise, covered infonnation must be provided by the FBl, within the time frames agreed to, whether such -infonnation is contained originally in communications referred to as "302s," "ECs," .. LHMs." or any other type of communication; (ii) The manner in which the information is or may be conv~yed to the intended agency or individual recipients. Covered entities shall continually endeavor to improve technological means of access to afford maximum flexibility, speed, and volume of information shared. consistent with the strictly necessary protection of intelligence or sensitive law enforcement sources and methods, and with section 3(.i} and other relevant provisions of this Agreement. 5 ~ .., I • • (f) Terrorist Threar Integration Center. The parties agJ"ee ~)t.at. when fully operational, the Terrorist Threat Integration Center (TflC) shall be the preferr~, though not the exclusive, method fQr sharing covered. information at the national level: TflC information-sharing mechanisms and procedures shall be consistent with the DHS Legislation and other relevant statutory authorities, Presidential Directives, the President's annoW1ccd policies for protecting against terrorise threats to the homeland, and this Agreement. As soon as practicable, the parties shall determine the extent to which provision of information to one or more covered entities via the ITIC inay constitute the only required method for providing such infonnation to such entities, provided however, that any_decision to share covered information among the parties solely by means of the TflC shall be memorialized in a separate written agreement executed by the parties, including by designees of the officials signing this A gr.cement. Analytic conciusions contained in TflC products sliall 'not be altered by agencles prior to dissemination. (g) . Policies for Sharing Particular Types ofInfonnation With DHS. Consistent with the OHS Legislation and other relevant statutory authorities, Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, and ttais Agreement, the Secretary shall be provided access to·au infonnation necessary for him to carry out the mission of the Department. Ex.c,ept as otherwise directed by the President, the parties agree that the amount of info~ation and depth of detail of infonnation provided to the Secretary, which will vary by the type of information at issue, will be governed by the following policies: (i) lnfpnnation Related IO Threats of Terrorism Against the United States. As required by the OHS Legislation, OHS shall be provided, without request, all ..reports (including infonnation reports containing intelligence which has not been fully evaluated), assessments, and analytical infonnation." The parties understand lh.nt, in this category, excepl upon further request by .OHS, and agreement by the originating entity. provided information will not routinely include infoJmation, collected through intelligence sources or methods, or sensitive law enforcement sources or methods, which has not been processed in any way to reduce the amount of substantive content or synthesize the material. Thus, for example, a recording of a conversation intercepted under the foreign lntelJigence Surveillance Act (FJSA) or an intelligence officer's or FBI agent's hand-written notes of a discussion with a source would not be routinely provided in this category. By contrast, a report forwarding the substance of a FISA~ recorded conversation, or an FBl "Electronic Communication" (EC), including the substance of a discussion with a source, even if.these include verbatim quotes from the underlying notes, would be provided. ECs containing substantive information, along with "302s," "TDs," "URs,'' and all other similar dobuments including substantive information, fall into the category of infonnation to be provided. The parties agree, as soon as practicable, to identify and/or put into place necessal)' and reasonable mechanisms, including, when operational, the TflC, along with the Joint Terrorism Task For<;es (JTIFs), and procedures, to ensure that DHS receives all such information automatically. under the .policies 6 and procedures agreed to in this Agreement, without further request. ., (ii) Vulnerabiljtjes lnfonnation. As required by the OHS Legislation, DHS shaJI be provided, without request, all infonnation of any kind concerning "the vulnerability of the infrastruchlre of the United States; or other vulnerabilities of the United States, to terrorism, whether or not such infonnation has been analyzed." The parties Wlderstand that, in this category, without further request by OHS, provided information will routinely include information, collected through intelligence sources or methods, or sensitive law enforcement sources or methods, which has not been processed in any way to reduce the amount of substantive content or synthesize the material. Provided information will include all types of infonnation, without regard to the distinctions drawn by way of . . example in Section 3(gXi), except as further agreed to by the parties or their designees. The parties agree, as soon as practicable, to identify and/or put into place necessary and reasonable mechanisms, including, when operational, the TT[C, along with the JTIFs, and procedures, to ensure that OHS receives all such information, under the principles agreed to in this Agreement, without further request. (iii) lnfonnation Relating to Significant and Credible Threats Qf Terrorism. As required by the DHS Legislation, OHS shall be provided, without request, all information of any kind concerning ..significant ~nd credible threats of terrorism against the United States, whether or not such infonnation has been analyzed ." The parties wtderstand that, in this category, without further request by DHS, provided infonnation will routinely include infonnation, collected through intelligence sources or methods, or sensitive law enforcement sources or methods, which has not been processed in any way to reduce the amount of substantive content or synthesize the material. Provided information will include all types of info1111ation, without regard to the distinctions drawn by way of example in Section J(g)(i), except as further agreed to by the parties or their designees. The parties agree, as soon as practicable, to identify and/or put into place necessary and reasonable mechanisms, including. when operational, the TTJC, along with the JlTFs, and procedures, to ensure that DHS receives al I such infonnation, under the principles agreed to in this Agreement, without further request. (iv) Other Information Requested hy the Secretary. The Secretary shall be provided, upon request, with such other information relating to threats of terrorism against the United States or to other areas of OHS' responsibility, whether or not such information has been analyzed. The parties understand that DHS will be provided infonnation in this category upon request including, if so requested, infonnation which hns not been processed in any way to reduce the amount of substantive content or synthesize the material. If so requested, provided infonnalion will include all types of infonnation, without regard to the distinctions drawn by way of exl\mple in Section 3(g)(i), except as otherwise directed by the President. The parties agree, as soon as practicable, to set up 7 • IA .. • ne~ry and reasonable mechanisms, including, when operational, th~ TTlC, atong with the JITFs, and procedures, to ensure that OHS, when requested, receives all such infonnation, under the principles agreed lo in this Ag;eement. . (h)· Timely Sharing oflnfomtation. Covered infonnation must be provided to those with a need-to-know that information (or infonnation relating to that subject matter), based on a broad interpretation of the mission of the other covered entity, as quickJy as possible. Providing sll timely and relevant covered infonnation to those who have a need-to-know it in order to assist them in meeting their homeland secm;ity-related responsibilities is fundamental to the success of the Department and all other efforts to ensure the security of the homeland from terrorisr attack. Delay in pi:-oviding sµch infonnation risks frustrating efforts to meet these critical responsibilities and could result in preventable attacks against U.S . persons or interests failing to be preempted; prevented, or disrupted. Accordingly, except as otherwise directed by the President or agfeed to by all parties, the parties agree that: {i) lnfonnation that a covered entity reasonably believes relates to a potential terrorism or WMD threat. to the United States homeland, its infrastructure, or to United States persons or interests, shall be provided immediately to other covered entities; • (ii) Other covered information, including, but not limited to, vulnerabilities infonnation, but which a covered entity does not reasonably believe relates to a potential terrorism or WMD threat to the United States homeland. its infrastf'\lcture, or to United St~es persons or interests, shall be provided as expeditiously as possible; (iii) Under no circumsrances may covered information be withheld from a covered entity with a need-to-know that information (or information relating to that subject mattc:r), based on a broad imerpretation of the ~ission of the other covered entity, or may the sharing of such infQrmarion be delayed beyond the time frames agreed to in this Agreement, except as consiste_n t with the Section 4{d), or other relevant provisions of this Agreement; (iv) When a question arises as to whether covered informati'on must be provided to the Department or any other covered entity pursuant 10 this[ Agreement, the parties will resolve the question pursuant to Section 4( ~); (v) Covered entities agree to use, to the greatest extent possible, the most rapid methods ofinfonnation sharing, consistent with the strictly necessary protection of intelligence or sensitive law enforct!!ment sources and methods, and with Section 3(a) and other relevant provisions of this Agreement; and • (vi) Consistent with Section 3, and olher relevant provisions of this Agreement, the parties agree that they shall work dilig~tly to ensure th'i'it all covered entities receive the SM'le information within the same time frame, 8 • • Agreement, to withhold in its cntirety ·a commwucation containing covered information. such indication shall occur immediately. (v) The parties agree that the provisi·o ns of this section shalJ;nol apply to established source protection procedures utilized by C[A's Directorate of Operations. or equivalent procedures developed and used by other covered entities, provided that such procedures do not result in the failure to provide DHS with substantive information as required under the OHS Legislation and this Agreement, and that the Secretary may personally request revisions in such procedures ifhe detennines that they restrict DHS' access to information in a way that jeopardizes DHS' mission. For information described in Section 3(i)(i), such procedures shall be revised, as ~on as is practicable, and without request from the Secretary. to ensure that those procedures·only remove such intelligence that clearly identifies, or would reasonably pcnnit ready identification of, intelligence or sensitive law enforcement sources or methods that are particularly susceptible to countenneasures that would nullify or measurably reduce their effectiveness. (j) Requesr.s for Additional Information . In addition to the participation of DBS in the "requirements" processes, as discussed further herein, the OHS Legislation provides for DHS to request additional or follow-up information upon receipt of individual items of information. As soon as practicable, the parties shall agree .'to mechanisms and procedures, including the lTlC, JITFs, and, if appropriate, focal points, for DHS to make, and covcrc:d entities to respond to, such requests. These mechanisms and procedures shall be designed to facilitate the greatest amowit of additional infonnation sharing consistent with strictly necessary protection of intelligenc~or sensitive law enforcement sources and methods, with Section 3(a) and other refevant provisions of this Agreement, and with the timeliest possible responses to requests for additional information. (k) Information Use Restrictions. In general, parties shall disclose covered information free of any originator controls or information use restrictions. Several categories of covered information that must be disclosed to covered entities pursuant to the OHS Legislation, this Agreement, and other authorities, remain subject to special labeling, handling, storage, use and access auditing requirements imposed by stiitute or, to the extent consistent with the OHS Legislation, Presidential Directives, the President's announced policies for protecting against terrorist threats lo the homeland, and this Agreement, pursuant to applicable regulations. The scope and duration of such restrictions, including caveats restricting use of the disclosed information to a particular level or element of a covered entity. will be tailored to address the particular situation or subject matter involved. \\'hen imposed, use restrictions shall b~ no more restrictive than strictly necessary to accomplish the desired effect. (I) Secondary J11formation Sharing. To the e:>ttenl consistent with this Agreement, covered entities may share infonnation provided by other covered entities with additional covered entities. Such secondary sharing shall be carried out, to the greatest extent possible, in manner that pennits the originating agency to know to a 10 ·whom the information has been provided. The parties shall agree, as soon as is practicable, upon recommendations, if any, for changes co Executive Order 12958, Director of Central Intelligence Directive 6/6 (and complementary or successor directives dealing with Originator Controls, 1he so-called "third agency rule,"' and other policies or procedures governing the sharing of received information with additional recipients) in order to comply with the DHS Legislation, and to carry out the President's announced policies for protecting against terrorist threats to the homeland, and the provisions of this Agreement. (m) Other Obligarious to Share Information. A covered entity's voluntary or obligatory provision of covered information to another covered entity does not in itself discharge or diminish any other obligation the -providing entity may have to provide that information, or any part of it, to any other department, agency or other public or private organization or individual uoder aoy statute, Presidential Directive, or other agreement. Although all covered entities will attempt to identify and call attention to infonnation relevant to the.mission of other covered entities, the responsibility to share infonnation relevant lo the mission or responsibilities of any covered entity in addition to DHS remains the responsibility of the originator or initial federal recipient of the information and does not shift to DHS by virtue of DHS • receipt of the infonnation. The parties agree, however, that, to the greatest extent possible, other sharing obligations shall be harmonized and coordinated with those covered by this Agreement, including the agreed preference for using the TTIC and JITFs as information-sharing mechanisms, in order to reduce duplication, facilitate dcconfliction, and increase efficiency. (n) PATRIOT Act Information. Law enforcement-related infonnation related to OHS mission, _permitted or required to be provided to intelligence agencies under the PA TRI OT Act and its implementing guidelines shall also be considered covered information under this Agreement and shall. therefore. be provided to the Department and other covered entities, in accordance with the OHS Legislation and other relevant s tatutory provisions 1 and this Agreement. • (o) Other Intelligence Information. Nothing in this Agreement shall be read to restrict the access of the Secretary or his designee to information the Secretary ordinarily would receive as a member of the Intelligence Community. including national security and foreign intelligence information. (p) Information Sharing Mechanisms . As soon as practicable, the parties shall agree µpon specific mechanisms, consistent with Section 3 and other relevant provisions of this Agreement, for how different types of cover~ infom1ation will be shared, including technical and administrative arrangements, and, as appropriate, designation of focal points, to maximize the effectiveness and coordination for providing covered information. Subsequent arrangements for infonnation sharing may he reached upon the approval of the parties or their designees. The parties shall work to develop, as pa11 of this process, effective mechanisms for covered entities to identify covered information held by them and to ensure, to the greatest degree feasible, the provision of such information, without specific request, to othi,r covered entities. The parties further agree 11 • I ~ 'O • that, notwithsWlding their agreement to develop further mechanisms and pro~dures for information sharing, covered entities shall promptly build on mechanisms and procedures already-in place to identify and provide to DHS c(ivered infonnation chat is generated or received by them in the course of carrying out their missions. • (r) Responsible Officials for Information Sharing. t:nfil such lime as modified by rhe parties, the responsible otlicials for infonnation sharing under this Agreement are as follows: ( q) Methods ofProviding information. The parties rc:cognize and agree that there arc many possible methods for "providing.. infonnation, including. but not limited to, hand-delivery, oral briefings, transmission by secure data-link, and affording routine and unrestricted access to computmzed databases, including the ability to tr~fcr such information to a recipient entity as necessary, and by fuJJ and complete co-location of analysts or other pe{'S()nnel and full integration of, and access to, information, as well as. for example, ensuring that the Secretary receives all daily threat briefing materials (including threat matrices and overnight rcpons). The parties further agree that requirements lo ..provide'' infonnation under this Agreement may be satisfied, depending on the type of information at issue, by the use of a single mechanism, such as via the TTIC, consistent with scclion 3{t) of this Agreement, or a combmation of mechanisms already in place and/or cceated under this Agreement. The parties shall agree, as part of the development of these mechanisms and procedures, as to which method, or combination of methods, of providing infonnation will be sufficient for panicular types or categories of information. (i) For the Secretary of Homeland S<!curity, the Undcrsccreiary for Information Analysis and lnfrastructure Protection, or another individual designated by the Secretary to act in this capacity; (ii) For the Attorney General, Executive Assistant Director for Countertcrrorism and Counterintelligence; and (iii) For the Director of Central Intelligence, the Associate Director of Central lntelJigencc for Homeland Security. (s) ProJ.•ision of Covered h,formalio11 to the DHS Direcrorate of Information Analysis and lnfrastruch,re Protection. Until furtht:r a·g reement by the parties, or their designees, a11 covered information provided, including infoimation provided, under current procedures, to existing elements transferred to OHS, e.g., the United Stales Coast Guard and the lJ.S. Customs Service, shall also be separately provided to the Directorate of lnfonnation Analysis and Infrastructure Protection, including, if agreed by the Secretary, via the ITIC. The Undersecretary for lnfom1ation Analysis and Infrastructure Protection, or another individual designated by the Secretary to act in this capacity, shall work with entities nor within the Directorall: to ensure effective coordination of information. I:? 0 ::s 0.. $<. Vi Classified Information. The head of each covered entity shall put procedures in place to ensure that each individual recipient of classified infonnation has, and maintains. appropriate security clearances, training, and need-to-know to receive classified infonnation at the level at which the recipient will receive such information. Individuals shall be designated at each covered entity at several Jevels of seniority to receive classified information judged by the originating agency to be sufficiently sensitive to require limited distribmion. In rare cases, the parties expect that extremely s~nsitive infonnation may be provided only to the Secretary or, as appropriate. the head of another covered entity. The head of each covered entity also shall ensure that all mechanisms and procedures for receiving, storing. and handling classified infonnation meet established legal and regulatory standards. The policies and procedures governing access to covered information under this Agreement, including such infonnation that is classified, shall apply without regard to whether that information is made availabJe in written, oral, or electronic form, OT to the means or mechanism by which it is communicated to the recipient. {t) (u) Thresholds. In order to ensure that the Department is provided with all information necessary to carry out its responsibilities, but is not inundated with unmanageable volumes of information below thresholds reasonable to perfonn its mission, as soon as practicable, the Secretary shall advise the other parties, individually or collectively, as to establishing additional thresholds for information sharing, consistent with the DHS Legislation. For example, the Secretary may determine that low-level information concerning purely indigenous foreign terrorist groups with no apparent capability to mount operations against the United States is not relevant to OHS' mission. Such further agreement sha11 be consistent with the DHS Legislation and other relevant statutory authorities, Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, and this Agreement. At any time following such initial agreement, the parties may agree to additional information sharing, or to more or less restrictive thresholds, as the volume of information involved and the needs of OHS become clearer, so long as such agreements are consistent with lhe OHS Legislation and this Agreement. Such agreements may be made by designees of the parties. • (v) Privacy. All infonnation sharing pursuant to this Agreement shall be consistent with applicable privacy laws. 4. Coordination, Dcconfliction, and Dispute Resolution. Coordination and Deconflicliorr Policy. Consistent with the President's direction that our highest priority is the protection of the American people from potentially devastating terrorist attacks. covered entities shall take all necessary measures to ensure that terrorist threats to our homeland are addressed cooperatively, efficiently, and with the understood overriding purpose of preventing, preempting, and disrupting those threats. To that end, the parties agree that no homeland security-related prevention, preemption, or disruption activity of any covered entity shall be presumed to be the best optjon in any given case, or otherwise deemed of higher precedence, impo1tance, or {a) 13 • I • • priority than any other such activi_ty. The covered entiti_e s shall work together, io the greatest extent possible, to achieve, in each case, the maximum preventative, preemptive, and disruptive effect on potential threats, including coordinating simultaneous and · complementary activities of multiple covered entities when appropriate. Because the failure to coordinate operational activities to preempt, prevent, and disrupt terrorist threats can (.."J'eate_confusion, inefficiency and, in extreme cases, dangerous silu~tions resulting from conflicting operational activities, the parties agree to coordinate. operational activities to the greatest possible c:dcnt. Specifically, each party shall take all reasonable steps to ensure coordination and decontliction of homeland security-related law enforcement, intelligence or national security-related activities of covered entities under that party's.authority with such activities of other covered entities. (b) Ana(vtic Conclusions and Supporling Information. Terrorism c.Jld other homeland-security related analytic efforts of all covered entities must be informed by the most comprehensive, accurate, and timely information available, regardless of ils nature and source, including. but not limited to, terrorism, WMD, vulnerabilities, and .other pertinent information available to any covered entity. Analytic conclusions relating to terrorist or WMD threats to the homeland, or other issues within the responsibility of OHS, including information updating and amplifying previous conclusions, must be · shared with all covered entities as soon as they are produced. Preemptive, preventative, a11d disruptive actions by all covered entities must be infom:ied lo the greatest ~xtent possible by all available information and by alJ analytic conclusions, including.competing e<>nclusions, of all entities with relevant analytic responsibilities. At the same ~imc, the Federal government must, to the greatest extent possible, speak with one voice to state and local officials, private industry, and the public, in order to prevent confusion, mixed signals, and, potentially, dangerous operational conflicts. In furtherance of th~e goals, the parties agree as follows: · (i) The parties shall ensure that covered entities disseminate thear terrorism or other homeland security-related analytic products without aetay to other covered entities that hav~ related interests and responsibjlities; (ii) Except as otherwise provided in Sections 4(bXiii) or (h_r). no analytic conclusions, as defined in Section 2(a) of this Agreement, of any covered entity shall be disseminated to stat~, local, or private sector officials. or lo the public, without the prior approval of the Secretary of Homeland Security, his designee, or in accordance with approval mechanisms, potentially including the TIIC or the JTTFs, established by the Secretary after the date of this Agreemeni. (iii) Analytic conclusions may be provided directly to such officials or to the public where the head of a covered entity or his or her designcc reasonably detennines lhal exigent circumstances exist such that providing an analytic conclusion prior to required approval is necessary to prevent, preempt, or disrupt an irnmim:nt threat of death or serious bodily injury or significant damage to U.S . infrastructure or other interests. In the event an analytic conclusion is · disseminated pursuant to the exige_nt circumstances exception in this paragraph, 14 the Setretary and other covered entities shall be notified immediately of the dissemination. (iv) Analytic conclusions may be shared with federal, slate, and local law enforcement officials without the prior approval of the Secretary of Homeland Security, provided, however, that it is the intention of the parties that OHS be provided with the earliest possible advance notice of the potential of such communications and, where possible, DHS will be included in the development of the communications through the OHS liaisons at FBI Headquarters. The Secretary of Homeland Security, or his designce (including a DHS representative to a JTTF if designated by the Secretary to do so}, must approve further dissemination of such analytic conclusions to other non-law enforcement state and local officials or to the public. (v) Nothing in this Agreement shall prevent covered entities from coordinating on analytic conclusions with, or seeking the views of, other Federal Government entities in evaluating terrorism or other homeland-security-related infonnation. ( c) Establishment ofMechanisms for Operational Coordinalio11 011d Deconjliction. As soon as practkable, the parties shall agree upon specific mechanisms, including technical, administrative, and, as appropriate, designation of focal points, to maximize the effectiveness of operational coordination and deconfiiction. These will cover both averse~ and domestic operations related to homeland security. Subsequent agreements for operational coordination and deconfliction may be reached upon the approval of the parties or their designces. • (d) Information Sharing Dispute Resolution. Consistent with the DHS Legislation and other relevant statutory authorities, Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, the obligation to protect intelHgence or sensitive law enforcement sources and methods from unauthorized disclosure, and with Section 3(a}, and other relevant sections of this Agreement, issues concerning the application of the_terms of this Agreement in any speci fie contexl with respect to whether particular covered information should be provided to the Department or to any other covered entity shall be handled under the following procedures: (i) A holder of particular covered information at issue, whether within or outside the entity originating that infonnation, shall refer the matter by the most expeditious means to the head of the entity originating the infonnation (or that official 's designee) for expeditious review. (ii) The revi~wing official shall, without exception, render a definitive decision on the requc.o;t within 24 hours of receiving the referral and , in light of the access provisions in the OHS Legislation, shall resolve any doubl in favor of - I • providing the requested information . (iii) If the originating agency's reviewing official declines to provide the covered information requested, that official shall, within the 24 houi-s alloUed for response, provide the Department or other covered with (A) the fact that the specific infonnatioo is being withheld; (B) a succinct and specific statement of the reasons for the withholding: and (C) as much of the information requested as the head of the originating agency (or that official's designec) reasonably concludes can be provided given the Pr~ident's announced policies for protecting against terrorist threats to the homeland. the DHS Legislation aml other relevant statutory authorities, and relevant Presidential Directiv~. (iv) If, at that point, a compromise is not reached expeditiously, the dispute will be resolved either by the Secretary, Attorney General, and DCI by mutual decision or through referral to the Assistant to the President for National Security Affairs and Assistant to the Prc:sident for Homeland Security Affairs, or their designees, for resolution. Notwi1hstanding any other provision of tl1is Agreement, the Attorney General, Secretary, or OCI, or their deputies may, whenever any of them deems it necessary or advisable (particularly when a fundamental matter of policy is implicated or time is of the ~ssence), intervene to raise and resolve any issue of access to covered infom1ation by mutual decision or through the National Security Council and/or Homeland Security Council system. (e) NSPD-8. Nothing in this Agreement in any way affects the responsibilities and authorities for coordination of United States counter-terrori'sm activities established in National Security Presidential Directive (NSPD) 8. 5. Protection of Intelligence and Sensitive Law Enforcement Sources and Methods. The parties intend that all provisions of this Agreement be interpreted consistently with the DCI's statutory responsibility to protect intclligen~ sources and methods from unauthorized disclosure and with similar responsihilities of the Attorney General and the Secretary to protect sensitive law enforcement sources and methods, with the OHS Legislation and other relevant statutory authoritie.,;, Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, and with Section 3(a), and other relevant provisions of this Agreement. Consistent with this agreed-upon interpretation: ( a) The DCI shall ~arry out his responsibilities for the protection of intelligence sources and methods, and the Secretary and Attorney General shall carry out analogous responsibilities for sensitive law enforcement sources and methods, in a manner, and through mechanisms, that ensure that all covered infonnation is ma.d e available promptly to the Department, and to other covered entities with a need-to-know and prop~r security clearances and handling procedures in place, subje.;t only to such handling and use restrictions as are strictly and unavoidably necessary to protect 16 intelligence and sensitive law enforcement sources and methods from unauthorized disclosure. (i) The DCl shalt ensure that the substance of all covered information relevant to the responsibilities of all covered entities is provided to those entities in a fonn suited to their effective use of that infonnation, consistent with lhe DCl's obligation to protect intelligence sources and methods from unauthorized disclosure and Section 3(a) of this Agreement. The Secretary and the Attorney General shall similarly ensure that the substance of covered information is provided in a suitable form . (ii) The DCI shall ensure that dissemination of classified reporting based, who11y or in part. on covered information, is accompllnied by dissemination of as much of that reporting and covered information as is possible at an unclassified (which may, when necessary, be marked "Sensitive-but-Unclassified" or ''SBU") or reduced classification level, in order to ensure the broadest possible · availability and use of covered information by those with a need-to-know that information (or infonnation relating 10 that subject matter}, based on a broad interpcetation of the mission of the other covered entity.: The Secretary and the Attorney General shall similarly ensure that dissemination is done in a manner that ensures the broadest possible availability. (b} information may be redacted or put into a tailored product to lhe extent consistent with Section 3(i) of this Agreement. (c) Nothing in this section relieves any member of the Intelligence Community that originates covered information from its obligation to provide that information to DHS and other covered entities, as appropriate, in a form consistent with this Agreement, the OHS LcgislaJion. and other relevant statutes and authorities regarding the protection of sources and methods. 6 . ''Sanitization" and Modification of Classificatjon Levels for Further Sharing by DHS. (a) Consistent with the President's announced policies, our national priorities, including this section, Section 3(a), and other relevant provisions of this Agreement, the OHS Legislation and other relevant statutes and Presidential Directives, covered entities that originate covered information that is classified shall retain the authority to detennine whether that information, or any portions thereof, must remain classified in the interest of national security. ( i) Covered entities shall ensure that covered information that is classified or otherwise subject to restricted dissemination, but which reasonably appears likely to require onward passage to state, local, or private sector officials, the public, or other I.aw enforcement officials for use in a criminal investigation, reaches DHS promptly with accompanying high-content "tear lines" suitable for onward passage at an unclassified level. Until this can be achieved 17 •. • simultaneously to the transmission of covered information, the development of such h:arJincs shall not delay the provision of covered information. ! (ii) The parties shall ensure, to the greatest extent possible. that covert:d entities utilize agreed-upon standardized formatting for preparation of tear-line material for passage 10 stale, local, or private sector officials, including state and local Jaw enforcement ofticials for use in a law enforcement investigation, or to the public, with the goal of providint necessary substantive infonnation, but not enabling recipients to determine the originator, within the Federal government, of the information. DHS may, on its own initiative or at the n::que.st of a homeland security official 10 whom covered information is disseminated, ask that the originating agency (b) declassify or reduce the classification level attached to that information in order to pcnnit dissc:mination to additional officials who have a need-to-know the information, to promote case of handling by those authorfaed lo review it. to pmnit its incorporation into a document that is unclassified or classified at a lower level, or for other purposes consistent with the need promptly to provide homeland security offo;ials with all relevant covered infonnatiun ,hat the)' have a need-to-know in the conduct of their official duties. Whene,·cr it receives such a request, the ong.inating agency shall respond to DHS, wi1hin 24 hours (or such longer period as is agreed to by all parties). unl~ss cvmpclling circurm,tances exist to require: a longer response time. Such response will t:ithc;r (i) agree to declassify or reduce the classification level of the covc:n:d information in question as reque.o;tcd; or (ii) provide an alternative formulation responsive to the requester's nc:ed for additional information sharing, but without declassifying or reducing the classification of the original document or covered information where that cannot be done consistent with assuring the national security. (c) Where the need by DHS for further dissemination of classified infonnation rt:cei\:ed from other covered entities, including Uuough declassification or the preparation of unclassified tear-lines, i~ urgent because that information contains or may contain terrorist threat indications critical to the ability of homeland security officials to prevent, prcempl, or disrupt a possible terrorist attack, lhnl information may be passed directly to the entity or official that has a need•to-know that information, provided that the covere<l entity passing the information first notifies the origin.ating agency and takt:S steps reasonable under the ex.igeot circwnstances to protect whatever classified informatiou 1s not essential tu initiating the urgent h0mc:lam.l sc::curity assurance measures that may be required. (d) The parties agree to develop together, as soon as practicable. mechanisms and procedures, including lhrough the use of d~tailees and assignees to the IT[C and JlTFs, as :.ippropriate, to carry out the provisions of Section 6 . The parti~ agTee to work together to ensure that the administrative, financial. and personnel burdens of rhis secrion are shared to the greatest extent possible among covered entities. 7. Detail or Assignment of Personnel. To fac ilitate the informatmn sharing, coordination, and deconfliclion policies covered in this Agreement, covered entities shall detail , and/or assign, to the greatest extent possible. including to the TTIC and/or JTTFs, personnel who have the authority either to make classificatton review and redaction decisions themsel ves, or, consistent with the time frames established in this Agreernenl, to refer those decisions to the appropriate officials at the originating agency for prompt action. 8. OHS Participation in Requirements Processes. As soon as practicable, the parties shall modify existing mechanisms and processes for prioritization of terrorism, WMD and other relevant foreign intelligence collection (including within the United States) and requirements processes to ensure that OHS has meaningful participation at each stage and level of each such mechanism or process, including through participation in the rnc. The parties also shall work together to provide recommendations as co whether, and how, processes or mechanisms for purely "domestic'' terrorism (e.g., concerning the capabilities. plans and intentions of exclusively domestic white supremacist or militia groups), and other relevant intelligence: collection should be cre-ated or, alternatively. how to ensure meaningful participation by OHS in the prioriti2ation for gathering such information. This st:ction does not refer to operational activ ities. 9. Databases. The parties agree to establish procedures and mechanisms tO pro\·idc OHS. and . as appropriate and practicable, other covered entities. with access :o databases containing covered information. To this end, the parties shall establish a working group, with in 30 days of the date of this Agreement. Developed procedures and mechanisms, including through the use of the TTIC and/or JlTFs, should be consistent with the OHS Legislation and other relevant statutory authorities. Presidential Directives, the President's announced policies for protecting against terrorist threats to the homeland, and the appropriate needs for access by DHS 10 appropriate databases, as well as with the protection of intelligence or sl!nsiiive law enforcement sources and methods, and with Section 3(a) and other provisions of this Agreement . Such procedures and mechanisms should facilitate, to the greatest possible extent : case and speed of infonnation exchange; differentiated access, to allow individuals with different levels of security clearance and need-to-know to have different levels of access to databases; and compatibility with other databases of covered entities. I0 . Statement of Jntent Concerning lnfonnation Tes;hnojogy. 11 is the intent of the parties to build and modemi:.:e all relevant databases and other infonnation t~t::hnology systems in order to moximrzc compatibility with other systems w11h which they must interact. Such procedures and mechanisms also must comply with existing statutory and President ial Directives, including with regard to the protection of classifi~d infonna1ion and applicable pri vacy protections. I l. Handling and Storage. The parties shall ensure that covered entities within their jurisdiction observe the esrablished handling and storage standards appropriate to the classification and access restrictions indicated on covered infonnation they receive, use, and 19 • • disseminate, subject only to the provisions of this Agreement pertaining to e;,tigcmt circumstances . 12. (nfonnalion coll~led and shared b~foreign government~. This Agreement contemplates a separate Memorandum ofUndcrstnnding, consistent wi th this Agreement. being agreed to by the parties, th:it addresse..c; concerns related to information collected and shared by foreign governments. 13. Implcmcotation. (a) Each of the parties shall implm1ent their responsibilities under this Agreement as to the covered entities under their jurisdiction through such binding regulations, orders, directives, and guidance as necessary or prudent from time to time. (b) Any authority or du~y assigned herein to the Attorney General. the Secretary. or the DC[, may be delegated to one or more subordinate officials at the dis1.-retion of th~ official to ,,:horn the authority or duty is 11ssigned. except as otherwise provided in this A~eement. Each such delegation shall be promptly communicated to all 01hc:r parties. 14. No Private Rights Created. These procedures 2.re not intended to and do not create any rights, privileges, or benefits, substantive or procedural, enforceable by any individual or organization against the United States, its departments. agencies. or other entiues, its officers or c:mploy~. or any other person. 15. Counterpart Signatures. This Agreement may he signed io counterparts, each of which shall be considered to be an original . s/s Attorney General Date sis MAR04 2003 Date Director of Central Intelligence Feb. 2S,2003 Secretary of Homeland Security Date 20 ~ 'U (1) :::s 0.. x· 0\ ExecutiYe Order 13388 of October 25 2005 Further Strengthening the Sharing of Terrorism Information to Protect Americans or By the authority \'csted in me as President hy the Constitution and the laws the l nited States ur the lntdligcucc Rcforn1 ,ind Terrorism Prevention Act of 2004 (l'uhlic Law 10R--i -s). and in order to further <;trengthcn th\! cflccth·c conduct urt fnitl·d .'tatcs countertcrrorism acti\'itic. and protect the lt.!rritory. pl!Oplc. and interest th\! L" nitt:!tl ·1atc~ of America. including against terr )rist anach. it is hereby ordered us follows: Section I. Policy. Tl\ the maximum extent consistent" ith applicable law. agencies shall. in the <lc:ign and use in t<mnation systems and in the dissc:mination of information among agencies: (a) givc the highest priority t<) (i) the dctcction. prevention. di~ruption. preemption. and mitigation of the effects terrorist acti\'itics against the territory. people. and interests of the United States of merica: (ii) the interchange of terrorism infonnation among agencies: (iii) the intcrchang of Lc:rro, ism information bc t,,cen agcncic!> and appropriate authorities of. ate. loca . and tribal go\'ernml!nLc;. and hctwccn agcncic~ and approprintc pri \ ah.: st'ctor en1itks: and (i\') the protecti n of the ability of agencies to acquire additional such information: and (b) protect the frce<lom. information privacy. and other legal rights uf' 1\merican s in the conduct t1factivitics implementing subsection (a). Sce. 2. Duties of He tis of Agcnek: Po:-scssing or Acquiring Terrorism lnfonnatio11 . To imp) mcnt the p licy l!t forth in ·ccti n I of thi · rJer. the: head o caeh agency that pn ·:cssl.!s or acquircs 1:rroris1~ infonnati< n: (a) shall promptly gin! aeces~ to the !t.:rrorism infom1ation to the: hcud of each other agency that has countertcJTorism fum:tions. and pro,·itle the terrorism information to each such ngcncy. unless otherwise directc<l by the President. and cons istent with (i) the statutory responsibilities of the agencies pro\'i<ling and n.:cci1. ing the information: (ii) any guidance issued by the Attorney General to fulfi l. th:: policy ·ct forth in subsection l(b) of this ordt:r: and {iii) ,thcr applicable la\,. including sccti ns 102. ~g) anJ (i) of tht: )iational. ccurity. ct of I section IO 6 of the lntclli~encc Rcfnn11 and Terrorism Pre\'clllion :\ct of 2004 (incl ding any pl,licies. pnicc<lun::,,. guidelines. rules. an<l standards issued pursuant thereto). sections 202 and lN1 the Homdand Security /\ct r ~002 . Executive Order J2()58 April 17. 199 . as amended. and l:xccutivc <)rtlc:r 13311 of .July 19. 2003: and b} shall cooperate in and facilitnte production or reports based on terrorism inlonnation with ·ontents and forn1at: that permit db,scmination that ma x·mi:,c · the utilit~ of the information in pwtccting the lt!rritory. pet\plc. and int ·rests of the l lnitcd . ·1atc ·. Sec. 3. Preparing Terrorism lnformotion for Maximum Distribution. To assist in cxpc<litious and effcctiYc implementation by agencies of the policy set forth in section I or this or<l 'r. the or America. includinl! or or or -n. or or P;igc I of J common standards : nr the sharing of terrorism information established pursuant to section 3 ot' of August 27. 2004. shall hc used. as appropriate. in carrying out ·. , , ot· the lntdligcm:e Reform and Terrorism Pren:ntion .'\ct nf 2004. Sec -L Rcquircmcms for Collecti(,n ofTerrorism Infonnation Inside the United States. l o assist in "'xpcditious and 1:ffccti\'e implcmcnlalion hy agcm:ics of the policy set forth in section I of this order. the rccon-.mcndations regarding the establishment cxccuti,·c hranclH,·idc collection and sharin~ requirements. procedures. and guidelines for terrorism infonnation collected ,vithin the Unikd Statt:s made pursuant to section -1 of ExeeutiYc Order 13356 shall be used. as appropriate. in carrying out . · ' · . ,, the ln telligencc Reform ami Terrorism Prevention /\ct of 200-t. Sec 5. Establishment and Functions oflnfom1ation Sharing Council. {a) C\ 1nsistcnt with section 1016(g) of the lntclligcncc Rcfom1 and Terrorism Pn.-:,\:ntion Act or 2004. 1herc is hcn:by established an lnfommtion Sharing Council (Council). chaired by the Program Manager to whom section 1016 of such Act retcrs. and composed exclusively or dcsignecs of: the Secretaries of State. the Treasury. Defense. Commerce, Energy. und Homeland Security: the Attorney General : the Director of:t\ational Intelligence: the Director or the Central Intelligence Agency: the Din!ctor of the Ofiice of Management and Budget: the Director of the Federal Bureau of lnn:stigation: the Director or the :\a1ic11al Counlcrterrorism Center: an<l such other heads of <kpanmems or agcm:i ~s as the Director orl\:ational lnt<.!lligencc may designate . (b) Th~ mission of the Council is to ( i) provide advice and inti.mnation concerning the establishment of an interoperable terrorism information 5haring environment to f~1cilitatc automated sharing or terrorism information among appropriate agcm:ics to implement the policy set forth in section I of this order: and (ii) perform lhe dutic:s sd forth in section lO I 6(g) of th!! Intelligence Rd<.mn and l'crrnrism PrcYcmion Act of ~004. (cl To as5ist in expeditious and cffccti,·c implementation by agencies of the polky set (<.mh in section l of this order, the plan for establishment of a proposed interoperable terrorism information sharing en\'iromnent rt.:pllrted undl.!r Sl:!ctitin 5(c) Executi\'c Order 13356 shall hi.: used. a:,; appropriate. in carrying out of'thc lntclligem:e Reform and Terrorism Pn.:vention /\ct of 2004 . St:c. (1. Ddinitions . .-\s used in this order: I a) the 11:rm "agency" has the meaning set forth for the term '\:-xccutivc ngcncy" in sccti(m 105 of title 5. Un ited States C'ndc. together with the Department of Homeland Security. but includes the Postal Rate Commission and the L'nitcd States Postal Sen·ice and excludes the GoYcmmcnt :\ccountability Office; and (b) the term ''terrorism information" hns the meaning set fot1h for such t~rm in section 1016(a){4) of the fnlclligcncc Rcfom1 and Tc1Torism Preven tion /\ct of ~00.:t . Sci.'. . 7. Gl.:"t!cral Prtn ision5. ( al This order: (i l s hall ht! impkn11.:ntcd in a manner con~istent with applicabk la\\'. including Federal la" protecting the infonnution privacy and other legal rights or Americans. and subject tn the availahility nfappropriations: or or or Page 2 of 3 :g► (1) :::s 0. ;;t O'\ (ii) shall he implemented in a manner consistent with the authority or thi.: principal officers of agencies as heads of their rcspccti\·c agencies. including under section 199 1)f the Rc\·iscd Statutes (::!2 U .S .C. 2651 l. section 101 of the lkpartmem of Energy Organization Act (-+2 t.:.s.c. 7131 ). section 103 of the t\ational Security Act or 1947 (50 t:.s .c. 403-1). section 102(a) oflhc Homeland Security Act of2002 (6 L.S .C. I 12(a)). and sections :rn1 of title 5. 113(bl and 162(b) of title 10. iS0l of title I:- . 503 of title 28. and >0l(b) of title> 1. llnitcd States Code: (iii) shall he implcmcnlcd consistent with the ·'· ·. ,;_ .. : . , ,. •. 1•.·.1 1• · -: . nn "Strengthening lnfonnation Sharing. Access. and I11tcgrati0n Organizational. \ ·lanagement. and Policy De\·doptm:nt Structures for Creating the Terrorism lnfonnation Sharing Environment :'' (i\· 1 shall not be construed to impair or otherwise affect the functions of the Director of the Office of ).fanagement and Budget relating lo budgct. administrative, an<l legislative proposals; and (v) shall be implemcntt!<l in a mi:11mer cousistenl with section I 02/\ or the National Security Act of 1947. (bl This order is intended only to improw the internal management the Federal Gt)\'crnmcnt and is not inkndc<l to. and does not. create any rights or bcnclits. suhsuntiYc or procedural. cnforccahlc at law or in equity by a pany against the L'nitcd States. its departments. agencies. instrumentalities. or entities. its officers. cmplnyccs. or agents. or any other person. Sec. 8. Amendments and Revocation. (a) E:,ccutivc Ortkr I 3311 or July 29. 2003. is amended: ( i) by striking ''Director of Central intelligence" each place it appears and inserting in lieu thcn:of in each such place "Dircctor of Natinnal lntdligcncc" : and (ii) by striking "I (I~( c )( 7)" and inscrting in lic::u thcrcnf "I 02.'\( i I( l }". \h l of August 27. 2004. is h~rchy n:Yokcd . Pr lsigncd: I ticorgc W. Bush THE WIIITE HO{ TSE. October ~5. ~005 . Pal,!C 3 of J ~ "O (D :::l 0.. ;><. Dcpurtment of ,Justice Protocol Regarding Terrorist Nominntious -...J <!Dfftrc of ttic 1Bcputi, ~tlorncp ®rncrnl WnslJinnton, :aut. 20:150 O1:lubcr 3, 2U0H Ml;:MORANUUM FOH HEADS OF l>l~PARTMENT COMPONRNTS From : S ubject: The Deputy Attorney General Department of Justice Prolocol llcgunling Terrorist Wa!chlisl Nominations The allachccl prulm:ol reflects a new policy for the Department's internal process fiir nominating individuals !ix the Terrorist Screening Ontubasc (TSDB) . The TSIJ£3 commlidatcs the U.~ . Government's lerrorism screening and lookout databuses inlo ..\ single integrated identities database . The TSDB is nlso k1wwn as 1hc "watch list. '' Thi s protocol is designed to ensure con:;isten\ and appropriate handling of watch Iisl in f'nrmation . The protocol responds to issues raised by the report orthc Inspector General , elated March 14, 2008, entitled "/\udiL orthc U.S. Ocportmeul or Just ice Terrorist Watchlisl Nomination Processes.'' Spceilicnlly. tlrnt report rceornmcndctl !hat thc Dcpartmen ; ad<Jpt a gtme::ral policy for submissi11n of watch list nominations. lmpkrncntnti on of the allached protocol will accomplish that task . t\11 comp,mcnts nrc directed Lo comply with this protocol clfoctivc immediately . DEPARTMENT OF .I\JS'l lCE PROTOCOL REG AR DING TERRORIST W t\TCI !UST NOM lN/\TIONS A. Bacl,;ground I. On September 16, 2003 , the President directed the /\tlurncy General in I lomcland Security Presidential Directive 6 (HSPD-<i) lo "establish an organi1.atiu11 to co11solida1c the Govcrnmc nt's approm:h lo terrorism serccning nncl provide for the appropriate and law!i.tl use nf' Tcrroris1 Information in screening pniccsses. " Terrorist Information was specifically defined lo mean "individuals known or appropriutcly suspected to be or have been engaged in conduct consliluling, in preparation for. in aid or, or related In terroris m ." 2. Con current with the signing of HS PD-(,, the Me111or<md11111 of Undcr.vlc111cli11g 011 the' I11teg rotio11 and Use 11/ Scn'. ellillJ.!, lt!{ur111ario11 to l'rotC'ct ,-f>;ni11st Terrorism (TSC MC >LI), was s igned by the Secretaries or Stale and I fomcland Security, !he 1\ltorncy Uencrnl and Pagel of 5 tht Dirc<:tur of Central Intelligence (DCI) tun behalf of the entire U.S . lnlclligcm:c c·o111munity) . The T~C MOli established the Terrorist Screening Center (TSC) lo Cl'l1St>litlatc lhc (iovcrnmcnl's approach to terrorism screening and provide for the :ipprl'prialc ;ud lawful use of"Tcrrorist Information. a term cl:lriticd by tile irn: lusmn t il' Tcmlrisl ldcntiliL~rs in a subsequent agreement nf'the panics. \ lnckr HSPD -<,. the TSC •.•,• :,~ t ;1 ckvclop and m:1i11tain a database, lt' the extent pl:rmittcd by law, L '. Onlainini; lhl· 1110,;t tho rough. accurate, :md current information possible about known •.lr suspct.:tc<.l ll;rro1 i~t'.; . I ISP!).(, 1cquin.:~ that its implcmcnlatit•n be .;onsi!>ll;nt -..vith thl~ ( '. 1•mti1utio11 am! appl icabh.: luws. including those protect in!! the righL,:; of all /\111criL·,111!'t. The TSC cn:atcd the Tc:T;lr;s\ Screening Database (TSDB) w meet these g1):lls. f"llc TSDB -: unst,lidatcs th;; C.S . Government's terrorism scn:cnmg anti lt1t)ko111 dalalmscs intn a !;ingh.: i ntegraL·cl itlentitic!- database. The TSOB is aiso known as the ·•watd1lis1. '· :; _T he l'~C !\·10 \ l al s u inc<Jrporatctl :ill pnwision:,; \•flhc .\./c' 111<11·mu/11111 ,.f f I11dt·rsr,mdi11g ;.,., ..._.,.,, rite: /t11ellig1:11n! Co111m1111ity, Ft!d, •1·11I /,a11• E.,,fi,r<<·111c11t A 1:,•1wr, -.,·. ,11ul tit, · l),•1•w·1111c11t 11.f llomdand 5,'t•curil_',' C:11nccr11ing ill/im1111tru11 ,\'l111rmg. dated /\·larch -l, 20113 1the '' lnti.,rmati ~' ll ~!wr ing iv!Ol.;"). -1. [n 200-1. the Secretaries of State. Treasury. and ))dense h1;(;11ne signatt>rics l(>the :nti,r:natiCln Sharing MOU by signing Addendum /\ to the TSC Mot :. By d11 i11g so. they ap·..:l'd tl:at all pruvisions oflhe TSC MOU and the lnf'otmatinn Sharing MUI ; apply tu all cntitit:s th a t an: N hcl.'.omc a part of their respective 1Jcpar1111c111s. :- . .-\ !;n :ond acl<.kmlurn (Addendum B), whid1 supplements and incorporates by rctcrcncc rvtou, superseded .-\udcndum A and was finalized llll J.tnu.iry t 8. 2007. The Dircclors orNationul lntelligcncl', NCTC, and lhc TSC _joim:d as signall_oril·s i11. \ddemlum n. Under paragraph()) (h) /\ddc11du111 I.I tin: Parties agreed. IP the maximuu: extent pcrlllittcd by law, to "provide lo lhc NLTC l111 ,m ongoing basis ,ill Terrorism l11rormati1rn (as defined in the lntt:llit~cnc : Reform and Tcm>rism l'rcvcntil)n /\ct (IRTl'A) uf'20lM, Section IO!ci(a) l<I) las amended lo irw.ludc homeland security informatillll and wcupl.lns ,,fmass dcstn,c.tion information] in their possession, custody, or contn> I. Pnra~raph 7 of t\ddcndu111 H intrmluccs the term Tcrrori.~t ldc111ilicrs .to mnrc dcady tkst:ril.H: 1111.: l)'pt' of lc1-rrirism in ti,nn.itio11 lhal NCTC (and the Federal Bureau llf Invest igati1111 ( 1-'H I) for l'urcl _y D1 1111cstit: Terrorism Information, as defined in till' TSC MOU) receives from inlcragt:ncy partners nn<l suhscqucntly shares with TSC for inchrsicm m 1hc TSl>B . .111 pr;,visi{IIIS ,·.f'thc TSC or (1 . Excn rlivc Order 13 . 54 (August 27, 2004) created the Notional Countcr1crrorism C.-nlc1 (NC"f'C) lo serve as the primnry orgm1izalio11 in the United Sl.rtes Ciln·cnum:111 for a1wlp:ing ancl .ntcgraling all intelligence possessed M acl1t1ircd by the t l11itctl Slates Cion:rnml:nl pertaining to terrorism and t:lmntcrtcm1ris111. l'•Xl·cpting purel y domestic i:111111l t'. llcrrr,ris:11 inl<1rmation. That same provisitin, however. pn•vidcs lhat NCTC may l'Cccivc. r~·tain. :mtl disseminate informatit,n fnim any h:dcral. Stat(·. t1 r lm:al l!ll\'crnmrnl. 1· 1 1J11lc1 , .. ur.:c 111!ccssnry 1( 1 fulfill its rcsponsibil itic!'>. giv ing NC' l l ' authority-to rct:civc, r-·la i1:. :md di-;-;uninnk domcsti(". tcrrurism infonnatit•n . ... 7. Sci.:tion I 021 or the Intelligence Reform and Terrorism Prevention Act or 2004 ( IRTPA) n111cnd1.~d the National Security Act of 194 7 to cndily the creatinn or NCTC. Pursuant lo lRTPA, NCTC serves "as the ccnlrnl and shared knowledge hank on known and suspected terrorists and international terror groups." NCTC's centralized knowledge bank is known ,is the Terrorist Identities Datamart Environment (TIDl~). Section 11121 (c) \Jll Dorm:sti;; Counlertcrrorism lnlclligcnec states NCTC "may, 1;onsistcnl with applicable law, the direction the Prc!;idcnt, and guidelines rcferrcu lo in section l02A(b), rc.ccivc intelligence pertaining c1-clusivcly to domestic countcrtcrrorism from any Federal, Slate. nr local govcrn:ncnt or other source nccessury to fulfill its responsibilities unJ n.:lain and diss{'.minatc such intelligencc." or 8. To enhance information sharing, the President issued r.xccu1ivc Orucr 13388, Further Srrcn.~fhenin,v, f/,c: SIwring of Tcrronxm ft1jiJ1·111afio11 ro l'mlcc:I A111crica11s (October 25, 200'.i), which requires the head of' each agency Lhnl possesses or acquires terrorism inli.irnialion to promptly give access to that information to the head or each 0thcr agL~ney that has counl<::rtcrrnrism functions. 9 . Pursuant to ,)nragrnph (2) of HSPD-6, NCTC is nwndatcd lo "provide [TSCj with ,:cccss lo nil appropriate information or intelligence in the [NCl'C's I custody, possess inn, or control that TSC I requires lo perform its funcLiuns ." I 0. TIDE serves as the single source for the TSDB, except for Purdy Domestic TL'. rroris111 lnfunnation, \'vhich is providcu directly lo lhc TSC (i·om the Fill vin a li1rinulizcd procedure. Purely l)omcslic Terrorism Information is defined in the TSC MOU a.~ "i.C' ., inliinnalion about U.S. persons Iha! has been determined to be purely domestic terrorism inrormation with no link to foreign i11Lclligcncc, cuuntcrinlclligence, or intcrna1ional terrorism." 11 . Ti DI : conlains the identifying n11d derogatory information on known or appropriately suspected international wrrorists and the PnI's Aulomntcd Case Support system wntains suppmting infornrntion regarding purely dorm:stic terrorists. The TSDB contains the idcnlilicrs exported li'om TIDE and the idcntilicrs ol'domcstic terrorists l'.Xported hy the f-BI. As a rc:rnlt, the TSDn contains the U.S . (jovcrn11K'. nl's c11mpn.:he11siVt'. database of' b\ll11 internatio nal and domestic Terrorist Identifiers. H. Nominntin~ Components I. The Depar1111cnl of Justice contains n number of cumpt111cn1~ thal may acquire inlr,rmalion regarding domestic or international terrorists. These componcnls inclmk the FBI, the TSC, the National Security Division, the Criminal Division, the Civil Ri~ht:. Division, the Dnig Enforcement Administration, lhe Uniti;<l Slates Marshals Service, the Hmcau ul' Ah.:L1 hol, Tnhacco, Firearms, and Explosives, The h:dcrnl Uurcau or l'risnn~, the E~:c1:utive Offici; ol'lhc United Stale:; /\ltnrncy.~. the United Stales /\ttomcys, and thr: Uni led States National Cc11tral nurc[IU , J Page J of 5 2. The policy oflhc l)cpa11rncnt of Justice is for all compuncnts to provide the FBI wilh all dt1111cstic: or in1crnalional Terrorism In formal ion or Terrorist Iden ti ficrs s0 lhal the ~-~ I ..:an make ::ipproprialc 11omi11a1ions hi the cons\•lidatc<l terrorist watchlisl. Willi one cx..:cption relating to TSC's autlwrity in exigent circumstnnees, only the FBI is authorized tl> nom in ale domestic {>r international terrorist::. for inclusion in the TSD!l on behal I' thc Dcpartmcnt l1f Juslicc. The FBI has implemented policies governing the submis:;inn nr such 1H1111i11atkms. including procedures to follow when uddin!,\. modifying, or deleting a TSDIJ record . in making any proposc<l rccummcndation fnr watchlisLing, each DO.I 1.:~1111po11cnt slv:-uld ensure thnl the undcrlyin!! inli.1rm.1lion is reasonably accur::itc. relevant and ti nwly. In additil•n. tht> TSC has implemented its Pmto,·r,/ l?cganli11g Ji:rron.,·r Yr111:111orirms These polil:ics mus! be l<1llnwcd regarding all nominations from the ")cparlmcnt or Just.ice . or .:- . ·!'hi; TSC. which is .idministcrcd by 1h1.· FBI and rcpr1rt~ lt1 the All11rney (i\:t1L"ral, i~ ;,t,rmiucd lo m:.tkc cntrit·s into the TSDB when cxig1.~nl circumstnnc.:cs ex isl. Such c:-.pcdi1ccl 11111nina1ions 11111.,·r be made in c.:1Hnplinncc with the FBI nnmin:ition ptilicics :tnd th\: TSC's flro:o< :ol R,·~:arding 'Jermri.,·1 N1>111i11,1tions. •I. "l'lw Joint ·1-.morism Task Forces (J'ITF\ al'e :i mulli-agcncy clfott led by thl' I kp:1rtn11.:111 of .I usth.:c and the Fl3 I 111 comhinc :md leverage low en fon;cmcnt and i11lclligc11t:c ct:111mun1ty n:sources Ill prulct:t the United St;tlcs from terrorist :illa~k. JITF~ arc comprised or highly tr:iincd, locally basc<l. invcstigalurs. analy.-..ts. linguists. ,111d ollll:r spcci.1lisls frnm h:dcral . slate. lc1cal, 1rilx1I, 1crritnrial law cnl~,n:cment and intclli!,!CrtL:c .:,•111nw11ity ag~ncics. The Niltional JTfF was c.5tablished in July 2002 to servL: .1~ the ,:l11•rc:i nati11g mcdianism r,,r lhc .rJTFs. :--. Dcpartmt·nt .:ir Jw,tkc t:limponcnls. other than the FBI nr the TSC. Jrc 1w1 pcrmillt·d I\) make direct nr:11i11ati 011s 111 the TSDB . /\ Dcpar\mcnl Justice component shuuld inform lhc appruprialc JITF through disse111i11,,tcd in1clligcncc reports. ckc1rnni1·. c~11111111111icatio:-., or other 111cthud appropriate to the circumstances when it becomes aware nl"'l\•rrNist lr11"".;)r111:iti~111, Terrorist ldcntilicrs. tir Purely Domestic Tcrn•rism lnfr,rmntit111 (e(1llcc1ivcly, Intelligence Information). The originating DOJ componc11t should !;tale whdhcr it reccm1mcnds watch listing Lin; i11dividual, thc basis for ihat rccnmmc11dali\1 11 , an I the invt:sligativc skrs. irany, it has u11dcrt.ikcn regarding the individtrnl. lt'thc JITI · clr..:tL·rn1i11cs lhat :he in limnation rcc..:ivcd rrorn ;mother u1111rl111cr1t !,t,mc.Jing ah11n: ur i11 ..:,mj un ...:tion with otlwr inli.,nnati on know:1 to the FBI meets the s-tandards set forth in the 1\llurm:y (jcnernl's Guidelines f, :r optning a prcli111innry 1errr•ris111 invL"stigatir,n 111· a fu ll t~m1ris111 i1H·c~.1igatiun ,111d one has not been orcncd. the I t I F sh:1J; iniliolr an 1nv~5!i~atic 11 a:1d shall nominate case suhjcds !i>r indusion in Tll)l ·. aml.'nr lht> I SDII in :.:..:.:,,r~l,mcc, ith FBI pulicy, by forw.irding ,ti! lntclligenct' l11lc1rmatin11. ;is apprnpriall' . IP ::n; H3l's Tcrrrr:st R\:,·i1.·w nnd Examinution \ 111it (TIU:XJ using the !'I >-<130 fnrlll and procc,;s. or 1 t', . The n·ll·v,1111 JITF will 1"1l1li(Y the Departmc111 L>l'Justice compont:nl !hill lnlclligcnn· In li,rmatio11 prnvidcd h)1 thnl component. has been used. in who It.; nr in part. as lht· basis E1r a nomitwtic,n lo Lli1.· TS Im 1)r the l'.rcatiun 111"a rcrnnl i11 TIDI:. To the extent p11ssihlt>. ► 'O 'O (1) the relevant JTl'F will assign a rcprcscntolivc rrom the nominating l)cpartmcnl of .lust ice cumponent \o participate in the preliminary or full investigation tlmt <1ris~'.S out ul' nmninalions from Department or J\lsticc components. Once notified, the Dcpartrm:111 l',limponcnt will promptly provide FBl's TREX with udditions. rnoclilic:11ions, or u<.:lctio ns '. o a particular record as appropriate rcgmding lhnt lntclligcncc Information vin the componcnl's .ITTF rcprcscntalivc . 7 . Tn prevent possible duplicate or partial reporting, the NCTC shnll be informed that th1: Fl3 I and the 'l'SC arc the sole TIDE ,rnd/or TSDU 11umi11ati11g agc111.:ics l'or tl11: Dcpanmc;nt u r .I ustice. 8. The provisions l1fthis Protocol arc nut intended lo prejudice, restrict, or intcrf'crt: wi th any 01l1cr agreement or nrrangcmcnt or Dcpartmcnl or Justice compuncnts, including arrang.cmc11ls related tn law c111i1rccmcn1, exchange of information or co11n1crtcrrorism ~rro r::; as appropriate . /\II l)eparlmcnl or Justii;c components should continue to share lnlelligcncc l11Ji.innalion as appmprialc within the U.S. Intelligence Community. ;:l Cl. X --..) ~ t\lEI\IORANDU!\I Of ll:\DERSTA:\Dl :'IG (Y\ TERROR I ST \\'.-\TCHLIST REDRESS PROCEDL'.RES 'O ~ ;:l 0.. X l'lll' I kpanmcnl pf .lustil'L' ( I)( l.l ). thL' h:dL'ral Bureau 111' Ill\ l.'~I igatinn i !"Bl I. lhL' Tcrrurist ScTL'l"lling t ·.:111cr cTSC'I. the fkpanmcnl ,11" l lumdand ScL'urit~ ( OI I<.;). the I kpartllll'lll pf St:ik ( f)<JS ). thl.' ()ffil"l' 11r th1.: Uirc1.:tur pf \:atit1nal lntclligl'IKL' ( UlJ .. , ). thl'. \:at 11111:il < 11u111l'1'll:rn1ri~m Cl·nter I Nt 'TC ). thl' <..'L'nlr:il 11111:lligcncl· :\gl·ncy (l ' 1.-\ J. till· lkparlmcnt Ill° I kll'nse ( D< Jl) ). and thL' Ikp;trtm..:nt 1h1.: Trl·asury Ihcrcinalkr rcll!rn:·d to a~ 1hc Parties l: or or Rccugni1.i11)! that 1hc United States (im-..:rn111c111 has dc\'clnpl'll a c111i:-.11lida1cd database k111.1"·11 and suspCl'lcd tcrrnri:-ls that supp11rls many dirt~rl'lll scrcl:ning prm.!l'illlls O)K'ratc<l umk r di st inct swtulory and rcgulatnry authorities: Rl'l.'11i;i1i1.i11g that agcrn:ic!> that contribute lo. l'.1ll11pik. distribute. and llSL' the con:-:olidated da1ahase mus! 11se hL·st l'llorts 111 111ai111ai11 l'lll'l'•.:nt. aL'L'lll':IIL'. anJ 1h11r11ugh i11li1rn1atit111: ReLog11i/i11g 1hal lhl' i111pkml."ntatiu11111'1lte :-,l•reening program:-, 11u11ethck:-s may. at 1i1111.:-.. still eau,e itll"t111\ L'nil:11cc. dday. tir tlth1:r ad,·l'rse l'XperiL'llt.:l':- for indi\·iduah dur ing the llTl'nrism screening pwce:-,:-. : I-kl' 1g.11i/.i11g that t.:t1111plai111~ rl't:1."i, ed 1-..:g;inling the terrori:-m scrt.:e11i11g I rt1L'ess sh, 1uld hl· L':-.pcJititiusl~ ,._:, ie\\'l'd aml aJJr..: ssed "ith dignit: and re:-pl."l't : R.:ci1g_11i/..ill l:! th:11 the L':-.peril."nC:L' Pl°lra,L·krs and ,11her inJi, iduab 11111.:ral.'tlllg "ith ~'" crnmi:nl :-ncc11ing IK'r,nnnd is p()te111ially :1ffi.'l'll'd hy factors ,,u1s idl..' thl' rnn,rbm Sl'.reL'ning :-L'npt.: ,1t'this \kmnra11du111 t1f l. !mkrst anding. i11l'luding. li1rt:-.:a111ph.:. randPm Sl'l'l'.l'ning. :--l-rcening t"nr im·nln:llll'lll \\ ith illicit dntgs ,w OlhL'r illegal L'onduct. hd1,I\ ioral .'>l'l\.'l."ning crill·ria. as\\ ell as thL' bask prnk:-.:-it111alis111 and l'Ptll'lesy 01· gm·cmmcnt Sl:l'L'l'lli11g J)L'rsnnncl. and th,11 at1c111i1m to 1hcsl' l:,ctms 1m1s1 be prn111PIL'tl lhrnugh r1lhcr appn1priate means \\'ilhin the l'l'SJK'L'tiVL· _j11risdic1iu11:- or thl' P:irti1:s: Rel'.O):!llil.ill):! that on .lanunry 17. 200(,, tile I kpar1111c111s 111' Slalc and I lrnnela11d Sl'l'uri ty :11111uunccd an initiati\l' 1111 "Sl'l'Url' BorJcrs and ( llll'll 1)11ors in the l11ltll'111:11i1111 Age:· tllhern isv k1111,,n a s the Rrl·e-Clli:rl(lff lnitiati\·c. in ·ludin!,! lhe estahlishmi.:nt t1!'a redress pl'lll'l'SS 11, addres~ pt·rcci, ed pn,hkms in i11tanati1111;rl ;md dnmc stil' tra, dcr :-.l.'l'l.'l'llin:;!: :111d I la, ing c11ns1rllL'd \\ ith th1: PriYacy and t •j, ii l.ihertil' :-- < h cr-.i:!ht Board ;111d the pri, .it· ~ and ci, ii lib1.:ni1.:s nl'licials nf DI IS. [)( )J. and ( )()'.\I. in de,doping tlil' prn1.."nlt1rl·s L'l111taineu in thi-. agn:.·l.'mc111: 00 - I. . ;'l.lllSl 'l·•-;q, P='~l! ' ''T' "! 11ap Ll('!H:11u11_111! 1;1 ...,11ud ,,1 .\l!Pl)t! "· \IJI\J -iu1: .,p.,dlll! .111 "l!lll!I ·1111" .,J,:J.1:11u1 n1 p;,1u1su11:, ;,q 111iq:; .7( }I·'\ :-,!l(l lll i1llll(W, ·no~.I. ;1 q1 (110.IJ p:i .\11u1::i.1 ;,q .Ill ·r='~l!POUI ,n11:1s HCTS.I. Jl;'llfl ., ,1:t1 "H(JS.l ,'ll(J ll! up:u1;,.1 p11h1qs p111p! '!Pll ! un .1 .... tp:iq" :iu!tu.1;,i;,p 111 UC IS.I .... tp ll! s11:11p! '!Pll! y1 ,\\:i! ,:,.1 :upnu:,d fiu!t:inpull:i url1.1_1 .\JJl!d .,u1: s;,pn1:i;-,;id .701\ '-!l[l ll! :'l11!ql,..,\.: ·.1< )(\ '-1\fl lllt1J.J iiu1-;!JI: -:till!ll!i1!!qll illl! ,\Ulf SI! S:'l!l.11:d Jtl \).Ind :itp .-iq r:i1m1;';!s:,p 11.,:,q :,.wq -..1u:,1111d11111."\ l(-•11S ll!ljl Jtl. \\t)J:'llf lflJt~J 1:is "1! {;,u.,fil! i1ll!Jl! ll !i1!.ll1 ii1ll!l llll!lllllll .ltl ,:i11.,ii1: i1ll!ll;'l,"\J."\'-' .lll LIU!l!IIU,1P :itp ll!l(I! -" 111:_1 s1u,..,uudtuo;, q:ins 11:1111u;,1x,.., ,..,111111 s,1!1.ll!d m \J.ll!tf q;,ns _1,1 ,1u:,111,th1111.--. .\UI: 1)) .1=:F'-I ll) pou1s.1:ipun ;'lq 11sp: 111:qs S;'lll.11\f .Ill .\\Jl!J I? 111 . )( )l.\j "!Lil lit :,:,u:i.t;'l_f:l.l .\UV lllcl.(I \\l!f .,q p;q.,;,1n.1d .... ,!\\J;'lll)1l '! .l1l ·p;,ru;,n11: ,t! ·:-;~(,ZI .1;1pJl)-•\!lll.'l:1, _. 11)1 llWllS.llld .HCJSJ. ;'ll(l lf! p.•lf!l!Jlh>.• UO!Jt:lll .lUJII! .In .:'l,n .:'lljl 01 p;,1n1:1.11111 :i.11: Jt?lf I s:i:1u:i!.t,1dx:i "i1ll!ll:i:i.1.)s 01 ll!l!JJ:id ll:tlJ ·.1n,1.1:itp s1.11:d .10 'Slll !llf lllll\l;l Jlmp! .\!JH'! tll ,\1ddn 1011 s:,np nO I"; S!ll.J. ·,{1dd1? 1ou 11nqs 11< S!l!l.lO sun! S! ,,11.u.l i'iu11.,!u1111.1 ."\lf l ·s11::,dd1: .lll;'llj I)} JI.) Till!ll~;.l.l;lS .lll.J ,\)!.lotplll! p:fi:i1 s_ ,\J.ll~d ,\lll! \fl! •" SJ;l!lJLIO:l :lnv'! "!lfl 111 llll! S! \ll.td {111: 11:tp 1u.11\::i ·•lfl OJ ·s11:.1dd1: .tu Slll! l!Jdllltl:-i p:i11:1;'l.l-i1ll!ll,1:i.1.1s ,s:,:H,.1d 111 .-i11.11Hp111: p!i1."\I s_ ,\JJl!d ,\lW .Ill :-:i11:1s P:ll!ll 1l .•ljl_ll) SUO!ll!(llil:1.l .hl ',.:,1n1u1s "lltl!llll!ISllll.) .... q, "Lil!\\ l:l!tlllll:'1111 p.111.1\qh):'1 ,1q t1HI jp!lj'-' J'lll! ·1t1:itll:ij dtt10:1 Ill p,,pll,11ll! S! :·\( )I•\ "! ll.l. "U(ISJ .Ill ,'ISl!tp!Jl!(f ;'°;U!ll;'l,"\.1."\~ JS!Ju.1.1:i.1_ :iq1 st: u \\l.111~ ·s1s!.1t,.1.1:i1 p;,p;,dsns puu ll .\\1lll'j _111 ;,s1:q1:1up p:-in~P!lllSllll., ~. ltPllllU;'I ,uii :itp lll p;,u!1:1U1);'1 llll!ll!llUl)_fll! JO ,'ISll :i1p n1 .111q:i.1 )l!lfl ;1lJ/lfo:';)J."\', lllS!.ltlJ.1;'11 iill!.lllf) S,'l."lll;l!J,'ld\.'1 :,~.1., ,pe 1rn,q1: s111!1:1dmo:i 1enp! '!PU! 111 puod-.:i.1 111 ss:i;,111d ss:-i.1p:,.1 p.111:urp.11111:i ,: 1u::illl,..,fdtu1 pu1: qs!Jl.}l!Js.1111 s.--.11.11:c1 :iq1 _fl"' DU!ptw1s.1:ip11n 11:1111nu .,q, tp.11~1 1:,~ 111 S! ,- H)I\ '-!lll _111 :i-.:i1d.111d .--.1u w, \;(>I.I .. ), HI.LSM).) u,v 'JJ( ). )S 'JSUd}l: ld I. ;-ltp pu1: .,;,u;ii1!(1•1llll p:uopt:;\ _111 Jn).),..,.l!<J :itp p.:ippl: tF'!ll -" 'fl n111p11:-ippv ,q p:ip.w1 .... dns -;1!.\\ v 1unp11:ippv ·Loo ;:: 111 ·.1, JI\! 11-c1t1s1 1 :itfl tit s.:i!.11111!11 fi,~ .)llll!;"\.)lf osp: ,)Sll,:J·"\O .f ll ,\JP.J;"l.1.1,"\S ••Lil J)lll! .\JllSl!;"IJ_[_ ;'llfl _JO .-i.11:i.1.1;,;is ;'lqt ·v umpu.1ppv llll s:i.1n1cui'i!s .t!:llfl ·'H · 17()1·\i l)-(fdSI f :iq1.10 s:i!.11,11:ufl!~ ;,q1 01 t11>!l!PP': ll! ·;,su~l...,(1.1" \.ll?J;-..1.,;,s ;"\[jl (llll! ,\.1l1S\!;'\.IJ, ;:iq1_10 ,\.n:1.:i.1:i:,s ."\ljl ,{q p:,uilp.; SCA\ ·nol·\J 9-((dSI f ,1l(l_lll SllO!S! .\ll.ld 1p: ;,.,u.:i.1;,_1 :i.1 :,q p:i1n.1ocl.11 >JU! pue p:i1u:1t11:,1dd11s q::1!tf" '( v u111pu::1ppv) tunpu:ippe uH ·too;:: ·;:: 1s11ii11v II() ·. )S.I. <1ll!lfS!l(( l!JS~ :i:,u;,R! lf:llllf Jl!,IIU,1,).fll .lll]:l;:l,l!(l 0ljl pun ' ,\l!.lllXlS ptn!(,"\lllllf f JU .uc1;,.1;,.,s :iq1 ·p:.1.:iU,"\!) .-i:i11.11111v ,,q1 ·,,11ns Jll ,(1111.,.1:i;:is Jtp .,q p:iuii!s s1:.\\ ( 1l( ll•\! l)-( tdSI 11 w,pn.l.l;tJ ISU 11:;i\;' j:l;l)ll.ld t)I llO!letU.ll~JU I TIU!ll.:'l:U.1S .Io :is11 put! lllll J1!.li1:1llfl ,>lfl lll> i1ll !p111:1,.1.,pt1 ." ) .fO lllllf)lll ).hllll,"\I\ .... q, 'l)-UJSH Jll J.lOtld11s ll! f'lll? -~:oo;:: ·91 .1;:iqtu.,1d;,s ll\l llS(\-' ·s;:1~,:i.,o.1d fi u!u:i.,.1;,,;- 11! t10!11:w.11>fll! 1s1.1n.1.1;,1_10 :isn 1n.1'":I ptw ;,11:1.1th1dd1: :iq1.1,~1 :ip! ,n.1d pt11: i1t1!u:i .... .1 .,-.: ·,;:-,!Jllll:Ui'i!, st?. )S.l. ='l!l ,1(1 JPJ.1;,J!(J l(Jl.;!JIIJ.1,"\J Ill l(;)l!I 1.1dd1: s. 111,"\lllll.l.;l \\\~) .1111 :'Ill![)! fl 1"llll:1 I )j UO! ll!/!lll!i'i.11) lll! l( S!l\( l!}~;'I Pl fll.1:1lf,ll ) \;lll.llll!V ;llJI p:i.qnh:i.1 "f()O~ ·91 J:11.jlll,,,d:is p:,1cp ,_'lllS!.lllJJ:1.1. !Sll!l!i°i\ 1.,;'l)\Ucl Ill ll\llll!UUll.JllJ ~UJ U:1,..,.1::is.1•' .... s, 1 puc 1111!11:.1;;:inq .. '(1)•(ldSI 119 ... ,!P:lJ~(I Jl!!llf."\jll";'\.ld ,1!m.,.,s p1m1;1u11., 1J 00 ~ :.aC: <1) 0. 0. ~ <I'\. ; I<)})\ l-:--1 .)U:l .I 3. DEFINITIONS 1\s usl'd in lhis l'vl( HJ. these terms nr phrases arl' defined as rnlhnvs: A. B. C. IJ. E. r. Ci. H. ( ·0111plui111 or RL'dress Cu111/llai11t : An individual':-, stalL"llH!nt. about an allL-gcdly advcrs<.: experience or outcnrnc during" terrori sm st.:n:cning process. which usually includes a request fnr assistam:e tir a n.:111ctly. Demga/1JJT !n/im11atin11 : The inlimnatinn n:lied upon or gcnl'ralcd by a nominating/orig inating. age111.:y to support the nominalion or an individual tn 1hr TSDB . A·11011 •11 or Su.,·pectec/ Tl:'rrorisr: As de lined hy HSPD-6. an individual known nr apprnpriatcly suspected to be or to have been engaged in conduct conslituli11g. in preparation for. in ai<l or, nr relat ed tn terrorism. Pursuam to I ISPD-6. the TSDB shall i111.:lucle idenli(),i ng inltmnalion about all known or suspected terrorists. Mishle11ti/i1..•d Person: An individual who has haJ an ad\'erse experience nr outcome during. terrorism screening because the individual is a near match 10 a k11<.1wn or suspected terrori st in the TSDB . Misidentilied persons arc 1101 actually listed in the TSDB but usually share an idcnlical nr very similar name and date or birth with a pcr~wn in th t' TSDB. which cnuscs them tn be dclay-:d or otherwise i111.:nnvcniencctl during screening. .Vo111i11ati1w .- lge11c r: A Fctkral agency that lws dctenninecl 1lwl :rn individual is~, kno,,·n or suspected terrorist anti nominates that individual 1l1 the TSDR based on information that origi nated with that agency and/or a third .igcncy. Orif!i11ati11';! .·lgl'nc r : A Fe<.krnl agcm:y that generates derogatory or identifying information ah(HII .i kno\\"n or suspcctetl lcrwrist. l'er.w1wlh· lclc11tifiohle l11/<>r111utio11 : Any representation 01· information 1ha1 permits the identity nr an individual Lo whom the inf'orm:1ti11n applics 1u he reasonably inli!rred by either direct or indirl'l'I means induding any other inft)flllalinn, which is linked to st11.·h individual. RL'dress: Thr process whereby an indivi<.lual may seck Lhc help 111' :1 screening agency in addressing the causl' or an adverse cxpericncc or outcnnH.: rclatcd to th1.:' use orTSDB data by tiling a complaint with the screening ag.cncy . Thl' screening ag.em:y or its dcsigncc, in cnupcra1i11n \\'ith TSC and lhL· 1wminating/Pril:!ina1ing agency, provides assist;mct: by determining lhl.! cause that adverse c:xperiem:c. vcrif')•ing that all n:le vn nl information relied up1,n in the screening pniccss is thorough, accurate. and t:UITcnt. and making any warranted L'.orrcctit)llS tu pertinent records. The redress pmccss as dl!li11cll in this paragraph docs not apply 10 complaints rdatcd lo the visa application process. Scrue11i11g Age11c1•: Any agency that conducts terrorism screening. A screening. agency acquires information for thL· purpose determining whether ;rn individual is a known ur suspected terrorist in the TSDB, anJ c\'aluatcs and/or uses 1hat information in ordcr tn take a particular gowrnmcntal aclitm with rcspecl tn an individual. such as requiring additional physical security screening al an airport sccurity chl'ckpninl. dctcnnining admissibility intu th-: Llnitcll Stales. m similar or I. or .I . L. -L govcrnmcnlal action. The DOS anJ DHS shall not he i.:onsidcrcd scn:L'ni11g agcm:ics with respect 10 the visa application process. Tamris111 Sat'e11i11g: The evnluation of an individual In tktcrminc whether he nr she is a knmYn or suspected terrorist ith:ntif1ecl in the TSDL3 in order to taken particular governmental aclil)ll with n::spcct lo an indiYidual. such as requiring addititH1al physic.ii scrnrity screening. at an airport scrnrity checkpoint. ddcrmining admissibility into the United Stntc:-. nr similar governmc111al nctiun. Tt!r/'/lrisl Scret!11i111; Dutahu.H' or 1:~'DB: The reucral government's consolidated databasL' that contains i<lentil)'ing infi-,rnrntion abnut known or suspected terrorists. It is also crnnmonly knO\\'ll as the consoliJulcd terrorist walchlist. The TSDB is a sensitive hut um:lassilicd database and docs 1101 ,.:nntnin any (krogatnry information . TIDE: NCH '' s Terrorist Identities Datamart En\'ironmcnt (TIDE). which is n i.:l;1ssi lied tblahase containing the derogatory informatinn that supports the nnminatinns or known 1lr sus1k·cted inll:rnalional terrorists lo the TSDB . RESPUNSll31LJTIES OF Tl IE PARTIES i\. Responsibilities or All Panics: 1. Dcsi!.!.natinn or Responsible Official. Each Party \\'ill iclentil)' a senitu· oflicial who will he responsible for ensuring the Party's full purtiL·ipation in lhc rcdl'l::ss prnccs~ and o\'crall co1nplin11cl'. with this l'vlOU . ;\ Pany may also designate redress 1)l'li\:ials for componl.!nts (il'that Party that perform screl.!ning or nominating./nriginaling agency li.mctions . The Part ks agree to identity these olfo:ials and exdrnngc the nanH!s or these nffil:ials no later thun 30 cakndar days alter this MOU becomes clfrctivc and update Lht! inliw111,1titm ns neetkd therl.!:tlkr. 11. Resourct:s. Subject to the availability nf runJs, each Party will itknlilY and commit appropriate staff and nthcr n:snurccs 111 carry out responsibilities under this MOU . This includes idcntil~•ing the ollice(s) responsible fi1r carrying out the Parly·s n:spl>nsibilities pL·rlaining to the processing of"inuividual redress complnints as scl forth in this MOU. The Parties agrl'e In exchange the names ant.I cnnlacl inli1rnrntion fi.ir till' responsible offices no later than 30 cakndur dnys a 11cr this MOU bcenmc!> ..:rfcctive, and update the infonnalitm as needed thercalkr. 111. lnl<wmation Sharing. Ead1 PaJ'ly will share all inlcmnatinn rckvant lll the resolution nf n com pin int with other Parties Lo the extent necessary 10 ca1Ty nut this t\.·IOU or to ddcnd ,my judicial chnlkngc to the rl'.solution or a complaint. consistent with legal requirements and dassilication and handling controls. A Party may provide the relevant inli.>r111atit1n in a summ~irizi.:Lf or suhstilutcd format tu protect s~11si1ive SOLll'Cl'.:-. ;1nd n11.:thods . 1v . Proleclion or Personal Iv Identifiable lnlimnation. Ead1 Party will take apprnpriah.: action 10 protccl personally idcntiliahk information (Pill in ii::, own n.:cord systc:ms n:laled lo a rcdn:ss mailer against unauthorized access 4 ► 'O 'O 0 ::l 0- ;;;:· 00 :g (I) '. "I. v11. and to ensure that Pl I is lwndled in a way thal pnwidcs scnirity and acrnun!ability. Whl'n Parties transmit PII related lo a redress malll:r , ·i;i 11011-elcelronic or L'kctrnnic 111cans. such as email. facsimilt:. pnnabk media or othcr\\'isc. the Partit.:s will prnpt.:rly mttrk the data amlillr communications/mctliahkvicc In pnwide appropriate nnlit:L' nf' the existence nf" PII and will ensure the means nr lr:tnsmission arc sceun.:d by encryption or equivalent prnlcetinns. Adminislrati,·c R,.:cord . Each Party will be rcsponsibk for mainwining thi: administrative records llL'Ccssary lo document it s parlicipatinn in th e redress process. Updatin!:! /\L:cm:y Rcconls. Each Party that maimain s data rcl:HL'd tn till' terrorist watchlisl in its pnper and/nr clei..:trnnie rc:eon.lkceping system ~ \\'ill update its records (i .e .. correct, modify. or delete) expeditiously llllCL' m,Lilii.:tl ora drnnge to an individual 's watch list status as th..: resulr or the displ1sition llf a redress ma lier. This pn1visilm appl ics lu data in gowrnment in fi1rn1atilm systems (c .g. , Tl l)E, Treasury E:11 li1rccrnent l'ornmunicalions Sys1e111/ln1cragcncy Bnrdcr l11spcc1in11 System (T ECS /IBIS). No-fly List, Consular l.oukoul And Support System) used l'or watchlist ere.it inn or screening purposes. It is not intended to n.:quin: the Parties to change records that rclkct acti\lns already taken basL·d Lll1 watdilist status. unless and only to the extent that the record \\'ill ha,·e au unwarranted adn?rse impact Llll the individual seeking rcdress. Litigali\111. Suhjcet to paragraph 4.1\.iii abovc. each Party agn:cs lo conpcrnti:: wilh DO.I 10 assist in del~nding any judicial ch:ilkngc tn the resolution of a n:drcss complaint prrn.:essed undcr this rvlOU or a dclerminatinn by a screening agency that rdicd in \\'hl1lc 11r in part un rec(1rds ur inli.mnatinn in th.:: TSDB . This pnwision shall 1101 he cnnstn1l·d tn limit nos·s discrctin11 under section 2221 I") nfthe l111111i gra1ion and Natiunality Act (IN/\), 8 U.S.C. 1202( f'l. com:crning. the disclosure of visa rccnrds in litigation . Privacy Act Cnmpli:1m:e. In carrying out this ~vlOU , eaL:h Party is n;spun.sihle ltir its mrn Cl)lllpliam.:c with the Privacy 1\ct of' 197-L 5 U.S.C. 552a et setf.. in the collection. main1cna11ce, use. anJ dissemination of perso nally idcnti liable information. Wi1hin 30 cakndar days aftt:r the effective date of thi s ~,IOU, each P~1rty agree:- lll rc,·icw its applicable Privacy ;\et system or records notices and any rcle\'anl l'orrns used to culled information li·nm the p11hlic where such infr1rmation may ultimatel y be used during the rcdres~ pniccss. Each Party agrce.-. lLl make appropriate changes to those dncumcnts. ii' m:L·essary. including lhe publication of'nc\\' or modified rnutinc uses lo permit thc sharing \Ir information to 1\:solvc nxln:ss malters and n.:latcu litigation . Record Retention . Each Party agrees to retain its redress recnrds for al lcnsl si:s- year-. from the date 1,r final ;igcnL"y disposition . /\gcncil.'.s may * v111. ** 1x . ::l 0.. :><° 00 \ . IL 1.:kc1 IP establish a 1011;;1..·r r.:11..·ntion pl.Tit id 111 llll'l'I ~1.11111<1r~. r-:b'.ulatur). llr ,,p1.:ra1 i, ,nal n~quin:m.:lll:-.. Hcqu.:,h tiw Dis1..·losun: ,1f TSl)B l)a1a . l 'nk~:-. and until !"SC ad, i:--1..·~ 1111: Partii:s 11f an alternate prni.:l.·dun:. cath Pany agrec:- that it \\ ill comact TSC :- kgal C(llltlSd i r it n:ct:i, l..'S ;i l'<..'l[LICSt Ii ,r inti ,nnat itlll 1.ir l'C(llr<ls that it kn,,,\ s would re, cal an indh idual" s :-tat us ( pus it i, 1..· nr 111..·gatiH·l in tl11..· rst )13 tll' \\'llllld othcrn isl' n:, cal the LlllltCtllS ,1r TSDB d,lla . lSC h:gul cuun:-.el will prn,·idl..' timdy 1:,!t1idanct: on hP\\ In l'l..'Spund 111 these n:qucst s. This pnwisiun also p1.•rtains tn rcqu~sts rnr TSl>I~ data rcsitll'nt in supp11r1ed !--acl.'ning. systl'lll:-. such as th\.' Nt1- Fly List. TFCS! IBJS . lhc N,1tio11al Crime lnformalion l ·i:1111.:r' s Violent tiang and Terrorist <hg:111i1.atio11 1:ik (\l(iT<Wl. and the I)( >s·s Consular l .m,kmll and Supp11r1 System (l'I./\SS) . !~spnnsihilitks ol'Sereeninu Al!1..'11ci1..•s: ,. I ksi~11atin111_1f R1:s1H111sihilitic:-. . .- \n) Party Iha! is" scr1:e11i11g agl.'.ncy 111ay <ksignati.: anl,thcr Pany. " ·1th the othi.:r Part y':-- t:onscrll if111.·c ..kd. t<• 111.·1-i"nnn thL' rcsp,m sihilitil·.., ,1utli111:d in sc1..·ti(lll -LB. \ll. thi:-- \l( >l'. In aJdit ion. "hl.'rt> a ~crc:ening agi:11cy is. a t:omp1111l.'11l of ;i Pan:,. the Part:, ma:, dct1.·nnint: at it, di st:rt:1i1Hl that :111y n~s p111i-;ibili1:, n!'1ha1 Sl.'. rl..'.:ning agt:111..·y m,1y ht> pcrli.1r111i:d in "lh)k ,ir in p:111 h:, thl..' P,1ny . 11 Ri.::-11u1\:l..':-. Subjet:I 10 lht' :I\ ail.ihility t1t° fund .... l.'.a.:h -..l·r1..·cning agl..'nl..':, ,, ill Ji.:'.'>i gnate tlr ,:rcale an uf'licl.' 111 1:arry l'lll ih npl.'ra1i,111al r1..·:-ponsihili1ics fur ri:Jrcs!'-. \\'here ;1 Part) has Sl·n:ral l.'ompnncnts that pl·rronn ti:rrorbm !--L'rt:i:nini;.. thl' rcsp,111sihlc 11Jfo:ial ror that Party (s,·t• Sl.'ctil'll -I.Ai abnn; l \\ ill de1cnni111: \\'ht:thcr a :-.int!k cl..'ntr;_ili/.i.:u ol'lic-: nr -;t•parall.· 11fficcs in the apprnprialc c11111poncn1s. ur -..11111\.' .:omhinalion 111' th\.'. t\\·o. will perl'nrm 1his runl'linn. Subject to the availahilily ur li.mds. 1..•:id1 screening :igcnL·y will cnmmit sufficient and apprnpriall.: siaff :111J res11un:. cs to that ortke lll' 111lic1:.·s to cnsurl.' rcdrcs:-; complaints arc prni.:cssed in a timely .ind ef'licienl. lll,llllll.'r. Till.' scrl.'c11ing agcncie:- agn:c to nntil~· the lllh~r PartiL·s 11f 1l11..· id..:mily of':md cunt,11..'t information ll1r tht: dcsig.natcu olfo:cs under 1his p.1r:1graph mi latl.'r than 30 i.:akmlar lla):, alh:r thi s \\,IOU bcl.'nmescrti..·c1i\e and update 1ha1 inli1r111a1io11 as nl.'.cded . Ill. Rl..'l.'.l..'ipt and Initial Proces:-.ill!.! nr l'omplai111s. 1:,11.:h SLTecning agl.'.tKy \\ ill h:1\1.· .i pn1ccdurc lilr rc1.:ei, i11 g ..:rnnplain1s from 111.:mh1.:r:, ,11'1!11.· public. tr thl.' s..:n.:1.:ning age ncy rl.'\.'t•i, l.'S ,l C\1mplaint rrnm .in illlli, idu.il \\·hu app-:ar:-. 10 hi..' in the TSDB and the complaint relates h1 a11 ad\ e1,I.'. ...-Jfrt.:t in !ht: -..crl..'l..'lling rmiccss ari!--in g 0111 111" his her pla1:e111clll i11 the TSDl.3. thl..' al,!l.'.lll.'.: \\ ill (11marJ a i.:1111: ,it'thl.' complaint and rdat\.:d informatillll ll• rsc \\ilhin a rcas,,nahk 1i1111..·. Tl11.· SLTl.'.L'lli11g ag1.·11i.:: \\ ill bl..' l'l.'.:,puns ihk t~,r \ cril~·mg thl.'. idenlil: llf the complainant in acl..'unlance \\ i1h the :-.cr\.·1..·ning agc111.:y ·:, appli1.·:1hle r1..·g ulatinns and p11li1.:ie:--. \\ 'hl.'.11 ti,rnardi11:;;. " t:\llnplaint to TSC. the Sl..'t\:i:nin!:,! ,tg.l.'.ncy mu:-.t pn" idi.: : I I l all rde, ant ..:orrcs11\111dcn1:e lh1111 th1..· i11dividual. 1.2/ copi\.-!-, ul'any rde,·:1111 internal :g► ~ ::s 0.. ;;;:· 00 I\' . \" . \'I. \'ii. , · 111. agcney records. and ( ~) inrorrnation identifying lhe L'Omplainant includinJ:!. at a minimum, the complain::mt's full name. date or birth. and place or cilizcnship. Arter consultation wilh alTcctccl Parties, TSC may rL·visc these requirements in the future as needed for c:,.,:pcditious pnicessi ng 11 1" redress complaints. No amendment tn the MOU \\'Ould bc required 1t1 effectuate such a change . 1-"ollo\\'-llJ) with the Complainant. I I' rcqucstcd hy TSC, lhc screening agency will contact the cumplainant tf1 request additional inrnrmatinn to assist TSC m the nominating/originating agency in \'CrilYing the cnn1plai11ant's identity and prtll:essing the complaint. Nolhing in this s ubsection pn.:du<lcs a screening agem:y l'rom cnntacling the t:nmplainanl in ,h:cnrdam:c with thc screening agency 's prrn:cdures or discretion . RcspLlnsc to the Cnmplainanl. Screening ngcncics arc responsible l\)r provi ding a written rcspnnse 10 compbints they rcccin:- b~iscd (1n inl<.mnation provided by TS(.' and lhc 1w111inaling/nrig ina1ing agency. Ikea use nr the scnsitivity nr the TSDB and derogatory information. lhL' cu11tcnl or any r'-~sponse 10 a L'omplni11111111s1 he coordina1cd wilh TSC and the nominating/originating agency through TSC. Screening agc11cics may use st:mdarclized rcspnnsc lctlcrs lhal have been L'lH>rdinnlL'd i11 adY:tl1\.' L' hy the scn::cning agcncy. TSC, and DO.I. l{edrcss lor tvlisidcntilied Persons. On January 17. 2006. DHS and DOS anrn.1unL'cd an initiative on ··sl~cure Borders and Opt:n Doors in the lnfonnatinn !\g.e:' othc.nvisc known as the Ri1:c -C hertoff lni1ia1i,·e. whil:h im:ludcs the establishment or a redress process to address pcn:c ivcd problems in inll:rnatiunal and Jomeslic travclcr sc n:cning. The Dl ·IS Screening l'Mrdin::ition Oflicc is leading the inter-agency cl'fon 10 l"l1lfil l the goa ls (11' the Rice-Cheri off lnitia1ive. which is intcmkd lo i111prnvc th c redress process li1r persons who are misidenlilicd during lra vc lcr sncc11ing prnccsses. among 11ther improvements. /\tlministrativc Appeals. If the scrcl'ning. agency has establishcd an adminislrntin: appl·als prm:css tiw redress determinations nr othl:r agency dctenninatinns in which the TSDR \\'as used, the scn:l.'ning. agency \\"ill notit~, TSC alicr receiving any such administrati\'L' app1.:al and \\"OJ"K " ·i1h TSC. as needed. to prot:l.'ss the appeal. and cnordinatc the linal ag'-·ncy rcspo11sc with TSC. Thc scrt:cning agency ,,·ill provkk all rclcva111 papernwk 10 TSC ( including a copy nl'tlw appeal lctll'r and 1111y i11li1rmation suhrnittL·d hy thi: individu.il on lheir own behall). When thc scrcL:ning. agency lias the kg.al autllllrit y tll make thi: final Lkt.:ision tlll th(' appL:al. ii will promptly nntify TSC nl'that dct:is ion . Lilirwtioq . When the screening agem:y hcct111ws :n\'arc (Ir li1ig.,1tio11 arising out 0J'1crroris111 scn:.•cning, the screening agency will notil)' TSC and D( >.I as soon as pnssihlc ancr idc111irying the nc-"us In the TSDB. Notilica1in11 should uccur as soon as Lhc Party learns or :,n individuars intent to SUL' (1r immediately alkr being saved with legal process. 7 ~ 'U (1) ::s 0.. :>< 00 t . 1 1 f tlH: TL'rrori~l Screen in!.! l"t'nlcr: Recl..'iPI anJ Cnimlination llf Complaims. TSC "ill rel.'.ci, i: i:nmplaint s lhm1 Sl.'l"el.'.11ing agL'lll:ies and rcscan.:h 1he111 to Jetenni111: the nature and i.:ause of the indi\·idual's adn·rsi: cxpi:ril'ncc. TSC will Lr:id. all complaints am.I will be n.:sponsibk liir f;1L·ilitaling any inter-agl.'JK)' 1:nnrdinatinn ncct"ssary Ill properly n:sean:h thc complaint and respond tn the sl:'fl..'L'lling agL'm.:y l"l.'g:mling the nutl.·rn111.· ( l.'.g .. any l:11rn.:1.·ti1111s madt' or n:..:(lJ1l lllL't1JcJ ). Rl.'\ ic\\ or lfas i~ for lndu:.i1l11 in tht.' TSDB . In L'aSL'S \\ hl'rL' thL· i:11111plainant is 11r appL'ars t\"> he in th1.: TSDH. TSC \\ ill pn,, id1.• l:'1lpic~ nf tho: L'1 implaim kt11.•1· and other rclc\ ant i11 I~ ln11al il>ll t\1 ~ l .. IC a11J.. or the 1111rninating originating agency 111 ass ist 111 thL' rcs()futinn ,1l"thc l:'1>mph11111. ·1SC,, ill thcn w,1rk ,, ith Nc·1C and ur thc 1w111inati11g ,mginming ;1~l.'11e~. as appnipria11.·. IP lktenninc \\hl.'.lhL'r thc Cl)tnpl:1i11a111·s l:'urrcnt :-talus in thc TS DB is appropriate based nn the most L'llrrl'nt. accurate. and thorough infon11.itio11 ava iliJbh.:. TS(.." may ask NCTl. aml,or the no111ina1i11giorigi11ating. .igi:m:y tn provi<.k upJated information or :111:ilysis to assist in this ck1L'rn1i11atio11 as n-c-11 as for a n:cnrnml.:'ndati(ln un :tddrl.:'s~ing the l:'mnplaint. lkll.: nnination. A lh...- l"l:'\ i..:\\'ing the availahk inlt)n11a1in11 and cun:.idl.'ring an) r...:c\1m1111~nda1ion l"ro111 thL' nn111i11ati11g l1riginati11 g ag_L'lll'~. TSC "ill m.il-e a J..:h:r111inatio11 whctha the rt.'l:'md should rc111ai11 i11 till.'. TSDB. Ii.I\ i.: it:- TSDR stallls 111ndilit"LI. ur bl.· n:nw,·l:'J. unkss th..: kg:d auth,1ri1: 11, 111akc ::. uch a Jct...:rmi11atil1n resit!...:~. in" hnk l'r in pan. with another ,l,:!Cll() . In StH:h cases. rsc ,,ill lllll~ prcp:m: a rCCPJlllllt.'lldation lilr thl' d...:ci~ion-making agcnl.·y ;111d ,, ill impkm..:111 any Je1..:rmina1iun i.:.lnc..: mad...:. rsc \\ ill tak1.· any 111.!L'l.'Ssary acli1lJI hi impkn11.•tll tho.: dc1i.:r111inati1111. such a:. removing thl' rL'i.:onJ frnm the TSUH or nwditYin!! tht.' n:...:11rd 's slatu:. in the TSt>B (e .g. .. downgralk fro111 Nn-Fly to Sch:ctL'l' ). lklim: taking action that is i111.•onsistent with :1rc:co1nm1::ndalio11111"thl:' 110111in;i1ing/nrigi11ating :1gct1l:')', TSC \\'ill noti ry NC.TC. whid1 wi II eu11\ L'Y th,11 dc11.•rmination hack tn the nrnni11:1ti11g/origin,1tinl! agcm:y. unkss th.: 11omi11ati11g,origi11ating agi.:nL·y i:- the l·l31. in,, hid1 c1s1.· TSC will l..'.11ntal"t the I· Bl dirl.:'ctly. Th..: 1wmina1ing."origi11~11i11g agency \\ ill then he r1.:spo11sibk fi)r addrc~sing the n1111lit.·1 "ith TSC or 1h1.· 1.kcisi1m-makin:! agency either din:ctly 11r 1!m1ug h :\CTC. Thi: Panics \\ ill tl11.·n 1.·uprdina11.· 1111 an agrcl.'d-1~1 rcs1.1lu11un. l pdall.: (1fthc TSDB . TSC will ..:n:-uri.: that TSDB rcl:'11rds arL' appropri;1tdy ddcti.:d m 1111nlifii.>d in ac..:ordan...:L' "ith a determination (111 ;i 1nlrL·:-.s 111:itll.:r. TSl · will also, cri(,· that :-.uch renw, als or n11Hlilirn1it>11 , ,.:arry o,·l.:'r 111 otlll·r :-1.:ri:1.•ning sy:;;1.:111~ that r1.•eci,-L' TSl)B dat.1 (e.g., TH 'Sil BIS. No-Fly 1.ist ). I >cconlliction. In thl.:' evcnt nf a multi-a!!cncy nomination whl.:'rc the 1111111 i11;iti11g amlt1.1r orig inal i11g agcn..:il':-; dn not agree 1)11 ,, hal n:cu11um:11datin11 sl111uld h..: mat.le 1)11 a :-.pc1.:ilic n:-drcs:-. maucr. TSC ,, ill l{L'srnnsihilitiL'~ ,. II. 111. 1 I\ . ,. ► "O request that lhc agcn<.:ics <.:onsuh with one another and share appropri:111:: i11funna1ion about the watchlistcd individual in an altcmpt 10 provide a joint rcco111111cnda1io11 10 TS('. Ir the nominating/original ing agt·1H:ics cannot agree t<1 a joint n:cornmcndation. TSC ( nr other agency with the legal authority tt, make the dcdsion) will make the linal determination considering the informnlinn provided by each agency . Review Rclatt·<l to tvlisickntilkd Persons. Ir a complainant ·s ath crsc c:--pcricnct· nr rnllcomc during terrorism screening is a rcsuh 111' hei11g :1 near match (.. misitkntificd··) to a record in the TSOB. and that t:lllnplain1 is n:krred t<, TSl' by tile screening agcncy. TS(.' \\·ill rC\"ie\\' the rccun.l in the TSOl3, as tlcscribcd in thl'.' paragraphs abnve. 10 ensure the TSDH record is valid and salislics the <.:rill'ria for inclusinn in the TSnn and determine il'additinnal information can be added to TIDI ·:. the TSDH . or 1.:tthcr agency syslcms tl, reduce the likelihond or a l"u1 urc m isidcnt i lieal ion . If the record does not mcl!l the criteria, it \,·ill be removed from the TSIJB. v11. ,·iii . D. AclministratiYc Appeals. TS( · will work with a scrt.:rni11g agency to ~1ssist it in prm:essing any :1dministrali\'C appi:al ol"a redn:ss di:tenni11a1io11 lll' other th:termination in which the TSDl3 was used . When TSC rt.:..:cin:s notice rifan appeal, TS(' will notil)' NCTC and/or thi: nominnling.inriginnting agcncy as S1)i)ll :1s pl1ssiblc. TSC \\'ill focilit:11(' 1x11111m111icalio11s between the nominating/originating am! screening agcn<.:ics on the following. issues: I I) determining \\'hat ma1eri:1l may hi:: rdcasable tn the individual during appc;tl ( if applicabk). and (2) updating the analysis nl' :111y inl'ormation 1ha1 may have dcvclopetl sint.:c lhe original tletcrtninati<1n and/or any information that \\'as pnwidcd hy lhc individual on his or her bd1alr during the appeals process itself. .'\lh:r n:,·il.'.wi11g the available inform:1lion ant! considi::ring any rceommenclntinn from the nominating/originating .igcney. 1 SC will nwke a dctenninatinn whether the record should remain in the TSDB. han: its TSDB stmus modified, or be n:nl<\Vl.'d. unless the legal authority tn make such a dctcnni11a1ion rcsidt·s. in whole or in pa,1. with another agency. In sud1 cases. TSC will l111ly pn:parl.'. a n::c,1111mcnd,1tion for the decision- making agency and \\'ill irnplc111cnt any tlcter111inati1\ll unct' made. Litigation . When TS(.' becomes aware nl'li.tigation arisi11 g 11ut or terrorism screening. TSC will notily NCT<..', tht: nnminating./nrigi1wting at!Cllcy. ,rnd DO.I as snon ;1s possible. Responsibilities or the National l'uuntcrterr(lrism l'enlcr: Revie\\', Conrdination, and Resl'arch nf l'omclrunts. Upon receipt nl" a eomplaim from TSC NCTC will revie\\' its holdings. notify the nominating/originating agency nl"thc complaint. and prnvid<.: the ll1)tnina1ing/originating agency \\'ith a copy nr the complaim f'or n:vic\\ . 1. "O ('l) ::l 0. X 00 NCTC will then request that the nominating/orig inating. agcm:y and. as apprnprintc, any nther agency with rclt:rnnL inlimnutinn, revic\\· their holdings and prnvide NCTC inli)r111ation rL·kvant to the complaint. This ma y include updah.•d information or analys is reg.arding. the complainant' s current status in the TSDl3, derogatory i11li.1rmatit1n. identil:ying information that might he relevant ln n mi:·iiden·tilii..:ation, 1>r other potentially rekv:1111 inlimnation or analysi s ( i11dudi11g that which tends lll sh11w that the individual is nut a k1H1wn or suspected terrorist. or " ·hich otherwise tends lo cast doubt on 1hi: derogatory inli1r111a1ion). N('TC will alsn request that the 11u111i11a1ing/nriginating ag.c111:y provide its n:eommcndation regarding rL·solution of the complain 1. \Vith the co!ll:urrem:e the 11omi11a1ing/nrigi11a1i11g agency, NCTC will provide that agency·s n:eommendation and any other relevant inltmnation ln TSC. Should TSC or another ngcncy di sag ree with the n:cn1111ne11dn1ion, NCTC will assist in lhc dcconffa:tiun process ns sci forth abnvc. NCTC ge nerally \\'ill not rccdve or process co mplaints or appeal s for indi\'iduals nominated only by lhl! FBI. Re\'il'\\' Rdated ln rvlisidenl ilied Persl1 ns . Ir a cllmplainanl ·s acl\·crsc c:xpcrienee or null.:omc during terrorism screening. was the ri:sult. nf being a near match (.. misidentified") lu a reconl in th e TSDl3 . .ind thal cnmph1i111 is relerrcd to TSC by the sc reening agency. NCTC \\'ill work with TSC and thl· n11minating/1irigi11ating agency lo cnsurc the TSDB record is valid ,11HI satisfies the..: critt:ria for inelusi1l11 in thc TSDB, and detcnninc ii' additional information can be added to Tl DE, the TSDB, or other agency sys tems lo reduce the likelihnnu nr a futun.: misidenlilication . Update of TID E. NCTC will promptl y update TIDE records with any 11ew derogatory or other relevant inft,rmation iincluLling. thm which ll·ncls tu show that the individual is not a known m suspcctcd terrnri!',I, or which otherwise tends 111 cast doubt un the J en·,gatnry information) pertaining lt1 individuals in the TSDB. NCTl' will also modity TIDE in a timely foshion to rdkct modifications lo TSDl3 nominations resulting from a redress complaint and will make npprnprialt' l'11angcs to a gi wn Tl DI : record whL'll it is ncc.:cssury In Iri gge r ekdroniL·,illy eonlilrming changes Iii the TSDU record . Adminislrative i\ppcals. Nl'Tl' will work with TSC. as necclcJ, lo a~sist it in processing. any administrative .ippeal ofa redress dc1crminatin11 nr lllher tletcrmination in which tile TSDB was used. including coordinating communicatinn bl.:!twccn TSC. the snccning agt'ncy. and the relevant numinatingturiginating agency. as necessary. NCTCs primary rok will be to coordinate administrative appeal requests by TSC with the appropriate nrnninalingtnriginating agency in the lntdligc m:c ( ·ommunit y utlu~r than th e Fl1I. or II . iii . I\' . 10 I.. R\.':sp1111:-ihili1ic:-. tl1°:,,-.:,,mi11ati11i2 Uri!.!ina1in!.! .\!!'-·ncil.':< RI."\ ic\\. l'nnnlinatinn, and Rcscan.:h or t'limplaint:--. <>1K'-' n,,1ilicd 111' a rcdrcs, '-·,1111plaint hy TSC 11r NCT( ·. thl.' 110111ina1ing,11rigi11a1in!:,! ag'-·nc: \\'ill n:vil'W 1hc dCrn!,!atory inlimna1ion 1hat is 1hc h;1si:--. 1i1r i1H:ludi11g th'-· complain.mt in thl' TSl)IL In Cullnlinati1111 with ;\J( ' IC. \\'hL'll apprnpriatL·. the nu111i11atin~/1)J'igi11a1ing agency will naluatc \\'hcth'-'" the L'nmplain:1111 cn11ti1HIL'S 111 satisJ~· lhl.' niti:ria li1r im:lusi,111 in till' TSDl3. a, \,ell :t'.-- any 11thcr rck\'mll t:ritcria. su\.'11 as those liir the Nt'1-FI~ and S1:lcL·t1:I.' l.isb . Thi.' 1111111i11a1ing originaling ag'-·11cy \\ ill determine wllcthcr updated inJi1nna1i1111 ,1r analysi~ c:\i~1~. in..:l11di11g inl'i1rmatinn fr,1111 other a~i:.·ru:ir.::,. iln<l i11c,1rp11ra1c an: such inl<.1rmati(1n in i1.s l'L'Spnnsc. The 1H1111i11a1ing l1rigina1in~ ag..:ncy ,, ill :ii"'' L·nnsiJcr any inli•rrn.111,,11 prm ilkJ thniugh the r..:dn:ss pr,,<.:ess hy !hi.' inJi, idual. tlK· sl..'rcening. a;,!L'lll..'y . N( 'T(. . nr I'S(· The 1111rnin:1ting-~•rigina1i11g :1g.L·t1c: s hall 1akl.· ;rppmpriate ~kps 111 modi I)'. L'OITl.'CI. <11' tkktc its IH1ldings to n:11.:cl any changl..'s mack to Tl I)fas a result t1f' till· rt:dress pn.11:c~s. or that other\\ i,l..' ha,·L· hl..''-'11 dctenninl..'d 10 he in crrc,r a~ a rc~ull orthc rL·drl..'sS prnc1.:ss. ii . lh:!;tllnmcn<lation. The nominating/originating agenL·y may 111akc a n::co111111cndali<111 to TSC as Ill thl..' n:s11lu1inn (1r any cornplai111. ( ·n11tim1ed i11cl11siu11 in the TSI )B m11s1 ht: s11ppnrtL'd hy tkr11ga1nry inli1nna1io11 in TII )I·:. \\'hL·n thr.: 110minatillg'ori~_!in:11inl,'. agl..'lll.'.: has :1dditi,111al den,gatl1r~ "" ,11hl..'r rdc\ant i11!"11r111ati1111 that i:-. 11111 in l'll)E. lhl..' 1H1minati11g ·origi11a1i11g a~enc: ,, ill l..'nsurl..' 1ll:11 '.\:CT<. · aml ·1 Sl · :1rr.: nPt itil.'tl. and \\ ii I \\lirl- ,, ith ;-(Cll · :111d TSl · 11, ~nsurc 1h.11 s111.:l1 int'11nnation is at.kkd In ·1 II >E in a 111a1111L'I' 1ha1 pnn ilks m..::iningt'ul i11ll1nnatiun ,, hi!..: proh:t:ting st1t11\.:l..':--. .iml llh:tht,tb. I.:\ l.'ry dfort sh()tdd h1: 111ad1:. h,m'-'' er. 111 share thL· dl..'wgatory i111i,r111atinn "1th r:-;1 · \\ hl..'111:, l..' r p,,ssihk. lkl'\)llllidinn . l11 lhl..' L'\'L'llt ora 111ulti-a~c11cy nomi11alion \\'hl'l'L' lllL' 111. 110111i11:11i11g und/or nri~inating agencies do 1111! :ign!L' nn \\'h:tl ri:L·11111111l..'11dalio11 should h1.: madi.: 011 ~1 sp..:cilic reJrL·ss 111a1tL·r. thl.' agl..'11ciL'!-,, i II \.·\msull \\'ith I lllL' am1t hL'r at TS( .. s r.:qu1.:s1 and sh:m: appr11pri;11..: i111"11n11a1i1.111 ab1Hll lilt.: \\atchlistcd imli, idual in an allL'lllpt 111 pn,\ iJ.: :1 j,1i111 rl..'i:11mmc1Hlalil,n tn TSC. I I' the 11nminati11g.-'t1ri;;in~t1 inµ aµcncks t:a1111ut ;ign.:t: 111 a ,i11in1 rr.:l.'.1111\111t:nda1i,111, T"'l' "ill mah...: thL' final dctern1in,Hil,n L'nnsidering all nl' thr.: a, ailahk inli1nnatill11. 1,. Re, il..'\\ RL'lated 11, \lisidcntiliL'd Pcr:-.P1b . If ,, c11mpla111:m1 ·s a,hL'r:--.L' ..:, pl·rit.:lll.'l..' durin g 1crrnri-;m ~acening \\ as the r'-·~ult Pt' bl..'in ~ a near mat rh 1"111isidc111ilicd··1111 a r..:corJ in 1h,: TSl>lL lhl..' nominating.,,rig.i11ati11g agency 111"1ha1 rcc11rd will "ork "i1h TS( · and Nert ·. as appropri:11c. Ill L"llsurc th'-· T~DB l'\.'L'11nl is ,·alid and sati:-.lics the crilL'ria fiir inclus inn in the TS Im. and ii' additi(lnal i11li1rnwtin11 can he adtkd to I'll )I ·.. the TSl>IL 11r otli'-·r agcru.:y sysl\.'ms 11, reduce the likclihoml or a ru111rL' 111 isitknti lkation. 1. 11 \ . Adminis1ratin: Appeals. Each m1mina1ingtoriginaling agcncy will wnrk with TSC and NC'TC. as nct:dl·d , lo assist them in 1m1ccssing an appeal or a redress determination or other detcrminatinn in whid1 the TSDl3 \\ib used. The nominatingiorigin.iting agcnt:y will be responsible for advising the sen:t:ning agcm:y on thc rdeasability or any materials requested by an appellant during an appeal. An updntcd analy:iis all rckvant information will be co11rdi11i1tl.!<l hel\\'\:'t:11 Nl'TC and tht: nrnnina1inglorigina1ing. agl'lll'Y, and will hr.: forwarded to TSC which in turn will providr.: it 10 the sL:recning ugc.:ney. The analysis will consider any nc,v inl'ormalion ckvclopcd sinec Ille initial determination, as well a:, any information proviucd by the individual on his or her own bchalr during !ht: appeals process itsclC ur or l{cs wnsibilities the Department llr .lustit:e: 1. DO.I will coordinate with the rclcvanl Panics during. the defense nf uny 11. judicial dialknge 10 the rc:,olution ora l'Omplaint processed un<ler 1his \tlOU 11r a tkh:nninalion by a screening. agency that relied in whnle or i11 part on n.:cords or i11formatio11 in the TSDL3. DO.I \\•ill •con:mll with the Parties, as necessary, lo provide continuing kgal advice .ind support un matters rdated 111 watdilisting redn::ss and this :vlOLJ. ( j' Visa Application Process; DOS and OJ IS Resnunsihilitics at lhl' Time nl' Visa Rcl'usal : 1. DOS and DHS will continue to rnmply \\'ilh npplicabk- visn procedurl?s, which may include an at-post internal n:vicw by n supervisory consular ti nicer or anolhcr appropriate onkial. While a consular tiffker's tknial of a visa appli..:ation may not he nverrukd. that <lett::rmination is informed hy an internal 111anag~·rncnt review :m<l, in appnipriate t:ases. by input from an interage111:y n:\·ie\\·. 11. Ir a visa application is refust:<l. applicams are advised that they may reapply li1r a \'isa. A suhscqu..::nt applicalion is consitkn:d ,is a new case. DOS agrees lo conlim1c 10 review the underlying Jala and foc1s in such suhscqw:nl applications . \Vhcncvcr appropriate, DOS consults with TSC. NCTC. and other agencies regarding dat.1 that appears it1c(1mplctc (II' inac1.:ura1c. nr otherwise conllicts with infornrntion ,.1h1ained in the Yisa application prucess. Sl:TTI.H.·11•: NT OF DISPUTES 1::-.L·cpl as set li.1rth in paragraphs 4.l'.\' and 4.F.iii t:1mcerni11g the deconllictinn ur waLchlist nominati,111s. disagreements between the Parties .irising under or related to this MOU will he resolved only hy t:on:,;ullation bdween the Parties. :g► (I) ::l ~- 0. 00 (1. I I ~ 'U 1111: R PR< )\"ISi< >\:S (I) ::J 0. This f\11 H. i:-- 1111L intcntkd lo i:ontlict with i:ilhcr tht: l"onstitulinn ur current kd1..'ral :--1a1u1cs. rcg11l,111011 s. or the din.:d i,-i.:s of thc Part k s. Ir any term or prov is inn nf this :\ I< ll ; is incnnsi s1t::111 with such authorit y, 1hc11 the krm or pro,·ision shall be inapplicahk to tha1 Pany and any otllcr Party that is deprndcnt upon Lhc rirsl P,1r1y·s action tu pcrliinn i1s rcsponsihilitics. hut the rcmainitt t! tcnm, and L'ondiLi1111s 111' this \HH l shall continue 111 apply . ·1hi:-- \I( H ' may he amended at an: time h: till: mutual \Hi Iten L'llll:.-L'nt uf tlh: P,irti c:--· aut}H)fi /.L'd 1\:prl.':--cntati, c:-.. \h1d ilic:1tiun within tllL' scnpc 111' 1h1s \l< n · shall he mat.IL' h: thL· is:--11 :11h:L' ,11' a full : L'\cc uh:d add.::ndum pri11r lo an:, l.'h;1n~c :-- i11 ri.:spons ihilit1i.:s bt.:in:c1 pcrli1r111cd . s. rt·. R\II N .-\TION The terms nr thi!'. l'Vl(.)l 1. as ii 111ay be :11llL'1tded. will remain in L·l"!i.:ct indelinitt::ly . T11 h:rminatc its participatillll in this Ml>l 1• a Party must g iVL' at kasl 30 days prim writh:1111,11ii.:t.:. 111 thl' L'H•nl 11f ll'r111ina1in11. i.:ach ParLy \\ ill l'ontinuc wi1h lirll pan1cipa1i1111 up 1n thi: cffi.:c1i, l' dale 1if' lt:nn i11:11 i1 lll . ,1 \: ( > OHLICi:\TI< ):\ l >F FL~ DS rl1i s /\I< ll : dnc...; 1w1 l'.l\llstitutl' an obligation w i.::--..pl'nd rund:-- hy :rn;- Part) . l 'nkss othL'I"\\ is1.· :1grt:l'd in" riling. l'ad1 Part~ shall bear an~ ct1s1 s. ii inl'urs in rl'lati1in to thi-. \ I( ll . F,pl'nd itmL·:-,, ill ht: suhjl'ct tt1 k1.kral hudgctary prPccssl's and a\'ailahilit~ nl' fund s purs uant t, 1 :1pplicahk la\\ s :111d reg ulations. ·1he Parlil.'s l'Xprcssly ad~11tndcdge that thi:-- \JUL: in nn ,, ay implies tha1 l'nngrcss will appro pri,11t.: funds li.w sut:h l':Xp1.·11di1un:s. I<>. ~ !]_J!._I_s_lV ATE Rll ii ITS Thi s t'vl( H : is an inh:rnal arra11ge1111:nt het,wl'n the Panit.:s and is 11()1 inte nded. and sh11trld 1H1t hl' -:rni:-trul'd. 111 crl':rtl.' an~ right 1lf bl.'nL'lil. suhs1a111i, l' ur prni.:l'dural. enli1r1.·1.·ahk at ur ntht.·n, i<;l' h: an:, third part~ a~ ains1 the Parlit.:s. th .:: ir p:m:nt nr L·11mpnnl.'nt agt:111.: il.':-.. th..- L 111t1: d ~ta11.·s. 1•r thl' nlfo.:i:r:--. t:mph1_yt:L's. agent ~ nr 111hi.:r associated pcr:..(11111c l Lhcrcn l". ta,, 11 . 1-.l·FHTl\'I-: l).\TI : l'hc t(·mis n r thi s \ !Ol · \\ iII hL·cnm e c t'fix:Ii, ·i: fhL· \ J( H · 111:1y hL· signed in L·1111ntcrp.ir1S. 1\11 thl' date 1111 ,, hkh it is s1g_nl'd hy :ii I P:irtii:s ·r hL· RL·sp1111 s ihk Olfo.: ials dc:-.i gnatc.:d by the.: l'artic:-. purs uant tu annual has is tir at Lile rt.·q11cs1 or any P:irt~ 11 1 discuss and 1\~\ ·icl\ SL'l'lil111 ---l . .-\ .i \\ ill mcc.:t \lll ,111 the i111pklllL't1tali(111 l,r thi s I; X 00 ► "O iv!( )LI . Failun: or the parties Lo conduct annual reviews will nnt result in the tennin:1lit)n nr acti\-ities provided for under this i\ IOU . 1 13. -0 (D ::i 0... St 00 POINTS OF CONT t\CT Pl1ints of contact ( POC's) 1hr the Parties. identi fled belt)\\', arc responsible for idcnti fying the respnn~iblc officials and redress resources pursuant tn sections 4.A.i and ii. and 4 .B.ii and providing that inforrnatio11 to the other POC's. i\. B. (' D. I:. F. Ci . I I. L .I . The POC f<.H· the Depnrtment ol'Justicc will he the ChidPrivacy and Ci,·il Liberties Ulfo:cr. The P< )(' for the Federal Bureau 111' Investigation will he the Scl'.linn l'hicf' or the Natilmal Threat Center Sectinn. l'ounterlerrorism Division . Thl· f>OC for the Terrorist Screening. Center will be th1:: Privacy Ofliccr. The PUC for the National Cnu11tcrtcrroris111 Center will be the Chier of thl" Terrnrist Identities Ciroup. The POC for the l)eparlmi::nt ol' Homeland Security will be the Director ol'thc Scn:cning Co1>rJination Olfo.:c. The POC for the Dcpartim~nt or State will be the Dir~ctor or Information l1vlanagL'11lt'llt and Li.iison Slal{ Vis.i Uffa:t:. The PO(' for 1hc Offo:e or thi: Director of"Natitinal l111clligence " ·ill be the Civil Lihcrties Prntcctinn Officer. The POC for the Ce111ral lt1tclliuencc /\gem:y \\'ill he the Chief or Policy and Co111111u11ity Action Staff ( PCAS ). The POC for the Department of Defense \\'ill h1..· the Dircctllr. Joint lntclligcnL·e Task Fon.:c ror Combating Terrorism. lkknsc lnh!lligcncc 1\gcncy . The PO(' for the Dcpart111ent or the Treasury will be the Assistant General Counsel ( Enforcement and Intelligence). The foregoing represents the understanding rc:ichcd by the Parties. APPROVED BY: - - - -- - ·· - - Condolcezza Rice Secretary Swtc or - - -··- - - Henry M. Paulson, Jr. Secretary of the Treasury Date Oate f. ~ls±,~ ;:y General Robert M. Gates Secretary of Defense - ··· - - - - - -- - -- Date Michael ChcrtolT Secretary of Homeland Security Date John D. l'-:cgropontc Date Director of l\ational l ntclligcncc 15 :g n ::i ..... 0.. ;>< 00 ~"~ Robc'i-is. Mucllcr7 Jtr Director, Federal 43urcau of Investigation -·- - - John Scott H.cdd Date Director, National Countcrterrorism Center ayden · ·, Date c:ncy rrorisl Screening Center 16 ► "O "O (I) ~ 0.. x· 00 The foregoing represents the understanding reached by the Parties. APPROVED BY: Condolecu.a Rice Secretary of State Date Henry M . Poulson, Jr. Secretary of the Treasury Date Alberto R. Gonzales Attorney General Date Robert M. Gates Secretary of Defense Date Michael Chertoff Secretary of Homeland Security Date Johnk.!t1~ Director of National Intelligence 15 ~ "O (1) :::s 0.. S<" 00 Robert S. Mueller, m Di.rector, Federal Bureau of Investigation Date National Counterterrorism Center Gen. Michael V. Hayden Diroctor, Central Intelligence Agency Date Richard S. Kopel Acting Director, Terrorist Screening Center Date 16 .-\PPH.O VED B\' : --- ■ Con<lolecz;,a Rice Sccn:tary or Slak Date I lt:nry \1. f>,·1uls0n. Jr. SL:crctary c,f the lrl'asu~· Datt' ---- - -- •''" :\lbertu R. ( i(.\nzalcs :\ttorn~y ( icneral Rohen 1' 1. Gales Scm;tary of (kfcnsc Dare 1 11 --fil i11 __- -·· Dale ary of I ll)meland Securil~ John D. Negropontc Director of National I ntdligcnct! Date 15 The foregoing represents the understanding reached by the Parties. APPROVED BY: 05/lJ/WO] Date Henry M. Paulson, Jr. Secretary of the Treasury Date Alberto R. Gonzales Attorney General Date Robert M. Gates Secretary of Defense Date Michael Chcrtoff Secretary of Homeland Security Date John D. Negroponte Director of National Intelligence Date 15 ► "Cl "Cl (1) ::i Cl.. ;;r 00 :,, ,li-:·n :·; . !\tu.J h:r. 1.1! !); ;,:, 1,-1r . L:,J,:1.il li1 ir•.:Ju ,--. •"!nvc.=:ti,·.:'1 1:,:1 i:;. ~t.: I J ·::. !- .r.'! '·.:l .\ ,.M~~ :, .. I)!!'".: :_..!.._,: ·r-~~ ••)!"·· ., . . :-~·:.·::!:--~·. ( _: • j• • If' > 'O 'O The foregoing represents the understanding reached by the Parties. ~ ::i 0.. x· APPROVED BY : 00 Co11dolcc2za Rice Secretary of State /;]~ _/;/1 , -.~.~; H' M. Paulson, Jr. Date febroorv Date Secretary of the Treasury Alberto R. Gonzales Attomcy General Dale 9-1 Date Michael Chcrtoff Secretary of Homeland Security John D. 1':egropontu Director of National Intelligence Date , ? 2007- January 7. 2010 \fE\IORA~Dl 'tvl FOR THE SECRETARY OF STATE THE SECRETARY OF DEFENSE THE ATTORNEY GENER.A L THF. SF.CRETARY ENERGY THF. SECRETARY OF HOMELAND SECURITY THE DIRECTOR OF NATIONAi. INTELLIGENCE THE DIRECTOR OF THE CE:'!TRAL INTELLIGENCE r\GE;--;cv THE DIRECTOR OF TllE FEDERAL Bl'. REAl ' OF INVESTIGA Tl< >N THE DIRECTOR OF THE NATIONAL SECURITY Alil~NCY THE DIRECTOR OF TIIE NATIONAi . COUNTERTERRORISM CE~TER Sl}l-\JECT: Anemptct.l Terrorist Allack on December 25 . 2009: Intelligence. Screcnine. ant.I Watchlisting System Corrective Actions After rccei\'ing the wnclusion ~ of the White House-led review of the U.S. '"'atchlisting system an<l the perfonnancc of the intelligem:e. homeland security.. an<l law enforcement communities as related 10 the attempt tll bring down a Ddroit-hound flight on December 25 by detonating an explosi\'e device. and a Department of Homeland Security-led rc\'icw on A \'iation Screening. Technology and Procedures; l ha\'c concluded that immediate actions must be taken lo enhanci: the security of the American people. These actions are necessary given inherent systemic weaknesses and human errors revealed hy the review of e\'cnts leading up 10 Oecember 25°'. They also arc required 10 ensure that the standards. practices . and husiness pn,ccsscs that have been in place since th\! aftcm1ath of 9/J I are appropriately robust to aJJress the C\'OI\- ing tt:rrnrist threat facing. nur Kat ion in the coming years. Department of State • Rc\'icw visa issuance and revocation criteria and processes. with special emphasis on counterterrorism concerns: detennine how technology enhancements can facilitate and strengthen visa-related husiness processes. Dcp:•rtmcnt of Homeland Security • Aggrc.ssi,·ely pursue enhanced scri:-cning tt!chnology. protocols. ::md proce<lurcs. t!Spt:..:ially in regard to aviation anJ other 1r,msportatiun sectors. consistent with pri\'acy rights and civil liberties: strengthen international partnerships aml coordination on aviation security issul.!s. • Develop recommendations on long- Lenn law i:nforcement requirements for aviation security in coordination with the Department of Justice. Director of National Intelligence • lmmcJiately rcallim1 and clarili· roles and responsibilities of the coumerterrorism analytic components of the Intelllgence Communjty in synchronizing. correlating. and analyzing all sources intelligence related to terrorism. or • Accelerate information lcchnology enhancements. to include knowledge discovery. database integration. cross-database searches. and the ability to correlate hiographic infom1ation v,:ith terrorism-related intelligence. • Take rurther steps to enhance the rigor am1 raise the stanJanl of tratlecr::.ift of intellig<.!m:c analysis. especially analysis designed to uncover and prevent terrorist plots. • Ensurc resources are properly aligned wiih issues highlighted in strategic \\aming analysis. The Central Jntelligc11cc Agency • Issue guidance aimed at ensuring the timely distrihution of intelligence reports . • Strengthen procedure:; related ll> how wati.:hlisting infom1ation is entered. reviewed. searchcd. analyzed. and acted upon. Federal Bureau of lnvcstigationffcrrorist Screening Center or • Conduct a thorough review Terrorist Screening Database holdings and ascertain current \"isa status of all ··known and suspected terrorists:· hcginning with thc No Fly list. • Dc\"clop recommendations on whether adjustments are ncetlcd to the watchlisting Nominations Guidance, including biographic and derogatory criteria for inclusion in the Terrorist Identities Datamart Environment and Terrorist Screening Database. as well as the subset Sdectcc and i\o Fly lists. National Counterterrorism Center • Establish and rl!sourcc appropriately a process to prioritize and to pursue thoroughly and exhaustiwly terrorism threat threads. to include the identification of appropriate followup aclion by th-.: intelligc-nl!e. law enforccmenl. and homeland security communities. • Establish a dedicated capahili1y rcsponsihlc for enhancing record infom,atinn on possible ccrrnrists in the Terrorist Identities Datamart Em·ironment for \vatd1listing purposes. National Security Agenc)" • Develop and begin implementation of a training course lo enhance analysts' awareness of watchlisting processes and procedures in partnership with National Countcrtcrrorism Terrorist Center and the Terrorist Screening Center. :'.'Jational Security Staff • Initiate an intcragency policy process to review the systemic failures leading to the ancmptcd terror al1ack on December 25. 2009, in order to make needed policy adjustm ents an<l to clarit~· roles and rc!sponsibilities \\ithin the countcrterrorism conununit;, . • Initiate an intcrag.cncy rcvic,v of the watch listing process. including business processes. procedures. ru1d criteria for watchlisting, and the interoperability and sufficie.ncy supporting infom1ation technology systems. or I ha,·c designated my Assistant for Homdand Security and Count1..:rtcrrorism John Brc:nnan to bt: rhc rcsponsihlc and accountahk \Vhitc H0use official t0 ensure rapiJ progre ss is made in all areas ...;.\ monthly status report o n actions und1::rway should be submitted tll m1: through Mr. I3n.:nnan. fn addition. I am directing Mr. 11rennan to work with departments and agencies and the Office ivl:magemcnt and Budget on resource requirements th.n are necessary to address the shortcomings uncovered by our reYiew. Finally. I will ask my Intdligencc :\d\'isory BoarJ to tonk at hroader analytic and intelligence issues associated with this incident, including how to meet the challenge associated wi.th cxpll1iting the en:r-incrcasing nilume 0f infonnation available to the Intelligence Community . As we gn forward . it is impcrath·e that we \\'L1rk together to correct pn.ibkms highlighted hy this incident. 1i.11.: using on concrete :mlutions. We arc all responsible for the safety anJ security of the American people and must redouble our eff011. to be d'foctivc in carrying out this solemn responsihility . or UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Acronym Addendum B A-File AIS ALA APT ATM ATS CBP CBRN CCD CIA CJIS CLASS CTD DC DCI DHS DlA DoD DOJ DOM EX DOS DSR OTO EFPs EMA ERO ESEL ESTA FBI FlN FISA FGI FTO FTTTF HAZMAT HSPD-11 Description Addendum B to the Memorandum of Understanding on the Integration and Use of Screening Information to Protect Against Terrorism, Signed by The Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the Director of National Intelligence, the Director of the Central lntelligence Agency, the Director of the National Counterterrorism Center, the Director of the Terrorist Screening Center Alien Registration File (DHS) Automated Identification System Airport Liaison Agents and Attaches (FBI) Advanced Passenger Information Automated Teller Machine Automated Targeting System (DHS) U.S. Customs and Border Protection (DHS) Chemical, Biological, Radiological, or Nuclear Consular Consolidated Database (DOS) Central Intelligence Agency Criminal Justice Information Services Division (FBI) Consular Lookout And Support System (DOS) Counterterrorism Division (FBl) Deputies Committee Director of Central Intelligence (now the DNI) Department of Homeland Security Defense Intelligence Agency (DoD) Department of Defense Department of Justice Document and Media Exploitation Department of State Daily Summary Reports (TSC) Designated Terrorist Organization Explosively Formed Projectiles/Penetrators Encounter Management Application (TSC) Enforcement and Removal Operations (DHS/ICE) Expanded Selectee List Electronic System for Travel Authorization Federal Bureau of Investigation Fingerprint Identification Number (DHS) Foreign Intelligence Surveillance Act Foreign Government Information Foreign Terrorist Organization Foreign Terrorist Tracking Task Force (FBI) Hazardous Materials Homeland Security Presidential Directive - 11 , Comprehensive Terrorist-Related Screening Procedures UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 0 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Acronym HSPD-24 HSPO-6 l&A IAFIS lAP ICE IED !IR lNA Information Sharing MOU IP JPC IRTPA ISA !SE JTTF JWlCS KSTF LEGAT LEO LPR MOU NCIC NCTC NDIU NICS NIPF NIPF-CT NlV NMEC NORTHCOM NTC-C NTC-P NVMC Description Homeland Security Presidential Directive-24, Biometrics for Identification and Screening to Enhance National Security Homeland Security Presidential Directive-6, Integration and Use of Screening Information to Protect Against Terrorism Office of Intelligence & Analysis (OHS) Integrated Automatic Fingerprint Identification System (FBI/CJIS) f mmigration Advisory Program U.S. Immigration and Customs Enforcement (OHS) Improvised Explosive Device Intelligence Information Report Immigration and Nationality Act Memorandum of Understanding between the f ntelligence Community, Federal Law Enforcement Agencies, and the Department of Homeland Security Concerning Information Sharing, dated March 4, 2003 Internet Protocol lnteragency Policy Committee (IPC) is an interagency group led by the White House National Security Staff to establish Administration policies Intelligence Reform and Prevention Act The Information Sharing and Access Jnteragency Policy Committee (ISA IPC) is the While House led group that specifically addresses watch listing policies for the U.S. Government Information Sharing Environment Joint Terrorist Task Force Joint Worldwide Intelligence Communications System Known or Suspected Terrorist File (Federal Bureau of Investigation, National Crime Information Center,formerly Violent Gang and Terrorist Organization File (VGTOF)) Legal Attaches (FBI) Law Enforcement Online Lawful Permanent Resident Memorandum of Understanding National Crime Information Center (FBI) Nati.onal Counterterrorism Center Nominations and Data Integrity Unit (TSC) National Instant Criminal Background Check System National Intelligence Priorities Framework National Intelligence Priorities Framework - Counterterrorism Non-Immigrant Visa National Media Exploitation Center Northern Command (DoD) National Targeting Center - Cargo (DHS/CBP) National Targeting Center - Passenger (DHS/CBP) National Vessel Movement Center (OHS) UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION ~ 'U n ::l 0. X 0 UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION Acron~·m Descripti on OTA OTW PI ERS PNR POE ROD Office of Intelligence and Analysis (DHS/TSA) One Time Waiver Passport Information El ectronic Records System Passenger Name Records Port of Entry Radioactive/Radiation Dispersal Device Memorandum of Understanding on Terrorist Watch list Redress Procedures Specially Designated Global Terrorist Specially Designated Terrorist Secret Internet Protocol Router Network Subject Matter Expert Specially Designated Nationals List Single Review Queue (TSC) Tipoff Australia Counterterrorism information Control System Threat-based expedited upgrade No longer an acronym. Previously Treasury Enforcement Communications System. Terrorist Identities Datamart Environment Not an acronym. Also seen as Tipoff Terrorist Review and Examination Unit (TSC) Traveler Redress Inquiry Program (DHS) Transportation Security Administration (OHS) Terrorist Screening Center Memorandum of Understanding on the Integration and Use of Screening Information to Protect Against Terrorism Terrorist Screening Database Terrorist Screening Operations Center (formerly Terrorist Screening Tactical Operations Center (ISTOC))(TSC) Terrorist Screening Operations Unit (fSC) Terrorist Threat Integration Center (now NCTC) Tipoff United States Canada Transportation Worker Identification Credential (DHS/TSA) United States Unclassified, for official use only United Nations Security Council Resolution Uniform Resource Locator United States Agency for International Development United States Coast Guard (DHS) U.S. Citizenship and Immigration Services (DHS) United States Secret Service (OHS) Vehicle Identification Number Watchlist Service (DHS) Redress MOU SDGT SOT SIPRNET SME SDNL SRQ TACTICS TBU TECS TIDE TIPOFF TREX TRIP TSA TSC TSC MO U TSDB TSOC TSOU TTIC TUSCAN TWIC U.S. U//FOUO UNSCR URL USAID USCG USCIS usss VIN WLS UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMATION 0 UNCLASSIFIED//FOR OFFICIAL USE ONLY/ SENSITIVE SECURITY INFORMATION Summary of Changes and Updates from the 2010 Watchlisting Guidance / ,.,.0Ut ..-• ..'"i·,.' . r.r, ~t~s2~~ ... . ...... ...~ ~ *..-..(!1~.fOUO) The Watchlisting Guidance is a comprehensive document detailing the U.S. Government' s terrorist watchlisting policies and procedures. It was originally developed to help standardize the watchlisting community' s nomination and screening processes. Since approval of the Watchlisting Guidance in July of 20 I 0, the guidance and its related appendices have undergone a thorough interagency review as a result of a May 2010 Deputy' s Committee tasking to the White House National Security Staff Information Sharing and Access lnteragency Policy Committee ((PC) that any significant issues or required changes be brought back to the Deputies for discussion. The Information Sharing and Access IPC identified a number of changes in Department and Agency watchlisting practices that had evolved since dissemination of the guidance in 2010. In order to reflect these changes, the 2013 Watch listing Guidance was developed over a period of several months by an IPC under the auspices of the Presidential Policy Directive - One (PPD 1) process with representatives from the Departments of State, Treasury, Defense, Justice and Homeland Security, the Office of the Director of National Intelligence, the Central Intelligence Agency, the National Security Agency, the Defense Intelligence Agency, the National Counterterrorism Center, the Federal Bureau of Investigation, and the Terrorist Screening Center. The Deputies Committee adopted the recommendation of the JPC to approve the 2013 Watchlisting Guidance on March 12, 2013 . (U//FOUO) The 2013 Watchlisting Guidance has a new structure and is organized in a way that mirrors the watchlisting cycle. It is now a single document divided as follows into fives chapters, with significant watchlisting foundational documents for reference, and a list of definitions, acronyms, and abbreviations: • • • • • • • • • Chapter I : Watchlisting Process and Procedures; Chapter 2: Minimum Identifying Criteria; Chapter 3: Minimum Substantive Derogatory Criteria; Chapter 4: No Fly>Selectee and Expanded Selectee Lists Implementation Guidance; Chapter 5: Encounter Management and Analysis ; Appendix l: Definitions; Appendix 2: Homeland Security Presidential Directive 6; Appendix 3: Memorandum of Understanding on the Integration and Use of Screening Information to Protect Against Terrorism (TSC MOU) ; Appendix 4: Addendum B to the TSC MOU; UNCLASSIFIED// FOR OFFICIAL USE ONLY/ SENSITIVE SECURITY INFORMATION WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons without a "need to know", as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transportation Security Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For U.S. Government Agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and 1520. UNCLASSIFIED//FOR OFFICIAL USE ONLY/ SENSITIVE SECURITY INFORM ATTON • • • • • • • Appendix 5: Memorandum of Understanding between the Intelligence Community, Federal Law Enforcement Agencies, and the Department of Homeland Security Concerning Information Sharing (Information Sharing MOU) ; Appendix 6: Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans; Appendix 7: Department of Justice Protocol on Terrorist Nominations; Appendix 8: Memorandum of Understanding on Terrorist Redress Procedures (TSC Redress MOU) ; Appendix 9: Presidential Memorandum Regarding 12/25/2009 Terrorist Attack; Appendix 10: Acronyms and Abbreviations; Appendix 11: Summary of Changes and Updates from the 2012 Watchlisting Guidance. (U//FOUO) The 2013 Watchlisting Guidance includes the following substantive policy changes and updates: • New, amended, or clarified definitions are included for the terms "aggregator," ''derogatory information," "encounter," "enhancement," "foreign fighters," "fragmentary information," " known terrorist," " lone wolf," "operationally capable," " particularized derogatory information," " reasonable suspicion," ''terrorism screening information," "terrorism and/or terrorist activities," and "U.S. Person" (Appendix 1); • Nominators are instructed to send available information to the National Counte1terrorism Center for consideration and additional review where reasonable minds could disagree on a record (Chapter 1); • Nominating Departments and Agencies are instructed to prioritize the identification of new Known or Suspected Terrorists who meet the reasonable suspicion standard, along with the identifying and derogatory information most useful to the watchlisting and screening effort (Chapter 1); • Nominating Agencies are to conduct periodic reviews of their nominations of U.S. Persons, at minimum on an annual basis (Chapter l); • Detailed instructions are described for handling U.S. Person information and ensuring that proper coordination processes are implemented (Chapters l and 3); • The guidance regarding minimum identifying criteria has been revamped and exceptions clarified (Chapter 2); • The guidance has been revised to provide Nominators with more flexibility regarding nominations of individuals based on fragmentary information (Chapter 2); • The minimum substantive derogatory criteria guidance has been restructured to elaborate on instances of where particularized derogatory information is required to meet the reasonable suspicion standard, and when reasonable suspicion is established by other authority (Chapter 3); UNCLASSIFIED//FOR OFFICIAL USE ONLY/ SENSlTIVE SECURITY INFORMATION UNCLASSlFIED//FOR OFFICIAL USE ONLY/ SENSITIVE SECURITY INFORMATION • The minimum substantive derogatory criteria has been restructured to enable the watchlisting community to more clearly distinguish between watchlisting based on substantive derogatory criteria that meets the reasonable suspicion standard from watchlisting for purposes that support immigration and visa screening activities of the Department of Homeland Security and the Department of State (Chapter 3); • Revised guidance is provided regarding the watchlisting of individuals based on information provided by a foreign government (Chapter 3); • The guidance contains two additional categories of alien non-terrorists in the databases maintained by the National Counterterrorism Center and the Terrorist Screening Center to support immigration and visa screening activities of the Department of Homeland Security and the Department of State (e.g. , individuals who have a defined relationship with the Known or Suspected Terrorist, but whose involvement with the Known or Suspected Terrorist's activities is unknown (TIDE Category Code 50) and aliens for whom additional intelligence is required (TIDE Category Code 99)) (Chapter 3); • The Implementing Guidelines regarding the No Fly and Selectee List criteria have been updated and clarified (e.g. , Guantanamo Bay detainees are now included on the No Fly List, as required by 49 U.S.C. Section 44903U)(2)(C)(v)) (Chapter 4); • Use of the One Time Waiver Policy is addressed to facilitate travel under controlled conditions of certain U.S. Citizen Known or Suspected Terrorists (Chapter 4); • The guidance reflects the creation of the Expanded Selectee List, an export to the Transportation Security Administration of Known and Suspected Terrorist records within the Terrorist Screening Database that contain a full name and complete date of birth to support airline passenger screening (Chapter 4); and • The guidance reflects the authority of the Terrorist Screening Center Director to make individual watchlist determinations (i.e., placement on the No Fly, Selectee and Expanded Selectee Lists) during exigent circumstances (Chapter 4). (U//FOUO) These changes to the Watchlisting Guidance are intended to make the watchlisting process more flexible, agile, and inclusive in order to respond to additional terrorism threats whi le providing the watchlisting community detailed guidance concerning the watchlisting policy of the U.S. Government. (U//FOUO) The 2013 Watchlisting Guidance describes the U.S. Government's comprehensive watchlisting policies and process and includes Sensitive Security Information. Accordingly, Departments and Agencies who received copies of the 2013 Watch Iisting Guidance are instructed to carefully control and share the guidance with only those individuals who are directly involved in the terrorist watchlisting and screening process. UNCLASSIFIED//FOR OFFICIAL USE ONLY/ SENSITIVE SECURITY INFORMATION UNCLASSIFIED//FOR OFFlCIAL USE ONLY/ SENSITIVE SECURITY TNFORMATTON (U) Nothing in the 2013 Watchlisting Guidance is intended to restrict the authority of any Department or Agency to act as provided by law, statute, or regulation, or to restrict any Agency from enforcing any laws within its authority or jurisdiction. :g> (1) ::3 0.. ~- ,_. ,__ UNCLASSIFIED//FOR OFFICIAL USE ONLY/ SENSlTlVE SECURITY INFORMATION UNCLASS lr-lED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMAITON UNCLASSIFIED//FOR OFFICIAL USE ONLY/SENSITIVE SECURITY INFORMAJTON WARN ING: This record contains Sensit ive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons without a "need to know", as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transportation Security Administration or the Secretary of Transportation. Unauthorized release may result in civi l penalty or other action. For U.S. government agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and 1520.