476
information reiati q to National Securitvl 1117 U Terrorism investigation ..The investigation can be opened as a result of a complaint or other Information. The TFO may Ito investigate or collect lithe 415 Policy (i.e., Case Classification for Terrorist s b7E JTFF CBT Page 1 of 1 —(380141(ALAOECIEN JOINT TERRORISM Introduction To The TASK FORCE (3TTF) FBI ORIENTATION Bureau Operations (U) The FBI is America's lead terrdrlsM federal inuczUgativpflew enforcement agency. It conducts many and varied investigations that are derived primarily through Congressional Legislation or authcrizatlan. The Bureau also assists state and local entities when help is requested. Invest! ation) are The SSA can aut orize The SAC can au orize after that FBIHQ has to authoriz QUIT :: PREVIOUS:: NEXT PAGE: 13 OF 17 - -SseBBOAtoolcORN- file://D:\jttfoV2\modulel\m1_120.htm 8/8/2011 FBI020624 ACLURM020833

U Terrorism investigation 1117 Ito investigate or collect

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

information reiati q to National Securitvl 1117

U Terrorism investigation ..The investigation can be opened as a result of a complaint or other Information. The TFO may

Ito investigate or collect lithe 415 Policy (i.e., Case Classification for Terrorist

s

b7E

JTFF CBT

Page 1 of 1

—(380141(ALAOECIEN

JOINT TERRORISM

Introduction To The TASK FORCE (3TTF)

FBI ORIENTATION

Bureau Operations (U) The FBI is America's lead terrdrlsM federal inuczUgativpflew enforcement agency. It conducts many and varied investigations that are derived primarily through Congressional Legislation or authcrizatlan. The Bureau also assists state and local entities when help is requested.

Invest! ation) are The SSA can aut orize The SAC can au orize after that

• FBIHQ has to authoriz

QUIT :: PREVIOUS:: NEXT PAGE: 13 OF 17

--SseBBOAtoolcORN-

file://D:\jttfoV2\modulel\m1_120.htm 8/8/2011

FBI020624 ACLURM020833

JTFF CBT Page 1 of 1

JOINT TERRORISM TERRORISM Introduction To The TASK FORCE (3TTF) FBI

ORIENTATION

Bureau -Operations (Can't) (u) Doczt!,c Investigations and Operations Guide (DIOG)

m predicate the type of Investigative techniques authorized I I Evcry'

investigation has its own case identification (ID) number. The first part of the case ID is a numeric classification and an alphabetic sub-classification. This numeric classification code stands for a distinct type of investigation. Common case classifications involved with 3TTEs are 266 (Domestic Terrorism) and 415 (International Terrorism). Examples are 266H = Anarchist Extremist and 414 t Each case ID also has a two-letter Field office designation. For example: NY Indicates the New York Field Office or Division. Finally, a case ID has a unique computer generated number. Example: 123456.

(U) An International Terrorism investigation originating out of the New York Office with ani !nexus would look like: 414aNY-123456. Field Offices have pocket size, hard copies of this FBI Investigative Classifications for investigators and staff. The updates to the hard copy are made on a yearly basis.

QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 17

--SEeRflf44.130E03N-

b7E

b7E

file://D:\jttfoV2\modulel \m1_130.htm 8/8/2011

FBI020625 ACLURM020834

JTFF CBT Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

0 RIENTATIO N

Bureau Operations (Con't)

Introduction To The FBI

(U) Investigations within the Bureau are commonly referred to as cases. 3ITTF cases are opened to investigate or collect information relating to threats to National Security. Opening of a case usually involves a communication, most often the Bureau's standardized Electronic Communication (EC). This gives information regarding the predicating offense, information regarding subjects of the case, and other administrative information. The case agent drafts this communication and receives the appropriate approvals. An FBI support employee opens the case in the Bureau's Automated Case Support (ACS) computerized case management system, and assigns a case number.

(U) There are several other terms regarding a case that need to be explained:

• Pending • Pending Inactive • Closed

QUIT :: PREVIOUS :: NEXT

PAGE: 15 OF 17

file://bAjttfoV2\modulel\m1_140.htm 8/8/2011

FBI020626 ACLURM020835

JTFF CBT

Page 1 of 1

—eretereiyttePeFel

JOINT TERRORISM

Introduction To The TASK FORCE (JTTF)

FBI

ORIENTATION

Bureau Operations {con't) (U) Pending indicates that the case Is open and being worked by the FBI. There are occasions when a case is pending, but no investigation or other activity on the case is expected to occur for an extended pericd of time. These investigations may be placed in Pending Inactive (PI) status by the SSA.

(U) A case is closed upon successful resolution of the investigation, prosecution, or exhausting of all investigative avenues. Closing of the case is documented on an EC.

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 17

--"Mrefteie,Lis

file://D:\jttfoV2\modulel\m1_150.htm 8/8/2011

FBI020627 ACLURM020836

JTFF CBT Page 1 of 1

—SEVAB94111:20813

JOINT TERRORISM

Introduction To The TASK FORCE (3TTF)

FBI ORIENTATION

Nodule Review (U) FBI Priorities:

• List of ten priorities of the Bureau - with the number one being preventing a terrorist attack on the United States.

(U) The FBI has a long and extensive history of fighting crime and the new emphasis on the ten priorities.

(U) The FBI is divided into Headquarters and Field Divisions:

. There are many Headquarters divisions and entities and 56 Field Offices • Foreign FBI Offices are known as Legats.

(U) Bureau investigations are known as cases.' A case can alsol

(U) The FBI has its own language demonstrated by the use of abbreviations and case classifications.

PREVIOUS :: FINISH MODULE

PAGE: 17 OF 17 ---11643Par44:1QIEQE

file://DAjttfoV2\modulel\m1_160.htm 8/8/2011

b7E

FBI020628 ACLURM020837

Overview Of Instructional Goal And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the types of written Communications: and administrative pAlicirs and procedures employed by the FBI in the fight against domestic and international terrorism.

(U) Objectives:

1. Read and review the types of written communications used within the FBI. 2. Gain a basic understanding of the FBI's administrative policies and procedures.

EXIT MODULE :: NEXT PAGE: 1 OF 14

—eacciutal.,Oimunt

file://DAjttfoVamodule2V/12_000.htm 8/8/2011

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DIM/ stp/ lsg ON 10-14-2011

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

0 RIENTATIO N

FBI Written Communications And Administrative Details

FBI020629 ACLURM020838

JTFF CBT Page 1 of 1

LOPZBY-ANGPeFal

JOINT TERRORISM TASK FORCE OTTO

ORIENTATION

Operational And Investigative Writing (U) Electronic Communication

FBI Written Communications And Administrative Details

(U) The Electronic Communication (EC) is the Bureau's standardized internal communication for investigative tasking (leads) and disseminating information. ECs are how ITTF agents and Field Offices receive and send important case information. An EC must be written when an investigation is opened. An EC is a macro (an automated template) that can be accessed from the Corel WordPerfect software application icon found on the computer desktop.

• Importance of Setting Leads • Drafting an EC • Approvals . Uploading an EC • FD-302

o Example • Drafting an FD-302 . Approval • Procedure for Indexing ACS

QUIT :: PREVIOUS :: NEXT

PAGE: 2 OF 14 --SSCRES41MCIELMIL

file://DAjttfoV2\module2\m2010.htm 8/8/2011

FBI020630 ACLURM020839

Ce aclurntations- , Ad,linistitive- Details'

JTFF CUT -Windows Internet Explorer ,

(120 e Itelottforneodle2tm2_010.htm

Pie Edt Mow Fayortas To Help

Favorites I t;;;) PEI Intranet

.4 717F CBT

1.4 X Fps,.-

- Etee • Safety. Toth • le'

JOIN T, ERRORTSM * t r li

* V

TASK FORCE. (,Vj F)

„ 'ORIENTATION

Operational

(u) Electronic

(U) The Electra investigative tar receive and sen Is a macro (an I icon found on t

At internal communication for e how Yri-F agents and Field Offices n when an investigation is opened. An EC Corel WordPerfect software application

- - - - (U) It is necessary to set leads so that other Field Offices or FBI HQ Divisions can assist with the Investigation of the case or track outgoing communications from your office.

Importance of Setting Leads Cte•ic _ - • •

• jmoortang • Drafting at rfrAgranuriklg

.1; • • F1:1-3077..

o I .--4-piiafturarq1)-302 \\_

-• tt_asionntal-

procedure-forndexinn ArRs-,\

k

/ ••■ , .

X•N

s , / 1 • 1 \

ormlnir eysvair•-• ti Ply Casette, •: 4t weir: • -

1=11 a),FF "'

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED

b 7 E DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg b 7 E

b 6 b7C

FBI020631 ACLURM020840

`e.. 4t X 13.0;,—; :r Isf DtInfoRtmodule4m2_010.hn

Fla Edt Now Freon/as Tools Hob

*Deviates LIVIntronet

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg

gin+ CBT

.1,7--.31:1/14T.TERFLORIS, t TASK FORC,E.C3Vhi

ORIENTATION. (1-

- 0 v cira - pew • Safety • Took. al. "

9frin19.flica 1,905 An Admlibstrative Detalis

Deakin° an EC

Information on how to draft an EC can be found in the Flertrnnir. Communication Reference Guide

ad internal communication for e how IITF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application

• Imoortang • oraftina at 1,,,Aporovlif,

••• ..,p0-307e ' o

'pratincran•Eb-302"•.<"\\ Approval- -

-1: procedure-for Indexi g

g Ply Canada fa 5' 4'. Ito% • ,•

Operational-

fu) Km-ironic (•

(U) The Electro, Investigative tat receive and serf Is a macro (an f icon found on t-

E7E

b6 b7C

g.JT IT CDT - Windows. Internet hpInter

FBI020632 ACLURM020841

4. 9 My Carrplat

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

.JIFF CUT Windows Internet Explorer

.0 51, DARIfee2tmodde200010.htrn

Fie Vle., Favorites To He

LC Favodes I .4 ty FM laranst

JIFF ®r

vj 41, X FP cw:

as Con-runtcattpns And .. *Ad n fratiir,6,Details

Operational (U) Electronic <

(U) The Electra' Investigative tm receive and sed, Is a macro (an I icon found on t

▪ Important . praitina al

Aonrovais

sewn:muds

The EC macro has an Approved Information prompt that reflects the official Bureau name(s) of Individuals) responsible for approving the EC. There are lines for multiple approvals that may be necessary.

SIFF 9:V•PM

d internal communication for e how JTTF agents and Field Offices n when an Investigation N opened. An.EC Corel WordPerfect software application

fr

--,

. lkaTnran.p -sa 4 <-4„\

Pli i-4 -1:' i-f4Indexina A;Et-'\ ,.. ,,..

..:"‹ •.' / "\,, ." \ '" \

▪ 0

.1)7 E

b6 b7C

FBI020633 ACLURM020842

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

b7E

(r ,JIFF CST - Windows Internet Explorer

gg. Fie Eck View Favorites To* He •

I'

*Favorites I ,•,:3 di Fal Intranet

iSJIFF CDT

- 0 - Ps- 5ddy ■ TOth CO.

r Uploading an EC 00714 " A!! r.:prv:cd CC up:zzdzsi the .g :t Sy..":!= (ACE). The ACS has 3 components: investigative Case Management (ICM), Electronic Case File (ECF), and Universal Index (UNI).

• ECF Is the Electronic Case File. It serves as the central electronic repository for the FBI's official Investigative textual and non-textual documents.

• ICM is the Investigative Case Management function. The ICM Includes: opening, assigning, and closing of administrative and investigative cases; setting, assigning, and covering of leads; setting record checks; and setting, completing, and tracking of ticklers.

• UNI is the Universal Index Application that serves as the FBI's General Index repository of records processing functions for the FBI's Investigative and administrative cases.

ECs are uploaded either through FBINET or through the Web-based Automated Case Support (WAGS) application found on the FBI Intranet.

Ri cars•Asi

'tfgeR '110gmu ,esvar "°%

FBI020634 ACLURM020843

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10714-2011 BY 65179 DMH/ stp/ lsg

C.JTFF CBT - Windows Internet Explorer

v.,4r x. fp Lv•

Fie Edit View Fawkes To* Heb

*Famites 54 g; Fentaxxt

FF car 111 • 0 0 6, • Pane • Moir. Tod, • 0.

CorprijuNga ions An rd inlS .time Detai15.

FD-301

The FD-302 is a form used to record the results of any Investigative activity that may result In testimony being given. The purpose of the FO-302 Is to provide an accurate and complete record of all evidence developed during an investigation.

Das

0 Examilh„,̀■.=-1,j,

••• • A1211Mi11-1 .--1. Procedure-f0Indexing A_ _;\

C . •

. .. • •i ss.

r=r-i-517F:5?„,,W

vz; V :P.., DARti0V2V110d1k741112010111311

Operational jul Flectrnnlr e

(U) The Electra investigative tat receive and sen is a macro (an z Icon found on r

• Important; • °ratline al

al internal communication for e how 3TTE agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application

FBI020635 ACLURM020844

-M - Pork, Safety • tads "

IP- ‘4,,, V fie, DdIttroMmodulann2010.htm

Flo Edt Kew Favates Tab 11±

FRIIntranit

:03TFParr

• Nfs

4 • AIM g hrOnoutor

fAetgia;# GOEVATIKi 460064 _ Gil JIFF CET

.b7E

exampl. (;"4•K The FD-302 can be used to document the results of the following investigative activity:

• When accepting or providing evidence

• Interviews • Surveillance results • Subpoena results

Trash cover results • Arrests

Click here to see an example of an FD-7K;

mi internal communication for e how ITTF agents and Field Offices n when an investigation is opened, An EC Corel WordPerfect software application

• % o —71--Errantncran,F1S-302

Apneoval--4 A" ....A procidure-fOr Indexing Atg-

-

'I • :tiireDadils:

Operational

Ito Electronic P

(U) The Eiectro; investigative tat receive and ser( Is a macro (an z Icon found on t

• Imnortanq • Drafting a(

..lu,Yr• jI1zi

a.,ITFF,C13T-.Windows Internee Explorer CR

(

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED. DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

FBI020636 ACLURM020845

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMHJ stp/ 1sg FD-302 (Rev. 10-6-95)

FBI020637

-1-

FEDERAL BUREAU OF INVESTIGATION

Date of transcription 06/02/2006

File a 266H-CE-123456 Date dictated

JOHN D. SMITH; white male, born: January 1, 1975, B$A!T: 123-45-6789, 123 First Street, Anytown, N.C. 54321, (704) 987-6543, was advised of the identity of the investigating agent and the purpose of the interview. He provided the following information:

XXXXXXXXXXXXXXXXXXXXXX2CCX.XXMXXXXXXXX=XXXXXXXXXXXXXXX=( xxxxxxxxx.xx XXXXXXX •

XXXXXXXXXXX XXX XXXX.

Investigation on 06/01/2006 at Anytown, N.C,

by SA JANE C. DOE

This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.

ACLURM020846

s • iffl • Page • Safety • icon. FO. "

• Importang • Drafting a( ,..Auprovals

7. ...s, , _.• Egzsg2e. . t )'.. - Ekamoie.)--" -.4,v, ■ ...-

--ii-praftinran.F0-30% \--\4\\

__„....-ii. procAdure-fli Indexinn rt..1-:.,,,\ .., •

'ii: '

. - ''r-... . ••<*s 'i \ -1. ,...\/ 'a

3DdgeoV2Into4te200_010.1tal

no Edt View Favonica Icon It* -

14- Pandas 1 14 a; Minton!!

- - - - - -- J WiTIFCBT

*tyo 7-7k .40INT,TERRA) RN A! * ra 1:7 slll ,TASK FORW3TTF)

. _

Operational f Ul Electronic

(U) The Electra Investigative tea receive and sea Is a macro (an icon found on r

Drafting an FD-302

One FD-302 Is written for each Investigative action.

There should be no more than five working days between the date of obtaining the information and the date the FD-302 Is written.

AI Internal communication for e how ITTF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application Information on how to prepare an FD-

302 can be found on the FBI Intranet at: htto://home.fblnet,fbliformsifd302

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

ail-FF CDT; t/indows Internet Explorer

• g MY CainKter es • trier ni • •

b7E

FBI020638 ACLURM020847

Badcground The purpose of the FD-302 is to report information that may become the subject of testimony.

Help

FD-302 User's Guide

FD-302 FAO

.form link*

Word Perfect version 12 has been deployed to all NGW machines, and indudes the original macros used prior to the NGW conversion. These macros should be utilized to create new7D-302s for the time being. These macros will be replaced over the coming months. Once we are certain that we have new versions of these forms that are acceptable for use in the field, Word Perfect will be removed from all users' desktops. Thank you for your patience during this transition period.

If you have created an FD-302 in InfoPath during the period when it was the only available option under NGW, the resources to the right are still available for support.

Submit Feedback

CPO Contact jnformation

Problems Using a Form? Start with Our Troubleshooting Guide.

Hdp

Weimer

Fie Edt Yew Fund= To

Favaites .4.3 12. FBI Intranet .

gifliare -FD-302

Fn-qn, jTocime 1

YieurttSte Conlon Documents Lists

!Discussions !Sites;

ipeopleand Groups

-21 0:p • Yam.. Safety. Reis. 9. b6 b 7 C

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-1472011 BY 65179 DNB/ stp/ lsg

.107E

a_ Home - FD-302 - Wincicnvs Internet Explorer

v 41.. !X !Pt,. __:e..

P ,-

recall-turret

es • Atom -

1*.kirar, OW^ *MP irt BE '-5-4.D 1__

FBI020639 ACLURM020848

0 • et • Pow, Seiety • Tools • if). ONFF CDT :

g pvcc.putet • 4': quo" '2

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

•b 7 E

0.1EFF CDT. Windows Internet Explorer

!p_, ovrommockezvie_moten

rre au View Fevets, Tools Help t'eFavailas I t:43 tiF011arenet

Operational. (u1 Electronic q

(U) The Electra investigative tat receive and sen Is a macro (an icon found on t

• IMDILMIne . Drafting al

- •

TASK-FORCE-4(4,V!) -S'ORIENTATIO N. Approval

A Task Force Officer's Supervisory Special Agent on the ITTF approves the FD-302.

Id Internal communication for a how JTTF agents and Field Offices n when an Investigation Is opened. An EC Corel WordPerfect software application

lipreadinku‘. Dow - 0-30W' • 0 &A/wi /N.

tfanrintal—"" • ,-"Te ProcOtire-fdr 'Indexing

.""

•''. tw.

FBI020640 ACLURM020849

41' X" IPIc2Si:r:.

- 0 - Pape - sake,- Tools-

...-. Eck New Favorites Tools tizIp

.yr Favoribn 11'4 FBS Irtianet

.4nwart

g PrOxrcater Pa Atm -

Q. JIFF. CBI•lyintlows Internet Explorer .

Procedure for Indecing ACS

The-Indexing Guidelines can on the FBI Intranet at: http://homeibinet.fbl/DO/OGC/LB/ESIDU 200ocuments/EC-Uoloading-Indexing-Documents.pdf.

This document Is maintained by the Office of the General Counsel.

Co m rruf-qta tions' And Ad j.tratlye:petails •

td internal communication for e how 3TTF agents and Field Offices n when an investigation Is opened. An EC Corel WordPerfect software application

, TASK FORCK(.3,TT, ORIENTATIOR.

Fes_w_sp.re

• jmnortand • Drafting a( t•IUMPS5119'

Dow

Operational (U) Electronic <

(U) The Electra investigative tar receive and sen is a macro (an t icon found on t.

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMHJ stpJ lsg

b7E

'ecirrE/ /IFF

FBI020641 ACLURM020850

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED

(RevA1.31-201:0) DATE 10-14-2011 BY 65179 DNB/ stp/ 1s4

FEDERAL BUREAU OF INVESTIGATION

Precedence: ROUTINE Date: 06/12/2009

To: All Divisions

From: kecords Management RPAS/5334 Contact:

Approved By: Murphy Timothy P b6

Hooton William L b7C

Drafted By:

Case ID #: 319W-HQ-A1487624

Title: RECORDS MANAGEMENT MATTERS UPLOADING AND INDEXING DOCUMENTS

Synopsis: Reiterates current policy regarding the indexing of subjects and references. The current policy will remain in effect until such time that Sentinel is at full operating capacity with .automated indexing (anticipated in FY2010).

Details: The Manual of. Administrative Operations and Procedures (MAOP), Part 2, Section 2-3, requires the indexing of subjects and references of FBI investigations. This communication reiterates the MAOP policy for indexing and reinforces the need to upload FBI-generated documents.

The purpose of indexing is to record individual names; non individual names, such as corporations; and property which are relevant to FBI investigations so that this information can be retrieved to support an efficient and effective case management system for current and future investigations.

Indexing of subjects and references into the Automated Case Support (ACS) system's Universal Indices (UNI) application creates a central repository of file information that can be searched to identify relevant records. UNI is the only searchable source that contains information about both paper and electronic records. Full text queries of the ACS system's Electronic Case File (ECF) only searches for information that is available electronically.

Properly indexing new records is a critical step in using and managing FBI information on an enterprise level. Many legacy applications still use UNI searches as the basis for identifying relevant records in support of both internal and external investigations. Failure to properly index new records compromises the

FBI020642 ACLURM020851

To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009

FBI's ability to identify all administrative and case information connected with an individual or organization. Information missed during a search is often referred to as a false negative result.

To illustrate the importance of a complete records index, Executive Branch agencies request name searches against UNI as a part of their investigations to determine suitability for employment; trustworthiness for access to'classified information by U.S. government employees, contractors, licensees, grantees, military personnel and other individuals with an officially determined need for access; or, in the case of aliens, eligibility to remain in the United States. Therefore, failure to properly index subjects and references could produce a false negative search result that is then communicated to other federal agencies. Internally, false negative results may compromise investigations, analytical work, and the FBI's Freedom of Information/Privacy Act operation.

Recipients of this communication are advised to consult MAOP Part 2, Section 2-3, for specific indexing criteria, guidelines and requirements. In addition. the Indexing Guidelines located at

1 1 provide specific guidance on searching and entering data into UNI.

In order to be searchable, retrievable, and shareable through automated means, the text of FBI-generated documents must be uploaded into the ECF component of ACS. Computer-generated documents (WordPerfect, Microsoft Word, Excel, etc.), are capable of being uploaded into ACS. Delays in the uploading of documents may impede the progress of related investigations or delay the FBI's ability to comply with Executive Orders or statutes governing the use and reporting of FBI information. In addition, uploaded documents are readily available to all authorized personnel and eliminates the need for the originating office to provide copies or summaries of the document(s). Monthly reports summarizing the efforts of each division, field office, and Legat regarding uploading activity can be found on the Information Technology Operations Division's (ITOD) website at 1 1

Offices are advised that uploading a document into ACS does not negate the originator's responsibility to index subjects and references into UNI. While the text of uploaded documents may be searched, such queries will not identify any paper records relevant to the search criteria. Indexing and uploading are accomplished through the use of ACS or Web-based ACS.

The indexing capability in Sentinel will not be available until the end of fiscal year 2010. Therefore, all FBI employees must continue to adhere to the current indexing policy, criteria, guidelines, and requirements using ACS or Web-based ACS.

b7E

FBI020643 ACLURM020852

'derived from the updated Attorney General Guidelines of December 2006.1 b7E

To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009

For records related to Confidential Human Sources, recipients are directed to the Directorate of Intelligence and the

1website at: 1

) Uploading the text of documents and proper indexing saves .

time, money, and personnel resources, and provides immediate access of data to collaborating partners through the information sharing initiative. RMD appreciates the effort of all offices in ensuring

. that the FBI's records are accurately. indexed and uploaded making them readily identifiable And available as needed.

3

FBI020644 ACLURM020853

To: All Divisions From: Records Management Re: 319W-HQ-A1487624, 06/12/2009

LEAD(s):

Set Lead 1: (Action)

ALL RECEIVING OFFICES

Advise all employees of the contents of this communication.

• •

4

FBI020645 ACLURM020854

JTFF CBT

Page 1 of 1

sECRsr&sesaas-

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

FBI Written Communications And Administrative Details

Overview Of Instructional Goal And Objectives

WI inserts

(U) An Insert is a blank sheet for recording the results of investigative activity that is not testimonial. The purpose of an Insert Is to document an investigation in a manner suitable for being included (inserted) into a report.

(U)Click here to see an example.

QUIT:: PREVIOUS:: NEXT

PAGE: 3 OF 14 —96€1480046Kilgoliai

file://D:\jttfoV2kmodule2\m2_020.htm 8/8/2011

FBI020646 ACLURM020855

182A-DE-36894 LWL:cbl

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ .stp/ lsg

1

The following investigation was conducted by SA at Inkster, Michigan:

On February 3, 2004, a review of the DOWNRIVER SHERATON HOTEL guest registry for December 20, 2003, revealed no information identifiable with

or

On February 6, 2004, a records check at the INKSTER POLICE DEPARTMENT revealed received a traffic citation for a minor traffic violation ini I.

On February 6, 2004, a records check at the INKSTER POLICE DEPARTMENT revealed no information identifiable with

or

b6 b 7 C

FBI020647 ACLURM020856

JTFF CBT

Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (3TTF)

ORIENTATION

FBI Written Communications And Administrative Details

Overview Of Instructional. Goal And Objectives

b7E

"It is the responsibility of the FBI to share terrorism intelligence and it is mandated by the National Security Act of 1947, Executive Order 12333, the USA Patriot Act, the Homeland Security Act of 2002, and the Attorney General's Guidelines of FBI National Security Investigations and Foreign Intelligence Collection."

b7E

Click here to see an example.

QUIT:: PREVIOUS:: NEXT

PAGE: 4 OF 14 —080HIPPHifereRK

file://D:\jttfoV2\module2\m2_030.htm 8/8/2011

FBI020648 ACLURM020857

TIFF CBT Page 1 of 1

-eseterfhttrepeat:

• JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Written Communications And Administrative Details

Overview Of Instructional Goal And Objectives (U) Letter Head Memo (LHM)

(U) The purpose of LHM is to. notify various departments, including the Department of justice, Office of Intelligence Policy and Review (OIPR) and FBIHQ, of the intent to open an intelligence case. An Opening EC must accompany the initial LHM. An LHM is used:

• In those instances when it is not necessary to conceal the FBI as a source; . When the field furnishes information to FBIHQ in the belief that it is of possible Interest to other

government agencies and when it is desired to provide a communication suitable for dissemination other than an investigative report;

. In applicant (except Bureau applicant), Office of Personnel Management security referral (140A and 140C), and security-type cases, to report the reliability and evaluation of sources;

• To set fourth Information qecessary for conducting investioationp abroad; • To transmit information tol and • To submit significant data to FBIHQ in nonprosecutable espionage and nationalistic tendency cases

(65 and 105 classifications).

(U) Click here to see an example.

QUIT:: PREVIOUS:: NEXT PAGE: 5 OF 14

91343ESSAL1101i1OPS

file://D:\jttfoV2\module2\m2_040.htm 8/8/2011

b7D

FBI020649 ACLURM020858

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 ONH/ stp/ lsg

U.S. Department of Justice

Federal Bureau of Investigation

In Reply, Please Refer to File No.

Newark, N.J..07101 May 17, 2002

UNKNOWN SUBJECT; THREAT TO BOMB

WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY,

MAY 1, 2002

Start, typing the text here.

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxmaxxxxxxx xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxx)pcx • xxxxxxxxxxxx xxxxx XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXxxxxxXXXXXXxxxxxxxxxxxxxxxxxxxX

xxxxxxxx xxxxxxxxxx xxxxxxxxxx XXXXXXXXXXXXXXXXXXXXXXXXXX .

XXXXXXXXXXXXXXXXXXXXXXXXMXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXX

1-U.S. Secret Service, Newark, NJ 1-Newark (174-550) JJS/def (2) (THE COPY COUNT AND BELOW NOTATION GO ON NEWARK'S COPY ONLY)

This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.

13

FBI020650 ACLURM020859

UNKNOWN SUBJECT; THREAT TO BOMB WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY; May 1, 2002

Continue typing text here.

XXXXXX2CXXXXXXXXX X XX xxxxxxxxxxxxkxxxxxxxx XXXXXXXXXXXXXXXXXXX XX3CXXX3C3CXXXXXXXXXXXXXXXXXXXXXXXXX=C=CX XXXXXXX

XXXXXXXXXXXXXXXXXXXX3OCXXXXXXXXX XXXXXX.XXX3OCXXX

XXXXXXXXXXXXXXXXX3CXX XXXXXXX3CXXXXXX3CXXXXXXXXXXX XXXXXXXXXXXXXXXXX3CXXXXXX.

2

FBI020651 ACLURM020860

UNKNOWN SUBJECT; THREAT TO BOMB WASHINGTON HIGH SCHOOL, SPRINGFIELD, NEW JERSEY; May 1, 2002

3

FBI020652 ACLURM020861

JTFF CBT

Page 1 of 1

TEtErrfrtiteseFaT

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Written Communications And Administrative Details

Overview Of Instructional Goal And Objectives

b7E

QUIT:: PREVIOUS :: NEXT PAGE: 6 OF 14

---SECRBW-ANGIMAN

file://DAjttfoV2\module21m2_050.htin 8/8/2011

FBI020653 ACLURM020862

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

--nrcrirr7ALSM

FBI Written Communications And Administrative Details

Overview Of Instructional Goal And Objectives

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 7 OF 14 —szettertiffereas-

file://DAjttfoV2\module2Am2_060.htm 8/8/2011

FBI020654 ACLURM020863

FBI020655

FBI Written Communications And Administrative Details

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://D:\jttfoV2\module2\m2_070.htm 8/8/2011

JTFF CBT Page 1 of 1

SHEINPIWNIereRN

Overview Of Instructional Goal And Objectives

FD-515 and FD-542

(U) The FD-515 is an Accomplishment Report used by personnel to claim statistics on arrests, indictments, convictions, disruptions and dismantiements of Organized Crime/Drug Program organizations, Violent Crime and Major Offender criminal enterprises, and Domestic and International Terrorism Investigations.

Click here to see an FD-515 example.

(U) The FD-542 is an Investigative Accomplishment Report macro used by personnel to claim investigative accomplishments involved in the counterintelligence or counterterrorism investigative process.

(U) Click here to see an FD-542 example.

QUIT :: PREVIOUS :: NEXT

PAGE: 8 OF 14

ACLURM020864

Accomplishment involves: (check all that apply)

Drugs

A Fugitive Bankruptcy Fraud Computer Fraud/Abuse Corruption of Public Official Money Laundering

trme. esce.

Asst. FO(s)

A. B. C. D.

Task Force

Assisting Agencies x •

1.

2.

File Number

Stat Agent Soc. Sec. No.

Stat Agent Name

RA

Squad

Assisting Agents Soc. Sec. No. 2c

1.

Name:

2.

Name:

FD-515 (Rev. 8-30-2010)

Squad supervisor approval (please initial)

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

Accomplishment Report Date Prepared

(Accomplishment must be reported and loaded into Date Loaded ISRAAwithin 30 days from data of accomplishment) Date Loader's Initials

Investigative Assistance or Technique Used

1. Used, but did not help 3. Helped, substantially

2. Helped, minimally 4. Absolutely essential For Sub. Invest.AssisL by other FO(s) indicate A,13, C, D for corresponding FO

Rate FO IAT Rate FO IAT Rate FO IAT Rate FO IAT

Mn. Analyst Lab. Field Sup UCO - Methods Vict-Wiln Coor

Aircraft AssL Pen Registers NCAVC./ VI-CAP *Wanted Flyer

Computer Photo Cover Care/NS Istel Asti SARs

........... M.... "It..7.7' '7iati. Novi - Fat CART

Asset FBS Prog ELSUR / F1SC Search Warrant filth Neg.-Local

ELSUR / T. III Show Money ERTAssL Fort Support Pro(

Eng. Reid SM. SOG Asst. Butte - OSC TFOSJCTD

Eng. Tape Ex. Swat Team Say. - OSC CXSICTD

Legate Asst. Tech.AglEquip. Poo-SC InfraGard/CyD

avid. Purchase Phone Toll Ree Tech Rasp Unit OFC/CID

Inf/CW Info UCO - Group I For. Lang Asst. PPP

Lab. Die Exam UCO Group II Non FBI Lab Es Fusion Centers

A. Complaint I information/ indictment

['Federal [Iota! ['International

Complaint Date*

Check if CMI Rico Complaint

Information Date*

Indictment Date:

B. Locate I Arrest

Federal ['Local [lintemational

Subject Priority: DA EIB De Locate Date:

Arrest Date:

0 Subject Resisted Arrest

El Subject Arrested was Armed

C. Summons Date:

❑ Federal 0 Local

D. Recovery I Restitution i PELP X [IFederal 0 Local 0 International

Recovery Date: Code

-

✓ Amount

Code ../ Amount $

Restitution Date' 0 Court Ordered OPretrial Diversion

Code

-

Amount $ PELP Date*

Code

-

Amount S

E. Hostages(e) Released Date'

Released by:OTerroristO Other

Number of Hostages:

F. Conviction

1:1 Federal ['Local DIntemational

Conviction Date'

Subject Description Code-. ( )9

For SF, G. H-Include Agency Code

['Felony or 0 MISCIOM02110f

0 Plea or El Tdal State: Judicial District

G. U.S. Code Violation Required for sections A, B, F and J (Federal Only)

Tffie Section II Counts

H. Sentence Date'

Sentence Type:_ •

In Jai: Years_ Months_

Suspended: Years Months

Probation: Years Mont s

Fines:

1. Disruption/Dismantlement ."

Disruption Date:

Dismantlement Date'

Completion of FD-515a Side 2 Mandatory

J. Civil Rico Matters Date' Also complete 'Section G'

Other Civil Matters Date:

Judgment-

Judicial Outcome •5

Amount $

Suspension: Years- Months

K. Administrative Sanction Date* Subject Description Code

UType: Length:

Suspension ['Permanent Debarment or Injunction Year_ Months_

L Asset Seizure Date* Asset Forfeiture Date' CATS # Mandatory Circle below one of the three asset forfeiture:

Admin. Civil Judicial, or Criminal

Do not indicate $ value in Section D

M. Acquittal/ Dismissal/ Pretrial Diversion

(Circle one) Date:

N. Drug Seizures ✓ Date:

Drug Code • Weight Code • FDIN Do not Indicate $ In Section D

0. Child Victim Information

Chid located / identified Date'

Erving ODeCeased

P. Subject information - Required for all blocks excluding block D (Recovery/PELP), blocks E, I, L and N

Name

Race.

Sex

Date of Birth

Social Security No. Of available)

For Indklmontaroanvoliona ay:

El!Lupo:trollied to an LCN. Alba °Nankai Cam. (AOCL Ulan Onmatrad Odom fOCt RonalanlEastam European, Clubmen. a Nowlin Organized CA= CoonO - ComPlato 50416a. Side 1 Blocks /OE mandatory, F-11 as appropnNo.

0 Subject misted to an OC/Deug onsanktallon. a VCMO ProommNatbnal Gene 86amporoN Noopov o IMMO PnpnwNaomi Pam* IN•alke MOM Mou•- CamPlano FL311a. Mel Blocks MC only.

x Additional information may be added by attaching another form or a plain sheet of paper for additional entries. Serial No. of FD-515

• See codes on reverse side. 1 Requires that an explanation be attached and loaded Into ISRAA for recovery over $1 m and PELP over $5 m, disruption, dismantlement, and drug seizures.

FBI020656 ACLURM020865

Continuation of GOVERNMENT SUBJECTS

Sire Roseanne State Law Enforoxnent Officer Stare-All Odra Maser Load Legislator Local Judge/Magian& Local Prosecutor Local Law Enforeanent Officer Local-AU Others County Commissioner City Cotasalman

BANK EMPLOYEES

7A Bank Officer 7B Bank Employee

MZ

PA

Sta

For Further Instructions See: MAOP, Part II, Sections 3-5 thru 3-5.3. Revised 12-19-2006

AG BR. CC DC Fl PI PR PS RN SP YR Of

PROPERTY CODES

01 Cash 02 Stocks, Bwds or Nagar. bsonsinants 03 General Retail Merchandise 04 Vehicles 05 Heavy Machinery et Equipment

07 lewehy . 011

Vessels 09

An, Antiques or Rare Collections I t Rani Pmnertv 20

All Other

SENTENCE TYPES

CP Capital Punishment IS

Jail Sentence LP Life Parole LS Life Sentence NS No Sentence (Sullied Is a Fugitive,

Insane, has ried, is a Corporation or must pay fine only)

PB Probation SI

Suspension of Jail Sentence YC Youth Croatian Act

PELP CODES

22 Counterfeit StocksillandslCurrrigf Negotiable Insuuments

23 Counterfeit/Pirated Samd Recordings or Motion Picturo

24 Bank Theft Scheme Aborted 25 Ransom, Extortion or Bribe

Demand Aborted 26 Theft From or Prod Against

GINCRUIWIl Same Aborted 27 Commercial or Industrial .

Theft Scheme Aborted 30 All Other

RACE CODES

A

ArianIPacifie Wander B

Black InefianlAmerierat Unknown White Noninttividual

JUDICIAL OUTCOME

Agreement BarreeVReurved , civil Contempt Disciplinary Charges Fur Preliminary Injunction Tempanuylitestraining Order Profiling Seidman Ambition Suspender Voluntary Resignation Lttber

SUBJECT PRIORITY

A Subject wanted terrines of violence (Le, murder, manslaughter, forcible rape) against another Inerwldual or convicted of such a crime in the put five yens.

B Subject wanted for crimes involving loss or destruction of property valued in mess dS25,000 or convicted of suds a oboe in the part five teat.

• C All other mkjectx

DRUG CODES

COC Cocaine HER Heroin HSH Hashish KAT IOW LSD LSO MAR Marijuana MDM MedsykamEmeymetharapbetamine MET Medaraphroznine MOR Moiphine OPM Opium DID Other &up

DRUG WEIGHT CODES

GM Gram(e) KO 1070Bran(s)

Liter(s) MI. P

Mantis) DU DosageUnk(s)

AGENCY CODES

AFOSI

Air Force Office of Special Investigations ACIS

Array Criminal Investigative Service BATT,

Bummer Alcohol, Tobacco & Firearms BIA

Bureau of holm Affairs CEIP

Custone and Border Protection DCAA Defense Courant Ault Agency DCIS

Defame Criminal Investigative Service DEA

Drug Enforcement Administration DOC

Deputment of Corrections DOI

Dept. of ineties Lina EPA

Environmental Protection Agency FAA

Federal Aviation Administration FDA

Food and Drug Administration HHS

Dept. of Health & Hannan Swim HUD

Dep. °Mousing & Urban Development ICE

lowimation and Customs Enforcement IRS

Internal Revenue Service NASA

Nall Aeronautics & Space Admits NBIS

Nat NARC Border Interaction NCIS

Naval Criminal Investigative Service RCMP

Royal Cariatian Mounted Pollee SBA

Small Bothnia Adadnistratbn USCG

U.S. Coast Gird USDS

U.S. Department of Stale USMS

US. Marshals Service USES

U.S Postal Service USSS

US. &ere:Senate USIA U.S. Tremr, LOC

Local anr

City COON County ST

Stain OTHR Other

JUDGMENTCODZS

CI Consent Issignseer CO Cows Ordered Settlemem OF Default Judgment DI Dismissal IN Judgment Notwideconfing MV Mined Warta SI Summary Judgmene VD Ventiet for Defendant VP Verdi:I for Plaintiff

SUBJECT DESCRIPTION CODES

5D SB IF 50 511 51 5.1 5K 5L Ref 5N 5P 5Q 5R 5S 5T 5U

UNION MEMBERS

President Vice•Plesident Tress= Secretor/Dean= Executive Board Member Business Agent -Representative Organizer Business Mutaga Kmancial &MOP/ Reeotting Secretary Office Manager Clerk Shop Stewani Member Trustee Other

GOVERNMENT SUBJECTS OTIIERg

8A All Odra Subjects 80 Conorwor Canonising

CHILD PREDATORS

(67, 60, 6H- Include Agency Code)

6A Presidential Appointee 6B U.S. Sasaki/Staff 6C U.S. Remeatertivataff 6D Federal Judge/Magistrate 9A Child Care provider 613 Federal Prosecutor 9B Clergy 6P Federal Law Enforcement Meer 9C Added° Conk 643 Federal Employee-GS J3 & Above 9D TeaduirfAide 6H Federal Employee -GS 12 & Below 9E Law Enforcement Perronnel 6J Governor 9F Coombe 6K Lt. Governor 9G Relative 61. State Legislator 9H Stranger 6M State Judge/Magisnre 91 Other

ORGANIZED CRIME SUBJECTS

IF Doss 10 Underboss IN Gansigtiere IJ Acting Boss 1K Capodecina IL, Soldier

KNOWN CRIMINALS

2A

Top Ten or LO. Fugitive 2B

Top Thief ' 2C

Top Con Man

FOREIGN NATIONALS

3A Legal Allen 3D Illegal Alien 3C Foreign Official Whet

Diplomatic Immunity 3D U.N. Employee Wart

Diplomatic hnmunity IS Foreign Student IF All Ochre

TERRORISTS

4A Known Member of a Terrorist Oegmization

4B Possible Terrorist Member or Sympathizer

FBI020657 ACLURM020866

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED

FD-542 (Rev. 01-31-2003)

DATE 10-14-2011 BY 65179 DMH/ stpl lsg

FEDERAL BUREAU OF INVESTIGATION

Precedence: ROUTINE Date: 09/10/2004

To: XXXXXX

From: AAJOIAA. Squad CT-3 Contact: SA XXXXXX XXXXXX, 000-000-0000

Approved By: XXXXXX XXXXXX X

Drafted By: XXXXX XXXXXX X:ced

Case ID #: XXXB-XX-XXXXXX (Pending)

Title: CIVIL AVIATION MATTERS; INTERNATIONAL AIRPORT(IA)

Synopsis: Document operational activity at International Airport and claim statistical accomplishments.

Details: On 08/26/2004, a day long security operation was implemented at IA. The writer and SA XXXX XXXXX, with assistance from SA's XXXX XXXXX and XXXX XXXXX, CT-3, supported the following agencies which have various levels of search authority at the airport: Port Authority Police Department (PAPD); the Transportation Security Administration (TS); US Customs and Border Protection (CBP); and US Immigration and Customs Enforcement (ICE). The operation targeted both pedestrian and vehicular entrances for employees. Passenger screening checkpoints were not within the scope of the security sweep.

'Aside from a number of motor vehicle summons which were issued by PAPD, along with a number of airport identification/airport escort violations (called "breach of rules" or "B-O-R's" by the Port Authority), there were two • reported instances of rampside employees taking prohibited knives onto the ramp. Both items, of course, were seized. Most noteworthy, however, were two reported instances of airport employees escorting either other employees or contract employees onto to ramp to board flights, without having gone through mandatory security screening. Both of these instances were brought to the attention of TSA investigators.

Several NCIC checks of truck drivers, without airport IDs making rampside deliveries, revealed drivers with felony convictions; however, these drivers are permitted access to the ramp area with airport-approved escorts.

FBI020658 ACLURM020867

To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004

A large number of immigration status checks were performed by CBP personnel, however, no airport employees were found to be here in the US illegally.

Although PAPD and CBP and TSA personnel perform occasional searches as individual agencies, no such multi-agency security operation has been undertaken in the seven years that ' this writer has been assigned to IA: All involved agencies were in agreement that the operation had been "successful" in terms of demonstrating tighter security enforcement at both the pedestrian and vehicular entrances. It was further agreed that such security sweeps should be conducted on a regular basis. Writer notes that although he FBI had only a support role in the operation, the Bureau presence was not only. appropriate, but also contributory.

2

FBI020659 ACLURM020868

To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004

Accomplishment Information:

Number: 1 Type: OPERATIONALLY CONTROLLED MEETING ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITWTN FBI ITU: SEARCH (NON-CONSENSUAL) ITU: WMD COUNTERMEASURES Claimed By:

SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3

Number: 1 Type: WMD RELATED LIAISON ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD COUNTERMEASURES Claimed By:

SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3

Number: 1 Type: WMD PREPAREDNESS CONTACT DEVELOPED ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD ITU: WMD COUNTERMEASURES Claimed By:

SSN: XXXXXXXXX Name: XXXX XXXXX Squad: CT3

Number: 1 Type: WMD - ASSISTANCE PROVIDED TO LOCAL/STATE/FEDERAL AGENCY ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI ITU: WMD ITU: WMD COUNTERMEASURES Claimed By:

SSN: XXXXXXXXX Name: XXXX XXXXX Squad: CT3

Number: 1 Type: PREVENT/INTERDICT CRIMINAL ACT ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI

FBI020660 ACLURM020869

To: XXXXX From: XXXXXX Re: XXXB-XX-XXXXXX, 09/10/2004

Claimed By: SSN: XXXXXXXXX Name: XXXX XXXXXX Squad: CT3

Number. 20 Type: POSITIVE INTELLIGENCE (DISSEMINATED OUTSIDE YEI) ITU: AGENT INTERVIEW ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI Claimed By:

SSN: XXXXXXXXX Name: XXXX XXXXXX . Squad: CT3

Number: 1 Type: PARTICIPATE IN DEVELOPMENT OF OPERATIONAL PLAN ITU: LIAISON WITH OTHER AGENCY ITU: LIAISON WITHIN FBI Claimed By:

SSN: XXXX XXXXXX Name: XXXX XXXXX Squad: CT3

• •

4

FBI020661 ACLURM020870

JTFF CBT Page 1 of 1

SeettaTHSGSCSIN

JOINT TERRORISM TASK FORCE OTTO

0 RIENTATIO N

FBI Written Communications And Administrative Details

Administrative Details 1W Time Utilization and Rgccrd !seeping CTURKIRequirements/Registers

(U) TURK Is a system for tracking Agent work effort by program.

QUIT ;: PREVIOUS :: NEXT

PAGE: 9 OF 14 -seetesTriserotet

file://DAjtifoV2\module2\m2_080.htm 8/8/2011

FBI020662 ACLURM020871

JTFF CBT Page 1 of 1

-3BeRESY-MeiFORIT

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Administrative Details introduction to Basic Overt:firm- Reimheirsnmentprocedures

FBI Written Communications And Administrative Details

cu)I

QUIT :: PREVIOUS :: NEXT PAGE: 10. OF 14

STCRETHMOIPORN

file://DAjttfoV2\module2\m2_090.htm 8/8/2011

b7E

FBI020663 ACLURM020872

JTFF CBT

Page 1 of 1

SBeRBILMIBEIBBN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Written Communications And Administrative Details

Administrative Details (if) DIOG

(U) The Domestic Investigatives and Operations Guide (DIOG) has been designed to assist investigative employees in the performance of their duties. Its purpose is to standardize policy so that criminal, national security, and foreign intelligence investigative activities are accomplished in a consistent manner. The DIOG is divided into seventeen parts:

• Scope and Purpose . General Authorities and Principles . Core Values, Roles and Responsibilities . Privacy and Civil Liberties and Least Intrusive

Methods

b7E

.

Foreign Intelligence

(U) The DIOG can be found on the FBI Intranet at I b7E

QUIT:: PREVIOUS:: NEXT PAGE: 11 OF 14

-Ssr-Bagyi,stierettig

file://DAjttfoV2\module2\m2_100.htm 8/8/2011

. Sensitive Investigative Matter / Academic Nexus

• Investigative Methods • Assistance to Other Pgencies . Extraterritorial Provisions . Retention and Sharing of Information . Intelligence Analysis and Planning . Undisclosed Participation . Otherwise Illegal Activity

FBI020664 ACLURM020873

JTFF CBT

Page 1 of 1

SECTrilitte•PBRIT

JOINT TERRORISM TASK. FORCE (JTTF)

ORIENTATION

FBI Written Communications And Administrative Details

Administrative Details (t)) MAOP

(U) The Manual of Administrative Operations and Procedures (MAOP) is divided into two parts:

. Part 1 contains rules and regulations pertaining to personnel issues.

. Part 2 contains information pertaining to the administrative operations of a Field Office and contains some instructions for FBI Headquarters.

(U) The MAOP can be found on the FBI Intranet at

1

b7E

(U) The MAOP is in the process of being reviewed and replaced by Corporate Policy Office (CPO) Directives and Policy Implementation Guides, as mandated by EC 319W-HQ-A1487698, Serial 451. As new policy documents are approved, the appropriate sections of the MAOP will be updated in the CPO Policy and Guidance Library. Superseded sections will be maintained in the CPO Policy and Guidance Archive.

QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 14

-sseless#024eaostm

file://D:\jttfoV2\module2\m2_110.htm 8/8/2011

FBI020665 ACLURM020874

Page 1 of 1 JTFF CBT

FBI Written Communications And Administrative Details

• JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

I b7E

Administrative Details National cl / enntMrsal arggram tianual (NFIPM)

(U) The NFIPM details the FBI's National Foreign Intelligence program.

CU) The NFIPM can be found on the FBI Laripet at:

FBI020666

—3Etliztrfiseaoas

QUIT :: PREVIOUS :: NEXT

PAGE: 13 OF 14 -soemaseester

file://D:\jttfoV2\module2\m2_120.htm 8/8/2011

ACLURM020875

JTFF CBT

Page 1 of 1

--311:3terHuclaQUI

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Written Communications And Administrative Details

Module Review

(U) This module introduced the neW IFTF Tao!: Force Officer to the following written types of communication used within the FBI:

• Electronic Communication • FD-302 • Inserts

I Letter Head Memo b7E

• • FD-515 and FD-542 • Administrative details including TURK, Basic Overtime Reimbursement Procedures, the MIOP, MAOP

and NFIPM were also introduced.

PREVIOUS :: FINISH MODULE

PAGE: 14 OF 14 Szetsys,l4mapRN

file://DAjttfoV21module2\m2_130.htm

8/8/2011

FBI020667 ACLURM020876

Page 1 of 1 DECLASSIFIED BY 65179 DM/ stp/ 1sg

JTFF CBT ON 10-14-2011

Security Briefing

SECAErINGIPORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Overview Of Instructional Goal And Objectives (U) Goal: The goal of this orientation is to introduce the new task force member to security requirements, clessificetion types, end leuels of access and security interviPm•

(U) Objectives:

1. Read and review the importance of protecting national security information. 2. Gain a basic understanding of the FBI's document classification types and other security concerns. 3. Read of the importance of a security exit interview.

EXIT MODULE :: NEXT

PAGE: 1 OF 27 McityrhiticalaSkL-

file://DAjttfoV2\module3\m3_000.htm 8/8/2011

FBI020668 ACLURM020877

JTFF CBT Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (ITTF)

ORIENTATION

Security Briefing

Security Overview (U) Safeguarding Classified Information—Everyone's Responsibility

(U) Safeguarding classified national security information is imperative to prevent unauthorized disclosure of Information that will cause harm to the national defense or foreign relations of the United States. When safeguarding classified information it is your responsibility to:

. Protect national security and FBI information and assets

. Alert others to the classification of the information

. Ensure protection of information classified by others

QUIT :: PREVIOUS:: NEXT PAGE: 2 OF 27

file://D NttfoV2\module3 \m3_010.htm 8/8/2011

FBI020669 ACLURM020878

JTFF CBT Page 1 of 1

-sweltrrtttverefai

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Security Overview (U) Classification Guidance Executive Order 12958, Classified National Security Information

(U) The Bush Administration Order set forth a uniform system for classifying, declassifying, and otherwise safeguarding National Security Information (NSI).

(U) By ensuring its classification, this Executive Order protects NSI, which, if disclosed, would cause harm to the nation's security or foreign relations of the United States.

QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 27

--8BefalititiMEOW-

file://DAjttfoV2\module3\n3_020.htm 8/8/2011

FBI020670 ACLURM020879

JTFF CBT Page 1 of 1

--SECRES6HNOLVAN

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Security Overview (U) Classification

(U) Classification is the element of information security that provides the policy for properly identifying classified information. This policy defines:

. The criteria and limitations of classifying information

. Who has authority to classify documents

. The levels of classification

. The criteria for declassifying NS!

QUIT:: PREVIOUS:: NEXT PAGE: 4 OF 27

SEC RN

file://DAjttfoV2 \module3 \m3_030.htm 8/8/2011

FBI020671 ACLURM020880

Page 1 of 1 J'TFF CBT

Security Briefing JOINT TERRORISM TASK FORCE ()TTF)

ORIENTATION

• Confidential—Damage • Secret—Serious damage • Top Secret—Exceptionally grave damage

(U) Terms such as "For Official Use Only" or "Law Enforcement Sensitive" do not refer to Levels of Classification.

FBI020672

srucauNWirrifon:

Security Overview (U) Classification -Noes

(U) Information is classified by the degree of damage its unauthorized disclosure would cause to national security:

QUIT:: PREVIOUS :: NEXT PAGE: 5 OF 27

-SEL"RerMIGEMiol-

\jttfoV2 Nmodule31m3_040.htm 8/8/2011

ACLURM020881

JTFF CBT Page 1 of 1

SEC/P21#419EQ813.

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Security Briefing

Security Overview

(U) Sensitive Comoartmented Information (SCI)

(U) SCI is not a classification. It is a restricted access control system used to safeguard a special class of classified information, most commonly related to intelligence sources and methods.

(U) SCI involves sensitive sources and/or methods and can be classified Confidential, Secret, or Top Secret.

QUIT :: PREVIOUS:: NEXT

PAGE: 6 OF 27 —SEISMOILAICIEL212N.

file://InjttfoV2\module3\m3_060.htm 8/8/2011

FBI020673 ACLURM020882

JTFF CBT

Page 1 of 1

SOGIM114410.ECISMT

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Security Overview

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 7 OF 27

SZeR99/411QEORIii

flle://D:\jttfoV2\module3\m3_070.htrn 8/8/2011

FBI020674 ACLURM020883

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Handling Classified Material (U) Public Release of Classified Information

(U) Classified information must not be publicly released.

(U) You must not release unclassified information publicly without specific approval from the Office of Public and Congressional Affairs (OPCA) or the Security Program Manager and Local Security Officer.

(U) All written, electronic, and oral material intended for public release must go through a pre-publication security review by OPCA and/or the Security Program Manager and Local Security Officer.

QUIT:: PREVIOUS:: NEXT PAGE: 8 OF 27

—weasel-Merest,

file://DAjttfoV2\module31m3_080.htm 8/8/2011

JTFF CBT Page 1 of 1

sEcitEilimurvXN

FBI020675 ACLURM020884

JTFF CBT

Page 1 of 1

-simaviviHseseas

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Handling Classified Material (U) Non-Authorized Disclosure

(U) The consequences of ignoring clearance and access rules are dangerous. If classified information is disclosed, the results could lead to a potential compromise of FBI information and assets, as well as disrupt ongoing investigations, and damage national security.

(U) In addition to harming national security and the FBI, unauthorized disclosures can also result in administrative/disciplinary action against and/or prosecution of the individual making the unauthorized disclosure.

QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 27

VikedMVERNerePS

file://D:\jttfoV2\module3\m3_090.htm 8/8/2011

FBI020676 ACLURM020885

JTFF CBT DECLASSIFIED BY 65179 DNH/ stp/ lsg Pagel of 1 ON 10-18-2011

SEeRLPTHIISBOBAI.

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Handling Classified Material (u) Mishandling Classified Material

(U) Inappropriate spills of classified information can:

. Damage national security

. Disclose highly sensitive sources or methods

. Disrupt ongoing operations

. Lead to prolonged and expensive investigations and damage assessment

(U) Classified material violations must be reported within 24 hours to the designated Security Officer (SO). The SO, Security Compliance Unit, and Supervisory Security Officer (S50) investigate such violations. Full cooperation is essential to these investigations.

(U) The FBI is required to report any damage assessment regarding SCI violations determined as "significant"- to the Director of National Intelligence (DNI).

SEVICBTf-nfeFeRtf

file://DAjttfoV2\module3\m3_110.htm 8/8/2011

FBI020677 ACLURM020886

JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ lsg Page 1 of 1 ON 10-18-2011

--9BeieW4HAMPai-

JOINT TERRORISM

Security Briefing TASK FORCE (3TTF)

ORIENTATION

Sharing Information With Parent Agency (U) Two questions to ask regarding sharing information with the parent agency:

1. Is the person cleared for that level of information? 2. Is there a need for that person to know the information?

(U) If either question is answered with a "no," then the information cannot be passed to the parent agency.

VELltrthhglioN12/113_

file://1DAjttfoV2\module3\m3_120.htm 8/8/2011

FBI020678 ACLURM020887

JTFF CBT DECLASSIFIED BY 65179 DM E/ stp/ lsg ON 10-18-2011

-sztitr2Huoscom.

Page 1 of 1

JOINT TERRORISM

Security Briefing TASK FORCE (3TTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Procedures to Protect against Unauthorized Disclosure

(U) Five procedures protect classified information from unauthorized disclosure:

1. Access 2. Marking 3. Transmission 4. Storage 5. Destruction

szeszTHrieveng

file://13:\jttfoV2\module3\m3_130.htm 8/8/2011

FBI020679 ACLURM020888

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Non-Disclosure Rules And Procedures ftfl Access—Confidential, Secret. and TOP Secret Material

(U) Access may be granted to people requesting classified material AS LONG AS they legitimately hold the clearance level commensurate with or above the classification level of the information to be disseminated AND an authorized holder in possession of the classified information determines their "Need-to-Know" BEFORE granting them access.

-ssesasAUlorsatt

file://D:\jttfoV2\module3\m3_140.htrn 8/8/2011

JTFF CBT DECLASSIFIED BY 65179 DNB/ stp/ log ON 10-10-2011

Page 1 of 1

SIIGRBBY-Meeefiff

FBI020680 ACLURM020889

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 D1111/ stp/ 1sg ON 10-18-2011

SECRIWA4EORIL--

JOINT TERRORISM Security Briefing. TASK FORCE (JTTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Access—Need-to-Know

(U) Need-to-Know is defined as "...a determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function." Thus, access is based on need—not position. Coworkers may not possess a valid "need-to-know."

—sseessWsegigabi-

file://DAjttfoV2\module31m3_150.htm 8/8/2011

FBI020681 ACLURM020890

3OINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

—seem eiymemea-

Security Briefing

DECLASSIFIED BY 65179 DtiE/ stp/ lsg ON 10-18-2011

JTFF CBT

Non-Disclosure Rules And Procedures (U) Markings—Essential Markings for Classified Documents

(U) It is essential that documents be marked with their classification and access, if applicable, so that people handling them can determine how to safeguard them. Classified documents and other media should have overall markings according to the following criteria:

• The overall classification must match the highest classification level of any information contained in the document and other classified communication media.

• A cover sheet indicating specific classification must accompany every classified document. The overall classification and access marking should appear:

1. At the top and bottom of the front cover, 2. On all document pages, and 3. All TS and SCI documents must be marked and attached to an FD-501.

FBI020682

• At the top and bottom of the outside of the back over.

(U) (U) Click here to see a page marking example. .

39€3666440E0211-

file://D AjttfoV2 \module3 \m3_170.htm

ACLURM020891

4- two* •

k ra75r- 10..Q9t. 9 mycamuter

WeirA24,- raftwik,

FBI020683

Of

A

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

0: "ITT COT.- Windows Internet Explorer a tel b7E

;A •

a - Q OP Page • Safety • Tois "

o [IL InttfaMooddonto3_170.11to

Fitt ES VieV4 Favorites Tools tiAp

Li Favorites Rrol FM Intend

03IFF

p

ACLURM020892

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DBH/ stp/ lsg ON 10-18-2011

JOINT TERRORISM TERRORISM TASK FORCE ()TTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Markings—Essential Markings for Classified Documents

Security Briefing

(U) Each portion or paragraph of the document should be marked to indicate its classification level. Thus, in the document where 99% of the information is unclassified and 1% is classified as Secret, anyone having access to it will know exactly which part of the document is classified.

(U) Classification levels of the text (Including SCI accesses and handling caveats) are indicated in parentheses, i.e., (TS) or (U), immediately preceding or following the portion to which it applies.

(U) Click here to see a portion marking example.

QUIT :: PREVIOUS :: NEXT PAGE: NAN OF NAN

—3LTIZET7474D990941.

file://DAjttfoV2\rnodule3\m3_180.htm 8/8/2011

FBI020684 ACLURM020893

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-19-2011 HY 65179 DMH/ stp/ 1sg

.1:4LP • X IP v.% LE, DAltrOV2lMOdlialp0_1813,hbA

Fit Ede blew Fawkes Tools Pulp

Fevceites pEd towed

TIT CBT 0 0 • Page • Safety. Teets • 4, r Portion Marking . _

avtiveara„ gotovaw, &MR% " TIFF :

FBI020685

r a 14.

JTFT CBT Windows Internet Explorer

SECRET

a DEPARTMENT OP GOOD WORKS w.unk.immos Chapter 1•Amdinn (U)

(LB This is parapaph I and contains unclassified Infennatico. Therefore. this portionwIll be marked whit ibe designation Yr la parenthesen

• 2. (Si Ibis is nano* 2 and contains "Sauer Ife0111131100. Thcrefole. this punka will be rearkertwhis an designation "S" la pa:ends:eel.

.3.

SECRET

ACLURM020894

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DMH/ stpl lsg ON 10-18-2011

---MallETTATOPBBN

JOINT TERRORISM

Security Briefing TASK FORCE (3TTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Restrictive Handling Caveats and Control Markings

(U) Other types of restrictive handling caveats and control markings that may be seen when working with classified information include:

ORCON—Originator Controlled (which means that dissemination and extraction of the information is controlled by the originator and dissemination outside the FBI is allowed ONLY with the originating agency's approval.)

PROPIN—Caution: Proprietary Information Involved

NOFORN—Not Releasable to Foreign Nationals

REL—Authorized for release to the country or international organization named (i.e., REL INTERPOL)

—sErazo,44;everer-

file://D:\jttfoV2\module3\m3_190.htm 8/8/2011

FBI020686 ACLURM020895

UNCLASSIFIED

V F. a.m... 'm on"' 41

QUIT:: PREVIOUS:: NEXT

FBI020687

PAGE: NAN OF NAN

file://DAjttfoV2\module31m3_200.htm

JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg Pagel of 1 ON 10-18-2011

JOINT TERRORISM TERRORISM Security Briefing TASK FORCE (JTTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Transmission—Secret and Confidential Material

(U) When sharing Confidential and Secret classified material, remember to always check the classification level of the reciplent(s) to be sure they hold the same classification clearance or above and verify their need-to-know. Also, Confidential and Secret information should not be discussed over non-secure telephone lines.

(U) You may handle Secret and/or Confidential Material in open storage facilities—for example, a field office that has been officially declared as such, but it must be locked in an approved safe at the end of the workday. Make sure the materials are accompanied by the appropriate classification cover sheet or label.

CLASSIFIED SCI •

IN. N...

SECRET II.1.1111170 ealmoolll*Gaa.now MM. MOW. 1.1,01.1 non.

CONFIDENTIAL C-•■•-•••••••■•■,

ACLURM020896

JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ 1sg Page 1 of 1 • ON 10-18-2011

ITCRETHBOE2ai

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Transmission—Secret and Confidential Material (con't)

Security Briefing

(U) You may send Confidential and Secret material via the following means:

. Secure fax machine

. Approved teletype

. Approved FBI or DCS courier

. U.S. Postal Service (registered mail) or Federal Express (If a waiver is granted by the Office of Security at the FBI)—in both cases, the package must also be return-receipt required and addressed to a specific, addressee who has been determined in advance to have the requisite security clearance to receive the information.

(U) You must transport all Confidential and Secret material in a double-wrapped wrapping, marking the inner wrapping with the classification and keeping the outer wrapping free of classification markings. You may also send Secret and Confidential material using an FBI internal mail-routing wrapping.

(U) Make sure all materials are accompanied by the appropriate classification cover sheet or label.

• lleteTi-AION

file://DAjttfoV2\module3lin3_210.htm 8/8/2011

FBI020688 ACLURM020897

JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ lsg Page 1 of 1 ON 10-18-2011

JOINT TERRORISM TERRORISM Security Briefing TASK FORCE (3TTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Transmission—Too Secret Material (TS)

(U) When sharing TS material, remember to always check the classification and access level of the recipient(s) to be sure they hold the clearance level commensurate with or above the classification level of the information to be disseminated and verify their need-to-know. Also, never discuss any classified or sensitive information over non-secure telephone lines.

(U) With a classification coversheet or label and an FDS01, Top Secret material may be sent by approved DCS Courier or hand carried between Sensitive Compartmented Information Facilities (SCIFs) in an opaque double-wrapped wrapping. Mark the inner wrapping with the classification; then insert this wrapping inside a wrapping that has no classification markings.

(U) If you need to discuss classified or sensitive information, you must do so on a secure line. Also, copy or fax classified or sensitive materials only on authorized, secure copiers and to authorized, secure fax machines.

(U) FBINet cannot store, process, or transmit TS information. TS information can be processed only on a TS/SCI Local Area Network (LAN) computer in a SCIF.

(U) Finally, you must store TS materials in approved safes whenever you are not using them, as well as, at the end of the workday.

Eatril'ONOEQM

file://DAjttfoV2\rnodule3\m3_220.htm 8/8/2011

FBI020689 ACLURM020898

y:e Fayed= t a,:,4 g; FBI Intranet

103TFFCBT 0 :7, Page Safely. Tads.

0.JTFIF CDT:Windows Internet Explorer

16 CetelfelfAmoddeAre3,220.1te

FEs BST YT;TFavorees 1095 Help

v

b7 E

37Fr- .14 -.SU .10:1: sit

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

FBI020690 ACLURM020899

bse. Ohre.

luntaitntilt

Care all 110:04wyeat Capon

• Vbeakaa■

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

CDT. Windows Internet Explorer

‘_4 • KitdoVArtiockialink,22il.htm — _

Flo Edit Mew Favates Tools. tido

fir Families I i;',15 tarring

'AIME CBT r yOenSp1.0114

WPIIIXAUte

mieewma. rem TOP &COMM

taseraverdrotintortcoacromunoutwxi xeswCOOMO

%lowly lamorOunrent elf es•v•war.0.4111100.14.1.101211 CoUng

Wtpm all...114•414 eitrukamo odea,amdr,

NonsagOdeo •

Mowlm ICwMCM.CYIMM on10111•04 Aretcao■ fa eF tuft oManewK OM. • s yr1,0 CUM

• 4411i6(41I—----WI ENNixst zy. ioeffor' 9",̀ "" • ea7.4t im%

FBI020691 ACLURM020900

JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-18-2011 Page 1 of 1

JOINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

Non-Disclosure Rules And Procedures CU) Classified Material storage

SEarIrrinctrorac

Security Briefing

(U) You are responsible for securing all classified material at the end of the workday in a GSA certified safe with a spin-dial, combination lock. SCI material must be secured in a GSA certified safe inside a SCIF when not in use.

(U) Combinations to safes should be memorized and restricted only to those with an authorized need-to-know of the information stored In the safe. Safe combinations should be protected at the level of the information stored in it.

(U) You may NOT take home classified material at any level without approval from the FBI Director, the relevant FD/HQ Security Programs Manager, or your SAC or Assistant Director.

(U) Floppy disks must be marked with appropriate classification media labels and handled according to the highest level of classification ever processed on the disk.

(U) Computers are classified at the highest level of information that has ever been entered into, stored on, or produced by the system.

fi le://DAjttfoV2\modulenn3_230.htm 8/8/2011

FBI020692 ACLURM020901

JTFF CBT DECLASSIFIED . BY 65179 DMH/ stp/ lsg Page 1 of 1 ON 10-18-2011

--Imtneri6H44030381:1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Security Briefing

Non-Disclosure Rules And Procedures (U) Destruction of Classified Material

(U) All classified material should be destroyed whenever the operational or historical need for the information ceases to exist. Place Secret and/or Confidential documents in classified trash bags or in an approved crosscut shredder.

(U) Do not place TS or SCI material in classified trash bags. TS or SCI material must be destroyed either by shredding in an approved crosscut shredder or disintegrated in an incinerator to a white ash.

(U) When destroying TS or SCI material you must have:

▪ Two-person integrity—an official and a witness fully controlling the destruction for its duration and

. Both witnesses must have clearances commensurate with the material being destroyed.

MEREThtfereall-

file://DAjttfoV2\module31m3240.htm 8/8/2011

FBI020693 ACLURM020902

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DM/ stp,/ lsg ON 10-18-2011

cprprmg4,080RE

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Non-Disclosure Rules And Procedures (U) Record of Destruction—the FD-501

(U) You must maintain an FD-501, Record of Destruction, for a minimum of two years. Headquarters personnel should return this record to the Special File Room 5334, FBIHQ, immediately after destroying a document. The destroying official and witness must sign and date the form after the document's destruction. Field offices maintain the FD-501 at the field office. Field offices should contact their local Security Officer.

(U) All classified information destruction records will contain the following information:

• Identification of document destroyed • Destruction method used • Time and place of destruction • Reason for destruction • Name of destroying official and witness

(U) Click here to see an FD-501

BIlefellel-MOBABN

file://D:\ittfoV2\module3\m3_250.htm 8/8/2011

FBI020694 ACLURM020903

,•••■•--0".. 00IttfotArrodltayrtusoine

• — - 4_— Ea Vim Faratas Toe , Heb

Favabis 114 F01 Intranet

tell JIFF 037

r FD-S01@)

v .X Vp;.:

- „ .--......

• 0 (43 • Fes. Safety • Ted" n

•- *100% ■ .••

d

.10 7E mar

C„SEFF...CI3T, Windows Internet Explorer

Oft Mats*

ItaniAppaMe

ONV tall

111e0faVerst

GPM

Cm. 4.114.141

or WomMWTo nst.W6WO, fts..11%.

sMINI ar.e5.~

71./4111.1.710,

1[0•01.1111117

1011:01101101.1001 IlWia1111f0/1

moms cowmparrceracasunon0e0 NOWN103011lgo WW16

rovftempenvIonneowaSiwarger/r11.1111040 eses.405

asav1Meatea

101)m 0110/9.111.4e Cloaleafte 0.0.11VIAL101 /bow. Tow Oftweel00.<

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

FBI020695 ACLURM020904

JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ lsg Page 1 of 1 ON 10-18-2011

sacialetintaran

3OINT TERRORISM

Security Briefing TASK FORCE (3TTF)

ORIENTATION

Exit Interviews (U) Each individual who leaves as a member of the 3TTF is to be interviewed and debriefed by their respective Chief Security Officer. The exit intervieW should be conducted prcmptly after thft individual advises of his/her intended resignation or separation.

b6 b7 C

ITCTIETr/tioroRN

file://DAjttfoV2\module3\m3260.htm 8/8/2011

FBI020696 ACLURM020905

JTFF CBT DECLASSIFIED BY 65179 DNB/ stp/ lsg Page 1 of 1

ON 10-18-2011

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

—§ZeRrrtoulasoax_

Security Briefing

Module Review

• (U) Safeguarding classified national security information is everybody's responsibility. • (U) Proper handling of classified documnntl and information is critical to protecting the nation. ▪ (U) There are specific non-disclosure procedures to ensure unauthorized release of classified

information. • (U) If there is uncertainty about handling or dealing with classified information contact your

Division's Security Officer.

file://DAjttfoV21module3\m3270.htm 8/8/2011

FBI020697 ACLURM020906

.1TFF CBT 1 Of 1 DECLASSIFIED BY 65179 DM/ stp/ lsg ON 10-18-2011

_-0BeimpTrn115nris

JOINT TERRORISM

Security Briefing TASK FORCE (JTTF)

ORIENTATION

Overview Of Instructional Goal And Objectives (U) Goal: The goal of this orientation is to introduce the new task force member to security requirements, claSSifiCatien types, and levels of access and cccurity intcntiews.

(U) Objectives:

1. Read and review the importance of protecting national security information. 2. Gain a basic understanding of the FBI's document classification types and other security concerns. 3. Read of the importance of a security exit interview.

_sszaaernfornTir

4

file://DAjttfoV2\module3\m3_000.htm 8/8/2011

FBI020698 ACLURM020907

JTFF CBT Page 1 of 1 DECLASSIFIED BY 65179 DMH/ stpl lsg ON 10-14-2011

FBI Computer Investigative Resources And Networks

-sseamitwereas- JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI020699

Overview Of Instructional Goal And Objectives (U) Goal: The goal of this module is to introduce the new task force officer to the computer Investigative resources and networks employed by the FBI in the fight against domestic and international terrorism.

(U) Objectives:

1. Gain a basic understanding of the FBI's unclassified network (UNet) and its databases, applications, and systems.

2. Gain a basic understanding of the FBI's classified network (FBINet) and its databases, applications, and systems.

3. Read and review the functions and features of thel

EXIT MODULE :: NEXT PAGE: 1 OF 21

-STCRLPTISANOBORN.

odvta I•1

file://D:\jttfoV2\module4\m4_000.htm 8/8/2011

I b7E

ACLURM020908

Page 1 of 1 JTFF CBT

emelerrnwerenew-

FBI Computer Investigative Resources And Networks

JOINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

FBI020700

8/8/2011 file://DAjttfoV21module4\m4_010.htm

UNET

(U) The Unclassified Network (UNet) System is a Sensitive But Unclassified (SBU) inforniation system designed to provide the Federal Bureau of Investigations (FBI) with mission essential, unattributable (does not identify system users as FBI), secure high-speed access to the public Internet and other unclassified open sources of information available from other agencies and organizations within the Executive Branch.

(U) These sources include among others:

.b7E

(U) Click here to see a screen capture of UNET.

(U) Click here to see a screen capture of) I .b7E

QUIT :: PREVIOUS :: N EXT PAGE: 2 OF 21.

-SWZRE10.410EQBN--

ACLURM020909

- - Sdoty Tools - 4). "

b7E

r oWet Ort2,45i-

Fl. Eck New Awakes Tools Hob

at) Search r Riverton •

Address 44 4

Links

Department of Justice

• 00J Intranet • poi E-Mail Directory

• DOJ Momentum • DOJ Travel

FBI

• FBI UNet Webmall •- •

UNET ALERTS OWA

OW4 should be available from any Internet computer through

When logging on UNet users are reminded to put 'FB' in front of their user name. Non-UNet users

are not required to use "FBA" when logging in through OWA.

UNet Workstation Log Off Procedures

Please restart vouy UNet workstations @ laptops and leave

UNet

Documentation

▪ Bigffx Troubleshooting Flow Chart, 07/20/09 (HM., MS Word. Vislo)

. FBI UNet Policy (PDF, 190k)

• UNet FBI Domain MIstration and

ALL INFORMATION CONTAINED

HEREIN IS UNCLASSIFIED

DATE 10-14-2011 BY 65179 DMIii stpi isg

SIT F. CI3T - Windows Internet Explorer.

Intedf2Voodde4Hel_010.hlso

Re Eck New Favonles Took Hek _

1,? Favorbzi j Fanokonot

j an" art

b7E

V t+, Compass 4- Pion

"gleartqco,..- C5T

FBI020701 ACLURM020910

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 DY L65179 DI411/ stp/ Isg

1r h fa.

oca

a.1717F [BT.- Windows Internet Explorer

its!, ONttfoenrcduleetrnejutttitrn

Fie Edt Hew. Paved= Tools Help

Finceites i5;;;$ W,F811nbanet

AMFFCBT

%)7" 61Mtttla . iFF CGT .F7 4) 151'..

FBI020702 ACLURM020911

JTFF CBT Page 1 of 1

FBI Computer Investigative Resources And Networks

—szcsilwafttferoler

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

(U) Click here to see a screen shot oil

PAGE: 3 OF 21

file://MttfoV2\module4\m4020.htrn 8/8/2011

QUIT :: PREVIOUS :: NEXT

—§ECTILPVINGEou__

UNet

b7E

FBI020703 ACLURM020912

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ Stp/ 1sg

N. In, DAStdoV2Vnadde4VM 020.htrn

Fie Edit New Favortes Teak Help

Favcdes i 4 4 L FIHIntranet

Onno on

4.x x t:P.-

JIFF CBI q)13 5P',11 Z11:17e,,

h.rm Isa.•

g _FITE CBT -Windows Internet Explorer

FBI020704 ACLURM020913

socRETtliwontRer

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

UNet

.b7E

(U) Click here to see a screen shot ofl

QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 21

--BBERBRY-MCITORN

file://DAjttfoV21module4\m4_030.htrn 8/8/2011

JIFF CBT

Page 1 of 1

FBI020705 ACLURM020914

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg

C.-JTFF CDT - Windows Internet Explorer

.414 x. ipLY:f:vn tg1/4&" • II-Arto— Moodie!. ‘m1_030.htro Ha E Ww Fayette Tools Help I.? Roma= .rea ki FBI Irtraret tamp CBT

JIFF • iz

FBI020706 ACLURM020915

JTFF CBT

Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

UNet

b7E

Click here to see a screen shot oti

QUIT:: PREVIOUS NEXT PAGE: 5 OF 23.

—BleeRSTH+1099R1+-

file://D:\jttfoV2\module4\m4040.htm

8/8/2011

FBI020707 ACLURM020916

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

UNet Open Source Search Ermines

(U) Open source search engines such as G000le are available through UNet.

QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 21

--FE-3111277SOPOBN-

file://D:\jttfoV2\module4\m4050.htm 8/8/2011

JTFF CBT

Page 1 of 1

vsemeAtucas2E_

FBI020708 ACLURM020917

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

SEseariLHNeveRN

FBI Computer Investigative Resources And Networks

FBINet (U) FBINet is the FBI's classified network. Google is FBINet's search engine. The following applications are available en FBINet.

:1 • Automated Case Summit (AM

• HQ Division/Field Office Web Sites . Sentinel • Intranet Resources • Outlook

QUIT:: PREVIOUS :: NEXT PAGE: 7 OF 21

ser.ps.w,Waososai

file://DAjttfoV21module4m4_060.htm 8/8/2011

b7E

FBI020709 ACLURM020918

FBINet Automated Case Support (ACS)

(U) ACS is available through FBINet. ACS consists of:

b7E

QUIT:f PREVIOUS :: NEXT PAGE: 8 OF 21

—Mem-himmum

file://DAjttfoV2\module4\m4_070.htm 8/8/2011

JTFF CBT

Page 1 of 1

--earerem

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

FBI02071 0 ACLURM020919

. 4ti. X IP trri o inttlotiAroodillerVM_070.titin

Flo Edit View Fayed:es Toth Help

1,4 Favorites Fill rthetht . _

g13111. CDT . • Ej t3ele • Pop. Stfety Took • say "

FBI020711

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg

JIFF CBT - Windows Internet Exptorcr d'o

b7E

b7E

01/Coinputar

027F ...

• to t00% •

ACLURM020920

11 DARIdov2W0daddlrnil_070.htto v 41 X rPtt,se-,r:”

L

He Edt Wm condo Emits Help

*ftwam 1 ,,,4cnnwiema

la JIFF CBT . _

0 -0 m4- Paw • Safety • Toob 4)). "

9 My Ccraputer eft qtmos - , JIFF ;

107E

.aJTEF.C13T- Windows Internet Explorer

137 E

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 55179 DMH/ stp/ lsg

FBI02071 2 ACLURM020921

aSEFF CDT - Windows Internet Explorer

re; ONttroVneodJeltmi_070.htal FP Li..1 sr.-■

He Edt View Favortes Rob Help

1,-.r Rambo I ci.4 0_, FBI Intramt

03114. CDT

g HeCmpter

FBI02071 3

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNH/ stp/ lsg

ACLURM020922

Page 1 of 1 JTFF CBT

FBI Computer Investigative Resources And Networks

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://D:\jttfoV2\module4\m4_080.htm 8/8/2011

FBI02071 4

FBINet (U) Automated Case Support (ACS) (Con't)

. Reports

• Tables

▪ Employee7Self Search

QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 21

SECRETTriTCRFORN

b7E

ACLURM020923

Cataelter 4- eltoo. -

b7E

;C DAlttfalatpaduleetinesse.hem — -

Fie Erit Vtert Fanatics Tools WO . _-',4•Faveriess 15. C FM Intranet

. _ _ JIFF Or

—•

X . - . .....---

• 0 n t - Ace. sereo• Tads . 9. "

FI • •

b7E

rasa is

aJTIT COT- Windows Internet Explorer tm,

ALL .INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ 'stp/ 1sg

FBI02071 5 ACLURM020924

f p

irFF CBT Windows Internet Explorer EN a X. D:Unforaooile4m4_00.thn

File Ed* NW Papaw Toth Help

Favorites I c,4 FEIN:and

I 097rFF CBI • CI J P&P Sdety. Took. 0. calfiR

JTFF CDT gid, e.,,,*12.1 •

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

FBI02071 6 ACLURM020925

FBI02071 7

JTFF CBT Page 1 of 1

FBI Computer Investigative Resources And Networks

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://DAjttfoV21moduleAm4090.htm 8/8/2011

Si...111FritfeECOIN

FBINet

(U) Click here to see a screen shot DI

b7E

QUIT:: PREVIOUS :: NEXT PAGE: 10 OF 21

----greiZER77ROITolte

ACLURM020926

‘fses 14 •

a Windows Internet Explorer

ifL3, lAtifoVAnsxkieetat4_090.1tas . _ .

fie ELIS Meer Pansies Tools Help

v ip

CI 1.3 Pace Safety Tools • 0.

1„,} Favorites yas wart

— - - _ ia TIT CST

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stpl lsg

b7 E.

S-1 MyCcIextaa itiorm _ . . JIFF CUT ..

FBI02071 8 ACLURM020927

b 7E

JTFF CBT

Page 1 of 1

----sterar7sarairN )DINT TERRORISM TASK FORCE (7TTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

FBINet

QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 21

--aseteleftHeBeiga.

file://DAjttfoV2\module4\m4100.htrn 8/8/2011

FBI02071 9 ACLURM020928

JTFF CBT

Page 1 of 1

StPeRETHICITURN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

FBINet

b7E

(U) Click here to see a screen shot ofi

QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 21

file://DAjttfoV2\module4\m4110.htm 8/8/2011

FBI020720 ACLURM020929

4t- x 19 s. VP!. kr DAEttorknadde4to4_110.htm Fes Edt New Favorked To* lidp

V My Caroller ea — 4111:0%

1Z• Payette( I iad ki FBI kismet tialiFF CET CI 4 - Page • Eddy Toth.

Go*

e.JTFF CDT - Windows Internet Explorer

b 7E

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg

FBI020721 ACLURM020930

JTFF CBT

Page 1 of 1

—STCRW/611110960PAI

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

FBINet

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 13 OF 21

---W3mArneresir-

file://D:\jttfoV21module4\m4120.htm 8/8/2011

FBI020722 ACLURM020931

:b7E

JTFF CBT

spavig1/21-/aerpavel.

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Page 1 of 1

FBI Computer Investigative Resources And Networks

FBINet

(U) Click here to see a screen shot of)

QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 21

arZeTHOGROSS

file://DAjttfoV2\moduleLlAm4_130.htm

8/8/2011

FBI020723 ACLURM020932

• •z. aiksit1:0_ JTFF CDT -11/indows Internet Explorer

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM/ stp/ lsg

v outfarninockfrom_130.hbn v 4 x Flo Eat Naw Favorites Toob 11.1;

Favorites FBI Irkranet •

j$31FcT - -

J1FP CbT .„ 07:)41 ,1

FBI020724 ACLURM020933

(U) Click here to see a screen capture of the FBI Intranet.

PAGE: 15 OF 21 ThigetrtLeHtfesena

file://D:\ittfoV2\module4\m4_140.htm

JTFF CBT Page 1 of 1

sranrrtmereRN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

FBINet

(U) FBINet is an Internal FBI web-based computer network that is capable of carrying information classified up to tile SECRET level. It is one a the primary backbones for FRI communications and information. FBINet provides access to investigative and datibase applications including Automated Case Support (ACS), Sentinel,' I

(U) FBIHQ division and Field Office web sites can be accessed from the FBI Intranet homepage.

QUIT :: PREVIOUS :: NEXT

FBI020725 ACLURM020934

FBI020726

C.JEFE CBT Windows Internet Explorer

. - x DARIToTTbnadolegto4_140.11m

nt •al ,NJ, • Pane • Safety • Tools • tet,

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 D}/ stpl lsg

b6

•'

b7C b7E

9 Rs, caTotat

Filo Eck Vim Fonda" Toab Help

te:r Favorbes 1.1:4 a: RN Intranet

TIFF CBT

_ •

ACLURM020935

JTFF CBT Page 1 of 1

SECREW/Imury

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

:b7E

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 21

file://D AjttfoV2\module4\m4_150.htm 8/8/2011

FBI020727 ACLURM020936

JTFF CBT

Page 1 of 1

suers,! i JOINT TERRORISM TASK FORCE (JTTF) . ORIENTATION

FBI Computer Investigative Resources And Networks

.b7E

(U) Click here to see a screen shot ofi

QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 21

—szcazzAirgeseivi-

file://D:\jttfoV2\module4\m4_160.htm 8/8/2011

FBI020728 ACLURM020937

P: • v!4r: - . .

66 • qt. 10014 • g ON Costa

48i06;41;..

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB/ stp/ 1sg

hi DeUttrorilmochkentrd_161).htin

FBI020729

r rr _

F CI37. Windows fntcrnet Explorer tEg

Fts Edt Vim Favcdos Tod Hek3

Ravabn 3 FE Trirartet - - - - - —

• i331PF CBT - P. Safety • Took - 0.

Gti75.•

b7E

ACLURM020938

JTFF CBT

emeterTt7ROORiT

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Page 1 of 1

FBI Computer Investigative Resources And Networks

b7 E

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 21

file://DAjttfoV2\moduleAm4_170.htm 8/8/2011

FBI020730 ACLURM020939

JTFF CBT

Page 1 of 1

SECRL11111■70FORN-

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 21

$SCRET//norcm

file://D NttfoV2 \module4\m4_180.htrn

8/8/2011

FBI020731 ACLURM020940

Page 1 of 1 JTFF CBT

FBI Computer Investigative Resources And Networks

JOINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

8/8/2011 file://D:\jttfoV2\module4\m4190.htm

FBI020732

srewitAM0EQES.

QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 21

-ssessisAinorLoas

b7E

ACLURM020941

JTFF. CBT

Page 1 of 1

SECRET//NOFORN

3OINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

FBI Computer Investigative Resources And Networks

Module Review • CU) The FBI's unctak-sified network is liNct. It's databases, applications, and systems include: and Google.

• (U) The FBI's classified network is FBINet. da bases, applications, and systems include: Google, ACS,I

b 7E

PREVIOUS:: FINISH MODULE PAGE: 21 OF 21

--eseimerni060Stif

file://DAjttfoV2\module4\m4 200.htm

8/8/2011

FBI020733 ACLURM020942

JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg ON 10-14-2011

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

—seetanii Introduction To Foreign Intelligence And Terrorism

Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the Intelligence Community, FBI intelligence /softy, and FBI Intelligens* Analystsf-

(U) Objectives:

1. Gain a basic understanding of the Intelligence Community. 2. Read and review the FBI's intelligence policies. 3. Gain a basic understanding of the Field Intelligence Group and the role of Intelligence Analysts within

the FBI.

EXIT MODULE :: NEXT

PAGE: 1 OF 25 seCteVe.,9346001311

file://11\jttfoV21module5\m5_000.htm 8/8/2011

FBI020734 ACLURM020943

FBI020735

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://13:\jttfoV21module5\m5_010.htm 8/8/2011

JTFF CBT Page 1 of 1

Intelligence Community Overview (U) The United States Intelligence Community (MC) is a 17-member federation of Federal Government agencies, services; bureaus; and othrr prgani3ations within the executive branch that play a role in the -

collection and dissemination of national intelligence.

(U) The Director of National Intelligence (DNI) leads the Intelligence Community. The DNI is the President of the United States' principal advisor for national security intelligence matters. The DNI is assisted by the Principal and Deputy Directors of National Intelligence and the National Intelligence Council (NIC). The Office of the Director of National Intelligence (ODNI) manages the Intelligence Community.

QUIT :: PREVIOUS :: NEXT PAGE: 2 OF 25

SECRET//NOPORN

ACLURM020944

Intelligence Community Overview (Cont)'

(U) 17 Members of the Intelligence Community inciudet

• Intelligence and Counterintelligence elements of the Air Farce

• Intelligence and Counterintelligence elements of the Army • Central Intelligence Agency • Intelligence and Counterintelligence elements of the Coast

Guard • Defense Intelligence Agency • Department of Energy (Office of Intelligence and

Counterintelligence) • Department of Homeland Security (Office of Intelligence and

Analysis) • Department of State (Bureau of Intelligence and Research) • Department of Treasury (Office of Intelligence and Analys Is) • Drug Enforcement Administration (Office of National

Security Intelligence) • Federal Bureau of Investigation • Intelligence and Counterintelligence elements of the Marine

Corps • National Geospatlal Intelligence Agency • National Reconnaissance Office • National Security Agency • Intelligence and Counterintelligence elements of the Navy • Office of the Director of National Intelligence

QUIT:: PREVIOUS:: NEXT PAGE: 3 OF 25

szeuBsyluereau

file://DAjttfoV2\module5\m5015.htm

8/8/2011

JTFF CBT Page 1 of 1

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI020736 ACLURM020945

NSB

JTFF CBT

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Intelligence Community Overview The FBI's National Security Branch (NSB)

(U) The NSB combines the missions, capabilities, and resources of the counterterrorism, counterintelligence, and intelligence elements of the FBI under the leadership of a senior FBI official. The components of NSB include:

• Counterintelligence Division (CD) • Counterterrorism Division (CTD) • Directorate of Intelligence (DI) • Weapons of Mass Destruction Directorate

(WMDD)

(U) In the graphic to the right, click on the boxes under NSB fora detailed description of each component.

Page 1 of 1

Introduction To Foreign Intelligence And Terrorism

QUIT :: PREVIOUS :: NEXT

PAGE: 4 OF 25 sftssumagem-

file://DAjttfoV2\module5\m5_020.htm

8/8/2011

FBI020737 ACLURM020946

JTFF CBT Page 1 of 1

SECREillay.va

Introduction To Foreign Intelligence And Terrorism

Intelligence Community Overview

Executive Order 12333

(U) Executive Order 12333 focuses activities of the Intelligence Community almost exclusively on the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents.

JOINT TERRORISM TASK 'FORCE (3TTF)

ORIENTATION

QUIT:: PREVIOUS:: NEXT PAGE: 5 OF 25

Ssi.xxx//Nurvux

8/8/2011 file://DAjttfoV2\modulenm5_030.htm

FBI020738 ACLURM020947

• t!. 1.1) '4e 4i:r.;51.7

1.' ,...LAXIVI1 I

JTFF CBT Page 1 of 1

SECR.........1111.411;GRY113

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues The First Amendment

(U) The First Amendment of the United States Constitution protects Freedom of Religion, Freedom of Speech, Freedom of the Press, and Freedom of Assembly.

(U) No FBI investigations are to be conducted solely based upon activities protected by the First Amendment or other Constitutional rights. In order to conduct an investigation, a nexus to violence, criminal activity, or permissible foreign intelligence or law enforcement purpose must be present.

QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 25

--BLTABV-MOKURI

file://D:\jttfoV2\module5\m5040.htm 8/8/2011

FBI020739 ACLURM020948

JTFF CBT Page 1 of 1

a,W4GEGRIT

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues Attorney General (AG) Guidelines

(U) AG Guidelines regulating the conduct of FBI investigative activity in the domestic context have existed since the 1970s in order to protect First Amendment rights. Following the September 11, 2001 attacks/the AG Guidelines were updated: AG Guidelines on General Crimes, Racketeering Enterprise, and Terrorism Enterprise Investigations (General Crime Guidelines) were reissued in May 2002, and AG Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (National Security Guidelines) were reissued in October 2003.

(U) Both the General Crime Guidelines and the National Security Guidelines require that investigative techniques be used in a manner that protects the rights of Americans and complies with constitutional and statutory restrictions. In addition, each set of Guidelines prohibits the collection, maintenance, and dissemination of information without a sound law enforcement basis.

QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 25

-SECRIMIONOFORN-

file://DAjttfoV2\module5\m5_060.htm

8/8/2011

FBI020740 ACLURM020949

FBI020741

JTFF CBT Page 1 of 1

SECRE971-14,101PORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues

Attendance and Surveillance at Public Events

(U) Agents may not conduct surveillance of individuals or groups solely for the purpose of monitoring the exercise of rights protected by the First Amendment. Generally, FBI personnel may only attend public events and conduct surveillance of persons in attendance for an established investigative purpose as set forth in the AG Guidelines. An established investigative purpose exists only if the agent can articulate objective facts and inferences that satisfy the Guideline's criteria. As with any investigative measure, the justification for this activity should be supported by appropriate documentation. Agents must always be mindful of the provision of the Guidelines that requires consideration of whether a less intrusive technique is available that could achieve the desired investigative results.

(U) There are two broad categories of investigative purposes established under AG Guidelines, either of which could justify attendance and surveillance at public events:

1. plonitorina an individual or group currently under investigation 2. Conducting an Assessment

(U) The Guidelines do not limit an agent to the original purpose of his/her attendance at a public event if unfolding circumstances provide additional bases for other investigative activity.

QUIT :: PREVIOUS :: NEXT PAGE: 8 OF 25

file://DAjttfoV2\module5\m5_070.htin

ACLURM020950

ipo $

(,._`_JIFF CUT- Windows Internet Explorer

• •••1,4t;' X, u DkittfeVArnodulegteg_070.1tm

Flie El View RIVIAOS Tonle Help

a - Q - peg.- sae*. Tca - • " *Fenceltes 1:6 FBI Wend

j,43Trro3r

• gt*Coroder rleg - •4,100% ,,•••

0 TIFF CEIT wiC_ire5c,) .a11,1:11 MDR 12047%.7''Inittsir

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg

00w: Monitoring an Individual or Group Currently Under Investigation _ - __ _ . ___ __ ___ ...

If c.:1 int:iv:du:: cr grccp currcrd...17 1.::....dic* i-cvcCiliCti-c !- -..,_.t.,,,,j tz ,ti.:,,n1 % pvi,ue Lat!eani• onr.i pnriann In unlawful activity, incite violence, or engage in any other activity of evidentiary or investigative significance, agents may attend the event for the purpose of monitoring that activity.

FBI020742

b7E

ACLURM020951

g ObCcepibx ea -

0.JTIT 97: Windows Internet Explorer • )71

CAW "

*(4 k& V IC DllIttroMmockieSisdidoheg Flo Edit How Payola Tools He *Fricritos hf:a r fignereeet

mp cur

r Conducting an Assessment

.:4r. 5) tp.. s_

b7E

a-c, 3 a•Page. Safety. Tocb •

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

b7E

FBI020743 ACLURM020952

FBI020744

JTFF CBT Page 1 of 1

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

ID7E

• Law Enforcement Unit Records • Disclosure to Immigration Authorities • Volunteered Information

file://DAjttfoV2\module5\m5_080.htm 8/8/2011

SECMa 7NOTOIRT

Attorney General Guidelines: First Amendment And Privacy Act Issues

Collecting, Maintaining. and Disseminating Information

(U) Specific legal requirements apply to collecting, maintaining, and disseminating information obtained from the following sources:

QUIT :: PREVIOUS :: NEXT

PAGE: 9 OF 25 613GBSOMIGFORN---

• Surveillance

ACLURM020953

JTFF CBT

718ZET'ffiteRiall

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues

Surveillance

(U) Information derived from surveillance of subject individuals or groups at public events pursuant to an open investigation should be collected, maintained in FBI records, and disseminated in compliance with the Privacy Act and departmental policy. If an agent conducts surveillance of persons underl

I personal identifying information obtained about individuals or groups through that surveillance may not be maintained in FBI records - absent some established law enforcement basis.

(U) Attendance by an agent undeA I should be

documented in some retrievable fashion. That documentation should be entered In the appropriate control file and should not include identifying information about individuals or groups in attendance, absent a valid investigative basis as discussed above.

Identifying information (e.g., cannot be temporarily collected for the sole purpose of determining

wwhef ea person of investigative interest is in attendance. However, identifying information can be collected if the presence of the individual at the event in question has independent investigative significance.

QUIT :: PREVIOUS :: NEXT

PAGE: 10 OF 25 ■ 43BORMISWHOrt

file://D:\jttfoV2\module5\m5_090.htm 8/8/2011

FBI020745 ACLURM020954

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: Firit Amendment And Privacy Act Issues

QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 25

file://DAjttfoV21module5\m5_100.htm 8/8/2011

FBI020746 ACLURM020955

JTFF. CBT Page 1 of 1

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

8/8/2011 file://DAjttfoV2\module5\m5_110.htm

—sBeciss4innEIEN

Attorney General Guidelines: First Amendment And Privacy Act Issues

. b7E

QUIT ::PREVIOUS :: NEXT PAGE: 12 OF 25

SECIMPTHHABOVAL-

FBI020747 ACLURM020956

d effg rEk:DAIttfoMmodileAm5_110.1tin 41-- X 15..)::::• -J.:er. •

waives:sr es • Alpo.

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10714-2011 HY 65179 DMH/ stp/ lsg

, 0.."4,0324 • (5, ]IFF ,_BT

FBI020748

b7E

C..fJTFE CBT Windows Inlernet Explorer

t. •

E. Mem Famxtes To* He

1.jr Fault= 1 v,4 CFEIIIrtromt _

iZIMCBT

b 7 E

- Pep.. SAO. Thais, co. "

ACLURM020957

JTFF CBT Page 1 of 1

--szclIVIT/StIPORN

JOINT TERRORISM TASK FORCE OTTO

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues Law Enforcement Unit Records

(U) In accordance with a 2002 Department of Education Memo, a Law Enforcement Unit is officially authorized or designated to enforce laws and maintain the security of the school. Law Enforcement Unit records may be released to anyone without consent or court order if they:

. Have been created for law enforcement purposes • Are maintained by the Law Enforcement Unit • Do not include records obtained by the Law Enforcement Unit from other educational institutions

QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 25

-szcsarTlyaerele#

file://lnjttfoV2\module5\m5_120.htm 8/8/2011

FBI020749 ACLURM020958

FBI020750

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

8/8/2011 file://DAjttfoV2\module5\m5_130.htm

JIFF CBT Page 1 of 1

saeRnefittoroRN

Attorney General Guidelines: First Amendment And Privacy Act Issues

Disclosure to Immigration Authorities

b 7E

QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 25

--lilitettErnIffrORN

ACLURM020959

JTFF CBT Page 1 of 1

szLxsT/inuruica

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues Volunteered Information (March 1996 FBI Airtel)

(U) FBI policy is not to accept volunteered information that on face value would appear to violate the Buckley Amendment. However, it is permissible to accept information, other than protected educational records, from sources (i.e., personal observations, etc). The FBI must return protected information that is acquired mistakenly and cannot make use of that information.

QUIT :: PREVIOUS :: NEXT

PAGE: 15 OF 25 L.tosT1/NUFORN

file://DAjttfoV2\module5\m5_140.htm

8/8/2011

FBI020751 ACLURM020960

JTFF CBT Page 1 of 1 .

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign. Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues Privacy Act Limitations

(U) The FBI Is prohibited from collecting, maintaining, using or disseminating a "record describing how an.

. individual exercises rights guaranteed by the First Amendment ... unless pertinent to and'within the scope of an authorized law enforcement activity." Where information describes only the exercise of First Amendment rights unconnected to an authorized law enforcement activity, no record may be made of this information.

(U) Do not index the names of individuals in FBI files who may be participating in any group activity where First Amendment concerns exist unless the individuals are also subjects of a criminal or intelligence investigation or you can delineate a specific criminal or intelligence purpose for putting that person's name in the file.

(U) It is not the mere passive receipt of information concerning the exercise of First Amendment rights that violates the Privacy Act; The Privacy Act applies when information is collected and recorded in an Agent's notes, report of investigation or other medium. When information is thus recorded, the FBI must be able to demonstrate it Is "pertinent to and within the scope of an authorized law enforcement activity." If public source printed material is retained and put into a file, the Agent must make a handwritten notation explaining why it was retained.

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 25

--secteriy.oixacatt

file://DAjttfoV2\module5\m5_150.htm 8/8/2011

FBI020752 ACLURM020961

FBI020753

Introduction To Foreign Intelligence, And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://D:\jttfoV2\module5\m5_160.htm 8/8/2011

JTFF CBT Page 1 of 1

"SECRErt/NCEPORN

Attorney General Guidelines: First Amendment And Privacy Act Issues

Disclosure of Information

(U) "No agency shall disclose any record contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with prior written consent of, the individual to who the record pertains, unless..."

(U) Common exceptions applicable to FBI investigations include:

• Written request, by a domestic government agency, for civil or criminal law enforcement purpose, specifying what and why, signed by the agency head or designee

• Compelling circumstances affecting the health and/or safety of a person (must notify the person) • Order of court of competent jurisdiction • Any published "routine use" or "blanket routine use" for the system of records in which the

information is maintained.

(U) Records must be kept of all dissemination of information, including to whom, the date, nature of information disclosed, and purpose for which information was disseminated. Knowing/willful disclosure of information not covered by a Privacy Act exception is a criminal misdemeanor. •

(U) Form FD-999, Liaison with External Organizations, may be used for this purpose.

QUIT :: PREVIOUS :: NEXT

PAGE: 17 OF 25 SBERBOILIZOBOBIL____

ACLURM020962

JTFF CBT

Page 1 of 1

SECRET/1110MM

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Attorney General Guidelines: First Amendment And Privacy Act Issues References

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 25

file://DAjttfoV21module5\m5_170.htm

8/8/2011

:b7 E

FBI020754 ACLURM020963

(Rev.0141-2003)

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DM) stp) 1sg

FEDERAL BUREAU OF INVESTIGATION

Precedence: ROUTINE Date: 09/08/2005

To: All Divisions Attn: ADIC AD bAC CDC FBIHQ, Manuals Desk 0

From: General Counsel

Approved By: Caproni Valerie E' Thomas Julie F

Drafted By: b6 b7c

Case ID #: 62F-HQ-C1413697 (Pending) 66F-HQ-C1384970

Title: PROTECTION OF CIVIL LIBERTIES -- UPDATE

Synopsis: To update FBI policy guidance, provided on March 19, 2004, on the protection of civil liberties during criminal and national security investigations.

Reference: 62F-HQ-C1413697 Serial 30 66F-HQ-C1384970 Serial 8139

Details: On March 19, 2004, we provided policy guidance that emphasized established FBI policy on the protection of civil liberties during Criminal and national security investigations. It addressed several important issues in an effort to assist FBI personnel in meeting the challenge of aggressively pursuing legitimate investigative goals without infringing on the exercise of constitutional freedoms.

One of the, issues previously addressed was the FBI's retention of personally identifying information obtained by surveillance.conducted during threat assessments under the Attorney General's National Security Guidelines (NSIG). The following updates that previous, guidance with more detailed comments regarding this specific issue.

The previous guidance stated that, to be retained in FBI records, such personally identifying information obtained during threat assessments "must be relevant to an existing investigation

FBI020755 ACLURM020964

To: All Divisions From: General Counsel Re: 62F-HQ-C1413597, 09/08/2005

I; by itself or in combination with I other known information, justify a new inquiry or investigation; or relate to another law enforcement activity the FBI is authorized by law or regulation to conduct." The underlying b7E intent was to ensure that those who retain such intorffiation do so for valid purposes. The intent was certainly not to restrict those who employ threat assessments as a legitimate tool to prevent terrorist attacks by

The introductory language of the NSIG's Part II, "National Security Investigations," discusses "critical information needed for broader analytic and intelligence purposes authorized by Executive Order 12333 and these Guidelines to protect national security." It then expressly states that "filnformation obtained

b7E

accordingly to be retained and disseminated for these purposes as provided in these Guidelines, or in FBI policy consistent with these Guidelines, regardless of whether it furthers investigative objectives in a narrower or more immediate sense."

Even if information obtained during a threat assessment

[ those who possess personally identifying. 1

information derived from the threat assessment may retain it for the national security purposes stated above. In that regard, the informationl

In addition, the information may possibly assist FBI personnel int

One cautionary point in this regard must be emphasized. This type of information--i.e., information obtained during a threat assessment that has insufficient value to justify further investigative activity (at least at the time it is obtained)--is often' 1 b7E I If it is retained for the purposes addressed above, measures-should be taken to identify it accurately as threat assessment information, to protect it from inadvertent disclosure, and to preclude its use as a basis for any further investigative activity unless and until such action is authorized by the NSIG or other applicable regulations.

2

b7E

FBI020756 ACLURM020965

To: All Divisions From: General Counsel Re: 62F-HQ-C1413697, 09/08/2005

Set Lead 1: (Discretionary)

ALL RECEIVING OFFICES

Read and disseminate as appropriate.

CC: Director Mueller Deputy Director Pistole EAD Bald EAD Ashley

b6 b7c

• •

3

FBI020757 ACLURM020966

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

Main Law Library

FBI > Directors Office > Office of the General Counsel

Main. Law Library

• Training Guide to Materials on the OGC Law Library Website (pdf)

• •

'

Attorney General Attorney General

• Aviation-Related • Border Searches • Buckley Amendment • CDC Team Site

[restricted - contact'

• CDC Conference • Church Committee • Department of

Law Enforcement • Digital Evidence

Investigations • Director of Central • DoD Operational • DO) IG Reports • DO] Memorandums • DO) Office of Investigative • DO) Orders

o OBD Orders • DO) USABook • Electronic Communications • Enemy Combatants

Commissions • Espionage Violations • Executive Orders • Export Controls • Extraterritorial • Fair Credit Reporting • FBI Chief Division

Manual • FBI Guidance/Policy. • Federal Rules of

Guidelines Orders Matters

• Foreign Terrorist Organizations • Homeland Security Presidential Directives • Immigration Issues • Information Sharing Environment • Inspector General Procedures • International Issues • Intelligence Community/National Security

Related Directives • Legal Handbook for Special Agdnts (pdf) • Legislative History of U.S. Public Laws

'or access]

Presentations Reports

Defense Assistance to U.S.

and Computer Related

Intelligence Directives Law Handbook

Agency Policies

Privacy Act and Military

and Authorities

Matters Act (pdf)

Counsel Critical Incident

ECs Criminal Procedure

• Maritime-Related Matters • MOU List (pdf)

• Model Memorandums of Understanding (MMOU)

• Memorandums of Understanding (MOU)

National Response Framework (pdf) • National Security Act of 1947 (amended

12/2007) (pdf) (Title 50. War and National Defense, Chapter 15— National Security)

• National Security Directives •

Office of the Director of National Intelligence Documents

• PATRIOT Act • PATRIOT Reauthorization Act.

• Probable Cause (ppt? (presentation by AUSA

• Right to Financial Privacy Act (pdf) (Title 12, United States Code, Sections 3401-3422)

• State Electronic Surveillance Procedures and Laws

• Terrorism Related • Treaties • United States Attorney's Manual • United States Public Laws

For questions or oonwnenls, OGC) (FEW) last modified on 7P/20119:10:12 AM

FBI020758 ACLURM020967

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

0I=1 IN. 40.n.

SAO.

FEDERAL DIUREAD eV irwesnaxnox

imam

masoluwannatormsmexcvntomugummontrm)

Omar. Aseta2.74

LOOMNVIolfrb

641611.110.4. ...1+4 44.16 wa «411.1

FBI020759

JTFF CBT Page 1 of 1

SEtaa.r//Numvard

National Foreign Intelligence Policy

National Foreign Intelligence Policy Manual (NFIPM)

The NFIPM details the FBI's National Foreign Intelligence Program. The NFIPM can be found on the FBI

Inn .....11141...4 ."•-•••

I.. ..1.4•11 .11■ OW,

M. • • a ...1,-061•

QUIT:: PREVIOUS:: NEXT PAGE: 19 OF 25

. -Sztettiffil4B6ir4PAT-

nranet at:1 b7E

file://DAjttfoV2Imodule51m5_180.htm 8/8/2011

ACLURM020968

JTFF CBT Page 1 of 1

-88098IPHIMPORN

JOINT TERRORISM TASK FORCE OTTO

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Foreign Intelligence Surveillance Act (FISA) (U) The Foreign Intelligence Surveillance Act (FISA) of 1978 prescribes procedures for requesting judicial authorization for electronic curve:nonce end physical search of persons engaged in espionage or international terrorism against the U.S. on behalf of a foreign power. A special eleven-member court, appointed by the Chief Justice of the U.S. Supreme Court, called the Foreign Intelligence Surveillance Court adjudicates FISA requests.

(U) Section 6001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004, known as the "lone wolf" amendment, broadened FISA to allow surveillance of any person, other than a U.S. person, who "engages in international terrorism or activities in preparation therefore." The expanded definition allows the government to use FISA for surveillance of a non-U.S. person who has no known ties to a group or entity.

(U) Recent changes to FISA as a result of the USA PATRIOT Improvement and Reauthorization act of 2005 and the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 can be found b7E

QUIT:: PREVIOUS:: NEXT PAGE: 20 OF 25

IELIcrrtOaeaoaa.

file://D:\ittfoV2\module51m5_190.htm

8/8/2011

FBI020760 ACLURM020969

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED ,DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg

(Rev. 01-31-2003)

FEDERAL BUREAU OF INVESTIGATION

Precedence: PRIORITY

To: All Divisions

From: Office of the General Counsel Contact:

Date: 04/07/2006

Approved By: Caproni Valerie E Thomas Julie F b6

b7C

Drafted By:

Case ID #: 319X-HQ-A1487720-OGC

Title: (U) USA PATRIOT ACT RENEWAL - NEW LEGISLATIVE CHANGES TO FCl/IT LEGAL AUTHORITIES.

Synopsis: (U) Summarizes recent changes to national security legal authorities as a result of the "USA PATRIOT Improvement and Reauthorization Act of 2005 (Public Law 109-177) and the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006" (Public Law 109-178), and describes the preliminary implementation procedures.

Details: The President signed the "USA PATRIOT Improvement and Reauthorization Act of 2005" (USA PATRIOT IRA) and the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006" on March 9, 2006. The USAPA IRA makes permanent many of the sunseting provisions of the USA PATRIOT Act.' Additionally, both laws make significant changes to many national security legal authorities, including National Security Letters (NSLs) and certain FISA-related provisions, and impose new reporting requirements. Moreover, the new laws make changes in several substantive criminal laws, some of which may have implications in national security investigations.

The National Security Law Branch of the Office of General Counsel is issuing preliminary guidance on those portions of the two laws relating to national security operations. The following summarizes authorities contained in'sections of the bills, to include a summary of potential changes in FBI operational procedures. Recipients should note that this is only initial guidance; more detailed explanations and procedures may follow in subsequent communications

The USA PATRIOT Act refers to the "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001," which was signed into law on October 26, 2001.

FBI020761 ACLURM020970

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

The USA PATRIOT Act Improvement and Reauthorization Act of 2005 is organized into the seven titles. Title I, which carries the same title as the overall bill, contains the significant changes to the FBI's national security tools.2 Titles II through VII contain several other Acts and miscellaneous provisions:

• Title I - USA PATRIOT Imprevement and Reauthorization Act

Title I makes most of the original sunset provisions of the original USA PATRIOT Act permanent, though it creates new sunsets for the authorities in section 206 (FISA roving authority) and section 215 (FISA access to business records) of the USA PATRIOT Act, and section 6001 (Lone Wolf provision) of the Intelligence Reform and Terrorism Prevention Act of 2004. It also extends the duration of several FISA tools. Additionally, it makes significant changes to the National Security Letter statutes Finally, the USAPA IRA requires new Congressional reporting of the use of national security tools.

• Title II - Terrorist Death Penalty Enhancement

This portion of the USAPA IRA entitled the "Terrorist Death Penalty Enhancement Act of 2005" makes adjustments to the death penalty procedures for federal cases, including certain air piracy cases.

• Title III - Reducing Crime and Terrorism at America's Seaports Act of 2005

This Title amends certain criminal statutes to strengthen maritime and seaport safety.

• Title W - Combating Terrorism Financing Act of 2005

This Title increases the penalties for terrorism financing, and adds new terrorism-related provisions to the specified unlawful activities that serve as money laundering predicates (including operating an illegal money transmitting business, such as the common "hawala" network).

• Title V - Miscellaneous Provisions

As recommended by the WMD Commission, this Title creates a National Security Division within the U.S. Department of Justice, which is to be led by an Assistant Attorney General for National Security.

2 Congress drafted the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 after the USA PATRIOT Improvement and Reauthorization Act of 2005. Congress used the USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 to make additional adjustments to the nondisclosure provisions of FISA Business Records and National Security Letters contained in the USA PATRIOT IRA, and to add the "Privacy Protections for Library Patrons."

2

FBI020762 ACLURM020971

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

• - Title VI - Secret Service Authorization and Technical Modification Act of 2005

As the Title suggests, it modifies certain authorities of the Secret Service.

Title VII - Combat Methamphetamine Epidemic Act of 2006

This Title creates regulations for the control of precursor chemicals and enhances the criminal penalties for methamphetamine production.

TITLE I - USA PATRIOT IMPROVEMENT and REAUTHORIZATION ACT of 2005.

This EC will not address the new sections of the USAPA IRA in sequence; instead, the sections will be organized by national security tools.

SUNSET PROVISIONS

Sec. 102. USA PATRIOT Act Sunset Provisions.

Section 102 repeals section 224 of the USA PATRIOT Act, making most of the original sunset provisions permanent. This section adopts a new 4-year sunset (December 31, 2009) for sections 206 (roving authority) and 215 (business records) of the USA PATRIOT Act. The now permanent provisions of the USA PATRIOT Act are the following:

USA PATRIOT Act 2001 Provision

Description of Provision • .

Sections 201 & 202 Expanded Title III predicates.

Section 203(b) & (d) Information sharing of foreign intelligence obtained in Title III and criminal investigations.

Section 204 Clarification of Intelligence Exceptions from Limitations on Interception and Disclosure of Wire, Oral and Electronic Communications.

Section 207 Extended duration of certain FISAs.

Section 209 Seizure of voice mail with a search warrant.

Section 212 Emergency disclosures of e-mail and records by ISPs.

Section 214 PISA pen/trap authority.

Section 217 Interception of computer trespasser communications.

Section 218 Change in the probable cause ("significant purpose") standard of FISA.

Section 220 Nationwide search warrants for electronic evidence.

FBI020763 ACLURM020972

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Section 223 Civil liability for certain unauthorized disclosures.

Section 225 Immunity for compliance with FISA wiretap.

Procedural Changes: None at this time. If necessary, additional guidance may be -issued in the future.

Provision New Sunset Date

FISA Roving Authority December 31, 2009

FISA Business Records Authority December 31, 2009

Sec. 103. Extension of Sunset Relating to Individual Terrorists as Agents of a Foreign Power.

Section 6001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) addressed the "lone wolf' terrorist by broadening the definition of the "agent of a foreign power" for any person other than a United States person to include a person who "engages in international terrorism or activities in preparation thereof." The USAPA IRA extends the sunset of this provision 4 years (until December 31, 2009).

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Provision

New Sunset Date

FISA "Lone Wolf'

December 31, 2009

FISA DURATION CHANGES

Sec. 105. Duration of FISA Surveillance on Non-United States Persons under Section 207 of the USA PATRIOT Act.

Section 105 extends the duration of both initiations and renewals of electronic surveillance (FISA § 105(e)), physical search (PISA § 304(d)), and pen register/trap and trace surveillance (FISA § 402(e)) for agents of a foreign power who are not U.S. persons.

Procedural Changes Related to the New FISA Durations: Dal Office of Intelligence Policy and Review will implement these changes to the FISA process. The new durations for non-United States persons are reflected in the chart below. Overall, the new durations should translate into considerable savings in FBI and OIPR resources.

FBI020764 ACLURM020973

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

FISA Technique

The initiations and renewals for United States persons will remain the same. b7E

FBA Technique

FISA BUSINESS RECORD CHANGES'

Sec. 106. Access to Certain Business Records Under Section 215 of the USA PATRIOT Act.

Section 106 makes the following changes to Sections 501 and 502 of the Foreign Intelligence Surveillance Act (FISA) regarding access to 215 Business Records.

Procedural Changes Related to PISA Business Records: FISA Business Records, which have been the subject of much debate, have been modified to contain more safeguards to protect civil liberties and privacy. include special procedures and approvals for b7E certain types of tangible things (i.ePese"safemal, a directive to develop "minimization procedures," the recipient's right to seek judicial review of an order, and a recipient's right to disclose an order for the purpose of obtaining legal advice or for assistance in complying with the order. The following charts summarize significant provisions in the new law.

Scope of FISA Business Records authority.

The changes included in this section also include the changes made by section 3 and 4 of the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006."

5

b7E

FBI020765 ACLURM020974

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

Special Categories of Tangible Things,

Congress designated particular categories of records for special procedures and approvals. The FBI will adjust procedures to account for the special designation.

• Special Categories.

• Approval Level for special categories:

The Director of the FBI may delegate the authority to either - • the Deputy Director of the FBI; or • the Executive Assistant Director (EAD) for National Security (or any successor position).

No further delegation is allowed.

• Congressional Oversight of special categories:

Attorney General must provide annual report (April) to the House Judiciary Committee (HJC), the House Pennanent Select Committee on Intelligence (HPSCI), the Senate Judiciary Committee (SJC), and the Senate Select Committee on Intelligence (SSCI).

• Rumber of FISA business record orders granted, modified, or denied for the special categories of tangible things.

FISA Business Record Standard- Relevance:

- . ..

The FBI's facts must show that there are "reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation." .

• Presumptive Relevance The tangible things are presumptively relevant if the facts show Test: they pertain to -

"(i) a foreign power or an agent of a foreign power, (ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or (iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigations..."

FISA Business Record Order

• The order must describe the tangible things with sufficient particularity to permit them to be fairly identified. • Date for return - the order will contain a date on which the tangible things must be provided. • Recipient must have a reasonable period of time to produce. • The Order may only require production of tangible things that would be available with a grand jury subpoena or a District Court order (in other words, privileges under the law will apply to Business Record orders).

b7E

6

FBI020766 ACLURM020975

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1467720-0GC, 04/07/2006

FISA Business Record Non-Disclosure Provision:

No person shall disclose the fact that the FBI has sought tangible things.

• Exceptions to non- A recipient may disclose a FISA Business Record Order to — diaclumuc. . (1) pcnon5 to whom disclosure is necessary to comply:

(2) an attorney to obtain legal advice or assistance with respect to the production; (3) a person as permitted by the FBI Director (or designee).

• Extension of • If the recipient discloses to another person (see exceptions nondisclosure to others: above), the recipient shall notify the person of the nondisclosure

requirement. • The person to whom disclosure is made shall be subject to the nondisclosure requirement. • The FBI director (or designee) may ask the recipient to identify the other persons to whom disclosure of the Business Record order will be made (except that the recipient does not have to identify the attorney).

Judicial Challenge of FISA Business Record authority:

The recipient of a PISA Business Record order may challenge the legality of the order in the Foreign Intelligence Surveillance Court

• Challenging the order • Recipient may move to modify or set aside the order. • FISC may grant the motion only if the order does not meet the requirements of FISA or is otherwise =lawful.

7

FBI020767 ACLURM020976

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

• Challenging the non- • Not less than 1 year afier the order, the recipient may move to disclosure provision: modify or set aside the nondisclosure order.

• FISC may grant such a motion only if there is no reason to believe that disclosure may endanger the national security of the U.S., interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person. • The FISC will treat as conclusive a certification by the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI that a disclosure may endanger the national security of the U.S. or interfere with diplomatic relations.

• Security: • Filings shall be under seal •Chief Justice of the U.S., in consultation with the AG and the DNI, will establish security measures.

Minimization Procedures for FISA Business Records:

-

Within 180 days of enactment, the Attorney General shall adopt specific minimization procedures governing the retention and dissemination of FISA Business Record information.

•U.S. Person information: The minimization procedures should minimize the retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting U S persons consistent with the U.S. intelligence community need to obtain, produce and disseminate foreign intelligence information.

• Evidence of a crime: The procedures should allow for the retention and dissemination of information that is evidence of a crime.

Procedural Changes Related to Congressional Oversight of FISA Business Records: The new law beefs up the Congressional reporting requirements for the FISA Business Record authority. OIPR will have the responsibility for reporting the FISA Business Record statistics to Congress.

Reporting Cycle: Attorney General will report on an annual basis (April of each year).

Congressional Committees:

•House Permanent Select Committee on Intelligence •House Judiciary Committee •Senate Select Committee on Intelligence •Senate Judiciary Committee

8

FBI020768 ACLURM020977

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

Reporting Categories: (1) Total number of applications for FISA Business Records. (2) Total number of orders granted, modified, or denied. (3) Total number of orders granted, modified, or denied for the, special cate2ories of tangible things.

Additional unclassified report

Annually (April of each year), the Attorney General shall make an unclassified report on the total number of FISA Business Records applications, and the total number of orders granted, modified, or denied.

Sec. 106A Audit on Access to Certain Business Records for Foreign Intelligence Purposes.

Section 106A directs the Inspector General of the Department of Justice to perform a comprehensive audit of the effectiveness and use, including improper or illegal use, of the FISA Business Records authority. The audit will take place in two phases, covering the years of 2002 to 2006.

Procedural Changes Related to the Audit of FISA Business Records: The Inspector General's Office of the Department of Justice (DOJ IG) started the audit process in January 2006, in anticipation of the new USA PATRIOT Improvement and Reauthorization Act. It will be incumbent upon the FBI to cooperate with the DOJ IG to complete the two-phased audit. Per established procedures, the FBI's Inspection Division will be the primary point of contact for the DOJ IG. Additional guidance may be published as the audit process continues.

Scope of Audit .

The IG will perform a comprehensive audit of the effectiveness and use, including any improper or illegal use, of the investigative authority.

Timing of Audit For 2002, 2003, and 2004, the audit should be completed within one year of enactment (March 9, 2007).

For 2005 and 2006, the audit should be completed by December 31, 2007.

Report results to Congress: The IG shall submit the audit reports to —

• House Judiciary Committee. • House Permanent Select Committee on Intelligence. • Senate Judiciary Committee. • Senate Select Committee on Intelligence. _

FBI020769 ACLURM020978

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Examine effectiveness of the tool:

Audit will look at the following for effectiveness —

• Categories of records obtained. • The importance to the FBI and the IC of the information obtained. • The manner it which the information is collected, retained, analyzed, and disseminated by the FBI (this will include an examination of the access to "raw data" provided by the FBI to other agencies of the Federal, State, local, or tribal governments, or private sector agencies). • The minimization procedures adopted by the AG. • Whether, and'how often, the FBI used information to produce analytical intelligence products for the FBI, the IC, or other Federal, State, local, or tribal government agencies. • Whether, and how often, the FBI provided the information to

• law enforcement authorities for criminal proceedings.

Examine the process: The audit process will look at the following:

• How often the FBI requested DOJ to submit an application and the request was not submitted to the court (including the basis for the decision). • Whether the court granted, modified, or denied the application. • The justification for the failure of the AG to issue implementing procedures governing the requests in a timely

• fashion, including whether the delay harmed national security. • Whether bureaucratic or procedural impediments prevent the FBI from fully using the authority.

FISA ROVING SURVEILLANCE CHANGES

Sec. 108. Multipoint Electronic Surveillance Under Section 206 of the USA PATRIOT Act.

This section modifies FISA sections 104(a) and 105(c), to clarify the amount of detail the FBI must provide to obtain a FISA roving surveillance order.

Procedural Changes Related to FISA Roving Surveillance:

The application must now include a description of the "specific" target when the target is identified by description rather than by name. The section also adds a return requirement on the FBI in national security investigations. This is consistent with Congress' intent to provide an extra layer of judicial review and to prevent the potential abuse of this investigative authority.

OIPR will implement the new requirements for the FISA roving surveillance. OIPR and FBI OGC may develop more specific guidance on the new process for obtaining this authority in the future.

10

FBI020770 ACLURM020979

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Standard for roving surveillance:

b7E

Consistent with Congress' intent to provide more oversight, the reporting requirements for FISA roving surveillance have been changed.

Procedural Changes Related to FISA Roving Surveillance Congressional Oversight: OIPR will maintain responsibility for reporting on the FISA roving surveillance.

Reporting cycle: The Attorney General will report on a semi-annual basis.

Congressional Committees:

• • House Permanent Select Committee on Intelligence • Senate Select Committee on Intelligence • Senate Judiciary Committee

Reporting categories: • Total number of applications made for orders and extensions. • Each criminal case in which information has been authorized for use at trial, during the period covered by such report. • Total number of emergency employments and total number of subsequent orders approving or denying surveillance.

FISA OVERSIGHT CHANGES

In section 109 of the USA PATRIOT Act Improvement and Reauthorization Act, Congress has implemented additional reporting requirements for the use of FISA physical search authority and FISA pen registers and trap and trace authority. This section modifies the reporting requirements in FISA sections 306 and 406(b).

FBI020771 ACLURM020980

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Congressional Reporting on FISA Physical Search authority:

Reporting cycle: Attorney General will report on a semiannual basis.

Congressional • House Permanent Select Committee on Intelligence Committees: - House Judiciary Coma-littcc,

• Senate Select Committee on Intelligence • Senate Judiciary Committee

Reporting categories: Report the following regarding emergency physical searches — • Total number of applications. • Total number of orders granted, modified, or denied. • Number of physical searches involving the residences, offices, or personal property of U.S. persons, and the number of occasions the AG provided notice. • Total number of emergency authorizations, and total number of subsequent orders approving or denying the physical searches.

Congressional Reporting on FISA Pen Register and Trap and Trace authority:

Reporting cycle: Attorney General will report on a semiannual basis.

Congressional Committees:

• House Permanent Select Committee on Intelligence • House Judiciary Committee • Senate Select Committee on Intelligence • Senate Judiciary Committee

Reporting categories:

.

Report the following regarding pen registers/trap and trace — • Total number of applications. • Total number of orders granted, modified, or denied. • Total number of emergency authorizations, and total number subsequent orders approving or denying the pen registers/trap and trace.

Procedural Changes Related to Enhanced Congressional Oversight If necessary, OIPR and FBI OGC will publish guidance in response to the new provisions. OIPR will retain responsibility for reporting to Congress on FISA related activities.

FISA PEN REGISTER/TRAP AND TRACE CHANGES

Sec. 128. PATRIOT Section 214; Authority for Disclosure of Additional Information in Connection with Orders for Pen Register and Trap and Trace Authority under FISA.

Congress modified the FISA pen register and trap and trace devices authority to give the FBI access to more information through this authority. The pertinent portion of the new statute describing the information available to the FBI is reproduced here (highlights added):

FISA § 402 [50 U.S.C. § 1842]. Pen registers and trap and trace devices for foreign intelligence and international terrorism investigations.

12

FBI020772 ACLURM020981

.b7E

b 7E

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

(C) shall direct that, upon the request of the applicant, the provider of a wire or electronic service shall disclose to the Federal officer using the pen register or trap and trace device covered by the order —

13

FBI020773 ACLURM020982

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

The chart below summarizes the information available through the new adjustments to the FISA tool.

b7E

The chart below summarizes the Congressional reporting requirements for the use of the FISA pen register and trap and trace authority.

Reporting cycle: Attorney General shall report on a semiannual basis.

Congressional Corrimittees:

• House Permanent Select Committee on Intelligence • House Judiciary Committee • Senate Select Committee on Intelligence . • Senate Judiciary Committee

Reporting categories: Use of pen registers and trap and trace.

Procedural Changes Related to Pen Registers/Trap and Trace: OIPR will retain the reporting responsibilities for the FISA pen register/trap and trace authority.

The FBI will now be able to obtainj b7E with a FISA pen register/trap and trace, without having to couple the request witli a FISA Business Record request. This provision should make this investigative tool more useful to

14

FBI020774 ACLURM020983

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

the FBI. OIPR has already made the changes to its pen register/trap and trace format to take advantage of the new provision.

EMERGENCY DISCLOSURES

Sec. 107 Enhanced Oversight of Good-Faith Emergency Disclosures Under Section 212 of the USA PATRIOT Act.

The emergency disclosure provision, codified at 18 U.S.C. § 2702(b)(8) & (c)(4), provides law enforcement with the ability to gain quick access tc under emergency conditions. The USA PATRIOT Act created the emergency disclosure provision which explicitly permits, but does not require, a service provider I Ito voluntarily disclose to law enforcement information, including in emergencies involving a risk of death or serious physical injury. Such disclosures are outside of the compulsory process — subpoena, court order, and search warrant — that is generally required before law enforcement can obtain such information from a service provider. See, 18 U.S.C. § 2703.

Section 107 makes changes to the emergency disclosure provision of 18 U.S.C. Section 2702, including the requirement for more Congressional reporting, to deal with the concern that this authority was not subject to sufficient Congressional, judicial or public oversight.

Procedural Changes Related to Good-Faith Emergency Disclosures: The Attorney General must now report annually to Congress on the number of accounts subject to disclosure, and the Attorney General must report the basis for the voluntary disclosures in investigations that are closed without filing criminal charges.

The FBI will need to track the use of this investigative authority for reporting purposes. The FBI will publish additional guidance on this issue as necessary.

Voluntary disclosure by provider:

If the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay.

Reporting cycle: Attorney General shall report on an annual basis.

Congressional Committees:

• House Judiciary Committee • Senate Judiciary Committee

Reporting categories: • Number of accounts from which voluntary disclosures were received. • Summary of the basis for disclosure where the investigation was closed without criminal charges.

15

b7E

FBI020775 ACLURM020984

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

NATIONAL SECURITY LETrERS4

Sec. 115. Judicial Review of National Security Letters.

Title 18, Chapter 223 of the United States Code (Witnesses and Evidence) is amended to include a new section 3511 which provides for the judicial review of NSLs.

Procedural Changes Related to the Judicial Review of NSLs: This new section modifies the NSL authorities under the-Electronic Communications Privacy Act (ECPA)(18 U.S.C. § 2709), the Fair Credit Reporting Act (FCRA)(15 U.S.C. § 1681u and 15 U.S.C. § 1681v), and the Right to Financial Privacy Act (RFPA)(12 U.S.C. § 3414), to make it clear that the recipient may seek the help of an attorney, and may challenge the legality of an NSL order and its non-disclosure provision in Federal District Court. A Federal District Court can modify or set aside an NSL if it is unreasonable, oppressive, or otherwise unlawful. It continues to be important for the FBI to serve NSLs only if the information sought falls within the statutory categories, and which are not overly broad or oppressive.

Future practice will give the FBI an idea of how many NSL challenges can be expected in a calendar year. If Federal grand jury practice is any indication, the number of NSLs challenged on a yearly basis should be small. Regardless, the FBI Field Office will need to work with local Assistant United States Attorneys when a recipient challenges the legality of an NSL or the non-disclosure provision. Additionally, FBI Field Offices should immediately notify FBI OGC if they receive notice of any challenge to an NSL or the NSL's nondisclosure provision. The following chart breaks down the new provisions (including jurisdictional issues).

The new law also gives the U.S. government a mechanism to address the situation where a recipient fails to comply with the NSL, which has been missing from the investigative tool in the past. Again, this procedure will require the assistance of a local United States Attorney's Office.

Judicial review of NSL (Recipient may challenge the request):

• Jurisdiction: In the U.S. District in which the recipient resides or does business.

• Recipient may ask court to set aside or modify request.

• Court will grant the recipient's motion if the NSL is unreasonable, oppressive, or otherwise unlawful.

4 The changes listed in this section also include the changes made by sections 4 and 5 of the "USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006."

16

FBI020776 ACLURM020985

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

Judicial review of NSL nondisclosure provision

• Jurisdiction: In the U.S. District in which the recipient resides or does business.

(Recipient may challenge the nondisclosure • Filed within one year of NSL request - provision):

4 Court may modify/set aside the non-disclosure if... "no reason to believe that disclosure may endanger the national security of the U.S., interfere with criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person." • Certification/Authority level: Court will treat as conclusive the certification by the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI that disclosure may endanger the national security of the United States or interfere with diplomatic relations (unless made in bad faith).

• Filed one year or more after the NSL -

• Within 90 days of recipient's petition, designated government officials must either terminate the nondisclosure requirement or recertify that the disclosure "may result in a danger to the national security of the U.S., interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." • Termination/Recertification Authority level: The Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the FBI, or his designee in a position not lower than Deputy Assistant Director at FBI headquarters or a SAC in an FBI field office designated by the Director shall either terminate the nondisclosure requirement or recertify that disclosure "may result in a danger to the national security of the U.S., interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." • Conclusive: Certification by the AG, DAG, an Assistant Attorney General, or the Director of the FBI that disclosure may endanger the national security of the United States or interfere with diplomatic relations shall be treated as conclusive (unless made in bad faith).

17

FBI020777 ACLURM020986

Libraries and 18 U.S.C. § 2709 (telephone toll and transactional records):

A library is not a wire or electronic communications service provider unless the library is providing the services defined in 18 U.S.C. § 2510(15)(electronic communication service).

To: All Divisions From: - Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Failure to Comply: • The Attorney General may invoke the aid of a Federal District Court. • Jurisdiction: U.S. District in which the investigation is carried on, or the person or entity resides or does business or may be found. • Court may compel by ordering personientity to comply. • Failure to obey is punishable by contempt.

Court Proceedings. & Security:

• Court must close hearings to the extent necessary to prevent an unauthorized disclosure of NSL. • Petitions, filings, records, orders, and subpoenas must be kept under seal to the extent and as long as necessary to prevent unauthorized disclosure. • At government's request, ex parte and in camera review of government's submissions which may contain classified material.

Sec. 116. Confidentiality of National Security Letters.

Section 116 makes changes to the National Security Letter authorities contained in the Electronic Communications Privacy Act (ECPA) (18 U.S.C. § 2709), the Right to Financial Privacy Act (RFPA)(12 U.S.C. §3414), and the Fair Credit Reporting Act (FCRA) (15 U.S.C. §§ 1681u and 1681v).

For example, Congress used this section to clarify the application of NSLs [18 U.S.C. § 2709 - telephone toll and transactional records] to libraries. A library is subject to an NSL only if it falls within the definition of a wire or communications provider.

Additionally, this section is used to statutorily establish the NSL nondisclosure requirements and the exceptions to the nondisclosure requirement available to a recipient.

I Si. 'I.: Procedural Changes Related overstepping this authority. the FBI b7E

I If you have any questions regarding the application of this provisions I please direct your questions to FBI OGC NSLB.

The other significant changes to NSLs regarding confidentiality are common to all NSLs used by the FBI. In order to activate the nondisclosure requirement, the NSLs must contain a certification from the Director of the FBI, or a Special Agent in Charge in an FBI field office. This new legislation allows designation of this certification to the SACs in field offices "designated by the Director." This language reflects Congress' intention that the delegation not occur automatically, but that the Director must choose which offices needed, and were properly

18

FBI020778 ACLURM020987

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

prepared to exercise, the delegated authority. The Director has made delegations to FBI Field Offices in a separate communication. Field Offices with delegated authority will receive . instructions on the process of preparing and issuing NSLs (instructions and updated forms will be posted on the FBI OGC National Security Law Branch website). The remaining changes are summarized in the chart below. FBI OGC NSLB will publish additional guidance on this authority as n.....,20.ary.

. Nondisclosure activated by FBI Certification:

• FBI certification: There may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, if a recipient discloses that the FBI has sought or obtained access to information or records under NSL statutes.

• Authority level: Director of the FBI, or his designee in a position not lower than DAD at FBI headquarters, or a Special Agent in Charge in a Bureau field office designated by the Director.

Exceptions - Recipient may disclose NSL request

• Recipient may disclose to persons necessary to comply with NSL request -

• Attorney: Recipient may disclose to an attorney to obtain legal advice or legal assistance regarding any NSL request

Notice: • The NSL shall notify the recipient of the nondisclosure requirement.

• Recipient disclosing NSL to an individual necessary to comply or, to an attorney, shall inform them of the applicable nondisclosure requirement.

FBI request for identity of persons to whom recipient plans to disclose NSL:

• Only activated at the request of the FBI Director or Director's designee.

• Recipient of NSL shall identify the persons to whom disclosure will be made or was made.

• EXCEPT: Nothing requires the person to identify an attorney to whom disclosure was made or will be made to obtain legal advice or legal assistance.

Sec. 117. Violations of Nondisclosure Provisions of National Security Letters.

This section makes it a federal crime for an individual to knowingly and with the intent to obstruct an investigation or judicial proceeding violate the nondisclosure provision of an NSL.

Procedural Changes Related to Violations of National Security Letter Non-disclosure: None at this point.

19

FBI020779 ACLURM020988

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Obstruction of an Investigation (18 U.S.C. § 1510):

• Individual must have been notified of the nondisclosure provision. •

• Individual must knowingly and with the intent to obstruct an investigation or judicial proceeding vic..lete the nondigelocure provision.

• Punishable by up to five years imprisonment, a fine, or both.

Sec. 118. Reports on National Security Letters.

Section 118 of the USA PATRIOT Improvement and Reauthorization Act of 2005 outlines a new reporting scheme for National Security Letters.

Procedural Changes Related to National Security Letter Reporting: This section now requires that NSL statistics be reported to the House and Senate Judiciary Committees, in addition to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence. Additionally, Congress has directed that the NSL requests made pursuant to the 15 U.S.C. § 1681v [Fair Credit Reporting Act] be reported semi-annually to the House Committee on Financial Services and the Senate Committee on Banking, Housing and Urban Affairs, in addition to the House and Senate intelligence committees. These provisions are consistent with Congress' desire for more oversight of the national security investigative tools. Finally, Congress has directed that the Attorney General provide an unclassified report annually (April) which will report the aggregate numbers of NSL requests concerning different U.S. persons. With the unclassified report, Congress intends for the public to have a better view of the material Congress sees in conducting its oversight responsibilities.

The FBI OGC's National Security Law Branch and OIPR will provide future guidance on the FBI's role in the reporting of NSLs.

Current NSL Reports: • AG reports on a semi-annual basis.

• Reports will now also be made to the House Judiciary Committee, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, and the Senate Select Committee on Intelligence.

Enhanced Oversight of 15 U.S.C. § 168Iv NSLs (for credit agency consumer records):

• AG reports on a semi-annual basis. .

• Reports will now also be made to the House Judiciary Committee, the House Committee on Financial Services, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, the Senate Housing and Urban Affairs Committee, and the Senate Select Committee on Intelligence.

FBI020780 ACLURM020989

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1467720-0GC, 04/07/2006

Aggregate Report of NSL requests:

• AG reports annually (April).

• Total number of NSL (excluding NSL's for subscriber information) requests for information concerning different U.S. persons.

• Unclassified report.

Sec. 119. Enhanced Oversight of National Security Letters.

Consistent with Congress' theme of more oversight, Congress has directed that the Inspector General of the Department of Justice shall perform an audit of the effectiveness and use, including any improper or illegal use, of national security letters issued by the Department of Justice.

Procedural Changes Related to the Audit of National Security Letters: This DOJ IG audit of the use of NSLs, which began in January of 2006, will require the cooperation of the FBL Congress' goal in this audit is to obtain detail on the specific functions and characteristics of NSLs and an analysis of the necessity of this national security investigative tool. As with DOJ IG's audit of the FISA Business Record authority, the FBI's Inspection Division will be the primary point of contact for the DOJ IG (per established procedures). The FBI OGC NSLB may issue additional guidance as the audit process continues.

Requirements of DOJ ICI Audit:

Comprehensive audit of -

• Use of NSLs for 2003 through 2006. • Description of noteworthy facts/circumstances, including any improper or illegal use of NSLs.

Timing of Audit: • For 2003 and 2004, must be completed not later than one year after enactment (March 9, 2007). .

• For 2005 and 2006, must be completed not later than December 31, 2007.

Congressional Committees:

• House Judiciary Committee and House Permanent Select Committee on Intelligence. • Senate Judiciary Committee and Senate Select Committee on Intelligence.

21

FBI020781 ACLURM020990

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Examine Effectiveness of NSLs:.

The audit will examine:

• Importance of the information acquired by DOJ to the intelligence activities of DOJ and other members of the IC. • How information is collected, retained, analyzed, and disseminated (including access to raw data) to members of the IC community, and other Federal, State, local or tribal governments, or private sector entities. • How often NSL information was used to produce an analytical intelligence product for distribution to the IC community, and to other Federal, State, local or tribal governments. • Whether, and how often, NSL information was provided to law enforcement authorities for use in criminal investigations. • Following enactment of the USA PATRIOT IRA, the number of NSLs issued without the certification necessary to create a nondisclosure obligation. • Types of electronic communications and transactional information obtained under § 2709, and the procedures DOJ, used if content information is obtained.

Feasibility of •Not later than February 1, 2007, or upon completion of the Minimization Procedures: 2003/2004 audit, the Attorney General and the Director of

National Intelligence shall jointly submit a report on the feasibility of applying rninimi7ation procedures to protect the constitutional rights of U.S. persons.

• Report goes to the House Judiciary Committee, the House Permanent Select Committee on Intelligence, the Senate Judiciary Committee, and the Senate Select Committee on Intelligence.

DELAYED NOTICE SEARCH WARRANTS

Sec. 114. Delayed Notice Search Warrants.

The section changes the procedural requirements for the warrants and increases the oversight of the delayed notice search warrants (18 U.S.C. § 3103a). A major change is the implementation of a 30 day notice requirement, as opposed to the former requirement of "within a reasonable period" of the warrant's execution.

Procedural Changes Related to Delayed Notice Search Warrants: In applicable cases, the FBI (through the U.S. Department of Justice trial attorney or Assistant United States Attorney) must provide the facts to a court to show there is "reasonable cause to believe that providing immediate notification of the execution of the warrant may have an adverse effect." The showing will have to be updated for each extension.

22

FBI020782 ACLURM020991

To: All Divisions From: 'Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Notification Delay No more than 30 days (or a later date certain if facts justify). •undue delay of trial is not a basis for a delayed notice.

Extensions of Delays 90 days (unless the facts justify longer)-- -granted upon an updated showing of the need for further delay.

Reporting Annual reporting to Congress by Court (starting with the fiscal year ending September 30, 2007).

OTHER LAW ENFORCEMENT/CRIMINAL RELATED PROVISIONS

Sec. 104. Section 2332b and the Material Support Sections of Title 18, United States Code.

This section makes permanent the material support of terrorism provisions in section 6603 of the Intelligence Reform and Terrorism Prevent Act of 2004 (18 U.S.C. §§ 2332b and 2339B).

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 110. Attacks Against Railroad Carriers and Mass Transportation Systems.

This section merges wrecking trains (18 U.S.C. § 1992) and attacks on mass transit (18 U.S.C. § 1993) into one section - 18 U.S.C. § 1992. The new law expands the law to cover the planning for such attacks, so it is now a federal crime to surveil, photograph, videotape, diagram, or collect information as part of a plan for an attack.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 111. Forfeiture.

This section expands the authorization to confiscate property located within the United States when it constitutes proceeds used in or derived from trafficking in nuclear, chemical, biological, or radiological weapons technology or material.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 112. Section 2332b(g)(5)(B) Amendments Relating to the Definition of Federal Crime of Terrorism.

This section adds drug trafficking in support of terrorism (21 U.S.C. § 960A) and receiving foreign military-type training from a foreign terrorist organization (18 U.S.C. § 2339D) to the definition of federal crimes of terrorism (18 U.S.C. § 2332b(g)(5)(B)).

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

23

FBI020783 ACLURM020992

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Sec. 113. Amendments to Section 2516(1) of Title 18, United States Code (Title III).

This section adds 20 federal crimes related to terrorism to the list of predicate offenses that may be used as a basis to intercept wire, oral, or electronic communications (18 U.S.C. § 2516(1)). The new wiretap predicates include the following:

• 18 U.S.C. § 37 [violence at international airports] • 18 U.S.C. § 43 [animal enterprise terrorism] • 18 U.S.C. § 81 [arson within special maritime and territorial jurisdiction] • 18 U.S.C. §§ 175, 175b, and 175c [biological agents] • 18 U.S.C. § 832 [nuclear and weapons of mass destruction threats] • 18 U.S.C. § 842 [explosive materials] • 18 U.S.C. § 930 [possession of weapons in Federal facilities] . • 18 U.S.C. § 956 [conspiracy to harm persons or property overseas] • 18 U.S.C. § 1028A [aggravated identity theft] • 18 U.S.C. § 1114 [killing or attempted killing of Federal employees, including any

member of the uniformed services] • 18 U.S.C. §1116 [killing or attempted killing of certain foreign officials, including

internationally protected persons] • 18 U.S.C. § 1992 [attacks on mass transit] • 18 U.S.C. § 2340A [torture] • 18 U.S.C. § 2339 [harboring terrorists] • 18 U.S.C. § 2339D [receiving military-type training from a foreign terrorist

organization] • 18 U.S.C. § 5324 [structuring transactions to evade reporting requirements] • 49 U.S.C. §46504 [assault on a flight crew member with a dangerous weapon] • 49 U.S.C. §46505(b)(3) or (c) [weapons offenses on board an aircraft]

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 122. Prohibition of Narco-Terrorism.

This section makes it a federal crime to engage in drug trafficking to benefit terrorism (amended the Controlled Substance Import and Export Act - 21 U.S.C. §§ 951 et seq.). To prove this crime, the evidence must show that a defendant had knowledge that the person or organization has engaged or is engaging in terrorism.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 123. Interfering with the Operation of an Aircraft.

This section makes it a federal crime to interfere with or disable a pilot or navigation facility operator with the intent to danger or with reckless disregard for human safety (e.g., aiming lasers at pilots) (18 U.S.C. § 32).

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

24

FBI020784 ACLURM020993

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

Sec. 124. Sense of Congress Relating to Lawful Political Activity. .

Congress uses this section to express the sense of Congress that federal investigations should not be based solely upon an American citizen's membership in a non-violent political organization or their otherwise lawful political activity.

Procedural Changes: None at this time. All employees are reminded, however, that neither criminal nor national security investigations of U.S. persons may be predicated solely on the exercise of First Amendment rights.

Sec. 127. Sense of Congress.

Congress uses this section to express its sense that the victims of terrorist attacks should have access to the forfeited assets of terrorists under 18 U.S.C. § 981.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

DATA-MINING ACTIVITIES

Sec. 126. Report on Data-Mining Activities.

This section requires the Attorney General to report to Congress on any Department of Justice (including the FBI) initiative that uses pattern-based data-mining or is developing pattern-based data-mining. Among several topics, the report is to explain how any pattern-based data-mining initiatives collect, review, gather, and analyze information, and how the initiatives will ensure the accuracy of information and protect the privacy and due process rights of individuals.

The statute defines pattern-based data-mining as follows in section 126(b)(1):

(1) Data-Mining.—The term "data-mining" means a query or search or other analysis of one or more electronic databases, where—

(A) at least one of the databases was obtained from or remains under the control of a non-Federal entity, or the information was acquired initially by another department or agency of the Federal Government for purposes other than intelligence or law enforcement

(B) the search does not use personal identifiers of a specific individual or does not utilize inputs that appear on their face to identify or be associated with a specified individual to acquire information; and

(C) a department or agency of the Federal Government is conducting the query or search or other analysis to find a pattern indicating terrorist or other criminal activity.

Procedural Changes:

FBI will participate in preparing the report.

25

FBI020785 ACLURM020994

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

TITLE II - TERRORISM DEATH PENALTY ENHANCEMENT

Among several provisions, this Title adjusts the Sentencing Guidelines to create a term of post-incarceration supervision in connection with a conviction for a federal terrorism crime for any term of years or for life and makes legal counsel available for death-penalty defendants.

Procedural Changes Related to the Terrorism Death Penalty Enhancement: None at this time.

TITLE III - REDUCING CRIME AND TERRORISM AT AMERICA'S SEAPORTS ACT of 2005

This Title strengthens statutes related to seaport and maritime safety. For example, the Title prohibits the maritime transportation of weapons of mass destruction for use in a federal terrorism crime (18 U.S.C. § 2283). Additionally, it prohibits the maritime transportation of , terrorists (18 U.S.C. § 2284). The following highlights some of the new provisions in Title DI.

Sec. 305. Transportation of Dangerous Materials and Terrorists.

This section makes it a federal crime to transport aboard a vessel an explosive, biological agent, chemical weapon, or radioactive or nuclear material with the intent that the material will be used to commit a federal crime of terrorism (as defined in 18 U.S.C. § 2332b(g)(5)(B)).

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 309. Bribery Affecting Port Security.

This section makes it a federal crime to give or take a bribe with the intent to commit international or domestic terrorism affecting port security.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

Sec. 311. Smuggling Goods from the United States.

This creates a new federal crime for illegally smuggling goods from the United States.

Procedural Changes: None at this time. If necessary, additional guidance may be issued in the future.

TITLE W - 'COMBATING TERRORISM FINANCING ACT of 2005.

The U.S. Department of Justice indicated that this Title carries forward the overall strategy to stop terrorist-fmancing by making several adjustments to criminal statutes. It accomplishes this goal by enhancing penalties for terrorism financing and prohibiting terrorism financing through informal money networks, including hawalas. Illegal money laundering transmissions (18 U.S.C. § 1960) are now predicates for racketeering (RICO predicate list at 18 U.S.C. § 1961(1). Terrorism financing (18 U.S.C. § 2339C) and the receipt of foreign military

26

FBI020786 ACLURM020995

To: All Divlsions From: Office of the General Counsel Re: 319X-HQ-A1487720-OGC, 04/07/2006

training (18 U.S.C. § 2339D) are now added to the money laundering predicate offense list (18 U.S.C. § 1956(c)(7)(D)). Finally, the Title authorizes the U.S. to confiscate the U.S. property related to certain acts of international terrorism against a foreign government or international organization (18 U.S.C. § 981(a)(1)(G)).

TITLE V - MISCELLANEOUS.

The Title creates a U.S. Department of Justice National Security Division which will be headed by a statutory Assistant Attorney General.

Sec. 506. Department of Justice Intelligence Matters.

This new section establishes a National Security Division (NSD) within the DOJ, headed by an Assistant Attorney General for National Security (AAGNS). This reorganization of DOJ is consistent with a recommendation by the WMD Commission that the "Department of Justice's primary national security elements - the Office of Intelligence Policy and Review, and the Counterterrorism and Counterespionage sections - should be placed under a new Assistant Attorney General for National Security."

On March 2, 2006, the U.S. Department of Justice stated the following: This reorganization would bring together under one umbrella the attorneys from the Criminal Division's Counterterrorism and Counterespionage Sections and the attorneys from the Office of Intelligence Policy and Review (OIPR), with their specialized expertise in the Foreign Intelligence Surveillance Act and other intelligence matters. The new Assistant Attorney General will thus have all three core national security components under his or her control. He or she will lead a dedicated team acting in concert to accomplish their shared mission of protecting the national security while simultaneously safeguarding Americans' civil liberties. The Assistant Attorney General will also serve as the Department's primary liaison to the new Director of National Intelligence, and the new Division will gather expertise from across the Department to create a focal point for providing advice on the numerous legal and policy issues raised by the Department's national security missions.

Procedural Changes: The new Division will contain the Office of Intelligence Policy and Review, the Counterterrorism Section and the Counterespionage sections. The FBI's working relationships with these components will continue as normal. If the U.S. Department of Justice issues specific guidance at a future date, the guidance will be communicated to the FBI.

TITLE VI - SECRET SERVICE AUTHORIZATION AND TECHNICAL MODIFICATION ACT OF 2005.

The Title confirms that the Secret Service is a distinct entity within the U.S. Department of Homeland Security (DHS). Among several provisions, the Title establishes a "rolling" no trespass zone for individuals under Secret Service protection. It also prohibits fraud in connections with U.S. identification documents issued for a presidentially designated nationally significant event.

Procedural Changes Related to the Secret Service Act: None at this time. If necessary, additional guidance may be issued in the future.

27

FBI020787 ACLURM020996

To: All Divisions From: Office of the General Counsel Re: 319X-HQ-A1487720-0GC, 04/07/2006

TITLE VII - COMBAT METHAMPHETAMINE EPIDEMIC ACT OF ' 2005.

Congress meant to provide a comprehensive approach toward controlling the methamphetamine problem. This Title increases the regulation of domestic and international commercial transactions in mothamplactamine precursor chemical and enhances the criminal sanctions for methamphetanaine related crimes, including the smuggling and selling of methamphetamine. For example, the Title requires sale of products containing ephedrine, pseudoephedrine, and phenylpropanolamine be limited to a 3.6 grams per customer per day, and the products be available only "behind the counter" at sales locations.

Procedural Changes Related to the Combat Methamphetamine Epidemic Act of 2005: None at this time. If necessary, additional guidance may be issued in the future.

Questions and Additional Information: 6

The National Security Law Branch is available to answer questions about b bC

this legislation. In addition, materials relating to the new legislation will be posted on the NSLB FBI Intranet website, which can be found through the FBI Office of General Counsel website.

LEAD(s):

Set Lead 1: (Action)

ALL RECEIVING OFFICES

Read and Clear

.•

28

FBI020788 ACLURM020997

lb 7E

(U) Additional information about 415 policy cambia found on the FBI Intranet at: (SI

JTFF CBT

Page 1 of 1

sTCOTTrtraretw-

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

415 Policy

(U) International Terrorism investigations are classified as 415 investigations. 415 investigations are national security invaaUgadona that auppert. the FBI's priority t' protpct the United States from terrorist attack. This goal drives the Counterterrorism Division's (CTD's) mission to prevent, disrupt, and defeat terrorist operations. The nature of International Terrorism investigations must focus on:

QUIT:: PREVIOUS:: NEXT PAGE: 21 OF 25

.saumasio,Lizosoax

file://DAjttfoV2\modulenm5200.htm 8/8/2011

FBI020789 ACLURM020998

JTFF CBT.

JOINT TERRORISM TASK FORCE (7TTF)

ORIENTATION

bst.tcz177 Nurutum

Introduction To Foreign Intelligence And Terrorism

266 Policy (U) Criminal Domestic Terrorism investigations are classified as 266 investigations. The 266 classification includes any imestigationn cf a criminal act which involves an indlYidual(s) who seeks to further political and/or social goals through activities that involve the use of force or violence and violate federal law. The 266 classification was developed to focus on the specific criminal activity of domestic terrorists. If a criminal violation on the part of a person(s) affiliated with a domestic terrorist group is determined to have occurred, is occurring, or is about to occur, then a criminal investigation should be opened under this classification.

QUIT:: PREVIOUS :: NEXT PAGE: 22 OF 25

szeasaVotseiteas.

.b7 E

file://DAjttfoV2\module5\m5_210.htm

FBI020790 ACLURM020999

JTFF CBT Page 1 of 1

SECItrittirereem-

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

Field Intelligence Group (U) The Field Intelligence Group (FIG) oversees a field office's analytical program. The FIG constitutes a mechanism for providing oversight of int-6111gal= collection, analysis, and dissemination. The FIG provides direction as to collection requirements, analysis that crosses multiple operational squads, and dissemination of Information and analysis.

QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 25

-srenTrtsoresti

file://D:\jttfoV2\module5\m5220.htrn 8/8/2011

FBI020791 ACLURM021000

JTFF CBT

Page 1 of 1

—seelerrttiverem-

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Introduction To Foreign Intelligence And Terrorism

FBI Intelligence Analysts (U) Intelligence analysts provide both strategic and tactical support to investigations. Analysts are charged with identifying intelligence gap:, and dcvdcping strategies for filling those gaps. Analysts can help acienti make connections between their cases and developments within the intelligence community'

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 25

SIMIZSrfritiegeat

file://DAjttfoV21module5\m5_230.htm 8/8/2011

FBI020792 ACLURM021001

b7E

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

LEDdltddattodule5tm5_130.htm — — — — — Flo Edt Van Fowles Tools Help

•$;,. Paved:es ,`,4 RE Intranet . . _

003ffor - - Pas" 51e0 Tod" ft•

4. X FPLI.estDr..,

'4k. tt00% My Ccaptter

6" JIFF cra "1-14w1b; txitia."

afifF CBT- Windows Internet Explorer

FBI020793 ACLURM021002

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg-

JTFF CDT - Windows Internet Explorer b7E

DARRoVEtroodtk5tro5_2:30.httn 4.0 I.1" X 135•7.: ari LP . . .

Re EcR Mew Favccies To Help — - •

t„? Fermatas d, FEE Intranet 431FF CDT -0 - Paps • Sictr., Tees. ca-

b7E -

rt,

9 mr ccarder

tt00% - •

TIFF asT r2;;;12..rigil,

FBI020794

ACLURM021003

r.,:,JTFF CDT - Windows Internet Explorer nag

j 311R3 CDT al • CI t"7 ( - Pap • may • Talc • e•

" Cam:tier 68. goon -

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB/ stp/ 1sg

-,•—•t•••■ 091_,DAltdordinoddoEWL,230.11bn

Ho Ea Mow Rocas' Toob Help

* Favodes I •,,4 iR31Inkranet

b7E

BFF CUT f<::ra'ft.:7 -40 T. •ci

b 7E

FBI020795 ACLURM021004

v1.414 X4.10 vms..et-. MUttforitmodule5bn5,23o.htin

tit • Page. Wet), Tcob • re.

Fib C4 Haw Favortos Toob Hob

*Fawkes 443 CFINIntranet

gt3TFF011

'siagrai.; N4, JIFF air , . it,r4w...rgrpuf, 111D=1111C,

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ otp/ lsg

b7E

tkatComoubs 4's •, *Jam -

r I_

aJTFF CET-Windows Internet Explorer ,

b7E

Ti

be.

FBI020796 ACLURM021005

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

a - 0 0 - Safety -

DARdoMmodule51,m5,130.1Arn

Fie Edit View Pewits Took Help

Fmordes i t, FBI Menet

SJIFF CBT

gPlYtefroder 4 - 4Ftton

b 7 E aJTFF COT • WindowsInternet Explorer

1 b 7 E

3TFF CGT., t.,; '';

FBI020797 ACLURM021006

FBI020798

JTFF CBT Page 1 of 1

Introduction To Foreign Intelligence And Terrorism

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://DAjttfoV21module5\m5_240.htm 8/8/2011

smart/7'VMM'

Module Review (U) The Intelligence Community is a federation of Federal Government agencies, services, bureaus, and other organizations within the executive branch that play a role In the collection end dissemination of national intelligence.

FBI intelligence policy includes:

• AG Guidelines • National Foreign Intelligence Policy • I I • DIOG • 315 Policy • 266 Policy

(U) Intelligence Analysts provide both strategic and tactical support to investigations.

PREVIOUS :: FINISH MODULE PAGE: 25 OF 25

—66G1i6134.44160104-

b E

ACLURM021007

JTFF CBT DECLASSIFIED BY 65179 DM/ stp/ 1sg ON 10-14-2011 Page 1 of 1

r..tatc, tytiereeN

JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance

ORIENTATION

Overview Of Instructional Goals And Objectives (u) Goal: The goal of this module is to introduce the new task force member to the physical surveillance techniques utilized by the FBI In the fight against domestic and International terroriam-

(U) Objectives:

1. Read and review an overview of physical surveillance. 2. Read and review an overview of) 3. Gain a basic understanding of enemy surveillance techniques.

EXIT rODULE :: NEXT PAGE: 1 OF 31

SEMEMICIRMIN

file://D:\jttfoV2\moduleam6_000.htm 8/8/2011

b7E

FBI020799 ACLURM021008

JTFF CBT

Physical Surveillance

--fs36PRALAILIEW2L

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

b7E

FBI020800

file://a\jttfoV2\module6\m6_010.htm

Bureau Surveillance Overview PhjElsaiiurveillance

(U) Physical surveillance is a proactive investigative technique utilized to develop intelligence vital to the detection and prevention of acts of terrorism and espionage, as well as provide evidence needed in the prosecution of parties responsible for criminal activity. Surveillance coverage can be used for the following purposes:

QUIT:: PREVIOUS:: NEXT PAGE: 2 OF 31

• SUUZIf/NVVVUM

ACLURM021009

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

SEE

Physical Surveillance

Bureau Surveillance Overview Physical Surveillance (Con't)

PAGE: 3 OF 31 secgrrh410FJ2LN •

file://DAjttfoV2\module6\m6020.htm

FBI020801 ACLURM021010

JTFF CBT

Page 1 of 1

JOINT TERRORISM

Physical TASK FORCE (inn

Surveillance

ORIENTATION

Bureau Surveillance Overview Surveillance Restrictions

(U) There are to be no surveillances conducted in unless specific authority is obtained from the Assistant Director of the FBIHQ Division responsible for the investigation. Assistant Directge in Charge. SACS. or ASACs. WFO. may anorove on an emeraency basic a surveillance to be conducted in' J with written notification within 24 hours to the Assistant Director of the appropriate FBIHQ Division. If a surveillance is authorized, there are not to be contacts with the individual(s) being surveilled, other law enforcement personnel or other individuals in the area.

1D7E

QUIT:: PREVIOUS NEXT

PAGE: 4 OF 31

SEC an—

file://DAjttfoV2\module6\m6_030.htm 8/8/2011

FBI020802 ACLURM021011

JTFF CBT

Page 1 of 1

stemTvtarnrORN

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Bureau Surveillance Overview

b 7E

QUIT :: PREVIOUS :: NEXT PAGE: 5 OF 31

—3EtErrtfrteremer-

file://DAjttfoV2\module6\m6_040.htm 8/8/2011

FBI020803 ACLURM021012

JTFF CBT

Page 1 of 1 •

MECIterhtteretiff

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Bureau Surveillance Overview

b 7 E

QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 31

—3=1TE1777/13FORR

file://DAjttfoV2\module61m6_060.htm 8/8/2011

FBI020804 ACLURM021013

JTFF CBT

Page 1 of 1

S1031/INUNUEN

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

Bureau Surveillance Overview

:b7E

QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 31

SECRET//NOFORN

file://DAjttfoV2\module6\m6_070.htm

8/8/2011

FBI020805 ACLURM021014

8/8/2011 file://D:\jttfoV2\moduleam6_080.htm

JTFF CBT Page 1 of 1

Physical Surveillance

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

.b7 E

Bureau Surveillance Overview

QUIT :: PREVIOUS :: NEXT

PAGE: 8 OF 31 —szeftermievress.

FBI020806 ACLURM021015

JTFF CBT

Page 1 of 1

LECRZWILONerettN

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Bureau Surveillance Overview

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 9 OF 31

—13Bererf-fRffaill

file://DNttfoV2\module6\m6090.htm 8/8/2011

FBI020807 ACLURM021016

JTFF CBT

ntraff-ftteeePal

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Bureau Surveillance Overview

QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 31

file://DAjttfoV2\mociule6\m6_100.htm

FBI020808

Physical Surveillance

ACLURM021017

FBI020809

Page 1 of 1 JTFF CBT

Physical Surveillance

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

b7E

file://DAjttfoV2\module6Arn6_110.htm 8/8/2011

Bureau Surveillance Overview

QUIT:: PREVIOUS :: NEXT PAGE: 11 OF 31

bZUVSTI/NOFORN

ACLURM021018

JTFF CBT

SECUVAIGEARN

JOINT TERRORISM TASK FORCE (JTTF)

0 RIENTATIO N

Bureau Surveillance Overview

file://DAjttfoV2\module61m6_120.htm

QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 31

-19BeEtWILHINNERMI-

FBI02081 0

Physical Surveillance

ACLURM021019

JTFF CBT

Page 1 of 1

3OINT TERRORISM

Physical TASK FORCE (3TTF)

Surveillance ORIENTATION

Bureau Surveillance Overview

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 31

--EMEIREW-ANOVOiel

file://D:\jttfoV2\module6\m6_130.htm 8/8/2011

FBI020811 ACLURM021020

.1TFF CBT

Page 1 of 1

AmrpRT//NOFORN

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

Bureau Surveillance Overview

lb 7E

QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 31

—00:::termtemaN

file://DAjttfoV2\module6\m6_140.1itm

8/8/2011

FBI02081 2 ACLURM021021

JTFF CBT

-srmr-MtlFORIT JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Bureau Surveillance Overview

Physical Surveillance

QUIT:: PREVIOUS :: NEXT PAGE: 15 OF 31

SE

file://D:\ittioV2\moduleam6150.htm

FBI02081 3 ACLURM021022

JTFF CBT

Page 1 of 1

JOINT TERRORISM TERRORISM Physical TASK FORCE (JTTF) Surveillance

ORIENTATION

Bureau Surveillance Overview

137E

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 31

--smeRLPTHNeumus

file://D:\jttfoV2\module6\m6_160.htm 8/8/2011

FBI02081 4 ACLURM021023

J 11-T CBT

Page 1 of 1

--sagipartmurm

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Bureau Surveillance Overview

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 31

"Eintrrii-AiGEORN

file://DAjttfoV21module6\m6_170.htm 8/8/2011

FBI02081 5 ACLURM021024

JTFF CBT

Page 1 of 1

SsesePHIPaPORN

JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance

ORIENTATION

Bureau Surveillance Overview Survcillancr.LLcris

(U) A surveillance log should be maintained for the purpose of documenting observations made during surveillance. The log is a chronological narrative detailing the observations noted during the surveillance. Prior to initiating the surveillancera team member should be assigned to writing the log. At the end of the shift each individual should initial on the log the notations of the activities he/she observed. Completed logs should be Incorporated into the case file and indexed. Original notes should be permanently retained in a 1A envelope (FD-340a). Logs should be concise and factual. When reporting locations, be as specific as possible. Avoid over-reporting or including unnecessary information since logs are subject to scrutiny in legal proceedings. All surveillance logs should be reviewed for accuracy since inaccuracies could be used by the defense to potentially discredit testimony.

(U) See this note regarding the alternative use of the FD-302.

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 31

-7-7ECitrrrtfraSOSN

file://DAjttfoV2\module6\m6_180.htm 8/8/2011

FBI02081 6 ACLURM021025

OBSERVATIONS TIME INITIALS

FBI02081 7

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

DATE DAY WEATHER CASE #

A Photographic/Physicd1 surveillance W?3=1 conducted in the vicinity of

by the following agents:

During this surveillance, the following observations were noted:

PAGE OF

ACLURM021026

,p '71 .71 it:. X • p leo Cs, DAjttfonlmodule6Wm6_180.htin

Fie Edd View Favorites Toole He

1:1 Favorites j T,4 FBI [rennet

- _ _ ,16 JIFF COT 0 ms pace- Safety • Tods ■

JTFF CDT - Windows Internet Explorer

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

b7E

bquia (U) Some field offices prefer to have the log Incorporated Into a FD-302. The AU Is maiaied i,1 C.,d;:ztleg the purpose of the surveillance, the names of the subjects or targets and any other pertinent activities to be surveilled. Followed by a listing in a chronological order of the times with a short or brief notation of the observation or description of the event. This will be followed by the name of the SA (s) who made the observation. Eventually the 302 is initialed by each member of the surveillance team after each one has reviewed the 302. This is done because the 302 will eventually becomes part of the prosecutive package and it Is also entered into ACS for future reference. Once the 302 Is entered into ACS, there Is an official record of the surveillance results. The original notes are kept in the 1A Envelope as any interview done by the Agent.

is*

My Carcoter

fttozi, ,:c6i0;7; a • qk loos,

FBI02081 8 ACLURM021027

JTFF CBT Page 1 of 1

Physical Surveillance

JOINT TERRORISM TASK FORCE (JTTF) • ORIENTATION

b7E

8/8/2011 file://DAjttfoV2\module6\m6_190.htm

FBI02081 9

S 1.../SCA 1 Mtn

Bureau Surveillance Overview

QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 31

• Bettrth°147070107

ACLURM021028

JTFF CDT - Window, Internet Explorer

tp

dog! DARtkertifood4e606_190.htm

Edd View Fatal:es Took Help

1,:t• Fayostes c:74 Fal Intranet

jgglIFFarr ci - Pew Safety Took ■ Q-

oc 60;

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ lsg

FBI020820 ACLURM021029

.44 Favorites I 4, Liu Intranet ---

J1613TFF CST a • sz tip Papa safety. Tools. 41.),•

MyCoropttar fa .0 Atom

FBI020821

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 EY 65179 DMS/ stp/ Isg

b7E

0_1-FEE CBT- Windows Werner Explorer

v cobttroVArrodiagro6_190.1vso

Fla Ed View Favorkos Tools Help

b7E

• MIFF ,:(11 p-; • 74;12"51"1"1::

4-1- X.

ACLURM021030

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Bureau Surveillance Overview

b 7E

QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 31

SECEESIAMEWORW--

file://D:\jttfoV2\module6\m6220.htm 8/8/2011

JTFF CBT

Page 1 of 1

SEC FORK

FBI020822 ACLURM021031

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 31

—3ELVILPT7'74143VEGGI

file://D:\jttfoV2\module6\m6_230.htm 8/8/2011

JTFF CBT

Page 1 of 1

SHeRBIWiterazer

FBI020823 ACLURM021032

FBI020824

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

• ORIENTATION

Physical Surveillance

b 7E

file://D:\jtifoV2\module6\m6240.htm 8/8/2011

SEETWIYYMPOEN

QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 31

ACLURM021033

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

b7E

QUIT PREVIOUS :: NEXT PAGE: 23 OF 31

-8Befilif#4391;GAN

file://DAjttfoV2\module6\m6_250.htm 8/8/2011

JTFF CBT )

Page 1 of 1

—§ZETEEIMstrropar

FBI020825 ACLURM021034

JTFF CBT

Page 1 of 1

seeme7y,mross

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

Enemy Surveillance Techniques

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 31

SECRET//Nomomi

file://attfoV2\module6\m6_260.htm 8/8/2011

FBI020826 ACLURM021035

JTFF CBT

Page . 1 of 1

—SECTMT7YNAPARN•

JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance ORIENTATION

Enemy Surveillance Techniques

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 25 OF 31

—61MTI-tmesoss

file://D:\jftfoV2\module6\m6_270.htm 8/8/2011

FBI020827 ACLURM021036

JTFF CBT

Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

Physical Surveillance

Enemy Surveillance Techniques

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 26 OF 31

—saeasstfaerelar

file://DAjttfoV2\module6\m6280.htm 8/8/2011

FBI020828 ACLURM021037

JTFF CBT

Page 1 of 1

szewrriPMECIREr

JOINT TERRORISM

Physical TASK FORCE ()TTF)

Surveillance

ORIENTATION

Enemy Surveillance Techniques

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 31

—SECaseHtioNOIN

file://DAjttfoV2\module6Am6_290.htm 8/8/2011

FBI020829 ACLURM021038

JIFF CBT

Page 1 of 1

—SErwrfluepess JOINT TERRORISM

Physical TASK FORCE (JTTF)

Surveillance

ORIENTATION

Enemy Surveillance Techniques

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 31

99€ROVHINK:6141--

file://D:\jttfoV2\module6\m6_300.htm 8/8/2011

FBI020830 ACLURM021039

JTFF CBT

Page 1 of 1

SBOARGOONOVORN

JOINT TERRORISM

Physical TASK FORCE (3TTF)

Surveillance

ORIENTATION

Enemy Surveillance Techniques

.1D7E

QUIT :: PREVIOUS :: NEXT •

PAGE: 29 OF 31 —saannetHwenronm-

file://D:\jttfoV2\module6\m6_310.htm 8/8/2011

FBI020831 ACLURM021040

Page 1 of 1 JTFF CBT

Physical Surveillance

JOINT TERRORISM TASK FORCE (7TTF)

ORIENTATION

Enemy Surveillance Techniques

8/8/2011 file://D:\ittfoV2\module6\m6_320.htm

FBI020832

seemiphimumabt

.b7E

QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 31

-SBESIBESLAIGEORN

ACLURM021041

Page 1 of 1 JTFF CBT

8/8/2011 file://DAjttfoV2\module6\m6_330.htm

FBI020833

-affeaseftwereettr

JOINT TERRORISM Physical TASK FORCE (JTTF) Surveillance

ORIENTATION

Module Review • Physical curve:Hence is a prOaCtlYe investigative technique utilized to develop intelligence vital to the

detection and prevention of acts of terrorism and espionage, as well as prcv:dc evidence. needed in the prosecution of parties responsible for criminal activity.

• b7E

PREVIOUS :: FINISH MODULE PAGE: 31 OF 31

L'Etztes4,0ICCLE2N

ACLURM021042

JTFF CBT DECLASSIFIED BY 65179 DMH/ stp/ 1sg Page 1 of 1 ON 10-14-2011

Met HeiGEGJAN

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

Overview Of Instructional Goals And Objectives ai) Zeal: The goal gf this module is to introduce the new task force member to the investigative techniques that may be used when developing] and/or coiled:1Po information/intelligence and gvidence!

Objectives:

1. Read and review the investigative techniques:

2. Lad and review the policies and procedures of Subpoena, and an Administrative Subpoena.

3. Read and review! 4. Read and review the policies and procedures off 5. Gain a basic understanding of! 6. Read and review the FBI's policies and procedures Tgardingl

7. Gain a basic understanding of who can assist inl 8. Read and review the units that comprise! 9. Gain a basic understanding of how to

10. Read and review!

EXIT MODULE :: NEXT PAGE: 1 OF 37

—Breftrrhlif0908111—

I a Grand Jury

b7E

b7E

file://DAjttfoV2\module71m7_000.htm 8/8/2011

FBI020834 ACLURM021043

JTFF CBT

Page 1 of 1

ralatb 011.1 UISLY

JOINT TERRORISM

Investigative TASK FORCE OTTO

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 2 OF 37

"riERETAMOZON

file://DAjttfoV2\module7\m7_010.htm 8/8/2011

FBI020835 ACLURM021044

-seemehittereittr

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 37

sffelZIMMoseter

file://1):\jttfoV2\module7m7_020.htm 8/8/2011

JTFF CBT

Page 1 of 1

FBI020836 ACLURM021045

JTFF CBT

Page 1 of 1

--szeteBoAisozsm_

QUIT:: PREVIOUS:: NEXT PAGE: 3 OF 37

aLLuNL/fnurvalm

file://DAjttfoV2\module7\m7020.htm 8/8/2011

b7E

FBI020837 ACLURM021046

. 4 tt.*ST Sres ILS; DAit tforZsoodiono7_020.11tso

Q a pa,e• sdely. Tod,. e.

Flo Ea VIM Favortos Tools Help

Lc Favodes I 4 FR Intrestot

0311.F aBT

g FyCanptker 4- Aloft • :TIFF CGT .„ ititserR' lfZ471,0:"‘,C,

ALL INFORMATION CONTAINED . HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH/ stp/ 1sg

JIFF CDT -Windows Internet Explorer

1b7E

FBI020838 ACLURM021047

FBI020839

JTFF CBT Page 1 of 1

Investigative Techniques

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

b7E

file://DAjttfoV2\module71m7_030.htm 8/8/2011

—sremintHiwaalial

QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 37

SECRETI-MOPORN

ACLURM021048

JTFF CBT

Page 1 of 1

1EMZET174064:08g

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS:: NEXT

PAGE: 5 OF 37 streRZTrinoretel

file://D:\jttfoV2\module7\m7_040.htm 8/8/2011

FBI020840 ACLURM021049

)DINT TERRORISM

Investigative TASK FORCE ()TTF)

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 6 OF 37

—SzeRrthitiescas

file://DAjttfoV2\module7\m7_050.htm 8/8/2011

JTFF CBT

Page 1 of 1

SELVETtnI0Feati

FBI020841 ACLURM021050

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Investigative Techniques

b7E

FBI020842

-13961:1B1PhiNGUARIT

QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 37

••666RDWALIMiefai•

file://DAjttfoV21module7\m7_060.htm 8/8/2011

ACLURM021051

b 7 E

C-A,01)

V MyCaroder 4.- title%

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMHY stp/ lsg

b 7 E

• 7TFF.r.61'•7.1., 12.•;'P.M

PC: v'r4r:, X. FDIVItioV2Vaoctie7lra7._050.1131

Flo Edit View Favortes Tools Itip

ys Favorites I g; F1311rtranst

SNIP CU 0 • 0 3 j - Pape. Sdrly • Tads • $.

I i • MEMINION

C JIFF CBT Windows Internet Exptorer nom,

FBI020843 ACLURM021052

JTFF CBT

Page 1 of 1

—SECRIGEORN

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 8 OF 37

—9BeREPIHNOPOrel-

file://D:\jttfoV2\module7\m7_070.htm 8/8/2011

FBI020844 ACLURM021053

QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 37

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Investigative Techniques Techniques

—szczczw,i744Gxesei

b 7E

.file://D:\jttfoV21module7\m7_080.htm 8/8/2011

FBI020845 ACLURM021054

JTFF CBT Page 1 of 1

--grcrtriWiwacaz JOINT TERRORISM Investigative TASK FORCE ()TTF) Techniques

ORIENTATION

QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 37

file://DAjttfoV2\module71m7_090.htm 8/8/2011

FBI020846 ACLURM021055

b7

ITFF CBT Page 1 of 1

--SECKETHifeEIORDI

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Investigative Techniques

QUIT:: PREVIOUS :: NEXT PAGE: 11 OF 37

-szeitesHaoscall

file://DAjt-IfoV2\module7\m7_100.htm 8/8/2011

FBI020847 ACLURM021056

QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 37

JTFF CBT

Page 1 of 1

-seeterrtMerolui

JOINT. TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

—seemefrrnormar

file://attfoVamodule71m7_110.htm 8/8/2011

b7 E

FBI020848 ACLURM021057

JTFF CBT Page 1 of 1

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

b7 E

QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 37

-- •,BeRelPiLHOeigNahl•

file://D:\jttfoV2\module7\m7_130.htm 8/8/2011

FBI020849 ACLURM021058

.1TFT CBT

Page 1 of 1

—SECHETfttieFGRII.

JOINT TERRORISM

Investigative TASK FORCE (3TTF)

Techniques ORIENTATION

'b7 E

(U) Click here to see an example off

QUIT :: PREVIOUS :: NEXT PAGE: 15 OF 37

"SSCREThctiogoim-__

file://D:\jttfoV2\module7\m7_140.htm

8/8/2011

FBI020850 ACLURM021059

TTFF CBT Page 1 of 1

seeivaipiat

JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques

ORIENTATION

(U) Grand Jury Subpoena (U) Grant Jury Subpoenas are issued in criminal matters and obtained from the USA's Office. Service of the Grand Jury. Subpoena is done either by the case Agent, ahother law enftitcernent officer or an Investigative Analyst. Document the serving of the Grand Jury Subpoena and the results of serving the subpoena on the same communication - for example, a FD 302 andLor an EC.I b7E

(U) If utilizing Grand Jury Subpoenas, do not! b7E . The Case. Agent may share the results of a Grand Jury Subpoena only with individuals who are on the 6(e) list with the case. To get on the 6(e) list, the Case Agent contacts the AUSA assigned to the case.

(U) While conducting an investigation, once an indictment has been returned, Grand Jury Subpoenas can no longer be used.

(U) Reminder: The use of certain investigative techniques may require disclosure to the subject, such as

Law Branch Federal Grand JurySrooenas. Investigators should consider and consult with thi USA's Office, National Security and/or Chief Division Counsel, and the substantive unit in the Counterterrorism Division regarding these potential disclosure requirements when selecting an investigative technique.

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 37

—0ECREMAMBEORN

file://DAjttfoV2\module71m7_150.htm 8/8/2011

FBI020851 ACLURM021060

JTFF CBT

Page 1 of 1

—StlI2LKWHOPEAUT

JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques

ORIENTATION

(U) Administrative Subpoena (U) Administrative Subpoenas (FD-617) are used only in criminal investigations involving violations of the Controlled Substances Act (Title 21), Health Cera Fraud, and Child Pornography.

(U) Restraint should be exercised in the use of the Administrative Subpoena, as it is not al Primary use of the Administrative Subooena will be

(U) The Administrative Subpoena is printed in two copies, original and attested copy. The original with executed return of service will be kept in the case file. The attested copy should be served to the person named on the subpoena. A copy of the Administrative Subpoena is 'electronically" placed in the respective division subfiles. The Program Supervisory Special Agent or the ASAC signs Administrative Subpoenas.

(U) A FD-302 should be prepared on the service and results of the Administrative Subpoena. An Investigative Analyst (IA) can prepare and serve the Administrative Subpoena when provided with the appropriate information from the Case Agent. Further, the IA will prepare a FD-302 on the results on the Administrative Subpoena.

QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 37

SECREIHROPORN

file://DAjttfoV2\module71m7_160.htm 8/8/2011

b7E

FBI020852 ACLURM021061

JTFF CBT

Page 1 of 1

MR611.'4140E0=

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

(U) Administrative Subpoena (Cont)'

(U) Information acquired as a result of an Administrative Subpoena is not 6(e) material. Like Grand Airy subpoenas, once an indictment is returned, Administrative Subpoenas can no longer be used to acquire records. Trial subpoenas or court orders remain the only options post Indictment. Authority to compel attendance and testimony of witnesses, and require records production relevant to controlled substance investigations may be granted by the SSRA, OC/DP SSA, or ASAC.

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 37

file://DAjttfoV21module7\m7_170.htm 8/8/2011

FBI020853 ACLURM021062

JTFF CBT

Page 1 of 1

LA.& x/ biuruittv

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 37

--SECTerrHNOVefill

file://DAjttfoV2\module7\m7_180.htm 8/8/2011

FBI020854 ACLURM021063

CBT Page 1 of 1

SEeRRTNNOPOIDI

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

file://DAjttfoV2\module7\n7_190.htm 8/8/2011

FBI020855

QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 37

ACLURM021064

b 7E

gJTFF CBT Windows Internet Explorer

.71011/111111111111111111Mil YMN

Mr Cormier fa - Alm

FBI020856

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stp/ lsg

v FE. rottlforapoduleAre_190.atm

Fie Edit View Favortes Tools Hdp

*Pavates I 1;o FBI gitianet

ii43TFF CDT

L

-0 Page • Sdety • Toole • 0. " (t11) Eacample

t. T7j

b7 E

3TFF WI., • )7 ' ,

X

ACLURM021065

JTFF CBT Page 1 of 1

Investigative Techniques

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

.1D7E

8/8/2011

FBI020857

file://DAjttfoV2\module71m7200.htm

-1366Pailili-PECZOML

QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 37

tzetesehitievem

ACLURM021066

Page 1 of 1 JTFF CBT

Investigative Techniques

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

b7E

file://DAjttroVamodule7\m7_210.htm 8/8/2011

FBI020858

seeterri-/MonT

QUIT :: PREVIOUS :: NEXT PAGE 22 OF 37

szeturrfittereftif

ACLURM021067

p JTFF CBT - %yin(lows Internet Explorer

64,70° 0[7:71tfor4mockieno),,210.bee

No Extt View Fevortes Tads Help

FBI020859

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMIL/ stp/ 1sg

* Favorites I'7;4 1L FBI totienot _ j ORM ® r r

- Q 0 6 - Peas • Sidi • To* ■ 0 •

b7E

.12 Hy Carlotta

(....1TFF • Vi

fa - Ion •

b7E

ACLURM021068

.TTFF CBT

Page 1 of 1

szerarryymeeem

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques

ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 37

szcrarrtenterem-

file://DAjttfoV2\module7\m7_220.htm 8/8/2011

FBI020860 ACLURM021069

t ‘ ; DAlttfoVnmoddennT,220.htro

Fie EA Hew Fowles To Fklp

*Fawkes V,13 CRilltnlronet

*NIT or

La.s S•re.1

0 • 0 • Paps. Safety. Tools

g ltiCarouter • (ra • tICOS4 -

FBI020861

0-1TFF CBT -rindows Internet Explorer

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stp/ 1sg

b7E

b7E

ACLURM021070

JTFF CBT

Page 1 of 1

seenterfryitgerette

JOINT TERRORISM

Investigative TASK FORCE (3TTF)

Techniques 0 RI ENTATIO N

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 37

file://D:\jttfoV2\module7\m7_230.htm 8/8/2011

FBI020862 ACLURM021071

JTFF CBT

Page 1 of 1

—SLITICEOSORIL

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques

ORIENTATION

1137E

QUIT :: PREVIOUS :: NEXT

PAGE: 25 OF 37 –SECRETI-tiffireati

file://DAjttfoV21module7\m7_240.htm 8/8/2011

FBI020863 ACLURM021072

JTFF CBT Page 1 of 1

Investigative Techniques

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

.b7E

(U)

(U)

file://DNitfoV2\module7m7_250.htm 8/8/2011

FBI020864

(See Note)

QUIT :: PREVIOUS :: NEXT PAGE: 26 OF 37

—seeRETtttrortmer

ACLURM021073

.TTFF CBT Page 1 of 1

file://D:\jttfoV2\module7\m7260.htm 8/8/2011

FBI020865

-szaRrrtmerrefef

JOINT TERRORISM Investigative TASK FORCE (JTTF) Techniques

ORIENTATION

QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 37

ACLURM021074

JTFF CBT Page 1 of 1

file://DAjttfoV21module7\m7_270.htm 8/8/2011

FBI020866

—szeRRTHeeizawq

JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques

ORIENTATION

QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 37

ACLURM021075

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-16-2011 BY 65179 Diel/ stp/ 1sg

r

• Q Q t - Pace.. Safety. Tods• *

(g_Mteceetaimileno.pahtm Edt Vlon Pavortas Torts Hob

rowdies I PDt /*and .

JIFF 03T

JTEr EDT• Windows Internet Explorer

b 7 E

pt, Corata eg • ! ft,100% •

*.let riff fk.Z2).2A, I At v,;

FBI020867 ACLURM021076

C JTFF COT - Windows Internet Explorer

ksv v Et, IntifeArArrcctier,ratrtahtat

FTe Edt Men Fawkes loots Help

*SyncIto y3 tj FBI Lima

faJIR.CEIT - 0 (92 - pap - Safety Teals "

x: rprve 5:414

WrirZilaMZET21 4 loon -

b7E

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-18-2011 BY 65179 DMH/ stpJ lsg

FBI020868 ACLURM021077

JIFF CBT

Page 1 of 1

teeRBESYNGFAA11-

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

(U)

CU)

CU)

b 7 E

QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 37

—sHeassAmosolaa-

file://DAjttfoV2\module7Nre 280.htm 8/8/2011

FBI020869 ACLURM021078

9 Ft/CoXttef - ea •- Al0f01.

. ra ■ :2,5 3 .$1411azgh;:, "GROASW,

FBI020870

DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-21-2011

a_ITFE CETI -IlintiowE Internet Explorer

ogvz ,41, e DeLlttfoVAroodrie7ya7,/801bn

Fib Frit New Favorites Tack Help

*Revokes 1.7,4 .t,FetInbarost

gi3IFF CBT

ID) r X

(11) -- X

-- -- x

CU)

b7E

.V•

Par. Safety. Teak.

ACLURM021079

JTFF CBT

Page 1 of 1

szaaaityyrtoraraT

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques ORIENTATION

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 37

394:0464114410.1=1

file://D:\jttfoV2\module7\m7 290.htm 8/8/2011

FBI020871 ACLURM021080

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Investigative Techniques Techniques

.b 7E

QUIT :: PREVIOUS :: NEXT PAGE: 31 OF 37

WeRviikANGEOEIL

file://D:\jttfoV2\module7km7__300.htm 8/8/2011

FBI020872 ACLURM021081

of 1 Page 1 JTFF CBT

b7 E

FBI020873

sECP"P4(.1"181347

QUIT :: PREVIOUS :: NEXT PAGE: 32 OF 37

F) TATION

JOINT TERRORISM TASK FORCE (3TT

ORIE

Investigative Techniques

—SECRLATHOGEOIN

file://D:\jttfoV2\module7\m7_310.htm 8/8/2011

ACLURM021082

JOINT TERRORISM

Investigative TASK FORCE (3TTF)

Techniques ORIENTATION

(U) Analysis (U) Intelligence Analyst and Financial Anclyzts are available to review and analyze:

QUIT :: PREVIOUS :: NEXT PAGE: 33 OF 37

bck.itz.i.//rtun

••■

, file://DAjttfoV2\module7Vn7_320.htm 8/8/2011

(U) An EC must be prepared setting a lead for their assistance.

.1)7E

JTFF CBT • Page 1 of .1

—t3BEFIE1674/1080IiN

FBI020874 ACLURM021083

-szeiteehtilesons

JOINT TERRORISM

Investigative TASK FORCE (3TTF)

Techniques ORIENTATION

(U)

(U)

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 34 OF 37

SEMBISLAMEaRN

file://D:\ittfoV2\module7\m7_330.htm 8/8/2011

JTFF CBT

Page 1 of 1

FBI020875 ACLURM021084

int • cl • Page • Sehty • Teak. (O.

JTFF CDT • ylindows Internet Explorer

fgv73v OMW0AWOJenra_MOJIM

He &It %Sim Famdas Mob Firdp

Feriontes la FM Wand

MP CST

4. twos - - Iticaaxter

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED • DATE 10-21-2011 BY 65179 DMH/ stp/ 1sg

b7E

=linrirfc rrItIral acnartc of tarrnrIcrn InvactInal-lva offortc In rwran1- and future mainr COAI".

Pei

taSPq

11 47) 4.1q.

FBI020876 ACLURM021085

FBI020877

lAttfoVArnock1enm7330.1tss

Re EcEt View Favorlbss Tools He

FsroxItes 1;4 FBI Intranet

I TEM OBI -at - - Paps Safety. 'Ws. 4), "

4.• x LS4.1

•ea - 41,100% • V Pt/Computer

b 7 E

DECLASSIFIED BY 65179 DMH/ stpj 1sg ON 10-25-2011

milminmenimmemiemmurgr- niM aJTFF CDT - Slindows Iniernet Cxploter

Vi 1.2t)PVI

ACLURM021086

L__

*4g/wean tet ky FBI Intranet — - _ _

u WITFF CBT a • 0 C3 a - 5efety• Toals ■

bl

g WO:crater - %gm -

Intc 0. )TFE -414.65.47 . CiblaN1...• ofteA;n.tT

.b7E

a.ITFF CDT • 1,!/inclows Internet Explorer

rit; 0:HUrolarada7a17_,330.11tm

Fie Exit View Favorites • Tads Help

x1557Welem

O

'Namara.

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

DATE: 10-21-2011 CLASSIFIED BY 65179 D1111/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-21-2036

FBI020878 ACLURM021087

v i'41•!. X OID:WfolatroWliena_Xtelltm pt:.y,

03rFF cer - Page • safety- Togs "

'4 14Y Ccoixter 4 - ',tom •

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-21-2011 BY 65179 DNB/ stp/ Isg

C JTFr CBT Vinthws Internet rxitIerer

Fie Ea View Favertes Togs Hie *Favorites I e.',4 FBI irviame

. . . ( TIFF CET— DIW...iintfe; • gte o :1,26 Prt

b7E

b7E

FBI020879 ACLURM021088

• JTFF CBT

Page 1 of 1

IrrarrhgttePAMT

JOINT TERRORISM

Investigative TASK FORCE (JTTF)

Techniques

ORIENTATION

b7 E

QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 37

file://DAjttfoV2\module7\m7340.htm 8/8/2011

FBI020880 ACLURM021089

-seesrrilsoross

JOINT TERRORISM Investigative TASK FORCE (3TTF) Techniques

ORIENTATION

Undercover Activities And Operations (U) An undercover activity is any investigative acUvity invciving the use of an assumed name or cover identity.

CID

(1.3) ----- (See Note)

QUIT :: PREVIOUS :: NEXT

PAGE: 36 OF 37 SECItri`f7gtfereSn-

ai)

b7E

file://DAjttfoV2\module7\rn7350.htm. 8/8/2011

JTFF CBT

Page 1 of 1

FBI020881 ACLURM021090

Lt, outforzwahava_350,win - no Ecit Hew Favortes Tools He

FBI020882

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-21-2011 BY 65179 DMH/ stp/ Isg

per.

(4. JIFF CDT - L'findows Internet Explorer

*Favorites I. Fit/wan -

: 511, CBT

Pi- (U) Crimp X UCO @XF■sl'• A -13 me- Pace • sziety • Tads *

b7E

b7E

E4=1105. HYCanlx_Iter 4 • AID"

b6 1:!1

b7C

ACLURM021091

b7E

Cg 131C„9 1.11: MitroViVrake7pn7_150.htm

Fie Edt l%cw Rendes To* Heb

*Riyadh,' I 4 FEIIIrtranet

Avrw. 61,- - Page Safety Tools • re•

4t. X EQtt rse f.

DECLASSIFIED BY 65179 DMHI stp/ 1sg ON 10-21-2011

b7E

d My Comder - %son - 2

FBI020883

aJIFF CUT - Windows Internet Explorer

(U)

(U)

Croup U UCO

ACLURM021092

°';4t'' X FP L5ei

• Pao- Mgr,' Ws. • 0 C3

MY Compass "01174 •

DECLASSIFIED BY 65179 DMH/ stp/ lsg ON 10-21-2011

CJTFF CBT-Sciindeva Internet Explorer

Wt& ° DittlinV2IiriodieAre7_350.11On

—Fie Erit Mew FeY1A03 Tads Help

*Favorites I '14 ei Milano& . — - -

b7E

b7E

FBI020884 ACLURM021093

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE OTTO

ORIENTATION

Investigative Techniques

b7E

_sEcaBefittifOrtn

(1.17 Module Review . I !are investigative

techniques used the FB information/intelligence and evidence

▪ peci is po icies an proce ures must be used when obtaining and using Grand Jury Subpoenas. and Adminis ative Subpoenas.

are investigative techniques used tol . specific policies and procedures mu be adhered to when using!

. Specific policies and procedures must be adhered to when!

1(U) Intelligence Analysts and Financial Analysts are available!

. Specific policies and orocedures must be used when obtaininci

PREVIOUS :: FINISH MODULE •

PAGE: 37 OF 37 SECF&WILANWEBBI--

file://DAjttfoV2\tnodule7\m7_360.htm 8/8/2011

FBI020885 ACLURM021094

T1IT CBT ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

JOINT TERRORISM TASK FORCE (JTTF)

0 RI ENTATION

DATE: 10-21-2011 CLASSIFIED BY 65179 DMH/ stpi lsg Page 1 ofl REASON: 1.4 (c) DECLASSIFY ON: 10-21-2036

T//NOFORN

Asset/Source Recruitment And Management

(U) Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to introduce the new task force member to the asset/source recruitment and management policies and procedures employed by the FBI in the fight against domestic and international terrorism.

Objectives:

1. Read and review an overview of International Terrorism Interviewing. 2. Read and review the type of information that should be obtained during a 415 interview. 3. Gain a basic understanding of the policies and procedures of source development and tasking. 4. Gain a basic understanding of asset administration. 5. Gain a basic understanding off

b7E

EXIT MODULE :: NEXT

PAGE: 1 OF 38

file://D:\jttfoV2\module8\m8_000.htm 8/8/2011

FBI020886 ACLURM021095

JTFF CBT Page 1 of 1

Asset/Source Recruitment And Management

.."51aCV/NOPORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

(ID X

15m4(/Nopogs PAGE: 2 OF 38

FBI020887

Overview Of International Terrorism (IT) Interviewing (NFIPM Section 19-03, Part N)

There are many instances when the Bureau receives information about an individual that neither relates to a threat to national security nor alleges clear criminal conduct.

QUIT :: PREVIOUS NEXT

file://DAjttioV2lmodule8\m8_010.htm 8/8/2011

CU)

(U)

b7E

b7E

ACLURM021096

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

JTFF CBT

(U) Overview Of International Terrorism (IT) Interviewing

QUIT :: PREVIOUS:: NEXT PAGE: 3 OF 38

file://attfoV2\module8\m8_020.htm

FBI020888 ACLURM021097

JTFF CBT Page 1 of 1

FBI020889

0<//NOFORN

) Overview Of International Terrorism (IT) Interviewing CTD Approval Authority

13.7E

(S) (U1

----------------

(U)

bl b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 4 OF 38 jtbsaRt//Nosoler

file://DAjttfoV2\module8\rn8030.htm 8/8/2011

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

ACLURM021098

Page 1 of 1 JTFF CBT

Asset/Source Recruitment And Management

jOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI020890

Ti/NOFORN

(u) ><Overview Of International Terrorism (IT) Interviewing

CTD Approval Authority (Con't1

(U) b7E

CU)

QUIT PREVIOUS :: NEXT PAGE: 5 OF 38

1></NOFORN

file://DAjttfoV2\module8\m8_040.htm 8/8/2011

ACLURM021099

JTFF CBT Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

Overview Of International Terrorism (IT) Interviewing

QUIT:: PREVIOUS:: NEXT PAGE: 6 OF 38 .

>NO/ /NOFORN

file://DAjttfoV2\module81m8_050.htm 8/8/2011

FBI020891 ACLURM021100

FBI020892

Page 1 of 1 JTFF CBT

Asset/Source Recruitment And Management

/NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

b7E

174//NOPORN PAGE: 7 OF 38

file://DAjttfoV2\module8Vn8_060.htm 8/8/2011

(U) Interview Guide For 415 Cases

QUIT :: PREVIOUS:: NEXT

ACLURM021101

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

(U) Interview Guide For 415 Cases (Con't)

. obtain knowledge of any suspicious individuals, to include those who are:

b7 E

. Obtain knowledge ofl

. Obtain knowledge of anyone Involved in the planning of attacks against the U.S.

QUIT :: PREVIOUS :: NEXT

PAGE: 8 OF 38 31:41114/1NOFORN

file://DAjttfoV2\module8\m8_070.htm 8/8/2011

FBI020893 ACLURM021102

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

(U) Source Development And Tasking

:b 7E

JTFF CBT

Page 1 of 1

//xo•oxx

QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 38

file://DAjttioV2\module81m8_080.htm 8/8/2011

FBI020894 ACLURM021103

JTFF CBT Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Source Development And Tasking

Asset/Source Recruitment And Management

s) bl b7E

QUIT :: PREVIOUS :: NEXT PAGE: 10 OF 38

40R4/ /NOFORN

file://attfoV2\module8\m8_090.htm 8/8/2011

FBI020895 ACLURM021104

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 13g REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036

)rrF c... MY Coaster

'ki°116 b 6 b 7 C cl,016:47" Oa; eteriir

CI JIFF CUT- Windows Internet Explorer

lb 7E

---------

Safety Tools . tv. fl c is; Page.

DAy7oV21facetieSlatl_090.htfa

Fte Edt Vim Favatas bas tieb * Raman t F1311ntranot

• ATIFFON

.

fv.

v: i4t , )(

b1

FBI020896 ACLURM021105

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE "SHOWN OTHERWISE

DATE: 10-27-2011 CLASSIFIED BY 65179 DNB/ stp/ lsg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036

b7E

v j muttrevztmeileavne_ogoilem fib Edt Vow Favartes Tads ride

*Favaites C, FBI Intranet

203IFPCEIT

(S) b1

E3 CI - pop • sem,— Ica' • eft. "

b6 b7C

FBI020897

,V■

41,

I'm( I

Tr JIFF COT - Windows Internet Explorer

ACLURM021106

JTFF COT - Windows Internet Explorer

R1 ) a

g

DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN. OTHERWISE

43. x P

- 0 - Paw, Safety 'fools C S)

DAIttioMnodde8Urd_090-hlra Fie Edt Yew Favortes Tool; Hdp *Favorites 1 .4 R3I Intranet

1VSJWFOIT x x

eZ1r5;:',;;',-",i10. • ••.:, t pr?

FBI020898

1.21fflitt.; 7o v

ACLURM021107

age • Safely, Tools • 40• 311Tait

41

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-25-2036

JTFF CDT - rindows. fnlerriet Explorer

g$ DA.W0T24nockiefkno_090.hbo xi ,P'-; p Edt View Favortes Tools Help

*Favarlos FBI ami&

j11221111MtaadW*; OM*g5;: MY Cargter aA; Am% -

h i

.b 7E

FBI020899 ACLURM021108

FBI020900

r--

b7E

b7E ridercever Agent

6-74 v Fie Erlt Hen Fayortes To* Me

Fayertes ;;;;; gi Fig !Amid

_031FECErt

Pr

SIXICareato Pa- tiom -

Nai7;;4i

DECLASSIFIED BY 65179 DMH/ stp/ 1sg ON 10-21-2011

T1I' CBT Windows Internet Explorer

CU)

":1,4t, X' IP ttry5:721

a • 0 ^J - Page. Safety • T006. da•

IT1 Agzr.t. :r tr:cr c2:22:!tyl

lr

ACLURM021109

b7E

JTFF CBT

Page .1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

Source Developing And Tasking

QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 38

9,116//NOFORN

file://D:\jttfoV2\module8\m8_100.htm 8/8/2011

FBI020901 ACLURM021110

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

JTFF CBT

Page 1 of 1

T//NOFORN •

(U)

Source Development And Tasking Obtainina Ynfermatinn

.b 1

QUIT :: PREVIOUS :: NEXT PAGE: 12 OF 38

1,16//NOFORN

file://DAjttfoV2\module8\m8_110.htm 8/8/2011

F B1020902 ACLURM021111

JTFF CBT Page 1 of 1

gr)

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Administration A royal to Operate p

FBI020903

//mom=

.b7E (U)

QUIT :: PREVIOUS :: NEXT PAGE: 13 OF 38

jPZ!/ /NOFORN

file://DAjttfol/2\module81m8_120.htm 8/8/2011

ACLURM021112

JTFF CBT Page 1 of 1

CU)

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Administration Notification of Approval

CU)

CU)

CM

CU)

After approval of an asset: b 7E

PAGE: 14 OF 38

//NOFORN

QUIT :: PREVIOUS :: NEXT

file://D:\jttfoV2\module8\m8140.htm 8/8/2011

F B1020904 ACLURM021113

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 16-i--2036

:Pt-1 [8 MtittforAmaddeeVoLVIO.htro

Fie Eat View Females rook He

Eh- Q m- - Page Safely.- Tools • (0 "

* rewrites V.: FBI Intranet

311F• CBT

b7E,

bl

Pt/Carobs 411-: 4L 103% •

P

a et

0:JTIF CBT • Windows Internet Explorer

FBI020905 ACLURM021114

(S)

file://D:\jttfoV2\module8\m8_150.htm

JTFF CBT

,...§)bc(f//NOFORN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

(U) Administration

Opening Assets

(U)

requires the following: ust be completed prior to opening the source.

(U) lAZ/NF) Visit thel

PAGE: 15 OF 38

for more detaili:

FBI020906 ACLURM021115

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

Administration CU)

(5) b 1

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 38

!Pg(TI/NOFORN

file://D:\jttfoV2\module8\m8_160.htm

8/9/2011

FBI020907 ACLURM021116

Refer to thel

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

(U)

1,11 //NOIFORN PAGE: 17 OF 38

) Administration Special Approval Requirements are needed to open and operate the following types of sources:

b7E

.file://DAjttfoV2\module81m8_170.htm

JTFF CBT

'For more details:

qpN(E//NOTORN

FBI020908 ACLURM021117

CU) Administration

C S )

JTFF CBT

Page 1 of 1

//mFoRN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

b1

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 38

file://DAjttfoV2\module8\m8_180.htrn

8/9/2011

F B1020909 ACLURM021118

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

JTFF CBT

Page 1 of 1

//NOFORN

(U) Administration

C U) .b7E

QUIT:: PREVIOUS:: NEXT PAGE: 19 OF 38

T//NOFORN

file://DAjttfoV21module8\m8_190.htm

8/9/2011

FBI02091 0 ACLURM021119

Page 1 of 1 JTFF CBT

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

RD Administration

bl b7E

i4T//NOFORN PAGE: 20 OF 38

FBI020911

T//NOFORN

QUIT :: PREVIOUS :: NEXT

file://DAjttfoV2\module8\m8200.htin 8/9/2011

ACLURM021120

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

JTFF CBT

Page 1 of.1

ET//NOFORN

(U) Administration

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 21 OF 38

)04//NOFORN

file://D:\jttfoV2\module8\m8210.htm 8/9/2011

FBI02091 2 ACLURM021121

*rewrites I CFR Intranet

Re Edt 16ew raved:es Toots Help •

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

%. fn. oNuia-4.4.kAne_vo.ht.

Er) DATE: 10-26-2011 CLASSIFIED BY 65179 DMH/ sCp/ 1ogg REASON: 1.4 (c) DECLASSIFY ON: 10-26-2036

n 47 :X,Leth,f17-sn

0 • (131 - Peer, Sat*. Tools. ra.

IceektoMmanteeleesterel

FBI02091 3

ant) 02ITFF CLIT-Vlindows Internet Explorer

ACLURM021122

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOUN OTHERUISE

DATE: 10-26-2011 CLASSIFIED BY 65179 DMH/ otp/ log REASON: 1.4 (c) DECLASSIFY ON: 10-26-2036

'P:-

papa- SAO. To*. 0.

qe DAlttherAmorkieetwe_ZIO.htm

Flo Cdt *VI Fovorkes Tech Het,

*Favorites .674 tint Intranet

JIFF CEIT

Aim 'Y *compd. Wk.) ET,, A4 9 ou AM

JTFF Cl3T - %/linilows Internet Explorer

b1

lb 7E

FBI02091 4 ACLURM021123

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

(U) Administration

b1

QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 38

file://DAjttfoV21module8\m8220.htm

8/9/2011

FBI02091 5 ACLURM021124

JTFF CBT Page 1 of 1

//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

(U) Ariminictratinn

QUIT :: PREVIOUS :: NEXT PAGE: 23 OF 38

E m//NOFORN

file://DAjttfoV21module81m8_230.htm 8/9/2011

FBI02091 6 ACLURM021125

• JTFF CBT Page 1 of 1

Asset/Source Recruitment And Management

T//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

33941/NOFORN PAGE: 24 OF 38

file://DAjt-tfoV2\module81m8240.htm 8/9/2011

FBI02091 7

Administration CU)

lb 1

QUIT :: PREVIOUS :: NEXT

ACLURM021126

Administration (U)

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (JTFF)

ORIENTATION

.1o1 b7E

Asset/Source Recruitment And Management

QUIT :: PREVIOUS :: NEXT

PAGE: 25 OF 38 ,IN14//NOFORN

file://D:\jttfoV2\module8\m8_250.htm 8/9/2011

FBI02091 8 ACLURM021127

JTFF CBT Page 1 of 1

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

For the latest information on human source validation. check with thel

I b7E

Administration Evaluation EC

FBI02091 9

QUIT :: PREVIOUS :: NEXT

PAGE: 26 OF 38 T//NOFORN

file://DAjttfoV21module8\m8260.htin 8/9/2011

ACLURM021128

JTFF CBT Page 1 of 1

(U) Administration

b1

(S)

>ilk/imports PAGE: 27 OF 38

T//NOFORN

QUIT :: PREVIOUS :: NEXT

file://D:\jttfoV2\module8\m8_270.htm 8/9/2011

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

FBI020920 ACLURM021129

JTFF CBT Page 1 of 1

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Administration

(S)

74//NOVORN PAGE: 28 OF 38

8/9/2011 file://D:\jttfoV2\module8\m8_280.htm

SE Ti/NOFORN

QUIT :: PREVIOUS :: NEXT

b1

CU)

FBI020921 ACLURM021130

JTFF CBT DECLASSIFIED BY 65179 DIM/ stp/ lsg ON 10-27-2011

Page 1 of 1

4/NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

(IT) Administration Payments

(LT)

QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 38

SE T//NOFORN

8/9/2011

F B1020922 ACLURM021131

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

Administration Disclosure

bl

QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 38

j it //NOrORN

tile://DAjttfoV2\module81m8_300.htm

8/9/2011

FBI020923 ACLURM021132

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

i*I/NOFORN

Asset/Source Recruitment And Management

(U) Administration JTTF

11)7E

QUIT :: PREVIOUS :: NEXT PAGE: 31 OF 38

>1*/NOFORN

file://DAjttfoV2\module8\rn8_310.htm 8/9/2011

F B1020924 ACLURM021133

1 Atiminictratinn

JTFF CBT

Page 1 of 1

SE T//NOFORN

(U)

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION N

Asset/Source Recruitment And Management

QUIT :: PREVIOUS :: NEXT PAGE: 32 OF 38

S):0M0//NOFOEN

file://D:\jttfoV2\module8\m8_320.htm

8/9/2011

FBI020925 ACLURM021134

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Asset/Source Recruitment And Management

JTFF CBT

Page 1 of 1

EET/

Administration

QUIT :: PREVIOUS :: NEXT PAGE: 33 OF 38

›likS//NOFORN

file://DAjttfoV2\module8\m8_330.htm 8/9/2011

FBI020926 ACLURM021135

Administration (U)

CS

lb 1

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Asset/Source Recruitment And Management

QUIT :: PREVIOUS :: NEXT

PAGE: 34 OF 38 ...44511114T//NOFORN

file://D:\ji-tfoV2\module8\m8_340.htm 8/9/2011

FBI020927 ACLURM021136

JTFF CBT Page 1 of 1

Asset/Source Recruitment And Management

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

SUM Administration

b7E

8/9/2011 file://DAjttfoV2\module8\m8_350.htm

FBI020928

T//NOFORN

Assets andl

0 If voitsuspect that a subject may have connections or associates with I trained or otherwis conside

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 38

T//NOFORN

(U) An EC will be prepared with a summary of your case and'

ACLURM021137

JOINT TERRORISM TASK FORCE (JTTF) .

ORIENTATION

Asset/Source Recruitment And Management

JUT CBT

Page 1 of 1

SE T//NOFORN

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 36 OF 38 T/ /NOFORN

file://DAjttfoV2\module8\m8_360.htm 8/9/2011

F B1020929 ACLURM021138

b7E

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

Asset/Source Recruitment And Management

QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 38

Spii//woroRN

file://D:\jttfoV2\module8\m8_370.htm 8/9/2011

FBI020930 ACLURM021139

JTFF CBT Page 1 al

Asset/Source Recruitment And Management

9:111t//NOFORN

30I NT TERRORISM TASK FORCE (3TTF)

ORIENTATION

b7E

bl

(U)

C S)

Module Review . When conducting Inteknetional Ferrari= interviewina follow proper approval authority.

interviews are thorarh in order toy

• The FBI's policies and procedures for source development and tasking must be followed. Thq FIXT'e neklh.imm_ rwrao•eaA, fem.. ftem_Aai• min r-IFIeftHnek mute+ het frillosuraril

FBI020931

PREVIOUS :: FINISH MODULE

PAGE: 38 OF 38 jtotis6J/Noroarr

file://a\ittfoV2\module8\m8_380.htm 8/9/2011

ACLURM021140

JTFF CBT DATE: 10-25-2011 CLASSIFIED BY 65179 DMH/ sCp/ lsg REASON: 1.4 (c) DECLASSIFY ON: 10-25-2036

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT Page 1 of 1 WHERE SHOWN OTHERWISE

sE //NOFOEN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations.

ORIENTATION

(U) Overview Of Instructional Goals And Objectives , (U) Goal: The goal of this module Is to introduce the new task force officer to FBI international operations that suppert the FBI's fight against sismectic and international terrorism.

Objectives:

1. Gain a basic understanding of the FBI's overseas theater operations. 2. Gain a basic understanding of role of the Legal Attache. 3. Read and review the FBI's policies and procedures regarding foreign travel. 4. Read and review information regarding pre-deployment planning.

EXIT MODULE :: NEXT PAGE: 1 OF 53

T//NOFORN

file://DAjttfoV2\module9\m9_000.htm 8/9/2011

F B1020932 ACLURM021141

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

International Operations

.1D7E

041:1</NOWORN PAGE: 2 OF 53

AjttfoV2\module9\m9_010.htm 8/9/2011

FBI020933

EZ Ti/NOEVEN

(U) Overseas Theatre Operations

QUIT :: PREVIOUS :: NEXT

ACLURM021142

JTFF CBT Page 1 of 1

SE Ti/NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

CU) ) Overseas Theatre Operations

bl b7E

QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 53

;)4!NOFORN

file://D:\ittfoV2\module9\m9_020.htm 8/9/2011

F B1020934

International Operations

ACLURM021143

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg

REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036

■•_1:41-: o ColettoVAneddeetm9_020.htm

Fie Edit View Fowles Tools He

Faeotte I {.3 raz mt.& OMIT car

PL.1.52-uel

0 - Pooe • Met!. Tools. 0.

4 • Am% g MY corpse. - • •o,., I - „." ly JTFF CE1 -Winckm;

b7E

JTF.F. CDT lyinclows Internet Explorer

:dtW tlooK1Westori

bl

FBI020935 ACLURM021144

gj3TFF CBT a • a = • Pap • Safety. Tholo •

CS)

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED EXCEPT WHERE SHOWN OTHERWISE

5 JEFF CBT- lklindows Interne! Explorer

vitiMWioftnortioplimmhth no Edd Naw Females Toth tloka

4'Favonlee 154 LPN trirenet

DATE: 10-27-2011 CLASSIFIED BY 65179 DMH/ stp/ 1sg REASON: 1.4 (c) DECLASSIFY ON: 10-27-2036

te; S Hy Computer

..V019‘4*;;;; JIFF CEi - Wl-dowr

4 - - g) • 0,70:.0

X

b 7 E

FBI020936 ACLURM021145

x 1.35 L.rek:e.f.

FBI020937

DECLASSIFIED BY 65179 DM/. stp/ lsg ON 10-25-2011

b E

0...1TF.E -CDT Viindows Internet Explorer

/ ° rt. EMPF0V211101U09(r119-020.Mrm Fds Ult liftm Famartas Tods 1,42

TT

Fa/° 105 Wang

(), 43mmor

b 7 E

L.,

N.

0 a Fes. Safety. Tools-

CU)

. vie compubm 4 • Age% ;6;12005 ./:.

ACLURM021146

International Operations

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Overseas Theatre Operations

(S)

bl b7E

QUIT :: PREVIOUS :: NEXT PAGE: 4 OF 53

file://D:\ittfoV2\module9\m9030.htrn 8/9/2011

JTFF CBT

Page 1 of 1

FBI020938 ACLURM021147

JTFF CBT Page 1 of 1

S5)M6//NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

International. Operations

(lb Overseas Theatre Operations

bl b7E

F B1020939

QUIT :: PREVIOUS:: NEXT PAGE: 5 OF 53

Tflaorom

file://DAjttfoV2\module91m9040.htm 8/9/2011

ACLURM021148

Overseas Theatre Operations

X

PAGE: 6 OF 53 SE Ti/NOFORN

file://DAjttfoV2\module91m9050.htm

JTFF CBT

THNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

F B1020940 ACLURM021149

Page 1 of 1

1/124//NOFORN

b1 b7E

JTFF CBT

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

) Overseas Theatre Operations (U)

QUIT:: PREVIOUS :: NEXT PAGE: 7 OF 53

SE TI/NOFORN

file://DAjttfoV2\module9\m9_060.htm 8/9/2011

FBI020941 ACLURM021150

Overseas Theatre Operations

x

x

JTFF CBT

Page 1 of 1.

EZ T//NOEORN

3OINT TERRORISM

International TASK FORCE (3TTF)

Operations

ORIENTATION

b1 b7E

QUIT :: PREVIOUS:: NEXT PAGE: 8 OF 53

...›(<//NOSORN

file://D:\jttfoV2\module9\m9070.htm 8/9/2011

F B1020942 ACLURM021151

JTFF CBT

Page 1 of 1

SE T/A10FORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations ORIENTATION

(U) Overseas Theatre Operations

b7E

QUIT :: PREVIOUS:: NEXT PAGE: 9 OF 53

";<‘//zroFoRN

file://D:\jttfoV2\module9\m9_080.htm 8/9/2011

F B1020943 ACLURM021152

Page 1 of 1 JTFF CBT

International Operations

2>%/NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

PAGE: 10 OF 53

8/9/2011 file://DAjttfoV21module9\ni9_090.htrn

F B1020944

Overseas Theatre Operations

b1 b7E

QUIT :: PREVIOUS :: NEXT

ACLURM021153

JTFF CBT Page 1 of 1

UNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) ) Overseas Theatre Operations

b1 b7E

QUIT :: PREVIOUS:: NEXT PAGE: 11 OF 53

Ti/NOFORN

8/9/2011

F B1020945 ACLURM021154

ITFF CBT Page 1 of I

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

International Operations

Overseas Theatre Operations Intelligence Sharing

X

QUIT:: PREVIOUS:: NEXT PAGE: 12 OF 53

!,42//NOFORN

file://DAjttfoV2\module9\m9110.htm 8/9/2011

CU)

C S)

CS)

bl

F B1020946 ACLURM021155

b7D b7E

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

(U) Overseas Theatre Operations

QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 53

T//NOFORN

file://DAjttfoV2\module9\m9_120.htm 8/9/2011

F B1020947 ACLURM021156

3)

JTFF CBT

Page 1 of 1

Ti/NOFORN

JOINT TERRORISM

International TASK FORCE (3TTF)

Operations ORIENTATION

(U) Overseas Theatre Operations

QUIT:: PREVIOUS:: NEXT PAGE: 14 OF 53

_SITARZT//NOFORN

file://D:\jttfoV2\module9\m9_130.htm 8/9/2011

bl b7E

F B1020948 ACLURM021157

JTFF CBT Page 1 of 1

International Operations

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

CS)

bl b7E

F B1020949

Overseas Theatre Operations

QUIT:: PREVIOUS :: NEXT PAGE: 15 OF 53

T//NOFORN

file://D:\jttfoV2\module9\m9_140.htm 8/9/2011

(U)

ACLURM021158

JTFF CBT Page 1 of 1

T//NOFORN

JOINT TERRORISM

International TASK FORCE (3TTF)

Operations ORIENTATION

(U) Legat Operations Leoats

(U) A Legat is the FBI's reoraspntative stationed in an American Embassy abroad who is responsible for liaison with) 'Intelligence agencies In matters of interest between those agencies and the b7D FBI. Legat personnel respond to the FBI's domestic and extraterritorial investigative needs. Thev can b7E accomplish this because!

QUIT :: PREVIOUS :: NEXT PAGE: 16 OF 53

i3pRt//molloRm

file://DAjttfoV2\module91m9_150.htm 8/9/2011

F B1020950 ACLURM021159

JTFF CBT

Page 1 of 1

E T//NOFORIT

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Legat Operations Leoat Services

(U) The services of the Legat should be utilized by domestic field offices and FBIHQ personnel requiring investigative assistance abroad as the Legat is qualified to handle the full range of FBI matters overseas. Legats' territories cover all nations in which the U. S. Government (USG) maintains diplomatic relations. Legats are expected tcl

(U) Each agent must utilize the Legate in all of his/her overseas contacts. In instances where ongoing or continuous contacts for Toended periods of time become necessary, direct contact between the FBI domestic employees and must be approved by and coordinated through the appropriate Legat.

QUIT :: PREVIOUS :: NEXT PAGE: 17 OF 53

)1:00;fT//NOFORN

file://DAjttfoV2\module91m9_160.htm 8/9/2011

b 7D b7E

FBI020951 ACLURM021160

JTFF CBT Page 1 of 1

SE THNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Legat Operations Leads to Foreign Countries

(U) Leads for all foreign countries should be submitted to the Legat covering the region, with informational copies to the Office of International Operations (OW) and substantive desk(s) at FBIHQ. Leads submitted

through must include an information copy for the respective Legat. b7E

QUIT :: PREVIOUS NEXT PAGE: 18 OF 53

T//NOE'ORN

file://D:\jttfoV2\module9\m9170.htm 8/9/2011

F B1020952 ACLURM021161

JTFF CBT

Page 1 of 1

/NOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

(U) Legat Operations Legat Responsibilities

(U) In addition to the Legat's responsibility to the host country, Legats are also responsible to the U.S. Ambassadors overseas. The FBI is obligated by a MOU between the Departments of Justice, State, and Treasury to keep the Chief of Mission "fully and currently informed" with respect to all activities and operations of FBI employees in that country. The Legats must be completely aware of all FBI activities in their territories so that they can meet their obligations to both the host country and the U.S. Ambassador.

QUIT :: PREVIOUS :: NEXT PAGE: 19 OF 53

//NOFORN

file://DAjttfoV2\module9\m9180:htm 8/9/2011

F B1020953 ACLURM021162

JTFF CBT

Page 1 of 1

S gfT//NOFORN

JOINT TERRORISM

International TASK FORCE (3TTF)

Operations

ORIENTATION

(U) Bureau Policy And Procedures Foreian Travel and Country Clearance

(U) In accordance with the requirements of the above MOU, all official foreign travel must be coordinated with the Legat Office covering the country concerned and the Office of International Operations (OM). The Legat should be kept informed as to contemplated activity to ensure! The Legat will also be able to comment as to any other current activity or political circumstances in the foreign country, which may have some effect on the travel activity.

b7D b7E

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 20 OF 53

..30agt.(/NOFORN

file://DAjttfoV21module9\m9_190.htrn 8/9/2011

F B1020954 ACLURM021163

JTFF CBT

Page 1 of 1

SE OT/INOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations ORIENTATION

(U) Bureau Policy And Procedures Foreign Travel Ec

b7D b7E

QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 53

g"147//NOFORN

file://D:\jttfoV2\module9\m9_200.htm 8/9/2011

F B1020955 ACLURM021164

JTFF CBT

Page 1 of 1

T//NOFORN

3OINT TERRORISM

International TASK FORCE (3TTF)

Operations ORIENTATION

(U) Bureau Policy And Procedures

lb 7E

QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 53 .......161‹//NOFORN

file://DAjttfoV2\module91m9__210.htm

8/9/2011

F B1020956 ACLURM021165

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

International Operations

(U) Bureau Policy And Procedures

lo7E

QUIT :: PREVIOUS:: NEXT PAGE: 23 OF 53

SE //NOFORN

file://D:\jttfoV2\module9\m9_220.htm 8/9/2011

F B1020957 ACLURM021166

JTFF CBT

Page 1 of 1

//NOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

(U) Bureau Policy And Procedures

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 24 OF 53

>Oki/140VMM

file://13:\jttfoV2\module9\m9230.htm 8/9/2011

F B1020958 ACLURM021167

JOINT TERRORISM

International TASK FORCE 1)TTF)

Operations ORIENTATION

(U) Bureau Policy And Procedures

:137E

QUIT:: PREVIOUS:: NEXT PAGE: 25 OF 53

3>ECTI/NOFORN

file://DAjttfoV2\module91m9240.htm 8/9/2011

JTFF CBT

Page 1 of 1

T//NOFORN

F B1020959 ACLURM021168

Page 1 of 1 JTFF CBT

International Operations

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

(U) Bureau Policy And Procedures

PAGE: 26 OF 53

F B1020960

Ti/NOFORN

b7E

QUIT:: PREVIOUS:: NEXT

file://DAjttfoV2\module9\rn9250.htm 8/9/2011

ACLURM021169

al)

(U)

JTFF CBT Page 1 of 1

T/rNOPORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

International Operations

/NOFORN) Bureau Policy And Procedures Additional Travel Instructions

b7E

QUIT:: PREVIOUS:: NEXT PAGE: .27 OF 53

8,11//NOFORN

file://D:\jttfoV2\module9\m9_260.htm 8/9/2011

FBI020961 ACLURM021170

Attorney General Guidelines for FBI Foreign Intelligence Collection and

Foreign Counterintelligence Investigations (FCIG)

I Presented by: I

Office of the General Counsel National Security Law Unit

AIL INFORMATION CONTAINED

DATE: 10-25-2011 HEREIN IS UNCLASSIFIED EXCEPT

CLASSIFIED BY 65179 DHH/ spt/ lsg WHERE SHOWN OTHERWISE

REASON: 1.4 (c, d) DECLASSIFY ON: 10-25-2036

b6 b7C

F B1020962 ACLURM021171

Presentation Overview

• Lesson Objectives • Introduction to the Guidelines • Definitions • Counterintelligence & Counterterrorism

Investigations • Dissemination • Reporting Requirements

J

2

F B1020963 ACLURM021172

F B1020964

,

3

ACLURM021173

Lesson Objectives -- By the end of the session you should:

• understand the basic purpose, scope, and organization of the FCIG

• be able to apply the "least intrusive means" principle

• know how to apply the U.S. Person presumption

• be familiar with the key definitions

F B1020965 ACLURM021174

• know'

Lesson Objectives -- By the end of the session you should:

• know what investigative steps can be taken

• understand which investigative techniques are available'

• know the rules for disseminating and reporting information

.b7E

5

FB1020966 ACLURM021175

F B1020967

.6

ACLURM021176

Introduction • • E.O. 12333 requires the FBI to:

— conduct and coordinate counterintelligence activities within the United States

— Coordinate counterintelligence activities outside the United States with the CIA

— Collect foreign intelligence — Produce and disseminate foreign

intelligence and counterintelligence

F B1020968 ACLURM021177

Introduction

• E.0 12333 provides that the FBI's responsibilities will be conducted in accordance with "such regulations as the Attorney General may establish"

• The FCIG are these regulations • Most recent version is March 8, 1999

F B1020969 ACLURM021178

Introduction

• The FCIG are the basic rules of the road that give the FBI its direction for conducting counterintelligence and counterterrorism investigations

• They also provide guidance on foreign intelligence collection andl

b7D 1)7E

9

FBI020970 ACLURM021179

Least Intrusive Means • Required by Section 2.4 of E.O. 12333

and Section III.A.1 of the FCIG. • The FBI should collect information

under the FCIG using the least intrusive means that will provide the quality, scope and timeliness required in a manner consistent with the laws and policies of the United States

`13

FBI020971 ACLURM021180

I • U.S. Person Presumption

• in which the status of a subject is not known, the subject shall be treated as a U.S. person

b7 E

15

F B1020972 ACLURM021181

FCIG Structure

• Scope • Definitions • Collection of FCI information. • Special Techniques • Dissemination • Reporting

FBI020973 ACLURM021182

ViT oz. 4,

-Y- -4. osaf

,,, -k * z

2, t

ki t1) .• c' ** IP, &,„,....-X 0. Ai, NO4113 or 1-1 la

seAr/CPLII3v

...

17

F B1020974 ACLURM021183

18

FBI020975 ACLURM021184

FBI020976 ACLURM021185

20

FBI020977 ACLURM021186

FBI020978

21

ACLURM021187

WA<

Subjects

• Subjects of counterintelligence investigations are divided into: — foreign powers

— foreign visitors

— U.S. persons

F B1020979 ACLURM021188

Foreign Power

• A foreign government or any component regardless of whether recognized by U.S.

• A faction of a foreign nation, not substantially composed of U.S. persons

• Entity•openly acknowledged by a foreign government

• Group engaged in international terrorism

• Foreign-based political organization, not substantially composed of U.S. persons

• Entity directed and controlled by a foreign government

23

FBI020980 ACLURM021189

24

FBI020981 ACLURM021190

27

F B1020982 ACLURM021191

28

FBI020983 ACLURM021192

,Pre-investigative Activities

b7E

29

F B1020984 ACLURM021193

Pre-investigative Activities (Cont.)

• Examine FBI records, review publicly available reference material I

lin order to obtain identifying data concerning an unknown person for indexing purposes

b7E

30

FBI020985 ACLURM021194

Pre-Investigative Activities (Cont.)

• Examine FBI records and review publicly available reference material in order to obtain identifying data concerning a known person for indexing purposes

31

FBI020986 ACLURM021195

Pre-investigative Activities (Cont.) '

• Conduct background inquiries concerning consenting individuals!

I

.b7D b7E

32

FBI020987 ACLURM021196

58

FBI020988 ACLURM021197

b7E

59

F B1020989 ACLURM021198

Operations Outside the U.S.

• DCI (or designee) and Attorney General (delegated to section chief) approval is necessary for investigative activity conducted outside the United States

• b7E

63

FBI020990 ACLURM021199

FBI020991

68

ACLURM021200

Dissemination

• In General • To Federal Authorities • To State and Local Government

Authorities • • To Congressional Committees •

F B1020992 ACLURM021201

Dissemination in General

• Transmission of information within DOJ is not dissemination

• Can disseminate publicly available information that doesn't identify U.S. persons for any lawful purpose

70 .

FBI020993 ACLURM021202

it

Dissemination in General (cont.)

Non-publicly available information can be disseminated within the intelligence community

• Non-publicly available information identifying U.S. persons may be disseminated outside the intelligence community if the identities may reasonably become necessary to understand or assess the importance of the information

71

F B1020994 ACLURM021203

Dissemination to Federal Authorities

• FBI may disseminate information to other federal authorities when it: — relates to a crime or violation of regulation

within that agency's jurisdiction — relates to the other agency's authorized

responsibilities — is required to be disseminated by statute

or other directive

72

FBI020995 ACLURM021204

Dissemination to State and Local Authorities

• The FBI may disseminate facts or information relating to crimes to state and local governments if the dissemination is consistent with the interests of U.S. national security

73

FBI020996 ACLURM021205

Dissemination to Congressional Committees

• The FBI can provide briefings and testimony on maters of general intelligence interests to the appropriate Congressional committees

• Any further dissemination requires Attorney General approval

• The FBI must consult with any other agency with a stake in the information prior to dissemination

75

MEW

FBI020997 ACLURM021206

FBI020998 ACLURM021207

F B1020999 ACLURM021208

FBI021000 ACLURM021209

80

FBI021001 ACLURM021210

Visited States .elmerica

JTFF CBT

Page 1 of 1

>11610/NOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures Passports

(U) Diplomatic passports do not automatically confer any diplomatic privileges or immunities (P&Is) from search, seizure or arrest in a foreign nation. In order for the bearer of a diplomatic passport to have diplomatic P&Is in the host nation, the bearer must be a USG employee permanently assigned to the US Embassy and be named on the diplomatic list of the nation. Diplomatic passports are issued through liaison between the OW and State. The issuance of diplomatic passports is within the sole purview of the Department of State and their issuance is strictly controlled. An official passport is the standard requirement for FBI employees traveling abroad on official business.

(U) The 0I0 recommends that the official traveler also carry a valid U.S. tourist passport as a back up for a diplomatic or official passport to be used under certain limited situations. The use of a tourist passport must not be presented to enter or depart from the foreign nation or in connection with other USG official duties or business.

QUIT :: PREVIOUS:: NEXT PAGE: 28 OF 53

)11<//NOFORTI

file://D:\jttfoV2\module9\m9_270.htm 8/9/2011

FBI021002 ACLURM021211

JTFF CBT

Page 1 of 1

...):412/NOPORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures Passports (Con't)

lAn official passport is not to be used for personal or pleasure travel, and any loss should be reported at once to the division head and the OM. Since official passports and visas provide no immunity for the bearer, he/she (the bearer) can be held fully liable for all actions while abroad. This liability is both civil and criminal under the laws of the host country, which are often different from those in the United States.

b7E

QUIT:: PREVIOUS :: NEXT PAGE: 29 OF 53

T//NOFORN

file://DAjttfoV21module9\m9_275.htm 8/9/2011

FBI021003 ACLURM021212

JTFF CBT

Page 1 of 1

//NoFowl

JOINT TERRORISM International TASK FORCE (3TTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures Visas

(U) Most foreign nations will not issue a visa if the diplomatic or official passport will expire in six months or less of the travel date.

(U) A visa is a permit, entered on the passport of a national of one country, by the consulate of another. This permit allows the bearer entry to or transit through, the country issuing the permit. On request, and with proper notice, the 0/0 will obtain visas necessary for official travel. A valid diplomatic or official passport with an expiration date greater than six months after the requested travel dates is required to be sent to the 010 when applying for a visa.

(U) The time for which visas are issued usually depends on the length of the trip. Applications, pictures International Health Cards, and other certified documents may be required before visas are issued. Official travel to most countries requires a visa. The visa is stamped in the U.S. passport used for travel. Visas are obtained from that country's Embassy or Consulate in the U.S. Foreign diplomatic establishments require a DOS, Washington, D.C., Passport Office letter before they will issue a visa for official travel. Note that most foreign Embassies in the US have specified time frames required for the issuance of a visa. Three to five workdays are commonly required; however, select nations may require weeks to issue a visa. The OM should be consulted at the earliest time when international travel is planned.

QUIT :: PREVIOUS :: NEXT PAGE: 30 OF 53

//NOFORN

file://D:\jttfoV2\module9\m9 280.htm 8/9/2011

FBI021004 ACLURM021213

JTFF CBT

'740//NOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures Investigations

(U) FBI Agents have no jurisdiction in foreign countries. Agents do not have arrest powers, subpoena powers, or the authority to conduct investigations, including foreign national interviews, in other countries without the approval of the COM and the host government' FBI credentials must be carried while on official travel abroad; however, use and/or display of credentials in a foreign country except for identification in an official capacity is inappropriate.

QUIT :: PREVIOUS :: NEXT PAGE: 31. OF 53

....iB4*//NOFORN

file://DAjttfoV2\module9\m9_290.htm

FBI021005 ACLURM021214

JTFF CBT

Page 1 of 1

01:101e//NOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures National Sovereignty

(U) National sovereignty of the foreign nation prohibits FBI Agents from exercising law enforcement or peace officer status. Notwithstanding the extraterritorial reach of some US statutes, no U.S. law can override a foreign country's right to protect the integrity of its sovereignty. A foreign nation may; however, agree to permit the FBI to perform limited law enforcement functions when in the company of a counterpart host nation law enforcement or intelligence official when the FBI has joint investigative jurisdiction. Though not limited to terrorist activity, such investigations generally have been conducted in the aftermath of terrorist attacks. The FBI's role in these shared investigations requires COM/Legat, 010 and FBIHQ approvals, in addition to host nation approval and are usually limited to victim/witness interviews and routine forensic examinations.

(U) Unless the above approvals have been granted, FBI Agents from domestic offices may not independently conduct investigations in foreign countries, including foreign national interviews without concurrence of the host government. Exceptions to this prohibition are authorized when a foreign national appears at an embassy or consulate voluntarily (walk-ins) or when an American citizen voluntarily appears for interview on these diplomatic premises. However, the interview of an American citizen or foreign national in-country, not on U.S. diplomatically protected premises, requires the above approvals and host nation authority. Such off-premises interviews would normally be conducted by the host government authorities.

QUIT :: PREVIOUS:: NEXT PAGE: 32 OF 53

4:04//NOFORN

file://D:\jttfoV2\module9\m9_300.htm 8/9/2011

FBI021006 ACLURM021215

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE OTTO

ORIENTATION

International Operations

0

(U) Bureau Policy And Procedures . Interviewing Persons in Police Custody in a Foreign Country

(U) Persons interviewed by FBI Agents while in police custody in a foreign country must be given the usual warning of rights under American Federal law provided there is no objection from the foreign police officer. If he/she objects, feeling the warning is not consistent with the law of his/her country and might work unfavorably on prosecution of the subject there, the officer should be requested to give the warning as required by the law of his/her country. Record the wording of this warning and the time and circumstances of its issuance.

QUIT:: PREVIOUS :: NEXT PAGE: 33 OF 53

dtP9//rioroaN

file://DAjttfoV2\module9\m9_310.htm 8/9/2011

FBI021007 ACLURM021216

b7E

JTFF CBT Page 1 of 1

4,112//NOFORN 3OINT.TERRORISM TASK FORCE (3TTF)

ORIENTATION

International Operations

(U) Bureau Policy And Procedures Counterintelligence Activities

QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 53

S)(T//NOFCRN

file://DAjttfoV2\module91m9_350.htrin 8/9/2011

FBI021008 ACLURM021217

JTFF CBT

Page 1 of 1

>12kY/NOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

(U) Bureau Policy And Procedures Routine Leads in Foreign Countries

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 38 OF 53

• .›RT//NOFORN

file://D:\jttfoV2\module9\m9_360.htm 8/9/2011

FBI021009 ACLURM021218

sp , r ► _s • L.<

aJTFFC.I3T • SIlindows Internet Exp(orcr

- it. comodu 4k , two,. " • eqS ekt

. . _

b7E

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-25-2011 BY 65179 DMH/ spt/ lsg

otttfoMnottlestow370.htrn ••• ■.47. X. IP t',15nrvi

Fl, Erk Mar Favertes Tads Help

*Favades 1/4k Flambe:et _ . . ifampan ta - Pecx, Safety To*. (0.

FBI021010 ACLURM021219

JTH CUT- 'findows Internet Explorer

:P1-i pit*Sa.vols

• Page• Safety. Tools.

fie Uk View Fawn= rod) WO

*Fend= 1:4 CFBILtronet

j WIN ®T

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-25-2011 BY 65179 DMH/ spt/ lsg

• Olio": Amgettee4; 1111111111111MIZIEM. a

• Ply caw. -:

b7E

4t x

Aw. t`6

lOa taMearill4Restoret

FBI021011 ACLURM021220

JTFF CBT Page 1 of 1

Ti/NOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Bureau Policy And Procedures Extradition

(U) International extradition is the formal process by which a person found in one country is surrendered to another country for trial or punishment. The process is regulated by treaty and conducted between the U.S. government and the government of a foreign country. It differs considerably from Interstate extradition or Interstate rendition. Extradition, in most instances, may be granted only pursuant to a treaty. Responsibility for extradition matters lies with the DO] and the DOS. A simple telephone call to a foreign police agency will not result in having a subject arrested and returned to the U.S. by host nation law enforcement officials.

QUIT :: PREVIOUS :: NEXT PAGE: 40 OF 53

sE Ti/N0FoRN

file://DAjttfoV2\module9\m9_380.htm 8/9/2011

FBI021012 ACLURM021221

JTFF CBT Page 1 of 1

sE TUNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

• ORIENTATION

(U) Bureau Policy And Procedures Subpoenas

(U) It is possible, pursuant to U.S. law, to have a subpoena issued for a national or resident of the U.S. in a foreign country, directing the witness to appear before a U.S. court. However, Legats cannot automatically serve subpoenas in other countries. It may be a violation of sovereignty. Foreign laws may restrict the serving of such subpoenas. U.S. Attorney's Offices work closely with the Department of Justice's Office of International Affairs to select a method of obtaining the witness's presence in the U.S. In tome cases this may be done in concert with an American consular official acting on a request by the DOS. b7E

QUIT:: PREVIOUS:: NEXT PAGE: 41 OF 53

file://D:\jttfoV2\module9\m9_390.htm 8/9/2011

FBI021013 ACLURM021222

Page 1 of 1 JTFF CBT

International Operations

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

(U) Bureau Policy And Procedures

PAGE: 42 OF 53

FBI021014

T//NOFORN

b7E

QUIT:: PREVIOUS:: NEXT

file://DAjttfoV21rnodule9\m9400.htm 8/9/2011

ACLURM021223

JTFF CBT

Page 1 of 1

SE i/NOPORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations

ORIENTATION

(U) Bureau Policy And Procedures Other Investigative Techniques: Consult Legat in Host Natiorl

.b7E

QUIT :: PREVIOUS :: NEXT PAGE: 43 OF 53

T//NOFORN

file://DAjttfoV2\module91m9_410.htm 8/9/2011

FBI021015 ACLURM021224

JTFF CBT

Page 1 of 1

T//NOFORN

JOINT TERRORISM

International TASK FORCE (JTTF)

Operations ORIENTATION

(U) Bureau Policy And Procedures Leqat Responsibilities

(U) Legats are responsible for conducting and coordinating all investigative matters overseas, including cases where domestic FBI Agents are deployed from the extraterritorial squads. The Legat is there to ensure that the anticipated investigation proposed by the office of origin does not raise sovereignty issues with the host government and that all matters have been coordinated with the embassy in accordance with the COM MOU. The Legate must be part of the investigative planning and decision making in order to fulfill the Director's expectations with respect to their role in overseas investigations.

QUIT:: PREVIOUS :: NEXT PAGE: 44 OF 53

T//NOFORN

file://D:\jttfoV2\rnodule9\m9_420.htm 8/9/2011

FBI021016 ACLURM021225

..•••• •

• —••• •■••••• • • ••• ••,- • .

Afro8ANISTN4

F. NT of S CATE

'Titan I tIch, Alliiiima._tnAtp11triffSTAIL

•••

TAMIL Yr,s'ir ,;(11,

JTFF CBT Available on the Internet

Page 1 of 1

sa6//soroRs

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) U.S. Department Of State Information And Updates Travel Advisories

(U) Travel advisories are issued by the DOS for countries where potential terrorist threats and potential unrest exist. Visit http://www.travel.state.govitravelicis_pa_tw/twitw_1764.html for a current list of travel advisories. (Note: The DOS refers to travel advisories as "Travel Warnings" on their website. The terms are interchangeable.)

QUIT:: PREVIOUS :: NEXT PAGE: 45 OF 53

Ti/NOFORN

file://DAjttfoV21module9\m9_430.htm 8/9/2011

FBI021017 ACLURM021226

No•

%11•4•ZIMZOINKIA•1•4•LbtlLICSIPIfirmaMUSUZ•coftliliglililbWheii1inCii• IM•oorOmMOMmtl•••Mil MOM

M2111111 ifew4 Itota "footslog'

=ISM Co•••••••••1

=== PRWIE

4111•31•00C xatZtacitausas

■••••••• ■••••0•11 04 eft r/SMI M•Orr.••••14•rs

=311 Ge••••■■01/0414 .W.a••••••••••••••■1•*"■•••••••••••••••%***•••••••••••••••0%.111.. •VMa.....•••••10.11,*4....6410116.•••••■1401, Ow. •••••••toommom•m*••• •••••mi••••••••■•••••••••M •••• • •••••••••••.•••• m•••••••om•Mm •.

x.•mmoi•mm•••Olvemommlomitmommmom•MmoMemdommomMo•II•••• ••••••••••••to p•••••••—•.•• m•■•••••••■••••••firo• we omo odral.....sommerg wali•olWato•••! woo ■••••••••■••••• Ow. ,....■•■••••.7•••••■■■•ft Mia.•01110•VNA

QUIT :: PREVIOUS :: NEXT

1011:6V/NOPORN

==11111

JTFF CBT Available on the nternet

Page 1 of 1

E Ti/NOEDER

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

International Operations

(U) U.S. Department Of State Information And . Updates Post Reports

(U) Post Reports provide information regarding countries in which U.S. Embassies are located. The information provided includes a brief history and description of the country's area, geography, climate, population, public institutions, arts, science, education, commerce and industry, transportation, communication, health and medicine, housing, food, clothing, supplies and services, education, recreation and social life, official functions, pets, etc. (Note: The DOS refers to post reports as "Background Notes" on their website. The terms are interchdngeable.)

Visit www.state.gov/r/pa/el/bgn/ for a full list of countries.

PAGE: 46 OF 53

file://D:\jttfoV2\module9\m9_440.htm 8/9/2011

FBI021018 ACLURM021227

JTFF CBT Page 1 of 1

T//NOPORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

International Operations

(U) Temporary Duty Pre-Deployment Planning Personal Property

(U) Household maintenance issues, household security issues, and automotive needs should be reviewed and addressed prior to deployment.

QUIT:: PREVIOUS:: NEXT PAGE: 47 OF 53

0M021/NOFORN

file://DAjttfoV21module9\m9450.htm 8/9/2011

FBI021019 ACLURM021228

JTFF CBT

Page 1 of 1

THNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Temporary Duty Pre-Deployment Planning Personal and Family Matters

(U) The pre-separation period Is stressful for all family members, especially for parents and children. Communication between yourself and loved ones is of vital importance, and can help alleviate the stress and tension often associated with deployment The key to successful and authentic communication with family members is to be honest Prior to deployment, is the time to open up lines of communication between you and family members. Honestly discuss with family members feelings about the assignment or deployment, and identify fears and expectations. Discuss any contingencies or unforeseen changes you might imagine. Personalities might change, especially those of the children. By the time you return home, goals may have changed for either you or your spouse or partner.

QUIT:: PREVIOUS :: NEXT

PAGE: 48 OF 53

file://D:\jttfoV2\module9\m9_460.htm 8/9/2011

FBI021020 ACLURM021229

Page 1 of 1 JTFF CBT

T//NOFORN PAGE: 49 OF 53

FBI021021

TUNOPORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Temporary Duty Pre-Deployment Planning Medical

(U) An important pre-deployment responsibility is to visit the Health Care Programs Unit (HCPU).1

.b7E

QUIT:: PREVIOUS:: NEXT

file://D:\jttfoV2\module9\m9_470.htm 8/9/2011

ACLURM021230

•••■ 44.4

b6 b7c

JTFF CBT

Page 1 of 1

JOINT TERRORISM

."4//NOPORN

International TASK FORCE (JTTF)

Operations ORIENTATION

(U) Temporary Duty Pre-Deployment Planning -cm:

(U) During deployment there may be times when legal matters must be taken care of in your absence. Consult an attorney for any legal questions concerning your particular situation. Wills and Powers of Attorney are just as critical for a single FBI employee as it is for his/her married employee.

QUIT :: PREVIOUS :: NEXT PAGE: 50 OF 53

T//NOPOPI1

file://D:\ittfoV2\module9\m9_480.htm 8/9/2011

FBI021022 ACLURM021231

JIFF CBT

Page 1 of 1

,B4T//1.10FoRN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Temporary Duty Pre-Deployment Planning 'Financial and Insurancp.

(U) Your insurance carrier may provide worldwide assistance with traveler's medical insurance and terrorism coverage for FBI employees. Be sure to review how your Federal and Bureau benefits and insurance coverage work while you are overseas serving the FBI.

QUIT :: PREVIOUS :: NEXT PAGE: 51 OF 53

..s.)04e//NoroRN

file://D NttfoV2\module9\m9490.htm 8/9/2011

FBI021023 ACLURM021232

JTFF CBT Page 1 of 1

?)164THNOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Temporary Duty Pre-Deployment Planning bcclowrent Rriofinct

(U) After an employee has been identified as a candidate for deployment, management may•hold a briefing. The Deployment Briefing will accomplish several objectives by communicating the following:

• The nature and objective of the deployment. • All relevant, available intelligence. • Potential dangers involved, and discussion regarding physical security during the deployment. • Necessary precautions. • Anticipated time frame and schedules. • Chain-of-command. • Emergency contacts and plans for deployment termination/emergency evacuation. • EAP facilitated education relating to separations, stress and coping skills. • Support services available via EAP, Health Services, Office of General Counsel, Office of International

Operations, etc, • Dissemination of pre-deployment checklists, tips, and family support information. • Establish a time-period for candidates to prepare and set tentative dates for the next briefing.

QUIT :: PREVIOUS :: NEXT PAGE: 52 OF 53

>114//NOFORN

file://DAjttfoV2\module9\m9_500.htm 8/9/2011

FBI021024 ACLURM021233

JTFF CBT

Page 1 of 1

,11V/NOFORN

JOINT TERRORISM International TASK FORCE (JTTF) Operations

ORIENTATION

(U) Module Review

b 7D I. A Legat. an FBI rqwesentative stationed in an American Embassy abroad, is responsible for liaison b 7E and Intelligence agencies in matters of interest between these agencies and

FBIHQ. FBIHQ personnel and domestic field offices requiring investigative assistance abroad should utilize the services of the Legat.

• Specific policies and procedures should be followed when planning to travel outside the United States.

PREVIOUS :: FINISH MODULE PAGE: 53 OF 53

file://DAjttfoV2\module9\m9510.htm 8/9/2011

FBI021025 ACLURM021234

JTFF CBT

DECLASSIFIED BY 65179 DMH I stp/ 1sg

Page 1 of 1 ON 10-14-2011

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

"SneWthlitetPeetti-

Middle East/Arab Culture And Familiarization

Overview Of Instructional Goals And Objectives (U) Goal: The goal of this module is to Introduce the new task force officer to Middle East/Arab culture.

(U) Objectives:

1. Read and review a history of the Middle East. 2. Gain a basic understanding of Islamic religion and society. 3. Read and review an overview of radical fundamentalist terrorist groups.

QUIT :: PREVIOUS :: NEXT PAGE: 1 OF 61

.ascarai-merelot--

file://D:\jttfoV2\module10\m10_000.htm

8/9/2011

FBI021026 ACLURM021235

JOINT TERRORISM TASK FORCE (J_TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

History Of The Middle East (U) The Beginning of the Middle East

(U) The earliest civilizations in the region now known as the Middle East were founded in Mesopotamia and Ancient Egypt The Sumerians, Babylonians, Assyrians and others built important states. From about 500 B.C. onward, several empires dominated the region.

(U) In the 1st Century B.C., the Roman Republic absorbed the entire eastern Mediterranean area, and under the Roman Empire, the region was united with most of Europe and North Africa in a single political and economic unit; this unity facilitated the spread of Christianity. The rule of Rome was succeeded in the 4th Century A.D. by the rule of the Byzantine Empire centered in Constantinople, which ruled from the Balkans to the Euphrates River. The Persian Empire controlled much of the Middle East beyond the Byzantine Empire. Until the 7th Century, Anatolia (Turkey), Syria, Palestine, and Egypt were all Christian and Greek speaking, united culturally and politically under the rule of the Byzantine Empire, while Mesopotamia (modern Iraq) formed a buffer zone between the Byzantine and Persian Empires.

QUIT :: PREVIOUS :: NEXT

PAGE: 2 OF 61 —ll'llettEuthitter0B21

file://DAjttfoV2\module10\m10_010.htm 8/9/2011

4

u Mess of Mecumlulls • Cities of Usupeternia

Bordot of mOdetn Iraq

JTFF CBT

Page 1 of 1.

—SECRVPH14944aRN

FBI021027 ACLURM021236

JIFF. CBT Page 1 of 1

—000ftlYtilVelPeRN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

History Of The Middle East (U) The Rise of Islam

(U) The rise of Islam in the Arabian Peninsula was a decisive event in the creation of the Middle East as a distinct cultural region. The followers of Muhammad occupied Palestine, Mesopotamia (Iraq), Syria, and Egypt. The Byzantines succeeded in preventing the Arabs from seizing Anatolia, which remained Christian until the arrival of the Turks 400 years later. The majority of the population in the areas conquered by the Arabs converted to Islam within two generations, creating a permanent cultural frontier between Europe and the Muslim world.

(U) During the 9th and 10th Centuries, the Arabs remained unchallenged in the zone between the Nile and the Tigris Rivers as well as in North Africa and most of Spain. The Arab cities of Cairo, Alexandria, Basra, Damascus and Baghdad, supported a large population, a prosperous trading economy, and a rich cultural life.

QUIT :: PREVIOUS :: NEXT PAGE: 3 OF 61

--SEt9B114,(Z)ZORN.

file://DAjttfoV2\module10\m10_020.htm 8/9/2011

FBI021028 ACLURM021237

JTFF CBT

Page 1 of 1

—eseRsehitoepem

JOINT TERRORISM Middle East/Arab

TASK FORCE (JTTF) Culture And

ORIENTATION Familiarization

History Of The Middle East (I!) Thst nice of Emnires

(U) By the mid-11th Century, the Seljuk Turks had migrated south from central Asia, and conquered Persia, Iraq, Syria, Palestine and the Hejaz, defeating the Byzantines and conquering Anatolia and later Egypt. The Seljuk Turks ruled most of the region for several hundred years, until the empire began breaking up. The fragmentation of the region allowed the Christian west to re-enter the region during the European-led Crusades. The Crusaders, however, where unable to establish a permanent presence in the area.

(U) By the 15th Century, a new empire had arisen in western Anatolia, ruled by the Ottomans who united the entire Middle Eastern region under one rule. The Ottomans continued by conquering Greece, the Balkans, and most of Hungary; however by 1700, the Ottomans had been driven out of Hungary and began a cultural and technological decline. The Middle East began looking to the west for money in order to build up the region.

QUIT:: PREVIOUS :: NEXT PAGE: 4 OF 61

-SrettrrHtf0PERIN

file://D:\jttfoV2\module10\m10_030.htm 8/9/2011

FBI021029 ACLURM021238

JTFF CBT Page 1 of 1

"SETRETHNOWQRN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

History Of The Middle East

(U) British and French Involvement

(U) When the Ottoman Empire collapsed in the 1900s, the British and the French enacted a secret treaty (Sykes-Picot Agreement) to partition the Middle East between them. Thus, the British and French established a permanent presence in the area. Great Britain, fearful of potential threats to their economically critical trade with India, began occupying the Middle Eastern counties of Egypt, Sudan, and Somalia. During World War I, the British took over Palestine and Mesopotamia, and freed Arabia from the Turks, ensuring their independence under pro-British rulers. Post-war settlements between the Allies left Britain in control of the Middle East in the 1920s. It was during this time of British control that territories on the Arabian Peninsula came together as Saudi Arabia and gave rise to Arab nationalism as a strong influence. In addition, the British implemented the Balfour Declaration.

(U) The Balfour Declaration put in writing Britain's Foreign Secretary, Arthur Balfour's, promise to ^view with favor" the creation of a Jewish homeland, should the Jews support Britain in the war effort. Soon after World War I, Jews known as Zionists began their campaign to return Israel to "Ancient Israel." Jews by the thousands began immigrating to Palestine, buying land from absentee Arab owners, and settling in virtually independent, self-contained settlements. Balfour's Declaration created an ethnic and religious divide that is still a major cause of conflict in the area today.

QUIT:: PREVIOUS :: NEXT

PAGE: 5 OF 61 szczamalmatorer

file://D:\jttfoV2\module10\m10_040.htm 8/9/2011

FBI021030 ACLURM021239

THE PALESTINE

17=1=-1 POST .•••■■•0110.

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

History Of The Middle East jU) Independence in the Middle East

(U) During the 1920s and 1930s, Iraq, Syria and Egypt moved toward independence. In Palestine, the conflict between the forces of Arab nationalism and Zionist colonization was exacerbated by the 1947 United Nations plan to partition Palestine to create both a Jewish state and a Palestinian state. The Palestinians rejected the plan, and the Zionist settlers declared Israel a state in 1948, sparking a war in which the Palestinians, supported by neighboring Arabs, were defeated.

(U) The departure of European powers from direct control of the region, the increasing importance of the oil industry, and the establishment of Israel marked the creation of the modem Middle East.

STATE OF ISRAEL IS BORN A.. tr. roma Mi.• • dr ftemo;

{o.• •■•••■••■•■•••■•••=11.1.(••••••

QUIT PREVIOUS :: NEXT PAGE: 6 OF 61

STATLPT7180909.9

file://13:\jttfoV21module101m10050.htm 8/9/2011

JTFF CBT Page 1 of 1

—SEcRLFMNUE111214

FBI021031 ACLURM021240

JTFF CBT

Page 1 of 1

-tre0641:4410FORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) The Founding of Islam

Muhammad is the founder of the religion of Islam, and considered by Muslims to be the final prophet from God. Muhammad, at the age of 40 in 610 A.D. went on a retreat to Mecca and purportedly began hearing the voice of God telling him new, pure scripture. Muhammad recited the scripture to family, friends, and, later, growing numbers of believers. The scriptures were later put into a holy book called the Quran. Muhammad followed the scriptures absolutely, without deviation, and expected those who believed in Islam to do the same. To help him interpret the meaning of the scriptures, Muhammad gathered a group of close relatives, friends, and confidants, who become his Al Shura Council.

(U) When Muhammad started preaching in 612 A.D., he brought to the Arabian Peninsula a unifying influence. Islam, in effect, unified the Arabian Peninsula as a nation, by giving the inhabitants a:

• Common name - Muslim • One leader to follow - Muhammad • A common goal in life - to worship God and spread his word (Islam) to others • A single language for all to use - classic Arabic

QUIT :: PREVIOUS :: NEXT PAGE: 7 OF 61

—SreltirtH6604001-

file://D:\jttfoV2\module10\m10_060.htm .8/9/2011

FBI021032 ACLURM021241

JTFF CBT

Page 1 of 1

arelt0S,L/NOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society

lUi The Founding of Islam (Cont)

(U) Not all people in Mecca, especially the rich merchants, welcomed Muhammad's revelations regarding Allah's desire for social justice among humans and prostration before him (Allah). When Muhammad's clan leader died, Muhammad lost his protection in Mecca. In 622 A.D., Muhammad fled to Medina, a city north of Mecca, where he and his followers found protection from the two Arab tribes living there. Muhammad's departure from Mecca is called Hijrah, and the Hijrah is considered the official beginning of Islam and the start of the Muslim calendar.

(U) Muhammad and his followers settled in Medina, where Muhammad continued his preaching. At first, Muhammad preached unity under one God with the Medini Jews, but the Jews wanted nothing to do with Muhammad or Islam. As time passed, the Jews became intolerant of Muhammad's message and the spread of Islam. The Medini Jews joined with the Meccan Arabs, who pursued Muhammad to Medina to stop Muhammad's spread of Islam. In 630 A.D., Muhammad marched an army to Mecca and retook the city.

QUIT:: PREVIOUS:: NEXT PAGE: 8 OF 61

—60Q0304140000014-

file://DAjttfoV2\moduie10\m10_070.htm 8/9/2011

FBI021033 ACLURM021242

CBT

Page 1 of 1

ZETET6400FORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Islamic Religion And Society (U) Islam after Muhammad's Death

Middle East/Arab Culture And Familiarization

(U) After Muhammad died in 632 A.D., the senior leaders of Muhammad's Al Shura Council fearing that the community could easily fall apart without strong leadership, moved quickly to decide the following:

. The Islamic government would consist of a khalifa (caretaker) or caliph, and

. A representative council could override the caliph if he overstepped his bounds. •

(U) The Council elected the oldest member, Abu Bakr el-Saddeq, as the leader, however, many followers were unhappy with the Al Shura Council's decision and believed that All ibn Abi Talib, Muhammad's cousin and son-in-law, as the blood relative, should be the first caliph. All eventually became the fourth and final caliph.

Two years into All's rule, a rival tricked All and seized power. This event set off vendettas and counter-vendettas that triggered three events:

. All's assassination

. The challenge against All's son Hassan as leader

. The murder of All's second son Hussain in a battle at Karbala (Iraq)

QUIT :: PREVIOUS :: NEXT PAGE: 9 OF 61

ascasal4Nororer

file://aAjttfoV2\module10\ml0_080.htrn 8/9/2011

FBI021034 ACLURM021243

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Islam after Muhammad's Death (Can't)

(U) All's followers calling themselves Shies, considered these three acts treasonous, and they permanently split from the main group, which was later called Sunni.

QUIT:: PREVIOUS:: NEXT PAGE: 10 OF 61

-sreiesettiaoFoeN

file://DAjttfoV2\modulelain10_090.htm 8/9/2011

FBI021035 ACLURM021244

JTFF CBT Page 1 of 1

SER QRN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society

(U) Shia Muslims

(U) Shia Muslims' follow All's secular interpretation of Islam. All and his followers, as seculars, believed that if God wanted people to enter Islam by force or sword, he would have used the word youdkhloun (meaning "being pushed or forced") in the Quran. Instead, he used yadkhloun (meaning "by their own free will"). Thus, All believed that Abu Bakr was too militant, and his actions would prevent Jews, Christians, and pagans from freely flocking into Islam. Shia Muslims:

. Strongly believe in the tenets of Islam; however, they follow a less stringent (literal) interpretation of the Quran.

. Label as sinners all who do not believe that only blood descendants of Muhammad (and Ali) should be caliph.

. Follow a complete legal code called the 3afari School of Thought.

. Believe in the sinlessness and infallibility of their Imams (religious leaders).

. Dominate only in Iran, though they also have a significant presence in Iraq, Lebanon, and Saudi Arabia.

. Tactically, the Shia are more apt to cooperate with any other entity, including the West, if doing so will give them an advantage against the Sunnis.

. Comprise approximately 10-15% of the Muslim community.

QUIT :: PREVIOUS :: NEXT PAGE: 11 OF 61

SBER1004140FORN

file://DAjttfol/2\module101m10_100.htm 8/9/2011

FBI021036 ACLURM021245

JTFF CBT Page 1 of 1

szcsaa,cmePess

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Sunni Muslims

(U) Sunni Muslims' follow Abu Bakr's fundamentalist interpretation of Islam. Abu Bakr believed that no one could repent without being pushed. Thus, people must "be repented" by force. Abu Bakr did not think All and his Shia followers were capable of effectively leading the Muslim armies against the idol worshipers, Jews, and Christians. Sunni Muslims:

• Believe that elections should determine caliphs. • Have a conservative, traditionalist view of Islam. • Believe in a literal interpretation of the Quran, and believe that anything outside of what the Quran

teaches is unacceptable. • Follow the Sharia law. • Control how the Quran is printed and distributed. • When Sunni's hear Muhammad's name they must speak the following phrase: Sallailahu alayhi wa

sallam, meaning "the peace and blessings of God be upon him." • Consider the Sunnah of Muhammad the second most important source of Islamic doctrine. The Sunnah

is written using the filter of Muhammad's words, actions, and experiences. • Comprise 85-90% of the Muslim community. • Have been prolific in spawning numerous and varied fundamentalist extremist terrorist organizations.

Sunni core doctrine and end state have remained the same and they continue to strive for Sunni Islamic domination of the world to prove a key Quranic assertion that no system of government or religion on earth can match the Quran's purity and effectiveness for paving the road to God.

QUIT :: PREVIOUS :: NEXT

PAGE: 12 OF 61 SECRET TRIVORR--

file://1D:\jttfoV2\module10\ml0_110.htm 8/9/2011

FBI021037 ACLURM021246

JTFF CBT

Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) (Wow — The Holy Book of Islam

(U) The Quran is the principal source of every Muslim's faith and practice, and it consists of 114 surah (recitations) with a total of 6236 ayat (verses).

(U) The surah are arranged by length, which is believed by Muslims to be divinely inspired. The major themes of the Quran include:

• The absolute authority of God. • The accountability of humans for their deeds. • The impermanence of this life. . The importance of following the examples and teachings of Muhammad.

(U) The Quran is viewed as a legal document containing the doctrines that must be followed to behave acceptably, in, order to find salvation on the Day of Judgment. It governs every aspect of life—politics, government, economics, education, child-rearing practices, male/female relationships, family structure, values, jobs, friendships, hobbies, and interests.The Quran requires those who practice Islam to embrace and follow the Arkan al Islam!, or Five Pillars of Islam. The actions required by the Five Pillars of Islam are integrated into every Muslim's daily and yearly routines.

(U) The Five Pillars are Shahadah, Salat, Zakat, Saum/Sivan, and Hajj.

QUIT:: PREVIOUS:: NEXT PAGE: 13 OF 61

SgERIEThVABGEN

file://DAjttfoV2lmodule101m10_120.htm 8/9/2011

FBI021038 ACLURM021247

JTFF CB T Page 1 of 1

ZEURET7914460/11

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic. Religion And Society

(U) Shahadah - Declaration of Faith

(U) Also known as the Muslim Creed, the Shahadah (witnessing) is a declaration of the two founding principles of Islam spoken in a specific formula. Translated, the Shahadah means, "I declare there is no god except God," and "Muhammad Is the Messenger of God."

U) Muslims recite the Shahada a minimum of 17 times every day in their daily prayers. The first pillar eminds Muslims about the reality of dedicating their lives to God who is the only one worthy of devotion,

praise, and worship. The first Islamic pillar also helps Muslims remember their pledge to practice what Muhammad, as God's last Prophet, preached.

QUIT :: PREVIOUS :: NEXT PAGE: 14 OF 61

—srertrytmeiretei-

file://DAjttfoV2\module10\m10_121.htm

8/9/2011

FBI021039 ACLURM021248

JTFF CBT Page 1 of 1

---"MelINCIL01=9RN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Salat - Prayer

(U) In addition to personal supplications to God spoken or thought throughout the day, Muslims must pray (perform a specific religious ritual) five times each day at specific prayer times.

. Fajr—before sunrise

. Zuhr—just after noontime • `Asr—in late afternoon . Maghrib—just after sunset . Isha—at night

(U) Muslims must ensure that they meet the following seven requirements:

. Pray only at prayer time

. Perform the ritual of wudu— the washing of hands, face, and feet with water to become ritually pure

. Wear clean clothes

. Be in a clean place

. Wear pants, a shirt, scarf or veil over hair (women only) and/or robe to cover the body

. Face the direction of. Mecca

. Have the proper focus for prayer

QUIT :: PREVIOUS :: NEXT PAGE: 15 OF 61

SEC RN

file://pNtif0V2\module10\m10_122.11tin 8/9/2011

FBI021040 ACLURM021249

JTFF CBT Page 1 of 1

L'Lztb1//1UJ IJ

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab ' Culture And Familiarization

Islamic Religion And Society

(U) Zakat — Almsgiving

(U) Islam fights the temptation of avarice by requiring its practitioners to give up a fixed portion of their annual savings to be distributed to the poor. The third pillar is a 2.5% religious tax. Muslims must pay the tax to help them overcome the human natural tendency toward greed.

(U) According to Surah 59:9 of the Quran, "Those who are saved from the greed of their own selves, they are the ones who will prosper.;' Fulfilling a desire for material possessions can distract Muslims from their real purpose in life, which is surrendering themselves to God.

• QUIT :: PREVIOUS:: NEXT PAGE: 16 OF 61

sITT01777sams

file ://D AjttfoV2\module10 \ m 1 0_123 .htm 8/9/2011

FBI021041 ACLURM021250

JTFF CBT

Page 1 of 1

' sacasahLMesees

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Saum/Sivan - Fasting

(U) Because God despises gluttony as a terrible sin, the fourth pillar helps Muslims overcome gluttonous desires. Islam requires Muslims to fast as a means of self-purification and self-restraint. Such fasting allows them to focus on the purpose of life by bringing constant awareness of God's presence.

(U) Physically able Muslims must fast from sunrise to sunset (during the daylight hours) every day during the month of Ramadan. Fasting means abstaining from:

. All food and liquids

. Inhaled substances

. Sexual activity

. Nutritional or non-essential oral medicines

(U) In addition to abstaining from ingesting or inhaling anything during the daylight hours, fasting also requires Muslims to refrain from all normally undesirable behaviors. Thus, they cannot fight, curse, argue, lie, gossip, or commit other such sins.

QUIT:: PREVIOUS:: NEXT PAGE: 17 OF 61

—SECRBILWBORGIRR

file://D:\jttfoV2\module10\m10__124.htm 8/9/2011

FBI021042 ACLURM021251

JTFF CBT Page 1 of 1-

SEGREALAKIEM.

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society

(U) Hail - Pilgrimage

(U) Even before Islam, hajj was an Arab custom. Arabs from all over the Arabian Peninsula would travel to the heart of Mecca to perform customary rituals at the Kabah, an ancient cube-shaped shrine. The fifth pillar continues a customary practice.

(U) All Muslims must make a pilgrimage to Mecca during the pilgrimage month, the twelfth month of the Islamic lunar calendar, at least once or twice in their life. However, they must do this only if they can afford the trip without depriving their families.

QUIT :: PREVIOUS :: NEXT PAGE: 18 OF 61

rot---secizETTIERTIZ

file://D:\jttfoV2\module10\m10125.htm 8/9/2011

FBI021043 ACLURM021252

JTFF CBT Page 1 of 1

-szenstesaiN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (W Islamic Place of Worship: MasiId or Mosque

(U) The focal point of the Islamic community, the masjid is far more than simply the Muslim place of worship. Muslims routinely congregate at their masjid for prayer (especially the five daily prayers), teaching, meditation, reading, study, and reflection. Many mosques also go by the title Markaz al Islam! (Islamic Center).

QUIT ::PREVIOUS :: NEXT PAGE: 19 OF 61

szclar NOEORN

file://D:\jttfoV2\module10\m10_130.htm

8/9/2011

FBI021044 ACLURM021253

FBI021045

JTFF CBT Page 1 of 1

Middle East/Arab Culture And Familiarization

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

file://DAjttfoV2\module101m10_140.htm 8/9/2011

—SECIIMeHlieTWORN

Islamic Religion And Society rUl Islarn_and Arab/Middle Eastern Culture

(U) Culture and the Islamic religion are closely linked because Muslims believe that God controls all things in life; Islam affects a Muslims whole way of living.

(U) Arabs and Middle Easterners believe a religious affiliation is essential for every person irrtheir society. Mainstream Arabs place a great value on piety.

QUIT :: PREVIOUS :I NEXT PAGE: 20 OF 61

—911eRBSHNOFGH

ACLURM021254

JTFF CBT Page 1 of 1

SZERVI1430FORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Islamic Religion And Society ftil Arab Men and Women

Middle East/Arab Culture And Familiarization

(U) Arab men and women are careful about appearances when they meet, and Arab and Middle Eastern women go out of their way to avoid situations in which they would be alone with a man who is not a close relative. When men and women, other than close family relatives, do interact together for personal reasons, they do so with others present and generally at some kind of shared activity or social event. Women always attend mixed social events with their husband or other male relative.

(U) Arab and Middle Easterners consider it improper for a man and woman who are not closely related to be alone in a room together with the door shut or to travel with one another.

(U) Societal norms for Interactions between men and women vary among Arab countries, with the more fundamentalist Islamic countries being stricter in enforcing "proper behavior."

QUIT :: PREVIOUS :: NEXT PAGE: 21 OF 61

rirertaT/4110,Epai

file://DAjttfoV2\module101m10_150.htm 8/9/2011

FBI021046 ACLURM021255

• JTFF CBT

Page 1 of 1

srerriWtgereim

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) interactions Between Western Men and Arab or Middle Eastern Women

(U) Foreigners must be aware of the restrictions that pertain to contact between Arab men and women and consider their own appearance In front of others.

. Arabs gain a negative impression when too much familiarity is shown toward a person of the opposite sex, and in turn, they may interpret that you are a person of low moral standards.

. Western men may greet Arab women at a social gathering, but they should include other people in the greeting.

. In many Arab countries men and women separate into their own conversation groups at social gatherings.

• Married Western women may greet and visit with Arab men if accompanied by their husbands. • Westerners can expect to spend much of their social time in all-male or all-female groups.

QUIT :: PREVIOUS :: NEXT PAGE: 22 OF 61

seetterhtietreter

file://DAjttfoV2\module10\m10_160.htrn 8/9/2011

FBI021047 ACLURM021256

JTFF CBT

Page 1 of 1

4BeitlYrfint12111214

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Societal Structure

(U) Most Arab and Middle Eastern counties have three social classes assigned varying degrees of privilege:

. (U) Ulmer class • (U) Middle class • (U) Lower class

Nomadic Bedouin, who remain independent from the general society, don't fit into any of the social class structures. .

QUIT:: PREVIOUS:: NEXT PAGE: 23 OF 61

—SEZRETHNOVEGIII

file://D:\jttfoV2\module10\m10_170.htm 8/9/2011

FBI021048 ACLURM021257

n-Fix if tor i .i

JTFF CDT - 1;:vinclows Internet Explorer

[13, DO:foV24soclut401,m10_170.hbe v'..0.1 X , ^ _•- _____ • - _ • I• I.-- Fee Fa %eve Favortes Toots He

Favorites 114 FBI trtranst . -

:feXFF03T - El 6 - pao;. saw. Toils-

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DEB / stp/ lsg

b 7E

(1.1) Upper dose

(U) The Arab and igliddletaSternupPer class cun~isi. u.. r

4(wov. SJ My ono.

• Royalty • Large and Influential families • Some wealthy individuals

Foreign residents of Arab and Middle Eastern countries generally gain the privileges and esteem of the upper class.

Society in general expects certain kinds of behavior in public from members of the upper class who wish to keep their good Image and standing. Upper class persons generally do not:

• Perform manual labor In front of others • Dress and groom themselves when out in public • Intimately socialize with people from other classes • Mix people of different social classes at their parties or events

Cc) g; gjt 9'.001

FBI021049 ACLURM021258

1p or. it. / v• 011.: DiUttfoV2tmodiel5m10_170.hbo

rie Edt Mew Favorites Tads Help

5:z Favorites 1 4 b. FBI Intranet - .

- 4 • slum • ,.:

(9,,•-d7j7G,,Ai V Mr Corroder

6).1=41 JrFF CET- Window;

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB stp/ lsg

b7E

(U) Middle dass

The middle class comprises of:

. Government employees • Military officers • Teachers . Moderately prosperous landowners • Moderately prosperous merchants . Clerics

r

k.u.ortr

JTFECDT - y/indows Internet Explorer a

fl -0 tRr awe sdaty • iccir. 9.

FBI021050 ACLURM021259

man I

0 JIFF CBT •Windows Internet Explorer

,̀44? X' 17)1...,,iSisrei

- Page- saiaty• 'rods 4). *

Lit reUtdorAmoduktonmte_170.1trn

Fie Edit View Farad= Toth Hey

Fawthes I e,..) FeUrtranet

03114.cor

• Atom g My Cateuter

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH stp/ Isg

b7E

(U) Lower class

Other than the nomadic bedouln, anyone noi. in we upper dass. Such groups include:

• Peasant farmers • Urban poor . Village poor • Servants/manual laborers

GAELs1c,'' Fall 1nFn Itho Inwor

FBI021051 ACLURM021260

JTIF CDT - Windows Internet Explorer LEI '41. X! p IkoYST OVioV24rock1e 10010_17011km

Fde Edt View Fevorkes Tools Help Rondos MI Wend

faxvr CIX The Bedouin

la- Pegs. Sidi Tads- 40- "

0.00(2

gr.V Ccaputer - two%

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg

1. pp r

Nomadic Bedouin, who remain independent from Ute yeuelai bud=ty, %twat ft tcw arq :f tint scct'.! structures.

The functional social unit In Bedouin society is the wandering group - a number of extended families, all of who usually trace their descent to one common patrilineal ancestor. Such a unit camps together, wanders together in search of pasture for Its animals, practices endogamy, atcLhasz-strangty developed feeling of cohesion. Oa lieeder;seiRestore Bedouins comprise about 10% of the Arab population.

- 9:41

b7E

FBI021052 ACLURM021261

JTFF CBT

Page 1 of 1

-SECRSirmLataEZRN

JOINT TERRORISM TASK FORCE (iTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society

LUIFamily Structure

(U) Arab society is built around the extended family system with strong relationships evident with both the immediate and extended family. Extended families who live together have a definitive structure according to status and control with the adult male head of the household having the highest status and daughters of the head of the household having the lowest status.

(U) The Quran dictates that men should be the head of the family. Many Arab men often remain in their father's household, while Arab women always move to live and raise their children within their husband's household.

(U) Men are the public face of a family, making all decisions that affect the family's welfare. Women have a clearly defined place in the family that exists "behind the scenes" or out of the public eye, and publicly women are always expected to defer to the wishes of the males in their family.

QUIT:: PREVIOUS :: NEXT

PAGE: 24 OF 61 TECRISTHIWZOBN

file://D:\jttfoV2\module,10\m10_180.htm 8/9/2011

FBI021053 ACLURM021262

JIFF CBT Page 1 of 1

SECrrilt4GEOW

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Islamic Religion And Society (U) Family Obligations

(U) To Arab and Middle Easterners, family loyalty is second only to Islam, and adult men are responsible for caring for all family members, including the extended family.

QUIT :: PREVIOUS :: NEXT

PAGE: 25 OF 61 ---Strffr707F0P31

file://D:\jttfoV2\module10\ml0_190.htm 8/9/2011

FBI021054 ACLURM021263

JTFF CBT Page 1 of 1

SZelifiris401QMRN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

(U) Al-Qa'ida

(U) Formed in 1988, by Usama bin Laden to unite the Arabs in Afghanistan, Al-Qa'ida is the first multi-national terrorist group of the 21st century. Al-Qa'ida, comprising all extremist fundamentalist Sunni Muslims, has the following goals:

1. Establish Islamic states throughout the world 2. Overthrow non-Islamic states throughout the world 3. Expel U.S. and western influences from the Persian Gulf region

(U) Al-Qa'ida allies itself with other Islamic extremist groups, including the National Islamic Front and the Iranian Shiite organization, Hizballah, to achieve its goals. Bin. Laden, as Al-Qa'ida's leader, follows the original concepts of Muhammad as written in the. Quran, Sharia, and Hadith.

(U) Bin Laden does not make excuses for using terrorism because he believes he has Allah's blessings to commit violent acts and engage in mass casualty and catastrophic terrorism. Bin Laden promotes the belief that those who martyr themselves for Islam will go straight to heaven, with all sin forgotten. Because not all Muslims are assured a place in heaven, this belief accounts for the number of suicide operations Al-Qa'ida and other terrorists are willing to take. The broad-based ideology followed by Al-Qa'ida appeals to the young and continues to draw supporters, even in its currently weakened state.

QUIT :: PREVIOUS :: NEXT

PAGE: 26 OF 61 "JETIELMVHOPOBB

file://D:\jttfoV2\module10\m10_200.htrn 8/9/2011

FBI021055 ACLURM021264

b7E

JTFF CBT

Page 1 of 1

--s>"emuziOFORN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups ° (U) Al-Oa'Ida (Con't)

(U) In 1998, bin Laded announced the formation of a new organization called "Islamic World Front" for the Struggle Against the Jews and the Crusaders, making all non-Islamic nations and peoples a potential target for Al-Qa'ida. Under this banner, he issued a fatwa (contract) stating that "it is the duty of all" Muslims to kill U. S. citizens, both civilian and military, and their allies everywhere, and they can do so without fear of reprisal from Allah. In fact, some Muslims believe that they will face Allah's wrath on the Day of Judgment if they do not carry out fatwas issued by the religious leaders.

QUIT :: PREVIOUS :: NEXT PAGE: 27 OF 61

SECRET/ NO

file://D:\jttfoV2\module10\m10_210.htm 8/9/2011

FBI021056 ACLURM021265

JTFF CBT

Page 1 of 1

sa.m.i.r/iitava4

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

137 E

QUIT :: PREVIOUS :: NEXT PAGE: 28 OF 61

s.

file://D:\jttfoV2\module10\m10_220.htm 8/9/2011

FBI021057 ACLURM021266

JTFF CBT

—SECREIWUCCOliti

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT :: PREVIOUS :: NEXT PAGE: 29 OF 61

SVCRErntalrelt11—

file://D:\jttfoV2\module10\m10230.htrn

FBI021058 ACLURM021267

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT PREVIOUS :: NEXT PAGE: 30 OF 61

file://DAjttfoV21module101m10_240.htm 8/9/2011

FBI021059 ACLURM021268

JTFF CBT

Page 1 of 1

SEtTePhitieFGAIT-

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 31 OF 61 -SELIMI,LONWORN.-

file://DAjttfoV2\module10\tn10_250.htm 8/9/2011

FBI021060 ACLURM021269

JTFF CBT

-SEGRETALUOZOBN.

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Terrorist Groups

Middle East/Arab Culture And Familiarization

QUIT ::.PREVIOUS :: NEXT PAGE: 32 OF 61

Bgenth:LA=OP

file://D:\jttfoV2\module10\m10_260.htm

FBI021061 ACLURM021270

JTFF CBT Page 1 of 1

JOINT TERRORISM TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

LUI_Almgalda Command and Control

(U) Usama bin Laden is-widely recognized as Al-Qa'ida's founder and leader. His consultative council, the Majlis al-Shura, has a rotating membership. Bin Laden appoints individuals he trusts to key positions (basing such decisions on family ties, friendship, and nationality).

(U) Al-Qa'ida's organizational headquarters has operated out of Afghanistan, Sudan and Egypt. After the Taliban was removed from power in Afghanistan, members of AI-Qa'ida dispersed into small groups. Al-Qa'Ida is now spread across South Asia, Southeast Asia, and the Middle East. It may also have a presence in Mexico and the tri-border area of South America.

QUIT :: PREVIOUS:: NEXT PAGE: 33 OF 61

FEMPIVROLFORN

file://DAjttfoV2\module101m10_270.htm 8/9/2011

FBI021062 ACLURM021271

JTFF CBT

Page 1 of 1

—saanao/441evem

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

(U) Al-Oacida Activities

(U) Major terrorist attacks include:

. Bombing U.S. Embassies in Nairobi, Kenya and Dar es Salamm, Tanzania (August 1998). At least 301 people were killed and more than 5,000 were wounded.

. Directing the attack on the USS Cole In the port of Aden, Yemen (October 2000). Seventeen U.S. Navy personnel were killed and 39 were wounded.

• Hijacking and flying four airplanes. Two of the airplanes crashed into the • World Trade Center's twin towers. One airplane crashed into the Pentagon in Arlington, VA, and one airplane that was targeting either the capital or the White House in Washington, D.C., crashed into a field in Shanksville, PA (September 11, 2001). Over 3,000 individuals were killed/missing and thousands were wounded.

. Firebombing a synagogue In Tunisia (April 11, 2002). Nineteen people were killed and 22 were wounded.

. Bombing a hotel in Mombasa, Kenya where at least 15 individuals were killed and 40 were wounded (November 28, 2002).

QUIT:: PREVIOUS:: NEXT

PAGE: 34 OF 61 -sEcrcrrtfirerevet

file://D:\jttfoV2 \ module10 \ m 1 0280.htm 8/9/2011

FBI021063 ACLURM021272

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 35 OF 61

-seesset4410ECalN

file://DAjttfoV2\module10\m10_300.htm 8/9/2011

FBI021064 ACLURM021273

Page 1 of 1 JTFF CBT

Middle East/Arab Culture And Familiarization

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Terrorist Groups

FBI021065

SERAIII‘HtteMPORN

b7 E

QUIT :: PREVIOUS :: NEXT PAGE: 36 OF 61

—SEeRet,HOOSOPai

file://DAjttfoV2\ module10\ml 0_310.htm 8/9/2011

ACLURM021274

Page 1 of 1 JTFF CBT

Middle East/Arab Culture And Familiarization

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Terrorist Groups

file://D:\ittfoV2\module10\m10_320.htm 8/9/2011

FBI021066

://mymvxm

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 37 OF 61

SECRET•hitietweeti-

ACLURM021275

JTFF CBT

Page 1 of 1

bECRUL/MUkUAN

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 38 OF 61

-Mem/14740MM

file://D:\ittfoV2\module10\m10_330.htm 8/9/2011

FBI021067 ACLURM021276

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg

aJTFF 1.1,Jindows Internet Explorer

X pl'• DdEdeVAroxkielAm10_330.htm _ _

1;to Edt Woo Favertos Help

b7E *Favoribu I #2, FBI Intranet

I falIFFCBT a • 0 • Pap • Safety Tods "

h.

: rec.:013ml ; 4 • 4:103% •

JIFF CET • Yihrlow efr

FBI021068 ACLURM021277

fa 4t100% • 4:

wirt,),Poz‘

g MY COMPItei

jr.

'■ ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DME / StP, iSg

Help b7E

• €3

.672; o L4; otteforztmoduatovalo_33o.htm

Fie Etht Mew reveries Tools

Favates j' FBI

'03TFPCBT

4t.: X P (p.

Pepi• Safety • Teak •ge).

pur i Ls

Cliff CRT- Windows Internet Explorer

FBI021069 ACLURM021278

a CJTFF CEtT • Windows Internet Explorer

b 7 E

K--). rt: Dtttrov2vneddaimn._330.ht. Us Ea....Vlavo Routes Tools Yelp 1.4. Root= I te3 FM Intranet *rap am

x: - •

a • - Page Way • Teds

ALL INF OPEATI ON C OBTAINED HERE IN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DIM / stp/ 1s

4 compaer - • ALM% •

=1C JrFr CP • W1,16:05

FBI021070 ACLURM021279

a JTFF CDT Internet Explorer

x tp r:irn .cto tr:DAstd.,2unodukomio330.,,m Re Eck New Few:ekes Tools I.*

iR1 'E! E3 page Safety ■ To* •

Fevoaes I IA di FBI Irerarlet

I OMIT cur

- Mr! Calleuter 4 • Awn • ,

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg

.b7E

FBI021071 ACLURM021280

JTFF CBT

Page 1 of 1

BYCIRLPTHHOW3.12N

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b 7 E

QUIT :: PREVIOUS :: NEXT PAGE: 39 OF 61

SECRhx/ /FICIFORN

file://D:\jttfoV2\module10\m10_340.htm 8/9/2011

FBI021072 ACLURM021281

Page 1 of 1 JTFF CBT

Middle East/Arab Culture And Familiarization

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Terrorist Groups

8/9/2011 file://DAjttfoV2\module101m10350.htm

FBI021073

SE PORN

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 40 OF 61

SECREWAMOPORN

ACLURM021282

b7E

JTFF CBT

Page 1 of 1

SECRET111,0FORN

JOINT TERRORISM TASK FORCE ()TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT :: PREVIOUS :: NEXT PAGE: 41 OF 61

-SreggiS4140ZORN

file://D:\jttfoV2\module10\m1 0_360.htm 8/9/2011

FBI021074 ACLURM021283

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT:: PREVIOUS :: NEXT PAGE: 42 OF 61

51843RBIYINOVVRN

file://a\jttfoV2\module10\m10370.htm 8/9/2011

JTFF CBT

Page 1 of 1

-esensaftstwoRta

FBI021075 ACLURM021284

JTFF CBT Page 1 of 1

4seawhi0;49Peaul

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 43 OF 61 —SztnerfilimozoigN._

file://D:\ittfoV2\module10\m10_380.htrn 8/9/2011

FBI021076 ACLURM021285

Page 1 of 1 JTFF CBT

Middle East/Arab Culture And Familiarization

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Terrorist Groups

8/9/2011 file://DAjttfoV2\module10\m10390.htm

FBI021077

7EvarrttneveRN

'Jo 7E

QUIT :: PREVIOUS :: NEXT PAGE: 44 OF 61

--szanniftlieveaw

ACLURM021286

EMM C'...ITFF y/indows Internet Explorer

3TFF CE:T -Wf,r1O,••• lOyawAdesq*

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ lsg

o ONtifoVArneduloiCkm10 390.htm.

Edt New Puts Mob Rep

Fates I 14 Fal Intranet

_r 077 an

.;i X 1757,..e Sorrel

• 0 • Pogs• Safety. Tods • fit.

g WC:repute?

• r,por

FBI021078 ACLURM021287

J 11-T CBT

Page 1 of 1

trevrOMereRN

JOINT TERRORISM Middle East/Arab

TASK FORCE (3TTF) ORIENTATION

Radical Fundamentalist Terrorist Groups

Culture And Familiarization

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 45 OF 61

SE WALATOPOTCR

file://DAjttfoV2\module10\m10_400.htm

8/9/2011

FBI021079 ACLURM021288

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

_ggraiiiefiRinreRN

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

.b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 46 OF 61 Noisa• J.l IL1VC

file://D:\jttfoV2\module10\ml 0_410.htm

8/9/2011

JTFF CBT

Page 1 of 1

FBI021080 ACLURM021289

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT PAGE: 47 OF 61

sprn‘ml/NOFORN

file://D: \jttfoV2 \module10 \rn 1 0_420.htm 8/9/2011

JTFF CBT

Page 1 of 1

FBI021081 ACLURM021290

JTFF CBT

Page 1 of 1

---ETETEMTIYMOIPARN

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 48 OF 61

SECRBOORN

file://D: \ittfoV2 \ module10 \ m 1 0_430.htm 8/9/2011

FBI021082 ACLURM021291

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT:: PREVIOUS:: NEXT PAGE: 49 OF 61

file://D:\jttfoV2\module10\m10440.htm 8/9/2011

FBI021083 ACLURM021292

:b7E

QUIT:: PREVIOUS :: NEXT PAGE: 50 OF 61

biSL.V.Z.L

file://D:\jttfoV2\module10\m10_450.htm

8/9/2011

JTFF CBT

Page 1 of 1

_saaaasyYmerens

JOINT TERRORISM Middle East/Arab

TASK FORCE (JTTF) Culture And

ORIENTATION Familiarization

Radical Fundamentalist Terrorist Groups

FBI021084 ACLURM021293

JTFF CBT

Page 1 of 1

--SLPCROP-64140E011N

)DINT TERRORISM TASK FORCE (ITTF)

ORIENTATION

Middle East/Arab Culture. And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 51. OF 61 -919e1610/14110g0.11111-

file://DAjttfoV2\modulel01m10 460.htm 8/9/2011

FBI021085 ACLURM021294

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT:: PREVIOUS:: NEXT PAGE: 52 OF 61

—esemaght,imosous-

file://D:\jttfoV2\module10\m10_470.htm 8/9/2011

JTFF CBT

Page 1 of 1

--ILTRirrhvereabr.

FBI021086 ACLURM021295

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg

p 1.1.p Sevti o /#1- DAp.HoVArroduklOVn10470.1fts Flo Edk Vlo Favorites Took Help

Favatros I fq3 F0! Wreak

• WIMP arr - alb - Poos Sdety • Took 1.

g Carvukc

FBI021087

• f.t)"10,1_57:• 4Zit• • • • .affr- z0=, .M 3TFF CET - yrrdw,li .„

pp I • CJTEF CBT Windows Internet Explorer

Po, a

ACLURM021296

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNB / stp/ lsg

I pit- • t4

C JTFF CBT -1i,Vindows Internet Explorer

b7E

Ip troisevn v Lg; oNttforAmodutelulmituan.htet

Fie Ecit %ow Fawkes Tank HCIP

f4e Ftwentes 114 FEllIntranet

Ira•E3 ca, Faie• Safer Tads.. 00.

FBI021088 ACLURM021297

b7E - • -

v IktliorAnod1lalOW110170.1tro

Ile Eck Vim Favates TccEs Help

*Feytettee I cf,a, el Feuneraec<

9 *lama., Pe • ‘100% -

Ft kJ *El V. Ni .•l= MIT CET • W1,10,Z „.

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH stp/ 1sg

m. peps • Wyly • To*, "

, r Cif-FE COT • !aindows Internet Explorer

j

FBI021089 ACLURM021298

FBI021090

ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DMH / stp/ 1sg

b7E

aJTIF COT - Windows Internet Explorer

vslit o InttlroMmodaistoVa10_470.htm

Fie Eck Nero Pelotas Tads Nip

Favoitcs I krill Intranet

03wr car Ca • CI C3 • Page • Sorely • laic ■

PL

ACLURM021299

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT:: PREVIOUS :: NEXT

PAGE: 53 OF 61

file://D:\jttfoV2\module10\m10480.htm 8/9/2011

FBI021091 ACLURM021300

.b7E

JTFF CBT

Page 1 of 1

-SSCRSVILNOSOS11-

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT :: PREVIOUS :: NEXT PAGE: 54 OF 61

nutvRII

file://a\jttfoV2\module10\m10_490.htm 8/9/2011

FBI021092 ACLURM021301

JTFF CBT Page 1 of 1

spcurm//mnynom

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b 7E

QUIT :: PREVIOUS :: NEXT PAGE: 55 OF 61

SECEIVILAANGEGIDT

file://DAjttfoV2\module10\m10500.htm 8/9/2011

FBI021093 ACLURM021302

b7E

JTFF CBT Page 1 of 1

EAL•1cZ. J. / (MORS

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

QUIT :: PREVIOUS :: NEXT

PAGE: 56 OF 61 "ECEIETHEMEOUN

file://D:\jttfoV2\module10\ml 0_510.htm 8/9/2011

FBI021094 ACLURM021303

JTFF CBT Page 1 of 1

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Radical Fundamentalist Fundamentalist Terrorist Groups

Middle East/Arab Culture And Familiarization

b7E

QUIT :: PREVIOUS:: NEXT PAGE: 57 OF 61

-3ZERerfrisesess

file://DAjttfoV21module10\m10_520.htm

8/9/2011

FBI021095 ACLURM021304

JTFF CBT

Page 1 of 1

—saeaseHtterePaq

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 58 OF 61 —6BEIREITHMIPOItlf

file://D:\jttfoV2\module10\m10_530.htm 8/9/2011

FBI021096 ACLURM021305

JTFF CBT Page 1 of 1

—RECRErhitfePORN

]DINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Radical Fundamentalist Terrorist Groups

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 59 OF 61 --1:1139RBW,14410EORN

file://D:\jttfoV2\module10\m10_540.htm 8/9/2011

FBI021097 ACLURM021306

JTFF CBT Page 1 of 1

soememeeirorea

JOINT TERRORISM TASK FORCE (3TTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Module Review (U) The Middle East has a complex blithe,/ that impact:, national and International relationships today.

(U) The religion of Islam plays a significant role in Middle Eastern/Arab society.

(U) The following radical fundamentalist terrorist groups operate in the Middle East and worldwide:

b7E

QUIT :: PREVIOUS :: NEXT

PAGE: 60 OF 61 szeitsei-AlicEORX

file://DAjttfoV2\module10\m10_550.htm 8/9/2011

FBI021098 ACLURM021307

JTFF CBT

Page 1 of 1

.racamaylitterem

JOINT TERRORISM TASK FORCE (JTTF)

ORIENTATION

Middle East/Arab Culture And Familiarization

Module Review Congratulations, you have completed the"Joint Terrorism Task Force Orientation" course." After completing the attached EMITSAY 121eDEP select "Finish Module" at the bottom of the page to return to the course menu.

The purpose of this survey is to to gain a better understanding of your views concerning the overall effectiveness of the online course you have just completed. Please take the time to write comments, particularly if you disagree or strongly disagree with an item, since this type of feedback is especially useful in improving future training.

All responses are anonymous and the results will be compiled, analyzed, and reported as group data.

Thank you for your participation.

b7E

PREVIOUS FINISH MODULE

PAGE: 61 OF 61 . SBeftEMLYAK60211

file://D:\jttfoV2 \ module10 \ m 1 0_560.htm 8/9/2011

FBI021099 ACLURM021308