The FBI's Counterterrorism Program

The FBI's Counterterrorism Program

U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88 6 Combat Transnational/National Criminal Organizations and Enterprises...88 7 Combat Major White-Collar Crime..............................................................88 8 Combat Significant Violent Crime...............................................................88 9 Support Federal, State, Municipal, and International Partners...................99 10 Upgrade Technology to Successfully Perform the FBI's Mission...............99 Implementing the New Priorities.............................................................99 1 Communication of Priorities........................................................................99 2 Priorities in the Budgetary Process...........................................................1010 3 Enforcement of Priorities...........................................................................1111 VI MOBILIZATION.......................................................................................1212 Personnel Mobilized.....................................................................................12 Expanded Operational Capabilities.......................................................13 1 Counterterrorism Watch............................................................................1313 2 National Joint Terrorism Task Force...........................................................14 3 Terrorism Financing Operations Section.......................................................15 4 Evidence Exploitation..................................................................................16 5 Fly-Away/Rapid Deployment Teams............................................................ 16 6 Foreign Terrorist Tracking Task Force.........................................................16 7 Bioterrorism Risk Assessment Group..........................................................17 8 Foreign Intelligence Surveillance Act Unit...................................................17 9 Language Translation.................................................................................17 10 Special Technologies and Applications Section..........................................18 11 Investigative Technology Division................................................................19 VII CENTRALIZATION............................................................................2020 Investigative Operations Branch.......................................................................2121 Operational Support Branch...............................................................................2222 Counterterrorism Analysis Branch....................................................................2222 VIII INTELLIGENCE INTEGRATION..............................................2323 Integrating Criminal and Intelligence Operations.......................................2323 Integrating Intelligence Processes in our Operations...............................2424 1 Initial Deployment of Analysts....................................................................2525 2 Office of Intelligence..................................................................................2525 3 Intelligence Program..................................................................................2525 EAD Intelligence...............................................................................2626 Concepts of Operations....................................................................2626 Field Office Intelligence Operations.....................................................28 Requirements Process.....................................................................2828 Baselining of Sources.......................................................................2929 Analytical Assets................................................................................29 Intelligence Production Board...........................................................3030 4 Intelligence Workforce................................................................................3131 Recruitment.......................................................................................3131 Special Agents Career Track............................................................3131 Training.............................................................................................3232 Program Evaluations........................................................................3434 Special Agent Evaluations................................................................3535 Evaluation of Special Agents in Charge...........................................3636 IX COORDINATION.................................................................................3737 State and Municipal Law Enforcement.....................................................3737 1 Task Forces...............................................................................................3838 2 Office of Law Enforcement Coordination...................................................3939 3 Terrorist Screening Center........................................................................3939 4 Law Enforcement Online...........................................................................4040 5 Alert Notification System............................................................................4141 6 Intelligence Bulletins..................................................................................4141 7 Information Sharing Pilot Projects..............................................................4141 8 Security Clearances...................................................................................4141 9 New Counterterrorism Training Initiatives..................................................4242 10 Behavior Analysis Unit...............................................................................4343 11 Regional Computer Forensic Laboratory Program....................................4343 Intelligence Community...............................................................................………..4343 1 Terrorist Threat Integration Center.......................................................………4343 2 Exchange of Personnel......................................................................................4444 3 Joint Briefings................................................................................................…..4444 4 Secure Networks............................................................................................….4444 5 Compatability of Information Technology Systems..............................4444 6 Terrorist Explosive Device Analytical Center....................................45 Department of Homeland Security...................................................................4545 Foreign Governments.....................................................................................................4646 1 International Investigations........................................................................4646 2 Expansion of Legal Attaché Offices...........................................................4646 3 Joint Task Forces and Operations.............................................................4747 4 Fingerprint/Identification Initiatives............................................................4747 5 International Training Initiatives.................................................................4848 Private Sector ..................................................................................................................4949 1 Community Outreach.................................................................................4949 2 Infragard....................................................................................................4949 3 Financial Sector Outreach.........................................................................5050 4 Railroad Initiative.......................................................................................5050

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    80 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us