Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 3
Page 46
46 / 81
The TSC performs the following functions: 1) it receives identity information of potential
terrorists (name and identifying information) from different government agencies; 2) it merges
that identity information into the Terrorism Screening Database, which is used to assist the
palice officer, border official, or consular official in making a positive identity match with a
known or suspected terrorist; and 3). if there is a potential match with a known or suspected
terrorist, the TSC passes the mformation to the Bureau's CT Watch, which then coordinates
the operational response through the local JTTF.
For example, when a police officer on patrol encounters an individual and runs his or her
name through the National Crime Information Center (NCIC) system, the system now includes
a check against TSC's list of persons. with known or suspected links to terronsm. If that officer
gets a “hit” or match against the database, the officer receives prepared instructions such as
“arrest,” “detain,” or “question the individual” The officer is aiso instructed to call the TSC’s
24/7 call center, which assists in the identity match of the person encountered, and connects
the officer to CT Watch and the appropriate JTTF for further actions and investigation.
From December 1, 2003, through March 23, 2004, the TSC received 2,045 calls from state,
federal, and local law enforcement personnel, based on potential matches with known or
suspected terrorists These calls resulted in 835 positive identifications, some of whom have
been apprehended on various charges while others have been developed into informants or
subjected to surveillance. The following two are. examples:
* A local department contacted the TSC following aan NCIC “hit” after an arrest
on a minor charge. TSC contacted the local JTTF, who interviewed the subject
regarding his involvement with a domestic terrorist group. The subject agreed
to coeperate with the FBI and is now an informant on domestic terrorism matters.
* Local police arrested the subject of a an NCIC “hit” and found evidence jn his
vehicle that indicated surveillance of a possible terrorist target. They contacted
TSC, who confirmed the person’s identity and contacted the local JTTF, which
then expanded its existing investigation.
Law Enforcement Online
Law Enforcement Online (LEO) is a 24 hours a day, seven days a week, real-time, interactive
computer communications and infermation service — an Internet for the law enforcement,
criminal justice, and public safety communities. Over the past 31 months, we have expanded
our use of LEO to facilitate information sharing with state and municipal law enforcement and
first responders. For example, the NJUTTF and all of the JTTFs have established Special
Interest Groups on LEO, accessible to all law enforcement personnel, to facilitate the exchange
of terrorism information nationally and locally. We also interfaced LEO. with two other law
enforcement networks: 1) the National Law Enforcement Telecormmunications System (NLETS),
an information sharing network that connects state, municipal, and federal law enforcement
and justice agencies; and 2) the Regional Information Sharing Systems Network (RISS), that
provides law enforcement users with database pointer systems, investigative leads bulletin
boards, and encrypted e-mail
MISC Doc. 45 40 000000379
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic