◆ SpookStack

Declassified Document Archive & Reader
Log In Register
Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

9 11 Commission Report — Part 3

81 pages · May 08, 2026 · Document date: Sep 11, 2001 · Broad topic: Terrorism · Topic: 9 11 Commission Report · 81 pages OCR'd
← Back to feed
The TSC performs the following functions: 1) it receives identity information of potential terrorists (name and identifying information) from different government agencies; 2) it merges that identity information into the Terrorism Screening Database, which is used to assist the palice officer, border official, or consular official in making a positive identity match with a known or suspected terrorist; and 3). if there is a potential match with a known or suspected terrorist, the TSC passes the mformation to the Bureau's CT Watch, which then coordinates the operational response through the local JTTF. For example, when a police officer on patrol encounters an individual and runs his or her name through the National Crime Information Center (NCIC) system, the system now includes a check against TSC's list of persons. with known or suspected links to terronsm. If that officer gets a “hit” or match against the database, the officer receives prepared instructions such as “arrest,” “detain,” or “question the individual” The officer is aiso instructed to call the TSC’s 24/7 call center, which assists in the identity match of the person encountered, and connects the officer to CT Watch and the appropriate JTTF for further actions and investigation. From December 1, 2003, through March 23, 2004, the TSC received 2,045 calls from state, federal, and local law enforcement personnel, based on potential matches with known or suspected terrorists These calls resulted in 835 positive identifications, some of whom have been apprehended on various charges while others have been developed into informants or subjected to surveillance. The following two are. examples: * A local department contacted the TSC following aan NCIC “hit” after an arrest on a minor charge. TSC contacted the local JTTF, who interviewed the subject regarding his involvement with a domestic terrorist group. The subject agreed to coeperate with the FBI and is now an informant on domestic terrorism matters. * Local police arrested the subject of a an NCIC “hit” and found evidence jn his vehicle that indicated surveillance of a possible terrorist target. They contacted TSC, who confirmed the person’s identity and contacted the local JTTF, which then expanded its existing investigation. Law Enforcement Online Law Enforcement Online (LEO) is a 24 hours a day, seven days a week, real-time, interactive computer communications and infermation service — an Internet for the law enforcement, criminal justice, and public safety communities. Over the past 31 months, we have expanded our use of LEO to facilitate information sharing with state and municipal law enforcement and first responders. For example, the NJUTTF and all of the JTTFs have established Special Interest Groups on LEO, accessible to all law enforcement personnel, to facilitate the exchange of terrorism information nationally and locally. We also interfaced LEO. with two other law enforcement networks: 1) the National Law Enforcement Telecormmunications System (NLETS), an information sharing network that connects state, municipal, and federal law enforcement and justice agencies; and 2) the Regional Information Sharing Systems Network (RISS), that provides law enforcement users with database pointer systems, investigative leads bulletin boards, and encrypted e-mail MISC Doc. 45 40 000000379
OCR quality for this page
Community corrections
First editor: none yet Last editor: none yet
No user corrections yet.
Comments
Document-wide discussion. Follow the Community Standards.
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.

Continue Exploring

Use the strongest next step for this document: continue reading, jump to the topic hub, or move into the matching agency collection.
Continue Reading at Page 47
Jump straight to page 47 of 81.
Reader
9 11 Commission Report — Part 40
Stay inside 9 11 Commission Report with another closely related document.
Topic
FBI Documents & FOIA Archive
Open the FBI agency landing page for stronger archive context.
FBI
9 11 Commission Report Topic Hub
See the topic overview, related documents, and linked subtopics.
Hub

Agency Collection

This document also belongs in the FBI Documents & FOIA Archive landing page, which is the stronger starting point for agency-level browsing and for searches focused on FBI records.
FBI Documents & FOIA Archive
Open the agency landing page for introduction text, topic links, and more FBI documents.
FBI

Explore This Archive Cluster

This document belongs to the Terrorism archive hub and the more specific 9 11 Commission Report topic page. Use these hub pages when you want the broader collection context, linked subtopics, and more documents around the same archive thread.
investigation
Related subtopics
Amerithrax
56 documents · 3567 known pages
Subtopic
16th Street Church Bombing
33 documents · 4210 known pages
Subtopic
Irgun Zvai Leumi
8 documents · 264 known pages
Subtopic
American Nazi Party
2 documents · 120 known pages
Subtopic
Aryan Circle
2 documents · 36 known pages
Subtopic
Aryan Nation
2 documents · 121 known pages
Subtopic