Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 4
Page 40
40 / 57
2. How does the interactian between the FBI and DBS take place with respect ta sach
information?
Response:
Interaction between the PBL and DHS tikes place on a mimberoflevels DHS
representatives attend the FBI's Darly Intelkgence Production Board meetings;
DHS members are part. of the NITTF at FSIHO: avtelhgence components at
FBINO are in daily contact with DAS intelligence components to coordinate
mielheence reporting and analysis; end DHS component orgamizations have
substantial representation m.the JTTFs in the feld.
Multiple vehicles have been developed specufiically to convey threat information
between the FRE and DHS.
Me RA ~~
The Emergent Threat Imtelligence/Informanon Svatem. The Emergent Threat
Intell:gence/Information system was developed primarily as a means of
communication between the DHS Homeland Security Operations Center and the
FBI's CT Watch in our SIOC. This mierface occurs via several secure mediums,
including telephone, facsimile transmission, and Secret Intemmet Protocol Router
Network (SIPRNET) or Joint Worldwide Intelligence Commurseations Systern
(JWICS) corapater tranemisnon, Ibis anticipated that future communication will
be processed (as allowed) via the FRIES (law enforcement sensitive} computer
system. Examples of the types of mtelligence requests made through this system
include name checks of persons of interest on incoming fights, major
developments m ongoing operations or investigations, and short notice wnite-ins
or bomb threats. A commurcaton is deemed "emergent threat" when the request
is time sensitive and a routine or formal method of unteragency notiheation would
detay the transmission of potentially critical information.
miformation request has been established to address specific ongoimyg or longterm
mtelligence or information requests. Utilizing this medram, DHS submuts a
detailed request for specific information te the FBI CTD's Executive Staff at
FBINO After the mformaton 1s properly vetted for case sensitive content, a
response ss provided to DHS via the same cable transrassyon mediuni.
Routmne Intell:eence or information Routine mtelligence or information is
disseminated to DHS, the USIC, the law enforcement community, and ultimately
the private sector via mtelligence bulletins that are issued weekly and as
necessary The FBT currently is warking with DHS to provide a unified
disserination system to prevent conflicting or duplicative messages An example
af this jount effort is FBIHO’s Terronsm Watch and Wamimeg Unit, which provides
adraft of the Weekly Intelligence Bulletin to DHS for input prior to publication,
ay?
aD.
MISsc. REQ. #53 000004706
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic