Professional Documents
Culture Documents
£&'•'&*
:; T-~^;:i-.: -;.-
o
^|*Sf.H
Sf^?S^M'*t'^Vs^>";;: :r:- L '• .
:p§^p£||:py&:-^|gier-v
li OF TERRORISTS
$Mfc^fest~iivV,v-"..Vv.«:. . • -
SEPTEMBER 11, 2001
• .
RESPONSIVE
MfSSfe ^: tO
ftia^
^fift -iliSfe*'^:: :
FEDERAL BUREAU OF INVESTIGATION
000000001
Req 13-6
9/11 Law Enforcement Privacy /9/11 Law Enforcement
Sensitive
From.: ounte£t=
_mmeai=
SIOC C Home-^paae
Hom bv selecting the, Aviation Alert List \or by the
-'-agc: I I if for some re'ason, the
\ o f f i c e cannbt r e t r i e v e the list of'-gndividuals, then \d
personnel a r e ' x t o imrnediatelv contact'! J'-in SIOC
o.perations at L J a n d the list will be sent by
facsimile transmission, This list will be uodated twice
daily.
names of-, those individuals with whom the FBI has ongoing Full
Field or''-.Preliminary Investigations. Off-ices are directed 'to
alert UC I ~ J and/or UC'L J if any individuals
listed on the "Associates" spreadsheet are under current
investigation.
so on.
Set Lead 1:
From: Counterterrorism
Contact: AD Pasquale J. D'Amuro p/11 Law Enforcement Privacy
Approved By: Mueller III Robert S
Watson Dale T,
Drafted BY:
The TWL will consist of a compendium of names based on information identified through
FBI and Joint Terrorism Task Force investigations. U.S. Intelligence Community reporting, and Department
of Defense intelligence gathering, as well as information provided by foreign intelligence/security services.
Although potential candidates for inclusion on the TWL will come from multiple sources, the FBI will
decide which names are ultimately placed on the TWL. The FBI also will decide into \vhich systems TWL
names will be entered (e.g.. some names may be forwarded to the Violent Gang Terrorist Organizations File
[YGTOF] maintained by NCIC. while other names may be forwarded to other databases, to include the Visa
Viper System operated by the Department of State, the FAA Watch List, or other systems).
The TWL will be designed to assist both the intelligence and the law enforcement
communities in their investigations of terrorist groups/individuals. TWL staff will coordinate with the
Criminal Justice Information Services (CJIS) Division to ensure the utilization of appropriate NCIC files
(i.e., VGTOF). This capability will provide all state and local law enforcement agencies ready access to this
'information. Information in the TWL will also be shared with U.S. Government agencies that operate
comparable tracking systems.
The TWL will be divided into three distinct categories. The first category will include the
names of individuals for whom formal criminal charges or indictments have been handed down (e.g.. the
22\s on the Most Wanted Terrorist list). The second category will include the names of
individuals under Full Investigations by the FBI, (Preliminary Investigations may be recommended by a
Field Office or selected by FBfHQ for inclusion into the TWL.) The third category of the TWL will include
the frames of individuals of interest to the FBI but who may not be the subjects of an active FBI investitzation
The list will be based upon criteria established by CTD. Individuals on the TWL will be
listed with identifying information, much like a "wanted" poster.
The CTAWU staff will maintain TWL international and domestic terrorism files covering
various classifications, such as 199.265.174.266. and 279. These case files will contain a sub-file for each
of the individuals listed in the TWL. These sub-files will be worked much the same way that field office
investigative case files are handled. This applies to persons who are not readily identifiable with a field
division. As a result, preliminary investigative steps will be undertaken by FBIHQ. For example, records
checks will be performed, leads will be set. and intelligence and biographical information will be
accumulated and maintained in these sub-files, until such information is developed to allow a field office
designation. When sufficient information has been developed, an EC will be generated to the field directing
that a case be opened and assigned. In situations where a field division already has an investigation opened,
the FBIHQ sub-file will mirror the field case file and will only be maintained at FBIHQ for reference.
The initial TWL will include the 22 individuals named to the Most Wanted Terrorists list
(Category One. as discussed above), other individuals being sought in connection with the PENTTBOM
Req 13 ~ 6 000000022
9/11 Law Enforcement Privacy
investigation, and all Full Field investigation subjects. From this starting point, the TWL staff will expand
the list, as appropriate, base'd-..on contributions from the sources identified above. A protocol will be
established and mechanisms will'be put in place to ensure full utilization of this asset. The CTD and TWL
staff, in coordination with relevant FBIHQ divisions, will develop the protocol and establish the mechanisms
necessary for utilizing the TWL. The field will be advised by'EC when this protocol has been developed.
However, in the interim, beeinninc on the date of this EC. field offices are advised to direct all inquiries and
candidates for inclusion on the TWL to Unit Ch'ie-fl \" ail "1 FBIHQ. Room
5432. In addition to the name, field offices will be asked to provide as many of the following identifiers as
possible for each submission: date of birth (essential), known aliases, alien registration number, social
security number, terrorist group affiliation, race, height, weight, and hair color.
LEAD(s):
Set Lead 1:
ALL RECEIVING OFFICES
Be"innin" 0^/"'0/"I002. receiving offices should direct all inquiries and Preliminary- Inquiry
candidates for inclusion on the TWL to Unit nhiefl ~"l. CTAWU.,.al\ . /• FBIHQ. Room
5432. In addition to the name, field offices should provide as ..many of the following identifiers _as possible
for each submission: date of birth (essential), known aliases,_ alien registration number, social security
number, terrorist group affiliation, race, height, weight, and hair color.
Set Lead 2:
CQUNTERTERR PRISM
AT TAWU
/' 9/11 Law Enforcement Privacy
By 04/15/2002, one (1) Supervisory Special Agent (SSA) and six (6) Intelligence Operations
Specialists will be reassigned to manage and implement the Terrorism Watch List in accordance with the
general framework outlined in the "Details" section of this EC.
1 - Mr.
1 -Mr.
1 -Ms.
1 - Mr.
Drafted By: |_
„„ f 000000025
Req 13-6
n: '-.our.terte:
e: 06/10/20C2
i) Subject of investigation is
target of classified collection techniques
or FULL investigation was opened based upon
single source reporting.
II. THE FBI TERRORISM WATCH LIST AND NCIC SILENT HITS
heading).
The f o u r sub-grcups will be comprised of:
Req 13-6
000000029
To: All Field Offx s From: Counterter. ;ism Division
Re: 66F-HQ-A1255362 Date: 06/10/2002
in
In an
an effort
e f o r to reduce the risk of another law
o re
enforcement a ency compromising an active FBI ^est.gat.on by
matcbinq a single subject to a specific organization, iBiHy
matching c, i y .redefine the Terrorist Organization
Classifications
tions For all
a Domestic
omes Terrorism subjects, the
" Organization Classification is: Domestic Extremist
™STXTMST*DFBI). For all International Terrorism subjects,
the Terrorist Organization Classification is: International
Extremist (INTRNTL XTMSTS*IFBI] .
All field offices that have the capability to enter
information to CJIS.
All field offices are reminded to continue to
initiate and use the two tiered Reporting and Audit system
referenced on page three (3) of the communication located at
III HO A1255362 serial 68. Additionally, all receiving
S; lie In^ted to continue using a 66 classification
Administrative file) for their divisions and use that file
^ ethe
into ^o ri
NCIC s^
system.
000000032
Req 13-6
To: All Field Offices From: Countertei .Srism Division
Re: 66F-HQ-A1255362 Date: 06/10/2002
LEAD (s):
Set Lead 1:
Set Lead 2:
10
CJIS
11
Drafted By:
Case ID #: 66F-HQ-C1250689
Title: CJIS DIVISION VIOLENT GANG AND TERRORIST ORGANIZATION
FILE
Synopsis: Instructions to all field offices to utilize new terrorist organization group/subgroup codes and
to modify all NCIC VGTOF terrorist records to new codes.
Reference: 66F-HQ-A1255362 Serial 104
Enclosure(s): Modification chart/worksheet
Details: As all recipients are aware, the National Crime
Information Center (NCIC) Violent Gang and Terrorist
Organization File (VGTOF) has been utilized since January
£(jvz in an effort to prevent potential terrorist attacks.
The referenced electronic communication provides direction
for the entry of Counterterrorism Program subjects into the
NCIC VGTOF.
SUBGROUPS
Category 1
IndividualsXwho are the subject of formal criminal
charges or indictments\(this includes individuals1 named to the
Most Wanted Terrorist List). ALL field offices and FBIHQ's
Counterterrorism Threat Assessment and Warning Unit (CTAWU) have
the ability to enter subjects into VGTOF using this category.
The new VGTOF subgroup codes which are to be used are listed
below:
Domestic NCIC Code:
International NCIC Code:
Caveat:
WARNING - APPROACH WITH CAUTION - ARMED AND DANGEROUS.
PLEASE ARREST AND DETAIN INDIVIDUAL. ONCE THE
I N D I V I D U A L IS SECURELY D E T A I N E D , IMMEDIATELY CONTACT
YOUR LOCAL FBI FIELD O F F I C E .
Category 2
Caveat:
Caveat:
Req 13-6
000000038
_ -._.,. . .
9/11 Law Enforcement Sensitive
<• -
To: All Field Ofr- ;es From: CJIS
Re:1-,.. 66F-HQ-C1250689, 01/11/2002
Category 4
Individuals of Active Investigative interest. For
example, the individuals the FBI wanted to interview who were
identified as part -pf the Penttbom Watch List could be entered
into VGTOF using this... category. Only'the FBIHQ's CTAWU has the
ability to enter subjects into VGTOF using this category. The
new VGTOF subgroup codes' '--.which are to be used are listed below:
Domestic NCIC Code:
International NCIC Code:
Caveat:
WARNING - APPROACH WITH CAUTION. HOWEVER, MAKE NO EFFORT
TO ARREST INDIVIDUAL UNLESS THERE IS EVIDENCE OF A
VIOLATION OF FEDERAL, STATE, OR LOCAL STATUTE (S). ONCE AN
INDIVIDUAL IS IDENTIFIED WITHIN THIS SYSTEM, CONDUCT ALL
LOGICAL INVESTIGATION UTILIZING TECHNIQUES AUTHORIZED IN
YOUR JURISDICTION. DO NOT ALERT THE INDIVIDUAL TO THE
FBI'S INTEREST AND CONTACT YOUR LOCAL FBI FIELD OFFICE AT
THE EARLIEST OPPORTUNITY.
All new VGTOF terrorist entries and existing VGTOF
records should use the aforementioned codes. Per the referenced
EC, all field offices have been directed to use the new codes
when making VGTOF record entries. In addition, all field offices
are directed to modify existing VGTOF records to reflect the new
group and subgroup codes .
Below is an example of an existing VGTOF terrorist
record. Please note this is a test record.
!/ 4
9/11 Law Enforcement Sensitive
9/11 Law Enforcement Privacy
LEAD(s):
Set Lead 1:
2) All existing VGTOF records should be modified to reflect the new codes.
3} The CJIS Division will continue to update existing VGTOF records foi/
COUNTERTERRORISM
AT WASHINGTON. DC
9/11 Law E n f o r c e m e n t P r i v a c y
•-^--errorisrr
•-o7852.'°12/24/2;
^ ^ ^ o r o " ^ - ana
waning n
UnL,- .
Terrorism Watch List and the appropriate
.cUo-in,
information as available:
a.
b.
c.
d.
f.
h.
k.
1.
- h ^ ' c o m m u n i c a t i o n should ^
s p e c i f i c a l l y^sLate ^
•- i f u n c T = s - - ' i e d photocraphs of the individual (s)
A v a i l a b l e , ' f i e l d o f f i c e s should include -he p h o t o g r a p h s , in
izonz-C _ o — - •?.at, as enclosures to their commur.ica-ions.
000000044
Req 13-6
9/11 Law Enforcement Privacy
LEAD(s) :
Set Lead 1:
From: CJIS
Programs Development Section/Global Initiatives
Unit/Module C-3 - / .
Contact: 1
Approved By:
\ information is provided,
please ensure the information is valid and complete.
GANG/GROUP
Domestic Extremist NCIC Code:
International Extremist NCIC Code:
It is important to ensure the proper codes are used so
the appropriate warning is appended to the record. The warning
caveat directs federal, state, and local law enforcement on
proper procedures upon an encounter with the subject listed in
VGTOF.
SUBGROUP
Category 1
Caveat:
Category 2
Caveat:
Category 3
LEAD(s) :
Set Lead 1: (Action)
ALL RECEIVING OFFICES
Attention: ADIC, SACs, JTTF POCs
Please disseminate to personnel responsible for
submitting VGTOF and Silent Hit entries, modifications, and
cancellations to CJIS and ensure that requests are submitted
according to instructions thus allowing CJIS to process requests
effectively and expeditiously.
44
Precedence: ..mmeciate
Drafted By: I I
,0 . 000000004
Req 13-6
1 Law Enforcement
Sensitive
err
From: Counterter ism
Da-e: 09/15/2001
Re.:
_
determine whether any of the individual ease be advise tha
are a current or continuous threat . Pleas
separate list designated as the Non-L£Q list, containing just
rhe\s and known identifiers of the "Watch List.," but not
cert'ain law 'enforcement sensitive information has been
provided to the FAA and all major commercial air carriers.
1 individual.
10/7/03
V
Req 13-6
000000006
Division
rroir.: Ccunzertez:
Da~e: OS/15/2001
Re: I~J leac
placed
an
noved
individual on the "Watch List" cannot be detained through
criminal or INS process, the decision as to whether or not the
individual is allowed to board a commercial aircraft remains
solely with the private airline companies, who can refuse to
provide air services,
„,„„.,
SIOC operations at
000000007
Req 13-6
Tc: All Offices • Frcr,: Counzerrerr isiu 'JiV^sj-y.:
Re: Irrnediare lead Daze: 09.'15/2001
LEAD (s) :
Set Lead 1 :
000000008
Req 13-6
9/11 Law Enforcement Privacy *
Title: PENTBOMB;
"PROJECT LOOKOUT"
00:NY
Synopsis: To set forth OGC's opinion on the entry of information on
United States Persons (USPER) and Non-United States Persons
(NONUSPER) results of investigations conducted pursuant to the
Project Lookout "Watch List."
Reference: 265A-NY-280350-2164
Details: Following the terrorist attacks of September 11,
2001, numerous FBI field divisions engaged in a logical
investigation of the suspected terrorist subjects. In the
interests of safety and security for the public and the
security of future commercial air travel, the investigation
expanded from the terrorist subjects themselves to other
individuals who may be linked to the criminal acts that
occurred on September 11, 2001. Based upon criteria_outlined_
bv Project Lookout personnel, FBI personnel are compiling a list
of individuals who might be associates of the subjects,
i" t-.
material witnesses to the attacks or logically connected
the criminal activity.
„„ . 000000009
Req 13-6
To: Counterterroi ~ rrorr.: oenera_ Counsel
Re: 265A-KY-28035v-KLC, 10/01/2001
Req 13-6
000000010
To: C o u n ~ e r t e r r c srn Frorr.: G e n e r a l Couns?
Re: 255A-NY-230350-v\L:, 1 0 / C 1 / 2 0 0 1
LEAD(s):
Set Lead 1:
ALL RECEIVING OFFICES
Read and clear.
From: Counterterrorismn
ITOS/UBL/R /RM 5328
Contact: UC[1 m
Approved By: Pickard Thomas J •9/11 Law Enforcement Privacy
Watson Dale L
D'Amuro Pasquale J /
Drafted By: |_
Title: PENTTBOM
"PROJECT LOOKOUT"
OO: NY
000000012
Req 13-6
All Field
265A-NY-230350-WLC, 10/23/2001
9/11 Law E n f o r c e m e n t
Sensitive 000000013
Req 13-6
Frorr.:
10/23/2001
,_ c 000000014
Req 13-6
To: All Field Of! jes
Re: 265A-NY-280350-KLC, 10/23 '2001
LEAD(s) :
Set Lead 1:
Precedence:
66F-HQ-C1321794 (Pending)
,, , 000000016
Req 13-6
Law Enforcement
;nsitive
Based upon trie need for increased safetv for the Clvmcic
Games and the necessity for increased information sharing with cur
law enforcement partners, senior FBI management personnel concluded
that due to the substantial 'risk imposed upon the 20C2 V3inter Olympic
Games that each field division''-.would search their files to compile a
list of subjects from the Counte'rterrorisTn orogram who could oose a
threat to the Olympic Games. Therefore, all field offices are
directed to^immediately compile ~ list of all Coun.terterrorism
Program subjects from ooen Domestic Terrorism and International
Terrorism cases (Preliminary Inquiries and Full, Investigations''. All
assigned personnel are to immediately access and_retrieve the names,
dates of birth, social security numbers and- othe.r relevant
unclassified identifying information, such as-, descriptive data
(height, weight, eye _colorT hair color, etc.) , .miscellaneous numbers
(passport numbers, etc.), operator license niimberSj and vehicle
i.nf orm.at.ion, of ALL investigative classifications for Domestic_and
\l Terrorism, including cases concerning \____ "1
•/ "~1 and then, task vour NCIC operators
to load all names and identifying information into the NCIC VGTOF
file by CO 3 February 1, 2002. Additional information concerning
details for entry into the VGTOF can be found in the NCIC Operating
, VGTOF Chapter.
Req 13-6
000000017
11 Law Enforcement Sensitive
. • • • • — „__-,
~ H"" 3 r ~ ii ~ CHCdC'Z-— "-' —C •^.._—_
"•!_" LTi-^^'d di."z^si,o"*™ £.v"-- — c '.T.= .^j ~^,o 3'c.i^r*1.LI
•5 n "H 2T V 2T £ C U S S "C .
who ha-
ini orrn.5L.ion intio
-'^^•-- the NCIC VGTOr file must use ^he following Terrcrist
Organi:=~ion Clsssificarions and corresponding codes prior LO
entering individual subjecr inf orms-ion. For Dcmesric Terrcrisrr.
subjecLs, -he Terrorist Organicerion
:v a.
oa^Cuiar^ub^crof'i^omes^ror ^^^^^^fb, , ^, of
iSS IgDlLSl-lisS'SS,,
information, .o .ncluae p.^m- ii\ ^-,^v = d in HCIC ii.s.
and numeric identiriers capable o. a^_^y --" ^ 5Ociai security
^S^??4ii?rShatiUandi?ocar!ari^-"-^^^^
and t
an trackin
r a c i n g - W - ^ - . —- _ " _ „ an
0*--,~*
^a^Bon should coordinate wirh .h = _r =t = -= an
-ar.ners to ensure consistent application
en^rcem
rhe system
i, c 000000019
Req 13-6
LEAD (s):
Set Lead 1:
RECEIVING OFFICES
Req 13-6
000000020