FBI Seal Federal Bureau of Investigation
""
Home Site Map FAQs

Contact Us

Your Local FBI Office
Overseas Offices
Submit a Crime Tip
Report Internet Crime
More Contacts
Learn About Us
Quick Facts
What We Investigate
Natl. Security Branch
Information Technology
Fingerprints & Training
Laboratory Services
Reports & Publications
History
More About Us
Get Our News
Press Room
E-mail Updates Red Envelope
News Feeds XML Icon
Be Crime Smart
Wanted by the FBI
More Protections
Use Our Resources
For Law Enforcement
For Communities
For Researchers
More Services 
Visit Our Kids' Page
Apply for a Job
 

FBI Privacy Act Systems

 

Introduction

Hot Topics

Reading Room Index
Electronic Reading Room
FBI File Fact Sheet
FOIA Request Instructions
- FOIA Request Form
- Privacy Waiver and Certificate of Identity Form
Privacy Act Instructions
- Privacy Act Request Form
Privacy Impact Assessments
FBI Privacy Act Systems
Record/Information/Dissemination Section (RIDS)
FBI File Classification List
Major Information Systems
- Central Records System
- Fingerprint Identification Records System
- National Crime Information Center
- National DNA Index System
- National Instant Criminal Background Check System
DOJ Reference Guide
U.S. DOJ FOIA
Search

72 FR 47073 / 08-22-07

JUSTICE/FBI-019

System Name: Terrorist Screening Records System (TSRS)

Summary: The Federal Bureau of Investigtation proposes to amend its Terrorist Screening Records System, Justice/FBI-019, maintained by the Terrorist Screening Center, to make several changes to its existing notice.

Security Classification: Classified, unclassified (law enforcement sensitive).

System Location: Records described in this notice are maintained at the Terrorist Screening Center, Federal Bureau of Investigation, Washington, D.C., and at facilities operated by other government entities for terrorism screening, system back-up, and continuity of operations purposes.

Categories of Individuals Covered by the System:
a) Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism ("known or suspected terrorists");
b) Individuals who are the subject of queries against TSC information systems;
c) Individuals identified during a terrorism screening process as a possible identity match to a known or suspected terrorist and other individuals who accompany or travel with such individuals;
d) Individuals who are misidentified as a possible identity match to a known or suspected terrorist ("misidentified persons");
e) Individuals about whom a terrorist watchlist-related redress inquiry has been made; and
f) Individuals whose information is collected and maintained for information system user auditing and security purposes, such as individuals who are authorized users of TSC information systems.

Categories of Records in the System:
a) Identifying information, such as name, date of birth, place of birth, biometrics, photographs, passport and/or drivers license information, and other available identifying particulars used to compare the identity of an individual being screened with a known or suspected terrorist, including audit records containing this information;
b) Information about encounters with individuals covered by this system, such as date, location, screening entity, analysis, associated individuals, and results (positive or negative identity match), and, for encounters with known or suspected terrorists only, other entities notified and details of any law enforcement, intelligence, or other operational response;
c) For known or suspected terrorists, in addition to the categories of records listed above, references to and/or information from other government law enforcement and intelligence databases, or other relevant databases that may contain terrorism information;
d) For misidentified persons, in addition to the categories of records listed above, additional identifying information that will be used during screening only for the purpose of distinguishing them from a known or suspected terrorist who has similar identifying characteristics (such as name and date of birth);
e) For redress matters, in addition to the categories of records listed above, information provided by individuals or their representatives, information provided by the screening agency, and internal work papers and other documents related to researching and resolving the matter;
f) Information collected and compiled to maintain an audit trail of the activity of authorized users of TSC information systems, such as user name/ID, date/time, search query and results data, user activity information (e.g., record retrieval, modification, or deletion data), and record numbers; and,
g) Archived records and record histories from the Terrorist Screening Database, Encounter Management Application, and other TSC data systems that are part of the TSRS.

Authority for Maintenance of the System: Homeland Security Presidential Directive-6, "Integration and Use of Screening Information to Protect Against Terrorism" (Sept. 16, 2003); Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans," (October 25, 2005); the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108- 458; the National Security Act of 1947, as amended; and 28 U.S.C. 533. In the event that the TSC's continuity-of-operations plans are invoked, the agency that assumes TSC operational functions will have the authority to administer the Terrorist Screening Records System as necessary to carry out those functions.

Purpose(s):
a) To implement the U.S. Government's National Strategy for Homeland Security and Homeland Security Presidential Directive-6, to identify potential terrorist threats, to uphold and enforce the law, and to ensure public safety.
b) To consolidate the government's approach to terrorism screening and provide for the appropriate and lawful use of terrorist information in screening processes.
c) To maintain current, accurate and thorough terrorist information in a consolidated terrorist screening database and determine which terrorism screening processes will use each entry in the database.
d) To ensure that appropriate information possessed by State, local, territorial, and tribal governments, which is lawfully available to the Federal Government, is considered in determinations made by the TSC as to whether a person is a match to a known or suspected terrorist.
e) To host mechanisms and make terrorism information available to support appropriate domestic, and foreign terrorism screening processes, and private-sector screening processes that have a substantial bearing on homeland security.
f) To provide continual operational support to assist in the identification of persons screened and to facilitate an appropriate and lawful response when a known or suspected terrorist is identified in an authorized screening process.
g) To provide appropriate government officials, agencies, or organizations with information about encounters with known or suspected terrorists.
h) To assist persons misidentified during a terrorism screening process and to assist screening agencies or entities in responding to individual complaints about the screening process (redress).
i) To oversee the proper use, maintenance, and security of TSC data systems and TSC personnel.

Routine Uses of Records Maintained in the System, Including Categories of Users and the Purposes of Such Uses: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, the records or information in this system may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in accordance with blanket routine uses established for FBI record systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI Privacy Act System of Records, Justice/FBI-BRU, published on June 22, 2001 at 66 FR 33558 and amended on February 14, 2005 at 70 FR 7513. In addition, as routine uses specific to this system, the TSC may disclose relevant system records to the following persons or entities and under the circumstances or for the purposes described below, to the extent such disclosures are compatible with the purpose for which the information was collected. (Routine uses are not meant to be mutually exclusive and may overlap in some cases.)

A) To those federal agencies that have agreed to provide support to TSC for purposes of ensuring the continuity of TSC operations.

B) To federal, state, local, tribal, territorial, foreign, multinational or other public agencies or entities, to entities regulated by any such agency or entity, and to owners/operators of critical infrastructure or private sector entities with a substantial bearing on homeland security and their agents, contractors or representatives, for the following purposes:

(1) For use in and in support of terrorism screening authorized by the U.S. Government,
(2) to provide appropriate notifications of the results of terrorism screening using information from the Terrorist Screening Database or a threat related to a positive encounter with an individual identified in the Terrorist Screening Database,
(3) to facilitate any appropriate law enforcement or other response (e.g., medical and containment response to a biological hazard) to a known or suspected terrorist or a threat related to the encounter, and
(4) to assist persons misidentified during a screening process.

C) To any person, organization, or governmental entity in order to notify them of a serious terrorist threat for the purpose of guarding against or responding to such a threat.

D) To federal, state, local, tribal, territorial, foreign, or multinational agencies or entities, or other organizations that are engaged in, or are planning to engage in terrorism screening authorized by the U.S. Government, for the purpose of the development, testing, or modification of information technology systems used or intended to be used during or in support of the screening process; whenever practicable, however, TSC, to the extent possible, will substitute anonymized or de-identified data, such that the identity of the individual cannot be derived from the data.

E) To federal, state, local, tribal, territorial, foreign, multinational agencies or entities, or private sector entities to assist in coordination of terrorist threat awareness, assessment, analysis or response.

F) To any person or entity in either the public or private sector, domestic or foreign, where reasonably necessary to elicit information or cooperation from the recipient for use by the TSC in the performance of an authorized function, such as obtaining information from data sources as to the thoroughness, accuracy, currency, or reliability of the data provided so that the TSC may review the quality and integrity of its records for quality assurance or redress purposes, and may also assist persons misidentified during a screening process.

G) To any federal, state, local, tribal, territorial, foreign or multinational agency, task force, or other entity or person that receives information from the U.S. Government for terrorism screening purposes, in order to facilitate TSC's or the recipient's review, maintenance, and correction of TSC data for quality assurance or redress purposes, and to assist persons misidentified during a screening process.

H) To any agency, organization or person for the purposes of (1) performing authorized security, audit, or oversight operations of the DOJ, FBI, TSC, or any agency, organization, or person engaged in or providing information used for terrorism screening that is supported by the TSC, and (2) meeting related reporting requirements.

I) To a former employee of the TSC or a former contractor supporting the TSC for purposes of: Responding to an official inquiry by a federal, state, or local government entity or professional licensing authority, in accordance with any applicable government regulations; or facilitating communications with a former employee/ contractor that may be necessary for personnel-related or other official purposes where the TSC requires information and/or consultation assistance from the former employee/contractor regarding a matter within that person's former area of responsibility.

J) To any criminal, civil, or regulatory law enforcement authority (whether federal, state, local, territorial, tribal, multinational or foreign) where the information is relevant to the recipient entity's law enforcement responsibilities.

K) To a governmental entity lawfully engaged in collecting law enforcement, law enforcement intelligence, national security information, national intelligence, or terrorism information for law enforcement, intelligence, or counterterrorism purposes.

L) To appropriate agencies, entities, and persons when:

(1) the Department of Justice suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
(2) the Department of Justice has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Department or another agency or entity) that rely upon the compromised information; and
(3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department of Justice's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.

Disclosure to Consumer Reporting Agencies: None.

Policies and Practices for Storing, Retrieving, Accessing, Retaining, and Disposing of Records in the System:
Storage: Records in this system are stored in paper and/or electronic format. Electronic storage is on servers, CD[ndash']ROMs, DVD-ROMs, and magnetic tapes.

Retrievability: Records in this system are typically retrieved by individual name, date of birth, passport number, and other identifying data, including unique identifying numbers assigned by the TSC or other government agencies.

Safeguards: All records are maintained in a secure government facility with access limited to only authorized personnel or authorized and escorted visitors. Physical security protections include guards and locked facilities requiring badges and passwords for access. Records are accessed only by authorized government personnel and contractors and are protected by appropriate physical and technological safeguards to prevent unauthorized access. All Federal employees and contractors assigned to the TSC must hold an appropriate security clearance, sign a non-disclosure agreement, and undergo privacy and security training.

Retention and Disposal: Records in this system will be retained and disposed of in accordance with the records schedule approved by the National Archives and Records Administration. For records maintained in the Terrorist Screening Database, active records are maintained for 99 years and inactive (archived) records are maintained for 50 years. Records of possible encounters with individuals on the Terrorist Screening Database are maintained for 99 years. Records of redress inquiries and quality assurance matters are maintained for at least six years. Audit logs are maintained for 25 years and records of user audits are maintained for ten years.

System Manager(s) and Address: Director, Terrorist Screening Center, Federal Bureau of Investigation, FBI Headquarters, 935 Pennsylvania Avenue, NW., Washington, DC 20535-0001.

Notification Procedure: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement, and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act.

Requests for notification should be addressed to the FBI at the address and according to the requirements set forth below under the heading "Record Access Procedures."

Record Access Procedures: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act. A request for access to a non-exempt record shall be made in writing with the envelope and the letter clearly marked "Privacy Act Request." Include in the request your full name and complete address. The requester must sign the request; and, to verify it, the signature must be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. You may submit any other identifying data you wish to furnish to assist in making a proper search of the system. Requests for access to information must be addressed to the Record Information Dissemination Section, Federal Bureau of Investigation, 935 Pennsylvania Avenue, NW., Washington, DC 20535-0001.

Contesting Record Procedures: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement and intelligence programs, records in this system are exempt from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests for amendment should be addressed to the FBI at the address and according to the requirements set forth above under the heading "Record Access Procedures."

If, however, individuals are experiencing repeated delays or difficulties during a government screening process and believe that this might be related to terrorist watch list information, they may contact the Federal agency that is conducting the screening process in question ("screening agency"). The screening agency is in the best position to determine if a particular problem relates to a terrorist watch list entry or is due to some other cause, such as a criminal history, an immigration violation or random screening. Some individuals also experience repeated delays during screening because their names and/or other identifying data, such as dates of birth, are similar to those of known or suspected terrorists. These individuals, referred to as "misidentified persons," often believe that they themselves are on a terrorist watch list, when in fact they only bear a similarity in name or other identifier to an individual on the list. Most screening agencies have or are developing procedures to expedite the clearance of misidentified persons during screening.

By contacting the screening agency with a complaint, individuals will be able to take advantage of the procedures available to help misidentified persons and others experiencing screening problems. Check the agency's requirements for submitting complaints but, at a minimum, individuals should describe in as much detail as possible the problem they are having, including dates and locations of screening, and provide sufficient information to identify themselves, such as full name, citizenship status, and date and place of birth. The TSC assists the screening agency in resolving any screening complaints that may relate to terrorist watch list information, but does not receive or respond to individual complaints directly. However, if TSC receives any such complaints, TSC will forward them to the appropriate screening agency.

Additional information about the redress process and how to file a complaint with a screening agency is available on TSC's Web site at http://www.fbi.gov/terrorinfo/counterrorism/redress.htm.

Record Source Categories: Information in this system is obtained from individuals covered by the system, public sources, agencies and private sector entities conducting terrorism screening, law enforcement and intelligence agency record systems, government databases, and foreign governments.

Exemptions Claimed for the System: The Attorney General has exempted this system from subsections (c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and (8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k). These exemptions apply only to the extent that information in the system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k). Rules have been promulgated in accordance with the requirements of 5 U.S.C. 553(b), (c) and (e).

 

Dated: August 14, 2007