HOME
*





Investigative Data Warehouse
Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."Morehart 2005, op. cit. Overview The size of the database appears to be growing rapidly. In 2004, according to a government solicitation for bids to manage the project, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spans formal techniques and practical considerations, including data modeling, efficient data representation and storage, query languages, security and privacy of sensitive data, and distributed computing issues, including supporting concurrent access and fault tolerance. A database management system (DBMS) is the software that interacts with end users, applications, and the database itself to capture and analyze the data. The DBMS software additionally encompasses the core facilities provided to administer the database. The sum total of the database, the DBMS and the associated applications can be referred to as a database system. Often the term "database" is also used loosely to refer to any of the DBMS, the database system or an appli ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


E-Government Act Of 2002
The E-Government Act of 2002 (, , , H.R. 2458/S. 803), is a United States statute enacted on 17 December 2002, with an effective date for most provisions of 17 April 2003. Its stated purpose is to improve the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within the Office of Management and Budget, and by establishing a framework of measures that require using Internet-based information technology to improve citizen access to government information and services, and for other purposes. The statute includes within it * FISMA (the Federal Information Security Management Act of 2002) as Title III, and * CIPSEA (the Confidential Information Protection and Statistical Efficiency Act) as Title V. Legislative history On 27 June 2002, the Act (the Lieberman Bill, or S. 803) passed the U.S. Senate on Unanimous Consent. House Hearing No. 107-184 on the proposed bill was held on 18 September 2002. Provisions * ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Loading And Analysis System
The Data Loading and Analysis System (DaLAS) is an electronic database used by the Federal Bureau of Investigation and United States Intelligence Community for counterintelligence and counterterrorism investigations. It is used to store copies of seized digital media, including disk images of CD-ROMs, DVDs, hard drives, mobile phones, and raw network feeds, as well as scans of physical documents. DaLAS supports the upload, processing, and classification of media, and provides a central, remotely accessed, searchable repository of data. The full details of DaLAS, including the number of files and total amount of stored data, are classified. During a 2011 investigation in the aftermath of the 2009 Fort Hood shooting, a query of Nidal Malik Hasan's personal email account returned a result on a hard drive image stored on DaLAS. The drive had been seized in 2007 in an unrelated New Jersey tax case. The match was a message posted to a web forum by Hasan on February 10, 2005, asking whethe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DCSNet
The Digital Collection System Network (DCSNet) is the Federal Bureau of Investigation (FBI)'s point-and-click surveillance system that can perform instant wiretaps on almost any telecommunications device in the US. It allows access to cellphone, landline, SMS communications anywhere in the US from a point-and-click interface. It runs on a fiber-optic backbone that is separate from the Internet. It is intended to increase agent productivity through workflow modeling, allowing for the routing of intercepts for translation or analysis with only a few clicks. The DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time. The DCSNet systems operate on a virtual private network parallel to the public Internet, with services provided at least for some time by the Sprint peerless IP network. Much of the information available on this system has come from the results of Freedom of Information Act (FOIA) requests mad ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

FBI Index
The FBI Indexes, or Index List, was a system used to track American citizens and other people by the Federal Bureau of Investigation (FBI) before the adoption of computerized databases. The Index List was originally made of paper index cards, first compiled by J. Edgar Hoover at the Bureau of Investigations before he was appointed director of the FBI. The Index List was used to track U.S. citizens and others believed by the FBI to be dangerous to national security, and was subdivided into various divisions which generally were rated based on different classes of danger the subject was thought to represent. General Intelligence Division In 1919, during the First Red Scare, William J. Flynn of the Bureau of Investigation appointed J. Edgar Hoover chief of the General Intelligence Division (GID). Hoover used his experience working as a library clerk at the National Archives to create the system using extensive cross-referencing. The GID took files from the Bureau of Investigations ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Open-source Intelligence
Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources (covert and publicly available sources) to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines. OSINT sources can be divided up into six different categories of information flow: *Media, print newspapers, magazines, radio, and television from across and between countries. *Internet, online publications, blogs, discussion groups, citizen media (i.e. – cell phone videos, and user created content), YouTube, and other social media websites (i.e. – Facebook, Twitter, , etc.). This source also outpaces a variety of other sources due to its timeliness and ease of access. *Public government data, public government repo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Central Intelligence Agency
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT) and performing covert actions. As a principal member of the United States Intelligence Community (IC), the CIA reports to the Director of National Intelligence and is primarily focused on providing intelligence for the President and Cabinet of the United States. President Harry S. Truman had created the Central Intelligence Group under the direction of a Director of Central Intelligence by presidential directive on January 22, 1946, and this group was transformed into the Central Intelligence Agency by implementation of the National Security Act of 1947. Unlike the Federal Bureau of Investigation (FBI), which is a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secondary Security Screening Selection
Secondary Security Screening Selection or Secondary Security Screening Selectee, known by its initials SSSS, is an airport security measure in the United States which selects passengers for additional inspection. People from certain countries are subject to it by default. The passengers may be known as Selectee, Automatic Selectee or the Selectee list. The number of names on the list fluctuates and is a secret, although the Transportation Security Administration apparently says there are tens of thousands of names on it. The Selectee list has been cited by civil liberties groups to be infringing on privacy rights and potential for racial and ethnic discrimination. Procedure when selected Passengers who have been selected for secondary screening will have the letters ''SSSS'' or ''*S*'' (all capitals) printed on their boarding passes as a signal for the need for a thorough search at security checkpoints. In the case of Southwest Airlines, secondary screening selectees may ha ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




No Fly List
The No Fly List maintained by the United States federal government's Terrorist Screening Center (TSC) is one of several lists included in algorithmic rulesets used by government agencies and airlines to decide who to allow to board airline flights. The TSC's No Fly List is a list of people who are prohibited from boarding commercial aircraft for travel within, into, or out of the United States. This list has also been used to divert aircraft away from U.S. airspace that do not have start- or end-point destinations within the United States. The number of people on the list rises and falls according to threat and intelligence reporting. There were 16,000 names on the list in 2011, in 2012, and in 2013. The list—along with the Secondary Security Screening Selection, which tags would-be passengers for extra inspection—was created after the September 11 attacks of 2001. The No Fly List, the Selectee List, and the Terrorist Watch List were created by George W. Bush's administrati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Transportation Security Administration
The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within, and connecting to the United States. It was created as a response to the September 11 attacks to improve airport security procedures and consolidate air travel security under a dedicated federal administrative law enforcement agency. The TSA develops broad policies to protect the U.S. transportation system, including highways, railroads, buses, mass transit systems, ports, pipelines, and intermodal freight facilities. It fulfills this mission in conjunction with other federal agencies and state partners. However, the TSA's primary focus is on airport security and the prevention of aircraft hijacking. It is responsible for screening passengers and baggage at more than 450 U.S. airports, employing screening officers in airports, armed Federal Air Marshals on planes, mobile teams of dog ha ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Bank Secrecy Act
The Bank Secrecy Act of 1970 (BSA), also known as the Currency and Foreign Transactions Reporting Act, is a U.S. law requiring financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, file reports if the daily aggregate exceeds $10,000, and report suspicious activity that may signify money laundering, tax evasion, or other criminal activities. The BSA is sometimes referred to as an anti-money laundering law (AML) or jointly as BSA/AML. History The BSA was originally passed by the U.S. Congress in 1970 and signed by President Richard Nixon into law on October 26, 1970. Shortly after passage, several groups attempted to have the courts rule the law unconstitutional, claiming it violated both Fourth Amendment rights against unwarranted search and seizure, and Fifth Amendment rights of due process. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]