[Federal Register: August 22, 2007 (Volume 72, Number 162)]
[Notices]               
[Page 47073-47079]
                    

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

Federal Bureau of Investigation

[AAG/A Order No. 028-2007]

 
Privacy Act of 1974; System of Records

AGENCY: Federal Bureau of Investigation, DOJ.

ACTION: Notice to amend system of records.

-----------------------------------------------------------------------

SUMMARY: The Federal Bureau of Investigation proposes to amend its 
Terrorist Screening Records System, Justice/FBI-019, maintained by the 
Terrorist Screening Center, to make several changes to its existing 
notice. Public comments are invited.

DATES: The Privacy Act requires that the public be given 30 days in 
which to comment on any new or amended uses of information in a system 
of records. In addition, the Office of Management and Budget (OMB), 
which has oversight responsibilities under the Act, and the Congress 
must be given 40 days in which to review major changes to Privacy Act 
systems. Therefore, the public, OMB, and the Congress are invited to 
submit written comments on this revised Privacy Act system of records. 
Please submit any comments by October 1, 2007.

ADDRESSES: Address all comments to Kenneth P. Mortensen, Deputy Privacy 
and Civil Liberties Officer, U.S. Department of Justice, 950 
Pennsylvania Ave., NW., Washington, DC 20530, facsimile number (202) 
616-9627.

[[Page 47074]]


FOR FURTHER INFORMATION CONTACT: Kenneth P. Mortensen, (202) 514-3853.

SUPPLEMENTARY INFORMATION: On July 28, 2005, the Department of Justice, 
Federal Bureau of Investigation (FBI) published a new Privacy Act 
System of Records notice, the Terrorist Screening Records System 
(TSRS), Justice/FBI-019, to cover records maintained by the Terrorist 
Screening Center (TSC), the system owner. See 70 FR 43715. Records in 
the TSRS include the Terrorist Screening Database (TSDB), records in 
the Encounter Management Application (EMA) that document the 
operational support TSC provides to agencies that screen for terrorists 
(``screening agencies''), and records related to the TSC's internal 
quality assurance process to ensure the terrorist data is thorough, 
accurate and current. The TSC also maintains records related to the 
resolution of terrorist watchlist-related redress complaints.
    The TSC now proposes modifications to the system to expand the 
scope of the system, and to increase the clarity of the notice. The 
following explains the proposed modifications:

General Changes

    The previous system notice used the terms ``terrorist screening'' 
and ``terrorism screening'' interchangeably to describe the same 
process. This notice is being modified so that only the term 
``terrorism screening'' is used, making it consistent with the language 
in Homeland Security Presidential Directive 6 (HSPD 6). This system 
notice also makes use of the term Terrorism Information as defined in 
section 1016 of the Intelligence Reform and Prevention Act of 2004 
(Pub. L. 108-458).

System Location

    The current system of records notice for Justice/FBI-019 states 
that the records are located at the TSC, Federal Bureau of 
Investigation, Washington, DC. The notice has been amended to reflect 
that records in Justice/FBI-019 may also be located in secondary 
locations for system back-up and continuity-of-operations purposes.

Categories of Individuals

    The TSC is expanding the categories of individuals covered by this 
system to cover individuals who are authorized users of the underlying 
information systems described by this system of records, such as the 
TSDB and EMA, since audit logs documenting their use will be maintained 
in connection with the system.
    Currently, only TSC personnel can perform queries directly against 
the TSDB, EMA, and other internal TSC databases. In the future, the TSC 
plans to operate a query function permitting authorized individuals 
from screening agencies or entities to access TSC systems directly from 
an external location and submit search queries. Collection and 
maintenance of information through audit logs about authorized users 
will allow the TSC to monitor who uses TSC information systems for what 
purpose, in order to ensure compliance with applicable laws and policy. 
Therefore, the TSC is modifying this system of records notice to 
account for this fact.
    Additionally, the TSC is clarifying that this system of records 
covers all individuals whose names or identifying information is 
collected to perform a query against TSC information systems, such as 
TSDB, but who are not necessarily individuals whose information is 
generally maintained as terrorist information in the TSDB. For example, 
in certain instances, individuals' names are queried directly against 
the TSDB or EMA to see if there is a possible record match and, if 
there is not, their names may be retained in an audit trail that 
records the activity of authorized users of TSC information systems. 
The system notice is being modified to make clear that these 
individuals' information is also included in this system of records.
    The TSC is adding a new category to cover individuals who accompany 
or travel with a person when that person is an actual match to a known 
or suspected terrorist identity in the TSDB and when the TSC or 
screening agency or entity identifies that person as such during a 
terrorism screening process. The TSC collects this information in the 
course of encounters with known or suspected terrorists. For example, 
an encounter can include times when an individual was in the car along 
with a person matching an identity in the TSDB during a traffic stop by 
state or local law enforcement officers. TSC maintains this information 
about such individuals in EMA and not in the TSDB, and shares it as 
appropriate with other agencies for law enforcement and intelligence 
purposes consistent with the routine uses of this system of records.

Categories of Records

    The TSC is adding new categories of records to cover audit logs for 
TSC systems, and archived records and record histories for the TSDB and 
other TSC systems.
    As discussed above, audit log records allow the TSC to monitor who 
uses TSC systems for what purpose in order to ensure compliance with 
applicable laws and policy. A TSDB record history is a log of any 
previous changes to the current version of a TSDB record.
    Archived TSDB records are TSDB records that pertain to individuals 
who are no longer eligible for inclusion in the TSDB, because those 
individuals no longer meet the criteria for inclusion in the TSDB as a 
known or suspected terrorist. The TSC retains these records in an 
archive that is logically separate from other TSDB data and may be 
accessed only by a limited number of TSC personnel who have undergone 
specialized training on the sensitivity of these records and the 
permissible reasons for access.
    Pursuant to TSC policy, archived TSDB records may only be accessed 
for the following purposes: (1) Redress, (2) litigation, (3) quality 
assurance (e.g., to determine if a record correction is required to an 
existing record in a TSC or other agency system), (4) to respond to 
requests from oversight bodies and auditors, and to perform internal 
audits, (5) to evaluate TSC performance and data in the event of 
another terrorist attack or attempted attack, and to support any 
related investigation, and (6) when access is otherwise required by law 
(e.g., Freedom of Information Act (FOIA) request). Archived TSDB 
records are not used or made available for any watchlisting purposes. 
The search function for the TSDB archive requires that prior to 
accessing the TSDB archive authorized TSC personnel must identify an 
approved purpose with information supporting the need for access. This 
information is maintained in a detailed audit log, which is routinely 
reviewed by TSC compliance personnel.
    Additionally, the TSC is modifying other descriptions of categories 
of records to clarify the types of information held in the TSC systems.
    The TSC is adding language to clarify that records of encounters 
may include information about individuals who accompany or travel with 
a person when that person is an actual match to a known or suspected 
terrorist identity in the TSDB and the TSC or screening agency or 
entity identifies that person as such during a terrorism screening 
process.
    The TSC is also modifying Item (a) To add ``photograph'' as a 
specific type of identifying data that may be contained in the TSRS. 
While a photograph may be considered a biometric, which is already 
listed in Item (a), TSC is listing photographs as a separate item to 
ensure clarity.
    The TSC is modifying Item (b) By changing the term ``agency'' to 
``entity'' to reflect that entities other than a

[[Page 47075]]

federal government agency may engage in terrorism screening. Item (b) 
is also being modified by removing the language ``terrorist 
encounters'' and replacing it with ``encounters with known or suspected 
terrorists,'' which is a more precise characterization, because Item 
(a) in the Categories of Individuals defines the phrase ``known or 
suspected terrorists.''
    The TSC is also modifying Item (c) to make clear that TSRS may also 
include references to or information from other relevant databases that 
contain terrorism information, in the event such databases are not 
considered law enforcement or intelligence databases.

Authority for Maintenance of the System

    The TSC is adding the following legal authorities: the National 
Security Act of 1947, as amended; the Intelligence Reform and Terrorism 
Prevention Act of 2004, Pub. L. 108-458, 18 Stat. 3638 (December 17, 
2004); and Executive Order 13388, ``Further Strengthening the Sharing 
of Terrorism Information to Protect Americans,'' (October 25, 2005). 
TSC is removing the reference to Executive Order 13356, which has been 
superseded by Executive Order 13388.
    Also, the TSC is adding language to provide notice that in the 
event that the TSC's continuity-of-operations plans are invoked, the 
agency that assumes TSC operational functions will have the authority 
to administer the Terrorist Screening Records System as necessary to 
carry out those functions and will act consistent with the obligations 
required by the Privacy Act of 1974 in the maintenance of TSRS as a 
Privacy Act System of Records.

Purpose Statement

    Consistent with the changes discussed above regarding auditing of 
TSC data systems, the TSC is expanding the purpose of the system of 
records to clarify that one purpose is to conduct appropriate oversight 
of the proper use of TSC data systems.
    The language in Item (e) Is being modified to add the quoted 
language below to more accurately reflect TSC's mission, as set forth 
in HSPD 6, to provide support for private sector screening processes 
``that have a substantial bearing on homeland security.''
    The language in Item (f) is being modified to remove the word 
``agency's'' and insert the word ``authorized'' preceding the term 
``screening process'' to more accurately describe the type of screening 
TSC may perform. The word ``agency'' was removed because not all 
terrorism screening is necessarily performed by a federal government 
agency. The word ``authorized'' was added because all terrorism 
screening processes using TSC data must be authorized by the TSC 
pursuant to the standard articulated in HSPD 6.
    The language in Item (g) Is being changed to add the word 
``organizations'' to the list of entities and individuals that may 
receive information about encounters with known or suspected 
terrorists. This change is intended to better reflect the ongoing 
efforts by the federal government to increase sharing of intelligence, 
law enforcement and terrorism information with the State and local 
governments, fusion centers, and critical infrastructure owners and 
operators, consistent with the privacy protections required by the 
Privacy Act and as articulated in this notice.
    The language in Item (h) is being changed by removing the word 
``repeatedly'' from the phrase ``to assist persons repeatedly 
misidentified during a terrorism screening process.'' This change is 
intended to clarify that an individual does not have to be 
misidentified more than once for the TSC to act to provide assistance 
through a redress process or other means. Conforming changes are being 
made to the notice to remove the word ``repeatedly'' from Routine Uses 
B, F, and G, and the categories of individuals (Item (d)).

Routine Uses

    Routine Use B listed for Justice/FBI-019 permits disclosure of 
information to various entities in order to, among other things 
``provide appropriate notifications of a positive terrorist encounter 
or a threat related to the encounter.'' The TSC is modifying this 
language to clarify that the TSC may notify an entity of not only a 
positive match to the terrorist watchlist, but also a negative or 
inconclusive match. Also, the TSC is modifying this Routine Use to 
include ``private sector entities with a substantial bearing on 
homeland security'' as described in HSPD-6 as potential recipients of 
information. Finally, the TSC is modifying the language in purpose (2) 
of this Routine Use to make clear that a positive encounter means an 
encounter with an individual who is identified in the TSDB, and to 
clarify purpose (3) of this Routine Use by adding the modifiers ``known 
or suspected'' to the terms ``terrorist'' and ``threat related to the 
encounter.''
    Routine Use D permits disclosure of information for the 
development, testing, or modification of information technology systems 
used or intended to be used during or in support of the screening 
process, but indicates TSC will use de-identified data whenever 
possible. The TSC is modifying the language of this Routine Use to 
clarify that ``de-identified data'' means data that cannot be used to 
derive an individual's identity and to note that de-identified data 
will be used to the extent practicable and possible.
    Routine Use E permits disclosure of information to various agencies 
or entities to assist in the coordination of terrorist threat 
awareness, assessment, analysis, or response. The TSC is modifying this 
language to include private sector entities in the list of entities 
that may receive information from TSRS for these purposes. This change 
is intended to better reflect the ongoing efforts by the federal 
government to increase sharing of intelligence, law enforcement, 
terrorism and threat information with State fusion centers and the 
private sector, such as critical infrastructure and key resource owners 
and operators, consistent with the privacy protections required by the 
Privacy Act.
    Routine Use H permits disclosure of information in support of 
authorized audit or oversight operations of the DOJ, including FBI and 
TSC, or any agency engaged in or providing information used for 
terrorism screening supported by the TSC. The TSC is modifying this 
Routine Use to include authorized security operations as a permissible 
purpose for sharing information, thereby allowing the TSC to disclose 
information to the investigating entity in the context of a security-
related investigation or inquiry, such as a personnel investigation or 
inquiry into a breach of data security. Additionally, the TSC is 
expanding the scope of this Routine Use by adding language that would 
allow disclosure if the subject of the security, audit, or oversight 
operation was not a Federal agency but an organization or individual 
that was engaged in or providing information used for terrorism 
screening that is supported by the TSC. These changes will allow the 
TSC to disclose information to support any oversight efforts into TSC-
related activities.
    Routine Use K permits disclosure of information to a governmental 
entity lawfully engaged in collecting law enforcement, law enforcement 
intelligence, or national security intelligence information for law 
enforcement or intelligence purposes. TSC is modifying this Routine Use 
by changing ``national security intelligence information'' to 
``national security information'' and ``national intelligence,'' which 
are terms defined

[[Page 47076]]

by Executive Order 12958, as amended, and the Intelligence Reform and 
Terrorism Prevention Act amendments to the National Security Act of 
1947, respectively. Also, the TSC is specifying counterterrorism as one 
of the purposes for which information may be disclosed under this 
Routine Use, which is consistent with TSC's counterterrorism mission.
    The Department of Justice previously published a notice modifying 
all of the Department's systems of records, including TSRS, to include 
a routine use to permit the disclosure of information to appropriate 
persons and entities for purposes of response and remedial efforts in 
the event that there has been a breach of the data contained in the 
Department's systems of records. See 72 FR 3410 (Jan. 25, 2007). The 
TSC is adding new Routine Use L to this notice to reflect this change.

Retention and Disposal

    Although TSC is a multi-agency organization, the FBI administers 
TSC. Recently, the FBI obtained approval from the National Archives and 
Records Administration for its request for records disposition 
authority for records created and maintained by the TSC. The TSC is 
modifying this language to provide information on the approved 
retention periods for TSC records described in Justice/FBI-019. For 
records maintained in the Terrorist Screening Database (TSDB), active 
records are maintained for 99 years and inactive (archived) records are 
maintained for 50 years. Encounter Management Application (EMA) 
records, which document positive, negative, and inconclusive screening 
encounters with individuals in the TSDB, are maintained for 99 years. 
TSC maintains EMA records on negative encounters, i.e., a person who is 
initially identified as a possible match to a TSDB identity but 
ultimately determined not to be a match, in order to expedite future 
screening of those individuals and to support the redress process. 
Records of redress inquiries and quality assurance matters are 
maintained for at least six years. Audit logs are maintained for 25 
years and records of user audits are maintained for ten years.

Contesting Record Procedures

    The TSC is adding language to this section to refer individuals to 
the TSC's public Web site for additional information on the redress 
process and the procedures for filing a complaint related to terrorism 
screening.

Record Source Categories

    The TSC is modifying this section to include ``private sector 
entities engaged in terrorism screening'' as a record source category. 
This change is being made to reflect that the TSC may receive 
information for screening from the private sector in support of the 
TSC's mission, as set forth in HSPD 6, to support ``private sector 
screening processes that have a substantial bearing on homeland 
security.''

Public Comments Invited

    Public comments are invited on all aspects of the revised system 
notice, including the retention periods for records and the new 
categories of individuals and records. See ADDRESSES section above for 
information on how to submit comments.
    In accordance with 5 U.S.C. 552a(r), the Department of Justice has 
provided a report of this amended system of records to the Office of 
Management and Budget and to Congress.

    Dated: August 14, 2007.
Lee J. Lofthus,
Assistant Attorney General for Administration.
JUSTICE/FBI-019

System name:
    Terrorist Screening Records System (TSRS).

Security classification:
    Classified, unclassified (law enforcement sensitive).

System location:
    Records described in this notice are maintained at the Terrorist 
Screening Center, Federal Bureau of Investigation, Washington, D.C., 
and at facilities operated by other government entities for terrorism 
screening, system back-up, and continuity of operations purposes.

Categories of individuals covered by the system:
    a. Individuals known or appropriately suspected to be or have been 
engaged in conduct constituting, in preparation for, in aid of, or 
related to terrorism (``known or suspected terrorists'');
    b. Individuals who are the subject of queries against TSC 
information systems;
    c. Individuals identified during a terrorism screening process as a 
possible identity match to a known or suspected terrorist and other 
individuals who accompany or travel with such individuals;
    d. Individuals who are misidentified as a possible identity match 
to a known or suspected terrorist (``misidentified persons'');
    e. Individuals about whom a terrorist watchlist-related redress 
inquiry has been made; and
    f. Individuals whose information is collected and maintained for 
information system user auditing and security purposes, such as 
individuals who are authorized users of TSC information systems.

Categories of records in the system:
    a. Identifying information, such as name, date of birth, place of 
birth, biometrics, photographs, passport and/or drivers license 
information, and other available identifying particulars used to 
compare the identity of an individual being screened with a known or 
suspected terrorist, including audit records containing this 
information;
    b. Information about encounters with individuals covered by this 
system, such as date, location, screening entity, analysis, associated 
individuals, and results (positive or negative identity match), and, 
for encounters with known or suspected terrorists only, other entities 
notified and details of any law enforcement, intelligence, or other 
operational response;
    c. For known or suspected terrorists, in addition to the categories 
of records listed above, references to and/or information from other 
government law enforcement and intelligence databases, or other 
relevant databases that may contain terrorism information;
    d. For misidentified persons, in addition to the categories of 
records listed above, additional identifying information that will be 
used during screening only for the purpose of distinguishing them from 
a known or suspected terrorist who has similar identifying 
characteristics (such as name and date of birth);
    e. For redress matters, in addition to the categories of records 
listed above, information provided by individuals or their 
representatives, information provided by the screening agency, and 
internal work papers and other documents related to researching and 
resolving the matter;
    f. Information collected and compiled to maintain an audit trail of 
the activity of authorized users of TSC information systems, such as 
user name/ID, date/time, search query and results data, user activity 
information (e.g., record retrieval, modification, or deletion data), 
and record numbers; and,
    g. Archived records and record histories from the Terrorist 
Screening Database, Encounter Management Application, and other TSC 
data systems that are part of the TSRS.

[[Page 47077]]

Authority for maintenance of the system:
    Homeland Security Presidential Directive-6, ``Integration and Use 
of Screening Information to Protect Against Terrorism'' (Sept. 16, 
2003); Executive Order 13388, Further Strengthening the Sharing of 
Terrorism Information to Protect Americans,'' (October 25, 2005); the 
Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-
458; the National Security Act of 1947, as amended; and 28 U.S.C. 533. 
In the event that the TSC's continuity-of-operations plans are invoked, 
the agency that assumes TSC operational functions will have the 
authority to administer the Terrorist Screening Records System as 
necessary to carry out those functions.

Purpose(s):
    a. To implement the U.S. Government's National Strategy for 
Homeland Security and Homeland Security Presidential Directive-6, to 
identify potential terrorist threats, to uphold and enforce the law, 
and to ensure public safety.
    b. To consolidate the government's approach to terrorism screening 
and provide for the appropriate and lawful use of terrorist information 
in screening processes.
    c. To maintain current, accurate and thorough terrorist information 
in a consolidated terrorist screening database and determine which 
terrorism screening processes will use each entry in the database.
    d. To ensure that appropriate information possessed by State, 
local, territorial, and tribal governments, which is lawfully available 
to the Federal Government, is considered in determinations made by the 
TSC as to whether a person is a match to a known or suspected 
terrorist.
    e. To host mechanisms and make terrorism information available to 
support appropriate domestic, and foreign terrorism screening 
processes, and private-sector screening processes that have a 
substantial bearing on homeland security.
    f. To provide continual operational support to assist in the 
identification of persons screened and to facilitate an appropriate and 
lawful response when a known or suspected terrorist is identified in an 
authorized screening process.
    g. To provide appropriate government officials, agencies, or 
organizations with information about encounters with known or suspected 
terrorists.
    h. To assist persons misidentified during a terrorism screening 
process and to assist screening agencies or entities in responding to 
individual complaints about the screening process (redress).
    i. To oversee the proper use, maintenance, and security of TSC data 
systems and TSC personnel.

Routine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, the records or information in this system 
may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in 
accordance with blanket routine uses established for FBI record 
systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI 
Privacy Act System of Records, Justice/FBI-BRU, published on June 22, 
2001 at 66 FR 33558 and amended on February 14, 2005 at 70 FR 7513. In 
addition, as routine uses specific to this system, the TSC may disclose 
relevant system records to the following persons or entities and under 
the circumstances or for the purposes described below, to the extent 
such disclosures are compatible with the purpose for which the 
information was collected. (Routine uses are not meant to be mutually 
exclusive and may overlap in some cases.)
    A. To those federal agencies that have agreed to provide support to 
TSC for purposes of ensuring the continuity of TSC operations.
    B. To federal, state, local, tribal, territorial, foreign, 
multinational or other public agencies or entities, to entities 
regulated by any such agency or entity, and to owners/operators of 
critical infrastructure or private sector entities with a substantial 
bearing on homeland security and their agents, contractors or 
representatives, for the following purposes: (1) For use in and in 
support of terrorism screening authorized by the U.S. Government, (2) 
to provide appropriate notifications of the results of terrorism 
screening using information from the Terrorist Screening Database or a 
threat related to a positive encounter with an individual identified in 
the Terrorist Screening Database, (3) to facilitate any appropriate law 
enforcement or other response (e.g., medical and containment response 
to a biological hazard) to a known or suspected terrorist or a threat 
related to the encounter, and (4) to assist persons misidentified 
during a screening process.
    C. To any person, organization, or governmental entity in order to 
notify them of a serious terrorist threat for the purpose of guarding 
against or responding to such a threat.
    D. To federal, state, local, tribal, territorial, foreign, or 
multinational agencies or entities, or other organizations that are 
engaged in, or are planning to engage in terrorism screening authorized 
by the U.S. Government, for the purpose of the development, testing, or 
modification of information technology systems used or intended to be 
used during or in support of the screening process; whenever 
practicable, however, TSC, to the extent possible, will substitute 
anonymized or de-identified data, such that the identity of the 
individual cannot be derived from the data.
    E. To federal, state, local, tribal, territorial, foreign, 
multinational agencies or entities, or private sector entities to 
assist in coordination of terrorist threat awareness, assessment, 
analysis or response.
    F. To any person or entity in either the public or private sector, 
domestic or foreign, where reasonably necessary to elicit information 
or cooperation from the recipient for use by the TSC in the performance 
of an authorized function, such as obtaining information from data 
sources as to the thoroughness, accuracy, currency, or reliability of 
the data provided so that the TSC may review the quality and integrity 
of its records for quality assurance or redress purposes, and may also 
assist persons misidentified during a screening process.
    G. To any federal, state, local, tribal, territorial, foreign or 
multinational agency, task force, or other entity or person that 
receives information from the U.S. Government for terrorism screening 
purposes, in order to facilitate TSC's or the recipient's review, 
maintenance, and correction of TSC data for quality assurance or 
redress purposes, and to assist persons misidentified during a 
screening process.
    H. To any agency, organization or person for the purposes of (1) 
performing authorized security, audit, or oversight operations of the 
DOJ, FBI, TSC, or any agency, organization, or person engaged in or 
providing information used for terrorism screening that is supported by 
the TSC, and (2) meeting related reporting requirements.
    I. To a former employee of the TSC or a former contractor 
supporting the TSC for purposes of: Responding to an official inquiry 
by a federal, state, or local government entity or professional 
licensing authority, in accordance with any applicable government 
regulations; or facilitating communications with a former employee/
contractor that may be necessary for personnel-related or other 
official purposes where the TSC

[[Page 47078]]

requires information and/or consultation assistance from the former 
employee/contractor regarding a matter within that person's former area 
of responsibility.
    J. To any criminal, civil, or regulatory law enforcement authority 
(whether federal, state, local, territorial, tribal, multinational or 
foreign) where the information is relevant to the recipient entity's 
law enforcement responsibilities.
    K. To a governmental entity lawfully engaged in collecting law 
enforcement, law enforcement intelligence, national security 
information, national intelligence, or terrorism information for law 
enforcement, intelligence, or counterterrorism purposes.
    L. To appropriate agencies, entities, and persons when (1) the 
Department of Justice suspects or has confirmed that the security or 
confidentiality of information in the system of records has been 
compromised; (2) the Department of Justice has determined that as a 
result of the suspected or confirmed compromise there is a risk of harm 
to economic or property interests, identity theft or fraud, or harm to 
the security or integrity of this system or other systems or programs 
(whether maintained by the Department or another agency or entity) that 
rely upon the compromised information; and (3) the disclosure made to 
such agencies, entities, and persons is reasonably necessary to assist 
in connection with the Department of Justice's efforts to respond to 
the suspected or confirmed compromise and prevent, minimize, or remedy 
such harm.

Disclosure to consumer reporting agencies:
    None.

Policies and practices for storing, retrieving, accessing, retaining, 
and disposing of records in the system:
Storage:
    Records in this system are stored in paper and/or electronic 
format. Electronic storage is on servers, CD[ndash']ROMs, DVD-ROMs, and 
magnetic tapes.

Retrievability:
    Records in this system are typically retrieved by individual name, 
date of birth, passport number, and other identifying data, including 
unique identifying numbers assigned by the TSC or other government 
agencies.

Safeguards:
    All records are maintained in a secure government facility with 
access limited to only authorized personnel or authorized and escorted 
visitors. Physical security protections include guards and locked 
facilities requiring badges and passwords for access. Records are 
accessed only by authorized government personnel and contractors and 
are protected by appropriate physical and technological safeguards to 
prevent unauthorized access. All Federal employees and contractors 
assigned to the TSC must hold an appropriate security clearance, sign a 
non-disclosure agreement, and undergo privacy and security training.

Retention and disposal:
    Records in this system will be retained and disposed of in 
accordance with the records schedule approved by the National Archives 
and Records Administration. For records maintained in the Terrorist 
Screening Database, active records are maintained for 99 years and 
inactive (archived) records are maintained for 50 years. Records of 
possible encounters with individuals on the Terrorist Screening 
Database are maintained for 99 years. Records of redress inquiries and 
quality assurance matters are maintained for at least six years. Audit 
logs are maintained for 25 years and records of user audits are 
maintained for ten years.

System manager(s) and address:
    Director, Terrorist Screening Center, Federal Bureau of 
Investigation, FBI Headquarters, 935 Pennsylvania Avenue, NW., 
Washington, DC 20535-0001.

Notification procedure:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement, and intelligence programs, records in this system have 
been exempted from notification, access, and amendment to the extent 
permitted by subsections (j) and (k) of the Privacy Act.
    Requests for notification should be addressed to the FBI at the 
address and according to the requirements set forth below under the 
heading ``Record Access Procedures.''

Record access procedures:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement and intelligence programs, records in this system have 
been exempted from notification, access, and amendment to the extent 
permitted by subsections (j) and (k) of the Privacy Act. A request for 
access to a non-exempt record shall be made in writing with the 
envelope and the letter clearly marked ``Privacy Act Request.'' Include 
in the request your full name and complete address. The requester must 
sign the request; and, to verify it, the signature must be notarized or 
submitted under 28 U.S.C. 1746, a law that permits statements to be 
made under penalty of perjury as a substitute for notarization. You may 
submit any other identifying data you wish to furnish to assist in 
making a proper search of the system. Requests for access to 
information must be addressed to the Record Information Dissemination 
Section, Federal Bureau of Investigation, 935 Pennsylvania Avenue, NW., 
Washington, DC 20535-0001.

Contesting record procedures:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement and intelligence programs, records in this system are 
exempt from notification, access, and amendment to the extent permitted 
by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests 
for amendment should be addressed to the FBI at the address and 
according to the requirements set forth above under the heading 
``Record Access Procedures.''
    If, however, individuals are experiencing repeated delays or 
difficulties during a government screening process and believe that 
this might be related to terrorist watch list information, they may 
contact the Federal agency that is conducting the screening process in 
question (``screening agency''). The screening agency is in the best 
position to determine if a particular problem relates to a terrorist 
watch list entry or is due to some other cause, such as a criminal 
history, an immigration violation or random screening. Some individuals 
also experience repeated delays during screening because their names 
and/or other identifying data, such as dates of birth, are similar to 
those of known or suspected terrorists. These individuals, referred to 
as ``misidentified persons,'' often believe that they themselves are on 
a terrorist watch list, when in fact they only bear a similarity in 
name or other identifier to an individual on the list. Most screening 
agencies have or are developing procedures to expedite the clearance of 
misidentified persons during screening.
    By contacting the screening agency with a complaint, individuals 
will be able to take advantage of the procedures available to help 
misidentified persons and others experiencing screening problems. Check 
the agency's

[[Page 47079]]

requirements for submitting complaints but, at a minimum, individuals 
should describe in as much detail as possible the problem they are 
having, including dates and locations of screening, and provide 
sufficient information to identify themselves, such as full name, 
citizenship status, and date and place of birth. The TSC assists the 
screening agency in resolving any screening complaints that may relate 
to terrorist watch list information, but does not receive or respond to 
individual complaints directly. However, if TSC receives any such 
complaints, TSC will forward them to the appropriate screening agency.
    Additional information about the redress process and how to file a 
complaint with a screening agency is available on TSC's Web site at 
http://www.fbi.gov/terrorinfo/counterrorism/redress.htm.


Record Source Categories
    Information in this system is obtained from individuals covered by 
the system, public sources, agencies and private sector entities 
conducting terrorism screening, law enforcement and intelligence agency 
record systems, government databases, and foreign governments.

Exemptions Claimed for the System
    The Attorney General has exempted this system from subsections 
(c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and 
(8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k). 
These exemptions apply only to the extent that information in the 
system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k). 
Rules have been promulgated in accordance with the requirements of 5 
U.S.C. 553(b), (c) and (e).

[FR Doc. E7-16487 Filed 8-21-07; 8:45 am]

BILLING CODE 4410-02-P