-
PURPOSE OF THE CONSOLIDATED WATCHLIST
OVERVIEW OF WATCHLIST NOMINATION AND SCREENING PROCESSES
TSC ENCOUNTER MANAGEMENT
NUMBER OF TERRORIST WATCHLIST RECORDS
HANDLING INSTRUCTIONS
OIG’S AUDIT APPROACH
- DATA ACCURACY AND TIMELINESS
- QUALITY ASSURANCE
- TERRORIST WATCHLIST REDRESS
STRUCTURE OF THE TSDB
RECORDS NOT DESIGNATED FOR ANY WATCHLISTING
FBI PROCEDURE FOR PROCESSING WATCHLIST DATA
DUPLICATE RECORDS
INCLUSION OF KNOWN TERRORISTS IN THE TSDB
CONCLUSION
RECOMMENDATIONS
OVERVIEW OF THE TSC’S QUALITY ASSURANCE PROCESS
OIG ANALYSIS OF TSC QUALITY ASSURANCE EFFORTS
QUALITY ASSURANCE MANAGEMENT AND OVERSIGHT
TSC EFFORTS TO ENHANCE TERRORIST WATCHLISTING
CONCLUSION
RECOMMENDATIONS
OVERVIEW OF THE TSC’S REDRESS EFFORTS
MULTI-AGENCY REDRESS AGREEMENT
OVERVIEW OF THE TERRORIST WATCHLIST REDRESS PROCESS
DISPOSITION OF REDRESS COMPLAINTS
TIMELINESS OF PROCESSING REDRESS COMPLAINTS
RESPONSE TO REDRESS COMPLAINANTS
APPEAL OF REDRESS DISPOSITION
PROACTIVE REDRESS
CONCLUSION
RECOMMENDATIONS
STATEMENT ON INTERNAL CONTROLS
STATEMENT ON COMPLIANCE WITH LAWS AND REGULATIONS
APPENDICES:
- OBJECTIVES, SCOPE, AND METHODOLOGY
- SYSTEMS USED IN THE TERRORIST WATCHLIST PROCESS
- DIAGRAM OF TERRORIST WATCHLIST DATAFLOW
- TERRORIST SCREENING CENTER RESPONSE
- OFFICE OF THE INSPECTOR GENERAL ANALYSIS AND SUMMARY OF ACTIONS NECESSARY TO CLOSE THE REPORT
* The full version of this report includes information that the FBI considered to be law enforcement sensitive and therefore could not be publicly released. To create this public version of the report, the OIG redacted (deleted) the portions of the full report that were considered sensitive by the FBI, and we indicated where those redactions were made.