Return to the USDOJ/OIG Home Page
Return to the Table of Contents

Department Critical Infrastructure Protection Implementing Plans to Protect Cyber-Based Infrastructure

Report No. 04-05
November 2003
Office of the Inspector General

Appendix 6
Critical Asset Descriptions

Component System Name Description
DEA EIS EIS is a centralized computer network comprised of a message handling system, a Geographic Information System, office automation tools, the EPIC Internal Database, and an automated external databases query capability.
DEA Mercury Mercury is a record message traffic system providing DEA connectivity in offices within and outside the continental United States offices.
DEA Merlin Merlin provides DEA intelligence analysts with access to classified information and special reports, office automation capabilities, database information, and analytical tools
DEA Firebird Firebird, the general support system, is the DEA office automation infrastructure upgrade initiative and provides DEA personnel with an intuitive interface for automating the investigative report process, sharing case information, and performing analysis and administrative activities.
DEA Centralized Data Intercept The Centralized Data Intercept serves as a central collection and distribution point for the call data information related to Title III intercepts.40
DEA Model 204 Model 204 Database Applications are mainframe investigative databases that support enforcement of laws.
DEA Electronic File Room The Electronic File Room is the central soft copy storage portion of the DEA SBU - investigative files.
DEA Wide Area Network DEA WAN consists of e-mail servers to support classified and SBU operations.
DEA GESCAN GESCAN is the DEA's automated message handling system.
DEA Firebird nodes in Special Operations Division (SOD) and Command Center Firebird nodes consists of Firebird NT Server, Exchange, MS Office, peripherals workstations and LAN wiring for the backup of SOD and Command Center SBU NT file services and e-mail at the offsite facility in Chantilly, VA, to NT Server.
FBI Mainframe and Applications The FBI mainframes contain investigative and administrative applications necessary for the FBI to perform its designated duties in securing domestic security, enforcing Federal laws, and protecting the rights and interests of United States persons.
FBI Key Asset Database The Key Asset Database is a database of information concerning Key Assets within each field office's jurisdiction, establish lines of communication with Key Asset owners and operators to improve cyber and physical security, and enhance ongoing coordination with other Federal, state and local government entities, to ensure their involvement in the protection of critical infrastructures.
FBI CJIS WAN CJIS WAN is the communications infrastructure that provides electronic connectivity between state/local law enforcement agencies, forensic/ballistic laboratories, and the FBI.
FBI InfraGard InfraGard is an information sharing system for computer intrusion incidents and system vulnerabilities.
FBI IAFIS IAFIS is a nationwide mainframe system that provides state of the art fingerprint identification processes and criminal history information for use by criminal justice and law enforcement agencies.
FBI NCIC 2000 NCIC 2000 is the nationwide criminal justice information application that provides the law enforcement community with immediate access to documented criminal information vital to effective criminal justice operations.
FBI Digital Storm Collection Systems The FBI's Digital Storm Collection Systems provide for the ability to operate Foreign Intelligence Surveillance Act (FISA) Electronic Surveillance activities and collect and remotely transfer FISA information.
FBI FBI NET FBINET is a general support system which provides worldwide communications support to the FBI's investigative and intelligence applications at 500 locations in the United States and approximately 35 overseas locations.
FBI IISNET IISNET is a major application processing classified data. The system is considered to be the FBI's path for the Department of Defense TS/SCI network.
FBI Secure Mobile Radio System The FBI's Land Mobile Radio Systems supports secure, mobile, tactical communications throughout the United States.
FBI SAMNET SAMNET is a major application and processes classified data. SAMNET is a messaging system and provides access to the Defense Special Security Communications System from approximately 60 field locations.
INS CIS CIS is a major application. CIS contains information on persons of interest to the INS, along with summary data from other INS systems.
INS ENFORCE ENFORCE is an event-based case management system, integrating subject processing, biometric identification, allegations and charges, preparation and the printing of appropriate forms.
INS IDENT IDENT is a two-fingerprint and photo image capture identification application that enables INS offers to quickly identify persons about whom INS has information.
INS NSINC INSINC is the INS data communications infrastructure for non-classified processing.
JMD JCN-MAN The MAN provides ATM services for 22 Department resources and facilities within the D.C. metropolitan area.
JMD JDC-D JDC-D provides enterprise mainframe and server platform support for mission critical applications such as INS CIS.
JMD JDC-W JDC-W provides enterprise mainframe and service platform support for mission critical applications such as DEA Model 204 Database Applications.
JMD JCN JCN is a general support system providing the Department with a state-of-the-art high capacity communications backbone that consolidates individual Department components' telecommunications networks into one network to reduce costs, increase reliability, simplify network management, provide a common security approach, support emerging requirements of new applications, and foster interoperability and cooperation between components and non-Department clients.

  1. Title III of the Omnibus Crime Control and Safe Streets Act of 1968 provided for the use of court-ordered electronic surveillance in the investigation of certain specified violations. The law provided that wiretaps could be used in emergency situations, but if a warrant was not obtained within 48 hours then any information obtained could not be used in court or even revealed.