|
A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
23 August 2007
[Federal Register: August 22, 2007 (Volume 72, Number 162)][Notices] [Page 47073-47079] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr22au07-143] ======================================================================= ----------------------------------------------------------------------- DEPARTMENT OF JUSTICE Federal Bureau of Investigation [AAG/A Order No. 028-2007] Privacy Act of 1974; System of Records AGENCY: Federal Bureau of Investigation, DOJ. ACTION: Notice to amend system of records. ----------------------------------------------------------------------- SUMMARY: The Federal Bureau of Investigation proposes to amend its Terrorist Screening Records System, Justice/FBI-019, maintained by the Terrorist Screening Center, to make several changes to its existing notice. Public comments are invited. DATES: The Privacy Act requires that the public be given 30 days in which to comment on any new or amended uses of information in a system of records. In addition, the Office of Management and Budget (OMB), which has oversight responsibilities under the Act, and the Congress must be given 40 days in which to review major changes to Privacy Act systems. Therefore, the public, OMB, and the Congress are invited to submit written comments on this revised Privacy Act system of records. Please submit any comments by October 1, 2007. ADDRESSES: Address all comments to Kenneth P. Mortensen, Deputy Privacy and Civil Liberties Officer, U.S. Department of Justice, 950 Pennsylvania Ave., NW., Washington, DC 20530, facsimile number (202) 616-9627. [[Page 47074]] FOR FURTHER INFORMATION CONTACT: Kenneth P. Mortensen, (202) 514-3853. SUPPLEMENTARY INFORMATION: On July 28, 2005, the Department of Justice, Federal Bureau of Investigation (FBI) published a new Privacy Act System of Records notice, the Terrorist Screening Records System (TSRS), Justice/FBI-019, to cover records maintained by the Terrorist Screening Center (TSC), the system owner. See 70 FR 43715. Records in the TSRS include the Terrorist Screening Database (TSDB), records in the Encounter Management Application (EMA) that document the operational support TSC provides to agencies that screen for terrorists (``screening agencies''), and records related to the TSC's internal quality assurance process to ensure the terrorist data is thorough, accurate and current. The TSC also maintains records related to the resolution of terrorist watchlist-related redress complaints. The TSC now proposes modifications to the system to expand the scope of the system, and to increase the clarity of the notice. The following explains the proposed modifications: General Changes The previous system notice used the terms ``terrorist screening'' and ``terrorism screening'' interchangeably to describe the same process. This notice is being modified so that only the term ``terrorism screening'' is used, making it consistent with the language in Homeland Security Presidential Directive 6 (HSPD 6). This system notice also makes use of the term Terrorism Information as defined in section 1016 of the Intelligence Reform and Prevention Act of 2004 (Pub. L. 108-458). System Location The current system of records notice for Justice/FBI-019 states that the records are located at the TSC, Federal Bureau of Investigation, Washington, DC. The notice has been amended to reflect that records in Justice/FBI-019 may also be located in secondary locations for system back-up and continuity-of-operations purposes. Categories of Individuals The TSC is expanding the categories of individuals covered by this system to cover individuals who are authorized users of the underlying information systems described by this system of records, such as the TSDB and EMA, since audit logs documenting their use will be maintained in connection with the system. Currently, only TSC personnel can perform queries directly against the TSDB, EMA, and other internal TSC databases. In the future, the TSC plans to operate a query function permitting authorized individuals from screening agencies or entities to access TSC systems directly from an external location and submit search queries. Collection and maintenance of information through audit logs about authorized users will allow the TSC to monitor who uses TSC information systems for what purpose, in order to ensure compliance with applicable laws and policy. Therefore, the TSC is modifying this system of records notice to account for this fact. Additionally, the TSC is clarifying that this system of records covers all individuals whose names or identifying information is collected to perform a query against TSC information systems, such as TSDB, but who are not necessarily individuals whose information is generally maintained as terrorist information in the TSDB. For example, in certain instances, individuals' names are queried directly against the TSDB or EMA to see if there is a possible record match and, if there is not, their names may be retained in an audit trail that records the activity of authorized users of TSC information systems. The system notice is being modified to make clear that these individuals' information is also included in this system of records. The TSC is adding a new category to cover individuals who accompany or travel with a person when that person is an actual match to a known or suspected terrorist identity in the TSDB and when the TSC or screening agency or entity identifies that person as such during a terrorism screening process. The TSC collects this information in the course of encounters with known or suspected terrorists. For example, an encounter can include times when an individual was in the car along with a person matching an identity in the TSDB during a traffic stop by state or local law enforcement officers. TSC maintains this information about such individuals in EMA and not in the TSDB, and shares it as appropriate with other agencies for law enforcement and intelligence purposes consistent with the routine uses of this system of records. Categories of Records The TSC is adding new categories of records to cover audit logs for TSC systems, and archived records and record histories for the TSDB and other TSC systems. As discussed above, audit log records allow the TSC to monitor who uses TSC systems for what purpose in order to ensure compliance with applicable laws and policy. A TSDB record history is a log of any previous changes to the current version of a TSDB record. Archived TSDB records are TSDB records that pertain to individuals who are no longer eligible for inclusion in the TSDB, because those individuals no longer meet the criteria for inclusion in the TSDB as a known or suspected terrorist. The TSC retains these records in an archive that is logically separate from other TSDB data and may be accessed only by a limited number of TSC personnel who have undergone specialized training on the sensitivity of these records and the permissible reasons for access. Pursuant to TSC policy, archived TSDB records may only be accessed for the following purposes: (1) Redress, (2) litigation, (3) quality assurance (e.g., to determine if a record correction is required to an existing record in a TSC or other agency system), (4) to respond to requests from oversight bodies and auditors, and to perform internal audits, (5) to evaluate TSC performance and data in the event of another terrorist attack or attempted attack, and to support any related investigation, and (6) when access is otherwise required by law (e.g., Freedom of Information Act (FOIA) request). Archived TSDB records are not used or made available for any watchlisting purposes. The search function for the TSDB archive requires that prior to accessing the TSDB archive authorized TSC personnel must identify an approved purpose with information supporting the need for access. This information is maintained in a detailed audit log, which is routinely reviewed by TSC compliance personnel. Additionally, the TSC is modifying other descriptions of categories of records to clarify the types of information held in the TSC systems. The TSC is adding language to clarify that records of encounters may include information about individuals who accompany or travel with a person when that person is an actual match to a known or suspected terrorist identity in the TSDB and the TSC or screening agency or entity identifies that person as such during a terrorism screening process. The TSC is also modifying Item (a) To add ``photograph'' as a specific type of identifying data that may be contained in the TSRS. While a photograph may be considered a biometric, which is already listed in Item (a), TSC is listing photographs as a separate item to ensure clarity. The TSC is modifying Item (b) By changing the term ``agency'' to ``entity'' to reflect that entities other than a [[Page 47075]] federal government agency may engage in terrorism screening. Item (b) is also being modified by removing the language ``terrorist encounters'' and replacing it with ``encounters with known or suspected terrorists,'' which is a more precise characterization, because Item (a) in the Categories of Individuals defines the phrase ``known or suspected terrorists.'' The TSC is also modifying Item (c) to make clear that TSRS may also include references to or information from other relevant databases that contain terrorism information, in the event such databases are not considered law enforcement or intelligence databases. Authority for Maintenance of the System The TSC is adding the following legal authorities: the National Security Act of 1947, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-458, 18 Stat. 3638 (December 17, 2004); and Executive Order 13388, ``Further Strengthening the Sharing of Terrorism Information to Protect Americans,'' (October 25, 2005). TSC is removing the reference to Executive Order 13356, which has been superseded by Executive Order 13388. Also, the TSC is adding language to provide notice that in the event that the TSC's continuity-of-operations plans are invoked, the agency that assumes TSC operational functions will have the authority to administer the Terrorist Screening Records System as necessary to carry out those functions and will act consistent with the obligations required by the Privacy Act of 1974 in the maintenance of TSRS as a Privacy Act System of Records. Purpose Statement Consistent with the changes discussed above regarding auditing of TSC data systems, the TSC is expanding the purpose of the system of records to clarify that one purpose is to conduct appropriate oversight of the proper use of TSC data systems. The language in Item (e) Is being modified to add the quoted language below to more accurately reflect TSC's mission, as set forth in HSPD 6, to provide support for private sector screening processes ``that have a substantial bearing on homeland security.'' The language in Item (f) is being modified to remove the word ``agency's'' and insert the word ``authorized'' preceding the term ``screening process'' to more accurately describe the type of screening TSC may perform. The word ``agency'' was removed because not all terrorism screening is necessarily performed by a federal government agency. The word ``authorized'' was added because all terrorism screening processes using TSC data must be authorized by the TSC pursuant to the standard articulated in HSPD 6. The language in Item (g) Is being changed to add the word ``organizations'' to the list of entities and individuals that may receive information about encounters with known or suspected terrorists. This change is intended to better reflect the ongoing efforts by the federal government to increase sharing of intelligence, law enforcement and terrorism information with the State and local governments, fusion centers, and critical infrastructure owners and operators, consistent with the privacy protections required by the Privacy Act and as articulated in this notice. The language in Item (h) is being changed by removing the word ``repeatedly'' from the phrase ``to assist persons repeatedly misidentified during a terrorism screening process.'' This change is intended to clarify that an individual does not have to be misidentified more than once for the TSC to act to provide assistance through a redress process or other means. Conforming changes are being made to the notice to remove the word ``repeatedly'' from Routine Uses B, F, and G, and the categories of individuals (Item (d)). Routine Uses Routine Use B listed for Justice/FBI-019 permits disclosure of information to various entities in order to, among other things ``provide appropriate notifications of a positive terrorist encounter or a threat related to the encounter.'' The TSC is modifying this language to clarify that the TSC may notify an entity of not only a positive match to the terrorist watchlist, but also a negative or inconclusive match. Also, the TSC is modifying this Routine Use to include ``private sector entities with a substantial bearing on homeland security'' as described in HSPD-6 as potential recipients of information. Finally, the TSC is modifying the language in purpose (2) of this Routine Use to make clear that a positive encounter means an encounter with an individual who is identified in the TSDB, and to clarify purpose (3) of this Routine Use by adding the modifiers ``known or suspected'' to the terms ``terrorist'' and ``threat related to the encounter.'' Routine Use D permits disclosure of information for the development, testing, or modification of information technology systems used or intended to be used during or in support of the screening process, but indicates TSC will use de-identified data whenever possible. The TSC is modifying the language of this Routine Use to clarify that ``de-identified data'' means data that cannot be used to derive an individual's identity and to note that de-identified data will be used to the extent practicable and possible. Routine Use E permits disclosure of information to various agencies or entities to assist in the coordination of terrorist threat awareness, assessment, analysis, or response. The TSC is modifying this language to include private sector entities in the list of entities that may receive information from TSRS for these purposes. This change is intended to better reflect the ongoing efforts by the federal government to increase sharing of intelligence, law enforcement, terrorism and threat information with State fusion centers and the private sector, such as critical infrastructure and key resource owners and operators, consistent with the privacy protections required by the Privacy Act. Routine Use H permits disclosure of information in support of authorized audit or oversight operations of the DOJ, including FBI and TSC, or any agency engaged in or providing information used for terrorism screening supported by the TSC. The TSC is modifying this Routine Use to include authorized security operations as a permissible purpose for sharing information, thereby allowing the TSC to disclose information to the investigating entity in the context of a security- related investigation or inquiry, such as a personnel investigation or inquiry into a breach of data security. Additionally, the TSC is expanding the scope of this Routine Use by adding language that would allow disclosure if the subject of the security, audit, or oversight operation was not a Federal agency but an organization or individual that was engaged in or providing information used for terrorism screening that is supported by the TSC. These changes will allow the TSC to disclose information to support any oversight efforts into TSC- related activities. Routine Use K permits disclosure of information to a governmental entity lawfully engaged in collecting law enforcement, law enforcement intelligence, or national security intelligence information for law enforcement or intelligence purposes. TSC is modifying this Routine Use by changing ``national security intelligence information'' to ``national security information'' and ``national intelligence,'' which are terms defined [[Page 47076]] by Executive Order 12958, as amended, and the Intelligence Reform and Terrorism Prevention Act amendments to the National Security Act of 1947, respectively. Also, the TSC is specifying counterterrorism as one of the purposes for which information may be disclosed under this Routine Use, which is consistent with TSC's counterterrorism mission. The Department of Justice previously published a notice modifying all of the Department's systems of records, including TSRS, to include a routine use to permit the disclosure of information to appropriate persons and entities for purposes of response and remedial efforts in the event that there has been a breach of the data contained in the Department's systems of records. See 72 FR 3410 (Jan. 25, 2007). The TSC is adding new Routine Use L to this notice to reflect this change. Retention and Disposal Although TSC is a multi-agency organization, the FBI administers TSC. Recently, the FBI obtained approval from the National Archives and Records Administration for its request for records disposition authority for records created and maintained by the TSC. The TSC is modifying this language to provide information on the approved retention periods for TSC records described in Justice/FBI-019. For records maintained in the Terrorist Screening Database (TSDB), active records are maintained for 99 years and inactive (archived) records are maintained for 50 years. Encounter Management Application (EMA) records, which document positive, negative, and inconclusive screening encounters with individuals in the TSDB, are maintained for 99 years. TSC maintains EMA records on negative encounters, i.e., a person who is initially identified as a possible match to a TSDB identity but ultimately determined not to be a match, in order to expedite future screening of those individuals and to support the redress process. Records of redress inquiries and quality assurance matters are maintained for at least six years. Audit logs are maintained for 25 years and records of user audits are maintained for ten years. Contesting Record Procedures The TSC is adding language to this section to refer individuals to the TSC's public Web site for additional information on the redress process and the procedures for filing a complaint related to terrorism screening. Record Source Categories The TSC is modifying this section to include ``private sector entities engaged in terrorism screening'' as a record source category. This change is being made to reflect that the TSC may receive information for screening from the private sector in support of the TSC's mission, as set forth in HSPD 6, to support ``private sector screening processes that have a substantial bearing on homeland security.'' Public Comments Invited Public comments are invited on all aspects of the revised system notice, including the retention periods for records and the new categories of individuals and records. See ADDRESSES section above for information on how to submit comments. In accordance with 5 U.S.C. 552a(r), the Department of Justice has provided a report of this amended system of records to the Office of Management and Budget and to Congress. Dated: August 14, 2007. Lee J. Lofthus, Assistant Attorney General for Administration. JUSTICE/FBI-019 System name: Terrorist Screening Records System (TSRS). Security classification: Classified, unclassified (law enforcement sensitive). System location: Records described in this notice are maintained at the Terrorist Screening Center, Federal Bureau of Investigation, Washington, D.C., and at facilities operated by other government entities for terrorism screening, system back-up, and continuity of operations purposes. Categories of individuals covered by the system: a. Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism (``known or suspected terrorists''); b. Individuals who are the subject of queries against TSC information systems; c. Individuals identified during a terrorism screening process as a possible identity match to a known or suspected terrorist and other individuals who accompany or travel with such individuals; d. Individuals who are misidentified as a possible identity match to a known or suspected terrorist (``misidentified persons''); e. Individuals about whom a terrorist watchlist-related redress inquiry has been made; and f. Individuals whose information is collected and maintained for information system user auditing and security purposes, such as individuals who are authorized users of TSC information systems. Categories of records in the system: a. Identifying information, such as name, date of birth, place of birth, biometrics, photographs, passport and/or drivers license information, and other available identifying particulars used to compare the identity of an individual being screened with a known or suspected terrorist, including audit records containing this information; b. Information about encounters with individuals covered by this system, such as date, location, screening entity, analysis, associated individuals, and results (positive or negative identity match), and, for encounters with known or suspected terrorists only, other entities notified and details of any law enforcement, intelligence, or other operational response; c. For known or suspected terrorists, in addition to the categories of records listed above, references to and/or information from other government law enforcement and intelligence databases, or other relevant databases that may contain terrorism information; d. For misidentified persons, in addition to the categories of records listed above, additional identifying information that will be used during screening only for the purpose of distinguishing them from a known or suspected terrorist who has similar identifying characteristics (such as name and date of birth); e. For redress matters, in addition to the categories of records listed above, information provided by individuals or their representatives, information provided by the screening agency, and internal work papers and other documents related to researching and resolving the matter; f. Information collected and compiled to maintain an audit trail of the activity of authorized users of TSC information systems, such as user name/ID, date/time, search query and results data, user activity information (e.g., record retrieval, modification, or deletion data), and record numbers; and, g. Archived records and record histories from the Terrorist Screening Database, Encounter Management Application, and other TSC data systems that are part of the TSRS. [[Page 47077]] Authority for maintenance of the system: Homeland Security Presidential Directive-6, ``Integration and Use of Screening Information to Protect Against Terrorism'' (Sept. 16, 2003); Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans,'' (October 25, 2005); the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108- 458; the National Security Act of 1947, as amended; and 28 U.S.C. 533. In the event that the TSC's continuity-of-operations plans are invoked, the agency that assumes TSC operational functions will have the authority to administer the Terrorist Screening Records System as necessary to carry out those functions. Purpose(s): a. To implement the U.S. Government's National Strategy for Homeland Security and Homeland Security Presidential Directive-6, to identify potential terrorist threats, to uphold and enforce the law, and to ensure public safety. b. To consolidate the government's approach to terrorism screening and provide for the appropriate and lawful use of terrorist information in screening processes. c. To maintain current, accurate and thorough terrorist information in a consolidated terrorist screening database and determine which terrorism screening processes will use each entry in the database. d. To ensure that appropriate information possessed by State, local, territorial, and tribal governments, which is lawfully available to the Federal Government, is considered in determinations made by the TSC as to whether a person is a match to a known or suspected terrorist. e. To host mechanisms and make terrorism information available to support appropriate domestic, and foreign terrorism screening processes, and private-sector screening processes that have a substantial bearing on homeland security. f. To provide continual operational support to assist in the identification of persons screened and to facilitate an appropriate and lawful response when a known or suspected terrorist is identified in an authorized screening process. g. To provide appropriate government officials, agencies, or organizations with information about encounters with known or suspected terrorists. h. To assist persons misidentified during a terrorism screening process and to assist screening agencies or entities in responding to individual complaints about the screening process (redress). i. To oversee the proper use, maintenance, and security of TSC data systems and TSC personnel. Routine uses of records maintained in the system, including categories of users and the purposes of such uses: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, the records or information in this system may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in accordance with blanket routine uses established for FBI record systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI Privacy Act System of Records, Justice/FBI-BRU, published on June 22, 2001 at 66 FR 33558 and amended on February 14, 2005 at 70 FR 7513. In addition, as routine uses specific to this system, the TSC may disclose relevant system records to the following persons or entities and under the circumstances or for the purposes described below, to the extent such disclosures are compatible with the purpose for which the information was collected. (Routine uses are not meant to be mutually exclusive and may overlap in some cases.) A. To those federal agencies that have agreed to provide support to TSC for purposes of ensuring the continuity of TSC operations. B. To federal, state, local, tribal, territorial, foreign, multinational or other public agencies or entities, to entities regulated by any such agency or entity, and to owners/operators of critical infrastructure or private sector entities with a substantial bearing on homeland security and their agents, contractors or representatives, for the following purposes: (1) For use in and in support of terrorism screening authorized by the U.S. Government, (2) to provide appropriate notifications of the results of terrorism screening using information from the Terrorist Screening Database or a threat related to a positive encounter with an individual identified in the Terrorist Screening Database, (3) to facilitate any appropriate law enforcement or other response (e.g., medical and containment response to a biological hazard) to a known or suspected terrorist or a threat related to the encounter, and (4) to assist persons misidentified during a screening process. C. To any person, organization, or governmental entity in order to notify them of a serious terrorist threat for the purpose of guarding against or responding to such a threat. D. To federal, state, local, tribal, territorial, foreign, or multinational agencies or entities, or other organizations that are engaged in, or are planning to engage in terrorism screening authorized by the U.S. Government, for the purpose of the development, testing, or modification of information technology systems used or intended to be used during or in support of the screening process; whenever practicable, however, TSC, to the extent possible, will substitute anonymized or de-identified data, such that the identity of the individual cannot be derived from the data. E. To federal, state, local, tribal, territorial, foreign, multinational agencies or entities, or private sector entities to assist in coordination of terrorist threat awareness, assessment, analysis or response. F. To any person or entity in either the public or private sector, domestic or foreign, where reasonably necessary to elicit information or cooperation from the recipient for use by the TSC in the performance of an authorized function, such as obtaining information from data sources as to the thoroughness, accuracy, currency, or reliability of the data provided so that the TSC may review the quality and integrity of its records for quality assurance or redress purposes, and may also assist persons misidentified during a screening process. G. To any federal, state, local, tribal, territorial, foreign or multinational agency, task force, or other entity or person that receives information from the U.S. Government for terrorism screening purposes, in order to facilitate TSC's or the recipient's review, maintenance, and correction of TSC data for quality assurance or redress purposes, and to assist persons misidentified during a screening process. H. To any agency, organization or person for the purposes of (1) performing authorized security, audit, or oversight operations of the DOJ, FBI, TSC, or any agency, organization, or person engaged in or providing information used for terrorism screening that is supported by the TSC, and (2) meeting related reporting requirements. I. To a former employee of the TSC or a former contractor supporting the TSC for purposes of: Responding to an official inquiry by a federal, state, or local government entity or professional licensing authority, in accordance with any applicable government regulations; or facilitating communications with a former employee/ contractor that may be necessary for personnel-related or other official purposes where the TSC [[Page 47078]] requires information and/or consultation assistance from the former employee/contractor regarding a matter within that person's former area of responsibility. J. To any criminal, civil, or regulatory law enforcement authority (whether federal, state, local, territorial, tribal, multinational or foreign) where the information is relevant to the recipient entity's law enforcement responsibilities. K. To a governmental entity lawfully engaged in collecting law enforcement, law enforcement intelligence, national security information, national intelligence, or terrorism information for law enforcement, intelligence, or counterterrorism purposes. L. To appropriate agencies, entities, and persons when (1) the Department of Justice suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Department of Justice has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Department or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department of Justice's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. Disclosure to consumer reporting agencies: None. Policies and practices for storing, retrieving, accessing, retaining, and disposing of records in the system: Storage: Records in this system are stored in paper and/or electronic format. Electronic storage is on servers, CD[ndash']ROMs, DVD-ROMs, and magnetic tapes. Retrievability: Records in this system are typically retrieved by individual name, date of birth, passport number, and other identifying data, including unique identifying numbers assigned by the TSC or other government agencies. Safeguards: All records are maintained in a secure government facility with access limited to only authorized personnel or authorized and escorted visitors. Physical security protections include guards and locked facilities requiring badges and passwords for access. Records are accessed only by authorized government personnel and contractors and are protected by appropriate physical and technological safeguards to prevent unauthorized access. All Federal employees and contractors assigned to the TSC must hold an appropriate security clearance, sign a non-disclosure agreement, and undergo privacy and security training. Retention and disposal: Records in this system will be retained and disposed of in accordance with the records schedule approved by the National Archives and Records Administration. For records maintained in the Terrorist Screening Database, active records are maintained for 99 years and inactive (archived) records are maintained for 50 years. Records of possible encounters with individuals on the Terrorist Screening Database are maintained for 99 years. Records of redress inquiries and quality assurance matters are maintained for at least six years. Audit logs are maintained for 25 years and records of user audits are maintained for ten years. System manager(s) and address: Director, Terrorist Screening Center, Federal Bureau of Investigation, FBI Headquarters, 935 Pennsylvania Avenue, NW., Washington, DC 20535-0001. Notification procedure: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement, and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act. Requests for notification should be addressed to the FBI at the address and according to the requirements set forth below under the heading ``Record Access Procedures.'' Record access procedures: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act. A request for access to a non-exempt record shall be made in writing with the envelope and the letter clearly marked ``Privacy Act Request.'' Include in the request your full name and complete address. The requester must sign the request; and, to verify it, the signature must be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. You may submit any other identifying data you wish to furnish to assist in making a proper search of the system. Requests for access to information must be addressed to the Record Information Dissemination Section, Federal Bureau of Investigation, 935 Pennsylvania Avenue, NW., Washington, DC 20535-0001. Contesting record procedures: Because this system contains classified intelligence and law enforcement information related to the government's counterterrorism, law enforcement and intelligence programs, records in this system are exempt from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests for amendment should be addressed to the FBI at the address and according to the requirements set forth above under the heading ``Record Access Procedures.'' If, however, individuals are experiencing repeated delays or difficulties during a government screening process and believe that this might be related to terrorist watch list information, they may contact the Federal agency that is conducting the screening process in question (``screening agency''). The screening agency is in the best position to determine if a particular problem relates to a terrorist watch list entry or is due to some other cause, such as a criminal history, an immigration violation or random screening. Some individuals also experience repeated delays during screening because their names and/or other identifying data, such as dates of birth, are similar to those of known or suspected terrorists. These individuals, referred to as ``misidentified persons,'' often believe that they themselves are on a terrorist watch list, when in fact they only bear a similarity in name or other identifier to an individual on the list. Most screening agencies have or are developing procedures to expedite the clearance of misidentified persons during screening. By contacting the screening agency with a complaint, individuals will be able to take advantage of the procedures available to help misidentified persons and others experiencing screening problems. Check the agency's [[Page 47079]] requirements for submitting complaints but, at a minimum, individuals should describe in as much detail as possible the problem they are having, including dates and locations of screening, and provide sufficient information to identify themselves, such as full name, citizenship status, and date and place of birth. The TSC assists the screening agency in resolving any screening complaints that may relate to terrorist watch list information, but does not receive or respond to individual complaints directly. However, if TSC receives any such complaints, TSC will forward them to the appropriate screening agency. Additional information about the redress process and how to file a complaint with a screening agency is available on TSC's Web site at http://www.fbi.gov/terrorinfo/counterrorism/redress.htm. Record Source Categories Information in this system is obtained from individuals covered by the system, public sources, agencies and private sector entities conducting terrorism screening, law enforcement and intelligence agency record systems, government databases, and foreign governments. Exemptions Claimed for the System The Attorney General has exempted this system from subsections (c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and (8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k). These exemptions apply only to the extent that information in the system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k). Rules have been promulgated in accordance with the requirements of 5 U.S.C. 553(b), (c) and (e). [FR Doc. E7-16487 Filed 8-21-07; 8:45 am] BILLING CODE 4410-02-P