Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Chapter 15 : Known or Appropriately Suspected Terrorist KST Files

Chapter 15 : Known or Appropriately Suspected Terrorist KST Files

Ratings: (0)|Views: 160|Likes:
This is a description of the actual Law Enforcement methods for appropriate Terrorism dossiers (on actual terror suspects or known users of political violence.) This is in contrast with the "DT Index" handed out on Compact Disc by the WSP Domestic Terrorism Conference Attendees.
This is a description of the actual Law Enforcement methods for appropriate Terrorism dossiers (on actual terror suspects or known users of political violence.) This is in contrast with the "DT Index" handed out on Compact Disc by the WSP Domestic Terrorism Conference Attendees.

More info:

Published by: Andrew Charles Hendricks on Jul 27, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2013

pdf

text

original

 
ACCESS Operations Manual Known or Appropriately Suspected Terrorist (KST) File Chapter 15-1Revised March 2013
Table of ContentsSECTION 01:
 
INTRODUCTION .................................................................................. 2
 
I.
 
PURPOSE OF THE KNOWN OR APPROPRIATELY SUSPECTED TERRORIST
(
KST
)
FILE
......... 2
 
II.
 
CRITERIA FOR ENTRY IN THE KST FILE
........................................................................ 2
 
III.
 
RETENTION PERIOD FOR THE KST FILE
....................................................................... 2
 
IV.
 
VALIDATION
............................................................................................................. 2
 
V.
 
PROCEDURES FOR HANDLING A HIT
........................................................................... 3
 
SECTION 02:
 
INQUIRY TRANSACTIONS ................................................................. 4
 
I.
 
GUIDELINES FOR KST INQUIRY
................................................................................... 4
 
II.
 
REQUIREMENTS FOR KST INQUIRY
............................................................................. 5
 
III.
 
INQUIRY USING VEHICULAR DATA
............................................................................... 5
 
IV.
 
EXAMPLE OF KST INQUIRY RESPONSE
........................................................................ 5
 
 
ACCESS Operations Manual Known or Appropriately Suspected Terrorist (KST) File Chapter 15-2Revised March 2013
CHAPTER 15: KNOWN OR APPROPRIATELYSUSPECTED TERRORIST (KST) FILESECTION 01: INTRODUCTION
Procedure #:
15.01.000
 Effective Date:
 June 1, 2012
 Supersedes:
WACIC Manual 2009 Edition
See Also: Applies To:
All ACCESS Users
CALEA:I. PURPOSE OF THE KNOWN OR APPROPRIATELY SUSPECTEDTERRORIST (KST) FILE
A. Based upon Homeland Security Presidential Directive-6 signed inSeptember 2003, the Terrorist Screening Center (TSC) was established toconsolidate the federal government's approach to terrorism screening andto provide for the appropriate and lawful use of terrorist information in theoverall screening process.B. KST File information is exclusively for the use of criminal justice agenciesfor criminal justice purposes.
In no case should KST File informationbe disseminated to any non-criminal justice agency or to the subjectof a hit.
 
II. CRITERIA FOR ENTRY IN THE KST FILE
A. The TSC alone has the authority to enter and update a record for anindividual who has been nominated as a known or appropriatelysuspected terrorist subject to the TSC. Documentation (electronic or hardcopy) must be on file to support a known or appropriately suspectedterrorist entry.
III. RETENTION PERIOD FOR THE KST FILE
A. KST File records have an unlimited retention period. A KST File recordwill remain on file indefinitely or until action is taken by the TSC to modifyor cancel the record. Other exceptions to the record retention periods willoccur in the event a serious error is detected in the record on file.
IV. VALIDATION
A. KST records will be validated monthly using a file generated from the TSC’s Terrorist Screening Database. The TSC will modify each record toinclude the name of validator in the VLN Field within 90 days from the datethe validation file was created by the TSC. The FBI, Criminal JusticeInformation Services Division will provide the TSC with a yearly report of active NCIC KST records that were not validated during the previousvalidation cycle. The TSC must validate these records within 90 days of receiving the report. Records that are not validated will be removed fromNCIC.
 
ACCESS Operations Manual Known or Appropriately Suspected Terrorist (KST) File Chapter 15-3Revised March 2013
V. PROCEDURES FOR HANDLING A HIT
A. No arrest or detention should be made based solely on a KST File record.B. As part of a positive response from the KST File, the receiving agency isadvised that the person in question cannot be arrested or detained solelyupon the basis of the information provided. A caveat at the beginning of the record response emphasizes to record recipients that they shouldcontact the TSC.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->