Government Technology

Terrorist Screening Center Recognized for Information Sharing Efforts



March 11, 2009 By

Yesterday, on the first day of its annual conference, the National Fusion Center Coordination Group recognized the Terrorist Screening Center (TSC), with an award for TSC's information sharing and outreach initiatives to bridge the counterterrorism efforts of federal agencies and state and local law enforcement.

TSC is a component of the FBI which maintains the U.S. government's consolidated terrorist watchlist.

"The TSC's focus on sharing information among federal, state, and local authorities has been key to the effectiveness of the terrorist watchlist as a counterterrorism tool," said TSC Deputy Director Cory Nelson, who leads the organization's fusion center outreach efforts. "We're grateful to be recognized by the National Fusion Center Conference for those efforts."

A 2007 report by the Government Accountability Office found that "TSC plays a central role in the real-time sharing of this information [collected during encounters], creating a bridge among screening agencies, the law enforcement community, and the intelligence community." The report also concluded that the consolidated terrorist watchlist had "helped combat terrorism" and "enhanced the U.S. government's counterterrorism efforts."

The TSC initiatives recognized by the "We Hear You" award include:

Real-time notification of encounters with watchlisted individuals. TSC notifies fusion centers by telephone as soon as the TSC Call Center has confirmed an encounter with a known or suspected terrorist by a state, county, or municipal law enforcement agency in their geographic jurisdiction.

Daily reports about encounters across the country. TSC posts unclassified versions of its daily report of encounters with known or suspected terrorists across the country on law enforcement networks, providing greater visibility on terrorist encounters than ever before.

Tailored analytical products. TSC provides special analysis reports on encounters with known or suspected terrorists-including analysis of possible trends-to state and local law enforcement through fusion centers.

The U.S. Terrorist Screening Center (TSC was, established December 2003 by Homeland Security Presidential Directive-6. It serves as the U.S. Government's consolidation point for known and suspected terrorist watchlist information, both foreign and domestic. The consolidated watchlist contains records that are updated daily and shared with federal, state, local, territorial, tribal law enforcement and intelligence community agencies as well as international partners to ensure that individuals with links to terrorism are appropriately screened. The TSC is a multi-agency organization administered by the National security branch of the Federal Bureau of Investigation.


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
View All

Featured Papers