File size: 163,989 Bytes
50e0c9f
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
Office of the Director of National Intelligence Washington, DC 20511
SEP 2 9 2015
Steven Aftergood Federation of American Scientists
1725 De Sales Street NW, Suite 600
Washington, DC 20036
Re: ODNI FOIA Request DF-2011-00039
Dear Mr. Aftergood:
This is in response to your 3 February 2010 email to the Office of the Director of National Intelligence (ODNI) (Enclosure 1 ), in which you requested, under the Freedom of Information Act (FOIA), a copy of the releasable portions of the report resulting from a review of intelligence lessons learned from the Fort Hood shooting, the Christmas Day bombing attempt, and other incidents.

Your request was processed in accordance with the FOIA, 5 U.S.C.  552, as amended.

A thorough search of our records and databases located material responsive to your request
(Enclosure 2).

Upon thorough review, the material was found to contain information that is currently and properly classified under Executive Order 13526, Section 1.4(c), and is therefore withheld pursuant to FOIA exemption (b)(1). Information was also withheld pursuant to the following FOIA exemptions:

-
(b)(3), which applies to information exempt from disclosure by statute, specifically:
o the National Security Act of 1947, as amended, 50 U.S.C.  3024(m)(1), which
protects, among other things, the names and identifying information of ODNI
personnel, and
o the National Security Act of 1947, as amended, 50 U.S.C.  3024(i)(l), which
protects information pertaining to intelligence sources and methods.
If you wish to appeal our determination on this request, please explain the basis of your appeal and forward to the address below within 45 days of the date ofthis letter.

Office of the Director of National Intelligence Information Management Office Washington, DC 20511
The document was also coordinated with other agencies-their redactions are noted in the document.

If you have any questions, email our Requester Service Center at DNI-FOIA@,dni.gov or call us at (703) 874-8500.

Sincerely, I J/ . /;~'hhL<rx4( 7 (
"\_6\-
Jennifer Hudson C
Director, Information Management Division Enclosures FBI

15 April 2010
Report to the Director of
National Intelligence on the
Fort Hood and Northwest
Flight 253 Incidents (U)

Intelligence Community Review Panel

CLBY:
              l<b)(3) I

CL REASON: 1.4 (b), (c), (d)
DECL ON: 25X1-human
DRV FROM: Multiple
Sources

TOP SECRET/{i IGSISJNORCONINOFORN.

l<b)(7)(E) I

## Report To The Director Of National Intelligence On The Fort Hood And Northwest Fligltt 253 Incidents (U) Executive Summary (U)

(b )(1)
(b)(3)
(b)(?)(E)
FBI

"In a way, I think this Christmas Day bomber did 118 a favor. "

-Gov. Thomas H. Kean, 25 Jatlfl01J' 2010. 1

The Director of National Intelligence (DNI) asked a panel of four senior
current and fonner national security officials in January to examine the
intelligence aspects of two recent events: the shooting attack on personnel
at Fort Hood by Army Major Nidal Hasan on 5 November and the
attempted bombing of Northwest Airlines Flight 253 on Christmas day by
a Nigerian citizen, Urnar Farouk Abdulrnutallab. a (U)

The panel's mandate was three-fold: To document the facts of these two
events, to add recommendations to what the Intelligence Community is
doing in response to them. and to add any further thoughts on what the
Intelligence Community might do to deal with existing terrorist threats or
what fonn new terrorist threats might take. (U)

To carry out this assignment, the panel read all of the relevant intelligence
reporting and carried out roughly 70 interviews, meetings, and roundtable
discussions with approximately 300 key decision makers, program
managers, officers, and agents from components in the Office of the
Director ofNational Intelligence (ODNI), the National Counterterrorism
Center (NCTC), the Central Intelligence Agency (CIA), including its
Counterterrorism Center (CTC), the Defense Intelligence Agency's (DIA)

Liberties Protection Officer in the Office of the Director ofNational Intelligence. (U)
Joint Intelligence Task Force-Counterterrorism (JfrF-cn, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Department ofHomd~ Security (DHS), the Office of the Undersecretary of Defense for Intelljgence, and the NatiQoal Security Council. It also asked a panel of experts from outside the Intelligence Community to offer ideas on future threats and called on four extemal readers-a scholar, the head of a major research institution. a two fonner senior intelligena officials-to critiqtre the study. (U)
Before~
the findings, SQme preliminary observations are in order regarding the context in which the pimel encourages readers to evaluate its findings. (U)
First, the panel was s1ruck by the enormous complexity of these issues and the challenges facing intelligence and law enforcement officers who must wrestle with them. The panel tried to evaluate these events dispassionately and clinically and, although it judges many actions critically, it is fully aware that whatever shortcomings it found.are not typical of the Intelligence Community's overall performance on counterterrorism.

- We saw our work as roughly akin to an FAA assessment of an airline
accident in which a single plane crash is seldom seen as emblematic of an
industrywide problem--5o it is with these events and the Intelligence
Community.
- Our simple aim was to develop a clear-eyed view ofhow the Intelligence
Community's counterterrorism performance can become even better and
how the adversary's task can be made harder. (U)
Second, it is important to understand the context for the Intelligence Community at the time of these events. During our review, we were consistently impressed by the pace, scope, breadth, and depth of US
counterterrorism efforts throughout 2009, many of which produced notable successes. Intelligence and law enforcement officers were tracking threats or supporting operations to counter them in Pakistan, neJt<liiig multiple requests for briefings; coordinating action with collectors, policymak:ers, and the law enforcement comm\Ulity; and providing analysis and support following the June shootings at a US military recruiting center in Little Rock, Arkansas.

j(b)(7)(E) I
Third, based partly on this surfeit of data, the panel concluded early on that it is too simple to call the challenge in these cases a "connect the dots"
problem-a metaphor that strips away context and trivializes the challenge counterterrorism officers face in dealing with truly massive volumes of infonnation. The 25 December case in particular is more akin to what scholar Roberta Wohlstetter in her classic study of Pearl Harbor called the
"signals to noise" problem. In short, the fragmentary clues about Abdulmutallab-the "signals"-were deeply submerged in a vast pool of intelligence reporting-thousands of messages a day, the "noise."

- The task then, and the North Star guiding this panel's efforts, has been
the question of bow to raise such alanning "signals" from a body of noise
that is growing rapidly as technology enables both the creation of more
data and the Intelligence Community's ability to collect it. (U)
Fourth, while petfection should be the goal for counterterrorism. there is really no formula to achieve it. Terrorists are "learning" enemies; they go to school on every one of our successes, play by no rules, do not respond to traditional deterrence techniques, and are prepared to die to achieve their aims~ So while the recommendations we offer and the steps the Community has ab:eady taken will redUce the odds of terrorist success, no one can g'Uanmtee that terrorists will not penetrate our defenses on some occasjon. (U)
Finally, in considering any set of recommendations on counterterrorism, it is important to remain aware that major


on various airline watchlists will produce a surge of false positives; using partial names to increase the likelihood of detecting terrorist travel risks

the Community
(S/INFt-

## What Happened? (U)

The ftrst task the DNI gave the panel was to determine the facts in these two cases. This is elaborately laid out in the first section of the report, in which we document chronologically what occurred. what advance intelligence reporting was available, and what intelligence and law enforcement officers did or did not do with it. There and throughout our report, we focus in more detail on the 25 December attempted bombing than on the Fort Hood shooting. Because ongoing legal proceedings limited our access to personnel and data associated with the Fort Hood case, we relied heavily on the joint preliminary review conducted by the Department of Defense (DoD), FBI, and ODNI. and a separate DoD
inquiry. Moreover, as we undertook this assignment, another group led by former CIA and FBI Director William Webster began an in-depth study focused on FBI's role in the Fort Hood case. (U)
To summarize what we learned about the nature of the intelligence reporting:
Counterterrorism officers were up against some tough challenges in assessing the implications of this reporting. Regarding the 25 December event, the panel nonetheless believes that analysts and collectors could have pursued strategies that would have raised Abdulmutallab out of the
"noise" or possibly even pointed to his target and timing. (U)
reporting the concerns of Abdulmutallab's fatherofficers would have assembled Abdulmutallab's full name, his biographic data. and his association with Aulaqi. This would have put him on officers' screens for more follow-up.

that linked him to Aulaqi. Meanwhile, name
-message. As a result, no one connected Abdulmutallab to Aulaqi and his hostile aims toward the US.

TOP SECRETJ;HCSIStHORCONINOFORN/1-
The panel recognizes that laying things out 1ihis way makes counterterrorism sound easier than it is in the real world of burgeoning volume, competing priorities, aud the attendant increase in "noise." We would be irresponsible, though, to simply conclude that detection in this case was impossible, unlikely, or that these cases were below the threshold.

OUt key point is simply ;that.it w~ possible to find the connections; the recommendations we summarize below and elaborate in the report are

## What Needs To Be Done? (U) (B)( 1) (B)(3) (B)(7)(E) Fbi

Alluring as it is to think the problems can be solved with such mundane procedural steps, the panel concluded that reducing the chances of reoccurretlCes requires much more. The panel was heartened to discover that the Community has indeed "gone to school" on these two cases; we counted over a hundred separate proposals for improvements in various stages of study or implementation. (U)
So in formulating our recommendations, the panel is aware that we are dealing with a moving target. We are convinced, however, that in most areas our diagnosis of problems and our recommendations go beyond or build on what the Community is doing or planning. We believe these must be pursued with the urgency they would have ifNW 253 had blown up in the sky above Detroit on Christmas. Nothing the US Government did prevented that from happening. (U)
A full list of our recommendations follows in Appendix A. Our recommendaliomfaO into four broad. categories. (U)
First, the Community needs more efficient internal processes for locating, retrieving. ami disseminating terrorism-related intelligence that may be submerged in "noise "-and some new business practices for how the Community uses that intelligence once it has been *identified.* Agency heads have already embarked on much of this-directing, for example, changes that require more rapid sharing of reports, updating of dissemination lists, more rigorous visa checks, and all-source approaches to name tracing. (U)
A.closely related part of this is the equally important issue of watchlisting-how analysts use and collate raw reporting to identify a potential terrorist and prevent him from entering the United States.

Watchlisting has improved ~tically since 9/ll, but the panel nonetheless believes there are still some important gaps to close. (U)
The essence of the problem is that the process is too segmented and that no single individual or entity has full end-to-end responsibility for a particular nomination. Everyone works very hard at it, but we found considerable confusion among the agencies about roles, responsibilities, and procedures.

As a result, few participants have a fully infonned substantive grasp from I
'fOP SEORETHI **les/st/IORGONINOF9RN..** (b )(?)(E)
start to finish. At each step of a multi-layered process, someone assumes that someone else took the hard substantive look or did the thorough diggiBg dun is required in watchlisting cases. (U)
We saw this glaringly in the Abdulmutallab case; it is only a matter of time before similar instances occur. (U)
Our report adcitresses in some detail the question of whether Abdulmutallab could have been kept off Flight 253 by designation for the "No Fly'' list.

We encountered strongly competing views on this, with data that can be marshaled on both sides. Our bottom line is that the intelligence was present to nominate him for the "No Fly" list; we are less certain that the nomination would have been approved, given differing interpretations of the criteria at the time. Our :fuller view of this is described in the textbox on page 19. (U)
Related to all of this is what we found to be ambiguity surrounding the Terrorist Identities Datamart Environment (fiDE)-the database that is commonly thought to be the broadest repository for data on people of possible terrorist concern. The panel concluded, however, that in practice TIDE is really a compilation of individuals who have been considered for watchlisting; people who fall below that threshold but who nonetheless merit concern are not necessarily included. This limits TIDE's utility as a tool that analysts populate with fragmentary data to build, identify, and shape a dossier on a suspected terrorist. (U)
To slUnttulrite *our* 1't!co~ns in this tll'ea, the CommlUfity should:

- Clarify the criterillfor Wtltehlisting in a way that does not become
excessively specific, onerous, and legalistic;
- EsttiJJiish a trllining program dud will proWde greater clarity on the
roles and responsibilities of every agency in the watchlisting process;
- Instruct tl1Uilysts to poplllate TIDE with partial derogatory
informatJon....-maldng TIDE "tht! place to build a dossier" -rather
than treating it as a library of completed watchlist nominations. (U)
The second major set of recommendations concerns the need for an information architecture that reduces the "signals to noise" ratio for analysts rather *than magnifying it.* This has been seen as a problem for years but the Community is still far away from uniform or broad application of the search and correlation capabilities available in the private sector or in the average US home; (U)
Slow progress on this is always attributed to the tensions between the need to share information versus the need to PI'9tect it. Many of these problems are understandable, 'but if the Community does not push through these barriers it guarantees that we will have more surprises like Abdulmutallab's attempted attack. (U)
The absence of adequate information technology runs through both the Fort Hood and Flight 253 narratives, particularly the inability of infonnation systems to help analysts locate relevant reporting in a sea of fragmentary data or to correct for seemingly minor human errors. This.

despite the existence throughout the Community of several excellent systems run by specific agencies or focused on a specific problem-but either not broadly available or broadly applied. (U)
Our recommendations call for actions in the near tenn, the medium tenn, and the longer tenn-in an effort to put infonnation technology objectives into a strategic context. (U)
In the near tenn, the priority should be on a problem we saw in both cases-that many officers do not know what data exist and how to access it or use it. Examples of things that. could be. done include: greatly increasing online documentation on what is available, how to get access, who has access, and tips from experienced users; embedding information specialists in fast-moving analytic or operational groups to handle support requests immediately; ensuring that all systems default to .. fuzzy logic" to help correct for imprecision or errors in searches; implementing the DNI's decision to support near-tenn enhancements to a particularly sophisticated CIA analytic tool to enable National Counterterrorism Center (NCTC) and CIA officers to use its unique capabilities with limited technical assistance.

(U)
In the medium term, but sooner rather than later, the Community must enable persistent search, attach analytic insights to data, and bridge the divides that separate datasets. For example, intelligence officers need usercontrolled alerting services that can flag incoming traffic and correlate it with existing reporting--a capability that could have linked communications between Aulaqi and Hasan as they arrived. Officers need to be able to see who else has looked at a report, attach comments electronically, and see what others think-a capability that would have enabled broader discussion among analysts interested in an unnamed Nigerian affiliated with Aulaqi And it is critical to incorporate into all programs tools that enable officers to access multiple databases across multiple networks through a single software interface. (U)
Over the longer term, the Community needs to push completion of state-ofthe-art search and correlation capabilities, including techniques that would provide a single point of entry to query databases for which officers have authorized access. We endorse the joint efforts of various agencies to build toward a common infonnation infrastructure with common data services, such as those for collaboration, access, discovery, audit processing, and storage. (U)
A critical step would be to establish the virtual equivalent of the nowcommon Community badge-that is, a uniform way across the Community of identifying logged-in individuals and their access permissions, together with tagging of data to descnbe the rights needed to access it. This is probably the key step needed to break through the barriers to sharing that result from legitimate concerns for protection of sensitive data. (U)
Intelligence Community Directive 501, which codifies procedures for discovery and sharing of data, effectively lays the policy groundwork for implementing our recommendations on information technology. (U)
To summtJTize our recommendations in this area:

- In the near term, tllke steps to ensure that counterterrorism officers
understand all of the dlltll avtlilable to them and have the tools simply
to ticcesS eflicieirtly what already exists-when they need it and where
they need it.
- In the medium term, augment capabilities to get more ollt of
inj'omuztion with tools that allow officers to team more from the dlltll
than what it presents on the surface-who luzs seen it, what others
think of it or have done with it, what related data are available, and
how it reltites to historictd reporting.
- In the longer term, move beyond an architectllre that relies so heavily
tin human initiative to one in which "data can talk to dllta"-so that
relationships embediled in complex dtttasets are brought to the surface
in ways that IIIOve the analyst's starting point further down the field
and closer to discovery of an adversary's plans and intentions.
- Plli'sue these objectives on 11 "crash" IHlsis. The panel is convinced that
delay will flSSIIre that more Umar FtmJIIks get through US defenses.
(U)
The panel's third set of concerns and recommendations has to do with closing or bridging the structural seams in the caunterterrorism mission.

The "seams" are visible in nmnerous ways--in the blurred distinctions between the NCTC and CIA missions, uncertainty about primary responsibility for homeland-related issues, and an underdeveloped appreciation for the benefits ofjointness" in some mission areas. (U)
We began this stt,ldy thinking that the redundancies in the Community's counterterrorism efforts represent healthy competition and that "lanes-inthe-road" issues in no way directly contributed to the Fort Hood or 25
December incidents. Officers we interviewed consistently said that turf considerations and bureaUCiatic overlap did not play a direct role in either incident (U}
There is no way for the panel to produce a definitive assessment on that point, but there are groundS for skepticism. Generally, the panel thought the competition for primacy on many issues between CIA's Counterterrorism Center (CTC) and NCTC, for example, needlessly diverts the creative energy and resources of both organizations. Both organizations are staffed by highly dedicated officers and both have enjoyed impressive successes. But the panel thinks this competitive climate contributes to the "signals to noise" problem-given that finding the "signals" is highly labor and detail intensive-and could hamper the Community's ability to detect and prevent the next Abdulmutallab-like attack. (U)
Managing this competition bas been a perennial problem since the creation ofNCfC in 2004 and flows from the overlap in the analytic responsibilities of the two organizations and their need to draw mainly on the same talent pool. The panel discussed the merits of merging the two organizations' analytic functions, but concluded that important distinctions in areas ranging from legal authorities to data access argue against that.

(U)
NCTC's unique access to homeland data, its legislative authorities, and its relationship to the FBI make it the natural lead on all threats with potential to reach US soil. CIA/CTC on other hand is the natural lead on terrorist operations abroad, particularly involving support to operators and collectors. We cannot improve on a recent DNI directive that captures these distinctions and embodies many of the views the panel bas expressed in its meetings with NCTC, CTC, and the DNI (See Appendix D). (U)
There have been numerous such efforts to clarify the "lanes in the road"
over the years, however, and in the end it will be a leadership and management responsibility to ensure that .each organization plays to its comparative advantage. (U)
Related to that, the panel sees a need to dramatically increase the focus on threats to the homeland. We believe that the segmented nature of the counterterrorism community and the fragmentary quality of the data require a singular focus by some unit on unearthing such plots. In our view, this should be the primary mission ofNCTC's new "pursuit" effort, which is focused on more fully developing fragmentary data that raise concerns about terrorism but lack specificity. We applaud this effort, which must avoid the temptation to put the bulk of its energy into the more familiar task of tracking threats overseas. (U)
To Sllmllll'ize Olll' recommemkztionsin this area:

- *Orgtmiztltionlll* respm~Sibilities should play to the clear strengths of
each orgtmizlltion. NCTC's rellltionship with FBI, its legislative
authorities, and its tie-in to the homelantl make it the llllrallead on
all threats with the potentittl to reoch US soiL CTC's natural strength
is in focliSing on terrorist operations abroad, particularly involving
SllpJ10rt to operators and collectors.
- Counterterrorism organizations must each maintain both a tactical and
strategic focus. They are mutllally reinforcing emphases in
counterterroris111.
- Wherever Intelligence COIIUIIunity leaders draw the "lanes in the
roat4" SDme ctHnpOnent MIIStfocllS relentlessly and exclusively on
developing allletuls that can point to the US homeland.
- To increase Sellllflessness throughollt the inteUigence and law
enforcement commllnities, agencies should increase the rotation of
officers among these organkations. (U)
Afourtharea isolated by the panel and requiring urgent attention is the confUsion that exists in the Community around how to handle US Persons data. This aecounted for numerous missed opportunities relating to Aulaqi and Hasail'--'both US Persons-and for these types of cases represents a problem approximating in seriomness the shortfalls we document on information technology. (U)
We saw a surprising level of disagreement, even among experienced experts, on whether current authorities allow intelligence collectors, analys~ and law enforcement pet'sODllel to seamlessly track terrorists who communicate with US Persons or who land on US soil and thus acquire US
Person status. Officers in varioiJ& agencies expressed everything from unease to worry about inadvertent mistakes to fear of professional rebuke if they strayed outside existing guidelines. In many cases, the panel sensed that officers bad the authority they needed but were erring on the side of caution-a subtle form of risk aversion. (U)
Given the increased threats to the US homeland in the last year, including an increasing number originating here or involving US Persons, it takes little imagination to grasp how the next terrorist surprise could be the result of confusion or excessive caution about how to manage this issue. (U)
To sUitUIUZI'ize our recommendatitms in this area:

- The ODNI and the Department of Justice must come together to help
the Community updllte, hai'IJtonize, simplib, t:UUl, where necessary,
modih procedures for dealing with US Pe1'S011S data.
- The ODNJ, working closely with the Department of Justice, mllSI meet
a need for Slllntlartlized, continual, Com11111nity-wide training on how to
address US Pei"Som issllt!$, ltl.lilldng swe that agencies are aware of,
(lltd~ thilr liSe *ofiexis61;g* ~rlties that are deaigned to
botll *pnJtect* p~
imd ctnltibel'tkN wf;ile emzblin.g coHection.
xiv TOP SEGRET!lt!GS.'Sfi.'ORGONINer~ ~ l<b )(?)(E) I

- Such training lliUI guidtmce must focus on working-leveliUUilysts and
collectors-those who have to make decisions rapidly on the front
lines-where delay or confusion can open up vulnerabilities or lead to
lost oppm111nities.
- The Commllllity should engage key foreign liaison partners to develop
plans to ensure collection in a way that is aggressive and timely but
consistent with any protections for US Persons. (U)

## What More?

The recommendations in the above four areas cover most of what the DNI
asked the panel to address in its first two tasks. Most of this can be accomplished .within individual agencies or under existing DNI authorities.

In thjnkmg about the tJiirtt task-what might the Community do beyond theSe things and what migtft hew terrorist threats look like-the panel considered sevenu .. :blue sky" ideas and tried to probe beyond current wisdom about the ilatnr"e of the threat (U)
Brietlyldeveloped .in the text are some ideas along those lines, including how we might accelerate the development of improved information teclmology through a "Manhattan Project" approach; how we might make increased use of''matrix" management techniques to erase some of the seams in the ~rism community~ how we might build a "Name Trace Centtat" to work that problem end to. end; how the Intelligence Community's role in the visa issuance process could be expanded; and how the Community might further leverage the expertise of organizations such as State's Bureau of Intelligence and Research and Homeland Security's Office Intelligence and Analysis. (U)
Accomplishing most of these in a direct and efficient manner would involve substantial disruptions and probably would strain DNI authorities as currently formulated and exercised. (U)
Looking to the issue of how terrorism is evolving, the panel absorbed some sobering messages from the experts it separately convened from inside and outside the Intelligence Community. The key ideas that emerged strengthened the panel's conviction that the Community must prepare for more challenging days ahead. According to these experts, among the things the United States must anticipate are:

-
- A growing need to focus more intently on the people and networks that
enable disaffected individuals such as Abdubnutallab or Aulaqi to
become operational.
- The need for a well-developed model of the radicalization process from
which the Community can derive indicators of an individual's propensity
to adopt violent tactics. We have a strategic template for understanding
foreign-based threats. We do not have a widely understood one for the
homeland. (SIIN)
While we have concentrated our review on the Intelligence Community, the panel comes away convinced that preventing the next Abdulmutallablike attempt~ any counterterrorism effort more broadly-requires focusing on more than just the Intelligence Conununity: law enforcement, airport security, the policy community, foreign partners, and even 1he private sector need to address the systemic weaknesses that made Fort Hood and the 25 December incidents possible. At 1he risk of falling back on a cliche, we are reminded of the axiom that a chain is only as strong as its weakest link. Improved collection will not matter without sound analysis. Sound analysis will not matter without a robust watchlisting system. A robust watchlisting system will not matter without effective airport screening technology. Better screening technology will not matter without skilled screeners. There are multiple variations one could make on this chain of events, such as the vital role of foreign screeners at airports abroad-but all would reinforce 1he same point: the Intelligence Community is only one of several layers of our homeland security defense.

(U)
To finally defeat terrorism requires at least three things: destroying the leadership, denying it safehaven, and changing the myriad conditions that give rise to the phenomenon. The Intelligence Community can carry much of the burden on the fust two-but very little on the *third.* (U)
Finally, constancy of support for, and policy regarding, the Intelligence Community is crucial. While intelligence stands apart from politics, policy
(b){?)(E)
toWard. it is forged. in a political environment We cannot emphasize
enough that the pendalwn swings and ebbing and flowing of support is an obstacle tO mission perforrnanOe. NCTC, for example, was slated to lose roughly 35 positio~ prior to Christmas. The post-Christmas reaction to Flight253 has ea$ed tlleDUJber ofwatchlisting nominations to skyrocket; warning bas beCome so common that the Community risks creating its own "sigiiaJs-to-noise" problem. We have seen the same pendulum swings on the collection side, where agencies-acutely aware of past controversies--have erred on the side of caution, sometimes unnecessarily slowing the dissemination of valuable intelligence. The Community's Congressional overseers have a vital role to play in helping to stabilize counterterrorism policies and keep them on a steady course.

(U)

## Contents

page
Executive Summary (U)
Scope Note (U)
xix
What Happened? (U)
1
The Shootings at Fort Hood, Texas, 5 November 2009 (U)
1
Anwar al-Aulaqi's Dual Roles-Inspiring and Planning 3
Homeland Attacks"(St~W)
Fort Hood: Red Herrings and Conventional Wisdom (U) 5
The Attempted Bombing ofNW 253, 25 December 2009 (U)
6
Strategic Warning and Threats to the Homeland (U)
8
NW 253: Red Herrings and Conventional Wisdom (U)
10
Some Preliminary Thoughts on Learning from These Incidents (U)
11
Missed Opportunities: The Context and the Consequences (U)
12
Should Abdulmutallab Have Been Prevented From Boarding
19
Northwest Flight 253? (U)
Analysis and Recommendations on the Way Ahead (U)
20
Internal Processes that Help Find Terrorists in the Data (U)
IT Could Do It: An Opportunity to Revolutionize the
Community's Watchlisting Practices (U)
Information Technology: Managing the Signals-to-Noise Volume (U) 25
Is Information Sharing a Problem? (U)
29
Clearing the Way for Properly Sharing US Person Information (U)
32
Abdulmutallab, Hasan, and Radicalization (U)
36
Blue Sky Ideas (U)
37
Expert Perspectives: The View from "Insiders" and "Outsiders" (U)
38
Some Closing Thoughts (U)
39
Appendix
A.
Consolidated List ofintelligence Community Review Panel
40
Recommendations (U)
B.
Successes: Creating New Challenges for the Intelligence Community 46
C.
Methodological Recommendations for Information Technology (U)
47
D.
Analytic Responsibilities for Counterterrorism Analysis (U)
48
E.
White House Directives for Corrective Actions (U)
51
F.
The Community Response to the Fort Hood and NW 253 Incidents (U) 55
G.
Acronyms and Abbreviations (U)
57
20
23
Scope Note (U)
On 15 January2010, Dennis C. Blair, Director ofNational Intelligence,
established the Intelligence Community Review Panel (ICRP) to explore
the role and performance of the Intelligence Community leading up to and
immediately following the November. 2009 shootings at Fort Hood, Texas,
and the attempted bombiiig ofNorthwest Flight 253 on 25 December.
Specifically, the DNI charged the review group with three tasks:

- providing a detailed factual recotmting of those events, to include what
information was available to the Community and what was done with it;
- providing a review of what went wrong in the Intelligence Community's
performance and assessing the various recommendations and corrective
actions that other review groups have already put forward for discussion/
- and offering an assessment of improvements that other review groups
may have overlooked and that we judge could reduce the likelihood of
future incidents such as Fort Hood and Flight 253. (U//FOUO)
Between 15 January 2010 and 15 April2010, panel members and staff revi,ewed hundreds of documents related to the incidents, ranging from raw intelligence to finished intelligence production and postmortem assessments conducted by multiple organizations. Members and staff conducted roughly 70 interviews, meetings, and roundtable discussions with approximately 300 key decision makers, program managers, officers, and agents from components in the Office of the Director of National Intelligence (ODNI), the National Counterterrorism Center (NCTC), the Centr<tl Intelligence Agency.(CIA), including its Counterterrorism Center
(CTC), the Defense Intelligence Agency's (DIA) Joint Intelligence Task Force-Counterterrorism (JITF-CT), the Federal Bureau of Investigation
(FBI), the National Security Agency (NSA), the Department of Homeland Security (DHS), the Office of the Undersecretary of Defense for Intelligence, and the National Security Council. We do not identify officers by name or title in this report unless it is essential to the credibility of our judgments. Many of the meetings included follow-up requests for information.

- We shared our draft of the factual recounting of events leading up to Fort
Hood and 25 December with senior officers at CTC, NCTC, FBI, and

NSA, and solicited reactions and factual corrections. Any remaining errors are our own.

- To refine and challenge our thinking, we consulted two groups of
cxperts.--<>ne internal and one external to the Intelligence Communityto speculate on what terrorists might consider next, and how the
intelligence and law enforcement communities can anticipate those
challenges. We incorporated some of their ideas in formulating our
recommendations.
- Finally, we brought in four external experts to review the draft and offer
comments on its logic, clarity, and recommendations. (U)
Despite our best efforts, our work remains incomplete: new information continues to arrive that refines, clarifies, or challenges our understanding of both events. We had limited access to some materials related to the Fort Hood incident, some of which undoubtedly would affect our judgments;
agencies and departments varied highly in the level of detail they provided;
and we had only 90 days to research and draft this report.

- W c focused more on the 25 December incident because the implications
and responsibilities ofthe Intelligence Community were greater than in
the case of Fort Hood and because both the Department of Defense
(DoD) and the FBI had commissioned outside reviews concerning Fort
Hood. Where possible, we relied on information gathered for these and
other studies, such as the ODNI 30-day review.
- FBI Headquarters asked us not to interview field agents because the
Army team responsible for prosecuting Hasan indicated that these agents
are possible witnesses in the military prosecution.
- Similarly, we were unable to obtain the restricted annex of the DoD
Independent Review Group's report on the Fort Hood Incident,
referenced in media reports discussing derogatory information on Hasan
that was not included in his official DoD personnel filcs.3 (UHFOUO?
It is very important to note that what follows is written in the spirit of critical, objective self-evaluation that has characterized the Intelligence Community. Our posture is one of assessing these events dispassionately and clinically, fully aware that the shortcomings are not typical of the Intelligence Community's counterterrorism performance. Our aim is simple: to develop a clear-eyed, independent understanding of what we need to improve in order to make the Community's performance even l<b)(?)(E) I
better. And the ultimate objective we must all share is to make the adversary's task harder. (U)
Panel members were the Honorable John McLaughlin, former Deputy Director of Central Intelligence; Mr. Dale Watson, former Executive Assistant Director for Counterterrorism and Counterintellligence at the FBI, and the first FBI deputy director at the CIA's Counterterrorism Center; Dr. Peter Weinberger, a senior scientist at Google and a member of NSA's external advisory board; and Mr. Alexander Joel, an attorney serving as Civil Liberties Protection Officer in the Office of the Director of National Intelligence.

- Staff members were four senior officers with experience in the CIA's
National Clandestine Service (NCS), Directorate of Intelligence, and
Counterterrorism Center; the National Counterterrorism Center; and the
Office of the Director ofNational Intelligence. (U)
Report to the Director ofNJttio,nal InteBigence on tke Fort HoOd and Northwest Fligbt 253 Inddents On 5 November 2009, Army Major N'ldal ,f1asaD
opened fire at Fort Hood, killing 13 military personnel and wounding Or ilijuri.ng 43 militaty ~
civilian pe1'SODDel before being incapacita1ed by police and taken into militaiy custody.4 Seven weeks later, Nigerian Umar Farouk Abdulmutanab boaided Northwest Airlines Flight 253 departing Amsterdam bound for DetrOit, Mi~gan. Abdmmntallab tried to ignite an explosive device as the plane neared Detroit, but did not fully detonate the explt>sive. ~lte was quickly subdued by fellow passengers and taken into custody upon landing. (U)
What. foll()WS .aze tactual account$ OfWlaatthe intelligence and law enforcem.ent ~ties aid in the nmup to these events~ These are not~
to be exhaustive. These accounts highlight, based~
. available data, what the Community knew; when and how it knew it, and where the Community night have bad an opportuni~ to affect the coo.tse of.CVQ~ts. {U)
This assessment was prepared for the Director . .QfNational Intelligence by the Intelligence Community Review Panel. (U)
.

b For additional detail on the facts and circumStances leadiitg up to the shootings at Fort Hood. see the DoD, FBI. and ODNI Preliminary Review of Intelligence Olll!i Intelligence.~ on Niddl Malik HfJStlliPrlor ftJ lhe Fort Hood *Shoot.,* submitted to tbe White House on
30 November 2009, the DoD West-Clark report..

Protecting the, Force. *Lessons from P:ortllood,* and the forthcoming Iq)01't by Judge Webster~ who~ kading an independent reView oftbe FBI's acti.tins With respect to

## Top Seoretj/Fig&Iswjorcon/T40Forn.. L<B)(?)(E) I Top Seorel'Iihcs/Sift'Oftcohinofofltn.. J(B)(7)(E) I

On 27 May, the W~n Field Qffice replied to SanDiego'sJanuaryEC. 10 WFO'sreviewof~
source, FBI, and DoD d.atabases.bad prodUced no derogatory information on :ffirsan. In fact, they discovered that Hasan bad been promoted to ougor ten days preViously and was conducting .msead ~
Islamic beliefs' impact on views of mititaty servke in Iraq and Afghanistan-research thadlasan's supervisors had praised as having "extraordinary potential to inform natic,mal policy and military strategy."
TOPSEORETI/tiGS/S~OONINOFORt'~ l<b)(7)(E) I
TOP **RCI'ti!Ti/HCS#St/IORCON/t40FORN** ~~

(b)( 1)
(b)(3)
(b )(7)(E)
FBI
entire
page

TOP SECRET!JHGSAiii~RGONINOFORN/-
j(b)(7)(E) I
~
~e father said that he was concerned his son .. bad fallen under the influence ofUDSpecified religious extremists;"' had become
"active in the college mosque" while studying in London; and that his son planned to "commit his life to *dawa,"* or proselytizing. Abdulmutallab's family also assessed that Umar Farouk was .. a victim of inexperience and naivety and influenced to join groups who would be willing to engage in illegal acts in the name of religion.  (SIMeS 1'0CINF)
The father did not explicitly associate his son with terrorism and provided no names of the religious extremists. 28 The father noted that intelligence l<b )(?)(E) I

- As we discuss elsewhere, the draft intelligence
report was not disseminated until after the incident
on 25 December. (lii lfoWCSIIOCMF)
place a 'look out' for Umar Farouk Abdulmutallab in the State Department Consular Class System," the State Department's visa database.33 The Embassy, in tum, sent a Visas Viper cable addressed to State!INR, NCTC, FBI, and DHS-notifying them about Abdulmutallab's possible ties to extremists.

- State Department's Visas Viper cable prompted
NCTC to create a record for Abdulmutallab in
NCTC's Terrorist Information Datamart
Environment (TIDE).
-
searched the State
Department's visa and immigration databases, but
because the State officer misspelled
"Abdulmutallab," did not use a name variant search
iool, and did not search on his passport number, the
search did not flag that Abdulmutallab held an
. active-US visa,.which could-have~sed ofticers.to
focus more on him. 34
- Recognition that Abdulmutallab held a US visa
would not, however, have automatically triggered a
specific procedural step, such as placement on the
No Fly or Selectee list.
,...,.,,(b-,...)(=7,...,)(E"""'")--,I

## Top S&Gre'F.'Irs6#8Llforoon#Nofarniiii (B )(?)(E)

Scbiphol Airport in Amsterdam. Dutch authorities pulled him aside for secondary screening because of immigration concerns; TSA officers whom we interviewed *said* that Abdulmutallab revealed no signs of nervousness during the screening; ailport screeners x-rayed his carry-on luggage and directed him tbrough a standard metal detector without incident. Passengers seated near Abdulmutallab later
"FOP **SEeR1'1/HeSISif/ORCONJMOPORN** ~ l<b )(?)(E) I
told US inv~gators that he demonstrated no unusual behavior until the incident.

- As the :fijgbt ~
landing. Abdul.mutallab tried to
ignite a ~ly
detonated explosive; the device
did not ignite PIQPetly, and Umar Farouk was
subdued by other~ The ~ligence
Comnnmity learned during subsequent debriefmgs
that Abdulmutallab had received unspecified
traiJ;1ing from explosives ~
Jlnahim }Iasan
~.Who bad been connected to the attempted
ass~ination ofSaudi Minister oflnteritit Pririee
Mobamined bin Nayif. Asiri bad provided
Abdulmutallab with modified pants and sYringes,
with the goal of taking down an aircraft over us~..,..,..,.-,
54 m,'~
- The Stale Deportment's *miBBpel/mgQj"* ~lab.,;~~~a~
AbdnlmntaDabreceiveda~USvislinJtme~W-..
~1:0.
.   .
i1
,,
'
- Abdulmutollab sailed through airpf1 *scretm:ing.* 58 Abl~~
authorities in~.
W'Do WCIII'eeoDec:Rl1~1tJ
detector and lBs cmy--on blgage W8S X~
statc-of-tho-artaixpott~.~'IWllld Jlae ec.:lekld
on Abduhnut:aDab's body~
- TheUS~.dfdriot~IIRJI~~.
Amsterdam. ~
9 CusbDS andDosder ~
(CsP)
compared it againSt a~lookiug:lbr.~ -
included Abdulinutallab .. Fatthef~oft:t..
on the State ~s
va. VtpircQ~e, wltkh is
to interview Abdukm:nallab 11p0n am\'al

(b)(1) (b)(3)
(b)(?)(E)
FBI
(b )(1)
(b)(3)
NSA
(b )(1)
(b)(3)
NSA
(b)( 1)
(b)(3)
CIA

## Some Preliminary Thoughts On Learning From These Incidents (U)

In assessing the events recounted above, the panel believes it is important to keep in mind the following three points. (U)
First, there is no recipe for *perfection.* Terrorists will not stop trying to penetrate our defenses, and some are going to get through. The American public, elected leaders, and Intelligence Community officers are understandably uncomfortable with that idea, but it is an unavoidable reality-one that should be communicated to the American people. The task of identifYing and screening terrorists who may seek to travel to the United States is a daunting one, and illustrates the signals-to-noise challenge. More than
1.2 million travelers try to enter the United States by air, land, and sea every day. Consider the scope of the air travel problem: passengers enter from 245
airports on more than 1 ,600 flights each day; TSA
officers screen 1.8 million travelers entering and departing US airports across the country each day. 64
No amount of collection, no aggregation of data, and no level of information technology will guarantee the government detects and prevents all terrorists from making it onto US-bound aircraft or into the United States.

- Worse yet, the United States is dealing with a
nimble adversary that constantly adjusts to exploit
any weak link in the homeland security system.
Better US collection capabilities prompt terrorists to
adopt newer and more exotic forms of
communications; more invasive airport screening
technologies prompt terrorist to seek new ways to
evade screening-such as entering through
countries where patdowns are taboo-or alternative
modes of entry, such as by sea or by land. Every
US success is a learning opportunity for terrorists.
- Individuals already inside the United States, who
decide to use violence to pursue the aims of foreign
terrorist groups, pose another threat with unique
challenges to detection and preventionparticularly if they limit travel abroad and
communication with known terrorist groups. If we
are to identifY .. homegrown extremists," we must develop new methods to detect threats in the homeland, consistent with our laws and respect for civil liberties, and enlist the support of all Americans. Here, too, there are no guarantees.

(CI~
Second, information overload has made the signal-tonoise challenge even harder in recent years. The intelligence, homeland security, and law enforcement communities are swimming in data and often armed with outdated information technology; more analysts are needed to cover some of the nation's most critical national security challenges. Our recommendations address these areas, together with changes in work processes that must accompany them. The Community must recognize, however, that additional resources and better technology-while necessary and welcome--are no panacea. More information will always be available to be analyzed and correlated. These changes can only reduce--not eliminate--risk. (U)
Third, in assessing the events leading up to both incidents, and in considering any set of changes to the counterterrorism community, it is important to remember that choices will entail tradeojJs-ftScal, bureaucratic, and *so on.* Ultimately, where to draw the line on those issues is a political decision, but the entire Washington community should understand that choices will have potentially unpopular-and almost certainly unintended-consequences.

- Surging analysts to cover an emerging threat means
moving analysts off other !>Nnnnt"
- Easing standards to place more suspected terrorists
on the No Fly/Selectee lists carries clear tradeoffs,
such as a likely surge in false positives. Allowing
collectors to nominate suspected terrorists on partial
names-increasing the likelihood of detecting their
travel-risks compromising collection programs
when individuals are linked with aliases used only in their covert communications, while better information sharing with foreign governments or the airline industry inCt'eases the risk of compromising sensitive information.

- Requiring the airline industry to do more to support
the Intelligence Community-such as sharing
passenger lists earlier than 30 minutes before
takeotf-cottld require earlier check-in times for
travelers, undoubtedly an unpopular move. 65
Requiring that airline companies tilfonn the US
Government whenever an individual on the No-Fly
List tries to purchase a ticket probably would meet
with complaints that.the US Government is
imposing eostly additional bmdens on the industry.
- Instituting a minimum waiting period to acquire a
US visa, which would give State Department and
the Community more time to research suspicious
applicants, would undoubtedly prompt complaints
and perhaps even in-kind retaliation from some
foreign governments. (S/INF)

## Missed Opportunities: The Context Ud The Cousequeoces (U)

As the panel reflected on these events; we wete acutely a'Wal"e that hindsight always brings greater clarity. We also readily concede tbatourjudgments are in some ways provisional, because new information wi11 probably emerge in the coming months. We learned this lesson in
(b )(1)
(b)(3)
NSA

- These events did not occur in a vacuum; the
operational tempo and workflow for the Intelligence
Community were heavy and sustained throughout
2009 and in the lead-up to both incidents. Both
cases had novel aspects not previously seen by the
Intelligence Gommunity; the 25 December incident
was the first attack against the homeland by an al-
Qa'ida affiliate.

- Nonetheless, the intelligence reporting that could
have led the Community to identifY Umar Farou.k as
a potential terrorist threat before 25 December
merited greater scrutiny-although Intelligence
Community follow-up actions would not have
necessarily have kept him off the ajrplane.
- Causes of these "missed opportunities" ranged :from
human error to poor decisionmaking; heavy work
volume; an occasional lack of individual
inquisitiveness or understanding about who was
responsible for driving an issue through to its
resolution; ambiguous roles and responsibilities; a
lack of understanding of key databases; and
information technology systems that do little to help
officers and agents find and correlate key bits of
reporting amidst a sea of data. (TSNSI/~)

During our review, Ml' were consistently impressed
by the pttce, scope, breadth, and depth of the
Community's counte'*"orism efforts throughout
21HJ9, IIIIJY of which produced 1llllhle SllCCesses. -
During ~period, analysts were tracking

net<nng nrultiple requests for briefings; producing a steady stream of current production; participating in daily teleconferences with collectors, policymakers, and the law enforcement community; and providing analysis and support following the June shootings at a US military h NCTC's Homeland Year in *Review for 2009* noted,
"SuccessfuJ attacks, disrupted plots, and arrests ofSwmi extremists in the US in 2009 reached their most significant level since 2001." (St/N.F)
recruiting center in Little Rock, Arkansas.fm We discuss further some of the successes we encountered in the course of our review, and ways in which success can create new challenges for the Community, in Appendix B. (Tlilt/WCS.LSJm.W)
In addition to these other pressures, counterterrorism d officers were working with enonnous data flows:

compressed timeframe, unlike the methods of
~~;:-~~~g~;~ bv tQa'ida ~~~?}(E)
It is thus too simple to call this a "connect the dots"
problem-a metaphor that strips away context and trivializes the challenge counterterrorism officers face in dealing with massive volumes of data The 25
December case in particular is more akin to what scholar Roberta Wohlstetter in her classic study of Pearl Harbor called the "signals to noise" problem. 68
In short, the fragmentary clues about Umar Farouk's plans--the "signals"-were deeply submerged in a vast pool of intelligence reporting-thousands of messages a day, the ''noise." The task then, and the North Star guiding this panel's efforts, has been the question of how to raise such alanning "signals" from a body of noise that is growing rapidly as technology enables both the creation of more data and the Intelligence Community's ability to collect it.

(S//NF)
But even allowing for a challenging "signals to noise" ratio, the panel could not avoitlconcluding that the body of reporting related to the 25
December case deserw!il greater attention than it received. To be sure, hindsight separates the
"
fro re
-
"
..

f...

-
~.

..

was not surprising given that Nigeria is the world's eighth most populous country. That context is essential. ff'sf/Sf/INF)
What moved the panel to the view that this case should have stood out priorities, information overload; cun1bersome technical tools-all were factors that help explain why many of these reports were not actively pursued.

''Stovepiping" of accounts, however, was not-these reports were sufficient to raise red flags for analysts covering AQAP operatives, AQAP use of foreigners, AQAP travel plans, or *AQAP* threats against the homeland. We highlight below the opportunities for this case to_ surfuce:

##

- Sorting out reasons why these reports did not
receive more attention led us to conclude that either
they were submerged in a heavy volume of
reporting or simply reinforced analysts' concerns
about the threat posed by Aulaqi and AQAP to
targets inside Yemell--"-a danger to which the
Intelligence Community already was alert and
acting on.
The panel identified one report that should have prompted roiJltst pursuit by the Jnte/ligence Comlltll1lity and cotdd have led to identifiCation of Umar Farouk Abdulmutallab as a potential threat before 25 December. But-emblematic of the challenges facing counterterrorism officers-this report included no biographic data for the unnamed associate who, in retrospect, almost certainly is identifiable with Umar Farouk Abdulmutallab .

- We cannot rule out that there were efforts to pursue
this thread that the panel did not uncover. But we
were unable to document any follow-up. Short of a
scrub of known AQAP operatives or an intensive
l<b)(?)(E) I
The panel reecqgaizes that these recitatiOns aion&-in which we isolate reports and lay them out seriallymakes detection and warning of terrorism sound easier than it is. We have no illusion that this neat overview approximates in any way the real world of the Community's counterterrorism analysts and law enforcement counterparts. But we do think it was possible to make these connections. In much of what we recommend, we discuss strategies intended to make that more *likely* to occur in the world of heavy reporting voli:unes, competing demands, and high operational tempo that terrorism analysts actually occupy. (U/t.FQUOJ
There were several missed opporllmities'that coldd have increosed the odds of detecting AITdulmliiiZilab or *Hasan.* The causes of the missteps ranged from human error to inadequate information technology, inefficient processes, unclear roles and responsibilities, and an occasional lack of individual inquisitiveness.

December, prevented officers
from piecing together two key reports.

- State Department's errant name trace did not
reveal thst Ahdulmutallab had an active US visa,
which could have raised the Community's attention.
Moreqver, no one apparently noticed that
~lab's
passport from several years earlier
indieamd that he had a pending visa ~on
in
2008.
.
In both Cfl#S, the intzdeqllllCY ojinjonntllion technology for aggregating lllul correkiilng the t'fikmnt.,..,mtg wa *strlldng.* To be sure. much of the ~tlmt.~
bal'e causedUmar Farouk and Hasan ttl riSe above the t1rousands of pieces of raw in~
was available in one da.ta'set or tmotlier; ~focused seare~tes-such as o1r #U~
Farouk"mid "NlgCria"-would have'~
1ihe
~to a manapble number. Bt;ttef,
~teehaology could have helped
~fur liuman errors, time,pressufes.lteavy WWoad.l)rmmtcooUngs.

inCTC andNCTC~1he
pro~ofdatabases and the tim~g
riafm:e oi~
and searching eacll one.; JITF
pCrStmnel~in WFO, for example, baa to worlc: with
nearly two dozen separate databases-iooluding
one using an antiquated DOS-based system.
- This prompted CIA to change how it disseminates
intelligence, which we detail later in this report.
- We found that counterterrorism offtcerS from
multiple agencies had widely varying degrees of
familiarity with watchlisting terminology and
processes in their own agency, let alone the greater
enterprise, which translated into uncertainty over
who had responsibility for ensuring that a suspected
terrorist was placed on a watchlist .
# ,....,(B-)-(7-)( __ E_)_,,

(b)(7)(E)
To sa~
o11Tcq11dllsiom tmlldssetl
opporlltwitin.in *t-e* ~
cQSf!S:

- The pace, scope, depth, tmd Intensity of the
Comnnmity's wtirkloild in ~~ ran-ap tD both
events pliqed a rtJie iii olficerS not tretdihg the
reportbtg with the sense of lll'gency it ilesNved;
- Jnadeqatlie info1"11Ultion teclmology did not help
anlllpls iltltl *agents.* ~'and
COI'I'fllate
releMnt~eltherfleCallsetlle~
was liariell.in a!ietl tl/dtztaor sprellll among a
nmze of ,mc9nnecteil titltiiJmses;
- A.se(iesof~.~;/i'fnt,,._,~ ltJ
uncktzrIJilllleir~1llill~n
~.liretmttlttlt:kej~w~n
diil1$treabh people who migllt hawpieced them together or t1d8d on them;

(b )(1)
(b)(3)
ODNI
CIA
NSA

(b )(1)
(b)(3)
ODNI
CIA

## . An~Is Add, Jleeommeadatifts'Oa Li .. (W8,F ~(U)

As part of the panel's secolld tasJr. *:~asked to OOJD.'flt'eDt.ontnewrieus ~
tml.tthe Jntelligem;e ~~
iseoftsi~
d as wen as those~lirtbeseDate~~
on Intdligence(SSq)andvarious ~t organimions--mid fu ofter~
~ofonr.own.. We$) soful.}y itwa:re thattherewillalwaysberi~o'f~~
such as those at FortHOod arid threiatS to a~
.

securily; no set.of~OBS,:~iffufly
.iDlplememed, will.el~ SUCh ~::$ill.

.

:We bel~~many.ofdtese'~ will
increase theatlds that us and foreign~
can stop similar .incidents. 90
.
.
We found tbat~~ bave "gone1nsehoof" on
these ~and areitnpiemenllittg~ ~igned
tolimit~k~- Weare~
aware. that SS'Webave studieathe~ ~
eoilsidet'ed~ a test Of ..
agencies ana~"()l)Nl-~tbe ~tling .
simultaneoU$11 . We thUs eQJle1tidetf.tfiaf QUI'
oompamtiveali~._inl~~Y
across these im"tiatiVes and ~Which
O'Jies'descne addcd~s 8n4~no~ ~
there may be gaps.
'We thetef~m~~ soolyasmall
segmeatofthe~tm:ditec;~~s
currently under~.
mrevlewiug~after:-
. acti0n J;epOrt,s ofimli'VidUal ~et~ihnu, we
iEJcntiiied m.ore:thim IQ(;} separate pro~
Commuhlty-wide, Some ~ifictO mdividiuil
organizations--so~ comment~ on~
that.
struck us as mi:)st J'Slevmtt Weals<) flag~ .
proposa~s that struck l1s as. UnwiSe mmtmeois of
time, energy, and~
- Some ofaur reool'il!J)et!'dat~ are~
and IOng-
tenn-enchmy~~'~~
 .others areimtt'~~ teChnicat~lllftl~~!c;
but struck us as important enough to merit attention.
 We a:re~on moving targets; scme
~are
already Ullderwty.
- We also nWiZe that some of our xecommen4atiol!IS
are nottle\ilr. In part,~ flag those issues for that
very~: yearsofinteragency discussiensand
~~not
produced ac,tion, evon es ~
 ~.~continues. (U#.FOU~
l)isti11iag ijJe ~
metors OOIJlPlieat:ini ~
ped'~ t&aDmageable11Wllber, we'J()Cl:med our
~~ibm'
key arc., ailofwhich
w~
at ..
to one degree or an.otber m the cases of
.~~
or).bdwnmtallab:.
.~:'More dlidelltilltermtl,pnJeeSSeS tbat,}lelp
'.analysts locate, retrieve, -~~lml
~iutel~
anewbusines&~s
roc how the Conummity uses 1bat intelligence once
it has been~
~Aa~Udlnology~that
~~than
cootributesto.tbe.~
nois'c~,welmVt~y~.
A~~oflabortbat~
~~-tiW~~tllteS'()n
l:lm:ets te a:~tasi;amd Plays to the
~~eofvari(msommmiity
pat1:nelS;
. ~~~~
~euftlm)Uiidi'QgUS
~-.
raagfugftottl eollectingto ~
storing. and Sharing this intelligence. (ti/IFOOO)
~~
tltat Help Fm'dT~FJriStsttn tile Dafa Barty mom: reVi~ We identified Several problems
tbat.~the Commtmity'sabilitytotmd the

tenOiis'tj~m the: available data. There are $VO
~tothisprobtem: ~-~c
~.that adfeet the Con:.nmul'ity's.~ to
~.c~ibfohmtion,aml~
mtefti~ ts pmtedtogetber to support 'the
watchlistiag process. The. ftll"Illel' changes are
~lt" ..
Ie; the 1titCr requfre cba:ngiDg how
intelligence officers conceptualize and leverage the watchlisting process. (U)
Many of the problems we identified early were similar to those other review groups have no1ed.

Among the earliest judgments we reached:

## (B )(1) (B)(3) Cia ~Lligence~ -Must Be Disseminated More Rapidly,

- NSA field dissemination lists need to be updated;
- State Department visa searches must be more
rigorous and technologically sophisticated;
- NCS names traces must be conducted in all-source
databases. (Uf!FOUO)
We were heartened to learn that agencies have already made headway on virtually all of these issues.

- The Director of CIA has already ordered that all
NCS countertetrorism-related field reports be
disseminated within 48 hours of receipt, and NSA

## Lissejmimltion Lists (B)(1) (B)(3) Nsa ~Es -----91

- State Department has addressed processes for
conducting name traces. State Department oould
have searched on Abdulmutallab's passport number, which would have been more precise than a tnmsli:teration of a foreign name, and could have used a "fuzzy logic .. function that could haVe corrected for the typographical error, but. did not.

In response, State Department has instructed its o:ffieers to search the Consular Consolidated Database using the "fuzzy logic" function, include all CUIIent and past visa information on the Visas Viper cable, and conduct searches Q.n passport numbers. If implemented, these:measmes will increase the odds that known or suspected terrorists will be detected earlier in the visa application
9'....,.,., process. - v:;;,_/i ... i1
..... ,"--
We offer several additional recommendations as the Community moves forward in improving the seacch for terrorist identities. 93

- Some of the steps outlined above should be
expanded furougbout the ~unity. All agencies
should promptly diSseminate counterte:r"lorism
reporting, update their dissemination lists on a
regular basis, and conduct name traces against all of
their holdings. Dissemination lists for
counterterrorism-related intelligence and. State
Department Visas Viper cables also should be
updated on a regular basis to ensure that collectors
in the field receive reports germane to their area of
respons1bility .
- We recommend 1bat agencies examine whether
complicated dissenii'llation codes can be
stan.da:rdiized or simplified. The roliting error of the
~a
predictable COllseCpie:llce of
having such detailed dissemination codes.
- ~
search for terrorist identities should be
conducted against all holdings available to that
agency.
- A ''fuzzy logic" tool that automatically formats and
searches variant spellings and renderings of foreign
names, should be available and used in name traces.
- "Discoverability" should be part of the process. In
practiCe, this means that if an all-source search
against a name or identity leads to information
(such as a phone number) to which the searohing officer does not have normal access, a notation will direct the officer to a point of contact who can grant access to that information.

- Officers performing identity searches should be
trained to look for partial names, along with salient
points such as the person's location, affiliations,
passport~ schooling. or travel,.....,-details that
can further narrow the search and identity an
individual. -tG',LNP)
The second half of improving the search for terrorist identities centers on the equally important issue of watchlisting-how analysts use and collate the raw reporting to identity a potential terrorist and prevent him from entering the United States. Watchlisting procedures clearly have improved over the years.

Prior to 9/11, the US Government maintained 13
separate watchlists; today there is one. Since 9/11, multiple agencies transferred information from their systems into TIDE. In no way do we mean to detract from the progress to date. (U/7POU6)-
Still, the panel believes that *the* watchl~ing process needs. *adjustment.* The Comnnmity's understanding of watchlisdng is inconsistent, between and often within organizations. The natui'e of watehlisting-an end-to-end process spanning multiple units and organizations-has led to a segmentation and redundancy to an extent that ensures that no single individual or entity has full responSibility for a particular nomination. We saw this dynamic .

glaringly in the case of Abdulmut:aliab. It is Only a matter of time before similar instances occur.

(U,t,'F~
In short, *indivl* ~~even when performing their tasks efficiently and energetically, take a fairly narrow view of *their roles.* Evecyone works vt:cy bard at it, but we were struck by the uncertainty about roles, responsibilities,. and procedures. Within the NCS, we found uncertainty among officers dealing with the Abdulmutallab case about. the steps in the watchlisting process, limited awareness of what analytic efforts were required to search and tie together information to fonnulate a watchlist request, and what CTC Watchlistii.tg officers would do with the request; CTC Watchlisting officers assume area division officers have already searched for derogatoiy information and made pertinent associations before submitting the nomination, and that the job of ere Watchlisting was to format nomination packages for passage to NcrC
Watchlisting. NCTC Watchlisting officers, in tum.

stressed that their primaty role is entering data into TIDE and forwarding nominations from the feeder oiganizations, because they relied on nominating agencies to have done the all-source analysis. TSC
officers rely mainly on the strength of the nominations as they receive them. (U//FOUO)
Closely related is the ambiguity surrounding TIDE.

TIDE is the US Government's central repositocy of identities for known and suspected international terrorists; ImDY in the Intelligence Community-and, based on press reporting, in Congress-believe that TIDE is the place where the intelligence and law enforcement communities can easily search for and piece together bits of terrorism-related information.

In practice, however, TIDE is not that database.

TIDE as it currently exists ~s largely a eompilation of individuais who have been considered for watchlisting; individuals who fall below that threshold but who may nonetheless merit concern are not necessarily included. TIDE is not uaed as a dynamic tool that analysts populate with fragmentary intelligence to build, identity, and shape a dossier on a sUSpeCted terrorist. (UI/FOUO)
With that in mind. we offer several recommendations.

- The criteria and threshold for watchlisting need
greater *clarity.* Throughout our interviews we
heard thatdiffefrent agenciesuse differing
int~
of the criteria forwatchl,istiihg
n~.
94 Regardless of~,~~hold
for derogatory information eventually settles, the Intelligence Community needs a single set of transparent guidelines that enables analysts to determine whether and when they may nominate a suspected terrorist. We agree with SSCI that TIDE
administrators should accept nominations based on

- We. endorse the White House recommendation that
partial names; terrorists rarely use full, true names in their clandestine connnunications.

- We also caution agai!Jst criteria that become too
NCTC develop a records enhancement capability
that can build, locate, and track derogatory
information on all *intlividuals* in Tll)E~:process
already,rmderway.
- W atchlisting efforts should be streamlined and the
specifiC and *caveat-laden.* If past experience is any
guide, attempts to lend greater precision and add
nuance only open the door to greater~
when inherently subjectivejudgments me at plJ~.y. 95
r.Mngs *redirected* Agencies sucll as CIA
haw:e large .staffs whose primary duties are

| (b)(    |
|---------|
| (b)(3)  |
| NSA     |

-
As SSCI recently observed, the staQdalds ta place
an individual on a watcblist are simply too
complicated. 96
data entry;and processing before fol'W8I'ding the nomination to 1he NCfC Wa~ting staft Similarly, the primacy dUties of the }'fCTC'
Wawhiisting staff are to enmr ~~'~be data

- The Community needs to establish greater clority
.Deiore ~the
nomination to TSC. oar
interviews showed that such ~has given

on roles and *responsibilities,* making clear that the
nominating agency should see the nomination
through from start to finish. Ncrc plays a
particularly important role tracking suspected
terrorists who fall into. the amorphous categocy that
crosses between foreign and domestic jurisdictions.
each organization a sense. that otheiS;~ doing
more than they actually did. Reducing $0me of tbis
duplication couid make availahle resources that
could be redirected to other important watchlisting
wti~wroa:sr~~.IT
improvements can simplify this process.
oar mterlocutom often told us tDat: the ~~Wen Jl9tpliirii'Yaml'f~ ~*
present state ofU in the relevaafparts oftlhe~Co
.. unumtJ>-~emhtJt~l!ftisietH~~tT
could be doing:.....tb.is is true . But ooosider 'Miat woUld ja.ve~~if~l'f'~~~-cU')
1he Community to assist with nominations fer watddisting:



- A system with the sophistieated entity resolution capabilities oouldautomatieany .build'8m\i~TmE
dossiers based on data available to NCTC.


- An algorithm could give these dossiers p.relimiuaey"score~t~tlle~'of~~
criteria, taking into account presence ofdle necessay~(iil'l~ dllteo~ ete:hatf~cOf
associated derogatory (i.e . membership in a temmst ~).
' "'
- These computer-generated doSsiers would flow to the watchtisting aoaiysts for processing. with the relevmt
biographic and probable derogatory data bigb1igbted. AB new infOmlation came in, the~
would
highlight it in the dossiers pushed to the analysts.
- While we cannot be sur:e without expetimentation, we think it likely that ovm time the algorithms also could
be trailled to identitY the probable watchtisting criteria. tbst the dt:Jssier fits. {S#NF)
...,..,(b-)( __
7,...,.,)(E""'")--,j

- Analysts need to use 11DE as a primary repository
of intelligence rather than merely as a step in the
watchlisting process. In focusing on placing
suspected terrorists on the No Fly list, the
Community appears to have missed opportunities to
use TIDE as a powerful tool for aggregating all
derogatory and identity reporting on suspeered
terrorists; we recommend that NCTC take ~lead
in a Community-wide training progi'8Jn to help 'all
agencies understand the purpose of TIDE,
been fed into other watchliSt databases. The fragmentary nature of counterterrorism reporting makes it imperative that analysts lean forward in populating TIDE with derogatory and partial identity intelligence rather than waiting to assemble a comprehensive intelligence package that meets all of the criteria for No Fly status.

- The Community needs a standardized training
program on the specif:cs of *watchlisting.* We have
seen some. review groups claill1 that the 25
December incident proves a need for centralized
analytic tradecraft training, but in our view a more
pressing n~e
clearly related to the Flight 253
incident-is a common and~
understanding of the watchlisting process. IfTSC
remains the final voice in the No Fly/Selectee
decision, it should be the lead agency to direct such
a training effort. so that its standards are clear to all
nominators. (:!1/M')
To Slllfl1tftlriz. tlll1' recommentlotiom, the Commtmity shollhl:

)-
Use 1111-soiii'Ce hol4ings for searcltes on terrorist
identities; let1ert1tfe techMiogy such flS "fu;::zy
logk" fOr lfll1tfe wuilmts, *and* ~disctwertibillt"
tllwtlUltVes when there is relevant information
in lllltJtlrerlocation; train oflkers to use all the
Sil&nt details tltllt Cllllfii17'0W IM search and
identih im lndividllaL
)-
Clarify the criterillfor waichlisting in a way tlult
does not become excessivezy specific, OltDOilS,
and legalistic.
};;>
EsttdJJish a t1'tlining program that will J1"ff"itk
greater cltnity on the purpose of TIDE, the roks
and respun.sibiliti of agencies that may
popu/Gte it, and how TIDE }its into the larger
watchlisting process.
};;>
Instruct analysts to populate TIDE with partial
derogatory information---mtJking TIDE "the
place to build a dossier" -rather tlum tl'eflting it
flS a library of completed watc11/ist nomintdions.
(CtiNF)

## Information Technology: Managing The Signalsto-Noise Volome

Inadequate information technology runs through both the Fort Hood and the NW Flight 253 narratives, particularly the inability of IT systems to he)p analysts locate relevant reporting in a sea of fragmentary data or to correct for seemingly uWro:r human errors. The Intelligenee Community's IT
tools-wbicb generally lag several years behind those of private industry, and even f.artherbebind tDosc available to home users-did not help io1e1Ji8ence officers and agents correlate data that could have increased the probability of Abdulnmttalab and Hasan rising above the noise. Indeed, the incidents highlighted what we assess are the two main technological problems facing counterterrorism offiCers:

- Limited visibility and accessibility of
counterterrorism data that are distributed across
multiple, discrete databases and *systems.* NCfC
analysts, for example, have access to more than 28
separate databases and systems, each of whicho for
the most part, has a separate log-on. This means
analysts have to search. each.~ separarely
before trying to identify connections among their
results.
- Search capabilities do not allow foil exploitation of
existing data. In most cases, users must know in advance what to look for using Boolean searches to find terms in individual reports as they are received by the Community. This approach is intolerant of even simple mistakes in the queries and does not enable questions like: list everyone that is potentially affiliated with AQAP and bas a passport or visa that would permit entty to the United States or UK. (SI/1'W)
In our view, these shortcomings are the result of a fundamental problem in the Community's approach to IT -there is no accepted and comprehensive, Community-wide strategy. The Intelligence Community lacks a common vision of a desired end state, a common understanding of the potential benefits, and a coherent Community-wide strategy for development and acquisition.

- Continuing the CUJT\mt course willbecome even
more problematic as tbe amount of data increases
and almost certainly ensures additional incidents in
whiclt.~~Con.ummity~
..
aftel~ &1 it\bad access f()cfaf.a~.have
enabled detection and PotentiallY dist:UI)tion of an
attack.
- As the preparations for attacks are concealed more
and more effectively, the planning periods decrease,
and terrorists adopt new modes of attack improved
information technology will be vital. The existing
processes, policies, and operations will not suffice.
~)..
We propose three sets of recommendations-near;., mid-, and long-term-that seek to enable fuster adoption throughout the Community ofiT solutions that will reduce our reliance on human beings'
inherently limited ability to sift and correlate vast amounts of data in their heads. Our recommendations range from incrementally upgrading existing applications to fundamentally reimagining the Intelligence Community's IT infrastructure; many can be accomplished in parallel.

- These recommendations are intended to serve only
as a starting point. IT is a moving target, but
waiting and debating in search of a comprehensive,
perfect solution is dangerous; the importa[lt thing is
to get started.
- When implementing these recommendations or
taking any other steps to enhance the Community's
IT infrastructure, it will be important to adhere to
four key methodological principles: invest in
computing capacity ahead of need, embed
developers with users, adopt a modular approach
based on separation of applications, data, and
infrastructure, and experiment. Details of our
proposed methodology for implementing these
recommendations are found in Appendix C. (S/INF}
We assess agencies' desire and need to protect some of their information will be the primary obstacle to implementing these recommendations, but this barrier is surmountable if policy, tecluiology, and operations can co-evolve. Technologists need to demonstrate capabilities that instill confidence that access can be limited to authorized users, thereby addressing the concerns underpinning current information rna
..

(b)( 1)
(b)(3)
CIA
shows that assessments of this tradeoff can change as new technologies are introduced.

- Many of the people we interviewed assessed that
policy on handling US Persons data,97 1aw
enforcement data, and sensitive source data was
limiting the Intelligence Community's ability to
aggregate and exploit available data, especially
information pertaining to critical domestic-foreign
nexus issues.
- There is no perfect solution to the risk/benefit
tradeoff on enabling correlation of data from the

## J(B)(?)(E) I

Community's most sensitive sources, but the counterintelligence calculus on terrorism data should be looked at through the prism of risk entailed in the event a terrorist act is not detected.

(S/~W)
Moving Forward on *Information Technology.* Our recommendations fall into three categories: near-term changes with limited resource implications, intermediate changes that require more time or resources, and longer-term efforts that we view as essential for the Intelligence Community to at least match capabilities already widely available outside the Community.

- Many of our recommendations are not novel.
Several have been discussed for decades, and some
already are underway.~M We emphasize them here
because we view them as essential for the
Community to increase the likelihood that the right
"signals" emerge from the "noise."
- For our recommendations to be effective, they need
to be followed with particular urgency and fidelity
by the four Intelligence Community entities with
the broadest responsibilities for counterterrorism-
CIA, FBI, NCTC, and NSA. There are no
organizational barriers to these four agencies to
collaborate to improve their ability to exploit data
that they already share. (U/fFOUO)
In the near term, the Intelligence Community must address the problem-as evidenced in both incidents-that many officers do not know what data they are accessing, what other relevant data exists, or how to exploit it.

- Greatly increase online documentation related to
datasets by, for example, tagging and registering
them. This information should be easily accessible
and include what data are available, how to get
access, who has access, and tips from experienced
users.
- Enable authorized users to access and use all-source
data and applications from anywhere and at
anytime, except when reasonably prohibited by
security concerns. The 25 December incident
highlighted that officers in the field sometimes are best positioned to separate signal from noise.

- Search capabilities should default to the use of
fuzzy logic. Had this been the case in November,
the State Department's Visas Viper cable, despite
the misspelling, would have prompted discovery of
Abdulmutallab's active US visa.
- Embed IT specialists in fast-moving analytic and
operational groups to handie simple support
requests immediately_ The Community should not
continue to allow mundane IT problems to interfere
with its mission.

## - (B)(1) (B)(3) Cia

In the midterm, but sooner rather than *later,* the Intelligence Community must enable persistent search, exploit query logs, attach analytic insights to data, facilitate continuous IT improvements, and bridge the data divide-while building toward the long-term vision: To do this, the Community must:

- Augment current search capabilities with usercontrolled alerting services that would flag
incoming traffic
- Enable officers across the Community to see who
else has looked at a given intelligence report and to
electronically attach informal insights and view comments by others. This may have enabled broader discussion among analysts interested in a Nigerian affiliated with AQAP or in Hasan and Aulaqi.

- Embed developers with users to provide continuous
improvements to mission applications. This would
foster innovation by giving developers-who can
imagine what technology can deliver-a better
understanding of end-users' requirements.
- Incorporate application programming interfaces
(APis) into all existing programs so that they can be
accessed, as appropriate, through other programs.
This would, policy permitting, enable officers to
access multiple databases, across multiple
networks, through a single software interface.
- Incorporate into new and existing programs the
capability

## Odni

In the long term, we make three recommendations to help ensure the Intelligence Community provides its counterterrorism officers with state-of-the-art capabilities for search and correlation. Several technical leaders in the Community are working on ideas similar to or consistent with these; we offer our perspective to encourage and help shape these efforts.

(U)
First, enable a federated and cross-domain search.

This would be a minimal step toward modernizing the Community's search capabilities and ameliorating some of the problems posed by the proliferation of databases across networks. Developers would place a thin layer over existing databases that would provide a single point of entry to query-through an API-
each database to which they are authorized access.

This would minimize the extent to which officers must remember where to search for what data and simplifY officers' synthesis of the results. (U)
Second, separate applications from data and infrastructure. This would enable authorized intelligence officers to access and use any data, anytime, from any workplace, with any tool, except as policy prohibits it. The most important initial step is to establish the virtual equivalent of the nowcommon Community badge: a common way of identifying individuals and their access permissions together with tagging of the data to deseribe the rights needed to access it.

- We endorse the joint effort of various. agencies,
-
working through their chief infonnation.ofijcers, to
build toward a common IT infrastructure and
identify common data services, such u those for
collaboration, access, discovery, audit, processing,
and storage;
- A common infrastructure for all data would have
many advantages, including enabling the use of
sophisticated search algorithms such as those used
on the Internet, instead of the outdated Boolean
searches currently used on most Intelligence
Community systems. Another benefit would. be the
capability to allow. a user to file all relevant data on
one interface. rather than on a. system-by-system
basis. (U/IF()U()}
Thitd, build computing clouds and data centerswhich will enable dispersed, enterprise data sharing and processing-as the basis for the Community's IT
infrastructure. The resultant computing capacity will allow "data to .talk to data," identify relationships, produce results that analysts now have to put together by hand, and do it before an officer has even thought to make an inquiry: Routine use of this kind of processing almost certainly would have helped identify Abdulmutallab for watchlisting.

- Additional advantages of a cloud-based approach
include lower overall costs, greater tlexibility in the
use of resources, ease of maintemmce, and easier
portability ofinnovations. Private-sector
technology leaders such as.Microsoft, Amazon, and
Google build their systems using clouds.
- As the Intelligence Community moves toward the
cloud, it will need to adopt-at the Commllllity
level-hardware, operating systems, and networks.
All new systems shoUld be expected to use this
common base. (S/~)
l<b )(?)(E) I
We also endorse two current initiatives that are necessary precursors for the Intelligence Community to move toward cloud computing:

- We believe investment in the U Cloud Pilot, which
will facilitate enterprise data processing and
storage. is critical to modernizing the Community's
use of information technologies.

## Our R~ In This Llretiiite Lfftldi Llld1'E Coiilplextht:Melsewhere Tmd *11Es1St* ~ Norteiltekss, .18 $Llltt1Lfll'Rize:

-
In *the* lrelfrtenn, tllke the stqs dettzilelllliHJ:ve to
mslll't! tlud cormterterrorism o.flicers
understand all of the data llVIIilllble to lhe11111nd
have the tools to access what alrelldy existswhen they need it and where they need it.
-
In the mitltenn, augment capabilities to get
nrore out of the tlatll with tools thllt allow
ojJicers to leam llfOI"e from the data thml what it
presents on *the* surf~who has seen it, what
others think of it or have done with it, what
11elated tlatll is avaihlble, and how it rellltes to
historical reporting.
)-
In the ..
tmn,.111f1Ve beyond an II1'Cititectwe
tlutt ~
 *lletnily* on human~
toone
in which "datil can talk to dattJ--sg.t/iat
relationships embedded ;, coltiJile:x datasets are
brtlught to the sll1'j(lce in ways that IIUJW! the
tmlllyst's starting point further down the field
and closer to discovery of an adversary's plans
and intentions.
)-
~t/JeseolljectiPeson a "CTQShIHisi& The
pattelis eo~
tlrtit tlehsy will assui'e that
llliJre lJ1(ulr Fal'tntlcs get throlig/1:; (UI!PfRJ(JJ
Various review groups and agency-specific lDCil1DS have concludal tkat isfuJ:mation sbafili&. was neta
significant factor contributing to the incidems. at Fort Hood aad oo 25 ~we aereewahtbat<bmad
conclusion .. Some issues that sucf8Gcd, ~
~
tiedtodle'hm'flueU~!S ~ilreiideat.merit follow-up to detmmine~theseisfraes. impede the ~orism:mWon:


- FAA officers said that analysts there 'have~ aecess to FIB ttm:at ~
lind'JRJ8eceai&11'DB .
because FAA is not part9f'lhe JnteHigeseeCb'unmmlty.w

.
.
- TSA officials nok!d that a Jaokof~
stiaringwith C()QI;lfepatts.,_may limit~Hb~
cannot share threat~ to ll1ab its Gase fof implementiDg~ ob custly-

countermeasures. QI~
Going forward, the Community must *make* ~hs on inj"ormadon sltoringptilicy ani/its implementation to reap the benefits ofiltjomtQiion *technology* . . Polity must be. ~tot!II!IIWe~
users to access and use all-sourcedatam4~oos ftom ~audat~~
reasonably prohibited by security oo.eems.

- Intelligence Community Directive SOl, Discovery and~
or Retrieval ~:Milia
the
Intelligence Community, codifies~ for discovery aad shariaa ofdata. 'Iltese~l!ll~
authorized Comm'UDityusers to ~reilemmtdata inotiet.~~~~~-
abead:y have access-find a p001t oftoatadierequest ~~ ~it~
l&yathe~
~ .
groundwork for implementing ourlbCt*ti&M!Jdatkms on~~

- The Community should develop an integrated approach to~
sharing with US pCmmcateadties.
outside the Intelligence Community, i.e., "non. Title SO organizatioBs. n :atbts sJready are~,
but 1D1
integrated approach would help clarify what information the CoQunonitY- aca$S fromn.oa'r6 so
organizations, and wbat fhose~'ed in return trom theQwnummty.


- Procedures for sharing information on US Pwaons must be clarfJied !J1I(l *better* quia~. We~.~
at length in a separate section. The Community cannot rea1i7e the~
ormt0Jlfl'ilion.~tb
assist the cotmterter:rorism :rirlssion~c~ these issues. (UJff'E)YO}

    .
l<b )(?)(E) I
Closing the Structural Seams in tbe lntelligeaee CommoDity's Counterterrorism Mission We ob~ed a third set of problems related to the roles and responsibilities of the Conummity's counterterrorism efforts. We began this review with the view that the redundancies in the Community's counterterrorism efforts represent healthy competition and that "lanes in the road"
issues in no way directly contributed to the Fort Hood or 25 December incidents. Officers we interviewed consistently said that turf considerations and bureaucratic overlap did not play a direct role either incident. (UHfOOO+-
There is no way for the panel to produce a definitive assessment on that point, but there are grounds for skepticism. The panel is concerned that the overlap between CTC and NCTC extends beyond healthy competition and that the turf battles, duplications, and clashes are a drain on the resources and creative energy of both organizations. This is concerning in part because both organizations stressed to the panel that they did not have enough resources to cover all issues at the level they deserve. Moreover, given the labor intensive nature of counterterrorism work. any wasted energy only exacerbates the "signals to noise" problem-which could hamper the Community's ability to detect and prevent the next Abdulmutallab-like attack. The panel believes, therefore, that there is still wOik to be done in sorting out the mission ofthese two. important organizations. (U/IFO~
Create a formal division oflabor that plays to the dear strengths of each organization. From the moment NCTC was codified m the 2004
lntelligenee Reform and ~errorism Prevention Act
(IRTP A}--:tran:sfonning the threat orientatim of its predecessor, the Terrorist Threat Integration Center, into the primary responsibility for the analysis of terrorism-it was inevitable that there would be problems of deconfliction between it and CIA's CTC. given that the analytic portions of the two organizations have so much overlap in their missions and draw to a large extent on the same limited talent pool. The panel discussed the implications of merging the analytic function of these two entities but concluded each has distinct, essential missions that require emphasisdetecting and identifYing threats to the homeland and supporting counterterrorism operations abroad.

(U/ff'OUO)
Over the years, much effort has gone into formally codifying the .. lanes in the road" for each to follow, and we cannot improve on the DNI
directive of 7 April2Q 10 (see Appendix D), which embodies many of the views we expressed in the course of our discussions with NCTC, CIA, and the DNI. Clarifying these roles and responsibilities will. we think, improve mission performance, reduce bureaucratic conflict, and avoid reforms that could be counterproductive. In the end, it must fall to leadership and management to marshal the talents of their people and the mandates of their organizations in ways that are mutually reinforcing and that close whatever gaps open up in our counterterrorism coverage.

- NCTC's relationships with FBI and DHS,
legislative authorities, and tie-in to the homeland
make it the natural lead for tracking and warning
of all foreign threats with the potential to reach
US soil.
- CTC, on the other hand. is the natural lead on
terrorist operations abroad. particularly involving
support for operators and collectors. {&'~
It appears that much of the tension between the two organizations centers on issues related to the President's Daily Brief (PDB)-everything from who takes the lead to what is said in the articles.

The panel believes it is not necessary to implement the cbqe proposed in the ODNI's
"Counterterrorism Review Master Action Plan: 6
Month~-" This reeommendstbat "NCTC
leads PDB plamling process" on counterterrorismrelated stories. The PDB is already a Communitywide publication, and ODNI officers on the PDB
leadership team already have the authority to task agencies to track and write about specific issues.

We think that exercising current authorities could achieve the same goal-integrated analytic coverage-with considerably less disruption and bureaucratic layering. {SIINF)
We are skeptical of any division of labor that divides counterterrorism responsibilities exclusively along "tactical" and "strategic" lines.

Terrorist organizations do not function that way, nor do analysis and collection. It is impossible to perform tactical analysis without an understanding of strategic goals, and it is impossible to understand an organization's strategy without a grasp of how and why it conducts specific operations. (Sf~lF)
Dramatically increase the focus on threats to the homeland. As we observed the segmented nature of following terrorists bound for the homeland-and the associated problem with bureaucratic handoff as the threat moves from the foreign to domestic realm-we became firmly convinced of the need for a unit that would lead the Community in tracking all threat reporting that hinted at an attack against the homeland. While all agencies should focus on threats to the homeland as their greatest priority, one organization needs to have sole responsibility for tracking, warning, and coordinating the Community's response to an threats with the potential to reach US soil. We think NCTC is a natural fit for this role.

(UHFOUO)
For this reason, we strongly endorse NCTC's concept of a "pursuit group." The goal ofthis group, as we understand it based on the DNI's recent memo,
101 would be to provide analytic and analysis-driven insight and tasking for follow-on collection to establish the underlying basis and provide additional information useful to thwarting the plot. As that group develops its concept of operations, we offer five recommendations:

- It must emphasize primarily threats with the
potential to reach the homeland, avoiding the
natural temptation to fall back into the
traditional, more familiar terrain offocusing mainly on threats overseas;
- The organization must place a particularly heavy
emphasis on areas where we have limited or
emerging coverage;
- It must deconflict and coordinate its pursuit of
targets with other Community components so that multiple units are not duplicating the efforts
of another;
l<b)(?)(E) I

- It should develop a coherent set of indicators that
will help identify when terrorist groups
- Its metric of success should be tapping the full
range of US government capabilities to identify
and disrupt plots--not traditional metrics such as
production of finished intelligence. (Cf/Nf')
Increase "jointness" within the
counterterrorism community. No mission in the
Intelligence Community is more important than
preventing terrorist attacks inside the United
States; it requires seamless collaboration, from
collectors in the field to consular sections, airport
screeners, law enforcement and intelligence
officers, and policymakers. (U)
Yet the process is still too fragmented and segregated. In our review of the Abdulmutallab and Hasan cases, we noted that contacts and information flow between agencies were often uncertain, frequently based on personal connections and individual initiative rather than institutional arrangements. To cite only a few examples, CTC, NCTC and NSA officers often commented on the central role of TSC.

Watchlisting officers explained that the normal process required time to move a nomination through to a TSC decision, but when the situation required rapid action, telephone calls to personal contacts at TSC could expedite the process, taking hours rather than days. Embeddedness ofNSA
and CIA officers at TSC, and vice versa, has been uneven. Similarly, embedding more TSA officers in those agencies could facilitate the process of delivering downgraded tearlines pertaining to aviation threats.

- Increase the nwnber and frequency of personnel
rotations between CTC and NCTC-not just
among line analysts, but among senior managers,
as well. These should be mandatory and take
place with regular periodicity. We suspect these
moves would foster collaboration as each side
views the lanes in the road issue while driving on
the opposite side of the road.

## L(B )(?)(E) I

- We agree with the West-Clark review of the Fort
Hood incident, which noted the need for greater
collaboration betWeen FBI and DoD; there also
were no counterintelligence officers from the
Department of the Army, CIA's
Counterintelligence Center, or the DNI's
National Counterintelligence Center supporting
either the Washington or the San Diego J1TF. 102
- "Jointness" can also be pursued as a performance
objective at the individual level. As a small step
toward developing a culture of collaboration. an
explicit performance objective for all CTC and
NCTC analysts shonld be to conduct one joint
project per reporting cycle with their primary
counterparts from the other organization.
Officers should be evaluated specifically on
whether they meet that objective. '(O'~W)
To summarize our recommendations:

);>
Organizatiqna/ responsibilities should *play* to .
the compartllive lldvantage of etlCh
otganiz.ation. In practice, this mesns thllt
NCTC's relatlunships with FBI and JJHS, its
legislative alilkorilies, and its, tie-in to the
homeltmd make it the 1Ullllrtd lead on 1111
threms with the potential to reach US soiL
CTC, on the other hand, is the lfllllrtlllefld
on terrorist operations abroad, jJarlicularly
involving sUpport for operators anti
collectors. Focusing on this approach would,
we suspect, reduce the time-consuming tilT,{
disputes over PDB authorship.
~ Wherever InteHigence Community ktzders
draw the "lanes in the 1'0ild,., some
component must focus tirelessly and
exclusively on folltnving 1111 repOrting that
involves threats to *the* us~
Tltis
needs to be a primary focus of NCTC,s new
pursuit groilp, as it deve/opsfragmenklry
data that raise concerns abolit tem iSm but
lack specijiclly.
~ To improve seamlessness thT'OIIghout the
intelligence and law enforcement
communide$, agencies should increase the
rotation of offrcers among these
organizations. (CifNil).
Clearing the Way for Properly Sharing US
Person Information Throughout our interviews, we were impressed with the great care taken by the Community to protect inferma.tion about US Persons. m toJ We noted. however. that US Persons issues manifested themselves in several ways in these cases.

- Sharing US Person information with foreign
partners, and tasking them to
- Intelligence officers in both the 25 December
and the Hasan cases worked hard to stay within
authorized guic:ielilll~
In general, we noticed a strong belief among collectors and analysts that restrictions on collecting, disseminating, accessing. and analyzing data on US Persons impede, mission performance.

A high-level NCTC official listed enhanced authorities related to US Persons as the nn11nher-
We also saw a surprising level of disagreementeven among experienced practitioners-on whether current US Person authorities allow intelligence officers to accomplish their missions, or whether new legal authorities are needed.

(b)( 1) (b)(3)
NSA
TOJI ecRI!'ffiHCSIS~~OONINOFORtt **...** j(b)(7)(E) I

- Similarly, NSA officers noted that if they were
swveiling a suspected terrorist overseas whom
they thought to be a non-US Person. and they
later learned that he was a US Person. they had
to cease coliection while they sought separate
court authorimtion to re-ini.tiate collection,
resnlting in another collection gap.
Panel members with deep experience on FISA and related matters provided a different perspective.

They believe that current authorities, when clarified and fully leveraged, should enable the government to accomplish its counterterrorism mission.

- For example, they believe that the Community's
current authorities enabled the government to
adequately swveil US Persons globally and
suspected terrorists inside the United Statesand to share lawfully collected telephone
numbers in shared databases--'-while also
protecting privacy and civillibexties.
- The experience of these panel members leads us
to believe that the government must develop
more efficient processes to make effective use of
existing authorities, especially ones that focus on
- In general, the law and the Community's
governing Executive Order (EO 12333) provide
the government with the operating room to be
effective; most of the burdensome steps appear
to be internal to the government's implementing
procedures-which could cause the collection
gaps and other issues described to us.
- Fixing these procedures is not solely the
responsibility of any single agency or of the
DNI. This requires the Department of Justice
continuously to engage with the DNI, both to
calibrate on an ongoing basis how to craft the
procedures so that they clearly and
straightforwardly implement the Community's
governing legal requirements, and to provide
assurance that when the Community complies
with those procedures, it is following the law.
~'INfL
We believe that the Community's culture of carefully protecting US Person infonnation is vital for earning and maintaining the trust of the American people and of oversight bodies. The Community must have that trust so that it can make the most of existing authorities-and obtain new ones as needed-to counter a rapidly evolving terrorist threat.

- Indeed, we believe that in that light, it is all the
more important to streamline and clarify policies
and procedures-to ensure they are being used to
protect privacy and civil liberties interests and
implement legal requirements, rather than to
serve other purposes.
- To be an effective part of the intelligence
mission--and not be an "impediment"-policies
and procedures must be focused, clear, easy-tounderstand, and consistent across agencies where
feasible. We believe much work lies ahead to
achieve that tsHN*-)
Callectively, these US Persans issues can and must be addressed *in the near term.* Some involve closing the breach between the perceptions and realities of current US authorities; others entail changing internal procedures of individual agencies. All involve focused leadership frem the DNI, in concert with the Department *:of* Justice.

We understand that this important work has already begun (see Appendix B). (U)
We see a need to simplify, harmonize, update, and modify the Community's procedures tela:ting to US Persons. We also see a clear need for standardized, continual Community-wide training and guidance on how to address US Person issues.

- The goal of such efforts is twofold: First, to
make use of the Intelligence Community's
authorities to the full extent intended, so that the
Community can more efficiently manage the
information in its possession and correlate data
as envisioned by the IT recommendations.
Second, to help intelligence officers better
understand what they need to do to collect and
share inforination with confidence that their
actions are consistent with legal and privacy
requirements.
- It is especially important that these efforts focus
on working-level analysts and collectors who are
most directly affected by US Persons
considerations, to dispel any misperceptions, and
to elicit areas where training, guidance, and
updated procedures could facilitate intelligence
operations while still protecting privacy and civil
liberties interests. For example, working-level
officers should be provided a consistent, clear,
authoritative-and preferably online-:gu.ide,
with the assurance that following it provides a
"safe harbor" on US Persons issues. (U)
We also recommend that the DNI establish a Community-wide, inter-disciplinary process for determining whether new authorities may be needed, on emerging issues, such as radicalization, new technological developments, and new fonns of terrorist communication. The goal would be to provide clarity and confidence to operators and analysts so that they know how conduct their missions in a way that properly protects privacy

## To~:

and legal interests, clearing the way for decisive action.

- If, as we suspect, terrorist means of
);;>
Protecting US Person injormtztion is vital for
IICCOiflp/iShJng the intelligena ltli8slon; t/u!
raks ftJI' doing so IIUISt - foctiSell, dear,
eflSY-to-lllltlerstimll, *and* ~IICI'Oss
agencies wMre feaible.
communication increase in sophistication and
self-radicalization inside the United States
becomes a more pressing concern, it will be
increasingly urgent to regularly bring together
analysts, collectors, and attorneys to discuss
whether current authorities and guidance are
keeping pace with the evolving nature of the
terrorist threat
);;>
The DNIIIUISt, in concert with DOJ, IIJad a
CUIIUIUUiity-wide effort to pro11i4e Wining
and gllitlance on 1JS Person polldes and
procedures, and to sbnplib, strl!llllne,
updote, tmd haTIIIOnize them where feasible,
with t1U! gOIII of providing Co,munity
oper1110rS and amdysts the confidence they
need to do tbei7 jobs knowing tlult they are
properly protecting privacy and complying
with the lllw.
);;>
The Commlmity should engage with liaison
services to cltlri,h and stret1mline its
procethiTeS *for* pr~
coiJecting tllnd
sharing US Person infomuzlion.
- Regarding working with liaison partners, we
recommend all agencies actively engage key
liaison partners to develop plans to ensure
collection in a way that is consistent with any
protections for US Persons. The Community
will benefit from a review of procedures for
sharing with liaison services when it has
authority to collect on US Persons and is ~
liaison assistance in such cooperation.
- Our recommendation in this area is an expansion
of sscrs sensible guidance that NSA should
conduct such an effort with its foreign partners.
(S!,N)-
);;>
The DNI should establish tm interdisciplinllry process for providing guidance
tmd clarity on emerging issues rehzting to US
Persons, sach a radictll4otUJn, new
teclmologies, and new forms of
commutriclltion. fS.{LNPJ

## A~Jrdw~Bi .. Llab,Baao, And~ (U)

Despite the IJl8DY dif'fCnmces ~
~.~ ineKkmts,
104 a common thread through both of them was what the Inte~ COdrnnm1ty~~~~n During ournwicW, we came away 'With four recommendations related to ttns is&Oe. (U#F()GO)
First, the Community shoutdaeedemteits eftDrts to Ul1derstand ~.~
This is a~:MDgthe areas from wbicll intenigence SU1:ptise CWspriag in tbe abseaee of a template to iDfmm the. ~s collection and~
a point~ byeutside exports. While the,Conmiunity basi~
mitiAWves to study radicalization overseas. its <:flbrts to understand homegrowa, ra6:aliDtion are more nascent.

Developing a. grasp. of the iSsue may.~.., types ofex:pertiseand ~.~the Community. as the Un.i=d .s.t;es piOVides a.~
aotf.'~cavironmeut for ~iDtion. It will also requite.ll robust understanding o( and~
ft>r. ~~and liberties. "(C'INF)
Seeoud, we agree witA tllie ~-ctm8Ulied who recomnteBded that the Community.$hatpcn itsfeeus on reeruiters'and~~ how~~
mdicalize(tbttJugh gtOups, in prisons, aD tbC\'IDtemet). :and

howtiley'~a'~~~to~Opemtional. Assame.amftyst5pointedoattt>~"Sdf"
!1ldicalization maybe a misnOmer.~- AbdlUtm:rtaUab ~
~
byradit:als-Aulraqi"inbeth
cases. but to differing exn:ms-e.nd:by the IntCmet..wbich will ptqan ~role
mradi~'<Ol.ae
future.

- The Community also must cleve1op methods: for detectmg~lized individuals or "lone wolve$'" who may
not have attended tefrorist trammg camps t>r Dlay be ~Outside the di1ect comtDaDd and eontroi' of
organized groups. The Community,~ faces a signals-to-noise chellenge with such individuals
overseas, and must find ways tO~
such indMduals inside the United States while respecting civil
rights andlibcrtiC$-t!lld ~-eDiiSting the support of'loeaJ COJDBtU11it:ies. ~
Third, the lessonS leatadtrotn ~damdWal~ andsel~efUS~
Hasan-shotildbe ~-~into~
and US Govemmtmt persoDIJCII<:potieies, which are typieal)y ~To~'~state-~spying.

- When government employees are involved. bri1lging co~
pl!Ofessionals into the investigative
process early can signifiamtly inorease the probabitity ofdemcting at-risk individuals."
- As in other counterintelligcmee cases (Ames, Hanssen).. the Hasan episode underscores the importance of
documenting and maintaining in an individual's permanent record"all relevant information about his or her
performance. 1o5 {1/Nf)
Finally, we believe it is vital to properly align orgaaizational responsibilities rolated to radicalization with each agency's strengths and authorities. Ncrc. FBI, and DHS must play their respective parts in close collaboration with one another. FBI's unique stnmgtbs include robust legal authorities and direct experience investigating domestic and intemationalterrorism inside the United States; those ofNCTC include a.aalyzing radicalization. bridging the foreign/domestic divilk; and aceessing intelligence ftom across the Commuu.ity.

DHS is uniquely positioned to focus on aualysis zelevant to~
vulnmabitities and domestic protective measures; aggregating data uniquely available to DHS for use by the counterterrorism community;
and working with state, local, trihal, and private-sector customers. We recommend that the Community reassess its assignment of radicalizatmn..~ ~
amoag these key orga:aimtions to ensure that they are bringing to bear their Ullique stlcDgtbs and authorities onlhis critical issue. (S{/Nf)

## Blue Sky Ideas (U)

The foregoing recommendations cover much of what the panel was asked to address. We have focused on recommendations that, wbile difficult. are still achievable within an individual agency or with DNI
lead authority. Consistent with the third task assigned to the Review Panel, we offer several additional "blue sky" recommendations-ideas that we have not seen surfaced by other review groups and that would entail more radical changes. These ideas are deliberately provocative, and more disruptive to personnel resources and organizational structures, requiring more study before attempting.

- A Manhattan Project for *information* techn~~Jogy
and *sharing.* To break the gridlock and the everelusive search for the perfect IT architecture, we propose the chief information officers from the key intelligence agencies-along with their budgetsbe pulled together into one unit with the goal of implementing a common infrastucture across the Intelligence Community. The Commmtity has been wrestling with data-sharing adjustments for years with scant progress.

one way to lev1~re

| (b     |
|--------|
| (b)(3) |
| CIA    |

strengths of CTC and NCfC while reducing redundancy. A matrixed group can consist of analysts from CIA, NCfC, DIA, FBI, and NSA, who sit side-by-side with collectors and operators from the NCS, DoD, and NGA, all worlcing under a This model works best targeting specific issues involving a blmry line between domestic and foreign components and where there are relatively few analysts in relation to the workload. Using the matrix model also reduces redundancies related to dual publications, representation at interagency meetings, and responses to taskings.

j(b )(?)(E)

- ~the
e;xpertise of INR *antli)HS/I&A.* In
our discussions of the Intelligence CQmmunity' s
counterterrorism efforts, we heard only few
refemtees to the State Department's Bunlall of
Intelligence and Research and DHS's Office of
Intelligence and Analysis as key playem. An
institutional division of labor, in whi-. INR. and
DHSII&A have lead responsibility on some regil)D
or aspect of terrorism. could tap their expertise and
increase efficiency in the Intelligence Community.
DHSII&A, for example, is uniquely positioned to
assess US vulnerabilities-infrastructure,
telecommunications and energy grids, and
information-sharing gaps between national and
local law enforcement.
- ExpmuJ the Intelligence Community's role in the
visa is~t~tmce *proce8$.* DHS could play~
esgecially important role in the visa issuance
process. Prev'enting terrorists from entering the us
ho~
is a top national security C0l1tem, so it
makes little sense to place the visa issUaDoe process in the bands only offoreign service oflit;em. This responsibility should belong in the homeland security apparatus. If the suggestion is too burdensome for DHS, then consideration ought to be given to ensuring that all visa issuances reqUire Community concurrence or are passed~ the Community for ex.amination.

- Bllildaco~
*"~'hace
Cmtml. " Identity information is currently pocketed across the Intelligence Cotnmunjty in various databases, meaning ll() ooe QftieeE in any agency can successfully access it. To remedy this, create a single unit, staffed by coontedeuerism
~s,from thro~ut the ~ty cleared for access to an relevant SOlli'CCS, responsible for countertefrorlsm-related name traces. Names traces would be conducted against holdings of all intelligence and law enforcement databases.

(S/tm)

## Expert Perspectives: The View From "Insiders" And "'Utsiders" (U)

We convened two expert roundtable sessions, one internal and ~ne external, to stimulate our tbinlcing about the Intelligence Community's postme to address issues beyond those surfaced during our review. The internal group of experts focused on threats that could sutprise the Commumty and threats ofwhich it is cognizant but not prepared to address.

Among their key concerns were:

-

## (B)( 1)

pane~s thiltking by driving hoe several key points.

AIIWng the111:
We asked the external group to address how the terrorist threat to the United States is changing; what terrorists could do to surprise the Intelligence Community or elude US colDltermeasures; what more the United States could do to protect itself; and to identify aspects of the terrorist problem that the United States is not focusing on, but should
(U/~~
Those experts emphasized the following issues:

- The terrorist threat is heterogeneous-there is no
longer a single "they," if there ever was;
- There are inherent difficulties in obtaining the key,
plot-"specific information that would allow the Intelligence Comomnity to pull a thread that would Ul100Ver a plot. As a result, the Community will not always succeed-a terrorist will eventually get through US defenses;

- Tradeoffs must be made-within and outside the
Community-that have real consequences, such as
those between civil liberties and increasmg the
number of people on watchlists;
- Ahnost ~foreign threat to the homeland that
the United States has thwartedwas uncovered
because of foreign travel or communication; we are
too dependent on these and need to develop and
refine new detection strategies;
- The Intelligence Community shoUld focus more on
the key people and networks that enable disaffected
individuals such as Hasan or Abdulmuta.llab to
become operational, i.e., Aulaqi-like figures that
inspire, enable, or recruit;
- The Community requires a well-developed model
of~ tadiclllization process fi'om which it can
ded\.te.~.~individuaJ.s~ity to
adoptevrhlent~ We have Jl-e~'tlte
for~~~'tllt-~ We d'onot
bave one fur thehoD1eland. (U/JFOUO)
To siiiiUITize, these two gTOIIJIS adtkd to the

- The increasing rugeney of homelllnd-reltded
threats--and the need for a more sustrdned, crossagency focus on this set of issues.
- The increasing heterogeneity of the terrorist
phenomenon, and therefore the growing clulllenge
of detectiQn and disruption.
- The fragility of many ofthe collection techniques
that help account for the Community's success so
far.
- The lilcelihood that terrorists will continue to
behave in "learning" nrode-ad}IISting their
methods of operation, whethu successful or not,
in response to what they see us doing. (SfiNF)

## Some Closing Thoughts (U)

Constancy of support for the Intelligence Community is *crucial.* Intelligence stands apart from politics, but policy toward intelligence is formulated in a political environment We cannot emphasize enough that the pendulum swings and ebbing and flowing of support is an obstacle to mission performance. NCTC, for example, was slated to lose roughly 35 positions prior to 25 December. The post-Christmas reaction to Flight 253 has caused watchlisting nominations to skyrocket; warning has become so common that the Community risks creating its own signals-to-noise problem. We have seen the same pendulum swings on the collection side, where agencies---acutely aware of controversies since 9/11-have erred on the side of caution, sometimes unnecessarily, slowing the dissemination of valuable intelligence. The Community's Congressional overseers have a vital role to play in helping to stabilize counterterrorism policies and keep them on a steady course. (U)
While we have limited our review to the Intelligence Community, we come away convinced that strengthening the United States' ability to prevent the next Fort Hood or 25 December-like attempt requires focusing on more than just the Intelligence Community: law enforcement, airport security, the policy community, foreign. partners, and even the private sector need to address the systemic issues that made the Fort Hood and 25 December incidents possible. At the risk of falling back on a cliche, we are reminded of the axiom that a chain is only as strong as its weakest link. Improved collection will not matter without sound analysis. Sound analysis will not matter without a robust watchlisting system.

A robnst watchlisting system will not matter without effective airport screening technology. Better screening technology will not matter without skilled screeners. There are multiple variations one could make on this chain of events, such as the vital role of foreign screeners at airports abroad-but all would reinforce the same point: the Intelligence Community is only one of several layers ofhomeland defense.

(U)
To fmally defeat terrorism requires at least three things: destroying the leadership, denying it safehaven, and changing the myriad conditions that give rise to the phenomenon. The Intelligence Community can carry much of the burden on the first two-but very little on *the third.* (U)

## Appendix A Consolidated List Of Intelligence Community Review Panel Recommendations (U) Build Internal Processes That Help Find Terrorists In The Data (U)

All agencies should .

- Disseminate counterterrorism reporting promptly. - Update, standardize, and simplifY their dissemination lists and codes on a regular basis.
- Search for terrorist identities against all of their available data holdings.
- Use technology such as "fuzzy logic" for name variants and incorporate "discoverability" that advises when
there is relevant information in another location.
- Train officers performing identity searches to look for partial names, along with salient points such as the
person's location, affiliations, passport numbers, schooling, or travel--details that can further narrow the
search and identifY an individual:fS/~
The DNI should .

- ClarifY the criteria and threshold for watchlisting. The Community needs a single set of transparent
guidelines that enables analysts to determine whether and when they may nominate a suspected terrorist. We
caution against criteria that become too specific and caveat-laden.
- Establish greater clarity on watchlisting roles and responsibilities. Delineate roles that play to each agency's
particular strengths and authorities, and make clear that the nominating agency should see a nomination
through from start to finish.
- Streamline watchlisting efforts and redirect the resulting savings. Reduce the duplication resulting from
multiple agencies processing nominations and redirect the resources toward other pressing duties such as
records enhancement. IT improvements can help simplifY this process.
- Ensure analysts use TIDE as a primary repository of intelligence rather than as a step in the watchlisting
process. The Community appears to be missing an opportunity to populate TIDE with fragmentary
intelligence to build, identify, and shape dossiers on suspected terrorists. NCTC should lead a Community-
wide training program to help agencies understand the pmpose of TIDE, its holdings, and criteaa for entry into TIDE.

- Institute a Community-wide training program. to ensure a common and transparent understanding of the
watchlisting process. If TSC remains the final voice in the No Fly/Selectee decision, it should lead ~h a
training effort, so that its standards are clear to all nominators ~Sl!blE)
We also emklrse

- SSCI's recommendation that TIDE administrators accept nominations based on partial names. Terrorists
rarely use full, true names in their clandestine communications.
- The White House's recommendation that NCfC develop a records-enhancement capability to build, locate,
and track derogatory information on all individuals in TIDE: (S/INF)

## Develop Information Technology That Helps Separate Signals From Noise (U)

In tlu! near term, all agencies should

- Greatly increase online documentation related to datasets to show what data are available, how to get access,
who has access, and to provide tips from experienced users.
- Enable authorized users to access and use all-source data and applications from any workplace and at any
time, except when reasonably prohibited by security concerns. The 25 December incident highlighted that
officers in the field sometimes are best positioned to separate signal from noise.
- Ensure that search capabilities default to the use of fuzzy logic. This would include the automatic
incorporation of variant spellings and renderings of foreign names.
- Embed IT specialists in fast-moving analytic and operational groups to handle simp~ support requests
immediately. The Community should not continue to allow mundane IT problems to interfere with its
mission.iCh'J'Wj
In tlte midterm, all agencies should .

- Augment current search capabilities with user-controlled alerting services that flag incoming traffic. and
automatically correlate it with existing reporting.
- Enable officers to see who else has looked at a given intelligence report and to el~nically attach informal
insights and view comments by others. Such a capability may have enabled bro&der discussion among
officers interested in a Nigerian affiliated with AQAP or in Hasan and Aulaqi.
l<b)(?)(E) I

- Embed developers with users to provide continual improvements to mission applications and give developers
a better understanding of end-users' requirements.
- Incorporate application programming interfaces (APis) into all existing programs so that they can be
accessed, as appropriate, through other programs. This would. policy permitting, enable officers to access
multiple databases, across multiple networks, through a single software interface.
- Incorporate into new and existing programs the capability
In the long term, the DNI should

- Enable a federated and cross-domain ~hacross all of the Comnnmity's holdings. Developers would
place a thin layer over existing databases that would provide users a single point of entry to query each
database they are authorized to access.
- Establish the virtual equivalent ofthe Community identification badge: a common way of identifYing
individuals and their access pennissions together with tagging of the data to descdbe the rights needed to
access it. This is a key step toward building a shared network: and common approach to sharing data and
toward enabling authorized intelligence officers to access and use any data, anytime, from any workplace,
with any tool, except as prohibited by policy.
- Build computing clouds and data centers as the basis for the Intelligence Community's information
technology infrastructure. As the Conummity moves toward the cloud, it will need to adopt-at the
Community level-hardware, operating systems, and networks. All new systems should be expected to use
this common base.
- Adhere to fow- key methodological principles-invest in computing capacity ahead of need; embed
developers with users; adopt a modular approach based on separation of applications, data, and
infrastructure; and experiment-when implementing any changes to the Community's information
technology. (See Appendix C.) (S-/INF)
We endorse

- The I2 Cloud Pilot, which will facilitate entetprise data processing and storage and is critical to modernizing
the Community's use of information technologies.
-
- The joint effort of various agencies, working through their chief information officers, to buildtoward a
common IT infrastructure and identifY common data services, such as those for collaboration, access,
discovery, audit, processing, and storage.

## Close The Structural Seams In The Counterterrorism Mission (U)

The DNI should

- Dramatically increase the focus on threats to the homeland While all agencies should focus on threats to the
homeland as their greatest priority, one organizAtion needs to have sole responsibility for tracking, warning,
and coordinating the Community's response to all threats with the potential to reach US soil We think
NCTC is a natural fit for this role. (U)
NCTC's Pursuit Group should ..

- Focus primarily on threats with the potential to reach the homeland, avoiding the natural temptation to fall
back into the traditional, more familiar terrain of focusing mainly on threats overseas.
- Coordinate and deconflict its pursuit of targets with other Community components so that multiple units are
not duplicating the efforts of one another.
- Emphasize areas where the Intelligence Community has limited or emerging coverage.
- Measure success as tapping the full range of US government capabilities to identifY and disrupt plots-not
by tracking traditional metrics such as production of finished intelligence. '(/fN*1
CIA and NCTC should

- Increase the number and frequency of personnel rotations between CTC and NCTC-not just among line
analysts, but among senior managers, as well. These should be mandatory and take place with regular
periodicity.
- Institute, for all officers, explicit individual performance objectives.geared towardjointness and
collaboration with the other organization. (U)
All agencies should

- Encourage rotations and embed their officers in other agencies to improve seamlessness operations
throughout the counterterrorism community. (U)
We endorse

- The DNI's directive on 7 April to formally assign responsibility for the counterterrorism mission, which
embodies many of the views we have expressed in the course of our review. In the end, it must fall to
leadership and management to marshal the talents of their people and the mandates of their organizations in
ways that are mutually reinforcing and that close whatever gaps open up in our COWlterterrorism coverage.
- The West-Clark panel's recommendations that seek to increase collaboration between FBI and DoD and
between FBI and the counterintelligence community. (S//NP)
We do not endorse

- Structural changes suggested by other groups that do not address the root causes of the tension between
organizations and may actually complicate the relationship. These include ODNI's recommendation that
NCTC lead the PDB planning process on counterterrorism-related stories. We think that exercising current
authorities could achieve the same goal-integrated analytic coverage-with less disruption and bureaucratic
layering.
- Any division of labor that divides counterterrorism responsibilities exclusively along "tactical" and
"strategic" lines. Terrorist organizations do not function that way, nor do analysis and collection. (SffNF)

## Clearing Tbe Way For Properly Sharing Us Person Information (U)

The DNI should worlc with the Deptutment of Justice to ...

- Simplify, harmonize, update, and modify the Community's procedures relating to US Persons.
- Establish a Community-wide, interdisciplinary process for developing guidance and training related to US
Persons authorities and procedures and for determining whether new authorities may be needed on emerging
issues, such as radicalization, new technological developments, and new forms of terrorist communication.
The goal would be to provide clarity and confidence to operators and analysts so that they know how
conduct their missions in a way that properly protects privacy and legal interests.
- Institute standardized, continual Community-wide training and guidance on handling US Persons issues. It
is especially important that this training and guidance focus on worlcing-level analysts and collectors who are
most directly affected by US Persons considerations. (StiNE)
The DNJ should work with the Ccnnmunity to

- Accelerate the Intelligence Community's efforts to understand homegrown radicalixAtion. This is among the
areas from which intelligence surprise could spring in the absence of a template to inform the Community's
collection and analysis.
- Slwpen the Community's focus on recruiters and enablers, how disaffected individuals radicalize, and how
they influence an individual's efforts to become operational.
- Develop methods for aetecting radicalized individuals or "lone wolves" who may not have attended terrorist
training camps or may be operating outside the direct command and control of organized groups.
- Incorporate into counterintelligence and US Government personnel policies-which are typically designed to
detect traditional state-versus-state spying-the lessons learned from studying the radicalization and selfradicalization of US Persons, such as Hasan. (Sifl~
AU agencies should

- Engage key liaison partners to review procedures and develop plans to ensure collection in a way that is
consistent with protections for US Persons. (G1/Nf)

## We Endorse

- SSCrs recommendation that NSA should actively engage key liaison partners to develop plans to ensure
collection in a way that is consistent with any protections for US Persons. (1/N.lY-

## Appendixb Successes: Creating New Challenges For Tbe Intelligence Community (U)

In the comse of our work, we came acress many examples of intelligence success OCC1nTing contemporaneously with the two events we assess-in collection, sharing, analysis, integration, technology, and innovation. Examples include:

- The counterterrorism community was disrupting
plots at home while putting unprecedented
pressure on al-Qa'ida abroad.
- The Intelligence Community bad collected key
intelligence in both incidents. We also found
that the Community is sharing infonnation
broadly. Indeed, despite concerns about sharing
sensitive data. sevexal closely held databases are
available to counterterrorism analysts at NCTC.
More work remains to be done-such as
implementing the "discovery" principles
embodied in Intelligence Community Directive
501. These accomplishments in collection,
sharing, and access created opportunities for key
analysts to bring together the critical pieces of
intelligence in each case.
- In the Hasan case, the San Diego JITF
recognized the significance of two e-mail
communications out of many others-they
picked a signal out from the noise--and engaged
in an individualized analysis following retrieval
of available DoD records. In the Flight 253 case,
analysts provided strategic warning about the
threat AQAP posed to the homeland, as well as
about the type of explosive used by
Abdulmutallab.
- There are promising IT tools and data
repositories at various-ncies
that have wide-
ranging capabilities.

(b )(1)
(b)(3)
CIA
At least ooe of these is deployed at NCTC and works across multiple datasets using a common access control standard. Moreover, the ODNI's U Pilot models aspects of these capabilities and demonstrates several of the qualities we describe in our recommendations.

- As exemplified by this study and by similar
efforts undertaken by others, the Intelligence
Community is a learning organization that is
unafraid to look at itself with a self-critical eye,
and to take corrective actions. Reviews of this
type should, we believe, be a routine part of
intelligence work, particularly when surprises
occur. The Community must remember that as it
learns from the past, so too, do the terrorists.
iSI.mJ
While the Community should reward-and learn from-these successes, it must also recognize that these successes create new challenges for the Community. Collection successes can increase the amount of data to be reviewed by analysts, as can increased information sharing, leading to more
"noise" in the system. Moreover, sustained success against existing terrorist groups-attacking their safe havens, leadership structures, known operational methods--can lead counterterrorism elements to redouble efforts on successful strategies, constraining resources and time devoted to new threats. From an IT perspective, analysts who have experienced success using familiar tools may be reluctant to adopt new ones. And successful technology within one agency must now be rapidly shared across the Community-it is not enough to have "pockets of excellence." (U)

## Appendixc Methodological Recommendations For Information Technology (U)

We recommend that any Intelligence Community efforts to improve its information technology capabilities adhere to the following four methodological tenets. (U)
First, invest in computing capacity ahead of need The Intelligence Community needs an environment to experiment and pilot innovations using real data, without ~rificing current capabilities. We judge the opportunity cost of not investing in capacity greatly outweighs the direct cost. The panel encountered ageneral belief that computing is expensive. It is not-particularly when examined through the risk management optic of the costs associated with a successful terrorist attack in the United States. (U)
Second, embed developers to enable continuous improvements to *applicatiom.* The most successful developments result from a loop where competent developers get continuous feedback from users and frequently improve the system.

This also provides informed input for improvements to the ''back-end" systems, which process the data before the users sublnit a query.

The usual approach of building systems using contracts with up-front requirements has a mediocre record-intelligence officers do not know what is technologically feasible and the technologists lack exposure to the work practices and problem sets that would enable them to offer up innovative solutions. (U)
Third, adopt a modular approach based on separating applications, data, and infrastructure.

The Intelligence Community's fragmented approach to IT has enabled. each fiefdom to build end-to-end systems without reference to any common elements--i.e., infrastructure, such as access control or filing applications. This is antithetical to implementing one unit's innovation throughout the enterprise.

- Instead, applications and services should be built
on top of common components such as user
identification, authentication, and access control,
or widgets for froat-ends.
- The Intelligence Community nmst separate data,
security. and other basic services from analytic
tools and frombackend processing tQ enable
sharing of innovation within and between
Community elements. (U)
Fourth, experiment, and enable experiments with both technology and *policy.* Getting to common infrastructure services requires making decisions among plausible alternatives. One approach is to pick alternatives and try them. In short, the Community needs to be able to test, toss out, and deploy new capabilities and policies at a pace far closer to that of the private sector. This would be one of the greateSt benefits of investing now to expand raw computing power.

- This is consistent with the goals of the I2 Cloud
Pilo~ which will facilitate enterprise data
processing and storage.
- In general, innovation needs experimentation,
and improvements in handling large amounts of
data need flexible computing resources for
experimenting and evaluating.
- Pilots and experimentation ought to be applied to
palicies as well, enabling exploration of the
unintended consequences of introducing both
new policies and technologies. (U)
AppeadixD Analytic Responsibilltles for Counterterrorism Aaalysis (U)
MEMORANDUMFOR:
EXCOM
SUBJECT: (U) Analytic Responsibilities for Counterterrorism Analysis in the U.S. IDtelligence Community REFERENCE: DNI Approved Lanes in the Road: Guiding Principles and Terms of Reference for Counterterrorism Analysis, I 5 March 2006
(U/IFOU~ Background and **purpose:** Multiple organizations in the US IC have responsibilities for a wide range of counterterrorism analysis, including strategic assessments, tactical pursuit of leads, targeting analysis for direct support to operations., and warning of tactical and strategic terrorism threats and trends. The analysis and published products of these organizations sometimes overlap. This redundancy is appropriate for important subjects, but without direetion it can lead to gaps in coverage at key points. This memorandum establishes the responsibilities and accountability of leaders of major organizations with counterterrorism analytic missions. Leaders of those organizations identified in this memo are accountable for the performance of the missions below.

## (U/Jfoy~ Definitions:

a.

Strategic analysis and warning: General descriptions of terrorist organi.zatioDS, including leadership, capabilities, intentions, and relationships. Analysis of emerging or changing terrorist.

movements, capabilities, and trends. Warning to the operational departments and agencies of the standing threats these organizations pose to American interests at home and abroad.

b. Tactical warning: Notification to the appropriate operational departments and agencies that planning of a terrorist plot is underway. To the extent possible. this warning should identify which organization is planning the attack, what the range of targets might be, and give as precise timeline as is possible given the available reporting. Tactical warning will J8I'Cly be specific but should be more than a recitation of general intent, and will include both available details and assessment.

c. Pursuit: Following tactical warning, analytic and analysis.:.driven insight and tasking for followon collection to establish the underlying basis and provide additional information useful to thwarting the plot.

(U/f.FOUO) **ResponsibHities:** Each organization within the IC with a significant counterterrorism analytic effort is expected to work seamlessly with its counterparts. drawing on the specific strengths and advantages of partners, but is also expected to place particular emphasis on those missions they are uniquely positioned to conduct. Those unique strengths include NCTC's ability to span domestic and foreign developments and its broad information accesses. CIA/OTA's collocation with the operational elements of CIA and HUMINT expertise, FBI's domestic authorities and accesses, DIA 's integrated support to DoD decision makers and deployed forces for offensive and defensive operations, DHS's responsibilities to support state and local organizations, NSA's SIGINT and NGA's geospatial analytical expertise are all key contributors to strategic and tactical warning. All analytical organizations will contribute to the full range of terrorism analysis, but the assignments below ensure that prinmy responsibilities are identified.


(U) The following responsibUities for analysis are specifically assigned:

## ! Sj/Nf) Nctc

-
Responsible for strategic analysis and tactical warning of the full range of terrorist organizations with an
overseas nexus, with a special focus on homeland threat.
-
Responsible for tracking all tactical warnings issued by the IC, and for ensuring that one analytical
organization is assigned primary responsibility for pursuit of each warning until action is completed or the
warning is cancelled.
-
Responsible for conducting pursuit of specitic~ ~-

## Fs#Nf) Cia

-
Responsible for strategic analysis and tactical warning of the full range of overseas terrorist organizations
with a particular emphasis on supporting departmental covert action and other overseas counterterrorism
operations.
0

-
Responsible for targeting and pursuit activities capitalizing on its unique HUMINT- and HUMINT-
derived collection access, in full collaboration with NCTC's pursuit effort and as coordinated by NCTC.

## (S/&!Bdia

-
Responsible for strategic analysis and tactical warning to support DoD principals and deployed units, with
a focus on threats to DoD forces, installation. and personnel worldwide and support to DoD operations.
-
Responsible for pursuit activities to enable tactical warning of plots against military forces, as coordinated
byNCTC.
must coordinate operations with NCfC. Rather, it refers to NCTC's mandate to ensure that one analytical organization is assigned primary responsibility for pursuit of each warning until action is completed or the warning is cancelled. (U)

## Fs/Fnf) Fbi

-
Responsible for strategic analysis and tactical warning of terrorist activities with a domestic nexus and
homegrown and domestic extremism, and supporting FBI operational activities.
-
Responsible for pursuit activities with a domestic nexus, as coordinated by NCTC.

## (S#Nf)Dhs

-
Responsible for strategic analysis and tactical warning of terrorist activities with a domestic nexus, and
homegrown and domestic extremism, and for analysis relevant to infrastructure protection, domestic
protective measures, and support to state and local, tribal, and private sector entities.

## (8/Inf) Nsa - (B)( 1 ) (B)(3) Nsa Fsiinanga

-
Responsible for supporting all overseas (and, as appropriate, domestic) terrorism analysis and operations
with all available Geospatial Intelligence.
Dennis C. Blair, signed 7 April2010

## Appendhe White House Directives For Corrective Actions (U)

This appendix lists corrective actions compiled from two key memoranda issued by the White House:

- Attempted Terrorist Attack on December 25, 2009: Intelligence, Screening, and Watchlisting System
Corrective Actions, 7 January 2010
- Inventory of Files Related to Fort Hood *Shooting,* 26 January 2010 (U)

## Directives Regardibg The Attempted Bombing Ofnw 253 (U)

Department of State Review visa issuance and revocation criteria and processes, with special emphasis on counterterrorism concerns; detennine bow technology enhancements can facilitate and strengthen visa-related busifless processes. (U)
Department of Homelond Security Aggressively pursue enhanced screening teclmology, protocols, and procedures, especially in regar4 to aviation and other transportation sectors, consistent with privacy rights and civil liberties; strengthen international partnerships and coordination on aviation security issues. (U)
Develop recommendations on long-term law enforeement requirements for aviation security in coordination with the Department of Jastice. (U)
Director of Nfllionallntelligence Immediately reaffirm and clarify roles and responsibilities of the counterterrorism analytic components of the Intelligence Community in synchronizing, correlating, and analyzing .all somces of intelligence related to terrorism. (U)
Accelerate information technology enhancements, to include knowledge disc{)very, database integration, crossdatabase searches, and the ability to correlate biographic infonnation with terrorism-related intelligence. (U)
Take further steps to enhance the rigor and raise the standard of tradecraft of intelligence analysis, especially analysis designed to uncover and prevent terrorist plots. (U)
Ensure resources are properly aligned with issues highlighted in strategic warning analysis. (U)
CentrtlllnteiiJgence Agency Issue guidance aimed at ensuring the timely distribution of intelligence reports. (U)
Strengthen procedures related to how watchlisting information is entered. reviewed, searched, analyzed, and acted upon. (U)
Federal Bureau of lnvestiglltion/Terrorist Screening Center Conduct a thorough review of Terrorist Screening Database holdings and ascertain current visa status of all
"known and suspected terrorists," beginning with the No Fly list. (U)
Develop recommendations on whether adjustments are needed to the watchlisting Nominations Guidance, including bi.bgrapbic and derogatory criteria for inclusion in the Terrorist Identities Datamart Environment and Terrorist Screening Database, as well as the subset Selectee and No Fly lists. (U)
Natiotud Coullterlerrorism Center Establish and resource appropriately a process to prioritize and to pursue thoroughly and exhaustively terrorism threat threads, to include the identification of appropriate follow-up action by the intelligence, law enforcement, and homeland security communities. (U)
Establish a dedicated capability responsible for enhancing record infonnation on possible terrorists in the Terrorist Identities Datamart Environment for watchlisting purposes. (U)
Natiotud Security Agency Develop and being implementation of a training course to enhance analysts' awareness ofwatchlisting processes and procedures in partnership with National Counterterrorism Center and the Terrorist Screening Center. (U)
Natlollll Security Staff Initiate an interagency policy process to review the systemic failures leading to the attempted terror attack on December 25, 2009, in order to rnalre needed policy adjustments and to clarify roles and responsibilities within the counterterrorism community. (U)
Initiate an interagency review of the watchlisting process, including business processes, procedures, and criteria for watchlisting, and the interoperability and sufficiency of supporting information technology systems.

(U)

## Direetives Regarding Tile Shootiags At Fort Hood (U)

Federal Blll't!au of Investigation and Depanment of Defense Institute refined information sharing procedures to ensure that FBI-developed. counterterrorism mvestigations or assessments involving military members, DoD civilian personnel. or others known to have access to military installations are provided to the Defense Intelligence Agency's Defense Counterintelligence and HUMINT Center in Washington; DC. (U)
Initiate a single new agreement to subsume and update the separate Memoranda of Understanding governing information sharing between DoD and the FBI. (U)
Deptlrtment of Defense Survey all DoD detailees serving in FBI JTfFs to determine their awarenessof, training for, and aecess to relevant FBI FISA-related databases. (U)
Review policies and procedures concerning assignment of detailees to FBI organizations., to include professional qualifications and placement, in relation to DoD and FBI needs. (U)
Fedend Bure~~u oflnveatigalion Develop a policy requiring communications between persons known to be in law enforcement, DoD personnel, and individuals holding security clearances and certain designated agents of foreign powers to be evaluated at the FBI Headquarters level to determine whether such information constitutes foreign intelligence that canrand-,"'7---==:-:----, shouldbedisseminatedtotheemployerofthecommunicant (U)
ote: per FBI, paragraphs are classified RET

## (B)( 1) (B)(3) (B)(7)(E) Fbi

Enhance training of the FBI workforce to ensure that: (I), all and al d
!, II
:_
t U
I
I
J
ioj.,;. .t:
I t t -
! fi~"'J~ ~! I C and can apply the policy
" d (2) all agents and analysts on task forces, particularly those on detail from other agencies, understand and, if appropriate, have access to all FBI databases that contain data needed to successfully accomplish their assigned mission.~

## (B)( 1) (B)(3) (B )(7)(E) Fbi

Director of National Intelligence Lead an interagency review of information systems in the Intelligence Community to ensure that they provide adequate community-wide access to optimize information sharing. (U)
Lead an intemgency evaluation of whether expertise and training pertaining to dissemination of intelligence is sufficient across the Intelligence Community. (U)

## Fort Hood: Additional Reviews Ordered (U)

Department of Defense Drawing upon the lessons learned from this study, as well as the recently completed review by former Army Secretary Togo West and former Admiral Vernon Clark, assess and determine whether additional revisions to policies and regulations governing the identification and reporting of suspicious behavior are appropriate. (U)
Natiollll Collllterterrorism Center Lead an interagency review of the FBI's recommendation to designate center intelligence collection platforms as .. strategic" to trigger additional levels of review, including by other agencies such as the National Security Agency and the Central Intelligence Agency. In the course of this review, NCTC and FBI acknowledged that further discussions would be required to determine how this should be done, and the President requests that these discussions commence as soon as possible. (U)
Lead an interagency review ofFBI's recommendation to ensure that all agents and analysts conducting counterterrorism investigations are sensitive to the signs that a person is, or may be, using the Internet to become self-radicalized. The President believes additional study is required to identify the potential signs of violent radicalization before training prograzm are designed and implemented pursuant to this recommendation. This review should also look at whether other government agencies, outside of the IC and law enforcement, could benefit from such training if it can be developed. (U)
Director of Nfltiollllnte/ligence Conduct a broader study of the approach by the IC to analyze and exploit FISA-derived information to identify any impediments or gaps in the current approach. assess the appropriateness of resource allocations~ and propose any necessary solntions to ensure the t:nOSt clfective analysis of that information. Where we operate under a "division oflabot" approach in reviewing. analyzing, and exploiting raw FISA-derived information that is lawfully shared with more than one agency 1.JD,der existing '!lrt orders, we must ensure that the dissemination standards used' by those agencies are appropriately tailOred to meet the needs of others. .

Therefore, the dissemination policies of agencies responsible for analyzing raw FISA inf'Ormlttion shotild also be reviewed to ensure that they adequately serve the needs of other components of the IC and the US
Government (U)

## Appendixf Tke Community Response To The Fort Hood And Nw 253 Incidents (U)

The Community responded quicldy to .both incidents. Our general impression is that the Community has taken seriously the need to learn lessons from these incidents, and to institute significant corrections, although we did note that perspectives and approaches varied across the Conmnmity.P Although further actions are needed, as outlined in our recommendations, the Community does have important steps underway. Some of these corrective measures include:

- Clarification, Realignment, and Deconjlictwn of Counterterrorism Roles and *Responsibilities.* The DNI bas
reassigned analytic counterterrorism responsibilities, which, as we discuss elsewhere, is an important step
forward. He also established and hosts biweekly counterterrorism meetings among the top leaders ofDHS,
CIA. FBI, NCTC and NSA to ensure proper' alignment of counterterrorism resources. We suggest further
steps in our recommendations.
- The Pursuit *Group.* NCTC bas established the "Pursuit Group" to pursue terrorism threat threads and
identify appropriate follow-up action by the intelligence, law enforcement, and homeland security
communities. This is a promising initiative.
- NCTC, TIDE and *Watchlisting.* NCTC bas surged resources to address data and systems issues with TIDE
and NCTC watchlisting support, including creating a record enhancement capability for TIDE records,
increasing the pace of watchlisting nominations, and implementing technical enhancements. Moreover, the
Community bas worked with TSC to revise watchlisting protocols. We make additional recommendations
for TIDE and watchlisting.
- Information Technology and *Data.* Near-term enhancements and integration initiatives have been proposed
that will address significant tactical needs. The 12 pilot will also till important gaps we have identified.
More work needs to be done, as outlined by our IT recommendations.
- *US Persons Issues.* The ODNI is leading an effort to identify and address issues relating to treatment of
information about US Persons, and will consult with the Department of Justice. We discuss these issues in
our recommendations.
- Information Sharing and !CD *501.* The ODNI is in the initial phases of implementing lCD 50 I to accelerate
information sharing within the Intelligence Community. Much work lies ahead on this important initiative.
P We were not able to conduct detailed assessments-we bad difficulty collating infonnation across agencies, and the information we collected Showed that measures were evolving during our review, were in planning stages, or called for future work. (U)

- *Radicalization.* NCTC, FBI, and DHS are at various stages of addressing different aspects of
.. radicalization," focusing on homegrown violent extremism (in its nascent stages).
- *Agency-Specific Actions.* Agencies have implemented various measures to address problems they identified. (b )(3)
~
note: per FBI, this paragraph is classified SECRET
TOP SECRET//UCS/S~ONJNeFORNJIIII j(b)(?)(E) I

Defense Criminal Investigative Service
Department of Homeland Security
DHS Office of Intelligence and Analysis
Defense Intelligence Agency

DCIS
DHS DHS/IA
DIA DoD
DoJ
DSD
DWS
EC
FAA
FBI
FISA
GCHQ
HUMINT
ICRP
ITR
INR
IT
JTIF
NCIS
NCS
NCTC
NGA
N1E
NSA
NW253
OTA

~t
of Justice
Australia Defence Signals Directorate
FBI Data Warehouse System
FBI Electronic Communication
Federal Aviation Administration
Federal Bureau of Investigation
Foreign Intelligence Surveillance Act
UK Government Communications Headquarters
Human Intelligence
Intelligence Community Review Panel
Intelligence Information Report
Department of State Bureau of Intelligence and Research
Information Technology
Joint Terrorism Task Force
Naval Criminal Investigative Service
National Clandestine Service
National Counterterrorism Center
National Geospatial Intelligence Agency
National Intelligence Estimate
National Security Agency
Northwest Airlines Flight 253
CIA Office of Terrorism Analysis
President's Daily Briefing

# (B )(7)(E)

FBI Terrorist Screening Center United Arab Emirates United Kingdom United States FBI Washington Field Office (U)
1 Rob Margetta, "Former 9/11 Commissiotren;:,.Qbatha Mu5t Back DNI," CQ.com, 26 Januacy201:(). "(u) ',
2 Consistent with the mandate of the RevieW Palrel~ we do not focus our roriclusions and, rero:mmendati011s on specific individuals. For that reason, we use the , pronoun "he" throu~out the report. ~avoid;si'Qgf~g out specific individuals, and do not name itic
officers who may .at some point be witn~ina criminal trial against Major Hasan. We alSo trY to strike a balance between not identifying specific individUals who spoke frankly while still providing the~ a.

sense of the organization that providedi ~
6l:fil~i>n or had action on a specific issue. (U)


3 Protecting the Force: Lessons from *FoJ"'* HOO!i~rt
~fthe DoD Independent_R~~iew, t.O.~'~}. (U)
..
Megan McCloskey, "CiVIhan pohce officer acted quickly to help subdue alleged gunman," Stars and Stripes (Mideast Edition), 8 November 2009. (U)
5 [Open Source I WASHINGTON POST ctRAS
ID:OW5666743l I 200802271 (U) I CIRAS ID:
OW56667431)
6 Hasan raised the same issues he pr-esented in his emails to Aulaqi in a June 2007 research paper, "lbe Koranic World View as it Relates to Muslims m the US
Military," on file with the panel. Hasan cited the example of Sergeant Hasan Akbar's killing of fellow US
soldiers to underscore the internal conflict faced by Muslim soldiers serving in the US military and that Hasan's paper goes on to say that Muslim soldiers who perceive the US military to be advancing the cause of
''American hegemony" rather than justice have "turned against fellow troops" and argued for the US mj]jtary to assign Muslim soldiers to religiously acceptable positions to avoid ''the potential for adverse events."
TOP SEORE'fHHOSfSI~~OONINOFORN.-
j(b )(?)(E) I
10 The agent bad been assigned the lead by his supervisor on 27 Februacy, but because of his workload he did not work on the case until27 May. Discretionary leads are generally required to be completed within 90
days of assignment. (S/INF)
t I [FBIS I GMP20090610479002120090810 I
(U/~ I CIRAS ID: FB5941323]
12 According to the FBI, neither they nor their UK
counterparts were able to corrobomte these claims.

(TS/fSIIfP'W). (S/,~W)
39 [Other 1 National Commission on Terrorist Attacks Upon the United States, The 9111 Commission Report. I
20041 (U) I CIRAS ID:]
4 Countmerrorism Mission Management, FY201 0
Counterterrorism Production Guidance, January 2010.

fSffNi7 The publication date was January 2010
although the contents had been drafted befOre th~ 25
December incident (U)
41 "Top Frontbumerintelligence Issl1eS." September
2009. TOP 8~itE'fh'HCSISi
GfFK!feROOl't/N()F{)ffit. (SIMF3
42 NIE MI'I2007-02HC. Memorandum to the Halders of NIE 2007-02HC, The Terrorist Threat to the US

## (B)(7)(E) Fbi (B)( 1) (B)(3) Cia (B)(3) Nsa (B)(7)(E) Fbi (B)(3) Nsa

needs fewer dots," Washington Post, p. A21. (0)
49 Russell Goldman and Huma Khan, ''TimelinC of terror: Clues in Bomber Umar Faroo.k Abduhnutallab's Past," ABCNews.com, 3'0 December 2009. (U}.  .

so DJ~. Grady, Politics: Why HeadS ~
R.<iJtll TheAt'tantic.oom, 8 January 2010. (U)

51 Eric L~
E* Schmitt,~ .Mart~~
"Review of Jet l30mb Shows Mote Mis$1'Jd.~~~
New York Times; 18 January201~p. At.~
52 Mike Allen, "CIA also knew about suspect,"
Politico.com, 29 Decenmer 2009. (U)
.

53 Similarly, the State Department V1$8S Vtpet cabte of
20 November noted only "lnfonnation at post soggersts subject may be involved with Y emeni-based extremists." (U/~
54 Jordy Yager, "Lawmakers press forwani with n:views of intel failures after Christmas attack," TheHill.com, 24
January 2010. (U)
55 Joseph Curl, "Counterterrorism chief: Officials 'didn't unclerstand' intel," Washington Times, 9 Jmru.ary2010, p. A l; "Bight Years later," New Y ode TtmeS, 8 Jammry
2010,. P. A26; and Greg Miller, "Costly eti01S in probe of failedjet airliner blast detailed." Los Angeles Times,
21 JaAuary 2010, p. AI; Brian Ross and Kirit R.adia,
"Northwest 253: Obama Blasts Intelligenee Failures as Evidence ofMissed Signals Mounts." ABQiews.com.

29 December 20Q9; and Jennifer Sims and Bob Gallucci,
"Why . . . - .

sharing cp't aiwasllll!f=lll5~.

w .
:~~aJanuary20lO,p. At9 .. tt1)
~ In any event, the Intelligence~ typieally does not mcoitor purchases of airline tickets worldwide.

Wfim Starks, "Malc:iaithem talk," CQ..com; II January
2010. (U)
.

58 Gregory Tn:verton, ''T~wiH.~~oa again." Los Angek!s.'Times, 19 Januat! 211:t~ pi Al3.

T~
Writes:l~Jat "Siitlply sinifiltghUn ..

migbt have d~ne $e job." . (ll)
59 Sebli~Stian~ "U:s~ lea:mett - tel'l'    on ahiine
' - .. . .

.

. .

.

. . .. . Ill tgellGC.

.

attack~wltie heW8sen route.'" Los .tm&e{es
Times, 7 *]8llU8JY* 2010. (U)
- ..

60 Frances Townsend, "No one connected flie. dots. on terror plot;'~ (;NN.com, )(J I>eceJnQer WlO; ,(U)
61 "Yement :flWU,US.Yemerti CitiZenTamgMore Operational ROle in Al-Qa'ida Groupt"(~NCTC
Online. 5 May~
'('f'Dp-
Seuit:ti~JhmFO'R:N1- ~
62 Mimi Hall; 'Ubama.orders security~
T~. 8 ~
2DfO, P AI. (U)
63 NIEMa200'1-02HC. ~trifie~

NIE 2007-02HC, The Terrorist Threaf.lli ...

Homeland tfSMiCSI/Si'-6Jf'OfKJ1Rf(
'
(stfl'~f)
64 TSA interviewees noted that the number '*''rise above 300 depend~ on the season ami the.~ is even higher once priVate airstrips arc included. (MNFT
65 We note that $ome legislators arc alrea4y~g at the idea that unspecified post-Detroit regulations could cause inconveniences that represent a "disservice to the traveling public. See Kara Rowland 8lld Nicholas K.ralev, "Obama pledges changes on security?"
Washington *Times.* 6 January 2010, p. A.L..!,U).

66 CTC and NCTC produced mon: than ~B
articles

in2000 in.additronJo~-~-.~ .. -...~>'h.
     . .,
          ":.'
                . ''
                      ,
                        '
                          '
                           ,.~:o&~a._pu.t ..
                                      ' .. ,-~,

8lld ~
~1'15.

-(&1.~
officership with respect to the alleged perpetrator.

These individuals failed to demonstrate that officership is the essence of being a member of the military Erofession, regardless of the officer's specialty." (U)
6 Other officers in the FBI WFO, including the WFO
supervisor, did know about the database, but the supervisor did not recommend to the DCIS agent that he
88 Terrorist Screening Center, "Protocol Regarding Terrorist Nominations: Guidance Regarding Application of the Minimum Substantive Derogatory Criteria for Accepting Nominations to the Terrorist Screening Database," February 2009. (U/~
89 For example, during this approximate timeframe, TSC rejected a broad range ofNCTC "No Fly" requests even those
(S7'J'Nft-
90 We focus more on the 25 December incident because the implications and responsibilities of the Intelligence Community are greater than in the case of Fort Hood.

(U)
91 Memorandum from CIA Director Panetta to DNl Blair, "Readdressal of teporting in the Wake of j(b)(?)(E) I
92 Senate Select Committee on Intelligence, "Report on the Attempted Terrorist Attack on Northwest Airlines Flight 253," t.'T~tmcst~Iitoe
'fHF), 16 March
94 For example, not provide enough derogatory information on Abdulmutallab's extremist links to justifY submitting the information to TIDE. Using the exact same information with the same level of derogatory reporting, however, Department of State officers prepared a Visas Viper report that ensured that the information on Abdulmutallab was entered into CLASS, thereby creating a record in TIDE.-tSh'NI<t
95 To take a few examples, Homeland Security Presidential Directive-6 notes that watchlisting is appropriate for "known or appropriately suspected"
terrorists to be watchlisted, while TSC guidelines justifY
watchlisting if the intelligence supports a ''rationale inference." NCTC guidelines notes that watchlisting requires "reasonable suspicion" and that the individual be "operationally capable." In our view, language such as this gives the appearance of making the criteria ostensibly more schematic and asceptic, but "Mlich actually make it more subjective. ~
96 Senate Select Committee on Intelligence, "Report on the Attempted Terrorist Attack on Northwest Airlines Flight 253," (T~t/t'ICS"/5J:OC/
t*}, 16 March

(b )(1)
(b)(3)
(b)(7)(E)
FBI

20 lO. (SI'J'MP)
97 US Persons issues are discussed in detail beginning on
t':ge32. (U)
8 The FBI, for example, is working toward its Next
Generation Analytic Environment (NGAE). The NGAE
initiative represents the FBI's vision for utilizing
technology to further the FBI's ability to correlate and
share terrorism-related intelligence. As a first step, the
FBI has identified the principal repositories of data
within the FBI and is in the process of developing a
cross-database search capability. The long-term

objective is to develop an architectural fiamework that one day might permit the FBI to ingest and share information across the Intelligence Community. (U)
99 "FAA Intelligence Review for NW 253 Bombing Attempt and Subsequent AQAP 1'hreaa,"

## (B)( 1) (B)(3) Cia

"Analytic Responsibilities for Colll'lterterrorism Analysis in the US Intelligence Cotnmunity". EIS
00284. 1 Aprii2010.~/Mf)-
102 The lack of FBI-DOD collab<mrtion-i)Srticularly the shortfalls on Serviee 1epr.esentation to the ITIF-was noted in Protectihg the Force: Lessons from Fort Hood
(Report of the DoD Independent Review, 2010). (U)
103 The Commlll'lity's rolesfor coHecting. reta:ining, and disseminating US Person infonnation are laid out in Executive Order 12333 and in procedures that implement that Order for each Intelligence Community element, as approved by the Attorney General and the head of the Community element. in consultation with the DNI. (U)
104 A primary difference is the role Aulaqi, who directed Abdulmutallab's attack but appears to have mainly played an

for Hasan.

## (B)( 1) (B)(3) (B)(7){E) Fbi

The publicly released version of the DOD
independent review group's report assessed that the relevant DoD personnel policies wer:e aenerany adequate and attrilmtea the omissioos to Hasan's supervisors, who "failed to apply appropriatejudgmmt and standards of offieership." The det:aiied findings and recommendations related to this matter can be fOlll'ld in the restricted annex of the report, which DoD declined to share with us. (U)