Skip to main content

Currently Skimming:

1 Background
Pages 9-15

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 9...
... Compounding this challenge is the added strain of the new focus on preventive counterterrorism, where success demands a different mind-set, different operational skills, and the exploitation of a radically expanded set of information sources. The FBI has made significant progress in certain areas of its IT modernization program in the last year or so.
From page 10...
... According to the FBI, its mission is "to uphold the law through the investigation of violations of federal criminal law; to protect the United States from foreign intelligence and terrorist activities; to provide leadership and law enforcement assistance to federal, state, local, and
From page 11...
... In those instances where a criminal act may be committed in the future, preparation for that act can be a current criminal violation under the conspiracy or attempt provisions of federal criminal law or other provisions defining preparatory crimes, such as solicitation of a crime of violence or provision of material support in preparation for a terrorist crime. The standard for opening an investigation is satisfied where there is not yet a current substantive or preparatory crime, but facts or circumstances reasonably indicate that such a crime will occur in the future.3 1.2.2 Counterterrorism In the counterterrorism domain, the FBI's objective is to prevent acts of terrorism in the United States and against U.S.
From page 12...
... 1.3.1 Investigation The investigative process is the primary process supporting the law enforcement mission. Investigation develops information from a variety of sources, including but not limited to information gathered directly by special agents or other law enforcement agencies, information obtained through informants, information obtained from other agencies such as Customs and Border Protection or local or foreign law enforcement agencies, laboratory-developed information, and publicly available information (e.g., information on the Internet or in the news)
From page 13...
... Intelligence processes are used in both law enforcement and counterterrorism missions, although the collection of information gathered under intelligence auspices is not directly aimed at the support of prosecutorial activities. Intelligence in the counterterrorism context requires that voluminous information resources from internal and external sources be logically brought together and analyzed with the goal of identifying potential threats of, or precursors to, terrorist activity.
From page 14...
... Terrorism and crime no longer respect those boundaries, and thus a bureau-wide technology deployment necessarily entails a set of systems and data that can be accessed easily across the geographic reach of the FBI's missions. (The FBI encompasses 56 field offices in major cities in the United States, approximately 400 resident agencies (i.e., satellite offices in smaller cities and towns)
From page 15...
... Central to this thrust is the creation of a large data repository, referred to as the IDW, the Integrated Data Warehouse, also in its early stages. 6As used in this report, the term "platform" refers to the computing infrastructure supporting FBI applications, specifically the combination of a type of hardware, say a PC-compatible personal computer, and specific software, such as a specific operating system, Web browser, and set of basic office applications.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.