Department of the Air Force

F071 JTF A

SYSTEM NAME:

Computer Network Crime Case System  (December 09, 2003,  68 FR 68608)

SYSTEM LOCATION:

Law Enforcement and Counterintelligence Center, Joint Task Force - Computer Network Operations, 701 South Courthouse Road, Arlington, VA 22204-2164.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:

Active duty, retired or former military personnel; current, retired and former civilian employees; dependents of military personnel; and other Department of Defense employees and contractors, both current and former; United States citizens in the United States and abroad; legal aliens; and foreign nationals residing in the U.S. and abroad, who are suspected of violating some law, regulation or directive related to computer network crimes.

CATEGORIES OF RECORDS IN THE SYSTEM:

Reports of investigation, statements of individuals, correspondence, and other informational material pertaining to specific law enforcement and counterintelligence investigations of alleged violations of laws, regulations or directives related to computer network crimes. Name(s) or aliases of the subject, group affiliation (if any), civilian or military status, trusted status, and whether or not the individual is a juvenile.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:

10 U.S.C. 8013, Secretary of the Air Force; E.O. 10450, Security Requirements for Government Employment; The Inspector General Act of 1978 (Pub.L. 95-452), as amended, and DoD Directive 5106.1 (32 CFR part 376); E.O. 13213, Critical Infrastructure Protection in the Information Age; DoD Instruction O-8530.2 Support to Computer Network Defense; DoD Directive 5240.2, DoD Counterintelligence; DoD Directive 5200.27, Acquisition of Information Concerning Persons and Organizations not Affiliated with the Department of Defense.

PURPOSE(S):

To identify and assist in prevention and control of computer network crime and related computer network activity within DoD; aid in attribution of criminal activity; and assist in the development of DoD's network defensive posture.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES:

In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, these records or information contained therein may specifically be disclosed outside the DoD as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:

To the Central Intelligence Agency, the Federal Bureau of Investigation, and other counterintelligence/intelligence agencies in matters pertaining to hostile intelligence and terrorist activities directed against the U.S., its installations, or personnel.

To Department of Justice officials to determine if judicial or administrative action is warranted.

To the U.S. Immigration and Naturalization Service in criminal matters, or matters pertaining to hostile intelligence and terrorist activities directed against the U.S., its allies, its installations, or personnel.

To defense and trial counsels for use in judicial and administrative actions.

To the U.S. Secret Service in conjunction with the protection of the President, Vice President, and other designated high-ranking officials.

To the Department of State and U.S. embassies overseas to provide criminal information affecting U.S. diplomatic relations with foreign nations.

To foreign law enforcement agencies where information sharing agreements exist in criminal matters, or matters pertaining to hostile intelligence and terrorist activities directed against the U.S., its allies, its installations, or personnel.

The DoD 'Blanket Routine Uses' published at the beginning of the Air Force's compilation of systems of records notices apply to this system.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM:


STORAGE:

Maintained on computers and computer output products.

RETRIEVABILITY:

Records are retrieved by name or alias, group affiliation (if any), organization and case number, and/or 'key-word' searches based on case information.

SAFEGUARDS:

Records are accessed by custodian of the record system and by person(s) responsible for servicing the record system in performance of their official duties who are properly screened and cleared for need-to-know. Records are stored in an approved automation system, with 'password' protection. Records are controlled by personnel screening and are located in an office environment protected by a security alarm system.

RETENTION AND DISPOSAL:

Records are reviewed annually for retention or disposal and are destroyed/deleted when no longer needed, unless the record has been identified as a matter of permanent record with historical value. Permanent records are retained until eligible for transfer to the National Archives and Records Administration. Records identified for disposal are destroyed by erasing, deleting, degaussing, or over-writing the database; hard copy residue is destroyed by shredding, pulping, macerating, or burning.

SYSTEM MANAGER(S) AND ADDRESS:

Law Enforcement and Counterintelligence Center Records Manager, Law Enforcement and Counterintelligence Center, Joint Task Force - Computer Network Operations, 701 South Courthouse Road, Arlington, VA, 22204-2164.

NOTIFICATION PROCEDURE:

Individuals seeking to determine whether this system of records contains information on themselves should address inquiries to the Law Enforcement Counterintelligence Center Records Manager, Law Enforcement and Counterintelligence Center, Joint Task Force - Computer Network Operations, 701 South Courthouse Road, Arlington, VA 22204-2164.

The requester must provide a notarized statement or an unsworn declaration made in accordance with 28 U.S.C. 1746, in the following format:

If executed without the United States: `I declare (or certify, verify, or state) under penalty of perjury under the laws of the United States of America that the foregoing is true and correct. Executed on (date). (Signature).'

If executed within the United States, its territories, possessions, or commonwealths: `I declare (or certify, verify, or state) under penalty of perjury that the foregoing is true and correct. Executed on (date). (Signature).'

RECORD ACCESS PROCEDURES:

Individuals seeking to access records about themselves contained in this system should address requests to the Law Enforcement and Counterintelligence Center Records Manager, Law Enforcement and Counterintelligence Center, Joint Task Force - Computer Network Operations, 701 South Courthouse Road, Arlington, VA, 22204-2164.

The requester must provide a notarized statement or an unsworn declaration made in accordance with 28 U.S.C. 1746, in the following format:

If executed without the United States: `I declare (or certify, verify, or state) under penalty of perjury under the laws of the United States of America that the foregoing is true and correct. Executed on (date). (Signature).'

If executed within the United States, its territories, possessions, or commonwealths: `I declare (or certify, verify, or state) under penalty of perjury that the foregoing is true and correct. Executed on (date). (Signature).'

CONTESTING RECORD PROCEDURES:

The Air Force rules for accessing records, and for contesting and appealing initial agency determinations are published in Air Force Instruction 37-132; 32 CFR part 806b; or may be obtained from the system manager.

RECORD SOURCE CATEGORIES:

From DoD and Military Department records; Federal Agency records; foreign law enforcement agencies, security, intelligence, investigatory, or administrative authorities; state, county, and municipal records; employment records of public schools, colleges, universities, technical and trade schools; hospital records; real estate agencies; credit bureaus; financial institutions which maintain credit information on individuals such as loan and mortgage companies, credit unions, banks, etc.; transportation companies (airlines, railroad, etc.); other private records sources deemed necessary in order to complete an investigation; miscellaneous records such as: telephone directories, city directories; Who's Who in America; Who's Who in Commerce and Industry; Who Knows What, a listing of experts in various fields; American Medical Directory; Martindale-Hubbell Law Directory; U.S. Postal Guide; Insurance Directory; Dunn and Bradstreet; and the U.S. Navy BIDEX (Biographical Index); any other type of miscellaneous records deemed necessary to complete the investigation or inquiry; the interview of individuals who have knowledge of the subject's background and activities; the interview of witnesses, victims, confidential sources, and or other individuals deemed necessary to complete the investigation.

EXEMPTIONS CLAIMED FOR THE SYSTEM:

Parts of this system may be exempt pursuant to 5 U.S.C. 552a(j)(2) if the information is compiled and maintained by a component of the agency that performs as its principle function any activity pertaining to the enforcement of criminal laws.

Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identify of a confidential source. NOTE: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions.

An exemption rule for this system has been promulgated in accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c) and (e) published in 32 CFR part 806b. For additional information contact the system manager.

FEDERAL REGISTER HISTORY: