Home
Statistics
Documents
Catalog
StratEdit
XSLTForms
DNAOS
About
Portal
Glossary
Contact [!?]
Documents
/
FBI
/
Content
Table of Content
Visions
Missions
Mission [1]
Values
Goals
A: Intelligence
A.1: Common Approach
A.2: Uniform Process
A.3: Environmental Alignment
A.4: Information Sharing and Support
B: Terrorism Protection
B.1: Prevent Attacks
B.2: Disrupt Activities
B.3: Sanctions
B.4: Incident Response and Investigation
B.5: WMD
C: Espionage
C.1: Acquisition of WMD
C.2: Intelligence Community Penetration
C.3: U.S. Government and Contractor Penetration
C.4: National Assets
C.5: Counterintelligence
C.6: Intelligence Dissemination
D: Cyber Attacks and Technology Crimes
D.1: Computer Intrusions and Malicious Code
D.2: Intellectual Property
D.3: Sexual Exploitation
D.4: Internet Fraud
E: Public Corruption
E.1: Law Enforcement Corruption
E.2: Public Corruption
F: Civil Rights
F.1: Hate Crimes
F.2: Color of Law Crimes
F.3: Involuntary Servitude and Slavery
F.4: FACE Act Violations
G: Criminal Enterprises
G.1: Transnational/National Criminal Enterprises
G.2: Drug Trafficking
G.3: Gang-Related Violence
H: White Collar Crime
H.1: Corporate Fraud
H.2: Health Care Fraud
H.3: Financial Institution Crime
H.4: Money Laundering
H.5: Telemarketing, Insurance, and Investment fraud
H.6: Procurement, Contract, and Entitlement Programs, Environmental Crimes, Bankruptcy Fraud, and Anti-Trust Offenses
I: Violent Crime
I.1: Most Significant Violent Crimes
I.2: Other Violent Crimes
I.3: Crimes Against Children
I.4: Crimes in Indian Country
J: Partnerships
J.1: State and Local Investigations
J.2: Intelligence Partners
J.3: Forensics
J.4: Investigative Technology
J.5: Criminal Justice Information Services
J.6: Training
Human Capital A: Preeminent Workforce
HC A.1: Recruitment System
HC B.1: Training and Development
HC C.1: Performance and Reward
HC D.1: Discipline
HC E.1: Leadership Development and Promotion
Tools A: Security
T A.1: Employee Compromise
T A.2: Compromise of Communications and Information
T A.3: Physical Attack
Tools B: Information Technology
T B.1: Harmonized System
T B.2: Mobility
T B.3: Data Storage and Retrieval
T B.4: Speed and Efficiency
T B.5: Data Security
Tools C: Investigative Technology
T C.1: Information Dissemination
T C.2: Tools, Technologies, and Services
T C.3: Intercept Capabilities
T C.4: Radio Communications
Tools D: Criminal Justice Information Services
T D.1: Information Sharing Capabilities
T D.2: NIBRS
T D.3: Background Checks
T D.4: IAFIS
T D.5: CJIS Internet Services
T D.6: LEO
T D.7: Business Continuity Plan
Tools E: Forensics
T E.1: Forensic Analyses
T E.2: Forensic Response
T E.3: Forensic Capabilities
T E.4: Research and Development
Tools F: Records Management
T F.1: E-Records
T F.2: Name Checking
T F.3: FOIPA Requests
sitemap
Copyright 1971-2012 01 COMMUNICATIONS INC. ALL RIGHTS RESERVED. - Powered by DNAOS
contact