115
DOCUMENT RESUME e < (i, 04618 - [B0024921] ( e'twek FBI Taking Actions to Comply Fuj.ly uith the Privacy Act. GGD-77-93; B-179296. December 26, 1977. 18 pp. + ' appendi.ces (88 pp.). Report to Rep. Richardson Preyer, Chairman, House Committee on Government Operations: Government Information and Individual Rights Subcommittee; by Elmer B. Staats, Comptroller General. Issue Area: Federal Records Management (1400). Contact: General Government Div. Budget Function: Law Enforcement and Justice: Federal Law Enfo-cement and Prosecution (751); General Government: General Property and Records Management (804). Organization Concerned: Federal Bureau of Investigation; Department of Justice. Congressional Relevance: House Committee on Government Operations: Government Information and Individual Rights Sutcommittee; House Committee on the Judiciary, Senate Committee on the Judiciary. Authority: Privacy Act of 1974 (5 U.S.C. 552). Since the enactment cf the Priracy Act of 1974, Federal agencies have been required to report in Ihe Federal Register ail of their systems of records on individuals. The federal Bureau of Investigation (FBI) central reaordr system is the main system under which all investigative, pe,.Lsonnel, administrative, and other records are kept. Inforuation maintained by field offices and foreign liaison offices is sent to FBI headquarters to be included in the central records system. The FBI maintains a general index containing names for future retrieval and other card indexes, photo albums, ccntrol files, and computer listings. Findings/Conclusioas: As of March 1917, the FBI had reported 12 systers of records. Until April 1977, descriptions of the categories of people in the central records system were general and thus inadequate for public access. Ncw the notices in the Federal Register are more specific and prcvide a better basis for determining what files the FBI maintains. Information in some of the indexes could not be retrieved through any published system. The FBI keeps 239 special indexes, exclusive of 28 classified indexes. Sixty-three of the indexes at headquarters and the field offices contained infcrmation that was not fully retrievable; all indexes kept by the foreign liaison offices contained retr'aeable information. Beco&mendations: The Attorney General should require the FBI Directcr to take one of the following actions with respect to indexes having nonretrievable information: make nonretrievable information on special indexes retrievable as part of a system of records already published in the Federal Register; publi.b a separate rotice in the Federal begist.er for each noLretrieva&.e~ special index; or destroys when permissible, the information in special indexes that is not retrievaLle through a published

DOCUMENT RESUME e (i, - Government Accountability … · cO COCESTRICT£D .-iho! f , ACcountbng ecc0,,t 0 'We General by the Office of Congr'~ tn .L Proal/ REPORT OF THE COMPTROLLER

Embed Size (px)

Citation preview

DOCUMENT RESUME e < (i,04618 - [B0024921] ( e'twek

FBI Taking Actions to Comply Fuj.ly uith the Privacy Act.GGD-77-93; B-179296. December 26, 1977. 18 pp. + ' appendi.ces(88 pp.).

Report to Rep. Richardson Preyer, Chairman, House Committee onGovernment Operations: Government Information and IndividualRights Subcommittee; by Elmer B. Staats, Comptroller General.

Issue Area: Federal Records Management (1400).Contact: General Government Div.Budget Function: Law Enforcement and Justice: Federal Law

Enfo-cement and Prosecution (751); General Government:General Property and Records Management (804).

Organization Concerned: Federal Bureau of Investigation;Department of Justice.

Congressional Relevance: House Committee on GovernmentOperations: Government Information and Individual RightsSutcommittee; House Committee on the Judiciary, SenateCommittee on the Judiciary.

Authority: Privacy Act of 1974 (5 U.S.C. 552).

Since the enactment cf the Priracy Act of 1974, Federalagencies have been required to report in Ihe Federal Registerail of their systems of records on individuals. The federalBureau of Investigation (FBI) central reaordr system is the mainsystem under which all investigative, pe,.Lsonnel, administrative,and other records are kept. Inforuation maintained by fieldoffices and foreign liaison offices is sent to FBI headquartersto be included in the central records system. The FBI maintainsa general index containing names for future retrieval and othercard indexes, photo albums, ccntrol files, and computerlistings. Findings/Conclusioas: As of March 1917, the FBI hadreported 12 systers of records. Until April 1977, descriptionsof the categories of people in the central records system weregeneral and thus inadequate for public access. Ncw the noticesin the Federal Register are more specific and prcvide a betterbasis for determining what files the FBI maintains. Informationin some of the indexes could not be retrieved through anypublished system. The FBI keeps 239 special indexes, exclusiveof 28 classified indexes. Sixty-three of the indexes atheadquarters and the field offices contained infcrmation thatwas not fully retrievable; all indexes kept by the foreignliaison offices contained retr'aeable information.Beco&mendations: The Attorney General should require the FBIDirectcr to take one of the following actions with respect toindexes having nonretrievable information: make nonretrievableinformation on special indexes retrievable as part of a systemof records already published in the Federal Register; publi.b aseparate rotice in the Federal begist.er for each noLretrieva&.e~special index; or destroys when permissible, the information inspecial indexes that is not retrievaLle through a published

system of records. He should also require the FBI Director toissue standard policies and procedures for establishing andhandling special indexes to insure compliance with the PrivacyAct. (lnthor/HTV)

cOCOCESTRICT£D - iho! f , .

ACcountbng ecc0,,t 0 'We Generalby the Office of Congr'~ .L tn Proal/

REPORT OF THECOMPTROLLER GENERALOF THE UNITED STA TES

F.L, Taking Actions ToComply Fully WithThe Privacy ActThe FBI uses various indexes to manage andconduc- investigations. GAO identified 239 ofthem at FBI headquarters, field offices, andforeign liaison offices.

Indexes that are part of, and full j retrievablethrough, the central records system or otherpublished svstems of records need not be pub-lished separately in the Federal Register.

However, 63 of the indexes were not fullyretrievable through a published system ofrecords. The FBI should either

--separately publish a notice of the exist-ence and character of the individualindexes in the Federal Register,

--make them fully retrievable as part of asystem of records already described inthe Federal Register, or

--destroy nonretrievable information inthe indexes.

The FBI said it was taking action to insurethat all indexes are maintained in compli-ance with the Privacy Act.

GGD-77-93 DECEMBER 26, 1977

COMPTROLLER GENERAL OF THE UNITED STATESWASHINGTON, D.C. XA4

B-179296

The Honorable Richardson Preyer, ChairmanSubcommittee on Government Information

and 7'- viJduai RightsGover, -r Operations CommitteeHouse uf Representatives

Dear Mr. Chairman:

In response to a letter dated November 19, 1975, fromthe former Chairman of your Subcommittee, this report identi-fies the indexes of individuals maintained by the FederalBureau of Investigationl (FBI) for investigative purposes anddiscusses the FBI's efforts to comply with the p blicationrequirements of the Privacy Act of 1974. Subseaqently, asagreed with your office, we did not review indexes used foradministrative purposes, nor did we include in this report28 classified investigative indexes relating to foreigncounterintelligence.

Our review was delayed by the FBI's reluctance to co-operate with us without Department of Justice concurrence anduntil we reached a formal agreement with the FBI regardingour access to records. After numerous discussions and ex-changes of correspondence with the Department of Justice andthe FBI, we were given access in May 1976 to the records nec-essary to conduct this review. Thereafter, the FBI coop-erated with us during our review.

Ihe Department of Justice and the FBI were given an op-portunity to comment on this report. They generally agreedwith our conclusions and recommendations. Their commentshave been discussed in chapter 2 of the report and are in-cluded in appendix VI.

As arranged ~v'th your Subcommittee, unless you publiclyannounce its contents earlier, we plan no further distribu-tion of this report until 10 days after the date of the re-port. We will then send copies to interested parties andmake copies available to others upon request.

Sincerely yours,

Comptroller Generalof the United States

COMPTROLLER GENERAL'S FBI TAKING ACTIONS TOREPORT OF THE SUBCOMMITTEE ON COMPLY FULLY WITH THEGOVERNMENT INFORMATION AND PRIVACY ACTINDIVIDUAL RIGHTSCOMMITTEE ON GOVERNMENT OPERATIONSHOUSE OF REPRESENTATIVES

D I G E S T

Since the enactment of the Privacy Act of1974, Federal agencies have been requiredto report in the Federal Register all theirsystems of records on individuals. TheFederal Bureau of Investigation (FBI) hadreported 12 systems of records as of March].977.

The FBI's central records system is themain system under which all investigative,personnel, administrative, and other rec-ords are kept. To find out wha' is in thecentral system, the FBI's general index--3x5 cards containing names for future re-trieval--must be searched.

Each field office and foreign liaison of-fice has its own central records system anda gene 1 index to those records. Most otthe information maintained in these officesis sent to FBI headquarters to be includedin its central records system, with perti-nent names placed in the general index.(See ch. 1.)

In addition to the general index, the FBIhas card indexes, photo albums, controlfiles, and computer listings, among others.It uses these special indexes in day-to-dayinvestigations. (See ch. 1.)

Until April 1977, the descriptions of thecategories of people in the FBI's centralrecords system were general and thus in-adequate for public access. Now, noticesin the Federal Register describe categoriesmore specifically and provide a better basisfor determining what files the FBI main-tains. The FBI does not need to publishseparate notices of the various indexes,

theISBr~~rhoir d Upd rept ~mroi. iGGD-77-93"r dUo reml zt^ aei.

unless information in them cannot be fullyretrieved through another published system ofwhich they are described as a part. However,information in some indexes co,,ld not beretrieved through any published system.Tt.ese indexes should be separately reportedin the Federal Register, be made retrievableas part of an already published system ofrecords, or have nonretrievable informationdestroy-> when permissible. (Se ch. 2 andapps. I.I and IV.)

FBI headquarters, field offices, and for-eign liaison offices keep 239 special in-dexes. (This total does not include 28classified indexes.) GAO's review did notcover indexes used for administrative pur-poses nor indexes involving only foreigncitizens. Sixty-three of the indexes atheadquarters and the field offices ccn-tdined information that was not fully re-trievable through the general index andthus n-t. through the central records sys-tem. All indexes kept by the foreign li-aison offices contained retrievable in-formati-n. (See ch. 2.)

The Attorney General should require the FBIDirector to:

-- Take one of the following actions with re-spect to the indexes having nonretrievableinformation.

1. Make nonretrievable names and other in-formation on special indexes retrievableas part of a system of records alreadypublished in the Federal Register (suchas the central records system).

2. Publish a separate notice in the Fed-eral Register for each nonretrievablespecial index.

3. Destroy when permissible the names andother information in special indexesthat are not retrievable through apublished system of records.

ii

-- Issue stanlard policies and proceduresfor establishing and handling special in-dexes (including major case indexes) toinsure compliance with the Privacy Act.

Because of the problems noted, the FBIshould also study the special indexesmaintained for administrative purposes tomake sure similar problems do not exist.

The Department of Justice and FBI gener-ally agreed with the findings, conclusions,and recommendations in this report. TheFBI is taking action to insure that all in-dexes being maintained by its headquartersdivisions and field offices are in com-pliance with the Privacy Act of 1974. (Seeapp. VI.)

IU*LiIMIa iii

C o n t e n t sPage

DIGEST i

CHAPTER

1 HOW AND WHERE THE FBI MAINTAINS RECORDS 1Central records system 1General index for accessing records 2Indexes used for managing investigativeactivities 2

2 IMPLEMENTING THE PRIVACY ACT OF 1974 4Requirements of the Privacy Act 4S!'stems of records published by the FBI 5Problems with record systems reported

in the Federal Register 6Some indexes need to be reported in the

Federal Register or revised 9Conclusions 14Recommendations 16Agency comments and actions 17

3 SCOPE OF REVIEW 18

APPENDIX

I November 19, 1975, letter from Chairwoman,Government Informiation and IndividualRights Subcommittee of the Committee onGovernment Operations, House of Represen-tatives 19

II Revised notice of FBI's central recordssystem in Federal Register, April 28,1977 30

III List of indexes maintained by FBI Headquar-ters for investigative purposes 33

IV List of indexes maintained by FBI fieldoffices for investigative purposes 55

V List of indexes maintained by FBI foreignliaison offices for investigativepurposes 102

VI December 6, 1977, letter from the Depart-ment of Justice 104

APPENDIX

VII Principal officials responsible foradministering activities discussedin this report 106

ABBREVIATIONS

DEA Drug Enforcement Administration

ELSUR electronic surveillance

FBI Federal Bureau of Investigation

GAO General Accounting Office

CHAPTER 1

HOW AND WHERE THE FBI

MAINTAINS RECORDS

CENTRAL RECORDS SYSTEM

The Federal Bureau of Investigation (FBI) maintains acentral records system at headquarters for its investigative,personnel, applicant, administrative. and general files. Al-though it has other record systems, this is the primary andmost important one. Basically it consists of one numericalsequence of subject matter files and an alphabetical indexto these files referred to as the general index. All infor-mation on a subject matter or case is included in one file.

To control a file, a numbering system is used to indi-cate (1) the classification or type of investigative viola-tion or administrative area involved, (2) the individualcase file within the category, and (3) the serialization ofindividual pieces of mail in the file. For instance, thenumber 91-200-20 on a piece of nail indicates it is the 20thpiece of mail in the 200th case file assigned to the bankrobbery (91) classification.

The FdI's central records system had 191 classificationsas of May 1, 1977. Most of them pertain to Federal viola-tions rever which the FEI has investigative jurisdiction.Otheres include personnel, applicant, and administrative mat-ters.

Each of the FBI's 59 field offices, where investigationsare conducted, and its 14 foreign liaison offices 1/ has itsown central records system similar to that of headquarters.Most, but not a1!, of the information kept at the field andforeign liaison offices is referred to headquarters andtherefore filed in the central records system.

Headquarters' central records system contains about6 million files or separate cases. The FBI does not main-tain statistics on the number of case files or index cardsmaintained by the field offices.

1/In May 1977, the FBI closed wie foreign liaison office,thus reducing the total to 13.

1

GENERAL INDEX FOR ACCESSING tECORDS

The key to the files at headquarters and in the fieldand foreign liaison offices is the general index. It consistsof alphabetically filed 3x5 index cards on various subjectmatters, primarily names of individuals. The cards usuallycontain information such as name, file number, birth placeand date, sex, race, address, and social security number.The general index must be searched to determine what infor-mation, if any, the FBI has in its central records system andwhether it is at headquarters or in the field.

Upon receiving a request under the Freedom of InformationAct or Privacy Act, the FBI searches the general index to thecentral records system to determine if the requested informa-tion is maintained. Other systems of records reported by theFBI in the Federal Register would be searched only if speci-fically requested.

Index cards are created and placed in the general indexonly for information considered pertinent for future retrie-val. The names of the subjects and victims involved in FBIinvestigations are also placed in the general index. How-ever, not all the names of persons who furnish informationduring an investigation are placed in the general index.

The general index to the files at FBI headquarters con-tains more than 59 million cards. These are estimated to re-present 20 million different individuals.

INDEXES USED FOR MANAGINGINVESTIGATIVE ACTIVITIES

In addition to the general index maintained at headquar-ters and at each field office and foreign liaison office, theFBI uses various indexes to facilitate the way investigationsare handled. Primarily, these indexes include index cards,photo albums, and control files.

Headquarters indexes

Operating divisions use headquarters indexes to re-trieve key and frequently used information without a searchin the vast central records system. For example, one sec*-tion maintains a card file on persons involved in theJustice Department's witness protection program--that is,persons who have been given new identities in exchange fortestimony against organized crime figures. Another sectionhas a card file on all criminal informants. These indexesgenerally contain basic identifying information, which is

2

also contained in the central files, They also contain FBIfile numbers which a supervisor can use to request a filefrom the central records system. Thus the supervisor doesnot first need to have the name searched through the generalindex. This procedure saves time and facilitates investi-gations.

Field office and foreignliaison office indexes

Indexes are used in the field and foreign liaison of-fices for the same general management purposes as headquar-ters indexes. Although some information in field office in-dexes originates at headquarters, most involves people whoare of interest only to the field office maintaining the in-dex. Some of the photo indexes are used to show pictures towitnesses or victims of crimes hoping to obtain leads onsuspects.

Field office indexes are in various forms. Some are notset up in card or photo format like headquarters, but may in-stead be copies of correspondence concerning individuals ina particular subject area. Some field offices do not catalogthis information in alphabetical order. They may use otheridentifying means, such as telephone number, race, height,date of birth, or chronological order.

3

CHAPTER 2

IMPLEMENTING THE PRIVACY P.CT OF 1974

Since April 1977 the FBI's public notice of its mainrecords system--the central records system--has sufficientlycategorized the information it containis. To the extent thatinformation, contained in an index is retrievable through andpart of a pubLished system of records, it is not necessaryfor the FBI to consider each index a separate system of rec-ords that must be individually published as such in the Fed-eral Register. However, 63 of the 239 indexes 1/ we identi-fied as being maintained by FBI headquarters or field officesfor investigative purpcsos *,re not fully retrievable froma published system of records. The FBI should either destroyncnretrievable information when permissible, separatelypublish a notice for each of these indexes, or make the in-dexes retrievable as part of an already published system ofrecords (such as the central records system).

REQUIREMENTS OF THEPRIVACIY ACT

The Privacy Act of 1974 requires that agencies "publishin the Federal Register at least annually a notice of theexistence and character of [each] system of records."

The act defines a record as:

"* * * any item, collection, or grouping ofinformation about an individual that Is main-tained by an agency * * * and that containshis name, or the identifying number, symbol,or other identifying particular assigned to theindividual, such as a finger or voice print ora photograph." 5 U.S.C. 552a(a)(4).

It defines a system of records as:

"* * * a group of any records under the controlof any agency from which information is retrieved

1/This total does not include 28 classified indexes. Threeof the 28 indexes were not fully retrievable through thecentral records system. These 28 indexes relate to FBIforeign counterintelligence investigative responsibili-ties.

4

by the name of tho individual or by some identify-ing number, symbol, or other identifying particu-lar assigned to the individual." 5 U.S.C. 552a(a)(5).

The publication requirement of the Privacy Act has twobasic purposes. First, it provides notice about Governmentrecords and, second, it describes access procedures. In gen-eral, the notice function is met if (1) the public is in-formed of Government recordkeeping practices about individualsand (2) individuals are able to make reasonably informed deci-sions about the likelihood of the existence of records aboutthemselves. The description of access procedures must includean explanation of how an individual can obtain access to rec-ords pertaining to him or her and how to contest the contentsof those records. A published notice that properly describesaccess procedure is deficient if it fails to inform thepublic about the nature of the Government record systems.

While the purpose of the Privacy Act is reasonablyclear, it is more difficult to state precisely what mustbe included in the publication notice for any specificsystem of records. The Congress gave agencies considerablediscretion in defining and describing systems of records.

In its guidelines for implementing the Privacy Actpublished in the Federal Register on July 9, 1975, the Of-fice of Management and Budget suggests several factors foragencies to consider ill determining what should be included!in a single system of records. These include:

-- If small groupings of records are treated as separatesystems, notices and procedures will be required foreach. The publication of numerous notices, however,may limit informational value.

-- It a large complex of records is treated as a singlesystem, only one notice is necessary. But, the noticemay have to be ,vuch more complex.

--A major criterion for determining whether a groupingof records constitutes one or several systems is theability of the agency to respond to individual re-quests for access to records.

SYSTEMS OF RECORDS PUBLISHEDBY THE FBI

?he FBI published notices of 12 record systems in theFederal Register.

5

1. The National Crime Information Center.

2. The FBI central records system.

3. The Bureau mailing list.

4. Routine correspondence handled by preprinted form.

5. Routine correspondence prepared without file yellow.6. The electronic surveillance (ELSUR) indices.

7. The FBI automated payroll system.

8. The personnel information network system.

9. The Identification Division records system.

10. Employee travel vouchers and individual recordearnings.

11. Employee health records.

12. Time utilization record-keeping system.

PROBLEMS WITH RECORD SYSTEMSREPORTED IN THE FEDERAL REGISTER

Central records system

The notice for the FBI's central records system itemizesand explains several categories of individuals the system hasrecords on. It also makes reference to the general index foraccessing those records. The notice does not list or men-tion oy name specific indexes (such as those discussed belowand listed in apps. III through V) which the FBI uses inmanaging alid conducting its day-to-day operations.

The FBI has not published a separate ritice for each ofthose indexes maintained by various headquarters divisionsand field office squads for daily use, because it considersthem to be part of the headquarters central records systemor the central records systems maintained by field officesor foreign liaison offices. According to the FBI, these in-dexes contain identifying information which duplicates in-formation contained in, and retrievable through, centralrecords. Having separate indexes on location allows thosewho routinely need related information to access them with-out the time-consuming search of the general index, whichis usually maintained in a central location.

6

The Justice Department has not issued a writtenopinion on the legal sufficiency of the central recordsystem notice publi3hed in the Federal Register in August1975. In a November 14, 1975, letter, however, a DeputyAssistant Attorney General, Office of Legal Counsel, listedseveral factors that were considered in preparing the notice.These included (1) the ability to readily retrieve informa-tion upon request about an individual from the system and(2) unnecessary duplication of notices.

Most of the indexes we identified were used for thesame general purpose--an investigative aid--and containedinformation retrievable through centrdl records. However,some indexes contained information which was not retrievablethrough central records or any ether published system ofrecords. These indexes might be treated as separate systemsof records for which separate notices would be appropriate.

In addition to not publishing separate notices of thevarious indexes maintained for daily management purposes,the FBI's August 1975 publication notice of its centralrecords system--containing most of the info. ation relatedto these indexes--was very general. The system containsabout 6 million files in 191 classifications on about 20 mil-lion individuals. Yet, the description of individual cate-gories included in the central records system was verybroadly stated. For example, the principal description forinvestigatory records was

"* * * individuals who relate in any manner toofficial FBI investigations including, but notlimited to suspects, victims, witnesses, andclose relatives and associates that are rele-vant to an 'nvestigation."

On April 28, 1977, subsequent to our analysis, the FBIexpanded Its notice in the Federal Register on the centralrecords system. (App. II contains a copy of this notice.)It now contains sufficient information about indiividualcategories to enable ~ne to more adequately determine whatrecords the FBI maintains. But as discussed later in thischapter, some records were not fully retrievable throughany of the published systems. These records should be re-ported in the Federal Register as a separate system ofrecords, be made retrievable las a part of an already pub-lished system of records, vr Lave the nonretrievable infor-mation in them destroyed when permissible,

7

Other record systems

Most of the other record systems the FBI listed in theFederal Register do not concern the investigative area;therefore, we did not examine them during this review. Theonly other published record systems in which we found indexesof a.i investigative nature were the (1) ELSUR indices, (2)the National Crime information Center, and (3) the Identifi-cation Division :ecords system.

The indexes we identified as being related to theNational Crime Information Center and the IdentificationDivision records system were retrievable through the respec-tive systems of which they were a part. The publicationnotice for the ELSUR indices, however, lacks some detailswhich would give the public a better idea of what it in-cludes.

The ELSUR index, maintained by FBI headquarters andmost field offices, was published as a separate record sys-tem in the Federal Register because not all names in theindex are retrievable through the general index and centralrecords system. Although the FBI initiated the ELSUR indexin 1966 at the direction of the Department of Justice, threeFBT field offices had initiated ELSUR indexes in 1941.

The field offices have been including in their ELSURindex, and reporting to headquarters for inclusion in itsindex, the names of all persons whose voices have been moni-tored through an FBI microphone installation or a telephonesurveillance since January 1, 1960. (See app. III, p. 49.)The names of monitored subjects are retrievable through theheadquarters or local field office ELSUR index.

Until 1969 field offices were also required to forwardfor inclusion in the headquarters ELSUR index the names ofall persons mentioned during monitored conversations. Head-quarters discontinued this requirement in 1969, but somefield offices still make up mention cards for inclusion intheir ELSUR index. Thereftre, the names of such persons,to the extent they are maintained in field office ELSURindexes, are not retrievable thLough the headquarters ELSURindex--a fact not set forth in th= published notice on ELSURindexes. The notice does not point out that ELSUR indexesare maintained in field offices which have conducted elec-tronic surveillance since 1960.

8

SOME INDEXES NEED TO BEREPORTED IN THE FEDERAL REGISTEROR REVISED

Of the types of indexes which we identified as beingmaintained at FBI headquarters, field offices, and foreignliaison offices, several contained some names and informationwhich were not retrievable through the respective centralrecords system or any other published system of records. TheFBI should separately publish the name, nature, and characterof such index in the Federal Register, destroy nonretrievableinformation which they contain, or make them fully retrievablethrough an already published system of records (such as thecentral records system).

Fourteen indexes maintained at FBIheadquarters are nonretrieval!_e

We identified 71 investigative indexes maintained at FBIheadquarters by various divisions. Some indexes consist ofnote cards containing various identifying information, someare computer Lapes, and others consist of photo albums con-taining pictures as well as identifying information. Appen-dix III contains a listing and brief description of the in-dexes.

Fourteen indexes were not fully retrievable through thecentral records system or any other system which the FBIpublicized in the Federal Register. These are the indexon associates of the Drug Enforcement Administration's (DEA's)class I narcotics violators, the White House special index,and computerized listings of data related to 12 major investi-gations conducted by the FBI.

Index on associates of DEA'sclass I narcotics violators

The FBI assists DEA and State and local narcotics controlagencies throughout the country by developing and disseminat-ing intelligence data concerning illicit drug trafficking.In November 1976, in connection with this role, DEA suppliedFBI headquarters with a computer printout of its class Inarcotics violators. These are people known to manufacture,supply, or distribute large quantities of illicit drugs. DEAalso supplied a printout of known associates of these class Iviolators. Information on both the violators and associateswas sent by FBI headquarters Lc A11 field offices and twomajor resident agencies.

9

Both FBI headquarters and field offices included theclass I violat(rs in their general indexes. They did notinclude the violators' associates in the general index,however, because of the lack of (1) sufficient identifyinginformation and (2) any significant investigative interest.The names of associates, along with the correspondingnames of violators, are kept on a separate list and are notretrievable through central records.

White House special inde.:

This index, still actively maintained, was initiatedduring President Dwight D. Eisenhower's administration tofacilitate security checks on White House appointees, staffmembers, visitors, and guests. When the President is havingvisitors or guests in or is considering appointments to Gov-ernment jobs or White House staff, the White House securityoffice usually sends their names to the FBI for securitychecks. If the person has a file, it is reviewed. Anyadverse or derogatory information is reported by memorandumto the White House.

The separate index of persons the White House has aninterest in consists of cards with the name, the date thesearch was made, the type of White House function or posi-tion to which appointment was being considered, and the FBIfile number, if one exists. Should a search of the generalindex determine a "no record," a card is prepared for theWhite House special index indicating this. The names ofsuch persons with no record are not included in the generalindex and thus are not retrievable through the headquartersceatral records system.

When the FBI receives a name from the White House, itfirst searches the special index to see if the subject waschecked previously. If he or ski was and the central recordssystem contains information on the subject, the FBI can im-mediately call for the file. Then it has only to determinewhether information has been added to the subject's filesince the last request from the White House. If nothing wasfound in a prior name check performed for the White House,the FBI can limit its search to the time period since thelast search.

FBI officials gave two reasons for creating a separateindex on persons the White House has an interst in. First,many names are referred more than once and, second, thename checks or searches must often be performed quickly--sometimes w_thin an hour.

10

Headquarters computer listings onmajor cases contain somenonretrievable names

For major cases or investigations, the FBI establishesspecial indexes to keep track of all the information. ThePresident John F. Kennedy assassination, the Patricia Hearstkidnapping, and the James Hoffa disappearance are examples ofsuch cases. Usually the field supervisor of a major casesets up an index card system to facilitate assigning andkeeping track of investigative leads without having tosearch the general index. The number of major case indexeswe identified in the field offices and the related retrie-val problems are discussed on pages 13 and 14.

Because of the complexity of some major cases, FBIheaquarters computerizes certain information to facilitateits administration. The field offices submit to headquar-ters the names of people on whom information is developed inconjunction with a major case. They also provide licenseplate numbers, evidence, and any other pertinent information.Headquarters then computerizes the information and usually ona monthly basis provides the field offices with a printoutfor each case. It shows the names of persons related to theinvestigation in alphabetical order, a brief summary of theinformation attributed to this person, and a reference tothe location of the information in the headquarters centralrecords or field office files. We identified 12 such com-puter listings.

Although the computer printout is generated as a head-quarters service to aid the field offices investigating majorcases, copies are maintained at headquarters and used bysupervisors responsible for overseeing such cases. Thenames on the computer listings are often included in tileheadquarters general index and thus retrievable through itscentral records system. In some instances the names wouldnot be considered necessary for future retrieval by head-quarters. They would therefore not be included in the head-quarters general index and thus not be retrievable throughthe central records system. All 12 computerized listingswe identified at FBI headquarters were not fully retriev-able through a published system of records.

Forty-nine indexes maintained by FBIfield offices are not fully retrievablethrough a published system of records

The FBI's notice in the Federal Register indicates thateach field office has its own records system and that not all

11

information at the field office is retrievable at headquar-ters. Therefore, we surveyed the FBI's 59 field offices todetermine (1) what indexes they maintained and (2) whetherthey maintained information on individuals in any indexesthat are not retrievable through the field office generalindex.

We identified 158 indexes maintained in various formsby the 59 field offices. Appendix IV contains a listing anddescription of these indexes.

Although a few of the FBI's approximately 495 residentagencies which support the field offices maintain special in-dexes for investigative purposes, they do not have a centralrecords system or a general index. They generally use thecognizant field office special indexes and central records asneeded.

The indexes most often kept by resident agencies arerelated to fugitive areas and include wanted flyers, identifi-cation orders, and check circulars. They are generally re-trievable through the cognizant field office general index.One larger resident agency did maintain a couple of the nameindexes we identified in several field offices, and thisinformation was retrievable through the appropriate fieldoffice's central records system.

The names and basic information in most of the fieldoffice indexes we identified are retrievable through apublished system of records, namely the general index andcentral records system of that office. As indicated inappendix IV, however, we identified 49 indexes in the fieldoffices of which some or all of the names and other infor-mation were not retrievable through the field office generalindex and central records system.

For example, not all of the names of persons includedin the bank robbery album maintained by some field officesare in the general index, and they would not be retrievablethrough the field office central records system. The albummight contain information furnished by an informant on a per-son who has never been arrested for bank robbery. It mightcontain a photo furnished by the local police with somebasic identifiers on a person who has been convicted ofarmed robbery and thus is a potential bank robber.

The information in a fe4 indexes may not be retrievablebecause of the manner in which it is filed. For instance,

12

in some field offices the bank robbery album is not filedby name, but by various physical descriptions--usually race,height, and date of birth. A few indexes are also filed bysuch classifications as telephone number or chronologicalorder. This makes it difficult to retrieve the informationbased on a request which contains only a name.

The Privacy Act's definition of "system of records"is not specific as to the meaning of the language "* * * re-trieved by the name of the individual * * * or other identl-fying particular assigned to an individual." (Underscoringadded for emphasis.) For this reason, we cannot concludethat all indexes containing information retrievable onlyby physical description, phone number, or chronologicalorder are reportable as a separate system of records eventhough they are not fully retrievable in the general index.We believe that generally, however, if certain data relatedto a person is important enough to be placed in a specialindex, the names are important enough to be included inthe general index--thus making chem retrievable.

Major case indexes in some fieldoffices are not retrievable

As discussed earlier, field offices maintain specialindexes to administer major cases or investigations. Ofthe 158 field office indexes, 68 related to major caseswith 22 major case indexes containing names which were notfully retrievable through the general index. Major caseindexes are included in appendix IV.

The retrieval of major case indexes varied by fieldoffice because of different practices. Some offices used adual card system when placing a name in a major case index--one card for the special index and one for the general index.Some offices only made up a card for the major case index.Other offices made up cards for the major case index and thegeneral index on those names considered pertinent for futureretrieval. In a few major cases having only one index card,the major case index cards that were relevant would be placedii. che general index at the conclusion of the case and therest would be destroyed.

We identified only one major case irdex that was totallyseparate from the general index--that of the President Kennedyassassination, Jack Leon Ruby, and Lee Harvey Oswald case.According to the FBI in the Dallas field office, this indexis searched in connection with information requests under the

13

Privacy Act and Freedom of Information Act, and all relevantnames and information on the index have also been reported toFBI headquarters and included in the headquarters centralrecords.

Informant indexes in two field officesare kept separately

In November 1976 FBI headquarters notified its fieldoffices that they could remove all informant index cardsfrom the general index if security reasons warranted it.Two field offices had done so as of February 1977.

The field offices were instructed that separatingtheir informant cards from the general index would requiresearching both indexes to comply with requestes under thePrivacy Act and Freedom of Information Act. Therefore,even though the two indexes are physically separated forsecurity reasons, the FBI considers them to be, and treatsthem as, part of the general index.

All indeyxs maintained by foreignliaison offices are retrievable

The FBI has 13 liaison offices in foreign countries toinsure a constant and prompt exchange of information andassistance between foreign law enforcement and security agen-cies and the FBI. As with the FBI's field offices, we sur-veyed the liaison offices to determine the indexes they main-tained. We identified only 10 indexes, and all of the namesand information included in them was retrievable throughtheir general index. The indexes we identified are listedand described in appendix V.

CONCLUSIONS

Because of the lack of descriptive detail, the August1975 notice in the Federal Register of the FBI's centralrecords system functioned ineffectively as a public recordof the system's nature and character. While the noticeprovided the public with information to request access torecords, to be more effective it needed to be expanded toinclude more descriptive detail about the categories ofindividuals on whom records are maintained. We believethe expanded notice published in the Federal Register onApril 28, 1977, now contains sufficient information aboutthe categories of individuals included in the central rec-ords system to enable an individual to more adequatelydetermine what records the FBI maintairs.

14

While a separate notice for each index would also beconsistent with the Privacy Act and could further improvethe 'BI's disclosure ?rocedures, the FBI's decision to treatall its indexes as part of the central records system or anyother published system would be a reasonable exercise of theFBI's discretion, providing the indexes are retrievablethrough the system they are a part of. As shown in appen-dixes III and IV, however, 63 indexes are not fully retriev-able through the headquarters or field office central recordssystems or through other published systems. The FBI shouldeither publish a separate notice for each of those indexes,destroy when permissible nonretrievable information in them,or make the indexes retrievable as part of an already pub-lished system of records.

Although the publication notice in the Federal Registerlists the ELSUR indices as a separate system of records, itdoes not disclose that most field offices maintain .n ELSURindex. The current notice would be more effective if it wereamended to point this out. Also, some field offices includeon their ELSUR indexes the names of persons mentioned duringmonitored conversations. Since 1959, however, these namesare not reported to FBI headquarters and thus are not retriev-able through its ELSUR index.

When FBI officials learned that several indexes we hadidentified were not fully retrievable through a publishedsystem of records, they incorporated a procedure to checkthe use and status of special indexes as part of the FBI'speriodic inspection of its headquarters divisicns, fieldoffices, and foreign liaison offices. This procedure hasbeen in use since January 1977 and includes an evaluation ofwhether the indexes are retrievable through the oeneral in-dex. If the inspection staff continues to evaluate indexesas part of its periodic inspections and its findings andrecommendations are enacted, the FBI will be better assuredof being in compliance with the Privacy Act.

In addition to its periodic review of indexes, the FBIshould take action with regard to those indexes that are nctretrievable through a published system of records. We be-lieve this can be accomplished by making such indexes re-trievable as part of an already published system, publishinga separate notice for each index or destroying when permis-sible the nonretrievable information they contain.

15

To avoid future discrepancies among field offices re-garding retrieval of the same types of indexes, such es themajor case indexes, FBI headquarters should issue standardpolicies and procedures on establishing and handling in-dexes.

Finally, we believe the FBI should consider conductinga review of the indexes it maintains for administrative pur-poses, particularly since those indexes were not includedin our review, to insure that problems similar to thosecited in this report do not exist.

RECOMMENDATIONS

We recommend that the Attorney General require the FBIDirector to:

-- Initiate one of the following actions with respect toindexes having nonretrievable information.

Make nonretrievable names and other informationon special indexes retrievable as part of asystem of records already published in the Fed-eral Register (such as the central records sys-tem).

2. Publish a separate notice in the Federal Regis-ter for each nonretrievable special index.

3. Destroy when permissible the names and otherinformation in special indexes that are notretrievable through a published system ofrecords.

-- Issue standard policies and procedures for establishingand handling special indexes to insure compliance withthe Privacy Act.

-- Amend the current notice in the Federal Register tostate that ELSUR indexes are maintained in some FBIfield offices as well as at headquarters and that theheadquarters ELSUR index and some field office ELSURindexes contain mention cards.

Because of the problems we noted concerning investiga-tive indexes, we further recommend that the FBI study thespecial indexes it maintains for administrative purposes toinsure that similar problems do not exist.

16

AGENCY COMMENTS AND ACTIONS

The Department of Justice and FBI generally agreed withthe findings, conclusions, and recommendations in this re-port. (See app. VI.) They agreed that the Congress needsI have detailed knowledge of the FBI's indexes and record-keeping practices to be in a position to consider appro-priate legislation.

To insure full compliance with the provisions of thePrivacy Act of 1974, the FBI has irnstructed all headquartersdivisions and field offices to check all of their indexesand to take one of the three recommended options to maketheir indexes comply with the act.

17

CHAPTER 3

SCOPE OF REVTEW

To identify the various indexes the FBI maintains forinvestigative purposes, we obtained information from FB'headquarters, the 59 field offices, and the 14 FBI foreignliaison offices. Following the identification of the head-quarters indexes, we sent a letter to all field offices andforeign liaison offices requesting that they list and ex-plain the indexes they maintain. A second letter was sentin the form of a checklist to be filled out by the fieldoffices and liaison offices. The checklist consisted ofall the various indexes, such as photo albuims and controlfiles, listed by the field offices in their first response.The checklist response was necessary because of the poten-tial misinterpretation of what an index is. We also hadtelephonic followup with the field officas on areas needingfurther clarification and visited four field offices--Atlanta, Chicago, Jacksonville, and New York--to discussthe indexes they maintained.

We did not include in our review indexes the FBI main-tains for administrative purposes. Nor did we include in-dexes involving only foreign nationals, because only U.S.citizens and aliens admitted for permanent residence arecovered by the Privacy Act. Also, we did not evaluate themerits of the indexes.

We analyzed the adequacy of the FBI's publication noticefor the central records system and other published systemsof records in which we found investigative indexes. We ad-dressed two points: (1) whether the Privacy Act requiresthat the FBI publish a separate notice for each index itmaintains and (2) whether the FBI's notice for the centralrecords system and other systems should provide more detailsabout the categories of information it contains.

18

APPENDIX I APPENDIX I

Sll.A S. ,IUS. N.Y.. eMIAJWdMAN SAM &TWIG , Amz.=W .aJ. SYAN, J N. . WN Im CINTo r . n.. HIUN . PA N. MC COOK9 JR, .;CALI.

-, " .' .." _S NINETY-FOURTH CONGRESS .s-4C...L. Io. .TOM. MS.A, ,lA53, N.J."ANTHOYMlly. CUM.ongreC of ti "e itniteb otatts

Fout of btprentatibGOVERNMENT INFORMATION AND INDIVIDUAL RIGHTS

SUBCOMMITTEEOF THE

COMMITTEE ON GOVERNMENT OPERATIONSRAYBURN HouSE OFFICE BUILDING. ROOM B-349-B-C

WASHINGTON, D.C. 20515

November 19, 1975

Honorable Elmer B. StaatsComptroller General of the United StatesU.S. General Accounting Office441 G Street, NorthwestWashington, D.C. 20548

Dear Mr. Comptroller General:

Enclosed is a copy of an opinion of the American Law Divisionof the Library of Congress concerning the filing, pursuant to thePrivacy Act of 1974, of notice of the existence of Federal Bureauof Investigation systems of records. The opinion finds that theFBI's "Administrative Index" meets the Privacy Act's definition ofa system of records and that the FBI's notice for the Central RecordsSystem does not adequately describe that system.

In your statement to the House Judiciary Subcommittee on CivilRights and Constitutional Rights on September 24, 1975, you mentioned,at p. 20 of your typed statement, that the FBI maintained various"lists of individuals subject to intensified investigative interestbecause of their leadership roles, potential for violence, or in somecases, organizational affiliation." You refer specifically to the"Administrative Index" (which is the subject of the Library of Congressopinion) as well as "the Agitator Index", "the Stop Index" and the"Computerized Teleohone Number Index". You also state that the "KeyActivist" and the "Key Extremist" programs fall within the categoryof programs connected with the maintenance of lists of persons.

In view of the opinion that the FBI should separately list the"Administrative Index" in conformity with the requirements of thePrivacy Act, and in view of the revelation in your testimony of theexistence of these additional lists, I would like the GAO to undertake a

19

APPENDIX I APPENDIX I

Honorable Elmer B. StaatsNovember 19, 1975 Page 2

survey and description of all such lists maintained by the FBi. Iwould like the GAO to determine whether there exist any additionalFBI lists or indexes such as the "Administrative Index" and the othersreferred itu in your testimony.

Please have your staff contact Timothy Ingram, the SubcommitteeStaff Directoi, 225-3741, concerning this request.

Sincerely,

BELLA S. BZUCChairwoman

Enclosure

20

APPENDIX I ArPENDIX I

U. XashiiSton, z Congrcssffonal Research Service'Washi.gton, D.C. 20540

November 11, 1975

To: House Goverrment Information and Individual RightsSubcommittee

From: American Law Division

Subject: Wlhether Justice Department Provided Notice of Existenceo o;Security Risk File Adequate to Meet Requirements of "PrivacyAct of 1974."

This will refer to your request of October 29, 1975, in whichyou asked whether the Justice Department is required by the "Priv:;cy ActLof 1974" (Pub.L. 93-579, December 31, 1974, 88 Stat., 1896, 5 U.S.C.sec. 552a) to, provide notice in the Federal Register of the exisLcnacc iwhat theydescribe as an "administrative index" of persons believed to po.e

a threat to national security.

The "Privacy Act" requires each agency maintaining a systenm o*'records, among other things not relevant to this report, to pu:K1ish at.least annually in the Federal Register a "notice of the existence and: c:l;. -

acter of the system of records" which shall include factors such as Lthe na, ,ard location of the system, categories of individuals whose rcoe.d-l; ;:8,omaintained in the system, categories of records maintained in the systlcn;,routine uses to which the records are put, and the policies and p..actic ...of the agency with regard to storage, retrievability, access, retention ;ii:,:disposal of the recorus. 5 J.S.C. j552a(c)(4).

The existence of tlhe "in. x" was disclosed to the IHouse Civ:iLiberties Subcomnittece in a memorandum by F.3. I. Director Clalhcellc, i.Kelley declassified and released by the Subcorlmittee on October 22, iU'".

21

APPENDIX I APPENDIX I

The system contains the names of more than 1200 persons who were de-

scribed as having

exhibited a willingness or capability of engagingin treason, re'bcllion, sabotage, espionage, as-sassination of govel. ment officials, terrorism,guerilla warfare or other acts which would re-sult in interference with or a threat to the sur-vival of national, 7tate or local government.New York Times, October 23, 1975, p. 13;Washington Post, October 24, 1° ;5, p. A2, quo-ting from FB M.emorandum.

The Justice Department did not provide separate notice for this

"administrative index" in its annual "Notices of Systems of Records" pub-

lished in the Federal Register on August 27, 1975, in accordance with the

requirements of Sec. 3(e)(4) of the "Privacy Act" (5 U.S.C. sec. 552 (e)

(4)). The Department has claimed that since these records are duplicates

of some of the records contained in the larger 'F.BI. Central Records

System, " it is not a separate system. It is contended that since notice

was given of the central files system from whicn all security risk records

were acquired (see 40 Fed. Reg. 38768, August 27, 1975), the "Privacy

Act" notice requirement had been fulfilled and a separate notice need not

be given to duplicates of part of the system and the specialized security

risk index wit. which portions of the whole file could be retrieved.

An examination of a description of the types of records involved,

the language and history of the "Privacy Act", and the authoritative inter-

pretation of that Act provided by the guidelines issued by tle Office of

22

APPENDIX I APPENDIX I

Management and the Budget for implementation of the Act: indicate that

the Justice Department is required by the "Privacy Act" to publish clear

notice of the existence of the system of records listing petrsons considered

to pose a danger to the national security even though the records com-

prising the system are also included in the noticed "F.B.I. Central JRe-

cords System. " As will be shown by this inemoi'ndum, this list meets

the Act's definition of a system of records which is inadequately described

in the notice for the "Central Records System. "

The so-called "inaex" is comprised of cards on which are pr1inted

the nantes, background info.rmation, file numbers and alleged acltivity in

which the individual is engaged which provide the rationale for dci'inia.l,

the subject as a security threat. The individual cards would clearly be

"records" under the "Privacy Act" since each one is "a collection, or

grouping of information about an individual that is maintained by nlu a'(e,)cy,

including but not limited to his...criminal or employment history and that

contains his name, or the ident.fying number... or otlic, identifyitng pac.li-

cular assigned to the it. lividual... " 5 (IS. C. sec. 552a.aj( ). 'ih :'' l.;

file would also constitute a "system of records" under the Act--"a group

;Sec. 6 of the "Privacy Act'? requires the Office of Managemenlt adnt -get to "develop guidelines and reglllations for the use of agencies in i.[pie-menting the provisions of section 552a of title 5, United States (.,odr"and to 'provide continuing assistance to and oversight of implementationof the provisions of such section by agencies.

23

APPENDIX I APPENDIX I

of any records under the control of any agency from which information

is retrieved by the name of the individual or by some identifying number,

symnbol, or other identifying par.icular assigned to the individual." 5

U. S.C. sec. 552a(a)(5). Even if the records could only be ret.rieved from

the central file, the existence of an index alone, with which those records

involving security risks could be segregated from the larger collection,

would constitute a system of records.

Since this information is clearly covered by the "Privacy Act,"

the crucial remaining issue is whether this system of records is a sep-

arate system requiring separate notice or is merely part of the "'F.B.I.

Central Records Systems." If the records are determined to be only a

component of the larger central records, then a determination would have

to be made as to whether the published notice adequately described this

component.

Although the agencies are given wide discretion in defining what

constitutes a separate system, the fact that all of the records in one system

were derived from another system does not necessarily mean, as the Jus-

tice Department asserts, that the smaller collection of records is not a

separate system. The OMB guidelines conclude that

The purpose(s) of a system is the most impor-tant criterion in determining whether a systemis to be treated as a single system or severalsystems for the purposes of the A,-t. If eachof several groupings of agency records is usedfor a unique purpose or setof purposes,... eachmay appropriately be treated as a separate sys-tem. 40 Fed.Reg. 28962-28963(July 9, 1975).

24

APPENDIX I APPENDIX I

The Federal Register notice of the "F.B.I. Central Records Sys -tem" in wnich t:e security system is purported to be included providessome evidence that the security list is distinctive fron thile other filesin the index. The categories of individuals included in the Central sys-tem are described as:

a. Individuals who relate in any manner to of-ficial F.B.I. investigations including, but notlimited to suspects, victims, witnesses andclose relatives and associates Lihat are relevantto an investigation.

b. Applicants for and current and former per-sonnel of the F. D.I.... or persons related topersolmel matters.

c. Applicants for and appointees to sensitivepositions in the United States Government andpersons... considered relevant to the investiga-tion.

d. Individuals who are the subject of unsolicitedinformation, who offer unsolicited information,request assistance. and make inquiries concern-ing record information, including general cor-respondence...

e. hIclividuals, associaLed wits; adniinistrativ coper-Lr;tLi.,l:; orf tit Ievis:L :; ililtu, . . Ctslll [':t¢ L(~ ;:..

Only one of the above categories, "a", would encompass the Lypeof record included in a "security watch system. " As can be seen above,category "a" include; a wide range of criminal suspects, convicts, victilmsand witnesses. The kidnapper, bank rebber and their victins and wi.i. sse;ito their crimes, in most cases, would differ substantially froni the 1200persons who, because of characteristics that the F.B.I. believes makethem dangerous to the national security, can be accessed from hJe central

25

APPENDIX I APPENDIX I

records for special forms of political surveillance or other treatment dis-

tinctive from other types of suspects.

The unique cl.aracteristics of the subjects of the national security

threat list are emphasized by the origins of this system which clearly demon-

strate that it was created for a unique purpose that sets it apart fromn

other criminal or personnel fi'es. Its nucleus was developed prior to 1971

when the F. B. I. maintained a detention list of persons who, under the

authority of the "Internal Security Act of 1950, " Ch 1024, title II, §100-1US,

64 stat. 1019, Sept. 23, 1950, would be subject to incarceration in the event

of a national emergency. The Justice Department has claimed that this

index was discontinued in September, 1971, after that Act was repealed, but

some F.B.I. sources have said that names in the old system, which at its

peak contained as many as 15, 000 names, were included in the present in-

dex. See New York Times, supra. Even though present law no longer pro-

vides specific authority for the incarceration of persons thought to pose a

national security threat in case of a national emergency, Director Kelley's

memorandum to the House Committee stated that the security threat systeirm

was maintained and continuously revised and updated to provide "a record

of individuals who would merit close investigative attention pending legal

steps by the President to take further action" if there was a national emer-

gency.

The hearings, primarily by the Senate Constitutional RiglhLs Sub-

committee and the Houb: Government Operations Committee, reports and

debate that preceded enactment of the "Privacy Act of 1974"made abundant-

ly clear Congress' concern over the effect of secret files on the rights

26

APPENDIX I APPENDIX

of individuals who could not even know that potentially damaging information

exidsted and was being widely disseminated, much less challenge inlornmation

believed to be erroneous. In the "Privacy Act, " Congress specifically

found

in order to protect the privacy of individuals iden-tified in information systems maintained by F'ed-.ral agencies, it is necessary and proper for

Congress to regulate the collection, maintenance,use, anm dissemination of information by such a-gencies. sec 2(a)(5).

The first purpose of the Act was stated to be to:

permit an individual to determine what recordspertaining to him are collected, maintained, used,or disseminated oy such agencies; sec. 2(b)(3).

For this reason, although many sensitive systems, such as C.I.A. llr; law

enforcement systems, are exempt fr'om requiremernts such as thlo.s p n-lit-

ting an individual to see his own record, no system is exempt frori tihe no-

tice reqairements of section 3(e)(4)((B), the requirement that all agencies

nnust rep)rt "the categories of individuals on whom rccords are main-

tained in the system. "

The OMB guidelines clearly recognize the purpose of the notice

requirement when they state:

Agencies shoul'i keep ill mind that' a major pur-pose of the Act is :.ot tlhe restructuring of exist-ing systems of recoiz',s, but rather the publiciz-ing of what those systems are and how they areused. 40 Fed. Reg. 28963(July 9, 1975).

Congress showed particular sensitivity to and concern over re-

ccrds that could be considered to endanger First Amendment rights. See,

27

APPENDIX I APPL'ODIX I

for example Senate Judiciary Committee, Subcommittee on Constitutional

Rights, Hearings on S. 2318, "The Freedom from Surveillance Acl of1973." 93rd Cong., 2nd Sess., April 9, 10, 1974. The "Privacy Act"specifically prohibits the maintenance of records "Describillg how anlly in-dividual exercises rights guaranteed by the First Amendment unless ex-pressly authorized by statute... or unless pertinent to and within the scope

of an authorized law enforcement activity. " sec. 3 (e)(7).

Even though F. B.I. Director Kclly's memorandum to the HiouseJudiciary Subcommittee denied that subjects were included in the security

system solely because of their stated opposition to Government policies

or because of their membership in a subversive organization, it is liceiy

that a person's political views or associations would have some influence

over whether he was included in the system. The old security index was

reported by the Times to have at one time contained the n.,mes of virtual-

ly all known members of the Communist Party. Because of the large nunl-

ber of Communists included in the original system, it is likely that nmanymembers of the Communist Party are still included in the system. Whilethe maintenance of national security iJle maybe justifiable as a law enforce-ment activity, CongreEs' sensitivity to t;is type of political intelligencefile would indicate an intention that clear notice be provided of its exist-ence.

While the OMB guidelines would permit "a large complex of re-

cords" to be treated as a single system, they specify that the "notice and

28

APPENDIX I APPENDIX I

the procedures may be considerably more complex" than if each small

grouping of records were treated as a separate system. 40 Fed. leg.2 8962(July 9, 1975). The notice given does not provide the necessary

specificity. The fact that one could read the notice and not suspect that

records are maintained within this system on persons who are under sur-

veillance as security risks shows that the notice does not meet the function

of alerting the public to existing systems and of informing Congress so

that its regulatory function with regard to sucl personnel information can

be preserved. Since this type of record may ae more subject to abuse

than most routine personnel files and is clearly distinct from other systems

of records includedintheCentrl iiecords, separate notice would be desir-

able. As a minimum, the law would seem to require that, if the Justice

Department were to continue to treat all these records as a unified system,

a much clearer and detailed notice be issued, if not a separate notice.

E. Jeremy HuttonLegislative Attorney

29

APPENDIX II APPENDIX II

REVISED NOTICE OF FBI'S

CENTRAL RECORDS SYSTEM

IN TiE FEDERAL REGISTER I/

DEPARTMENT OF JUSTICEffice of the Attorney General

lOrder No. 724-V7IPRIVACY ACT OF 1974

Systems of Records; CorrectionIn P.R. Doc. 77-12097 appearing at

page 21668 in the issue of Thursday, April28, 1977, the following paragraph wasomitted from the description of the cate-.gorles of records for JUSTICE/FBI-002.titled "FBI Central Records System."

The FBI Central Reccrds System--theFBI utilizes a central recb7rs system o/maintaining its investigative, personnel,applicant, administrative, and generalfles. This system consists of one numeri-cal sequence of -sbiect matter files, analphabetical index to the I;tes, and a sup-porting abstract system to facilitateprocessing and accountability of all Im-portant mail placed in 11le. Files kept InFBI field ojlces are also structured in thesame marner, except they do not utilizean abstract system.

Pursuant to the authority vested in me by5 U.8.C. 652a, the desoription of otegoriesof records printed below replaes the exist-ing one and is heerby adopted.

Dated: May 11, 1977.

OIrn'N B. RELL,Attorney Oeneral.

1/Underscored portion represents what was initiallypublished in the Federal Register on August 27, 1975.

30

APPENDIX II APPENDIX II

NOTICES 26479JUSTIcE/II.4002 8. Falsely Clirmin, Oltisenship 79. Obstruction of Criminal InvestigationsYostem nne40. Passport An Vi Matter 7. Applicatlon for Pardon After Comple-system 1111211w: I Bl~tem641, Ezplostves (obsolete) tlon of Sentence and Application forFBI Crentral Records Bsdt. 4. Deserter; Deert. Harboring Executive Clemency

Categi: 4l ofen4. Il Wl Waring of Uniform: Pai Ad- 74. PerJuryvertiaing or Misuse of'Nroe, 'orda, 78. Bondsmen and SuretiesI s L m E tnmble]Onms or Insignia; Illegal &anu- 76. Escaped Federal Prisoner: Escape andfocture, Use, Possession, or Eale of Rescue: Probation Violator; ParoletEmtle-s and Insignia: Illegal Manu- Violator; Mandatory Releae Vloiatorfacture, Possession, or Wearing of 77. Applicants (Special Inquiry, Depart-Civil Defense Insignia Miscellaneous, mental and Other Oovernment Agen-cO~ lrFPorging or Using Pered Certlificate of cles. except these having special clay-Discharge from Military or Naval enrv- siicatons)_uovor s _Wm _ iO I ice: Miscellaneous, Falsely Making or 78. Illegal Use of Governlment Transpo!,i-Forging Naval. Military, or Oficil tion RequestsPasr; Miscellaneous. Forging or Coun- 79. Missing Personsterfrting Seal of Department or 80. Laboratory Research MattersAgency of the United States; Miuse I. GSold H oarding (obsolete)of the Great Stal or the United States 82 War Risk Insurance (National S.uivi.eor of the Seals of the President or Life Insurance) (obsolete)-l fibations Msod the Vie President of the Unitled gs. Court of ClaimsIn Its basic filing system. They pertain States;: UnAuthohised Use of "Johnny 84. BReconstructlon Finance Corporationprimarily to Federal violations over "Orison" Symbol; Unauthorised Use Act (obsolete)which the FBI huas investigative Jurladic- of "Smokey Bear" Symbol i. Home Owner Loan Corporation (ubst,-vton. However, included In the 131 da- ~4 Civil Rights; Civil Rights, Election l tetsctiaHons are peronndel, applicant, and Laws. Clvil Rights, Election Laws, 6,. Flerul Lending and Insurance Agenciess..ifctstirve mp tberse to falitat tand Voting Righte Act, 1965 87. Interstate Transportation of ftto!l.tiveII matters to facilitate the 4. rime on the High Be (Includme stow- Propervy (Fraud by Wire. Radio. or&wvays 03 1ee Tw· oR bfats and aircraft) Television)tions mae a follows (the word "obsolete" F. raud Against the Government; Anti- 8. Unlawful Plight to Avoid Prosecution.following the name of the clasifidcetion Kickback statute: Dependent Asaist- Custody, or Confinement: UnllawuvIndicated that documer a we no longer ance Act orf 1950; ase Claimsn. Civil; Flight to Avoid Giving Testimonybeing filed under tIhi leeadlng: Pederal.Ald Road Act; Lead and Zinc 89. Assaulting or Killing a Federal Osicer:Act: Publc Works anf, Economic De- Congressional Assassination StatueCLMsymcS2obwa velopment Act of lgtR; Renegotiation 90. Irregularitica In Federal Penal Instil t-1. Training Schools: NtUols Acade5y Act. Criminal; Renegotiation Act, tonsMattes; I Natiohal Acade ~y p CivilU; Trade panalon Aot o Il,; 91. Bank Burglary; Bank Larceny: Blnktter pl Naoaantsl Unemployment Compenatlon Stat- Robbery

2. Neutrality tta. utes; Economic Opportunity Act 92, Antl-Racketeering: A.R., Lea tet; AR.3. Overthrow or Desltruction o the Iom- d inpersonation Interference with Government Corn-. Overthrow or Detruction of the O- 4S. Postal Violation (Except MaUl raud) 'unicationA System; A.R., Hobbs ACtN ational 49. National Bankruptcy Act 93. Aceert ining Financial Ability4. Na tiona l r te m re Arm: Control A 0. Involuntary Servitude and Slavery 94. search Mattersstac Act; Statleul PoFr Contrn or A 51. Jury Panel Inveetigations 95. Laboratory Cases (Examlnaiton or Evi-astance Act; Unlawful Possesieon or 8. Theft. Robbery. oembealement, llgal dence in Other than Bureau Cases)Receipt of Firearms 1Posselon or Destruction of Govern- 96. Alien AP.licant (obsolete)5. Income Tax. Iment Property 97. Reglstratlo.l Act0. Interstate Transportation of Strike- 53. Exce Profits on Wool (obsolete) se. Sabotagebreakers 54. Customs Laws and Smuggling 99. Plant Survey (obsolete)7. Kidnaping 65. Counterfeiting 100. Subversive Matter (ILdlviduals; I :-9. Migratory Bird Act 80. Election Laws nal Security (Organizatlon)9 Extortion 57. War Labor Disputes Act (obsolete) 101. Hatch Act (obsoletei10. Red Cosm Act as. Bribery: Conflict of Interest 1p2. Voorhis Act1.2 Tax (Other than Income) 59. World War Adjusted Compensation Act :03. Intvrstate Tranlsportatlon of Stolen Cat-13. MNarcoteiacs Nto(obsolete) tie1S. Miscellaneous National Defense Act: 0. Anti-Trust 104. Servicemen's Dependents Allowance ActProstitution; Selling Whiskey Within C1. Treason or Misprison of Treason of 1942 (obsolete)Army Camps (obsolete) 62. Miscellaneous-Including Adminlstra- 10S. Internal Security (Nationalistic Tend-~~14. 8ed"I~iotivote Inquiry (formerly Misconduct In ency. Foreign Intelligence) (Individo-18. Theftfrom Interstate Shipment Office) a&Is and Organizations, by country)16. Violation Federal Injunction (obsolete) 63, Miscellaneous. Non-Subversive, includ- 106. Allen Enemy Control; Escaped Prlsones17. Veterans Administration bMatters ing: Black Market In Rallroad Tickets of War and Intern es (obsolete)18. May Act (obsolete); Civil Aeronautics Act (ob- 107 Denaturalization Proceedings (obsoletel19. Censorship Matters (obsolete) solete); Eight-Hour-Day Law: Federal 1( reign Travel Co20. Federal Grain Standards Act (obsolete) Judlciary Inveatatio Federal Ju- Foregn T Contr o lete21. Food and Drugs venile Delinquency Act: Kickback 109. Foreign Political Matters22. National Motor Vehicle Tramc Act (ob- Racket Act: Lands Division Matter 110. Foreign Economic Matterssolete) (Condemnation Proceedings); Misoel- Ill..Foreign cclal Conditions23. Prohibition laneous-Clvil Stit: Miscellaneus. 112. Foreign Fund24, Profiteering (obsolete) 0P.A. Violation (Civll) (obsolete); 113 Fo25. Selective Service Act; Selective Training Mlscellaneouas- Wage and Hour Law 3 Foreign Military d Nval Mattersand Service Act (Fair Labor Standards Act of 1938); 114. Allcl Property Custorian Matter (otio-26. Interstate Transportation 'f dtolen Mo- soldlers and Sailors Civil Relief Act lete)tor Vehicle; Interstate Transportation ul 1940; Tariff Act of 1930; Top Hood- 115 Bond Default; Bail Jumperof Stolen Aircraft lurn Coverage; Unreported Intrstate 116. Atomic Energy Act, Applicant; Atomic27. Patent Matter Shipment of Cigarettes; Federal Ciga- Energy Ac:t. Employee2£. Copyright Matter rette Labeling and Advertisling Act 117. Atomc Energy Act Criminal29. Bahk Fraud and mbeszzlement 64. voreign Misreelaneous 118. Applicant, Central Intelligence Agncy30. Interstate Quarantine Laws (oosoletel Eponge App Celtr ntlgene 31. WhiteSlave Traalc Aei gg,.'ncy31. White Slave Trsffic Ac. (6. Administrative Matters (obsolete)32. Identification (Fingerprint Matters) 67. Personnel Matters 119. Federal Regulatlns of Lobbying Adt33. Uniform Crime Reporting 68. Alaskan Matters (obsolete) 120. Federal Tort Claims Act34. Violation of Lacy Act (obsolete) 69. Contempt of Court 121, Loyalty of Government Employees (ob-38. Civil Service 70. Crime on Ildian Reservation; Inducing solete)39e Mail Fraud Conveyance of Indian Trust Land; 122. Labor Maniagement Relations Act. 194737. False Claims Against the Goveenment Crime on Government Reservation; 123. Special Inquiry. State Department.(obsolete) Embezzlement or Theft of Indian Voice of America (U.S. Informatirn38. Application for Pardon to Restor, Citvi Property Center Pblic Law 402. 0th Con-Rlghte fobeolete) 71 BB~sofL~dtng~ctCenter) IPubllc Law 40a, 80th Con-

Rights (obsolete) 71. Bills of Lading Act gre..)

IORAL IoIST11s, VOL. 42, NO. 100-TUESDAY, MAY 24, 1977

31

APPENDIX II APPENDIX II

26480 NOTICESZ~4. !lueopemn teRcovery Program (Interns- 165. CrlmAehbordAircrant~44 Ituropen Recovery Program (Interne- 184. Crime Aboard Aircraft of Information contained in the Centraltlonal Cooperation Admilnistrat!on), 165. Interstate Transmiaaion o f Waerin ors te Te e dupciveformerly Foreign Operations Admials- Information Records yste. These licativetration, Economic Cooperation Ad- 166. Interstate Transportation In Aid ot records fall intothe following categories:nr.lnistration or ER.P.. Eropean Re- Hicketerlng (1 ) Li tings of individuals used to as-covery Program; A.I D., Agency for 167. Destruction of Interstate Property sist in the location and apprehension ofInternational Development (obsolete) 168. Interstate TrImlportation of Wagering individuals for whom legal process is125. Railway Labor Act; Railway Labor Act. Iaraphernall outstanding (fugitives):Employer's Liability Act 189. Hydraulic Brake Fluid Act (obsolete) Istngs of ndividuals used n th126. NatiJnal Security Resources Board, Spe- 170. Extremist Informants2 stings of ndividuals used n thcial Inquiry (obsolete) 171. Motor Vehicles Seat Belt Act (obsolet)e identification of Particular offenders in127. Sensitive Positions in the United States 173. Sports Brlbery cases where the FPI has Jurisdcctlon.Government, lubllc law 266 (obso- 173. Public Accommodations, Civil Rights These listings include various photo-lete) Act of 1964 graph albums and background data con-128. International Development Program Public Facilities, Civil Rights Act of cerning persons who have been formerly(Foreig; Operations Adminlstration) 1964 charged with a particular crime and who129. Evacuation Clrlma (obsolete) Public Education, Civil Rights Act of may be suspect In similar criminal ac-130. Special Inquiry, Armed Forces Seelrity 184 tivitie and hographs of ndividualsAct (obsolete) Employment, Civil Rights .. ct of 1964 who are unknown but suspected of in-131. Admiralty Matter 174. Explosives and Incendlary Devices;132. Special Inlqilry, Office of De;eluse do- Bomb Threats (Formerly. Bombing volvemelit In a particular criminal ac-aolization (obsolete) iMatters; Bombing Matters, Threat.) tivity, for example, bank surveillance· Nations' Science Foundatlo'. Act, Ap- 175. Assaulting the Prelident (or Vice Presli. 'htollraphs;plicanl (ohsolete oaent) of the United States (3o Listings of individuals as part of134. Security Informants 176. Anti-riot Laws an overall criminal intelligence effort by145. PROSAB (Protecollon of Strategic Air 177. D!scrimination in Housing an overall crminal intelligence eort byCommand Bases of U.S.A. Air Force) '78. Inlerstate Ob.,cene or Harabssing Tic- thb F ll. This would Iiclude photograph138. American Legion Contact (obsolete) hone Call lbums lists of Individals known to be137. CrLminal Informalts 179. Extortlonate Credit Trasliactlun involved in criminal activity, Including138, Loyalty of Employees of the United Na- 180. Desecration of the Flmas theft from interstate shipment. inter-tions and Other Public International 18'. Consumer Credit Protection Act state transportation of stolen property.Organizations 182, Illegal Oambling Businesa: Illegal Gam- and individuals Il the upper echelon of39. Interception of Communications (For- bling Business, Obstruction: Illegal o-ganioed crime:merly. Unauthorized Publicatlon or Gambling Business. Forfeiture ;4) Li

Use of C overunications) 183. Racketeer. Influenced and Corrupt Or- ti ings o individuals In Conr-140. Security of Governmea t Employees anztos tion with the FBI's mandate to carr' outS.O.E., Fraud Against the Govern- 184. Pole Killings Presidential directives on January 8,bent 18~. Polce Killings141. False Entries in Records of Interstate 185. Protection of Foreign Officials and OfR- 1943. July 24, '950. December 15. 195'i.Carriers clal Onlleta of the United States and Fbruarly 18. 1976. which designatedC142 Illegal Us Or Rallroad Pasc 186. Real Estate S-ttlement '.-cedures Act the FBI to carry out investigative work142. Illegal Use syof Railroad Po5 of 1974 in matters relating to espionage, sabo-

revices 187. Privacy Act orf 174, Criminal tage, and foreign counterintelligente144. Interstate Transportation of Lottery 188. Crime Resistance These listings may include photographTicke':s 189 Equal Credit Opporturity Art alblms and other listings containin)l145. Interstate Transportation of Obsc-ne 190. Freedom of Information*Privacy Acts biographic data regarding indivicduls.Matter: Droadeasting Obscene Lan- 191. False Identity Matter This would include lists of identified andguage146. Interstate Transportation of Prison- Files ket n I Fel Oces suspected oregn intelligence agents andMade Goods informant147, Federal Housing Administration Mat- -nt conta (51S Special indices duplicative of theter, in a lnxc central indices used to access the CelntrIal148. Interstate Transportation of Fireworks s ina Reclrds Svstem have been created frolm149, Destriction of Aircraft or Motor Vehicles Records System have been c reated fwt rol150. Harboring of Federal Fugitives, Stattti th was no rosec e ac n unrC time to ti;ne in conjunction with theo151, (Iteferral cases received from CSC under -e[.r- r cs. administratlon and investigation of Inn-P.L 298) Agency for International veloed du es atn e- jor cases This duplication and segre-Development: Atomic Energy Com- gation facilitates access to documentsmission (Cilil Service Commisslon ); prepared In connection with major casesNational Aeronautlcs and Space Ad- jurlsdic!ioln of the Bur Some of the information contained illministration: National Science Foun- the main files has also been extracteddation; Peace Corps: Action: a C, t n h orArms Control and Dsarmament U.S. and placed on coirr.uter to enable valn-

Agency; World llealth Organization; records and recois ous divisonom to retrieve InformationInternationa' Lab-or Organiz tionw | nmore rapidly by avoiding the need forUS1 . Information Agency files are k ept isi a manual search for information main-152. Switchblade Knife Act tained in the main files, For example.153, Automobile Information Disclosure Act tC i e]g] [] tamned In the main files. For example.14. Interstte Transportation of Unsafe ay operati on These records are lists of since investigation of major frauds re-Refrigerators -iua-which contain certain bio-155. National Aelonautics and tSpace Act of grphice data inludig physical descrip- quires th' Agent to collect and organize1950 tion and photograph. They may -lso con- massive vr umes of evidence and other156. WrIfare anad Pension Plans Disclosure taln information coneerniing act!;ites o1 investigative information, the FBI isAct the individual as reported to FBIHQ by using computers to do this in a more157. Extremist Matters; Civ. Unrest the various field offices, The establish- accurat e and expeditious maimer. Addi-158. Labor-Minagement Rei.rtlng and Dis-closure Act or 1en (Securig tynd Dat- ment of these lists s necessioated by the ta.l y Agents occasionally seize vi-ter) AobSolete) needs of the Divisions to have immediate159. Lator-Mansgement Leporting and Dis- access to pertinent information duplica- dence In computerized form and FBIclosure Act of 1959 (Investigative tive of data found in the Central Records computers ire used to organize and sortMatter) without the delay caused by a time- the nformnnatlon in preparation for trial.180. Federal Train Wreck Statute consuming manual search of central A o t nf161. Special Inquiries for White House, Con- Indices. The manner of segregating these WL s matters Wa l Adgresslonal Committee and Other Gov- individuals varies depending on the par-ermnet Agencies ticular needs of the FBI Division. The u162. Intetate Gambling Activities information pertaining to individuals .soa{n5m ietYiJvIi153. Forsen Police Cooperation who are a part of the list is derivative rn Doc 77-14544 Filed 5-23-7;8:45 am I

RKL& EGOISmTEiR, VOL. 42, NO. IOO-lUESDAY, MAY 24, 19/7

32

APPENDIX III APPENDIX III

INVESTIGATIVE INDEXES

FBI HEADQUARTERS (note a)

Title Description and use Status

Indexes retrievablethrough the centralrecords system:

Administrative Consists of cards with Inactiveindex (ADEX) descriptive data on indi-

viduals who were subjectto investigation in anational emergency becausethey were believed to con-stitute a potential oractual threat to the inter-nal security of the UnitedStates. When ADEX wasstarted in 1971, it was madeup of people who were for-merly on the security index,reserve index, or agitatorindex. Maintained in twoseparate locations in FBIheadquarters, ADEX was dis-continced in January 1976.The computer section of theFBI has in storage on com-puter tape all the individ-uals who were on ADEX whenit was discontinued.

Background Consists of cards on persons Activeinvestigation who have been the subject ofindex--Depart- a full field investigationment of Jus- in connection with their con-tice sideration for employment in

sensitive positions with theDepartment of Justice, suchas a U.S. attorney, Federaljudge, or high leveldepartmental official.

a/Does not include ten classified indexes.

33

APPENDIX III APPENDIX III

Title Description and use Status

Background Consists of cards on per- Activeinvestigation sons who have been theindex--White subject of a full fieldHouse, other investigation in cn inec-executive tion with their consid-agencies, and eration for employmentthe Congress in sensitive positions

with the White House,executive agencies (otherthan the Department ofJustice), and the Congress.

Bank robbery Consists of photographs of Activenote file notes used in bank robber-

ies in which the suspecthas been identified. Thisindex is used to help solverobberies in which the sus-pect has not been identi-fied, btut a note was left.The note is compared withthe index to try to matchthe sentence structure andhandwriting for the purposeof identifying possiblesuspects.

Car ring theft Contains cards on individ- Activeworking index uals involved in car ring

theft cases on which theFBI laboratory is doingexamination work.

4

APPENDIX III APPENDIX III

Title Descrietion and use Status

Check circular Consists of fliers filed Activefile numerically in a control

file on fugitives who arenotorious fraudulent checkpassers and who areengaged in a continuingoperation of passingchecks. The fliers includethe subject's name, photo,a summary of the subject'smethod of operation, andother identifying data.They are used to alertother FBI field offices andbusiness establishmentsthat may be the victims ofbad checks.

Computerized Consists of a computer Inactivetelephone listing of telephone numbersnumber file (and subscribers' names and'CTNF) addresses) alleged to have

. telligence been used by extremists andrevolutionaries. These num-bers were matched with othertelephone numbers discoveredduring investigations to de-termine possible connectionswith known extremists andrevolutionaries. This infor-mation was gathered fromtelephone company tollrecords. The index wasdeveloped to facilitate FBIefforts to locate persons itclassified as extremists andrevolutionary. The FBI dis-continued using this com-puterized information in Feb-ruary 1975, but the computertapes of the following in-dividuals and organizationsare in storage: (1) AlFatah (an Arab terroristgroup), (2) Weatherman, (3)?w Left, and (4) Black and

ether ethnic extremists.

35

APPENDIX III APPENDIX III

Title Description and use Status

CTNF--organized Consists of computerized Activecrime and gam- listing of telephone num-bling bers (and subscribers'

names and addresses) usedby organized crime and gam-bling figI.Les. These num-bers are matched with tele-phone numbers obtainedthrough subpoena in subse-auent investigations, usuallyto determine possible connec-tions with organized crime andand gambling figures. Thenames and addresses of sub-scribers of telephones usedby known organized crime andgambling figures are retriev-able through this index.

Criminal Consists of cards con- Activeinformant taining identity and briefindex background information on

all active and inactive in-formants furnishing informa-tion in thd criminal area.

DEA class I Consists of a computer Activenarcotics listing of narcotic viola-violators tors--persons known to

manufacture, supply, or dis-tribute large quantities ofillicit drugs--with back-ground data. It is used bythe FBI when assisting DEA indisseminating intelligencedata concerning illicit drugtrafficking. (See p. 9 ofthis report.)

36

APPENDIX III APPENDIX III

Title Description and use Status

Evidence Consists of cards main- Activecontrol tained by the FBI labora-index tory containing the names

of suspects, subjects,victims, etc., in matterswhich are currently underexamination or have under-gone examination withinthe last 3 years. Theindex is used to facilitatemanaging evidence examina-tions.

Extremist Consists of cards with Inactiveinformant identity and backgroundindex data on all extremist

informants. It was usedas a reference to aid inthe supervision of theinformant program. Thisindex was discontinuedin Novmeber 1976.

Extremist photo Consists of photo and Inactivealbum descriptions of known extre-

mists, extremist fugitives,and some informants. All per-sons in th, key extremist pro-gram were included in this al-bum. Used for ready referenceand fugitive identification,this photo album was discon-tinued in January 1977.

False identi- Contains cards with the Activeties index names of deceased individuals

whose birth certificates havebeen obtained by other personsfor possible false identifica-tion uses and in connectionwith which the FBI laboratoryhas been requested to performexaminations.

37

APPENDIX III APPENDIX III

Title Description and use Status

FBI wanted Consists of cards on Activepersons persons being sought underindex Federal warrants covering

violations which fall underthe jurisdiction of the FBI.It is used as a readyreference to identify thosefugitives.

Foreign Consists of cards with Activecounter- identity and background dataintelligence on all active and inactive(FCI) asset operational and informationalindex assets in the foreign counter-

intelligence field. It isused as a reference aid ofthe FCI asset program.

Fugitive alert Consists of fliers, filed Inactivefile numerically in a control

file, on fugitives chargedwith crimes relating to kill-ing or attempting to kill alaw enforcement officer orbelieved to be a threat tothe safety of law enforce-ment personnel. The fliers,which include names, aliases,physical descriptions, andphotographs, are distributedto law enforcement agenciesby the FBI to alert them ofsuch persons. This programwas discontinued in June 1977,and the file is no longermaintained at headquarters.

Fugitive bank Consists of fliers on bank Activerobbers file robbery fugitives filed se-

quentially in a control file.FBI headquarters distributesto the field offices flierson bank robbers in a fugi-tive status for 15 or moredays to facilitate theirlocation.

38

APPENDIX III APPENDIX III

Title Description and use Status

Gambling case Consists of a listing of Activelisting persons under investiga-

tion for gambling on whichthe FBI laboratory has pro-vided assistance since1969.

Identification Consists of fliers filed Activeorder, fugi- numerically. Whein immediatetive flyer file leads have been exhausted in

fugitive investigations anda crime of considerablepublic interest has been com-mitted, the fliers are givenwide circulation among lawenforcement agencies through-out the United States andare posted in post offices.The fliers contain the fugi-tive's photograph, finger-prints, and descripticn.

Key activist Consists of photos and Inactiveprogram photo descriptive data on selectedalbum individuals advocating civil

disobedience and other unlaw-ful and disruptive acts. Itwas used to intensify theinvestigative effort on thosepersons. This index was dis-continued in February 1975.

Key extremist Contains a listing of selec- Inactiveprogram ted individuals who werelisting under investigation for ex-

tremist activities and onwhom investigation was to beintensified. Individuals in-cluded those who traveled ex-tensively and called forcivil disobedience and unlaw-ful or disruptive acts. Itwas used to intensify theinvestigative effort on thosepersons. This index was dis-continued in Vebruary 1975.

39

APPENDIX III APPENDIX III

Title Description and use Status

Kidnapping book Consists of data, filed Activechronologically, on kid-nappings that have occurredsince the early 1950s. Thevictims' names and the sus-pects' names, if known,would be listed with a briefdescription of the circum-stances surrounding the kid-napping. The file is usedas a reference aid inmatching up prior methods ofoperation in unsolved kid-napping cases.

La Cosa Nostra Contains cards on individ- Active(LCN) member- uals having been identifiedship index as members of the LCN.

The cards contain personaldata and pictures. Theindex is used solely by FBIagents for assistance ininvestigating organized crimematters.

Leased line Contains cards on individ- Activeletter request uals and organizations whoindex are or have been the subject

of a national security elec-tronic surveillance in whicha leased line letter wasnecessary. It is used as anadministrative and statisti-cal aid.

Mailed cover Consists of cards containing Inactiveindex a record of all mail covers

conducted on individuals andgroups since about January1973. It was used for refer-ence in preparing mail coverrequests. This index wasdiscontinued in 1975.

40

APPENDIX III APPENDIX III

Title Description and use Status

Military deser- Consists of cards contain- Activeter index ing the names of all mili-tary deserters the variousmilitary branches haverequested FBI assistance inlocating. It is used as anadministrative aid.

National bank Consists of fliers on bank Activerobbery album robbery suspects filed

sequentially in a controlfile. When an identifiablebank camera photograph isavailable and the case hasbeen under investigation for30 days without identifyingthe subject, FBI headquarterssends a flier to the fieldoffices to help identify thesubject.

National fraudu- Contains photographs of the Activelent check signatures on stolen andfile counterfeit checks. It is

filed alphabetically, butthere is no way of knowingif the names are real orfictitious. The inde) isused to help solve st)lencheck cases by matchingchecks obtained in suchcases against the index toidentify a possible suspect.

National securi- Contains cards on individ- Activety electronic uals and organizations onsurveillance whom a national securitycard file electronic surveillance(requested) has been requested. It is

used as an administrativeand statistical aid.

41

APPENDIX III APPENDIX III

Title Description and use Status

National securi- Contains cards on individ- Activety electronic uals and organizations onsurveillance whom a national securitycard file electronic surveillance has

(instituted) been instituted. It is usedas an administrative andstatistical aid.

Night deposi- Contains cards with the Activetory trap names of persons who haveindex been involved in the theft

of deposits made in banknight depository boxes.Since these thefts haveinvolved various methods,the FBI uses the index tosolve such cases bymatching up similar methodsto identify possible sus-pects.

Revolutionary Consists of photos and Active

Communist descriptions of individualsParty (RCP) who are leaders and activ-photo album ists in the RCP, formerly

the Revolutionary Union.The FBI has identified theRCP to be a Marxist-Leninist-Maoist revolutionary organi-zation, which calls for aviolent revolution in theUnited States. This index isused as an investigative aid.

Revolutionary See description and use for InactiveUnion (RU) RCP album. This album wasphoto album discontinued after the RU

changed its name and anupdated photo album wascreated titled RCP.

42

APPENDIX III APPENDIX III

Title Description and use Status

Security of Contains cards on persons ActiveGovernment whom the FBI, for securityemployees or loyalty purposes, hasindex investigated under Execu-

tive Orders 9835 and 10450.The index is used to facili-tate the location of thesubject's file.

Security infor- Consists of cards contain- Activemant index ing identity and brief

background information onall active and inactiveinformants furnishing in-formation in the criminalarea.

Selective Ser- Contains cards on individ- Activevice violators uals being sought on theindex basis of Federal warrants

for violation of theSelective Service Act.

Skyjack fugitive Contains photographs with Activealbum descriptive data of fugi-

tives wanted for skyjacking.It is used as a referenceaid in cases where thefugitive may reenter theUnited States.

Symbionese Contains cards with mixed InactiveLiberation subject entries, such asArmy (SLA) individuals, weapons, andindex vehicles, thought to have a

connection with the SLA. Itwas used to tabulate andretrieve data relating to SLAactivities. The FBI has in-dicated this index wi!l bedestroyed when the JusticeDepartment gives it permis-sion to destroy intelligence-related documents.

4-

APPENDIX III APPENDIX III

Title Description and use Status

Toll record Contains cards on individ- Activerequest uals and organizations onindex whom toll records have been

obtained in nationalsecurity-related cases andwith respect to which FBIheadquarters had to preparea request letter. It isused primarily to facili-tate the handling of repeatrequests on individualslisted.

Top echelon Consists of cards contain- Activecriminal ing identity and brief back-informant ground information on indi-program viduals who are either fur-(TECIP) nishing high level informa-index tion in the organized crime

area or are under develop-ment to furnish such informa-tion. The index is usedprimarily to evaluate, cor-roborate, nd coordintc¢informant information and todevelop prosecutive dataagainst racket figures underFederal, State, and localstatutes.

Top ten pro- Consists of fliers, filed Activegram file numerically in a control

file, on fugitives consid-ered by the FBI to be oneof the 10 most wanted.Including a fugitive on thetop 10 usually assuresgreater national newscoverage as well asnationwide circulation ofthe flier.

44

APPENDIX III APPENDIX III

Title Description and use Status

Wanted fliers Consists of fliers, filed Activefile numerically in a control

file, on badly wanted fugi-tives whose apprehension maybe facilitated by immediatenationwide circulation of aflier. The flier containsthe names, photographs,aliases, previous convic-tions, and caution notices.

Weatherman Consists of photos and Activephoto album descriptions of individuals

associated with Weathermanactivities for use as areference aid in Weathermaninvestigations.

Witness protec- Contains cards on individ- Activetion program uals who have been furnishedindex a new identity by the U.S.

Justice Department becauseof their testimony in orga-nized crime trials. It isused primarily t' notify theU.S. Marshals S rvii whe-iinformation rela,'d cJ tiisafety of a protected wit-ness comes to the FBI'sattention.

Indexes not fullyretrievable throughthe central recordssystem

Associates of Consists of a computer ActiveDEA class I listing of individualsnarcotics DEA has identified asviolators associates of class I

narcotics violators.(See p. 9 of thisreport.)

45

APPENDIX III APPENDIX III

Title Description and use Status

White House Contains cards on all poten- Activespecial tial White House appoin-index tees, staff members, guests,

and visitors referred to theFBI by the White House se-curity office for a recordscheck to identify any ad-verse or derogatory informa-tion. This index expeditessuch checks in the tighttime frame usually required.(See p. 10 of this report.)

Major ca3e Consists of computerized syn- Inactiveindex-- opses of information mostlyPatricia on persons related tc theHearst kid- investigation--subjects, sus-napping pects, friends, associates,

witnesses--and other key 0dsca,such as license plate numbers,telephone numbers, and physi-cal evidence. This informa-tion .s computerized tofacilitate the management andcoordination of large and com-plex investigations. Not allthe names included on the com-puter tape are consideredimportant enough to includein th£ general index and thus,are noc retrievable throughthe cent:-l records system.

Major case Same as above. Activeindex- -bombi-.g ofTWA passen-ger terminalat La Guar-dia Airport

Major case in- Same as above. Inactivedex--burg-lary of Demo-craticNational Head-quarters(Watergate)

46

APPENDIX III APPENDIX III

Title Description and use Status

Major case in- Same as above. Inactivedex--murderof FBIagents onPine RidgeIndian Re-servation

Major case in- Same as above. Activedex--Phoenixland fraud

Major case in- Same as above. Inactivedex--DonSegretticampaignlaw viola-tions, aspinoff ofthe Water-gate inves-tigation

Major case in- Same as above. Activedex--extor-tion bythreat ofbombing ot200 majorU.S. compan-ies by un-known sub-ject, someletter bombswere re-ceived

Major case in- Same as above. Activedex--inves-tigationinto possibleorganizedcrime in-fluence overwaterfrontbusinesses andunions in At-lantic andGulf ports

47

APPENDIX III APPENDIX III

Title Description and use Status

Major case in- Same as above. Activedex--investi-gation con-cerning anillegalgamblingbusiness

Major case in- Same as above. Inactivedtx--inves-tigationinto a seriesof bombingsin the westcoast area

Major case in- Same as above. Activedex--inves-tigation ofan individualunder theRacketeer In-fluence andCorrupt Or-ganizations(RICO)Statute

Major case in- Same as above. Inactivedex--inves-tigation ofan individualunder theRacketeerInfluence andCorrupt Or-ganizationsStatute

48

APPENDIX III APPENDIX III

Title Description and use Status

Electronic sur- Consists of cards on individ- Activeveillance in- uals who have been thedices records subject of a microphonesystem or telephone surveillance

by the FBI from 1960 topresent. This includesindividuals who were the(1) targets of directsurveillance, (2) partic-ipants in monitored con-versations, and (3) owners,lessors, or licensors ofthe premises on which theFBI has conducted an elec-tronic surveillance. Inaddition to the persons'names, the card would con-tain the date the voicewas monitored, a sourcenumber to identify theindividual on whom thesurveillance was installed,and the location of thefield office which con-ducted the monitoring.It also includes personswho were mentioned from1960 to 1969. The highlypublicized 17 White Housewiretaps were initiallylisted separately on thespecial cove.-qe indexuntil th? summer cf 1976when they were merged intothe ELSUR index. The ELSURindex is used to respond toinquiries by the Departmentof Justice anJ to preparetitle III affidavits. (Seep. 6.)

49

APPENDIX III APPENDIX III

Title Description and use Status

Indexes retriev-able throughthe Identifi-cation Divi-sion recordssystem

Criminal Consists of cards, filed by Activefingerprint fingerprint classifi&di;-ncard file on all individuals whose

fingerprints have been sub-mitted to the FBI as a re-sult of arrest or incar-ceration by Federal, State,or local law enforcementagencies.

Criminal Consists of index cards filed Activefingerprint alphabetically on each in-card index dividual who has a criminal

fingerprint card at the FBIas a result of arrest .,r in-carceration by Federal,State, or local law enforce-ment agencies. These ca.rdscontain a number which refersto records on individualscalled rap sheets, which arecompilations of arrests andrelated data submitted to theFBI by Federal, State, andlocal law enforcement agen-cies.

Civil finger- Consists of cards, filed by Activeprint card fingerprint classfication,file on all individuals whose

fingerprints have been sub-mitted to the FBI as a re-sult of (1) Federal employ-ment application, (2) mili-tary service, (3) alienregistration or naturaliza-tion, and (4) desire tohave their fingerprintsplaced on file.

50

APPENDIX III APPENDIX III

Title Description and use Status

Civil finger- Consists of index cards filed Activeprint card alphabetically on individualsindex who (1) have civil fingerprint

cards at the FBI as a resultof Federal employment applica-tion, military service, cralien registration and na-turalization and (2) desireto have their fingerprintsplaced on record with the FBIfor personal identificationpurposes.

Single Contains fingerprint cards on Activefingerprint individuals with the capa-card file bility to commit, or who

are known to have committed,the following types ofcrimes--bank robbery, bankburglary, major thefts, in-terstate transportation ofobscene material, bombings,extortion, professionalfraudulent check passing,white extremists, hijacking,and kidnapping. This indexis searched when latentprints are available in cor-responding crimes. A searchof all criminal fingerprintsmaintained could not be donebecause of the volume ofcriminal fingerprint cards.

Idertifica- Consists of cards with finger- Activetion prints and an alphabeticalorder, listing of those FBI fugi-fugitive tives on whom identificationflyer file orders have been issued. It

is used for any immediatecomparison desired with thefingerprints of any one ofthese fugitives. (See descrip-tion for identification order,fugitive fliers file on p. 39of this appendix.)

51

APPENDIX III APPENDIX III

Title Description and use Status

Missing per- Consists of cards containing Activesons index the names of and other data on

missing persons. The index isused to help locate missingpersons at the request of aninterested relative and localand Federal law enforcementagencies and to facilitate thehandling of requests from theWhite House and the Congressfor assistance in missing per-son matters.

General ap- Consists of index cards filed Activepearance numerically and containing aindex photograph and physical

description of individuals whohave committed or who arecapable of committing any typeof swindle or confidence game.One section of this card fileis devoted to individuals whoare in the major theft sectionof the single fingerprint file.The index is used for the pur-pose of identifying subjects ofconfidence games by means ofdescriptions made available bythe victim or other witnesses.

52

APPENDIX III APPENDIX III

Title Description and use Status

Indexes retriev-able throughthe NationalCrime Informa-tion Center(NCIC) recordssystem

NCIC criminal Consistc of computerized infor- Activehistory mation on individuals who harefile been convicted of significant

violations of Federal, State,or local law. Data stored inthe computer includes personalidentification data as well aspublic record data concerningeach of the individual's majorsteps through the criminal jus-tice process. This informationis used by criminal justiceagencies in the discharge oftheir officia2 mandated respon-sibilities.

NCIC missing Consists of computerized infor- Activepersons mation on any person who is (1)file missing and because of proven

physical/mental disability issubject to personal and im-mediate danger, (2) missing un-der circumstances indicatingthat the disappearance was notvoluntary, (3) accompanied byanother person under circum-stances indicating that his orher physical safety is in dan-ger, and (4) declared unemanci-pated as defined by the laws ofthe State of residence and doesnot meet any of the other entrycriteria. This information isused by law enforcement agen-cies to locate persons who arereported as missing.

53

APPENDIX III APPENDIX III

Title Description and use Status

NCIC wanted Consists of computerized in- Activepersons formation on individuals whofile have committed, or have been

identified with, an offensewhich is classified as afelony or serious misdemeanorunder the existing penalstatutes of the law enforcementjurisdiction originating theentry. Probation and paroleviolators meeting this criteriaare also included as are in-dividuals for whom Federal war-rants are outstanding. Thisinformation is used by lawenforcement agencies to locatefugitives.

54

APPENDIX IV APPENDIX IV

O )0 CN · X EI

w aw

"r4 000

o C U

.4 C '4 .-4 l4

o 4 l as> o -oC: W 4 L)

w-4 *'-44 -"4

rz Z 0) m

00>

4i 4 >

((D

_(aa u (a 4.

-X 0

z . 3 '- aU E :-4 ED ,-4 4C->0 C: C In EC >

O aI a ·- 4 C c; O-O a'' - ·-

W> H4 4J 4o n m 4J " -e4 3: ( a-( a E- 4 o , o a) ,-

I' 0C '0 C' -: 4

44 -4 O4 Or -- Uq1 -- o c (a tn 404: 0.Ca -I 4J-r ._, .J ' n o .( OC ' c c 'a a

> t, 14, 4J ~n 41 r H 3 4 3 C 4E O - -4

I-I I-I "-I *H I- X >. *4I-~~4H 0 X4 o1 44HIZ~ Q4 ~, O} 4 EJ C: * C: t ( U l M Oa(

i> La 4.x XO a t) x 0 U 0n IV aC : CJ 0 ZEn O E-'C 3H E -n '- 44 U -4 - (CS 0 42

't o U1 C '" -' ,w 4:i3 -

0~ 0 04a- C c uC w f l * 'U e

a- Q. - - ~ , C> 4 4> nO r-0 4.. c: a 00o c C tuO O o.V] a Ez · uz a EI 'U ( 1) a n < a L

ro ., Oa

(a < o wa w) 3 r ( araa

v ) r- a4 4 ^ O : M C wN

, .-- 0) X t( 't) 4t ~ N X4 a · a- -· U4O ,-- E- aq 4 4-U,-4

·(L) rz . En >Q, ).. C t.: ~ 0 x~'O 0 4:

x c: 0 r: : aE LIa :), O aI

0 55a

55

APPENDIX IV APPENDIX IV

U) r--

ro-4 x4

o C.,L

U)

a c) ac

4-i >j >) ·C o C

ci) . O -

Ei Z 4aE ,

Z

o 4-J -Q *a4C 4J -4j: QU C 4

C a C LU) O E o 0 W1M (aC c *a(a O * 4- -.COc > 4) ' Qc ci a4 cc: H ,) t O CU -,4 a - U· u -, - O0 ---

,M . 4J a 0 to uc0 a) ,- (a >' a) 4 w-- O O.C0 .J .. x a. c t" c a- C C EU} : >O EU .- 4): Oo U) 3 o E- a >Q -a o n 4 ma u * r- -D

4 r) L Q ) 4J S0. O Q0 U ' C Q 4-C ( A

a O4 u· v uu c -o Eo O:*e o o c Co

. *a v-. a- (a a) CC 4a C 4 4 Q 4 ' OrU c t% c- D '4 U~ 0O :0 o -. 1 * M > ,- 4,ta 0 k Ex C 0 t4n 4J U) V 0r- 0: ·o E 0>U) 4- 3t /OUaJ CCU U) U- -. C .C c . U)" C.E 4o,- c O 0

) ) - U --.I Q4 cC) -O . = -D (V C Q (a 0 En O u 0v Hi)WL > C O) O)>UI..C C-ia aO la

3 >3

*0(a-/0 LO Q ( UO) >U( WH *W 4W 1 C WC V4Cl Q ~ . C O C ¢ 0 a n C ~ x

U4 -- WU 4,4 EC .. D- Q- ) U4. QQ . Sn O0 . e *.d ·- O

XS~~~~~~ h~~~~~>1

M 4

YH 3~ Y ·5e Cc ,- CC-'4

m

56

APPENDIX IV APPENDIX IV

,U) -4'4.U) X ·

".4

..oF ~ ., o 0

.'4 4 -"

- 0 0 0 0... 0 4

-.1-4 - ) 03 0' r : M- . m 03 (a

Z 0: 0 0

Z

3 ) 4) iP(

4U( 0 0 (

,- . )H . 4

' .. 4U-J r_-4 . - U) . ,

tU4O) X UXC E

_1 0 V E H @ a a W H 0 * a C V C- V O 40 Q a 0 C W O C U-

U) w -o t40o 0 Y a - C Lj 4 * S 0 W- O L( C.- 4 a> o - o a) -0 " -4 -H i -0 W c t 3 _I «Y C: Q to Ce C . w O: g 4 0P Ae O J W

O 4 C 10 ) tq *'1 C 0 3 OW 4 > r- U W >

o W v ) -- .0 t C 0 ( E. -e o 4 c -4 0 m a- 0( _ 0 - O 4 E - O (l. 4 J 04 O -E

O U 0 ev ( O -v e n -J 0 ( U 3 ^0 U) oU 4-v V EUU) .C4-4W 0 * .o o o o4

o .4 (U vr- E O 1-. c: wt o) .U3 0 U) * S 4 .

U U) e-J 4 0 Q a Q a4 O OW a4 X J J

., O Ua 43 --I 0 ) 0 o o - O n 4

a e , 0 e 4 e V C V S *9 a P4 C O U )

U) 0 4 -aO Q x c >1 3

' -4 a o a v c r a c v E Q n u * v

44 P 3 wY 4 -)o IVU Q). a 0 0 o U e s oa - · ~ aJ-V o A W r e

(U -4 -4

as cC v vaoc

57

APPENDIX IV APPENDIX IV

uo -- r*,4 X o·W4 xJ

OC

._1-4 I >-4 -4 l *4

O.: o o o44 -

E Za

Z

U) >U .-4W

4 4 > :>( ' U U4

ua u-H F5

a '" I 14VUC ; -H >U *a 0

I IV 4 v C.- .P > 4 Cv O " a(y O , r,· C . > a U)O >- I v) 4. C E S

a) U 4, .i 0 )) O > -M i C U> s 4 C oc c W w 4 4JU) c n a r ' C E a O a *H W C O *V4 a(,0 ' *HH

~ 2 -' C0 --H 0-"- "4 T- . -4- O 4 -O ) o 3 a) >~ c > on, :~ 3 3 E C 4t cC :

OV 0 >1 -4 , 0 4-4 O 0 ' ' O'-4 P W 4 .-c C: c c 4J 4 1. : > -I s > a o) c a w) 0 w Q, (1D 0 JJcTo co O - c. *- 3 ° * 4 :J u a o-- 0 -4 u o4 S tD U m

.·4 . O' U .V C w4-4 (C C C J (. a. 0o o > C : U)C tU) 4 -) 4J4 W -4 *-f 94 U -t _4 * U) =1 ' 0 4J J a)*-I C

0O 0O --4 -- Q4 ( O V >1 4 .- U (U O)D 44 tJ C - 4-4 W4 O.-4 4 E W 3 4 w C O U CD < 4i r. 04 r ' a> C O 4 r-q I4 En -

o O 3 la rO 40 0 r- 0 '4 Wo 0o 4 C O OC 0)--4 (D ) O ) 4J04 = 0 o H 40 :>'-4 U) 0 C

'0- V 4*. 04 JJ r= V · c: > (0-4 44 a ) 4J 4V > -4. V-) O p O iU) 4 *r4 0 > P4 n 39 C

: C: > .-4 -4 EI -4 ) 04 a) (a -Q 0 44-4 4. O .C-4 0m] -4 3 _-4 C V O 0)t UC 04 > * · E U) 4. C O. - , 4-,J 4- .-.

U)07 D a W 0) 4 .o o - U)4 -4 0 4 0 > 07 0 4J c >') *-4 a) > U) -4 - U) Q: U) :: ) 0 4- 0 U). -4 a 0 LC:: 4-4-

4J Q,--f U 0 a. 3 a, E aU) 4 , - 4, E n U) V 4 ) C 04 ' 4W r >C O O M ED) 4-4 > C ( tD r 04 > > U r ) (a U t3 t O M P4 W °O Ll a a)D r4 (O - C 4J 0 0 m c X a w a, o a -H4 4i w4 4 w Gl QnU t7 a4 mf 3 0J * 4, Z L_ ) t tD CIT' *4 * a a n > (a J) l L( L4 w w

x EVO) I I Hr

nO (C~ iU I ) 4 -

(J --4.-4 ) w) u U) (0_4 =:> C > (

4') D 4J 0' ' '-4 - > - U 0).-4 r C 4a U) ^-4 E-4 O - 0- O 0 tO > a

u w4 A 4)-4 r -4 a) c,

m U4 Ei 04 Q0- (0VV i- W-4 0 (aa2 c a U

58

APPENDIX IV APPENDIX IV

%4 H

OC

r,

) *r4 .4aJ

.- x 04.4 U E4

-4( .

-4 .

*,

-.. II ' , .

Z C

· :-,4 0 0 0 0

,. ., .: U U

C4- (: - . :

0 U 4. U C C C:a) ,4¢ L4 H

0 "- ,4 , C--J

c' 0·D O C 3 - ·'O CD 0U · ~.4J > 0 0" :_ 0_ 5 0-

4.; 4-)

a e c E n o au > >r I JJ 3w"~ > - a - ac 0 O 0 S O S- -.'U -rlU C ) ' 0w C) w04 C0j a3 tO s o 0 c = c J 0 *,

o -a o D o --t 0 ' , -,4 0-,l*,I 0 4 ' C0 0w)C

C4 . ' S3 J. 0 *r4 r H 3 U UVo t a) E o ' E 4 E f 0). C C O

o ((w 0 -40 , -4 0 (a l X .- * O - r 0 -,-4 u) 20 -4 o.a- o -4 .- C C m U E .cC U0 c -Io44) O rU l-4 4, 43 Q -43 *, X a o : LU4 4 E

--4 0 0)4 (a -4 C O -4 ' C '0 .0 D O r'0Q -4 a)

PO . C 0 4 0'. 4J EM w CW)U 4J WCn (0 rc E

C E V a) a) Z w C0 ' C CO r -O P4 a) ma w 4 '4 a0)Wa) 0) .) U4-i .4-3 0'- a) 4 Ca r a CCo -E * o *w, c c c o a - srO0) m 0

1 > >1

C 04 4J - 4.a 0 (a 4C :1 prcr t-I ~ a, C

QJ N 4 zJ SC W Co

E-41 Cr _, :f = o 0a)C C -0 E U - C E s 4'U--, f E- 04-- E A--s: s o o

u u

!9)

APPENDIX IV APPENDIX IV

O C4-4 H

-C

4- to ,-S4 o0 4J :3 > o - o

Li .0)

LQ E 0 4-zE Z

4- > > >·( H - -H4C 4 4) 4.).,uu .4 . , uU) U o I

) : 1 4) 4 V -4

C )*4 0> r ) a)4 UC._,- "0 I (D

t0 s 4n > - W -1 t-

cn 0 tC wa.,A V-H- U r14-4 U) o ry)3 4c- c-0 C 4J V ,- . ) 00-HU} C * 44 0 > I 4 - .- M E {- I

0 0 3 O i O : 4- >-,4-:) 4.i O , - J o 4 ( C V0C 04 a4 cu - i Eto UO 44U) 4 S-i

- O -H- r- 0 > 0 V U -4 U) .- . - .0.- ,3 0 cO -- . .t ISU

U OX U) 4L -H U En = 0 0 0U) EnH .IQ4 1 H04 a- j 0 4.)-H -J - C4O0 WV H ( ·a)P U)- a H -H U) -H u CQ ' C'~' C C. > : C> - a>Lv a a) U) u -r C a) W UV 3 o- _ a)o

Ura r-C~ T C . ~ a ~ C C ' ~ · ·c

c/~ o U O - JroO to to - U o i.~ 4

I 0)C ' O E I

a ) -H La E- E -

.) -HO oi~ U-I

N C: 0 H a U U C: _4

w L aL o CY ) E ) 960-,4 W aw a z ro r O U)- 3 iE ' - E , a) ra - L

E J c -'l (C Ca - CO Q

60

APPENDIX IV APPENDIX IV

a) a c

W.4 X

OC.,-4

'U

W4 C,-I >

0 4- 4-O

0 U)00 J44J U > O _I O

t> >U V'4 s-j 0H- O 0

00) c0 4 "

-4 E D0 C C * I

C > 2 40 Y t -H C -4

tV *r4-i Ur 4 tD -. a) ta)4 ° 4-: C r. U Et ': E 4 ) u 44 U U 4 a

:- r= E ' -a =- ; O O T ,-4J (a > (

C .4 - f 4 4. 0- -, X .(4) : a ·a U>

-5J wa C 0 wo _1 o C 4. ) m ] C 1· , W . O ~ -u.. -4 4 0 . 0 = r-, a) (a ATSe

0) U) C) >C C).C *> COC)> 0)0- U)W 0- 4-4 ;U) * -4 ;.- 1) 4 U-)>

o) ,--.") - C ) a ) - C *'4 .*

) U O U.,-4 "4 .4 _t - i 4 u .. H .4

"O) 0 0

o) 40 ,4 314- --> -4- ) tV ,i . yt 4t W t D r

Q) U) H U C U 4 *(a >1 U1U > 0

°) 'd 'm a) (a 4 C En - ( V1 '4 -4

C ( E - 0 ·v c > a

U : C C C

APPENDIX IV APPENDIX IV

oc

a

W4 >1 ~ .0

W4 .- I 4

C W- L -J*4 .4

( 0 4-'

3 u~~~~~

. ( a a o -40 0 (a a .

-Ua) U

-4 4.4 ()O -- 4. C4-) 4. ) 4 4 4 Uo CO 4JOW . W -C 4 O O X 'UO -- 4.

' · C 0 W -4 . C (V C, w

r a a U c ou * O o ac: U4 U

0 0J *- ) 4 M W4 rK 0 1 C - C4 > *- -J

.)] , -a) E C.&.4 O U1C 04.-4 WC 4J. CO -44

W LW ' Cj a 4 i C U 04W a) 0U ) V U

0 4 a ac 4S C co [.C *- U O X .C CO.C ·-

0 ) C- ' C M0- L- CO w4-O - 4 0S Q W C.QQ a)j r.a i Su aC 3 M V a

O U) uH - *-t UJ C -I C) 4 a C U)U) C )

En 4C 4.4 rC t 4 C: 0 4J, U) 4J 4 CJ C)-U ) *-1r E, la .; .4 V 1 4 U= -Q) t O 4*

Q w CQ ) s 4-) 4 . M C ) C - --U)

O r-V,> X ul 4-4 lD 44 I-J E I o O ,a 4J C

u C: aS G C a! C ro TS 4- U Li U al a

U u 04 M > 0-- C 0 44 -I. C ,-q U--4 0 c ) o

JT) 4r J r. C O (Oa M O 4 0 U1 4J V aUm --I

-a n O <) ·-t · r 3 4J F. · a J C t4Z aa3 ·cr a a 4Z EE e s C a) U E _t a. 4 UJ :v> -- T_ -:4JU3 3t : * --' (n (DI

C ' c U o) 0.: 3 o3.)"0 . .-' , "

4iC CO r. >

(0 t 4

6 2

O :3 C) 3

- O C O

62

APPENDIX IV APPENDIX IV

-x 0U ua

t a) E4-

.,4

O4 C

4 -,> -4

4J 4J 4 4J 4C

Li-9O,-4 4J.,

,-l !

a)! . t COu-' i, ·a 0 0 0 . :: :oVP 3 Cq W a 4J ro ( c-

no r, O-, -4 4J ~no r- --.- ¢ mq r- 4i

. E0. o'

Li

ZC w 'uV a (

O. > -t> , a - > -, .U . - - - 4 - ) . -.4 ' 4

4. 4 0 . - 44 o0 U' U U

OH U ) M 4 45 .r.4 4-.) ro ·: . tO >· OU C U ) 44

Ca) V I C UC

o a e C I O ,

0U) SC) 0 C N S 4 5 O O O c C 0 3 H. o O

5 4CZ4 ,- -4CS W 0 O'U 0aC 4,

· ~ O b~ -- 0 *H Q _I *r E a X Xa 3 rT) sv o > sa v e q av aH M ca a a a) v

r_ , 44" n E: > nt ! ,4 .. c E>

to r C W U C )0 -a Va 0 (a 44 rV 0 . 4 c 1 0UC 4 U 4 0C U CU C -4 4.C ~ CU

O. . C UOU). U 04 .E > .. a. U U) °-4u w6-4 n 3 f u lr 4 r 4J,4 rC > 4 J , 3 j ( 4 4.)

. 4-C *.4 P4 ')L4 *4 >i4 Q *4 0 %f X4 C E U)E40 0L 0 *rJ0 _ w 0 0XII *HrU 4.)Cf C Q J4 ..JJ n H. a 4U LV UC * C 0) U 0 c U V : Wu 1 0 tO O . 4 r. C -U) 0U 0 W 3 4a C

U) 0 L Ea *. 4i Q. - Q .4 , p4 0 04,4 V4 *H CJ C "r4 Li 0 a. L ) * L4a-4 -) °4 D CU 0 - LI C

0)C, a. c' c U . s r4l4 U 0 rU UC ;: U) a C U 0

U C-4 3 s:s E u4c. c w o Ur r) .4 c. .. 0 C n5) U)

u) u) U)

4. C X C X 0U() 0)

OC OC C- UI @L4 i4 r4 L 4) 4rt C > rn

U CU a a

63

APPENDIX IV APPENDIX IV

oa, R(a r-f0 (U CS

-lx 0ru av E-

*,0

O *,, *,l >

.,f -4

,-4

) .4 . ,-

01 0i ) 0)o 0

4i 4i VI- -444

-4 -1 "0-,- · a)> 0) >H4U 0E-4U

4 WE-' -4U 0e -4 . 4)44-44(

Cl) U) V *H *H4.4(U(UE L -4 *)Hj.) -40

J I 0) V 4-4 -4 U 4J j -4

UiC u UI

sv a)r q- - _I : -> . - > c(U0 >- . C:U 4.J ) V -i - 4- 4 C C-H

'aJ : : , U' T 4U. a1 LI) W· C.4 LO - "4 ) 4 C: "O - )

C c , l n-- ~ U (D.O O q:) O 4J - , ~ q r; S a 3J:: " >,

*( 4 a C rv u -E u -, Q 4 n-4 -4 U) -, >U

o o U U L0) a U)0OV a(U Qr-4 r- I .H 0) H~,-4

) r) '4O .f- U C . o 0 04-4 E4- r c 44 a) H j4.0 4 . c 44·.4 X , U) · O S S . U)( C 00 0u O ) t o.. .-4>.~ - ~-> 0 O-Q ·-', E'4 U) - tiq- 4 (D : > )' ~ C:-*a 4.) 3 :0 S Q ( ' ' 4 · 4 0> 1 · ( C - m

E - * - ~ aJ ~ , * .a, o , 04 . 0 O 0 0 0. (Daz =1 0 m u v , u rn P4 C - :0 C Q. U 4 3 -, _

(D ,c C C E ~ a 4 'D 0 .~ -t H )H · LJ C O · ) .~ 0,,

0. 4J r.P 4J-0

a0 ) a O * a r W C O 0( 3 Ur c: n o c a, 0 a : a

4.) E --

( " 4J , 4 J

E-'4 Wl 0)0 )u 0)a

64

APPENDIX 1V APPENDIX IV

,4x 0

w4-4 E-,

O C.,4

i4-4

0 4I) 3 >O o o oC LW a)

I '4 -,"

D Ej 0 4

Z3 w

(a >

3O *' O

-.4 -,4

i -W 4J- O i- 4 rJ

U) n0 - o o U *4.) a·l -4 -- UIC C J l

U 0- C- ) W j - i- ' I O 0) 40 c r

U) _-I-rmC: 4-lU U) * U1 * U) 0-- -- * )

D (a'O C) ,. " :3 i -. Q 0 ::V m > m n C - ( Vu - U

O C0.a O , - C 0 0 0 Co::4 t 0 o J

O c . c 0 0 -O 4, -4 >-4 -C 0-4 Cn -4 - u > --- 4 X4-

.04 440 0 .. * H 04 Q H 44W 0) o , - --,4 0 D 3J * r 4 H *i-1 H 4-) C Y U O

w I c) u c-i o E uo v 4 -

rn *4 > 44 E 3) -,4 tn--I 4.^ 4) 3 U (a e i a) r to c O a aCi WVu P C f aP4 )-4 a=)

r) 00) -1 -* 0) a0) En 0 c4 En )Wc o > i a) )0.. 0 a cu o 4-1 c 2 Li W E0 4-4 o 4JO 0) 0 0) 0.. o 0 o 0 .C cO fa o t0

in c

4i 0) -1 v-4 rV -ri a)rn r: x 4 C-i1 a C) Vc L4 a-4 (E 0 4-4 (O a

~a) 44W .0 W 0 O> c U) : a,

rl 0 o *- a) rn a) LA Q C-4i a 0 > 4 :> a> tn *^ G, zr-4 4 .I U 0 )L j 4 " -4 l a) -c a -4) 0 N 4J -

:0) -4 -4 -40 4 o O *a Ca ') E C^4 Mu a) a C~~ 3 Z;- 3- 3

65

APPENDIX IV APPENDIX IV

U) 1-4;, 4. - Ln

OX 0E

c4 C >1v-

0 4- J> 0 O44 )0

.Q E 4-iEz a3 Z

U)

34 .)) a

·~ o. ~ ~U r~ E-~ .red 0,-4 :> -4 w 0> > -

*a .4 H 4:: -_

C)) C) C) a)

O I- C4O a ') U ' q)C 0

-1 - 0) 4-)-4 -U4 W *- 0 Q ,C - C 4 - W r wV 0 C 4 Q) )4 ) 0- O 0 0 *, 4 -4 -0 M) VO.w C H u U ) U)Q0)4O 4.J *O0a t (a¢

C > W 'U C =1 Z U C 0 o C0 U) (u ;U ' Cu -) *-,-I4 U) U) 0

i (aU 4 a) c .1 r el - * En ( a 4 -4( 0o a0. a ) cca *,4 JJ a ) O 4 a

*-, a s O C 6: h 0 4 > m tv 4 c o rq U -4 a *H I

U) C U) 4 4-4 > *0 4J a) 04E O - > a) -44 C U, -4 ) -4 W U U) a4= 0 * 0 > a) w ---0 w w 0 -Jq-4 a -%e r. --I c a r.) a0) U)] -) 04 w X u ci w u X sa -4 w w a)

o o: ,U 0 44 o a) o c0 o 0 E a, u c 4; 0 0 4

0 41 U 4 0 a C1 - -a LO d . Q ( (a

U)X

a )a .,-4 a (a '-

4- H 0 E ) WE-4 L4>, ,.-(4 U a) W

0) o0 Va) 4X

66

APPENDIX IV APPENDIX IV

U) ILUD

U '.0

-4.-4 a)44r C >'r4

-4 -4 n

Cu .4,

I to )a

4O 4J

4- > -4

( *-4 4**

W W Li) u

0I 0 a I .- tU J U co

) ' C >1 (H - ,- q

.0 C I 0. 4 ::: WJ /: C: 91 0 3 0 . ,-_4U) c .o cn - Cj C3

- U) CE 4 , E( C: . 4 -" C .0 c ( I m -

ra 3 C,. :> to C: 0 -, t fo aE/J- 3- E/ 4- . C 44 W 4 C)

. 0m o 4 C C c 4 C-C E( -. U FE

V VX (U wC OC a V C O.* I ·cC C . EuU EH Oq .H m UU 1 -- lQ. - W Oa

O a -q O r C ,r- 6 4 44- r 0 :1 u4-4 W ,'

0 -- ,0 (a 0 44-44 ,-rOH U 0 44 O 4. 0 C: WC C I 4C ' · U i 0 I C O

·,4 O . O " C-tW 44 - 4 O-4 0O O l e t" 4- a) ( -H:

a 4 O t oT .- to 4 O-- I u u-4 * 0 0 V U c

,4 O D SV02.Ca - l H- * X W ( U) 4-) M f rO O-4 J -iC'-4 gU4~lW UU C a) -1 W - -4 C 44 4 a)W C *H

U u) :>, *4) a E 1 c c a 4 C f lL-_O'U] rnw tO Q a :> C 0W C rAW OW ° -U) .&JU).0CLJ>CIfl(U r:·.- (a0- -(O .i0i000 0 4-l0

o3 mf 00 -4

0 .c-4A EEn E U) 44 4 ia

a-4 44 )-4 u f - 4 W C CL0u *-4 U) CVa ou W 0

u - ,) U a) E C. -w 0 a) 0 U)a, .- ) i Cr a) . V O .E rD C: 'T3 .iJOCUW

C: i-.,0 4.~ l C : --4 0 ol C:44 O U') V 44 Cr: E O X : O S W0 o u - t r4c O C u- "n ( C C V te c 0 C O'" 0-- 4- re - t

UC- OQ , - · t-4 C) - ) t Q 4 H C 0 4 4:-J O-0 0 ( UU

C l

a) . o r.iU-4 U)'I C C C i

.- Ee O e *-4 a)

O 0 -C o0 0 ' 4-. o ci 0 .H

c4-4 -c

67

APPENDIX IV APPENDIX IV

U)

4- ,-4 IVHX 0

44 0) [-4

O C-,

,-4a0 c ) C

44r C > O

- 4- a)-4 -, .-

o) > >

C _-i a*

La4 ~ ~ ~ ~ ~~~~~~4

" . -H O C C

sa a)> 4 U) 4l

Ua) v o4cl.l. vU 4- i-Ho a) a L a)

U) VCU oU-, t o '--t''-4, U tO 1: i r -%(a 04- o 0 c > a)- aa c0 Q OU 0 CD o a)La I- C >O 4, - 4c- U) o4O - -v

r: O r Q - rO O to C 0t O O' 4 ,

t > w -m u ,t · t-t4 q; p; >O 44 > to - q; G3 oo - o * a c 4- 4 a) ,, " a) ( O : , u 0

,, to s sr 4 u. -,- O o to to · t: :o :> v1 , ," )

-t to C C4-4 ,t * t C 0 ) % --- U o. O4-n (o. .O tO '-44 On-u' ' --- ' 4-H tC A CO 4 - OOo- 04 -O 4U O ) a)v . OC-" t -Ct o

La t - U c a C- > -t 0 3 > v O 4-HO 44 oVC

c 0>-- t o o v- Op o 43 o c c >t -.: o - n

u o4 a UO U (n , 4( U o) o UU (a (a: O C C- H- c ' a)a)U) J- >4 ) - 4. 4- 4' --4a) 4 t -- -H U)) - W 0 : a O)(n -H4--3 410 .a) t t aU la U 4-.i ,)-(a H0 r. c..

U)*a u tn cH- -,-IC Q-aeC4- a i -- Ha v- a )4C1)C U)0 0 C0 4) C Oua)ac CU)w > a) -H aUw fL

4O a,~ °· c · ra) - oa o -- E Et'o0 0La- 4 U) 4,

o 4. O- -H a)f U > Ei)La -0C '-4 /~t4 -H 04

1 0 o C 0 3 U V a) -H auo L ) v E C -, _ a : o - w, oH U) t C '. - 04 0- : a) > ( 41 C a 4. U- 4E-i La~t~OO0O .,>La~C U)O 0 00hE tO O o m Q ' > to r- c m 0 o 0 Oa4 -- t.C -4 a a) a 3 a) a L .C4- O-J U (nU0 4J E-3 3- 04 > 0.4 04c c O a a)

68

APPENDIX IV APPENDIX IV

U) ' -I

o C,WOC

,- .,, -

a 1o .01

, C . 1 > >.

o : · O4) .

O4-) 4-,ia~ u ~ u~ O3 D ~ , ~ 4 a 4-4

U ( ~ -, rJ -O : 4O) O 4* C~e 0 .J r . ( r0 : (4-

· U U)O .- )0ca 6o ,v 0 - 0) ( " >0( V m--4 ( 44 4- 0 4.)

w -HC ~) 'O"D0 04" 0~ U O W 4-J; 0 U) .m r C'O O4)

0 (ZC A (a 4-

V 4 ',) - r-4 0 - - 44 Q) o4 - 0 C i) C 4 Q U ) -,q " J (D ( ,- --- 4 r0 a o 4- 0. - )

V U) 0) -0)U ) U 4 > O - rU) r qJ : V ) > m 0'13.CI

O 4 '4 O r4 w: 34 U) J 0 4r -a- 4 E -rO ra ' O4J 4 OQ:

WV .) .0

) 0 ) OU) U U

6 Ca9 a W U

a ) C ca z au a u a ra v

r-4 a cQv a ) E 0) J C ) M

c a( c 00 o a a E o

o ( c O : · s a : 0 a a z 6 c

69

APPENDIX IV APPENDIX IV

a)x

44r a) E-

OC

o

.,.4-. a)w c >-

-4 -- £24 (a r- M

E ZZ,

a, (a .JJ w-j

( O za)

4 -> > >· ,- -,4 v .

44. 4 - C a) i c ! U- CCD 0 U4- Oao C o 1v a C I a *V

a) a-), c a) C i C - W ( v4J- . r o }u) uI) . CO-4 a C -- 4 -4a O u. a) I -4 -

' 3 "a 'c D .- C o > a): -4 ·0 u- 3· wmE a) t a ·-r a u E-- o o a) U) (a a)

V a s o v aV( v 4i *i ( u o- > * a) uC c: o 0 O-, C a) m > u C a() 4- m )a a) . U)3 (Aa (, a La O E -4 (ora 0 -4 U s u o C c o 44 a rC 44

-,a) -aU J 0 ( O V-4 4; {U) O .C a) '-4 OC c H C -4 C o o > ae Vn 0) r1 T o o *--q O cu a)O O O c 4 C E u a )c C *n -J 4 v C: 2U)

*,4 - -4 *n) -4 ., 0- c c N,4-,4 .. o 3 au oa 0 a 4. 4- *- C "V -- au -- I - a .n ,a) C7 Cu)

4 O Q0X ' 0 C u *W C V J k& n cU)cr " E U * nU)' H ''-1, X 0H O V-4 a) -4 -r 0 c(4a 4 : o u aO4L o) aq) C - co rrJ x N 4vO 3 tn U)-4 Li C

u -u C -4 u U) :3 a) a) - U)n t3 a u 0 c oC 4J0U) au C ) -i V O r N L J O n4) CV- 4J > c a; ) .a) a() 0V>I a)a w w --Ic a) < En - u -u . E Eo 3 O.n

roa Q a) u P c : - > c >r -4 u M > aw -- a> W v av( C a eC a U)-N"-( M a _c c t- I -U c-4r o > o 4J 3 Ea) *r ·- atD 04 C 'Ja r) t (U-- - C R H 0 L -- 4O O -4

-O E-1C SJ :- O 'O U E4 4-4 - O C 44 -C

be C0 C4JQ- C 4I) 0( nI c -v o

- LU a) Li --l C

E- 0 E r to a ._L N t0 E 4J O )4 -E-e O E tO O a Q Cf( -Q O la ( · q

E (U o u U m u * 3 ^ u Q-W

z 0

'10

APPENDIX IV APPENDIX IV

oa r

Ulcc,4-4

4W H

C

-4

! .44 C>1f -

04 0 0a

o0 4 0 o CD oc 4 a)

m 5 ·4

z

4)U1 >

t) .,, " .j. 4 >

4 a 4 . 4

U] C C) C)l (d a ·'.-

I 0 ) 4-J ) I ) OC

a) sC~ C-4Vr .sU) 0 U)C f -4 C Enu)En 4W ) u' .: -*1 0 -4 .- .. : *- :0::-4 ::. -- ~U - -. a 9 0 .a ( a. ) 4 ., *-4 > > a- ) a

O Oa O C C u wr i *H - r- C u) O O 0 O e" 0 O o E- o W i H . 4. 0 f o la.- W -4& -

4 , ) O a U ( 4 ' ,U)" 4 O v 0 * O' ,

C Cq 4v: .4) ( : O 0s 0) O E O OU a) ->c sC a c > f-: t 4J O -4 , c ( a >

4 i -4 u r U O (a(aO 3 m - A t (,-( 0 ;-' 4 .4C 40 0 JU) 4 4 C 4-; 0 ' ) 4-J -0 V

*, 4 awU 0 ro C0 .H 44 c W o c c 0 o0

4J4-4 C C J0* 4 a)v C 4 4- .4 vr' rJ - - c rn

0-0 w .4 si r4 U (4J 0 rr C 0 --I 4- >Oa-H043 -*-i v (a * 0 U w U 00 4O·0Er ( Ca U 40n C.I UUP.r 3c a1 s

0 cur :·~ct Z act 3 C C4

0) .8.) 4-3(0 4 0

&41 0 j w 0

& -J 4 0 to 4L: Ui

.O 0 I u n 4I ,

.. 0 a) * a 0 0-=:-'6 O 4 a ) u- 7

71

APPENDIX IV APPENDIX IV

U) -q

a) X O k D C

o C

T,

4-4 lu - -

a) (O 4- 1.-'

) ca)) } >

," I D I

· X 4J ' >rn E

4 O mm r-4a)0 EooQ(V0 0 C.) a) 0 Ot (

a) 0) 4 H ) rJL -4 . a) :1 04 a

-4 f ' ) 3) r-4-H-c-q 0 4J - U

· J C. ~ E : C

UU c( o4 a - o -U 4 ) (- o x

a 4 H 4 c - u >u ) 0 I - U) > .0-4 V C(n C: a) - -4 ' 30 - 4 C, @ : a )

a - " 4 4 1 u -) C C L 4 W W $4 > > U) E U a 0

-)W r a o o ) O L -

4 v 0

c o o 3 ( o - 0x u4 04

-4 6C4- < 0t U c O ~ a)c0 C J

4) U) C 4-) >i P

4 o

O I t C >I ov rzc, O l: c; r4 H 4Jn O> -4

>- 0 ) : UJC l W 4a a r 0 W rO C 4 -0

LiU Ca - --U - U C O X

UL 4J 3 -> 0 4 ) 3 - UJ J a 1O ) O L' O U : 1 3 C 3 U JJ O 0 C

APPENDIX IV APPENDIX IV

-x 0

- ci

'"i L Eio .1 :>1 o o o

Qi

E z a)

zLi

U) > I I

.- i -l ,- I 0 "0

c T C -H va4-il3 IV ) 44-

, ' r 4 - . .,-I

I- U .. w - I: -' -

-. q-. F ti 0 0 : : · 4

. 4i C4a) a) s O a

a Il 4.4 0 PO V4 to . qo :i0>· : 4i >. -4a' >l .CV( -H

V) o ) 04 . r-0 L.4 U4 4 r O u 4:>aU.-4

i " 0.- - C) a) 4 -- i 4H H n .-4J g) 04- C l.J

o oe-4 H U).>( V (a :E 4) L it S (

( · :> ~ t- O QC; -:I0 u C U O (a i k ,-c c- I O-H 04 4a)4j0 0 V- : V 4) :. ro o

L> 40 0 X i s 0

C C J o a Lio4 > v) ) -s t a -

0 o - -oL- -~ 0s

'A O4 )a U) - 1 -Oi)0

E-4 - C--I a -" - (u LO .

, - - -, v a c E c c '

>" :3"' '" = - C O 3. O 4j

( UH 3 to U O c0 (

-H' a) H c o c z c c * C a o E- c J(

73

APPENDIX IV APPENDIX IV

(aV -4 r-4 C U 4J H·*H X O4i a E-4

Wo Co4-4 C >.

0 4 : :> C o OCU 4 W

w - I '-

I E0 o JE Z O

z

U) > >

4-) 4 40- >(a U U -44J D D O

UtC C U

I '~ 4 Q) J : I I O I U- II a I C v CU H m 4- O i a 3 U '

WWIC -4 ct (C C(-1 raCU 3 C 4-) (O Cl T3 -H (a a) u) fn o ra 0) w r E * i cr'3 ! c a) m 4i a) En uw vc ) o c a a4Riu r . 4 X - -4 4J -H c -s E 'U c 1-4 u)

U) (a o o- 4- )- U 3 o U w-c U (oi .(a (aU r 0o4 E) 1 s< ) ru r'- r: aw - U) w f u u Z 4J U! aJC 'C (o U 3H C a) > c U jU-H Cr: U) C. -,- >. - ,) X. V U0 a0o ( -c s- 4 c .sa c, - 0 , o U)0 n, -o sI M c 0u a * 4J0' o c

- O1-) 04J o4J 4-J -r * : (a - E-4 a) ra C > u .c )C -, a C L) C oH un - J 4- t.. : : --Jr Q- c 4 LWo U5 > O w O aU)o 0 2 J 4 u C ( (a x (a ra 0tl X U)-4 ( -H 4J ' u - 4-) x CO a c a) tr * 1 a) a4 u u7 c Q UwQ4 E E E CO . a) Fq ro a() - >i - 4( -& c 4 a ) - U3 -**4 M . U a) M -4 o r - rC) U) 44 0 04 4J 4J L) U 4 : Ju E4 C U)4 Li-i I - - w X: a) C 3m C o U o 4 w H WQ w o C u 4O4 E)L w *a Q 3) w H C (1 c4 a Q ) c c c U) in U 3 S-aU) w W T3 r U)V 0. rO 0 > 44 U EC- *-> U) )>U7 U) 4 -J cU ) tD ) a - V 4 -J O) u C O CU 4i 4 J un W C U)

-) H a-4 * 4 Q 3 C u-4 > Mq C CU S.O-4 - *H -- C U)H rq S H Q4 CU Mn rU r > w o U) --4 3 0 -4U -I)n _1 (U7 W P -4 4) O)

4 0 a) C C: au n (K % C -44 a-) C U7 a) .W>iC 4 0 *a-I un > un C V ) O > C-) E - U C ) E > c4 oO C C _ ''4 U1 - -444 U) r O - C 4 4- O 4 - (O O 4 - =$ tLt (( .)(U 4.) Jc J 4 31 U( r U f 0 (U .) 44 U) 4c - U) CJ -4L C S

x 0(1) 4-7

C C-H Q. U)

-4 >1 > t 04-) 4J 4.i 4J W W X,1 -H4 - - -r- 4J il)

:3 _ 3Z 0 CU U ( U U) U )

u) u) Cn

74

APPENDIX IV APPENDIX IV

G ,- unU)o <

.4 a; E-

OC

- tra) c t1

i-4 ·.,

a 0 4 i E o

3 I

U) C. - J - "0 -4 > -,0 0

· *.,-4 = :3 C

w. ., - to , ( i b

0 ) r

ac a>1 I I O O JW W-d i ECC *-400 U) . - 0 0 m c -) U 90* .-4 U) d- c- ., e ..,.4

1 W o M or a, En o : C4 C0 o1 C O >

C C C 0-& > d JJ .' 0 JJ co *H w fa ., @ W 0, O . 0, c t O, o ' c c > -, (14 ( e r. e aW u= J 4 4 c o 0 @

0 U.;Qaaw0 .. UC- didio -a. . .- JcU OL tC0 a0 a -4 J d 4 C . G .O m 0 a

: U Q0. aC Q) .C U aj- 4 C C : w w vC- .,

U a cl fC * c: c CC U) C i. c U )

U coU) 0 4- E n -40 o4 0 r 0(a -4I - U) r *-4 U) w L *.4 U-4 -* U a

a 0t I U) 4U a) W u) 4*H- > W)0 rU ) U4 C CC -1- a -H f a0 U CO4 -- 4 - -4r -4 c

000 o o cr c 0 >CC-- 40oC -a) a-4 .*3 -- o f0 *C0: aY 4J .) LU a V t 4J FW n A U V C fi 4J M - 4 w D] a)

00 I

-4 >1 0--4 4 CX X

E-4, Lw0 O>

75

APPENDIX IV APPENDIX IV

Ioz IU, o 1- 4o 4c ,-4

-4 4 0- a) E-

.,4

a C

O4- C >..

Cl 44 a)

Q E 0 4-E Z a)

1 a a) a4i > > >r .,l .* .4J 4J W 4JUt U C) U

I O ..C O'~ "O <:o) r-, ,-.-

a c )m C

I C.1J .W I C: )- C 1-.4 -4 I a) : cI a) -4 c O -, i:. cQ C a) o Vo H (. a) 0,4O 4-r4 - -C c W -) H L4 (UW

N > C -J 4-4 W Ol0 l- ) O- 0 r O S C .c .40 r- 0 · 1. ,H M. 4J m $.: C: .- 03 3 4 O

c o c U) ,-- C 4i rI C : a a . o o a·c 1 ~ O C :3 ~ .r Cn r > :; .>O q- 4 C '( q-43-- r : a 3 -p q 0 o' Mr.,4a us ·t *-,'4 0 C rU Jn u a -4 Oa- -. 0 0a 0 a

-O (O 3:4-444 E-,C 0. C- l O ' H 4C o U U c o a4H 4 U u- H4J o 4 O 4) (

O (, u O -- 4 o: ... . , U 0 : : ) c- 'co ., a) C: c- 4 C -4 .c E- C- o C

4 Ur rC 'U) W SW U) *-- O C- O C 3 4-4)a) U"IU (a

i I C( (o U O M 4-4 a Z 4- u C. > c *- 4-

0 0 ',4-4 0 'a0 4 r- C 4J-U () (u 0 -H 4-4 --44-4 U)

-0 0 C a 4 c c cU U-4 4 -) 0 a) U)'C4 0 -4 w ' U OU a 3) >

CrO n- U 3 4 - C >4-) E U -

O -43 .4a) o 0 aCOC-f-4 O- 'C-Ur:3&J ',4 4.4JU) U '~ 04 0 -4. 4,-: u>

O >X Y4 av a) IC -aW O'U U) C ; Q

--r E Li u v w-U U LU X '- 4* X', ao r U)c 3 a

E-41 UI 4- l e) O r lLa C C U U C > C:3 -4( 4 o _a n -:o 0a 4)U) U) U)

76

APPENDIX IV APPENDIX IV

U)rl

*S4 X O

O C

ar

o4 C >I o o

·n I

-- 0

-4

0J 4- o> CD Co

1) m I4-:

Q o .:; U . ~ - -O :3 .W ( .4.

E Z wz

(a c4 ~ 0 -0 ' ~ : { - .~: · u t

4 4 0U2 U u

u- U) , - 0V V a) (a w r1 CD v I s a ) LiJ a) ) U)E z: v o U) 4 > o a) , 0 O 4r > r V to >I · C r w n a)W 4O>a ·~~~~~~~ Wm-a u w M r0 ' 4 00>a w - 0 0>

30 , U -4 S > a) U --4 4 ( 0S Sa O Qf 'O U) > -u (

C 'Cfl -4OCU a) O -4 .W44@ > = 0 3L a -w *-a -So3

rO 0 ° C ' 4H C U a C 4U 4J $ C '- > 4 340> U r 4 ( Q0)C o 0)4 1U W 00 un O u o r 04 U) -4 - U 4 C

u) o 0 M X. u, ,) : -H C - a1 o W -0 u 4a S 3 O () -O r, .4- 4 u 4i a) CD .. 4 L Q 0 ( 0 a T3 fr C (L' ( wO (LiwWqC0 C 0 4) W > U uW 4J -H W4 -u o >1 4J H~4J a)a

. Ul o 0 04 C . 0 Q C o -1 u * e S w

4 U) 44 40J )) C C O > - W C 4 a) 4 u) -H 4 H -SY

0 '0 4

ui 4Q -1 4J 4 aX a -C i u q l Q G F U)CC J - - O0 E n C- 4 4 E 4 H -4 U H) >i O $ WU E( : (* 4 -H

4-)

Q4 >C C

7

APPENDIX IV APPENDIX IV

UJ I l

U 4J

· 'X0o

aC

0 4i 't >'- 4-4 a)a4 -4

.I -. 0 -FZ z 04D- 6 O .

L C*a) n l .

O,) 4 t O ,- O , t a -4.) I. > -' ,a

O .) - 10 to-n-4 - i I 4J tD .,4 I O -0 t0l

a) I I , O ., O -U) J -4 k Q Ot4 40 -4 a

4 044 aa) 't J 0 0) a) 4 a)3 L D 0 ,-- -

4g o- , a)4 * ..0 0 .* t a a3 . ,o o -,)r c a .U 0 -4 0 , M OO c 4 - 0 U

U) rnr cw ( uJ - 4 a L -1 0 1 )1 0C L C a) O R ( ' ) U c E 4 C U) . O u)1 O O 1 ,-

)4 tl ) >t r4 Q -4 - '' C 0) Da O D a)

w. ) UJ ) C 4-a I a 0r a a> . * . c' rU ) C0 n C r a) a)4

· ,.40 Ia 0 0' ,---

1) r U U )= J * V ' J , 0) -

(n an 3 t)' C Cnn o r C\ . a

a)l r.)iJ)4 C O ) W a )

c a) 0 c v . U O e O 41 0 0 aaL >0l1- S a r * 0 1 cn o s s cs c c V m 4Jr_

CJ - 0 I

4 I41) cC 0-4 O W>1 >, C C 4J

E0e

78

APPENDIX IV APPENDIX IV

.,-,

4-4 O

U C

4t-4 ,

04i0:3 '>,4,4 W

C 4

z

-i > >(a- -H

I (a 4- 4 OtUr4CD IWI a) 0

I4 t 4~Dco 4. .,Cr 0Cn I t : 4. .CDr a)r-l > . ,4nwC

- . 4W t 4 0 t -4-4 tO (a a) .- :0C

O 4 03QC O3.4 Ol- t) G; 4-C C O ·0 ) o

a n CDWC '.-4 :>-4 (-1

4 o) -

· '- C tn C.-. - I .r ,O O, 4-4 -.-. E 0 E : 404 n-4

J .4-) 0) 4 0 4~) C) 04 0) 3: 0 CD ~ *.-4 0. . ,- C:: a - *0 -0 4-

C C O O .c t -,I oL >,: q.4.:.O Cq- > a)

· 0 C 4 T 4 0 ) 4 C 40- .O0 a)W- >. ·w w w : t e):3 4 C W 0 C x t4-: :o 4:: *c

4J0w4) W W 4 4 0) w ~ oC f W ~ ).V4 C4 U .,-4 H- to

a4 to4 . :3 C 404 rC,-I : to , -3 -0 I 4 0 0 to 44 0~ m

4 c c 0" 0-cH s w sq a 40 .. C , a v 04 00 tO -

C. 4 ) 0 0 (04.1 E.,4 a) to 04-~ V to " 40 '"'-

)-j 0) r -- Q r O . O~ Q : 0- " CO Q ta > En:

0) O)4 ) --- UX4-YL) 'Ac -3 W . H -0 W Q-

0 --4 00 .C: 0 0 )0 .: C :3, ro -0 a:: . c w w a

4 // 4, .4J 0 4 40 40,0 0.. M -~r 4-) t4-4 C .* . t1 o 04 -co0.~to

'0n) 0)X~~4.-4~~ Q4-C'4 0

-4 C r4 @ ) JW0V1@^ U)n 04 *

· I C--4l W' U -

-4 UU 0 ) O U ) U ·,~ - .C: o 0 s - C) -4 -4

0) to -- .4 .

u ·

Ev)-4r~E-4

r^4 We ct 53o·la u 'U *r4 u U )- r4

3- C 1Llr r I tu4 ( ) I

C 3 OWO~w~~ U 00 a a t 79

APPENDIX IV APPENDIX IV

U I o --4 X 4I

w-4a, .,

·,l -I 0O,4 >1 -

.,-4 -4 a o oa) (a .-,

O4-D E - .4

I n X:Z W

r :. x > ) -> >0

> a) 4 (

4) 4) U c

I1o 3 x :> to o

() r -·O-4 O: UT a) 4 ·L 1V)O 'r

5U · 4-J " 0 c U) 4-' 1 c 0 '(U rC 0n o E- 0 O 44 W, r O -(O > -- >', a O ,-- -,t c , ..- Co4-

U) c c r H _ 4- > C C -- :3 a- -o a)4 c V o vD C 4- 'U *4 4--I 0, O-q - a).-4 > 0 to 3 )U. U) O C'4

· C En 0 C 4-J 3 0 . > .4n U 0) 4- lt - 0o a U . a.3 0o H- a) C - C .cu. -4 o W t4 (U] a) a) X ..:: *FCO --

C U U') O m (a - ,- >3 CD .0 WOO -U M 44 O O aU> a-(U 4 '> X C-0 C r- a) 4 f4 0 0 - 4 0-, 3 4Jc4 C S >*_ 4 4J " 0P H ( 3

t 4-J.dt 0 (U4 H-44J CU)CVO 3 > i O)0 C a) > Cc 0 W -4>i 0 4 O a (e) 0 0 >-H > .. ) H > .4 -U)

., 040 0 LA.-I O~ r - -C0 HV"- C-- (4 -J4i U)4 C- ) U) t4-J.o C 04 -. .) v a s 1 C w > a. o :3 04 s .4 O a.

-S~: Qa v . . c a -a .. c ~ . s a'04 o 4 44U) 4 U) 4 0: U)-. o >4 0 a)

-< 0 4-' 0 C O ) 0 u4 (O 4 * -H .- 4- - t i C .a E-4 ' a- ) C J - a)I-i ( U4 Cf lS> 0C 04 **C U 3 O '.C 4- .- UU U) r3 4QC . 'f U) Q U)V >41i a) U)U a) 0 o .U) 4u v -

U) 4v 4 - -f - 4- >C (II --4 Z w V J t 0) 'r- 4- S * aC C) 4j oa. ) n a u C n 5 a E 3 U) -i o a ) c U) la . > r) a)Q . -C a. a) a) a)C 'f C V aa ), ( C4 c C. a .Cr-$ E '

U)x. 1.> 4.) -4U 0)3 . mU w 0u m U) Oo 3( u) vU) '( UWU( g -4)--EC U -4(O0 C: 0 -( U --4 >0 4 O -0 C O) J i £ VD ( 3 3 C UO LW _ O; 0iJ 4J O $4 O .. '9 O M 4J .3 o '-t C -Hrt 41 a O a% C eD $

u .r, > . n Ln > U U) r- Pi 4 Q n u a n _ 3 c - U 4 4 - -)-f L4 a

a)

OE

.1 - C

o v 0E1 F 8

APPENDIX IV APPENDIX IV

tJ NW C%

r1

W -4 - ,-

4E

n ,

U)

as c

* -, - I-- o--I >

02 CC C)

a

v- I E .0 0,- t ) 0 to0

0 -

0 0 (LwwE!4 a0aat 0 0 *_tW r

v a C ) 0a ( -

)U x A

QC o

w rG 3E Cr ) n * UW8

04 c 4 -4 O C a a X u y a , u)

E er W1U Q C Ou -4 4j fu v 0 4

tOl C ; 4 0 t-u a 6 a 3 @ t a m c 4 5 4 3 4- -O O 0 4 DI

_. u 4' O X O -4 U o ,

U) 0) -4 XJ 0) tu t aD 4( r a ·-4 c O a i ! --4 o U C

81

APPENDIX IV APPENDIX IV

o 1

," X1 O

O ]Z41I E1

~jLI

44 'OO I

E, Io

*E· Iz a o o o o

O C , 00 r 40 IZ tD

rr >c -C a I

Th * a)V0 , -- r- *C L

U )Va)4C ' U O )0 4J1-a.- 0) (I) C")MI ' C 4iW4 0 4.' U J C

I 4J-4n Q.C) 4 rJ-(1 0 '.-4) U) - a(a--,) C0

C JI . O -i

o WV U) a) 0 U) >.-4 :--.4> ,t-~ -::: 0 . : J

U .) > I C a)

o C c 0 f ) U)LX2 4 U-j H C) - a)

44 0I-4

:( c 4( I0

t - l uC v0 - * 4 C ·-1- 44

'U1 J ) aJ -tt) 4' E C tC4 V) 4-4

04 1-4U ---I a) Fa i ):oU) H OE- E'--*H Ca tl

W L I w ( 2) M t oC -4t O tt C 4 E- > ' 4 4 V

82

APPENDIX IV APPENDIX IV

4-4 XV u

O C

roa,-4

44 1C

., 3 .

c4 (a r- (a4-1 Q)

I-- tO4 V Lu

a)c >m 4 c 0

V a 4 > W 4 W

VU -- I V V w VU U U

> c:aE c a : aaC: a0) r.-4u 9) 4J 1-4 V 4 4 4

'-4 " la 0 >C C .0 -

o C -* 1-44 -q.--

WJ *: C- 1O : t (D >1 _-10 . , nl '

4 ucc a w c - s N o -4 Q m -- · n cn s

4 .-J a ra 44 - 4 4- ' 0) 0 w -4 a) a

OJ4 0-4 r4 -. C m C O ) - C , M C .4 4 C

*c( -4 5p S ) 4 I W H --I *) 4J VW1 V C4 V a4C WO 1 0) U X °W -4 a W U) V aJ U V oxU V U c aJ > *4 rl N D Cr V U Va (IJ W-I) 0O *_4

C -tJ- 0 Q4Ci 0) 4 4 0- r 4 Ur 0 C C4-0 3-- 'U'- QO -O 4 0 0 C C - 1 S O .. .

4 )J W C atl ]) aU O H I) * 4 tUo 0 -4

X X I I o'4 Q > -0' -

-j X ---4 ' O I

C &J Cr4 _ C 3 E O o 4

- 4(V 4-0 l)4) U E -4w _)4iE-4 . (a =O: ) '- Oq-4 0W 0) Q'J-) c-) 0) ,-w . - o ",. 0)) V 4(U4-J UU..~ 0- * .(O .4 U En r- -4 ,' 4- 008a~ ' C O · O( -r4 -, ~

83

APPENDIX IV APPENDIX IV

U 4,

a'oC

(DJ

a,

. , .O4 .,

0 -iC-i 4 4o

c -{ Q· L I a) I Uu)C) aa) cr a, a _l a a) -4 4r u a) -II -e -4 4-) t0 4-. (U) 0 U0- r. O- ) U) . ·n >

..c:O o 1 ~ n =on m r-. {D4 (a C f (a (,- to 0

fu 4I ( aa m r4 C 3 W C U 4 ·--4 r4 M(U0 (1)

Of)[ C'4 r- C 0- '4 1 r a O a)~-) aOJ I Ic

O c, -,,c4 En OC = --' o4 t u ·4 04 ) O 4c - o * az a) D 4 (a C U L > fJ 44 aQ ) m a) q C 1 34M C o W W Rc o c 4 o o

-O4 (U .C 1C " 07 . S X O ~' , :, ·

En.4.,4 tn> w) oN - o > m w c-, 4 t E (ao.01 w >D O -- · 4 = 4 · ' .U " U - 4 to-I 'l v a) U c 4. a n · a U O ,) ,a a _ . -4 t

O >- aE O .4 - S 4- ...c: o 3 m o 4 4 4 -J-IJ l 4J4 U - 4 E U) \ -- V C ' 41 --4 4J 4

(1.; 0 J -- -

0

*n C-I tV a 4 -E

cA uz u- 0 v co

-4 4C 4U) 'O 4 C )

a > 0u 0

84

APPENDIX IV APPENDIX IV

'4

0 1

o-4 ·-

%4

O4 ,-i >

C. 4 .4 -

.D O4J

~4- I

Cb a)I

(0 I., -14J 4. 4.

c )4

0 U) 0)

to

C

~~~~~a~~~~~~~~~~~~~a)

o0 I C: I

3 JJ ) LI a) ~ O C U w 4.-( -- U0 la -4 0 r 0 -- 4 O 40--, 4 WJ: I2 1 I 4 C. --4 w -. -4-I a CV -JC U 4 W - I C -- 4J W ' 4J r- O C

a, | Wt JJ , C L4 N I aW W, a) - m0 Q O W U -o - --q3 tn oJ 0' -4 I ,0-).- C t' 4J 4 - J w,0I -4w )4 a) U r c = U C 0 a0 o U xU U ) a r fOX

-^ 4J a) -W I- ( C 4- -- W 4a --I 4j a) r -4 4 E-WE- VU Q V4 M ¢0O C U U o4 En JJ t a tC C 4 XW M 6] l O JJ ) C-4 ° li ( 4a M w W r4 W 0

,-> ,..> - > --4 J 485

85

APPENDIX IV APPENDIX IV

,.-

o 0'%4 , - 4 E,-

'o0

* ,-

0 4u :: o c o

.Q E0o *-JEZ 4

; I

0)

U) .

U) U Ut

0t C c cE

0-4

:> :> I,,

-c o o W4

Ec Wn > 0

, E E EUL -I ') 0

c~u~ ·,n~4 Q' C: c C

C 8 60 0 0 O0

·Y E 4O 1 0 ¢$ .W 0 4 U C O - U 0 : C: .4 ( 0 E. 0 U L4X-- "l - O O C--4 0) 0)

C aw e-- -. C; c ~ 0 -- C .0 f 'Q, c. .- .,

4-4 tr o U)) o) a} * O C o c c E f * u c aC J c:>. 4,OO 0 0C. t4UU o :'), o WC E :,. ,, : 0 .

r t3 :> C 4V J- C 3 E u C p O IU0 *s 3 c 4 a. oOJ._4 vU o - C ,. a o 4- 0 o U , c - n U)< I v 4 EU C O aiJ L

c c C:

86

APPENDIX IV APPENDIX IV

UlrT

4.4 X 0

W4 a4. CI

·ew~~~~~~~~~~~~~~~~s~ ~~ ~~ ~~ ~.-i

(a ., " 0,

C0I C >W4 ..O

c

00

ua I

' 0 4 4

C 0 0 O O 0i

C 0 ( .0

_ 0 W44 C4) 4 ° V Q 4

C 4 _I C

4C EU 4 4 to > O-4 Ci E1 (

o() 4 vto 0 4 U 0)/D U ) 0 c *s ffi C 0 C4

(0

amt~~~~~~ U

vo a:a~a~ v: .

1-4 I- b-IWa

~~c( E Ei a~~Llrrr a err ct~~~~~~~~0

~~" CO CO C~8

APPENDIX IV APPENDIX IV

,-1

U· X 0!

44 aO ,0 C-

1.4

Zvc4-4 >1 i -,

v Ai-: > : > _

c -4 .-4 a

- 0 0 00

,t* ._ .0 .0

E Iz E

D ~ ~~t~ tna~ t~.9~a

O -o o- O

s, n-

to t~~~~~~~~: i

U- a . a-

4 .0 -4) .0 a) 0 0 a) w 0 4 t .- i'-'4J-'0 a)to-' J-'0 ac towLIU--4) J --E44'

a) E(UW.0 E> c) c -J04 C W la EU ) C 44E id :

- *- 44 E * _ 41 V - :) I E c- > C Q tj L a El _ VE-4 U) O 1 - St V> ro t)0 w _t tU A V? m -f t .o )? it 44 C ) t O

>0 oN .a4-4* -4U > M 4 *- 4 U -- 21 0 !OD VJ U U '-4 V 4JW

88

APPENDIX IV APPENDIX IV

4U) ,-4

(ii U U '.U .4J> ,-4 ,-

44-4V

%-4O

,-4

.p .4,-,~I ,-I'

O4U)

..4 c>- a

O iE L

4 1c 4 4

aiZ(U 4

a , l

5E

IUq >

.*- a 0) ) 4_ :> :> : :>

·. -u w M u(

41 ' . . .4 -r

U) ;~ U) m rJ'2

.rl 4J -4 U ' .M 4J .0 4J 4 04 4: -D 44

4 at ) 1 )

O,-0 0 I a) ' ,-4 Z:: 0140 0 O O-4 O

* : . .0 . 0

-4 U) U) N )a

>, tO 4 vq -0 0 -xn > > ra a 0 1i >

JJ a I ta a ·c( a .t L a OP ')l

4 ' n W 1O E..*-. 0m

40 0 ou - 1 0 '4 0

C4) ·,Ea L C : U'4aa ria XV- 1- *- r- 1 4 O C-& ' 1 m 4-41l u4V 4 Jl *. a4 '.-I'Ut . a>U *z a

E-. U X' N .. C C s ) > 0 C w

89

APPENDIX IV APPENDIX IV

C

O t-

W U '

4)*H 0IO U~ _ D

Z0-1 0 0 E Ek- 14

' zO 0)

: , C) -4 C4' > 4i > 4 40 vI U U Uu) U u C c

:i O4

CI C)

CI > > > > V

0 0

-I a) C) C a:3-. E E E E E

M fa0

l E I O 0 O C 0 o 0 I) u)o > 4) M 4v : 444 C jc C4W U C o C: 0 C M C o C 44 too -4 CO co V -4C 4 to -I * 4 "> a 00C C 4 -4 a- 0 a > c a n 4 C C Uo *· as W o c> Ca o .4- O 04 C Oq 3-4 X c t v *e r a * r: o VI a 4J .r-I E44 -1 C 4 V C C: 4V C 40 C V M--40 M 4)0 Xa ra *r4 0 - 4 V ( a O4 a0 Oa 4UCZ 0.-- 0a C )) 11 C .0 tr C 1 u--t :: CJ V a C 4v cr 1-4 t4J -4 D -4 C a(1) -4 A C r E f *4 D : E( C *^ 4 a) c.,J 4 > u -- 4 E 4J a 4v 4 >v 4 04E-II u* -4 c -a r (a at C) tW " w ) wn a. C)o U W in ,-4J C Z O 4 W S C- a4 C m w 4) S S >1s-a 40 (a U)> u) (a , > i o :> -;) J ( v :> v i t w > E a

1H H 1- H 1- E4

1

90

APPENDIX IV APPENDIX IV

U4a0

a-4

·-4 .*_'-C 0

- .-4 CD C0 o CD o1-..4'. C c 00 040

Z

.0 2 f 4- 4. -3

la

U) I o

r. .> > > 4i0 0 0 0 00)

O. m e ( En

a (a)

a4j ) 0 Ii

CaE~ > 0-H U C > C V a

4.1 4.I C to En,-4 .4-,4 (a w I 00 00 0 ., C .M C- 0 _ 0

0O .0 ., O 0 .0 0 0 3(4 OS 4i o 4 '0 o W 4 v o o 40i 0 (9 (a o 4 x

· .P 4 m .- u Q .,-4 : W (a W '' Q - 4- J O 0 4 O o*-i O w ) U O w -U 4 w *, 0) w l C 4 c Ua 4i w )

. UJ - ) 0 W 0 -4 0 a 0)0 aW L

4 0 aO r. 0 04- -,- 4J0 0 ) 4c

a> ) r 6 g > .0 a ) > r, > - > 4-, 0, ,r-

91

ad at~~~~~~~~~~~~0) 0)1 0 .C s-a~~~~~~c

a,~ ~ ~ ~ ~~~.~ o -l(0( rfl4i4rV C 4i.-U0 U

I- - - - -

a~~~~~~~~~~~~~~~~~~~~~~~~~~~~)

91~~~~~~

APPENDIX IV APPENDIX IV

o ,

-,4a c4-J CG al

-4 .I (9-

c > Ia D

0 0 0 0 0 -

z I

.4 ., .0 .l (9 ~ O

a4 ,-

U U) U U C: U

j o

01 Q a a) n U n Q

H 0) 0) 0_ 44 0 0 )- EU EU EU,-I j E.-

0) U) 4) C) 0 U 4)C) Cla)

a. ii

0E UE C D u 0 r1 C C -4 C-4 C M- -- W 0O1 to v C O ' 0 . . C 4.1: 3 C C u: :4 > : 4 > >4 * to 1 t a U O D O Q O a S C E O to

vC jU 0 U) 0V o 0 W s 04 - O Q0 0E >t v C - 3*a - a) C -J a) a Q m w0 4* e i Gto ' > a to0) 1 c c c a E EU (U .7 c sa EIU. c'. o C:,-il StO 1,9 V/) O . ~ O3:1 to to ~ l ~ 00 I

: > M (-- - 3 :> E E > 9 E r E :> 0 4f- - > :> > 4 . >

92

APPENDIr' IV APPENDIX IV

.,-4 , -4 -4 ,-4 r

,-4

I-'

· - > > -4

U N- "4 .4 ."4 -4.

CO ~ 4J r

L: *1 W - O O O O

Q-0E .P -

Z Li

J5 4J a a) a- 4

j 4I 4. 4 -, 4 C u 4 %44

0 * 0 0 0

0 0 . 0 . 0 . 0C i E (u >Eu A. .

oo to S (a toc Eu Eu E E Eu

> 0 .4 0) 4-) E Eu

4. -4 o o.-4 -4 cn4 L.4

J E O.04-2 a )4 0 r1 0 .X0 0·9-4 3E U4I-U - 0 *-4v o a 0 aE u

4)0 ( 4)0 w 0 to ) r- 0 4i s-I cn4> o O 4)Ec o Ia cn cn

E-. CeaO o C Cr O)V

APPENDIX IV APPENLIX IV

o

.4 1,-E

C -l i

M15 >'4.44 0 - I Q Ui *'-,. o o

3 00O

U)

U ,, U .H ,

Ut U U UI0C 0 0

o 0 0 0

a) M U

U-C : 0 :t .: C 4, . E0 1U) CV3 C CI -i

Or4 04'V'H to u M UD0 u 0 -4

-,- OOC . .4' C C -4' *- C ' ' C .,-4 4.,0 (Ui >v-. i -4 a) m U· tp 3. 4Uy a r wu ) w

4 4. 04-40 W 4-, C: .:> OC.-,-4 i C 4. U0E4 aU) 04 U . r -I U) , -V U)000-'( Uo C (> C.( O UCC 0 .uu L-

C C C C

94

APPENDIX IV APPENDIX IV

0 0

44. 0

-,-4

L4 C -4

1.4 -4 4 w ,-4 o CD

fi o W

>:) 4- 4 . 4.0 *-4 U U U

41 I

V0

__ EmC 0 I 0 0

o 0 .to

. c 0 01 U U)

4) ct 4) a)

Q f4 -. I q w 4 O r W fO'4 () O , N " * 1 1u C c tr 0e t 0 a X o *o 0 c c a) -1 -4 Y to

0 P4r.w C C C:

c - = M e E 4 4J I c u a4 v r c4 W

0 s 00 W 0 o 4J

W 4 ) 4 0 .4 I . 4 4 . .C= 44 1J C 0 4 0 * :J U .4.) 4

cOa -404.Ji a U 4C) c C c m 17 to I

0 4c c C-4 Y .a > E rm saj 0i r c c Di c c4 44)0 )-r 4) 0 -0 o *0 o 4 - cn * 0-, -4 0M *t-4 -0 0.- 4) c Ye . 4.-l w 4) a 0 q w 4 W -- : I 4) u 4 > c CE ) 0 0. -P4 1= : 4 U-- 0 CWC.Jll "'4 0 I -4 M 0 _ Ai

> t w > 0 C 4 > > 4- > >

C C C C

95

APPENDIX IV APPENDIX I\

* X o

V I t

· ,1

*.0 >0h( ·rl·W 4 4 0 .0 a~4) > >E 0 I

rI I

0 I - 0'· 0 ' 0 .r:. n 0 _-S 4. ) :: 4i 0

-4. 4J 0 O,- .. 0)

J- ) J " -J .J 4, , -

U L - Q)0- C & C u 0U

"-4 : -, .r -4 -

1a 0 a a

4J ~ °-(U -( " U: M 4 -(U . nO

._4 -- Ai a

04 U) > -q 0. U) U) U)

) u ,-m :) = 0 ) 0-, 4 > 4o C o > 4 U) o o C >l) ai

o*FC O C oo I 4- -4 0 - *

-J - L 4 aJ 0 . s 4-' X o @ : o Ea,, 4 U) 0) 3 > .- 4 a 4 4W V)

96

APPENDIX IV APPENDIX IV

4 wX -4.4W a E

o g:

ras ,,4

.-4 .-4t4C Q)

44 a4 ,

" a ) 0)

.:1) >E lo 4E

Z )~4-

ml :3 a) 0)

fi > > >

I O O O G

to .

4)W4 -)

( a a a>

0 '

U IV U)

· 4.. 4O

X X I 9l

I h I l I r -c: I a 1 C: C U · W C4 . :J C- q-, I 0-- .,C 4 I O D 13 .-

= 0 - 4 ~1 0; t; 0 0.4 0 C 3 0 .C v. O. 4.4 o 4 1 4

C) C _ > MCI a w l ) _L

m w w 4 a C c Q) C ) O t-9 W 44 tO ) CO QJ *1 4J 4 aJ> U 0 44 -- = W > > 4 4i W O > > · 4 4 O > W

APPENDIX IV APPENDIX IV

0 U ,- ,- ,- ,-

.- x

-'-

r-f tr

-4

·.4 .,-4ror

-.,

rtI= 0 0

C13 z

z

.- i. ->

*.I-4l~U 0)1 ,4 '" O O O-

E~~~~~ to to

0 .- 0 00

04

4I > >o 4i .0

Z La

c 0 0 0 0,"~ 0~ ¢, O~Z: ~V.~ O O~ t~0 ~0 -0

0~~~~~~~

ZILq

· 3 ~ a ' - ,~ O ~ ~-~~ ,' . t ,~, .r t

'U ·-I ·c U U U8U) C.) U C C C

0 .be 44 44 I-' -- f M

-. .0 w _. 0 .0c .0 M

' 4 ) l a) U)& ) J W -,dU 4 -U) Cl) U) 4) ('U m E 'Ur- 4 C -U 'u 'U -

m 0l ; tz w- )Q0: 3- 0 %1) 0-rqw l

La E

-' -'U ~ 4 J - 44 'U --U -, ' - o

Mw0N W 404MW M iMC 0 r4 n -4 - t O

Cl) 4) Uw ) U 5Z )0 4) rlU)0 w U)m

> '> IUt a c C >-l

C *-a~lW - I > aIU-

UCI 0- 04.4 0f0> -4C-'clta~~-~C~ CIO'C4 -ia 4)'

C.00 Cf4 i- COC.-C C

o~ ~ ~ 4) 0. 4) 0Ov UC- 'Uv *-W 4)C) '- '- *4) .. 'U -- ** .4~

OC 0 (0 .0 OC' o 4)

C ~ C Ct C: C r ·

-, I- p~4 E4 1-4ia Q-I · ccU~t ~i ac

r r~E ;I~Ea t ~ O3 ~·~ a~ r 98tc

APPENDIX IV APPENDIX IV

w w E4

..

I CC.,' .. ,

4 t,-4 (

lU 0 .,,0r4 0

t eo ocZ WI

1 0) 0 0 e 00 , >., . >

.0 E4 4) a 4.

0

: 0 0 0 C.)4)4)- -4 - I-. 04

Co Coo o o mC L

Cl Cm t) C C .

10 C0 Ma) t-e 0l 4 tlC.-_ C 4 4. A J . .0: W@ , a A

*-4 tO to Ca c O C O Cd l )

> u- > 0> 0r >

I a I I X ) OW m I c k c: c0 x4 0 0 )r Q · a

o, o 0~ Le 4)Lf 0 a f O) . o e n :C sC

O, C tOO X O 0 C 0 0 0 CQ

ast C) :n ,) "3 3a CL b. .c Cf l- C) W 8. C

APPENDIX IV APPENDIX IV

o C

.,O .,.,%+4

0w l m

.- x o o o o

'E oE-

Z:3 a4 -4 4. 4 CC D

c. CD

4 > '4> > > 0

a)U * C-i ®n u 3 u u ·

~ 04-')a

U)o o

a D a a a

C.' m m m m ma)a

,c C I I c I I0 I : O c' : 0 -,4 . 4C: I C I . C 44 U ' w U) -*' .4 -C ( c a o o C O ( L a . a) i a) co a)Cm V1 3 = C a N Q > D >C ) a u C 4 4) C C E E0 C eCO O E ~ .C -, * 0 O -, O( -V a e v . e a .,4*4. U) Li AU C w W 00 fx 4) U U) o M m O m tm _ 4v a t C ma O t a o X U Cl w W G C .-iC --4 *1. ) 0 0: V Q C M--4e t 0 4J 'C4 4w C C.4 U 4 4·W -4 ,-- 'O c " a 4 ) o * > P: c : O 4 C ~ 0 4 o-40 O 4v -,4 *4._ 4; 0 aW < ,4 4O C: t 4.c. 4 .- W -s = U '4 C ( U .4. U _I4 a ( : 3 :1 : 0, * t C ,.c ,-4 :J4J Q; Q a) a D a) 0 o

e « ~C-3 c )V .0 , 0 >o

100

APPENDIX IV APPENDIX IV

O , -O0V

%4

o C

4) C

':4 C -

o 4J - (cU 5 >

W. -,4 4 o oC

g Zi 0

V-4)CU Q4 -4

o 4

:3 · ~1 c) ~1 e-( o l a o -,Wt, U .v 0 . .i C

0 U -*si-4 -4 0 J .4 U3 Q . ' )

-41 H twC"'0 t w 4J i C --uC t co Vc *4 c o W o - w uv a

to e - O 1,.4 , ro4'J L)-.C u *-1 ->C C , : 0 .

4· ,4 ., C U) r. C4 '-I U 4J -- 0 ' O r0 4 M w C)0 , .4 LO u ' " .. : 4 vT.O r-l :e O U ON e C · O C._l ~ ~ @ · I~ ..4-.O O,--~ ~1 0 ~ II',~ m 0 O Oc '~ O'O e-

· 04 -- ) 0: V 4· Q 44 0 fo M a1 i 4 En o u uI I IC e I I I I I I I I

u E O 4W > 0 C a) x I I t il(I) C = 0 -a -4 -.-4 0 C) = 0)

a , rE --4 .n .U) 4 04 4J- ,

.-44J

0e00 I I

4 0 > '- U)0 f

,.4 ~- b O-,- ' I ~,

C

,..4 c9 ' ·W 4

U e o

It O ax (J ~a 9·lr c c a E'4Ii~r IL i~l 1L ·lr OOQra C 1aa~I~ uc ,oa~L taoa

4~4U) U 00Wa111\ctwar taoc c I(1C 0 S-1a U V~lo I l aC ~u , rUCEa crr r c ocrru , ,,,,,,000,~,,u a a~0~ a~U3~

la a a ~~OE~~~101

APPENDIX V APPENDIX V

C X f

· C oC: 0

."4

,4.,-4 o04e 0cD0

O 4C -4Q R Q %4 -H ,-4 M--4 W

0 (aruW4 W M W

L 0 4-) = 4J

.; . ,4 .,4 w 0) E s .u4J 4-4 4JJ0 o

U .4. >4-) > ' C

Cz *a -4 (4 :4 I , -I ,--H 4L' ..10 '" ' 4 .1 .

C 1 O-4 ) U L C)

~~Z H rl i4 ffi 4 z4 s~~~~~J to H (a H

) Va x OH x D I > 0 4 Ca x .

> H H 0,4 *H ,04 0 ::M 04 1 r

Ca v U ( CU) .a w & 1 CD W g C V to)

C -4 a) Cm0) a .) 4 - .w 'V 0n 040) e )

Z H .4 Po Lo '4H to '4 -. t -4 (a

C9 0) 4) a 0)1 0) C) ONC 4OCD q CD u

U 0) 0 () 0) m * *> c ( c

H CD )O :> 0)0)( OJ0) .- 1-a 4))4 0 U

UI J, ^ L~ C =-rl o 14 r- o a

$ U)40.a U) r Ha UC04 o u)

) C > m 4)

9-' -4 4 V~4 -40)i

4j u a) 4 0) U

u Ja 0-4 V(u IC, C~r4 *.4 4cD

E-a .4 I: .. 4. 4 *0 u 0

102

APPENDIX V APPENDIX V

0 4) to

.,4

0 C -4.Q 1 C)44-4 , -4 00 .4 .)

0 = > H "W g W @ O ' , O O ' O

44 4 - CD '.'v a) orE 4 r4-40IW4) 0 0 0 0) o 'Z 4) 0 4

Qw L4iZ O

U)

JJ V) %) 4 4) 4)CL) C C) C C

V CX EX CX .X CX

Co C ,> c> C H C,9

C -rl 0V 0-.q 0-rl 0-r0

4-C -C 4i C 4J C 4C

*94 w0 Li La 0 a0 -0.J. U . U ( Ut .

U) (% U m) r U) - U) 4 t) Ln*,4 4 C )r I cr- 4 ) a Ci' ) c

V-4 -4 ra -q V-94 Va '4C) 4) 4 4 4 ap

n u) aZ ) ! 3 > a a cr :3 0 4a an m

o 4

1 0 I 4 K

CrC) "4 4i 44>1 Ca-. 40 C) C) Li>C

o4) (a ·- u * Ea

-4 0rCt .,4 r-44 C - 4) C: w V

1 > l O .*C w

APPENDIX VI APPENDIX VI

tIiTED STAATES DEPARTMENT OF JUSTICE

WASHINGTON, D.C. 200

Addresl He:la to theDivislon Indicated

"d Rfr to Initial. and Numb. .b 977

Mr. Victor L. LoweDirectorGeneral Government DivisionUnited States General Accounting OfficeWashington, D.C. 20548

Dear Mr. Lowe:

This letter is in response to your request for com-ments on the draft report entitled "FBI Investigativeindexes--Action Needs to Be Taken To Be In ComplianceWith The Privacy Act Of 1974."

We are in general agreement with the findings andrecommendations contained in the report, which for themost part acknowledge the propriety of the FBI's inter-pretive position. We agree with ttn need for Congressto have a detailed knowledge of the FBI's indices andrecordkeeping practices in order to be in a positionto promulgate legislation in this area.

Initial implementation of the notice provisions ofthe Privacy Act proved to be extremely complex. The FBI,like other agencies, was required to commence implementa-tion prior to the issuance of the Office of Managementand Budget guidelines. Further, as the report indicates,the guidelines, when issued, left a large degree of dis-cretion with the agencies in implementing these pro-visions. Consequently, there was little guidance inanswering the threshold question -- "What is a systemof records?" However, with the Department's approval,the FBI's approach was to identify and publish all group-ings of records about individuals if the groupings con-tained information which was not retrievable from a searchof our Headquarters central index or the respective fieldoffice general indices.

104

APPENDIX VI APPENDIX VI

In carrying out this approach each FBI HeadquartersDivision was queried to ascertain whether such systemsexisted. The FBI specifically excluded those recordswhich were duplicative of information retrievable throughthe Headquarters general index. Field offices were notqueried, but by letter dated July 13, 1976, the fieldwas reminded that in accordance with standard existingFBI policy and regulations, no investigative records areto be maintained separately that cannot be accessedthrough the general indices. Additionally, as the reportnotes, during the past year the FBI Inspection Divisionhas been examining field office indices in light of thePrivacy Act. Because of the paucity of legislative history

and lack of specific implementation guidelines concerningthis area of the 'rivacy Act, the FBI welcomed this studyof its investigative indices and worked closely with GAO

in identifying problem areas with its implementation ofthe notice provisions.

To insure full compliance with the provisions ofthe Privacy Act, each field office is being furnisheda copy of the draft report with instructions to check

all indices maintained by them against the report andLo take one of the three options available to bring allirdizes into compliance with the Privacy Act. Similarly,

the Headquarters Divisions are receiving the same instruc-tions.

As indicated previously, we appreciate GAO's assis-tance in this endeavor to insure FBI indices are beingmaintained in full compliance with the Privacy Act andcommend the thoL3.-hness and objectivivy of the individ-uals from GAO involved in this study.

We also appreciate the opportunity given us to

comment on the draft report. Should you have anyfurther questions, please feel free to call us.

Sincerely,

Kevin D. RooneyAssistant Attorney General

for Administration

105

APPENDIX VII APPENDIX VII

PRINCIPAL OFFICIALS RESPONSIBLE

FOR ADMINISTERING ACTIVITIES

DISCUSSED IN THIS REPORT

Tenure of officeFrom To

DEPARTMENT OF JUSTICE

ATTORNEY GENERAL OF THEUNITED STATES:Griffin B. Bell Jan. 1977 PresentEdward H. Levi Feb. 1975 Jan. 1977

FEDERAL BUREAU OF INVESTIGATION

DIRECTOR:Clarence M. Kelley July 1973 Present

106