This is a graphic for ANSIR
This is a graphic for the National Security List
This is a graphic of a blue faded line
This is a graphic link to  ANSIR Advisories
This is a graphic link to Vulnerabilites
This is a graphic link to Espionage Techniques
This is a graphic for National Security List
This is a graphic link to ANSIR Homepage
This is a graphic link to FBI Homepage

The framework for the FBI's national security mission is set out in a strategy known as the National Security List (NSL). The NSL is composed of two related lists:

* Specific activities which trigger an FBI counterintelligence or counterterrorism response. These activities are set out on the unclassified issue threat list.

* Foreign powers that pose a threat to U.S. interests based on the aggressiveness and frequency of their involvement in activities on the issue threat list. This list is entitled the country threat list and is classified.

The NSL was developed in concert with the U.S. Intelligence Community and key elements of the U.S. Government. The issue threat list has eight categories of activities deemed to be significant threats to U.S. National security interests. The FBI will investigate such activities whenever identified.

The issue threats are: Terrorism | Espionage | Proliferation | Economic Espionage |
Targeting the National Information Infrastructure | Targeting the U.S. Government |
Perception Management | Foreign Intelligence Activities

A formal description of the elements which constitute the issue threats follow:

Terrorism

Terrorism is foreign power-sponsored or foreign power-coordinated activities that: involve violent acts, dangerous to human life, that are a violation of the criminal laws of the United States or of any State, or that would be a criminal violation if committed within the jurisdiction of the United States or any state; appear to be intended :

  • to intimidate or coerce a civilian population;
  • to influence the policy of a government by intimidation or coercion; or
  • to affect the conduct of a government by assassination or kidnapping; and
  • occur totally outside the United States or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum.

Espionage

Espionage concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments, or persons, which involves the identification, targeting and collection of U.S. National defense information.

Proliferation

Proliferation consists of foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments or persons, which involves:

  • the proliferation of weapons of mass destruction to include chemical, biological, or nuclear weapons, and delivery systems of those weapons of mass destruction; or
  • the proliferation of advanced conventional weapons.

Economic Espionage

Economic espionage concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments, or persons, which involves:

  • the unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic policy information, proprietary economic information, or critical technologies; or
  • the unlawful or clandestine targeting or influencing of sensitive economic policy decisions.

Targeting the National Information Infrastructure

This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments, or persons, which involves the targeting of facilities, personnel, information, or computer, cable, satellite, or telecommunications systems which are associated with the National Information Infrastructure. Proscribed intelligence activities include:

  • denial or disruption of computer, cable, satellite or telecommunications services;
  • unauthorized monitoring of computer, cable, satellite or telecommunications systems;
  • unauthorized disclosure of proprietary or classified information stored within or communicated through computer, cable, satellite or telecommunications systems;
  • unauthorized modification or destruction of computer programming codes, computer network databases, stored information or computer capabilities; or
  • manipulation of computer, cable, satellite or telecommunications services resulting in fraud, financial loss or other federal criminal violations.

Targeting the U.S. Government

Targeting the U.S. Government is foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments, or persons, which involves the targeting of government programs, information, or facilities or the targeting or personnel of the:

  • U.S. Intelligence community;
  • U.S. Foreign affairs, or economic affairs community; or
  • U.S. Defense establishment and related activities of national preparedness.


Perception Management

Perception Management is foreign power-sponsored or foreign power-coordinated intelligence activity directed at the U.S. Government or U.S. Corporations, establishments, or persons, which involves manipulating information, communicating false information, or propagating deceptive information and communications designed to distort the perception of the public (domestically or internationally) or of U.S. Government officials regarding U.S. policies, ranging from foreign policy to economic strategies.

Foreign Intelligence Activities

This final issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity conducted in the U.S. or directed against the United States Government, or U.S. Corporations, establishments, or persons, that is not described by or included in the other issue threats.