Revealed – Top Secret – Terrorist Financing

Revealed – Top Secret – Terrorist Financing

Charlie Hebdo #1178-page-001

National Terrorist Financing Risk Assessment 2015

Page Count: 70 pages
Date: June 2015
Restriction: None
Originating Organization: Department of the Treasury
File Type: pdf
File Size: 1,425,075 bytes
File Hash (SHA-256): DDC42CE4FBD16

After the September 11, 2001 terrorist attacks, the United States adopted a preventive approach to combating all forms of terrorist activity. Efforts to combat the financing of terrorism (CFT) are a central pillar of this approach. Cutting off financial support to terrorists and terrorist organizations is essential to disrupting their operations and preventing attacks. To that end, the U.S. government has sought to identify and disrupt ongoing terrorist financing (TF) and to prevent future TF. The law enforcement community, including various components of the U.S. Departments of Justice, Homeland Security, and the Treasury, along with the intelligence community and the federal functional regulators, applies robust authorities to identify, investigate, and combat specific TF threats, enforce compliance with applicable laws and regulations, and prosecute supporters in order to deter would-be terrorist financiers. The U.S. Department of the Treasury (Treasury), which leads financial and regulatory CFT efforts for the U.S. government, employs targeted financial sanctions, formulates systemic safeguards, and seeks to increase financial transparency to make accessing the U.S. financial system more difficult and risky for terrorists and their facilitators. All of these efforts involve extensive international engagement to try to prevent any form of TF, particularly financing that does not necessarily originate in the United States, from accessing the U.S. financial system.

These efforts have succeeded in making it significantly more difficult for terrorists and their facilitators to access and abuse the regulated U.S. and international financial systems. At the time of the September 11, 2001 attacks, Al-Qaida (AQ) was relying on both a web of wealthy supporters that practically operated in the open and a financial system that let money for terrorists flow with minimal scrutiny. Operating such a financial network would be substantially more difficult today in the United States because of robust anti-money laundering (AML)/CFT standards. Additionally, several of the most significant sources of TF—such as the ability of terrorists to derive financial benefit through the control of territory—result from weak governance that the United States does not experience.

However, the threat from terrorism and terrorist financing is constantly evolving and requires adaptation by law enforcement, financial regulators, intelligence services, and policy makers. When examined over time, several fundamental lessons emerge: first, a wide range of terrorist organizations have sought to draw upon the wealth and resources of the United States to finance their organizations and activities; second, just as there is no one type of terrorist, there is no one type of terrorist financier or facilitator; and third, terrorist financiers and facilitators are creative and will seek to exploit vulnerabilities in our society and financial system to further their unlawful aims.

Thus, even with the safeguards described above, the U.S. financial system continues to face residual TF risk. The central role of the U.S. financial system within the international financial system and the sheer volume and diversity of international financial transactions that in some way pass through U.S. financial institutions expose the U.S. financial system to TF risks that other financial systems may not face. As Treasury Secretary Jacob Lew has observed, “The dollar is the world’s reserve currency and, for over 200 years, we have established ourselves as the backbone of the global financial system.” While U.S. counterterrorism (CT)/CFT efforts have resulted in better identification and faster action than prior to September 11, 2001, information obtained from financial institution reporting, TF-related prosecutions, and enforcement actions against financial institutions in the United States are powerful reminders of the TF risk that remains in the United States.

As described in detail in Section III, multiple terrorist organizations and radicalized individuals seek to exploit several vulnerabilities in the United States and in the U.S. financial system to raise and move funds, that despite ongoing efforts by the U.S. government to mitigate, still pose a residual risk of TF. Terrorist financiers use various criminal schemes to raise funds in the United States, and they continue to attempt to exploit the generosity of American citizens. Although coordinated law enforcement and regulatory efforts by the U.S. government, working with charitable organizations, has improved the resiliency of the charitable sector to abuse by TF facilitators, the large size and diversity of the U.S. charitable sector and its global reach means the sector remains vulnerable to abuse. A notable trend identified in the charitable sector involves individuals supporting various terrorist groups seeking to raise funds in the United States under the auspices of charitable giving, but outside of any charitable organization recognized by the U.S. government. Additionally, the growth of online communication networks, including social media, has opened up new avenues for terrorists and their supporters to solicit directly, and receive funds from, U.S. residents.


In order to operate, however, each of these groups requires significant funding. While the cost of an individual terrorist attack can be quite low, maintaining a terrorist organization requires large sums. Organizations require significant funds to create and maintain an infrastructure of organizational support, to sustain an ideology of terrorism through propaganda, and to finance the ostensibly legitimate activities needed to provide a veil of legitimacy for terrorist organizations. As deceased AQ financial chief Sa’id al-Masri put it: “without money, jihad stops.” Although financial activities can vary significantly among different terrorist groups, several areas of commonality exist.


a. Kidnapping for Ransom

Terrorist groups engage in a range of criminal activity to raise needed funds. Extensive revenue from kidnapping for ransom (KFR) and other criminal activities such as extortion have permitted AQ affiliates and other terrorist groups to generate significant revenue. KFR remains one of the most frequent and profitable source of illicit financing, and an extremely challenging TF threat to combat. The U.S. government estimates that terrorist organizations collected approximately $120 million in ransom payments between 2005 and 2012. In 2014 alone, ISIL acquired at least $20 million and as much as $45 million in ransom payments. In addition, AQAP, AQIM, and Boko Haram are particularly effective with KFR and are using ransom money to fund the range of their activities. Kidnapping targets are usually Western citizens of countries with governments that have established a pattern of paying ransoms, either directly or through third party intermediaries, for the release of individuals in custody. AQAP used ransom money it received for the return of European hostages to finance its over $20 million campaign to seize territory in Yemen between mid-2011 and mid-2012. AQIM is believed to have obtained a €30 million ransom payment in October 2013 for the release of four French hostages who worked for the French government-owned nuclear firm Areva. Also in 2013, Boko Haram kidnapped eight French citizens in northern Cameroon and obtained a substantial ransom payment for their release.  Similarly, Al-Shabaab-affiliated groups received an approximately five million dollar ransom in exchange for the release of two Spanish hostages who were kidnapped in Kenya in October 2011.

b. Extortion

The exploitation of local populations and resources has become a key revenue source for numerous terrorist groups worldwide. Pioneered by groups such as Hamas and Al-Shabaab, this form of pseudosovereignty-based fundraising has spread to other un- or under-governed territories around the world, most recently Iraq and Syria. Not only does territorial occupation allow for fundraising from the theft of natural resources, but it also creates the opportunity to extort, under the threat of violence, local populations and businesses and generate funds from the seizure of public utility services and their accompanying revenues. Unlike taxation by local governing authorities, whereby tax revenue is used to pay for basic public services, terrorist groups extort funds from local populations with minimal corresponding provision of services in exchange, and under the threat of physical harm for non-payment. For example, Al-Shabaab, Al-Nusrah Front (ANF) and ISIL are all able to leverage their occupation of territory and the threat of violence to extort funds from the local population, as well as conduct criminal activity such as robbery and trafficking in stolen goods. ISIL generates significant revenue, up to several million dollars per week, from the sale of stolen and smuggled energy resources it controls inside Iraq and Syria. ISIL also operates sophisticated extortion rackets throughout Iraq and Syria, including extracting payments for the use of public highways and cash withdrawals from banks by depositors in cities such as Mosul. Through these schemes, ISIL can receive upwards of several million dollars a month of revenue. Despite losing control of the port of Kismayo, which was its key revenue source, Al-Shabaab continues to generate at least hundreds of thousands of dollars per month, primarily through extortion and the threat of violence, in its remaining strongholds in southern Somalia. Similarly, Hamas can also raise revenue from control of border crossings and avenues of commerce, as well as businesses and local populations.

c. Drug trafficking and other criminal activity

In addition, various terrorist groups derive significant financial benefit from other criminal activities, including through drug trafficking. Both the Revolutionary Armed Forces of Colombia (FARC) and the Taliban have utilized drug trafficking operations to finance their terrorist operations. The Haqqani Network is also financed by a wide range of revenue sources including businesses and proceeds derived from criminal activities such as smuggling, extortion, and KFR in Afghanistan and Pakistan. Hizballah supporters are often engaged in a range of criminal activities that benefit the group financially, such as smuggling contraband goods, passport falsification, drug trafficking, money laundering, and a variety of fraudulent schemes, including credit card, immigration, and bank fraud. BSA reporting specifically implicates individuals currently being investigated by the FBI for ties to Hizballah and Hamas in a wide variety of money laundering activity within the U.S. financial system, most prominently trade-based money laundering (TBML) activities including through the export of used cars.



Secret Life Of Pets, Secret Service, Secret Garden, Secret World Legends, Secret Flying, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Squirrel, Secret Shopper, Secret Agent Man, Secret Admirer, Secret Aardvark, Secret Agent, Secret Annex, Secret And Lies, Secret Agent Man Song, Secret App, Secret Asian Man, Secret Agent Man Lyrics, Secretbuilders, Secret Book, Secret Beach Kauai, Secret Beach, Secret Ballot, Secret Box, Secret Beach Maui, Secret Bay Dominica, Secret Base, Secret Band, Secret Circle, Secret Church, Secret Caverns, Secret Classroom Superpowers, Secret Codes, Secret Clinical Strength, Secret Clearance, Secret Circle Cast, Secret Conversations Facebook, Secret Cameras, Secret Deodorant, Secret Definition, Secret Diary Of A Call Girl, Secret Door, Secret Deodorant Coupons, Secret Diary, Secret Deodorant Commercial, Secret Decoder Ring, Secret Daughter, Secret Door Lyrics, Secret Empire, Secret Extensions, Secret Escapes, Secret Empire #1, Secret Empire Reading Order, Secret Entourage, Secret Empire #0, Secret Empire #2, Secret Eaters, Secret Emoji, Secret Flying, Secret Forest, Secret Forest Ep 11, Secret Falls Kauai, Secret Flask, Secret Formula, Secret Facebook Group, Secret Frappuccino, Secret For The Mad Lyrics, Secret Falls, Secret Garden, Secret Garden Song, Secret Garden Movie, Secret Garden Cafe, Secret Garden Musical, Secret Garden Lyrics, Secret Garden Denver, Secret Garden Book, Secret Google Games, Secret Garden Miami, Secret Hitler Rules, Secret Hitler Game, Secret History Of Twin Peaks, Secret Hitler Online, Secret Hair Extensions, Secret Handshake, Secret History, Secret Hotel Deals, Secret Heart, Secret Hiding Places, Secret In Their Eyes, Secret In Spanish, Secret Ingredient, Secret Island, Secret In Their Eyes Cast, Secret Invasion, Secret In N Out Menu, Secret Invisible Solid, Secret Island In Texas, Secret In French, Secret Jardin, Secret Jewels, Secret Journal, Secret Jobs, Secret Jamaica, Secret Jieun, Secret Jardin Lodge, Secret Journey Police, Secret Journey To Planet Serpo, Secret Jardin Dr90, Secret Kpop, Secret Keeper Girl, Secret Keeper, Secret Key, Secret Korean Drama, Secret Knock, Secret Knowledge, Secret Krabby Patty Formula, Secret Key Starting Treatment Essence, Secret Kingdom, Secret Life Of Pets, Secret Life Of Bees, Secret Life Of Pets Cast, Secret Life Of The American Teenager, Secret Love Song, Secret Life Of Walter Mitty, Secret Lab Chair, Secret Life Of An American Teenager Cast, Secret Language, Secret Life Of Pets Imdb, Secret Menu, Secret Menu Items, Secret Mage, Secret Menu Starbucks, Secret Menu In N Out, Secret Messages, Secret Meaning, Secret Movie, Secret Mountain Fort Awesome, Secret Mage Deck, Secret Nails, Secret Nyc, Secret Netflix, Secret Nail Salon, Secret Names, Secret Netflix Codes, Secret Numbers, Secret News, Secret Nature From Jeju Peeling Gel, Secret Nation, Secret Of Mana, Secret Of Nimh, Secret Of The Snowy Peaks, Secret Of The Cedars, Secret Of Kells, Secret Of Evermore, Secret Of The Wings, Secret Of Moonacre, Secret Of Mana Rom, Secret Of Mana 2, Secret Pizza, Secret Police, Secret Project Robot, Secret Place, Secret Passion Fruit, Secret Power, Secret Passages, Secret Pizza Party, Secret Paladin, Secret Place Lyrics, Secret Quotes, Secret Question, Secret Quest, Secret Questions To Ask, Secret Questions To Ask Siri, Secret Quests Ffxv, Secret Quests Skyrim, Secret Qr Codes, Secret Questions To Ask Alexa, Secret Quote Spongebob, Secret Romance, Secret Resorts, Secret Recipe, Secret Rooms, Secret Rare Pokemon Cards, Secret Rainbow Hair, Secret Rare Ultra Ball, Secret Rendezvous, Secret Relationship, Secret Roku Channels, Secret Service, Secret Squirrel, Secret Shopper, Secret Societies, Secret Synonym, Secret Starbucks Menu, Secret Service Jobs, Secret Sandwich Society, Secret Sisters, Secret Shopper Jobs, Secret Treasures, Secret Treasures Sleepwear, Secret Tunnel, Secret Things, Secret Tunnel Song, Secret The Pierces, Secret Thesaurus, Secret Travel, Secret Treasures Bra, Secret To Success, Secret Underground Cities, Secret Us Weapons, Secret Underground Bases, Secret Universe Of Names, Secret Underground, Secret Underground Medicine, Secret Upgrades Office Space, Secret Us Bases, Secret Us Military Bases, Secret Unscented, Secret Variety Training, Secret Village Of The Spellcasters, Secret Video Recorder, Secret Variety Training Ep 2, Secret Vault, Secret Vault 81, Secret Veneers, Secret Voice Recorder, Secret Video, Secret Volume, Secret World Legends, Secret Window, Secret Wood, Secret Wars, Secret Wood Rings, Secret World Legends Release Date, Secret World Of Arrietty, Secret Weapon, Secret Wars 2015, Secret Warriors, Secret X Folder, Secret Xtians, Secret Xscape, Secret X Folder Comic, Secret X, Secret Xbox One Gamerpics, Secret Xtend, Secret Xbox One Games, Secret Xbox One Codes, Secret X Folder Webtoon, Secret Youtube, Secret Yeahu, Secret Yellowstone, Secret Young Justice, Secret Youtube Videos, Secret Yosemite, Secret Youtube Tricks, Secret Youtube Website, Secret Yumiverse, Secret Yosemite Spots, Secret Zoo Series, Secret Zoo, Secret Zoo Book, Secret Zinger, Secret Zombies Calling Card, Secret Zodiac Sign, Secret Zion Hikes, Secret Zone, Secret Zombies Challenge Infinite Warfare, Secret Zombie Challenge, Terror Financing In India, Terror Financing And Money Laundering, Terror Financing Definition, Terror Financing In Pakistan, Terror Financing And Demonetisation, Terror Financing, Terror Financing Unit Of The Treasury Department, Terror Financing Convention, Terror Financing Meaning, Terror Financing In Bangladesh, Terror Financing And Money Laundering, Terror Financing And Demonetisation, Iran Terror Financing And The Tax Code, Anti Terror Financing, Financing Terror Bit By Bit, Terror Financing In Bangladesh, Terror Financing Convention, Terror Financing Cases, Terror Financing Challenges, Terror Financing Channels, Counter Terror Financing, Combating Terror Financing, Cyber Crime Terror Financing, Terror Financing Definition, Terror Financing Department, Define Terror Financing, Terror Financing Essay, Terror Financing Expert, Fight Terror Financing, Fbi Terror Financing, Terror Financing To Top G7 Meeting Agenda, Terror Financing In Hindi, Terror Financing In India, Terror Financing In Pakistan, Terror Financing In Bangladesh, Terror Financing In Hindi, Isis Terror Financing, Iran Terror Financing And The Tax Code, Kuwait Terror Financing, Terror Financing Meaning, Terror Financing Methods, Terror Financing To Top G7 Meeting Agenda, Terror Financing Unit Of The Treasury Department, Financing Of Terror, Terror Financing Pakistan, Qatar Terror Financing, Terror Financing Risk, Saudi Terror Financing, Terror Financing To Top G7 Meeting Agenda, Hezbollah Financing Terror Through Criminal Enterprise, Terror Financing Unit Of The Treasury Department, Iran Terror Financing And The Tax Code, Terror Financing Unit Of The Treasury Department, Terror Finance Briefing Book, Terror Finance Blog, Terror Finance Watch List, Terror Finance, Terror Finance Tracking Program, Terror Finance Transparency Act, Terror Finance Networks, Qatar Terror Finance, Counter Terror Finance, Terror Threat Finance Course, Terror Finance Abroad Touches Thanksgiving At Home, Terror Finance Transparency Act, Iran Terror Financing And The Tax Code, Terror Finance Briefing Book, Terror Finance Blog, Financing Terror Bit By Bit, Terror Financing In Bangladesh, Terror Financing Convention, Terror Financing Cases, Terror Financing Challenges, Terror Financing Channels, Terror Threat Finance Course, Counter Terror Finance, Terror Financing Definition, Terror Financing Department, Terror Financing Essay, Terror Financing Expert, Terror Financing In Hindi, Terror Financing In India, Terror Financing In Pakistan, Terror Financing In Bangladesh, Terror Financing In Hindi, Iran Terror Finance Transparency Act, Iran Terror Finance Transparency, Kuwait Terror Finance, Terror Financing Meaning, Terror Financing Methods, Terror Finance Networks, Qatar And Terror Finance Negligence, Terror Financing Unit Of The Treasury Department, Terror Financing Pakistan, Terror Finance Tracking Program, Qatar And Terror Finance Part Ii, Prosper Terror Finance, Qatar Terror Finance, Terror Financing Risk, Us Terror Finance Rules, Qatar And Terror Finance Report, Stop Terror Finance, Terror Finance Tracking Program, Terror Finance Transparency Act, Terror Financing To Top G7 Meeting Agenda, Terror Threat Finance Course, Iran Terror Finance Transparency, The Terror Finance Blog, Turkey Terror Finance, Terror Financing Unit Of The Treasury Department, Us Terror Finance Rules, Terror Finance Watch List

The Most Influential People of All Time – The Secret List

The Most Influential People of All Time – The Secret List
Rank – Name – Year of Birth – Score
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 227
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35

    The Wright Brothers

  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48

    added by: Polar Bear

  49. 49
  50. 50



Secret Photos and Inside Viewws of the Scientology Headquarters “Gold Base”

Secret Photos and Inside Viewws of the Scientology Headquarters “Gold Base”


The international headquarters of Church of Scientology, also called the Gold Base or Int Base,1 is located on a 500-acre parcel of land in San Jacinto in Riverside County, California. The Church of Scientology purchased the site, a former resort used by celebrities, in 1978. Many of Scientology’s organizations are headquartered there, including the Religious Technology Center, the Commodore’s Messenger Organization International and Golden Era Productions. Golden Era Productions manufactures the E-Meter and produces and distributes all church audio-visual materials, both internal and promotional. The motif of the facility is designed to look like a Scottish castle, perhaps as a reference to one of Hubbard’s largest ideological inspirations Aleister Crowley. Like Mr. Crowley’s Boleskine House, which is located near Loch Ness, Scotland, Mr. Hubbard also refers to his house in a singular epithet “Bonnie View”. 2 The two facilities also share architectural similarities and the Boleskine House is considered to be of great importance in Thelema, Crowley’s own psuedo-religious magical organization.

Cine Castle

Scientology has a long, sometimes stormy history in the Inland area, dating to the 1960s, when the first mission opened in Grand Terrace. In 1974, the church opened a mission — then the largest worldwide — near University Avenue and Lime Street in Riverside, in what is now the Life Arts Center.

But Scientology’s largest presence here is the Gold Base — home to Golden Era Productions, where all the church’s training videos, books and audiotapes are made.

The compound is nestled against rolling green hills and bisected by winding, two-lane Gilman Springs Road. The movie studio is designed after a Scottish castle, with conical turrets and a sky-blue tiled roof.

Each of the three dozen buildings in the complex shares the motif. Flagstones line bright white exterior walls and gates are made of rough-hewn oak on wrought-iron hinges.

Fraser joked that people stop “about 50 times a day” just to ask what the place is.

The church bought the site, formerly a resort popular among Hollywood moguls, in 1978.

Golden Era’s high-tech studios produce 300 different videos, films and audiotapes a year for distribution worldwide, along with books, television commercials and E-Meters — the electronic devices used for personal counseling, an underlying feature of Scientology.

About 500 staff members live and work at the base, and another 100 or so non-Scientologists are employed there.

Photographs of Hubbard are everywhere, and several corridors are lined with signed photos of celebrity Scientologists, including John Travolta and Isaac Hayes.

Fraser said the site has hosted more than 100 fundraisers for local charities. She serves on the board of a youth museum, and another staff member is on the Hemet Public Library board and helped with a plan for San Jacinto’s Main Street.

Fraser gives free tours of Golden Era and has hosted Riverside County leaders. 3

Notable buildings and features in Gold Base include:4

Upper Villas—RTC offices and housing, where David Miscavige and other high level Scientologists live and work
BonnieView—L. Ron Hubbard’s fully-furnished mansion, still maintained and staffed in the belief that he will return in another body.
Cine Castle—main film studio in the shape of a castle, for producing church A/V materials
OGH buildings—Old Gilman House. Formerly “isolation” space for physically ill staff. Possibly now used for auditing or solo auditing.
Del Sol—CSI offices, and auditing rooms for staff.
Staff berthing—four buildings where staff live.
Qual Gold—Headquarters for Qual Sec, in charge of “quality control” as per the Hubbard organization policies. In practice this mostly means facilities staff auditing and training.
MCI—This large building is the staff dining hall, known as “Massacre Canyon Inn” from the building’s pre-Scientology name when the property was a resort.

Unusually Strong Security Measures at Gold Base

Gold Base has a number of unusually strong security measures, including razor-tipped fences, motion sensors, snipers nests and a large number of regular and infrared CCTV cameras. However, it is unclear whether the purpose of many of these security measures is to protect the base from outside threats or to keep unruly members inside the compound. The outer fences are lined with razors and motion sensors at regular intervals of approximately 20 ft. The facility also has infrared cameras, anti-protester speaker systems as well as floodlights arranged at regular intervals. There are are also “lookout posts” that are akin to snipers’ nests in the sides of the hills surrounding the complex.
Razor-tipped fences at Gold Base point both inward and outward.
Motion sensors are positioned at regular intervals along the outer fences of Gold Base.

Infrared cameras are positioned around Gold Base.

19625 Gilman Springs Road
Gilman Hot Springs, California 92583

Golden Era Golf Course
19871 Gilman Springs Road
San Jacinto, CA 92583-2105
(951) 654-0130

The large mansion at top right is L. Ron Hubbard’s former house “Bonnie View”.
Close up of L. Ron Hubbard’s former home. The Religious Technology Center Building is in the bottom right. David Miscavige’s office is located in the RTC building
Golden Era Productions and Golf Course. The building at right is “Building 36”. Building 36 contains the Gold Executives and administrative staff, marketing, and manufacturing.
Production studios for video and audio in upper portion of photo. Auditing rooms and “the Ranchos”, which are the book compilation, editing, design and typesetting units, are located to lower right. Flat-roofed building to the left is CMO International and Exec Strata are located in atemporary building, called “The Trailers”. In the nearby “200’s” are the offices of L. Ron Hubbard’s Public Relations staff and the LRH Biographer, Dan Sherman.
Cine Castle. “The Castle” is a large, state-of-the art sound studio for filming. It also has alarge area for set and prop construction and storage, costumes, and makeup.
Garage and motor pool at top. Massacre Canyon Inn is at lower right, where the staff eats, and where they have military-style “musters” three times a day.
The Running Program Track is used for punishment. The Rehabilitation Project Force uses the track to force offending members of the Sea Org to run consistently in circles, without stopping, for up to 12 hours at a time.

TOP-SECRET-Committee on National Security Systems Recommendations for Implementing FICAM on U.S. Secret Networks

TOP-SECRET-Committee on National Security Systems Recommendations for Implementing FICAM on U.S. Secret Networks


Download the original document below


Threats to Federal information systems are rising as demands for sharing of information and intelligence between Federal Departments and Agencies increase. It is essential that the Federal Government devise an approach that addresses both challenges without compromising the ability to achieve either objective. Developing a common governance framework and set of Identity, Credential, and Access Management (ICAM) capabilities that enhance the security of our systems by ensuring that only authorized persons and systems from different Federal components have access to necessary information is a high priority. The Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance was developed to address the need for secure information sharing capabilities across the breadth of the Federal Government.

A recent gap analysis conducted to determine gaps between the current state of the Secret Fabric and FICAM revealed substantive differences between levels of adoption of this framework and served as the catalyst for this document. In addition to varying levels of FICAM maturity, the gap analysis also showed significant variations in levels of sharable information, connectivity, and governance structures which further complicate the aim of a common FICAM framework across the Secret Fabric.

Using the gap analysis as a starting point, this document provides four major recommendations:

Establish and Empower a Governance Structure for ICAM on All Networks
 Develop a Common Interoperable ICAM Architecture for the Secret Fabric
 Transition to a Common Interoperable ICAM Architecture
 Prepare for the Evolution of ICAM on the Secret Fabric as New Technology Emerges and New Mission and Business Needs Arise

The following progress chart summarizes the recommendations with objective end states and suggested activities required to accomplish the objectives along a snapshot of status of ICAM on the Secret Fabric as of the publication date of this document. These recommendations, objectives and activities will be included in the FICAM Implementation Plan for the Secret Fabric currently under development by the National Security Systems (NSS) Identity and Access Management (IdAM) Working Group under the guidance of the Program Manager for the Information Sharing Environment (PM-ISE).