Laserfiche WebLink
Attachment C <br />Section 13 Terrorism Incident Prevention Equipment <br />AEL Ref No Title /Description Fall 2004 <br />SUM 1FTPPMMRSEAIPG SEL Ref Number <br />UAS/ <br />13.1 <br />WITH THIS STANDARD WILL BE ALLOWABLE.) <br />13.7 <br />Software, Data collection/ Information Gathering <br />❑O We <br />❑O <br />I1 <br />One -time or recurring fees for the use of commercial databases containing <br />13.2 <br />terrorist threat information. <br />Software, Data Synthesis <br />oWo❑ <br />ODP PREPAREDNESS OFFICER TO DETERMINE THE APPROPRIATE <br />ALLOWABLE COST CATEGORY FOR THESE PURCHASES.) <br />13.3 <br />Equipment, Law Enforcement Surveillance <br />V J❑ ❑J ❑ <br />Joint Regional Information Exchange System (JRIES) <br />000❑ <br />the prohibitions contained in Title III of the Omnibus Crime and Control and <br />Safe Streets Ad of 1968 (the "Wiretap Ad "), 18 U.S.C. §§ 2510 -2521. <br />13.4 <br />PIN Registers <br />❑d ❑,/ ❑� ❑ <br />System, Alert/Notification 04MA- 02 -ALRT <br />n ❑J <br />V <br />❑ <br />Alert and notification equipment that allows for real -time dissemination of <br />and Control and Safe Streets Act of 1968 (the "Wiretap Act "), 18 U.S.C. §§ <br />information & intelligence. Examples of this equipment include cellular <br />phones, pagers, text messaging, etc. <br />13.5 <br />Hardware, software and internet -based systems that <br />allow for information exchange and dissemination <br />❑O C7 <br />❑O <br />❑ <br />13.6 <br />Software, Facial Recognition 04SW- 02 -FACR <br />F/] Q <br />[I, <br />❑ <br />Facial recognition software for access control, Identification of criminal actors <br />(IFF), etc. <br />(NOTE: DHS has adopted INCITS 385 -2004, Information technology - Face <br />Recognition Format for Data Interchange. ONLY SOFTWARE COMPLIANT <br />Interactive versions of this appendix and the Fall 2004 SEL are available on -line at ww .rkb.mipt.org. <br />Wednesday, April 2 7, 2005 Full AEL: Page 64 of 79 <br />WITH THIS STANDARD WILL BE ALLOWABLE.) <br />13.7 <br />Fees for use of databases containing terrorist threat <br />information <br />0 0 0 ❑ <br />One -time or recurring fees for the use of commercial databases containing <br />terrorist threat information. <br />(NOTE: GRANTEES SHOULD COORDINATE WITH THEIR ASSIGNED <br />ODP PREPAREDNESS OFFICER TO DETERMINE THE APPROPRIATE <br />ALLOWABLE COST CATEGORY FOR THESE PURCHASES.) <br />13.8 <br />Equipment, Law Enforcement Surveillance <br />V J❑ ❑J ❑ <br />Surveillance equipment, including electronic equipment. Use is subject to <br />the prohibitions contained in Title III of the Omnibus Crime and Control and <br />Safe Streets Ad of 1968 (the "Wiretap Ad "), 18 U.S.C. §§ 2510 -2521. <br />13.9 <br />PIN Registers <br />❑d ❑,/ ❑� ❑ <br />Equipment capable of capturing incoming and outgoing phone numbers, <br />along with the duration of calls, without listening to the actual conversations. <br />Use is subject to the prohibitions contained in Title If of the Omnibus Come <br />and Control and Safe Streets Act of 1968 (the "Wiretap Act "), 18 U.S.C. §§ <br />2510 -2521. <br />Interactive versions of this appendix and the Fall 2004 SEL are available on -line at ww .rkb.mipt.org. <br />Wednesday, April 2 7, 2005 Full AEL: Page 64 of 79 <br />