OIG IA Redacted Jan 6 Intel Report March 10 2022
OIG IA Redacted Jan 6 Intel Report March 10 2022
OIG IA Redacted Jan 6 Intel Report March 10 2022
Threats prior to
January 6, 2021,
but Did Not Issue Any
Intelligence Products
before the
U.S. Capitol Breach
(REDACTED)
March 4, 2022
OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
I&A Response
I&A concurred with all five recommendations. We
consider them resolved and open.
www.oig.dhs.gov OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Table of Contents
Background .................................................................................................... 3
Recommendations......................................................................................... 30
Appendixes
Appendix A: Objective, Scope, and Methodology ................................. 35
Appendix B: I&A Comments to the Draft Report................................... 37
Appendix C: Organizational Chart of Relevant I&A Offices ................... 43
Appendix D: Appendix E ...................................................................... 44
Appendix E: I&A Timeline Related to January 6 Events....................... 47
Appendix F: Appendix E....................................................................... 49
Appendix G: Appendix F ...................................................................... 50
Abbreviations
CETC Current and Emerging Threats Center
CTMC Counterterrorism Mission Center
FBI Federal Bureau of Investigation
FIR Field Intelligence Report
FOD Field Operations Division
HSIN Homeland Security Information Network
I&A Office of Intelligence and Analysis
IC Intelligence Community
IIR Intelligence Information Report
ILD Intelligence Law Division
IOO Intelligence Oversight Officer
www.oig.dhs.gov OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Background
1 The events occurred on November 14, 2020, and December 12, 2020. For the November 14,
2020 instance, see Arrests Made in an Aggravated Assault Offense: 1700 Block of I Street,
Northwest, Metropolitan Police Department (Nov. 15, 2020).
https://mpdc.dc.gov/release/arrests-made-aggravated-assault-offense-1700-block-i-street-
northwest. For the December 12, 2020 instance, see Additional Arrest Made and Suspects
Sought in an Assault with a Dangerous Weapon (Knife) Offense: 500 Block of 11th Street,
Northwest (Dec. 14, 2020). https://mpdc.dc.gov/release/additional-arrest-made-and-
suspects-sought-assault-dangerous-weapon-knife-offense-500-block.
2 See for example, Marrisa Lang, Trump supporters plan D.C. rally on day Congress certifies
events; the two other reviews pertain to DHS law enforcement agencies planning and response
efforts. The OIGs for the Departments of Defense, Interior, and Justice also have initiated
reviews of their respective agencies activities relating to January 6 events.
4 This report defines January 6 events as any event, activity, or gathering, whether formal or
informal, permitted or unpermitted, taking place in Washington, D.C., related to the January 6,
2021 certification of Electoral College votes by the U.S. Congress. We used this definition when
asking I&A employees about intelligence preceding the events at the U.S. Capitol.
www.oig.dhs.gov 3 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
I&As intelligence products are governed by IC-specific laws and directives and
I&A internal standards. Under Executive Order 12333, I&A is restricted to
collecting overtly or through publicly available information, 8 and may analyze
and disseminate information and intelligence to its partners to support its
national and departmental missions. 9 According to I&As Intelligence Oversight
Program and Guidelines (I&A Guidelines),10 national missions are those that
protect the United States national interests from foreign security threats, while
departmental missions assist DHS or other Federal, state, local, or private
sector partners in measures regarding threats to homeland security.
Specifically, departmental missions include domestic terrorism, critical
infrastructure and key resources, and efforts that support
any
departmental officials, offices, or elements in the execution of their lawful
missions.11
I&A is led by the Under Secretary for Intelligence and Analysis and Principal
Deputy Under Secretary. I&As Intelligence Enterprise Operations is led by a
Deputy Under Secretary, who oversees eight offices, including five mission
centers that focus on different threat areas. I&As Intelligence Enterprise
Readiness is also led by a Deputy Under Secretary, who oversees areas such as
5 See https://www.intelligence.gov/how-the-ic-works.
6 6 United States Code (U.S.C.) § 121(d)(1) and 6 U.S.C. § 121(d)(6).
7 Other IC agencies are also authorized to share information, including threat-related
www.oig.dhs.gov 4 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Our review identified three offices that conducted work related to the January 6
events: the Current and Emerging Threats Center (CETC), Counterterrorism
Mission Center (CTMC), and Field Operations Division (FOD).
Current and Emerging Threats Center: CETC provides indication and warning
of threats directed against the United States through the collection, analysis,
and dissemination of intelligence and information 24 hours a day, 7 days a
week. CETCs Open Source Collection Operations branch (OSCO) is the lead
for identifying and reporting threats made online via social media and through
other sources of publicly available information. OSCO collects threats based
on intelligence requirements developed by the IC or Department 12 and provides
lead information for law enforcement entities across the country. OSCOs open
source collectors often conduct their online searches after receiving requests
for information (RFI) or tips about online threats from other I&A offices.
After identifying possible threat information, the I&A Guidelines provide the
procedures for collecting, retaining, and disseminating the information. On
July 13, 2018, DHS Associate General Counsel for Intelligence issued a
memorandum (DHS Memorandum) that instructs I&A personnel on how to
further apply these procedures when collecting and reporting on social media
and other publicly available sources.13 According to the DHS Memorandum,
open source collectors may report information in intelligence products when
they have a reasonable belief that the information:
www.oig.dhs.gov 5 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
When OSCO reasonably believes the information meets the I&A Guidelines for
dissemination, it concludes the information meets its reporting threshold and
drafts an open source intelligence report (OSIR). OSIRs contain raw,
unevaluated open source information and do not include analysis.
According to I&As internal processes, at least one other collector must conduct
a peer review of an OSIR before the drafter submits it to a senior collector and
ultimately an OSCO supervisor for additional review and approval. The
reviewers can provide an opinion on whether the information in the OSIR meets
I&As reporting threshold. When disagreements occur during the review
process, the drafter may contact DHS Office of General Counsel (OGC)
Intelligence Law Division (ILD)16 to receive a legal opinion on whether the
information meets the I&A Guidelines.
On October 30, 2020, the I&A Acting Under Secretary issued guidance
implementing further review of certain OSIRs before dissemination. 17
According to the guidance, all OSIRs related to the 2020 presidential election
had to be reviewed and cleared by both ILD and I&As Intelligence Oversight
Officer (IOO).18 After all reviews are complete, OSCO publishes the OSIR on
the Homeland Security Information Network (HSIN), DHS official system for
sharing unclassified information with state, local, and other partners.
15 I&A Guidelines.
16 OGC consists of attorneys and staff working in operational components and headquarters
offices, including I&A. ILD advises I&A on legal issues associated with departmental and
national intelligence activities.
17 Temporary Procedures for Review of Civil Unrest and Certain Election-Related Raw
www.oig.dhs.gov 6 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
FOD provides OSCO tips relating to online threat information, which FOD
might receive from state, local, and other partners. OSCO either produces an
OSIR on the information or tells FOD the information does not meet its
reporting threshold. In addition, FOD can draft its own intelligence products,
including Field Intelligence Reports (FIR) and Intelligence Information Reports
(IIR). Similar to OSIRs, FIRs and IIRs are raw intelligence products that record,
but do not analyze, the identified information. FIRs meet DHS intelligence
requirements and are published via HSIN, while IIRs meet IC intelligence
requirements and may be published on HSIN or a classified system depending
on their classification.20
During the summer of 2020, I&A produced open source intelligence reporting
in response to civil unrest in Portland, Oregon. 21 However, I&A faced criticism
19 Fusion centers serve as focal points in states and major urban areas for the receipt,
analysis, gathering and sharing of threat-related information between State, Local, Tribal and
Territorial (SLTT), federal and private sector partners. https://www.dhs.gov/fusion-centers.
20 DHS intelligence requirements may not align with IC intelligence requirements. For
example, information about domestic terrorism or a threat to U.S. critical infrastructure may
meet a DHS intelligence requirement but not an IC intelligence requirement. In this instance,
FOD could write an FIR about the information, but not an IIR.
21 For other OIG work related to DHS response to civil unrest in Portland, Oregon, see
Management Alert FPS Did Not Properly Designate DHS Employees Deployed to Protect Federal
Properties under 40 U.S.C. § 1315(b)(1), OIG-21-05, Nov. 2, 2020, and DHS Had Authority to
www.oig.dhs.gov 7 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Results of Evaluation
In the weeks before the events at the U.S. Capitol, I&A identified specific open
source threat information related to January 6 but did not issue any
intelligence products about these threats until January 8. 23 Within OSCO,
staff collected open source threat information but did not produce any
actionable information. This resulted, in part, from inexperienced collectors
who received inadequate training and did not fully consider I&A Guidelines for
reporting threat information. Collectors also described hesitancy to report
information following scrutiny of I&As actions in Portland, Oregon, in the
summer of 2020. Although an OSCO collector submitted one product for
review on January 5 regarding possible violence, I&A did not distribute the
product until 2 days after the events at the U.S. Capitol. Additionally, CTMC
identified indicators that the January 6 events might turn violent but did not
issue an intelligence product outside I&A, even though it had done so for other
events. Instead, CTMC identified these threat indicators for an internal I&A
leadership briefing, only. Finally, FOD considered issuing intelligence products
on at least three occasions prior to January 6 but ultimately did not
disseminate any. It is unclear why FOD chose not to move forward with
issuing an intelligence product.
Although I&A did not disseminate any related intelligence products prior to
January 6, it emailed threat information to its local partners in the
Washington, D.C. area on several occasions. However, this information was
emailed to select partners and was not as widely disseminated as I&As typical
Deploy Federal Law Enforcement Officers to Protect Federal Facilities in Portland, Oregon, but
Should Ensure Better Planning and Execution in Future Cross-Component Activities, OIG-21-31,
Apr. 16, 2021.
22 An August 3, 2020 letter from the Permanent Select Committee on Intelligence, U.S. House
of Representatives, to DHS Acting Secretary Chad Wolf and Acting Under Secretary for
Intelligence and Analysis Brian Murphy, states, [a]ccording to press reports, I&A engaged in
intelligence collection and reporting on journalists and non-violent protestors.
https://intelligence.house.gov/uploadedfiles/20200803_chm_letter_to_murphy_wolf_re_civil_li
berties.pdf.
23 See Appendix E for a timeline about I&As work related to January 6 events between
www.oig.dhs.gov 8 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
intelligence products. As a result, I&A was unable to provide its many state,
local, and Federal partners with timely, actionable, and predictive intelligence.
OSCO collectors received an RFI and open source tips about January 6 events,
and identified specific threats about storming the U.S. Capitol and targeting
law enforcement. However, the collectors did not produce any actionable
intelligence products because they received inadequate training and did not
fully consider the I&A Guidelines for reporting threat information. They also
described hesitancy to report information following scrutiny of I&As actions in
Portland, Oregon. Although an OSCO collector submitted one product for
review before January 6, I&A did not distribute the product until January 8.
OSCO Received an Urgent RFI Related to the January 6 Events and Began
Tracking Relevant Threats
On December 29, 2020, CTMC sent OSCO an RFI for threat information
regarding January 6 events, such as:
The RFI listed the U.S. Capitol Police, the United States Secret Service, and
other Federal, state, and local partners as intended recipients of the
information. The CTMC intelligence analyst who drafted the RFI said he
expected OSCO to post OSIRs about January 6 threats on HSIN, where the
intended recipients could access them.
In the email transmitting the RFI, CTMC informed OSCO that this was an
urgent request. Within the RFI itself, CTMC explained the information would
www.oig.dhs.gov 9 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
After receiving the RFI, seven OSCO collectors researched possible threats to
January 6 events and recorded their findings in a document tracking threats
responsive to CTMCs request. Between December 29, 2020, and January 3,
2021, five of these collectors identified comments referencing using weapons
and targeting law enforcement and the U.S. Capitol building. They also noted
some individuals claimed they would sacrifice themselves in the ensuing
violence. Table 1 provides excerpts from OSCOs document tracking January 6
threats in response to the RFI. See Appendix D for all January 6 threats
documented by these five collectors.
We did not locate any evidence that the five collectors drafted an OSIR about
any of the threats recorded in their document.
OSCO Received Open Source Tips about January 6 Threats from FOD
In addition to the RFI from CTMC, OSCO also received tips about online
threats from FOD. However, OSCO did not produce any OSIRs based on FODs
tips about January 6 threats.
www.oig.dhs.gov 10 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
On December 21, 2020, FOD shared a tip 24 with OSCO about an individual
who threatened to shoot and kill protesters at the upcoming rallies related to
the presidential election.25 According to the tip, as shown in Figure 1, the
individual informed members of an online discussion group that he planned to
kill at least 50 individuals.
Source: I&A
Later that day, an OSCO collector told FOD that she could not locate the
, and that OSCO had to
. However, FOD never responded, and on December 31, 2020,
the FOD member acknowledged to a colleague that the email from OSCO
slipped away from her. OSCO did not draft an OSIR based on this tip.
On January 5, 2021, FOD provided a tip to OSCO about a social media user
calling for people to come to Washington, D.C., to counter the protests and
stated, Following the tip,
OSCO researched the social media account and informed FOD it was unable
to find any derogatory information.
On January 6 at 11:29 a.m., FOD provided a tip about a social media user
claiming the Proud Boys planned to shut down the Washington, D.C. water
system, as shown in Figure 2. At 2:53 p.m., shortly after the U.S. Capitol
24 FOD received the tip from the SITE Intelligence Group, a non-governmental organization that
tracks online activity of terrorist and violent extremist groups.
25 FOD also considered drafting an intelligence product about this threat, as discussed later in
this report.
26 Figure 1 and other figures in this report redact certain information to protect online
related to the 2020 U.S. Presidential election in Washington, D.C., on November 14, 2020, and
December 12, 2020.
www.oig.dhs.gov 11 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
breach, OSCO notified FOD that this information did not meet its reporting
threshold.
Source: I&A
On January 6 at 11:32 a.m., FOD provided two additional tips about threats to
Washington, D.C. Both tips referenced
as shown in Figure 3.
Source: I&A
www.oig.dhs.gov 12 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
We found no evidence that OSCO informed FOD whether these two tips met
I&As reporting thresholds.
Source: DHS
28 During a surge, I&A asks OSCO collectors to work extra hours to respond to crises.
www.oig.dhs.gov 13 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Source: DHS
Source: DHS
These two collectors continued to discuss their view that the threats were
unlikely. Although one collector suggested he could be proven wrong, they
did not consider issuing OSIRs about the possibility of these threats occurring.
www.oig.dhs.gov 14 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
D.C. area. One OSCO member told us that they were clearly concerned and
told each other to stay safe throughout the week. Others told each other they
would stay home on January 6 to avoid potential violence.
OSCO Did Not Issue Any OSIRs about January 6 Threats before the U.S.
Capitol Attack
OSCO rapidly hired inexperienced open source collectors in the months leading
up to January 6, 2021. When OSCO switched to a 24 hours per day schedule
in the summer of 2019, with shift changes at 5 a.m., 1 p.m., and 9 p.m., many
collectors left. OSCO began hiring new collectors, mostly at entry level
positions, with many not having Federal government or intelligence experience.
As of January 6, 2021, 16 out of 21 collectors had less than 1 year of
experience, and some of these new collectors said they did not receive adequate
training to help determine when threat information should be reported.
Following the hiring process, I&A did not offer any training courses designed
for OSCO collectors. Instead, collectors trained informally by working
alongside colleagues with more experience. Several collectors described this
approach as insufficient, with one collector calling it haphazard and not
organized, and another saying it should not have been considered training at
all. This informal training was even more limited during the COVID-19
pandemic, when new collectors could only come to the office part time and had
www.oig.dhs.gov 15 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
fewer opportunities to work with their colleagues during shifts. I&A also
instructed new collectors to take online training courses, but these courses
were not developed specifically for I&A collectors conducting open source
intelligence.
Certain collectors told us they were still unsure about when information should
be reported following the more formal training. For example, one collector said
the formal training did not define reporting thresholds sufficiently, which
caused confusion during the OSIR peer review process. Another collector said
the training could have provided better direction to OSCO members. She
added that although a training instructor said collectors could contact ILD
when they have a question about a reporting threshold, she was also aware
that ILD did not operate on a 24 hours per day schedule and may not be
available when OSCO members have a question. However, during the election
period, ILD expanded its operating hours and remained on call to answer
collectors questions.
I&A leadership expressed concerns the day before the U.S. Capitol breach that
experienced instructors were not leading OSCOs training. On January 5,
2021, the Acting Deputy Under Secretary for Intelligence Enterprise Operations
wrote to other senior I&A officials, I dont feel comfortable having CETC
continue to be the [primary] leader of this training.
www.oig.dhs.gov 16 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Source: DHS
www.oig.dhs.gov 17 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
The collector and others on her shift initially agreed that this information
met I&As reporting threshold. However, the collector was nearing the
end of her shift and did not think she had time to draft an OSIR.
Instead, she emailed the screenshots to collectors on the next two shifts
so they could consider disseminating an OSIR about these threats. The
next shifts collectors decided the information was hyperbole and
recommended against dissemination. One collector responded, [s]ome
posts either appeared hypothetical, vague, or hyperbolic, while other
posts were not specific enough to meet OSIR threshold. After a
supervisor also said he did not think the information was reportable, the
collector refrained from drafting an OSIR on the threats.
Overall, open source collectors explained to us that they did not think storming
the U.S. Capitol was possible, and, therefore, they dismissed this specific type
of threat as hyperbole. For example, two collectors said this type of threat
online was common and doubted the legitimacy of the threat prior to January
6. Another collector said OSCO did not think anyone would be able to breach
the U.S. Capitol, but unfortunately, OSCO was wrong. As a result, despite
several collectors documenting threats to storm the U.S. Capitol building, they
concluded that they could not report it to I&As state and local partners.
www.oig.dhs.gov 18 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
The I&A Guidelines allow open source collectors to report information that
enhances I&As understanding of known threat actors, even if the information
does not include true threats or incitement. ILD explained to us that a known
threat actor is a group that has been the subject of previous intelligence, and
I&A could conduct more expansive collection about information relating to
these groups. One collector did identify online posts about January 6 events
by the Proud Boys, a known threat actor. However, a colleague reviewing the
information said,
DHS Memorandum
I&A may also report information about a risk of violence during a heightened
threat environment, even if the information does not include true threats or
incitement. Prior to January 6, other I&A offices issued intelligence products
warning of a heightened threat environment because of domestic extremist
threats.29 However, I&As Acting Deputy Under Secretary informed us that
OSCO was not operating under a heightened threat environment at the time.
According to the Acting Deputy Under Secretary, operating under a heightened
threat environment would have lowered the reporting threshold to make it
easier to disseminate information at a time when attacks may occur with
minimal or no advanced warning.
29 According to the March 3, 2021 testimony by the Acting I&A Under Secretary, I&A issued
more than 15 warnings to its Federal, state, and local partners about the heightened threat
from domestic extremists before January 6.
www.oig.dhs.gov 19 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Scrutiny of OSCO Collectors Work during Prior Civil Unrest Affected Their
Approach to Reporting Threats for January 6
OSCO staff shared with each other their hesitancy to collect information on
January 6 events because of the scrutiny they previously received. On
December 24, 2020, two collectors discussed protestors planning to bring
weapons to Washington, D.C. on January 6. The collectors mentioned a third
collectors concern for sharing this information within I&A because of
to which the other collector responded:
www.oig.dhs.gov 20 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
When we asked the Acting Deputy Under Secretary about the change in CETCs
approach to reporting, she noted that there was different leadership for the
summer of 2020 compared to January 6, 2021. 30 She said the prior leadership
pushed collectors to report on anything related to violence, including potential
threats or tactics and techniques used by individuals that may be associated
with violence. In contrast, the new leadership encouraged collectors to issue
intelligence reports on threats only when they were confident the threats were
real. The Acting Deputy Under Secretary said this change in direction went too
far and caused collectors to institute a very high threshold for reporting
information.
Although OSCO did not disseminate an OSIR prior to the U.S. Capitol breach
on January 6, we found an instance in which it did release one product related
to that days events. However, the OSIR was not disseminated until 2 days
after the breach, rendering it useless for the purposes of advanced warning.
On January 5, an OSCO collector identified a potential threat of violence
related to January 6 events and concluded it met I&A Guidelines. Specifically,
the open source collector discovered a about an individual
arriving in the Washington, D.C. area and searching for a location for armed
individuals to park their cars. The individual previously posted online that he
would arrive in the area and he
was Washington, D.C.
After the collector drafted an OSIR about the threat, another OSCO collector
performed the peer review on January 5 and said the information did not meet
reporting thresholds because it only contained hyperbolic information.
However, at the request of the OSIR drafter, ILD agreed to review the product.
ILD spoke with the OSIR drafter on the phone on January 5, informed the
OSIR drafter that the information contained in the OSIR met I&As reporting
guidelines, and summarized this phone call in an email to the drafter, another
collector, and OSCO supervisors on January 6 at 12:16 a.m. ILD outlined how
the information
30DHS replaced I&As Under Secretary on August 1, 2020. In November 2020, I&A hired a
new CETC Director and moved the former CETC Director to the role of Deputy Director.
www.oig.dhs.gov 21 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
According to ILD:
After ILD cleared the product, OSCO supervisors did not request IOO review
and clearance (as required for election-related raw intelligence) until about 15
hours later at 5:22 p.m. on January 6, after the U.S. Capitol breach. 31 We
found no evidence that OSCO supervisors took any action regarding the OSIR
during the intervening 15 hours, and it is unclear why OSCO waited until after
the U.S. Capitol breach to ask the IOO for the review. After receiving OSCOs
request for review, the IOO consulted with ILD and other intelligence oversight
partners and also provided clearance for the dissemination of the product on
January 7.
On January 8, before publishing the product, OSCO once again asked ILD and
the IOO to review the product before dissemination. In response, ILD
expressed confusion at OSCOs repeated requests to review the product before
dissemination. ILDs email states:
31 Rioters breached the U.S. Capitol building at approximately 2:15 p.m. ET.
www.oig.dhs.gov 22 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Although the OSCO collector drafted the OSIR on January 5, the day before the
U.S. Capitol breach, the OSIR was not finalized and disseminated until
January 8, 2 days after the breach. Table 2 shows a timeline of the drafting
and dissemination process for the OSIR.
www.oig.dhs.gov 23 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
On January 4, 2021, the Acting Deputy Under Secretary tasked CTMC with
analyzing indicators of potential protest-related violence in Washington, D.C.
In its analysis, CTMC identified seven observed or partially observed indicators
of potential violence associated specifically with the protests planned for
January 6. For example, CTMC determined that an indicator about event
organizers calling for protesters to bring weapons was observed, and referenced
six media articles about the January 6 events. However, this analysis was
intended for an internal briefing only and not for a published product. CTMC
briefed I&A leadership and the DHS Deputy Secretary on these indicators on
the morning of January 6; the product was not disseminated more widely on
HSIN or outside DHS in any other manner.
32 CTMC determines indicators are partially observed when it discovers relevant but vague and
non-specific information.
33 In addition, CTMC published two probable indicator products after January 6. On January
14, 2021, CTMC published a product about possible protest-related violence in Washington,
D.C. leading up to and on Inauguration Day. On February 11, 2021, CTMC published a
product about possible violence in the Washington, D.C. area, including violence unrelated to
protest activity.
www.oig.dhs.gov 24 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
34 In Table 3, observed indicators of possible violence are indicated in red; partially observed
indicators of possible violence are indicated in orange; and non-observed indicators of possible
violence are indicated in yellow.
www.oig.dhs.gov 25 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
We asked the Acting Deputy Under Secretary why the January 6 analysis was
not disseminated as the Portland product had been. She said she did not ask
CTMC to issue a probable indicator product before the January 6 events
because there was not enough time. She explained that she tasked CTMC to
conduct this analysis 2 days before the events, and I&A cannot publish a
CTMC product within that timeframe. In light of this time constraint, the
Acting Deputy Under Secretary said she tasked CTMC with this assignment to
ensure it was prepared to brief leadership about the threats, rather than to
disseminate a product.
During our interviews, some I&A employees discussed how products that
provide indicators or warnings about upcoming threats can be helpful to state
and local officials. One FOD member assigned to the Mid-Atlantic Region
reviewed CTMCs indicator analysis prior to January 6 and said this
information would have been incredibly helpful. However, CTMC did not
place this analysis in a final product for dissemination to local officials before
the U.S. Capitol breach.
35 CTMC explained that while this is not a requirement, it is considered good intelligence
tradecraft for producing analytic intelligence reports.
www.oig.dhs.gov 26 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
The FOD member informed his supervisor the following day that FOD
leadership recently placed a hold on all FIRs. FOD drafts and posts FIRs on
unclassified systems. However, FOD leadership became concerned about
possible security compromises affecting unclassified systems after the 2020
SolarWinds Orion security breach.37 As a result, FOD leadership advised that
issuing IIRs on a classified system may continue while pausing production of
FIRs and IIRs on HSIN.
IIRs must meet IC intelligence requirements, which may not align with the DHS
intelligence requirements for FIRs. 38 A FOD member informed his supervisor
that a colleague would conduct research to determine whether one of the
36 As previously noted, FOD sent this tip to OSCO (see Figure 1). OSCO asked a question
about the tip, but FOD never responded.
37 According to DHS Cybersecurity and Infrastructure Security Agency, an advanced
persistent threat (APT) actor added malicious code to multiple versions of the SolarWinds Orion
platform and leveraged itas well as other techniquesfor initial access to enterprise networks
of U.S. government agencies, critical infrastructure entities, and private sector organizations.
https://www.cisa.gov/sites/default/files/publications/CISA_Insights_SolarWinds-and-AD-
M365-Compromise-Risk-Decisions-for-Leaders_0.pdf.
38 If information meets a DHS intelligence requirement but not an IC intelligence requirement,
FOD can write an FIR about the information but not an IIR.
www.oig.dhs.gov 27 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Yet, we found no evidence the FOD member who received the IIR via email
reviewed the product at any point, and he informed us he did not remember
what happened to the draft after he received it. Similarly, the IIR drafter did
not remember what happened to the product. She initially told us that she
might have shared the IIR with a senior FOD official to determine whether it
matched IC requirements, but she could not locate any documentation
confirming she shared it with this official or any additional individuals.
39 FOD also sent a tip with this information to OSCO. However, as previously discussed, an
OSCO collector told FOD that she could not locate the threat online and that OSCO had to
locate it before reporting on it. FOD never responded, and OSCO did not draft an OSIR based
on this tip.
www.oig.dhs.gov 28 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
In all five of these instances, I&A personnel quickly informed state and local
officials about threat information, which could have aided their operational
response during the January 6 events. However, sharing information via email
does not disseminate information as widely as publishing intelligence products,
which are posted on HSIN and available to a broad range of state and local
partners. Additionally, in three of these instances, I&A shared an intelligence
product issued by another agency, rather than information it discovered during
its own intelligence collection or analysis efforts. Despite the numerous threats
I&A encountered in the weeks preceding January 6, I&A did not produce any
intelligence products about the information before the U.S. Capitol breach.
40 As previously discussed, the FOD member planned to draft an FIR about these threats, but
When we asked the FOD member if he received a response, he could not remember.
www.oig.dhs.gov 29 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
We did not identify any additional instances of I&A sharing threat information
with state and local partners prior to the January 6 events. We issued a
mandatory questionnaire to FOD field employees asking whether they shared
related information with state and local partners prior to the January 6 events.
No respondents indicated any additional instances of information sharing
occurred. Further, we contacted certain individuals within the U.S. Capitol
Police, Metropolitan Police Department, NTIC, FBI, and the Department of
Interior to ask whether they received information from I&A prior to the January
6 events. NTIC did not respond to our request, and the other agencies said
they did not receive any information from I&A. We also reviewed transcripts
from secure chat rooms that I&A officials hosted or joined leading up to the
U.S. Capitol breach. Although I&A personnel were present in the chat rooms,
we did not note further sharing of threat information prior to the breach.
Conclusion
I&A is the only member of the IC statutorily tasked with delivering intelligence
to state, local, and Federal partners, as well as developing intelligence from
these partners for DHS and the IC. Despite these responsibilities, I&A was
unable to provide its many state, local and Federal partners with timely,
actionable, and predictive intelligence prior to the U.S. Capitol breach on
January 6, 2021. I&A staff disagree about whether an intelligence product
from I&A would have affected the outcome on January 6. Nonetheless, the
issues we found during our review demonstrate the need for essential changes
at I&A to ensure it is better equipped to respond to similar events in the future.
Recommendations
www.oig.dhs.gov 30 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 31 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 32 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 33 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 34 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix A
Objective, Scope, and Methodology
www.oig.dhs.gov 35 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
We conducted this evaluation under the authority of the Inspector General Act
of 1978, as amended, and according to the Quality Standards for Inspection
and Evaluation issued by the Council of the Inspectors General on Integrity and
Efficiency.
www.oig.dhs.gov 36 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix B
I&A Comments to the Draft Report
www.oig.dhs.gov 37 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 38 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 39 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 40 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 41 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 42 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix C
Organizational Chart of Relevant I&A Offices
www.oig.dhs.gov 43 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix D
January 6 Threats Identified by OSCO in Response to the RFI
OSCO Collector 1
On a forum thread with over 5,500 likes and over 250 comments, one
user suggests User
also suggest in D.C.
OSCO Collector 1
OSCO Collector 2
OSCO Collector 3
42 The OIG did not edit the collectors language when compiling information for this appendix.
www.oig.dhs.gov 44 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Post has 73
upvotes.
OSCO Collector 4
An individual discusses coming armed and meeting outside the city and
then
Discussions of organizing in Virginia and then driving to DC armed
together as the police/military won't be able to stop thousands of armed
patriots
Suggestions of using stun guns
January 2
OSCO Collector 2
OSCO Collector 3
www.oig.dhs.gov 45 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
OSCO Collector 4
January 3
OSCO Collector 1
OSCO Collector 5
www.oig.dhs.gov 46 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix E
I&A Timeline Related to the January 6 Events
LEGEND
www.oig.dhs.gov 47 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
www.oig.dhs.gov 48 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix F
Office of Inspector General Major Contributors to This Report
www.oig.dhs.gov 49 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
OFFICE OF INSPECTOR GENERAL
Department of Homeland Security
Appendix G
Report Distribution
Secretary
Deputy Secretary
Chief of Staff
Deputy Chiefs of Staff
General Counsel
Executive Secretary
Director, GAO/OIG Liaison Office
Under Secretary for Office of Strategy, Policy and Plans
Assistant Secretary for Office of Public Affairs
Assistant Secretary for Office of Legislative Affairs
I&A Liaison
Congress
www.oig.dhs.gov 50 OIG-22-29
FOR OFFICIAL USE ONLY / ATTORNEY-CLIENT PRIVILEGE
FOR OFFICIAL USE ONLY
To view this and any of our other reports, please visit our website at:
www.oig.dhs.gov.
OIG HOTLINE
To report fraud, waste, or abuse, visit our website at www.oig.dhs.gov and click
on the red "Hotline" tab. If you cannot access our website, call our hotline at
(800) 323-8603, fax our hotline at (202) 254-4297, or write to us at: