The process for sharing this type of specific threat...
The process for sharing this type of specific threat information with state and locals was consistent with protocols for how we share the information and for how that information is vetted by the intelligence community.
Click Here or the flag on image above to change the background image