Documents

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

Electromagnetic Pulse (EMP) is an instantaneous, intense energy field that can overload or disrupt at a distance numerous electrical systems and high technology microcircuits, which are especially sensitive to power surges. A large scale EMP effect can be produced by a single nuclear explosion detonated high in the atmosphere. This method is referred to as High-Altitude EMP (HEMP). A similar, smaller-scale EMP effect can be created using non-nuclear devices with powerful batteries or reactive chemicals. This method is called High Power Microwave (HPM). Several nations, including reported sponsors of terrorism, may currently have a capability to use EMP as a weapon for cyber warfare or cyber terrorism to disrupt communications and other parts of the U.S. critical infrastructure. Also, some equipment and weapons used by the U.S. military may be vulnerable to the effects of EMP.

Louisiana 2006 State Homeland Security Strategy

The purpose of this strategy is to identify a strategic direction for enhancing our State, Region and Parish response capabilities and capacity to prevent and reduce the State’s vulnerability to all-hazard disaster events, to include Chemical, Biological, Radiological, Nuclear or Explosive (CBRNE) incidents. This is an exceedingly complex mission that requires coordination, cooperation, and focused effort from the entire State (citizens, local, state, and federal partners) as well as private industry and non-profit voluntary agencies. To that end, each of the sixty four (64) parishes will update or will develop Memorandums of
Understanding (MOU) over the next year agreeing to assist each other in event of major CBRNE incidents.

Nevada State Homeland Security Strategy (2007)

The purpose of the Nevada State Homeland Security Strategy (SHSS) is to identify and address statewide priorities to achieve and sustain a strengthened ability to prevent, detect, deter, mitigate against, prepare for, respond to and recover from any natural, manmade and/or technological emergency or disaster up to and including any act of terrorism. The State, through implementation of this strategy, is seeking outcomes that will ensure a safe and secure Nevada through enhanced capabilities in intelligence, surveillance, rapid first response and recovery, the protection of critical infrastructure, and to promote public education and awareness.

SPAWAR/USCYBERCOM Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Overview

Opening Statements
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.

DHS Communications Sector Critical Infrastructure 2008 Report

The National Communications System (NCS), as the Communications Sector-Specific Agency (SSA), manages numerous protective programs that industry developed and operates to further help reduce risk to the Communications Sector by ensuring the security of the communications infrastructure and delivery of National Security and Emergency Preparedness (NS/EP) communications services, with a strong focus on response and recovery. These programs include the Government Emergency Telecommunications Service (GETS), Wireless Priority Service (WPS), and the Telecommunications Service Priority (TSP) Program. The NCS has also begun to work with industry to develop a Next Generation Priority Service (NGPS). The overarching goal of the above programs is to improve access and expedite restoration or provisioning for national security and emergency preparedness users should there be congestion in the network.

Connecticut 2008 Emergency Communications Plan

The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.

USSOUTHCOM El Salvador Gangs Presentation

Maras emerged out of the conflicts during the 1970s & 80s in Central America. In the context of the wars and insurgencies in El Salvador, Guatemala, and Nicaragua, thousands of people, including youngmen fled North, many which had training on guns as well as armed combat techniques. In Los Angeles they encountered rejection by other Hispanic communities and found it difficult to find work and socialize; a percentage of these young men, especially those from El Salvador where part of the insurgency/ civil war back home and joined the 18th Street Gang from LA, which was started by Mexicans and expanded to other Hispanics, African- Americans, and Asians.

LoJack and Law Enforcement

The following primer on LoJack stolen vehicle recovery systems is written for law enforcement officers who communicate with the media. It’s designed to factually explain the various components of the LoJack Stolen Vehicle Recovery System and how it is used by officers to track and recover vehicles that have been reported stolen by their owners. If you have additional questions on LoJack, please contact your local LoJack Law Enforcement Liaison or LoJack Corporate Communications.

eBay/PayPal Responding to Law Enforcement Record Requests

eBay, Inc., has established a Fraud Investigations Team (FIT) to promote safe use of our platforms, and encourage prosecution of those responsible for misconduct on them. Law enforcement agencies in North America seeking assistance and records for investigations that relate to either the eBay marketplace or PayPal financial transactions may contact FIT directly for information by phone (408.967.9916 – automated message only).

AT&T Wireless and AT&T Mobility, LLC Subpoena Guides

The National Compliance Center (NCC) is a team of specialized, wireless subpoena and court order compliance professionals focused on providing law enforcement, officers of the court, Public Safety Answering Points and other legal contacts with the best possible customer service in the wireless industry. The NCC is located in North Palm Beach, Florida and currently responds to all subpoena, search warrant and court ordered requests nationwide for wireless customer records. The goal of this team is to comply with civil and criminal process and provide assistance to federal, state and local law enforcement agencies, attorneys, and customers pursuant to that process. At the same time, the team must ensure that they adhere to all applicable state and federal laws and protect the privacy of our customers.

2007 MySpace.com Law Enforcement Guide

MySpace.com (“MySpace”) is committed to assisting law enforcement, to the extent permitted by law, in investigations related to unlawful activity. This Law Enforcement Guide is designed to serve that purpose by providing information to facilitate law enforcement requests for user data held by MySpace. The Guide specifies what information is collected by MySpace, how long that information is retained, how to tailor requests to ensure MySpace produces the specific information sought, and the legal process necessary to permit MySpace to disclose different types of information. Finally, the Guide provides contact information for MySpace personnel dedicated specifically to responding to law enforcement requests, including emergency requests.

Microsoft Online Services Global Criminal Compliance Handbook

Information that may be disclosed with a subpoena. Basic subscriber information includes name, address, length of service (start date), screen names, other email accounts, IP address/IP logs/Usage logs, billing information, content (other than e-mail, such as in Windows Live Spaces and MSN Groups) and e-mail content more than 180 days old as long as the governmental entity follows the customer notification provisions in ECPA (see 18 U.S.C. §§ 2703(b), 2705.)

MySpace: Working with Law Enforcement

• Data retained by MySpace
– IP activity related to all logins and image uploads are retained for at least a year.
– Basic subscriber information is retained for at least a year.
– Private messages, blogs, and comments are available if they still exist live on the site.
– Deleted front end profile information is NOT retained by MySpace, nor do we retain previous versions of the profile.

Regional Organized Crime Information Center Active Shooter Guide

Some of the most tragic events in our country’s recent history have been episodes where a deviant has carried out shootings in public places. These killings take place for no other reason than to harm as many innocent people as possible. They are often unpredictable and strike in places dear to us, such as our schools, churches, and places of work. They also can occur in random public settings. The definition of an active shooter incident is when one or more subjects participate in a shooting spree, random or systematic, with intent to continuously harm others. Active shooter scenarios are incredibly dangerous and difficult because there is no criminal objective (robbery, hostagetaking) involved other than mass murder.