134 search results for "cell phone"

The Increasing Sophistication and Legitimacy of the Islamic State

The Islamic State of Iraq and the Levant (ISIL) has become the preeminent terror group among U.S.-based extremists according to an assessment authored by the Department of Homeland Security and more than a dozen state and local fusion centers. Individuals determined to fight “overseas in a Muslim-majority country” or conduct attacks domestically will be “more likely to derive inspiration from ISIL than [al-Qaeda] or any of its affiliates” as long as ISIL can maintain its “current level of perceived legitimacy and relevancy.” This assessment of ISIL’s increasing popularity among domestic extremists is the focus of a ten page Field Analysis Report obtained by Public Intelligence titled Assessing ISIL’s Influence and Perceived Legitimacy in the Homeland: A State and Local Perspective. Drawing on suspicious activity reports from around the country as well as intelligence reporting from DHS and the Bureau of Prisons, the report finds that ISIL’s military successes in Iraq and Syria along with the group’s self-proclaimed re-establishment of the caliphate have captured the attention of violent extremists likely to buy in to its “violent extremist counterculture.”

(U//FOUO) DHS Infrastructure Protection Note: Most Significant Tactics Against the Electricity Subsector

This IP Note is a joint publication of OCIA and the DHS Office of Intelligence and Analysis (I&A) Homeland Counterterrorism Division. It is intended to identify high- consequence tactics, techniques, and procedures (TTPs) used during attacks and incidents that occurred at electrical substations, facilities, and associated electrical infrastructure from 2002 to 2013. The incidents identified in this report have no known nexus to terrorism.

DHS NCCIC Report on Assessing Risks of Your Digital Footprint

To facilitate efficiency and effectiveness on a global scale, massive amounts of data are stored and processed in systems comprised of hardware and software. Each digital transaction or interaction we make creates a digital footprint of our lives. Too often, we don’t take the time to assess not only the size of our digital footprint, but what risks are involved in some of the choices we make. Our data lives in our social media profiles, mobile devices, payment accounts, health records, and employer databases among other places. The loss or compromise of that data can result in an array of impacts from identity theft to financial penalties, fines, and even consumer loyalty and confidence. This results in both a shared risk and therefore shared responsibility for individuals, businesses, organizations and governments. The following product is intended to facilitate awareness of one’s digital footprint as well as offer suggestions for a unified approach to securing that data. This is not an all-encompassing product, but rather offers discussion points for all that hold a stake in the security of our data.

FBI Cyber Division Bulletin: Cargo Thieves use GPS Jammers to Mask GPS Trackers

This Private Industry Notification (PIN) highlights the use of Global Positioning Systems (GPS) jammers by criminals to thwart law enforcement response and investigation into cargo thefts in the United States. Since at least February 2012, various law enforcement and private sector partners have reported that GPS tracking devices have been jammed by criminals engaged in nefarious activity including cargo theft and illicit shipping of goods. Although banned by federal law, the jammers are readily available over the Internet and easy to employ.

Identity Dominance: The U.S. Military’s Biometric War in Afghanistan

For years the U.S. military has been waging a biometric war in Afghanistan, working to unravel the insurgent networks operating throughout the country by collecting the personal identifiers of large portions of the population. A restricted U.S. Army guide on the use of biometrics in Afghanistan obtained by Public Intelligence provides an inside look at this ongoing battle to identify the Afghan people.

Sandia National Laboratories Mobile Biometric Device Technology Study

Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

DHS-Connecticut Intelligence Center (CTIC) Active Shooter Individual Response Guidelines

An “Active Shooter” is an individual actively engaging in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearm(s) and there is no pattern or method to their selection of victims. Active Shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of Law Enforcement is required to stop the shooting and mitigate harm to victims. Because Active Shooter incidents are often over within 5-15 minutes, before Law Enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

Washington Fusion Center Newsletters Detail Local Examples of Suspicious Activity Reporting

What kind of “suspicious” behaviors might put you in the sights of your local fusion center? A collection of Fusion Liaison Officer (FLO) reports from the Washington State Fusion Center (WSFC) obtained by police accountability activist Andrew Charles Hendricks via a Washington Public Records Act request provide insight into the mechanics of suspicious activity reporting at the local level. More than a dozen reports, which are minimally redacted, detail monthly reporting by the WSFC to its “statewide network of agency-selected law enforcement, fire-fighting and critical infrastructure agency representatives” that ensure “vital disciplines are incorporated into the fusion process by serving as the conduit through which homeland security and crime related information flows to the WSFC for assessment and analysis through the state homeland security Regional Intelligence Groups.” According to the State of Washington, the “end state” of the FLO program “is to have FLOs throughout the state in all aspects of law enforcement, fire service and critical infrastructure” to facilitate the flow of information both to and from the state fusion center.

Senate Permanent Subcommittee on Investigations Federal Support for Fusion Centers Report

The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded “intelligence” of uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism. Congress directed the Department of Homeland Security (DHS) to lead this initiative. A bipartisan investigation by the Permanent Subcommittee on Investigations has found, however, that DHS’ work with those state and local fusion centers has not produced useful intelligence to support federal counterterrorism efforts.

How to Stop Killing Afghan Civilians

The problem of civilian casualties in Afghanistan has presented substantial tactical difficulties for coalition forces according to a recent U.S. Army handbook. Produced by the Center for Army Lessons Learned (CALL) and released to soldiers on a restricted basis in June, the handbook presents best practices for reducing civilian casualties (CIVCAS) and offers strategies for mitigating negative effects from casualties among local populations.

CSIS Canadian National Counterterrorism Intelligence Requirements (NCTIR)

In 2004, the Government of Canada issued its first National Security Policy (NSP), Securing an Open Society, to ensure that Canada would be prepared for and could respond to future threats. Recognizing that threats to national security are beyond the capacity of individuals, communities or provinces to address alone, the NSP envisaged greater integration and more strategic co-ordination of key security functions, particularly those related to intelligence collection, threat assessments and emergency preparedness through the implementation of a strategic framework and an action plan. To make substantive improvements in integration and co-ordination with regard to terrorist threats, the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP), in co-operation with the Canadian Association of Chiefs of Police (CACP), are developing National Counter-Terrorism Intelligence Requirements (NCTIR). The NCTIR is envisaged as an integral component of a broader national strategy involving training, information-sharing and a co-ordinated response to terrorist threats involving the whole of government.

Ohio Police Describe Strange Hallucinations of Bath Salts Users

Last month the Ohio State Highway Patrol partnered with the Ohio Strategic Analysis and Information Center (SAIC) to survey local police departments about their encounters with suspects under the influence of bath salts. Since its release last month, the survey has been circulated by law enforcement around the country, discussed online in forums by concerned police officers and has even begun to garner press attention for its disturbing reports of the effects of the designer drug, including superhuman strength and highly bizarre hallucinations that often result in violent behavior.

Suspicious Activity Reporting Line Officer Training Video

A video made by the Bureau of Justice Assistance and the International Association of Chiefs of Police. It is designed to inform law enforcement “line officers” of standards for reporting suspicious activity in furtherance of the Nationwide Suspicious Activity Reporting Initiative (NSI). The video and transcript were obtained from the website of the Department of Public Safety in New Mexico.

FEMA Research Report: How to Improve Public’s Suspicious Activity Reporting

The Federal Emergency Management Agency’s (FEMA) Individual and Community Preparedness Division partnered with the International Association of Chiefs of Police (IACP) on a project to research and develop a strategy to improve the public’s awareness and reporting of suspicious activity. In early 2010, IACP conducted research of contemporary and historical practices intended to improve the public’s reporting of suspicious activity. The literature review showed that little research existed on the motivations and barriers that affect whether or not individuals report information to law enforcement. To close this gap in data, IACP developed a three phase primary research strategy. This report provides an overview of key research findings and provides insights and recommendations that support national and local campaigns.

(U//FOUO) U.S. Army Document and Media Exploitation Draft Manual

This publication provides Tactics, Techniques, and Procedures (TTP) required for Army personnel when conducting Document and Media Exploitation (DOMEX) operations. The document is designed to serve as a reference for multiple personnel at varying echelons. The ATTP provides specific information for Army personnel operating as part of a DOMEX or other exploitation team for the collection, processing, and reporting of DOMEX activities. The manual serves as a reference for staff planners and intelligence personnel at battalion and brigade combat teams. Additionally, the manual provides an understanding of DOMEX activities, procedures, organizations, products, and databases at joint task force, U.S. Army, and the Department of Defense.

What the FBI Wants to Hide From You In Their 2011 Gang Threat Assessment

What information from its most recent gang threat assessment does the FBI want to keep only for the eyes of law enforcement? Thanks to the publication of the full “law enforcement sensitive” version of the assessment on the website of the California Gang Investigator’s Association, we now know the answer to that question. The full version of the document contains approximately twenty additional pages of information regarding gang threats across the U.S. including details on the incredible proliferation of Mexican drug trafficking organizations. Most of the content derived from non-public reporting sources, such as FBI field reports, concerns specific incidents that are described more generally in the public version of the document. There are also some rather startling statistics omitted from the public version. For example, the fact that 36% of law enforcement report that gangs in their jurisdiction have ties to Mexican criminal gangs and drug trafficking organizations is omitted from the public version of the report.

DoJ-DHS Law Enforcement Guidelines for First Amendment-Protected Events

As articulated in the United States Constitution, one of the freedoms guaranteed by the First Amendment is the right of persons and groups to assemble peacefully. Whether demonstrating, counterprotesting, or showing support for a cause, individuals and groups have the right to peacefully gather. Law enforcement, in turn, has the responsibility to ensure public safety while protecting the privacy and associated rights of individuals. To support agencies as they fulfill their public safety responsibilities, the Criminal Intelligence Coordinating Council (CICC) developed this paper to provide guidance and recommendations to law enforcement officers in understanding their role in First Amendment-protected events. This paper is divided into three areas, designed to provide in-depth guidance for law enforcement.

(U//FOUO/LES) Arlington Police Department Khalid Ali‐M Aldawsari Saudi IED Plot Advisory

On 02/23/2011 Khalid Ali‐M Aldawsari (pictured left), a Saudi national currently attending college at South Plains College, near Lubbock, Texas, was arrested on federal terrorism charges. Aldawsari was charged with attempted use of a weapon of mass destruction (WMD), in connection with the alleged purchase of chemicals and equipment necessary to make an improvised explosive device (IED), in addition to research into possible U.S. based targets. Court documents advise that Aldawsari had performed internet research on how to construct an IED, using chemical components. It has also been alleged he had acquired/taken major steps in acquiring the necessary components and equipment needed to build such a device. According to court documents, on 02/01/2011 a chemical supplier reported to the FBI a suspicious purchase of concentrated phenol, by a man named Khalid Aldawsari. Although the toxic chemical phenol can have legitimate uses; it can also be used to make explosives. Concentrated sulfuric and nitric acids, beakers, flasks, clocks, wiring, and a Hazmat suit were found during 2 FBI searches of Aldawsari’s apartment.

(U//FOUO) U.S. State Department Social Media Landscape: Portugal

Social media usage in Portugal is growing and it is recognized by organizations as a useful communications tool, particularly amongst consumer brands. Although, the government has invested heavily in schools IT infrastructure, it is yet to embrace social media as part of its overall communications strategy and there remains great potential for the government or political parties to fully utilize social media. Similarly, there are cases of media outlets engaged in social media activity, although these are the exception, rather than the rule. The 16-24 year old age group is leading the digital movement in Portugal; it is this group which has benefited most from the unprecedented level of government investment However, it is important to recognize their predecessors, the 25-34 year old age group are also heavy users of the Internet.

(U//FOUO) U.S. State Department Social Media Landscape: Finland

Finland has a high level of Internet penetration and usage in comparison to other European nations. However, whilst the technology and capability exists to facilitate for a vibrant social media landscape, the conservative Finnish national character in conjunction with online security fears can be seen to be restricting this potential growth. In line with most European nations it is the younger age groups, namely 15-24 year olds who are most active online in Finland, whilst people who live by themselves are also active online participants. Most people access the Internet at home, however educational establishments are also common locations and many schools, colleges and universities are well equipped with IT facilities and Internet access. Men typically use the Internet as an information resource, whilst women and younger people use it as a communication tool.

(U//FOUO) U.S. State Department Social Media Landscape: Norway

Norway boasts an active online community with high Internet penetration rates in comparison to the rest of Europe. In addition, access rates are high and spread fairly evenly across demographic groups, age ranges and locations. A range of social media activities are popular, including blogging and content sharing, however social networking is the most prominent activity, with Norwegian Facebook users now exceeding 2 million. A large number of Norwegian companies have an active social media presence with Facebook and Twitter the platforms of choice. Whilst, usage is high, few companies at present measure or evaluate social media and there is a reluctance to divert resources for this purpose. Social media is emerging as a defining behavior of Internet usage in Norway, and the government has been keen to harness social media as a potential engagement and consultation tool. The government is also in the process of designing an innovative electronic voting system to increase voter turnout, which is hoped to be trialled in 2011. The government clearly appreciates the value of a digitally inclusive society and has set an ambitious target of supplying broadband connectivity to the entire country. In order to aid digital inclusivity the Government also ensures the text on public websites is suitable for older and weak sighted people. In keeping with most of Norwegian society, politicians, journalists and NGOs are all increasingly using social media as a communications tool.