Terrorists may attempt to gain skills and knowledge necessary to plan and execute by obtaining specialized training, soliciting or stealing technical and proprietary information, or reaching out to academics and experts. In 2007, German police arrested three terrorist suspects for allegedly planning and preparing car bomb attacks against US citizens and interests in Germany. The suspects traveled to Pakistan where they received weapons and explosives training from a Pakistan-based Uzbek jihadist group called the Islamic Jihad Union.
This report examines the UASI grant program, including a detailed review of 15 cities that have received funding through the program. It is intended to assess whether spending on DHS antiterrorism grants like UASI have made us safer, and whether the taxpayer dollars that have been spent on these programs have yielded an adequate return on investment in terms of improved security.
In February and March 2012, unauthorized IP addresses accessed the Industrial Control System (ICS) network of a New Jersey air conditioning company, US Business 1. The intruders were able to access a backdoor into the ICS system that allowed access to the main control mechanism for the company’s internal heating, ventilation, and air conditioning (HVAC) units. US Business 1 was using the Tridium Niagara ICS system, which has been widely reported in the media to contain multiple vulnerabilities that could allow an attacker to remotely control the system.
Terrorists often conduct physical surveillance to identify suitable targets, determine vulnerabilities, plan attack methods, or assess the target’s security posture. In March 2010, David Coleman Headley pled guilty for his role in the November 2008 terrorist attacks in Mumbai, India by conducting video and photographic surveillance of potential targets, as well as later surveilling Danish newspaper offices–the target of another attack plot.
The advent of set-top box devices and other media content access devices (“access devices”) has provided users with access to a large number and variety of media content choices. For example, a user may choose to experience a variety of broadcast television programs, pay-per-view services, video-on-demand programming, Internet services, and audio programming via a set-top box device. Such access devices have also provided service providers (e.g., television service providers) with an ability to present advertising to users. For example, designated advertisement channels may be used to deliver various advertisements to an access device for presentation to one or more users. In some examples, advertising may be targeted to a specific user or group of users of an access device.
Terrorists and criminals may use photos or videos of potential targets to gain insight into security operations and details of facility operations, including traffic flow through and around facilities, opening times, and access requirements. In late 2000 and early 2001, convicted al-Oa’ida operative Dhiren Barot took extensive video footage and numerous photographs of sites in downtown New York City and Washington, DC in preparation for planned attacks. Photographs and video useful in planning an attack may include facility security devices (surveillance cameras, security locks, metal detectors, jersey walls and planters); security personnel; facility entrances and exits; and other features such as lighting, access routes, gates, roads, walkways, and bridges.
Terrorists overseas and in domestic attack plots have used various methods to acquire and store materials necessary to construct explosives. Najibullah Zazi, who pled guilty in 2010 to plotting to attack the New York subway system, made multiple, large-quantity purchases of chemical components needed to assemble the homemade explosive Triacetone Triperoxide (TATP)—6 bottles on one day and 12 bottles on a separate day—at beauty supply stores throughout the summer of 2009. Law enforcement and first responders should be aware that the possession, storage, or attempt to acquire unusual quantities of laboratory equipment, personal protective equipment, chemicals, and flammable accelerants—although legal to purchase and own—could provide indicators of preoperational attack planning.
(U//LES) FBI Sovereign Citizen Extremists Targeting Law Enforcement Creates Potential for Violent Traffic Stops
The FBI assesses with medium confidence, based on reliable source reporting and reports from other law enforcement agencies, some sovereign citizen extremistsb are making more specific plans to interfere with state and local law enforcement officers during traffic stops and, in some cases, intentionally initiating contact with law enforcement. The FBI assesses with medium confidence that a shift from reacting to law enforcement scrutiny1,2 to targeting police officers indicates an increased interest in harassing and intimidating police and may lead to potentially hostile confrontations.
The purpose of this special study is to provide commanders, leaders, and planners at the tactical, operational, and strategic levels a guide that synchronizes strategic-level requirements and outcomes with operational- and tactical-level objectives, therefore providing synergy of effort that will support the Army Force Generation cycle and reset planning timelines. It is our hope that this information will be useful to both sustainment and maneuver commanders, that it will constitute a historical survey of recent drawdown operations, and that it will offer tactics, techniques, and procedures that can be used today and in the future to assist cornmanders at all levels with the planning and execution of the responsible drawdown of forces.
Unmanned Ground Systems consist of a powered physical system with no human operator on aboard the principal platform, which can act, either operated remotely or with some degree of autonomy, to accomplish assigned tasks. Unmanned Ground Systems may be mobile or stationary, can be smart learning, self-adaptive, and includes all associated supporting components such as Operator Control Units (OCU).
This handbook is written for you, the embedded training team (ETT) member. Traditionally, this mission was reserved for Special Forces’ units or teams. With the revision of Army Field Manual 3.0, Operations, this is now a mission for general purpose forces. The Army has not yet officially designated one organization or agency as the ETT proponent; therefore, information concerning TTs circulates at all levels. This handbook has been vetted by the Joint Center for International Security Forces Assistance, 1st Infantry Division, Combined Security Transition Command-Afghanistan, and the Center for Army Lessons Learned Integration Network.
A collection of documents recently obtained and published by Public Intelligence provides a complete guide to NATO’s training process for “strategic communications” activities, including public diplomacy, public affairs, information operations and psychological operations. The documents, compiled for participants in a NATO training summit, describe the doctrine behind strategic communications and provide practical examples of their use in a number of recent conflicts from Libya to Afghanistan. These activities are designed to contribute “positively and directly in achieving the successful implementation of NATO operations, missions, and activities” as well as “influence the perceptions, attitudes and behaviour of target audiences . . . with the goal of achieving political or military objectives”.
NATO Technical Report: Measuring the Effectiveness of Activities that Influence Attitudes and Behaviors
The emphasis of military operations is shifting more and more towards non-kinetic activities, such as Psychological Operations and Information Operations, which are geared towards influencing attitudes and behaviors of specific target audiences. Though many such activities are undertaken, there is little systematic evaluation of the effects they bring about and their effectiveness. As a result, it is not well known what these operations contribute to the overall operation and to what degree they are achieving their goals. The purpose of the Task Group HFM-160 was to develop a systematic approach to the Measurement Of Effectiveness (MOE) of influence operations.
U.S. Army Soldier’s Primer to Terrorism Tactics, Techniques and Procedures in Complex Operational Environments
This Soldier’s primer describes terrorism TIP threats in an operational environment (OE) and the likely impacts on military operations in a U.S. combatant command area of responsibility (AOR).
This course provides an overview of incorporating Human Geography into GEOINT at NGA, with the intention of providing a foundation of the knowledge, skills, and application capabilities for the NGA GEOINT analyst.
DHS and FBI Call for Increased Vigilance in Jewish Communities Following Israel’s Recent Military Actions
Last Friday, officials from the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) hosted a teleconference with the directors of fusion centers around the country as well as the Major City Intelligence Commanders across to discuss the “heightened tensions in the Middle East due to the on-going military actions between Israel and Hamas.” A bulletin from the New York State Intelligence Center (NYSIC) described the conference call, stating that the DHS and FBI representatives emphasized that there is “currently no credible or specific information suggesting any violent actions in the United States as a result of these tensions” but requested increased vigilance from “law enforcement in regions where Jewish consulates or large Jewish populations exist was encouraged, and law enforcement officials on the teleconference from those areas discussed measures being taken to ensure the safety and security of their local communities, which included increased law enforcement presence, community outreach and encouraging reporting of suspicious activities.”
The following photos depict components of the Iwo Jima Amphibious Ready Group, particularly the 24th Marine Expeditionary Unit, training for operations in support of “theater security”. The 24th MEU is part a collection of seven Marine units that deploy around…
Despite the eradication of opium poppy by Governor-led Eradication (GLE) having increased by 154% in comparison to its 2011 level (9,672 hectares eradicated in 2012), the total area under opium poppy cultivation in Afghanistan was estimated at 154,000 hectares (125,000 – 189,000) in 2012. While that represents a 18% increase in cultivation, potential opium production was estimated at 3,700 tons (2,800 – 4,200 tons) in 2012, a 36% decrease from the previous year. This was due to a decrease in opium yield caused by a combination of a disease of the opium poppy and adverse weather conditions, particularly in the Eastern, Western and Southern regions of the country.
(U//FOUO) DHS-FBI Bulletin: No Specific Threats to American Jewish Community, Despite Recent World Events
This Joint Intelligence Bulletin (JIB) provides law enforcement and private sector safety officials with an evaluation of potential terrorist threats to Jewish organizations, facilities, and personnel in the United states. The information is provided to support the activities of DHS and FBI and to assist federal. state, local, tribal, and territorial government counterterrorism and first responder officials to deter, prevent, preempt, or respond to terrorist attacks in the United States.
A document detailing investigative tools and materials utilized by the FBI when conducting cyber investigations. The document was distributed by the Oklahoma Bankers Association after being provided by a local branch of the FBI Cyber Division.
A presentation on recent cyber attacks on the U.S. financial industry included in a collection of documents provided to banks and financial institutions by a local branch of the FBI Cyber Division office and distributed by the Oklahoma Bankers Association.
The Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), has statutory responsibility to (1) provide situational awareness and establish a common operating picture for the federal government, and for state, local, and tribal governments as appropriate, in the event of a natural disaster, act of terrorism, or other man-made disaster, and (2) ensure that critical terrorism and disaster-related information reaches government decisionmakers. Traditional media sources and, more recently, social media sources such as Twitter, Facebook, and a vast number of blogs provide public reports on breaking events with a potential nexus to homeland security. By examining open source traditional and social media information, comparing it with many other sources of information, and including it where appropriate into reports, the NOC can provide a more comprehensive picture of breaking or evolving events.
The Bureau of Criminal Apprehension (BCA) has investigated allegations of law enforcement officers providing controlled substances to individuals as part of a drug recognition certification program. The investigation appeared to be professional and comprehensive. We have reviewed the allegations and for the reasons identified below have concluded that there is insufficient evidence to issue felony charges in this matter.
Terrorist groups, including al-Qa‘ida, and violent extremists have considered using or have possessed cyanide compounds. Cyanides probably appeal to terrorists because of their toxicity, availability, and ease of dissemination. Some of the cyanide tactics that have been considered by terrorists include mixing it with oils and lotions for use as a contact poison, contaminating food or water supplies, or by using it in an improvised chemical dispersal device.
U.S.-China Economic and Security Review Commission Analysis of Chinese Investments in the U.S. Economy
Once hardly noticeable, Chinese investments in U.S. companies are now rising sharply. Cumulative Chinese investments in U.S. companies remain modest compared to those of other major countries. However, a combination of “push and pull” factors are moving China’s annual investment levels closer to levels consistent with China’s current economic stature.