Terrorist groups, including al-Qa‘ida, and violent extremists have considered using or have possessed cyanide compounds. Cyanides probably appeal to terrorists because of their toxicity, availability, and ease of dissemination. Some of the cyanide tactics that have been considered by terrorists include mixing it with oils and lotions for use as a contact poison, contaminating food or water supplies, or by using it in an improvised chemical dispersal device.
U.S.-China Economic and Security Review Commission Analysis of Chinese Investments in the U.S. Economy
Once hardly noticeable, Chinese investments in U.S. companies are now rising sharply. Cumulative Chinese investments in U.S. companies remain modest compared to those of other major countries. However, a combination of “push and pull” factors are moving China’s annual investment levels closer to levels consistent with China’s current economic stature.
The majority of state and local participant feedback on training that DHS or DOJ provided or funded and that GAO identified as CVE-related was positive or neutral, but a minority of participants raised concerns about biased, inaccurate, or offensive material. DHS and DOJ collected feedback from 8,424 state and local participants in CVE-related training during fiscal years 2010 and 2011, and 77—less than 1 percent—provided comments that expressed such concerns. According to DHS and DOJ officials, agencies used the feedback to make changes where appropriate. DOJ’s Federal Bureau of Investigation (FBI) and other components generally solicit feedback for more formal, curriculum-based training, but the FBI does not require this for activities such as presentations by guest speakers because the FBI does not consider this to be training. Similarly, DOJ’s United States Attorneys’ Offices (USAO) do not require feedback on presentations and similar efforts. Nevertheless, FBI field offices and USAOs covered about 39 percent (approximately 9,900) of all participants in DOJ CVE-related training during fiscal years 2010 and 2011 through these less formal methods, yet only 4 of 21 FBI field offices and 15 of 39 USAOs chose to solicit feedback on such methods. GAO has previously reported that agencies need to develop systematic evaluation processes in order to obtain accurate information about the benefits of their training. Soliciting feedback for less formal efforts on a more consistent basis could help these agencies ensure their quality.
While passenger vessels and terminals will likely remain potentially attractive targets for terrorist attacks, trends in overseas terrorist attacks and the lack of any reporting on maritime terrorist plots against the U.S.-Canada MTS suggests the threat to the majority of the system is low; violent extremists could attack U.S. and Canadian ferries and similar soft maritime targets with little or no warning.
Tens of thousands of dams, levees, navigation locks, industrial waste impoundments, and other water retention and control structures are located throughout the United States. Due to their iconic nature and potential impact on public safety, these structures present attractive targets for terrorist activity. Explosive attacks pose a significant threat, as evidenced by past plots against foreign infrastructure targets. Cyber intrusions present another concern and could be used to sabotage or control site operations. The FBI is interested in any information that could help mitigate threats to the security of dams or other water retention and control infrastructure.
Maritime transportation infrastructure—to include watercraft, seaports, harbors, and waterways—is vital to the United States’ economy and national security. Maritime shipping accounts for ninety-nine percent of all US overseas trade. Additionally, passenger ships transport more than 140 million people to and from US ports each year. Countless vacationers enjoy maritime recreation on US lakes and beaches. All of these activities depend upon safe and open waterways, which the FBI defends from a variety of criminal and national security threats. A top concern is that past attacks on foreign passenger ferries and cargo liners could inspire similar action against US commercial vessels. Additional threats to maritime security include: contraband smuggling, human trafficking, piracy and crimes at sea, and cyber attacks against maritime information systems.
The Central Florida Intelligence eXchange (CFIX) recently received a brief from the Arizona Counter Terrorism Information Center (ACTIC – TLO Program) that included a report of a stolen ambulance in Phoenix, AZ. At the request of an Intelligence Liaison Officer (ILO) in the Central Florida region (R-5 Hospital/Medical Sector), CFIX was asked to collect, research, analyze and develop a ‘Situation Brief’ based on this report to determine if this was a significant trend that could cause concern for Region 5 partners.
U.S. Treasury Office of Foreign Assets Control Specially Designated Nationals and Blocked Persons List
This publication of Treasury’s Office of Foreign Assets Control (“OFAC”) is designed as a reference tool providing actual notice of actions by OFAC with respect to Specially Designated Nationals and other persons (which term includes both individuals and entities) whose property is blocked, to assist the public in complying with the various sanctions programs administered by OFAC. The latest changes to the SDN List may appear here prior to their publication in the Federal Register, and it is intended that users rely on changes indicated in this document. Such changes reflect official actions of OFAC, and will be reflected as soon as practicable in the Federal Register under the index heading “Foreign Assets Control.” New Federal Register notices with regard to Specially Designated Nationals or blocked persons may be published at any time. Users are advised to check the Federal Register and this electronic publication routinely for additional names or other changes to the SDN List.
NATO recognises that that the military alone cannot resolve a crisis or conflict. There is a need for more deliberate and inclusive planning and action through established crisis management procedures that allow for both military and non-military resources and efforts to be marshalled with a greater unity of purpose. Adopting such a comprehensive approach to operations begins with inculcating a culture of active collaboration and transparency among those involved in crisis management.
L&O operations have historically been understood to consist of LE missions supporting U.S. military commanders and their efforts to police our military personnel, civilians, and family members working and residing on U.S. military posts, camps, and stations. (Posts, camps, and stations refer to any U.S. military installation, base, or other location within the United States and enduring installations, bases, or other locations outside the United States employed to support long-term military commitments and/or serve as power projection platforms.) U.S. Army doctrine has not historically focused on L&O operations outside of LE support to posts, camps, and stations. L&O support to the operational commander and the capabilities inherent within LE organizations have been largely disregarded within Army (and joint) doctrine. Recent conflicts and the nature of the threat within the OE have increased the relevance of L&O operations and LE capabilities in support of Army operations. The applications of L&O operations and the requirements for Army LE personnel to conduct these operations have grown tremendously as nation building and protracted stability operations have demonstrated the need for civil security and civil control as critical lines of effort within the larger effort to transfer authority to a secure and stable HN government.
The Joint Civil Information Management Tactical Handbook is designed to provide joint procedures and standardized formats for the collection and reporting of civil data to support the Joint Force Commander planning and execution of operations. The publication consolidates the Services’ best tactics, techniques and procedures.
Harris Corporation’s standard terms and conditions for the sale of their wireless surveillance products including the AmberJack, StingRay, StingRay II, Harpoon and KingFish products. The terms and conditions document was included in a contract signed with Tempe, Arizona on October 8, 2012 for $60,321.15 worth of surveillance software, equipment and training.
It shall be the mission of those personnel of the Seattle Police Department who are trained in the use of unmanned aerial systems (UAS), to use this resource to protect the lives and property of citizens and first responders in a constitutionally and legally sound manner. Use of an aerial system can be utilized in circumstances which would save life and property, as well as being able to detect possible dangers that could not otherwise be seen.
The United States and our allies are fighting terrorists who have defined this conflict as religiously based. Commanders on both sides have identified the center of gravity as the popular support of the people and understand the value of leveraging the religious aspects of the indigenous culture. Coalition commanders must apply that knowledge to support the overall objectives. Using chaplains, whose expertise includes religion and religious culture, shows great potential for success for enabling operational goals.
The need to communicate effectively with a wide range of audiences is not just desirable, it is essential to gain understanding and support for NATO’s operations. Public support for NATO’s missions and tasks follows from public understanding of how the Alliance makes a difference to international peace and security. Public confidence, in turn, is enhanced by NATO’s ability to achieve its mandate in a way that is open, transparent. and consistent with member nation values and expectations.
A September 2012 presentation from NATO’s International Security Assistance Force for training media spokespersons to work with Afghan and international media.
Terrorists might use disguises, fraudulent or stolen credentials, and cloned or repurposed vehicles to gain access to restricted areas, to blend in with their surroundings when conducting surveillance, or to conceal other activities while planning or executing an attack. Anders Breivik, the gunman who was sentenced to 21 years in prison for the July 2011 attack on the Workers’ Youth League summer camp in Norway, wore a police uniform and displayed false identification to gain unauthorized access to the camp. Depending on the target, disguises might be aimed at impersonating law enforcement, emergency services, or officials of an institution who have legitimate access to secured/restricted sites.
Known or possible terrorists have displayed suspicious behaviors while staying at hotels overseas—including avoiding questions typically asked of hotel registrants; showing unusual interest in hotel security; attempting access to restricted areas; and evading hotel staff. These behaviors also could be observed in U.S. hotels, and security and law enforcement personnel should be aware of the potential indicators of terrorist activity.
This guide gives Department of Defense (DoD) staff and contractors an overview of the kinds of marking required to protect classified and unclassified controlled information that cannot be disseminated to all audiences. The guide offers an integrated approach to the major requirements for marking and control of information, briefly explaining the reasons for marking and providing examples of correctly marked information. To facilitate information sharing and declassification processes, whenever practicable a classified attachment, addendum, annex, enclosure, or similar section shall be used when classified information constitutes only a small portion of an otherwise unclassified document.
This field guide provides small unit leaders and individual Soldiers and Marines a proven collection of actions to focus their efforts while attacking networks. Primarily, these actions consist of mission analysis, briefing, and execution and are adapted for use by these small unit leaders in a population-centric operating environment.
A list of 2,059 names of Greek citizens that have Swiss bank accounts with HSBC. The list was originally published by a Greek magazine called Hot Doc on October 27, 2012 resulting in the arrest of its editor Kostas Vaxevanis for “breach of privacy”.
NATO/ISAF engagement in Afghanistan in 2010 was characterised by a refreshed, comprehensive civ-mil strategy as reflected in a substantial force uplift, significant progress in the growth and development of the Afghan National Security Forces, and discernable campaign progress in priority districts. These were reflected in the NATO/ISAF Strategic Communications Framework 2010. In parallel, political events, including the London Conference, the Consultative Peace Jirga, the Kabul Conference, Afghan Parliamentary elections and the NATO Summit in Lisbon, helped define a clear political roadmap for Afghanistan. These developments are reflected in the Lisbon Summit Declaration which provides political guidance for the focus of our efforts in 2011 and reaffirms that NATO’s mission in Afghanistan remains the Alliance’s key priority.
The mission of KFOR as authorised by the North Atlantic Council (NAC) is to contribute to a safe and secure environment in Kosovo and to support the development of security institutions capable of operating without NATO assistance. The adaptation of KFOR’s force posture during 2010 and its unfixing from Properties with Designated Special Status have been supported by an effective strategic communications (StratCom) approach which has been closely coordinated at all stages throughout the NATO chain of command and NATO HQ. Continued StratCom efforts will be required to complement and support military and civilian activities during 2011 as KFOR’s footprint and posture continues to adapt and as progress is made toward mission achievement.
OPERATION OCEAN SHIELD was launched by the North Atlantic Council on 17 August 2009. NATO is conducting counter-piracy activities as part of an internationally recognised and supported effort in a region of strategic interest to the Alliance. NATO’s commitment is as a complementary player in coordination with the other international counter-piracy actors including the EU’s Operation ATALANTA, CTF-151, and individual nations.