August 30, 2011 in Department of Homeland Security
Malicious users seeking to exploit interest related to physical events such as earthquakes and hurricanes will likely use subject lines and attachment titles related to the incidents in phishing e-mails. Network administrators and general users should be aware of these attempts and avoid opening messages with attachments and/or subject lines related to physical events.
The company “Legally Concealed” has created and is marketing decals and apparel to the public “specifically to show support and solidarity for the 2nd Amendment”. According to their website, http://www.legallyconcealed.org/ the special symbol, of the (2) silver lines and number “2” on the black background was “designed in the same spirit of the law enforcement “thin blue line””.
According to recent open source reporting, law enforcement officers (LEO’s) have been encountering bombs made of innocuous trash bags that have caused injuries to responding officers or significant damage to property. LEO’s are encouraged not to touch the light (airy), low-flying, closed trash bags; consider evacuating the immediate area; and, to call the appropriate response personnel.
August 29, 2011 in Department of Homeland Security
This Joint Intelligence Bulletin (JIB) highlights potential terrorist threats related to the 10-year anniversary of the 11 September 2001 (9/11) attacks. This JIB provides perspective on the threat to the Homeland and US interests overseas from al-Qa‘ida, al-Qa‘ida affiliates and allies, and al-Qa‘ida-inspired homegrown violent extremists (HVEs). FBI and DHS are providing this information to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, as well as first responders and private sector security officials, in effectively deterring, preventing, or disrupting terrorist attacks against the United States. Unless otherwise noted, this JIB uses the FBI’s definitions of terms, which may differ from the definitions used by DHS.
August 18, 2011 in North Carolina
This Joint Intelligence Bulletin (JIB) updates a DHS-FBI joint analytic product of the same title dated 3 September 2010 and is intended to provide warning and perspective regarding the scope of the potential terrorist threats to the United States, specifically towards US persons. This product is provided to support the activities of DHS and FBI and to help federal, state, and local government counterterrorism and law enforcement officials deter, prevent, preempt, or respond to terrorist attacks directed against the United States.
August 17, 2011 in California
Large police departments maintain dozens of databases. It is unusual to see these computer systems linked together to enable effective analysis. It is even more unlikely that other information sources, such as gunshot detection systems or dispatch systems, are linked into police analytical or fusion centers. Finally, police departments do not link their operations and information systems to other parts of the justice system or social services system. Thus, poor information sharing prevents good analysis and investigation. Even more troubling, poor information sharing can undermine efforts to intervene with individuals or neighborhoods to stop the cycle of violence. The best way to see the future and act appropriately is to have a complete picture of the current situation. Police must integrate their information and activities to enable situational awareness.
U.S. House of Representatives Report: Warlords Provide Security for U.S. Supply Chain in Afghanistan
Security for the U.S. Supply Chain Is Principally Provided by Warlords. The principal private security subcontractors on the HNT contract are warlords, strongmen, commanders, and militia leaders who compete with the Afghan central government for power and authority. Providing “protection” services for the U.S. supply chain empowers these warlords with money, legitimacy, and a raison d’etre for their private armies. Although many of these warlords nominally operate under private security companies licensed by the Afghan Ministry of Interior, they thrive in a vacuum of government authority and their interests are in fundamental conflict with U.S. aims to build a strong Afghan government.
August 17, 2011 in U.S. Army
This FOUO pocket guide provides information used by battle staffs involved in planning, coordinating, synchronizing or executing actions that support the effective employment of unmanned aircraft systems (UAS) on the battlefield. Covers the MQ-1B PREDATOR, MQ-1 WARRIOR A, MQ-1C ER/MP, MQ-9 REAPER, MQ-5B HUNTER, RQ-7B SHADOW.
Presidential Policy Directive-2 (PPD-2) Implementing National Strategy for Countering Biological Threats
August 16, 2011 in White House
Presidential Policy Directive 2 is one of a number that have not previously been released. It was publicly posted to a collaboration server for U.S. military personnel complete with its National Security Council coversheet intact, providing a rare look at dissemination guidelines utilized in high-level documentation.
“Body packing” is a well-documented concealment method criminals have used to smuggle drugs or other contraband. Body packing in humans and animals may involve several forms of concealment — including insertion into body orifices, ingestion, or possibly surgical implantation—of illicit items or material inside or hidden on the body to escape detection by security systems and personnel. Terrorists often assign high priority to concealment in planning attacks, and such methods—to include surgical implantation—offer potential means for suicide operatives to deliver improvised explosive devices to targets.
August 13, 2011 in U.S. Air Force
This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.
August 12, 2011 in U.S. Army
This regulation prescribes responsibilities, policy, and guidance for the Department of the Army in planning and operations involving the use of Army resources in the control of actual or anticipated civil disturbances. Basic authority is contained in DOD Directive 3025.12, Employment of Military Resources in the Event of Civil Disturbances.
August 12, 2011 in Federal Bureau of Investigation
The FBI has been notified that ATX Global, an online marketing company, has mailed approximately 730 envelopes that include a marketing letter with an affixed live 9mm Luger PPU round. The ammo was used to catch the reader’s attention corresponding with the first line, “If you had just One Shot…” This mass mailing did not specifically target gun and ammo businesses.
August 12, 2011 in Department of State
The Criminal Justice Sector Assessment Rating Tool (CJSART) is designed to assist policy makers and program managers to prioritize and administer host-nation criminal justice sectors needing assistance. Once the assistance programs are underway, the CJSART is a systematic tool designed to measure progress and accomplishments against standardized benchmarks. Used in its entirety, the CJSART holistically examines a country’s laws, judicial institutions, law enforcement organizations, border security, and corrections systems as well as a country’s adherence to international rule of law standards such as bilateral and multilateral treaties.
These template of the Standing Rules for the Use of Force developed by Army North (ARNORTH) and approved by Army Judge Advocate General (JAG) School for commands to follow. The first two templates apply to forces under federal control. The third template is an example State RUF card for National Guard personnel in a SAD or Title 32 status. These templates are taken from the “DoD Defense Support to Civil Authorities Handbook” which includes other information relating to military support operations related to civil disturbances.
August 11, 2011 in California
A photo of a 37-year-old schizophrenic homeless man named Kelly Thomas that was taken in the hospital by his father Ron Thomas, a former Orange County Sheriff’s Deputy. Thomas was fatally beaten by Fullerton Police officers on July 5, 2011 following attempts to search his backpack due to reports of someone “looking into cars” in the area. Multiple videos of the beating exist, including surveillance footage that has yet to be released by the Orange County District Attorney, and a large number of witnesses have come forward confirming the extremely excessive use of force by the six officers that were attempting to subdue Thomas. One officer in particular was reportedly responsible for beating Thomas repeatedly in the back of the head with a Taser until Thomas began to bleed profusely, as well as dropping his knee against the back of Thomas’ head leading to fractures in his face and the crushing of his windpipe. This officer has been identified as Jay Cicinelli, a former LAPD officer who was shot within weeks of leaving the academy and now only has one eye. The beating is now being investigated by the FBI.
August 10, 2011 in Department of Homeland Security
Reported copper thefts from critical infrastructure and key resource (CIKR) sectors in the United States rose at least 50 percent in 2010 compared to the previous year, largely driven by record-high prices for copper. Individuals and criminal organizations have engaged in copper thefts primarily for financial gain. We have seen no indication that terrorists are using copper thefts in the homeland as a tactic to damage or destroy CIKR facilities or to fund terrorist activity.
August 10, 2011 in Immigration and Customs Enforcement
The SM-CCTV System is a computer network consisting of closed-circuit video cameras, digital video recorders (DVRs), and monitoring capabilities that capture video-only feeds in and around ICE facilities. The purpose of the SM-CCTV System is to help ICE secure and regulate physical access to ICE facilities. The system also serves to enhance officer safety, prevent crimes, and assist in the investigation of criminal acts committed inside and on the perimeter of protected ICE facilities. Video surveillance also supports terrorism prevention and facility protection with its visible presence, and detects and deters unauthorized intrusion at ICE facilities. The SM-CCTV System is planned to be deployed in numerous ICE facilities nationwide.
August 10, 2011 in Department of Homeland Security
The Department of Homeland Security (DHS) currently uses the Terrorist Screening Database (TSDB), a consolidated database maintained by the Department of Justice Federal Bureau of Investigation Terrorist Screening Center (TSC) of identifying information about those known or reasonably suspected of being involved in terrorist activity in order to facilitate DHS mission-related functions, such counterterrorism, law enforcement, border security, and inspection activities. DHS and TSC are improving the current method of transmitting TSDB data from TSC to DHS. Through a new service called the “DHS Watchlist Service” (WLS), TSC and DHS will automate and simplify the current manual process. TSC remains the authoritative source of watchlist data and will provide DHS with near real-time synchronization of the TSDB. DHS will ensure that each DHS component system receives only those TSDB records which they are authorized to use under the WLS Memorandum of Understanding and authorized under existing regulations and privacy compliance documentation between TSC and DHS (WLS MOU) and any amendments or modifications thereto. DHS conducted this privacy impact assessment (PIA) because the WLS will maintain a synchronized copy of the TSDB, which contains personally identifiable information (PII), and disseminate it to authorized DHS components.
Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Afghanistan invoke master narratives in order to move audiences in a preferred direction. Afghan influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.