The California Emergency Management Agency’s original Law Enforcement Guide for Emergency Operations was developed in response to the need for standardization and uniformity of organization and response on the part of law enforcement agencies involved in major multi-jurisdictional and multi-agency incidents such as a civil disorder, technological disaster, or natural disaster. The revised and expanded 2009 Law Enforcement Guide for Emergency Operations is designed to be a practical field-oriented guide to assist law enforcement personnel throughout the State of California with implementation of the Field Level Incident Command System. The intended primary users of this guide are watch commanders and field supervisors. The guide can also be an excellent emergency response tool for law enforcement managers, as well as line officers and deputies.
The following photos were taken before during and after the attempted eviction of the Occupy LA encampment by the LAPD on the evening of November 27 and into the morning of November 28, 2011. Several photos at the end of…
The Federal Reserve and the big banks fought for more than two years to keep details of the largest bailout in U.S. history a secret. Now, the rest of the world can see what it was missing. The Fed didn’t tell anyone which banks were in trouble so deep they required a combined $1.2 trillion on Dec. 5, 2008, their single neediest day. Bankers didn’t mention that they took tens of billions of dollars in emergency loans at the same time they were assuring investors their firms were healthy. And no one calculated until now that banks reaped an estimated $13 billion of income by taking advantage of the Fed’s below-market rates, Bloomberg Markets magazine reports in its January issue.
From 1979 to 2007, real (inflation-adjusted) average household income, measured after government transfers and federal taxes, grew by 62 percent. During that period, the evolution of the nation’s economy and the tax and spending policies of the federal government and state and local governments had varying effects on households at different points in the income distribution: Income after transfers and federal taxes (denoted as after-tax income in this study) for households at the higher end of the income scale rose much more rapidly than income for households in the middle and at the lower end of the income scale.
The Implementation Manual is a companion document developed to provide amplifying and explanatory guidance on the syntax and use of the markings contained in the CAPCO Register. While not the policy basis for individual agencies’ use of any particular marking, the Implementation Manual cites the applicable authority and sponsor for each marking. Some of the Dissemination Controls and Non-Intelligence Community Dissemination Control Markings are restricted to use by certain agencies. They are included to provide guidance on handling documents that bear them. Their inclusion in the manual does not authorize other Agencies to use these markings. Non-US Classification and Joint Classification Markings are restricted to the respective countries or international organizations.
The 2008 version of the Director of National Intelligence’s Classification and Control Markings Register was released via a FOIA request and is available in a redacted form via the Federation of American Scientists. We have obtained an unredacted version and are presenting selected pages alongside the previously released version to highlight the information that was redacted, including several NSA dissemination control markings such as FRONTO, KEYRUT, SEABOOT and SETTEE.
As the Italian government struggled to borrow and Spain considered seeking an international bail-out, British ministers privately warned that the break-up of the euro, once almost unthinkable, is now increasingly plausible. Diplomats are preparing to help Britons abroad through a banking collapse and even riots arising from the debt crisis. The Treasury confirmed earlier this month that contingency planning for a collapse is now under way.
Afghanistan’s former anti-drug czar has warned that opium poppy cultivation will dramatically increase as foreign combat troops head home, with farmers and insurgents taking advantage of a withdrawal set to be complete by the end of 2014. Insecurity in poppy growing regions in Afghanistan — the world’s leading producer of opium — and the expectation among insurgents and farmers that the country will be under the full control of Afghan forces within years is driving production, ex-counter-narcotics minister General Khodaidad said. “With the coming exit strategy for 2014, the whole thing will be completely out of control. All the provinces will go more and more back to poppy,” Khodaidad said at his Kabul house.
Court documents filed by the attorney of Sirhan Sirhan, the alleged assassin of Robert F. Kennedy. The documents claim that Sirhan was a hypno-programmed assassin and that another person fired the gun that killed Kennedy.
The main document used to train California police officers in the use of force.
The Lord’s Resistance Army Disarmament and Northern Uganda Recovery Act, Public Law 111-172, requires the Secretary of State to submit a report to Congress on implementation of the President’s strategy to support disarmament of the Lord’s Resistance Army (LRA) and assistance provided toward a lasting solution to the conflict in northern Uganda.
This policy recognizes that the use of force by law enforcement requires constant evaluation. Even at its lowest level the use of force is a serious responsibility. The purpose of this policy is to provide officers of this department with guidelines on the reasonable use of force. While there is no way to specify the exact amount or type of reasonable force to be applied in any situation, each officer is expected to use these guidelines to make such decisions in a professional, impartial, and safe manner. The use of force by law enforcement personnel is a matter of critical concern both to the public and to the law enforcement community. Officers are involved on a daily basis in numerous and varied human encounters and, when warranted, may use force in carrying out their duties.
The internal “use of firearms” policy for the Sacramento Sheriff’s Department from February 2005.
The internal “use of force” policy for the Sacramento Sheriff’s Department from February 2011.
Senior Iranian parliamentary officials announced that the country has arrested 12 agents of the American Central Intelligence Agency. Member of the Iranian Parliament’s National Security and Foreign Policy Commission Parviz Sorouri said that the agents had been operating in coordination with Israel’s Mossad and other regional agencies, and targeted the country’s military and its nuclear program. “The US and Zionist regime’s espionage apparatuses were trying to damage Iran both from inside and outside with a heavy blow, using regional intelligence services,” Sorouri told the Islamic republic news agency on Wednesday.
A series of documents comprised of all publicly available versions of Facebook’s subpoena and legal compliance guides produced for law enforcement information requests. This site previously published the Facebook law enforcement guides from 2007-2010, which included a 2008 version of the manual that was originally published by Cryptome. The guides were referenced by privacy scholars and others in the media, yet Facebook would not even confirm to Reuters the authenticity of the documents. With two more editions provided by the latest #AntiSec leak (including a second expanded copy from 2010 and a shorter version from 2006), there are now 6 separate versions available from 2006-2010. All but one of the guides are labeled with version numbers documenting the evolution of the Facebook process for supplying user information to law enforcement.
Police departments around the country are moving to shield their radio communications from the public as cheap, user-friendly technology has made it easy for anyone to use handheld devices to keep tabs on officers responding to crimes. The practice of encryption has become increasingly common from Florida to New York and west to California, with law enforcement officials saying they want to keep criminals from using officers’ internal chatter to evade them. But journalists and neighborhood watchdogs say open communications ensure that the public receives information as quickly as possible that can be vital to their safety. D.C. police became one of the latest departments to adopt the practice this fall. Police Chief Cathy Lanier said recently that a group of burglars who police believe were following radio communications on their smartphones pulled off more than a dozen crimes before ultimately being arrested and that drug dealers fled a laundromat after a sergeant used his radio to call in other officers — suggesting that they, too, might have been listening in.
TSA informational poster from October 2011 explaining that flood water sensors often resemble improvised explosive devices (IEDs).
The Department of Homeland Security (DHS) today announced a new partnership between the DHS “If You See Something, Say Something” public awareness campaign and Major League Soccer (MLS)—highlighting the Department’s partnership with the sports industry to ensure the safety and security of the employees, players and fans.“Each of us has a role to play in helping keep America safe, and time and again, we have seen the value of public vigilance in thwarting terrorism and crime,” said Secretary Napolitano. “Promoting the simple, but effective “If You See Something, Say Something” message during the MLS Cup and throughout the MLS season is a significant step in ensuring the safety of the players, spectators and employees.”
A subpoena/legal compliance guide for Microsoft’s MSN Online Services, including Hotmail accounts, that was last revised April 2005.
Multiple versions of the subpoena/legal compliance guides issued by Blizzard Entertainment, makers of World of Warcraft, for law enforcement information requests. Two versions from 2008 and 2009 are included.
A subpoena compliance guide for AOL Inc. describing data retention practices and subpoena guidelines from October 2010.
This brief report was put together by the NYPD Citizen Complaint Review Board in 2002 in response to citizen complaints about officers failing to identify themselves. The report includes a 2003 update to the NYPD Patrol Guide that clearly states that officers are required to “courteously” state their rank, name, badge number and command when asked by any citizen while giving them sufficient time to write down this information.
Leading Democratic party strategists have begun to openly discuss the benefits of embracing the growing and increasingly organized Occupy Wall Street (OWS) movement to prevent Republican gains in Congress and the White House next year. We have seen this process of adopting extreme positions and movements to increase base voter turnout, including in the 2005-2006 immigration debate. This would mean more than just short-term political discomfort for Wall Street firms. If vilifying the leading companies of this sector is allowed to become an unchallenged centerpiece of a coordinated Democratic campaign, it has the potential to have very long-lasting political, policy and financial impacts on the companies in the center of the bullseye. It shouldn’t be surprising that the Democratic party or even President Obama’s re-election team would campaign against Wall Street in this cycle. However the bigger concern should be that Republicans will no longer defend Wall Street companies- and might start running against them too. Well-known Wall Street companies stand at the nexus of where OWS protestors and the Tea Party overlap on angered populism. Both the radical left and t he radical right are channeling broader frustration about the state of the economy and share a mutual anger over TARP and other perceived bailouts. This combination has the potential to be explosive later in the year when media reports cover the next round of bonuses and contrast it with stories of millions of Americans making do with less this holiday season.
This handbook provides an understanding of the processes and procedures being employed by joint force commanders (JFCs) and their staffs to plan, execute, and assess counter threat finance (CTF) activities and integrate them into their joint operation/campaign plans. It provides fundamental principles, techniques, and considerations related to CTF that are being employed in the field and are evolving toward incorporation in joint doctrine.