Three bulletins from the El Paso Intelligence Center on a drug-smuggling ambulance, cocaine hidden in tin cans and pot contaminated with Halon.
With its whitewashed bell tower, groomed lawns and Georgian-style buildings, Brooklyn College looks like a slice of 18th Century America dropped into modern-day New York City. But for years New York police have feared this bucolic setting might hide a sinister secret: the beginnings of a Muslim terrorist cell. Investigators have been infiltrating Muslim student groups at Brooklyn College and other schools in the city, monitoring their Internet activity and placing undercover agents in their ranks, police documents obtained by The Associated Press show. Legal experts say the operation may have broken a 19-year-old pact with the colleges and violated U.S. privacy laws, jeopardizing millions of dollars in federal research money and student aid. The infiltration was part of a secret NYPD intelligence-gathering effort that put entire Muslim communities under scrutiny. Police photographed restaurants and grocery stores that cater to Muslims and built databases showing where people shopped, got their hair cut and prayed. The AP reported on the secret campaign in a series of stories beginning in August.
Criminal complaint issued in the Iran-linked plot to assassinate the Saudi Arabian ambassador to the United States, USA vs. MANSSOR ARBABSIAR a/k/a “Mansour Arbabsiar” and GHOLAM SHAKURI a/k/a “Ali Gholam Shakuri”.
The full text version of a notice first tweeted, then physically handed out to protesters at the Occupy Boston Rally reminding them that the Boston Police Department “Respects Your Right to Peacefully Protest.” The note should be juxtaposed against the events which later transpired, including a large number of arrests well documented in photos and video.
More than 60 years ago, in his “Foundation” series, the science fiction novelist Isaac Asimov invented a new science — psychohistory — that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet — Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones — to do the same thing. The most optimistic researchers believe that these storehouses of “big data” will for the first time reveal sociological laws of human behavior — enabling them to predict political crises, revolutions and other forms of social and economic instability, just as physicists and chemists can predict natural phenomena.
The FBI by mid-January will activate a nationwide facial recognition service in select states that will allow local police to identify unknown subjects in photos, bureau officials told Nextgov. The federal government is embarking on a multiyear, $1 billion dollar overhaul of the FBI’s existing fingerprint database to more quickly and accurately identify suspects, partly through applying other biometric markers, such as iris scans and voice recordings. Often law enforcement authorities will “have a photo of a person and for whatever reason they just don’t know who it is [but they know] this is clearly the missing link to our case,” said Nick Megna, a unit chief at the FBI’s criminal justice information services division. The new facial recognition service can help provide that missing link by retrieving a list of mug shots ranked in order of similarity to the features of the subject in the photo.
Los Angeles Joint Drug Intelligence Group Intelligence Bulletin on Diverted Pharmaceuticals & Gang Distribution from March 2010.
Masked gunmen dump the bodies of 35 murder victims during rush hour as terrified motorists watch and tweet friends to avoid the avenue in a coastal city. A couple of weeks later, 32 more corpses are found nearby in three houses. A woman’s decapitated body is left at a border city’s monument to Columbus, the head atop a computer keyboard with a sign saying she was killed for blogging about drug traffickers. The severed heads of five men are dumped outside an elementary school in Acapulco, and two more near a military base in Mexico City days later. That was just in the past three weeks.
On 21 Sep 11, USACIDC reported the CRIPS have put out an order to shoot any Solider in uniform on sight in retaliation for the shooting of their members by Soldiers earlier in the week. The Lawton Oklahoma Police Department has confirmed the CRIPS have threatened to kill soldiers in uniform. The threat stems from when the soldiers, in retaliation for drug rip off, entered the off-post residence of the CRIPS, robbed and subsequently shot some of the CRIPS members. Three of the victims were identified as members of the “107 Hoover CRIPS.”
Switzerland climbed to the top of a financial secrecy index, even after a global crackdown on tax evasion, according to a report from the Tax Justice Network. The Alpine country, whose secrecy laws date back to 1934, was followed by The Cayman Islands, Luxembourg and Hong Kong, the London-based Tax Justice Network said. The U.S., which topped a 2009 index through the state of Delaware, was placed fifth in a study of 72 tax jurisdictions published today. While Switzerland agreed in March 2009 to meet international standards to avoid being blacklisted as a tax haven by the Organization for Economic Cooperation and Development, the country continues to resist the automatic exchange of information, the Tax Justice Network said. Agreements signed in August with the U.K. and Germany to end disputes over tax evasion will “entrench Swiss banking secrecy,” according to the study.
This order directs structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks that shall be consistent with appropriate protections for privacy and civil liberties. Agencies bear the primary responsibility for meeting these twin goals. These structural reforms will ensure coordinated interagency development and reliable implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and minimum standards for sharing classified information both within and outside the Federal Government. These policies and minimum standards will address all agencies that operate or access classified computer networks, all users of classified computer networks (including contractors and others who operate or access classified computer networks controlled by the Federal Government), and all classified information on those networks.
DHS Human Factors/Behavioral Sciences Division presentation on social network analysis, behavioral threat detection and biometrics programs as of May 2009.
Overview presentation from 2007 regarding the Future Attribute Screening Technology Mobile Module (FAST M2), a system for identifying potential threats via behavioral analysis.
Customs and Border Protection Bandidos Motorcycle Club global distribution map produced in May 2010.
Confidential Draft of U.S. Treasury “Volcker Rule” Restrictions on Proprietary Trading With Hedge Funds
The OCC, Board, FDIC, and SEC (individually, an “Agency,” and collectively, “the Agencies”) are requesting comment on a proposed rule that would implement Section 619 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (“Dodd-Frank Act”) which contains certain prohibitions and restrictions on the ability of a banking entity and nonbank financial company supervised by the Board to engage in proprietary trading and have certain interests in, or relationships with, a hedge fund or private equity fund.
Department of Homeland Ssecurity Bomb-Making Awareness Program (BMAP) Law Enforcement and Private Sector User Guides along with accompanying promotional posters from 2009.
According to multiple media reports, on 7 September an explosion occurred inside the reception area of the Delhi High Court in New Delhi, India at approximately 10:00am local time. The blast killed at least 11 people and injured some 76 others. Indian authorities reported to the press that the explosives were inside a briefcase left in a reception area in between the security gates of the High Court. India’s National Security Guard Director indicated that the device contained ammonium nitrate, which was also used in the most recent bomb against the court complex on 25 May. Harakat-ul-Jihad al-Islami (HUJI) claimed responsibility for the blast in an e-mail message and demanded that India repeal the death sentence of Afzal Guru, who was convicted of attacking the Indian Parliament building in 2001 and is awaiting execution.
These photos and videos depict a New York Police Department Lieutenant named Connolly striking protesters blindly with a baton. This man has been identified as Lt. Brian Connolly of the 9th Precinct, who was awarded the Medal for Valor in…
A method is described for tracking information about the activities of users of a social networking system while on another domain. The method includes maintaining a profile for each of one or more users of the social networking system, each profile identifying a connection to one or more other users of the social networking system and including information about the user. The method additionally includes receiving one or more communications from a third-party website having a different domain than the social network system, each message communicating an action taken by a user of the social networking system on the thirdparty website. The method additionally includes logging the actions taken on the third-party website in the social networking system, each logged action including information about the action. The method further includes correlating the logged actions with one or more advertisements presented to the one or more users on the third-party website as well as correlating the logged actions with a user of the social networking system.
Los Angeles City Council Resolution unanimously passed October 5, 2011 in support of Occupy LA and the Occupy Wall Street protests.
The Cookie Monster might want to share more than a few crumbs when a new character joins the “Sesame Street” gang: a girl called Lily from a family hard-pressed to put food on the table. The fuchsia-faced puppet will star in an hour-long primetime special on Sunday from the producers of the long-running children’s television show to draw attention to hunger among American families. “When you don’t even know whether you’re going to have a next meal or not, that can be pretty hard,” Lily, rubbing her empty belly, was seen telling a compassionate Elmo in a preview video on Wednesday. “Many people don’t realize this is a problem that hits close to home,” says country-rock star Brad Paisley on the show. “One in four children do not regularly know where their next meal is coming from, in our country.”
For those who wish to understand the true nature of our current financial system, the Pujo Committee’s 1912-1913 investigation of the “Money Trust” is essential reading. The Committee identified a concentrated group of Wall Street bankers who operated a sophisticated financial network unified by 341 interlocking directorships held in 112 corporations valued at more than $22 billion in resources and capitalization exerting significant control and influence over the U.S. economy and monetary system. The companies and individuals comprising this network were primarily agents of the Morgan and Rockefeller banking empires which dominated U.S. finance following the “Industrial Revolution”. The Committee names a number of prominent banking institutions as participating in this system including J.P. Morgan & Co., First National Bank of New York, Kuhn Loeb & Co. and individuals such as Paul Warburg, Jacob H. Schiff, Felix M. Warburg, Frank E. Peabody, William Rockefeller and Benjamin Strong, Jr. Understanding this system of overlapping financial networks and how those networks are used to dominate utilities, railroads, banking and the U.S. financial infrastructure throughout much of the twentieth century is key to the proper analysis of our current economic situation and the influence that the “Money Power” wields over global politics.
Reports of mortgage fraud in the U.S. surged by nearly 88% in the second quarter of this year as banks discovered more problem loans made during the housing boom, according to a government report released Wednesday. The Financial Crimes Enforcement Network, a Treasury Department agency, reported 29,558 “suspicious activity reports” related to suspected mortgage fraud in the April-June period. That was up from 15,727 in the same quarter a year earlier. The increase was attributed to mortgage servicers performing reviews of loan files after receiving demands from mortgage investors to repurchase defaulted mortgages. Government-controlled mortgage-finance giants Fannie Mae and Freddie Mac and other mortgage investors have been trying to recoup losses by forcing banks to buy back loans that don’t meet underwriting guidelines.
U.S. Customs and Border Protection Laredo Sector Intelligence Unit seizure of $1,757,665 of marijuana hidden in a cloned school bus from October 2009.
National Postal Model for the Delivery of Medical Countermeasures developed following Executive Order 13527 “Establishing Federal Capability for the Timely Provision of Medical Countermeasures Following a Biological Attack”.