Recent partnerships with the “If You See Something, Say Something” campaign include the Indianapolis 500, the U.S. Open, the Washington State Ferries, The City of Los Angeles, AEG Worldwide, Massachusetts Bay Transportation Authority, the National Collegiate Athletic Association (NCAA), the National Basketball Association (NBA), the National Football League (NFL), Walmart, Mall of America, the American Hotel & Lodging Association, Amtrak, and the Washington Metropolitan Area Transit Authority. In addition more than 9,000 federal buildings, the general aviation industry, and state and local fusion centers across the country also participate in the campaign.
Charlotte-Mecklenburg Police Department presentation on predictive crime analytics from July 2011.
This Joint Intelligence Bulletin (JIB) updates a DHS-FBI joint analytic product of the same title dated 3 September 2010 and is intended to provide warning and perspective regarding the scope of the potential terrorist threats to the United States, specifically towards US persons. This product is provided to support the activities of DHS and FBI and to help federal, state, and local government counterterrorism and law enforcement officials deter, prevent, preempt, or respond to terrorist attacks directed against the United States.
Large police departments maintain dozens of databases. It is unusual to see these computer systems linked together to enable effective analysis. It is even more unlikely that other information sources, such as gunshot detection systems or dispatch systems, are linked into police analytical or fusion centers. Finally, police departments do not link their operations and information systems to other parts of the justice system or social services system. Thus, poor information sharing prevents good analysis and investigation. Even more troubling, poor information sharing can undermine efforts to intervene with individuals or neighborhoods to stop the cycle of violence. The best way to see the future and act appropriately is to have a complete picture of the current situation. Police must integrate their information and activities to enable situational awareness.
After examining hundreds of combat support and reconstruction contracts in Afghanistan, the U.S military estimates $360 million in U.S. tax dollars has ended up in the hands of people the American-led coalition has spent nearly a decade battling: the Taliban, criminals, and power brokers with ties to both. The losses underscore the challenges the U.S. and its international partners face in overcoming corruption in Afghanistan. A central part of the Obama administration’s strategy has been to award U.S.-financed contracts to Afghan businesses to help improve quality of life and stoke the country’s economy. But until a special task force assembled by Gen. David Petraeus began its investigation last year, the coalition had little visibility into the connections many Afghan companies and their vast network of subcontractors had with insurgents and criminals — groups military officials call “malign actors.” In a murky process known as “reverse money laundering,” payments from the U.S. pass through companies hired by the military for transportation, construction, power projects, fuel and other services to businesses and individuals with ties to the insurgency or criminal networks, according to interviews and task force documents obtained by the AP.
U.S. House of Representatives Report: Warlords Provide Security for U.S. Supply Chain in Afghanistan
Security for the U.S. Supply Chain Is Principally Provided by Warlords. The principal private security subcontractors on the HNT contract are warlords, strongmen, commanders, and militia leaders who compete with the Afghan central government for power and authority. Providing “protection” services for the U.S. supply chain empowers these warlords with money, legitimacy, and a raison d’etre for their private armies. Although many of these warlords nominally operate under private security companies licensed by the Afghan Ministry of Interior, they thrive in a vacuum of government authority and their interests are in fundamental conflict with U.S. aims to build a strong Afghan government.
This FOUO pocket guide provides information used by battle staffs involved in planning, coordinating, synchronizing or executing actions that support the effective employment of unmanned aircraft systems (UAS) on the battlefield. Covers the MQ-1B PREDATOR, MQ-1 WARRIOR A, MQ-1C ER/MP, MQ-9 REAPER, MQ-5B HUNTER, RQ-7B SHADOW.
A restricted distribution presentation from the U.S. Air Force Research Laboratory massive cloud traffic auditing and online data mining presentation from July 2011.
Presidential Policy Directive-2 (PPD-2) Implementing National Strategy for Countering Biological Threats
Presidential Policy Directive 2 is one of a number that have not previously been released. It was publicly posted to a collaboration server for U.S. military personnel complete with its National Security Council coversheet intact, providing a rare look at dissemination guidelines utilized in high-level documentation.
Four versions of the U.S. Army and Air Force civil disturbance plan known as Garden Plot from 1968-1991.
Recent unrest in London has sparked media interest in the U.S. military’s plans for civil unrest, including a report from the Atlantic on a little known document called CONPLAN 3502. With economies declining around the world and social unrest spreading throughout the Middle East and even into Western democracies, many wonder what would happen if this sort of unrest and violence were to spread to the United States. Would the response be measured and calm, respecting popular movements and upholding fundamental human rights, or would the response look something more like what is happening in Syria? To understand just what would happen in the event of widespread unrest in the United States, you must first familiarize yourself with CONPLAN 3502, the classified military plan for civil disturbances. A slide from a U.S. Northern Command presentation previously published by this site indicates that CONPLAN 3502 is one of several Contingency Plans (CONPLANs) for domestic U.S. military operations in the event of a disaster, terrorist attack or national security special event (NSSE). Several of the plans deal with Defense Support to Civil Authorities (DSCA) in times of disaster or crisis, including pandemic influenza outbreaks, nuclear and radiological events, as well as chemical weapons attacks. Though, CONPLAN 3502 is unique in that it deals exclusively with support operations conducted with local authorities during times of “civil disturbance”. Because CONPLAN 3502 is classified “Secret”, it has not been released to the public and little is known of its contents. However, through bits of information found in a number of relevant documents, a fairly coherent picture of military civil disturbance planning may be ascertained.
Despite aggressive law enforcement efforts, stricter government regulations and tighter borrowing standards, mortgage fraud “remains elevated,” and may be getting worse, the FBI said Friday. While top officials admitted they didn’t want to sound “alarmist,” they acknowledged the distressed housing market, bleak unemployment picture and weak economy continue to provide fertile ground for fraud in the mortgage industry. “It could get worse,” said Deputy Assistant FBI Director David Cardona, who oversees the FBI’s financial crimes units. “There could be more victims,” he said.
These formerly classified photos are part of a series released by the German artist Simon Menner that he reportedly obtained from the Stasi archives. This particular set demonstrates Stasi agents demonstrating different techniques for disguising themselves. Blurring of the eyes…
“Body packing” is a well-documented concealment method criminals have used to smuggle drugs or other contraband. Body packing in humans and animals may involve several forms of concealment — including insertion into body orifices, ingestion, or possibly surgical implantation—of illicit items or material inside or hidden on the body to escape detection by security systems and personnel. Terrorists often assign high priority to concealment in planning attacks, and such methods—to include surgical implantation—offer potential means for suicide operatives to deliver improvised explosive devices to targets.
This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.
This regulation prescribes responsibilities, policy, and guidance for the Department of the Army in planning and operations involving the use of Army resources in the control of actual or anticipated civil disturbances. Basic authority is contained in DOD Directive 3025.12, Employment of Military Resources in the Event of Civil Disturbances.
The FBI has been notified that ATX Global, an online marketing company, has mailed approximately 730 envelopes that include a marketing letter with an affixed live 9mm Luger PPU round. The ammo was used to catch the reader’s attention corresponding with the first line, “If you had just One Shot…” This mass mailing did not specifically target gun and ammo businesses.
The Criminal Justice Sector Assessment Rating Tool (CJSART) is designed to assist policy makers and program managers to prioritize and administer host-nation criminal justice sectors needing assistance. Once the assistance programs are underway, the CJSART is a systematic tool designed to measure progress and accomplishments against standardized benchmarks. Used in its entirety, the CJSART holistically examines a country’s laws, judicial institutions, law enforcement organizations, border security, and corrections systems as well as a country’s adherence to international rule of law standards such as bilateral and multilateral treaties.
These template of the Standing Rules for the Use of Force developed by Army North (ARNORTH) and approved by Army Judge Advocate General (JAG) School for commands to follow. The first two templates apply to forces under federal control. The third template is an example State RUF card for National Guard personnel in a SAD or Title 32 status. These templates are taken from the “DoD Defense Support to Civil Authorities Handbook” which includes other information relating to military support operations related to civil disturbances.
Google has admitted complying with requests from US intelligence agencies for data stored in its European data centers, most likely in violation of European Union data protection laws. Gordon Frazer, Microsoft UK’s managing director, made news headlines some weeks ago when he admitted that Microsoft can be compelled to share data with the US government regardless of where it is hosted in the world. At the center of this problem is the USA PATRIOT ACT, which states that companies incorporated in the United States must hand over data administered by their foreign subsidiaries if requested. Not only that, but they can be forced to keep quiet about it in order to avoid exposing active investigations and alert those targeted by the probes.
With the 10th anniversary of the 9/11 attacks only a month away, former CIA Director George Tenet and two former top aides are fighting back hard against allegations that they engaged in a massive cover-up in 2000 and 2001 to hide intelligence from the White House and the FBI that might have prevented the attacks. The source of the explosive, unproved allegations is a man who once considered Tenet a close friend: former White House counterterrorism czar Richard Clarke, who makes the charges against Tenet and the CIA in an interview for a radio documentary timed to the 10th anniversary next month. Portions of the Clarke interview were made available to The Daily Beast by the producers of the documentary. In the interview for the documentary, Clarke offers an incendiary theory that, if true, would rewrite the history of the 9/11 attacks, suggesting that the CIA intentionally withheld information from the White House and FBI in 2000 and 2001 that two Saudi-born terrorists were on U.S. soil – terrorists who went on to become suicide hijackers on 9/11.
A photo of a 37-year-old schizophrenic homeless man named Kelly Thomas that was taken in the hospital by his father Ron Thomas, a former Orange County Sheriff’s Deputy. Thomas was fatally beaten by Fullerton Police officers on July 5, 2011 following attempts to search his backpack due to reports of someone “looking into cars” in the area. Multiple videos of the beating exist, including surveillance footage that has yet to be released by the Orange County District Attorney, and a large number of witnesses have come forward confirming the extremely excessive use of force by the six officers that were attempting to subdue Thomas. One officer in particular was reportedly responsible for beating Thomas repeatedly in the back of the head with a Taser until Thomas began to bleed profusely, as well as dropping his knee against the back of Thomas’ head leading to fractures in his face and the crushing of his windpipe. This officer has been identified as Jay Cicinelli, a former LAPD officer who was shot within weeks of leaving the academy and now only has one eye. The beating is now being investigated by the FBI.
Reported copper thefts from critical infrastructure and key resource (CIKR) sectors in the United States rose at least 50 percent in 2010 compared to the previous year, largely driven by record-high prices for copper. Individuals and criminal organizations have engaged in copper thefts primarily for financial gain. We have seen no indication that terrorists are using copper thefts in the homeland as a tactic to damage or destroy CIKR facilities or to fund terrorist activity.
The SM-CCTV System is a computer network consisting of closed-circuit video cameras, digital video recorders (DVRs), and monitoring capabilities that capture video-only feeds in and around ICE facilities. The purpose of the SM-CCTV System is to help ICE secure and regulate physical access to ICE facilities. The system also serves to enhance officer safety, prevent crimes, and assist in the investigation of criminal acts committed inside and on the perimeter of protected ICE facilities. Video surveillance also supports terrorism prevention and facility protection with its visible presence, and detects and deters unauthorized intrusion at ICE facilities. The SM-CCTV System is planned to be deployed in numerous ICE facilities nationwide.
The Department of Homeland Security (DHS) currently uses the Terrorist Screening Database (TSDB), a consolidated database maintained by the Department of Justice Federal Bureau of Investigation Terrorist Screening Center (TSC) of identifying information about those known or reasonably suspected of being involved in terrorist activity in order to facilitate DHS mission-related functions, such counterterrorism, law enforcement, border security, and inspection activities. DHS and TSC are improving the current method of transmitting TSDB data from TSC to DHS. Through a new service called the “DHS Watchlist Service” (WLS), TSC and DHS will automate and simplify the current manual process. TSC remains the authoritative source of watchlist data and will provide DHS with near real-time synchronization of the TSDB. DHS will ensure that each DHS component system receives only those TSDB records which they are authorized to use under the WLS Memorandum of Understanding and authorized under existing regulations and privacy compliance documentation between TSC and DHS (WLS MOU) and any amendments or modifications thereto. DHS conducted this privacy impact assessment (PIA) because the WLS will maintain a synchronized copy of the TSDB, which contains personally identifiable information (PII), and disseminate it to authorized DHS components.