A cache of papers found at the intelligence headquarters dating from the time it was run by Moussa Koussa, who later became foreign minister and defected in March, showed Libya was handed Islamist opposition members as part of the CIA’s “extraordinary rendition” programme. MI6 also provided extensive information to the Libyan authorities of opponents living in Britain. The British intelligence services seem to have been more circumspect than their American colleagues, however. Often the files, which were found by Human Rights Watch and shown to The Sunday Telegraph, suggest they restricted themselves to confirming information already known to the Libyans.
On 31 May 2010 at 4.26 a.m. a flotilla of six vessels was boarded and taken over by Israeli Defense Forces 72 nautical miles from land. The vessels were carrying people and humanitarian supplies. The flotilla had been directed to change course by the Israeli forces who stated that the coast of Gaza was under a naval blockade. Nine passengers lost their lives and many others were wounded as a result of the use of force during the take-over operation by Israeli forces.
Over the last few years, it has become more commonplace to see military-type weaponry such as grenades and assault rifles utilized by Mexican drug trafficking organizations (DTOs). Increasingly, many of the reported hand grenade seizures in United States are illegal, improvised grenades destined for Mexico and the DTOs. These devices have become a weapon of choice for Mexican DTOs because they are cheap, the components are relatively easy to obtain and manufacture, are easily concealable, and can kill or injure large numbers of people indiscriminately. Reports have indicated that grenade attacks originated mostly in southern Mexico around the beginning of President Felipe Calderon’s presidency in 2006, and have steadily spread northward as the conflicts between rival DTO cartels, and Mexican government’s enforcement efforts have intensified in the northern Mexican Border States.
As of February 2010, al-Qa‘ida was allegedly contemplating conducting an operation against trains at an unspecified location in the United States on the tenth anniversary of 11 September 2001. As one option, al-Qa‘ida was looking at the possibility of tipping a train by tampering with the rails so that the train would fall off the track at either a valley or a bridge. Al-Qa‘ida noted that an attack from tilting the train would only succeed one time because the tilting would be spotted. Al-Qa‘ida also noted that newer train cars each have their own braking system, and that movement in a specific direction would derail it, but would not cause it to fall off the track.
China remained quiet Tuesday as a recently leaked video of a Chinese general’s candid remarks — apparently made at a corporate event in March — on sensitive spying cases continued to draw international attention. The ministries of defense and foreign affairs have not responded to CNN’s inquiries, and numerous phone calls to National Defense University, where the general — Maj. Gen. Jin Yinan — teaches, went unanswered. State media made no mention of the story. In a clip found on YouTube and smaller video-sharing sites, Jin — with the help of slides — presented eight major espionage cases. While some cases had been publicized, others had never been revealed or discussed in detail before, especially those involving senior officers of the normally secretive People’s Liberation Army (PLA).
A small but growing proxy war is underway in Mexico pitting US-assisted assassin teams composed of elite Mexican special operations soldiers against the leadership of an emerging cadre of independent drug organizations that are far more ruthless than the old-guard Mexican “cartels” that gave birth to them. These Mexican assassin teams now in the field for at least half a year, sources tell Narco News, are supported by a sophisticated US intelligence network composed of CIA and civilian US military operatives as well as covert special-forces soldiers under Pentagon command — which are helping to identify targets for the Mexican hit teams. Evidence of this intelligence support network has surfaced recently even in mainstream media reports, in outlets such as the New York Times and the Mexican publication El Universal — the former reporting that “CIA operatives and American civilian military employees have been posted at a Mexican military base,” and the latter reporting that elite US and Mexican troops engaged in joint training exercises in Colorado earlier this year.
This paper summarizes the responses of six Marine battalion commanders who served in stability and support operations (SASO) and counterinsurgency (COIN) environments of Operation Enduring Freedom (OEF) and Operation Iraqi Freedom (OIF). These commanders were interviewed on their approach to their duties, how they exercised their authority and balanced the use of kinetic and non-kinetic effects in accomplishing their myriad missions and tasks. The content of this report may serve to guide future commanders.
The intent of this bulletin is to provide Law Enforcement Officers (LEOs) with a general knowledge of ambush tactics used by the Tijuana Cartel against Mexican LEOs in Tijuana, Mexico. The San Diego Police Department (SDPD) Officer Safety Bulletin dated October 3, 2010, outlining Mexican Drug Trafficking Organizations’ (DTOs) and San Diego street gangs’ use of Tijuana Cartel tactics in San Diego County, identified a need for a more comprehensive review of cartel tactics used south of the U.S. border.
Al Jazeera news producer Jamal Elshayyal recently gained access to the Tripoli headquarter of Libya’s intelligence agency. Among the documents scattered throughout the demolished building were secret files indicating that influential Americans advised Muammar Gaddafi since the beginning of the Libyan uprising.
A leaked document from the United Nations regarding post-conflict deployment to Libya and discussing the possible continued role of NATO in military peacekeeping operations.
Malicious users seeking to exploit interest related to physical events such as earthquakes and hurricanes will likely use subject lines and attachment titles related to the incidents in phishing e-mails. Network administrators and general users should be aware of these attempts and avoid opening messages with attachments and/or subject lines related to physical events.
The company “Legally Concealed” has created and is marketing decals and apparel to the public “specifically to show support and solidarity for the 2nd Amendment”. According to their website, http://www.legallyconcealed.org/ the special symbol, of the (2) silver lines and number “2” on the black background was “designed in the same spirit of the law enforcement “thin blue line””.
According to recent open source reporting, law enforcement officers (LEO’s) have been encountering bombs made of innocuous trash bags that have caused injuries to responding officers or significant damage to property. LEO’s are encouraged not to touch the light (airy), low-flying, closed trash bags; consider evacuating the immediate area; and, to call the appropriate response personnel.
Only hours before Anders Behring Breivik began shooting children on Utøya, the police emergency squad concluded an exercise where they practiced an almost identical situation.
A high-ranking Department of Defense employee was charged Thursday with taking a bribe at an international conference in Atlanta to steer lucrative federal contracts for work in Afghanistan to a contractor. Desi Deandre Wade, the department’s Chief of Fire and Emergency Services in Afghanistan, was arrested Wednesday at the Fire-Rescue International Conference in downtown Atlanta after he took $95,000 in cash from a contractor, U.S. Attorney Sally Quillian Yates said. “While he was supposed to be working to support our troops, he was lining his pockets,” she said. Wade’s attorney Allison Dawson said at an initial hearing Thursday that her client, a military veteran, intended to plead not guilty.
Hurricane Irene Department of Homeland Security Infrastructure Sector Analysis Summary as of August 27, 2011 11:00 EDT.
This Joint Intelligence Bulletin (JIB) highlights potential terrorist threats related to the 10-year anniversary of the 11 September 2001 (9/11) attacks. This JIB provides perspective on the threat to the Homeland and US interests overseas from al-Qa‘ida, al-Qa‘ida affiliates and allies, and al-Qa‘ida-inspired homegrown violent extremists (HVEs). FBI and DHS are providing this information to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, as well as first responders and private sector security officials, in effectively deterring, preventing, or disrupting terrorist attacks against the United States. Unless otherwise noted, this JIB uses the FBI’s definitions of terms, which may differ from the definitions used by DHS.
Recent partnerships with the “If You See Something, Say Something” campaign include the Indianapolis 500, the U.S. Open, the Washington State Ferries, The City of Los Angeles, AEG Worldwide, Massachusetts Bay Transportation Authority, the National Collegiate Athletic Association (NCAA), the National Basketball Association (NBA), the National Football League (NFL), Walmart, Mall of America, the American Hotel & Lodging Association, Amtrak, and the Washington Metropolitan Area Transit Authority. In addition more than 9,000 federal buildings, the general aviation industry, and state and local fusion centers across the country also participate in the campaign.
Charlotte-Mecklenburg Police Department presentation on predictive crime analytics from July 2011.
This Joint Intelligence Bulletin (JIB) updates a DHS-FBI joint analytic product of the same title dated 3 September 2010 and is intended to provide warning and perspective regarding the scope of the potential terrorist threats to the United States, specifically towards US persons. This product is provided to support the activities of DHS and FBI and to help federal, state, and local government counterterrorism and law enforcement officials deter, prevent, preempt, or respond to terrorist attacks directed against the United States.
Large police departments maintain dozens of databases. It is unusual to see these computer systems linked together to enable effective analysis. It is even more unlikely that other information sources, such as gunshot detection systems or dispatch systems, are linked into police analytical or fusion centers. Finally, police departments do not link their operations and information systems to other parts of the justice system or social services system. Thus, poor information sharing prevents good analysis and investigation. Even more troubling, poor information sharing can undermine efforts to intervene with individuals or neighborhoods to stop the cycle of violence. The best way to see the future and act appropriately is to have a complete picture of the current situation. Police must integrate their information and activities to enable situational awareness.
After examining hundreds of combat support and reconstruction contracts in Afghanistan, the U.S military estimates $360 million in U.S. tax dollars has ended up in the hands of people the American-led coalition has spent nearly a decade battling: the Taliban, criminals, and power brokers with ties to both. The losses underscore the challenges the U.S. and its international partners face in overcoming corruption in Afghanistan. A central part of the Obama administration’s strategy has been to award U.S.-financed contracts to Afghan businesses to help improve quality of life and stoke the country’s economy. But until a special task force assembled by Gen. David Petraeus began its investigation last year, the coalition had little visibility into the connections many Afghan companies and their vast network of subcontractors had with insurgents and criminals — groups military officials call “malign actors.” In a murky process known as “reverse money laundering,” payments from the U.S. pass through companies hired by the military for transportation, construction, power projects, fuel and other services to businesses and individuals with ties to the insurgency or criminal networks, according to interviews and task force documents obtained by the AP.
U.S. House of Representatives Report: Warlords Provide Security for U.S. Supply Chain in Afghanistan
Security for the U.S. Supply Chain Is Principally Provided by Warlords. The principal private security subcontractors on the HNT contract are warlords, strongmen, commanders, and militia leaders who compete with the Afghan central government for power and authority. Providing “protection” services for the U.S. supply chain empowers these warlords with money, legitimacy, and a raison d’etre for their private armies. Although many of these warlords nominally operate under private security companies licensed by the Afghan Ministry of Interior, they thrive in a vacuum of government authority and their interests are in fundamental conflict with U.S. aims to build a strong Afghan government.
This FOUO pocket guide provides information used by battle staffs involved in planning, coordinating, synchronizing or executing actions that support the effective employment of unmanned aircraft systems (UAS) on the battlefield. Covers the MQ-1B PREDATOR, MQ-1 WARRIOR A, MQ-1C ER/MP, MQ-9 REAPER, MQ-5B HUNTER, RQ-7B SHADOW.