FBI Phoenix Division Cyber Crime Report “Botnet Owners Share Honeypot Internet Protocol Addresses in Attempt to Avoid Law Enforcement and Security Vendor Scrutiny”.
Bureau of Alcohol, Tobacco, Firearms and Explosives Project Gunrunner Southwest Border Strategy Weapons of Choice from February 2008.
In a seizure during an outbound parcel interdiction, Counter Narcotics Alliance (CNA) agents seized a box of wine at the FedEx Tucson hub. The Arizona Department of Public Safety lab analyzed a red fluid concealed in the wine bladder of Franzia boxed wine. The liquid was prescription cough syrup distributed at the street level as “purple drank”, slang for a recreational drug popular in the hip-hop community. The main ingredients are codeine, a narcotic, and promethazine, an antihistamine. Purple Drank is typically mixed with ingredients such as Sprite and pieces of Jolly Rancher candy. Numerous slang terms for purple drank include: “Sizzurp, Lean, Syrup, Drank, Barre, Purple Tonic, Southern Lean, Texas Tea, Memphis Mud, Mrs. Dranklesworth, Tsikuni, Lean, P-Flav, Slip, Purple Sprite, PG Tips, Purp, and Purple Jelly”. The generic prescription name is Phenergan. Reported side effects include: drowsiness, sedation, somnolence, blurred vision, dizziness; confusion, disorientation, lassitude, tinnitus, in coordination, fatigue, euphoria, nervousness, insomnia, tremors, convulsive seizures, excitation, catatonic-like states, hysteria, and hallucinations.
The powerful confederation of Mexican DTOs known as the Sinaloa cartel controls the majority of Mexico’s marijuana and methamphetamine production and distribution, as well as cocaine trafficking from South and Central American producers into the United States across the U.S. southwest border. The Sinaloa cartel conducts business with powerful U.S. gangs that largely control local drug distribution. As one of the most powerful cartels operating in Mexico, it has expanded operations throughout western Mexico and attempted to take control of new plazas from weaker organizations.* Arrests of high-level members have not fractured the cartel or caused infighting—as was the case with several of its rivals—likely because of the cartel’s stable revenue sources, decentralized structure, family-based culture, and geographic breadth, which all contribute to its preeminence.
The 2008 Homeland Security Threat Assessment (HSTA) is a strategic assessment looking out five years. The HSTA represents the analytical judgments of the Department of Homeland Security (DHS) Intelligence Enterprise (IE) regarding the critical threats to the U.S. Homeland that the Department will need to address in the period 2008-2013.
The information contained in this bulletin identifies a tactic recently employed against an Arizona Department of Public Safety (AZ DPS) officer. The incident occurred at a scheduled demonstration by a known citizen action group to protest the traffic cameras on Arizona’s highways. This information is provided for situational awareness to assist law enforcement engaged in public event site security; and for those monitoring potential threats at public gatherings.
There are many different ideologies that an anarchist may follow. Although there may be a number of differences, they all contain the same central belief. Anarchism is the idea that government (the state) is unnecessary and harmful. Anarchy is society without government. Anarchists are people who desire to live in a society without ru-lers as their ancestors once did. The main belief is that the community in which they live be dependant only upon itself. People who believe in government (such as liberals, conservatives, socialists and fascists) are known as “statists”. Anarchism opposes all forms of hierarchical control.
This Homeland Security Assessment examines threats to U.S. border security emanating from the Mexican state of Sonora, which borders Arizona and a small section of New Mexico. It discusses drug and alien smuggling, border violence, and Mexican federal, state, and local government capabilities to confront organized crime. This is the fifth of six planned assessments on current threats to homeland security arising in Mexican states along the U.S. border. It is intended primarily for working-level analysts and operators engaging in homeland security-related activities and concerned with pertinent developments in Sonora and nearby U.S. territory.
The Sovereign Citizens and Militia Movements have been in existence for a number of years and remain active throughout the US today. The Sovereign Citizen Movement began in the 1970’s when groups/individuals adopted right-wing anarchist ideologies originating from the theories of the group called the Posse Comitatus. The Militia Movement began to form not long after the 1993 Waco, Texas incident.
A presentation from U.S. Immigration and Customs Enforcement’s Enforcement Systems Branch on the status of information sharing presented at the 2011 AFCEA Homeland Security Conference on February 23, 2011.
Two banks in Britain are being investigated for lax money-laundering controls and others are likely to be handling the proceeds of corruption and other financial crime, the financial regulator said on Wednesday. The Financial Services Authority (FSA) said it had referred two banks to its enforcement division for “serious weaknesses” in how they managed “high-risk” customers, including those whose public status made them vulnerable to corruption. “We are considering whether further regulatory action is required in relation to other banks, and further cases may be referred for enforcement,” the FSA added as it published a review of how banks manage money-laundering risks.
This note has been produced by the Rightsholder Group as an initial response to a request from the Minister for Culture, Communications and the Creative Industries to see whether there is scope to move toward across-industry voluntary approach to inhibiting access to websites that are substantially focused upon infringement of copyright. Our proposal is for a voluntary approach that will have a significant impact on the problem of infringement undertaken using the internet while being legally and technically feasible, cost-effective and proportionate. Our proposal is advanced on the basis that sound internet policy should encompass notions of accountability to incentivise private sector participants to take commercially reasonable steps, where available, to prevent or limit those harms that flow from the products or services they offer. This is a complex issue and we have addressed it here by offering a general approach based on core principles, exemplified by a more detailed explanation of the legal basis for the approach and of how such a system could work.
Restricted U.S. Air Force F-16A/B Flight Manual from August 15, 2003.
United Nations Department of Peace-keeping Operations Civilian Police Handbook from October 1995.
U.S. Army presentation titled “Negotiations: A Preparation Guide for Commanders” from 2003.
Think you could avoid the TSA’s body scanners and pat-downs by taking Amtrak? Think again. Even your daily commute isn’t safe from TSA screenings. And because the TSA is working with Immigration and Customs Enforcement (ICE) and Border Patrol, you may have your immigration status examined along with your “junk”. As part of the TSA’s request for FY 2012 funding, TSA Administrator John Pistole told Congress last week that the TSA conducts 8,000 unannounced security screenings every year. These screenings, conducted with local law enforcement agencies as well as immigration, can be as simple as checking out cargo at a busy seaport. But more and more, they seem to involve giving airport-style pat-downs and screenings of unsuspecting passengers at bus terminals, ferries, and even subways. These surprise visits are part of the TSA’s VIPR program: Visible Intermodal Prevention and Response. The VIPR program first started doing searches in 2007, and has grown since then. Currently, the TSA only has 25 VIPR teams doing these impromptu searches: in 2012, it wants to get 12 more.
A social networking site (SNS) is a web-based service that allows communities of people to share common interests and/or experiences. Rather than using direct point-to-point communication to stay in touch (e.g., face-toface, phone, text/video messages), SNSs allow users to publish information that can be read later by other users (a one-to-many form of communication) and follow their friend’s postings and provide comments. SNSs provide innovative methods for interacting with friends through third-part applications, such as simple games (tic-tac-toe, paper-rock-scissors), interactive maps to show places visited across the world, and quiz/trivia games which allow for score comparison with others. Many SNSs also allow users to logon from mobile devices that have web browser access to the Internet, allowing them to check and update their accounts from virtually any location with a Wi-Fi or cellular signal.
Two pamphlets produced by the NSA on “Using Your BlackBerry Securely” and “Security Tips for Personally Managed Apple iPhones and iPads” from March 2011.
Two miles from the cow pasture where the Wright Brothers learned to fly the first airplanes, military researchers are at work on another revolution in the air: shrinking unmanned drones, the kind that fire missiles into Pakistan and spy on insurgents in Afghanistan, to the size of insects and birds. The base’s indoor flight lab is called the “microaviary,” and for good reason. The drones in development here are designed to replicate the flight mechanics of moths, hawks and other inhabitants of the natural world. “We’re looking at how you hide in plain sight,” said Greg Parker, an aerospace engineer, as he held up a prototype of a mechanical hawk that in the future might carry out espionage or kill. Half a world away in Afghanistan, Marines marvel at one of the new blimplike spy balloons that float from a tether 15,000 feet above one of the bloodiest outposts of the war, Sangin in Helmand Province. The balloon, called an aerostat, can transmit live video — from as far as 20 miles away — of insurgents planting homemade bombs. “It’s been a game-changer for me,” Capt. Nickoli Johnson said in Sangin this spring. “I want a bunch more put in.”
IED and Sniper Defeat: The Battle Staff Operations Process in a COIN Environment briefing from April 13, 2007.
The World Bank has called for sweeping action to tackle corruption in the global road building sector, including laws penalising bid rigging, market division, and other forms of collusive behaviour in both developed and developing countries. In a report, Curbing Fraud, Corruption and Collusion in the Roads Sector, the World Bank said corruption in road contract procurement and subcontracting was a systemic problem in some countries. “Collusion and corruption are sometimes deeply ingrained in the roads sector,” the report stated. “Short-term palliatives, such as an independent procurement evaluator or technical auditor, may be the answer. More drastic measures may also be required including the use of bid ceilings, competitive negotiation, and turning procurement over to an independent agent”.
Because an extensive, well maintained network of roads is essential for economic development, road construction and maintenance projects have been a mainstay of the World Bank’s lending portfolio since its founding. This long experience in the roads sector is reflected in favorable project evaluations. The Bank’s Independent Evaluation Group reports that roads and other transport projects consistently score higher on measures of outcomes, institutional development, and sustainability than non-transport projects and the Bank’s Quality Assurance Group has found that roads projects are well-supervised. At the same time, roads projects around the globe remain plagued by fraud, corruption, and collusion. A Transparency International poll ranked construction as the industry most prone to corruption and a survey of international firms revealed that companies in the construction industry were more likely than firms in any other sector to have lost a contract because of bribery. World Bank-financed projects are not immune. Roughly one-fourth of the 500 plus projects with a Bank-funded roads component approved over the past decade drew one or more allegations of fraud, corruption, or collusion; to date, the Bank’s Integrity Vice Presidency (INT) has confirmed allegations in 25 projects resulting in 29 cases of misconduct under Bank rules.
The Maritime Threat Summary is a monthly product the Maritime Homeland Threat Analysis Branch (MHTAB) of the US Coast Guard (USCG) Intelligence Coordination Center produces for USCG Homeport. It highlights suspicious maritime activities and security incidents associated with the US Maritime Transportation System (MTS).
Foxtongue – http://www.flickr.com/photos/foxtongue/
BrittneyBush – http://www.flickr.com/photos/tzofia/
eych-you-bee-ee-ahr-tee – http://www.flickr.com/photos/eych/
refreshment_66 – http://www.flickr.com/photos/15574096@N00/
NSA Working With AT&T, Verizon to Scan Email, Internet Traffic for Attacks Against Defense Contractors
The National Security Agency is working with Internet providers to deploy a new generation of tools to scan e-mail and other digital traffic with the goal of thwarting cyberattacks against defense firms by foreign adversaries, senior defense and industry officials say. The novel program, which began last month on a voluntary, trial basis, relies on sophisticated NSA data sets to identify malicious programs slipped into the vast stream of Internet data flowing to the nation’s largest defense firms. Such attacks, including one last month against Bethesda-based Lockheed Martin, are nearly constant as rival nations and terrorist groups seek access to U.S. military secrets. “We hope the . . . cyber pilot can be the beginning of something bigger,” Deputy Defense Secretary William J. Lynn III said at a global security conference in Paris on Thursday. “It could serve as a model that can be transported to other critical infrastructure sectors, under the leadership of the Department of Homeland Security.”