An alert has been sounded over the past three years that more than 1,100 schoolchildren and young adults are at risk of being drawn into violent extremism. Setting out the Government’s new strategy for combating radicalisation, the Home Secretary Theresa May promised a drive against the spread of hardline ideologies in universities, prisons and community groups as well as fresh measures to control their dissemination online. Under the revised “Prevent” strategy, organisations applying for public funds will have to prove they espouse “mainstream British values” before they receive taxpayers’ money. About 1,120 people had been referred to a Home Office programme launched in 2007 under which teachers and community leaders are encouraged to identify potential terrorists. Nearly 300 of those referred to police were aged under 16 – 55 were 11 or younger.
This paper is designed to act as a guide for working with local communities in rural Afghanistan at the wuluswali (district) level, primarily in the east and south. Afghan society has always been extremely diverse from district to district, requiring a flexible, multi-faceted approach to governance. This multi-faceted approach blended tribes, Islam and the state. The political upheaval of the past 40 years has disrupted Afghan society and the traditional structures which historically provided governance and social order, not just the Kabul-based government. It is important that the information in this guide is not seen as absolute or universally applicable, but rather as a baseline guide for understanding the complexities of local governance, or the lack thereof, in rural Afghanistan. There is no standard formula for success in Afghanistan due to its diversity; the only constant is the need for flexibility.
On December 16, 2010, at approximately 1736 hours, the Melbourne Police Department responded to reports of fraud at the RaceTrac gas station located at 4641 W Eau Gallie Blvd, in Melbourne (MP10-83795). An investigation revealed there was a credit card skimmer installed inside one of the fuel pumps that had been attached with Velcro. Victims began reporting fraudulent charges on their credit card accounts on December 14, 2010 and there have been fourteen (14) reports to date that are believed to be linked with this trend. At this time, it is unknown as to how long the skimmer had been inside the pump. It is estimated that over 600+ credit card numbers have been compromised. The stolen credit card numbers have been used multiple times at bank ATM’s in New York City, most frequently at the Actors Federal Credit Union.
The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established. Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community. In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as “carders” – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.
Next week, in Switzerland, Henry Kissinger and his brave band of corporate CEOs, high-wealth individuals and heavyweight thinktankers will lock arms with Queen Beatrix of the Netherlands and David Rockefeller, and stand their ground against the economic contagion.
Authentication establishes the trusted relationship between the user and a system or service and validates their identities to each other. Organizations rely on authentication services to protect important data by limiting access to trusted users. Malicious actors are increasingly interested in exploiting authentication services because organizations rely on them to ensure system integrity and limit access to sensitive data by trusted users. US-CERT is providing this advisory to warn organizations about increased threats and interest in authentication services and provide recommended best practices to strengthen system integrity.
Israel Defense Forces Presentation on Six Day War Commemoration: Renewed Possibility of Violence Against Israel.
The integration of North America’s economies would best be achieved through an “incremental” approach, according to a leaked U.S. diplomatic cable. The cable, released through the WikiLeaks website and apparently written Jan. 28, 2005, discusses some of the obstacles surrounding the merger of the economies of Canada, the United States and Mexico in a fashion similar to the European Union. “An incremental and pragmatic package of tasks for a new North American Initiative (NAI) will likely gain the most support among Canadian policymakers,” the document said. “The economic payoff of the prospective North American initiative … is available, but its size and timing are unpredictable, so it should not be oversold.”
The Colorado Information Analysis Center (CIAC) has no current information indicating an imminent threat to Colorado chemical sector critical infrastructure. However, both within the United States and abroad, recent attempts to perpetrate attacks utilizing the Postal and Shipping and Transportation Sectors has created a need for heightened awareness. The CIAC has produced this assessment to provide situational awareness on the current critical infrastructure threat environment, sector incidents and trends, as well as pertinent updates. Information contained in this report originates from CIAC cases, unclassified local, state, and federal databases, and open source reporting.
The bad news just keeps on coming for Goldman Sachs. The Wall Street investment bank has received a subpoena from the office of the Manhattan district attorney, which is investigating Goldman’s role in the financial crisis, said one person familiar with the subpoena. It comes amid increased enforcement scrutiny of the company, which has faced blistering criticism that it shorted — or bet against — the mortgage market before it collapsed and that it knowingly sold bundles of bad mortgages to its clients. Goldman denies these accusations.
This Report is the product of a two-year bipartisan investigation by the U.S. Senate Permanent Subcommittee on Investigations into the origins of the 2008 financial crisis. The goals of this investigation were to construct a public record of the facts in order to deepen the understanding of what happened; identify some of the root causes of the crisis; and provide a factual foundation for the ongoing effort to fortify the country against the recurrence of a similar crisis in the future.
This multi-Service tactics, techniques, and procedures (MTTP) publication facilitates multi-Service coordination, integration, and regulation of airspace during exercises and operations where more than one Service shares airspace for operational use.
Financial Crimes Law Enforcement/Suboena Contacts List from November 2010 detailing contact information for a variety of companies, banks, insurance agencies and other organizations that would need to be contacted over the course of financial crimes investigations.
Photos by Gustavo Sanabria taken from May 22 – May 29, 2011 in La Puerta del Sol.
A recent article by the Washington Post is helping to spread the mistaken belief that Inspire magazine’s first issue was attacked by a virus which corrupted most of its content. The article states that while U.S. sources debated how to sabotage or otherwise “attack” the publication of the magazine, which is said to be produced by Al-Qaeda in the Arabian Peninsula, a group of British “cyber warriors” took action. The article states that “when Inspire launched on June 30, the magazine’s cover may have promised an ‘exclusive interview’ with Sheik Abu Basir al-Wahishi, a former aide to Osama bin Laden, and instructions on how to ‘Make a Bomb in the Kitchen of Your Mom.’ But pages 4 through 67 of the otherwise slick magazine, including the bomb-making instructions, were garbled as a result of the British cyber-attack.” The article also states that it took almost two weeks for a corrected and complete version of the magazine to emerge.
Several US PACCOM Global Information Grid 3.0 Design Presentations from 2010 through 2011.
According to Debkafile, an Israeli electronic news website, a group claiming to be al-Qa‘ida has declared 11 November 2007 as the first day of a campaign of “electronic jihad” on the Internet. According to Debkafile, unspecified “al-Qa‘ida electronic experts” allegedly would begin attacking “Western, Jewish, Israeli, Muslim apostate and Shiite Web sites on that date with many more jihadist hackers joining in the attacks later [sic].” DHS and the FBI have no specific or credible information corroborating these cyber attack claims, or intelligence indicating this group is tied to al-Qa‘ida.
The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United States engages in computer warfare. The classified list of capabilities has been in use for several months and has been approved by other agencies, including the CIA, said military officials who spoke on the condition of anonymity to describe a sensitive program. The list forms part of the Pentagon’s set of approved weapons or “fires” that can be employed against an enemy. “So whether it’s a tank, an M-16 or a computer virus, it’s going to follow the same rules so that we can understand how to employ it, when you can use it, when you can’t, what you can and can’t use,” a senior military official said.
One of the more interesting aspects of running a website like this is that you receive a lot of highly unusual email. Everything from the occasional death threat to advertisements for Kuwaiti GPS tracking systems, all mixed with the incoherent ramblings of people with advanced schizophrenic disorders. That’s okay. That’s what you expect. However, a recent trend has emerged that is basically incomprehensible to us. People send us email thinking we are all kinds of people, places, and organizations that we are not.
Afghan officials said Sunday that a NATO airstrike had killed 14 civilians, most of them women and children, in the southern province of Helmand on Saturday night. Local officials said the strike was aimed at Taliban fighters and missed, hitting two family homes. But in a conflicting account, a high-level NATO official said Sunday night that nine civilians were killed in the strike, which was aimed at five insurgents who attacked a coalition foot patrol and killed a Marine. The insurgents continued to fire from inside a compound when NATO forces called in the strike. “Unfortunately, the compound the insurgents purposefully occupied was later discovered to house innocent civilians,” the official, Maj. Gen. John Toolan, commander of NATO forces in the Southwest region, said in a statement. The general apologized for the civilian deaths on behalf of all coalition forces, including Gen. David H. Petraeus, the top coalition commander in Afghanistan, and said the investigation into the episode was continuing.
Every year, U.S. officials from agencies with anti-money laundering responsibilities meet to assess the money laundering situations in 200 jurisdictions. The review includes an assessment of the significance of financial transactions in the country‘s financial institutions involving proceeds of serious crime, steps taken or not taken to address financial crime and money laundering, each jurisdiction‘s vulnerability to money laundering, the conformance of its laws and policies to international standards, the effectiveness with which the government has acted, and the government‘s political will to take needed actions.
NY Fed Investigating Goldman Sachs for Systematically Denying Borrowers’ Attempts to Lower Mortgage Payments
The Federal Reserve Bank of New York has begun an investigation into the mortgage-servicing arm of Goldman Sachs, looking at whether it systematically rejected borrowers’ efforts to lower their loan payments through government programs. The inquiry by the New York Fed arose from a letter sent by an anonymous employee, who accused the Goldman unit, Litton Loan, of denying loans without properly reviewing applications. The letter was brought to the Fed’s attention by The Financial Times after it received the tip. “We are in possession of the letter and are conducting an inquiry,” a spokesman for the New York Fed said in a statement.
Marine Corps Warfighting Publication (MCWP) 4-11.9, Ammunition Logistics, provides guidance for commanders, staffs, logisticians, ammunition and aviation ordnance officers, supply officers, and ammunition and aviation ordnance Marines. This publication discusses the Marine Corps ammunition and aviation ordnance communities’ organization and support structure, the general responsibilities of ammunition and aviation ordnance personnel, the systems used in support of ammunition logistics, planning considerations, safety issues, training, and the regulatory environment in which Marine Corps ammunition logistic operations are planned and executed. Various elements of Navy supporting establishments with ammunition responsibilities that have not been addressed in other USMC Service doctrine are introduced in the MCWP 4-11.9.
This publication will ease coordination and improve understanding during multi-Service operations. A Brevity code is a code which provides no security but which has as its sole purpose the shortening of messages rather than the concealment of their content (Joint Publication 1-02).
Port Authority security up for review (NorthJersey.com):
A consulting company founded by New Jersey’s former top federal prosecutor, Michael Chertoff, has been tapped to review security at the Port Authority’s tunnels, bridges and airports.
Commissioners of the bi-state agency quietly…