(U//FOUO) THIS JOINT INTELLIGENCE BULLETIN PROVIDES LAW ENFORCEMENT AND PUBLIC AND PRIVATE SECTOR SAFETY OFFICIALS WITH AN EVALUATION OF POTENTIAL TERRORIST THREATS DURING THE 2010 U.S. HOLIDAY SEASON, EXTENDING FROM THE PRE-CHRISTMAS PERIOD THROUGH NEW YEAR’S DAY. THIS INFORMATION IS PROVIDED TO SUPPORT THE ACTIVITIES OF DHS AND FBI AND TO HELP FEDERAL, STATE, AND LOCAL GOVERNMENT COUNTERTERRORISM AND LAW ENFORCEMENT OFFICIALS DETER, PREVENT, PREEMPT, OR RESPOND TO TERRORIST ATTACKS AGAINST THE UNITED STATES.
Walmart will join the Department of Homeland Security in a program called “If You See Something, Say Something” which encourages the American public to take an active role in ensuring the safety and security of the nation, DHS said Monday. “Homeland security starts with hometown security, and each of us plays a critical role in keeping our country and communities safe,” Secretary Janet Napolitano said as she thanked Walmart and the more than 320 stores who joined the national campaign Monday. Participating stores, eventually including 588 from 27 states, will play a short video message at select checkout locations to remind shoppers to contact local law enforcement to report suspicious activity, said a DHS statement.
(U//FOUO) This product is intended to provide perspective and understanding of the nature and scope of potentially emergent threats in response to the posting of the second edition of Inspire magazine. It is also intended to assist federal, state, local, and tribal government agencies and authorities, the private sector, and other entities to develop priorities for protective and support measures relating to an existing or emerging threat to the homeland security.
(U//FOUO) Terrorists have shown considerable interest in an improvised chemical device called the mubtakar, which is designed to release lethal quantities of hydrogen cyanide, cyanogen chloride, and chlorine gases. One or more devices could be used in attacks in enclosed spaces, such as restaurants, theaters, or train cars. The mubtakar is small and could be transported in a bag or box, or assembled at the attack site. DHS and FBI encourage recipients of this document to report information about suspicious devices and the acquisition or possession of mubtakar precursor chemicals or components (see figures for details) to the nearest state and local fusion center and to the local FBI Joint Terrorism Task Force.
(U//FOUO) Terrorists continue to express broad interest in toxins and poisons that could be used to contaminate food or water supplies, or spread through skin contact. Widely circulated terrorist manuals contain instructions for mixing toxins and poisons with skin penetrating enhancers such as oils, lotions, and other ointments. Other possible methods of delivery include adding toxins or poisons to beverages, fruits, vegetables, or other foods. Most toxins and poisons mentioned in terrorist manuals are more suitable for assassinations and small-scale attacks than for mass casualty attacks, but terrorists might calculate that a coordinated series of simultaneous small attacks could produce comparable casualties and widespread public fear, as well as erode consumer confidence.
In what appears to be the latest phase of a far-reaching federal crackdown on online piracy of music and movies, a number of sites that facilitate illegal file-sharing were shut down this week by Immigration and Customs Enforcement, a division of the Department of Homeland Security. By Friday morning a handful of sites that either hosted unauthorized copies of films and music or allowed users to search for them elsewhere on the Internet, were shut down, their content replaced by a notice that said, in part: “This domain name has been seized by ICE — Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court.” In seizing the domain names of the sites, or Web addresses, the government effectively redirected any visitors to its own takedown notice.
Homeland Security Presidential Directive 8/HSPD-8 establishes policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic preparedness goal; establishing mechanisms for improved delivery of Federal preparedness assistance to State and local governments; and outlining actions to strengthen preparedness capabilities of Federal, State, and local entities. This paper describes a concept for rapid and systematic implementation of the provisions of HSPD-8 to improve preparedness doctrine and practice and reorient preparedness programs and activities that converged within homeland security under a unified national all-hazards preparedness strategy.
(U) As of 29 October, packages on cargo aircraft containing explosive materials were intercepted in the United Kingdom (UK) and Dubai, United Arab Emirates (UAE). The packages were shipped from Yemen, with the United States listed as the final destination. On the evening of 28 October,security officials at East Midlands Airport in Lockington, UK identified a suspicious package containing a modified printer-toner cartridge that was later confirmed to contain explosives.
The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil. The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.
The Multi-Jurisdiction Improvised Explosive Device (IED) Security Plan (MJIEDSP) Planning Guide assists multi-jurisdiction areas in developing a detailed IED security plan. The IED security plan outlines specific bombing prevention actions that reduce vulnerability and mitigate risk against the primary terrorist IED attack method within a multi-jurisdiction area.
The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.
In its role as Energy SSA, DOE has worked closely with dozens of government and industry security partners to prepare this 2007 Energy SSP. Much of that work was conducted through the Sector Coordinating Councils (SCC) for electricity and for oil and natural gas, as well as through the Energy Government Coordinating Council (GCC). The electricity SCC represents more than 95 percent of the electric industry and the oil and natural gas SCC represents more than 98 percent of its industry. The GCC, co—chaired by DHS and DOE, represents all levels of government—Federal, State, local, and tribal-that are concerned with the Energy Sector.
In early 2008, President Bush signed National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23) formalizing the Comprehensive National Cybersecurity Initiative (CNCI). This initiative created a series of classified programs with a total budget of approximately $30 billion. Many of these programs remain secret and the their activities are largely unknown to the public. Forbes reported in April 2008 that “Bush’s cyber initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware.”
The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”
Simply stated, the LEIS Service is the “pipe” used to connect state and local law enforcement with DHS law enforcement.
The attempted bombing in Times Square on 1 May 2010 highlights the need to identify Homegrown Violent Extremists before they carry out a terrorist act. The ability of the bomber to operate under the radar demonstrates the difficulties associated with identifying terrorist activity and reinforces the need for law enforcement, at all levels, to be vigilant and identify individuals who are planning violence or other illegal activities in support of terrorism.
The Homeland Security Department plans to test futuristic iris scan technology that stores digital images of people’s eyes in a database and is considered a quicker alternative to fingerprints. The department will run a two-week test in October of commercially sold iris scanners at a Border Patrol station in McAllen, Texas, where they will be used on illegal immigrants, said Arun Vemury, program manager at the department’s Science and Technology branch. “The test will help us determine how viable this is for potential (department) use in the future,” Vemury said.
So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now. And many of the technological tools that expedite communication today were in their infancy or didn’t even exist in 2001. So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries. And the threats we face are by their very nature asymmetrical. Terrorism more often has become privatized violence—does not rely on links, links to an army or to a sovereign state. We often hear that this is what our globalized era looks like, but what is most salient about today’s environment is that it is also networked. And in a networked world, information true and false moves everywhere all the time. And in that networked world, everyone who is part of the network, meaning all of us, can enjoy the tremendous benefits, but also must be ready and willing to learn about and help address the vulnerabilities that come with these benefits. So the team we put on the field needs to be bigger, better networked and better trained. What are the implications for this network world for the Department of Homeland Security? It means that we must continue to take an all-hazards approach to preparedness, meaning we prepare for natural disasters as well as terrorist attacks. We need to comprehend and anticipate an expanding range of threats.
At the heart of this are fusion centers. Starting with just one in 2006, there are now 72 fusion centers nationwide, serving as focal points for information-sharing among federal, state, local, tribal, and territorial partners. By the end of this year, all 72 fusion centers should be able to analyze information and spot trends in order to effectively share timely intelligence – with local law enforcement, and with DHS, so the information can also be used by others within the Intelligence Community. To support this vision: we’re prioritizing fusion centers in our FY2011 grants, and looking for ways to support them through additional technology and personnel, including the deployment of highly-trained experts in critical infrastructure; we’re deploying experienced DHS analysts to every one of these centers – 64 at last count – and we won’t stop until we have them in every one; and we’re linking them together, and with DHS headquarters, through the classified Homeland Security Data Network.
(U//FOUO) Detailed video obtained through live Web-based camera feeds combined with street-level and direct overhead imagery views from Internet imagery sites allow terrorists to conduct remote surveillance of multiple potential targets without exposing themselves to detection.
The purpose of the Nevada State Homeland Security Strategy (SHSS) is to identify and address statewide priorities to achieve and sustain a strengthened ability to prevent, detect, deter, mitigate against, prepare for, respond to and recover from any natural, manmade and/or technological emergency or disaster up to and including any act of terrorism. The State, through implementation of this strategy, is seeking outcomes that will ensure a safe and secure Nevada through enhanced capabilities in intelligence, surveillance, rapid first response and recovery, the protection of critical infrastructure, and to promote public education and awareness.
DHS Suspicious Activity Reporting Selection Standards, August 2010.
(U//FOUO) The vast majority of suspicious incidents are not terrorism related. Incident reporting continues to reveal most involve members of the traveling public who do not have intent to cause harm. Intoxicated passengers, people traveling without proper identification or with propaganda materials, and persons with mental health needs are generally not considered suspicious and are generally not included in the weekly summary. However, some incidents are more serious and are reported for situational awareness. Incidents involving notable drug or weapons concealment, possible surveillance, laser targeting of aircraft, possible insider collusion, exploitable gaps in security, and some unusual behaviors at transportation venues are discussed as they may involve technologies or tactics which may lend insight to future terrorist tradecraft.
A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.
The purpose of the Multi-Year Training and Exercise Plan (MYTEP) is to provide a follow-on companion document to Florida‟s Domestic Security Strategic Plan. It is a living document that will be updated and refined annually. The MYTEP provides a roadmap for Florida to follow in accomplishing the priorities and goals described in the Florida‟s Domestic Security Strategic Plan. Each State Priority is linked to a corresponding National Priority, and, if applicable, an Improvement Plan (IP) action. The priority is further linked to the associated target capabilities that would facilitate accomplishment of the priority and the training and exercises that will help the jurisdiction obtain those capabilities and achieve that priority.