Tag Archive for Federal Bureau of Investigation

(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Misrepresentation

Terrorists might use disguises, fraudulent or stolen credentials, and cloned or repurposed vehicles to gain access to restricted areas, to blend in with their surroundings when conducting surveillance, or to conceal other activities while planning or executing an attack. Anders Breivik, the gunman who was sentenced to 21 years in prison for the July 2011 attack on the Workers’ Youth League summer camp in Norway, wore a police uniform and displayed false identification to gain unauthorized access to the camp. Depending on the target, disguises might be aimed at impersonating law enforcement, emergency services, or officials of an institution who have legitimate access to secured/restricted sites.

(U//FOUO) DHS-FBI Bulletin: Indicators of Suspicious Behaviors at Hotels

Known or possible terrorists have displayed suspicious behaviors while staying at hotels overseas—including avoiding questions typically asked of hotel registrants; showing unusual interest in hotel security; attempting access to restricted areas; and evading hotel staff. These behaviors also could be observed in U.S. hotels, and security and law enforcement personnel should be aware of the potential indicators of terrorist activity.

(U//LES) FBI Going Dark: Law Enforcement Problems in Lawful Surveillance

‘Going Dark’ is a Law Enforcement (LE) initiative to address the gap between the legal authority and practical ability of LE to conduct lawfully-authorized electronic surveillance. Problems highlighted by the Going Dark initiative include LE’s difficulty in receiving information from some technology companies, and criminal’s use of advanced technologies and techniques that can complicate carrying out of lawfully-authorized court orders to conduct electronic surveillance.

The FBI’s Vision for Domestic Electronic Surveillance

Last month, Cryptome quietly posted a 2007 draft of the Federal Bureau of Investigation’s vision statement for the Domestic Communications Assistance Center (DCAC). The document, which has received no media attention, offers the most in depth view yet of the DCAC and its functions. In May, CNET correspondent Declan McCullagh disclosed the existence of the DCAC, which he described as having a mandate “covering everything from trying to intercept and decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a wireless provider or social network might turn over in response to a court order.” The vision statement obtained by Cryptome describes the general functions and organization of the DCAC as well as the FBI’s national electronic surveillance (ELSUR) strategy.

(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Attempted Breaches/Intrusions

Terrorists may attempt to breach secured perimeters or gain unauthorized access to facilities, sensitive locations, or restricted areas for preoperational activity or to conduct an attack. Timothy McVeigh breached a locked storage shed at a Kansas rock quarry with a battery-operated drill and stole explosives that were later used in the 1995 Oklahoma City bombing. Attempts at intrusion could take the form of trespassing, forced entry, or impersonation of authorized personnel and could possibly involve the assistance of knowledgeable ‘insiders.”

(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Aviation Flyovers

Terrorists may use small aircraft flyovers to conduct preoperational activities such as reconnaissance or rehearsals for planned attacks. When suspicious flyovers occur, law enforcement and first responders should report the key attributes of the flight and the aircraft for timely identification (time of day, location and direction of flight, facility overflown, aircraft size, markings, color scheme, tail number, number of windows, placement of wings or rotor, number of engines, and weather) to the Federal Aviation Administration (FAA) through a local Air Traffic Control facility or office, a local Flight Standards District Office, or directly to the FAA’s Domestic Events Network at 202 493 5107, and the Transportation Security Administration. The FAA is often best able to distinguish between legitimate air traffic and suspicious flight operations that warrant further investigation.

(U//FOUO) FBI Counterfeit and Substandard Lithium Batteries Pose Serious Health Risks to Law Enforcement

The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.

(U//FOUO) DHS-FBI Bulletin: Potential Use of Cold Packs in Improvised Explosives

Cold packs, packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for improvised explosives. The chemicals are packaged in prill form, and can be used directly or ground into powder when being used in homemade explosive production. Five hundred packs would yield 30 to 90 pounds of precursor material for use in an improvised explosive device (IED).

DHS, FBI Warn Law Enforcement of Terrorists Asking Questions

The Department of Homeland Security and Federal Bureau of Investigation are warning business owners and emergency personnel around the country to be on the look out for terrorists and criminals asking too many questions. In a bulletin from earlier this year, DHS and FBI warned that terrorists and criminals often exhibit the highly suspicious behavior of asking “pertinent, intrusive or probing questions” about security and operations at sensitive facilities. According to the document, terrorists or criminals “may attempt to identify critical infrastructure vulnerabilities by eliciting information pertaining to operational and security procedures from security personnel, facility employees or their associates” and that this type of questioning by individuals “with no apparent need for the information” can provide an “early warning of a potential attack.”

(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Terrorists Eliciting Information

Terrorist or criminals may attempt to identify critical infrastructure vulnerabilities by eliciting information pertaining to operational and security procedures from security personnel, facility employees, and their associates. Persistent, intrusive or probing questions about security, operations or other sensitive aspects of a facility by individuals with no apparent need for the information could provide early warning of a potential attack.

(U//FOUO) DHS-FBI Bulletin: Terrorist Interest in Attacking Theaters and Mass Gatherings

An early April 2012 suicide bombing of a theater in Somalia and a violent extremist communication advocating attacks on US theaters highlight terrorists’ continued interest in attacking such venues. Although we have no specific or credible information indicating that terrorists plan to attack theaters in the United States, terrorists may seek to emulate overseas attacks on theaters here in the United States because they have the potential to inflict mass casualties and cause local economic damage.

(U//LES) FBI-NGIC Gang Criminal Activity Expanding Into Juvenile Prostitution

The National Gang Intelligence Center (NGIC) and the FBI’s Crimes Against Children Unit (CACU) assesses with medium confidence that gang activity is expanding towards juvenile prostitution primarily for its steady financial rewards and perceived low risk of law enforcement interaction. Historically, prison, street and outlaw motorcycle gangs profit from drug distribution and have recently become involved in non-traditional criminal activity such as mortgage fraud and identity theft. Some gangs appear to be diversifying their income by reducing or eliminating drug trafficking activities in favor of juvenile prostitution.

The Continually Expanding Definition of Terrorism

Though the United States has been engaged in a Global War on Terror for more than a decade, the U.S. Government surprisingly does not have a standardized definition of terrorism that is agreed upon by all agencies. The State Department, Federal Bureau of Investigation and a number of other government agencies all utilize differing definitions of what constitutes an act of terrorism. This lack of agreement has allowed individual agencies to present vastly different and, in some cases, far more inclusive definitions of terrorist acts enabling the use of expanded law enforcement and investigative procedures that might not be applicable in other agencies. In fact, some agencies have presented a definition of terrorism so expansive as to include a number of activities that are not traditionally associated with terrorism or terrorist organizations.

(U//FOUO) FBI Inspire Magazine Encourages the Use of Wildfires in Jihad

Al-Qaida in the Arabian Peninsula (AQAP) has released issue 9 of its English-language “Inspire” Magazine. There is a portion of the magazine dedicated to attacking the United States by starting wildfires. The article instructs the audience to look for two necessary factors for a successful wildfire, which are dryness and high winds to help spread the fire. Specific fire conditions that are likely to spread fire quickly are Pinewood, crownfires (where the trees and branches are close together), and steep slope fires (fire spreads faster going up a slope).

(U//LES) FBI Domestic Terrorism Operations Unit Introduction to Sovereign Citizens

Sovereign citizens believe the government is operating outside of its jurisdiction and generally do not recognize federal, state, or local laws, policies, or governmental regulations. They subscribe to a number of conspiracy theories, including a prevalent theory which states the United States Government (USG) became bankrupt and began using citizens as collateral in trade agreements with foreign governments. They believe secret bank accounts exist at the United States (US) Department of the Treasury. These accounts can be accessed using Internal Revenue Service (IRS), Universal Commercial Code (UCC), and fraudulent financial documents.

(U//LES) FBI Motorcycle Gang Trademarks Logo to Prevent Undercover Infiltration

As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization. The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.

FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement

This is the Federal Bureau Investigation (FBI) Laboratory Broad Agency Announcement (BAA) BAA-202200 for the High Value Detainee Interrogation Group (HIG) under the Federal Acquisition Regulation (FAR) 6.102(d)(2)(i) to provide for the competitive selection of research proposals for behavioral science research to advance the science and practice of intelligence interviewing and interrogation. This is an unrestricted solicitation. The NAICS Code for this acquisition is 541720 and small business size standard is $19 million.

(U//LES) FBI International Expansion and Influence of US-Based Gangs

The purpose of this assessment is to explore the expansion and influence of US-based gangs abroad and their illicit operations and associations with foreign criminal organizations. For the purpose of this assessment, the term “gang” encompasses both street gangs and outlaw motorcycle gangs. In addition to FBI and open source reporting, the following law enforcement agencies from the United States, Canada, Central America, the Netherlands, and United Kingdom were surveyed to obtain data for the assessment.

National Level Exercise 2012 Will Focus on Cyber Attacks Against Critical Infrastructure

Rather than combating natural disasters or a nuclear detonation in a major U.S. city, this year’s National Level Exercise will focus on cyber threats to critical infrastructure and the “real world” implications for government and law enforcement of large-scale cyber attacks. National Level Exercise 2012 (NLE 2012) is scheduled to take place in June and will involve emergency response personnel from at least thirteen states, four countries, nearly every major governmental department as well as a number of private companies, non-governmental organizations, institutions of higher education and local fusion centers. The exercise will span four FEMA regions and will include scenarios affecting the National Capital Region.

(U//LES) FBI Mara Salvatrucha (MS-13) International Assessment

The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.

(U//FOUO) DHS-FBI Intelligence Bulletin on Homegrown Extremist Retaliation for Afghan Massacre

This Joint Intelligence Bulletin is intended to increase awareness and provide understanding of the nature of potentially emergent threats in response to the alleged killing of civilians by a US soldier in Afghanistan and the burning of Korans and other religious documents on a military base. This Information is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial counterterrorism and law enforcement officials and the private sector to prevent or respond to terrorist attacks against the United States.

What the FBI Wants to Hide From You In Their 2011 Gang Threat Assessment

What information from its most recent gang threat assessment does the FBI want to keep only for the eyes of law enforcement? Thanks to the publication of the full “law enforcement sensitive” version of the assessment on the website of the California Gang Investigator’s Association, we now know the answer to that question. The full version of the document contains approximately twenty additional pages of information regarding gang threats across the U.S. including details on the incredible proliferation of Mexican drug trafficking organizations. Most of the content derived from non-public reporting sources, such as FBI field reports, concerns specific incidents that are described more generally in the public version of the document. There are also some rather startling statistics omitted from the public version. For example, the fact that 36% of law enforcement report that gangs in their jurisdiction have ties to Mexican criminal gangs and drug trafficking organizations is omitted from the public version of the report.

(U//LES) FBI National Gang Threat Assessment 2011

Gang members armed with high-powered weapons and knowledge and expertise acquired from employment in law enforcement, corrections, or the military will likely pose an increasing nationwide threat, as they employ these tactics and weapons against law enforcement officials, rival gang members, and civilians. Associates, friends, and family members of gangs will continue to play a pivotal role in the infiltration and acquisition of sensitive information.

(U//FOUO) FBI Indicators for Terrorist Use of Toxic Industrial Chemicals

The release of a toxic industrial chemical (TIC) by a terrorist group or lone actor represents a significant threat. TICs are readily available in large quantities, routinely shipped by commercial carriers, and often stored in bulk containers. Most TICs are generally less toxic than chemical warfare (CW) agents, but a large volume of TICs can be equally dangerous. The release of a TIC in a populated area is capable of generating numerous casualties and deaths; the toxic effects would be more dangerous if release occurred in an enclosed space.

(U//FOUO) DHS Mass Transit and Passenger Railroad Systems Terrorist Attack Preparedness Info Regarding a Realistic Threat

Terrorist attack tactics used against mass transit and passenger railroad systems abroad provide insights that can assist law enforcement officers in securing these critical infrastructure assets. The chart below highlights common tactics noted in attempted or successful use of explosive or incendiary devices against mass transit or passenger railroad systems in attacks conducted between March 2004 and November 2009. The information about these attacks provides insights into device type, selection, and construction and can help law enforcement identify patterns and develop protective measures. Analysis shows terrorists have timed attacks during periods of peak ridership; used multiple, coordinated, drop-and-leave devices in identical or similar baggage; and placed devices inside rail cars to cause casualties among passengers.