Tag Archive for For Official Use Only

(U//FOUO) New Jersey Fusion Center Special Events List September 2014

NJROIC-SpecialEventsSeptember2014_Page_03

The NJ Office of Homeland Security and Preparedness (OHSP) compiles a statewide list of special events that provides situational awareness to law enforcement, as well as to assist in local planning requirements. Special events include any event that attracts large numbers of participants and spectators in both a public or private venue. Examples include concerts, marathons, firework displays, community celebrations, visits by VIPs, sporting events, holiday gatherings, etc.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Police Mentor Guide

JCISFA-ANP-MentorGuide

In order to develop the ANP, the Combined Security Transition Command-Afghanistan (CSTC-A) uses Police Mentor Teams to help develop them. A shortage of PMTs across the country, however, has led to the formation of in-lieu of advisor teams comprised of Soldiers from land owning units or attached Military Police units. The purpose of this document is to help provide those additional advisory teams with information they need to develop the skills required to effectively augment the CSTC-A program. This handbook will provide an overview of the entire police program including current goals, relationships to other organizations, the Focused District Development Program, key challenges that may be encountered and the duties of key members of the police advising teams including how to work with the team’s enablers.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Army Mentor Guide

JCISFA-ANA-MentorGuide

This guide is a JCISFA publication on mentoring the Afghan National Army and is applicable to advisors, mentors and partner forces executing Security Force Assistance (SFA) operations. The guide is a companion to the May 2009 JCISFA Afghan National Police Mentor Guide and addresses identified gaps in mentoring Afghan National Security Forces. The guide offers cultural background information, partner security force challenges, advisor/mentor best practices, and challenges. As the United States assists other nations, our forces must adopt a “by, with, and through” strategy to enable a supported nation and its security forces to generate and sustain capabilities institutionally and operationally. We can achieve this by advising and mentoring them, partnering with the supported nation and through development of the supported nation and its security forces so that they can do it themselves.

(U//FOUO) DHS-FBI-NCTC Bulletin: Malicious Cyber Actors Use Advanced Search Techniques

DHS-FBI-NCTC-GoogleDorking

Malicious cyber actors are using advanced search techniques, referred to as “Google dorking,” to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks. “Google dorking” has become the acknowledged term for this malicious activity, but it applies to any search engine with advanced search capabilities. By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities. For example, a simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.

(U//FOUO) FBI Analytic Report: Autonomous Cars Present Game Changing Opportunities and Threats For Law Enforcement

FBI-AutonomousVehicles

The FBI assesses that if autonomous cars are approved by Congress for use by the public nationwide in the next five to seven years, these vehicles will have a high impact on transforming what both law enforcement and its adversaries can operationally do with a car. State regulators in California, Florida, and Nevada already legalized the use of these vehicles within their states.

(U//FOUO) New Jersey Fusion Center: Potential Threats to Government Officials in New Jersey

NJROIC-ThreatsGovernmentOfficials

The FBI San Antonio Division recently reported that groups of young individuals in Texas, and possibly other states, were attempting to elicit information regarding residences of firefighters, military personnel, police officers, etc. The subjects knocked on neighborhood doors, telling residents they worked for an organization that helps young people with public speaking by sending them out to contact random people at their homes and ask about their professions. The youths reportedly received points based on the professions they located, with the potential of winning a college scholarship and a large sum of money. Police officer had the highest point value.

(U//FOUO) New Jersey Division of Fire Safety Bulletin: Sovereign Citizens

NJ-SovereignCitizens

The anti-government sovereign citizen movement has been catapulted into the forefront of public attention due to an increase in criminal activity by sovereign citizens nationwide. The movement consists of individuals and small groups throughout the United States, guided and supported by adherents who share the core belief that Federal, state, and local governments are all illegitimate entities.

(U//FOUO) Marine Corps Intelligence Activity Malaysia Cultural Field Guide

MCIA-MalaysiaCultureGuide

Malays are predominantly Muslim, and as a result, the country is strongly influenced by Islam. Most Malaysian Muslims are moderate in their views. They do not want Malaysia to become an Islamic state, and regard Islam primarily as a religion, not a lifestyle. Some of Malaysia’s smaller religious and ethnic groups are concerned about what they perceive as the increasingly Islamic nature of Malaysian society.

(U//FOUO) U.S. Strategic Command Cyber Warfare Lexicon

USSTRATCOM-CyberWarfareLexicon

Since the 2006 signing of the National Military Strategy for Cyberspace Operations (NMS-CO), the emerging US cyber warfare community continues to mature and its capabilities increasingly compete for consideration when US forces plan operations. Computer network attack (CNA) and electronic attack (EA) technologies have progressed to the point where their use could be routinely considered in the context of existing and developing OPLANS. In order to effectively integrate and standardize use of these non-traditional weapons, the developers, testers, planners, targeteers, decision-makers, and battlefield operators require a comprehensive but flexible cyber lexicon that accounts for the unique aspects of cyber warfare while minimizing the requirement to learn new terms for each new technology of the future. Without a shared understanding of the accurate meanings of a significant number of frequently used terms, it will be difficult to make progress on the more complex and unresolved technical and operational issues for non-traditional weapons: actionable requirements, technical and operational assurance, effective mission planning techniques, and meaningful measures of effectiveness. In fact, the Secretary of Defense’s Information Operations (IO) Roadmap listed its first benefit to the combatant commanders as “a common lexicon and approach to IO, including support to integrated information campaign planning.” Although the focus of cyberspace operations is not the same as that of IO, they share some technologies and until now, no such lexicon (for IO, or any portion of IO) has been published.

(U//FOUO) Marine Corps Intelligence Activity Singapore Cultural Field Guide

MCIA-SingaporeCultureGuide

Singapore is made up of three main ethnic groups: Chinese, Malays, and Indians. The Chinese ethnic group makes up the majority (75 percent) of the population, followed by the Malays (15 percent) and the Indians (8 percent). Each ethnic group is internally diverse. However, in the view of most Singaporeans, the divisions within each ethnic group are far less significant than those between groups.

DHS Unaccompanied Alien Children (UACs) 2014 Location of Origin Map

DHS-UAC-Map

We analyzed these locations to determine the factors pushing child migration to the US Border. We assess these reasons vary regionally. For example, many Guatemalan children come from rural areas, indicating they are probably seeking economic opportunities in the US. Salvadoran and Honduran children, on the other hand, come from extremely violent regions where they probably perceive the risk of traveling alone to the US preferable to remaining at home. This violence, combined with poor economies and other secondary factors will make stemming the flow of UACs to the US a very complex issue to address.

(U//FOUO) Marine Corps Intelligence Activity Ukraine Cultural Field Guide

MCIA-UkraineCultureGuide

Ukraine is positioned between Eurasia and Europe, and the region has been influenced by many major civilizations. Ukraine, whose name means “borderland,” has lived under foreign powers for most of its existence. This is most recently evidenced by the creation of the Ukrainian Soviet Socialist Republic, controlled by the centralized establishment in Moscow under the communist regime. Even today the capital, Kiev, struggles internally between Moscow and the West, forcing Ukrainians to more closely identify with either their own cultural brethren or a new, more independent direction for the country.

(U//FOUO) Pennsylvania Fusion Center Bulletin: Targeting First Responders

PACIC-TargetingFirstResponders

First responders, such as law enforcement, emergency medical services (EMS), and firefighters, often arrive at incidents completely focused on the emergency at hand. Whether it is a fire, a chest pain complaint, or a vehicular accident, the first responders prepare for certain events to take place during emergency situations and personal safety is a priority throughout the response. Unfortunately, in the past few years there are have been several occurrences where first responders became the victims of ambushes while performing their duties to protect citizens and save lives.

(U//FOUO) New York Fusion Center Bulletin: Recent Spike in Violence Targeting Law Enforcement

NYSIC-TargetingLawEnforcement

Over the last week there have been three attacks – one in Canada and two in the United States – in which law enforcement officers were targeted, leading to the death of five officers and one civilian. Based upon reporting it appears all the suspects in these incidents were motivated by elements of a far right anti-government ideology with a particular fixation on law enforcement. While it is unknown whether this spike is indicative of a long term increasing trend, it is significant from a near term perspective due to the short time frame and purposeful targeting of law enforcement.

(U//FOUO) DHS-FBI-NCTC Bulletin: Terrorists Continued Interest in Targeting Mass Transit

DHS-FBI-NCTC-MassTransit

Terrorists in late December 2013 conducted three attacks targeting people using public transportation systems in Russia, emphasizing terrorists’ persistent interest in attacking locations where large congregations of people are confined to small, often enclosed spaces. Russian officials claim North Caucasus-based violent extremists associated with the Imirat Kavkaz (IK) probably conducted these attacks to embarrass the Russian government in the build-up to the 2014 Olympic Games in Sochi. The IK, a violent extremist group based in Russia, has no known capability in the Homeland and is unlikely to directly target Western interests overseas.

(U//FOUO) Washington D.C. Fusion Center Bulletin: Nationwide Fuel Theft Trend

WRTAC-FuelThefts

Incidents involving the theft of fuel (gasoline, diesel, kerosene, ethanol, etc.) from fuel storage tanks have been reported across the United States. Fuel theft has significant health and safety implications, including risk for spills, fires, and explosions. Fuel thieves typically do not adhere to security standards or practices, and may inadvertently expose fuel to a hot engine, lit cigarette, or ignition source. First responders and other maintenance personnel also may be exposed to fuels through skin contact or inhalation routes during recovery and/or cleanup operations, which can result in potential health effects.

(U//FOUO) U.S. Army Tactical Combat Casualty Care Handbook August 2013

CALL-TCCC

Tactical Combat Casualty Care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care, which is practiced by most medical providers and medics. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical environment medical personnel face in combat. Unique combat wounds and tactical environments make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Stated another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training focused on combat trauma care, as opposed to civilian trauma care.

(U//FOUO) Colorado Information Analysis Center Bulletin: Vulnerabilities in Knox-Box Key Entry Systems

CIAC-KnoxBoxVulnerabilities

The Knox-Box® rapid entry system is an access control system utilized by public safety agencies. This system allows facilities to securely store entry keys or cards on site for first responders. First responders utilize a master key that unlocks all Knox boxes within their jurisdiction. Currently there are over 3.5 million Knox-Box rapid entry systems in use nationwide and over 11,500 fire departments in North America that use the Knox-Box rapid entry system. In one Colorado fire district there are over 4,000 Knox-Box systems in use within the local, state, and federal government which includes; energy, water, postal, emergency services, defense, transportation, and communication sectors. Unauthorized access to the system would allow individuals to bypass physical security measures at the site. The unauthorized individuals would also be able to duplicate keys, or remove entry keys or cards which would delay first responders.