Tag Archive for For Official Use Only

(U//FOUO) DHS National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat

DHS-NRE-InsiderThreats

The Department of Homeland Security’s (DHS) Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produced this National Risk Estimate (NRE) to provide an authoritative, coordinated, risk-informed assessment of the key security issues faced by the Nation’s infrastructure protection community from malicious insiders. DHS used subject matter expert elicitations and tabletop exercises to project the effect of historic trends on risks over the next 3 to 5 years. In addition, DHS used alternative futures analysis to examine possible futures involving insider threats to critical infrastructure over the next 20 years. The results are intended to provide owners and operators a better understanding of the scope of the threat and can inform mitigation plans, policies, and programs, particularly those focused on high-impact attacks.

(U//FOUO) Army Threat Integration Center (ARTIC) Special Assessment: ISIL Threats Against the Homeland

ARTIC-HomelandThreatsISIL

This ARTIC Special Assessment provides an overview of potential threats posed by the Islamic State of Iraq and the Levant (ISIL), its supporters, those swayed by radical Islam, and lone offenders with the intent or inclination to act on ISIL’s behalf. Presently, the Intelligence Community has not identified any corroborative or definitive extremist plots focused on the US Army, its Soldiers, Government Civilians, and Family Members. However, terrorist groups and their supporters have the capability of conducting attacks with little to no warning in the Homeland and against US military installations and facilities worldwide. Given the continued rhetoric being issued by ISIL’s media services and supporters through various social media platforms the ARTIC is concerned of the possibility of an attack. Soldiers, Government Civilians and Family Members are reminded to be vigilant of their surroundings and report suspicious activities to their respective military or local law enforcement.

(U//FOUO) FBI Bulletin: Threat of Cyberterrorist and Hacktivist Activity in Response to U.S. Military Actions in the Middle East

FBI-ISIL-Cyberterrorism

The FBI has no information at this time to indicate specific cyber threats to US networks or infrastructure in response to ongoing US military air strikes against the terrorist group known as the Islamic State of Iraq and the Levant (ISIL), also known as the Islamic State of Iraq and al-Shams (ISIS) or the Islamic State (IS). However, the FBI assesses extremist hackers and hacktivist groups, including but not limited to those aligned with the ISIL ideology, will continue to threaten and may attempt offensive cyber actions against the United States in response to perceived or actual US military operations in Iraq or Syria. The FBI bases this assessment on recent, nonspecific, and probably aspirational threats made on social media platforms to carry out cyber as well as physical attacks in response to the US military presence in the Middle East.

(U//FOUO) New Jersey Fusion Center Special Events List September 2014

NJROIC-SpecialEventsSeptember2014_Page_03

The NJ Office of Homeland Security and Preparedness (OHSP) compiles a statewide list of special events that provides situational awareness to law enforcement, as well as to assist in local planning requirements. Special events include any event that attracts large numbers of participants and spectators in both a public or private venue. Examples include concerts, marathons, firework displays, community celebrations, visits by VIPs, sporting events, holiday gatherings, etc.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Police Mentor Guide

JCISFA-ANP-MentorGuide

In order to develop the ANP, the Combined Security Transition Command-Afghanistan (CSTC-A) uses Police Mentor Teams to help develop them. A shortage of PMTs across the country, however, has led to the formation of in-lieu of advisor teams comprised of Soldiers from land owning units or attached Military Police units. The purpose of this document is to help provide those additional advisory teams with information they need to develop the skills required to effectively augment the CSTC-A program. This handbook will provide an overview of the entire police program including current goals, relationships to other organizations, the Focused District Development Program, key challenges that may be encountered and the duties of key members of the police advising teams including how to work with the team’s enablers.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Army Mentor Guide

JCISFA-ANA-MentorGuide

This guide is a JCISFA publication on mentoring the Afghan National Army and is applicable to advisors, mentors and partner forces executing Security Force Assistance (SFA) operations. The guide is a companion to the May 2009 JCISFA Afghan National Police Mentor Guide and addresses identified gaps in mentoring Afghan National Security Forces. The guide offers cultural background information, partner security force challenges, advisor/mentor best practices, and challenges. As the United States assists other nations, our forces must adopt a “by, with, and through” strategy to enable a supported nation and its security forces to generate and sustain capabilities institutionally and operationally. We can achieve this by advising and mentoring them, partnering with the supported nation and through development of the supported nation and its security forces so that they can do it themselves.

(U//FOUO) DHS-FBI-NCTC Bulletin: Malicious Cyber Actors Use Advanced Search Techniques

DHS-FBI-NCTC-GoogleDorking

Malicious cyber actors are using advanced search techniques, referred to as “Google dorking,” to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks. “Google dorking” has become the acknowledged term for this malicious activity, but it applies to any search engine with advanced search capabilities. By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities. For example, a simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.

(U//FOUO) FBI Analytic Report: Autonomous Cars Present Game Changing Opportunities and Threats For Law Enforcement

FBI-AutonomousVehicles

The FBI assesses that if autonomous cars are approved by Congress for use by the public nationwide in the next five to seven years, these vehicles will have a high impact on transforming what both law enforcement and its adversaries can operationally do with a car. State regulators in California, Florida, and Nevada already legalized the use of these vehicles within their states.

(U//FOUO) New Jersey Fusion Center: Potential Threats to Government Officials in New Jersey

NJROIC-ThreatsGovernmentOfficials

The FBI San Antonio Division recently reported that groups of young individuals in Texas, and possibly other states, were attempting to elicit information regarding residences of firefighters, military personnel, police officers, etc. The subjects knocked on neighborhood doors, telling residents they worked for an organization that helps young people with public speaking by sending them out to contact random people at their homes and ask about their professions. The youths reportedly received points based on the professions they located, with the potential of winning a college scholarship and a large sum of money. Police officer had the highest point value.

(U//FOUO) New Jersey Division of Fire Safety Bulletin: Sovereign Citizens

NJ-SovereignCitizens

The anti-government sovereign citizen movement has been catapulted into the forefront of public attention due to an increase in criminal activity by sovereign citizens nationwide. The movement consists of individuals and small groups throughout the United States, guided and supported by adherents who share the core belief that Federal, state, and local governments are all illegitimate entities.

(U//FOUO) Marine Corps Intelligence Activity Malaysia Cultural Field Guide

MCIA-MalaysiaCultureGuide

Malays are predominantly Muslim, and as a result, the country is strongly influenced by Islam. Most Malaysian Muslims are moderate in their views. They do not want Malaysia to become an Islamic state, and regard Islam primarily as a religion, not a lifestyle. Some of Malaysia’s smaller religious and ethnic groups are concerned about what they perceive as the increasingly Islamic nature of Malaysian society.

(U//FOUO) U.S. Strategic Command Cyber Warfare Lexicon

USSTRATCOM-CyberWarfareLexicon

Since the 2006 signing of the National Military Strategy for Cyberspace Operations (NMS-CO), the emerging US cyber warfare community continues to mature and its capabilities increasingly compete for consideration when US forces plan operations. Computer network attack (CNA) and electronic attack (EA) technologies have progressed to the point where their use could be routinely considered in the context of existing and developing OPLANS. In order to effectively integrate and standardize use of these non-traditional weapons, the developers, testers, planners, targeteers, decision-makers, and battlefield operators require a comprehensive but flexible cyber lexicon that accounts for the unique aspects of cyber warfare while minimizing the requirement to learn new terms for each new technology of the future. Without a shared understanding of the accurate meanings of a significant number of frequently used terms, it will be difficult to make progress on the more complex and unresolved technical and operational issues for non-traditional weapons: actionable requirements, technical and operational assurance, effective mission planning techniques, and meaningful measures of effectiveness. In fact, the Secretary of Defense’s Information Operations (IO) Roadmap listed its first benefit to the combatant commanders as “a common lexicon and approach to IO, including support to integrated information campaign planning.” Although the focus of cyberspace operations is not the same as that of IO, they share some technologies and until now, no such lexicon (for IO, or any portion of IO) has been published.

(U//FOUO) Marine Corps Intelligence Activity Singapore Cultural Field Guide

MCIA-SingaporeCultureGuide

Singapore is made up of three main ethnic groups: Chinese, Malays, and Indians. The Chinese ethnic group makes up the majority (75 percent) of the population, followed by the Malays (15 percent) and the Indians (8 percent). Each ethnic group is internally diverse. However, in the view of most Singaporeans, the divisions within each ethnic group are far less significant than those between groups.

DHS Unaccompanied Alien Children (UACs) 2014 Location of Origin Map

DHS-UAC-Map

We analyzed these locations to determine the factors pushing child migration to the US Border. We assess these reasons vary regionally. For example, many Guatemalan children come from rural areas, indicating they are probably seeking economic opportunities in the US. Salvadoran and Honduran children, on the other hand, come from extremely violent regions where they probably perceive the risk of traveling alone to the US preferable to remaining at home. This violence, combined with poor economies and other secondary factors will make stemming the flow of UACs to the US a very complex issue to address.

(U//FOUO) Marine Corps Intelligence Activity Ukraine Cultural Field Guide

MCIA-UkraineCultureGuide

Ukraine is positioned between Eurasia and Europe, and the region has been influenced by many major civilizations. Ukraine, whose name means “borderland,” has lived under foreign powers for most of its existence. This is most recently evidenced by the creation of the Ukrainian Soviet Socialist Republic, controlled by the centralized establishment in Moscow under the communist regime. Even today the capital, Kiev, struggles internally between Moscow and the West, forcing Ukrainians to more closely identify with either their own cultural brethren or a new, more independent direction for the country.