A January 2014 bulletin from the Department of Homeland Security National Cybersecurity and Communications Integration Center on distributed denial-of-service attacks and mitigation methods.
Author Archive for Public Intelligence
Archistrategos.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Bulletin: Fake Help Desk Scams an Ongoing Problem
Law enforcement continues to see reporting of malicious cyber actors using fake help desk scams, also known as technical support scams. These scams, if successful, seek to compromise and take control of computer systems. Malicious cyber actors send users an e-mail or they make cold calls, purportedly representing a help desk from a legitimate software or hardware vendor. The malicious cyber actors try to trick users into believing that their computer is malfunctioning—often by having them look at a system log that typically shows scores of harmless or low-level errors—then convincing them to download software or let the “technician” remotely access the personal computer to “repair” it.
Florida
Florida State Attorney’s Office Ibragim Todashev Killing Report and Documentation
News
FBI Law Enforcement National Data Exchange Contains 223 Million Records
The Law Enforcement National Data Exchange (N-DEx) run by the FBI Criminal Justice Information Services (CJIS) Division now contains approximately 223 million records on nearly two billion entities. A FBI CJIS presentation from February 2014 posted on the website of the Integrated Justice Information Systems Institute includes detailed information on state and local data contributors including a tally of the total number of records contributed by state.
Federal Bureau of Investigation
FBI Law Enforcement National Data Exchange (N-DEx) Overview
United States
House Homeland Security Committee Boston Marathon Bombings Report
This report examines much of Tamerlan Tsarnaev’s personal history and his interaction with Federal agencies, including his radicalization, the 2011 threat assessment carried out by the FBI, and his travel to Russia in early 2012. Additionally, the Committee explores missed opportunities that potentially could have prevented this attack.
Saudi Arabia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Saudi Arabia Cultural Field Guide
Saudi Arabia, U.S. Marine Corps
Marine Corps Intelligence Activity Saudi Arabia Country Handbook
This handbook provides basic reference information on Saudi Arabia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Saudi Arabia.
Department of Defense
DoD Open Business Model for Unmanned Aircraft Systems Ground Control Stations
Over the past twenty years, the Department of Defense (DoD) has acquired a diverse portfolio of Unmanned Aircraft Systems (UAS) across the Military Services to meet its national security needs. Newly emergent threats and evolving national security requirements are prompting the DoD to re-evaluate its entire portfolio of systems, while at the same time, seeking to reduce the total ownership costs including lifecycle sustainment costs of these systems. The anticipated reduction in defense spending in concert with advances in information technology provides ample opportunity for DoD to rethink how it acquires, designs, and builds its systems. As a result, DoD is adopting and exploiting open system design principles and architectures to increase competition, foster reuse across systems, and increase interoperability. This new acquisition model requires access to multi-vendor solutions to enable rapid insertion of new technologies to counter emerging threats, avoid technology obsolescence, and decrease time to field new capabilities. DoD is adopting an Open Business Model (OBM) to support the implementation of an Open Architecture (OA) for UAS Ground Control Stations (GCS) in order to drive greater acquisition efficiencies and reduce the total ownership costs. This new model is built upon several lessons learned from the Navy’s own open architecture efforts in the submarine community when it radically changed its approach to building weapon systems due to an emerging threat from an adversary in conjunction with declining budget.
Pakistan
Marine Corps Intelligence Activity Pakistan Military Culture Study
The Pakistan military is ambivalent toward the United States yet largely dependent on U.S. military aid. The Pakistan military distrusts civilians, and throughout Pakistan’s history, the military has repeatedly sought to control the civilian government. Currently, a worsening security and economic situation is taxing the military’s resources. However, the military is a hierarchical organization that remains internally stable and professional.
Pakistan, U.S. Marine Corps
Marine Corps Intelligence Activity Pakistan Country Handbook
This handbook provides basic reference information on Pakistan, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Pakistan.
El Salvador, U.S. Marine Corps
Marine Corps Intelligence Activity El Salvador Country Handbook
This handbook provides basic reference information on El Salvador, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to El Salvador.
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Chinese People’s Liberation Army Culture Study
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Chinese Military Culture Field Guide
China’s Military Culture Field Guide is designed to provide deploying military personnel an overview of China’s military cultural terrain. In this field guide, China’s military cultural history has been synopsized to capture the more significant aspects of China’s military cultural environment, with emphasis on factors having the greatest potential to impact operations. The field guide presents background information to show China’s military mind-set through its history, values, and internal dynamics. It also contains practical sections on lifestyle, customs, and habits. For those seeking more extensive information, MCIA produces a series of cultural intelligence studies on China’s military that explores the dynamics of China’s military culture at a deeper level.
China, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity China Cultural Field Guide
China, U.S. Marine Corps
Marine Corps Intelligence Activity China Country Handbook
This handbook provides basic reference information on China, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to China.
Indonesia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Indonesia Cultural Field Guide
Indonesia, U.S. Marine Corps
Marine Corps Intelligence Activity Indonesia Country Handbook
This handbook provides basic reference information on Indonesia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Indonesia.
U.S. Marine Corps, Vietnam
Marine Corps Intelligence Activity Vietnam Country Handbook
This handbook provides basic reference information on Vietnam, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Vietnam.
Customs and Border Protection
Customs and Border Protection Use of Force Policy Handbook Unredacted
U.S. Army
U.S. Army Irregular Opposing Forces Manual
Irregular forces are armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces (JP 3-24). The distinction of being armed as an individual or group can include a wide range of people who can be categorized correctly or incorrectly as irregular forces. Excluding members of regular armed forces, police, or internal security forces from being considered irregular forces may appear to add some clarity. However, such exclusion is inappropriate when a soldier of a regular armed force, policeman, or internal security force member is concurrently operating in support of insurgent, guerrilla, or criminal activities.
Intelligence Fusion Centers, New Jersey
(U//FOUO) New Jersey Fusion Center Bulletin: Suspicious Activity Regarding the Electrical Grid in New Jersey
In the past year, the NJ Suspicious Activity Reporting System (NJ SARS) has received multiple reports of intrusions at electrical grid facilities in New Jersey. The NJ ROIC currently has no indication of any specific threats associated with these incidents, but provides this information for situational awareness and requests information on any similar, previously unreported incidents in New Jersey.
Federal Bureau of Investigation
FBI Checklist for Reporting Economic Espionage or Theft of Trade Secrets
Federal Bureau of Investigation
(U//FOUO) FBI Counterintelligence Vulnerability Assessment for Corporate America
To prevent foreign entities from achieving their goals, a Counterintelligence Program (CIP) proactively searches for and uses information from multiple sources. An effective CIP draws information from security programs and other internal systems, as well as from the U.S. Intelligence Community (USIC). Once this information is assembled, an effective CIP develops a coherent picture and crafts a strategy to prevent the foreign entity from successfully achieving its goals and minimizes the damage already done. An effective CIP conducts active analysis of available information, requires annual CI education for all employees, and provides a system for immediate referral of behavior with CI implications.
U.S. Navy
U.S. Navy Arctic Roadmap 2014-2030
This Roadmap outlines the Navy’s strategic approach for the Arctic Region and the ways and means to achieve the desired national end state. Resource constraints and competing near-term mission demands require that naval investments be informed, focused, and deliberate. Proactive planning today allows the Navy to prepare its forces for Arctic Region operations. This Roadmap emphasizes low-cost, long-lead activities that position the Navy to meet future demands. In the near to mid-term, the Navy will concentrate on improving operational capabilities, expertise, and capacity, extending reach, and will leverage interagency and international partners to achieve its strategic objectives. The Roadmap recognizes the need to guide investments by prudently balancing regional requirements with national goals.