Author Archive for Public Intelligence

Archistrategos.

Al-Qaeda Statement on Death of Osama bin Laden

Al-Qaeda statement calls the day ” a historic day of the days of the great Islamic umma (nation) and in a noble stand of one of its great men and heroes across its blessed age and on the path taken by the will of all the mighty predecessors and those who will follow them, the Sheikh, the Mujahid & the Commander, the pious migrant fighter, Abu Abdullah Osama bin Muhammad bin Laden, may God have mercy on him was killed in a place where truth shines and where sincerity for good deeds and the call for truthfulness exist. Bin Laden was killed so he can follow the mighty caravan of the umma (the nation) with the great leaders, the loyal soldiers, and the honest knights who refused to abandon their faith for the mundane lives and to hand over the command to those who will be humiliate them and be humiliated and that’s why they confronted the weaponry with weaponry, force with force and accepted to challenge the arrogant masses that came out to fight with their killing machines, equipments, aircrafts and forces boastfully so they can be seen as men, and still this didn’t weaken their resolve and didn’t drain their strength, but instead he stood up for them face to face, a mighty mountain, a proud mountain and he was still in the midst of the battle that many got used to and his eyes were used to its sceneries but after that, he was yet to be excused and delivered his message and then he was shot bullets of betrayal and blasphemy delivering his soul to its maker while repeating: ‘Who sacrifice the blessed soul for his Lord to fight off the falsehood CANNOT ever be blamed’.”

Osama bin Laden Death Revelry Photos

thisisbossi – http://www.flickr.com/photos/thisisbossi/ Kelly Gardiner – http://www.flickr.com/photos/ennuiislife/ theqspeaks – http://www.flickr.com/photos/theqspeaks/ Josh Pesavento – http://www.flickr.com/photos/pezz/ Ricky Justus – http://www.flickr.com/photos/rickyjustus/ Liz Elkind – http://www.flickr.com/photos/lemon5/ markn3tel – http://www.flickr.com/photos/n3tel/ This Secret Lullaby – http://www.flickr.com/photos/burn_down_love/

(U//FOUO) DHS Possible Implications of the Death of Osama bin Laden

The Intelligence Community (IC) assesses the death of al-Qa‘ida leader Usama Bin Ladin could result in retaliatory attacks in the Homeland and against US and Western interests overseas. Attacks might originate with al-Qa‘ida Core elements in the tribal areas of Pakistan, with one of their affiliates overseas, and/or with individuals in the homeland sympathetic to the cause but lacking a formal group association. We have no indications of advanced al-Qa‘ida Core plotting efforts in the Homeland, but the case of now-detained al-Qa‘ida operative Najibullah Zazi—who, along with two associates, planned to attack the New York City subway in 2009 using homemade explosives—demonstrates that unidentified operatives could advance plotting in the homeland.

Alabama, Virginia Tornado Destruction Photos

Virginia Department of Transportation – http://www.flickr.com/photos/vadot/ Virginia Department of Emergency Management – http://www.flickr.com/photos/vaemergency/ DigitalGlobe – http://www.flickr.com/photos/digitalglobe-imagery/ Tim and Renda – http://www.flickr.com/photos/timandrenda/ MGShelton – http://www.flickr.com/photos/melindashelton/ LakeMartinVoice – http://www.flickr.com/photos/lakemartinvoice/ GAiN USA – http://www.flickr.com/photos/gainusa/

(U//LES) DHS Liquefied Natural Gas Terminal Vulnerabilities and Terrorist Indicators Reports

LNG is typically created in a three-step process. First, gaseous-form natural gas, extracted from the ground in neighboring oil reservoirs, is “frozen” into a liquid state through a complex cryogenic process (called liquefaction). The LNG boiling point is -260°F. In a liquid state, the volume of the gas is greatly reduced; it would take 600 ships carrying natural gas to equal the cargo contained on just one LNG tanker. Thus, it is practical and economical to import natural gas from overseas. The density of LNG is 26.5 pounds per cubic foot, or less than half that of water. LNG is odorless, colorless, non-corrosive, and nontoxic.

Cecil Rhodes “Confession of Faith”

It often strikes a man to inquire what is the chief good in life; to one the thought comes that it is a happy marriage, to another great wealth, and as each seizes on his idea, for that he more or less works for the rest of his existence. To myself thinking over the same question the wish came to render myself useful to my country. I then asked myself how could I and after reviewing the various methods I have felt that at the present day we are actually limiting our children and perhaps bringing into the world half the human beings we might owing to the lack of country for them to inhabit that if we had retained America there would at this moment be millions more of English living. I contend that we are the finest race in the world and that the more of the world we inhabit the better it is for the human race. Just fancy those parts that are at present inhabited by the most despicable specimens of human beings what an alteration there would be if they were brought under Anglo-Saxon influence, look again at the extra employment a new country added to our dominions gives. I contend that every acre added to our territory means in the future birth to some more of the English race who otherwise would not be brought into existence. Added to this the absorption of the greater portion of the world under our rule simply means the end of all wars, at this moment had we not lost America I believe we could have stopped the Russian-Turkish war by merely refusing money and supplies. Having these ideas what scheme could we think of to forward this object. I look into history and I read the story of the Jesuits I see what they were able to do in a bad cause and I might say under bad leaders.

(U//LES) DHS Agricultural Storage Facility Vulnerabilities and Terrorist Indicators Reports

Traditionally, food in America is produced through a series of processes commonly referred to as the “farm to table” continuum. This process is comprised of multiple components, including production, distribution, processing, transportation, wholesaling, exporting/importing, retail sales, and consumption. Each component of the “farm to table” continuum is achieved in a variety of ways specific to the particular end product being produced. At multiple stages of these processes, raw agricultural products, farm input supplies, and consumer-ready foods are stored in large facilities. These agricultural storage facilities include facilities storing raw agricultural products (wheat, corn, apples, etc.) prior to processing; farm input supplies (fertilizers, chemicals, etc.), live animals (cattle, swine, chickens, etc.), or processed products ready for distribution and consumption (cheese, cereals, packaged products, etc.). In this regard, there is not a “typical” agricultural storage facility. Rather, a variety of facilities specific to the storage requirements of a given product or component serve the “farm to table” continuum.

(U//LES) DHS Wastewater Treatment Facility Vulnerabilities and Terrorist Indicators Reports

Wastewater is water that has been used. It includes substances such as human waste, food scraps, oils, soaps, and chemicals. Wastewater is derived from residential, commercial, and industrial activities. In homes, wastewater is produced from sinks, showers, bathtubs, toilets, washing machines, and dishwashers. Commercial and industrial activities also produce wastewater that must be treated prior to release to the environment. In addition to home and business production, wastewater can also be generated by storm runoff (referred to as inflow) and interception of ground water (infiltration). Because of potentially harmful substances that wash off roads, parking lots, and rooftops, this water must also be treated.

(U//LES) DHS Railroad Bridges Vulnerabilities and Terrorist Indicators Reports

The national economy is based on timely rail deliveries, especially in light of industry’s current practice of just-in-time stocking arrangements. Railroad bridges can be critical chokepoints for high-volume rail lines moving freight from geographic areas of supply to other areas of demand. Furthermore, critical rail bridges are vital assets of the Strategic Rail Corridor Network (STRACNET), a 38,800-mile interconnected network of rail corridors. The STRACNET supports the deployment of military forces across the U.S. to strategically located ports of embarkation.

(U//LES) DHS Banking Repositories Vulnerabilities and Terrorist Indicators Reports

One of the key roles of the government is to maintain the stability of the nation’s financial system and to address and contain systematic risk that may arise in the financial markets. The financial repositories play an important role in market stability. Several agencies of the government (U.S. Treasury, U.S. Mint, Federal Reserve Board, U.S. Secret Service, FBI) are involved in the supply, distribution, storage, and security of U.S. currency, coins, and other market transactions and clearing transactions.

(U//LES) DHS Railroad Yards Vulnerabilities and Terrorist Indicators Reports

Railroad yards can be located in any type of environment having a flat area sufficiently extensive and elongated to permit emplacement of intermodal loading tracks, sorting “humps,” classification “bowls,” or any combination thereof. Thus, yard properties may be sited in open plains or adjacent to hills or other high ground (Figure 3). In the latter case, there may be vulnerabilities to adversaries using longer range, stand-off weapons. Trains are put together in the classification yard, which is comprised of multiple parallel tracks branching out from a central track and connected by switches. Each of the parallel tracks is designated to receive cars with particular destinations along the route. A special locomotive, or switch engine, transports each car or group of cars to its assigned track. Depending on the sensitivity of the shipment and the type of classification yard, cars may be either “shoved to rest” or “humped.” If shoved to rest, the car remains attached to the engine until it couples with the adjacent car. If humped, the car is uncoupled at the top of a very gentle incline and allowed to travel freely downhill.

(U//LES) DHS Nuclear Spent Fuel Storage Vulnerabilities and Terrorist Indicators Reports

Spent fuel, after it is removed from the reactor core, is safely stored in specially designed pools at individual reactor sites around the country. The spent fuel is first placed into a spent fuel pool (Figure 1), which is like a deep swimming pool with racks to hold the fuel assemblies. It allows the fuel to begin cooling. The spent fuel is moved into the water pools from the reactor along the bottom of water canals, so that the spent fuel is always shielded to protect workers. Fuel assemblies are covered by a minimum of 25 feet of water within the pool, which provides adequate shielding from the radiation for anyone near the pool. Spent fuel pools are very robust structures that are constructed to withstand earthquakes and other natural phenomena and accidents. They are typically rectangular structures 20 to 40 feet wide, 30 to 60 feet long, and at least 40 feet deep. The outside walls are typically constructed of more than 3 feet of reinforced concrete. Spent fuel pools at pressurized water reactors (PWRs) are commonly located within an auxiliary building near the containment. Many of the PWR pools are located in the building’s interior. At boiling water reactors (BWRs), spent fuel pools are typically located at an elevated position within the reactor building, outside the primary containment area.

White House Strategy for Trusted Identities in Cyberspace

A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses. “Our digital infrastructure, therefore, is a strategic national asset, and protecting it—while safeguarding privacy and civil liberties—is a national security priority” and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online. As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President’s Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity.

NCIS Interviewing and Interrogating Militant Islamists Guide

Law enforcement personnel at all levels serve on the front line of America’s Global War on Terrorism (GWOT). In the interest of national security and public safety, law enforcement investigators frequently must question persons, either for purposes of intelligence gathering, for collecting evidence that may lead to prosecution and take immediate action that may be in the interest of the public safety/force protection. The objective of these interviews/interrogations is to gather accurate and reliable information that furthers security, safety, intelligence, and law enforcement interests. The current threat environment, however, poses some new challenges for professionals conducting terrorism investigations.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Use a Dirty Bomb

An independent, unclassified analytic Red Cell session, sponsored jointly by the U.S. Departments of Energy and Homeland Security, found a Radiological Dispersal Device (RDD) attack on the U.S. homeland to be highly appealing from a terrorist standpoint. The Red Cell group, which simulated two different terrorist cells, believed an RDD attack would be relatively easy to prepare and mount and could have wide-ranging physical, psychological, political, and economic impacts. The group believed radioactive materials would be easy to procure, especially from abroad, and found a variety of potential targets across the country. Participants expected that public distrust of official guidance would heighten fear and panic.

ISAF Afghan Insurgent Reintegration Guide and Soldier Information Cards

The Afghanistan Peace and Reintegration Programme (APRP) is active. It provides for both reintegration (where fighters leave the fight and peacefully rejoin their communities) and reconciliation (where entire insurgent groups reach a settlement with GIRoA that ends hostilities). Reintegration is the focus of this guide. Information is presented on the APRP, its place in the COIN Campaign and ISAF‟s role. It provides those in ISAF with what they need to work with community leaders and GIRoA and ANSF partners to build their understanding of the Programme and its opportunities. It is an Afghan Programme and ISAF‟s role is to assist and encourage GIRoA to implement it fully.

Examples of Security Research Aided by Public Intelligence

Coverage in the Netherlands of a recent request by the Dutch police to remove issues of Inspire magazine from this website has often misrepresented our position, referring to this site as an “al-Qaeda website”, while failing to explain the nature of what this website does. Articles about the request have even been accompanied by gratuitous photos of Osama Bin-Laden. The fact that our publication of Inspire magazine is not supportive or promotional, but done for “educational and informational purposes” seems to have been missed by many Dutch readers. This is despite the fact that we have included uncharacteristic disclaimers stating this fact on every page where we have made Inspire magazine available. To any regular reader of this site it should be painfully obvious that we are not supporting, condoning or encouraging the activities contained in the magazine, or any other material we publish.