Author Archive for Public Intelligence

Archistrategos.

SPAWAR/USCYBERCOM Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Overview

Opening Statements
▼Never before has it been possible for one person to potentially affect an entire Nation‟s security.
▼In 1999 (10 years ago), two Chinese Colonels published a book called “Unrestricted Warfare” that advocated “not fighting” the U.S. directly, but “understanding and employing the principle of asymmetry correctly to allow us [the Chinese] always to find and exploit an enemy’s soft spots.”
▼The idea that a less-capable foe can take on a militarily superior opponent also aligns with the views of the ancient Chinese general, Sun Tzu. In his book “The Art of War,” the strategist advocates stealth, deceptionand indirect attackto overcome a stronger opponent in battle.

Law Enforcement Online Virtual Command Centers Brief

• Intelligence Information Sharing System allowing LE Agencies, DoD, Intelligence Community, and Emergency Management to pass critical time sensitive information in a secure environment –LE Vetted Information
• Operational 12 yearswithover 100,000 vetted members
• Certified and Accredited for Sensitive But Unclassified (SBU) and Law Enforcement Sensitive (LES) Information
• Protected through an encrypted VPN tunnel
• No Individual User Costs –internet access only

DHS TRIPwire Quick-Look Report: Holocaust Museum Shooting, 10 June, 2009

* James W. von Brunn, a Holocaust denier reported to be in his late 80s, walked into the Holocaust Museum in Washington, DC and shot a security guard with a .22 caliber rifle on 10 June 2009
* In 1981 von Brunn served six years in prison for attempting to kidnap members of the Federal Reserve board due to anger over high interest rates
* Von Brunn has been charged with murder and killing in the course of possessing a firearm at a federal facility, both capital offenses under federal law
* The Department of Homeland Security has categorized the shooting as a criminal incident and said it does not appear to have a connection to terrorism. The attack is being investigated as a hate crime

Law Enforcement Guide to Texas Street Gangs

This booklet is published by the Texas Department of Public Safety, Criminal Intelligence Service, with the cooperation of the Texas Department of Criminal Justice-Security Threat Group Management Office. It is being provided as a resource to assist law enforcement agencies and correctional staff in identifying possible members of Security Threat Groups (STGs) and is not to be disseminated outside your agency.

DHS/FBI (U//FOUO) Potential Terrorist Attack Methods

Under the National Infrastructure Protection Plan, the Department of Homeland Security’s Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) has the responsibility to produce assessments that support the strategic planning needed to enhance the protection and preparedness of the Nation’s critical infrastructure and key resources (CIKRs). HITRAC analyzed information about terrorist attack capabilities, goals, and objectives to assess the potential terrorist attack methods that might be used against CIKRs.

USNORTHCOM Joint Task Force North Special Interest Aliens Handbook

This smart book was compiled by Joint Task Force North in response to a support request by the United States Border Patrol. The purpose is to provide the Department of Homeland Security with a basic reference and questioning guide to determine the validity of an apprehended individual’s stated country of origin and to assist in identifying those that are Special Interest Aliens (SIAs). Customs and Border Protection identifies thirty-four countries and two territories as special interest countries. This is current as of March 1, 2008.

ATF (CUI) School Firearms Related Violence and Incidents Overview 2005-2007

The purpose of this report is to provide information as it relates to the phenomenon of school firearms violence. This report provides an overview of school firearms violence, and through the examination of ATF case information, attempts have been made to possibly identify the kinds of individuals who are most likely to commit and/or plan a school firearms violence incident.

The Potential Terrorist Risk of Drinking Water Contamination

Domestic terrorist groups have historically threatened, and in some cases have executed contamination of drinking water systems. Such groups are likely to continue targeting the Water Sector in the future. These groups include, but are not limited to, hate groups, eco-terrorists, antigovernment and religiously motivated groups. International terrorist groups, specifically Islamic extremists such as al Qaeda, have shown interest in contaminating US drinking water.

(U//FOUO) Threats to College Sports and Entertainment Venues and Surrounding Areas

(U//FOUO) The Department of Homeland Security/Office of Intelligence and Analysis, the South Carolina Information and Intelligence Center, and the Michigan Intelligence Operations Center, in coordination with the University of South Carolina, Clemson University, and Michigan State University, have prepared the following threat assessment to assist security planners and law enforcement personnel in monitoring threat information and maintaining a safe and secure event environment for U.S. college sports and entertainment venues and surrounding areas. These areas include entrance and egress routes to the venue, local hotels, restaurants and bars, and parking lots where crowds gather.

Mount Weather

The Mount Weather Special Facility is a Continuity of Government (COG) facility operated by the Federal Emergency Management Agency (FEMA). The 200,000 square foot facility also houses FEMA’s National Emergency Coordinating Center. The site is located on a 434 acre mountain site on the borders of Loudon and Clarke counties, approximately 48 miles west of Washington, DC in Bluemont, Virginia. The above ground support facilities include about a dozen buildings providing communications links to the White House Situation Room.

ATF North Carolina Explosives Theft Warning

On October 23, 2008, ATF received notification of an explosives theft from B.R.S. Inc. B.R.S. advised that sometime between October 20th and October 23rd, unknown suspect(s) cut the locks to their Type II storage magazine and stole two cases of ORICA Magnum Ultra HW. The stolen explosives are described as being 2” by 16” sticks and were distributed among two cases. A full case weighs approximately 55 pounds. After an inventory reconciliation was conducted, it was determined that approximately 88 pounds of Magnum Ultra HW was stolen.

DHS Deceased Internal Cocaine Smuggling Photos

On 6/21/2007, Juan Carlos GOMEZ arrived at Miami International Airport from Bogota, Colombia, on Avian flight #008. Passenger GOMEZ presented himself for inspection to CBPO Ortiz at Passport Control at 2311 hrs. CBPO Ortiz admitted GOMEZ as a USC and referred him to Baggage Control Secondary to verify his parole status as Ortiz indicated prior drug arrest. At approximately 2335 hrs GOMEZ presented his CBP form 6059B to the primary baggage control officer and was escorted to baggage secondary for further examination. The floor coordinator was informed of the situation and assigned CBPO Medrano to conduct GOMEZ’s secondary inspection at 2340 hrs. SCBPOs Adan and Sanfilippo were also informed of GOMEZ’s record.

National Planning Scenarios Version 21.3 2006 Final Draft

The Federal interagency community has developed 15 all-hazards planning scenarios (the National Planning Scenarios or Scenarios) for use in national, Federal, State, and local homeland security preparedness activities. The Scenarios are planning tools and are representative of the range of potential terrorist attacks and natural disasters and the related impacts that face our nation. The objective was to develop a minimum number of credible scenarios in order to establish the range of response requirements to facilitate preparedness planning.