Author Archive for Public Intelligence

Archistrategos.

Identifying Fraudulent Social Security Documents: A Tool For Law Enforcement Officers

Social Security Facts:
· The Social Security act was signed by FDR on August 14, 1935.
· Ernest Ackerman was the first recipient of Social Security benefits. He received a
one –time lump sum payout of 17 cents.
· FICA stands for the Federal Insurance Contributions Act.
· Social Security numbers were first issued in 1936. To date, over 415 million
different numbers have been issued.
· When someone dies his or her Social Security number is NOT reused. The ninedigit
Social Security number allows for approximately 1 billion possible
combinations. At this point there is no need to recycle numbers.

Maryland Coordination and Analysis Center: Stages of an Active Shooter

(U//FOUO) Due to the recent events in Virginia and threats to schools across the country, the following information is provided as background information for patrol officers. An active shooter is usually not a spur of the moment action. The person progresses through a number of identifiable stages. These stages may occur in rapid succession or over a period of months or even years. During the first four stages, law enforcement may have an opportunity to intervene before the shooter is able to execute the plan.

FBI United Society of Aryan Skinheads Activity in San Diego

(U) United Society of Aryan Skinheads Activity in San Diego

(U) The United Society of Aryan Skinheads (USAS) is seeking to increase their visibility in San Diego in an effort to become the premier Skinhead organization in California. The San Diego Field Intelligence Group is seeking the assistance of local law enforcement partners to identify the location USAS members and groups in the San Diego area.

How a Boy Becomes a Martyr: The Dangers of Web 2.0 Technology

The following report is a fictitious account of how a young person in America could become a suicide bomber for an Islamic extremist group. It is the fifth in a series of reports on Web 2.0 technology and future urban warfare. All references to people, groups, and products are intended for illustrative purposes only. As such, the authors do not suggest that any of the products or organizations listed condone or support extremist activities.

FBI The School Shooter: A Quick Reference Guide

REMEMBER
# Many offenders experienced a significant personal loss in the months leading up to the attack, such as a death, breakup, or divorce in the family.
# Many offenders engaged in repetitive viewing of violent media and were often fascinated with previous school shootings. Repeated viewing of movies depicting school shootings, such as “Zero Day” and “Elephant,” may indicate a fascination with campus attacks.
# Be aware of the subject’s online videos, blogs, and social networking activities.

FBI Rage and Racism: Skinhead Violence On The Far Right

This intelligence assessment examines acts of violence by racist skinheads between 1 January 2007 and 30 September 2008. For the purposes of this report these acts are limited to physical violence against persons (assaults, rape, murder) and property (arson). Threats of violence and violence by incarcerated racist skinheads who are members of prison gangs such as the Aryan Brotherhood are not included. The assessment is designed to help law enforcement become more aware of the violent tendencies of racist skinheads. The statistical information for this report is drawn from news reports available on the Internet, police reports, and FBI case information.

HAMAS Sympathizers in New Jersey: Supporting Terrorism Abroad

The Palestinian statehood issue remains a popular and unifying cause throughout the Arab and Islamic world, and a high agenda item for militant jihadists. HAMAS is one of the principal terrorist groups involved in this conflict and uses violence in the form of terrorism to further its cause. The organization has long been designated by the US Department of State as a terrorist group. According to the State Department’s 2007 “Country Reports on Terrorism,” HAMAS receives funding from Iran, sympathetic supporters in Arab countries, and from the Palestinian diaspora around the world, including in the United States.

NYPD Responding to Terrorist Attacks: Trends in European Response Scenarios

This paper analyzes three high-profile European case studies of post-9/11 terrorist attacks (Istanbul [2003], Madrid [2004], and London [2005]). It also examines targeting and tactical information gleaned from several failed/foiled plots in Europe. Although the general findings of this paper can be applied to any type of large scale terrorist attack, this study focuses on those attacks perpetrated by Muslim extremists since this subset currently constitutes the most prominent terrorist threat to the U.S.

NCTC Lone-Actor Terrorists with Biological Expertise: A Potential Threat with Limited Indicators

Elements of the U. S. government hosted an interdisciplinary, unclassified workshop to better understand the potential threat from independently acting terrorists with biological expertise. Such lone-actor terrorists have the potential to carry out high-impact biological attacks while generating few signatures, making detection or disruption of their efforts challenging. The one-day workshop explored the possible motivations, intents, and objectives of lone-actor terrorists who might consider conducting biological attacks; examined scientific infrastructure vulnerabilities that these individuals could exploit; and identified strategies to mitigate this potential threat.

U.S. State Department: Look out for terrorist beggars

(SBU) On January 20, a suicide bomber disguised as a beggar approached Afghan warlord General Abdul Rashid Dostum outside a mosque in northern Afghanistan. Though the “beggar” detonated his device one meter from Dostum, no one was killed in the explosion other than the bombers himself. In this issue of Terrorist Tactics, we will see how posing as a beggar can serve as a clever ruse to carry out pre-operational surveillance.

DHS Analysis of Mumbai Combined Arms Operation

On 26 November 2008, Islamic extremists conducted terrorist attacks in Mumbai, India. Mumbai is the commercial and financial capital city of India, with a population of over 14 million. Ten gunmen paralyzed India’s largest city in a matter of minutes Wednesday night, with the siege continuing until Saturday afternoon. To fully identify appropriate protective measures, it is essential to retrace the assault planning process, and examine all facets taken by the terrorists to achieve their [goals].

Camp Victory Server Consolidation for Advanced Leveraging of Equipment

Server Consolidation for Advanced Leveraging of Equipment (SCALE) evaluates VMware ESX Server 3.0.1 virtualization software for use at Camp Victory, Baghdad, Iraq. Global Cyberspace Integration Center (GCIC) personnel and Multi-National Corps – Iraq, C6 (MNC-I/C6) synchronized efforts to reduce information technology (IT) equipment, power, space, and heating, ventilation, & air conditioning (HVAC) demands while increasing system redundancy and scalability for Non-Secure Internet Protocol Router Network (NIPRNet), Secure Internet Protocol Router Network (SIPRNet), and Combined Enterprise Regional Information Exchange System (CENTRIXS) in direct support to 8,000 Coalition warfighters.

Government Collection of Private Information: PATRIOT Act Reauthorization

Shortly after the 9/11 terrorist attacks, Congress enacted the USA PATRIOT Act, in part, to “provid[e] enhanced investigative tools” to “assist in the prevention of future terrorist activities and the preliminary acts and crimes which further such activities.” To that end, the Act eased restrictions on the government’s ability to collect information regarding people’s activities and conversations, both in domestic criminal investigations and in the realms of foreign intelligence gathering and national security.

USMC Training Atmospherics and Set Design Enhancements

This specification establishes the functional capabilities for the atmospherics set design training enhancements effort. This specification is required to enhance and upgrade existing and future USMC Military Operation in Urban Terrain (MOUT), Home Station Training (HST) areas and Ranges. Even though these areas are typically equipped with streets, courtyard walls, mosques, buildings, and village shanties, the atmosphere is void of detailed cultural realism such as items listed. Specifically, this specification will provide the detailed information required for placing, updating or enhancing spaces and places within the training areas.

FOUO Pork Products Defense Commissary Data Sheet OCONUS

DESCRIPTION:

A. Pork products will be produced using the USDA’s Institutional Meat Purchase Specifications (IMPS) for Pork Items and The North American Meat Processors Association, Meat Buyers Guide.

1. All pork cuts shall originate from barrow and gilt carcasses graded US No. 1 or equivalent. Fresh primal and sub primal cuts shall meet the requirements of IMPS series 400 or the Meat Buyers Guide. Cured, smoked and fully cooked pork items shall meet the requirements of IMPS series 500.

2. Unless otherwise specified, all items will be processed 2 days from harvesting and will be packaged in accordance with the contract requirements. All tray ready items will have soaker pads properly added to eliminate normal purge. Product must also meet the following requirements:

a. Fresh vacuumed packed primals and sub primals must be delivered within 10 days from date of pack to the point of embarkation. Product must be sourced loaded and staged at the Port of Embarkation within 3 days prior to the scheduled sail date. Temperature monitoring devices must be placed inside the containers to help record proper temperatures during transport.