Documents

INternational Distributed Unified Reporting Environment (INDURE) User Guide

The International Distributed Uniform Reporting Environment (INDURE) software application provides both a data repository and the reporting tools to interact with that repository in a user-friendly manner. Users are able to insert information into the data repository using a wide variety of reports and make that data available to an international audience. Furthermore, users can query all the data within INDURE and export that data to a variety of external formats and programs. The purpose of INDURE is to provide a data repository into which non DoD communities like NGO’s, USAID and others involved in civil capacity, socio cultural information, events of significance and engagement data can all can input, share, extract and analyze data in concert with DoD entities. INDURE provides these communities with standardized reporting tools that span significant activities (SIGACTS), Civil Capacity information, Socio Cultural and Engagement disciplines.

INternational Distributed Unified Reporting Environment (INDURE) V1.1 Concept of Operations

This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.

(U//FOUO) FBI Times Square “Destructuve Device” Bulletin

(U//FOUO) At approximately 1830 hours on 1 May 2010, a sports utility vehicle (SUV) laden with a destructive device was observed parked at 45th Street and Broadway in Times Square, New York City. Eyewitness reports described the vehicle as smoking, and popping noises were heard emanating from it but no detonation occurred. Law enforcement investigation of the SUV revealed the following: three 20lb propane tanks; two five gallon gasoline canisters; one container containing a black powder material; one large, sealed, vault-like container with visible wires connecting to two analog alarm clocks; and one fuse.

(SBU) DHS TRIPwire: Times Square Vehicle Incendiary Device Attack

In the evening of May 1, 2010, a vehicle with a large incendiary device was discovered and rendered safe in Times Square, New York City. The vehicle was parked at 1515 7th Ave. in Times Square, according to local police officials. The vehicle did not detonate as designed, and there were no casualties. The investigation into the attempted bombing is still ongoing. According to open sources, the vehicle was a blue Nissan Pathfinder spotted by a street vendor who noticed smoke emanating from the vehicle about 6:30pm EST. It is believed the vehicle was abandoned just after 6:00pm, and had its hazard lights flashing and its engine still running. A firefighter who arrived on the scene shortly after being notified reported seeing a “flash” and heard a “popping sound” from the trunk of the vehicle. Theatres, hotels and all foot traffic in the area were cleared and streets were cordoned off by police.

(U//FOUO) DHS Times Square Attempted Bombing Snapshot

(U) Times Square:

–(U) At 6:34pm, a 1993 Nissan Pathfinder bearing Connecticut license plates was discovered in front of 45thStreet and Broadway, the Times Square area of New York City, with smoke in the cabin. Eyewitnesses report seeing smoke and hearing popping sounds coming from inside the vehicle, and people were observed running from the scene. A mounted NYPD Patrol Officer responded, evacuated the area, and notified the bomb squad.

(U) On 2 May, at approximately 1330, Al-Jazeera reported that a group claiming to be Tehrik-e Taliban Pakistan had claimed responsibility for the attack in a one-minute long video posted on a video-sharing Website. It has yet to be determined if the tape is authentic, and if so, if the group played any role in the attack.

Operation Partnership: Law Enforcement and Private Security Collaborations

The law enforcement-private security (LE-PS) partnerships featured here were formed or expanded to address a range of critical needs: to avert or respond to a terrorist attack, support urban downtown revitalization, marshal resources to combat financial crimes, compensate for law enforcement budget cuts, improve safety at special events, improve security for the nation’s infrastructure, and bring community policing approaches and new resources to bear on crimes against residents and businesses. Many of the partnerships have been able to measure success not only by meetings and exchanges of information but also by crimes prevented and solved.

Regional Organized Crime Information Center Jamaat ul-Fuqra Report

Over the past two decades, a terrorist group known as Jamaat ul-Fuqra, or “Community of the Impoverished,” has been linked to multiple murders, bombings, and various other felonies throughout the United States and Canada. In 1980, a Pakistani cleric named Sheikh Mubarak Ali Gilani began preaching against Western culture at a Muslim mosque in Brooklyn, NY. He promoted Islam as the path to a better life and called for fighters to join his holy war against the Soviet occupation of Afghanistan.

Regional Organized Crime Information Center Terrorist Indicators Guide

ANALYSIS of terrorist preparations for past attacks overseas and in the United States suggests that preoperational indicators may be present in the days or weeks prior to an attack. Indicators may point to possible terrorist planning. Alone, an indicator can result from legitimate commercial activity or criminal activity not related to terrorism; however, multiple indicators can suggest a terrorist threat.

(U//FOUO//LES) TSA 2006 Terrorist Threat to U.S. Highway System

(U//FOUO) Threats to the U.S. highway system (including tunnels, bridges, long-haul buses, school buses, and commercial trucks) emanate from transnational and domestic terrorist organizations, as well as from insiders and special interest groups. However, the primary threat stems from al-Qa’ida, its affiliates, and other Sunni Muslim extremists, whether foreign or domestic. No reporting indicates a current, credible, and specific terrorist threat to U.S. highway interests. However, since 1993 at least three terrorist plots to bomb tunnels and bridges in the United States have been disrupted, aborted, or abandoned. Further, recurring suspicious incidents involving U.S. highway infrastructure and assets could reflect pre-operational terrorist planning. Thus far, however, no definitive link has been established between any of the suspicious incidents and terrorism.

Canadian Forces Electronic Warfare Manual

Electronic warfare (EW) has been practiced in every conflict since World War I. Fundamentally, the practice of EW has not changed. However, the context in which EW must operate has. The Canadian Land Force has developed new doctrine and has placed a greater emphasis on joint and coalition operations. As well, closer relationships with national and strategic agencies have had significant impacts on the conduct of EW. The purpose of this chapter is to place EW in context of these new developments.

Los Angeles County Sheriff Active Shooter Response Tactics

This presentation deals with how to prevent, prepare, and tactically respond to a active shooter incident. This will include a historical overview of noteworthy active shooter incidents, with an emphasis on school shootings. Lessons learned, key terms, and important definitions will be discussed as well as the crisis response box, lockdown, and evacuation procedures. This presentation will also review law enforcement equipment, training and tactics as well as post shooting event incident management and threat assessment & management techniques.

Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

The Aegis ballistic missile defense (BMD) program, which is carried out by the Missile Defense Agency (MDA) and the Navy, gives Navy Aegis cruisers and destroyers a capability for conducting BMD operations. Under current MDA and Navy plans, the number of BMD-capable Navy Aegis ships is scheduled to grow from 20 at the end of FY2010 to 38 at the end of FY2015. MDA and Navy plans also call for an increasing portion of the Navy’s BMD-capable Aegis ships to be equipped with newer and more capable versions of the Aegis BMD system.

Apple iPhone Password Work-Around

If you encounter an Apple iPhone where the phone is locked with a Passcode, keep in mind the hand set only allows 5 Passcode attempts before locking out phone. This work-around is limited to iPhones with firmware versions 1.1.2 and earlier. The workaround was disabled on version 1.1.3 in February 2008. Data can be retrieved from the SIM card as well as from the phone handset. To remove the SIM card, place a paperclip in the hole at the top of the phone. Force must be applied to get the SIM holder to pop-up. The SIM card will be inside a plastic tray and can be easily removed. Process the SIM card as normal.

Rapid Enforcement Allied Computer Team (REACT) Task Force

The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County District Attorney’s Office designated as the lead agency. The REACT Task Force is one of five in the State of California and authorized under California Penal Code 13848. All Agents of the React Task Force are either California Peace Officers and/or U.S. Federal Agents.

2008 High Technology Crime In California: Annual Report to the Governor & Legislature

California is home to many of the largest and most advanced technology companies in the world. We also have most of our citizens online in ever increasing amounts. In 2008, 75% of Californians reported that they use a computer at home, work, or school, and 70% use the Internet. Accompanying such an explosion in the telecommunication and Internet penetration has been a concomitant rise in technology crime. Our experience has taught us that technology and computers have given stalkers, pedophiles, destructive disgruntled employees, thieves, scam artists and those seeking infamy a new forum in which to ply their trade and cause misery.