FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
Documents
Department of Justice
NDIC Money Laundering in Digital Currencies Report
Digital currencies combine the intrinsic value of gold and other precious metals as well as the designated value of national currencies with the worldwide reach of the Internet to create an ideal mechanism for international money laundering. Users can anonymously fund digital currency accounts, send those funds (sometimes in unlimited amounts) to other digital currency accounts worldwide, and effectively exchange the funds for foreign currencies—often while bypassing U.S. regulatory oversight.
Threats and Takedown Notices
Las Vegas Police Request Removal of Document from Public Intelligence
During the month of April 2010, we have received the same message twice from the Las Vegas Metropolitan Police Department concerning a Law Enforcement Sensitive brief entitled “Silver Shield: Nevada’s Approach to Critical Infrastructure Protection” from November 2007. The briefing discusses various aspects of Suspicious Activity Reporting, Fusion Center integration, and the use of unmanned aerial vehicles (UAV) to patrol portions of the city for aerial photography during incident response.
U.S. Central Command
U.S. Central Command “Monitoring the Tactical Network”
FOUO U.S. Central Command “Monitoring the Tactical Network” Brief, April 13, 2010.
Department of Homeland Security
(U//FOUO) DHS Acutely Toxic Chemical List
(U//FOUO) DHS Acutely Toxic Chemical List, September 2008.
U.S. Northern Command
USNORTHCOM General Population Evacuation by Air
USNORTHCOM General Population Evacuation by Air Brief from March 17, 2009.
FEMA
Authorized FEMA and Contracted Inspector Identification Badges Guide
When a Disaster is declared, FEMA employees and Contracted Inspectors will be working in the affected area. In order to help you identify authorized FEMA staff and Contracted Inspectors, we are providing samples of authorized FEMA Identification Credentials. If there is any question regarding the authenticity of someone claiming to be a FEMA employee, inspector or representative, please contact us as soon as possible.
Congressional Research Service
Homeland Emergency Preparedness and the National Exercise Program
An emergency preparedness and response program provides resources and support to individuals and communities that might be affected by a broad range of disruptive incidents. These incidents may be caused by natural phenomena such as severe weather, fires, earthquakes, tsunamis, or disease outbreaks. Incidents might result from human activity as well, and could include accidents, criminal acts, terrorism, or other attacks. Concerns have been raised whether current preparedness and response policies and capacities are sufficient.
Congressional Research Service
Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges
Interruptions of congressional operations by incidents such as episodic computer virus infections, or the anthrax contamination that took place during autumn 2001, have demonstrated the importance of congressional continuity of operations (COOP) planning. COOP planning refers to the internal effort of an organization to assure that the capability exists to continue essential functions in response to a comprehensive array of potential operational interruptions. For Congress, COOP planning is related to a second level of preparedness, continuity of government (COG) planning. Congressional COG planning focuses on ensuring that Congress is able to carry out its legislative responsibilities under Article I of the Constitution.
Corporate
BlackRock Maiden Lane III Counterparty Brief
Previously Confidential BlackRock Solutions Maiden Lane III Counterparty Brief from November 5, 2008.
Threats and Takedown Notices
FBI Requests Removal of Document from Public Intelligence
On April 19, 2010, Public Intelligence received a notice from George White, Information Security Officer for the Federal Bureau of Investigation’s Criminal Justice Information Services Division, requesting the removal of a “For Official Use Only” document posted less than one day prior. The “Criminal Justice Information Services Security Policy” is a draft document dated January 1, 2011 discussing the security procedures and implementation of future additions to the CJIS system.
U.S. Army
U.S. Army Game Studio Serious Games Development
U.S. Army Game Studio Serious Games Development Brief, March 29, 2010.
U.S. Army
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT)
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT), April 2010.
Canada
Canadian Land Force Chaplain’s Manual
The Canadian Charter of Rights and Freedoms guarantees the “freedom of conscience and religion” for every Canadian.
Accordingly, CF regulations direct that, subject to operational and service exigencies, commanding officers shall make provision for spiritual service support and religious accommodation for the soldiers under their command.
U.S. Air Force
Angel Thunder 2010
Canada
Canadian Forces Crowd Confrontation Operations Manual
This manual is based on the precept that crowd confrontation situations could occur on any CF operation. The doctrine has been
designed to facilitate the use of CCO as a unique operation, which may be a subset of any other CF operation. Where peace support operations (PSO), domestic operations, or armed conflict examples are used, the concepts presented are intended to cover all operations. The manual stresses that the CCO hierarchy can be applied during any operation to assist in the decisions of what equipment to acquire or deploy and what training is to be based on.
Department of Justice
Intelligence-Led Policing: The New Intelligence Architecture
Intelligence operations have been reviewed, studied, and slowly but steadily transformed. Most efforts have focused on reorganizing intelligence infrastructures at the federal level; however, corresponding efforts have been made to enhance state and local law enforcement intelligence operations. Such enhancements make it possible for state and local law enforcement agencies to play a role in homeland security. Perhaps more important, improvements to intelligence operations help local law enforcement respond to “traditional” crimes more effectively.
Department of Homeland Security
DHS Biosecurity Infrastructure Protection Assessments and Activities Brief
FOUO DHS Biosecurity Infrastructure Protection Assessments and Activities Brief, August 2009.
FEMA
FEMA Composite Enterprise Architecture Overview
FEMA Composite Enterprise Architecture Overview “The Direction of FEMA’s EA”, June 8, 2009.
FEMA
FEMA Exercise Modeling & Simulation Briefing
FEMA Exercise Modeling & Simulation Briefing from the National Exercise Simulation Center (NESC), March 4, 2010.
FEMA
(U//FOUO) 2009 Presidential Inaugural NSSE Brief
FEMA 2009 Presidential Inaugural NSSE Brief, January 14, 2010.
Colorado
Colorado Multiyear Training and Exercise Plan 2010-2012
The purpose of the Multiyear Training and Exercise Plan (TEP) is to provide a follow-on companion document to the Colorado Homeland Security Strategy and the priorities set by the State Improvement Planning Workshop. It is a living document that will be updated and refined annually. The Multiyear TEP provides a roadmap for Colorado to follow in accomplishing the priorities described in the Homeland Security Strategy through effective trainings and exercises.
Intelligence Fusion Centers, Virginia
Virginia Fusion Center Educational Facilities Threat Assessment
The purpose of this Threat Assessment is to convey potential threats to educational facilities and related assets in the Commonwealth of Virginia in order to prevent terrorist and insider attacks as well as to increase awareness regarding available threat information. It is anticipated that this assessment will assist homeland security personnel in understanding the potential vulnerabilities to public and private schools, colleges, and universities in order to further assist in responding effectively to an educational facility-related incident. This assessment describes insider threats as well as those posed by domestic extremist and international terrorist groups.
Department of Homeland Security, Department of Justice, Intelligence Fusion Centers
(U//FOUO) DHS/DOJ Fusion Process Analytic Skills & Knowledge Review
To facilitate the development of a nationwide, integrated, inter-connected fusion center capability, the U.S. Department of Homeland Security’s (DHS) National Preparedness Directorate (NPD) and the Office of Intelligence & Analysis (I&A) and the U.S. Department of Justice’s (DOJ) Bureau of Justice Assistance (BJA) have partnered to develop and deploy the Fusion Process Technical Assistance Program. This program has been developed in coordination with the Office of the Director of National Intelligence (ODNI); the Office of the Program Manager, Information Sharing Environment (PM-ISE); the Federal Bureau of Investigation (FBI); and experts from the State and local community—including the Global Justice Information Sharing Initiative (Global), the Criminal
Intelligence Coordinating Council (CICC), and the Global Intelligence Working Group (GIWG).
Department of Justice, Federal Bureau of Investigation
U.S. DOJ-FBI Criminal Justice Information Services (CJIS) Security Policy 2011 Draft
Law enforcement needs timely and secure access to services that provide data wherever and whenever for stopping and reducing crime. In response to these needs, the Advisory Policy Board (APB) recommended to the Federal Bureau of Investigation (FBI) that the Criminal Justice Information Services (CJIS) Division authorize the expansion of the existing security management structure in 1998. Administered through a shared management philosophy, the CJIS Security Policy contains information security requirements, guidelines, and agreements reflecting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI); and the Personally Identifiable Information derived from CJI.