Since the 1990s, the Organization for Economic Cooperation and Development (OECD) has pursued the issues of bribery and tax havens, resulting in changes to certain U.S. laws. In addition, the OECD, under the direction of its member countries, spearheaded an international agreement to outlaw crimes of bribery, and it continues to coordinate efforts aimed at reducing the occurrence of money laundering, corruption, and tax havens.
Documents
Financial Crimes Enforcement Network
Insurance Industry Suspicious Activity Reporting 2010 Assessment
This report details key findings of the Financial Crimes Enforcement Network’s (FinCEN) assessment of Suspicious Activity Reports (SARs) filed from May 2, 2007, through April 30, 2008, by insurance companies and includes some preliminary observations about SARs filed from May 2008 through October 2009. It compares the results through April 2008 with a similar study of the first year of required reporting by segments of the insurance industry (May 2, 2006, through May 1, 2007). FinCEN analyzed insurance filings to identify typologies, patterns, and trends related to filing volume, filer location, subject details, characterizations of suspicious activities, insurance products, and other relevant information. Analysis includes summaries of SAR narratives identifying reported money laundering risks and vulnerabilities. In identifying potential trends, FinCEN reached out to representatives of the Bank Secrecy Act Advisory Group (BSAAG) to better understand what the industry is seeing with regard to these trends. That information is summarized in the Significant Findings section.
Intelligence Fusion Centers, Nevada
Silver Shield Nevada’s Approach to Critical Infrastructure Protection
Law Enforcement Sensitive Nevada “Silver Shield” Approach to Critical Infrastructure Protection Brief, November 26, 2007.
Canada, European Union, Japan, Mexico, United States
Anti-Counterfeiting Trade Agreement (ACTA) 2010 Draft Full Text
U.S.-Japan-EU-Mexico-Canada Confidential Anti-Counterfeiting Trade Agreement (ACTA) Draft Text, January 18, 2010. This is the 56-page full version of the “consolidated text” of the treaty.
Intelligence Fusion Centers, Ohio
Ohio Department of Public Safety: Method of Suicide that Could Injure or Kill First Responders
Recently a new way to commit suicide has been discovered by mixing two chemicals that can be bought over the counter at local stores. They are Bonide, a sulfur spray used as an insecticide for fruit trees, and hydrochloric (muriatic) acid. Once mixed, the chemicals produce heat and a flammable, noxious gas that causes the subject to pass out and the heart to stop within minutes. The process appears to be quick and painless. Two documented cases, one in Pasadena, California and the other at Lake Allatoona in Bartow County, Georgia, involved young men in their early 20s. Both were found locked inside their cars with the chemicals. Each left a note on the car warning anyone around of danger. The car at Lake Allatoona had been taped to prevent gas from escaping.
Corporate
Bernie Madoff Client List
Bernie Madoff List of Counterparties, February 3, 2009.
North Atlantic Treaty Organization
NATO Civil-Military Co-Operation (CIMIC) Doctrine
Civil-military co-operation is not a new phenomenon within NATO. Traditionally, however, it was seen as presenting little more than a logistic challenge. NATO’s operations beyond its own domestic borders, on territory devoid of fully functioning civil institutions or effective infrastructure present different and more complex challenges. Changes to the environment in which NATO might potentially operate have led to the development of a new Strategic Concept (SC 99)3. This recognises a much wider range of threats to international security than existed hitherto. In addition to continuing to provide for collective defence, the Concept states that the Alliance must stand ready “to contribute to effective conflict prevention and to engage actively in crisis management, including crisis response operations”.
U.S. Northern Command
USNORTHCOM Electric Energy Security in the Domestic Theater
USNORTHCOM Electric Energy Security in the Domestic Theater brief from December 14, 2009
Department of State, United States
U.S. Government Counterinsurgency Guide
Insurgency is the organized use of subversion and violence to seize, nullify or challenge political control of a region. As such, it is primarily a political struggle, in which both sides use armed force to create space for their political, economic and influence activities to be effective. Insurgency is not always conducted by a single group with a centralized, military-style command structure, but may involve a complex matrix of different actors with various aims, loosely connected in dynamic and non-hierarchical networks. To be successful, insurgencies require charismatic leadership, supporters, recruits, supplies, safe havens and funding (often from illicit activities).
United States
IACP State and Provincial Police Planning Sections (SPPPOS) Directory
The State and Provincial Police Planning Officers section (SPPPOS) is a part of the Division of State and Provincial Police of the International Association of Chiefs of Police (IACP). Membership includes police agencies with responsibilities consisting of both highway patrol and criminal investigation responsibilities in the service of state and provincial governments, the federal government of Canada, or other sovereign governments exercising jurisdiction over territories within the United States or Canada. The organization is comprised of five geographic areas; the North Atlantic, North Central, North Atlantic, Mountain Pacific, and Southern regions. Each region may convene meetings as needed. An international conference is held annually.
Intelligence Fusion Centers, Texas
El Paso Intelligence Center: Mexican U.S. Consulate Murderers Gang Warning
The Barrio Azteca was organized in the El Paso, Texas, County Jail in 1987 from where it moved to the streets and the Texas Department of Criminal Justice prison system. The Barrio Azteca prison gang – which has chapters in El Paso, Texas, and Juarez, Chihuahua, Mexico – has historically been linked to the Juarez Cartel. Barrio Azteca membership is estimated at 3,500 inside and outside of the prison system. Members have been reported in Texas, New Mexico, Colorado, Nevada, Arizona, California, Oklahoma, Idaho, Washington, Kansas, Illinois, South Carolina, North Carolina, New Jersey, New York and Utah. They participate in enforcing the rules of the Juarez Cartel in El Paso, Texas, and southern New Mexico.
Afghanistan, Iraq, U.S. Marine Corps
USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF
The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.
Corporate
MoneyGram Anti-Money Laundering Compliance Guides
MoneyGram Anti-Money Laundering Compliance Guides for the Caribbean and Latin America, United States, and Canada.
U.S. Army
U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028
The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.
Department of Justice
U.S. DOJ Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
According to the Supreme Court, a “‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property,” United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized the interception of intangible communications as a seizure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a “‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed.”
Scholarly
Electronic Evidence Compliance: A Guide for Internet Service Providers
This Guide provides general guidelines for Internet service provider compliance with law enforcement and national security evidence gathering authorities. It is not intended to constitute or be a substitute for legal advice provided to individual clients on the basis of particular facts. In light of the law’s complexity, Internet service providers should consult counsel regarding questions about the law.
Intelligence Fusion Centers, New Jersey
New Jersey ROIC: Terrorist Bus Alteration
In December 2007, the Fairfield (New Jersey) Police Department (FPD) observed a bus, registered in Florida, at a local gas station, where the driver was pumping diesel fuel through an open window into the bus. Further investigation revealed that the driver had removed the right-side seats to accommodate eighteen 55-gallon plastic drums, which he filled with approximately 300 gallons of diesel fuel before FPD impounded the bus. There were numerous equipment violations observed and the driver was issued summonses as a result. The drums were not secured and diesel fuel apparently leaked during the fueling process.
Department of Justice, Intelligence Fusion Centers, Regional Information Sharing Systems
Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
What is a SAR?
•“Official documentation of observed behavior that may be indicative of intelligence gathering or preoperational planning related to terrorism, criminal, or other illicit intention”
• SAR process focuses on what law enforcement agencies have been doing for years—gathering information regarding behaviorsand incidentsassociated with crimeand establishing a process whereby information can be shared to detect and prevent criminal activity, including that associated with domestic and international terrorism
• Examples: Surveillance, photography of facilities, testing of security
Intelligence Fusion Centers, North Dakota
North Dakota Homeland Security Fusion Center Brief
The Fusion Center provides one central location for intelligence collection, investigation and dissemination of ND Homeland Security information to protect critical infrastructure and assets.
Documents
Adam Gadahn March 7, 2010 Video with Transcript
This video was released on March 7, 2010 by the Al-Qaeda media arm As-Sahab and has been variously titled “A Call to Arms” and “Unsheath Your Sword”. In the 25-minute video, Adam Gadahn calls on Muslims in the West to follow in the footsteps of Nidal Malik Hasan, the Fort Hood shooter. Gadahn encourages Americans and other Muslims in the West to “prepare to play his due role in responding to and repelling the aggression of the enemies of Islam.” Gadahn also provides advice on choosing high-value targets for potential terrorist attacks in America and the West, such as military installments and mass transportation systems, as well as symbols of capitalism whose ruin could cripple the Western economy. Gadahn urges his followers to take action as soon as possible and explains that now is the “golden, once in a lifetime opportunity to reap the rewards of jihad and martyrdom…so unsheathe your sharpened sword and rush to take your rightful place among defiant champions of Islam.”
California
Los Angeles County Sheriff DNA Order Tracking System (DOTS)
Los Angeles County Sheriff DNA Order Tracking System (DOTS), May 2007.
World Health Organization
World Health Organization Pandemic H1N1 Update February 2010
World Health Organization Pandemic H1N1 Update from the USPACOM/COE Pandemic Influenza Workshop, February 2010.
California, Intelligence Fusion Centers
LA-RTTAC Guardian Incident Review: August 2009
(U//FOUO//LES) The Guardian database is populated several ways. Leads may come directly to the FBI for entry by FBI personnel. They may come from e-Guardian – an unclassified, law enforcement sensitive reporting portal available to vetted account holders at the Law Enforcement Online (LEO) Web site – for later transfer into Guardian. Or they may come first to the JRIC via online lead sheets, by facsimile, or by phone for selective entry into e-Guardian. The FBI’s Threat Squad assesses and investigates all Guardian leads. Based upon their findings, incidents are closed, transferred to another agency for follow-up, or referred internally for additional investigation.
Bureau of Alcohol Tobacco Firearms and Explosives
ATF Letter and Package Bomb Detection Techniques
ATF Letter and Package Bomb Detection Techniques Brochure from August 1996.
North Atlantic Treaty Organization
NATO Interoperable ISTAR System Concept of Employment
This document represents the current Concept of Employment (CONEMP) coaltion interoperable intelligence, surveillance, target acquisition and reconnaissance (ISTAR) system. It provides information for commanders and their staffs on the operational employment of participating network enabled ISTAR systems during coalition operations.