Documents

The OECD Initiative on Tax Havens

Since the 1990s, the Organization for Economic Cooperation and Development (OECD) has pursued the issues of bribery and tax havens, resulting in changes to certain U.S. laws. In addition, the OECD, under the direction of its member countries, spearheaded an international agreement to outlaw crimes of bribery, and it continues to coordinate efforts aimed at reducing the occurrence of money laundering, corruption, and tax havens.

Insurance Industry Suspicious Activity Reporting 2010 Assessment

This report details key findings of the Financial Crimes Enforcement Network’s (FinCEN) assessment of Suspicious Activity Reports (SARs) filed from May 2, 2007, through April 30, 2008, by insurance companies and includes some preliminary observations about SARs filed from May 2008 through October 2009. It compares the results through April 2008 with a similar study of the first year of required reporting by segments of the insurance industry (May 2, 2006, through May 1, 2007). FinCEN analyzed insurance filings to identify typologies, patterns, and trends related to filing volume, filer location, subject details, characterizations of suspicious activities, insurance products, and other relevant information. Analysis includes summaries of SAR narratives identifying reported money laundering risks and vulnerabilities. In identifying potential trends, FinCEN reached out to representatives of the Bank Secrecy Act Advisory Group (BSAAG) to better understand what the industry is seeing with regard to these trends. That information is summarized in the Significant Findings section.

Ohio Department of Public Safety: Method of Suicide that Could Injure or Kill First Responders

Recently a new way to commit suicide has been discovered by mixing two chemicals that can be bought over the counter at local stores. They are Bonide, a sulfur spray used as an insecticide for fruit trees, and hydrochloric (muriatic) acid. Once mixed, the chemicals produce heat and a flammable, noxious gas that causes the subject to pass out and the heart to stop within minutes. The process appears to be quick and painless. Two documented cases, one in Pasadena, California and the other at Lake Allatoona in Bartow County, Georgia, involved young men in their early 20s. Both were found locked inside their cars with the chemicals. Each left a note on the car warning anyone around of danger. The car at Lake Allatoona had been taped to prevent gas from escaping.

NATO Civil-Military Co-Operation (CIMIC) Doctrine

Civil-military co-operation is not a new phenomenon within NATO. Traditionally, however, it was seen as presenting little more than a logistic challenge. NATO’s operations beyond its own domestic borders, on territory devoid of fully functioning civil institutions or effective infrastructure present different and more complex challenges. Changes to the environment in which NATO might potentially operate have led to the development of a new Strategic Concept (SC 99)3. This recognises a much wider range of threats to international security than existed hitherto. In addition to continuing to provide for collective defence, the Concept states that the Alliance must stand ready “to contribute to effective conflict prevention and to engage actively in crisis management, including crisis response operations”.

U.S. Government Counterinsurgency Guide

Insurgency is the organized use of subversion and violence to seize, nullify or challenge political control of a region. As such, it is primarily a political struggle, in which both sides use armed force to create space for their political, economic and influence activities to be effective. Insurgency is not always conducted by a single group with a centralized, military-style command structure, but may involve a complex matrix of different actors with various aims, loosely connected in dynamic and non-hierarchical networks. To be successful, insurgencies require charismatic leadership, supporters, recruits, supplies, safe havens and funding (often from illicit activities).

IACP State and Provincial Police Planning Sections (SPPPOS) Directory

The State and Provincial Police Planning Officers section (SPPPOS) is a part of the Division of State and Provincial Police of the International Association of Chiefs of Police (IACP). Membership includes police agencies with responsibilities consisting of both highway patrol and criminal investigation responsibilities in the service of state and provincial governments, the federal government of Canada, or other sovereign governments exercising jurisdiction over territories within the United States or Canada. The organization is comprised of five geographic areas; the North Atlantic, North Central, North Atlantic, Mountain Pacific, and Southern regions. Each region may convene meetings as needed. An international conference is held annually.

El Paso Intelligence Center: Mexican U.S. Consulate Murderers Gang Warning

The Barrio Azteca was organized in the El Paso, Texas, County Jail in 1987 from where it moved to the streets and the Texas Department of Criminal Justice prison system. The Barrio Azteca prison gang – which has chapters in El Paso, Texas, and Juarez, Chihuahua, Mexico – has historically been linked to the Juarez Cartel. Barrio Azteca membership is estimated at 3,500 inside and outside of the prison system. Members have been reported in Texas, New Mexico, Colorado, Nevada, Arizona, California, Oklahoma, Idaho, Washington, Kansas, Illinois, South Carolina, North Carolina, New Jersey, New York and Utah. They participate in enforcing the rules of the Juarez Cartel in El Paso, Texas, and southern New Mexico.

USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF

The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.

U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028

The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.

U.S. DOJ Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

According to the Supreme Court, a “‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property,” United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized the interception of intangible communications as a seizure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a “‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed.”

Electronic Evidence Compliance: A Guide for Internet Service Providers

This Guide provides general guidelines for Internet service provider compliance with law enforcement and national security evidence gathering authorities. It is not intended to constitute or be a substitute for legal advice provided to individual clients on the basis of particular facts. In light of the law’s complexity, Internet service providers should consult counsel regarding questions about the law.

New Jersey ROIC: Terrorist Bus Alteration

In December 2007, the Fairfield (New Jersey) Police Department (FPD) observed a bus, registered in Florida, at a local gas station, where the driver was pumping diesel fuel through an open window into the bus. Further investigation revealed that the driver had removed the right-side seats to accommodate eighteen 55-gallon plastic drums, which he filled with approximately 300 gallons of diesel fuel before FPD impounded the bus. There were numerous equipment violations observed and the driver was issued summonses as a result. The drums were not secured and diesel fuel apparently leaked during the fueling process.

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)

What is a SAR?

•“Official documentation of observed behavior that may be indicative of intelligence gathering or preoperational planning related to terrorism, criminal, or other illicit intention”
• SAR process focuses on what law enforcement agencies have been doing for years—gathering information regarding behaviorsand incidentsassociated with crimeand establishing a process whereby information can be shared to detect and prevent criminal activity, including that associated with domestic and international terrorism
• Examples: Surveillance, photography of facilities, testing of security

Adam Gadahn March 7, 2010 Video with Transcript

This video was released on March 7, 2010 by the Al-Qaeda media arm As-Sahab and has been variously titled “A Call to Arms” and “Unsheath Your Sword”. In the 25-minute video, Adam Gadahn calls on Muslims in the West to follow in the footsteps of Nidal Malik Hasan, the Fort Hood shooter. Gadahn encourages Americans and other Muslims in the West to “prepare to play his due role in responding to and repelling the aggression of the enemies of Islam.” Gadahn also provides advice on choosing high-value targets for potential terrorist attacks in America and the West, such as military installments and mass transportation systems, as well as symbols of capitalism whose ruin could cripple the Western economy. Gadahn urges his followers to take action as soon as possible and explains that now is the “golden, once in a lifetime opportunity to reap the rewards of jihad and martyrdom…so unsheathe your sharpened sword and rush to take your rightful place among defiant champions of Islam.”

LA-RTTAC Guardian Incident Review: August 2009

(U//FOUO//LES) The Guardian database is populated several ways. Leads may come directly to the FBI for entry by FBI personnel. They may come from e-Guardian – an unclassified, law enforcement sensitive reporting portal available to vetted account holders at the Law Enforcement Online (LEO) Web site – for later transfer into Guardian. Or they may come first to the JRIC via online lead sheets, by facsimile, or by phone for selective entry into e-Guardian. The FBI’s Threat Squad assesses and investigates all Guardian leads. Based upon their findings, incidents are closed, transferred to another agency for follow-up, or referred internally for additional investigation.