• At approximately 2000 local time, a dump truck rammed the security gate at the Marriott, Islamabad.
• While stopped at the gate, the driver exploded a suicide vest, lighting the truck on fire.
• Mortars, other explosives cook off for approximately three minutes, while security organizes and attempts to stop fire.
• Minutes later, the main explosive of about 600kg of RDX and TNT, combined with an aluminum powder to accelerate the flame.
Documents
New York
NYPD Threat Analysis September 17, 2008 U.S. Embassy Attack in Yemen
Summary
•The U.S. Embassy in Yemen was attacked on the morning of September 17th, 2008
•Six attackers in two vehicles, both of which were VBIEDs, attacked the front gate of the embassy
•The attack resulted in 16 deaths, a toll that includes all six attackers
•No Americans were killed, and there was no reported damage to the embassy buildings
•A group calling itself Islamic Jihad in Yemen claimed responsibility for the attack
•This is the largest attack in Yemen in the last few years, as al-Qaeda is reportedly undergoing a resurgence in that country
White House
Obama Executive Order: Establishment of the Council of Governors
Sec. 2. Functions. The Council shall meet at the call of the Secretary of Defense or the Co-Chairs of the Council to exchange views, information, or advice with the Secretary of Defense; the Secretary of Homeland Security; the Assistant to the President for Homeland Security and Counterterrorism; the Assistant to the President for Intergovernmental Affairs and Public Engagement; the Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs; the Commander,United States Northern Command; the Chief, National Guard Bureau; the Commandant of the Coast Guard; and other appropriate officials of the Department of Homeland Security and the Department of Defense, and appropriate officials of other executive departments or agencies as may be designated by the Secretary of Defense or the Secretary of Homeland Security.Such views, information, or advice shall concern:
(a) matters involving the National Guard of the various States;
(b) homeland defense;
(c) civil support;
(d) synchronization and integration of State and Federal military activities in the United States; and
(e) other matters of mutual interest pertaining toNational Guard, homeland defense, and civil support activities.
U.S. Army
U.S. Army Public Affairs Handbook
Below are some suggestions on why to release information as early as possible:
1. The American public, Congress and the media are entitled to “timely and accurate” information about the military, per the DoD Principles of Information (See Appendix).
2. Early release of information sets the pace and tone for resolution of a problem.
3. If you wait, the story will often leak anyway. If it does, you jeopardize trust and credibility.
FEMA
FEMA Draft Comprehensive Preparedness Guide (CPG) 101: Producing Emergency Plans
This Comprehensive Preparedness Guide, CPG 101, continues the more -than – 50 -year effort to provide guidance about emergency operations planning to State, Local, Territorial, and Tribal Governments. Some predecessor material can be traced back to the 1960s-era Federal Civil Defense Guide. Long-time emergency management practitioners will also recognize the influence of Civil Preparedness Guide 1-8, Guide for the Development of State and Local Emergency Operations Plans, and State and Local Guide (SLG) 101, Guide for All-Hazards Emergency Operations Planning, in this document.
Pacific Northwest National Laboratory
PNNL: Concealed explosive detection using a wideband holographic millimeter-wave imaging system
A novel wideband millimeter-wave imaging system is presently being developed at Pacific Northwest National Laboratory (PNNL) that will allow rapid inspection of personnel for concealed explosives, handguns, or other threats. Millimeterwavelength electromagnetic waves are effective for this application since they readily penetrate common clothing materials, while being partially reflected from the person under surveillance as well as any concealed items. To form an image rapidly, a linear array of 128 antennas is used to electronically scan over a horizontal aperture of 0.75 meters, while the linear array is mechanically swept over a vertical aperture of 2 meters. At each point over this 2-D aperture, coherent wideband data reflected from the target is gathered using wide-beamwidth antennas. The data is recorded coherently, and reconstructed (focused) using an efficient image reconstruction algorithm developed at PNNL.
Germany
U.S. Nuclear Weapons in Europe
Three main reason used for retaining U.S. nuclear weapons in Europe:
* Russia could turn bad and still has a lot of nonstrategic nuclear weapons
* Symbol of continued U.S. commitment to NATO: provides trans-Atlantic glue
* Other countries on NATO’s southern periphery are developing weapons of mass destruction
Department of Homeland Security
DHS Office for Bombing Prevention Overview
Office for Bombing Prevention (OBP) Overview OBP is dedicated to enhancing and coordinating the nation‟s ability to deter, prevent, detect, protect against, and respond to attacks that use IEDs against critical infrastructure, key resources, and soft targets.
U.S. Army
Army PR Chain Teaching Program Talking Points
Individuals not specifically addressed within this definition may be included in our PR responsibilities at the direction of the Secretary of Defense (SECDEF). This expands Army PR responsibilities considerably as multinational partners, American civilians, and citizens from other nations in our operational areas now become potential recovery obligations for the Army.
Bilderberg Participant Lists
1965 Bilderberg Meeting Participant List
BILDERBERG MEETINGS
Villa D’Este Conference, Italy
2-4 April 1965
Israel Defense Forces
Introduction To The Israeli Air Force
Introduction To the Israeli Air Force by the Israeli Air Force August 14, 2007
United States
Model Procedures for Responding to a Package with Suspicion of a Biological Threat
Local and world events have placed the nation’s emergency service at the forefront of homeland defense. The service must be aware that terrorists, both foreign and domestic, are continually testing the homeland defense system. In October 2001, a person or persons contaminated the U.S. mail stream with anthrax, resulting in illness and death. The potential threat of similar attacks continues, and the authorities continue to be called in to assess hoaxes and suspect materials. No community is immune from the threat. To protect the health and safety of the public, and to help deal with hoaxes and suspicious materials, clear procedures for assessing and managing biological threats are imperative.
United States
National Retail Federation Emergency Response Protocols to Active Shooters
According to the U.S. Department of Homeland Security, an Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.
Israel Defense Forces
IDF Operation Cast Lead Strategic Overview
IDF Operation Cast Lead – A Strategic Overview
Bilderberg Participant Lists
1963 Bilderberg Meeting Participant List
BILDERBERG MEETINGS
Cannes Conference
29-31 March 1963
Bilderberg Participant Lists
1958 Bilderberg Meeting Participant List
BILDERBERG MEETINGS
Buxton Conference, England
13-15 September 1958
Bilderberg Participant Lists
1957 Bilderberg Meeting Participant List
BILDERBERG MEETINGS
St. Simons Island Conference, USA
15-17 February 1957
Bilderberg Participant Lists
1954 Bilderberg Meeting Participant List
BILDERBERG MEETINGS
HOTEL DE BILDERBERG
OSTERBEEK, NETHERLANDS
29-31 May 1954
Joint Chiefs of Staff
Joint Publication 3-07.2 Antiterrorism
This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans.
Department of Homeland Security, FEMA
Target Capabilities List User Guide
The Target Capabilities List (TCL) Implementation Project is the method by which the Federal Emergency Management Agency (FEMA) will update the TCL and implement the doctrine of capabilities-based preparedness as outlined in the National Preparedness Guidelines. The goal of the project is to provide more user-friendly, accessible, and credible capability targets with which to link all preparedness cycle activities to strengthen preparedness across prevention, protection, response, and hazard mitigation capabilities. The purpose of this document is twofold. First, it explains the history of the TCL and why FEMA is leading the effort to streamline and revise the content found in TCL Version 2.0 through the establishment of updated Target Capabilities.
Department of Homeland Security
Identifying Fraudulent Social Security Documents: A Tool For Law Enforcement Officers
Social Security Facts:
· The Social Security act was signed by FDR on August 14, 1935.
· Ernest Ackerman was the first recipient of Social Security benefits. He received a
one –time lump sum payout of 17 cents.
· FICA stands for the Federal Insurance Contributions Act.
· Social Security numbers were first issued in 1936. To date, over 415 million
different numbers have been issued.
· When someone dies his or her Social Security number is NOT reused. The ninedigit
Social Security number allows for approximately 1 billion possible
combinations. At this point there is no need to recycle numbers.
Intelligence Fusion Centers, Maryland
Maryland Coordination and Analysis Center: Stages of an Active Shooter
(U//FOUO) Due to the recent events in Virginia and threats to schools across the country, the following information is provided as background information for patrol officers. An active shooter is usually not a spur of the moment action. The person progresses through a number of identifiable stages. These stages may occur in rapid succession or over a period of months or even years. During the first four stages, law enforcement may have an opportunity to intervene before the shooter is able to execute the plan.
California, Federal Bureau of Investigation
FBI United Society of Aryan Skinheads Activity in San Diego
(U) United Society of Aryan Skinheads Activity in San Diego
(U) The United Society of Aryan Skinheads (USAS) is seeking to increase their visibility in San Diego in an effort to become the premier Skinhead organization in California. The San Diego Field Intelligence Group is seeking the assistance of local law enforcement partners to identify the location USAS members and groups in the San Diego area.
Bureau of Alcohol Tobacco Firearms and Explosives
ATF Assessment: Use of Natural Gas as a Terrorist Weapon in Apartment Buildings
At a June 2004 press conference, then Deputy Attorney General James Comey outlined the case against Jose Padilla, the so-called “dirty bomber” suspect, and his connections to al-Qaeda.1 Jose Padilla gained notoriety for the alleged plan to use a radiological dispersal device (RDD). However Padilla’s plot to utilize natural gas to blow up apartment buildings in the United States did not seem to draw as much attention as the plan to utilize a RDD. There has been very little discussion pertaining to his plot to cause a catastrophic fire/explosion event at apartment buildings using natural gas.
Department of Defense
How a Boy Becomes a Martyr: The Dangers of Web 2.0 Technology
The following report is a fictitious account of how a young person in America could become a suicide bomber for an Islamic extremist group. It is the fifth in a series of reports on Web 2.0 technology and future urban warfare. All references to people, groups, and products are intended for illustrative purposes only. As such, the authors do not suggest that any of the products or organizations listed condone or support extremist activities.