Documents

Second Amended Complaint in SEC v. Stanford International Bank, Ltd., et al.

For at least a decade, R. Allen Stanford and James M. Davis executed a massive Ponzi scheme through entities under their control, including Stanford International Bank, Ltd. (“SIB”) and its affiliated Houston-based broker-dealers and investment advisers, Stanford Group Company (“SGC”) and Stanford Capital Management (“SCM”). Stanford and Davis, acting in concert with the other defendants, misappropriated billions of dollars of investor funds and falsified SIB’s financial statements in an effort to conceal their fraudulent conduct.

Preliminary Analysis of the Insurance Coverage Specifications Provided by the House Tri-Committee Group

The Congressional Budget Office (CBO) and the staff of the Joint Committee on Taxation (JCT) have completed a preliminary analysis of the major provisions related to health insurance coverage that are contained in title I of draft legislation called the Affordable Health Choices Act, which was released by the Senate Committee on Health, Education, Labor, and Pensions (HELP) on June 9, 2009. Among other things, that draft legislation would establish insurance exchanges (called “gateways”) through which individuals and families could purchase coverage and would provide federal subsidies to substantially reduce the cost of that coverage for some enrollees.

Air Force Advanced Technical Exploitation Contract

Rapid and generally automated exploitation and reporting with adequate human intervention to produce actionable intelligence. This activity ranges from data processing to initial data interpretation to data posting for rapid dissemination/access across the community. It supports current intelligence issues and threats, warning/combat/crisis operations, and cueing other intelligence collectors.

FMI 2-22.9: Open Source Intelligence

OSINT operations are integral to Army intelligence operations. Directly or indirectly, publicly available information forms the basis of all intelligence operations and intelligence products. The availability, depth, and range of publicly available information enable intelligence organizations to satisfy many intelligence requirements without the use of specialized human or technical means of collection.

MI6 Headquarters, Vauxhall Cross

The headquarters of the British Secret Intelligence Service, also known as Military Intelligence, Section 6, is located at 85, Albert Embankment in the south western part of central London, on the bank of the River Thames beside Vauxhall Bridge. Designed by Terry Farrell and built by John Laing, the Developer Regalian Properties PLC approached the government in 1987 to assess their interest in the proposed building. At the same time, MI6’s sister service MI5 was seeking alternative accommodation and collocation of the two organisations was considered.

Region XIII+ (MT) MPC Planning Conference

Vigilant Guard is a Homeland Security/Homeland Defense FEMA Regional exercise program sponsored by NORADNORTHCOM
and the National Guard Bureau J7 Office. The program provides an opportunity for State National Guard Joint Force Headquarters
to improve command and control and operational relationships with internal, regional civilian and military partners.

Montana Vigilant Guard Cabinet Brief

Vigilant Guard is a Homeland Security/Homeland Defense FEMA Regional exercise program series hosted by the National Guard Bureau. The program provides an opportunity for the State to improve emergency coordination, response and recovery management with federal, regional, local civilian and military partners.

Montana Vigilant Guard 2009 Brief

• Vigilant Guard (VG) dates are 15-16-17 Sep 09
• Units and Soldiers/Airmen will arrive via convoy.
• Units and Soldiers/Airmen will be required to in-process as part of JRSOI operations.
• JRSOI operations will be conducted at Fort Harrison, Helena, MT.
• Units entering the state are not logistically self-sufficient and must be supported by the JFHQ-MT.
• Approximately 675 Soldiers/Airmen participating in VG, approximately 20+ Units and 430 PAX from outside Helena, MT.

US Code Title 42, § 264, Part G: Quarantine and Inspection

The Surgeon General, with the approval of the Secretary, is authorized to make and enforce such regulations as in his judgment are necessary to prevent the introduction, transmission, or spread of communicable diseases from foreign countries into the States or possessions, or from one State or possession into any other State or possession. For purposes of carrying out and enforcing such regulations, the Surgeon General may provide for such inspection, fumigation, disinfection, sanitation, pest extermination, destruction of animals or articles found to be so infected or contaminated as to be sources of dangerous infection to human beings, and other measures, as in his judgment may be necessary.

Executive Order 13375

By the authority vested in me as President by the Constitution and the laws of the United States of America, including section 361(b) of the Public Health Service Act (42 U.S.C. 264(b)), it is hereby ordered as follows Based upon the recommendation of the Secretary of Health and Human Services, in consultation with the Surgeon General, and for the purpose set forth in section 1 of Executive Order 13295 of April 4, 2003, section 1 of such order is amended by adding at the end thereof the following new subsection: (c) Influenza caused by novel or reemergent influenza viruses that are causing, or have the potential to cause, a pandemic.

Unclassified Inspectors General Report on the President’s Surveillance Program

Title III of the Foreign Intelligence Surveillance Act Amendments Act of 2008 required the Inspectors General (IGs) of the elements of the Intelligence Community that participated in the President’s Surveillance Program (PSP) to conduct a comprehensive review of the program. The IGs of the Department of Justice, the Department of Defense, the Central Intelligence Agency, the National Security Agency, and the Office of the Director of National Intelligence participated in the review required under the Act. The Act required the IGs to submit a comprehensive report on the review to the Senate Select Committee on Intelligence, the Senate Committee on the Judiciary, the House Permanent Select Committee on Intelligence, and the House Committee on the Judiciary.

United States Computer Emergency Readiness Team Operations

The National Cyber Security Division (NCSD) United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security (DHS) and the public and private sectors. Established in 2003 to protect the nation’s internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation. The organization interacts with federal agencies, state and local governments, industry professionals, and others to improve information sharing and incident response coordination and to reduce cyber threats and vulnerabilities.

DHS Senior Leadership Brief 2009 H1N1 Flu

As of Monday, 04 May 09, 698 schools in 33 States were closed due to confirmed and probable cases of H1N1 Flu. The closures impacted over 358,220 students and 20,684 teachers. Centers for Disease Control and Prevention (CDC): Reports 403 confirmed cases of H1N1 Flu in 38 States; 702 probable cases of H1N1 Flu in 41 States and the District of Columbia. Number of deaths remains at 1 (Texas). A state-by-state breakdown is listed in Table 1.

USNORTHCOM Antiterrorism (AT) Operations Order (U) 05-01

USNORTHCOM has been assigned the Force Protection (FP) mission and AT Program responsibility for the USNORTHCOM AOR. The purpose of the FP mission is to defend, detect, and mitigate against terrorist attacks directed at DoD personnel, infrastructure, resources, and information to ensure DoD’s continued warfighting capability. The scope of this mission extends to all DoD Elements and personnel in the USNORTHCOM AOR, whether assigned or unassigned to USNORTHCOM. While the FP mission supports USNORTHCOM’s primary missions of Homeland Defense (HLD) and Civil Support (CS), it is a separate task assigned in the Unified Command Plan (UCP) (ref. a.) and is executed through a different chain of command from the specified USNORTHCOM missions of HLD and CS. The successful execution of the USNORTHCOM FP mission enables the USNORTHCOM HLD and CS missions, and assures availability of DoD assets in support of other Combatant Command-assigned missions.

Preliminary Results Show Federal Protective Service’s Ability to Protect Federal Facilities Is Hampered By Weaknesses in Its Contract Security Guard Program

FPS does not fully ensure that its contract security guards have the training and certifications required to be deployed to a federal facility. FPS requires that all prospective guards complete about 128 hours of training including 8 hours of x-ray and magnetometer training. However, in one region, FPS has not provided the x-ray or magnetometer training to its 1,500 guards since 2004. Nonetheless, these guards are assigned to posts at federal facilities. X-ray training is critical because guards control access points at facilities. Insufficient x-ray and magnetometer training may have contributed to several incidents where guards were negligent in carrying out their responsibilities. For example, at a level IV facility, an infant in a carrier was sent through an xray machine due to a guard’s negligence. Moreover, GAO found that FPS does not have a fully reliable system for monitoring and verifying guard training and certification requirements. GAO reviewed 663 randomly selected guard records and found that 62 percent of the guards had at least one expired certification including a declaration that guards have not been convicted of domestic violence, which make them ineligible to carry firearms.

Maiden Lane LLC Consolidated Financial Statements 2008

We have audited the accompanying consolidated statement of financial condition of Maiden Lane LLC (a Special Purpose Vehicle consolidated by the Federal Reserve Bank of New York) and subsidiaries (the “LLC”) as of December 31, 2008, and the related consolidated statements of income and cash flows for the period from March 14, 2008 to December 31, 2008. These financial statements are the responsibility of the LLC’s management. Our responsibility is to express an opinion on these financial statements based on our audit.

People’s Republic of China Media Guide

Sweeping social and economic changes triggered by more than two decades of reform in China have led to equally sweeping changes in China’s vast, state-controlled media environment, particularly in the quantity and diversity of media sources and the development of the Internet. The Communist Party of China (CPC) not only tolerates much greater diversity in the media, but has strongly encouraged greater efforts to provide media content that resonates with the lives and interests of the population. Despite these changes, however, all pertinent information continues to be filtered through party censors to ensure that it is consistent with official policy. The party exercises especially tight control over the core mainstream media which deliver domestic and international news along with politically sensitive information. These media constitute the main vehicle for conveying the policy preferences and decisions of the central leadership.

Second Interim Strategy Note For the Republic of Iraq for the Period FY06-07

Iraq has had two political transitions over the past year, taking steps toward a constitutionally-elected government. Nevertheless, the country faces a violent insurgency that is impeding reconstruction and economic recovery. Immediate challenges are to restore rule of law, establish political legitimacy, and begin to build credible and inclusive institutions. The ability of the Iraqi Transitional Government to include ethnic and religious groups in the political process over the coming months will be important in determining whether a future constitutionally-elected government will improve security and stability, which are preconditions for successful reconstruction.

Troubled Asset Relief Program: Status of Efforts to Address Transparency and Accountability Issues

As of March 27, 2009, Treasury had disbursed $303.4 billion of the $700 billion in TARP funds. Most of the funds (about $199 billion) went to purchase preferred shares of 532 financial institutions under the Capital Purchase Program (CPP)—Treasury’s primary vehicle under TARP for stabilizing financial markets. Treasury has continued to take significant steps to address all of the recommendations from our December 2008 and January 2009 reports. In particular, Treasury has recently expanded the scope of the monthly CPP surveys of the largest institutions to include all institutions participating in the program, which is intended to provide Treasury with information necessary to begin to track the effectiveness of the program. Treasury also continued to make progress in several other areas, including requiring firms participating in certain new programs to show how assistance will expand lending. These requirements will better enable Treasury to determine what institutions plan to do with any capital infusions and to track the resulting lending activity of participating institutions on a regular basis. In addition, we specifically found that though Treasury is now receiving dividends from the investments it has made in CPP and certain other programs, it has not publicly reported these receipts, which totaled almost $2.9 billion through March 20, 2009. We recommended that Treasury could improve transparency pertaining to TARP program activities by reporting publicly the monies, such as dividends, paid to Treasury by TARP participants.