The FBI has no information at this time to indicate specific cyber threats to US networks or infrastructure in response to ongoing US military air strikes against the terrorist group known as the Islamic State of Iraq and the Levant (ISIL), also known as the Islamic State of Iraq and al-Shams (ISIS) or the Islamic State (IS). However, the FBI assesses extremist hackers and hacktivist groups, including but not limited to those aligned with the ISIL ideology, will continue to threaten and may attempt offensive cyber actions against the United States in response to perceived or actual US military operations in Iraq or Syria. The FBI bases this assessment on recent, nonspecific, and probably aspirational threats made on social media platforms to carry out cyber as well as physical attacks in response to the US military presence in the Middle East.
Documents
Canada, European Union
Comprehensive Economic and Trade Agreement (CETA) Consolidated Text
The text of the CETA agreement is made public here exclusively for information purposes. The text presented in this document is the text at the end of the negotiations conducted by the European Commission. It will be subject to legal revision in order to verify the internal consistency and to ensure that the formulations of the negotiating results are legally sound. It will thereafter be transmitted to the Council of the European Union and to the European Parliament for ratification. The text presented in this document is not binding under international law and will only become so after the completion of the ratification process.
Federal Reserve Bank of New York
Federal Reserve Bank of New York Report on Systemic Risk and Bank Supervision
The 2007-2009 financial crisis was a systemic collapse – a sudden collapse of asset prices and the failure or near-failure/rescue of almost all large financial institutions. The United States has not witnessed a systemic collapse since the 1930s, and many thought it was impossible for the United States to have such an event, given the apparent advances in risk management that preceded it. However, the collapse occurred and was very large, damaging to the real economy and extremely expensive to resolve. A desire not to let such an event happen again pervades the body politic, indeed is demanded by many. But preventing such an event is neither easy nor costless. Financial crises typically follow large economic booms. While such booms may be characterized as bubbles in retrospect, they are extremely popular while they are occurring. The Federal Reserve has long seen its mission against inflation “to take away the punch bowl just when the party is getting good”; if it now becomes the systemic risk regulator it must be prepared to do the same against rising systemic risk, using tools beyond monetary policy. This is likely to be unpopular unless the ground is extremely well prepared and broadly understood. We return to this threshold problem in more detail below.
Iran, United Nations
Iranian President Hassan Rouhani Speech to UN General Assembly Transcript September 25, 2014
Extremism is not a regional issue that just the nations of our region would have to grapple with; extremism is a global issue. Certain states have helped creating it and are now failing to withstand it. Currently our peoples are paying the price. Today’s anti-Westernism is the offspring of yesterday’s colonialism. Today’s anti-Westernism is a reaction to yesterday’s racism. Certain intelligence agencies have put blades in the hand of madmen, who now spare no one. All those who have played a role in founding and supporting these terror groups must acknowledge their errors that have led to extremism. They need to apologize not only to the past but also to the next generation.
U.S. Marine Corps, Uganda
(U//FOUO) Marine Corps Intelligence Activity Uganda Cultural Field Guide
The Uganda Cultural Field Guide is designed to provide deploying military personnel an overview of Uganda’s cultural terrain. In this field guide, Uganda’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
U.S. Marine Corps, Uganda
Marine Corps Intelligence Activity Uganda Country Handbook
This handbook provides basic reference information on Uganda, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Uganda.
Ethiopia, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Ethiopia Cultural Field Guide
The Ethiopia Cultural Field Guide is designed to provide deploying military personnel an overview of Ethiopia’s cultural terrain. In this field guide, Ethiopia’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Ethiopia, U.S. Marine Corps
Marine Corps Intelligence Activity Ethiopia Country Handbook
This handbook provides basic reference information on Ethiopia, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Ethiopia.
Bahrain, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Bahrain Cultural Field Guide
The Bahrain Cultural Field Guide is designed to provide deploying military personnel an overview of Bahrain’s cultural terrain. In this field guide, Bahrain’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Bahrain, U.S. Marine Corps
Marine Corps Intelligence Activity Bahrain Country Handbook
This handbook provides basic reference information on Bahrain, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Bahrain.
Oman, U.S. Marine Corps
Marine Corps Intelligence Activity Oman Country Handbook
This handbook provides basic reference information on Oman, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Oman.
Qatar, U.S. Marine Corps
(U//FOUO) Marine Corps Intelligence Activity Qatar Cultural Field Guide
The Qatar Cultural Field Guide is designed to provide deploying military personnel an overview of Qatar’s cultural terrain. In this field guide, Qatar’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Qatar, U.S. Marine Corps
Marine Corps Intelligence Activity Qatar Country Handbook
This handbook provides basic reference information on Qatar, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Qatar.
Intelligence Fusion Centers, New Jersey
(U//FOUO) New Jersey Fusion Center Special Events List September 2014
The NJ Office of Homeland Security and Preparedness (OHSP) compiles a statewide list of special events that provides situational awareness to law enforcement, as well as to assist in local planning requirements. Special events include any event that attracts large numbers of participants and spectators in both a public or private venue. Examples include concerts, marathons, firework displays, community celebrations, visits by VIPs, sporting events, holiday gatherings, etc.
General Services Administration
General Services Administration Palantir Technologies Pricelist
General Services Administration
General Services Administration 1122 Program Equipment and Supplies Catalog
Section 1122 of the fiscal year 1994 National Defense Authorization Act established the authority for State and local governments to purchase law enforcement equipment through Federal procurement channels, provided that the equipment is used in the performance of counter-drug activities. The “1122 Program” affords State and local governments the opportunity to maximize their use of taxpayer dollars, by taking advantage of the purchasing power of the Federal Government to receive discounts commensurate with large volume purchases.
National Guard
(U//FOUO) National Guard Roles, Status and Authorities Presentation August 2014
Afghanistan, Joint Chiefs of Staff
(U//FOUO) Joint Center for International Security Force Assistance Afghan National Police Mentor Guide
In order to develop the ANP, the Combined Security Transition Command-Afghanistan (CSTC-A) uses Police Mentor Teams to help develop them. A shortage of PMTs across the country, however, has led to the formation of in-lieu of advisor teams comprised of Soldiers from land owning units or attached Military Police units. The purpose of this document is to help provide those additional advisory teams with information they need to develop the skills required to effectively augment the CSTC-A program. This handbook will provide an overview of the entire police program including current goals, relationships to other organizations, the Focused District Development Program, key challenges that may be encountered and the duties of key members of the police advising teams including how to work with the team’s enablers.
Afghanistan, Joint Chiefs of Staff
(U//FOUO) Joint Center for International Security Force Assistance Afghan National Army Mentor Guide
This guide is a JCISFA publication on mentoring the Afghan National Army and is applicable to advisors, mentors and partner forces executing Security Force Assistance (SFA) operations. The guide is a companion to the May 2009 JCISFA Afghan National Police Mentor Guide and addresses identified gaps in mentoring Afghan National Security Forces. The guide offers cultural background information, partner security force challenges, advisor/mentor best practices, and challenges. As the United States assists other nations, our forces must adopt a “by, with, and through” strategy to enable a supported nation and its security forces to generate and sustain capabilities institutionally and operationally. We can achieve this by advising and mentoring them, partnering with the supported nation and through development of the supported nation and its security forces so that they can do it themselves.
U.S. Army
Megacities and the U.S. Army: Preparing for a Complex and Uncertain Future
Cities with populations of ten million or more are given a special designation: megacity. There are currently over twenty megacities in the world, and by 2025 there will be close to forty. The trends are clear. Megacities are growing, they are be-coming more connected, and the ability of host nation governments to effectively deal with their explosive growth and maintain security is, in many cases, diminishing. Megacities are a unique environment that the U.S. Army does not fully understand.
California
San Francisco Bay Area Urban Shield 2014 Overview Presentation
Urban Shield is a continuous, 48-hour Full Scale Multi-Disciplinary Homeland Security/Disaster Preparedness Exercise hosted by the Alameda County Sheriff’s Office, with the support of the Bay Area Urban Area Security Initiative (UASI), and more than 200 local, state, federal, international and private sector partners.
Federal Bureau of Investigation
FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information
The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.
California, Intelligence Fusion Centers
(U//LES) Northern California Fusion Center Bulletin: Recreational Drones Create Problems for Law Enforcement
The expansion of Unmanned Aerial Vehicle (UAV) operations for military purposes in the last decade has driven growth in the commercial UAV industry where. the casual enthusiast can now purchase a ready-to-fly system for less than $300. These UAVs can be accessorized for varied purposes such as cinematography, agricultural monitoring, wildlife tracking, site surveillance, and potentially even for kinetic attacks with a firearm or improvised explosive. This Advisory Bulletin addresses an observed increase in UAV use by ordinary citizens, outlining capabilities and implications for the law enforcement community. The NCRIC has not received any specific or credible UAV threats in our 15-county AOR and presents the following information for situational awareness purposes.
Department of Justice
Department of Justice Review of FBI Use of National Security Letters 2007-2009
This review is a follow-up to three previous OIG reports concerning the FBI’s use of national security letter authorities. In our first and second NSL reports, issued in March 2007 and March 2008, the OIG found repeated instances of the FBI’s misuse of NSL authorities during 2003 through 2006. During our first NSL review we also discovered the FBI’s practice of issuing exigent letters and using other informal methods to obtain telephone records, instead of using NSLs or other legal process. We addressed these practices in a separate report issued in January 2010.
Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
(U//FOUO) DHS-FBI-NCTC Bulletin: Malicious Cyber Actors Use Advanced Search Techniques
Malicious cyber actors are using advanced search techniques, referred to as “Google dorking,” to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks. “Google dorking” has become the acknowledged term for this malicious activity, but it applies to any search engine with advanced search capabilities. By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities. For example, a simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.