FBI Phoenix Division Cyber Crime Report “Botnet Owners Share Honeypot Internet Protocol Addresses in Attempt to Avoid Law Enforcement and Security Vendor Scrutiny”.
Documents
Bureau of Alcohol Tobacco Firearms and Explosives
(U//FOUO/LES) LulzSec Release: ATF Project Gunrunner Southwest Border Strategy Weapons of Choice
Bureau of Alcohol, Tobacco, Firearms and Explosives Project Gunrunner Southwest Border Strategy Weapons of Choice from February 2008.
Arizona
(U//LES) LulzSec Release: Arizona “Purple Drank” Warning
In a seizure during an outbound parcel interdiction, Counter Narcotics Alliance (CNA) agents seized a box of wine at the FedEx Tucson hub. The Arizona Department of Public Safety lab analyzed a red fluid concealed in the wine bladder of Franzia boxed wine. The liquid was prescription cough syrup distributed at the street level as “purple drank”, slang for a recreational drug popular in the hip-hop community. The main ingredients are codeine, a narcotic, and promethazine, an antihistamine. Purple Drank is typically mixed with ingredients such as Sprite and pieces of Jolly Rancher candy. Numerous slang terms for purple drank include: “Sizzurp, Lean, Syrup, Drank, Barre, Purple Tonic, Southern Lean, Texas Tea, Memphis Mud, Mrs. Dranklesworth, Tsikuni, Lean, P-Flav, Slip, Purple Sprite, PG Tips, Purp, and Purple Jelly”. The generic prescription name is Phenergan. Reported side effects include: drowsiness, sedation, somnolence, blurred vision, dizziness; confusion, disorientation, lassitude, tinnitus, in coordination, fatigue, euphoria, nervousness, insomnia, tremors, convulsive seizures, excitation, catatonic-like states, hysteria, and hallucinations.
Department of Homeland Security
(U//FOUO) LulzSec Release: DHS Sinaloa Drug Cartel Reference Guide
The powerful confederation of Mexican DTOs known as the Sinaloa cartel controls the majority of Mexico’s marijuana and methamphetamine production and distribution, as well as cocaine trafficking from South and Central American producers into the United States across the U.S. southwest border. The Sinaloa cartel conducts business with powerful U.S. gangs that largely control local drug distribution. As one of the most powerful cartels operating in Mexico, it has expanded operations throughout western Mexico and attempted to take control of new plazas from weaker organizations.* Arrests of high-level members have not fractured the cartel or caused infighting—as was the case with several of its rivals—likely because of the cartel’s stable revenue sources, decentralized structure, family-based culture, and geographic breadth, which all contribute to its preeminence.
Department of Homeland Security
(U//FOUO) LulzSec Release: DHS Evaluating Threats 2008-2013
The 2008 Homeland Security Threat Assessment (HSTA) is a strategic assessment looking out five years. The HSTA represents the analytical judgments of the Department of Homeland Security (DHS) Intelligence Enterprise (IE) regarding the critical threats to the U.S. Homeland that the Department will need to address in the period 2008-2013.
Arizona, Intelligence Fusion Centers
(U//FOUO) LulzSec Release: Arizona Fusion Center Counter-Surveillance Tactic Used at Demonstration
The information contained in this bulletin identifies a tactic recently employed against an Arizona Department of Public Safety (AZ DPS) officer. The incident occurred at a scheduled demonstration by a known citizen action group to protest the traffic cameras on Arizona’s highways. This information is provided for situational awareness to assist law enforcement engaged in public event site security; and for those monitoring potential threats at public gatherings.
Intelligence Fusion Centers, Missouri
(U//FOUO) LulzSec Release: MIAC Anarchist Movement Report
There are many different ideologies that an anarchist may follow. Although there may be a number of differences, they all contain the same central belief. Anarchism is the idea that government (the state) is unnecessary and harmful. Anarchy is society without government. Anarchists are people who desire to live in a society without ru-lers as their ancestors once did. The main belief is that the community in which they live be dependant only upon itself. People who believe in government (such as liberals, conservatives, socialists and fascists) are known as “statists”. Anarchism opposes all forms of hierarchical control.
Department of Homeland Security
(U//FOUO/LES) LulzSec Release: DHS Mexico Sonora-Based Threats to U.S. Border Security
This Homeland Security Assessment examines threats to U.S. border security emanating from the Mexican state of Sonora, which borders Arizona and a small section of New Mexico. It discusses drug and alien smuggling, border violence, and Mexican federal, state, and local government capabilities to confront organized crime. This is the fifth of six planned assessments on current threats to homeland security arising in Mexican states along the U.S. border. It is intended primarily for working-level analysts and operators engaging in homeland security-related activities and concerned with pertinent developments in Sonora and nearby U.S. territory.
Arizona, Intelligence Fusion Centers
(U//FOUO/LES) LulzSec Release: Arizona Fusion Center Sovereign Citizens and Militia Information
The Sovereign Citizens and Militia Movements have been in existence for a number of years and remain active throughout the US today. The Sovereign Citizen Movement began in the 1970’s when groups/individuals adopted right-wing anarchist ideologies originating from the theories of the group called the Posse Comitatus. The Militia Movement began to form not long after the 1993 Waco, Texas incident.
Immigration and Customs Enforcement
(U//FOUO) U.S. Immigration and Customs Enforcement Information Sharing Overview
A presentation from U.S. Immigration and Customs Enforcement’s Enforcement Systems Branch on the status of information sharing presented at the 2011 AFCEA Homeland Security Conference on February 23, 2011.
Corporate, United Kingdom
Confidential Rightsholder Group UK Website Blocking Scheme Working Paper
This note has been produced by the Rightsholder Group as an initial response to a request from the Minister for Culture, Communications and the Creative Industries to see whether there is scope to move toward across-industry voluntary approach to inhibiting access to websites that are substantially focused upon infringement of copyright. Our proposal is for a voluntary approach that will have a significant impact on the problem of infringement undertaken using the internet while being legally and technically feasible, cost-effective and proportionate. Our proposal is advanced on the basis that sound internet policy should encompass notions of accountability to incentivise private sector participants to take commercially reasonable steps, where available, to prevent or limit those harms that flow from the products or services they offer. This is a complex issue and we have addressed it here by offering a general approach based on core principles, exemplified by a more detailed explanation of the legal basis for the approach and of how such a system could work.
U.S. Air Force
U.S. Air Force F-16A/B Flight Manual
Restricted U.S. Air Force F-16A/B Flight Manual from August 15, 2003.
United Nations
United Nations Civilian Police Handbook
United Nations Department of Peace-keeping Operations Civilian Police Handbook from October 1995.
U.S. Army
(U//FOUO) U.S. Army Commander’s Negotiation Preparation Guide
U.S. Army presentation titled “Negotiations: A Preparation Guide for Commanders” from 2003.
National Security Agency
(U//FOUO) NSA Social Networking Sites Security Guide
A social networking site (SNS) is a web-based service that allows communities of people to share common interests and/or experiences. Rather than using direct point-to-point communication to stay in touch (e.g., face-toface, phone, text/video messages), SNSs allow users to publish information that can be read later by other users (a one-to-many form of communication) and follow their friend’s postings and provide comments. SNSs provide innovative methods for interacting with friends through third-part applications, such as simple games (tic-tac-toe, paper-rock-scissors), interactive maps to show places visited across the world, and quiz/trivia games which allow for score comparison with others. Many SNSs also allow users to logon from mobile devices that have web browser access to the Internet, allowing them to check and update their accounts from virtually any location with a Wi-Fi or cellular signal.
National Security Agency
(U//FOUO) NSA BlackBerry and iPhone/iPad Security Guides
Two pamphlets produced by the NSA on “Using Your BlackBerry Securely” and “Security Tips for Personally Managed Apple iPhones and iPads” from March 2011.
U.S. Army
(U//FOUO) U.S. Army Battle Staff Operations in a Counterinsurgency Environment
IED and Sniper Defeat: The Battle Staff Operations Process in a COIN Environment briefing from April 13, 2007.
World Bank
World Bank Fraud, Corruption, and Collusion in the Roads Sector Report
Because an extensive, well maintained network of roads is essential for economic development, road construction and maintenance projects have been a mainstay of the World Bank’s lending portfolio since its founding. This long experience in the roads sector is reflected in favorable project evaluations. The Bank’s Independent Evaluation Group reports that roads and other transport projects consistently score higher on measures of outcomes, institutional development, and sustainability than non-transport projects and the Bank’s Quality Assurance Group has found that roads projects are well-supervised. At the same time, roads projects around the globe remain plagued by fraud, corruption, and collusion. A Transparency International poll ranked construction as the industry most prone to corruption and a survey of international firms revealed that companies in the construction industry were more likely than firms in any other sector to have lost a contract because of bribery. World Bank-financed projects are not immune. Roughly one-fourth of the 500 plus projects with a Bank-funded roads component approved over the past decade drew one or more allegations of fraud, corruption, or collusion; to date, the Bank’s Integrity Vice Presidency (INT) has confirmed allegations in 25 projects resulting in 29 cases of misconduct under Bank rules.
U.S. Coast Guard
(U//FOUO) U.S. Coast Guard Maritime Homeland Threat Summary June 2011
The Maritime Threat Summary is a monthly product the Maritime Homeland Threat Analysis Branch (MHTAB) of the US Coast Guard (USCG) Intelligence Coordination Center produces for USCG Homeport. It highlights suspicious maritime activities and security incidents associated with the US Maritime Transportation System (MTS).
White House
Obama Administration Report on Legal Justification for Military Actions in Libya
In his address to the nation on Libya on March 28, 2011, President Obama presented a comprehensive explanation for why he authorized military action as part of an international coalition to protect the people of Libya and to enforce U.N. Security Council Resolution (UNSCR) 1973. In the intervening weeks and months, coalition efforts have been effective in protecting the Libyan population. The regime has suffered numerous defeats, cities and towns across Libya have been liberated from brutal sieges, strong sanctions are in place, and the regime is encountering serious difficulties raising revenues through oil sales or other means. All these actions and outcomes are consistent with UNSCR 1973.
U.S. Army
(U//FOUO) US Army Company Intelligence Support Team (COIST) Handbook
The mission of COISTs is to describe the effects of the weather, enemy, terrain, and local population on friendly operations to reduce uncertainty and aid in decision making. This is a simple and clear mission with a powerful purpose. However, the operation of the company COIST is far from simple. Company leaders must review and interpret huge volumes of data on a daily basis to determine their relevance and relationships. A few examples of this data include weapons intelligence team reports, patrol debriefs, intelligence summaries (INTSUMs), link diagrams, and be-on-the-lookout (BOLO) lists. Although the commander will determine and direct the exact requirements for the COIST, specified and implied tasks usually include targeting; intelligence, surveillance, and reconnaissance (ISR); patrol briefings and debriefings; detainee operations; and site exploitation.
United States
Congressional Lawsuit Over Obama Administration’s Violation of War Powers Act in Libya
This is an action for injunctive and declaratory relief to protect the Plaintiffs and the country from a stated policy of Defendant Barack Obama, President of the United States, whereby a president may unilaterally go to war in Libya and other countries without the declaration of war from Congress required by Article I, Section 8, Clause 11 of the U.S. Constitution.
U.S. Army
(U//FOUO) U.S. Army Biometric Automated Toolset (BAT) Smart Card
U.S. Army Biometric Automated Toolset (BAT) Smart Card from February 2007.
National Security Agency
(U//FOUO) NSA “Site M” Expansion Planning Documents
National Security Agency “Site M” Expansion Development Plan and Anti-Terrorism Force Protection Assessment from May 31, 2011. The Site M Area Development Plan (ADP) for the National Security Agency/Central Security Service (NSA/CSS) coordinates the development of facilities on Site M at Fort George G. Meade (Ft. Meade), allowing for growth and expansion over time. Site M development is planned to consist of administrative buildings, operation buildings, High Performance Computing Centers (HPCC) and associated support facilities. The objective of the AT/FP component is to develop a plan for protection of the proposed Site M development. This plan is based on the mandatory DoD minimum antiterrorism standards as well the specific requirements of NSA/CSS Ft. Meade. The plan provides overall guidance for development of the site as well as specific design strategies for key AT/FP components. A layered approach to security has been applied to ensure probability of detection with low false and nuisance alarm rates.
Bilderberg Participant Lists
2011 Bilderberg Meeting Participant List
Official list of participants for the 2011 Bilderberg Meeting in St. Moritz, Switzerland. The 59th Bilderberg Meeting will be held in St. Moritz, Switzerland from 9 – 12 June 2011. The Conference will deal mainly with Challenges for Growth: Innovation and Budgetary Discipline, the Euro and Challenges for the European Union, the role of Emerging Economies, Social Networks: Connectivity and Security Issues, New Challenges in the Middle East, Conflict Areas, Demographic Challenges, China, Switzerland: Can it remain successful in the future?