Documents

(U//FOUO) DHS Snapshot: Yemen Explosive Packages on Cargo Aircraft

(U) As of 29 October, packages on cargo aircraft containing explosive materials were intercepted in the United Kingdom (UK) and Dubai, United Arab Emirates (UAE). The packages were shipped from Yemen, with the United States listed as the final destination. On the evening of 28 October,security officials at East Midlands Airport in Lockington, UK identified a suspicious package containing a modified printer-toner cartridge that was later confirmed to contain explosives.

CJCS Military Family “Self-Help Guide” to Antiterrorism

This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.

(U//FOUO) Michigan Fusion Center: Soldier Uses Military Disguise to Enter Sporting Event

An athletic facility reported an illegal entry incident during a sporting event on 9, October 2010. The subject arrived at the facility in a military Humvee, wearing a full military formal dress uniform, just prior to the start of the event. The subject advised event security personnel that he was there as part of the game day military Honor Guard, and requested to park the Humvee in the secured parking area reserved for police vehicles. The individual was allowed access at several points and subsequently parked the Humvee in the secured lot. The individual exited the vehicle and retrieved two military M-16 rifles with bayonets from the Humvee.

(U//FOUO//LIMDIS) FEMA National Capital Region Catastrophic Incident CONPLAN Draft

In the event of a catastrophic incident or threat to the National Capital Region (NCR), the significant federal presence would both necessitate and complicate a robust response. In order to facilitate the coordination that would be required for the integration of federal, state, and local response efforts, the Office of Personnel Management (OPM) and the FEMA Office of National Capital Region Coordination (NCRC) have compiled this draft NCR Federal Concept Plan (CONPLAN) of Catastrophic Planning Assumptions. For planning purposes, a catastrophic incident is defined in the National Response Framework as any natural or manmade incident, including terrorism, which results in an extraordinary level of mass casualties, damage, or disruption severely affecting the population, infrastructure, environment, economy, national morale, and/or government functions.

(U//FOUO) USMC Company Intelligence Cell in Stability and Support Operations TTPs

In the asymmetrical threat climate of the 21st century, stability and support operations (SASO) are often conducted from a companylevel firm base (FB). These company and platoon size units need immediate, on-scene intelligence support to deal with an enemy that can recruit, rest, and resupply amongst the population in a predominately urban environment. This requires an intense collection and analysis effort by even the smallest unit. And, because of the noncontiguous nature of SASO, it is unrealistic to expect that higher echelon staffs will consistently be available to support them. Therefore, Marines in small units must establish and maintain a limited, but effective, capability for themselves.

SIGTARP October 2010 Quarterly Report to Congress

More than two years have passed since the Emergency Economic Stabilization Act of 2008 (“EESA”) authorized the creation of the Troubled Asset Relief Program (“TARP”). On October 3, 2010, Treasury’s authority to initiate new TARP investments expired, marking a significant milestone in TARP’s history but also leading to the widespread, but mistaken, belief that TARP is at or near its end. As of October 3, $178.4 billion in TARP funds were still outstanding, and although no new TARP obligations can be made, money already obligated to existing programs may still be expended. Indeed, with more than $80 billion still obligated and available for spending, it is likely that far more TARP funds will be expended after October 3, 2010, than in the year since last October when U.S. Treasury Secretary Timothy Geithner (“Treasury Secretary”) extended TARP’s authority by one year. In short, it is still far too early to write TARP’s obituary.

(U//FOUO) DHS-FBI Small Arms, Lone Shooters and Small-Unit Tactics Warning

(U//FOUO) DHS and the FBI assess that, given the current evolving and diversifying Homeland threat environment, recent incidents involving small arms operations here in the United States and abroad demonstrate the need for continued vigilance and awareness. Small arms operations could be employed through a range of tactics from a lone shooter—as illustrated by the 1 September incident in Silver Spring, Maryland at the headquarters of a U.S. cable network—to a small-unit assault operation.

DHS-DoD Memorandum of Agreement on Cybersecurity October 2010

The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.

TransUnion Illegal Sale of Personal Credit Information 2000 FTC Documentation

The Federal Trade Commission has ordered the Trans Union Corporation to stop selling consumer reports in the form of target marketing lists to marketers who lack an authorized purpose for receiving them under the Fair Credit Reporting Act (“FCRA”). In a unanimous opinion authored by Commissioner Mozelle W. Thompson, the FTC determined that “Trans Union’s target marketing lists are . . . consumer reports under the FCRA” and concluded that Trans Union is violating the FCRA by selling this information to target marketers who lack one of the “permissible purposes” enumerated under the Act. The Commission’s decision applies to a number of Trans Union’s target marketing list products including its Master File / Selects products, its modeled products and its TransLink / reverse append products. Trans Union is based in Chicago, Illinois, and is one of the three national credit bureaus, or consumer reporting agencies, in the United States. It currently handles data on approximately 160 million consumers. As a consumer reporting agency, Trans Union receives detailed credit information about millions of American consumers from numerous credit grantors including banks, mortgage companies, credit unions, auto dealers and others. Trans Union compiles this information into consumer reports and sells the reports to credit grantors nationwide.

TransUnion Corporation Sale of Consumer Credit Information Privacy Litigation Decision 2002

Defendant Trans Union is one of three major consumer reporting agencies in the United States. Its core business is assembling and evaluating consumer credit information, including credit and payment patterns on consumers for the purpose of selling consumer reports to third parties. Typical buyers of such information are firms considering extending credit to a particular consumer. The information provided by Trans Union is used to determine if the consumer is a good credit risk. Trans Union maintains a computer data base called “CRONUS,” that contains consumer credit information it uses to generate credit reports. The data base includes the credit activity of every credit-active individual in the United States. Trans Union receives the information from credit grantors such as banks, mortgage companies, credit unions, auto dealers and collection agencies. Trans Union also receives information on student loans and child support.

TransUnion Threatens Public Intelligence Over Credit Reporting Guides

A Vice-President of TransUnion has demanded that we remove two documents from this site that he says are copyrighted. Gary S. Friedlander, Vice President & Division General Counsel for TransUnion LLC, says that our posting of the documents constitutes “intentional infringement” and he threatens that “Trans Union can file a lawsuit against you seeking among other things: preliminary and permanent injunctive relief, money damages, and attorneys’ fees”. Mr. Friedlander also demands that we “immediately destroy any and all copies of Trans Union copyrighted material in your possession and/or control”.