The Multi-Jurisdiction Improvised Explosive Device (IED) Security Plan (MJIEDSP) Planning Guide assists multi-jurisdiction areas in developing a detailed IED security plan. The IED security plan outlines specific bombing prevention actions that reduce vulnerability and mitigate risk against the primary terrorist IED attack method within a multi-jurisdiction area.
Documents
Department of Homeland Security
(U//FOUO) DHS Report: Small Unit Tactics in Terrorist Attacks
The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.
Mexico, Texas
(U//FOUO) Texas-Mexico Border Security Carnage Update
(U//FOUO) Texas-Mexico Border Security Carnage Update, July 2010.
U.S. Marine Corps
USMC Reserve Security Office WikiLeaks Guidance
The information found on the website “WIKILEAKS” is classified information that was transmitted to that public domain site illegally. Per reference (a) and the enclosures, “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.” Despite the circumstances surrounding WIKILEAKS, we must continue to protect similar or identical information commensurate with the level of classification assigned per reference (b), until the information is assessed by the appropriate Original Classification Authority (DCA).
Department of Energy, Department of Homeland Security
(U//FOUO) DoE-DHS Energy Sector Critical Infrastructure Protection Plan
In its role as Energy SSA, DOE has worked closely with dozens of government and industry security partners to prepare this 2007 Energy SSP. Much of that work was conducted through the Sector Coordinating Councils (SCC) for electricity and for oil and natural gas, as well as through the Energy Government Coordinating Council (GCC). The electricity SCC represents more than 95 percent of the electric industry and the oil and natural gas SCC represents more than 98 percent of its industry. The GCC, co—chaired by DHS and DOE, represents all levels of government—Federal, State, local, and tribal-that are concerned with the Energy Sector.
National Security Agency
(U//FOUO) NSA Progress in Near-Real Time Attack Detection Brief
The overall objective of the this task was to architect and implement a capability that will enable automated parsing, normalization, extraction, aggregation, filtering and then detection of attack patterns based on log and log like data in near real time depending on local network settings. We call this the Audit Data Extraction Utility (ADEU).
Corporate
Confidential Trans Union Automated Inquiry Credit Report User Guide
The TU40 User Guide describes the fixed-format inquiry (FFI) and fixed-format response (FFR) that are used in TU Release 4.0 (TU40). The intended audience for this guide consists of the programmers who are moving from an earlier format or who maintain systems that currently use TU40 to conduct electronic transactions with the TransUnion consumer database.
Corporate
Trans Union Credit Report Training Guide
Trans Union Credit Report Training Guide, July 2000.
Customs and Border Protection
Customs and Border Protection Colombian US Army Imposter Briefing
Customs and Border Protection Colombian US Army Imposter Briefing, 2010.
Department of Justice
(U//FOUO//LES) NGIC Gangs Targeting Law Enforcement for Weapons Theft
(U//LES) Gang members and criminals nationwide are targeting law enforcement officials, military, government vehicles, and residences in search of weapons, equipment, police badges, body armor, and uniforms.a These incidents suggest that some gangs are becoming more brazen, tactical, and willing to engage law enforcement and rival gang members in potentially lethal encounters. The National Gang Intelligence Center assesses that these thefts could also allow gang members and criminals to impersonate law enforcement officers to gain better access to their targets.
FEMA
FEMA Director Battle Book
The purpose of this ―battle book is to provide the FEMA Director with background information and recommended checklist actions on scenarios that may require a significant response operation under the National Response Plan. This document is intended to serve as a ―one stop reference that includes information on the agency’s emergency teams and resources.
Department of Homeland Security
(U//FOUO) DHS Project 12 Report: Critical Infrastructure Public-Private Partnerships
The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”
International Monetary Fund, World Bank
IMF/World Bank “Future of Global Financial and Monetary System” Seminar
In the context of rapidly increasing inter-dependence across national economies and shifting economic weight of different regions, the crisis has been a wake-up call for putting in place a global financial and monetary system that reduces the frequency and severity of crisis, underpinned by greater multilateralism in policymaking. Global cooperation and coordination on a wide set of issues, ranging from crisis prevention to regulatory and prudential reform and to provision of financial support, is critical for responding to the challenges presented by financial fragilities, external imbalances, weak fiscal positions and rising debt levels, and volatile capital flows.
Department of Homeland Security
(U//FOUO//LES) DHS Law Enforcement Information Sharing (LEIS) Service
Simply stated, the LEIS Service is the “pipe” used to connect state and local law enforcement with DHS law enforcement.
Afghanistan, United States
Senate Report on Private Security Contractor Oversight in Afghanistan
In 2009, the Senate Armed Services Committee initiated an inquiry into private security contractors operating in Afghanistan. In the course of the inquiry, the Committee reviewed hundreds of thousands of pages of documents from the Departments of Defense and State, the U.S. Agency for International Development, and private security contractors. Committee staff conducted more than 30 interviews of military and contractor personnel and solicited written answers from several others. This report is a product of that inquiry.
Department of Homeland Security
DHS Retail Sector Suspicious Activity Reporting Video
DHS video designed to raise the level of awareness for retail and shopping center employees by highlighting the indicators of suspicious activity, this video provides information to help employees identify and report suspicious activities and threats in a timely manner.
U.S. Army
(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology
This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.
Corporate
Confidential Facebook Law Enforcement Subpoena Guides 2007-2010
Four versions of the confidential law enforcement guide to requesting information from Facebook.
Joint Chiefs of Staff
CJCS Defense Support of Civil Authorities (DSCA) Exord
THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.
Department of Defense
DoD Defense Support to Civil Authorities Handbook
The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.
U.S. Marine Corps
(U//FOUO) Insurgent Tactics in Southern Afghanistan 2005-2008
This short book provides an up-to-date introduction to the tactics employed by insurgents in southern Afghanistan during the years 2005-2008. It includes vignettes and maps on 19 different tactically significant engagements. The book covers three types of attacks: ambushes, attacks on fixed positions, and defensive engagements. The intended audience is Marines and soldiers going into theatre.
Documents
Adam Gadahn September 2010 “Pakistan Floods” Video
This video was released in late September 2010 by As-Sahab Media and features U.S.-born Adam Gadahn speaking about Pakistani flood relief. At approximately four minutes into the video, Gadahn references the leak of Afghan war documents by WikiLeaks.
California
California State Terrorism Threat Assessment System (STTAS) Concept of Operations
This Concept of Operations (CONOPS) provides California law enforcement and other agencies ensuring the security of our state, a primer on the State Terrorism Threat Assessment System (STTAS). This includes an overview of the California Joint Regional Information Exchange System (CAL JRIES), the state’s principal, real-time information sharing communication platform. Homeland security stakeholders will substantively influence the ongoing evolution of this CONOPS as enhancement cycles inevitably refine California’s response to terrorist and other homeland security threats.
Documents
Osama Bin Laden October 2010 “Pakistan Floods” Videos
Two videos released by As-Sahab in the beginning of October 2010 with an individual claiming to be Osama bin Laden discussing Pakistani aid relief and climate change.
Israel
Reut Institute Report on Gaza Flotilla and Israel’s “Political Firewall”
This case-study deals with a strategic political strike against the State of Israel that was planned without interruption since February 2009 and materialized on May 31, 2010. Known as the Gaza Flotilla, this effort exceeded the expectations of its organizers in causing tangible and significant damage to Israel. Planning of the Gaza Flotilla was carried out over the internet and in public conferences by non-governmental organizations (NGOs) primarily operating from major cities of countries friendly to Israel, including London, Dublin or San Francisco. In the broader context, the Gaza Flotilla was just the tip of the iceberg. It is one incident out of many in a campaign entitled ‘Lifeline to Gaza’ designed to break the ‘siege’ of Gaza. The campaign itself is one of several being waged against Israel. Others include the Boycott, Divestment, Sanctions (BDS) Movement, the ‘lawfare’ strategy, and the Durban conferences.