Terrorists can acquire precursor materials legally through a variety of commercial transactions, secondhand from individuals with access to such substances, or through theft. Many precursors can be purchased legitimately and without special authorization from chemical supply stores. They also are available at retail stores that sell beauty supply products, hardware and home improvement materials, groceries, and swimming pool supplies, and are used widely in hospitals, universities, construction sites, industrial facilities, farms, and mining operations.
Department of Homeland Security
Arizona, Intelligence Fusion Centers
(U//LES) LulzSec Release: Arizona Fusion Center Undercover Officer Safety Guide
On April 8, 2011, an undercover officer working as part of a drug task force was shot while conducting surveillance. The officer survived the shooting but suffered injuries not only related to being shot but also from having his vehicle rammed several times during the incident. This bulletin is being produced to help outline some of the officer safety issues discussed during the initial review of the shooting incident, which may impact your future surveillance operations. The investigation into this shooting is on-going so specific details are not included, as to avoid compromising that investigation.
California, Intelligence Fusion Centers
(U//FOUO/LES) LulzSec Release: California STAC Gang Infiltration of Law Enforcement Agencies
Infiltration of any law enforcement agency by a gang member can have severe ramifications for the agency involved, its employees, the public it serves, and its allied agencies. Gangs employ various tactics to include infiltrating an agency directly or indirectly, to achieve their objective; to counter this threat, law enforcement must remain cognizant of and employ mitigation strategies. Gangs’ motivations for infiltrating agencies vary; thus law enforcement must remain cognizant of suspicious employee behavior, identify possible motivations for infiltration, and employ mitigation strategies to counter infiltration threats.
Intelligence Fusion Centers
(U//LES) LulzSec Release: EPIC Guide to Detecting Illicit Trafficking by Aircraft
El Paso Intelligence Center: A Police Officer’s Reference Guide to Detecting Illicit Trafficking by Aircraft from October 2009.
Intelligence Fusion Centers, New York
(U//FOUO/LES) LulzSec Release: NYSIC Vehicle Concealment Smartbook 2009
New York State Intelligence Center Concealment Smartbook from April 2009.
Department of Homeland Security
(U//FOUO) LulzSec Release: DHS National Socialist Movement Reference Aid
The National Socialist Movement (NSM) USPER is the most active neo-Nazi group operating in the United States. It has grown from a small organization with a limited following confined to the mid-western United States to the preeminent National Socialist group in the nation. Despite having recently suffered a defection of several regional leaders, NSM remains an influential force within white supremacist circles and the only major racist group that eschews all attempts to distance its methods and objectives from those of the Third Reich. NSM has a reputation for conducting numerous public rallies that have triggered a violent response, including a riot in Toledo, Ohio, in October 2005.
Intelligence Fusion Centers, New Jersey
(U//LES) LulzSec Release: New Jersey Fusion Center MS-13 Using Game Consoles to Communicate
As of June 2010, MS-13 members in Los Angeles have directed operational activities of new MS-13 members in Birmingham, United Kingdom, using gaming consoles such as Sony Playstation and Microsoft Xbox 360. The MS-13 leaders appear to be taking advantage of the devices’ voice over internet protocol (VOIP), text chat, virtual world, and video teleconferencing features, which allow them to communicate with fellow gang members overseas.
Department of Homeland Security, Department of Justice, Intelligence Fusion Centers
(U//LES) LulzSec Release: EPIC Language of the Cartels Narco Terminology Report
In 2009, the National Drug Intelligence Center (NDIC) assessed that Mexican drug trafficking organizations (DTOs) were operating in the U.S. in at least 1, 286 cities spanning nine regions. Moreover, NDIC assesses with high confidence that Mexican DTO’s in at least 143 of these U.S. cities were linked to a specific Mexican Cartel or DTO based in Mexico—the Sinaloa Cartel (at least 75 cities), the Gulf Cartel/Los Zetas (at least 37 cities), the Juárez Cartel (at least 33 cities), the Beltrán-Leyva DTO (at least 30 cities), La Familia Michoacán (at least 27 cities), or the Tijuana Cartel (at least 21 cities). NDIC assesses with high confidence that Mexican DTOs will further expand their drug trafficking operations in the United States. Due to the rise in violence throughout the Southwest Region and Mexico, members of the Cartels, their associates and their families have been suspected of moving into many U.S. cities along the border. As a result, agencies are requesting information on ways to identify those involved with drug trafficking organizations. The information included in this report is not set in stone as many of these criminal organizations are dynamic and will alter their methods and trends frequently to avoid detection by law enforcement.
California, Intelligence Fusion Centers
(U//FOUO/LES) LulzSec Release: San Diego Cross-Border Kidnapping Threat Assessment
The San Diego Law Enforcement Center (SD-LECC) convened an analytical task force in Spring 2010 to address the question: “What does cross-border kidnapping in San Diego look like?” Intelligence Analysts from Chula Vista Police Department, San Diego Sheriff’s Department, the Federal Bureau of Investigation, and the Department of Homeland Security’s Office of Intelligence and Analysis analyzed statistical, investigative and open source intelligence from local law enforcement agencies, FBI, DHS, ICE, CBP, DEA and the U.S. Department of State Bureau of Consular Affairs to prepare this assessment. There is strong evidence—based on intelligence gathered from traditional and alternative sources, such as banks, hospitals, citizen interviews, wiretaps and private consulting firms—that kidnappings in the San Diego area are widely underreported. Consequently, this assessment offers a strategic baseline only; there is insufficient data to support a definitive study of cross-border kidnapping tactics and techniques. This assessment is intended to support law enforcement executives and practitioners in their efforts to collect additional information and combat this problem.
Department of Homeland Security
(U//FOUO) LulzSec Release: DHS Sinaloa Drug Cartel Reference Guide
The powerful confederation of Mexican DTOs known as the Sinaloa cartel controls the majority of Mexico’s marijuana and methamphetamine production and distribution, as well as cocaine trafficking from South and Central American producers into the United States across the U.S. southwest border. The Sinaloa cartel conducts business with powerful U.S. gangs that largely control local drug distribution. As one of the most powerful cartels operating in Mexico, it has expanded operations throughout western Mexico and attempted to take control of new plazas from weaker organizations.* Arrests of high-level members have not fractured the cartel or caused infighting—as was the case with several of its rivals—likely because of the cartel’s stable revenue sources, decentralized structure, family-based culture, and geographic breadth, which all contribute to its preeminence.
Department of Homeland Security
(U//FOUO) LulzSec Release: DHS Evaluating Threats 2008-2013
The 2008 Homeland Security Threat Assessment (HSTA) is a strategic assessment looking out five years. The HSTA represents the analytical judgments of the Department of Homeland Security (DHS) Intelligence Enterprise (IE) regarding the critical threats to the U.S. Homeland that the Department will need to address in the period 2008-2013.
Arizona, Intelligence Fusion Centers
(U//FOUO) LulzSec Release: Arizona Fusion Center Counter-Surveillance Tactic Used at Demonstration
The information contained in this bulletin identifies a tactic recently employed against an Arizona Department of Public Safety (AZ DPS) officer. The incident occurred at a scheduled demonstration by a known citizen action group to protest the traffic cameras on Arizona’s highways. This information is provided for situational awareness to assist law enforcement engaged in public event site security; and for those monitoring potential threats at public gatherings.
Intelligence Fusion Centers, Missouri
(U//FOUO) LulzSec Release: MIAC Anarchist Movement Report
There are many different ideologies that an anarchist may follow. Although there may be a number of differences, they all contain the same central belief. Anarchism is the idea that government (the state) is unnecessary and harmful. Anarchy is society without government. Anarchists are people who desire to live in a society without ru-lers as their ancestors once did. The main belief is that the community in which they live be dependant only upon itself. People who believe in government (such as liberals, conservatives, socialists and fascists) are known as “statists”. Anarchism opposes all forms of hierarchical control.
Department of Homeland Security
(U//FOUO/LES) LulzSec Release: DHS Mexico Sonora-Based Threats to U.S. Border Security
This Homeland Security Assessment examines threats to U.S. border security emanating from the Mexican state of Sonora, which borders Arizona and a small section of New Mexico. It discusses drug and alien smuggling, border violence, and Mexican federal, state, and local government capabilities to confront organized crime. This is the fifth of six planned assessments on current threats to homeland security arising in Mexican states along the U.S. border. It is intended primarily for working-level analysts and operators engaging in homeland security-related activities and concerned with pertinent developments in Sonora and nearby U.S. territory.
Arizona, Intelligence Fusion Centers
(U//FOUO/LES) LulzSec Release: Arizona Fusion Center Sovereign Citizens and Militia Information
The Sovereign Citizens and Militia Movements have been in existence for a number of years and remain active throughout the US today. The Sovereign Citizen Movement began in the 1970’s when groups/individuals adopted right-wing anarchist ideologies originating from the theories of the group called the Posse Comitatus. The Militia Movement began to form not long after the 1993 Waco, Texas incident.
Immigration and Customs Enforcement
(U//FOUO) U.S. Immigration and Customs Enforcement Information Sharing Overview
A presentation from U.S. Immigration and Customs Enforcement’s Enforcement Systems Branch on the status of information sharing presented at the 2011 AFCEA Homeland Security Conference on February 23, 2011.
Intelligence Fusion Centers, Michigan
(U//FOUO) Michigan Fusion Center Restaurant Inspection Scam Warning
Restaurants in multiple states, including Michigan, are reporting phone calls from individuals claiming to be from the Health Department. Throughout Michigan, the scammers are requesting to schedule an inspection at the food establishment, as well as sensitive information about the business. According to the Better Business Bureau, this was a widespread occurrence in Minnesota and North Dakota in 2010.
Department of Homeland Security
(U//FOUO) US-CERT Advisory Increased Threats to Authentication Services
Authentication establishes the trusted relationship between the user and a system or service and validates their identities to each other. Organizations rely on authentication services to protect important data by limiting access to trusted users. Malicious actors are increasingly interested in exploiting authentication services because organizations rely on them to ensure system integrity and limit access to sensitive data by trusted users. US-CERT is providing this advisory to warn organizations about increased threats and interest in authentication services and provide recommended best practices to strengthen system integrity.
Colorado, Intelligence Fusion Centers
(U//FOUO) Colorado Information Analysis Center Chemical Sector Threat Report
The Colorado Information Analysis Center (CIAC) has no current information indicating an imminent threat to Colorado chemical sector critical infrastructure. However, both within the United States and abroad, recent attempts to perpetrate attacks utilizing the Postal and Shipping and Transportation Sectors has created a need for heightened awareness. The CIAC has produced this assessment to provide situational awareness on the current critical infrastructure threat environment, sector incidents and trends, as well as pertinent updates. Information contained in this report originates from CIAC cases, unclassified local, state, and federal databases, and open source reporting.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Unsubstantiated “Electronic Jihad” Warning November 2007
According to Debkafile, an Israeli electronic news website, a group claiming to be al-Qa‘ida has declared 11 November 2007 as the first day of a campaign of “electronic jihad” on the Internet. According to Debkafile, unspecified “al-Qa‘ida electronic experts” allegedly would begin attacking “Western, Jewish, Israeli, Muslim apostate and Shiite Web sites on that date with many more jihadist hackers joining in the attacks later [sic].” DHS and the FBI have no specific or credible information corroborating these cyber attack claims, or intelligence indicating this group is tied to al-Qa‘ida.
Intelligence Fusion Centers, Maryland
(U//FOUO) Maryland Fusion Center Implications of Death of Osama bin Laden
The Intelligence Community (IC) assesses the death of al-Qa’ida (AQ) leader Usama Bin Laden could result in retaliatory attacks in the Homeland and against U.S. and Western interests overseas. Attacks might originate with AQ Core elements in the Tribal Areas of Pakistan, with one of their affiliates overseas, and/or with individuals in the Homeland sympathetic to the cause but lacking a formal group association. We have no indications of advanced AQ Core plotting efforts in the Homeland, but the case of now-detained AQ operative Najibullah Zazi—who, along with two associates, planned to attack New York City subway in 2009 using homemade explosives— demonstrates that unidentified operatives could advance plotting in the Homeland.
Department of Homeland Security
(U//FOUO) DHS Hotels Threat Assessment
This assessment is intended to support the activities of DHS and to assist federal, state, and local government counterterrorism and law enforcement officials, and the private sector in deterring, preventing, preempting, or responding to terrorist attacks against soft targets such as hotels in the United States. It is intended to support the national “See Something, Say Something” campaign.
Department of Homeland Security, Intelligence Fusion Centers
(U//FOUO) DHS Identifying Clandestine Biological, Chemical, Explosives, and Methamphetamine Laboratories
The purpose of this assessment is to assist members of the law enforcement and public safety communities in differentiating among four types of clandestine laboratories: biological, chemical, explosives, and methamphetamine. It provides descriptions, distinguishing features, and hazards of each type of laboratory and includes four reference guides for distribution to public safety personnel. This assessment expands on a related product—Distinguishing a Biological Agent Production Laboratory from a Methamphetamine Laboratory, Lawrence Livermore National Laboratory, 22 January 2008—by including indicators and warning signs associated with clandestine chemical and explosives laboratories.
Department of Homeland Security
(U//LES) DHS Chemical Storage Facility Terrorist Indicators Report
To consider terrorist threat indicators in relationship to chemical storage facilities, it is useful to understand the basic structure of the industry and what general types of facilities might be attractive targets for terrorist attack. Chemical storage facilities are attractive terrorist targets because they can contain toxic and hazardous materials, can create extensive casualties and property damage, and can be a source of materials for use in other attacks. Figure 1 shows some of the potential terrorist targeting objectives.
Department of Homeland Security
(U//LES) DHS Petroleum Pipeline Vulnerabilities and Terrorist Indicators Reports
The United States (U.S.) has two types of pipelines that transport petroleum: those that carry crude oil and those that carry refined petroleum products, such as gasoline, diesel fuel, jet fuel, and home heating oil. Pipelines transport more than two-thirds of all crude oil and refined products in the U.S. Other transportation modes are water, which includes ocean tankers and barges and accounts for 28% of petroleum transportation; tanker trucks, which account for 3% of petroleum transportation; and railroads, which account for 2% of petroleum transportation. The U.S. has more than 200,000 miles of petroleum pipelines.