Department of Homeland Security

(U//LES) DHS Nuclear Power Plants Characteristics and Common Vulnerabilities Reports

A nuclear power plant is an arrangement of components used to generate electric power. Nuclear power plants used in the United States (U.S.) are either boiling water reactors (BWRs) or pressurized water reactors (PWRs). Boiling water reactors (Figure 1) use a direct cycle in which water boils in the reactor core to produce steam, which drives a steam turbine. This turbine spins a generator to produce electric power. Pressurized water reactors (Figure 2) use an indirect cycle in which water is heated under high pressure in the reactor core and passes through a secondary heat exchanger to convert water in another loop to steam, which in turn drives the turbine. In the PWR design, radioactive water/steam never contacts the turbine. Except for the reactor itself, there is very little difference between a nuclear power plant and a coal- or oil-fired power plant.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Use a Dirty Bomb

An independent, unclassified analytic Red Cell session, sponsored jointly by the U.S. Departments of Energy and Homeland Security, found a Radiological Dispersal Device (RDD) attack on the U.S. homeland to be highly appealing from a terrorist standpoint. The Red Cell group, which simulated two different terrorist cells, believed an RDD attack would be relatively easy to prepare and mount and could have wide-ranging physical, psychological, political, and economic impacts. The group believed radioactive materials would be easy to procure, especially from abroad, and found a variety of potential targets across the country. Participants expected that public distrust of official guidance would heighten fear and panic.

(U//FOUO) DHS “Red Cell” Report: How Terrorists Might Exploit a Hurricane

A key component of the IAIP/Competitive Analysis and Evaluation Office’s mission is convening a diverse range of governmental and nongovernmental experts who adopt a terrorist mindset to challenge traditional or existing assumptions about how terrorists might attack some aspect of our critical infrastructure. The ideas generated by these “red cells” contribute insights on potential terrorist threats to the homeland for state and local governments, law enforcement, and industry.

DHS Participation in Film and Television Productions Management Directive

It is Department of Homeland Security policy to use the broad authority granted in the Homeland Security Act of 2002, to further the Department’s missions, particularly with respect to disseminating the Department’s homeland security message. This directive sets Departmental policy for interaction between the Department and non-government, entertainment-oriented motion picture, television, advertising, video and multimedia productions/enterprises.

(U//FOUO) DHS Dams Sector Security Awareness Handbook

The Nation has more than 100,000 dams. Of this number, approximately 82,000 are listed in the National Inventory of Dams (NID), which generally includes dams greater than 25 feet in height or reservoirs having more than 50 acre-feet in storage capacity. In the NID, the downstream hazard potential (e.g., the amount of risk or damage a dam can pose because of failure or negligent operation) is classified as high, significant, or low. In the current NID database, approximately 12,000 dams are classified as high hazard potential from a dam safety perspective. However, only a very small percentage of high-hazard dams represent a potential for causing mass casualties.

(U//LES) El Paso Intelligence Center Bath Salts Synthetic Stimulant Bulletin

Across the United States, synthetic stimulants that are sold as “bath salts” have become a serious drug abuse threat. These products are produced under a variety of faux brand names, and they are indirectly marketed as legal alternatives to cocaine, amphetamine, and Ecstasy (MDMA or 3,4-Methylenedioxymethamphetamine). Poison control centers nationwide have received hundreds of calls related to the side-effects of, and overdoses
from, the use of these potent and unpredictable products. Numerous media reports have cited bath salt stimulant overdose incidents that have resulted in emergency room visits, hospitalizations, and severe psychotic episodes, some of which, have led to violent outbursts, self-inflicted wounds, and even suicides. A number of states have imposed emergency measures to ban bath salt stimulant products (or the chemicals in them) including Florida, Louisiana, North Dakota, and West Virginia; and similar measures are pending in Hawaii, Kentucky, Michigan, and Mississippi. A prominent U.S. Senator has also recently proposed legislation that would ban the synthetic stimulant chemicals found in bath salt products at the federal level.

(U//LES) DHS-FBI Spokane White Supremacist MLK Parade IED Bulletin

Kevin William Harpham was arrested in Colville, Washington by federal law enforcement on 9 March 2011 in connection with the improvised explosive device (IED) found along the route of a Martin Luther King, Jr. Day “MLK Unity March” in Spokane, Washington on 17 January 2011. On 17 January 2011, three sanitation workers in Spokane, Washington discovered a Swiss Army backpack containing an RCIED immediately prior to the Martin Luther King, Jr. Day “MLK Unity March.” The device was placed along the parade route. Based on preliminary forensic examinations, we assess with medium confidenceii that the IED was designed to fire directional fragmentation similar to a single shot shotgun with buckshot or cannon with a grapeshot round. We likewise assess that the device was viable and could have caused personal injury or death.

(U//FOUO) DHS-FBI Terrorist Exploitation of Postal and Commercial Shipping Companies

Terrorists remain interested in exploiting postal and commercial shipping companies to conduct or support attacks in the United States. Publicity surrounding the more than 40,000 incidents involving unknown or suspicious substances related to the U.S. Mail since 2001 likely reinforces violent extremists’ belief that the postal sector is a useful mechanism for conducting an attack, as it demonstrates that mail containing potentially harmful substances can be delivered without arousing suspicion or being discovered until the recipient opens the letter or package.

(U//FOUO) DHS Strategy for Improving Improvised Nuclear Device Attack Response

The mission of the Department of Homeland Security (DHS) includes acting as a focal point regarding natural and manmade crises and emergency planning. In support of the Department’s mission, the primary mission of the Federal Emergency Management Agency (FEMA) is to reduce the loss of life and property and protect the Nation from all hazards, including natural disasters, acts of terrorism, and other man-made disasters, by leading and supporting the Nation in a risk-based, comprehensive emergency management system of preparedness, protection, response, recovery, and mitigation. Consistent with these missions, the Nuclear/Radiological Incident Annex to the National Response Framework (June 2008) sets forth DHS as the coordinating agency for all deliberate attacks involving nuclear/radiological materials, including radiological dispersal devices (RDDs) and improvised nuclear devices (INDs).

(U//LES) Arizona Fusion Center Warning: Police Officers Targeted on Facebook

On October 28, 2010 a DUI traffic stop by MCSO uncovered a CD containing multiple photographs and names of over 30 Phoenix PD officers and civilian employees. All of the names and photographs found on the CD were obtained from Facebook and reveal the identity of several patrol and undercover officers. All officers who were identified on the CD have been notified. It is unknown how many more CDs (if any) may be circulating. This information is provided for Officer Safety and Situational Awareness purposes.

(U//FOUO) TSA Liquid and Natural Gas Pipeline Threat Assessment 2011

The Transportation Security Administration’s (TSA’s) mission includes enhancing the security preparedness of U.S. hazardous liquid and natural gas pipeline systems. This TSA Office of Intelligence (TSA-OI) threat assessment primarily addresses the potential for attacks against the pipeline industry in the Homeland and assesses the tactics, techniques, and procedures (TTPs) used in attacks against pipelines and related infrastructure overseas for their potential use by terrorists in the Homeland.

(U//FOUO) TSA Pipeline Security Smart Practices Report

U.S. hazardous liquids and natural gas pipelines are critical to the nation’s commerce and economy and, as a consequence, they can be attractive targets for terrorists. Before September 11, 2001, safety concerns took precedence over physical and operational security concerns for a majority of pipeline operators. Security matters were mainly limited to prevention of minor theft and vandalism. The terrorist attacks of 9/11 forced a thorough reconsideration of security, especially with respect to critical infrastructure and key resources. Pipeline operators have responded by seeking effective ways to incorporate security practices and programs into overall business operations.

(U//LES) LA-SAFE Geomagnetic Storm Warning

A series of coronal mass ejections (CMEs) are en route to Earth from a sunspot which will buffet the Earth’s magnetic field during the next 12 to 60 hours. These CMEs are a result of the strongest solar flare in more than four years, which peaked on February 15th and registered as an X-flare. X-flares are the strongest type of solar flare. NOAA forecasters estimate a 45% chance of geomagnetic activity on February 17, 2011. Geomagnetic storms usually last 24 to 48 hours, but some may last for many days. They also have the capability of disrupting communication systems, navigation systems and electric grids.

(U//LES) New York State Intelligence Center “Vigilance Project”: Domestic Terrorism Analysis

The Vigilance Project is a comprehensive, analytic report that examines major terrorism cases that have taken place against the Homeland since September 11, 2001. The report serves as a historical compilation of acts or attempted acts of terrorism against the United States, or its interests, and as a tool to identify trends and commonalities among the cases and the subjects involved. It is recognized that the threat environment is dynamic and potential threats are not limited to the findings contained in this report. As the title suggests, it is the duty of every citizen to remain vigilant in the face of terrorism. The findings of this report allow readers to gain an understanding of terrorism participants, their tactics and procedures, and become aware of similarities among the cases, in order to draw useful conclusions. The ultimate goal of the Vigilance Project is to provide useful information to law enforcement partners to support their role in preventing the next attack.

DHS Secretary Napolitano Testimony on “Homeland Threat Landscape”

As the President said in his State of the Union address, in the face of violent extremism, “we are responding with the strength of our communities.” A vast majority of people in every American community resoundingly reject violence, and this certainly includes the violent, al-Qaeda-style ideology that claims to launch attacks in the name of their widely rejected version of Islam. We must use these facts as a tool against the threat of homegrown violent extremism. In conjunction with these communities and with the Department of Justice and the Program Manager for the Information Sharing Environment, we have published guidance on best practices for community partnerships, which has been distributed to local law enforcement across the country. DHS also holds regular regional meetings – which include state and local law enforcement, state and local governments, and community organizations – in Chicago, Detroit, Los Angeles, and Minneapolis. These regional meetings have enabled participants to provide and receive feedback on successful community-oriented policing and other programs aimed at preventing violence.

Boston Regional Intelligence Center Counterfeit Money Advisory

There have been several reports of counterfeit money being passed around the City of Boston since the beginning of December 2008. In the majority of incidents, counterfeit $20 dollar bills were used, but $10, $50 and $100 dollar bills have been used on occasion. The most frequent recipient of these counterfeit bills have been Taxi/ Livery drivers, restaurants and bars in the Dorchester (C11), South Boston (C6), Roxbury (B2) and Jamaica Plain (E13) areas. Boston Police, in conjunction with the United States Secret Service made an arrest on 2/3/09 of an individual that may be responsible for some of the counterfeit currency being passed around (CC# 090061459). Below please find a list of serial numbers that have been used in more than one incident, as well as a list of serial numbers used since 12/12/08.

(U//FOUO) DHS-FBI-NORTHCOM Super Bowl 2011 Joint Special Event Threat Assessment

This Joint Special Event Threat Assessment (JSETA) addresses potential threats to the National Football League (NFL)USPER Super Bowl XLV, which will be played on 6 February 2011 at Cowboys Stadium in Arlington, Texas. It focuses on potential threats to the game—and to various NFL-sanctioned events scheduled for the Dallas/Ft. Worth Metroplex-area during the 12 days prior to the game—from international and domestic terrorists, cyber actors, criminals, and foreign intelligence services.

(U//FOUO) Washington D.C. Fusion Center: The Perils of Social Networking

In a the New York State court, a NYPD officer was questioned by the defense attorney regarding statements he had posted on his Facebook webpage that portrayed him as a rogue cop. At the conclusion of his testimony, what should have been a slam-dunk “ex-con with a gun” case, resulted in an acquittal for the defendant because of the reasonable doubt created by the officer’s own postings on Facebook and MySpace. In other words, his own website statements were used to impeach him. Convictions rest on the credibility of the officer(s). The defense strategy was to show the jury that what the officer writes about himself on social network websites is how he “really” conducts police work. The suspect in this case claimed that the officer used excessive force on him and broke three ribs. The suspect went on to allege that when the police officer realized that he would have to explain the broken ribs, he “planted” a stolen 9mm Beretta on the suspect and charged him with the offense.

(U//FOUO) DHS-FBI 2010 Holiday Terrorism Warning

(U//FOUO) THIS JOINT INTELLIGENCE BULLETIN PROVIDES LAW ENFORCEMENT AND PUBLIC AND PRIVATE SECTOR SAFETY OFFICIALS WITH AN EVALUATION OF POTENTIAL TERRORIST THREATS DURING THE 2010 U.S. HOLIDAY SEASON, EXTENDING FROM THE PRE-CHRISTMAS PERIOD THROUGH NEW YEAR’S DAY. THIS INFORMATION IS PROVIDED TO SUPPORT THE ACTIVITIES OF DHS AND FBI AND TO HELP FEDERAL, STATE, AND LOCAL GOVERNMENT COUNTERTERRORISM AND LAW ENFORCEMENT OFFICIALS DETER, PREVENT, PREEMPT, OR RESPOND TO TERRORIST ATTACKS AGAINST THE UNITED STATES.