Department of Homeland Security

(U//FOUO) Colorado Information Analysis Center Fake Health Inspectors Warning

On 29 October the Colorado Information Analysis Center received notification from Tri-County Health Department regarding several instances of an individual posing as a health inspector. An individual posing as a “Health Department” inspector has called businesses in Adams, Arapahoe, Douglas, and Larimer counties to set up a meeting to inspect their facilities. However, once scheduled the individual does not show up. The CIAC is aware of similar incidents in Orange County, CA in June 2010. Although Orange County does not use the 760 area code seen in the above incidents, it is possible that these similar reports indicate a trend that crosses state lines. The “inspectors” in Orange County used the same MO as in the Colorado cases. In other states, these types of imposters have extorted money from food facility operators, although this type of activity has not been reported in Colorado.

(U//FOUO) Attempted VBIED Attack at Maryland Military Recruitment Center

On 8 December 2010, 21 year old Antonio Martinez [aka Muhammad Hussain], a recent convert to radical Islam, was arrested after he attempted to blow up a military recruiting center in Catonsville, Maryland, using what he believed was a vehicle borne improvised explosive device [VBIED]. According to the criminal complaint, Martinez came to the attention of the FBI after a confidential source informed them of the following statement he had made on his Facebook page, “Any 1 who ALLAH and HIS Prophet PEACE .Be.Upon. Him I hate u with all of my heart”.

(U//FOUO) Colorado Information Analysis Center Smartphone Security Bulletin

Smartphones feature an diverse array of computer capabilities which expose them to many of the vulnerabilities previously confined to computers. These threats have evolved from targeting personal computers (PCs) to hitting smartphones much quicker than some security experts anticipated. It took almost fifteen years for these types of attacks to evolve for PCs, but these attacks have been adapted for smartphones much more quickly. The malicious software (malware) currently targeting smartphones attempts to gather personal information stored on the phone and sell it. Since users often store more of this type of information on smartphones than PCs, in some cases it has become more profitable for hackers to create malware for smartphones than PCs.

(SBU) Central Florida Intelligence Exchange Domestic Security Intelligence Report August 2010

On 13-15 August 2010, the Campaign for Liberty will be holding their second annual Florida Liberty Summit at the Rosen Center Hotel in Orlando, Florida. The Campaign for Liberty is a political organization founded by Congressman Ron Raul. The website for the event states it is a way for “liberty minded activists…to network, learn, and build as our grassroots Revolution to reclaim our Republic and restore our Constitution”. During the 2009 Florida Liberty Summit the start of the program had to be postponed for 30 minutes due to International Drive being backed up with attendees attempting to park. Based on the groups calculations, there was around 1500 people in attendance. Although the attendance numbers on the group sites promoting this year’s event are low, the continued support of Ron Paul and his party may produce similar attendance numbers and issues to that of the 2009 event.

(U//FOUO) Central Florida Intelligence Exchange Gaza Flotilla Protest Warning

On May 31, 2010, Israeli soldiers boarded six humanitarian aid ships that were headed towards the Gaza Strip, carrying thousands of tons of supplies as well as hundreds of pro-Palestinian activists. The convoy, which was organized by the ‘Free Gaza Movement’, was intercepted by Israeli naval forces while attempting Israel and Gaza Humanitarian Convoy to break the naval blockade off the Gaza Stip. There were more than 10 people killed and several injured, including Israeli soldiers, during this incident. Statements regarding the events have differed greatly. The pro-Palestinian activists are reporting that the Israeli soldiers boarded the ship with no warning and began shooting sleeping civilians as soon as their feet hit the deck. Conversely, the Israel Ministry of Foreign Affairs issued a statement advising that Israeli naval forces boarded the ships after issuing several warnings that were ignored. Once on the ships, Israeli soldiers were attacked by the activists with live fire as well as other weapons such as knives and clubs.

(U//LES) Central Florida Intelligence Exchange BP Protest Warning

The following scheduled protests are a part of “Seize BP Week of Action”, which are demonstrations that are being held throughout the country between 3 June and 10 June 2010. The purpose of the protests is to convince the United States government to seize BP’s assets and to “ensure justice” for all of the devastation that has been caused in the Gulf of Mexico from the disaster of the Deepwater Horizon.

(U//FOUO) Washington D.C. Fusion Center Alcoholic Energy Drinks Warning

Recently, alcoholic energy drinks have been making national headlines related to multiple hospitalizations for alcohol poisoning among college students. These hospitalizations have resulted in several universities banning the alcoholic energy drinks from campuses. Lawmakers in several states, including New York, have sought to ban the drinks, though no legislation has passed yet. These drinks mix alcohol with caffeine. Alcoholic energy products are marketed to look like energy drinks on grocery shelves, but can pack a real alcoholic punch. Four Loko is a popular brand, but not the only alcoholic energy drink under scrutiny. In the case of Four Loko, the 23.5-ounce drink is 12 percent alcohol and roughly equivalent to drinking five 12-ounce beers. The drink also has about a cup’s worth of coffee, according to the manufacturer. There’s a very common misconception that if you drink caffeine with an alcoholic beverage the stimulant effect of the caffeine counteracts the depressant effect of the alcohol and that is not true.

(U//FOUO//LES) DHS Terrorist Use of Social Networking Facebook Case Study

Terrorists have traditionally sought to exploit new and alternative media, particularly on the Internet, to spread their propaganda and to a lesser extent, operational and tactical guidance to prospective supporters through websites, forums, blogs, chat rooms etc. In recent years, Islamic terrorists have expanded the purview of their online endeavors into social networking sites, websites that create and foster online communities organized around shared affinities and affiliations that connect people based on interests and relationships. In most cases, social networking sites are openly viewable to any participant on the site.

Washington, D.C. Fusion Center Helium Suicides Warning

The Los Angeles Joint Regional Terrorism Threat Assessment Center (LAJRIC) distributed a public safety bulletin on an emerging suicide method using helium and an “exit hood.” Helium suicides are still relatively rare however, in the last several years, information about the use of helium as a certain, fast, and painless suicide method has spread on the Internet and in various suicide handbooks. First responders have encountered helium suicides and other variations of this suicide method using chemicals which are hazardous to first responders in the District or National Capitol Region. The WRTAC is issuing the below information for situational awareness and investigative purposes only.

(U//FOUO) DHS-FBI “Inspire” Al-Qaeda Magazine Second Edition Warning

(U//FOUO) This product is intended to provide perspective and understanding of the nature and scope of potentially emergent threats in response to the posting of the second edition of Inspire magazine. It is also intended to assist federal, state, local, and tribal government agencies and authorities, the private sector, and other entities to develop priorities for protective and support measures relating to an existing or emerging threat to the homeland security.

(U//FOUO) TSA Pipeline Threat Assessment

(U//FOUO) The Transportation Security Administration’s (TSA) mission includes enhancing the security preparedness of our nation’s hazardous liquid and natural gas pipeline systems. This 2008 threat assessment addresses terrorist attacks against oil and gas pipeline facilities overseas and considers the potential for attacks against the oil and gas pipeline industry in the United States. Pipelines are a mode of transportation with distinct characteristics and security requirements. Pipelines operate in all 50 states and transport more than two-thirds of all petroleum products, including gasoline, diesel and jet fuel, home heating oil, kerosene, and propane. Natural gas transmission and distribution pipelines transport natural gas from sources to residential, commercial, and industrial customers. Hazardous liquid pipelines transport crude oil to refineries and refined oil products to product terminals and airports. America depends daily on its pipelines to meet its oil and gas requirements.

(U//FOUO) DHS Mubtakar Improvised Cyanide Gas Device Warning

(U//FOUO) Terrorists have shown considerable interest in an improvised chemical device called the mubtakar, which is designed to release lethal quantities of hydrogen cyanide, cyanogen chloride, and chlorine gases. One or more devices could be used in attacks in enclosed spaces, such as restaurants, theaters, or train cars. The mubtakar is small and could be transported in a bag or box, or assembled at the attack site. DHS and FBI encourage recipients of this document to report information about suspicious devices and the acquisition or possession of mubtakar precursor chemicals or components (see figures for details) to the nearest state and local fusion center and to the local FBI Joint Terrorism Task Force.

(U//FOUO) DHS Small-Scale Toxin and Poison Attack Warning

(U//FOUO) Terrorists continue to express broad interest in toxins and poisons that could be used to contaminate food or water supplies, or spread through skin contact. Widely circulated terrorist manuals contain instructions for mixing toxins and poisons with skin penetrating enhancers such as oils, lotions, and other ointments. Other possible methods of delivery include adding toxins or poisons to beverages, fruits, vegetables, or other foods. Most toxins and poisons mentioned in terrorist manuals are more suitable for assassinations and small-scale attacks than for mass casualty attacks, but terrorists might calculate that a coordinated series of simultaneous small attacks could produce comparable casualties and widespread public fear, as well as erode consumer confidence.

(U//FOUO) Florida Fusion Center K2/Spice Warning

K2 or Spice, marketed as “synthetic marijuana,” is an herbal substance being sold legally in the United States as incense labeled “not for human consumption.” The products contain one or more synthetic compounds which interact with the body similarly to the primary psychoactive constituent of delta-tetrahydrocannabinol, or THC, in marijuana. Therefore, the corrupt term of “synthetic marijuana” has been attached to these substances when in fact the correct term should be “synthetic cannabinoids.” A series of synthetic compounds were created in 1995, by Dr. John W. Huffman of Clemson University. One of the more popular compounds created by Dr. Huffman was the JWH series specifically; JWH-018.

(SSI) TSA Aviation Security Directive Airport-Issued Identifcation Threat Reporting

The threat to U.S. civil aviation remains significant. Current credible intelligence indicates Al-Qaida and other terrorist groups continue to develop plans for multiple attacks against targets in the United States, including airports and civil aviation. These terrorist groups continue to pursue a range of targets, tactics, and capabilities to accomplish this objective, including employment in the aviation sector to gain knowledge of aviation operations. Terrorist operatives view attacks on the United States as a priority because of their potentially Significant economic and psychological impacts.

(U//FOUO) DHS Homeland Security Presidential Directive/HSPD-8 Draft Implementation Concept

Homeland Security Presidential Directive 8/HSPD-8 establishes policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic preparedness goal; establishing mechanisms for improved delivery of Federal preparedness assistance to State and local governments; and outlining actions to strengthen preparedness capabilities of Federal, State, and local entities. This paper describes a concept for rapid and systematic implementation of the provisions of HSPD-8 to improve preparedness doctrine and practice and reorient preparedness programs and activities that converged within homeland security under a unified national all-hazards preparedness strategy.

(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) October 2010

(U//FOUO) The Transportation Suspicious Incident Report (TSIR) provides a weekly comprehensive review of suspicious incident reporting related to transportation. The TSIR includes incident reporting, analyses, images, and graphics on specific incidents. In addition, selected articles focus on security technologies, terrorism, and the persistent challenges of securing the nation’s transportation modes. This product is derived from unclassified incident and law enforcement reporting and does not represent fully evaluated intelligence.

(SSI) DHS-CBP-TSA Terrorist Watchlist Screening Implementation User’s Guide

The Department of Homeland Security (DHS) merges the capability to anticipate, preempt, and deter threats to the homeland whenever possible through its component agencies. Under the guidance of its Screening Coordination Office, DHS directed U.S. Customs and Border Protection (CBP) and the Transportation Security Administration (TSA) to combine the Advance Passenger Information System (APIS) Pre-Departure and Secure Flight concepts and systems to provide “One DHS Solution” to the commercial aviation industry consistent with applicable authorities and statutes.

(U//FOUO) DHS Snapshot: Yemen Explosive Packages on Cargo Aircraft

(U) As of 29 October, packages on cargo aircraft containing explosive materials were intercepted in the United Kingdom (UK) and Dubai, United Arab Emirates (UAE). The packages were shipped from Yemen, with the United States listed as the final destination. On the evening of 28 October,security officials at East Midlands Airport in Lockington, UK identified a suspicious package containing a modified printer-toner cartridge that was later confirmed to contain explosives.