K2 or Spice, marketed as “synthetic marijuana,” is an herbal substance being sold legally in the United States as incense labeled “not for human consumption.” The products contain one or more synthetic compounds which interact with the body similarly to the primary psychoactive constituent of delta-tetrahydrocannabinol, or THC, in marijuana. Therefore, the corrupt term of “synthetic marijuana” has been attached to these substances when in fact the correct term should be “synthetic cannabinoids.” A series of synthetic compounds were created in 1995, by Dr. John W. Huffman of Clemson University. One of the more popular compounds created by Dr. Huffman was the JWH series specifically; JWH-018.
Department of Homeland Security
Transportation Security Administration
(SSI) TSA Aviation Security Directive Airport-Issued Identifcation Threat Reporting
The threat to U.S. civil aviation remains significant. Current credible intelligence indicates Al-Qaida and other terrorist groups continue to develop plans for multiple attacks against targets in the United States, including airports and civil aviation. These terrorist groups continue to pursue a range of targets, tactics, and capabilities to accomplish this objective, including employment in the aviation sector to gain knowledge of aviation operations. Terrorist operatives view attacks on the United States as a priority because of their potentially Significant economic and psychological impacts.
Transportation Security Administration
TSA Security Screening Equipment 2007 Body Scanners Briefing
TSA security screening equipment briefing including whole-body imaging equipment, June 27, 2007.
Department of Homeland Security
(U//FOUO) DHS Homeland Security Presidential Directive/HSPD-8 Draft Implementation Concept
Homeland Security Presidential Directive 8/HSPD-8 establishes policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic preparedness goal; establishing mechanisms for improved delivery of Federal preparedness assistance to State and local governments; and outlining actions to strengthen preparedness capabilities of Federal, State, and local entities. This paper describes a concept for rapid and systematic implementation of the provisions of HSPD-8 to improve preparedness doctrine and practice and reorient preparedness programs and activities that converged within homeland security under a unified national all-hazards preparedness strategy.
Transportation Security Administration
(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) October 2010
(U//FOUO) The Transportation Suspicious Incident Report (TSIR) provides a weekly comprehensive review of suspicious incident reporting related to transportation. The TSIR includes incident reporting, analyses, images, and graphics on specific incidents. In addition, selected articles focus on security technologies, terrorism, and the persistent challenges of securing the nation’s transportation modes. This product is derived from unclassified incident and law enforcement reporting and does not represent fully evaluated intelligence.
Transportation Security Administration
TSA Passenger Screening Body Scanner Stimulus Package Report
Approximately $266 million in ARRA funds will be used to deploy state-of-the-art checkpoint screening equipment including Advanced Technology (AT) X-ray, Bottled Liquid Scanners (BLS), Advanced Imaging Technology (AIT), Chemical Analysis Devices (CADs), and Next-Generation Explosive Trace Detectors (ETD).
Transportation Security Administration
(U//FOUO) TSA Female Suicide Bombers History Overview
(U//FOUO) TSA Female Suicide Bombers History Overview, October 2006.
Customs and Border Protection, Department of Homeland Security, Transportation Security Administration
(SSI) DHS-CBP-TSA Terrorist Watchlist Screening Implementation User’s Guide
The Department of Homeland Security (DHS) merges the capability to anticipate, preempt, and deter threats to the homeland whenever possible through its component agencies. Under the guidance of its Screening Coordination Office, DHS directed U.S. Customs and Border Protection (CBP) and the Transportation Security Administration (TSA) to combine the Advance Passenger Information System (APIS) Pre-Departure and Secure Flight concepts and systems to provide “One DHS Solution” to the commercial aviation industry consistent with applicable authorities and statutes.
Transportation Security Administration
(U//FOUO) TSA Security Technology Challenges Brief
(U//FOUO) TSA Security Technology Challenges Brief, June 11, 2010.
Department of Homeland Security
(U//FOUO) DHS Snapshot: Yemen Explosive Packages on Cargo Aircraft
(U) As of 29 October, packages on cargo aircraft containing explosive materials were intercepted in the United Kingdom (UK) and Dubai, United Arab Emirates (UAE). The packages were shipped from Yemen, with the United States listed as the final destination. On the evening of 28 October,security officials at East Midlands Airport in Lockington, UK identified a suspicious package containing a modified printer-toner cartridge that was later confirmed to contain explosives.
Intelligence Fusion Centers, Oregon
(U//FOUO) Oregon TITAN Fusion Center: Al-Qaeda Inspire Magazine Analysis
(U//FOUO) Purpose and Scope: Provide first responders with a summary, analysis, warnings & indicators, and implications of key articles in the Fall 2010 Inspire magazine for Oregon and SW Washington.
Intelligence Fusion Centers, Michigan
(U//FOUO) Michigan Fusion Center: Soldier Uses Military Disguise to Enter Sporting Event
An athletic facility reported an illegal entry incident during a sporting event on 9, October 2010. The subject arrived at the facility in a military Humvee, wearing a full military formal dress uniform, just prior to the start of the event. The subject advised event security personnel that he was there as part of the game day military Honor Guard, and requested to park the Humvee in the secured parking area reserved for police vehicles. The individual was allowed access at several points and subsequently parked the Humvee in the secured lot. The individual exited the vehicle and retrieved two military M-16 rifles with bayonets from the Humvee.
Department of Homeland Security, FEMA, Washington D.C.
(U//FOUO//LIMDIS) FEMA National Capital Region Catastrophic Incident CONPLAN Draft
In the event of a catastrophic incident or threat to the National Capital Region (NCR), the significant federal presence would both necessitate and complicate a robust response. In order to facilitate the coordination that would be required for the integration of federal, state, and local response efforts, the Office of Personnel Management (OPM) and the FEMA Office of National Capital Region Coordination (NCRC) have compiled this draft NCR Federal Concept Plan (CONPLAN) of Catastrophic Planning Assumptions. For planning purposes, a catastrophic incident is defined in the National Response Framework as any natural or manmade incident, including terrorism, which results in an extraordinary level of mass casualties, damage, or disruption severely affecting the population, infrastructure, environment, economy, national morale, and/or government functions.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Small Arms, Lone Shooters and Small-Unit Tactics Warning
(U//FOUO) DHS and the FBI assess that, given the current evolving and diversifying Homeland threat environment, recent incidents involving small arms operations here in the United States and abroad demonstrate the need for continued vigilance and awareness. Small arms operations could be employed through a range of tactics from a lone shooter—as illustrated by the 1 September incident in Silver Spring, Maryland at the headquarters of a U.S. cable network—to a small-unit assault operation.
Department of Defense, Department of Homeland Security
DHS-DoD Memorandum of Agreement on Cybersecurity October 2010
The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overall capacity and capability of both DHS’s homeland security and DoD’s national security missions, while providing integral protection for privacy, civil rights, and civil liberties.
Department of Homeland Security
(U//FOUO) DHS Multi-Jurisdiction IED Security Planning Guide
The Multi-Jurisdiction Improvised Explosive Device (IED) Security Plan (MJIEDSP) Planning Guide assists multi-jurisdiction areas in developing a detailed IED security plan. The IED security plan outlines specific bombing prevention actions that reduce vulnerability and mitigate risk against the primary terrorist IED attack method within a multi-jurisdiction area.
Department of Homeland Security
(U//FOUO) DHS Report: Small Unit Tactics in Terrorist Attacks
The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.
Department of Energy, Department of Homeland Security
(U//FOUO) DoE-DHS Energy Sector Critical Infrastructure Protection Plan
In its role as Energy SSA, DOE has worked closely with dozens of government and industry security partners to prepare this 2007 Energy SSP. Much of that work was conducted through the Sector Coordinating Councils (SCC) for electricity and for oil and natural gas, as well as through the Energy Government Coordinating Council (GCC). The electricity SCC represents more than 95 percent of the electric industry and the oil and natural gas SCC represents more than 98 percent of its industry. The GCC, co—chaired by DHS and DOE, represents all levels of government—Federal, State, local, and tribal-that are concerned with the Energy Sector.
Customs and Border Protection
Customs and Border Protection Colombian US Army Imposter Briefing
Customs and Border Protection Colombian US Army Imposter Briefing, 2010.
Department of Homeland Security
(U//FOUO) DHS Project 12 Report: Critical Infrastructure Public-Private Partnerships
The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”
Department of Homeland Security
(U//FOUO//LES) DHS Law Enforcement Information Sharing (LEIS) Service
Simply stated, the LEIS Service is the “pipe” used to connect state and local law enforcement with DHS law enforcement.
Department of Homeland Security
DHS Retail Sector Suspicious Activity Reporting Video
DHS video designed to raise the level of awareness for retail and shopping center employees by highlighting the indicators of suspicious activity, this video provides information to help employees identify and report suspicious activities and threats in a timely manner.
Department of Homeland Security
(U//FOUO) US-CERT Advisory “Here You Have” Malware Campaign
The National Cybersecurity and Communications Integration Center (NCCIC) and US-CERT are aware of malicious e-mails received on September 9, 2010, by public and private sector stakeholders. Organizations should warn users to avoid opening suspicious e-mails and monitor activity to the following URL:
Members[dot]multimania[dot]co[dot]uk/yahoophoto/PDF_Document21_025542010_pdf[dot]scr
Intelligence Fusion Centers, Minnesota
(U//LES) Minnesota Joint Analysis Center Charitable Motorcycle Run Spying Advisory
The South East Minnesota Narcotics and Gang Task Force is requesting information on Outlaw Motorcycle Gang (OMG) activity that may have an impact on this year’s Fall Flood Run. The Flood Run (www.floodrun.org) is a charitable motorcycle run that takes place both in the spring and fall along the St. Croix River and attracts thousands of riders, the majority of which are law-abiding. However, information has been received that this year’s Flood Run on September 18, 2010, is expected to attract an increased number of Hells Angels and Outlaws gang members, which are rival clubs. Both clubs are known to be involved in criminal activities such as assault, narcotics, money laundering, prostitution and thefts and both are also considered to be “at war” with each other.
Corporate, Intelligence Fusion Centers
Oracle Intelligence Fusion Center Technology White Paper
State and local law enforcement agencies are engaged in the day-to-day business of fighting crime and terrorism. A federal government, post event analysis concluded that sufficient information existed such that law enforcement officials could have intercepted the terrorists that flew aircraft into the World Trade Center. This “connecting-the-dots” philosophy relies heavily on real-time information integrated into a single comprehensive 360 view of the environment. The development and funding of intelligence fusion centers is a direct result of a need for better, more integrated information about suspects, locations, and conveyances that may be used in the planning or commission of a crime, including a terrorist act. The concept of the fusion center as an all source production of criminal and intelligence information is a good one. The weakness in the approach is the over reliance upon individuals staffing the fusion centers. In any business, labor costs are one of the biggest burdens to the profitability of the business. While current technology cannot replace the human brains ability for abstract thought and analysis, technology can provide methods and means for the collection, integration, analysis, and dissemination of all source intelligence to enhance fusion center operational efficiencies.