UN/USAID Hospital and Field Medical Locations in Port Au Prince, Haiti as of January 26, 2010.
UN/USAID Damage Assessment and Field Medical Locations in Port Au Prince, Haiti as of January 26, 2010.
* James W. von Brunn, a Holocaust denier reported to be in his late 80s, walked into the Holocaust Museum in Washington, DC and shot a security guard with a .22 caliber rifle on 10 June 2009
* In 1981 von Brunn served six years in prison for attempting to kidnap members of the Federal Reserve board due to anger over high interest rates
* Von Brunn has been charged with murder and killing in the course of possessing a firearm at a federal facility, both capital offenses under federal law
* The Department of Homeland Security has categorized the shooting as a criminal incident and said it does not appear to have a connection to terrorism. The attack is being investigated as a hate crime
Under the National Infrastructure Protection Plan, the Department of Homeland Security’s Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) has the responsibility to produce assessments that support the strategic planning needed to enhance the protection and preparedness of the Nation’s critical infrastructure and key resources (CIKRs). HITRAC analyzed information about terrorist attack capabilities, goals, and objectives to assess the potential terrorist attack methods that might be used against CIKRs.
Domestic terrorist groups have historically threatened, and in some cases have executed contamination of drinking water systems. Such groups are likely to continue targeting the Water Sector in the future. These groups include, but are not limited to, hate groups, eco-terrorists, antigovernment and religiously motivated groups. International terrorist groups, specifically Islamic extremists such as al Qaeda, have shown interest in contaminating US drinking water.
(U//FOUO) The Department of Homeland Security/Office of Intelligence and Analysis, the South Carolina Information and Intelligence Center, and the Michigan Intelligence Operations Center, in coordination with the University of South Carolina, Clemson University, and Michigan State University, have prepared the following threat assessment to assist security planners and law enforcement personnel in monitoring threat information and maintaining a safe and secure event environment for U.S. college sports and entertainment venues and surrounding areas. These areas include entrance and egress routes to the venue, local hotels, restaurants and bars, and parking lots where crowds gather.
The Network Intrusion Responder Program (NITRO) was designed by the U.S. Secret Service’s National Computer Forensics Institute to introduce law enforcement officers to basic network intrusion investigation techniques.
On 6/21/2007, Juan Carlos GOMEZ arrived at Miami International Airport from Bogota, Colombia, on Avian flight #008. Passenger GOMEZ presented himself for inspection to CBPO Ortiz at Passport Control at 2311 hrs. CBPO Ortiz admitted GOMEZ as a USC and referred him to Baggage Control Secondary to verify his parole status as Ortiz indicated prior drug arrest. At approximately 2335 hrs GOMEZ presented his CBP form 6059B to the primary baggage control officer and was escorted to baggage secondary for further examination. The floor coordinator was informed of the situation and assigned CBPO Medrano to conduct GOMEZ’s secondary inspection at 2340 hrs. SCBPOs Adan and Sanfilippo were also informed of GOMEZ’s record.
The Federal interagency community has developed 15 all-hazards planning scenarios (the National Planning Scenarios or Scenarios) for use in national, Federal, State, and local homeland security preparedness activities. The Scenarios are planning tools and are representative of the range of potential terrorist attacks and natural disasters and the related impacts that face our nation. The objective was to develop a minimum number of credible scenarios in order to establish the range of response requirements to facilitate preparedness planning.
To facilitate the development of future JFOs and other DHS facilities for each high-threat or regional area, a JFO Development Team (DT) will be established. This team will be cochaired by the appropriate DHS/FEMA regional office, DHS/USSS field office, and/or FBI field office. Membership of the team will include all DHS field elements within the defined urban threat area or regional area. DHS/FEMA will coordinate general oversight and guidance throughout the process, ensuring that the years of experience and existing assets utilized in the development of DFOs are carefully integrated into the JFO developmental process.
Office for Bombing Prevention (OBP) Overview OBP is dedicated to enhancing and coordinating the nation‟s ability to deter, prevent, detect, protect against, and respond to attacks that use IEDs against critical infrastructure, key resources, and soft targets.
The Target Capabilities List (TCL) Implementation Project is the method by which the Federal Emergency Management Agency (FEMA) will update the TCL and implement the doctrine of capabilities-based preparedness as outlined in the National Preparedness Guidelines. The goal of the project is to provide more user-friendly, accessible, and credible capability targets with which to link all preparedness cycle activities to strengthen preparedness across prevention, protection, response, and hazard mitigation capabilities. The purpose of this document is twofold. First, it explains the history of the TCL and why FEMA is leading the effort to streamline and revise the content found in TCL Version 2.0 through the establishment of updated Target Capabilities.
Social Security Facts:
· The Social Security act was signed by FDR on August 14, 1935.
· Ernest Ackerman was the first recipient of Social Security benefits. He received a
one –time lump sum payout of 17 cents.
· FICA stands for the Federal Insurance Contributions Act.
· Social Security numbers were first issued in 1936. To date, over 415 million
different numbers have been issued.
· When someone dies his or her Social Security number is NOT reused. The ninedigit
Social Security number allows for approximately 1 billion possible
combinations. At this point there is no need to recycle numbers.
(U//FOUO) Due to the recent events in Virginia and threats to schools across the country, the following information is provided as background information for patrol officers. An active shooter is usually not a spur of the moment action. The person progresses through a number of identifiable stages. These stages may occur in rapid succession or over a period of months or even years. During the first four stages, law enforcement may have an opportunity to intervene before the shooter is able to execute the plan.
The Palestinian statehood issue remains a popular and unifying cause throughout the Arab and Islamic world, and a high agenda item for militant jihadists. HAMAS is one of the principal terrorist groups involved in this conflict and uses violence in the form of terrorism to further its cause. The organization has long been designated by the US Department of State as a terrorist group. According to the State Department’s 2007 “Country Reports on Terrorism,” HAMAS receives funding from Iran, sympathetic supporters in Arab countries, and from the Palestinian diaspora around the world, including in the United States.
Vehicle Borne Improvised Explosive Devices (VBIEDs) pose complex security challenges for all sectors. To reduce vulnerabilities from an attack using VBIEDs, the Department of Homeland Security (DHS) Office for Bombing Prevention (OBP) recommends the protective measures listed below.
On 26 November 2008, Islamic extremists conducted terrorist attacks in Mumbai, India. Mumbai is the commercial and financial capital city of India, with a population of over 14 million. Ten gunmen paralyzed India’s largest city in a matter of minutes Wednesday night, with the siege continuing until Saturday afternoon. To fully identify appropriate protective measures, it is essential to retrace the assault planning process, and examine all facets taken by the terrorists to achieve their [goals].
THE U.S. SECRET SERVICE
Investigates . . .
Fraud involving U.S. financial obligations and securities
Crimes affecting other federally insured financial institutions
Threats against the President & other government officials
Access Device fraud
Food and Agriculture Security Partners
DHS coordinatesthe overall national effort to enhance CIKR protection and resiliency through the implementation of the NIPP; With guidanceprovided by Homeland Security, these agencies shall collaborate with all relevant partners to prevent, deter, and mitigate deliberate efforts to destroy, incapacitate, or exploit the food and agriculture sector
* Government Coordinating Council (GCC) –the council which provides effective coordination of agricultural security and food defense strategies and activities, policy, and communication across government and between the government and the private sector to support the nation’s homeland security mission
–Sector Specific Agency (SSA) –the designated sector specific agencies for food and agriculture are the USDA and DHHS (FDA)
–21 Food & Agriculture GCC members
* Sector Coordinating Council (SCC) –created by private industry to serve the sector’s counterterrorism and security interests; represents the scope,breadth, depth, and interdependence of the U.S. Food and Agriculture Sector (i.e., owners, operators, associations)
Region X identified the following exercises as part of the Regional-level calendar. Any HSEEP-based exercise where the host/lead is a State, Federal jurisdiction, or a Federal/State partnership and engages with at least one State and/or Federal agency (primarily Emergency Support Function [ESF] partners) within FEMA Region X may be placed on the Regional-level calendar. In addition, associated training courses available, or needed, to prepare exercise participants for the identified Regional-level exercises are included in the following table.
The Security Filing, commonly known as the “10+2” initiative, is a Customs and Border Protection (CBP) regulation that requires importers and vessel operating carriers to provide additional advance trade data to CBP pursuant to Section 203 of the SAFE Port Act of 2006 and section 343(a) of the Trade Act of 2002, as amended by the Maritime Transportation Security Act of 2002, for non-bulk cargo shipments arriving into the United States by vessel.
*The growing number of SPSS vessels indicates that their stealthy characteristics and ability to carry many tons ofcocaine have helped them develop into what now seems to be a major component of the narcotics logistics chain•
* Colombian Navy believes that during the past two to three years, cocaine smuggling SPSS vessels have been arranged mostly by the drug trafficking factions of the FARC, probably in association with organized crime groups also involved in drug trafficking •
**Profit margin:–1 Kg of cocaine is sold in the US for ~$20 to $25,000 USD ($30 to $35,000 USD in Europe)
–7000 Kg of cocaine can be carried in a SPSS –Money earned: 7000 x 25,000 = $175 million USD
–Captain gets paid $20 to $25,000 USD per trip, other crew gets $5 to $6,000 USD per trip; Total crew cost ~$40,000 USD
–$1 to $2 million invested to build and run a SPSS is ~2 to 3% of the whole profit made
Cyber Threat Branch Responsibilities
• Execute the responsibilities created by the Homeland Security Act of 2002:
– Access, receive, and analyze law enforcement, intelligence, and other information from federal, state, and local agencies and private sector entities to:
• Identify and assess the nature and scope of terrorist threats
• Detect and identify threats to the United States
• Understand threats in light of actual and potential vulnerabilities
– Carry out comprehensive assessments to determine the risk posed by terrorist attacks
• Outreach plays a critical role in the mission
– The CTB provides threat briefings and teleconferences to:
• Sector Coordinating Councils
• Government Coordinating Councils
• Key industry associations
So we all have to do our part to have a system that works. At the end of the day, when it comes to immigration, people need to be able to trust the system. Americans need to know that their government is committed to enforcing the law and securing the border—and that it takes this responsibility seriously. Law enforcement needs to have better legal tools and the necessary resources to deal with border-related and immigration-related crime. Businesses must be able find the workers they need here in America, rather than having to move overseas. Immigrants need to be able to plan their lives—they need to know that once we reform the laws, we’re going to have a system that works, and that the contours of our immigration laws will last. And they need to know that they will have as many responsibilities as they do rights.
DHS defines risk by three principal variables: threat, or the likelihood of a type of attack that might be attempted, vulnerability, or the likelihood that an attacker would succeed with a particular attack type, and consequence, or the potential impact of a particular attack. The risk model used to allocate HSGP funds includes both asset-based and geographically-based terrorist risk calculations. DHS combines these complementary risk calculations to produce an estimate of the relative risk of terrorism faced by a given area.