Department of Homeland Security

(U//FOUO) Threats to College Sports and Entertainment Venues and Surrounding Areas

(U//FOUO) The Department of Homeland Security/Office of Intelligence and Analysis, the South Carolina Information and Intelligence Center, and the Michigan Intelligence Operations Center, in coordination with the University of South Carolina, Clemson University, and Michigan State University, have prepared the following threat assessment to assist security planners and law enforcement personnel in monitoring threat information and maintaining a safe and secure event environment for U.S. college sports and entertainment venues and surrounding areas. These areas include entrance and egress routes to the venue, local hotels, restaurants and bars, and parking lots where crowds gather.

DHS Deceased Internal Cocaine Smuggling Photos

On 6/21/2007, Juan Carlos GOMEZ arrived at Miami International Airport from Bogota, Colombia, on Avian flight #008. Passenger GOMEZ presented himself for inspection to CBPO Ortiz at Passport Control at 2311 hrs. CBPO Ortiz admitted GOMEZ as a USC and referred him to Baggage Control Secondary to verify his parole status as Ortiz indicated prior drug arrest. At approximately 2335 hrs GOMEZ presented his CBP form 6059B to the primary baggage control officer and was escorted to baggage secondary for further examination. The floor coordinator was informed of the situation and assigned CBPO Medrano to conduct GOMEZ’s secondary inspection at 2340 hrs. SCBPOs Adan and Sanfilippo were also informed of GOMEZ’s record.

National Planning Scenarios Version 21.3 2006 Final Draft

The Federal interagency community has developed 15 all-hazards planning scenarios (the National Planning Scenarios or Scenarios) for use in national, Federal, State, and local homeland security preparedness activities. The Scenarios are planning tools and are representative of the range of potential terrorist attacks and natural disasters and the related impacts that face our nation. The objective was to develop a minimum number of credible scenarios in order to establish the range of response requirements to facilitate preparedness planning.

DHS Interagency Integrated SOP: Joint Field Office (JFO) Activation and Operations

To facilitate the development of future JFOs and other DHS facilities for each high-threat or regional area, a JFO Development Team (DT) will be established. This team will be cochaired by the appropriate DHS/FEMA regional office, DHS/USSS field office, and/or FBI field office. Membership of the team will include all DHS field elements within the defined urban threat area or regional area. DHS/FEMA will coordinate general oversight and guidance throughout the process, ensuring that the years of experience and existing assets utilized in the development of DFOs are carefully integrated into the JFO developmental process.

Target Capabilities List User Guide

The Target Capabilities List (TCL) Implementation Project is the method by which the Federal Emergency Management Agency (FEMA) will update the TCL and implement the doctrine of capabilities-based preparedness as outlined in the National Preparedness Guidelines. The goal of the project is to provide more user-friendly, accessible, and credible capability targets with which to link all preparedness cycle activities to strengthen preparedness across prevention, protection, response, and hazard mitigation capabilities. The purpose of this document is twofold. First, it explains the history of the TCL and why FEMA is leading the effort to streamline and revise the content found in TCL Version 2.0 through the establishment of updated Target Capabilities.

Identifying Fraudulent Social Security Documents: A Tool For Law Enforcement Officers

Social Security Facts:
· The Social Security act was signed by FDR on August 14, 1935.
· Ernest Ackerman was the first recipient of Social Security benefits. He received a
one –time lump sum payout of 17 cents.
· FICA stands for the Federal Insurance Contributions Act.
· Social Security numbers were first issued in 1936. To date, over 415 million
different numbers have been issued.
· When someone dies his or her Social Security number is NOT reused. The ninedigit
Social Security number allows for approximately 1 billion possible
combinations. At this point there is no need to recycle numbers.

Maryland Coordination and Analysis Center: Stages of an Active Shooter

(U//FOUO) Due to the recent events in Virginia and threats to schools across the country, the following information is provided as background information for patrol officers. An active shooter is usually not a spur of the moment action. The person progresses through a number of identifiable stages. These stages may occur in rapid succession or over a period of months or even years. During the first four stages, law enforcement may have an opportunity to intervene before the shooter is able to execute the plan.

HAMAS Sympathizers in New Jersey: Supporting Terrorism Abroad

The Palestinian statehood issue remains a popular and unifying cause throughout the Arab and Islamic world, and a high agenda item for militant jihadists. HAMAS is one of the principal terrorist groups involved in this conflict and uses violence in the form of terrorism to further its cause. The organization has long been designated by the US Department of State as a terrorist group. According to the State Department’s 2007 “Country Reports on Terrorism,” HAMAS receives funding from Iran, sympathetic supporters in Arab countries, and from the Palestinian diaspora around the world, including in the United States.

DHS Analysis of Mumbai Combined Arms Operation

On 26 November 2008, Islamic extremists conducted terrorist attacks in Mumbai, India. Mumbai is the commercial and financial capital city of India, with a population of over 14 million. Ten gunmen paralyzed India’s largest city in a matter of minutes Wednesday night, with the siege continuing until Saturday afternoon. To fully identify appropriate protective measures, it is essential to retrace the assault planning process, and examine all facets taken by the terrorists to achieve their [goals].

DHS Food and Agriculture Sector Infrastructure Protection

Food and Agriculture Security Partners

DHS coordinatesthe overall national effort to enhance CIKR protection and resiliency through the implementation of the NIPP; With guidanceprovided by Homeland Security, these agencies shall collaborate with all relevant partners to prevent, deter, and mitigate deliberate efforts to destroy, incapacitate, or exploit the food and agriculture sector

* Government Coordinating Council (GCC) –the council which provides effective coordination of agricultural security and food defense strategies and activities, policy, and communication across government and between the government and the private sector to support the nation’s homeland security mission

–Sector Specific Agency (SSA) –the designated sector specific agencies for food and agriculture are the USDA and DHHS (FDA)
–21 Food & Agriculture GCC members

* Sector Coordinating Council (SCC) –created by private industry to serve the sector’s counterterrorism and security interests; represents the scope,breadth, depth, and interdependence of the U.S. Food and Agriculture Sector (i.e., owners, operators, associations)

FEMA Region X Multi-year Training and Exercise Plan 2010-2014

Region X identified the following exercises as part of the Regional-level calendar. Any HSEEP-based exercise where the host/lead is a State, Federal jurisdiction, or a Federal/State partnership and engages with at least one State and/or Federal agency (primarily Emergency Support Function [ESF] partners) within FEMA Region X may be placed on the Regional-level calendar. In addition, associated training courses available, or needed, to prepare exercise participants for the identified Regional-level exercises are included in the following table.

Customs and Border Protection Secure Freight Initiative Brief

The Security Filing, commonly known as the “10+2” initiative, is a Customs and Border Protection (CBP) regulation that requires importers and vessel operating carriers to provide additional advance trade data to CBP pursuant to Section 203 of the SAFE Port Act of 2006 and section 343(a) of the Trade Act of 2002, as amended by the Maritime Transportation Security Act of 2002, for non-bulk cargo shipments arriving into the United States by vessel.

DHS Project Nemo Overview

*The growing number of SPSS vessels indicates that their stealthy characteristics and ability to carry many tons ofcocaine have helped them develop into what now seems to be a major component of the narcotics logistics chain•

* Colombian Navy believes that during the past two to three years, cocaine smuggling SPSS vessels have been arranged mostly by the drug trafficking factions of the FARC, probably in association with organized crime groups also involved in drug trafficking •

**Profit margin:–1 Kg of cocaine is sold in the US for ~$20 to $25,000 USD ($30 to $35,000 USD in Europe)

–7000 Kg of cocaine can be carried in a SPSS –Money earned: 7000 x 25,000 = $175 million USD

–Captain gets paid $20 to $25,000 USD per trip, other crew gets $5 to $6,000 USD per trip; Total crew cost ~$40,000 USD

–$1 to $2 million invested to build and run a SPSS is ~2 to 3% of the whole profit made

DHS Cyber Threat to the U.S.

Cyber Threat Branch Responsibilities

• Execute the responsibilities created by the Homeland Security Act of 2002:
– Access, receive, and analyze law enforcement, intelligence, and other information from federal, state, and local agencies and private sector entities to:
• Identify and assess the nature and scope of terrorist threats
• Detect and identify threats to the United States
• Understand threats in light of actual and potential vulnerabilities
– Carry out comprehensive assessments to determine the risk posed by terrorist attacks
• Outreach plays a critical role in the mission
– The CTB provides threat briefings and teleconferences to:
• Sector Coordinating Councils
• Government Coordinating Councils
• Key industry associations

Secretary Napolitano Remarks on Immigration Reform at the Center for American Progress

So we all have to do our part to have a system that works. At the end of the day, when it comes to immigration, people need to be able to trust the system. Americans need to know that their government is committed to enforcing the law and securing the border—and that it takes this responsibility seriously. Law enforcement needs to have better legal tools and the necessary resources to deal with border-related and immigration-related crime. Businesses must be able find the workers they need here in America, rather than having to move overseas. Immigrants need to be able to plan their lives—they need to know that once we reform the laws, we’re going to have a system that works, and that the contours of our immigration laws will last. And they need to know that they will have as many responsibilities as they do rights.

Sacramento Urban Areas Security Initiative Grants FY 2006

DHS defines risk by three principal variables: threat, or the likelihood of a type of attack that might be attempted, vulnerability, or the likelihood that an attacker would succeed with a particular attack type, and consequence, or the potential impact of a particular attack. The risk model used to allocate HSGP funds includes both asset-based and geographically-based terrorist risk calculations. DHS combines these complementary risk calculations to produce an estimate of the relative risk of terrorism faced by a given area.

DHS Influenza A(H1N1) National Integrated Report

• As of 16 October, the number of Influenza-Like Illness (ILI) deaths in the U.S. was 537 this week compared to 405 deaths reported last week. (Source: HHS/CDC)
• As of 16 October, the most significant impacts of A(H1N1) remain increased ILI outpatient visits and influenza associated pediatric deaths. (Source: HHS/CDC)
• CDC provided updated interim guidance on the use of face masks and N95 respirators for decreasing exposure to A(H1N1). (Source: HHS/CDC)

TOPOFF 2: MSCMC Briefing

•The threat will emulate the same fictional international terrorist organization employed in TO2000:
–Wages coordinated WMD campaign against U.S.
–A role-playing adversary (“Red Team”) will aid in understanding threat tactics, techniques, and procedures.
•Domestically:
–Intelligence build: Threats to targets in U.S.
–Radiological dispersal device (RDD) attack in Seattle.
–Bio-terrorism attack in Illinois.

Federal Remote Sensing Situation Report

This situation report is developed for DHS senior leadership. The report provides overall situational awareness on Federal remote sensing activities supporting emergency management operations in North Dakota, South Dakota and Minnesota. The following information is derived from multiple sources across the Federal remote sensing community. The report will be updated as new information becomes available.

Philadelphia Fusion Update

The mission and purpose of the Fusion Center is to provide a centralized, comprehensive, multi-discipline, information and intelligence sharing statewide enterprise capable of fusing all hazards information to produce indicators, identify threats, and issue warnings to enhance the operational effectiveness and efficiency of the entities involved in prevention, preparedness, response, and recovery activities.

CrossFIRE New York Public Safety & Health Field Intelligence Report

It may be as innocuous and routine as a shift change at your fire station. Perhaps it’s an unusually large-scale event, such as a concert or a famous guest speaker in your city or town. People involved with attack pre-planning may watch intended targets, along with the activities of first responders, to determine security weaknesses, points of entry, traffic patterns, and times of day that offer the most opportunity. Surveillance might include: extensive photography, videotaping, preparing drawings and diagrams, or preparation of charts and graphs to record times and details of events.