United States

(U//FOUO/LES) DHS Report: Assessing ISIL’s lnfluence and Perceived Legitimacy in the Homeland

This Field Analysis Report (FAR) is designed to support awareness and inform enforcement and collection operations of federal, state, and local partners involved in homeland security and counterterrorism efforts. Some of the activities described in the FAR may be constitutionally protected activities and should be supported by additional facts to justify increased suspicion. The totality of relevant circumstances should be evaluated when considering any law enforcement response or action. Our assessment of the level of the Islamic State of Iraq and the Levant’s (ISIL) name recognition since its declaration of a caliphate in June 2014 is based on a review of suspicious activity reporting (SAR) across the United States between 1 January and 30 December 2014, criminal complaints of US persons charged with supporting or seeking to support ISIL, Bureau of Prisons (BOP) intelligence reporting, and DHS I&A open source reporting to assess the influence of ISIL’s messaging campaign within the United States and ISIL’s perceived legitimacy among homegrown violent extremists (HVEs).

DoD-DoJ-CIA-NSA-ODNI Inspectors General Report on the President’s Surveillance Program

A declassified report from 2009 compiled by the offices of the Inspectors General of the Department of Defense, Department of Justice, Central Intelligence Agency, National Security Agency and Office of the Director National Intelligence on the President’s Surveillance Program.

DHS Privacy and Civil Liberties Assessment Report on Executive Order 13636

Section 5 of Executive Order 13636 (Executive Order) requires the DHS Chief Privacy Officer and Officer for Civil Rights and Civil Liberties to assess the privacy and civil liberties impacts of the activities the Department of Homeland Security (DHS, or Department) undertakes pursuant to the Executive Order and to provide those assessments, together with recommendations for mitigating identified privacy risks, in an annual public report. In addition, the DHS Privacy Office and the Office for Civil Rights and Civil Liberties (CRCL) are charged with coordinating and compiling the Privacy and Civil Liberties assessments conducted by Privacy and Civil Liberties officials from other Executive Branch departments and agencies with reporting responsibilities under the Executive Order.

GAO Report: DOD Needs to Enhance Oversight of Military Whistleblower Reprisal Investigations

The Department of Defense (DOD) did not meet statutory military whistleblower reprisal 180-day notification requirements in about half of reprisal investigations closed in fiscal year 2013, and DOD’s average investigation time for closed cases in fiscal years 2013 and 2014 was 526 days, almost three times DOD’s internal 180-day requirement. In 2012, GAO made recommendations to improve investigation timeliness, and DOD has taken some actions to address those recommendations. However, based on a random sample of 124 cases, GAO estimated that there was no evidence that DOD sent the required notification letters in about 47 percent of the cases that DOD took longer than 180 days to close in fiscal year 2013. For cases in which DOD sent the required letter, GAO estimated that the median notification time was about 353 days after the servicemember filed the complaint, and on average the letters significantly underestimated the expected investigation completion date. DOD does not have a tool, such as an automated alert, to help ensure compliance with the statutory notification requirement to provide letters by 180 days informing servicemembers about delays in investigations. Without a tool for DOD to ensure that servicemembers receive reliable, accurate, and timely information about their investigations, servicemembers may be discouraged from reporting wrongdoing.

(U//FOUO) DHS Infrastructure Protection Note: Most Significant Tactics Against the Electricity Subsector

This IP Note is a joint publication of OCIA and the DHS Office of Intelligence and Analysis (I&A) Homeland Counterterrorism Division. It is intended to identify high- consequence tactics, techniques, and procedures (TTPs) used during attacks and incidents that occurred at electrical substations, facilities, and associated electrical infrastructure from 2002 to 2013. The incidents identified in this report have no known nexus to terrorism.

U.S. Army TRISA Report: The Battle for al Qusayr, Syria

Al Qusayr, a village in Syria’s Homs district, is a traditional transit point for personnel and goods traveling across the Lebanon/Syria border. Located in the southern half of the Orontes valley known as the al Assi basin, its proximity to northern Lebanon has made this region an important logistical area for the rebel forces of the Free Syrian Army (FSA) and the Syrian Arab Army (SAA), in what has become known as the Homs front. A typical border region, the al Assi basin’s inhabitants are multinational as well as multi-ethnic with a complex makeup of Sunni, Shia, Alawi, and Christian religions that claim both Lebanese and Syrian Citizenship. Due to the proximity to the border region, and the main north and south highway from Homs to Damascus, al Qusayr is a pivotal point in the Syrian conflict for both the FSA and the pro-regime SAA.

Bureau of Justice Assistance Guide: Cyber Integration for Fusion Centers

This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to integrate information technology, cybersecurity, and cybercrime1 prevention (cyber) intelligence and analytic capabilities. Development of these capabilities will inform local, state, and national detection, mitigation, response, recovery, investigation, and criminal prosecution activities that support and maintain the United States’ cybersecurity.

Department of Justice Inspector General Report on FBI Section 215 Orders 2007-2009

This Executive Summary provides a brief overview of the results of the Department of Justice (Department or DOJ) Office of the Inspector General’s (OIG) third review of the Federal Bureau of Investigation’s (FBI) use of the investigative authority granted by Section 215 of the Patriot Act. Section 215 is often referred to as the “business record” provision. The OIG’s first report, A Review of the Federal Bureau of Investigation’s Use of Section 215 Orders for Business Records, was issued in March 2007 and covered calendar years 2002 through 2005. The OIG’s second report, A Review of the FBI’s Use of Section 215 Orders for Business Records in 2006, was issued in March 2008 and covered calendar year 2006. This third review was initiated to examine the progress the Department and the FBI have made in addressing the OIG recommendations which were included in our second report. We also reviewed the FBI’s use of Section 215 authority in calendar years 2007, 2008, and 2009.

U.S. Air Force Strategic Master Plan May 2015

This Strategic Master Plan (SMP) translates the United States Air Force’s 30-year strategy, America’s Air Force: A Call to the Future, into comprehensive guidance, goals, and objectives. The complete SMP consists of a core narrative, goals, objectives. and four annexes: the Human Capital Annex (HCA), Strategic Posture Annex (SPA), Capabilities Annex (CA), and the Science and Technology Annex (STA). The core SMP will be updated every two years, while the annexes may be revised annually. as required. The SMP’s primary audience includes the Headquarters Air Force (HAF) staff, the Air Force Major Commands (MAJCOMs), and the Core Function Leads (CFLs) that reside within the MAJCOMs who are responsible for planning, progran1ming and budgeting. However, guidance in the SMP also serves as authoritative· direction for all Air Force programs and Flight Plans.

U.S. Army TRISA Threat Tactics Report: Islamic State of Iraq and the Levant

The Islamic State of Iraq and the Levant (ISIL) has risen to prominence as a danger to peace and a regional threat with global impact. This perception comes, in large measure, because of its successes in Syria and then a rapid takeover of northern Iraq. Its military victories are largely due to successful recruiting, intra-insurgent conflict, large cash reserves, and ineffective opponents. There is much to learn from how ISIL is fighting. The ready availability of recruits, many of whom are foreigners attracted to ISIL successes, and large amounts of money for payroll and purchasing war materiel are critical considerations, but it is also important to consider how ISIL is fighting on the ground.

FBI Cyber Notification: Chinese Cyber Espionage Against U.S. Government and Business Networks

The FBI is providing the following information with HIGH confidence: The FBI has obtained information regarding one or more groups of cyber actors who have compromised and stolen sensitive business information from US commercial and government networks through cyber espionage. Analysis indicates a significant amount of the computer network exploitation activities emanated from infrastructure located within China. Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement.

FBI Cyber Notification: FBI, TSA Analyzing Claims of Intrusion Vectors into Onboard Avionics

The FBI and TSA are currently analyzing claims in recent media reports which included statements that critical in-flight networks on commercial aircraft may be vulnerable to remote intrusion. At this time, the FBI and TSA have no information to support these claims but continue to leverage public and private sector partnerships to evaluate potential threats posed by intrusions into a commercial aircraft’s secure networks. The FBI and TSA also continuously monitor and analyze reporting on cyber and technical threats to proactively deter individuals from using remote intrusions to disrupt any portion of the aviation sector, including its business networks, critical navigation and air traffic control signals, and the onboard networks of commercial aircraft.

U.S. Army Special Operations Command Revolutionary and Insurgent Strategy Studies and Casebooks

The Assessing Revolutionary and Insurgent Strategies (ARIS) series consists of a set of case studies and research conducted for the US Army Special Operations Command by the National Security Analysis Department of The Johns Hopkins University Applied Physics Laboratory. The purpose of the ARIS series is to produce a collection of academically rigorous yet operationally relevant research materials to develop and illustrate a common understanding of insurgency and revolution. This research, intended to form a bedrock body of knowledge for members of the Special Forces, will allow users to distill vast amounts of material from a wide array of campaigns and extract relevant lessons, thereby enabling the development of future doctrine, professional education, and training.

Restricted U.S. Army Special Operations Forces Manual

FM 3-18 is the principal manual for Special Forces (SF) doctrine. It describes SF roles, missions, capabilities, organization, mission command, employment, and sustainment operations across the range of military operations. This manual is a continuation of the doctrine established in the JP 3-05 series, ADP 3-05, ADRP 3-05, and FM 3-05.

(U//FOUO) DHS-DOT-EPA Crude Oil Transport by Rail Preparedness Initiatives Guide

Domestic rail shipments of crude oil grew from 9,500 train car loads in 2008 to 435,560 loads in 2013—an increase of nearly 4,500 percent. The growth in shipment volume has increased the threat of spills, explosions, and other effects associated with a train derailment or crash. Recent incidents in Lac Mégantic, Quebec, Lynchburg, Virginia, Mount Carbon, West Virginia, and Galena, Illinois demonstrate the consequences of crude by rail incidents on surrounding communities and natural environments.