United States

NYPD Domain Awareness System Public Security Privacy Guidelines

In order to help ensure public safety and security and to detect, deter, and prevent potential terrorist activities, the New York City Police Department (NYPD) has developed a networked Domain Awareness System. The Domain Awareness System not only supplies critical supplemental assistance to officers’ ongoing security and public safety efforts, but also enhances the collaborative nature of those efforts by leveraging the resources of the private sector and other City agencies. Given the ongoing threat of terrorist attack, the Domain Awareness System is an important part of the NYPD’s integrated approach to providing protection for those who work in, live in, and visit New York City.

(U//FOUO) Open Source Center Master Narratives Country Report: Syria

Understanding master narratives can be the difference between analytic anticipation and unwanted surprise, as well as the difference between communications successes and messaging gaffes. Master narratives are the historically grounded stories that reflect a community’s identity and experiences, or explain its hopes, aspirations, and concerns. These narratives help groups understand who they are and where they come from, and how to make sense of unfolding developments around them. As they do in all countries, effective communicators in Syria invoke master narratives in order to move audiences in a preferred direction. Syrian influencers rely on their native familiarity with these master narratives to use them effectively. This task is considerably more challenging for US communicators and analysts because they must place themselves in the mindset of foreign audiences who believe stories that — from an American vantage point — may appear surprising, conspiratorial, or even outlandish.

Restricted U.S. Military Multi-Service Air Operations in Maritime Surface Warfare Manual

This publication provides multi-Service TTP for the seamless integration of air assets during the conduct of maritime surface warfare. The maritime domain is defined as the oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the littorals. AOMSW is intended to support the joint force commander’s (JFC’s) objectives by providing capabilities/forces in support of joint maritime operations. The end state of this publication is a streamlined support process for maritime surface warfare within the joint force maritime component commander’s (JFMCC’s) area of operations (AO).

(U//FOUO) New Jersey Fusion Center Incident Assessment: Mass Shooting at Colorado Movie Theater

James Eagan Holmes, a 24-year-old male, allegedly shot and killed12 people and wounded approximately 38 more after opening fire in a crowded movie theater during a showing of the new Batman movie, “The Dark Knight Rises.” The shooting erupted during the midnight showing at the multiplex in Aurora, Colorado, not far from Denver, where a large crowd had gathered, some dressed as characters from the highly anticipated Batman sequel. Holmes began the attack by throwing two gas canisters into the theater after entering through an exit door that had been propped open. Witnesses stated many assumed it was a promotional stunt related to the movie and did not initially react. After both canisters had deployed, Holmes commenced shooting into the crowd.

DHS Infrastructure Protection Note: Performance Venues – Indicators of Violence and Protective Measures

Performance venues include theaters, concert halls, auditoriums, and amphitheaters, ranging in size and function from small neighborhood movie theaters or community playhouses to high-capacity venues in major metropolitan areas. Performance venues are relatively open-access, limited egress facilities and have been successfully targeted in the past.

(U//FOUO) FBI Counterfeit and Substandard Lithium Batteries Pose Serious Health Risks to Law Enforcement

The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.

(U//FOUO) U.S. Army Soldier Surveillance: Fundamentals of Tactical Information Collection

This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning and detainee handling, briefing, debriefing, and reporting in offensive, defensive, stability operations, and civil support operations. Most of the text was developed specifically for patrols and to conduct traffic control points (TCPs) or roadblocks, and other missions where Soldiers will interact with the local populace including site exploitation and tactical questioning after a planned or hasty raid. The term “patrol” could reflect a platoon, section, fire team, or other special-purpose group given a mission as listed above.

Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities

The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.

Special Inspector General Final Forensic Audit of Iraq Reconstruction Funds

SIGIR audits, inspections, and investigations have found serious weaknesses in the government’s controls over Iraq reconstruction funds that put billions of American taxpayer dollars at risk of waste and misappropriation. The precise amount lost to fraud and waste can never be known, but SIGIR believes it is significant. As of June 30, 2012, SIGIR audit reports had questioned $635.8 million in costs, and SIGIR Investigations, working with other agencies, had resulted in $176.84 million in fines, forfeitures, and other monetary results.

(U//FOUO) New Jersey Fusion Center: Attack on Afghan Resort Demonstrates Vulnerability of Hotels

A recent terrorist attack on a resort hotel in Afghanistan demonstrates the vulnerability of hotels and other “soft” targets to these types of assaults. On June 22, 2012, Afghan forces retook a lakeside hotel outside of Kabul from a Taliban suicide assault team that was holding dozens of civilian hostages. The Taliban claimed credit for the attack, calling the hotel and others near it a “hub of obscenity and vulgarity.”

DHS-University of Maryland Study: Profiles of Perpetrators of Terrorism – United States (PPT-US)

The objective of this project is to create and manage a comprehensive dataset of groups and movements that have used terrorist tactics within the United States – at some point between 1970 and 2007 – to achieve political, religious, social or economic goals. These data will be integrated into the Terrorist and Extremist Violence in the United States (TEVUS) database in the near future as part of the larger Integrating U.S. Security Databases (IUSSD) project.

U.S. Northern Command Homeland Defense/Civil Support Capabilities Assessment Study Plan

This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).

U.S. Army Military Police School Enemy Prisoner of War and Civilian Internee Policy and Operations Courses

As a military police supervisor, you may become involved with EPW/CI operations in a variety of ways. The Army Military Police have the primary responsibility for EPW/CI operations for the Department of Defense. In any form of hostilities in which the United States is involved, persons that are captured or surrender who cannot be readily classified will be treated as EPW/CI until such time as they are reclassified by competent authority. This includes low intensity conflicts, as well as declared wars. In some cases, you may find yourself as an advisor to other countries. You will be expected to encourage those whom you are advising to afford the same treatment to their prisoners.

U.S. Army Military Police School Detainee Policy, Procedures, and Operations Course

This lesson describes detainees captured or detained by the US Armed Forces and provides key definitions. These definitions explain the different personnel categories that a Military Police (MP) commander may be required to handle, protect, account for, and ensure are treated according to established laws, regulations, and international agreements. For the purpose of this lesson, the broader use of the word “detainee” applies to Enemy Prisoners of War (EPWs), Civilian Internees (CIs), Retained Persons (RPs), and other classification terms for US-controlled persons unless otherwise specified. Use of specific detainee classifications does not preclude protections granted according to Geneva Conventions I through IV (1949), Department of Defense (DoD) Directive 5100.77, or protections promulgated under paragraph 1-5 of Army Regulation (AR) 190-8. MP leaders and Soldiers conducting Internment/Resettlement (I/R) operations must maintain task proficiency for each category. For the purposes of this subcourse, detainee operations are defined as operations that take or keep selected individuals in custody as a result of military operations to control their movement and activity and/or gain intelligence.

DARPA Fog Computing Leak Prevention Software Design Report

This is the design documents for the Allure Defender system. This document is a high level design and API of the components that make up the Allure Defender system. We outline all the high-level pieces and then the individual components, their behaviors, expected input/outputs, and relationships. We will discuss specific implementation and design choices and languages and libraries that will be used. In addition we will cover specific user cases and illustrate some running examples. Last we refer to a running system which implements many of the components we cover in the document.

(U//FOUO) DHS-FBI Bulletin: Potential Use of Cold Packs in Improvised Explosives

Cold packs, packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for improvised explosives. The chemicals are packaged in prill form, and can be used directly or ground into powder when being used in homemade explosive production. Five hundred packs would yield 30 to 90 pounds of precursor material for use in an improvised explosive device (IED).