This book will familiarize Warfighters and leaders with the MRAP vehicle, its capabilities and limitations, and planning considerations for its employment. The information found in this book does not replace or override any safety precautions, warnings, notes in existing technical and/or operator manuals, or unit standing orders or operating procedures.
United States
Department of Homeland Security
(U//FOUO) DHS Bulletin: Anonymous Hacktivist Threat to Industrial Control Systems (ICS)
The loosely organized hacking collective known as Anonymous has recently expressed an interest in targeting industrial control systems (ICS). This product characterizes Anonymous’ capabilities and intent in this area, based on expert input from DHS’s Control Systems Security Program/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in coordination with the other NCCIC components.
Pennsylvania
(U//FOUO) Pittsburgh Office of Emergency Management “Occupy Pittsburgh” Threat Assessment
This product was created in response to a request for information (RFI) concerning impacts to the Pittsburgh area from the planned Occupy Pittsburgh set for October 15, 2011. This product is intended to provide the private sector and first responders information on the event and appropriate prevention and response measures. Information in this report was collected through open source materials only. Open sources used in this product may include bias and misleading information. This product is an update to a previous assessment disseminated on October 6, 2011.
Department of Homeland Security
(U//FOUO) DHS Bulletin: “Anonymous” and Associated Hacker Groups Deploying New Cyber Attack Tools
The hacker collective known as ‘Anonymous’ has successfully attacked a wide range of public and private sector entities since 2003 with relatively crude tools. Historically, they rely on tools such as the Low Orbit Ion Cannon (LOIC) or Botnets to deny access to websites, or hijack or deface web pages and post quasi-political statements, or perform other malicious activity. Since many of these older tools made it relatively easy for law enforcement and other government forces to identify the source of an attack and then arrest the perpetrator, Anonymous members may have recognized a need to have more advanced tools that offered a lesser degree of exposure. They recently claimed to have developed and possibly employed several new cyber attack tools for use in their self-proclaimed ‘internet civil disobedience’ campaigns. The NCCIC, coordinating with several of its partners, believes there are at least four new tools being shared among and employed by Anonymous members: #RefRef, Apache Killer, Anonware, and Universal Rapid Gamma Emitter (URGE).
Federal Bureau of Investigation
(U//FOUO) FBI Anonymous’ Participation in “Day of Rage” Protest May Coincide with Cyber Attack
The FBI assesses that the hacktivist group Anonymous is likely to participate in the “Day of Rage” protest scheduled for 17 September 2011 in New York City‟s financial district. While the extent of group members‟ participation in the event is unknown, in late August 2011 Anonymous endorsed the event through propaganda consisting of a video posted on YouTube and a campaign poster, as well as references in their Twitter accounts. In the past, Anonymous has been involved in physical protests that coincided with planned cyber attacks. This could indicate an intention to conduct a cyber attack in conjunction with the “Day of Rage” protest.
Corporate, New York
Zuccotti Park Owner’s Letter to Police Commissioner Raymond Kelly on Occupy Wall Street
As you know, for over three weeks, Zuccotti Park (the “Park”) has been used by “Occupy Wall Street” and other protesters as their home base. The Park is owned by a Brookfield affiliate and was recently renovated at Brookfield’s considerable expense as an amenity for the general public. It is intended to be a relaxing tree-filled oasis in the midst of the hustle and bustle of Lower Manhattan. We fully support the rights of free speech and assembly, but the manner in which the protesters are occupying the Park violates the law, violates the rules of the Park, deprives the community of its rights of quiet enjoyment to the Park, and creates health and public safety issues that need to be addressed immediately. Within the Park, the protesters have set up living spaces with tarpaulins, mattresses, sleeping bags, tables, bookshelves, gasoline-powered generators and other items that arc inconsistent with the rules and normal public use of the Park. At all hours of the day and night, protesters arc sleeping on benches and walkways, blocking normal pedestrian access to the general public and preventing cleaning and maintenance workers from performing necessary upkeep. When not blocked by protesters, the walkways throughout the Park are blocked by the various items and equipment brought to the Park by the protesters.
California, Intelligence Fusion Centers
Northern California Regional Intelligence Center (NCRIC) Overview Presentation
Northern California Regional Intelligence Center presentation on “Fusion Centers Information Sharing, Analysis and Coordination” from October 2011.
Government Accountability Office
GAO Report: DHS Data Mining Systems Do Not Ensure Protection of Privacy
As part of a systematic evaluation framework, agency policies should ensure organizational competence, evaluations of a system’s effectiveness and privacy protections, executive review, and appropriate transparency throughout the system’s life cycle. While DHS and three of its component agencies—U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, and the U.S. Citizenship and Immigration Services—have established policies that address most of these key policy elements, the policies are not comprehensive. For example, DHS policies do not fully ensure executive review and transparency, and the component agencies’ policies do not sufficiently require evaluating system effectiveness. DHS’s Chief Information Officer reported that the agency is planning to improve its executive review process by conducting more intensive reviews of IT investments, including the data-mining systems reviewed in this report. Until such reforms are in place, DHS and its component agencies may not be able to ensure that critical data mining systems used in support of counterterrorism are both effective and that they protect personal privacy.
Intelligence Fusion Centers, Texas
(U//LES) El Paso Intelligence Center Bulletins: Drug-Smuggling Ambulance, Cocaine in Tin Cans, Contaminated Pot
Three bulletins from the El Paso Intelligence Center on a drug-smuggling ambulance, cocaine hidden in tin cans and pot contaminated with Halon.
United States
Iran-Linked Saudi Arabian Ambassador Assassination Plot Criminal Complaint
Criminal complaint issued in the Iran-linked plot to assassinate the Saudi Arabian ambassador to the United States, USA vs. MANSSOR ARBABSIAR a/k/a “Mansour Arbabsiar” and GHOLAM SHAKURI a/k/a “Ali Gholam Shakuri”.
Massachusetts
Boston Police Department “We Respect Your Rights” Notice to Occupy Boston Protesters
The full text version of a notice first tweeted, then physically handed out to protesters at the Occupy Boston Rally reminding them that the Boston Police Department “Respects Your Right to Peacefully Protest.” The note should be juxtaposed against the events which later transpired, including a large number of arrests well documented in photos and video.
California
(U//LES) Los Angeles Joint Drug Intelligence Group Diverted Pharmaceuticals & Gang Distribution
Los Angeles Joint Drug Intelligence Group Intelligence Bulletin on Diverted Pharmaceuticals & Gang Distribution from March 2010.
Oklahoma, U.S. Army
(U//FOUO) U.S. Army North Crips Targeting Uniformed Soldiers in Retaliation for Oklahoma Murders
On 21 Sep 11, USACIDC reported the CRIPS have put out an order to shoot any Solider in uniform on sight in retaliation for the shooting of their members by Soldiers earlier in the week. The Lawton Oklahoma Police Department has confirmed the CRIPS have threatened to kill soldiers in uniform. The threat stems from when the soldiers, in retaliation for drug rip off, entered the off-post residence of the CRIPS, robbed and subsequently shot some of the CRIPS members. Three of the victims were identified as members of the “107 Hoover CRIPS.”
White House
White House “WikiLeaks” Executive Order on Improving Security of Classified Networks
This order directs structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks that shall be consistent with appropriate protections for privacy and civil liberties. Agencies bear the primary responsibility for meeting these twin goals. These structural reforms will ensure coordinated interagency development and reliable implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and minimum standards for sharing classified information both within and outside the Federal Government. These policies and minimum standards will address all agencies that operate or access classified computer networks, all users of classified computer networks (including contractors and others who operate or access classified computer networks controlled by the Federal Government), and all classified information on those networks.
Department of Homeland Security
DHS Social Network Analysis, Behavioral Threat Detection, Biometrics Presentation
DHS Human Factors/Behavioral Sciences Division presentation on social network analysis, behavioral threat detection and biometrics programs as of May 2009.
Department of Homeland Security
DHS Future Attribute Screening Technology Mobile Module (FAST M2) Overview
Overview presentation from 2007 regarding the Future Attribute Screening Technology Mobile Module (FAST M2), a system for identifying potential threats via behavioral analysis.
Customs and Border Protection
(U//FOUO/LES) Customs and Border Protection Bandidos Motorcycle Club Global Map
Customs and Border Protection Bandidos Motorcycle Club global distribution map produced in May 2010.
Department of the Treasury, Federal Reserve
Confidential Draft of U.S. Treasury “Volcker Rule” Restrictions on Proprietary Trading With Hedge Funds
The OCC, Board, FDIC, and SEC (individually, an “Agency,” and collectively, “the Agencies”) are requesting comment on a proposed rule that would implement Section 619 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (“Dodd-Frank Act”) which contains certain prohibitions and restrictions on the ability of a banking entity and nonbank financial company supervised by the Board to engage in proprietary trading and have certain interests in, or relationships with, a hedge fund or private equity fund.
Department of Homeland Security
DHS Bomb-Making Materials Awareness Program (BMAP) Law Enforcement and Private Sector User Guides
Department of Homeland Ssecurity Bomb-Making Awareness Program (BMAP) Law Enforcement and Private Sector User Guides along with accompanying promotional posters from 2009.
Department of Homeland Security
(U//FOUO) DHS HUJI Claims Responsibility for India High Court Bombing
According to multiple media reports, on 7 September an explosion occurred inside the reception area of the Delhi High Court in New Delhi, India at approximately 10:00am local time. The blast killed at least 11 people and injured some 76 others. Indian authorities reported to the press that the explosives were inside a briefcase left in a reception area in between the security gates of the High Court. India’s National Security Guard Director indicated that the device contained ammonium nitrate, which was also used in the most recent bomb against the court complex on 25 May. Harakat-ul-Jihad al-Islami (HUJI) claimed responsibility for the blast in an e-mail message and demanded that India repeal the death sentence of Afzal Guru, who was convicted of attacking the Indian Parliament building in 2001 and is awaiting execution.
California
Los Angeles City Council Resolution in Support of Occupy LA
Los Angeles City Council Resolution unanimously passed October 5, 2011 in support of Occupy LA and the Occupy Wall Street protests.
Corporate, United States
Pujo Committee “Money Trust” Wall Street Banking Cartel Investigation 1912-1913
For those who wish to understand the true nature of our current financial system, the Pujo Committee’s 1912-1913 investigation of the “Money Trust” is essential reading. The Committee identified a concentrated group of Wall Street bankers who operated a sophisticated financial network unified by 341 interlocking directorships held in 112 corporations valued at more than $22 billion in resources and capitalization exerting significant control and influence over the U.S. economy and monetary system. The companies and individuals comprising this network were primarily agents of the Morgan and Rockefeller banking empires which dominated U.S. finance following the “Industrial Revolution”. The Committee names a number of prominent banking institutions as participating in this system including J.P. Morgan & Co., First National Bank of New York, Kuhn Loeb & Co. and individuals such as Paul Warburg, Jacob H. Schiff, Felix M. Warburg, Frank E. Peabody, William Rockefeller and Benjamin Strong, Jr. Understanding this system of overlapping financial networks and how those networks are used to dominate utilities, railroads, banking and the U.S. financial infrastructure throughout much of the twentieth century is key to the proper analysis of our current economic situation and the influence that the “Money Power” wields over global politics.
Customs and Border Protection, Texas
(U//FOUO/LES) Customs and Border Protection $1.7 Million Marijuana School Bus Seizure
U.S. Customs and Border Protection Laredo Sector Intelligence Unit seizure of $1,757,665 of marijuana hidden in a cloned school bus from October 2009.
Department of Health and Human Services
U.S. Postal Service Model for the Delivery of Biological Attack Countermeasures
National Postal Model for the Delivery of Medical Countermeasures developed following Executive Order 13527 “Establishing Federal Capability for the Timely Provision of Medical Countermeasures Following a Biological Attack”.
U.S. Forces Iraq
(U//FOUO) U.S. Forces Iraq Base Transition Smart Book 2011
This is the Final Edition of the USF-I Base Transition Smartbook. Updated from the October 2010 edition, it provides a single-source, quick reference guide for the base transition process, and captures/de-conflicts updated and additional base transition guidance through the use of bold and strike-through text. The information in this Smartbook summarizes base transition Standard Operating Procedures (SOP), published US Forces-Iraq (USF-I) orders/ guidance, and lessons learned from past base transitions to facilitate honorable and successful transitions of remaining non-enduring bases and enduring sites. The USF-I Base Transition Smartbook is the guiding document for transitioning USF-I bases in the Iraq Joint Operations Area (IJOA) to the Government of Iraq (GoI). Guidance is intended to be flexible enough to fit a range of situations, and to ensure a base is transferred properly, in accordance with applicable laws and regulations. The Base Transition Smartbook is located on the USF-I J7 website. Revisions are summarized below and highlighted throughout the text.