United States

(U//FOUO) DHS/FBI “Body Packing” Criminal Tactic with Possible Terrorist Applications

“Body packing” is a well-documented concealment method criminals have used to smuggle drugs or other contraband. Body packing in humans and animals may involve several forms of concealment — including insertion into body orifices, ingestion, or possibly surgical implantation—of illicit items or material inside or hidden on the body to escape detection by security systems and personnel. Terrorists often assign high priority to concealment in planning attacks, and such methods—to include surgical implantation—offer potential means for suicide operatives to deliver improvised explosive devices to targets.

U.S. Air Force Civil Disturbance Manual

This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.

(U//FOUO) FBI Online Marketing Company Mailed Live 9mm Luger Round to Potential Customers

The FBI has been notified that ATX Global, an online marketing company, has mailed approximately 730 envelopes that include a marketing letter with an affixed live 9mm Luger PPU round. The ammo was used to catch the reader’s attention corresponding with the first line, “If you had just One Shot…” This mass mailing did not specifically target gun and ammo businesses.

U.S. State Department International Criminal Justice Sector Assessment Guide

The Criminal Justice Sector Assessment Rating Tool (CJSART) is designed to assist policy makers and program managers to prioritize and administer host-nation criminal justice sectors needing assistance. Once the assistance programs are underway, the CJSART is a systematic tool designed to measure progress and accomplishments against standardized benchmarks. Used in its entirety, the CJSART holistically examines a country’s laws, judicial institutions, law enforcement organizations, border security, and corrections systems as well as a country’s adherence to international rule of law standards such as bilateral and multilateral treaties.

U.S. Military Civil Disturbance Standing Rules for the Use of Force (SRUF)

These template of the Standing Rules for the Use of Force developed by Army North (ARNORTH) and approved by Army Judge Advocate General (JAG) School for commands to follow. The first two templates apply to forces under federal control. The third template is an example State RUF card for National Guard personnel in a SAD or Title 32 status. These templates are taken from the “DoD Defense Support to Civil Authorities Handbook” which includes other information relating to military support operations related to civil disturbances.

Graphic Photo of Kelly Thomas Victim of Fullerton Police Brutality

A photo of a 37-year-old schizophrenic homeless man named Kelly Thomas that was taken in the hospital by his father Ron Thomas, a former Orange County Sheriff’s Deputy. Thomas was fatally beaten by Fullerton Police officers on July 5, 2011 following attempts to search his backpack due to reports of someone “looking into cars” in the area. Multiple videos of the beating exist, including surveillance footage that has yet to be released by the Orange County District Attorney, and a large number of witnesses have come forward confirming the extremely excessive use of force by the six officers that were attempting to subdue Thomas. One officer in particular was reportedly responsible for beating Thomas repeatedly in the back of the head with a Taser until Thomas began to bleed profusely, as well as dropping his knee against the back of Thomas’ head leading to fractures in his face and the crushing of his windpipe. This officer has been identified as Jay Cicinelli, a former LAPD officer who was shot within weeks of leaving the academy and now only has one eye. The beating is now being investigated by the FBI.

(U//FOUO) DHS Rising Copper Thefts Disrupting Homeland Infrastructure

Reported copper thefts from critical infrastructure and key resource (CIKR) sectors in the United States rose at least 50 percent in 2010 compared to the previous year, largely driven by record-high prices for copper. Individuals and criminal organizations have engaged in copper thefts primarily for financial gain. We have seen no indication that terrorists are using copper thefts in the homeland as a tactic to damage or destroy CIKR facilities or to fund terrorist activity.

ICE Facilities Standard CCTV Camera Information and Locations

The SM-CCTV System is a computer network consisting of closed-circuit video cameras, digital video recorders (DVRs), and monitoring capabilities that capture video-only feeds in and around ICE facilities. The purpose of the SM-CCTV System is to help ICE secure and regulate physical access to ICE facilities. The system also serves to enhance officer safety, prevent crimes, and assist in the investigation of criminal acts committed inside and on the perimeter of protected ICE facilities. Video surveillance also supports terrorism prevention and facility protection with its visible presence, and detects and deters unauthorized intrusion at ICE facilities. The SM-CCTV System is planned to be deployed in numerous ICE facilities nationwide.

DHS Terrorist Watchlist Service Privacy Impact Assessment

The Department of Homeland Security (DHS) currently uses the Terrorist Screening Database (TSDB), a consolidated database maintained by the Department of Justice Federal Bureau of Investigation Terrorist Screening Center (TSC) of identifying information about those known or reasonably suspected of being involved in terrorist activity in order to facilitate DHS mission-related functions, such counterterrorism, law enforcement, border security, and inspection activities. DHS and TSC are improving the current method of transmitting TSDB data from TSC to DHS. Through a new service called the “DHS Watchlist Service” (WLS), TSC and DHS will automate and simplify the current manual process. TSC remains the authoritative source of watchlist data and will provide DHS with near real-time synchronization of the TSDB. DHS will ensure that each DHS component system receives only those TSDB records which they are authorized to use under the WLS Memorandum of Understanding and authorized under existing regulations and privacy compliance documentation between TSC and DHS (WLS MOU) and any amendments or modifications thereto. DHS conducted this privacy impact assessment (PIA) because the WLS will maintain a synchronized copy of the TSDB, which contains personally identifiable information (PII), and disseminate it to authorized DHS components.

(U//FOUO) LA-JRIC 82% of Cocaine in U.S. Contaminated by Veterinary De-worming Drug

In April 2011, the US Drug Enforcement Administration (DEA) reported up to 82 percent of all cocaine seized in the United States contained levamisole, a veterinary drug used to de-worm livestock. Law enforcement and public health officials in the United States are warning of serious public health consequences for drug users related to contaminated cocaine use.

(U//FOUO/LES) U.S. Army “We Are Not Your Soldiers” Anti-War Protest Warning October 2009

A named U.S. anti-war group “We are not your Soldiers” announced on their website that October 6, 2009 will be a “National Day of Resistance against Military Recruiters.” While no specific locations have been mentioned where the protests will occur, the group has called on all individuals across the United States to confront military recruiters at schools and in malls and to protest in front of military recruiting centers. The demonstration organizers plan on using students and teachers to rally students to their cause. They are asking students to wear an orange bandanna or ribbon (the color against torture and war) to show there’s a movement. They are asking students and teachers to invite anti-war veterans to talk to their classes or assemblies.

White House Strategy for Countering Violent Extremism in the United States

Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.

(U//FOUO) RAND Corporation Study: Israeli Warfare After the Second Lebanon War

The Armored Corps Association hosted its inaugural conference on November 13–14, 2007, as a forum for discussion of Israeli operations during the July–August 2006 Second Lebanon War. Attendees sought to identify both challenges meriting particular attention due to their implications for the country’s future security and solutions to those challenges. The event drew some 200 active and retired members of the Israeli Defense Forces (IDF), in addition to representatives from the commercial sector, the United States, and the United Kingdom. A list of speakers and brief biographical sketches appear in Appendixes A and B, respectively. Note, however, that selected materials do not appear herein due to some speakers’ requests that they not be included in either the Hebrew or English version of these proceedings.

DHS Bulletin: Anonymous/LulzSec Has Continued Success Using Rudimentary Hacking Methods

This Bulletin is being provided for your Executive Leadership, Operational Management, and Security Administrators situational awareness. The actors who make up the hacker group “Anonymous” and several likely related offshoots like “LulzSec”, continue to harass public and private sector entities with rudimentary exploits and tactics, techniques, and procedures (TTPs) commonly associated with less skilled hackers referred to as “Script Kiddies”. Members of Anonymous routinely claim to have an overt political agenda and have justified at least a portion of their exploits as retaliation for perceived ‘social injustices’ and ‘freedom of speech’ issues. Attacks by associated groups such as LulzSec have essentially been executed entirely for their and their associates’ personal amusement, or in their own hacker jargon “for the lulz”.

(U//FOUO) DHS Red Cell Report: How Terrorists Might Infect U.S. Poultry With Bird Flu

This report explores how terrorists or other non-state adversaries could potentially facilitate an avian influenza outbreak within the United States. The report was primarily intended to assist the Secretary of Homeland Security, Chief Intelligence Officer, Deputy Assistant Secretary, and Chief Medical Officer as they consider the implications of avian influenza to the Homeland. The scenarios explored in this paper are speculative and meant only to broaden the scope of thinking. They are not based on specific evidence or intelligence about terrorists’ plans and capabilities, but are considered scientifically feasible, according to experts that were interviewed.

(U//LES) FBI Bloods Street Gang Communicating Through Playstation Network (PSN)

FBI New York case information indicates that Bloods gang members in the Bronx, NY are utilizing PlayStation Network (PSN) to communicate each other while on house arrest. Identified Bloods will post their “PSN tag name”, a self-generated ID used to identify individual users, on social networking web-sites and invite others to connect with them using their PlayStation 3 gaming system. These individuals have been observed sharing “tag names” with each other and discussing intentions to communicate through PSN.

(U//FOUO) DHS Utility-Sector Employee Insider Threats Warning

Insiders often possess detailed operational and system-security knowledge, as well as authorized physical and systems access to utilities. Insiders can be employees, contractors, service providers, or anyone with legitimate access to utility systems. They often are self-motivated, know system security measures, and raise no alarms due to their authorized systems access. With knowledge of and access to a utility’s network, malicious actors could seize control of utility systems or corrupt information sent to plant operators, causing damage to plant systems and equipment. Systems and networks used by utilities are potential targets for a variety of malicious cyber actors. Threat actors who target these systems may be intent on damaging equipment and facilities, disrupting services, stealing proprietary information, or other malicious activities. The greater the individual’s knowledge and authorized systems access, the greater risk the individual poses. Furthermore, any individual with access to a plant’s systems could unwittingly or inadvertently introduce malware into a system through portable media or by falling victim to socially engineered e-mails.

White House Strategy to Combat Transnational Organized Crime July 2011

Transnational organized crime refers to those self-perpetuating associations of individuals who operate transnationally for the purpose of obtaining power, influence, monetary and/or commercial gains, wholly or in part by illegal means, while protecting their activities through a pattern of corruption and/or violence, or while protecting their illegal activities through a transnational organizational structure and the exploitation of transnational commerce or communication mechanisms. There is no single structure under which transnational organized criminals operate; they vary from hierarchies to clans, networks, and cells, and may evolve to other structures.

GAO Federal Reserve $16 Trillion Emergency Bailout Loans Audit Report

On numerous occasions in 2008 and 2009, the Federal Reserve Board invoked emergency authority under the Federal Reserve Act of 1913 to authorize new broad-based programs and financial assistance to individual institutions to stabilize financial markets. Loans outstanding for the emergency programs peaked at more than $1 trillion in late 2008. The Federal Reserve Board directed the Federal Reserve Bank of New York (FRBNY) to implement most of these emergency actions. In a few cases, the Federal Reserve Board authorized a Reserve Bank to lend to a limited liability corporation (LLC) to finance the purchase of assets from a single institution. In 2009 and 2010, FRBNY also executed large-scale purchases of agency mortgage-backed securities to support the housing market. The table below provides an overview of all emergency actions covered by this report. The Reserve Banks’ and LLCs’ financial statements, which include the emergency programs’ accounts and activities, and their related financial reporting internal controls, are audited annually by an independent auditing firm. These independent financial statement audits, as well as other audits and reviews conducted by the Federal Reserve Board, its Inspector General, and the Reserve Banks’ internal audit function, did not report any significant accounting or financial reporting internal control issues concerning the emergency programs.