United States

(U//FOUO) DHS U.S. Lodging Industry Protective Measures Guide

Preventing terrorism, enhancing security, and ensuring resilience to disasters are core missions of the U.S. Department of Homeland Security (DHS). Accomplishing these missions necessitates building and fostering a collaborative environment in which the private sector and Federal, State, local, tribal, and territorial governments can better protect critical infrastructure and key resources (CIKR). The U.S. Lodging Industry is designated as CIKR because it is essential to the Nation’s economic vitality and way of life. It is critical to the Department’s vision of ensuring a homeland that is safe, secure, and resilient against terrorism and other hazards. As such, DHS developed the Protective Measures Guide for the U.S. Lodging Industry in collaboration with the American Hotel & Lodging Association to provide options for hotels to consider when implementing protective measures. The guide provides an overview of threat, vulnerability, and protective measures designed to assist hotel owners and operators in planning and managing security at their facilities. It provides suggestions for successful planning, organizing, coordinating, communicating, operating, and training activities that contribute to a safe environment for guests and employees. In addition, when contemplating appropriate protective measures to implement, owners and operators should consider their own knowledge of the property‘s operations and vulnerabilities, as well as the general surroundings and its place within the community. When implementing appropriate protective measures, owners and operators should make use of additional resources, from local law enforcement and emergency management agencies to the security resources listed in the appendices of this guide.

(U//FOUO) New York Office of Homeland Security “Crime-Terror Nexus” Report

As authorities have clamped down on traditional financing pipelines, such as charitable front groups, and as terrorist networks have grown increasingly decentralized, terrorists have turned to criminal activities to finance their operations locally. Throughout the world, Al Qaeda, Hamas, and Hezbollah operatives have involved themselves in an array of criminal enterprises, including counterfeiting, drug dealing, cigarette smuggling, credit card fraud, auto theft, kidnapping, extortion, and artifact trafficking. Although criminality is outlawed under Islamic law, the Al Qaeda manual advises that “necessity permits the forbidden.” Reflecting this theory, when Jemaah Islamiyah (JI) operatives questioned whether hacking into foreigners’ bank accounts was acceptable in Islam, JI leader Abu Bakr Bashir reportedly responded, “[if] you can take their blood; then why not take their property?” “Terrorist groups are particularly interested in raising funds through crime because as Lieutenant Colonel David LaRivee, Associate Professor of Economics at the United States Air Force Academy, stated, “many of the agencies responsible for enforcement in these areas do not traditionally focus on counterterrorism nor do they have strong ties with counterterrorist agencies. This means that many indictable criminal activities that support terrorism are overlooked because they seem insignificant when evaluated locally, but are in fact very significant when considered from a broader perspective.” In order to disrupt these financing efforts, “local law enforcement officials will be key,” as the FBI assessed in a May 25, 2005 Intelligence Bulletin.

USAID Islamic Republic of Afghanistan Provincial Media Landscape and Audience Survey Reports

A large-scale research project was thus planned and conducted from March to August 2010. This research included a deep probe into the media sector and the public’s behaviors and expectations. The methodology used to achieved this included a combination of: literature review; direct observations; key informant interviews with most relevant actors involved in the media sector; 6,648 close-ended interviews in more than 900 towns and villages of 106 districts, covering all 34 provinces of the country; an audience survey on more than 1,500 individuals run daily for a week; about 200 qualitative, openended interviews; and 10 community case studies. Such an effort guarantees that results presented here are fairly representative of the Afghan population at large.

(U//FOUO) Massachusetts Commonwealth Fusion Center Hotels/Lodging Industry Warning

As Al-Qa‘ida and other terrorist groups continue to seek innovative ways to conduct attacks and circumvent security procedures, there is concern that the holiday season provides attractive opportunities for terrorists to target the Homeland. This bulletin focuses on lodging facilities that serve large numbers of business and leisure travelers and provide venues for a variety of holiday events.

(U//FOUO) San Diego Fusion Center: Hotels are Potential Bomb Labs

Hotels, motels, and other lodging facilities have been used by extremist individuals and groups as locations to manufacture improvised explosive devices (IEDs) in close proximity to their intended targets. Hotels, specifically rooms with kitchens or kitchenettes, allow these groups or individuals to greatly reduce the potential for a premature detonation. Given the short distance to the intended target the risk of premature detonation during transportation is minimized.

(U//FOUO) CBP Killing or Capturing Cartel Leaders Has No Effect on Drug Trafficking

CBP BorderStat drug seizure information was used to evaluate seizure statistics in relation to the arrest or death of key DTO personnel. The drug seizure data was collected from January 2009 through January 2010. This data was analyzed to determine if the arrest or death of key personnel had a direct impact on the flow of U.S.-bound drugs. This research indicates that there is no perceptible pattern that correlates either a decrease or increase in drug seizures due to the removal of key DTO personnel.

USAID Afghanistan Ministry of Finance/Da Afghanistan Bank Assessment July 2009

Our assessment of the Ministry of Finance (MoF) and Da Afghanistan Bank (DAB) disclosed that the financial management systems and procedures of the MoF and DAB are adequate for purposes of accounting for and managing funds that may be provided directly to the Government of the Islamic Republic of Afghanistan (GIRoA) by USAID. With regard to the Control and Audit Office (CAO), our review disclosed that the CAO has limited capacity to audit donor funds. This limitation, however, could be sufficiently mitigated by providing technical assistance to the CAO and through USAID/Afghanistan’s direct contracting for audit services as well as in-house Financial reviews performed by USAID/Afghanistan staff or RIG-approved audit firms.

U.S. Joint Irregular Warfare Center Irregular Adversaries and Hybrid Threats 2011 Assessment

To understand irregular warfare’s importance to the United States, it is first necessary to understand who is capable of threatening our national security using irregular means. This assessment discusses three types of groups that conduct their conflict with the United States using such means: insurgent groups, violent extremist organizations, and criminal networks. The descriptions we provide here are not intended to be comprehensive definitions, since such definitions would incorrectly imply a consensus among policymakers, officers, and analysts that simply does not exist.

(SSI) TSA Passenger Aircraft Cargo Screening and Security Measures Emergency Amendment

In October 2010, terrorists concealed explosives in cargo bound for the United States. Terrorists continue to pursue such tactics to attack the United States and U.S. interests overseas involving commercial aircraft. The measures described in this Emergency Amendment (EA) are required to detect and deter unauthorized explosives in cargo. When implemented, this EA cancels and supersedes EA 1546-10-07 series. The measures contained in this EA are in addition to the requirements of the foreign air carrier’s TSA-accepted security program and all other EAs currently in effect for its operations.

(U//FOUO) U.S. Forces Afghanistan DCGS-A Problems Mean “Lives Lost” Memo

Intelligence analysts in theater do not have the tools required to fully analyze the tremendous amounts of information currently available in theater. The impact of this shortfall is felt in almost every activity that intelligence supports. Analysts cannot provide their commanders a full understanding of the operational environment. Without the full understanding of the enemy and human terrain, our operations are not as successful as they could be. This shortfall translates into operational opportunities missed and lives lost.

(U//FOUO) DHS LulzSec Bulletin: Hacktivist Groups Target U.S. and Foreign Networks

The National Cybersecurity and Communications Integration Center (NCCIC), through coordination with its partners and monitoring of multiple sources, is tracking reports that members of the hacktivist collectives ‘LulzSec’ and ‘Anonymous’ have combined their efforts and continue to perpetrate cyber attacks targeting U.S. and foreign networks. LulzSec Members have posted statements on the internet claiming the attacks, referred to as ‘Operation AntiSecurity’ (AntiSec), are ‘designed to demonstrate the weakness of general internet security’ and have allowed them to collect massive amounts of data. LulzSec is purported to be a group of former Anonymous members who typically use widely available and crude tools to hijack or deface web pages as a political statement. They also routinely post information regarding planned and ongoing activities on publicly available Internet Relay Chat (IRC) sessions and social networking sites like Twitter. Recent attacks by LulzSec and Anonymous have proven simple Tactics, Techniques and Procedures (TTPs) are often successful, even against entities who have invested a significant amount of time and capital into designing and securing their information networks.

(U//FOUO) LulzSec Release: Arizona Police Say Hezbollah is in Mexico

Literally meaning “Party of God”, Hezbollah began as a militia in 1982 in response to the Israeli invasion of Lebanon. The Shi’a Islamist organization has since grown into a worldwide political and paramilitary network with seats in the Lebanese government, numerous social services programs, long-standing ties with the Syrian and Iranian governments, and an annual income estimated to be anywhere between $200-$400 million. Hezbollah’s main goal is to cast out any form of Israeli rule and/or occupation. Due to the U.S.’ political and financial support of Israel, Hezbollah regards our nation as a viable target. While there is no immediate or confirmed threat to the Tucson area, recent events and the current middleeastern political arena merit a renewed awareness of the group’s capabilities and presence throughout the Western Hemisphere.

ICE List of Specially Designated Countries (SDCs) that Promote or Protect Terrorism

The Department of Homeland Security Office of Inspector General issued a report in May 2011 titled “Supervision of Aliens Commensurate with Risk” that details Immigration and Customs Enforcement’s (ICE) detention and supervision of aliens. The report includes a list of Specially Designated Countries (SDCs) that are said to “promote, produce, or protect terrorist organizations or their members”. The report states that ICE uses a Third Agency Check (TAC) to screen aliens from specially designated countries (SDCs) that have shown a tendency to promote, produce, or protect terrorist organizations or their members and that the purpose of the additional screening is to determine whether other agencies have an interest in the alien. ICE’s policy requires officers to conduct TAC screenings only for aliens from SDCs if the aliens are in ICE custody.

China and Proliferation of Weapons of Mass Destruction and Missiles

Congress has long been concerned about whether U.S. policy advances the national interest in reducing the role of the People’s Republic of China (PRC) in the proliferation of weapons of mass destruction (WMD) and missiles that could deliver them. Recipients of China’s technology reportedly include Pakistan and countries said by the State Department to have supported terrorism, such as Iran. This CRS Report, updated as warranted, discusses the security problem of China’s role in weapons proliferation and issues related to the U.S. policy response since the mid-1990s. China has taken some steps to mollify U.S. and other foreign concerns about its role in weapons proliferation. Nonetheless, supplies from China have aggravated trends that result in ambiguous technical aid, more indigenous capabilities, longer-range missiles, and secondary (retransferred) proliferation. According to unclassified intelligence reports submitted as required to Congress, China has been a “key supplier” of technology, particularly PRC entities providing nuclear and missile-related technology to Pakistan and missile-related technology to Iran.

(U//FOUO) DHS Interagency Security Committee Threats to Federal Facilities Assessment

The DBT Report is a stand-alone threat analysis to be used with the Physical Security Criteria for Federal Facilities: An ISC Standard. The document establishes a profile of the type, composition, and capabilities of adversaries, and it is also designed to correlate with the countermeasures in the compendium of standards and to be easily updated as needed. The DBT is an estimate of the threats that face Federal facilities across a range of undesirable events and based on the best intelligence information, Intelligence Community (IC) reports and assessments, and crime statistics available to the working group at the time of publication. Users of the DBT must consider that undiscovered plots may exist, adversaries are always searching for new methods and tactics to overcome security measures, and the lone-wolf adversary remains largely unpredictable.

USAID Kabul Bank Fraud Report Classified/Unclassified Version Comparison

In May 2011, the USAID Office of the Inspector General published a report on the agency’s supervision and oversight of assistance activities in Afghanistan and the Kabul Bank crisis. This report was quickly withdrawn and the Federation of American Scientists’ Steven Aftergood quoted a USAID official as saying that “At the time our report was issued, it was written utilizing information from non-classified sources. After our report had been issued, USAID subsequently classified two documents that were cited in our report. This action resulted in the report becoming classified and we removed it from the web site.” Now that an “Unclassified” version of the report has been released, a comparison of the two versions reveals the “classified” portions of the report that were concealed by USAID. These sections of the report indicate that a material loss review was commissioned by USAID/Afghanistan and completed in May 2010 indicating that $850 million, or 94 percent of the value of the bank’s outstanding loans, had been fraudulently diverted to “insiders” connected with the bank. The concealed sections also indicate that Deloitte and Da Afghanistan Bank failed to provide this report to USAID for nearly six months.

(U//LES) LulzSec Release: Arizona Fusion Center Marijuana-Mushroom Grow Officer Safety

Historically, indoor Marijuana-Mushroom grows have been “no big deal” to law enforcement as a HazMat or public health concern. However, due to recent Arizona events the Department of Public Safety would like to bring situational awareness to law enforcement (LE) and first responders regarding the hazards associated with responding to indoor marijuana grow locations. This information is provided for officer safety purposes.

ICE Pattern Analysis and Information Collection (ICEPIC) System

The ICE Pattern Analysis and Information Collection (ICEPIC) system was established in 2008 to enable ICE law enforcement agents and analysts to look for non-obvious relationship patterns among individuals and organizations that are indicative of violations of the customs and immigration laws that are enforced by DHS agencies, as well as possible terrorist threats and plots. From these relationships, ICE agents develop specific leads and intelligence for active and new investigations. Identified relationships are also recorded for reuse in subsequent investigative analyses. The information processed by ICEPIC comes from existing ICE investigative and apprehension records systems, as well as immigration and alien admission records systems. ICEPIC includes capabilities that assist investigators in recording results of analyses performed in support of investigations and in capturing additional relevant information obtained from outside sources. The information collected by, on behalf of, in support of, or in cooperation with DHS and its components may contain personally identifiable information collected by other Federal, State, local, tribal, foreign government agencies, or international organizations.

(U//FOUO) LulzSec Release: DHS-FBI Use of Common Chemicals to Make Homemade Explosives

Terrorists can acquire precursor materials legally through a variety of commercial transactions, secondhand from individuals with access to such substances, or through theft. Many precursors can be purchased legitimately and without special authorization from chemical supply stores. They also are available at retail stores that sell beauty supply products, hardware and home improvement materials, groceries, and swimming pool supplies, and are used widely in hospitals, universities, construction sites, industrial facilities, farms, and mining operations.