United States

Pipeline and Hazardous Materials Safety Administration (PHMSA) Gas Distribution Pipeline Safety Report

PHMSA made an adjustment to the expected value of property damage occurring from 2001 through 2005, since some of the property damage was caused by Hurricane Katrina in 2005 (an outlier), which skewed the damages above expectations and which this rule was not designed to mitigate. A more accurate expected value of benefits, perhaps reflective of a longer timeline and taking into account risks and consequences not experienced from 2001 through 2005, would show a higher expected benefit of this rule} It is possible for high-consequence accidents to occur, in which there are a disproportionately large number of casualties (Le., deaths and serious injuries), since a portion of gas distribution piping is located in densely populated areas with schools and businesses containing a large number of people.

(U//FOUO) US Forces-Afghanistan Private Security Contractor Management

OPERATIONS IN AFGHANISTAN REQUIRE ARMED CONTRACTORS (ACS) AND PRIVATE SECURITY COMPANIES (PSCS) TO FULFILL A VARIETY OF IMPORTANT SECURITY FUNCTIONS FOR THE DEPARTMENT OF DEFENSE, DEPARTMENT OF STATE, AND OTHER ENTITIES OPERATING IN THE COMBINED JOINT OPERATIONS AREA – AFGHANISTAN (CJOA-A). INCLUDED IN THESE ARMED CONTRACTORS AND PRIVATE SECURITY COMPANIES ARE TRADITIONAL PRIVATE SECURITY COMPANIES, THE AFGHAN SECURITY GUARDS AND DOD CONTRACTORS WHO ARE ARMED FOR PERSONAL PROTECTION. TRADITIONAL PSC’S PERFORM CONVOY ESCORT, STATIC SECURITY AND PERSONAL SECURITY DETAILS. AFGHAN SECURITY GUARDS (ASG’S) PROVIDE LOCAL STATIC SECURITY TO FOB’S, COP’S AND OTHER INFRASTRUCTURE WITH LOCAL AFGHAN COMPANIES. DOD CONTRACTORS MAY BE ARMED EITHER AS A FUNCTION THE SERVICE THEY PROVIDE OR THEIR OPERATING LOCATION. THESE AC/PSC’S ARE NOT COMBATANTS; THEY EXECUTE SERVICES TO PROTECT PERSONNEL, SUPPLIES AND EQUIPMENT AND FIXED FACILITIES. WEAPONS EMPLOYED BY AC/PSCS ARE FOR PURELY DEFENSIVE PURPOSES ONLY.

(SSI) TSA Prototype RFID Baggage Tracking Report

This report describes the qualification test conducted at Newark International Airport on a prototype RF identification system for use in passenger baggage identification and tracking applications. The system tested was one made by Avante, which operates at 13.56 MHz. It consisted of a freestanding conveyor belt, an HF antenna array, a long-range reader and baggage tags that incorporate an antenna and an integrated circuit.

Bipartisan Policy Center Report on Assessing Threat of Radicalization and Domestic Terrorism

Al-Qaeda and allied groups continue to pose a threat to the United States. Although it is less severe than the catastrophic proportions of a 9/11-like attack, the threat today is more complex and more diverse than at any time over the past nine years. Al-Qaeda or its allies continue to have the capacity to kill dozens, or even hundreds, of Americans in a single attack. A key shift in the past couple of years is the increasingly prominent role in planning and operations that U.S. citizens and residents have played in the leadership of al-Qaeda and aligned groups, and the higher numbers of Americans attaching themselves to these groups. Another development is the increasing diversification of the types of U.S.-based jihadist militants, and the groups with which those militants have affiliated. Indeed, these jihadists do not fit any particular ethnic, economic, educational, or social profile.

Janet Napolitano Speech to the Council on Foreign Relations on “Refocusing” Homeland Security

So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now. And many of the technological tools that expedite communication today were in their infancy or didn’t even exist in 2001. So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries. And the threats we face are by their very nature asymmetrical. Terrorism more often has become privatized violence—does not rely on links, links to an army or to a sovereign state. We often hear that this is what our globalized era looks like, but what is most salient about today’s environment is that it is also networked. And in a networked world, information true and false moves everywhere all the time. And in that networked world, everyone who is part of the network, meaning all of us, can enjoy the tremendous benefits, but also must be ready and willing to learn about and help address the vulnerabilities that come with these benefits. So the team we put on the field needs to be bigger, better networked and better trained. What are the implications for this network world for the Department of Homeland Security? It means that we must continue to take an all-hazards approach to preparedness, meaning we prepare for natural disasters as well as terrorist attacks. We need to comprehend and anticipate an expanding range of threats.

Janet Napolitano Speech to New York First Responders on “Rebuilding” Homeland Security

At the heart of this are fusion centers. Starting with just one in 2006, there are now 72 fusion centers nationwide, serving as focal points for information-sharing among federal, state, local, tribal, and territorial partners. By the end of this year, all 72 fusion centers should be able to analyze information and spot trends in order to effectively share timely intelligence – with local law enforcement, and with DHS, so the information can also be used by others within the Intelligence Community. To support this vision: we’re prioritizing fusion centers in our FY2011 grants, and looking for ways to support them through additional technology and personnel, including the deployment of highly-trained experts in critical infrastructure; we’re deploying experienced DHS analysts to every one of these centers – 64 at last count – and we won’t stop until we have them in every one; and we’re linking them together, and with DHS headquarters, through the classified Homeland Security Data Network.

U.S. Air Force Social Media Guide

This guide provides Air Force Public Affairs professionals with basic social media knowledge needed to maneuver in the online information space and the basic-level tactics explained here should be used to compliment the traditional forms of Public Affairs, to include internal communication, community relations and media relations.

(U//FOUO) FBI Warning: Controversies in Muslim Communities Raise Potential for Violence

THE FBI ASSESSES THAT MULTIPLE ONGOING CONTROVERSIES IMPACTING US MUSLIM COMMUNITIES MAY SERVE TO POLARIZE PUBLIC OPINION AND FUEL ISLAMIC EXTREMIST RHETORIC, BOTH IN THE SHORT- AND LONG-TERM. THE FBI CURRENTLY HAS NO SPECIFIC CREDIBLE INFORMATION THAT INTERNATIONAL TERRORIST ORGANIZATIONS ARE PLANNING ACTION AGAINST THE UNITED STATES BECAUSE OF THESE EVENTS, ALTHOUGH THE POTENTIAL IMPACT OF THESE CONTROVERSIES NECESSITATES CONTINUED VIGILANCE FROM STATE, LOCAL, TRIBAL, AND PRIVATE SECURITY ENTITIES. MULTIPLE CONTROVERSIES GENERATING HEATED RHETORIC OVER THE PAST FEW WEEKS, OPEN SOURCE REPORTING HAS DRAWN ATTENTION TO SEVERAL CONTROVERSIAL EVENTS IMPACTING MUSLIM COMMUNITIES IN THE UNITED STATES. WHILE EACH BEGAN AS A SEEMINGLY LOCAL DISPUTE, ALL ARE NOW RAISING NATIONAL-LEVEL QUESTIONS REGARDING CONSTITUTIONALLY PROTECTED FREEDOMS AND ISLAMS ROLE IN AMERICA. THE PLANNED BURNING OF QURANS BY A NONDENOMINATIONAL CHURCH IN GAINESVILLE, FLORIDA IN RECOGNITION OF THE NINTH ANNIVERSARY OF 11 SEPTEMBER CONTINUES TO ATTRACT ATTENTION. THE CHURCHS LEADER HAS STATED HE DOES NOT THINK THIS EVENT IF IT OCCURS WILL PRECIPITATE VIOLENCE AGAINST HIM OR HIS FOLLOWERS, DESPITE NUMEROUS DEATH THREATS, WARNINGS FROM OTHERS IN THE LOCAL COMMUNITY, INTERNATIONAL MUSLIM COMMUNITY PROTESTS, AND PROTESTS FROM FOREIGN GOVERNMENTS.

(U//FOUO) FBI Warning: Extremists Likely to Retaliate Against Florida Group’s Planned “International Burn A Koran Day”

(U//FOUO) While the FBI has no information to indicate a specific attack has been planned against the United States or US assets in response to the “International Burn a Koran Day” event, the FBI assesses with high confidencea that, as with past incidents perceived as acts of desecration against Islam, extremist actors will continue to threaten or attempt to harm the leaders, organizers, or attendees the event, scheduled for 6:00-9:00pm on 11 September 2010 in Gainesville, Florida. Depending on the continued national and international publicity the event receives, it may also inspire retaliatory attacks against US facilities overseas.

(U//LES) Virginia Fusion Center Mara Salvatrucha 13 Report

Mara Salvatrucha 13, or MS-13, is a transnational, mainly Hispanic, street gang notorious for its adherence to a methodology of extreme violence to enforce fear and establish street credibility. MS-13 diverges from the traditional American street gang model in that it maintains cross border organizational ties, and currently poses a serious threat throughout Central America, Mexico, and Canada, as well as domestically in the United States. In Virginia, the influx of Salvadoran immigrants to the Washington. DC metro area has created the second domestic center for the gang’s American presence. Membership has been documented across the National Capitol Region and in central Virginia, making it the major gang threat to Northern Virginia and a major concern for the Commonwealth as a whole. Demographic change in the Commonwealth, combined with the potential expansion of MS-13 membership to non-Hispanic individuals, constitutes a serious potential threat to public safety.

Nevada State Homeland Security Strategy 2010

The purpose of the Nevada State Homeland Security Strategy (SHSS) is to identify and address statewide priorities to achieve and sustain a strengthened ability to prevent, detect, deter, mitigate against, prepare for, respond to and recover from any natural, manmade and/or technological emergency or disaster up to and including any act of terrorism. The State, through implementation of this strategy, is seeking outcomes that will ensure a safe and secure Nevada through enhanced capabilities in intelligence, surveillance, rapid first response and recovery, the protection of critical infrastructure, and to promote public education and awareness.

(U//FOUO) Defense Intelligence Agency Ammonium Nitrate Threat Warning

(U//FOUO) Terrorists typically favor basic tactics, techniques, and procedures (TTP), off-the-shelf technology and readily available resources when planning and carrying out an attack. While simplistic in effort, these factors can be a lethal and destructive combination. Terrorists also continue to explore innovative attack options that take advantage of overlooked vulnerabilities inherent to the civilian sector. One such vulnerability is transporting bulk quantities of ammonium nitrate (AN) via the road, rail and waterway network. Using a region’s bulk AN transportation network to attack critical infrastructure and urban centers would arguably qualify as a high probability — high casualty/destruction threat scenario.

(U//FOUO) Army Unauthorized Information Dissemination Safeguards in Response to WikiLeaks

(U/FOUO) 1. ALL ARMY ACTIVITIES ARE DIRECTED TO IMMEDIATELY REVIEW AND REVALIDATE WHO HAS SYSTEM ADMINISTRATOR(SA)/POWER USER PRIVILEGES. IN ACCORDANCE WITH (IAW) REF A, THESE PERSONNEL SHALL BE GRANTED THE MINIMUM SET OF PRIVILEGES REQUIRED TO PERFORM THEIR JOBS AND NOTHING MORE. ALL ACTIVITIES MUST ENSURE THAT THEY HAVE IDENTIFIED THESE PERSONNEL AND THAT NO OTHER PERSONNEL HAVE THESE PRIVILEGES. THIS IS KEY TO PRECLUDING UNAUTHORIZED DOWNLOADING AND DISSEMINATION OF SOFTWARE AND INFORMATION.

(U//FOUO) Army WikiLeaks Warning: Classified Public Information

ARMY PERSONNEL MUST BE VIGILANT WITH REGARD TO THE INFORMATION POSTED ON THE WIKILEAKS WEBSITE AND ANY OTHER WEBSITE THAT PURPORTS TO PUBLISH CLASSIFIED INFORMATION. VIEWING, DOWNLOADING OR PRINTING INFORMATION FROM THE WEBSITE COULD POTENTIALLY EXPOSE ARMY NETWORKS TO SENSITIVE DATA OR CREATE SITUATIONS IN WHICH DATA IS IMPROPERLY SAFEGUARDED THUS HARMING OUR ABILITY TO CONDUCT MISSIONS VITAL TO OUR NATIONAL DEFENSE. INFORMATION MARKED AS CLASSIFIED BUT IN THE PUBLIC DOMAIN IS NOT CONSIDERED DECLASSIFIED UNTIL ASSESSED BY THE APPROPRIATE ORIGINAL CLASSIFICATION AUTHORITY AND A DETERMINATION ON ITS DISPOSITION AND CONTINUED CLASSIFICATION IS RENDERED.

(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) August 2010

(U//FOUO) The vast majority of suspicious incidents are not terrorism related. Incident reporting continues to reveal most involve members of the traveling public who do not have intent to cause harm. Intoxicated passengers, people traveling without proper identification or with propaganda materials, and persons with mental health needs are generally not considered suspicious and are generally not included in the weekly summary. However, some incidents are more serious and are reported for situational awareness. Incidents involving notable drug or weapons concealment, possible surveillance, laser targeting of aircraft, possible insider collusion, exploitable gaps in security, and some unusual behaviors at transportation venues are discussed as they may involve technologies or tactics which may lend insight to future terrorist tradecraft.

(U//FOUO) Air Force Wing Leadership Guide to the Air and Space Expeditionary Force (AEF)

The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.

James Lee Website, Manifesto and Reality Show Treatment

This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.

Persistent Threat Detection System (PTDS)

The Persistent Threat Detection System (PTDS) is a tethered aerostat-based system that has been in use by the U.S. Army since 2004. According to the PTDS is equipped with multi-mission sensors to provide long endurance intelligence, surveillance, reconnaissance and communications in support of coalition forces in Afghanistan and Iraq. According to information provided by the manufacturer, Lockheed Martin, the PTDS “leverages a wide-area, secure communications backbone for the integration of threat reporting from multiple available sensors. The system’s sensor integration architecture supports the automated interoperability between tactical/theater surveillance assets and the dissemination of threat data to operational forces to aid interdiction of hostile fires and unconventional threats.”

(U//FOUO) U.S. Army Persistent Threat Detection System (PTDS) Tethered Aerostat Specifications

This document specifies the performance of the Baseline and Tactical Persistent Threat Detection System (PTDS). Section 3 specifies the requirements for the Baseline PTDS and Section 4 specifies the requirements for the Tactical PTDS (T-PTDS). Throughout this specification, the acronym PTDS (without B- or T-) applies to both the Baseline PTDS and Tactical PTDS.

(U//FOUO) DHS “Red Cell” Report: Thinking Beyond Mass Transit For Next Homeland Attack

A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.