US-CERT is aware of recent open source reports regarding possible counterfeit Cisco routers. US-CERT originally reported this activity in April 2006. Please note that US-CERT is re-releasing that information in this report for situational awareness purposes due to the new open source reporting and to provide methods for determining if a router is counterfeit.
United States
Congressional Research Service
Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress
The Aegis ballistic missile defense (BMD) program, which is carried out by the Missile Defense Agency (MDA) and the Navy, gives Navy Aegis cruisers and destroyers a capability for conducting BMD operations. Under current MDA and Navy plans, the number of BMD-capable Navy Aegis ships is scheduled to grow from 20 at the end of FY2010 to 38 at the end of FY2015. MDA and Navy plans also call for an increasing portion of the Navy’s BMD-capable Aegis ships to be equipped with newer and more capable versions of the Aegis BMD system.
California
California Computer And Technology Crime High Tech Response Team (CATCH) Overview
California Computer And Technology Crime High Tech Response Team (CATCH) Overview, December 2003.
Texas
Apple iPhone Password Work-Around
If you encounter an Apple iPhone where the phone is locked with a Passcode, keep in mind the hand set only allows 5 Passcode attempts before locking out phone. This work-around is limited to iPhones with firmware versions 1.1.2 and earlier. The workaround was disabled on version 1.1.3 in February 2008. Data can be retrieved from the SIM card as well as from the phone handset. To remove the SIM card, place a paperclip in the hole at the top of the phone. Force must be applied to get the SIM holder to pop-up. The SIM card will be inside a plastic tray and can be easily removed. Process the SIM card as normal.
United States
Rapid Enforcement Allied Computer Team (REACT) Task Force
The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County District Attorney’s Office designated as the lead agency. The REACT Task Force is one of five in the State of California and authorized under California Penal Code 13848. All Agents of the React Task Force are either California Peace Officers and/or U.S. Federal Agents.
California
2008 High Technology Crime In California: Annual Report to the Governor & Legislature
California is home to many of the largest and most advanced technology companies in the world. We also have most of our citizens online in ever increasing amounts. In 2008, 75% of Californians reported that they use a computer at home, work, or school, and 70% use the Internet. Accompanying such an explosion in the telecommunication and Internet penetration has been a concomitant rise in technology crime. Our experience has taught us that technology and computers have given stalkers, pedophiles, destructive disgruntled employees, thieves, scam artists and those seeking infamy a new forum in which to ply their trade and cause misery.
California, Federal Bureau of Investigation, U.S. Secret Service
Rapid Enforcement Allied Computer Team (REACT) Task Force Funding and Progress Report
Rapid Enforcement Allied Computer Team (REACT) Task Force Funding and Progress Report including personnel roster, January 2010.
U.S. Air Force
U.S. Air Force SKL Wireless & Black Data Distribution System Overview
FOUO U.S. Air Force Cryptologic Systems Group SKL Wireless & Black Data Distribution System Overview, July 2009.
U.S. Air Force
U.S. Air Force SKL (Simple Key Loader) Instruction Guide
FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
Department of Justice
NDIC Money Laundering in Digital Currencies Report
Digital currencies combine the intrinsic value of gold and other precious metals as well as the designated value of national currencies with the worldwide reach of the Internet to create an ideal mechanism for international money laundering. Users can anonymously fund digital currency accounts, send those funds (sometimes in unlimited amounts) to other digital currency accounts worldwide, and effectively exchange the funds for foreign currencies—often while bypassing U.S. regulatory oversight.
U.S. Central Command
U.S. Central Command “Monitoring the Tactical Network”
FOUO U.S. Central Command “Monitoring the Tactical Network” Brief, April 13, 2010.
Department of Homeland Security
(U//FOUO) DHS Acutely Toxic Chemical List
(U//FOUO) DHS Acutely Toxic Chemical List, September 2008.
U.S. Northern Command
USNORTHCOM General Population Evacuation by Air
USNORTHCOM General Population Evacuation by Air Brief from March 17, 2009.
FEMA
Authorized FEMA and Contracted Inspector Identification Badges Guide
When a Disaster is declared, FEMA employees and Contracted Inspectors will be working in the affected area. In order to help you identify authorized FEMA staff and Contracted Inspectors, we are providing samples of authorized FEMA Identification Credentials. If there is any question regarding the authenticity of someone claiming to be a FEMA employee, inspector or representative, please contact us as soon as possible.
Congressional Research Service
Homeland Emergency Preparedness and the National Exercise Program
An emergency preparedness and response program provides resources and support to individuals and communities that might be affected by a broad range of disruptive incidents. These incidents may be caused by natural phenomena such as severe weather, fires, earthquakes, tsunamis, or disease outbreaks. Incidents might result from human activity as well, and could include accidents, criminal acts, terrorism, or other attacks. Concerns have been raised whether current preparedness and response policies and capacities are sufficient.
Congressional Research Service
Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges
Interruptions of congressional operations by incidents such as episodic computer virus infections, or the anthrax contamination that took place during autumn 2001, have demonstrated the importance of congressional continuity of operations (COOP) planning. COOP planning refers to the internal effort of an organization to assure that the capability exists to continue essential functions in response to a comprehensive array of potential operational interruptions. For Congress, COOP planning is related to a second level of preparedness, continuity of government (COG) planning. Congressional COG planning focuses on ensuring that Congress is able to carry out its legislative responsibilities under Article I of the Constitution.
U.S. Army
U.S. Army Game Studio Serious Games Development
U.S. Army Game Studio Serious Games Development Brief, March 29, 2010.
U.S. Army
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT)
U.S. Army Mobile Counter-IED Interactive Trainer (MCIT), April 2010.
U.S. Air Force
Angel Thunder 2010
Department of Justice
Intelligence-Led Policing: The New Intelligence Architecture
Intelligence operations have been reviewed, studied, and slowly but steadily transformed. Most efforts have focused on reorganizing intelligence infrastructures at the federal level; however, corresponding efforts have been made to enhance state and local law enforcement intelligence operations. Such enhancements make it possible for state and local law enforcement agencies to play a role in homeland security. Perhaps more important, improvements to intelligence operations help local law enforcement respond to “traditional” crimes more effectively.
Department of Homeland Security
DHS Biosecurity Infrastructure Protection Assessments and Activities Brief
FOUO DHS Biosecurity Infrastructure Protection Assessments and Activities Brief, August 2009.
FEMA
FEMA Composite Enterprise Architecture Overview
FEMA Composite Enterprise Architecture Overview “The Direction of FEMA’s EA”, June 8, 2009.
FEMA
FEMA Exercise Modeling & Simulation Briefing
FEMA Exercise Modeling & Simulation Briefing from the National Exercise Simulation Center (NESC), March 4, 2010.
FEMA
(U//FOUO) 2009 Presidential Inaugural NSSE Brief
FEMA 2009 Presidential Inaugural NSSE Brief, January 14, 2010.
Colorado
Colorado Multiyear Training and Exercise Plan 2010-2012
The purpose of the Multiyear Training and Exercise Plan (TEP) is to provide a follow-on companion document to the Colorado Homeland Security Strategy and the priorities set by the State Improvement Planning Workshop. It is a living document that will be updated and refined annually. The Multiyear TEP provides a roadmap for Colorado to follow in accomplishing the priorities described in the Homeland Security Strategy through effective trainings and exercises.