352 search results for "cell"

(U//FOUO) U.S. State Department Social Media Landscape: Belgium

The social media landscape in Belgium has grown considerably over the last few years and Belgians appear to be increasingly proactive in their social media endeavors as Internet access is obtainable from many electronic sources. All generations, young and old have familiarized themselves with the cell phone, iphone, Blackberry and Netbook usage in order to access social media sites while on the move. The rise in Internet access via mobile devices has created an abundance of new social media users.

(U//FOUO) U.S. State Department Social Media Landscape: Spain

The social media landscape in Spain is relatively mature since reading blogs and engaging on social networks is now a regular part of daily life for many people, particularly teenagers and young professional people. As in most other European countries, social media participation is higher in large cities, especially Madrid which is seen as the center of the technology and Web 2.0 industry in Spain (64.3% of households have Internet access). Social networking is the most popular social activity in Spain. Until recently the local platform Tuenti had the highest membership although the global platform Facebook has now usurped that with 100,000 more members (5.7 million total) and levels of traffic to rival Google.

(U//FOUO) U.S. State Department Social Media Landscape: Latvia

Latvia, one of the three Baltic states, has a diverse population totaling 2.3 million – 59% Latvians, 29% Russian nationals and 3.8% Belo Russians amongst other ethnic groups. The media industry reflects this and is divided into Latvian or Russian language outlets and broadcasters. Internet penetration in the country currently stands at 59% which is just below the EU average (60%). However, significant growth centered particularly around the capital Riga and amongst Latvia’s youth demographic shows the signs of increasingly widespread digital inclusion and Internet literacy. Social media is still in the early stages of development, focused primarily on local social networks such as Draugiem, although globally popular platforms including Twitter and Facebook are growing in Latvian members. Commercial engagement with social media reflects this growing trend and is led primarily by telecommunication companies such as IZZI and Lattlecom. The Latvian government is also beginning to embrace social media as part of its communications strategy although its current presence is largely passive with an emphasis on broadcast rather than engagement.

(U//FOUO) U.S. State Department Social Media Landscape: Hungary

Improvements in infrastructure and access in Hungary over the last decade have encouraged considerable increases in Internet access and with that, an exploration of social media. Currently, Internet access is just below the EU average but is heavily focused around Budapest and other large cities, while the rural population remains largely digitally excluded. That said, government-backed initiatives to improve access in rural areas are ongoing. Internet access is also greater amongst those with a higher education and / or employed in the service industries. In turn, a gender divide is also apparent in Hungary’s Internet access as a result of lower levels of employment amongst women. The 15-24 age group and students are leading the digital movement in Hungary, aided by government initiatives which have focused on providing IT education and equipment to schools. It is this demographic that is largely responsible for the popularity of social networking, primarily conducted on local platforms in the Hungarian language, although membership of the global platform Facebook is growing and highlights a desire to be part of the global social media conversation.

(U//FOUO/LES) North Carolina Fusion Center Jared Lee Loughner Not Connected to White Supremacists Report

On January 8, 2011 shortly after 10:00 AM in Tucson, Arizona, a gunman opened fire during U.S. Representative Gabrielle Giffords’ constituent meeting outside a Safeway Grocery store. Rep. Giffords was shot in the head. While Giffords has reportedly survived the attack, twelve people were injured and six were killed. The gunman was later identified as Jared Lee Loughner, 22 years of age. Subsequent media reports have described Loughner as espousing anti-government rhetoric and possibly affiliated with groups such as New Century Foundation/American Renaissance (although Law Enforcement have not located any information to indicate this affiliation). New Century Foundation (NCF), started by Virginia resident Jared Taylor, is a 501 (c)(3) organization founded in 1994 to “study immigration and race relations so as to better understand the consequences of America’s increasing diversity.” (www.nc-f.org) NCF is primarily known for American Renaissance (AmRen), a journal and companion website that broadcasts racist and anti-illegal immigration ideologies.

(U//LES) FBI Second Issue of Inspire Magazine Encourages Use of WMDs

An article in the second issue of the English-language jihadist magazine “Inspire” emphasizes the use of weapons of mass destruction (WMD); however the article did not provide specific instructions. In the article entitled “Tips for Our Brothers in the United Snakes of America,” the author encourages those with microbiology and chemistry degrees to develop biological or chemical toxins such as botulism, ricin, or cyanide. WMD was referred to as the “next stage… [in] the war with America.” It is also stated in the article that upcoming issues of “Inspire” will cover WMD in greater detail.

(U//FOUO) Colorado Information Analysis Center Smartphone Security Bulletin

Smartphones feature an diverse array of computer capabilities which expose them to many of the vulnerabilities previously confined to computers. These threats have evolved from targeting personal computers (PCs) to hitting smartphones much quicker than some security experts anticipated. It took almost fifteen years for these types of attacks to evolve for PCs, but these attacks have been adapted for smartphones much more quickly. The malicious software (malware) currently targeting smartphones attempts to gather personal information stored on the phone and sell it. Since users often store more of this type of information on smartphones than PCs, in some cases it has become more profitable for hackers to create malware for smartphones than PCs.

(U//FOUO//LES) NCIS Guide to Developing Islamic Extremist Counterterrorism Sources

Following the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities.

(U//FOUO) Open Source Center Pakistan Protest Social Networking Limited Primarily to Elites

Based on the current observed levels of participation on social network sites (SNS) in Pakistan and the country’s past experience with street protest movements during the 2007 State of Emergency and 2009 lawyers Long March, it is possible that Internet users could leverage such sites to organize grassroots protest movements, but the intensity of such efforts would likely be limited by several factors.

(U//FOUO) Open Source Center Chinese Premier Promotes Cyberspace Agenda

Authoritative PRC media reports of Chinese Premier Wen Jiabao’s live online appearances illustrate authorities’ expanding use of the Internet to set and control policy discourse in Chinese-language virtual space. They also suggest ongoing efforts to manage leaders’ images and portray them as accessible and soliciting online public opinion. While some apparent missteps suggest a cautious, evolving approach to interactive Internet media in relation to top leaders, reported leadership statements indicate sustained attention to the goal of incorporating new technologies into the propaganda system.

Open Source Center Japan’s Advanced Mobile Phone Environment

Widespread advanced use of mobile phones in Japan has not come about serendipitously: the Japanese have taken to their cell phones because of the country’s highly advanced mobile phone technology and network infrastructure. Additionally, the government’s ambitious strategic plan to make Japan the most advanced “e-nation” in the world has boosted the industry, created an ideal environment for promoting mobile phone usage beyond simple person-toperson calling, and spurred domestic demand for high-tech handsets.

(U//FOUO) Open Source Center Guide to Germany’s Leading Political Blogs

The blogs selected and profiled in this guide are, at the time of this report, among the most well-known German-language political blogs and were selected for inclusion based on an assessment of several indicators, which are detailed in the methodology statement. The blogs profiled here are among Germany’s most influential independent political blogs and therefore have some potential to shape public opinion and debate on political issues in Germany. However, it should be noted that, given the challenges in establishing linkage between online content and realworld interactions and events, the degree of influence of blogs is difficult to quantify.

(U//FOUO) Open Source Center South Korea Internet Freedom

Widely regarded as the most connected country in the world, South Korea has a system of government regulations over Internet use that are designed to curb “general cyber crimes” but that also limit Internet freedom. The issue of Internet freedom gained attention online following the Lee Myung-bak administration’s handling of two high-profile incidents — in 2008 related to the protest against US beef imports and in 2009 over the arrest of a prominent Internet-based critic. Aside from interest related to these two issues, netizens, for the most part, do not appear concerned over the issue. If Seoul implements new regulations in response to continued growth in cyber crimes or new technologies, such as smartphones, netizens would likely oppose them only if they go beyond existing laws or impose significant inconveniences.

(U//FOUO) Open Source Center Cuban Independent Blogging, Political Activism Grows

A small group of independent bloggers, including Yoani Sanchez, Reinaldo Escobar, and Claudia Cadelo, has promoted blogging as a vehicle for free expression and information sharing to circumvent Cuba’s tightly controlled media environment, and to communicate with the outside world. They have become increasingly confrontational toward the government, demanding greater civil liberties and criticizing many government policies . Other on-island bloggers — many of them journalists or university professors and students — have called on the government to be more open and allow greater access to outside information, but they generally have avoided direct criticism of it. The government response has been limited to date, but the increasingly antigovernment line of some bloggers is likely to test the limits of government tolerance.

(U//FOUO) Open Source Center Iranian Internet War on Freedom of Information

For almost a decade, the Iranian regime and netizen activists have been engaged in a veritable war of attrition over freedom of information on the Internet. With at least tacit support from information technology businesses — whose interests are adversely affected by government controls and restrictions — activists have sought to exploit the Internet in order to share information and voice dissent. In turn, the authorities have been implementing plans to manage cyber activity by taking ownership of Internet infrastructure and by promoting the presence of their supporters and messages in cyberspace, while justifying their efforts on the grounds of morality and national security. Neither netizen activists nor the government are likely to win the battle over information flows in the near term, in part because of financial considerations and evolving technologies.

(U//FOUO) Open Source Center Bolivian Media Use Among Indigenous People

At the request of Open Source Center, InterMedia commissioned the La Paz-based research firm Apoyo Bolivia to conduct a qualitative research study in Bolivia to analyze the use of media among indigenous groups, including their media consumption, habits and opinions. The study involved 10 depth interviews that took place in August 2009 in four departments: Cochabamba, Chuquisaca, La Paz and Oruro. This qualitative study represents the views of these participants only and does not necessarily represent the view of all Bolivians.

(U//FOUO) DHS-FBI “Inspire” Al-Qaeda Magazine Second Edition Warning

(U//FOUO) This product is intended to provide perspective and understanding of the nature and scope of potentially emergent threats in response to the posting of the second edition of Inspire magazine. It is also intended to assist federal, state, local, and tribal government agencies and authorities, the private sector, and other entities to develop priorities for protective and support measures relating to an existing or emerging threat to the homeland security.

Domestic Operational Law Handbook for Judge Advocates 2010

The Domestic Operational Law (DOPLAW) Handbook for Judge Advocates is a product of the Center for Law and Military Operations (CLAMO). First published in April of 2001, it was the first of its kind. Designed as a resource for operational lawyers involved in domestic support operations, its publication was indeed timely. After the events of September 11, 2001, and more recently, Hurricanes Katrina in 2005 and Ike in 2008, the Handbook continued to meet a growing need for an understanding of the legal issues inherent in such operations. As with the original publication of the Handbook, this update would not have been possible without the tireless efforts of countless active, reserve, and National Guard judge advocates who participate in these unique operations on an ongoing basis.

Does Anyone Take These Al-Qaeda Magazines Seriously?

With the release of their November 2010 Special Issue of Inspire magazine, a group claiming to be Al-Qaeda in the Arabian Peninsula (AQAP) has again succeeded in getting the entire global news media to uncritically relate their message. Every few months since the first release of the magazine in July 2010, the public is now subjected to a mass of uncritical stories that propagate predefined talking-points which are taken almost verbatim from one of two “monitoring groups” which actually profit from the sale of terrorist propaganda materials. One of those groups, the SITE Intelligence Group, was founded by the daughter of an executed Israeli spy. Joel Meares of The Columbia Journalism Review writes that when “Reading the latest terror reports it seems that any questions about the validity of Inspire have disappeared. The magazine once greeted with skepticism and perspective—to what extent one publication can speak for as disparate and fractured a community as the jihadists is always a question—is now being treated as the unquestioned and official spokes-journal of Al-Qaeda. And some close watchers of Al-Qaeda caution against the approach.”

UN-NATO Documents Detail Violence and Voter Supression in Afghan Elections

According to a series of classified reports from NATO and the UN recently published by this site, the recent elections in Afghanistan were marred by “unprecedented” levels of violence including voter intimidation, kidnapping of election workers and candidates, as well as attacks on polling stations and ballot distribution systems. A confidential United Nations “Joint Security Analysis” covering the week of the elections states that the country experienced a “massive increase” in violence “due to an unprecedented peak of security incidents recorded on Election Day 18 September.” In fact, there was such a significant and “unprecedented” increase in violence leading up to the elections that this created a significant decrease in subsequent attacks because insurgent forces were literally running out of ammunition.