Since 2009 Philadelphia has seen a 43 percent increase in drug-related overdose deaths, helping to make Pennsylvania the nation’s leading state for drug overdose death among young men. Over the same period, the city has seen a 45 percent increase…
The abuse of illicit drugs, specifically heroin and cocaine, as well as the opioids fentanyl and oxycodone, has contributed to an increase in drug-related deaths in Philadelphia over the last decade. Specifically, drug-related overdose deaths in Philadelphia have risen 43 percent since 2009, with a corresponding 45 percent increase in heroin-positive toxicology test results.
The community-oriented policing (COP) paradigm provides an existing framework for collaborative grassroots engagement that has the potential for success in counterradicalization outreach efforts. COP leverages already established community-based social service programs to address individual, group, and community radicalization factors.
The Future Operating Environment 2035 (FOE 35) forms part of the Development, Concepts and Doctrine Centre’s (DCDC) Strategic Trends Programme. DCDC is the MOD’s independent think tank and, as such, FOE 35 does not represent the official position of Her Majesty’s Government. It supersedes the 2010 Future Character of Conflict (FCOC) and aims to: describe the characteristics of the 2035 operating environment to provide evidence-based insights that can inform future Defence capability development. FOE 35 describes the potential characteristics of the future operating environment, and is designed primarily to inform UK Defence and security policy-makers and our Armed Forces more broadly. However, it is intended to have applicability across UK Government and agencies to help inform their understanding of the future operating environment in which we all (military, other UK Government departments, international organisations and agencies) may find ourselves operating in 2035.
Model Aircraft are custom built or commercially produced unmanned aircraft systems (UAS) that meet the statutory definition of Model Aircraft and operate in accordance with the statutory requirements for Model Aircraft. These are sometimes referred to as radio controlled airplanes or aircraft and usually require one individual for operational control. Some Model Aircraft are capable of sustained flight for approximately 2 hours or less depending on the type of Model Aircraft (Rotary or Fixed Wing) and power source (e.g. nitromethane, lithium ion, and lithium polymer batteries). Model Aircraft must be flown within visual line of sight of the operator; however, there is an increasing use of first person view technology that allows operation to occur beyond line of sight and at altitudes in excess of several hundred feet.
The FBI has obtained information regarding a group of cyber actors who have compromised and stolen sensitive military information from US cleared defense contractors (CDCs) through cyber intrusions. This group utilizes infrastructure emanating from China to conduct their nefarious computer network exploitation (CNE) activities. Information obtained from victims and subsequent analysis indicates that they were targeted based on their US Navy Seaport Enhanced contracts. The actors did not target information pertaining to a specific contract but instead stole all information that they accessed via their malicious cyber activities. Any activity related to this group detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement.
As technology pervades into our everyday lives, once simple devices have become smarter and more interconnected to the world around us. This technology is transforming our cities into what are now referred to as “Smart-Cities”. Smart Cities have been defined as urban centers that integrate cyber-physical technologies and infrastructure to create environmental and economic efficiency while improving the overall quality of life. The goal of these new cities is to create a higher quality of life, a more mobile life and an overall increased efficient use of available resources. Some examples of Smart-City technologies are interconnected power grids reducing power waste, smarter transportation resulting in increased traffic management, and smarter infrastructures that reduce hazards and increase efficiency.
Disruptive cyber attacks by criminal hackers—primarily distributed-denial-of-service (DDoS) attacks—targeting local law enforcement websites have increased since August 2014. We judge that this is almost certainly a result of the heightened coverage surrounding the alleged use of excessive force by law enforcement and an increased focus on incidents of perceived police brutality. The primary impact from the majority of these attacks has been the temporary disruption of the targeted public-facing websites.
The purpose of this white paper is to provide an in-depth examination of ABI-like analytic techniques that were developed, refined and employed to successfully support multiple, high-level, but dissimilar interagency law enforcement investigations over an extended period of time. The premise of this paper is that, as the Intelligence Community developes a strategy, framework and roadmap for enterprise-wide adoption of ABI, lessons learned from the law enforcement community are worthy of examination and possible incorporation into the IC strategy for ABI.
An analysis of recent suicide bombings throughout the Middle East, Europe and Africa by the FBI Terrorism Explosive Device Analytical Center (TEDAC) that was released after the terrorist attacks in Paris, France last month states that “suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely . . . have minimal correlation” and do not indicate tactical migration.
(U//LES) FBI Suicide Vest and Belt Use in Middle East, Africa, and Europe Show Minimal Signs of Tactic Migration
The FBI Terrorism Explosive Device Analytical Center (TEDAC) assesses the tactics used to construct suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely have minimal correlation. Use of these tactics allows suicide bombers to discretely move to a desired target location and make real-time decisions to maximize lethality. The suicide belt design allows the wearer to conceal the device and blend in with their surrounding environment, as well as to position themselves in potentially crowded environments while not raising suspicion.
(U//FOUO) DHS-FBI-NCTC Bulletin: Tactics, Techniques, and Procedures Used in November 2015 Paris Attacks
This Joint Intelligence Bulletin (JIB) is intended to provide a review of the tactics, techniques, and procedures demonstrated by the perpetrators of the 13 November 2015 attacks in Paris, France. This JIB does not provide analysis of any follow-on operations or operations occurring in Europe in the wake of the attacks. It relies on a variety of open source and media reporting for the analysis, which could change as official details of the post-incident investigations come to light. This JIB is intended to support the activities of DHS, FBI and NCTC to assist federal, state, and local government counterterrorism and law enforcement officials, first responders, and private-sector security partners in effectively deterring, preventing, preempting, or responding to terrorist attacks against the United States.
After the September 11, 2001 terrorist attacks, the United States adopted a preventive approach to combating all forms of terrorist activity. Efforts to combat the financing of terrorism (CFT) are a central pillar of this approach. Cutting off financial support to terrorists and terrorist organizations is essential to disrupting their operations and preventing attacks. To that end, the U.S. government has sought to identify and disrupt ongoing terrorist financing (TF) and to prevent future TF. The law enforcement community, including various components of the U.S. Departments of Justice, Homeland Security, and the Treasury, along with the intelligence community and the federal functional regulators, applies robust authorities to identify, investigate, and combat specific TF threats, enforce compliance with applicable laws and regulations, and prosecute supporters in order to deter would-be terrorist financiers. The U.S. Department of the Treasury (Treasury), which leads financial and regulatory CFT efforts for the U.S. government, employs targeted financial sanctions, formulates systemic safeguards, and seeks to increase financial transparency to make accessing the U.S. financial system more difficult and risky for terrorists and their facilitators. All of these efforts involve extensive international engagement to try to prevent any form of TF, particularly financing that does not necessarily originate in the United States, from accessing the U.S. financial system.
Since 2013, the country has experienced several waves of Libyan returnees, which also formed the backbone of the newly established ISIL in Libya. In addition, the country continues to attract foreign terrorist fighters in significant numbers from North Africa. While currently concentrated in its stronghold in Sirte, ISIL could seek local alliances to expand its territorial control, also entailing the risk of motivating additional foreign terrorist fighters to join the group in Libya.
Targeting of high profile and international events by state-sponsored or other foreign adversaries, cyber criminals and issue motivated groups is a real and persistent threat. The information contained on government systems, whether classified or unclassified, is of strategic interest to cyber adversaries. Information gathered through cyber espionage can be used to gain an economic, diplomatic or political advantage.
Mexican transnational criminal organizations (TCOs) pose the greatest criminal drug threat to the United States; no other group is currently positioned to challenge them. These Mexican poly-drug organizations traffic heroin, methamphetamine, cocaine, and marijuana throughout the United States, using established transportation routes and distribution networks. They control drug trafficking across the Southwest Border and are moving to expand their share, particularly in the heroin and methamphetamine markets.
DEA continues to identify eight major cartels currently operating in Mexico: Sinaloa, Cartel de Jalisco Nueva Generacion (New Generation Jalisco Cartel or CJNG), Beltran-Leyva Organization (BLO), Los Zetas, Gulf, Juarez/La Linea, La Familia Michoacana (LFM), and Los Caballeros Templarios (Knights Templar or LCT); however, leadership losses for LFM and LCT over the last year have significantly degraded their operational capabilities and organizational cohesion. The attached graphic illustrates fluctuations in the areas of dominant control for Mexico’s major DTOs, most notably the significant expansion of CJNG.
The DDIS Intelligence Risk Assessment gives an overview of our current intelligence-based assessments of developments in a number of countries and conflict areas and provides an outline of foreign policy issues that may impact on Denmark’s security. This year’s Risk Assessment emphasizes the terrorist threat posed by militant Islamist groups, Russia’s attempt at repositioning itself as a great power, cyber espionage against businesses and public authorities, and the conflict-ridden and unstable situation in the Middle East and North Africa. The analyses contained in this risk assessment are based on classified intelligence. The assessment is, however, unclassified and aimed at a wide audience, which limits the level of detail in analyses.