352 search results for "cell"

CJCS Military Family “Self-Help Guide” to Antiterrorism

This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.

TransUnion Corporation Sale of Consumer Credit Information Privacy Litigation Decision 2002

Defendant Trans Union is one of three major consumer reporting agencies in the United States. Its core business is assembling and evaluating consumer credit information, including credit and payment patterns on consumers for the purpose of selling consumer reports to third parties. Typical buyers of such information are firms considering extending credit to a particular consumer. The information provided by Trans Union is used to determine if the consumer is a good credit risk. Trans Union maintains a computer data base called “CRONUS,” that contains consumer credit information it uses to generate credit reports. The data base includes the credit activity of every credit-active individual in the United States. Trans Union receives the information from credit grantors such as banks, mortgage companies, credit unions, auto dealers and collection agencies. Trans Union also receives information on student loans and child support.

(U//FOUO) DHS Report: Small Unit Tactics in Terrorist Attacks

The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.

(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology

This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.

CJCS Defense Support of Civil Authorities (DSCA) Exord

THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.

National Guard Domestic Law Enforcement Operations Guide

a. Consolidate the policy and responsibilities for National Guard law enforcement support and mission assurance operations.

b. Define consistent terminology and concepts for use by the National Guard Bureau and the National Guard of the several states for the planning and conduct of domestic law enforcement support and mission assurance operations.

c. Provide direction for the planning and reporting requirements for National Guard domestic law enforcement support and mission assurance operations.

d. Define National Guard capabilities for domestic law enforcement support and mission assurance operations.

Janet Napolitano Speech to the Council on Foreign Relations on “Refocusing” Homeland Security

So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now. And many of the technological tools that expedite communication today were in their infancy or didn’t even exist in 2001. So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries. And the threats we face are by their very nature asymmetrical. Terrorism more often has become privatized violence—does not rely on links, links to an army or to a sovereign state. We often hear that this is what our globalized era looks like, but what is most salient about today’s environment is that it is also networked. And in a networked world, information true and false moves everywhere all the time. And in that networked world, everyone who is part of the network, meaning all of us, can enjoy the tremendous benefits, but also must be ready and willing to learn about and help address the vulnerabilities that come with these benefits. So the team we put on the field needs to be bigger, better networked and better trained. What are the implications for this network world for the Department of Homeland Security? It means that we must continue to take an all-hazards approach to preparedness, meaning we prepare for natural disasters as well as terrorist attacks. We need to comprehend and anticipate an expanding range of threats.

(U//FOUO) FBI Warning: Extremists Likely to Retaliate Against Florida Group’s Planned “International Burn A Koran Day”

(U//FOUO) While the FBI has no information to indicate a specific attack has been planned against the United States or US assets in response to the “International Burn a Koran Day” event, the FBI assesses with high confidencea that, as with past incidents perceived as acts of desecration against Islam, extremist actors will continue to threaten or attempt to harm the leaders, organizers, or attendees the event, scheduled for 6:00-9:00pm on 11 September 2010 in Gainesville, Florida. Depending on the continued national and international publicity the event receives, it may also inspire retaliatory attacks against US facilities overseas.

(U//FOUO) Army Unauthorized Information Dissemination Safeguards in Response to WikiLeaks

(U/FOUO) 1. ALL ARMY ACTIVITIES ARE DIRECTED TO IMMEDIATELY REVIEW AND REVALIDATE WHO HAS SYSTEM ADMINISTRATOR(SA)/POWER USER PRIVILEGES. IN ACCORDANCE WITH (IAW) REF A, THESE PERSONNEL SHALL BE GRANTED THE MINIMUM SET OF PRIVILEGES REQUIRED TO PERFORM THEIR JOBS AND NOTHING MORE. ALL ACTIVITIES MUST ENSURE THAT THEY HAVE IDENTIFIED THESE PERSONNEL AND THAT NO OTHER PERSONNEL HAVE THESE PRIVILEGES. THIS IS KEY TO PRECLUDING UNAUTHORIZED DOWNLOADING AND DISSEMINATION OF SOFTWARE AND INFORMATION.

James Lee Website, Manifesto and Reality Show Treatment

This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.

(U//FOUO) OEF/OIF Legal Services Support To Operational Commanders

Marine Corps Judge Advocates have been providing wartime legal support to operational commanders since the Vietnam War. Judge Advocates who deployed to Operation DESERT STORM reported an increased need for operational law support and a diminished need for traditional military justice (court-martial) support. Observations by Judge Advocates and infantry commanders who served in OEF/OIF between 2003 and 2006 show that the need for operational law support of ground commanders has continued to expand and is now required on a consistent basis at the infantry battalion level.

Terrorism Liaison Officer (TLO) Program

The Terrorism Liaison Officer (TLO) is designed to be a nationally interconnected program of designated law enforcement officers, firefighters, military, and other first responders that attend an approved and accredited course of instruction. This shared learning experience prepares the TLOs to fill a specific role within their organization as a link or “liaison.” The TLO program was initiated in California via the Commission on Peace Officer Standards and Training (POST) around 2005-2006 by a Anthony Lukin. According to several proposals for the program, Fusion Centers in California “utilize the Terrorism Liaison Officer (TLO) Program to foster communication and collaboration amongst the fire service; law enforcement; the federal homeland security and intelligence communities and public safety stakeholders. The TLOs serve as the conduit through which homeland security and crime-related information flows from the field to the Fusion Center for assessment and analysis. The network also serves as the vehicle to carry actionable intelligence from the Fusion Center to field personnel. This information flow provides for increased safety and security for fire department personnel as well as the communities served.”

(U//FOUO) DHS IED/VBIED Construction and Tactics Overview

(U//FOUO) The Intelligence Community currently has no specific, credible intelligence indicating that domestic or international terrorist organizations intend to use Improvised Explosive Devices (IEDs) or Vehicle-Borne Improvised Explosive Devices (VBIEDs) against targets within the Homeland. However, both foreign and domestic terrorist groups continue to use IEDs/VBIEDs as a frequently employed method of attack, and in particular, the frequency of lethal IED incidents overseas is cause for continuing concern.

Sprint Law Enforcement Subpoena Compliance Manual

This handbook has been created to assist law enforcement agencies in their understanding of processes and procedures implemented by Sprint for the compliance of legal demands. The handbook will include contact information, billing information, service of legal demands on Sprint, types of legal demands required and miscellaneous general information for your future reference.

Yakima Training Center

The Yakima Training Center (YTC) is a United States Army training center (Army maneuver training and live fire area) located in south central Washington state. It is bounded on the west by Interstate 82, on the south by the city of Yakima, on the north by the city of Ellensburg and Interstate 90, and on the east by the Columbia River. It comprises 327,000 acres (132,332 hectares) of land, most of which consists of shrub-steppe, making it one of the largest areas of shrub-steppe habitat remaining in Washington state. According to a 2001 report by the European Parliament, the Yakima Training Center is also an integral part of the ECHELON global communications interception system.

GCHQ Bude

GCHQ Bude, formerly known as the the GCHQ Composite Signals Organisation Station (CSOS) Morwenstow, is a satellite ground station located on the north Cornwall coast between the small villages of Morwenstow and Coombe, UK operated by the British signals intelligence service (GCHQ) on the site of the former World War II airfield, RAF Cleave. Staff are drawn from GCHQ (UK) and the NSA (U.S.) and the station is operated under the UKUSA agreement, gathering data for the ECHELON signals intelligence (SIGINT) network. Comparable stations in operation include Menwith Hill (UK), Sugar Grove (West Virginia, U.S.), Yakima (Washington, U.S.), Sabana Seca (Puerto Rico), Misawa (Japan), Pine Gap (Australia), Geraldton (Australia), GCSB Waihopai (New Zealand) and GCSB Tangimoana (New Zealand) that cover other INTELSAT areas such as South America and the Pacific Ocean. GCHQ Bude is located about 100 km from the commercially operated Goonhilly Satellite Earth Station that handles civilian communications which was closed in 2008.

Islamic Republic of Afghanistan Detailed Governance Information

Afghanistan’s government structure is designed around a strong, democratic national government. At the national level, the three branches (Executive, Legislative, and Judicial) form the foundation of the government, but other entities, such as ministries, the Afghan National Security Forces (military and police), and commissions also carry out government obligations. Below the national level, the public sector consists of provincial-level governments, municipalities, and finally district-level government. However, unlike the U.S. government, each of the 34 provinces does not operate independently of the national government. Kabul, the capital, is the seat of power. Each province answers to the national government.

(U//FOUO) DHS Homeland Terrorist Threat Reporting Guide

This Terrorist Threats to the U.S. Homeland Reporting Guide (TTRG) was jointly produced by the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS). The purpose of this document is to leverage the vast information collection and reporting resources of our state, local and tribal law enforcement partners, as well as other first responder partners, in recognizing activities or conditions that may be indicative of terrorist activity. State and local organizations are on the front line in the war against terror and therefore have a critical role as primary sources of information. Timely and relevant information from the “front lines” is critical to the identification of terrorists and their supporters, development of insights into their plans and intentions, and subsequent disruption of their operations.

Erez Crossing

The Erez Crossing (מעבר ארז‎) is a civilian entry point into the Gaza Strip. It consists of a series of large concrete building and caged corridors which function as a pedestrian/cargo terminal on the Israeli Gaza Strip barrier, located in the northern end of the Gaza Strip. It is part of a complex formerly including the Erez Industrial Park. The crossing is currently restricted to Arab residents under the jurisdiction of the Palestinian Authority and to Egyptian nationals or international aid officials only. The complex reportedly cost more than $35 million to construct.