The U.S. Military’s Video Game Training

From March 29-31 in the Orlando Hilton, the annual Defense GameTech conference was being held to discuss “gaming technologies” that can enhance “warfighter training” and so-called “virtual world” technologies. The annual GameTech conference was attended this year by many notable names from the world of computer entertainment, including Will Wright, creator of The Sims, and executives from Linden Labs, the company which makes Second Life. In addition to industry people, the conference was also attended by military, government, and academic experts on “serious games”. One of the main presentations at this year’s conference was given by General James Mattis, Commander of Joint Forces Command.

(U//FOUO//LES) TSA 2006 Terrorist Threat to U.S. Highway System

(U//FOUO) Threats to the U.S. highway system (including tunnels, bridges, long-haul buses, school buses, and commercial trucks) emanate from transnational and domestic terrorist organizations, as well as from insiders and special interest groups. However, the primary threat stems from al-Qa’ida, its affiliates, and other Sunni Muslim extremists, whether foreign or domestic. No reporting indicates a current, credible, and specific terrorist threat to U.S. highway interests. However, since 1993 at least three terrorist plots to bomb tunnels and bridges in the United States have been disrupted, aborted, or abandoned. Further, recurring suspicious incidents involving U.S. highway infrastructure and assets could reflect pre-operational terrorist planning. Thus far, however, no definitive link has been established between any of the suspicious incidents and terrorism.

Canadian Forces Electronic Warfare Manual

Electronic warfare (EW) has been practiced in every conflict since World War I. Fundamentally, the practice of EW has not changed. However, the context in which EW must operate has. The Canadian Land Force has developed new doctrine and has placed a greater emphasis on joint and coalition operations. As well, closer relationships with national and strategic agencies have had significant impacts on the conduct of EW. The purpose of this chapter is to place EW in context of these new developments.

Los Angeles County Sheriff Active Shooter Response Tactics

This presentation deals with how to prevent, prepare, and tactically respond to a active shooter incident. This will include a historical overview of noteworthy active shooter incidents, with an emphasis on school shootings. Lessons learned, key terms, and important definitions will be discussed as well as the crisis response box, lockdown, and evacuation procedures. This presentation will also review law enforcement equipment, training and tactics as well as post shooting event incident management and threat assessment & management techniques.

Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

The Aegis ballistic missile defense (BMD) program, which is carried out by the Missile Defense Agency (MDA) and the Navy, gives Navy Aegis cruisers and destroyers a capability for conducting BMD operations. Under current MDA and Navy plans, the number of BMD-capable Navy Aegis ships is scheduled to grow from 20 at the end of FY2010 to 38 at the end of FY2015. MDA and Navy plans also call for an increasing portion of the Navy’s BMD-capable Aegis ships to be equipped with newer and more capable versions of the Aegis BMD system.

Apple iPhone Password Work-Around

If you encounter an Apple iPhone where the phone is locked with a Passcode, keep in mind the hand set only allows 5 Passcode attempts before locking out phone. This work-around is limited to iPhones with firmware versions 1.1.2 and earlier. The workaround was disabled on version 1.1.3 in February 2008. Data can be retrieved from the SIM card as well as from the phone handset. To remove the SIM card, place a paperclip in the hole at the top of the phone. Force must be applied to get the SIM holder to pop-up. The SIM card will be inside a plastic tray and can be easily removed. Process the SIM card as normal.

Rapid Enforcement Allied Computer Team (REACT) Task Force

The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County District Attorney’s Office designated as the lead agency. The REACT Task Force is one of five in the State of California and authorized under California Penal Code 13848. All Agents of the React Task Force are either California Peace Officers and/or U.S. Federal Agents.

2008 High Technology Crime In California: Annual Report to the Governor & Legislature

California is home to many of the largest and most advanced technology companies in the world. We also have most of our citizens online in ever increasing amounts. In 2008, 75% of Californians reported that they use a computer at home, work, or school, and 70% use the Internet. Accompanying such an explosion in the telecommunication and Internet penetration has been a concomitant rise in technology crime. Our experience has taught us that technology and computers have given stalkers, pedophiles, destructive disgruntled employees, thieves, scam artists and those seeking infamy a new forum in which to ply their trade and cause misery.

NDIC Money Laundering in Digital Currencies Report

Digital currencies combine the intrinsic value of gold and other precious metals as well as the designated value of national currencies with the worldwide reach of the Internet to create an ideal mechanism for international money laundering. Users can anonymously fund digital currency accounts, send those funds (sometimes in unlimited amounts) to other digital currency accounts worldwide, and effectively exchange the funds for foreign currencies—often while bypassing U.S. regulatory oversight.

Las Vegas Police Request Removal of Document from Public Intelligence

During the month of April 2010, we have received the same message twice from the Las Vegas Metropolitan Police Department concerning a Law Enforcement Sensitive brief entitled “Silver Shield: Nevada’s Approach to Critical Infrastructure Protection” from November 2007. The briefing discusses various aspects of Suspicious Activity Reporting, Fusion Center integration, and the use of unmanned aerial vehicles (UAV) to patrol portions of the city for aerial photography during incident response.

Authorized FEMA and Contracted Inspector Identification Badges Guide

When a Disaster is declared, FEMA employees and Contracted Inspectors will be working in the affected area. In order to help you identify authorized FEMA staff and Contracted Inspectors, we are providing samples of authorized FEMA Identification Credentials. If there is any question regarding the authenticity of someone claiming to be a FEMA employee, inspector or representative, please contact us as soon as possible.

Homeland Emergency Preparedness and the National Exercise Program

An emergency preparedness and response program provides resources and support to individuals and communities that might be affected by a broad range of disruptive incidents. These incidents may be caused by natural phenomena such as severe weather, fires, earthquakes, tsunamis, or disease outbreaks. Incidents might result from human activity as well, and could include accidents, criminal acts, terrorism, or other attacks. Concerns have been raised whether current preparedness and response policies and capacities are sufficient.

Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges

Interruptions of congressional operations by incidents such as episodic computer virus infections, or the anthrax contamination that took place during autumn 2001, have demonstrated the importance of congressional continuity of operations (COOP) planning. COOP planning refers to the internal effort of an organization to assure that the capability exists to continue essential functions in response to a comprehensive array of potential operational interruptions. For Congress, COOP planning is related to a second level of preparedness, continuity of government (COG) planning. Congressional COG planning focuses on ensuring that Congress is able to carry out its legislative responsibilities under Article I of the Constitution.

FBI Requests Removal of Document from Public Intelligence

On April 19, 2010, Public Intelligence received a notice from George White, Information Security Officer for the Federal Bureau of Investigation’s Criminal Justice Information Services Division, requesting the removal of a “For Official Use Only” document posted less than one day prior. The “Criminal Justice Information Services Security Policy” is a draft document dated January 1, 2011 discussing the security procedures and implementation of future additions to the CJIS system.