The Barrio Azteca was organized in the El Paso, Texas, County Jail in 1987 from where it moved to the streets and the Texas Department of Criminal Justice prison system. The Barrio Azteca prison gang – which has chapters in El Paso, Texas, and Juarez, Chihuahua, Mexico – has historically been linked to the Juarez Cartel. Barrio Azteca membership is estimated at 3,500 inside and outside of the prison system. Members have been reported in Texas, New Mexico, Colorado, Nevada, Arizona, California, Oklahoma, Idaho, Washington, Kansas, Illinois, South Carolina, North Carolina, New Jersey, New York and Utah. They participate in enforcing the rules of the Juarez Cartel in El Paso, Texas, and southern New Mexico.
Afghanistan, Iraq, U.S. Marine Corps
USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF
The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.
Corporate
MoneyGram Anti-Money Laundering Compliance Guides
MoneyGram Anti-Money Laundering Compliance Guides for the Caribbean and Latin America, United States, and Canada.
U.S. Army
U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028
The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.
Department of Justice
U.S. DOJ Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
According to the Supreme Court, a “‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property,” United States v. Jacobsen, 466 U.S. 109, 113 (1984), and the Court has also characterized the interception of intangible communications as a seizure. See Berger v. New York, 388 U.S. 41, 59-60 (1967). Furthermore, the Court has held that a “‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed.”
Scholarly
Electronic Evidence Compliance: A Guide for Internet Service Providers
This Guide provides general guidelines for Internet service provider compliance with law enforcement and national security evidence gathering authorities. It is not intended to constitute or be a substitute for legal advice provided to individual clients on the basis of particular facts. In light of the law’s complexity, Internet service providers should consult counsel regarding questions about the law.
Intelligence Fusion Centers, New Jersey
New Jersey ROIC: Terrorist Bus Alteration
In December 2007, the Fairfield (New Jersey) Police Department (FPD) observed a bus, registered in Florida, at a local gas station, where the driver was pumping diesel fuel through an open window into the bus. Further investigation revealed that the driver had removed the right-side seats to accommodate eighteen 55-gallon plastic drums, which he filled with approximately 300 gallons of diesel fuel before FPD impounded the bus. There were numerous equipment violations observed and the driver was issued summonses as a result. The drums were not secured and diesel fuel apparently leaked during the fueling process.
Department of Justice, Intelligence Fusion Centers, Regional Information Sharing Systems
Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
What is a SAR?
•“Official documentation of observed behavior that may be indicative of intelligence gathering or preoperational planning related to terrorism, criminal, or other illicit intention”
• SAR process focuses on what law enforcement agencies have been doing for years—gathering information regarding behaviorsand incidentsassociated with crimeand establishing a process whereby information can be shared to detect and prevent criminal activity, including that associated with domestic and international terrorism
• Examples: Surveillance, photography of facilities, testing of security
Intelligence Fusion Centers, North Dakota
North Dakota Homeland Security Fusion Center Brief
The Fusion Center provides one central location for intelligence collection, investigation and dissemination of ND Homeland Security information to protect critical infrastructure and assets.
Documents
Adam Gadahn March 7, 2010 Video with Transcript
This video was released on March 7, 2010 by the Al-Qaeda media arm As-Sahab and has been variously titled “A Call to Arms” and “Unsheath Your Sword”. In the 25-minute video, Adam Gadahn calls on Muslims in the West to follow in the footsteps of Nidal Malik Hasan, the Fort Hood shooter. Gadahn encourages Americans and other Muslims in the West to “prepare to play his due role in responding to and repelling the aggression of the enemies of Islam.” Gadahn also provides advice on choosing high-value targets for potential terrorist attacks in America and the West, such as military installments and mass transportation systems, as well as symbols of capitalism whose ruin could cripple the Western economy. Gadahn urges his followers to take action as soon as possible and explains that now is the “golden, once in a lifetime opportunity to reap the rewards of jihad and martyrdom…so unsheathe your sharpened sword and rush to take your rightful place among defiant champions of Islam.”
California
Los Angeles County Sheriff DNA Order Tracking System (DOTS)
Los Angeles County Sheriff DNA Order Tracking System (DOTS), May 2007.
World Health Organization
World Health Organization Pandemic H1N1 Update February 2010
World Health Organization Pandemic H1N1 Update from the USPACOM/COE Pandemic Influenza Workshop, February 2010.
California, Intelligence Fusion Centers
LA-RTTAC Guardian Incident Review: August 2009
(U//FOUO//LES) The Guardian database is populated several ways. Leads may come directly to the FBI for entry by FBI personnel. They may come from e-Guardian – an unclassified, law enforcement sensitive reporting portal available to vetted account holders at the Law Enforcement Online (LEO) Web site – for later transfer into Guardian. Or they may come first to the JRIC via online lead sheets, by facsimile, or by phone for selective entry into e-Guardian. The FBI’s Threat Squad assesses and investigates all Guardian leads. Based upon their findings, incidents are closed, transferred to another agency for follow-up, or referred internally for additional investigation.
Bureau of Alcohol Tobacco Firearms and Explosives
ATF Letter and Package Bomb Detection Techniques
ATF Letter and Package Bomb Detection Techniques Brochure from August 1996.
North Atlantic Treaty Organization
NATO Interoperable ISTAR System Concept of Employment
This document represents the current Concept of Employment (CONEMP) coaltion interoperable intelligence, surveillance, target acquisition and reconnaissance (ISTAR) system. It provides information for commanders and their staffs on the operational employment of participating network enabled ISTAR systems during coalition operations.
North Atlantic Treaty Organization
Concept For NATO Joint Sea Basing (NJSB)
NATO Joint Sea Basing (NJSB) provides the Alliance with another option for the deployment, employment, sustainment and re-deployment of a mission tailored joint force package utilizing a combination of seaborne platforms, strategic sealift and tactical airlift/sealift to rapidly project and sustain multinational forces wherever needed. Simply stated, specified land, air and sea component forces are deployed utilizing existing seaborne platforms resident within NATO member nations’ inventory in conjunction with available strategic sealift assets from the commercial market. Correspondingly, sea basing provides the NATO force commander with a capability to exercise command and control and/or the projection of military and logistics capabilities from seaborne platforms.
Corporate
Google Log Retention Policy FAQ
When users search on Google, we collect information about the search, such as the query itself, IP addresses and cookie information. (More info on this is available here.) We had previously kept the logs data for as long as it was useful. When we implement this policy change, we will continue to keep server log data so that we can improve Google’s services and protect them from security and other abuses, but we will anonymize our server logs after 18-24 months, unless legally required to retain the data for longer.
Organisation for Economic Co-operation and Development
OECD Analysis and Management of Nuclear Accidents Integrated Plan
The Working Group on the Analysis and Management of Accidents (WGAMA) shall be responsible for activities related to potential accidental situations in nuclear power plants, including the following technical areas: reactor coolant system thermal-hydraulics; design-basis accident including ECCS strainer clogging; pre-core melt conditions and progression of accident and in-vessel phenomena; coolability of over-heated cores; ex-vessel corium interaction with concrete and coolant; incontainment combustible gas control; physical-chemical behaviour of radioactive species in the containment; fire safety. The activities will mainly focus on existing reactors, but will also comprise applications for some advanced reactor designs.
United States
Nationwide Wireless Priority Service
The Nationwide Wireless Priority Service (WPS) is a system in the United States that allows high-priority emergency telephone calls to avoid congestion on wireless telephone networks. This complements the Government Emergency Telecommunications Service (GETS), which allows such calls to avoid congestion on landline networks. The service is overseen by the Federal Communications Commission and administered by the National Communications System in the Department of Homeland Security.
United States
U.S. Government Emergency Telecommunications Service
The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency phone service provided by the National Communications System (NCS) in the Office of Cybersecurity and Communications Division, National Protection and Programs Directorate, Department of Homeland Security. GETS supports Federal, State, local, and tribal government, industry, and non-governmental organization (NGO) personnel in performing their National Security and Emergency Preparedness (NS/EP) missions. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN). It is intended to be used in an emergency or crisis situation when the PSTN is congested and the probability of completing a call over normal or other alternate telecommunication means has significantly decreased.
Corporate
T-Mobile Law Enforcement Relations
The T-Mobile USA, Inc. Law Enforcement Relations Group (LERG) is committed to efficiently assisting the law enforcement community with all lawfully authorized activities. Our Law Enforcement Relations unit is staffed by personnel who are well acquainted with the technical and evidentiary needs of federal, state, and local prosecutors and investigative officers. The unit maintains their proactive philosophy by offering educational presentations, reference materials and expedient, secure procedures that support the mission of the public safety community in an unparalleled fashion.
Corporate
MetroPCS CALEA Compliance Manual
It is the policy of MetroPCS to comply with the letter and spirit of all laws of the United States, including the Communications Assistant for Law Enforcement Act (hereinafter referred to as “CALEA”) relating to the implementation of law enforcement wiretap requests. CALEA requires MetroPCS to implement security measures to safeguard the privacy and reliability of information obtained through lawfully authorized interceptions of communications (i.e., wiretaps, pin registers, and subpoenas) and to help prevent unauthorized interceptions. MetroPCS Personnel must receive appropriate legal authorization and appropriate carrier authorization (as such terms are defined herein) to implement the interception of communications or access to call-identifying information.
Corporate
Nextel’s Guide For Law Enforcement – Subpoena & Court Orders
This Guide was prepared for Law Enforcement to facilitate the processing of subpoena requests and compliance with court orders for electronic surveillance directed to Nextel Communications, or any of its operating subsidiaries (collectively “Nextel”). This Guide references the Nextel points-of-contact that have been authorized to assist Law Enforcement with subpoena compliance, as well as with the provisioning of lawful interceptions of communications on Nextel’s wireless networks. In addition, this Guide provides Law Enforcement with an overview of Nextel’s current administrative practices and policies required to support these requests.
Department of Homeland Security
National Communications System Priority Telecommunications Services For Public Safety
National Communications System brief on the Government Emergency Telecommunications Service “Priority Telecommunications Services For Public Safety”, November 5, 2008.
United States
Raven Rock Mountain Complex (Site R)
Raven Rock Mountain Complex (RRMC) is a underground continuity of government facility built by the U.S. government in the early 1950s. It is located about 14 km (8.7 miles) east of Waynesboro, Pennsylvania, and 10 km (6.2 miles) north-northeast of Camp David, Maryland. It is also called the Raven Rock Military Complex, or simply Site R. Other designations and nicknames include “The Rock”, NMCC-R (National Military Command Center Reservation), ANMCC (Alternate National Military Command Center), AJCC (Alternate Joint Communications Center), “Backup Pentagon”, or “Site RT”; the latter refers to the vast array of communication towers and equipment atop the mountain. Colloquially, the facility is known as an “underground Pentagon”.