The National Communications System (NCS), as the Communications Sector-Specific Agency (SSA), manages numerous protective programs that industry developed and operates to further help reduce risk to the Communications Sector by ensuring the security of the communications infrastructure and delivery of National Security and Emergency Preparedness (NS/EP) communications services, with a strong focus on response and recovery. These programs include the Government Emergency Telecommunications Service (GETS), Wireless Priority Service (WPS), and the Telecommunications Service Priority (TSP) Program. The NCS has also begun to work with industry to develop a Next Generation Priority Service (NGPS). The overarching goal of the above programs is to improve access and expedite restoration or provisioning for national security and emergency preparedness users should there be congestion in the network.
Connecticut, FEMA
Connecticut 2008 Emergency Communications Plan
The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.
Intelligence Fusion Centers, North Carolina
North Carolina Information Sharing and Analysis Center February Bulletin
FOUO/LES North Carolina Information Sharing and Analysis Center (ISAAC) February Intelligence Bulletin.
United Arab Emirates
Mossad Dubai Assassins Travel Routes Maps
Maps of travel routes of the 26 Mossad Assassins who killed Mahmoud al-Mabhouh in Dubai on January 19, 2010.
Department of Homeland Security
DHS Admissibility of Digital Photographs in Criminal Trials
DHS Admissibility of Digital Photographs in Criminal Trials Brief from the Federal Law Enforcement Training Center, November 13, 2008.
Defense Threat Reduction Agency, Joint Chiefs of Staff
Joint Staff / Defense Threat Reduction Agency Anti-terrorism Vulnerability Assessment Benchmarks 2008
FOUO Joint Staff / Defense Threat Reduction Agency Anti-terrorism Vulnerability Assessment Benchmarks, January 1, 2008.
U.S. Southern Command
USSOUTHCOM El Salvador Gangs Presentation
Maras emerged out of the conflicts during the 1970s & 80s in Central America. In the context of the wars and insurgencies in El Salvador, Guatemala, and Nicaragua, thousands of people, including youngmen fled North, many which had training on guns as well as armed combat techniques. In Los Angeles they encountered rejection by other Hispanic communities and found it difficult to find work and socialize; a percentage of these young men, especially those from El Salvador where part of the insurgency/ civil war back home and joined the 18th Street Gang from LA, which was started by Mexicans and expanded to other Hispanics, African- Americans, and Asians.
Corporate
LoJack and Law Enforcement
The following primer on LoJack stolen vehicle recovery systems is written for law enforcement officers who communicate with the media. It’s designed to factually explain the various components of the LoJack Stolen Vehicle Recovery System and how it is used by officers to track and recover vehicles that have been reported stolen by their owners. If you have additional questions on LoJack, please contact your local LoJack Law Enforcement Liaison or LoJack Corporate Communications.
Corporate
eBay/PayPal Responding to Law Enforcement Record Requests
eBay, Inc., has established a Fraud Investigations Team (FIT) to promote safe use of our platforms, and encourage prosecution of those responsible for misconduct on them. Law enforcement agencies in North America seeking assistance and records for investigations that relate to either the eBay marketplace or PayPal financial transactions may contact FIT directly for information by phone (408.967.9916 – automated message only).
Arizona, Department of Homeland Security
Arizona Statewide Communications Interoperability Plan
The Arizona Statewide Communications Interoperability Plan (SCIP) serves as a reference for public safety officials by describing the status of interoperable communications throughout Arizona and by documenting the specific goals and objectives Arizona has established to improve public safety communications.
Corporate
AT&T Wireless and AT&T Mobility, LLC Subpoena Guides
The National Compliance Center (NCC) is a team of specialized, wireless subpoena and court order compliance professionals focused on providing law enforcement, officers of the court, Public Safety Answering Points and other legal contacts with the best possible customer service in the wireless industry. The NCC is located in North Palm Beach, Florida and currently responds to all subpoena, search warrant and court ordered requests nationwide for wireless customer records. The goal of this team is to comply with civil and criminal process and provide assistance to federal, state and local law enforcement agencies, attorneys, and customers pursuant to that process. At the same time, the team must ensure that they adhere to all applicable state and federal laws and protect the privacy of our customers.
Corporate
Microsoft Windows 7/Vista Advanced Forensics Guides for Law Enforcement
More than five-hundred pages of law enforcement sensitive guides concerning Microsoft Windows 7/Vista Advanced Forensics Topics.
Corporate
2007 MySpace.com Law Enforcement Guide
MySpace.com (“MySpace”) is committed to assisting law enforcement, to the extent permitted by law, in investigations related to unlawful activity. This Law Enforcement Guide is designed to serve that purpose by providing information to facilitate law enforcement requests for user data held by MySpace. The Guide specifies what information is collected by MySpace, how long that information is retained, how to tailor requests to ensure MySpace produces the specific information sought, and the legal process necessary to permit MySpace to disclose different types of information. Finally, the Guide provides contact information for MySpace personnel dedicated specifically to responding to law enforcement requests, including emergency requests.
Corporate
Microsoft Online Services Global Criminal Compliance Handbook
Information that may be disclosed with a subpoena. Basic subscriber information includes name, address, length of service (start date), screen names, other email accounts, IP address/IP logs/Usage logs, billing information, content (other than e-mail, such as in Windows Live Spaces and MSN Groups) and e-mail content more than 180 days old as long as the governmental entity follows the customer notification provisions in ECPA (see 18 U.S.C. §§ 2703(b), 2705.)
Corporate
MySpace: Working with Law Enforcement
• Data retained by MySpace
– IP activity related to all logins and image uploads are retained for at least a year.
– Basic subscriber information is retained for at least a year.
– Private messages, blogs, and comments are available if they still exist live on the site.
– Deleted front end profile information is NOT retained by MySpace, nor do we retain previous versions of the profile.
Intelligence Fusion Centers
Regional Organized Crime Information Center Active Shooter Guide
Some of the most tragic events in our country’s recent history have been episodes where a deviant has carried out shootings in public places. These killings take place for no other reason than to harm as many innocent people as possible. They are often unpredictable and strike in places dear to us, such as our schools, churches, and places of work. They also can occur in random public settings. The definition of an active shooter incident is when one or more subjects participate in a shooting spree, random or systematic, with intent to continuously harm others. Active shooter scenarios are incredibly dangerous and difficult because there is no criminal objective (robbery, hostagetaking) involved other than mass murder.
United States
Council on Foreign Relations 2009 Membership Roster
Complete 2009 Membership Roster from the Council on Foreign Relations.
United States
U.S. Electronic Crimes Statutes By State
Listings of U.S. electronic crime statutes by state, taken from copies that are issued to Forward Edge 2, a U.S. Secret Service interactive, computer-based training program which “takes the next step” in training law enforcement officers to conduct electronic crime investigations.
Verizon
Verizon Wireless Law Enforcement Resource Team (LERT) Guide
The Verizon Wireless LERT is dedicated to responding to all lawful process for business and customer information. We assist law enforcement personnel and members of the legal community in a professional, knowledgeable and expeditious manner while maintaining the privacy and security of business and customer information. We provide informational presentations for law enforcement organizations and associations to further demonstrate our commitment and support of public safety.
Tennessee
Tennessee Methamphetamine Task Force Brief
2009 Meth Seizure Trends
* 1,008 Meth Seizures thru September 2009
* 542 Meth Seizures thru September 2008
* 86% Increase over the Same Period in 2008.
* Seizure Total Could Reach 1,344 for all of 2009
* Reasons for Increase
* One Pot Manufacturing
U.S. Army
U.S. Army TC 21-306: Tracked Combat Vehicle Driver Training
This training circular (TC) provides the unit commander, vehicle commander, and the vehicle driver with the basis for developing a tracked combat vehicle driver training program and can assist commanders in selecting highly qualified drivers. TC 21-306 is a result of the Chief of Staff of the Army’s (CSA) direction to the Training and Doctrine Command (TRADOC) to develop tracked and wheeled vehicle driver training programs, to include the development of training support packages (TSPs) that will standardize driver training Armywide. The TSPs described in this publication fulfill that requirement for tracked vehicles by providing units with flexible training programs that can be implemented as stand-alone courses or integrated into existing training.
Threats and Takedown Notices
Multiple Fusion Centers Request Removal of Documents from Public Intelligence
In the month of February, we have received multiple notices from U.S. Intelligence Fusion Centers requesting the removal of documents from our archive. The notices originated from the following entities:
1. Virginia Fusion Center
2. Rocky Mountain Information Network
Canada
Canada Terrorist Attack Tactics Against Bridges and Tunnels: January 2002 – December 2008
Canada has many large bridges and tunnels, including 24 international vehicular bridges and tunnels linking Canada and the United States – specifically to the states of Maine, Vermont, New York, Michigan and Minnesota. Fourteen of these bridges and tunnels are in Ontario, nine are in New Brunswick, and one is in Quebec. As well, there are nine international railway bridges and tunnels – eight in Ontario, with another one in New Brunswick. Damage to one or more of these structures would cause short to medium-term traffic congestion at the border, and would hurt the economy of both countries.
New York
NYPD University of Alabama Amy Bishop Shooting Brief
Overview
•At approximately 4 pm, local time, a female shooter opened fire on the campus of University Alabama-Huntsville
-The shooter was a female member of the university faculty
-The attack occurred at a biology faculty meeting
•Reports indicate 3 people were killed and 3 wounded
-2 male victims are in critical condition
-1 female victim is in stable condition
•The female suspect was arrested and her husband is detained
•Shooting occurred in the Shelby Center, a 200,000-square-foot science facility on the university campus
•Motive: the female opened fire when she learned she would not get a tenure faculty position as a full-time biology professor
Congressional Research Service
The National Counterterrorism Center (NCTC)—Responsibilities and Potential Congressional Concerns
The National Counterterrorism Center (NCTC) was established in 2004 to ensure that information from any source about potential terrorist acts against the U.S. could be made available to analysts and that appropriate responses could be planned. Investigations of the 9/11 attacks had demonstrated that information possessed by different agencies had not been shared and thus that disparate indications of the looming threat had not been connected and warning had not been provided. As a component of the Office of the Director of National Intelligence, the NCTC is composed of analysts with backgrounds in many government agencies and has access to various agency databases.