The following list is approximate and partial, and it changes from time to time. It is based on information from Palestinian traders and businesspersons, international organizations, and the Palestinian Coordination Committee, all of whom “deduce” what is permitted and what is banned based on their experience requesting permission to bring goods into Gaza and the answers they receive from the Israeli authorities (approved or denied). It is not possible to verify this list with the Israeli authorities because they refuse to disclose information regarding the restrictions on transferring goods into Gaza. It should be noted that Israel permits some of the “prohibited” items into Gaza (for example: paper, biscuits, and chocolate), on the condition that they are for the use of international organizations, while requests from private merchants to purchase them are denied.
352 search results for "cell"
United States
Trilateral Commission Complete Membership List May 2010
Trilateral Commission Complete Membership List, May 2010.
Federal Bureau of Investigation
(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses
(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.
Transportation Security Administration
TSA Mass Transit System Threat Assessment 2008
(U//FOUO) The U.S. mass transit and passenger rail systems are vulnerable to terrorist attacks because they are accessible to large numbers of the public and are notoriously difficult to secure.
Department of Justice
Intelligence-Led Policing: The New Intelligence Architecture
Intelligence operations have been reviewed, studied, and slowly but steadily transformed. Most efforts have focused on reorganizing intelligence infrastructures at the federal level; however, corresponding efforts have been made to enhance state and local law enforcement intelligence operations. Such enhancements make it possible for state and local law enforcement agencies to play a role in homeland security. Perhaps more important, improvements to intelligence operations help local law enforcement respond to “traditional” crimes more effectively.
Threats and Takedown Notices
FEMA Requests Removal of National Level Exercise 2010 (NLE 10) Document
On April 13, 2010, we received a message from Danny Rains who is an investigator for the Federal Emergency Management Agency in the “Office of Security” requesting the removal of a document entitled “National Level Exercise 2010 (NLE 10) Exercise Overview”. The ten page document, which is described in FEMA’s request as “very sensitive”, consists of approximately 20 PowerPoint slides including the title page and was published nearly seven months ago on August 8, 2009. The document is labeled “For Official Use Only” and is marked as a draft copy. The contents of the brief are basically a calender of potential dates for the exercise and very brief descriptions of some preliminary plans for the exercise. The document has already been seen by a large number of people and has been discussed on a variety of websites and forums, including mirrors in some cases.
Canada
Canadian Land Force Counter-Insurgency Operations Manual
A COIN campaign is conducted through a specific philosophy and a set of specific principles that guide the application of combat power. It is distinctly different from the conduct of an insurgency itself, and the lines of operation within the COIN campaign must counter the lines of operation of the insurgents. Within the guiding principles, each COIN campaign must be a custom approach to the insurgency at hand. The constant is the fact that insurgency and counter-insurgency are essentially about the battle to win and hold popular support both at home and in the theatre of operations.
Intelligence Fusion Centers, Washington D.C.
Washington, D.C. Fusion Center: Officer Safety Issues, November 2009
(U//FOUO//LES) Washington Regional Threat and Analysis Center Officer Safety Issues, November 2009.
Threats and Takedown Notices
Third U.S. Fusion Center Requests Removal of Document from Public Intelligence
The following message was received on April 5, 2010 from a Captain Brad Carnduff of the Illinois Statewide Terrorism and Intelligence Center. This is the third notice we have received from a U.S. fusion center. The previous two notices, from the Virginia Fusion Center and the Rocky Mountain Information Network, were both received in the month of February. This notice is unique in that it requests the identity of the “person, group or organization who forwarded this Daily Intelligence Note to your attention”. It also asks that we “contact the STIC prior to posting” similar material in the future.
Intelligence Fusion Centers, Kansas
KCTEW Bulletin: (U//FOUO) Hydrogen Sulfide Suicides
Hydrogen sulfide is considered a broad spectrum poison, meaning ‐ that it can poison several different systems in the body, although the nervous system is most affected. The toxicity of H2S is comparable with that of hydrogen cyanide. It forms a complex bond with iron in the mitochondrial cytochrome enzymes, thereby blocking oxygen from binding and stopping cellular respiration.
California
Oakland Police Department Officer Shooting Brief March 21, 2009
Orange County Sheriff-Coroner Department Brief on Oakland Police Department Officer Involved Shooting that occurred March 21, 2009.
Bureau of Alcohol Tobacco Firearms and Explosives
ATF American/Canadian Northern Border Extremists
According to information obtained via the Southern Poverty Law Center (SPLC), the number of hate groups operating with the United States has risen and continues to rise. In 2006, law enforcement intelligence and SPLC information counted 844 organizations in 2007; this number has risen to 888, an increase of approximately 4.7 percent. This number may seem small; however, during an 8-year time period, this has translated into a 48-percent jump in the number of groups since 2000, when there were 602 hate groups operating in the United States, according to research by the intelligence project of the SPLC. Much of the expansion has been driven by hate groups’ exploitation of the issue of illegal immigration, which most Americans see as a pressing concern. This overview addresses the issue of American and Canadian extremism in Canada and in those States that fall along the American-Canadian border.
Customs and Border Protection
U.S. DHS/CBP Female Suicide Bomber Threat Assessment
(U/FOUO) In the aftermath of the Christmas Day suicide bombing attempt over Detroit, it has become apparent that terrorist organizations continue to scrutinize and attempt to circumvent border security procedures by using a variety of methods. One such method that has not been fully analyzed is the possible use of female operatives. The media has recently reported information suggesting that al-Qa’ida will expand the scope of the female suicide bomber outside of Iraq to include western airliners.
Afghanistan, Iraq, U.S. Marine Corps
USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF
The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.
United States
U.S. Government Emergency Telecommunications Service
The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency phone service provided by the National Communications System (NCS) in the Office of Cybersecurity and Communications Division, National Protection and Programs Directorate, Department of Homeland Security. GETS supports Federal, State, local, and tribal government, industry, and non-governmental organization (NGO) personnel in performing their National Security and Emergency Preparedness (NS/EP) missions. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN). It is intended to be used in an emergency or crisis situation when the PSTN is congested and the probability of completing a call over normal or other alternate telecommunication means has significantly decreased.
Corporate
Nextel’s Guide For Law Enforcement – Subpoena & Court Orders
This Guide was prepared for Law Enforcement to facilitate the processing of subpoena requests and compliance with court orders for electronic surveillance directed to Nextel Communications, or any of its operating subsidiaries (collectively “Nextel”). This Guide references the Nextel points-of-contact that have been authorized to assist Law Enforcement with subpoena compliance, as well as with the provisioning of lawful interceptions of communications on Nextel’s wireless networks. In addition, this Guide provides Law Enforcement with an overview of Nextel’s current administrative practices and policies required to support these requests.
Department of Homeland Security
DHS Communications Sector Critical Infrastructure 2008 Report
The National Communications System (NCS), as the Communications Sector-Specific Agency (SSA), manages numerous protective programs that industry developed and operates to further help reduce risk to the Communications Sector by ensuring the security of the communications infrastructure and delivery of National Security and Emergency Preparedness (NS/EP) communications services, with a strong focus on response and recovery. These programs include the Government Emergency Telecommunications Service (GETS), Wireless Priority Service (WPS), and the Telecommunications Service Priority (TSP) Program. The NCS has also begun to work with industry to develop a Next Generation Priority Service (NGPS). The overarching goal of the above programs is to improve access and expedite restoration or provisioning for national security and emergency preparedness users should there be congestion in the network.
Connecticut, FEMA
Connecticut 2008 Emergency Communications Plan
The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.
U.S. Southern Command
USSOUTHCOM El Salvador Gangs Presentation
Maras emerged out of the conflicts during the 1970s & 80s in Central America. In the context of the wars and insurgencies in El Salvador, Guatemala, and Nicaragua, thousands of people, including youngmen fled North, many which had training on guns as well as armed combat techniques. In Los Angeles they encountered rejection by other Hispanic communities and found it difficult to find work and socialize; a percentage of these young men, especially those from El Salvador where part of the insurgency/ civil war back home and joined the 18th Street Gang from LA, which was started by Mexicans and expanded to other Hispanics, African- Americans, and Asians.
Corporate
LoJack and Law Enforcement
The following primer on LoJack stolen vehicle recovery systems is written for law enforcement officers who communicate with the media. It’s designed to factually explain the various components of the LoJack Stolen Vehicle Recovery System and how it is used by officers to track and recover vehicles that have been reported stolen by their owners. If you have additional questions on LoJack, please contact your local LoJack Law Enforcement Liaison or LoJack Corporate Communications.
United States
Council on Foreign Relations 2009 Membership Roster
Complete 2009 Membership Roster from the Council on Foreign Relations.
United States
U.S. Electronic Crimes Statutes By State
Listings of U.S. electronic crime statutes by state, taken from copies that are issued to Forward Edge 2, a U.S. Secret Service interactive, computer-based training program which “takes the next step” in training law enforcement officers to conduct electronic crime investigations.
Verizon
Verizon Wireless Law Enforcement Resource Team (LERT) Guide
The Verizon Wireless LERT is dedicated to responding to all lawful process for business and customer information. We assist law enforcement personnel and members of the legal community in a professional, knowledgeable and expeditious manner while maintaining the privacy and security of business and customer information. We provide informational presentations for law enforcement organizations and associations to further demonstrate our commitment and support of public safety.
Tennessee
Tennessee Methamphetamine Task Force Brief
2009 Meth Seizure Trends
* 1,008 Meth Seizures thru September 2009
* 542 Meth Seizures thru September 2008
* 86% Increase over the Same Period in 2008.
* Seizure Total Could Reach 1,344 for all of 2009
* Reasons for Increase
* One Pot Manufacturing
Congressional Research Service
Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy
Al Qaeda (AQ) has evolved into a significantly different terrorist organization than the one that perpetrated the September 11, 2001, attacks. At the time, Al Qaeda was composed mostly of a core cadre of veterans of the Afghan insurgency against the Soviets, with a centralized leadership structure, made up mostly of Egyptians. Most of the organization’s plots either emanated from the top or were approved by the leadership. Some analysts describe pre-9/11 Al Qaeda as akin to a corporation, with Osama Bin Laden acting as an agile Chief Executive Officer issuing orders and soliciting ideas from subordinates.