352 search results for "cell"

Partial List of Items Prohibited/Permitted into the Gaza Strip

The following list is approximate and partial, and it changes from time to time. It is based on information from Palestinian traders and businesspersons, international organizations, and the Palestinian Coordination Committee, all of whom “deduce” what is permitted and what is banned based on their experience requesting permission to bring goods into Gaza and the answers they receive from the Israeli authorities (approved or denied). It is not possible to verify this list with the Israeli authorities because they refuse to disclose information regarding the restrictions on transferring goods into Gaza. It should be noted that Israel permits some of the “prohibited” items into Gaza (for example: paper, biscuits, and chocolate), on the condition that they are for the use of international organizations, while requests from private merchants to purchase them are denied.

(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses

(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.

Intelligence-Led Policing: The New Intelligence Architecture

Intelligence operations have been reviewed, studied, and slowly but steadily transformed. Most efforts have focused on reorganizing intelligence infrastructures at the federal level; however, corresponding efforts have been made to enhance state and local law enforcement intelligence operations. Such enhancements make it possible for state and local law enforcement agencies to play a role in homeland security. Perhaps more important, improvements to intelligence operations help local law enforcement respond to “traditional” crimes more effectively.

FEMA Requests Removal of National Level Exercise 2010 (NLE 10) Document

On April 13, 2010, we received a message from Danny Rains who is an investigator for the Federal Emergency Management Agency in the “Office of Security” requesting the removal of a document entitled “National Level Exercise 2010 (NLE 10) Exercise Overview”. The ten page document, which is described in FEMA’s request as “very sensitive”, consists of approximately 20 PowerPoint slides including the title page and was published nearly seven months ago on August 8, 2009. The document is labeled “For Official Use Only” and is marked as a draft copy. The contents of the brief are basically a calender of potential dates for the exercise and very brief descriptions of some preliminary plans for the exercise. The document has already been seen by a large number of people and has been discussed on a variety of websites and forums, including mirrors in some cases.

Canadian Land Force Counter-Insurgency Operations Manual

A COIN campaign is conducted through a specific philosophy and a set of specific principles that guide the application of combat power. It is distinctly different from the conduct of an insurgency itself, and the lines of operation within the COIN campaign must counter the lines of operation of the insurgents. Within the guiding principles, each COIN campaign must be a custom approach to the insurgency at hand. The constant is the fact that insurgency and counter-insurgency are essentially about the battle to win and hold popular support both at home and in the theatre of operations.

Third U.S. Fusion Center Requests Removal of Document from Public Intelligence

The following message was received on April 5, 2010 from a Captain Brad Carnduff of the Illinois Statewide Terrorism and Intelligence Center. This is the third notice we have received from a U.S. fusion center. The previous two notices, from the Virginia Fusion Center and the Rocky Mountain Information Network, were both received in the month of February. This notice is unique in that it requests the identity of the “person, group or organization who forwarded this Daily Intelligence Note to your attention”. It also asks that we “contact the STIC prior to posting” similar material in the future.

KCTEW Bulletin: (U//FOUO) Hydrogen Sulfide Suicides

Hydrogen sulfide is considered a broad spectrum poison, meaning ‐ that it can poison several different systems in the body, although the nervous system is most affected. The toxicity of H2S is comparable with that of hydrogen cyanide. It forms a complex bond with iron in the mitochondrial cytochrome enzymes, thereby blocking oxygen from binding and stopping cellular respiration.

ATF American/Canadian Northern Border Extremists

According to information obtained via the Southern Poverty Law Center (SPLC), the number of hate groups operating with the United States has risen and continues to rise. In 2006, law enforcement intelligence and SPLC information counted 844 organizations in 2007; this number has risen to 888, an increase of approximately 4.7 percent. This number may seem small; however, during an 8-year time period, this has translated into a 48-percent jump in the number of groups since 2000, when there were 602 hate groups operating in the United States, according to research by the intelligence project of the SPLC. Much of the expansion has been driven by hate groups’ exploitation of the issue of illegal immigration, which most Americans see as a pressing concern. This overview addresses the issue of American and Canadian extremism in Canada and in those States that fall along the American-Canadian border.

U.S. DHS/CBP Female Suicide Bomber Threat Assessment

(U/FOUO) In the aftermath of the Christmas Day suicide bombing attempt over Detroit, it has become apparent that terrorist organizations continue to scrutinize and attempt to circumvent border security procedures by using a variety of methods. One such method that has not been fully analyzed is the possible use of female operatives. The media has recently reported information suggesting that al-Qa’ida will expand the scope of the female suicide bomber outside of Iraq to include western airliners.

USMC Irregular Warfare (IW) and Interagency Integration Lessons from OIF/OEF

The following material was extracted from MCCLL reports based on interviews, lessons and observations from operational units that participated in OIF/OEF over the past 36 months. Although this material is based on collections that took place in 2005 through 2007, comments from recent observers and currently deployed individuals indicate that issues on the ground likely remain the same. Content of this paper is grouped in response to specific questions in the TECOM tasking dated 2 April 2008.

U.S. Government Emergency Telecommunications Service

The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency phone service provided by the National Communications System (NCS) in the Office of Cybersecurity and Communications Division, National Protection and Programs Directorate, Department of Homeland Security. GETS supports Federal, State, local, and tribal government, industry, and non-governmental organization (NGO) personnel in performing their National Security and Emergency Preparedness (NS/EP) missions. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN). It is intended to be used in an emergency or crisis situation when the PSTN is congested and the probability of completing a call over normal or other alternate telecommunication means has significantly decreased.

Nextel’s Guide For Law Enforcement – Subpoena & Court Orders

This Guide was prepared for Law Enforcement to facilitate the processing of subpoena requests and compliance with court orders for electronic surveillance directed to Nextel Communications, or any of its operating subsidiaries (collectively “Nextel”). This Guide references the Nextel points-of-contact that have been authorized to assist Law Enforcement with subpoena compliance, as well as with the provisioning of lawful interceptions of communications on Nextel’s wireless networks. In addition, this Guide provides Law Enforcement with an overview of Nextel’s current administrative practices and policies required to support these requests.

DHS Communications Sector Critical Infrastructure 2008 Report

The National Communications System (NCS), as the Communications Sector-Specific Agency (SSA), manages numerous protective programs that industry developed and operates to further help reduce risk to the Communications Sector by ensuring the security of the communications infrastructure and delivery of National Security and Emergency Preparedness (NS/EP) communications services, with a strong focus on response and recovery. These programs include the Government Emergency Telecommunications Service (GETS), Wireless Priority Service (WPS), and the Telecommunications Service Priority (TSP) Program. The NCS has also begun to work with industry to develop a Next Generation Priority Service (NGPS). The overarching goal of the above programs is to improve access and expedite restoration or provisioning for national security and emergency preparedness users should there be congestion in the network.

Connecticut 2008 Emergency Communications Plan

The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.

USSOUTHCOM El Salvador Gangs Presentation

Maras emerged out of the conflicts during the 1970s & 80s in Central America. In the context of the wars and insurgencies in El Salvador, Guatemala, and Nicaragua, thousands of people, including youngmen fled North, many which had training on guns as well as armed combat techniques. In Los Angeles they encountered rejection by other Hispanic communities and found it difficult to find work and socialize; a percentage of these young men, especially those from El Salvador where part of the insurgency/ civil war back home and joined the 18th Street Gang from LA, which was started by Mexicans and expanded to other Hispanics, African- Americans, and Asians.

LoJack and Law Enforcement

The following primer on LoJack stolen vehicle recovery systems is written for law enforcement officers who communicate with the media. It’s designed to factually explain the various components of the LoJack Stolen Vehicle Recovery System and how it is used by officers to track and recover vehicles that have been reported stolen by their owners. If you have additional questions on LoJack, please contact your local LoJack Law Enforcement Liaison or LoJack Corporate Communications.

Verizon Wireless Law Enforcement Resource Team (LERT) Guide

The Verizon Wireless LERT is dedicated to responding to all lawful process for business and customer information. We assist law enforcement personnel and members of the legal community in a professional, knowledgeable and expeditious manner while maintaining the privacy and security of business and customer information. We provide informational presentations for law enforcement organizations and associations to further demonstrate our commitment and support of public safety.

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda (AQ) has evolved into a significantly different terrorist organization than the one that perpetrated the September 11, 2001, attacks. At the time, Al Qaeda was composed mostly of a core cadre of veterans of the Afghan insurgency against the Soviets, with a centralized leadership structure, made up mostly of Egyptians. Most of the organization’s plots either emanated from the top or were approved by the leadership. Some analysts describe pre-9/11 Al Qaeda as akin to a corporation, with Osama Bin Laden acting as an agile Chief Executive Officer issuing orders and soliciting ideas from subordinates.