(U//LES) DEA Bulletin: Tannerite Being Used in Methamphetamine Manufacturing

DEA-TanneriteMeth

The Drug Enforcement Administration (DEA) Plattsburgh Resident Office (RO) and the New York State Police (NYSP) received credible reporting that Tannerite is being used as a substitute for ammonium nitrate using the “one-pot” methamphetamine manufacturing method. Tannerite, an explosive powder, is otherwise used in the making of exploding firearms targets. This is the first time this particular process has been reported in the New York Division’s area of responsibility (AOR).

DHS Acquisition of License Plate Reader Data from a Commercial Service Privacy Impact Assessment

DHS-CommercialLPR

U.S. Immigration and Customs Enforcement (ICE) uses information obtained from license plate readers (LPR) as one investigatory tool in support of its criminal investigations and civil immigration enforcement actions. Because LPR information can be combined with other data to identify individuals and therefore meets the definition of personally identifiable information (PII), ICE is conducting this Privacy Impact Assessment (PIA) to describe how it intends to procure the services of a commercial vendor of LPR information in order to expand the availability of this information to its law enforcement personnel. ICE is neither seeking to build nor contribute to a national public or private LPR database.

Information Sharing Environment (ISE) Functional Standard for Suspicious Activity Reporting Version 1.5.5

ISE-SAR-FunctionalStandard-1.5.5

This issuance updates the Functional Standard for ISE-SARs and is one of a series of Common Terrorism Information Sharing Standards (CTISS) issued by the Program Manager for the Information Sharing Environment (PM-ISE). While limited to describing the ISE-SAR process and associated information exchanges, information from this process may support other ISE processes, to include alerts, warnings, and notifications; situational awareness reporting; and terrorist watchlisting.

(U//LES) FBI Sovereign Citizen Quick Reference Guide for Courts

FBI-SovereignCitizenCourts

Sovereign Citizen (SC) activity typically involves criminal behavior that is generally non-violent but has lead to threats and plots against Court Officials by the more extremist adherents. Below are some indicators that you have encountered a SC during your normal duties and be a signal that additional precautions against fraudulent filings and personal harm be used.

National Strategy for the National Network of Fusion Centers 2014-2017

NationalFusionCenterStrategy-2014-2017

The vision of the 2014–2017 National Strategy is to connect the geographic and public safety diversity of over 38,000 states, counties, cities, and towns together in a way that creates a national information sharing asset that is coordinated with and contributes to federal information sharing efforts. Federal efforts to connect the knowledge and capabilities of the Intelligence Community (IC) often involve state and local law enforcement joining federal efforts. The NNFC is the reversal and broadening of this framework, inviting federal partners to join state and local public safety information sharing efforts. In carrying out this strategy, IC professionals have an opportunity and avenue to bring their knowledge and capabilities to state and major urban area fusion centers, designated by governors and staffed by state and local professionals. As a unique national asset, this state and local network must work seamlessly with field-based intelligence and information sharing entities, providing geographic and interdisciplinary knowledge and perspective without interrupting or replicating federal efforts. The 2014–2017 National Strategy integrates with other criminal intelligence sharing efforts supported by the Criminal Intelligence Coordinating Council.

Feds Issue Bulletin Warning ISIL’s “Savvy” Use of Media is Resonating with Western Youth

The fo

The “innovative use of social media and messaging” by the Islamic State of Iraq and the Levant (ISIL) “has played a key role in motivating young Western males and females to travel to the Syrian conflict to join and support the self-declared Islamic State” according to a join intelligence bulletin released by the Department of Homeland Security and FBI last month. The 5-page bulletin titled “ISIL Social Media Messaging Resonating with Western Youth” was disseminated to law enforcement throughout the country at the end of February to report on the “continuing trend” of Western youth being inspired to travel to Syria and join ISIL forces. According to the bulletin, this trend is aided by the fact that “Western youth are willing to connect over social media with like-minded persons, and have proven adept at obfuscating such social media usage from their parents and guardians.”

(U//FOUO) DHS-FBI Bulletin: ISIL Social Media Messaging Resonating with Western Youth

DHS-FBI-SocialMediaISIL

This Joint Intelligence Bulletin (JIB) is intended to provide information on a continuing trend of Western youth being inspired by Islamic State of Iraq and the Levant (ISIL) messaging via social media to travel to Syria to participate in the conflict. This JIB is provided to support the activities of FBI and DHS to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and private sector security partners in deterring, preventing, or disrupting terrorist attacks in the United States.

U.N. Human Rights Office Report on Islamic State War Crimes

UN-ISIS-WarCrimes

The present report has been prepared by the Office of the United Nations High Commissioner for Human Rights pursuant to Human Rights Council resolution A/HRC/RES/S-22/1, in which the Council requested the High Commissioner to dispatch a mission to Iraq to investigate alleged violations and abuses of international human rights law committed by ISIL and associated terrorist groups, and to establish the facts and circumstances of such abuses and violations, with a view to avoiding impunity and ensuring full accountability.

Comments on Reddit Led to Virginia Fusion Center Warning on Protesters Attacking Emergency Vehicles

oemc-vehicle

A bulletin issued in December 2014 by the Virgina Fusion Center (VFC) warned law enforcement and first responders that emergency vehicles could be targeted by violent protesters seeking to retaliate against the perceived surveillance of their activities. The bulletin, which is titled “Malicious Activists May Promote Harm to Emergency Management Vehicles Observed During Violent Protests,” draws its conclusion that “violent or malicious activity” could be directed toward emergency vehicles “operating near protest areas” based primarily upon comments to a post on Reddit and a protest guide posted anonymously on Pastebin.

(U//FOUO) Virginia Fusion Center Bulletin: Malicious Activists May Promote Harm to Emergency Vehicles

VFC-ViolentProtesters

The Virginia Fusion Center (VFC) has observed via open sources that actors affiliated with the Anonymous hacktivist movement released a video which purportedly identifies a Chicago Office of Emergency Management and Communications (OEMC) vehicle as a tool for law enforcement wiretapping efforts by police and fusion center personnel in Chicago, Illinois. The VFC is sharing this information for situational awareness, as emergency management vehicles operating near protest areas may be targeted by precipitating violent or malicious activity.

U.K. Parliament Intelligence and Security Committee Report on GCHQ Mass Surveillance

UK-ISC-MassSurveillance

The leak by Edward Snowden of stolen intelligence material in June 2013 led to allegations regarding the UK Agencies’ use of intrusive capabilities – in particular those relating to GCHQ’s interception of internet communications. This Committee investigated the most serious of those allegations – that GCHQ were circumventing UK law – in July 2013. We concluded that that allegation was unfounded. However, we considered that a more in-depth Inquiry into the full range of the Agencies’ intrusive capabilities was required – not just in terms of how they are used and the scale of that use, but also the degree to which they intrude on privacy and the extent to which existing legislation adequately defines and constrains these capabilities.

FCC Order on Protecting and Promoting the Open Internet

FCC-NetNeutrality

The open Internet drives the American economy and serves, every day, as a critical tool for America’s citizens to conduct commerce, communicate, educate, entertain, and engage in the world around them. The benefits of an open Internet are undisputed. But it must remain open: open for commerce, innovation, and speech; open for consumers and for the innovation created by applications developers and content companies; and open for expansion and investment by America’s broadband providers. For over a decade, the Commission has been committed to protecting and promoting an open Internet.

(U//FOUO) DHS-FBI-NCTC Bulletin: Terrorists Encouraging Use of Propane Cylinders as IEDs

DhS-FBI-NCTC-PropaneIEDs

Since the May 2010 publication of the Roll Call Release “Terrorist Use of Propane Cylinders,” terrorists have continued to advocate the use of propane cylinders in building improvised explosive devices (IEDs). Throughout 2014, al-Qa‘ida-inspired violent extremists posted on the Internet English-language instructions for building and using propane IEDs and encouraged attacks in the United States. The posts recommended military, commercial, and financial sector targets, major metropolitan areas, and mass gatherings.

Special Operations Command Central Multi-Method Assessment of the Islamic State of Iraq and the Levant

SOCCENT-ISIL-Assessment

Early in 2014, as it became clear that the rise of the so-­called “Islamic State” was becoming a significant menace to Regional Stability and US Interests, SOCCENT began a dialogue with Dr. Hriar Cabayan and his co-workers regarding a topic that has been at the core of the struggle against Violent Extremism. That question has been, and remains today, a perplexing one for those of us from Western cultures and societies: “What precisely are we contesting, and what is it that fuels the adversary’s power?” The contents of this paper reflect some of the work that Dr. Cabayan and his colleagues are doing to help us understand and comprehend this “intangible power” across a unique enterprise of academicians, scientists, policy intellectuals, current and former Foreign Service, military, and intelligence professionals. Most importantly, their efforts to improve our comprehension will enable us to adjust our efforts, our operations, our investments, and our risk-­‐calculations to more effectively contest it and the organization that wields it. I am grateful for their tireless work in this regard, and I commend it to the reader.

Defense Personnel Security Research Center Counterintelligence Reporting Essentials (CORE) Guide

PERSEREC-CORE

Supervisors and coworkers are willing to report on behaviors that have a clear connection to security, such as transmitting classified documents to unauthorized personnel, but they are unwilling to report on colleagues’ personal problems, such as alcohol abuse. Because it was difficult to discern which reporting requirements were clearly related to security, there was very little reporting. PERSEREC, in collaboration with counterintelligence professionals, developed a clear, succinct list of “Coworker Reporting Essentials” (CORE) behaviors that could pose a possible threat to national security and thus should be reported if observed. The draft CORE was reviewed and edited by counterintelligence professionals at the Counterintelligence Field Activity (CIFA), and was coordinated by the DoD Investigative Working Group (IWG).

U.S. Army Network Campaign Plan 2020 and Beyond

USArmy-NetworkCampaignPlan

The world is evolving into an increasingly interconnected environment. The Army of 2020 will operate in a complex world where cloud-based computers receive data from tens of billions of devices. These computers will have the capacity to digest, correlate, contextualize, process and then present data back to humans in a way that assists our decision-making process. The Army is modernizing its network to prepare for the impending data-driven, cloud-based world, as depicted in Figure 1. While legacy networking architectures stored and protected data locally, cloud-based architectures will store and protect data in a centralized yet distributed repository that enables global access. The Army Network Campaign Plan outlines current efforts that posture the Army for success in a cloud-based world.

(U//FOUO) U.K. Ministry of Defence Guide: Understanding the Arab World

UK-MoD-UnderstandingArabWorld-2

The Arab World is a vast area which is home to diverse people, many of whom have experienced considerable change since the start of 2011. The way in which people behave and interact with you will therefore vary greatly across the region. This guide discusses aspects of Arab culture that you might experience in Algeria, Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, the Palestinian Territories, Qatar, Saudi Arabia, Sudan, Syria, Tunisia, UAE and Yemen. Further reading on individual countries is recommended before you deploy.

(U//FOUO) DHS Intelligence Assessment: Sovereign Citizen Extremist Ideology Driving Violence

DHS-SovereignCitizenIdeology

This Assessment is based on an I&A review of 24 law enforcement investigations into acts and threats of sovereign citizen extremist (SCE) violence since 2010, detailing locations, targets of violence, and their statements about the violence, when available. It is intended to inform law enforcement at the federal, state, and local levels about the nature and circumstances of SCE violence to help officers prepare for, anticipate, and ultimately avoid violent incidents. Most sovereign citizens are non-violent, and this assessment applies only to those that use violence to advance their goals.

U.N. Assistance Mission in Afghanistan (UNAMA) Protection of Civilians in Armed Conflict 2014 Annual Report

UNAMA-CivilianDeaths2014-4

The intensification of conflict-related violence in Afghanistan took an extreme toll on civilians in 2014, with civilian loss of life and injury reaching unprecedented levels. UNAMA documented 10,548 civilian casualties (3,699 deaths and 6,849 injured), marking a 25 per cent increase in civilian deaths, a 21 per cent increase in injuries for an overall increase of 22 per cent in civilian casualties compared to 2013.2 In 2014, UNAMA documented the highest number of civilian deaths and injuries in a single year since it began systematically recording civilian casualties in 2009.

(U//FOUO) New Jersey Fusion Center Drug Monitoring Initiative (DMI) Drug Identification Guide

NJROIC-DrugIdentification

The New Jersey Regional Operations Intelligence Center (NJ ROIC) monitors New Jersey drug environment through the Drug Monitoring Initiative (DMI), providing an understanding of the presence and prevalence of drugs in regions throughout the state. This pill guide is for law enforcement officers and public safety officials to utilize when encountering pill products during the course of their daily duties.

Massachusetts U.S. Attorney’s Office Framework for Countering Violent Extremism

USAOMA-RadicalizationFramework

In March 2014, the White House National Security Council (NSC) requested assistance from three regions with piloting the development of a comprehensive framework that promotes multidisciplinary solutions to countering violent extremism. The Greater Boston region was selected because of its existing collaborative efforts and nationally recognized success with developing robust comprehensive violence prevention and intervention strategies. With the support of the Department of Justice, Federal Bureau of Investigation, Department of Homeland Security and National Counterterrorism Center, a range of stakeholders in the Greater Boston region began to develop a locally-driven framework. The U.S. Attorney’s Office for the District of Massachusetts has had a coordinating role in this process.

Asymmetric Warfare Group Report: Psychological and Sociological Concepts of Radicalization

USArmy-RadicalizationConcepts

Radicalization is the process by which an individual, group, or mass of people undergo a transformation from participating in the political process via legal means to the use or support of violence for political purposes (radicalism). Radicalism includes specific forms, such as terrorism, which is violence against the innocent bystander, or insurgency, which is violence against the state. It does not include legal and/or nonviolent political protest, such as protest that is more properly called activism.

FAA Proposed Rules on Operation and Certification of Small Unmanned Aircraft Systems

FAA-ProposedDroneRules

The FAA is proposing to amend its regulations to adopt specific rules to allow the operation of small unmanned aircraft systems in the National Airspace System. These changes would address the operation of unmanned aircraft systems, certification of their operators, registration, and display of registration markings. The proposed rule would also find that airworthiness certification is not required for small unmanned aircraft system operations that would be subject to this proposed rule. Lastly, the proposed rule would prohibit model aircraft from endangering the safety of the National Airspace System.

UK Computer Emergency Response Team (CERT) Introduction to Social Engineering

UK-CERT-SocialEngineering

Social engineering is one of the most prolific and effective means of gaining access to secure systems and obtaining sensitive information, yet requires minimal technical knowledge. Attacks vary from bulk phishing emails with little sophistication through to highly targeted, multi-layered attacks which use a range of social engineering techniques. Social engineering works by manipulating normal human behavioural traits and as such there are only limited technical solutions to guard against it.