Iranian President Hassan Rouhani Speech to UN General Assembly Transcript September 25, 2014

Extremism is not a regional issue that just the nations of our region would have to grapple with; extremism is a global issue. Certain states have helped creating it and are now failing to withstand it. Currently our peoples are paying the price. Today’s anti-Westernism is the offspring of yesterday’s colonialism. Today’s anti-Westernism is a reaction to yesterday’s racism. Certain intelligence agencies have put blades in the hand of madmen, who now spare no one. All those who have played a role in founding and supporting these terror groups must acknowledge their errors that have led to extremism. They need to apologize not only to the past but also to the next generation.

(U//FOUO) New Jersey Fusion Center Special Events List September 2014

The NJ Office of Homeland Security and Preparedness (OHSP) compiles a statewide list of special events that provides situational awareness to law enforcement, as well as to assist in local planning requirements. Special events include any event that attracts large numbers of participants and spectators in both a public or private venue. Examples include concerts, marathons, firework displays, community celebrations, visits by VIPs, sporting events, holiday gatherings, etc.

General Services Administration 1122 Program Equipment and Supplies Catalog

Section 1122 of the fiscal year 1994 National Defense Authorization Act established the authority for State and local governments to purchase law enforcement equipment through Federal procurement channels, provided that the equipment is used in the performance of counter-drug activities. The “1122 Program” affords State and local governments the opportunity to maximize their use of taxpayer dollars, by taking advantage of the purchasing power of the Federal Government to receive discounts commensurate with large volume purchases.

Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police

“First time I ever saw an Afghan Police Station I thought it was something straight out of the dark ages, complete with zero electricity, mud structure, and no sewage drainage. Immediately I knew this mission would be challenging and wondered what the heck I got myself into?” This quote from a U.S. Army Captain is just one example of the unusually blunt assessments contained in the Joint Center for International Security Force Assistance (JCISFA) guide for advising the Afghan National Police (ANP). The 2010 version of the JCISFA ANP Mentor Guide, which was obtained by Public Intelligence along with a guide for troops assisting the Afghan National Army (ANA), contains a number of revealing observations on the often poor condition of Afghan National Security Forces, in particular the ANP.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Police Mentor Guide

In order to develop the ANP, the Combined Security Transition Command-Afghanistan (CSTC-A) uses Police Mentor Teams to help develop them. A shortage of PMTs across the country, however, has led to the formation of in-lieu of advisor teams comprised of Soldiers from land owning units or attached Military Police units. The purpose of this document is to help provide those additional advisory teams with information they need to develop the skills required to effectively augment the CSTC-A program. This handbook will provide an overview of the entire police program including current goals, relationships to other organizations, the Focused District Development Program, key challenges that may be encountered and the duties of key members of the police advising teams including how to work with the team’s enablers.

(U//FOUO) Joint Center for International Security Force Assistance Afghan National Army Mentor Guide

This guide is a JCISFA publication on mentoring the Afghan National Army and is applicable to advisors, mentors and partner forces executing Security Force Assistance (SFA) operations. The guide is a companion to the May 2009 JCISFA Afghan National Police Mentor Guide and addresses identified gaps in mentoring Afghan National Security Forces. The guide offers cultural background information, partner security force challenges, advisor/mentor best practices, and challenges. As the United States assists other nations, our forces must adopt a “by, with, and through” strategy to enable a supported nation and its security forces to generate and sustain capabilities institutionally and operationally. We can achieve this by advising and mentoring them, partnering with the supported nation and through development of the supported nation and its security forces so that they can do it themselves.

Megacities and the U.S. Army: Preparing for a Complex and Uncertain Future

Cities with populations of ten million or more are given a special designation: megacity. There are currently over twenty megacities in the world, and by 2025 there will be close to forty. The trends are clear. Megacities are growing, they are be-coming more connected, and the ability of host nation governments to effectively deal with their explosive growth and maintain security is, in many cases, diminishing. Megacities are a unique environment that the U.S. Army does not fully understand.

FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information

The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.

(U//LES) Northern California Fusion Center Bulletin: Recreational Drones Create Problems for Law Enforcement

The expansion of Unmanned Aerial Vehicle (UAV) operations for military purposes in the last decade has driven growth in the commercial UAV industry where. the casual enthusiast can now purchase a ready-to-fly system for less than $300. These UAVs can be accessorized for varied purposes such as cinematography, agricultural monitoring, wildlife tracking, site surveillance, and potentially even for kinetic attacks with a firearm or improvised explosive. This Advisory Bulletin addresses an observed increase in UAV use by ordinary citizens, outlining capabilities and implications for the law enforcement community. The NCRIC has not received any specific or credible UAV threats in our 15-county AOR and presents the following information for situational awareness purposes.

Department of Justice Review of FBI Use of National Security Letters 2007-2009

This review is a follow-up to three previous OIG reports concerning the FBI’s use of national security letter authorities. In our first and second NSL reports, issued in March 2007 and March 2008, the OIG found repeated instances of the FBI’s misuse of NSL authorities during 2003 through 2006. During our first NSL review we also discovered the FBI’s practice of issuing exigent letters and using other informal methods to obtain telephone records, instead of using NSLs or other legal process. We addressed these practices in a separate report issued in January 2010.

Feds Issue Bulletin on Google Dorking

A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use “advanced search techniques” to discover sensitive information and other vulnerabilities in websites. The bulletin, titled “Malicious Cyber Actors Use Advanced Search Techniques,” describes a set of techniques collectively referred to as “Google dorking” or “Google hacking” that are used to refine search queries to provide more specific results.

(U//FOUO) DHS-FBI-NCTC Bulletin: Malicious Cyber Actors Use Advanced Search Techniques

Malicious cyber actors are using advanced search techniques, referred to as “Google dorking,” to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks. “Google dorking” has become the acknowledged term for this malicious activity, but it applies to any search engine with advanced search capabilities. By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities. For example, a simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.