Since June, advanced persistent threat (APT) actors have been targeting the aviation industry and attempting to extract confidential information by sending “spear-phishing” emails designed to trick recipients into opening malicious attachments or follow links to infected websites. According to an FBI Cyber Division bulletin from July 8, “individuals associated with the air travel industry” have received an increased number of spear-phishing emails often using spoofed senders “in an attempt to make the e-mail appear more legitimate.”
(U//FOUO) FBI Cyber Division Bulletin: Advanced Persistent Threat (APT) Actors Targeting Aviation Industry
Since June 2013, the FBI has observed advanced persistent threat (APT) actors’ increased interest in the aviation industry. APT actors have sent spear-phishing e-mails targeting individuals associated with the air travel industry. Some of the spear-phishing e-mails originated from a spoofed sender in an attempt to make the e-mail appear more legitimate. E-mail recipients should be aware of suspicious and potentially malicious e-mail attachments or links.
The primary intent of this Center for Army Lessons Learned publication is to provide a reference to assist commanders and planners in understanding how these complex systems are organized, managed, and operated — from a civilian perspective. It will not make the reader an expert. Each chapter was developed by students attending the Command and General Staff College during an elective course titled “Restoring Essential Services in Stability Operations.”
This report on unconventional operational concepts and the homeland was prepared as part of the Defense Science Board 2007 Summer Study on Challenges to Military Operations in Support of National Interests. The summer study recognized that asymmetric tools of war in the hands of potential adversaries may well be employed using non-traditional concepts of operation. Moreover, the battlefield may no longer be limited to regions afar, but may include the U.S. homeland. The United States could well confront the possibility of going to war abroad in the face of significant devastation in the homeland—dividing forces between homeland catastrophe relief operations and combat abroad, or even facing the possibility that deploy and supply of U.S. military forces could be delayed and disrupted.
This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in DSCA operations, and it provides the doctrinal basis for interagency coordination during DSCA operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective.
This pamphlet is designed to foster your awareness of the terrorist threat, to provide techniques for you to actively protect yourself and your family, and to help ensure the process of changing our mindset from complacency to constant vigilance. It is intended to serve as a guide, and you should incorporate the measures that apply to you and your family.
(U//FOUO) DoD Instruction: Biometric Enabled Intelligence (BEI) and Forensic Enabled Intelligence (FEI)
This white paper explains the Government’s legal basis for an intelligence collection program under which the Federal Bureau of Investigation (FBI) obtains court orders directing certain telecommunications service providers to produce telephony metadata in bulk. The bulk metadata is stored, queried and analyzed by the National Security Agency (NSA) for counterterrorism purposes. The Foreign Intelligence Surveillance Court (“the FISC” or “the Court”) authorizes this program under the “business records” provision of the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. § 1861, enacted as section 215 of the USA PATRIOT Act (Section 215). The Court first authorized the program in 2006, and it has since been renewed thirty-four times under orders issued by fourteen different FISC judges. This paper explains why the telephony metadata collection program, subject to the restrictions imposed by the Court, is consistent with the Constitution and the standards set forth by Congress in Section 215. Because aspects of this program remain classified, there are limits to what can be said publicly about the facts underlying its legal authorization. This paper is an effort to provide as much information as possible to the public concerning the legal authority for this program, consistent with the need to protect national security, including intelligence sources and methods. While this paper summarizes the legal basis for the program, it is not intended to be an exhaustive analysis of the program or the legal arguments or authorities in support of it.
(U//FOUO) DoD Instruction: Human Intelligence (HUMINT) Training-Joint Center of Excellence (HT-JCOE)
In 2011, the U.S. Department of Homeland Security’s (DHS) Office of Intelligence and Analysis (I&A), in coordination with federal and SLTT partners, began conducting an annual assessment of fusion centers to evaluate their progress in achieving the COCs and ECs and to collect additional data to better understand the characteristics of individual fusion centers and the National Network as a whole. DHS/I&A initiated the 2012 Fusion Center Assessment (2012 Assessment) in August 2012 as the second iteration of the annual assessment process and the first assessment to provide data on year-over-year progress in implementing the COCs and ECs. The 2012 Assessment was also the first assessment to collect National Network performance data based on an initial set of five performance measures adopted in 2011. This 2012 National Network of Fusion Centers Final Report (2012 Final Report) summarizes and characterizes the overall capabilities and performance of the National Network based on the results of the 2012 Assessment. This report does not include fusion center-specific capability or performance data. Instead, it uses aggregated data from the 2012 Assessment to describe the capability and performance achievements of the National Network.
In a restricted report issued in May, the DEA detailed the most recent findings from its heroin monitoring program, assessing the period from 2006 -2011. The report finds that heroin in the U.S. generally comes from two different places: South America and Mexico. If you live east of the Mississippi River, chances are that the heroin you’re buying is from South America. Heroin purchased on the West Coast is almost certainly trafficked from Mexico. Some heroin from Southwest Asia does make it to the U.S. However, the amount is minimal compared to other sources and the quality is relatively poor.
This report presents data and conclusions from the Heroin Domestic Monitor Program (HDMP) conducted by the Drug Enforcement Administration (DEA) for calendar year (CY) 2011. The HDMP provides data on the price, purity, and geographic source of heroin sold at the retail level in 27 U.S. cities. The data contained in this report are based on actual undercover heroin purchases made by the DEA and its law enforcement partners on the streets of these cities.
During the 112th Congress, then-Committee on Homeland Security (Committee) Chairman Peter T. King, currently the Chairman of the Subcommittee on Counterterrorism and Intelligence, directed Committee Majority staff to conduct a comprehensive study of the National Network in an effort to understand current strengths and gaps and provide recommendations for improvement. This work continued into the 113th Congress under the additional direction of current Committee Chairman Michael T. McCaul. Over the course of nineteen months (January 2012-July 2013), the Committee logged 147 meeting hours during visits to 32 fusion centers, in addition to numerous briefings and discussions with various Federal partners, representatives of the National Fusion Center Association, and follow-up conversations with fusion center directors and personnel.
Many countries view ballistic and cruise missile systems as cost-effective weapons and symbols of national power. In addition, they present an asymmetric threat to US airpower. Many ballistic and cruise missiles are armed with weapons of mass destruction. Ballistic and cruise missiles present a significant threat to US and Allied forces overseas, and to the United States and its territories. Missiles are attractive to many nations because they can be used effectively against an adversary with a formidable air defense system, where an attack with manned aircraft would be impractical or too costly. In addition, missiles can be used as a deterrent or an instrument of coercion. Missiles also have the advantage of fewer maintenance, training, and logistic requirements than manned aircraft. Even limited use of these weapons could have devastating consequences because missiles can be armed with chemical, biological, or nuclear warheads.
A table describing Research in Motion/Blackberry requirements for disclosure of user data to law enforcement. The chart shows what legal process is required to request user data, the type of data each process can typically obtain and the legal authorities authorizing each form of request.
Restricted Joint Chiefs of Staff Manual: Exercises Impacting Global Positioning System (GPS) in U.S. and Canada
Department of Defense, Department of Homeland Security, Department of Justice, Federal Bureau of Investigation
A collection of Network Security Agreements (NSAs) entered into with foreign communications infrastructure providers ensuring U.S. government agencies the ability to access communications data when legally requested. The agreements range in date from 1999 to 2011 and involve a rotating group of government agencies including the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), Department of Justice (DoJ), Department of Defense (DoD) and sometimes the Department of the Treasury. According to the Washington Post, the agreements require companies to maintain what amounts to an “internal corporate cell of American citizens with government clearances” ensuring that “when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”