134 search results for "cell phone"

(U//FOUO) U.S. State Department Social Media Landscape: Romania

Internet penetration and usage in Romania is still relatively underdeveloped in comparison to the rest of Europe, with availability and usage limited mainly to Bucharest, the capital city. As a result, social media usage is also generally focused around Bucharest. As well as geographical limits for Internet activity, social demographics play a large part in determining Internet usage; with professionally-employed, university educated citizens representing by far the largest community active online. Amongst Internet users, social media use is growing in popularity; particularly social networking sites, blogging, photo and video sharing, and microblogging. Businesses are beginning to identify opportunities to use social media as part of their communications strategies. The government and state services have been slower to adopt social media, although individual politicians are experimenting with the media for campaigning purposes. While Romanian is widely used, English is the common language for conversation via social media in Romania. Politics is a very popular topic of conversation amongst Romanian Internet users, particularly given recent levels of political uncertainty. Concern currently exists that the lack of regulation over the Internet, combined with the real-time nature of the medium is devaluing the quality of content being consumed by the public. Although Internet use is low compared to the rest of Europe, social media are establishing a relevancy to Romanian society as a means to connect; share and debate and we can expect their use to grow.

(U//FOUO) U.S. State Department Social Media Landscape: Italy

Strategic use of social media by the Italian government is minimal, but there is evidence of limited use by political parties, particularly politicians who are leveraging their Facebook profiles to engage with voters. Commercial employment of social media and digital communications is limited in Italy although global brands are beginning to demonstrate some level of engagement with consumers through different social media platforms, primarily Facebook which is often used to generate conversation around specific products. Smaller businesses are expected to emulate this kind of social media engagement over the coming months.

(U//FOUO) U.S. State Department Social Media Landscape: Spain

The social media landscape in Spain is relatively mature since reading blogs and engaging on social networks is now a regular part of daily life for many people, particularly teenagers and young professional people. As in most other European countries, social media participation is higher in large cities, especially Madrid which is seen as the center of the technology and Web 2.0 industry in Spain (64.3% of households have Internet access). Social networking is the most popular social activity in Spain. Until recently the local platform Tuenti had the highest membership although the global platform Facebook has now usurped that with 100,000 more members (5.7 million total) and levels of traffic to rival Google.

(U//FOUO) U.S. State Department Social Media Landscape: Latvia

Latvia, one of the three Baltic states, has a diverse population totaling 2.3 million – 59% Latvians, 29% Russian nationals and 3.8% Belo Russians amongst other ethnic groups. The media industry reflects this and is divided into Latvian or Russian language outlets and broadcasters. Internet penetration in the country currently stands at 59% which is just below the EU average (60%). However, significant growth centered particularly around the capital Riga and amongst Latvia’s youth demographic shows the signs of increasingly widespread digital inclusion and Internet literacy. Social media is still in the early stages of development, focused primarily on local social networks such as Draugiem, although globally popular platforms including Twitter and Facebook are growing in Latvian members. Commercial engagement with social media reflects this growing trend and is led primarily by telecommunication companies such as IZZI and Lattlecom. The Latvian government is also beginning to embrace social media as part of its communications strategy although its current presence is largely passive with an emphasis on broadcast rather than engagement.

(U//FOUO) U.S. State Department Social Media Landscape: Hungary

Improvements in infrastructure and access in Hungary over the last decade have encouraged considerable increases in Internet access and with that, an exploration of social media. Currently, Internet access is just below the EU average but is heavily focused around Budapest and other large cities, while the rural population remains largely digitally excluded. That said, government-backed initiatives to improve access in rural areas are ongoing. Internet access is also greater amongst those with a higher education and / or employed in the service industries. In turn, a gender divide is also apparent in Hungary’s Internet access as a result of lower levels of employment amongst women. The 15-24 age group and students are leading the digital movement in Hungary, aided by government initiatives which have focused on providing IT education and equipment to schools. It is this demographic that is largely responsible for the popularity of social networking, primarily conducted on local platforms in the Hungarian language, although membership of the global platform Facebook is growing and highlights a desire to be part of the global social media conversation.

(U//FOUO) Open Source Center Pakistan Protest Social Networking Limited Primarily to Elites

Based on the current observed levels of participation on social network sites (SNS) in Pakistan and the country’s past experience with street protest movements during the 2007 State of Emergency and 2009 lawyers Long March, it is possible that Internet users could leverage such sites to organize grassroots protest movements, but the intensity of such efforts would likely be limited by several factors.

(U//FOUO) Open Source Center Chinese Premier Promotes Cyberspace Agenda

Authoritative PRC media reports of Chinese Premier Wen Jiabao’s live online appearances illustrate authorities’ expanding use of the Internet to set and control policy discourse in Chinese-language virtual space. They also suggest ongoing efforts to manage leaders’ images and portray them as accessible and soliciting online public opinion. While some apparent missteps suggest a cautious, evolving approach to interactive Internet media in relation to top leaders, reported leadership statements indicate sustained attention to the goal of incorporating new technologies into the propaganda system.

(U//FOUO) Open Source Center South Korea Internet Freedom

Widely regarded as the most connected country in the world, South Korea has a system of government regulations over Internet use that are designed to curb “general cyber crimes” but that also limit Internet freedom. The issue of Internet freedom gained attention online following the Lee Myung-bak administration’s handling of two high-profile incidents — in 2008 related to the protest against US beef imports and in 2009 over the arrest of a prominent Internet-based critic. Aside from interest related to these two issues, netizens, for the most part, do not appear concerned over the issue. If Seoul implements new regulations in response to continued growth in cyber crimes or new technologies, such as smartphones, netizens would likely oppose them only if they go beyond existing laws or impose significant inconveniences.

(U//FOUO) Open Source Center Cuban Independent Blogging, Political Activism Grows

A small group of independent bloggers, including Yoani Sanchez, Reinaldo Escobar, and Claudia Cadelo, has promoted blogging as a vehicle for free expression and information sharing to circumvent Cuba’s tightly controlled media environment, and to communicate with the outside world. They have become increasingly confrontational toward the government, demanding greater civil liberties and criticizing many government policies . Other on-island bloggers — many of them journalists or university professors and students — have called on the government to be more open and allow greater access to outside information, but they generally have avoided direct criticism of it. The government response has been limited to date, but the increasingly antigovernment line of some bloggers is likely to test the limits of government tolerance.

(U//FOUO) Open Source Center Iranian Internet War on Freedom of Information

For almost a decade, the Iranian regime and netizen activists have been engaged in a veritable war of attrition over freedom of information on the Internet. With at least tacit support from information technology businesses — whose interests are adversely affected by government controls and restrictions — activists have sought to exploit the Internet in order to share information and voice dissent. In turn, the authorities have been implementing plans to manage cyber activity by taking ownership of Internet infrastructure and by promoting the presence of their supporters and messages in cyberspace, while justifying their efforts on the grounds of morality and national security. Neither netizen activists nor the government are likely to win the battle over information flows in the near term, in part because of financial considerations and evolving technologies.

(U//FOUO) Open Source Center Bolivian Media Use Among Indigenous People

At the request of Open Source Center, InterMedia commissioned the La Paz-based research firm Apoyo Bolivia to conduct a qualitative research study in Bolivia to analyze the use of media among indigenous groups, including their media consumption, habits and opinions. The study involved 10 depth interviews that took place in August 2009 in four departments: Cochabamba, Chuquisaca, La Paz and Oruro. This qualitative study represents the views of these participants only and does not necessarily represent the view of all Bolivians.

(U//FOUO) DHS-FBI “Inspire” Al-Qaeda Magazine Second Edition Warning

(U//FOUO) This product is intended to provide perspective and understanding of the nature and scope of potentially emergent threats in response to the posting of the second edition of Inspire magazine. It is also intended to assist federal, state, local, and tribal government agencies and authorities, the private sector, and other entities to develop priorities for protective and support measures relating to an existing or emerging threat to the homeland security.

CJCS Military Family “Self-Help Guide” to Antiterrorism

This guide is designed to assist in making you and your family less vulnerable to terrorists. You should review its contents and incorporate protective measures applicable to your particular situation. It is important that you ensure all members of your family are made aware ofthis valuable information so they not only protect themselves, but also become an integral part of the overall community force protection effort. Terrorists generate fear through intimidation, coercion, and acts of violence such as bombings, hijackings, or kidnappings. As recent events have shown, terrorists have reached new levels of organization, sophistication, and violence, often targeting members of the Department of Defense and their families. Their tactics and techniques are also continually changing and will continue to be a challenge to predict and neutralize. Accordingly, we must remain vigilant.

(U//FOUO) DHS Report: Small Unit Tactics in Terrorist Attacks

The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.

Janet Napolitano Speech to the Council on Foreign Relations on “Refocusing” Homeland Security

So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now. And many of the technological tools that expedite communication today were in their infancy or didn’t even exist in 2001. So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries. And the threats we face are by their very nature asymmetrical. Terrorism more often has become privatized violence—does not rely on links, links to an army or to a sovereign state. We often hear that this is what our globalized era looks like, but what is most salient about today’s environment is that it is also networked. And in a networked world, information true and false moves everywhere all the time. And in that networked world, everyone who is part of the network, meaning all of us, can enjoy the tremendous benefits, but also must be ready and willing to learn about and help address the vulnerabilities that come with these benefits. So the team we put on the field needs to be bigger, better networked and better trained. What are the implications for this network world for the Department of Homeland Security? It means that we must continue to take an all-hazards approach to preparedness, meaning we prepare for natural disasters as well as terrorist attacks. We need to comprehend and anticipate an expanding range of threats.

(U//FOUO) DHS IED/VBIED Construction and Tactics Overview

(U//FOUO) The Intelligence Community currently has no specific, credible intelligence indicating that domestic or international terrorist organizations intend to use Improvised Explosive Devices (IEDs) or Vehicle-Borne Improvised Explosive Devices (VBIEDs) against targets within the Homeland. However, both foreign and domestic terrorist groups continue to use IEDs/VBIEDs as a frequently employed method of attack, and in particular, the frequency of lethal IED incidents overseas is cause for continuing concern.

Yakima Training Center

The Yakima Training Center (YTC) is a United States Army training center (Army maneuver training and live fire area) located in south central Washington state. It is bounded on the west by Interstate 82, on the south by the city of Yakima, on the north by the city of Ellensburg and Interstate 90, and on the east by the Columbia River. It comprises 327,000 acres (132,332 hectares) of land, most of which consists of shrub-steppe, making it one of the largest areas of shrub-steppe habitat remaining in Washington state. According to a 2001 report by the European Parliament, the Yakima Training Center is also an integral part of the ECHELON global communications interception system.

(U//FOUO) DHS Homeland Terrorist Threat Reporting Guide

This Terrorist Threats to the U.S. Homeland Reporting Guide (TTRG) was jointly produced by the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS). The purpose of this document is to leverage the vast information collection and reporting resources of our state, local and tribal law enforcement partners, as well as other first responder partners, in recognizing activities or conditions that may be indicative of terrorist activity. State and local organizations are on the front line in the war against terror and therefore have a critical role as primary sources of information. Timely and relevant information from the “front lines” is critical to the identification of terrorists and their supporters, development of insights into their plans and intentions, and subsequent disruption of their operations.

Erez Crossing

The Erez Crossing (מעבר ארז‎) is a civilian entry point into the Gaza Strip. It consists of a series of large concrete building and caged corridors which function as a pedestrian/cargo terminal on the Israeli Gaza Strip barrier, located in the northern end of the Gaza Strip. It is part of a complex formerly including the Erez Industrial Park. The crossing is currently restricted to Arab residents under the jurisdiction of the Palestinian Authority and to Egyptian nationals or international aid officials only. The complex reportedly cost more than $35 million to construct.

(U//FOUO) FBI VoIP Server Intrusions in North Carolina Banks and Businesses

(U//FOUO) This SIR has been produced in an effort to alert federal, state, and local law enforcement agencies of criminal activity with a nexus to North Carolina. The Charlotte Division has observed two similar occurrences of compromised Voice over Internet Protocol (VoIP) servers used to facilitate vishing attacks. Vishing attacks, a deviation from the term phishing attacks, use voice and text messages rather than email in attempts to trick victims into providing personal and financial account information.

LoJack and Law Enforcement

The following primer on LoJack stolen vehicle recovery systems is written for law enforcement officers who communicate with the media. It’s designed to factually explain the various components of the LoJack Stolen Vehicle Recovery System and how it is used by officers to track and recover vehicles that have been reported stolen by their owners. If you have additional questions on LoJack, please contact your local LoJack Law Enforcement Liaison or LoJack Corporate Communications.

DHS Deceased Internal Cocaine Smuggling Photos

On 6/21/2007, Juan Carlos GOMEZ arrived at Miami International Airport from Bogota, Colombia, on Avian flight #008. Passenger GOMEZ presented himself for inspection to CBPO Ortiz at Passport Control at 2311 hrs. CBPO Ortiz admitted GOMEZ as a USC and referred him to Baggage Control Secondary to verify his parole status as Ortiz indicated prior drug arrest. At approximately 2335 hrs GOMEZ presented his CBP form 6059B to the primary baggage control officer and was escorted to baggage secondary for further examination. The floor coordinator was informed of the situation and assigned CBPO Medrano to conduct GOMEZ’s secondary inspection at 2340 hrs. SCBPOs Adan and Sanfilippo were also informed of GOMEZ’s record.