James Eagan Holmes, a 24-year-old male, allegedly shot and killed12 people and wounded approximately 38 more after opening fire in a crowded movie theater during a showing of the new Batman movie, “The Dark Knight Rises.” The shooting erupted during the midnight showing at the multiplex in Aurora, Colorado, not far from Denver, where a large crowd had gathered, some dressed as characters from the highly anticipated Batman sequel. Holmes began the attack by throwing two gas canisters into the theater after entering through an exit door that had been propped open. Witnesses stated many assumed it was a promotional stunt related to the movie and did not initially react. After both canisters had deployed, Holmes commenced shooting into the crowd.
DHS Infrastructure Protection Note: Performance Venues – Indicators of Violence and Protective Measures
Performance venues include theaters, concert halls, auditoriums, and amphitheaters, ranging in size and function from small neighborhood movie theaters or community playhouses to high-capacity venues in major metropolitan areas. Performance venues are relatively open-access, limited egress facilities and have been successfully targeted in the past.
A collection of documents released publicly on July 11, 2012 in response to a Freedom of Information request from the Australian Department of the Prime Minister and Cabinet for material relating to WikiLeaks, Julian Assange and Bradley Manning.
U.S. Department of State Humanitarian Information Unit map from July 19, 2012 depicting locations and numbers of internally and externally displaced persons as a result of the current conflict in Syria.
(U//FOUO) FBI Counterfeit and Substandard Lithium Batteries Pose Serious Health Risks to Law Enforcement
The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.
For the last two fiscal years, the President’s Budget Submissions for the Department of Defense have included purchases of a significant amount of combat equipment, including armored vehicles, helicopters and even artillery, under an obscure section of the FY2008 National Defense Authorization Act (NDAA) for the purposes of “homeland defense missions, domestic emergency responses, and providing military support to civil authorities.” Items purchased under the section include combat vehicles, tanks, helicopters, artillery, mortar systems, missiles, small arms and communications equipment. Justifications for the budget items indicate that many of the purchases are part of routine resupply and maintenance, yet in each case the procurement is cited as being “necessary for use by the active and reserve components of the Armed Forces for homeland defense missions, domestic emergency responses, and providing military support to civil authorities” under section 1815 of the FY2008 NDAA.
Shadow banking, as one of the main sources of financial stability concerns, is the subject of much international debate. In broad terms, shadow banking refers to activities related to credit intermediation and liquidity and maturity transformation that take place outside the regulated banking system. This paper presents a first investigation of the size and the structure of shadow banking within the euro area, using the statistical data sources available to the ECB/Eurosystem.
The FSB has roughly estimated the size of the global shadow banking system at around € 46 trillion in 2010, having grown from € 21 trillion in 2002. This represents 25-30% of the total financial system and half the size of bank assets. In the United States, this proportion is even more significant, with an estimated figure of between 35% and 40%. However, according to the FSB estimates, the share of the assets of financial intermediaries other than banks located in Europe as a percentage of the global size of shadow banking system has strongly increased from 2005 to 2010, while the share of US located assets has decreased. On a global scale, the share of those assets held by European jurisdictions has increased from 10 to 13% for UK intermediaries, from 6 to 8% for NL intermediaries, from 4% to 5% for DE intermediaries and from 2% to 3% for ES intermediaries. FR and IT intermediaries maintained their previous shares in the global shadow banks assets of 6% and 2% respectively.
This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning and detainee handling, briefing, debriefing, and reporting in offensive, defensive, stability operations, and civil support operations. Most of the text was developed specifically for patrols and to conduct traffic control points (TCPs) or roadblocks, and other missions where Soldiers will interact with the local populace including site exploitation and tactical questioning after a planned or hasty raid. The term “patrol” could reflect a platoon, section, fire team, or other special-purpose group given a mission as listed above.
The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.
The Air Force Public Affairs Agency created this guide to help all Airmen safely and wisely use social media. This guide provides simple, easy-to-follow tips to help you use social media tools in your professional and personal life. This guide is for informational purposes only and does not replace official Air Force instructions.
SIGIR audits, inspections, and investigations have found serious weaknesses in the government’s controls over Iraq reconstruction funds that put billions of American taxpayer dollars at risk of waste and misappropriation. The precise amount lost to fraud and waste can never be known, but SIGIR believes it is significant. As of June 30, 2012, SIGIR audit reports had questioned $635.8 million in costs, and SIGIR Investigations, working with other agencies, had resulted in $176.84 million in fines, forfeitures, and other monetary results.
Telecommunications interception reform recognises that there are significant challenges facing intelligence and law enforcement agencies in accessing communications, particularly in keeping pace with rapid changes in the telecommunications environment. New, emerging and future technologies impact on the ability of these agencies to access communications to collect intelligence and effectively detect and prosecute crimes. The Australian Crime Commission’s Future of Organised Criminality in Australia 2020 assessment reveals that access to highly effective software, ciphers and other methodologies are increasingly being utilised by organised crime to impede detection by law enforcement. Lawful interception, therefore, is the most important tool in the investigation and prosecution of serious and organised and other technology‐enabled crime, and is vital to effectively collect security intelligence. Proposed reforms seek to allow those agencies to utilise modern technologies to maintain effective investigative techniques.
A presentation from Victoria Sheckler, Deputy General Counsel of the Recording Industry Association of America, was presented at an International Federation of the Phonographic Industry meeting in Panama in April 2012. It contains information on an upcoming effort by internet service providers to police their users’ sharing of copyrighted material called the Copyright Alert System. The presentation also discusses other voluntary measures such as agreements by payment processors to stop doing business with sites that are “repeat offenders” and efforts to encourage domain name registrars to enforce stricter “whois” policies.
The TEPCO Fukushima Nuclear Power Plant accident was the result of collusion between the government, the regulators and TEPCO, and the lack of governance by said parties. They effectively betrayed the nation’s right to be safe from nuclear accidents. Therefore, we conclude that the accident was clearly “manmade.” We believe that the root causes were the organizational and regulatory systems that supported faulty rationales for decisions and actions, rather than issues relating to the competency of any specific individual.
On May 9, 2012 the California Department of Forestry and Fire Protection (CAL FIRE) conducted a practical evaluation of the Ember Bomb incendiary device as described in the ninth issue of lnspre, a magazine published by al-Qa’ida in the Arabian Peninsula (AQAP).
This subcourse is designed to teach you the philosophy and structure of the Army correctional system. The lessons contained in this subcourse will enable you to understand the role of the U.S. Army corrections officer and non-commissioned officer and the management of U.S. Army detention and correctional facilities.
A recent terrorist attack on a resort hotel in Afghanistan demonstrates the vulnerability of hotels and other “soft” targets to these types of assaults. On June 22, 2012, Afghan forces retook a lakeside hotel outside of Kabul from a Taliban suicide assault team that was holding dozens of civilian hostages. The Taliban claimed credit for the attack, calling the hotel and others near it a “hub of obscenity and vulgarity.”
The objective of this project is to create and manage a comprehensive dataset of groups and movements that have used terrorist tactics within the United States – at some point between 1970 and 2007 – to achieve political, religious, social or economic goals. These data will be integrated into the Terrorist and Extremist Violence in the United States (TEVUS) database in the near future as part of the larger Integrating U.S. Security Databases (IUSSD) project.
This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).
U.S. Army Military Police School Enemy Prisoner of War and Civilian Internee Policy and Operations Courses
As a military police supervisor, you may become involved with EPW/CI operations in a variety of ways. The Army Military Police have the primary responsibility for EPW/CI operations for the Department of Defense. In any form of hostilities in which the United States is involved, persons that are captured or surrender who cannot be readily classified will be treated as EPW/CI until such time as they are reclassified by competent authority. This includes low intensity conflicts, as well as declared wars. In some cases, you may find yourself as an advisor to other countries. You will be expected to encourage those whom you are advising to afford the same treatment to their prisoners.
This lesson describes detainees captured or detained by the US Armed Forces and provides key definitions. These definitions explain the different personnel categories that a Military Police (MP) commander may be required to handle, protect, account for, and ensure are treated according to established laws, regulations, and international agreements. For the purpose of this lesson, the broader use of the word “detainee” applies to Enemy Prisoners of War (EPWs), Civilian Internees (CIs), Retained Persons (RPs), and other classification terms for US-controlled persons unless otherwise specified. Use of specific detainee classifications does not preclude protections granted according to Geneva Conventions I through IV (1949), Department of Defense (DoD) Directive 5100.77, or protections promulgated under paragraph 1-5 of Army Regulation (AR) 190-8. MP leaders and Soldiers conducting Internment/Resettlement (I/R) operations must maintain task proficiency for each category. For the purposes of this subcourse, detainee operations are defined as operations that take or keep selected individuals in custody as a result of military operations to control their movement and activity and/or gain intelligence.
This lesson is designed to describe the nature and causes of disaffection and social unrest; define the potential for social unrest in the United States; identify the types of confrontations; define crowd behavioral and psychological influences; identify patterns of disorder.
This is the design documents for the Allure Defender system. This document is a high level design and API of the components that make up the Allure Defender system. We outline all the high-level pieces and then the individual components, their behaviors, expected input/outputs, and relationships. We will discuss specific implementation and design choices and languages and libraries that will be used. In addition we will cover specific user cases and illustrate some running examples. Last we refer to a running system which implements many of the components we cover in the document.
Cold packs, packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for improvised explosives. The chemicals are packaged in prill form, and can be used directly or ground into powder when being used in homemade explosive production. Five hundred packs would yield 30 to 90 pounds of precursor material for use in an improvised explosive device (IED).