This report attempts to analyze the indicators and commonalities of recent school shootings in an effort to inform public safety officials and assist in the detection and prevention of potential school shooter plots or attacks. All incidents included in this assessment occurred in the United States while classes were in session. Domestic violence shootings and gang violence were not included in an effort to differentiate between “active shooter” incidents and other acts of violence. DHS defines an “active shooter” as an individual actively engaged in killing or attempting to kill people in a confined and populated area.
This report examines the 29 deadliest mass shootings in the past 13 years, starting with the shootings at Columbine High School in Colorado in 1999, to identify commonalities and trends. These 29 incidents include shooting incidents in which at least five people were killed.
This Technical Bulletin (TB) provides Communications Security (COMSEC) information regarding custodianship of accounts, accounting/reporting procedures, safeguarding material supply procedures, and Controlling Authority (CONAUTH) responsibilities in accordance with (IAW) COMSEC policy set forth in Army Regulation (AR) 380-40.
This document is intended as the standard U.S. user’s manual for planning and conducting field key generation and OTAD in support of tactical activities. It is targeted primarily at Joint and Intra-Service Operations and Exercises, particularly those involving forces that do not routinely train or operate together. It also has limited application to Combined operations and exercises involving Allied forces that hold OTAR- and OTAT-capable COMSEC equipment
Patrols are one of the most common operations a unit will perform in the counterinsurgency (COIN) environment. A patrol is the basis for many other types of operations. Cordon and search, reconnaissance, demonstration of force, security, and traffic control checkpoints are all activities a unit may perform while on patrol. Patrols are invaluable in the COIN environment because they enable units to interface with the indigenous population and gain human intelligence.
Terrorists or cyber criminals might try to discover vulnerabilities in computer systems by engaging in unauthorized testing of cybersecurity in order to exploit those vulnerabilities during an attack. These attempts might include port scanning, phishing, and password cracking. “Social engineering,” another technique, leverages unwitting insider access by eliciting information about operational and security procedures from employees, personnel, and their associates.
Despite the U.S. military’s massive spending each year on advanced communications technology, the use of simple text chat or tactical chat has outpaced other systems to become one of the most popular paths for communicating practical information on the battlefield. Though the use of text chat by the U.S. military first began in the early 1990s, in recent years tactical chat has evolved into a “primary ‘comms’ path, having supplanted voice communications as the primary means of common operational picture (COP) updating in support of situational awareness.” An article from January 2012 in the Air Land Sea Bulletin describes the value of tactical chat as an effective and immediate communications method that is highly effective in distributed, intermittent, low bandwidth environments which is particularly important with “large numbers of distributed warfighters” who must “frequently jump onto and off of a network” and coordinate with other coalition partners. Text chat also provides “persistency in situational understanding between those leaving and those assuming command watch duties” enabling a persistent record of tactical decision making.
This publication provides multi-Service tactics, techniques, and procedures (MTTP) to standardize and describe the use of internet tactical chat (TC) in support of operations. Thus, it provides commanders and their units with guidelines to facilitate coordination and integration of TC when conducting multi-Service and joint force operations.
A request for participants (RFP) issued by the San Francisco Public Utilities Commission on June 8, 2012. The RFP concerns the construction of a wireless control and communications network for managing the city’s planned upgrade to dimmable LED streetlights. The RFP states that future uses for the secure wireless network may include street surveillance, gunshot monitoring, public information broadcasts, electric meter reading and pollution monitoring.
(U//FOUO) U.S. Marine Corps Human Intelligence Exploitation Team (HET) Operations in Iraq Lessons Learned Report
HET is viewed as a highly valuable and effective intelligence generating asset which, in conjunction with other intelligence sources, provides a significant amount of actionable intelligence during operations in Iraq. “The HET teams produced more reporting … than any other intel asset we have out there.” “HETs have been the pointy tip of the spear in this counterinsurgency fight. Two-thirds of MNF-W operations are directly driven by HET operations.” Key observations from this collection include the following.
This study provides a conceptual foundation for understanding different far-right groups and then presents the empirical analysis of violent incidents to identify those perpetrating attacks and their associated trends.
In 2008, recognizing a nascent requirement in the maritime security domain, CJOS COE was requested by NATO Allied Command Transformation (ACT) to provide an overall picture of Maritime Unmanned Systems (MUS) as a potential new capability, with a view to create an increased awareness and trigger further developments within the Alliance. The resulting MUS Study, published in November 2009, was then forwarded for endorsement by ACT, to the International Military Staff (IMS). Following this first document, CJOS COE has produced the attached Guidance document building on the initial study and aiming at supporting NATO MUS capability development.
The Central California Intelligence Center (CCIC)/Sacramento Regional Threat Assessment Center (RTAC) has prepared the following Situational Information Report on exploding targets, a commercially available binary explosive agent, to provide law enforcement and public safety officials with a better understanding of the potential public safety risks involving its use. While exploding targets are legally permissible depending on state and local regulations, the CCIC is concerned that the mixture may be more dangerous than what is stated on the manufacturer’s website especially if mishandled by individuals with novice experience in handling explosive components or when used in large quantities to detonate bigger targets and, in essence, creating an explosives or incendiary device.
This paper describes the foreign banking landscape in the United States. It begins by establishing a vocabulary for discussion of the subject, and then identifies a number of important data-related issues. With that information in hand, the remainder of the paper focuses on identifying the most important underlying trends on both sides of the balance sheets of foreign-owned banks’ U.S. operations. At each step, the investigation considers how foreign-owned banks compare to U.S.-owned domestic banks, and how two types of foreign banks operations in the U.S. — branches and agencies of foreign banks (FBAs), and foreign-owned subsidiary banks (FSUBs) — compare to each other.
National Institute of Justice Assessment of the Federal Assault Weapons Ban and Gun Violence 1994-2003
This overview presents key findings and conclusions from a study sponsored by the National Institute of Justice to investigate the effects of the federal assault weapons ban. This study updates prior reports to the National Institute of Justice and the U.S. Congress on the assault weapons legislation.
An FBI analysis of active shooter incidents since 2002 found that 96% of the attacks were perpetrated by males, most of which acted alone. The statistic is found in a joint intelligence bulletin released at the end of December by the Department of Homeland Security and FBI. The bulletin provides brief advice on crisis response and long-term protective measures as well as statistics related to past active shooter incidents, which are defined as situations where one or more individuals participates in a “random or systematic killing spree demonstrating their intent to harm others with a firearm.” Active shooters are distinguished from other “traditional criminal acts, such as robbery or hostage-taking” by their intention to commit “mass murder”. The FBI analyzed 154 active shooter events in the United States between 2002 and 2012 that included three or more individuals being shot.
This Joint Intelligence Bulletin (JIB) is intended to provide information on the recent active shooter incidents that have taken place in the Homeland. This information is provided to support the activities of DHS and FBI and to assist private sector security officials and federal, state, local, tribal, and territorial law enforcement in identifying protective and support measures relating to active shooters.
Managing combat trauma on the modern battlefield represents challenges that are scarcely encountered within the civilian community. The advent of tactical combat casualty care (TCCC) represented a fundamental paradigm shift from the care of casualties (CAX) that evolved in the late 1970s. Special operations forces (SOF) engaged in combat operations, removed from conventional forces (CF) and with austere logistical support, represent a set of unique challenges, as well. The limited amount of equipment and medical supplies, coupled with delays in evacuation, add to what is already a frightening experience. Being wounded also generates great fear and anxiety in the CAX. Special operations medics, exposed to hostile fire while caring for CAX, become likely targets, resulting in the special operations medic unintentionally becoming “part of the problem, not the solution” and forcing CAX to care for themselves. The conditions associated with this type of environment demand specialized training for all SOF. We refer to this specialized training as SOF combat casualty care.
Four days after the mass shooting last July in Aurora, Colorado, a project of the Houston Office of Public Safety and Homeland Security called Ready Houston released a training video to help educate members the public about how to survive a mass shooting. The six-minute video, which was produced with $200,000 from the Department of Homeland Security’s Urban Area Security Initiative, includes a dramatic recreation of a man dressed entirely in black walking into an office building and beginning to shoot people at random with a shotgun that he pulls from a small satchel. Variously described as “outlandish”, “surreal” and “over-the-top”, the video has met with mixed responses since it was re-released by several fusion centers and local agencies, including most recently the Alabama Department of Homeland Security.
As we enter an era in which the administration of law enforcement becomes more complicated, greater challenges are thrust not only upon police officials, but also upon the community at large. The bomb threat is one such challenge. The bomber has a distinct advantage over other criminals because he can pick his time and place from afar, and use the bomb threat as a weapon to achieve his criminal objectives. This bulletin has been prepared in order to provide law enforcement and public safety agencies with a working base from which to establish their own bomb threat response capability; and to enable these same agencies, when called upon by potential bomb or bomb threat targets in the business community, to offer assistance in developing guidelines for a bomb threat response plan.
Because the operational environment (OE) requires Army forces to operate in urban areas, commanders must have accurate information on the complex human elements, infrastructure, and physical terrain that make up the urban environment. The limits on imagery and electronic reconnaissance and surveillance (R&S) capabilities place a premium on human-based visual reconnaissance. Reconnaissance troops and platoons must be trained to gather and analyze the necessary information and provide it to their commanders and higher headquarters. This chapter discusses definitions, training strategy, prerequisite training, individual task training, and collective task training designed to prepare reconnaissance units at troop level and below for operations in urban terrain.
The Council of Governors and the President of the United States have identified the need for Dual Status Commanders (DSC) to unify the response efforts within the 54 Territories and States of the United States of America. United States Northern Command (USNORTHCOM) has identified Title 10 Deputy Commanders (O-6 in grade) to lead a Joint Support Force Staff Element (JSF-SE) that will integrate with the State-Level DSC staff in order to provide unity of effort to the response of both Title 32/State Active Duty (SAD) and Title 10 forces. This Standard Operating Procedures document outlines the USNORTHCOM Staff support to the DSC Program, a template for a T10 Deputy Commander Handbook and the methods, procedures and best practices for the JSF-SE.
The North American Aerospace Defense Command (NORAD) and U.S. Northern Command (USNORTHCOM) Publication Series is the authoritative reference defining the Commands’ missions and structure, force employment objectives, mission area planning considerations and operational processes from the strategic to the tactical level. The NORAD and USNORTHCOM Publication Series also defines the Commands’ doctrine, as well as their operational tactics, techniques, and procedures (TTP). The NORAD and USNORTHCOM Publication Series is authoritative because it defines the actions and methods implementing joint doctrine and describes how assigned and attached military forces will be employed in the Commands’ joint and combined operations.
This document provides detailed instructions for the implementation and installation of premise wire infrastructure in support of unclassified and classified networks within NSAW, Build-out Facilities, domestic facilities where NSA controls the plenum, domestic facilities where NSA does not control the plenum and all OCONUS field sites. This document provides instructions for implementations and installations of premise wiring in communications facilities, office spaces and machine rooms by ITD Internal Service Providers (ISP), External Service providers (ESP), field personnel stationed at the respective facilities or authorized NSA agents.
National Counterintelligence Executive Specifications for Constructing Sensitive Compartmented Information Facilities
This Intelligence Community (IC) Technical Specification sets forth the physical and technical security specifications and best practices for meeting standards of Intelligence Community Standard (ICS) 705-1 (Physical and Technical Standards for Sensitive Compartmented Information Facilities). When the technical specifications herein are applied to new construction and renovations of Sensitive Compartmented Information Facilities (SCIFs), they shall satisfy the standards outlined in ICS 705-1 to enable uniform and reciprocal use across all IC elements and to assure information sharing to the greatest extent possible. This document is the implementing specification for Intelligence Community Directive (ICD) 705, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities (ICS-705-1) and Standards for Accreditation and Reciprocal Use of Sensitive Compartmented Information Facilities (ICS-705-2) and supersedes Director of Central Intelligence Directive (DCID) 6/9.