This Special Product was produced in response to reports of Department of Defense (DoD) personnel becoming victims of internet-based extortion scams known as sextortion. Its purpose is to inform United States Air Force (USAF) personnel of this new online scam and offer mitigating steps that can reduce the chances of becoming a victim.
This guide offers recommendations for local outreach campaigns, explains how to effectively develop and disseminate messages in order to help the public better understand their role in reporting suspicious activity, and helps law enforcement agencies and community partners to understand, navigate, and use the many resources available to help build and sustain local efforts. New technologies, resources, and innovative practices highlighted within this document can be used to improve the education, communication, and trust amongst communities and law enforcement agencies who serve them. With the proper tools and knowledge, individuals and entire communities will help law enforcement agencies identify, investigate, and prevent crime and terrorism.
GAO Report: Increasing the Effectiveness of Efforts to Share Terrorism-Related Suspicious Activity Reports
The Department of Justice (DOJ) has largely implemented the Nationwide Suspicious Activity Reporting Initiative among fusion centers—entities that serve as the focal point within a state for sharing and analyzing suspicious activity reports and other threat information. The state and local law enforcement officials GAO interviewed generally said the initiative’s processes worked well, but that they could benefit from additional feedback from the Federal Bureau of Investigation (FBI) on how the reports they submit are used. The FBI has a feedback mechanism, but not all stakeholders were aware of it. Implementing formalized feedback mechanisms as part of the initiative could help stakeholders conduct accurate analyses of terrorism-related information, among other things.
The National Counterterrorism Center (NCTC) is warning law enforcement and first responders that urban exploration, an activity that involves trying to gain access to restricted or abandoned man-made structures, can provide useful information for terrorists conducting surveillance of a potential target. Also known as “building hacking”, urban exploration has been around in its modern form for decades, tracing some its more recent history to post-war exploration of the Parisian catacombs and members of MIT’s Tech Model Railroad Club Signals and Power Subcommittee, who organized explorations of steam tunnels and rooftops around campus in the late 1950s.
(U//FOUO) National Counterterrorism Center: Urban Exploration Offers Insight on Infrastructure Vulnerabilities
Urban Explorers (UE)—hobbyists who seek illicit access to transportation and industrial facilities in urban areas—frequently post photographs, video footage, and diagrams on line that could be used by terrorists to remotely identify and surveil potential targets. Advanced navigation and mapping technologies, including three dimensional modeling and geo-tagging, could aid terrorists in pinpointing locations in dense urban environments. Any suspicious UE activity should be reported to the nearest State and Major Area Fusion Center and to the local FBI Joint Terrorism Task Force.
The Airspace Management Plan for Disasters provides a nationally consistent framework and suite of supportive tools for the use of the Federal Aviation Administration’s air traffic and airspace management operational expertise and capabilities, as well as statutory authority, to enhance the safety and effectiveness (including unity of effort) of air missions supporting response and recovery efforts such as Search and Recue flights following a disaster. The plan also speaks to the use of these tools to safeguard persons and property on the ground. Additionally, this plan also helps to balance the needs of those response air missions with the agency’s concurrent effort to return the National Airspace System, which is critical to the U.S. economy and American way of life, to normal operations.
The following videos were released by Joint Task Force Guantanamo Public Affairs on March 1, 2013. They depict detainees in Camp 5 and 6 as well as the Expeditionary Legal Complex. Videos and photos of detainees held at Guantanamo are…
The Homeland Security Geospatial Concept of Operations (GeoCONOPS) provides an understanding of the current landscape for the coordination of disaster response geospatial activities at the Federal level. The document serves the geospatial communities that support emergency management activities of the Federal government under Presidential Policy Directive 8 (PPD-8). This includes individual Emergency Support Functions (ESFs), the Joint Field Offices, FEMA Regional Coordination Centers (RRCC), and the National Response Coordination Center (NRCC). Stakeholders and actors representing the federal geospatial community have been extensively engaged in providing input for the development of the GeoCONOPS document. The GeoCONOPS serves as a guide to the Federal departments and agencies providing geospatial support under the Stafford Act which defines the programs and processes by which the Federal Government provides disaster and emergency assistance to state and local governments, tribal nations, eligible private nonprofit organizations, and individuals affected by a declared major disaster or emergency.
In January 2009 the Army’s authority to unilaterally apprehend and detain insurgents in Iraq expired. The Army now operates in Iraq at the invitation of the Government of Iraq (GOI). The change in the Army’s authority heightens the guiding principle of working by, with, and through the Iraqi Security Forces (ISF). The Army must work within the Iraqi rule of law when dealing with insurgents who threaten U.S. forces. It requires the Army to work with the ISF and the Iraqi court system to remove insurgents from the street. The Army must learn how the Iraqi system is structured and how its courts operate. The Army must also help educate the Iraqi courts, particularly the judges, on the science of how Americans collect and process evidence (forensics). Educating the judges on forensics is important to the Army having its day in court and its evidence entered into the proceeding against the insurgents.
The tenth issue of “Inspire” magazine reportedly produced by Al-Qaeda in the Arabian Peninsula’s media organization Al-Malahem.
A document issued last month by the Department of Homeland Security identifies priorities for the collection of suspicious activity reports from local communities around the U.S. The document describes”topics of interest” identified by DHS Intelligence and Analysis (DHS/I&A) analysts as priorities for the Winter 2013 period that should be utilized by “law enforcement, first responders, and other homeland security professionals” to improve their reporting of suspicious activity.
(U//FOUO) DHS Intelligence and Analysis Suspicious Activity Reporting (SAR) Topics of Interest Winter 2013
DHS/I&A is interested in the following SAR topics, which have been updated based on current issues of national interest. Previous topics remain relevant, and law enforcement, first responders, and other homeland security professionals should continue to submit reports on these issues. Per the SAR Functional Standard, only information validated as reasonably indicative of preoperational planning related to terrorism should be reported as a SAR. I&A is reviewing SAR reports on these topics but would welcome any additional context, ideas or local analysis on these topics and opportunities for joint production.
A draft version of the EU Heads of Mission report on Jerusalem for 2012 was authored in January 2013 and reportedly leaked to a number of major news outlets by the organization Breaking the Silence.
The following map and photos depict current and future locations used by the U.S. military for launching drones and surveillance flights throughout Central and North Africa. The map is not complete and reflects available information from open sources. Similar to…
The Administration is focused on protecting the innovation that drives the American economy and supports jobs in the United States. As a Nation, we create products and services that improve the world’s ability to communicate, to learn, to understand diverse cultures and beliefs, to be mobile, to live better and longer lives, to produce and consume energy efficiently and to secure food, nourishment and safety. Most of the value of this work is intangible—it lies in America’s entrepreneurial spirit, our creativity, ingenuity and insistence on progress and in creating a better life for our communities and for communities around the world. These intangible assets are often captured as intellectual property—copyrights, patents, trademarks and trade secrets, and reflect America’s advantage in the global economy.
The large-scale population survey on the extent of bribery and four sector-specific integrity surveys of public officials undertaken by UNODC and the Government of Afghanistan in 2011/2012 reveal that the delivery of public services remains severely affected by bribery in Afghanistan and that bribery has a major impact on the country’s economy. In 2012, half of Afghan citizens paid a bribe while requesting a public service and the total cost of bribes paid to public officials amounted to US$ 3.9 billion. This corresponds to an increase of 40 per cent in real terms between 2009 and 2012, while the ratio of bribery cost to GDP remained relatively constant (23 per cent in 2009; 20 per cent in 2012).
Kabul Bank’s controlling shareholders, key supervisors and managers led a sophisticated operation of fraudulent lending and embezzlement predominantly through a loan-book scheme. This resulted in Kabul Bank being deprived of approximately $935 million funded mostly from customer’s deposits. The loan-book scheme provided funds through proxy borrowers without repayment; fabricated company documents and financial statements; and used information technology systems that allowed Kabul Bank to maintain one set of financial records to satisfy regulators, and another to keep track of the real distribution of bank funds. Shareholders, related individuals and companies, and politically exposed people were the ultimate beneficiaries of this arrangement. Over 92 percent of Kabul Bank’s loan-book – or approximately $861 million – was for the benefit of 19 related parties (companies and individuals).
IARPA invests in high-risk, high-payoff research that has the potential to provide our nation with an overwhelming intelligence advantage over future adversaries. This research is parsed among three Offices: Smart Collection, Incisive Analysis, and Safe & Secure Operations. This BAA solicits abstracts/proposals for the Office of Incisive Analysis (IA).
A Center for Army Lessons Learned smart card from 2010 detailing procedures for conducting traffic control point operations.
Two re-occurring themes surface in after-action reports from exercises and operations. The first is that NATO Commanders and staffs naturally and increasingly turn to the Legal Advisers to help plan, execute, coordinate, evaluate, and support the assigned mission. The second is that no single doctrinal resource exists in NATO to assist legal practitioners in the fulfilling of this task. Although several Alliance members have produced such guides, before the NATO Legal Deskbook none existed for Legal Advisers and legal personnel assigned to NATO commands. Whether doctrinally ready or not, the Alliance calls upon NATO Legal Advisers and staffs to advise and, often, help direct the execution of the legal component of a mission or mandate. NATO owes these attorneys, paralegals, and legal personnel, who work under often austere and demanding conditions, practical guidance in the form of a comprehensive resource that provides an overview and insight on the legal regime that forms NATO practice. Fulfilling this need is the genesis, purpose and rational for this practitioner‘s guide.
During recent weeks, various sources in law enforcement and media outlets have been reporting phone kidnapping scams occurring in Central and Northern New Jersey and New York. In most incidents, scammers have alleged that a member of the phone scam victim’s family had been involved in a car accident and claimed to have taken the victim’s family member hostage. The scammers then claim they will drop their hostage at a hospital after a certain amount of money (usually $1500‐2000) is wired via Western Union to the scammers, as restitution for damage to the scammer’s vehicle. In addition, the scammers state that they have the hostage’s cell phone and any attempts to call the cell phone or disengage from the conversation will result in the murder or beating of the hostage.
Terrorists are attempting to recruit new members in the United States and overseas to support their operations, obtain funding, and conduct terrorist attacks. For example, in May 2012, Maryland-based Mohammad Hassan Khalid pled guilty to attempting to use the Internet to recruit individuals who had the ability to travel to and around Europe to conduct terrorist acts, in addition to providing logistical and financial support to terrorists. In prior cases of recruitment, individuals who were willing to participate in terrorist acts became involved with known and suspected terrorists, participated in paramilitary training abroad, or tried to acquire small arms and build explosives.
The doctrine of explosives and demolitions focuses on the procedures that support the combat operations provided by engineer capabilities to the combined arms team. This doctrine reduces the effectiveness of barriers, obstacles, infrastructure, and minefields to maintain mobility and momentum in the operating area. Field Manual (FM) 3-34.214 is the reference manual for explosives and demolitions procedures that support combat operations, as well as, peacetime training missions requiring demolition (the destruction of structures, facilities, or material by use of fire, water, explosives, mechanical, or other means) (FM 1-02) applications.
FM 3-01 is the Army Air Defense Artillery’s (ADA) capstone doctrinal publication. The seven chapters that make up this edition of Air and Missile Defense Operations constitute the Army ADA’s view of how it conducts prompt and sustained operations and sets the foundation for developing the other fundamentals and tactics, techniques, and procedures detailed in subordinate field manuals. FM 3-01 also provides operational guidance for commanders and trainers at all echelons.
Natural or man-made disasters and special events can be so demanding that local, tribal) state and non-military federal responders are temporarily overwhelmed by the situation. The Department of Defense (DOD) has a long history of supporting civil authorities in the wake of catastrophic events. When directed by the President or the Secretary of Defense (SecDef), United States Northern Command (USNORTHCOM) will respond quickly and effectively to the requests of civil authorities to save livesj prevent human suffering, and mitigate great property damage. The Joint Strategic Capabilities Plan 2008 (JSCP) directs CDRUSNORTHCOM to prepare a plan to support the employment of Title 10 DOD forces providing Defense Support of Civil Authorities (DSCA) in accordance with (IAW) the National Response Framework (NRF), applicable federal law, DOD Directives (DODD), and other policy guidance including those hazards defined by the National Planning Scenarios that are not addressed by other JSCP tasked plans. DSCA is a subset of DOD civil support that is performed within the parameters of the NRF.