ATP 2-33.4 provides information on how intelligence personnel conduct intelligence analysis in support of unified land operations. It describes approaches used to conduct intelligence analysis and describes how intelligence analysis assists commanders with understanding the complex environments in which Army forces conduct operations.
Food and agriculture infrastructure is a $1 trillion industry, almost entirely under private ownership and comprises an estimated 2.1 million farms, 935,000 restaurants, and more than 200,000 registered food manufacturing, processing, and storage facilities. Intentional contamination of the food supply could have significant public health and economic consequences depending on the commodity, the agent used, and where in the supply chain the contaminant was added. This product provides first responders and private-sector stakeholders an awareness of the complex operating environment that may result from intentional contamination of the food supply and identifies key collaborative partners and indicators to minimize the risk of an intentional attack on the food supply.
Open source platforms can be used by criminals to instigate or conduct illegal activity and by terrorists to recruit and encourage new members, disseminate violent extremist messaging through video or documents, coordinate activities, and claim responsibility for attacks around the world. As such, law enforcement and analytic personnel should understand the uses of social media and be aware of social media tools that can be used to document criminal and terrorist activity. A wide variety of open source analysis tools—both no-cost and paid—is available to public and private sector organizations, including law enforcement and analytic personnel, and the technology continues to evolve. ROSA tools that access only publicly available information and are capable of searching multiple platforms simultaneously are assets for maximizing efficiency during authorized uses by law enforcement and analytic personnel.
assesses the increase in the number of vehicle-ramming attacks since January 2016 indicates Foreign Terrorist Organization (FTO) messaging efforts are probably resonating with violent extremists and will most likely continue in the near term. FTO-inspired violent extremists will probably continue to plan and engage in vehicle-ramming attacks against Western-based mass gathering and public venues since this tactic often requires minimal training, expertise, and preoperational planning. Since January 2016, eight FTO-inspired vehicle-ramming attacks have occurred in Western countries. OCIA identified three common characteristics among these attacks: targeting of public venues or mass gatherings; use of secondary weapons; and lack of observable indicators immediately before the attack.
(U//FOUO) Northwest High Intensity Drug Trafficking Area Threat Assessment and Strategy For Program Year 2018
The opioid epidemic continues to dominate headlines within the state and throughout the region. Powerful synthetic opioids, such as fentanyl and its derivatives, led to the overdose deaths of 70 individuals in Washington State during 2016 – more than twice the number of fentanyl-related deaths in the previous year. Although much of Washington’s focus is on curbing the opioid crisis, methamphetamine remains a critical threat in the Pacific Northwest. The regulation of recreational and medicinal marijuana continues to pose new challenges for law enforcement even as use of the drug in Washington State has been legal for several years.
Urban warfare is not a new phenomenon. The U.S. Army saw urban combat in the Revolutionary War, the War of 1812, the Civil War, and elsewhere. Starting with World War II, overall armed conflict began to occur around centers with a high population density. This new backdrop for conflict has caused a whole new set of challenges, especially in an era of public scrutiny. The “Army’s capacity to engage, fight, and win major urban combat operations will determine the success of future operational and strategic endeavors.”
Personal information is increasingly distributed online by the media, the public, law enforcement agencies, and even law enforcement personnel themselves. It is imperative that law enforcement personnel understand the importance and consequences of their online activities and be proactive in monitoring and limiting their digital footprint. What may seem like an innocent upload or shared post can have a significant effect not only on law enforcement personnel but on their departments, families, and friends. Law enforcement should take the steps now to protect themselves and their family members before becoming a victim.
DHS-FBI Guide: Handling Threats to Private Citizens and Locations Named Online by Violent Extremists
The fusion center has no information to indicate specific or credible threats to people whose names have been published online by violent extremists. You are being provided this advisory to assist your agency in responding to queries from members of the public or other concerned parties. This information, which often includes personally identifiable information (PII) obtained maliciously via the Internet, most likely represents aspirational threats. Its primary purpose is likely to heighten anxiety and a sense of vulnerability. It is unlikely that violent extremist-inspired individuals in the United States will target people identified online, but this cannot be ruled out entirely.
(U//FOUO) National Counterterrorism Center Guide: Sunni Violent Extremist Attacks in the US Since 9/11
NCTC assesses that the Sunni violent extremist threat in the US has evolved from one defined by complex, large-scale attacks directed by a foreign terrorist organization (FTO) to mostly self-initiated attacks by homegrown violent extremists using relatively simple methods. Of the 28 Sunni violent extremist attacks in the US since 9/11 only three were directed by an FTO. Most attacks were perpetrated by individuals enabled—through encouragement or operational support—or inspired by ISIS, al-Qa‘ida, and al-Qa‘ida affiliates.
The number of criminal and gang-related assaults involving acid or other corrosive substances has risen sharply in some Western countries. As of July 2017, police statistics in England indicate assaults and threats involving corrosives have risen from 183 in 2012 to more than 500 this year, according to open source reporting. Although there has been minimal specific interest by terrorists in acid attacks to date, we judge the increase in criminal incidents coupled with recent English-language terrorist messaging encouraging attacks using acid may spur opportunistic terrorist use of the tactic, underscoring the potential threat and importance of an immediate on-scene emergency response.
(U//FOUO) Northern California Fusion Center: Violent Tactics Showcased at Berkeley Riots Likely to be Used at Future Demonstrations
Tactics used by violent Anti-fascists at events in Berkeley on 1 February, 4 March, and 15 April 2017 highlight their ability to exploit peaceful protests with coordinated violent demonstrations, attack law enforcement personnel, destroy property, and conduct information campaigns to advance their socio-political goals. This Advisory Bulletin is intended to inform law enforcement involved in operational planning and event safety at gatherings that violent anti-fascist elements may target.
(U//LES) FBI Intelligence Assessment: Black Identity Extremists Likely Motivated to Target Law Enforcement Officers
The FBI assesses it is very likely Black Identity Extremist (BIE) perceptions of police brutality against African Americans spurred an increase in premeditated, retaliatory lethal violence against law enforcement and will very likely serve as justification for such violence. The FBI assess it is very likely this increase began following the 9 August 2014 shooting of Michael Brown in Ferguson, Missouri, and the subsequent Grand Jury November 2014 declination to indict the police officers involved. The FBI assesses it is very likely incidents of alleged police abuse against African Americans since then have continued to feed the resurgence in ideologically motivated, violent criminal activity within the BIE movement. The FBI assesses it is very likely some BIEs are influenced by a mix of anti-authoritarian, Moorish sovereign citizen ideology, and BIE ideology. The FBI has high confidence in these assessments, based on a history of violent incidents attributed to individuals who acted on behalf of their ideological beliefs, documented in FBI investigations and other law enforcement and open source reporting. The FBI makes this judgment with the key assumption the recent incidents are ideologically motivated.
In August, ISIS released a seven-minute, English-language video encouraging would-be fighters to travel to the Philippines instead of Syria and Iraq. The video was the latest sign the group has shifted its recruiting tactics as it loses ground to Coalition Forces in the Middle East. Asia has become a new focus for ISIS, according to private sector analysts, such as Flashpoint Intelligence.
InterAgency Board Recommendations on Personal Protective Equipment and Decontamination Products for Fentanyl Exposure
Increased illicit use of opioids, including synthetic opioids such as fentanyl and its analogue carfentanil, is a source of increased risk to responders. Most routine encounters between patients or detainees and EMS or law enforcement do not present a significant threat of toxic exposure. While there are anecdotal reports of public safety personnel being exposed to opioids during operations, they are largely unconfirmed. To proactively address the potential risks, this document establishes guidance for personal protective equipment selection and use, decontamination, detection, and medical countermeasures for first responders who may be exposed to opioids in the course of their occupational activities. Throughout the remainder of this document, the term synthetic opioids will be used to include fentanyl, fentanyl analogues, morphine analogues, the U-series opioids, and others.
Electric vehicle (EV) usage continues to increase in the United States, along with its supporting infrastructure. As EVs increase in market share, issues like charging speed and battery capacity will drive future development of EV charging technology. As EV demand increases, manufacturers will continue to develop, build, and deploy additional Internet-connected charging stations and new connected technologies to satisfy demand.
As the American Army fought in Iraq and Afghanistan, it became the best tactical level counter insurgency force of the modern era. America’s enemies, however, did not rest. Russia observed the transformation of the American Army and began a transformation of their own. This new military barely resembles its former Soviet self. Wielding a sophisticated blend of Unmanned Aircraft Systems (UAS), electronic warfare (EW) jamming equipment, and long range rocket artillery, it took the Soviet model out of the 1980s and into the 21st Century.
Contrary to recent news reporting, there are no fentanyl analogues resistant to Naloxone. News reports indicated a “new” fentanyl analogue, acrylfentanyl, was “extremely powerful” and implied it resisted Naloxone’s effects. However, acrylfentanyl binds to the same receptors within the human body as fentanyl, meaning correctly administered Naloxone is effective against it.
(U//FOUO) DHS Reference Aid: Overview of Recently Successful or Arrested HVEs’ Radicalization to Violence
This Reference Aid is based on I&A’s review of the radicalization to violence of 39 US homegrown violent extremists (HVEs) who either successfully carried out or were arrested before attempting to carry out attacks in the Homeland between 1 January 2015 and 31 December 2016. It is intended to inform federal, state, local, tribal, and territorial counterterrorism, law enforcement, and countering violent extremism (CVE) officials. For additional information about these HVEs, please see the classified I&A Intelligence Assessment “(U//FOUO) Commonalities in HVEs’ Radicalization to Violence Provide Prevention Opportunities,” published 10 February 2017.
This case study is an examination of behaviors that resulted in a disrupted terrorist attack, revealing a cycle of planning and preparation that could provide indicators for preventing similar attempts. The terrorist attack planning cycle is not a static, linear process but rather could begin in any of the several stages with variances in details, sequence, and timing. An individual’s mobilization to violence often provides observable behavioral indicators such as, pre-attack surveillance, training, and rehearsal. The indicators potentially allow third-party observers and law enforcement to identify individuals moving to violence, circumstances that may allow for disruption of planned attacks. This product is intended to cultivate an awareness of the planning cycle among stakeholders for identification, mitigation, and disruption of attack planning.
DHS-FBI-NCTC Guide: International Partnerships Necessary To Mitigate ISIS’s Organ Harvesting for Terrorist Funding
The Islamic State of Iraq and ash-Sham (ISIS) is attempting to obtain money from organ harvesting, including from its own injured members, captives, and deceased individuals. Identification, prevention, and interdiction of organ harvesting and trafficking is a highly complex issue which may be effectively addressed through international partnerships among governmental, health, law enforcement, legal, and private-sector entities.
We assess with moderate confidence that cyber actors, including those who support violent extremism, are likely to continue targeting first responders on the World Wide Web, including by distributing personally identifiable information (PII) for the purpose of soliciting attacks from willing sympathizers in the homeland, hacking government websites, or attacking 911 phone systems to hinder first responders’ ability to respond to crises.
The Delaware State Police (DSP) Intelligence Unit is providing the following information for officer safety and situational awareness. Officers should be mindful, when placing prisoners in custody, of smart watches and similar devices that can connect via Bluetooth to a cellular device. Smart watches have the capability to both make and receive phone calls and text messages, as well as erasing same. This could cause an issue if a cellular device and it’s contents are being used as evidence. Through experimentation at Troop 7, it was determined that if a prisoner is in the detention area and the phone is seized, the watch could still be operational.