Two Massachusetts schools received letters postmarked from Dallas, TX today, March 6, 2012, which contained a white powder. The letters were received at the Memorial Elementary School in Milford, MA and the Dedham Middle School in Dedham, MA. The incidents are being investigated by the FBI and the Department of Fire Services Hazardous Materials Emergency Response Division. Additionally, a letter was also received at a school in Warwick, Rhode Island, one at a school in Fort Kent, Maine and one at a school in Goffstown, NH. On 3/5/2012, a school in CT received a white powder letter. A photo of one of the envelopes is shown below as well as maps of the affected MA schools.
Since 2007 an unknown subject has sent more than 360 letters containing a white, powder substance to various government officials, public schools and other locations. In May, 2011 20 letters were delivered to public schools in Washington, DC. Over the past two days similar letters have been received in Washington, DC; New York, New York; Dallas, Texas and Enfield, Connecticut.
The 2008 national suicide rate adjusted for Marine Corps demographics is 20.7 per 100,000. The national adjusted suicide rate is calculated by taking Centers for Disease Control data, and changing the data to look more like the Marine Corps (mostly young and male). Adjusted civilian rates for CYs ’09 and ’10 will be calculated when the data is available.
A well-known company specializing in forensic accounting and fraud investigations has threatened to sue Public Intelligence for infringing on a trademark that the company does not even own. Kessler International, a company founded by former Deputy Inspector General of the New York Metropolitan Transit Authority Michael G. Kessler, issued the threat on March 7, 2012 demanding that this website remove a Sprint/Nextel law enforcement guide for subpoenaing subscriber information because it happens to mention the word “Fraudbuster” on approximately three pages. The threat states that the publication of the document constitutes trademark infringement because “FRAUDBUSTERS” is the registered trademark of Kessler International. The threat also demands that we sign an agreement to never again infringe on their trademark and pay them any profits that we have earned from our unauthorized use of their trademark.
Office of the Army Surgeon General presentation on “Psychological Issues of War: Valuable Information Learned from Army Surveillance and Research” concerning statistical trends in the occurrence of suicide, PTSD and traumatic brain injury cases among U.S. service members from December 2009.
U.S. Army TRADOC Intelligence Support Activity (TRISA) report on the Taliban’s use of civilian shields from April 2010.
Firefighters’ roles as a first responder and an emergency medical service allow for unique access to people and information, which can generate invaluable tips and leads. Because the presence and effectiveness of firefighters mitigate the impact of a terrorist incident involving massive human casualties, terrorists have historically conducted preoperational planning that target firefighting agencies in order to limit the effectiveness of their reaction capabilities.
For the National Security Prosecutor’s Unit (NSPU) or a provincial court to prosecute and convict detainees, including Afghan murder suspects or National Security criminals, capturing units must provide evidence and witness statements against the suspects for use in an Afghan court of law. Appropriate evidence collection may result in admissible evidence in support of effective prosecutions. Turn all evidence associated with the suspect over to Afghan authorities and obtain a thoroughly documented receipt for the evidence.
The U.S. is investigating allegations that some officials in the Afghan Air Force, which was established largely with American funds, have been using aircraft to ferry narcotics and illegal weapons around the country, American officials told The Wall Street Journal. Two probes of the Afghan Air Force, or AAF, are under way—one led by the U.S. military coalition and another by the U.S. Drug Enforcement Administration, officials said.
A transcript of a private meeting held in 1968 in the New York Pratt House of the Council on Foreign Relations. The meeting was attended by a number of prominent members of the early U.S. intelligence community, including Richard Bissell and Allen Dulles. The transcript was reportedly discovered by Vietnam War protesters who occupied a building in 1971 housing Harvard’s Center for International Affairs. One of the attendees of the secret meeting, William Harris, served as an associate to the Center for International Affairs and this transcript was found in his personal files. The transcript was published in full in the 1974 book “The CIA and the Cult of Intelligence” by Victor Marchetti, a former special assistant to the Deputy Director of the Central Intelligence Agency, and John D. Marks, a former officer of the United States Department of State. The meeting transcript is described in the book as the “most complete description of the CIA’s covert-action strategy and tactics ever made available to the outside world.”
The DHS Homeland Infrastructure Threat and Risk Analysis Center produced this threat assessment to support implementation of 6 Code of Federal Regulations Part 27, “Chemical Facility Anti-Terrorism Standards (CFATS).” This assessment describes the potential terrorist threat to the chemical and petroleum facilities regulated under CFATS and determined to be high risk by the Secretary of Homeland Security. It does not address facilities that may hold threshold quantities of the chemicals listed in CFATS that fall outside its scope, such as public water facilities or facilities regulated under the Maritime Transportation Security Act of 2002. Nor does it address the transportation of chemicals, which is regulated under other authorities. Potential terrorist tactics against such facilities—based on DHS’ knowledge of terrorist intentions and capabilities—are included to aid industry security personnel in implementing security measures at their facilities.
The Vatican has for the first time appeared on the U.S. State Department’s list of money-laundering centres but the tiny city-state is not rated as a high-risk country.The 2012 International Narcotics Control Strategy Report was made public on Wednesday and Washington’s list of 190 countries classifies them in three categories: of primary concern, of concern and monitored. The Vatican is in the second category, grouped with 67 other nations including Poland, Egypt, Ireland, Hungary and Chile.
U.S. Army Company Intelligence Support Team (CoIST) Reference Card produced by the Asymmetric Warfare Group in December 2010.
The 2010 tax return for the New York charity American Friends of Bilderberg.
This handbook is a compilation of tools to help all soldiers collect information through tactical questioning and EPW/detainee and document handling in Offensive, Defensive, Stability, and Support operations. However, most of the handbook was developed specific to small unit patrols, traffic control points (TCPs)/ roadblocks, and other interaction with the local population in the Middle East.
This manual provides commanders and staffs of brigade elements and below with concepts and doctrine concerning the conduct of counterguerrilla operations by US forces in insurgency and conventional conflict environments. It provides a general overview of US counterinsurgency strategy and the impact that strategy has on counterguerrilla operations. It provides planning, training, and operational guidance for commanders and staffs conducting counterguerrilla operations. The doctrine provides principles to guide the actions of US forces conducting counterguerrilla operations. In applying these principles, the commander must be aware that the situation in each counterguerrilla operation is unique. Techniques and tactics applied successfully in one situation may not be suitable if applied in the same manner in another situation. The principles in this manual are guides to be adapted to each counterguerrilla situation.
The following photos were produced by NASA via the Atmospheric Imaging Assembly (AIA) on NASA’s Solar Dynamics Observatory (SDO). The first few photos depict solar flares occurring over the last several days, which have reportedly created the strongest solar storms in…
This multi-Service tactics, techniques, and procedures (MTTP) publication will assist in advising foreign forces. It serves as a reference to ensure coordinated multi-Service operations for planners and operators preparing for, and conducting, advisor team missions. This MTTP is intended to provide units and personnel that are scheduled to advise foreign forces (FF) with viable tactics, techniques, and procedures (TTP) so that they can successfully plan, train for, and carry out their mission. Currently, material regarding advising is found in joint and Service doctrinal treatment of foreign internal defense (FID), counterinsurgency (COIN), security assistance (SA), and unconventional warfare (UW). Several Services are developing documents that focus on basic survival and common advisor skills, but do not sufficiently cover how an advisor team might function at all levels. This MTTP provides guidance that will help to enhance the activities of some advisor functions and improve inter-Service coordination for this joint mission.
The National Security Agency/Central Security Service officially opened the new NSA/CSS Georgia Cryptologic Center at a ribbon-cutting ceremony where officials emphasized how the $286 million complex will provide cryptologic professionals with the latest state-of-the-art tools to conduct signals intelligence operations, train the cryptologic workforce, and enable global communications. NSA/CSS has had a presence in Georgia for over 16 years on Ft. Gordon, when only 50 people arrived to establish one of NSA’s Regional Security Operations Centers.
Unconventional warfare, or UW, is defined as activities conducted to enable a resistance movement or insurgency to coerce, disrupt or overthrow an occupying power or government by operating through or with an underground, auxiliary and guerrilla force in a denied area. Inherent in this type of operation are the inter-related lines of operation of armed conflict and subversion. The concept is perhaps best understood when thought of as a means to significantly degrade an adversary’s capabilities, by promoting insurrection or resistance within his area of control, thereby making him more vulnerable to a conventional military attack or more susceptible to political coercion. “UW includes military and paramilitary aspects of resistance movements. UW military activity represents the culmination of a successful effort to organize and mobilize the civil populace against a hostile government or occupying power. From the U.S. perspective, the intent is to develop and sustain these supported resistance organizations and to synchronize their activities to further U.S. national security objectives.”
Director of National Intelligence 2012 Report on Reengagement of Detainees Formerly Held at Guantanamo Bay
Based on trends identified during the past 9 years, we assess that if additional detainees are transferred without conditions from GTMO, some will reengage in terrorist or insurgent activities. Posing a particular problem are transfers to countries with ongoing conflicts and internal instability as well as active recruitment by insurgent and terrorist organizations.
Anonymous/LulzSec Sabu, Kayla, Topiary, Anarchaos, Palladium, Pwnsauce Indictment and Criminal Complaints
Indictments and criminal complaints for Anonymous/LulzSec members Sabu, Kayla, Topiary, Anarchaos, Palladium, Pwnsauce released March 6, 2012.
Tom Kean and Lee Hamilton, who co-chaired the 9/11 Commission, weighed in Monday on a simmering disagreement in the Senate over the best way to address the nation’s vulnerability to cyberattacks. The two men, who now run the Bipartisan Policy Center’s Homeland Security project, are calling on senators to take more urgent action on the issue of cybersecurity. They cite recent public statements by Director of National Intelligence James Clapper and FBI DIrector Robert Mueller warning that the cyber threat is expected to overshadow other terrorist threats facing the United States in the not-too-distant future. “Much like the situation before the September 11, 2001, attacks, the federal government is not adequately organized to deal with a significant emerging national security threat,” said Kean, former governor of New Jersey; and Hamilton, a former congressman from Indiana, in a letter sent to Senate leaders urging action on cybersecurity.
Understanding the local culture is critical to mission success. This Cultural Intelligence Indicators Guide (CIIG ) will contribute to an initial Intelligence Preparation of the Operational Environment that should be continuously updated by line companies. It is intended to aid Marines in the identification of key cultural observables during security and atmospherics patrols, while at the same time helping tactical unit leaders identify the information needed to understand and influence their local environment. The intent is to anticipate the second and third order effects of our actions in order to shape and influence events to our advantage.