Terrorists may attempt to breach secured perimeters or gain unauthorized access to facilities, sensitive locations, or restricted areas for preoperational activity or to conduct an attack. Timothy McVeigh breached a locked storage shed at a Kansas rock quarry with a battery-operated drill and stole explosives that were later used in the 1995 Oklahoma City bombing. Attempts at intrusion could take the form of trespassing, forced entry, or impersonation of authorized personnel and could possibly involve the assistance of knowledgeable ‘insiders.”
134 search results for "cell phone"
Department of Defense, Japan
U.S. Strategic Bombing Survey: The Effects of the Atomic Bombings of Hiroshima and Nagasaki June 1946
The available facts about the power of the atomic bomb as a military weapon lie in the story of what it did at Hiroshima and Nagasaki. Many of these facts have been published, in official and unofficial form, but mingled with distortions or errors. The U.S. Strategic Bombing Survey, therefore, in partial fulfillment of the mission for which it was established, has put together in these pages a fairly full account of just what the atomic bombs did at Hiroshima and Nagasaki. Together with an explanation of how the bomb achieved these effects, this report states the extent and nature of the damage, the casualties, and the political repercussions from the two attacks. The basis is the observation, measurement, and analysis of the Survey’s investigators. The conjecture that is necessary for understanding of complex phenomena and for applying the findings to the problems of defense of the U.S. is clearly labeled.
California
U.C. Berkeley Police Review Board Report on Occupy Berkeley Protest Response
On the morning of November 9, 2011, thousands of students, faculty, staff, and community members gathered for a noontime rally in Sproul Plaza. Protestors voiced their opposition to a variety of issues including recent tuition increases and state cuts to public education, and their support for the Occupy movement, which began in New York City a few months prior. In the early afternoon, hundreds of protestors convened a “General Assembly,” in which they voted to set up tents near Sproul Hall. The first tents to be erected in the grassy area near Sproul Hall were quickly removed by campus police without incident. Two later incidents in this same area, however, one in the mid-afternoon and one at night, involved the use of force by police against large numbers of protesters. Around 3 p.m., another set of tents was erected. In an effort to remove the tents, the police used batons and other means of force to move protestors that were locking arms and blocking access to the tents. After tense interaction with protesters, the police removed this second set of tents and withdrew to their command post in the basement of Sproul Hall. During this period, six individuals were arrested and more were injured and in some instances handled roughly.
Federal Bureau of Investigation
(U//LES) FBI-NGIC Gang Criminal Activity Expanding Into Juvenile Prostitution
The National Gang Intelligence Center (NGIC) and the FBI’s Crimes Against Children Unit (CACU) assesses with medium confidence that gang activity is expanding towards juvenile prostitution primarily for its steady financial rewards and perceived low risk of law enforcement interaction. Historically, prison, street and outlaw motorcycle gangs profit from drug distribution and have recently become involved in non-traditional criminal activity such as mortgage fraud and identity theft. Some gangs appear to be diversifying their income by reducing or eliminating drug trafficking activities in favor of juvenile prostitution.
U.S. Army
Restricted U.S. Army Internment and Resettlement Operations Manual
I/R operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity of a foreign government to effectively care for and govern its population. This includes capabilities to conduct shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities throughout the world.
Corporate
Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products 2010 Price List
A 2010 price list for Harris Corporation wireless surveillance products was included in contract documentation for the purchase of multiple KingFish Dual Mode wireless measurement systems that went to Maricopa County, Arizona.
Federal Bureau of Investigation
(U//LES) FBI Mara Salvatrucha (MS-13) International Assessment
The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.
News
Garbage Collectors Around the U.S. Trained to Report Suspicious Activity
Several newspapers in southern Florida are reporting that trash collectors are receiving training from their employer Waste Management to work with local law enforcement to report crimes and other suspicious activities. The training is part of a program called Waste Watch that is designed to leverage the fact that “drivers are familiar with their routes and are in the same neighborhoods every day” which “puts them in the unique position to spot unusual activity and anything out of the ordinary.” Press releases from Waste Management describe the program as a way of opening “channels of communication with the authorities to help keep them informed and alert of what’s happening in their city’s streets and alleys.”
Scholarly
CS Spray Exposure Clinical Effects and Management
The number of people exposed to CS spray presenting to accident and emergency departments is on the increase. Its effects, though usually minor and short lived, involve several systems and can occasionally be life threatening. It is therefore important that staff are able to manage these patients and know when and how to protect themselves and others from further contamination.
Russia
Russian Foreign Ministry List of People and Organizations Financing Terrorism
This “previously confidential list of people and organizations found to be involved in laundering money and funding terrorism” was presented by Rossiyskaya Gazeta, the Russian-government owned newspaper. It was originally compiled by the Russian Foreign Ministry.
Corporate, European Union
WikiLeaks Financial Blockade Complaint Against Visa and MasterCard
WikiLeaks Financial Blockade Complaint Against Visa and MasterCard concerning infringements of Articles 101 and 102 of the EU Treaty.
National Security Agency
(U//FOUO) NSA Social Networking Sites Security Guide
A social networking site (SNS) is a web-based service that allows communities of people to share common interests and/or experiences. Rather than using direct point-to-point communication to stay in touch (e.g., face-toface, phone, text/video messages), SNSs allow users to publish information that can be read later by other users (a one-to-many form of communication) and follow their friend’s postings and provide comments. SNSs provide innovative methods for interacting with friends through third-part applications, such as simple games (tic-tac-toe, paper-rock-scissors), interactive maps to show places visited across the world, and quiz/trivia games which allow for score comparison with others. Many SNSs also allow users to logon from mobile devices that have web browser access to the Internet, allowing them to check and update their accounts from virtually any location with a Wi-Fi or cellular signal.
National Security Agency
(U//FOUO) NSA “Site M” Expansion Planning Documents
National Security Agency “Site M” Expansion Development Plan and Anti-Terrorism Force Protection Assessment from May 31, 2011. The Site M Area Development Plan (ADP) for the National Security Agency/Central Security Service (NSA/CSS) coordinates the development of facilities on Site M at Fort George G. Meade (Ft. Meade), allowing for growth and expansion over time. Site M development is planned to consist of administrative buildings, operation buildings, High Performance Computing Centers (HPCC) and associated support facilities. The objective of the AT/FP component is to develop a plan for protection of the proposed Site M development. This plan is based on the mandatory DoD minimum antiterrorism standards as well the specific requirements of NSA/CSS Ft. Meade. The plan provides overall guidance for development of the site as well as specific design strategies for key AT/FP components. A layered approach to security has been applied to ensure probability of detection with low false and nuisance alarm rates.
News
UN-NATO Documents Detail Violence and Voter Supression in Afghan Elections
According to a series of classified reports from NATO and the UN recently published by this site, the recent elections in Afghanistan were marred by “unprecedented” levels of violence including voter intimidation, kidnapping of election workers and candidates, as well as attacks on polling stations and ballot distribution systems. A confidential United Nations “Joint Security Analysis” covering the week of the elections states that the country experienced a “massive increase” in violence “due to an unprecedented peak of security incidents recorded on Election Day 18 September.” In fact, there was such a significant and “unprecedented” increase in violence leading up to the elections that this created a significant decrease in subsequent attacks because insurgent forces were literally running out of ammunition.
Corporate
TransUnion Corporation Sale of Consumer Credit Information Privacy Litigation Decision 2002
Defendant Trans Union is one of three major consumer reporting agencies in the United States. Its core business is assembling and evaluating consumer credit information, including credit and payment patterns on consumers for the purpose of selling consumer reports to third parties. Typical buyers of such information are firms considering extending credit to a particular consumer. The information provided by Trans Union is used to determine if the consumer is a good credit risk. Trans Union maintains a computer data base called “CRONUS,” that contains consumer credit information it uses to generate credit reports. The data base includes the credit activity of every credit-active individual in the United States. Trans Union receives the information from credit grantors such as banks, mortgage companies, credit unions, auto dealers and collection agencies. Trans Union also receives information on student loans and child support.
Joint Chiefs of Staff
CJCS Defense Support of Civil Authorities (DSCA) Exord
THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.
United States
James Lee Website, Manifesto and Reality Show Treatment
This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.
United States
United Blood Nation Codebook
United Blood Nation Codebook, December 15, 2007.
Intelligence Fusion Centers, Washington D.C.
Washington, D.C. Fusion Center: Officer Safety Issues, November 2009
(U//FOUO//LES) Washington Regional Threat and Analysis Center Officer Safety Issues, November 2009.
Threats and Takedown Notices
Third U.S. Fusion Center Requests Removal of Document from Public Intelligence
The following message was received on April 5, 2010 from a Captain Brad Carnduff of the Illinois Statewide Terrorism and Intelligence Center. This is the third notice we have received from a U.S. fusion center. The previous two notices, from the Virginia Fusion Center and the Rocky Mountain Information Network, were both received in the month of February. This notice is unique in that it requests the identity of the “person, group or organization who forwarded this Daily Intelligence Note to your attention”. It also asks that we “contact the STIC prior to posting” similar material in the future.
United States
U.S. Government Emergency Telecommunications Service
The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency phone service provided by the National Communications System (NCS) in the Office of Cybersecurity and Communications Division, National Protection and Programs Directorate, Department of Homeland Security. GETS supports Federal, State, local, and tribal government, industry, and non-governmental organization (NGO) personnel in performing their National Security and Emergency Preparedness (NS/EP) missions. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN). It is intended to be used in an emergency or crisis situation when the PSTN is congested and the probability of completing a call over normal or other alternate telecommunication means has significantly decreased.
Corporate
Nextel’s Guide For Law Enforcement – Subpoena & Court Orders
This Guide was prepared for Law Enforcement to facilitate the processing of subpoena requests and compliance with court orders for electronic surveillance directed to Nextel Communications, or any of its operating subsidiaries (collectively “Nextel”). This Guide references the Nextel points-of-contact that have been authorized to assist Law Enforcement with subpoena compliance, as well as with the provisioning of lawful interceptions of communications on Nextel’s wireless networks. In addition, this Guide provides Law Enforcement with an overview of Nextel’s current administrative practices and policies required to support these requests.
Connecticut, FEMA
Connecticut 2008 Emergency Communications Plan
The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.
Verizon
Verizon Wireless Law Enforcement Resource Team (LERT) Guide
The Verizon Wireless LERT is dedicated to responding to all lawful process for business and customer information. We assist law enforcement personnel and members of the legal community in a professional, knowledgeable and expeditious manner while maintaining the privacy and security of business and customer information. We provide informational presentations for law enforcement organizations and associations to further demonstrate our commitment and support of public safety.
U.S. Army
U.S. Army Public Affairs Handbook
Below are some suggestions on why to release information as early as possible:
1. The American public, Congress and the media are entitled to “timely and accurate” information about the military, per the DoD Principles of Information (See Appendix).
2. Early release of information sets the pace and tone for resolution of a problem.
3. If you wait, the story will often leak anyway. If it does, you jeopardize trust and credibility.