134 search results for "cell phone"

(U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Attempted Breaches/Intrusions

Terrorists may attempt to breach secured perimeters or gain unauthorized access to facilities, sensitive locations, or restricted areas for preoperational activity or to conduct an attack. Timothy McVeigh breached a locked storage shed at a Kansas rock quarry with a battery-operated drill and stole explosives that were later used in the 1995 Oklahoma City bombing. Attempts at intrusion could take the form of trespassing, forced entry, or impersonation of authorized personnel and could possibly involve the assistance of knowledgeable ‘insiders.”

U.S. Strategic Bombing Survey: The Effects of the Atomic Bombings of Hiroshima and Nagasaki June 1946

The available facts about the power of the atomic bomb as a military weapon lie in the story of what it did at Hiroshima and Nagasaki. Many of these facts have been published, in official and unofficial form, but mingled with distortions or errors. The U.S. Strategic Bombing Survey, therefore, in partial fulfillment of the mission for which it was established, has put together in these pages a fairly full account of just what the atomic bombs did at Hiroshima and Nagasaki. Together with an explanation of how the bomb achieved these effects, this report states the extent and nature of the damage, the casualties, and the political repercussions from the two attacks. The basis is the observation, measurement, and analysis of the Survey’s investigators. The conjecture that is necessary for understanding of complex phenomena and for applying the findings to the problems of defense of the U.S. is clearly labeled.

U.C. Berkeley Police Review Board Report on Occupy Berkeley Protest Response

On the morning of November 9, 2011, thousands of students, faculty, staff, and community members gathered for a noontime rally in Sproul Plaza. Protestors voiced their opposition to a variety of issues including recent tuition increases and state cuts to public education, and their support for the Occupy movement, which began in New York City a few months prior. In the early afternoon, hundreds of protestors convened a “General Assembly,” in which they voted to set up tents near Sproul Hall. The first tents to be erected in the grassy area near Sproul Hall were quickly removed by campus police without incident. Two later incidents in this same area, however, one in the mid-afternoon and one at night, involved the use of force by police against large numbers of protesters. Around 3 p.m., another set of tents was erected. In an effort to remove the tents, the police used batons and other means of force to move protestors that were locking arms and blocking access to the tents. After tense interaction with protesters, the police removed this second set of tents and withdrew to their command post in the basement of Sproul Hall. During this period, six individuals were arrested and more were injured and in some instances handled roughly.

(U//LES) FBI-NGIC Gang Criminal Activity Expanding Into Juvenile Prostitution

The National Gang Intelligence Center (NGIC) and the FBI’s Crimes Against Children Unit (CACU) assesses with medium confidence that gang activity is expanding towards juvenile prostitution primarily for its steady financial rewards and perceived low risk of law enforcement interaction. Historically, prison, street and outlaw motorcycle gangs profit from drug distribution and have recently become involved in non-traditional criminal activity such as mortgage fraud and identity theft. Some gangs appear to be diversifying their income by reducing or eliminating drug trafficking activities in favor of juvenile prostitution.

Restricted U.S. Army Internment and Resettlement Operations Manual

I/R operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity of a foreign government to effectively care for and govern its population. This includes capabilities to conduct shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities throughout the world.

(U//LES) FBI Mara Salvatrucha (MS-13) International Assessment

The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.

Garbage Collectors Around the U.S. Trained to Report Suspicious Activity

Several newspapers in southern Florida are reporting that trash collectors are receiving training from their employer Waste Management to work with local law enforcement to report crimes and other suspicious activities. The training is part of a program called Waste Watch that is designed to leverage the fact that “drivers are familiar with their routes and are in the same neighborhoods every day” which “puts them in the unique position to spot unusual activity and anything out of the ordinary.” Press releases from Waste Management describe the program as a way of opening “channels of communication with the authorities to help keep them informed and alert of what’s happening in their city’s streets and alleys.”

CS Spray Exposure Clinical Effects and Management

The number of people exposed to CS spray presenting to accident and emergency departments is on the increase. Its effects, though usually minor and short lived, involve several systems and can occasionally be life threatening. It is therefore important that staff are able to manage these patients and know when and how to protect themselves and others from further contamination.

(U//FOUO) NSA Social Networking Sites Security Guide

A social networking site (SNS) is a web-based service that allows communities of people to share common interests and/or experiences. Rather than using direct point-to-point communication to stay in touch (e.g., face-toface, phone, text/video messages), SNSs allow users to publish information that can be read later by other users (a one-to-many form of communication) and follow their friend’s postings and provide comments. SNSs provide innovative methods for interacting with friends through third-part applications, such as simple games (tic-tac-toe, paper-rock-scissors), interactive maps to show places visited across the world, and quiz/trivia games which allow for score comparison with others. Many SNSs also allow users to logon from mobile devices that have web browser access to the Internet, allowing them to check and update their accounts from virtually any location with a Wi-Fi or cellular signal.

(U//FOUO) NSA “Site M” Expansion Planning Documents

National Security Agency “Site M” Expansion Development Plan and Anti-Terrorism Force Protection Assessment from May 31, 2011. The Site M Area Development Plan (ADP) for the National Security Agency/Central Security Service (NSA/CSS) coordinates the development of facilities on Site M at Fort George G. Meade (Ft. Meade), allowing for growth and expansion over time. Site M development is planned to consist of administrative buildings, operation buildings, High Performance Computing Centers (HPCC) and associated support facilities. The objective of the AT/FP component is to develop a plan for protection of the proposed Site M development. This plan is based on the mandatory DoD minimum antiterrorism standards as well the specific requirements of NSA/CSS Ft. Meade. The plan provides overall guidance for development of the site as well as specific design strategies for key AT/FP components. A layered approach to security has been applied to ensure probability of detection with low false and nuisance alarm rates.

UN-NATO Documents Detail Violence and Voter Supression in Afghan Elections

According to a series of classified reports from NATO and the UN recently published by this site, the recent elections in Afghanistan were marred by “unprecedented” levels of violence including voter intimidation, kidnapping of election workers and candidates, as well as attacks on polling stations and ballot distribution systems. A confidential United Nations “Joint Security Analysis” covering the week of the elections states that the country experienced a “massive increase” in violence “due to an unprecedented peak of security incidents recorded on Election Day 18 September.” In fact, there was such a significant and “unprecedented” increase in violence leading up to the elections that this created a significant decrease in subsequent attacks because insurgent forces were literally running out of ammunition.

TransUnion Corporation Sale of Consumer Credit Information Privacy Litigation Decision 2002

Defendant Trans Union is one of three major consumer reporting agencies in the United States. Its core business is assembling and evaluating consumer credit information, including credit and payment patterns on consumers for the purpose of selling consumer reports to third parties. Typical buyers of such information are firms considering extending credit to a particular consumer. The information provided by Trans Union is used to determine if the consumer is a good credit risk. Trans Union maintains a computer data base called “CRONUS,” that contains consumer credit information it uses to generate credit reports. The data base includes the credit activity of every credit-active individual in the United States. Trans Union receives the information from credit grantors such as banks, mortgage companies, credit unions, auto dealers and collection agencies. Trans Union also receives information on student loans and child support.

CJCS Defense Support of Civil Authorities (DSCA) Exord

THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.

James Lee Website, Manifesto and Reality Show Treatment

This is an idea for a reality-game show called “Race to Save the Planet.” This is a show where contestants would come from all over to compete with each other and come up with ideas to save the planet. The idea here is to use human inventiveness to save the planet from the environmental destruction it’s facing. People competing can either have completely new ideas on how to save the planet, or they can build on another person’s idea and make that original idea better. The persons coming up with the good ideas will win cash prizes as incentives. People who build on another person’s ideas will also receive prizes for doing so, AND the persons whose idea was built on will also receive a commission for his original idea and future commissions whenever his idea is used or improved.

Third U.S. Fusion Center Requests Removal of Document from Public Intelligence

The following message was received on April 5, 2010 from a Captain Brad Carnduff of the Illinois Statewide Terrorism and Intelligence Center. This is the third notice we have received from a U.S. fusion center. The previous two notices, from the Virginia Fusion Center and the Rocky Mountain Information Network, were both received in the month of February. This notice is unique in that it requests the identity of the “person, group or organization who forwarded this Daily Intelligence Note to your attention”. It also asks that we “contact the STIC prior to posting” similar material in the future.

U.S. Government Emergency Telecommunications Service

The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency phone service provided by the National Communications System (NCS) in the Office of Cybersecurity and Communications Division, National Protection and Programs Directorate, Department of Homeland Security. GETS supports Federal, State, local, and tribal government, industry, and non-governmental organization (NGO) personnel in performing their National Security and Emergency Preparedness (NS/EP) missions. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN). It is intended to be used in an emergency or crisis situation when the PSTN is congested and the probability of completing a call over normal or other alternate telecommunication means has significantly decreased.

Nextel’s Guide For Law Enforcement – Subpoena & Court Orders

This Guide was prepared for Law Enforcement to facilitate the processing of subpoena requests and compliance with court orders for electronic surveillance directed to Nextel Communications, or any of its operating subsidiaries (collectively “Nextel”). This Guide references the Nextel points-of-contact that have been authorized to assist Law Enforcement with subpoena compliance, as well as with the provisioning of lawful interceptions of communications on Nextel’s wireless networks. In addition, this Guide provides Law Enforcement with an overview of Nextel’s current administrative practices and policies required to support these requests.

Connecticut 2008 Emergency Communications Plan

The State of Connecticut has identified interoperable communications as a priority in its emergency response and disaster recovery planning efforts. The Connecticut Public Safety State Executive Interoperability Committee (CPSSEIC) is comprised of emergency management and communications experts from throughout the state. CPSSEIC meets regularly to determine communication equipment requirements, provide grants guidance, and develop training and exercise requirements.

Verizon Wireless Law Enforcement Resource Team (LERT) Guide

The Verizon Wireless LERT is dedicated to responding to all lawful process for business and customer information. We assist law enforcement personnel and members of the legal community in a professional, knowledgeable and expeditious manner while maintaining the privacy and security of business and customer information. We provide informational presentations for law enforcement organizations and associations to further demonstrate our commitment and support of public safety.

U.S. Army Public Affairs Handbook

Below are some suggestions on why to release information as early as possible:

1. The American public, Congress and the media are entitled to “timely and accurate” information about the military, per the DoD Principles of Information (See Appendix).

2. Early release of information sets the pace and tone for resolution of a problem.

3. If you wait, the story will often leak anyway. If it does, you jeopardize trust and credibility.