DHS Human Factors/Behavioral Sciences Division presentation on social network analysis, behavioral threat detection and biometrics programs as of May 2009.
Overview presentation from 2007 regarding the Future Attribute Screening Technology Mobile Module (FAST M2), a system for identifying potential threats via behavioral analysis.
Customs and Border Protection Bandidos Motorcycle Club global distribution map produced in May 2010.
Confidential Draft of U.S. Treasury “Volcker Rule” Restrictions on Proprietary Trading With Hedge Funds
The OCC, Board, FDIC, and SEC (individually, an “Agency,” and collectively, “the Agencies”) are requesting comment on a proposed rule that would implement Section 619 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (“Dodd-Frank Act”) which contains certain prohibitions and restrictions on the ability of a banking entity and nonbank financial company supervised by the Board to engage in proprietary trading and have certain interests in, or relationships with, a hedge fund or private equity fund.
Department of Homeland Ssecurity Bomb-Making Awareness Program (BMAP) Law Enforcement and Private Sector User Guides along with accompanying promotional posters from 2009.
According to multiple media reports, on 7 September an explosion occurred inside the reception area of the Delhi High Court in New Delhi, India at approximately 10:00am local time. The blast killed at least 11 people and injured some 76 others. Indian authorities reported to the press that the explosives were inside a briefcase left in a reception area in between the security gates of the High Court. India’s National Security Guard Director indicated that the device contained ammonium nitrate, which was also used in the most recent bomb against the court complex on 25 May. Harakat-ul-Jihad al-Islami (HUJI) claimed responsibility for the blast in an e-mail message and demanded that India repeal the death sentence of Afzal Guru, who was convicted of attacking the Indian Parliament building in 2001 and is awaiting execution.
These photos and videos depict a New York Police Department Lieutenant named Connolly striking protesters blindly with a baton. This man has been identified as Lt. Brian Connolly of the 9th Precinct, who was awarded the Medal for Valor in…
A method is described for tracking information about the activities of users of a social networking system while on another domain. The method includes maintaining a profile for each of one or more users of the social networking system, each profile identifying a connection to one or more other users of the social networking system and including information about the user. The method additionally includes receiving one or more communications from a third-party website having a different domain than the social network system, each message communicating an action taken by a user of the social networking system on the thirdparty website. The method additionally includes logging the actions taken on the third-party website in the social networking system, each logged action including information about the action. The method further includes correlating the logged actions with one or more advertisements presented to the one or more users on the third-party website as well as correlating the logged actions with a user of the social networking system.
Los Angeles City Council Resolution unanimously passed October 5, 2011 in support of Occupy LA and the Occupy Wall Street protests.
For those who wish to understand the true nature of our current financial system, the Pujo Committee’s 1912-1913 investigation of the “Money Trust” is essential reading. The Committee identified a concentrated group of Wall Street bankers who operated a sophisticated financial network unified by 341 interlocking directorships held in 112 corporations valued at more than $22 billion in resources and capitalization exerting significant control and influence over the U.S. economy and monetary system. The companies and individuals comprising this network were primarily agents of the Morgan and Rockefeller banking empires which dominated U.S. finance following the “Industrial Revolution”. The Committee names a number of prominent banking institutions as participating in this system including J.P. Morgan & Co., First National Bank of New York, Kuhn Loeb & Co. and individuals such as Paul Warburg, Jacob H. Schiff, Felix M. Warburg, Frank E. Peabody, William Rockefeller and Benjamin Strong, Jr. Understanding this system of overlapping financial networks and how those networks are used to dominate utilities, railroads, banking and the U.S. financial infrastructure throughout much of the twentieth century is key to the proper analysis of our current economic situation and the influence that the “Money Power” wields over global politics.
U.S. Customs and Border Protection Laredo Sector Intelligence Unit seizure of $1,757,665 of marijuana hidden in a cloned school bus from October 2009.
National Postal Model for the Delivery of Medical Countermeasures developed following Executive Order 13527 “Establishing Federal Capability for the Timely Provision of Medical Countermeasures Following a Biological Attack”.
This is the Final Edition of the USF-I Base Transition Smartbook. Updated from the October 2010 edition, it provides a single-source, quick reference guide for the base transition process, and captures/de-conflicts updated and additional base transition guidance through the use of bold and strike-through text. The information in this Smartbook summarizes base transition Standard Operating Procedures (SOP), published US Forces-Iraq (USF-I) orders/ guidance, and lessons learned from past base transitions to facilitate honorable and successful transitions of remaining non-enduring bases and enduring sites. The USF-I Base Transition Smartbook is the guiding document for transitioning USF-I bases in the Iraq Joint Operations Area (IJOA) to the Government of Iraq (GoI). Guidance is intended to be flexible enough to fit a range of situations, and to ensure a base is transferred properly, in accordance with applicable laws and regulations. The Base Transition Smartbook is located on the USF-I J7 website. Revisions are summarized below and highlighted throughout the text.
Emails and documents related to the ongoing investigation of the Bureau of Alcohol, Tobacco, Firearms and Explosives’ “Fast and Furious”/Project Gun Runner program leaked to CBS. Includes a map of distribution routes for weapons involved in the program leading to locations throughout Mexico.
The intent of the Houston HIDTA Threat Assessment, produced by the Houston Intelligence Support Center (HISC), is to identify the potential impact of drug trafficking trends within the Houston HIDTA and to deliver accurate and timely strategic intelligence to assist law enforcement agencies in the development of drug enforcement strategies.
McGill School of Architecture 2011 Cyclical Academic Unit Review (AUR) withheld from students and the public after the dismissal of the Director of the School of Architecture (SoA) Michael Jemtrud. The document outlines the problematic relationship between the SoA and the Faculty of Engineering and attests to the fact that there is a clear division in the faculty over their support of Jemtrud. Students who asked to see the document, hoping to find in it some explanation for the swift and drastic changes made in the school, changes that had a direct impact on their academic careers, were told that the document was always intended to serve only as advisory to the Provost and as such would only been seen by an academic review committee, who would in turn draft a report (of the AUR) and present its findings to the Senate. The first meeting came and went, and the document was not brought up, not even alluded to.
See also: Occupy Wall Street Union Square March and Arrests Photos September 24, 2011 Occupy Wall Street Photos September 2011 Occupy Wall Street Protest Police State Photos Mat McDermott – http://www.flickr.com/photos/matmcdermott/ Adrian Kinloch – http://www.flickr.com/photos/akinloch/ nicksifu – http://www.flickr.com/photos/nicksifu/
One of the more interesting aspects of Inspire magazine is its use of a public key encryption system for communication based upon a program called Asrar al-Mujahideen. The fundamentals of using this program are explained in the first issue of Inspire magazine. Throughout the first six issues of the magazine the same four email addresses are listed alongside a public key for use with the Asrar al-Mujahideen program. In the September 2011 issue there is a different public key listed, though the email addresses remain the same. All four email addresses used are associated with free email providers located in the United States. All of the providers log IP information for users of their services and the suggested program used for encryption does not take any steps to hide the sender’s identifying information.
United States Army Europe Regulation 95-23 “Unmanned Aircraft System Flight Regulations” from September 2009.
This TEPW provided participants the opportunity to exchange information about upcoming state-level training and exercises. Primarily, however, the workshop was a venue for state representatives to review, validate, and prioritize the state’s target capabilities that would be the focus of the state’s exercises and training in 2011-14. There were thirty-three participants in attendance at the TEPW, representing thirteen State agencies, three regions within the state, one local agency, the Mid-American Regional Council (MARC), the St. Louis Area Regional Response System (STARRS), the Missouri Emergency Response Commission (MERC), the Missouri National Guard (MONG), and FEMA Region VII. The group developed for publication the Missouri Multi-Year Training and Exercise Plan (MYTEP) for 2012-2014.
An improvised chemical pressure bomb is a device that’s charge comes from a gaseous chemical reaction or phase change (such as when liquid changes to gas) in a confined area; the resulting buildup causes the container to rupture violently. There are several types of improvised chemical pressure bombs that can be constructed from easy to acquire materials.
U.S. Department of Justice cellular service provider data retention guide originally obtained by American Civil Liberties Union of North Carolina.
Afghan National Army Base and Incentive Pay Chart via NATO Training Mission Afghanistan from April 2011.
FBI affidavit for Rezwan Ferdaus accused of planning to use remote controlled airplanes to attack the Pentagon and the U.S. Capitol.
On September 9, 2010, about 6:11 p.m. Pacific daylight time, a 30-inch-diameter segment of an intrastate natural gas transmission pipeline known as Line 132, owned and operated by the Pacific Gas and Electric Company (PG&E), ruptured in a residential area in San Bruno, California. The rupture occurred at mile point 39.28 of Line 132, at the intersection of Earl Avenue and Glenview Drive. The rupture produced a crater about 72 feet long by 26 feet wide. The section of pipe that ruptured, which was about 28 feet long and weighed about 3,000 pounds, was found 100 feet south of the crater. PG&E estimated that 47.6 million standard cubic feet of natural gas was released. The released natural gas ignited, resulting in a fire that destroyed 38 homes and damaged 70. Eight people were killed, many were injured, and many more were evacuated from the area.