“Body packing” is a well-documented concealment method criminals have used to smuggle drugs or other contraband. Body packing in humans and animals may involve several forms of concealment — including insertion into body orifices, ingestion, or possibly surgical implantation—of illicit items or material inside or hidden on the body to escape detection by security systems and personnel. Terrorists often assign high priority to concealment in planning attacks, and such methods—to include surgical implantation—offer potential means for suicide operatives to deliver improvised explosive devices to targets.
This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.
This regulation prescribes responsibilities, policy, and guidance for the Department of the Army in planning and operations involving the use of Army resources in the control of actual or anticipated civil disturbances. Basic authority is contained in DOD Directive 3025.12, Employment of Military Resources in the Event of Civil Disturbances.
The FBI has been notified that ATX Global, an online marketing company, has mailed approximately 730 envelopes that include a marketing letter with an affixed live 9mm Luger PPU round. The ammo was used to catch the reader’s attention corresponding with the first line, “If you had just One Shot…” This mass mailing did not specifically target gun and ammo businesses.
The Criminal Justice Sector Assessment Rating Tool (CJSART) is designed to assist policy makers and program managers to prioritize and administer host-nation criminal justice sectors needing assistance. Once the assistance programs are underway, the CJSART is a systematic tool designed to measure progress and accomplishments against standardized benchmarks. Used in its entirety, the CJSART holistically examines a country’s laws, judicial institutions, law enforcement organizations, border security, and corrections systems as well as a country’s adherence to international rule of law standards such as bilateral and multilateral treaties.
These template of the Standing Rules for the Use of Force developed by Army North (ARNORTH) and approved by Army Judge Advocate General (JAG) School for commands to follow. The first two templates apply to forces under federal control. The third template is an example State RUF card for National Guard personnel in a SAD or Title 32 status. These templates are taken from the “DoD Defense Support to Civil Authorities Handbook” which includes other information relating to military support operations related to civil disturbances.
Google has admitted complying with requests from US intelligence agencies for data stored in its European data centers, most likely in violation of European Union data protection laws. Gordon Frazer, Microsoft UK’s managing director, made news headlines some weeks ago when he admitted that Microsoft can be compelled to share data with the US government regardless of where it is hosted in the world. At the center of this problem is the USA PATRIOT ACT, which states that companies incorporated in the United States must hand over data administered by their foreign subsidiaries if requested. Not only that, but they can be forced to keep quiet about it in order to avoid exposing active investigations and alert those targeted by the probes.
With the 10th anniversary of the 9/11 attacks only a month away, former CIA Director George Tenet and two former top aides are fighting back hard against allegations that they engaged in a massive cover-up in 2000 and 2001 to hide intelligence from the White House and the FBI that might have prevented the attacks. The source of the explosive, unproved allegations is a man who once considered Tenet a close friend: former White House counterterrorism czar Richard Clarke, who makes the charges against Tenet and the CIA in an interview for a radio documentary timed to the 10th anniversary next month. Portions of the Clarke interview were made available to The Daily Beast by the producers of the documentary. In the interview for the documentary, Clarke offers an incendiary theory that, if true, would rewrite the history of the 9/11 attacks, suggesting that the CIA intentionally withheld information from the White House and FBI in 2000 and 2001 that two Saudi-born terrorists were on U.S. soil – terrorists who went on to become suicide hijackers on 9/11.
A photo of a 37-year-old schizophrenic homeless man named Kelly Thomas that was taken in the hospital by his father Ron Thomas, a former Orange County Sheriff’s Deputy. Thomas was fatally beaten by Fullerton Police officers on July 5, 2011 following attempts to search his backpack due to reports of someone “looking into cars” in the area. Multiple videos of the beating exist, including surveillance footage that has yet to be released by the Orange County District Attorney, and a large number of witnesses have come forward confirming the extremely excessive use of force by the six officers that were attempting to subdue Thomas. One officer in particular was reportedly responsible for beating Thomas repeatedly in the back of the head with a Taser until Thomas began to bleed profusely, as well as dropping his knee against the back of Thomas’ head leading to fractures in his face and the crushing of his windpipe. This officer has been identified as Jay Cicinelli, a former LAPD officer who was shot within weeks of leaving the academy and now only has one eye. The beating is now being investigated by the FBI.
Reported copper thefts from critical infrastructure and key resource (CIKR) sectors in the United States rose at least 50 percent in 2010 compared to the previous year, largely driven by record-high prices for copper. Individuals and criminal organizations have engaged in copper thefts primarily for financial gain. We have seen no indication that terrorists are using copper thefts in the homeland as a tactic to damage or destroy CIKR facilities or to fund terrorist activity.
The SM-CCTV System is a computer network consisting of closed-circuit video cameras, digital video recorders (DVRs), and monitoring capabilities that capture video-only feeds in and around ICE facilities. The purpose of the SM-CCTV System is to help ICE secure and regulate physical access to ICE facilities. The system also serves to enhance officer safety, prevent crimes, and assist in the investigation of criminal acts committed inside and on the perimeter of protected ICE facilities. Video surveillance also supports terrorism prevention and facility protection with its visible presence, and detects and deters unauthorized intrusion at ICE facilities. The SM-CCTV System is planned to be deployed in numerous ICE facilities nationwide.
The Department of Homeland Security (DHS) currently uses the Terrorist Screening Database (TSDB), a consolidated database maintained by the Department of Justice Federal Bureau of Investigation Terrorist Screening Center (TSC) of identifying information about those known or reasonably suspected of being involved in terrorist activity in order to facilitate DHS mission-related functions, such counterterrorism, law enforcement, border security, and inspection activities. DHS and TSC are improving the current method of transmitting TSDB data from TSC to DHS. Through a new service called the “DHS Watchlist Service” (WLS), TSC and DHS will automate and simplify the current manual process. TSC remains the authoritative source of watchlist data and will provide DHS with near real-time synchronization of the TSDB. DHS will ensure that each DHS component system receives only those TSDB records which they are authorized to use under the WLS Memorandum of Understanding and authorized under existing regulations and privacy compliance documentation between TSC and DHS (WLS MOU) and any amendments or modifications thereto. DHS conducted this privacy impact assessment (PIA) because the WLS will maintain a synchronized copy of the TSDB, which contains personally identifiable information (PII), and disseminate it to authorized DHS components.
The Homeland Security Department’s plan to centralize and expand in-house access to the FBI’s database of suspected terrorists has prompted a letter of protest from a coalition of Washington privacy organizations. In public comments submitted Aug. 5, a coalition led by the Electronic Privacy Information Center challenged a proposed rule under which Homeland Security would duplicate an existing system of records to create the DHS Watchlist Service. It will contain individuals’ names, dates and places of birth, biometric and photographic data, passport information, driver’s license information and “other available identifying particulars.” Homeland Security during the past year has been reviewing the eight-year-old terrorist screening database used at airports and is preparing, as set out in the July 6 proposal, to widen employee access to a mirror copy of the records created by the FBI and Justice Department “in order to automate and simplify the current method for transmitting” the data to DHS component agencies including the Transportation Security Administration. TSA uses the terrorist watch list for the Secure Flight program, which allows it to instantly check passenger names that airlines were given by ticket purchasers against a consistent national watch list of suspected terrorists.
In April 2011, the US Drug Enforcement Administration (DEA) reported up to 82 percent of all cocaine seized in the United States contained levamisole, a veterinary drug used to de-worm livestock. Law enforcement and public health officials in the United States are warning of serious public health consequences for drug users related to contaminated cocaine use.
You’re shopping at the mall with your children when one of them suddenly disappears. A quick search of the nearby area is unsuccessful. What do you do? Now there’s a free new tool from the FBI that can help. Our just launched Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks.
Los Angeles County Sheriff’s Department guide to improvised/disguised weapons and other officer safety concerns from June 2009.
Christine Lagarde, the French politician entrusted with restoring the reputation of the International Monetary Fund after the resignation of Dominique Strauss-Kahn, is to face a criminal inquiry over corruption claims. The decision by a French court to investigate Ms Lagarde, 55, for allegedly aiding and abetting embezzlement and fraud – offences that carry a maximum sentence of 10 years in prison – represents a fresh embarrassment to the IMF just a month after it appointed her as managing director. She is accused of wrongdoing over her role in a €403 million ($543m) payment to businessman Bernard Tapie when she was the French finance minister.
A named U.S. anti-war group “We are not your Soldiers” announced on their website that October 6, 2009 will be a “National Day of Resistance against Military Recruiters.” While no specific locations have been mentioned where the protests will occur, the group has called on all individuals across the United States to confront military recruiters at schools and in malls and to protest in front of military recruiting centers. The demonstration organizers plan on using students and teachers to rally students to their cause. They are asking students to wear an orange bandanna or ribbon (the color against torture and war) to show there’s a movement. They are asking students and teachers to invite anti-war veterans to talk to their classes or assemblies.
A reportedly “Top Secret” document that was obtained and published by the Guardian. It details rules and procedures allowing members of British intelligence, specifically MI5 and MI6 to obtain information from detainees that have been subject to torture in other jurisdictions. The memo notes that obtaining such information may be in violation of both UK and international law.
The former director of the CIA’s Counterterrorism Center raised concerns Wednesday about an impending “code war” in which hackers will tamper not just with the Internet but with technology that runs real-world infrastructure. Somewhat fittingly, Cofer Black’s keynote talk at the Black Hat hacker conference at Caesars Palace in Las Vegas was interrupted by a literal alarm: flashing lights, sirens and the whole bit. “Attention, please. Attention, please,” a robotic woman’s voice said repeatedly as Black smiled, apparently confused. “We are currently investigating the alarm signal you are hearing. Please remain calm.” After a pause and some laughs from the audience, Black kept going.
A 466-page summary of a more than 25,000-page report compiled by the Indian government’s Karnataka Lokayukta or People’s Commissioner who investigated years of illegal activities in the Indian mining sector, including widespread corruption, bribery and the exportation of illicit iron ore worth more than $3 billion. The report has met with widespread controversy due to its singling out of a number of prominent billionaires in the Indian mining industry.
Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.