White House Strategy for Countering Violent Extremism in the United States

Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.

Mossad Behind Assassinations of Iranian Nuclear Scientists

One atomic researcher after the other has died in a series of recent murders in Iran. Is Israel’s Mossad trying to sabotage the construction of a nuclear bomb with the attacks? Officials in Jerusalem aren’t denying anything. Israeli military generals are even more hawkish, and their calls for air strikes on Iran are growing louder. “Israel is not responding,” Israeli Defense Minister Ehud Barak said earlier this week when asked if his country had been involved in the latest slaying of an Iranian nuclear scientist. It didn’t exactly sound like a denial, and the smile on his face suggested Israel isn’t too bothered by suspicions that it is responsible for a series of murders of physicists involved in the controversial Iranian nuclear program. There is little doubt in the shadowy world of intelligence agencies that Israel is behind the assassination of Darioush Rezaei. “That was the first serious action taken by the new Mossad chief Tamir Pardo,” an Israeli intelligence source told SPIEGEL ONLINE.

(U//FOUO) RAND Corporation Study: Israeli Warfare After the Second Lebanon War

The Armored Corps Association hosted its inaugural conference on November 13–14, 2007, as a forum for discussion of Israeli operations during the July–August 2006 Second Lebanon War. Attendees sought to identify both challenges meriting particular attention due to their implications for the country’s future security and solutions to those challenges. The event drew some 200 active and retired members of the Israeli Defense Forces (IDF), in addition to representatives from the commercial sector, the United States, and the United Kingdom. A list of speakers and brief biographical sketches appear in Appendixes A and B, respectively. Note, however, that selected materials do not appear herein due to some speakers’ requests that they not be included in either the Hebrew or English version of these proceedings.

China Installed More Than 10,000,000 Surveillance Cameras in 2010

Beijing police have ordered supermarkets and shopping malls to install high-definition security cameras, as China continues its huge expansion in monitoring technology. The country has added millions of surveillance cameras over the last five years, part of a broader increase in domestic security spending. In May, Shanghai announced that a team of 4,000 monitor its surveillance feeds to ensure round-the-clock coverage. The south-western municipality of Chongqing has announced plans to add 200,000 cameras by 2014 because “310,000 digital eyes are not enough”. Urumqi, which saw vicious ethnic violence in 2009, installed 17,000 high-definition, riot-proof cameras last year to ensure “seamless” surveillance. Fast-developing Inner Mongolia plans to have 400,000 units by 2012. In the city of Changsha, the Furong district alone reportedly has 40,000 – one for every 10 inhabitants.

TSA Agents Steal Pens, Cameras, Watches, Honor Student’s $100

Federal prosecutors say a Transportation Security Administration officer has been indicted on theft charges related to items that were stolen from luggage at Los Angeles International Airport. Thirty-eight-year-old Paul Yashou of Torrance was named in a five-count indictment Friday that charges him with two felony and three misdemeanor counts. The U.S. attorney’s office says the indictment alleges that Yashou stole four watches, ranging in value from $1,000 to $15,000, and a $1,000 pre-paid debit card.

DHS Bulletin: Anonymous/LulzSec Has Continued Success Using Rudimentary Hacking Methods

This Bulletin is being provided for your Executive Leadership, Operational Management, and Security Administrators situational awareness. The actors who make up the hacker group “Anonymous” and several likely related offshoots like “LulzSec”, continue to harass public and private sector entities with rudimentary exploits and tactics, techniques, and procedures (TTPs) commonly associated with less skilled hackers referred to as “Script Kiddies”. Members of Anonymous routinely claim to have an overt political agenda and have justified at least a portion of their exploits as retaliation for perceived ‘social injustices’ and ‘freedom of speech’ issues. Attacks by associated groups such as LulzSec have essentially been executed entirely for their and their associates’ personal amusement, or in their own hacker jargon “for the lulz”.

Top Drug Trafficker Claims U.S. Government Made Agreement to Protect Sinaloa Cartel

The son of a heavy hitter in a powerful Mexican drug trafficking organization has filed explosive legal pleadings in federal court in Chicago accusing the US government of cutting a deal with the the “Sinaloa Cartel” that gave its leadership “carte blanche to continue to smuggle tons of illicit drugs into Chicago and the rest of the United States.” The source of that allegation is Jesus Vicente Zambada Niebla, the son of Ismael “El Mayo” Zambada Garcia — one of the purported top leaders of the Sinaloa drug-trafficking organization — a major Mexican-based importer of weapons and exporter of drugs.

(U//FOUO) DHS Red Cell Report: How Terrorists Might Infect U.S. Poultry With Bird Flu

This report explores how terrorists or other non-state adversaries could potentially facilitate an avian influenza outbreak within the United States. The report was primarily intended to assist the Secretary of Homeland Security, Chief Intelligence Officer, Deputy Assistant Secretary, and Chief Medical Officer as they consider the implications of avian influenza to the Homeland. The scenarios explored in this paper are speculative and meant only to broaden the scope of thinking. They are not based on specific evidence or intelligence about terrorists’ plans and capabilities, but are considered scientifically feasible, according to experts that were interviewed.

Bolivian President Evo Morales Fears Being Framed by U.S. Government

Bolivian leader Evo Morales says he’s worried that U.S. authorities will plant something on his presidential plane to link him with drug trafficking when he attends Wednesday’s United Nations General Assembly meeting. “Do you know what? I think they have to be preparing something,” he told a convention of female farm workers over the weekend. “So much that I’m afraid to go with our airplane to the United States. Surely when we arrive, they can plant something and detain the presidential plane.” Morales said he was still planning to attend the meeting, but feared a U.S. plot. “They are preparing something to discredit us with drug trafficking,” he said.

Off-Duty TSA Agent Flashes His Badge to Speed Up Slow Driver

An off-duty TSA agent is accused of using his status as a federal employee to intimidate a driver in Connecticut, where police said the man waved his badge at a woman for driving too slowly.The agent, Donald Eichler, said it’s way overblown. “This is terrible. Way overblown. She over-reacted. I may not have a job tomorrow,” he said. He is a transportation security administration employee at Bradley Airport, who South Windsor police said misused his badge when he followed and harassed a woman in his vehicle. “The ticket says I was following too close and she was doing like 30 in a 40 mile an hour speed one, so I tapped my horn a few times and said come on let’s go. They said I flashed my TSA badge and I had my ID badge,” Eichler said.

Inside the Sinaloa Cartel’s Drug Smuggling Operations

Never lose track of the load. It was drilled into everybody who worked for Carlos “Charlie” Cuevas. His drivers, lookouts, stash house operators, dispatchers — they all knew. When a shipment was on the move, a pair of eyes had to move with it. Cuevas had just sent a crew of seven men to the border crossing at Calexico, Calif. The load they were tracking was cocaine, concealed in a custom-made compartment inside a blue 2003 Honda Accord. The car was still on the Mexican side in a 10-lane crush of vehicles inching toward the U.S. Customs and Border Protection inspection station. Amputee beggars worked the queue, along with men in broad-brimmed hats peddling trinkets, tamales and churros.

(U//LES) FBI Bloods Street Gang Communicating Through Playstation Network (PSN)

FBI New York case information indicates that Bloods gang members in the Bronx, NY are utilizing PlayStation Network (PSN) to communicate each other while on house arrest. Identified Bloods will post their “PSN tag name”, a self-generated ID used to identify individual users, on social networking web-sites and invite others to connect with them using their PlayStation 3 gaming system. These individuals have been observed sharing “tag names” with each other and discussing intentions to communicate through PSN.

U.S. Officials Lying About Civilian Deaths From Pakistan Drone Strikes

As the Pakistani public grows increasingly outraged at the United States’ drone attacks in the northwest region of the country, a recent study by the London-based Bureau of Investigative Journalism is contradicting U.S. officials’ insistence that “not a single civilian life” has been claimed in the covert war. Led by British investigative journalist Chris Woods and Pakistani journalist Rahimullah Yusufzai, the study found that at least 45 civilians, including six children, have been killed in 10 drone strikes since August 2010 alone, while another 15 attacks between then and June 2011 likely killed many more. According to the study, civilians die in one out of every five Central Intelligence Agency (CIA)-operated drone attacks in the tribal region, located on the border with Afghanistan, a statistic that the Bureau says can no longer be denied by the U.S. government.

DHS Gives Up On $230 Million Program for Advanced Cargo Radiation Detectors

The U.S. Homeland Security Department has terminated the program to develop the next generation of radiation detection monitors, a senior agency official announced on Tuesday. “The [Advanced Spectroscopic Portal] will not proceed as originally envisioned. We will not seek certification or large-scale deployment of the ASP,” Warren Stern, director of the Domestic Nuclear Detection Office, told the House Homeland Security technology subcommittee. The agency spent roughly $230 million over five years attempting to develop and field the monitor system. The machines were designed to not only detect radiation but identify the nature of its source. Proponents claimed the devices, each with a price tag of around $822,000, would eliminate time-consuming secondary inspections to determine whether a material was dangerous. Homeland Security officials had expected to spend $1.2 billion to deploy 1,400 of the machines to scan cargo containers for potential nuclear or radiological weapons materials at U.S. points of entry. However, the system was found to be susceptible to false alarms and other significant technical troubles.

(U//FOUO) DHS Utility-Sector Employee Insider Threats Warning

Insiders often possess detailed operational and system-security knowledge, as well as authorized physical and systems access to utilities. Insiders can be employees, contractors, service providers, or anyone with legitimate access to utility systems. They often are self-motivated, know system security measures, and raise no alarms due to their authorized systems access. With knowledge of and access to a utility’s network, malicious actors could seize control of utility systems or corrupt information sent to plant operators, causing damage to plant systems and equipment. Systems and networks used by utilities are potential targets for a variety of malicious cyber actors. Threat actors who target these systems may be intent on damaging equipment and facilities, disrupting services, stealing proprietary information, or other malicious activities. The greater the individual’s knowledge and authorized systems access, the greater risk the individual poses. Furthermore, any individual with access to a plant’s systems could unwittingly or inadvertently introduce malware into a system through portable media or by falling victim to socially engineered e-mails.

White House Strategy to Combat Transnational Organized Crime July 2011

Transnational organized crime refers to those self-perpetuating associations of individuals who operate transnationally for the purpose of obtaining power, influence, monetary and/or commercial gains, wholly or in part by illegal means, while protecting their activities through a pattern of corruption and/or violence, or while protecting their illegal activities through a transnational organizational structure and the exploitation of transnational commerce or communication mechanisms. There is no single structure under which transnational organized criminals operate; they vary from hierarchies to clans, networks, and cells, and may evolve to other structures.

Scotland Yard Investigating Anders Behring Breivik’s Alleged Meetings With UK “Mentor”

Police attempting to piece together Anders Behring Breivik’s links to far-right groups in the UK and Europe have written to Scotland Yard asking for more officers to help with the investigation. A specialist unit has been set up in The Hague to trawl through a database of known high-risk, rightwing extremists and assist the Norwegian police as they examine evidence from Breivik’s 1,500-page “manifesto” published online hours before he launched one of the worst mass killings in peacetime Europe. Rob Wainwright, director of Europol, told the Guardian he had written to the Metropolitan police’s new head of counter-terrorism, Cressida Dick, asking for more officers from Scotland Yard after Breivik boasted of his links to far-right groups in the UK. “What we’ve seen is an active extremist scene across European countries, including the UK,” said Wainwright. “There are some signs the extreme right have been more active, especially on the internet. They are more sophisticated and using social media to attract younger people.”

Federal Reserve Provided $16 Trillion in Emergency Loans to U.S. and Foreign Banks

The first top-to-bottom audit of the Federal Reserve uncovered eye-popping new details about how the U.S. provided a whopping $16 trillion in secret loans to bail out American and foreign banks and businesses during the worst economic crisis since the Great Depression. An amendment by Sen. Bernie Sanders to the Wall Street reform law passed one year ago this week directed the Government Accountability Office to conduct the study. “As a result of this audit, we now know that the Federal Reserve provided more than $16 trillion in total financial assistance to some of the largest financial institutions and corporations in the United States and throughout the world,” said Sanders. “This is a clear case of socialism for the rich and rugged, you’re-on-your-own individualism for everyone else.”

GAO Federal Reserve $16 Trillion Emergency Bailout Loans Audit Report

On numerous occasions in 2008 and 2009, the Federal Reserve Board invoked emergency authority under the Federal Reserve Act of 1913 to authorize new broad-based programs and financial assistance to individual institutions to stabilize financial markets. Loans outstanding for the emergency programs peaked at more than $1 trillion in late 2008. The Federal Reserve Board directed the Federal Reserve Bank of New York (FRBNY) to implement most of these emergency actions. In a few cases, the Federal Reserve Board authorized a Reserve Bank to lend to a limited liability corporation (LLC) to finance the purchase of assets from a single institution. In 2009 and 2010, FRBNY also executed large-scale purchases of agency mortgage-backed securities to support the housing market. The table below provides an overview of all emergency actions covered by this report. The Reserve Banks’ and LLCs’ financial statements, which include the emergency programs’ accounts and activities, and their related financial reporting internal controls, are audited annually by an independent auditing firm. These independent financial statement audits, as well as other audits and reviews conducted by the Federal Reserve Board, its Inspector General, and the Reserve Banks’ internal audit function, did not report any significant accounting or financial reporting internal control issues concerning the emergency programs.