Congress has long been concerned about whether U.S. policy advances the national interest in reducing the role of the People’s Republic of China (PRC) in the proliferation of weapons of mass destruction (WMD) and missiles that could deliver them. Recipients of China’s technology reportedly include Pakistan and countries said by the State Department to have supported terrorism, such as Iran. This CRS Report, updated as warranted, discusses the security problem of China’s role in weapons proliferation and issues related to the U.S. policy response since the mid-1990s. China has taken some steps to mollify U.S. and other foreign concerns about its role in weapons proliferation. Nonetheless, supplies from China have aggravated trends that result in ambiguous technical aid, more indigenous capabilities, longer-range missiles, and secondary (retransferred) proliferation. According to unclassified intelligence reports submitted as required to Congress, China has been a “key supplier” of technology, particularly PRC entities providing nuclear and missile-related technology to Pakistan and missile-related technology to Iran.
Irish activists planning to sail in a flotilla to Gaza have accused Israel of sabotaging their ship. It is the second vessel due to participate that has had its propeller damaged while moored in a Mediterranean port this week. The Israeli military is under orders to prevent an international convoy of ships carrying pro-Palestinian activists and aid from reaching Gaza. Organisers want to challenge Israel’s naval blockade of the territory.
The DBT Report is a stand-alone threat analysis to be used with the Physical Security Criteria for Federal Facilities: An ISC Standard. The document establishes a profile of the type, composition, and capabilities of adversaries, and it is also designed to correlate with the countermeasures in the compendium of standards and to be easily updated as needed. The DBT is an estimate of the threats that face Federal facilities across a range of undesirable events and based on the best intelligence information, Intelligence Community (IC) reports and assessments, and crime statistics available to the working group at the time of publication. Users of the DBT must consider that undiscovered plots may exist, adversaries are always searching for new methods and tactics to overcome security measures, and the lone-wolf adversary remains largely unpredictable.
In May 2011, the USAID Office of the Inspector General published a report on the agency’s supervision and oversight of assistance activities in Afghanistan and the Kabul Bank crisis. This report was quickly withdrawn and the Federation of American Scientists’ Steven Aftergood quoted a USAID official as saying that “At the time our report was issued, it was written utilizing information from non-classified sources. After our report had been issued, USAID subsequently classified two documents that were cited in our report. This action resulted in the report becoming classified and we removed it from the web site.” Now that an “Unclassified” version of the report has been released, a comparison of the two versions reveals the “classified” portions of the report that were concealed by USAID. These sections of the report indicate that a material loss review was commissioned by USAID/Afghanistan and completed in May 2010 indicating that $850 million, or 94 percent of the value of the bank’s outstanding loans, had been fraudulently diverted to “insiders” connected with the bank. The concealed sections also indicate that Deloitte and Da Afghanistan Bank failed to provide this report to USAID for nearly six months.
A survey of news reports and eyewitness photos from the last six months indicates that tear gas grenades and canisters being used around the world to suppress peaceful demonstrations and prevent political change in despotic regimes are largely made and sold by U.S. companies, often with the consent of the U.S. government. Police and security forces in Egypt, Tunisia, Israel, Bahrain, Yemen and Greece have all utilized U.S.-made tear gas and often other “less lethal” munitions, such as rubber bullets.
linmtheu – http://www.flickr.com/photos/26040773@N07/
SekaRuis – http://www.flickr.com/photos/sekarius/
endiaferon – http://www.flickr.com/photos/endiaferon/
cortlinux – http://www.flickr.com/photos/cortlinux/
General Dynamics Comparison of Public Key Infrastructure (PKI) Vendors: Microsoft vs. Red Hat from 2011.
Historically, indoor Marijuana-Mushroom grows have been “no big deal” to law enforcement as a HazMat or public health concern. However, due to recent Arizona events the Department of Public Safety would like to bring situational awareness to law enforcement (LE) and first responders regarding the hazards associated with responding to indoor marijuana grow locations. This information is provided for officer safety purposes.
Afghan officials have issued an arrest warrant for the former governor of the central bank, Abdul Qadeer Fitrat. He is being investigated in connection with massive fraud at the privately owned Kabul Bank and the printing of unauthorised amounts of currency. Earlier, it emerged Mr Fitrat had fled Afghanistan for the US – he said his life was in danger for exposing fraud.
The ICE Pattern Analysis and Information Collection (ICEPIC) system was established in 2008 to enable ICE law enforcement agents and analysts to look for non-obvious relationship patterns among individuals and organizations that are indicative of violations of the customs and immigration laws that are enforced by DHS agencies, as well as possible terrorist threats and plots. From these relationships, ICE agents develop specific leads and intelligence for active and new investigations. Identified relationships are also recorded for reuse in subsequent investigative analyses. The information processed by ICEPIC comes from existing ICE investigative and apprehension records systems, as well as immigration and alien admission records systems. ICEPIC includes capabilities that assist investigators in recording results of analyses performed in support of investigations and in capturing additional relevant information obtained from outside sources. The information collected by, on behalf of, in support of, or in cooperation with DHS and its components may contain personally identifiable information collected by other Federal, State, local, tribal, foreign government agencies, or international organizations.
The genteel lanes of David Cameron’s Oxfordshire constituency are usually a world away from the muddy chaos of Glastonbury, but the two collided following the death of a 56-year-old businessman in a festival toilet. Friends and political colleagues of Christopher Shale, the chairman of West Oxfordshire Conservative Association (Woca), expressed disbelief and grief as they came to terms with his sudden death – apparently from a heart attack midway through the festival programme. Shale had become such a close political ally of the prime minister’s that Cameron described him as “a big rock in my life”.
To find out about the thousands of similiar projects that are currently being funded in Afghanistan, see:
Afghanistan Commander’s Emergency Response Program (CERP) Spending Data 2010-2011
Terrorists can acquire precursor materials legally through a variety of commercial transactions, secondhand from individuals with access to such substances, or through theft. Many precursors can be purchased legitimately and without special authorization from chemical supply stores. They also are available at retail stores that sell beauty supply products, hardware and home improvement materials, groceries, and swimming pool supplies, and are used widely in hospitals, universities, construction sites, industrial facilities, farms, and mining operations.
Declassified DoD Inspector General Report on NSA Thinthread and Trailblazer Systems from December 15, 2004.
On April 8, 2011, an undercover officer working as part of a drug task force was shot while conducting surveillance. The officer survived the shooting but suffered injuries not only related to being shot but also from having his vehicle rammed several times during the incident. This bulletin is being produced to help outline some of the officer safety issues discussed during the initial review of the shooting incident, which may impact your future surveillance operations. The investigation into this shooting is on-going so specific details are not included, as to avoid compromising that investigation.
Infiltration of any law enforcement agency by a gang member can have severe ramifications for the agency involved, its employees, the public it serves, and its allied agencies. Gangs employ various tactics to include infiltrating an agency directly or indirectly, to achieve their objective; to counter this threat, law enforcement must remain cognizant of and employ mitigation strategies. Gangs’ motivations for infiltrating agencies vary; thus law enforcement must remain cognizant of suspicious employee behavior, identify possible motivations for infiltration, and employ mitigation strategies to counter infiltration threats.
Barry Cooper operates a website: Never Get Busted.com were he sells self-produced videos titled “Never Get Busted Again,” “Never Get Raided” and a police training video on locating hidden compartments he made while still an interdiction officer. These videos show viewers how to “conceal their stash,” “avoid narcotics profiling” and “fool canines every time,” according to the website. Barry Cooper is a proponent for the legalization of marijuana and was a Libertarian candidate for U.S. Congress District 31 in Texas. Barry Cooper lives in Tyler, Texas and appears strongly motivated to prove his contention that marijuana should be decriminalized and enjoys the publicity generated by this ruse. He has stated an intention to operate again in Odessa, Texas and elsewhere. Barry Cooper and his associates at Kobusters.com have shown the technical ability to stage this type of action and the knowledge to hire “actors” to execute this type of ruse in order to further substantiate their false claims.
China’s rulers say corrupt cadres are the nation’s worst enemy. Now, according to a report that was given widespread coverage this week in local media, Beijing says that enemy resides overseas, particularly in the U.S. The 67-page report from China’s central bank looks at where corrupt officials go and how they get their money out. A favored method is to squirrel cash away with the help of loved ones emigrating abroad, schemes that often depend on fake documents. News of the study got prominent notice this week in Chinese media. A sample headline from page one of the Shanghai Daily on Thursday: “Destination America For China’s Corrupt Officials.” The reports said the study was posted to the website of China’s central bank. While the PDF document remains widely available in Chinese cyberspace, the report – dated June 2008 and identified as “confidential” – no longer appears on the People’s Bank of China website.
我国腐败分子向境外转移资产的 途径及监测方法研究 Confidential People’s Bank of China Report on Billions in Theft by Government Officials from June 2008.
El Paso Intelligence Center: A Police Officer’s Reference Guide to Detecting Illicit Trafficking by Aircraft from October 2009.
New York State Intelligence Center Concealment Smartbook from April 2009.
Unregulated psychoactive substances marketed as “bath salts” are among the latest in a series of legal synthetic drugs that are being offered as alternatives to illegal drugs. Produced as legal substitutes for ecstasy, cocaine and amphetamines, salts are powerful stimulant drugs designed to avoid legal prosecution and are commonly available on the internet and specialty head shops. They can be made up of a variety of unregulated chemical substances and are being sold under a variety of names or brands. Open sources indicate that “bath salts” are becoming increasingly popular due to the perception that they pose seemingly safer alternative to illegal methods of getting “high” and can easily be obtained over the Internet. Concerns regarding the safety of these drugs have prompted many European countries to take measures to stop the imports and selling of these products within their borders. Recent seizures nationwide suggest these powdered salts are making inroads in the US, thus becoming narcotics of potential concern.
Intelligence reporting indicates that Los Zetas has expanded its criminal activities including extortion, kidnapping, and drug trafficking, into the Midwest and Southeast United States, and may be collaborating with a newly identified drug trafficking organization (DTO) to expand its role in the illicit drug trade in the Southeast. Los Zetas activities in the United States to date have largely been limited to the US/Mexico border area. The group’s expansion further into the United States could lead to increased smuggling, drug trafficking, and violent crime in the Southeast region, including East Tennessee and Georgia.
The National Socialist Movement (NSM) USPER is the most active neo-Nazi group operating in the United States. It has grown from a small organization with a limited following confined to the mid-western United States to the preeminent National Socialist group in the nation. Despite having recently suffered a defection of several regional leaders, NSM remains an influential force within white supremacist circles and the only major racist group that eschews all attempts to distance its methods and objectives from those of the Third Reich. NSM has a reputation for conducting numerous public rallies that have triggered a violent response, including a riot in Toledo, Ohio, in October 2005.
As of June 2010, MS-13 members in Los Angeles have directed operational activities of new MS-13 members in Birmingham, United Kingdom, using gaming consoles such as Sony Playstation and Microsoft Xbox 360. The MS-13 leaders appear to be taking advantage of the devices’ voice over internet protocol (VOIP), text chat, virtual world, and video teleconferencing features, which allow them to communicate with fellow gang members overseas.