U.S. State Department International Criminal Justice Sector Assessment Guide

The Criminal Justice Sector Assessment Rating Tool (CJSART) is designed to assist policy makers and program managers to prioritize and administer host-nation criminal justice sectors needing assistance. Once the assistance programs are underway, the CJSART is a systematic tool designed to measure progress and accomplishments against standardized benchmarks. Used in its entirety, the CJSART holistically examines a country’s laws, judicial institutions, law enforcement organizations, border security, and corrections systems as well as a country’s adherence to international rule of law standards such as bilateral and multilateral treaties.

U.S. Military Civil Disturbance Standing Rules for the Use of Force (SRUF)

These template of the Standing Rules for the Use of Force developed by Army North (ARNORTH) and approved by Army Judge Advocate General (JAG) School for commands to follow. The first two templates apply to forces under federal control. The third template is an example State RUF card for National Guard personnel in a SAD or Title 32 status. These templates are taken from the “DoD Defense Support to Civil Authorities Handbook” which includes other information relating to military support operations related to civil disturbances.

Graphic Photo of Kelly Thomas Victim of Fullerton Police Brutality

A photo of a 37-year-old schizophrenic homeless man named Kelly Thomas that was taken in the hospital by his father Ron Thomas, a former Orange County Sheriff’s Deputy. Thomas was fatally beaten by Fullerton Police officers on July 5, 2011 following attempts to search his backpack due to reports of someone “looking into cars” in the area. Multiple videos of the beating exist, including surveillance footage that has yet to be released by the Orange County District Attorney, and a large number of witnesses have come forward confirming the extremely excessive use of force by the six officers that were attempting to subdue Thomas. One officer in particular was reportedly responsible for beating Thomas repeatedly in the back of the head with a Taser until Thomas began to bleed profusely, as well as dropping his knee against the back of Thomas’ head leading to fractures in his face and the crushing of his windpipe. This officer has been identified as Jay Cicinelli, a former LAPD officer who was shot within weeks of leaving the academy and now only has one eye. The beating is now being investigated by the FBI.

(U//FOUO) DHS Rising Copper Thefts Disrupting Homeland Infrastructure

Reported copper thefts from critical infrastructure and key resource (CIKR) sectors in the United States rose at least 50 percent in 2010 compared to the previous year, largely driven by record-high prices for copper. Individuals and criminal organizations have engaged in copper thefts primarily for financial gain. We have seen no indication that terrorists are using copper thefts in the homeland as a tactic to damage or destroy CIKR facilities or to fund terrorist activity.

ICE Facilities Standard CCTV Camera Information and Locations

The SM-CCTV System is a computer network consisting of closed-circuit video cameras, digital video recorders (DVRs), and monitoring capabilities that capture video-only feeds in and around ICE facilities. The purpose of the SM-CCTV System is to help ICE secure and regulate physical access to ICE facilities. The system also serves to enhance officer safety, prevent crimes, and assist in the investigation of criminal acts committed inside and on the perimeter of protected ICE facilities. Video surveillance also supports terrorism prevention and facility protection with its visible presence, and detects and deters unauthorized intrusion at ICE facilities. The SM-CCTV System is planned to be deployed in numerous ICE facilities nationwide.

DHS Terrorist Watchlist Service Privacy Impact Assessment

The Department of Homeland Security (DHS) currently uses the Terrorist Screening Database (TSDB), a consolidated database maintained by the Department of Justice Federal Bureau of Investigation Terrorist Screening Center (TSC) of identifying information about those known or reasonably suspected of being involved in terrorist activity in order to facilitate DHS mission-related functions, such counterterrorism, law enforcement, border security, and inspection activities. DHS and TSC are improving the current method of transmitting TSDB data from TSC to DHS. Through a new service called the “DHS Watchlist Service” (WLS), TSC and DHS will automate and simplify the current manual process. TSC remains the authoritative source of watchlist data and will provide DHS with near real-time synchronization of the TSDB. DHS will ensure that each DHS component system receives only those TSDB records which they are authorized to use under the WLS Memorandum of Understanding and authorized under existing regulations and privacy compliance documentation between TSC and DHS (WLS MOU) and any amendments or modifications thereto. DHS conducted this privacy impact assessment (PIA) because the WLS will maintain a synchronized copy of the TSDB, which contains personally identifiable information (PII), and disseminate it to authorized DHS components.

(U//FOUO) LA-JRIC 82% of Cocaine in U.S. Contaminated by Veterinary De-worming Drug

In April 2011, the US Drug Enforcement Administration (DEA) reported up to 82 percent of all cocaine seized in the United States contained levamisole, a veterinary drug used to de-worm livestock. Law enforcement and public health officials in the United States are warning of serious public health consequences for drug users related to contaminated cocaine use.

(U//FOUO/LES) U.S. Army “We Are Not Your Soldiers” Anti-War Protest Warning October 2009

A named U.S. anti-war group “We are not your Soldiers” announced on their website that October 6, 2009 will be a “National Day of Resistance against Military Recruiters.” While no specific locations have been mentioned where the protests will occur, the group has called on all individuals across the United States to confront military recruiters at schools and in malls and to protest in front of military recruiting centers. The demonstration organizers plan on using students and teachers to rally students to their cause. They are asking students to wear an orange bandanna or ribbon (the color against torture and war) to show there’s a movement. They are asking students and teachers to invite anti-war veterans to talk to their classes or assemblies.

UK MI5/MI6 “Top Secret” Policy for Gaining Intelligence From Detainees Subject to Torture

A reportedly “Top Secret” document that was obtained and published by the Guardian. It details rules and procedures allowing members of British intelligence, specifically MI5 and MI6 to obtain information from detainees that have been subject to torture in other jurisdictions. The memo notes that obtaining such information may be in violation of both UK and international law.

Indian Karnataka Lokayukta (People’s Commissioner) Report on Mining Industry Corruption

A 466-page summary of a more than 25,000-page report compiled by the Indian government’s Karnataka Lokayukta or People’s Commissioner who investigated years of illegal activities in the Indian mining sector, including widespread corruption, bribery and the exportation of illicit iron ore worth more than $3 billion. The report has met with widespread controversy due to its singling out of a number of prominent billionaires in the Indian mining industry.

White House Strategy for Countering Violent Extremism in the United States

Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.

(U//FOUO) RAND Corporation Study: Israeli Warfare After the Second Lebanon War

The Armored Corps Association hosted its inaugural conference on November 13–14, 2007, as a forum for discussion of Israeli operations during the July–August 2006 Second Lebanon War. Attendees sought to identify both challenges meriting particular attention due to their implications for the country’s future security and solutions to those challenges. The event drew some 200 active and retired members of the Israeli Defense Forces (IDF), in addition to representatives from the commercial sector, the United States, and the United Kingdom. A list of speakers and brief biographical sketches appear in Appendixes A and B, respectively. Note, however, that selected materials do not appear herein due to some speakers’ requests that they not be included in either the Hebrew or English version of these proceedings.

DHS Bulletin: Anonymous/LulzSec Has Continued Success Using Rudimentary Hacking Methods

This Bulletin is being provided for your Executive Leadership, Operational Management, and Security Administrators situational awareness. The actors who make up the hacker group “Anonymous” and several likely related offshoots like “LulzSec”, continue to harass public and private sector entities with rudimentary exploits and tactics, techniques, and procedures (TTPs) commonly associated with less skilled hackers referred to as “Script Kiddies”. Members of Anonymous routinely claim to have an overt political agenda and have justified at least a portion of their exploits as retaliation for perceived ‘social injustices’ and ‘freedom of speech’ issues. Attacks by associated groups such as LulzSec have essentially been executed entirely for their and their associates’ personal amusement, or in their own hacker jargon “for the lulz”.

(U//FOUO) DHS Red Cell Report: How Terrorists Might Infect U.S. Poultry With Bird Flu

This report explores how terrorists or other non-state adversaries could potentially facilitate an avian influenza outbreak within the United States. The report was primarily intended to assist the Secretary of Homeland Security, Chief Intelligence Officer, Deputy Assistant Secretary, and Chief Medical Officer as they consider the implications of avian influenza to the Homeland. The scenarios explored in this paper are speculative and meant only to broaden the scope of thinking. They are not based on specific evidence or intelligence about terrorists’ plans and capabilities, but are considered scientifically feasible, according to experts that were interviewed.

(U//LES) FBI Bloods Street Gang Communicating Through Playstation Network (PSN)

FBI New York case information indicates that Bloods gang members in the Bronx, NY are utilizing PlayStation Network (PSN) to communicate each other while on house arrest. Identified Bloods will post their “PSN tag name”, a self-generated ID used to identify individual users, on social networking web-sites and invite others to connect with them using their PlayStation 3 gaming system. These individuals have been observed sharing “tag names” with each other and discussing intentions to communicate through PSN.

(U//FOUO) DHS Utility-Sector Employee Insider Threats Warning

Insiders often possess detailed operational and system-security knowledge, as well as authorized physical and systems access to utilities. Insiders can be employees, contractors, service providers, or anyone with legitimate access to utility systems. They often are self-motivated, know system security measures, and raise no alarms due to their authorized systems access. With knowledge of and access to a utility’s network, malicious actors could seize control of utility systems or corrupt information sent to plant operators, causing damage to plant systems and equipment. Systems and networks used by utilities are potential targets for a variety of malicious cyber actors. Threat actors who target these systems may be intent on damaging equipment and facilities, disrupting services, stealing proprietary information, or other malicious activities. The greater the individual’s knowledge and authorized systems access, the greater risk the individual poses. Furthermore, any individual with access to a plant’s systems could unwittingly or inadvertently introduce malware into a system through portable media or by falling victim to socially engineered e-mails.