In April 2011, a colloquium was held at the private military college Norwich University in conjunction with the Vermont branch of the FBI’s Infragard program. These presentations from the colloquium provide insight into government responses to WikiLeaks and other similar initiatives.
Sandusky was employed by Penn State for 23 years as the defensive coordinator of its Division I collegiate football program. Sandusky played football for four years at Penn State and coached a total of 32 years. While coaching, Sandusky started “The Second Mile” in State College, Pennsylvania, in 1977. It began as a group foster home dedicated to helping troubled boys. It grew into a charity dedicated to helping children with absent or dysfunctional families. It is now a statewide, three region charity and Sandusky has been its primary fundraiser. The Second Mile raises millions of dollars through fundraising appeals and special events. The mission of the program is to “help children who need additional support and would benefit from positive human interaction.” Through The Second Mile, Sandusky had access to hundreds of boys, many of whom were vulnerable due to their social situations.
See also: Afghan Landscapes
A “Sales Playbook” for distributors of Blue Coat equipment includes pricelists and a guide to selling web filtering technology including some of the very same models discovered by Telecomix to be in use by the Syrian government for spying on their population. These models include the SG-400 and SG-810, among others, which have a price range of $3,999 up to $34,999 depending on the specific model.
Air Force Policy Directive 91-4 on safety in using directed energy weapons (DEW) revised October 21, 2011.
Previous reports by the Director General have identified outstanding issues related to possible military dimensions to Iran’s nuclear programme and actions required of Iran to resolve these. Since 2002, the Agency has become increasingly concerned about the possible existence in Iran of undisclosed nuclear related activities involving military related organizations, including activities related to the development of a nuclear payload for a missile, about which the Agency has regularly received new information.
So-called sovereign citizens are anti-government extremists who reject the notion of U.S. citizenship. They claim to follow only God’s laws and the amendments found in the original Bill of Rights. Sovereign citizens believe they are exempt from all other responsibilities associated with being a U.S. citizen, such as paying taxes, possessing a driver’s license, registering vehicles, or holding a Social Security card. In addition, they do not generally recognize Federal or State government authority or laws. Sovereign citizen groups are known for presenting fraudulent IDs, license plates, tax-exemption cards, passports, and birth certificates, among others. Other activity includes firearms violations, redemption schemes, and documents that falsely claim diplomatic and law enforcement privileges.
With the fundamental issues of organized crime deeply integrated in present-day law enforcement, investigators are better equipped for emerging and unfamiliar types of organized crime, more specifically, Asian organized crime. The investigation into Asian criminal groups is similar to that of other organized groups. Basic investigative techniques of organized crime are applicable to Asian crime groups; however, the degree of cultural variance among people of Asian decent and Americans makes the investigation of Asian criminal groups, by American law enforcement, a challenging task.
The purpose of this assessment is to provide situational awareness of suspicious incidents involving the ESS, as reported by local public safety officials and State and Local Fusion Centers in Indiana, Virginia, Colorado, Nevada, and Illinois.
Marketed with harmless-sounding names such as Ivory Wave, Tranquility, and Blue Silk (among others), bath salts have become the newest trendy street drug. Comparable to methamphetamine, cocaine, and PCP, snorting bath salts can induce violent and aggressive behavior, which make users very dangerous to themselves and law enforcement. Authorities are caught in a rush to combat this dangerous trend, as bath salts are legal in most states. Bath salts are essentially drugs that are being labeled “bath salts.” Although they are marketed “not for human consumption,” they are being purchased with the intent to be snorted, injected, or smoked by abusers, sometimes causing extreme reactions such as hallucinations, paranoia, suicidal thoughts, agitation, and increased heart rate. Users have also experienced hypothermia, seizures, and delusions. None of the chemicals found in these salts are contained in legitimate bath salts sold by a reputable company.
This Recognition Guide focuses on images of VOIED switches, components, and materials. Common IED indicators (observables) are listed and when found, indicate a high probability of IED activity. Refer to this material if something looks: suspicious, out of place, or out of character. This guide is organized by switches (Pressure Plate, Low Metallic Signature, and No Metal Content), main charges, containers, power supplies, initiators, and finally a section on IED factories.
This plan outlines the Chief of Naval Operations’ (CNO) Strategic Studies Group (SSG) XXVIFs approach to addressing the challenges of operating at the convergence of Sea Power and Cyber Power as presented in the CNO’s Theme. In addition to providing a framework for the approach, this plan presents SSG XXVIFs initial overarching concept and Concept Team (CT) areas of focus.
A study directed by the Commanding General, U.S. Army Training and Doctrine Command (TRADOC), “Study to Establish Levels of Digital Literacy for Soldiers and Leaders in the U.S. Army” from February 28, 2011.
A letter published on the website of the Oakland Police Officers’ Association in response to public outrage over the violent police action that took police on October 25, 2011 attempting to suppress a march in support of the Occupy Oakland protest.
Affadavit filed in U.S. District Court in the Northern District of Virginia in support of a search warrant for the home of Samuel J. Crump. Crump and several other men ranging in age from 65 to 73 were allegedly plotting to conduct a series of attacks using homemade ricin.
Recent plots and attacks in the Homeland and overseas demonstrate a continuing terrorist focus on acquiring commercially available materials and components that can be used in constructing improvised explosive devices (IEDs). Heightened public and state and local official awareness, as well as tightened legal controls, have made it more difficult to purchase certain products that contain explosive precursors in bulk quantities or concentrated forms. Operatives are now more likely to use surreptitious, though legal, methods—such as multiple purchases in smaller quantities—to acquire sufficient amounts to create explosives.
Decision by the Queen’s Bench Division of the UK High Court of Justice in the matter of Assange v Swedish Prosecution Authority issued November 2, 2011.
Stuart Bannocks – http://www.flickr.com/photos/42665617@N07/ Loz Pycock – http://www.flickr.com/photos/blahflowers/ Hedonoikos – http://www.flickr.com/photos/bauzz/ Workers Solidarity Movement – http://www.flickr.com/photos/wsm_ireland/ Garry Knight – http://www.flickr.com/photos/garryknight/ Christopher A. Tittle – http://www.flickr.com/photos/onigiris_and_onsens/ Beth PH – http://www.flickr.com/photos/beth-torr/
We write to express our concern with the recent activity by the Department of Justice against legitimate medical cannabis dispensaries in California that are operating legally under state law. As you know, in October of 2009, Attorney General Eric Holder issued formal guidelines for federal prosecutors in states that have enacted laws authorizing the use of cannabis for medical purposes. The guidelines were spelled out in a memo to United States Attorneys from then Deputy Attorney General David Ogden, saying in part that the Attorneys should not focus federal resources in their state “on individuals whose actions are in clear and unambiguous compliance with existing state laws providing for the medical use of marijuana.”
The Georgia Information Sharing and Analysis Center (GISAC) is releasing this informational bulletin to enhance the situational awareness of law enforcement and security personnel with regard to a highly suspicious break-in incident that occurred on 24 October 2011 at the Haralson County Water Treatment Facility. During this incident, a subject broke in to the facility and was recorded (via security camera) taking pictures of the facility’s chlorination system, including the chlorine tank. In light of this highly suspicious incident, GISAC is urging facilities to be vigilant in their security measures and report any suspicious activity regarding water treatment facilities, or other critical infrastructure as soon as possible.
Ten surveillance videos released by the FBI regarding the investigation into the so-called “Illegals Program”, a network of accused Russian spies operating unofficially in the U.S. from the late 1990s to 2010.
The National Drug Intelligence Center (NDIC) assesses with high confidence that in 2009, Mexican drug trafficking organizations (DTOs) were operating in the United States in at least 1,286 cities spanning all nine Organized Crime Drug Enforcement Task Force (OCDETF) regions, based on law enforcement reporting. Moreover, NDIC assesses with high confidence that Mexican DTOs in at least 143 of these U.S. cities were linked to a specific Mexican Cartel or DTO based in Mexico—the Sinaloa Cartel (at least 75 cities), the Gulf Cartel/Los Zetas (at least 37 cities), the Juárez Cartel (at least 33 cities), the Beltrán-Leyva DTO (at least 30 cities), La Familia Michoacán (at least 27 cities), or the Tijuana Cartel (at least 21 cities). NDIC assesses with high confidence that Mexican DTOs will further expand their drug trafficking operations in the United States in the near term, particularly in the New England, New York/New Jersey, Mid-Atlantic, and Florida/Caribbean Regions. NDIC also believes that Mexican DTOs will maintain the present high level of availability for heroin, marijuana, and methamphetamine because the conditions in Mexico and in the United States that enabled and motivated the DTOs to increase production and availability of those drugs have not significantly changed.
The following texts were obtained and first published by Citizens Trade Campaign (CTC). According to CT, the texts “reveal that the Obama administration has reversed reforms designed to enhance access to affordable medicines made during the George W. Bush administration and is instead demanding new rights for pharmaceutical firms to challenge pricing and other drug formulary policies used by many developed countries to keep down prices.” The texts also have relevance for those studying intellectual property rights as previously leaked versions of the Trans-Pacific Partnership (TPP) demonstrated a number of features that advanced controversial aspects of U.S. copyright law.
Copies of an “informational” letter were left on a table for protestors pick up and read during the “Occupy Phoenix” event at Cesar Chavez Park. The presence of the letter was reported to the ACTIC by a Maricopa County Sheriff’s Deputy who had responded to an un-related call and was alerted to it by another deputy working the event. This letter is blatantly anti-government and anti-law enforcement in nature. It not only condones but even encourages citizens to kill any “government agent” (i.e. law enforcement officer), who in their perception violates their rights. Examples are given in the document, of “illegal” search and seizure, sobriety and border checkpoints, airport security, etc… In essence this document states that citizens have the right and moral obligation to resist any action by law enforcement that is viewed as a violation of the citizen’s rights, and often-times resistance involves killing officers.
This report is part of a series created by the Department of Homeland Security’s Protective Security Division concerning common vulnerabilities and the detection of terrorist activity at critical infrastructure locations.