Mirror of Utøya gunman Anders Behring Breivik’s Facebook page and photo gallery, provided because profiles on social networking sites are often removed after their owners engage in high profile criminal/terrorist activities.
Comprehensive Agreements on Security of Information Within the North Atlantic Treaty Organization signed in June 2002.
NATO Restricted Outsourcing Balkans Communications and Information Systems Support from January 2008.
Preventing terrorism, enhancing security, and ensuring resilience to disasters are core missions of the U.S. Department of Homeland Security (DHS). Accomplishing these missions necessitates building and fostering a collaborative environment in which the private sector and Federal, State, local, tribal, and territorial governments can better protect critical infrastructure and key resources (CIKR). The U.S. Lodging Industry is designated as CIKR because it is essential to the Nation’s economic vitality and way of life. It is critical to the Department’s vision of ensuring a homeland that is safe, secure, and resilient against terrorism and other hazards. As such, DHS developed the Protective Measures Guide for the U.S. Lodging Industry in collaboration with the American Hotel & Lodging Association to provide options for hotels to consider when implementing protective measures. The guide provides an overview of threat, vulnerability, and protective measures designed to assist hotel owners and operators in planning and managing security at their facilities. It provides suggestions for successful planning, organizing, coordinating, communicating, operating, and training activities that contribute to a safe environment for guests and employees. In addition, when contemplating appropriate protective measures to implement, owners and operators should consider their own knowledge of the property‘s operations and vulnerabilities, as well as the general surroundings and its place within the community. When implementing appropriate protective measures, owners and operators should make use of additional resources, from local law enforcement and emergency management agencies to the security resources listed in the appendices of this guide.
After representatives of the Drug Enforcement Administration, the State Department and the Defense Department touted the success of U.S. counter-narcotics efforts in Afghanistan for more than an hour Wednesday, lawmakers aggressively questioned them about a subject that forced panelists into near silence: corruption in President Hamid Karzai’s government. Sen. Dianne Feinstein (D-Calif.), chair of the Senate Caucus on International Narcotics Control, noted that in April 2009, Karzai issued a decree to release drug traffickers who were caught with more than 260 pounds of heroin. “True or false?” Feinstein asked. Thomas Harrigan, chief of operations for the DEA, paused and answered: “I believe they were pardoned.”
With terrorists increasingly resorting to hacking and using internet for communications, India and the US Tuesday inked an agreement to promote increased collaboration in cyber security. The memorandum of understanding on cyber security was signed by R. Chandrashekhar, secretary, India Department of Information Technology, and Jane Holl Lute, deputy secretary for the US Department of Homeland Security (DHS). The agreement entails closer cooperation and the timely exchange of information on cyber security.
U.S. District Court of Massachusetts indictment of Aaron Swartz for allegedly downloading millions of scholarly articles from JSTOR filed in July 2011.
U.S. District Court of Northern California indictment of sixteen people filed July 13, 2011 in connection with Anonymous DDoS attacks on PayPal.
As authorities have clamped down on traditional financing pipelines, such as charitable front groups, and as terrorist networks have grown increasingly decentralized, terrorists have turned to criminal activities to finance their operations locally. Throughout the world, Al Qaeda, Hamas, and Hezbollah operatives have involved themselves in an array of criminal enterprises, including counterfeiting, drug dealing, cigarette smuggling, credit card fraud, auto theft, kidnapping, extortion, and artifact trafficking. Although criminality is outlawed under Islamic law, the Al Qaeda manual advises that “necessity permits the forbidden.” Reflecting this theory, when Jemaah Islamiyah (JI) operatives questioned whether hacking into foreigners’ bank accounts was acceptable in Islam, JI leader Abu Bakr Bashir reportedly responded, “[if] you can take their blood; then why not take their property?” “Terrorist groups are particularly interested in raising funds through crime because as Lieutenant Colonel David LaRivee, Associate Professor of Economics at the United States Air Force Academy, stated, “many of the agencies responsible for enforcement in these areas do not traditionally focus on counterterrorism nor do they have strong ties with counterterrorist agencies. This means that many indictable criminal activities that support terrorism are overlooked because they seem insignificant when evaluated locally, but are in fact very significant when considered from a broader perspective.” In order to disrupt these financing efforts, “local law enforcement officials will be key,” as the FBI assessed in a May 25, 2005 Intelligence Bulletin.
The Sudanese Armed Forces (SAF) is a conventional armed force with a mandate to protect and to maintain internal security. It carries out its mandate mainly through ground forces, including Popular Defence Force (PDF) militia, as well as an air force and navy. The Supreme Commander of the armed forces, Lieutenant General Omar Hassan Ahmad el-Bashir, holds both the posts of National President and Commander-In Chief of the Armed Forces and People’s Defence Forces (PDF). For operational purposes he exercises this power through the Minister of Defence (currently major-general Bakri Hassan Saleh). The Minister appoints a Commander of the Armed Forces and Chief of General Staff (currently, general Abbas Arabi) who, together with five Deputy Chiefs of Staff (Operations, Intelligence, Logistics, Administration, Training and Morale), form the Committee of the Joint Chiefs of Staff or Command Group. The air force and navy are individual services under the commander-in-chief.
Sean Hoare, the former News of the World showbiz reporter who was the first named journalist to allege Andy Coulson was aware of phone hacking by his staff, has been found dead, the Guardian has learned. Hoare, who worked on the Sun and the News of the World with Coulson before being dismissed for drink and drugs problems, is said to have been found dead at his Watford home. Hertfordshire police would not confirm his identity, but the force said in a statement: “At 10.40am today [Monday 18 July] police were called to Langley Road, Watford, following the concerns for the welfare of a man who lives at an address on the street. Upon police and ambulance arrival at a property, the body of a man was found. The man was pronounced dead at the scene shortly after. “The death is currently being treated as unexplained, but not thought to be suspicious. Police investigations into this incident are ongoing.”
House Democrats on Wednesday accused two Republicans who served on the Financial Crisis Inquiry Commission of leaking sensitive material during the course of the group’s yearlong probe. The finger pointing came in a 37-page report from aides to Rep. Elijah E. Cummings (D-Md.), the ranking member of the House Committee on Oversight and Government Reform, who culled from thousands of the FCIC’s e-mails, memos and other documents. It found that two Republicans appointed to the 10-member commission — Vice Chairman Bill Thomas and Peter Wallison, a former Treasury official — “leaked confidential information to outside parties on multiple occasions.”
If you see something, say something – and don’t worry about getting sued. That’s the push Rep. Pete King is making in Congress, hoping to expand liability protection for people who report something fishy that could indicate a terror plot. “Good citizens who report suspicious activity should not have to worry about being sued,” said King, chairman of the House Homeland Security Committee. A 2007 law only covers tips made on passenger transportation – but not by the man on the street, like hero Times Square vendors Lance Orton and Duane Jackson.
A judge in the Supreme Court of the State of New York ruled Friday that a lawsuit filed by a group of 84 Israeli terror victims against the Bank of China can proceed. The plaintiffs, who include family members of victims of terrorist bombings and rocket attacks carried out by Palestinian Islamic Jihad and Hamas in 2006 and 2007, are claiming that the Bank of China facilitated the attacks by providing wire transfer services to both terror groups. The group lawsuit, known as the “Almaliakh action” after Emil Almaliakh, an Eilat resident killed in a suicide bombing in 2007, has been filed with the assistance of the Israel Law Center (Shurat HaDin) and New York attorney Robert Tolchin.
A large-scale research project was thus planned and conducted from March to August 2010. This research included a deep probe into the media sector and the public’s behaviors and expectations. The methodology used to achieved this included a combination of: literature review; direct observations; key informant interviews with most relevant actors involved in the media sector; 6,648 close-ended interviews in more than 900 towns and villages of 106 districts, covering all 34 provinces of the country; an audience survey on more than 1,500 individuals run daily for a week; about 200 qualitative, openended interviews; and 10 community case studies. Such an effort guarantees that results presented here are fairly representative of the Afghan population at large.
The Department of Homeland Security has complained to Rep. Jason Chaffetz (R-Utah) about what it says was an inappropriate disclosure of sensitive security information to the press by the House transportation panel that he chairs. In a letter dated Wednesday, a clearly miffed Department of Homeland Security Deputy Counsel Joseph B. Maher told Chaffetz that “sensitive security information” provided to his subcommittee by the Transportation Security Administration was illegally disclosed to the press. “This document was marked as [Sensitive Security Information],” Maher wrote, “and provided clear notice that unauthorized disclosures of the document violated federal law.”
Globally, UNODC estimates that, in 2009, between 149 and 272 million people, or 3.3% to 6.1% of the population aged 15-64, used illicit substances at least once in the previous year. About half that number are estimated to have been current drug users, that is, having used illicit drugs at least once during the past month prior to the date of assessment. While the total number of illicit drug users has increased since the late 1990s, the prevalence rates have remained largely stable, as has the number of problem drug users, which is estimated at between 15 and 39 million.
A federal judge has issued an opinion in EPIC v. NSA, and accepted the NSA’s claim that it can “neither confirm nor deny” that it had entered into a relationship with Google following the China hacking incident in January 2010. EPIC had sought documents under the FOIA because such an agreement could reveal that the NSA is developing technical standards that would enable greater surveillance of Internet users. The “Glomar response,” to neither confirm nor deny, is a controversial legal doctrine that allows agencies to conceal the existence of records that might otherwise be subject to public disclosure. EPIC plans to appeal this decision. EPIC is also litigating to obtain the National Security Presidential Directive that sets out the NSA’s cyber security authority. And EPIC is seeking from the NSA information about Internet vulnerability assessments, the Director’s classified views on how the NSA’s practices impact Internet privacy, and the NSA’s “Perfect Citizen” program.
U.S. Department of the Treasury Overview of the Government of the Islamic Republic of Afghanistan 1390/2011 Budget Process from May 6, 2011.
As Al-Qa‘ida and other terrorist groups continue to seek innovative ways to conduct attacks and circumvent security procedures, there is concern that the holiday season provides attractive opportunities for terrorists to target the Homeland. This bulletin focuses on lodging facilities that serve large numbers of business and leisure travelers and provide venues for a variety of holiday events.
The assassination of Ahmad Wali Karzai, Afghan President Hamid Karzai’s half-brother and one of the country’s most feared men, necessitates a careful reflection on the abiding power of its country’s warlords and what their influence portends, as the United States begins scaling down its forces. Long cultivated by the Central Intelligence Agency (CIA), Mr. Karzai used his connections to build an empire in Kandahar: an empire that is alleged to have been paid for with cash harvested from the drugs trade as well as business interests that extended from land to transportation and infrastructure projects. Even though the U.S. was well aware of his corruption, leaked diplomatic cables suggest it feared losing a powerful partner in the war against the Taliban.
Hotels, motels, and other lodging facilities have been used by extremist individuals and groups as locations to manufacture improvised explosive devices (IEDs) in close proximity to their intended targets. Hotels, specifically rooms with kitchens or kitchenettes, allow these groups or individuals to greatly reduce the potential for a premature detonation. Given the short distance to the intended target the risk of premature detonation during transportation is minimized.
The number of private security guards is now almost twice that of police officers, as governments around the world outsource many of their security functions, according to a new report based on data compiled by the United Nations. Yet, despite the rapid growth of the private security sector, which now employs an estimated 20 million documented personnel worldwide, these staff hold far fewer firearms than do state security forces, the annual Small Arms Survey reveals. The 2011 edition of the survey, published today by the Graduate Institute of International and Development Studies in Geneva, finds that private security staff personnel in 70 countries measured hold no more than four million firearms, compared to 26 million held by police and law enforcement officials, and 200 million held by members of national armed forces.