California, Intelligence Fusion Centers
Orange County Private Sector Terrorism Response Group TV Guide Weekly Bulletin
An example of a weekly bulletin released by the Orange County Intelligence Assessment Center to local businesses through its “Private Sector Terrorism Response Group” (PSTRG) on January 6, 2012. The PSTRG was created in “December 2001 to create a private sector partnership [that can] effectively address private sector safety, incident management, employee education and public health consequences of potential attacks on the critical infrastructure within Orange County. Two large groups involved with PSTRG are the Orange County Business Council, of which 80% of the major businesses in Orange County are members, and Technet, a consortium of 28 high tech firms.” The bulletin includes excerpts of news articles related to terrorism, a list of upcoming events, including dirt bike events and rodeos, as well as a helpful list of upcoming television shows on the History Channel and other networks that relate in some manner to terrorism.
New Jersey
(U//FOUO) New Jersey Office of Homeland Security School Bomb Plot Warning
On January 25, 2012, police officers in Utah arrested two teenagers after discovering that they planned to bomb their high school. The plot was foiled because another student received suspicious text messages from one of the boys and notified school administrators. During the subsequent investigation, police were able to corroborate the initial tip. The two suspects had blueprints of the school and planned to steal a plane at a nearby airport after their attack. They told police they were learning to fly on a flight-simulator program on their home computers.
Australia, Canada, New Zealand, United Kingdom, United States
American, British, Canadian, Australian and New Zealand (ABCA) Armies Security Force Capacity Building Handbook
SFCB has come to play an increasingly important role in each of our armies over the last decade and will undoubtedly feature in operations spanning the spectrum of conflict in the future. Its affect on organization, training, equipping and doctrine has been felt to a greater or lesser extent by each of us and will help define recent conflicts and their effects. However, SFCB cannot be done in isolation. What must be borne in the military planner‘s mind from the outset is that SFCB is a part of the wider SSR campaign and as a consequence must be part of a comprehensive approach. Furthermore, if coalition partners are present, an extra layer of complexity is present and must be planned for. Failure to take these two aspects into account runs the risk of failure at worst or a fragmented HNSF as a result, at best. This handbook aims to assist the military planner in their approach to SFCB. It is aimed at both commanders and staff officers, primarily on brigade and divisional staffs, although it also has utility for those charged with training, mentoring and advising HNSF forces at the tactical level.
Afghanistan, U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Partnering with Afghan National Security Forces (ANSF) Lessons Learned
The Marine Corps has a long and storied history of partnering, mentoring, and advising foreign militaries. Marines served as the officer corps of the Gendarmerie d’Haiti and integrated at platoon-level with South Vietnamese Popular Forces. These are only two of many possible examples, but they suffice to illustrate the diversity of relevant Marine Corps experience. This enduring legacy influences Marine counterinsurgency operations in Afghanistan as well as theater security cooperation exercises throughout the world.
Afghanistan, North Atlantic Treaty Organization
ISAF CAAT Afghan National Security Forces (ANSF) Guidelines in Partnering for Transition
The level of partnership with ANSF units largely depends on the individual coalition commander’s discretion whether it is a partnered unit or an advisor team. Although this discretion is important to empower leaders on the ground, the current parameters in partnering guidance are very broad which leads to varying levels of effectiveness and consistency. Standardized guidelines would provide specific tasks (e.g. develop and conduct all planning and operations from a Joint TOC) to units designated as ANSF partners. Additionally, true embedded partnership improves ANSF development, mission accomplishment and force protection. The recommendations in this paper offer uniformed standards throughout diverse allied forces, assistance during RIP/TOA, improvement in the development of the Afghan forces, and a path to effective transition.
U.S. Air Force
(U//FOUO) U.S. Air Force Top Ten Cyber Threats 2012
Every year as technology grows and advances thus do the threats that surround it. Predicting what new cyber threats to look for may not always be an easy task. By keeping up with the past trends and ever changing current environment, may help to give us a good handle on how to prepare for what may be to come.
New York, Switzerland
Wegelin & Co. Swiss Bank Aiding U.S. Tax Evasion Indictment
The indictment of the Swiss bank Wegelin & Co. and several affiliated persons for conspiring to aid wealthy U.S. clients evade taxes, February 2012.
Department of Homeland Security, Federal Bureau of Investigation
(U//FOUO) DHS-FBI Florida-Based Violent Extremist Arrested for Plotting Bombing Attack in Tampa
This Joint Intelligence Bulletin is intended to provide information on the 7 January 2012 arrest by the FBI Tampa Joint Terrorism Task Force (JTTF), as part of a planned law enforcement action, of Florida-based Sami OsmakacUSPER. Osmakac is charged with attempted use of weapons of mass destruction. This information is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial, counterterrorism and law enforcement officials to prevent or respond to terrorist attacks against the United States.
News
Do You Believe in Conspiracy Theories? You May Be a Terrorist
A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. The document, part of a collection published yesterday by Public Intelligence, indicates that individuals who discuss “conspiracy theories about Westerners” or display “fury at the West for reasons ranging from personal problems to global policies of the U.S.” are to be considered as potentially engaging in terrorist activity. For an example of the kinds of conspiracy theories that are to be considered suspicious, the flyer specifically lists the belief that the “CIA arranged for 9/11 to legitimize the invasion of foreign lands.”
News
Do You Like Online Privacy? You May Be a Terrorist
A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called “Communities Against Terrorism”, lists the use of “anonymizers, portals, or other means to shield IP address” as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using “software to hide encrypted data in digital photos” or other media. In fact, the flyer recommends that anyone “overly concerned about privacy” or attempting to “shield the screen from view of others” should be considered suspicious and potentially engaged in terrorist activities.
Federal Bureau of Investigation
FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers
A collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The fliers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country. We have compiled this collection from a number of online sources.
United Kingdom
Julian Assange’s Appeal to the U.K. Supreme Court
A copy of the appeal presented by Julian Assange’s lawyers to the U.K. Supreme Court in the matter of Julian Paul Assange vs. the Swedish Prosecution Authority.
California, Intelligence Fusion Centers
(U//FOUO) Los Angeles Fusion Center: Steganography Intelligence Bulletin
Steganography—the practice of concealing data within a carrier—may be used to obscure malicious or criminal information and activity from law enforcement. While steganography dates to the fifth century BC, it has long been regarded as, and remains, one of the most advanced forms of clandestine communication. In modern usage, the Internet allows accessibility to, and broad dissemination of, steganography tools, and its application continues to evolve with technology. Understanding steganography in its current state is essential to its identification and detection.
News
The Most Technologically Secure Super Bowl Ever
If you watch the Super Bowl next Sunday, between the commercials and the elaborate half-time show, take a moment to to think about the one aspect of the event that you will not see: the massive deployment of federal and local law enforcement resources to achieve what is already being called “the most technologically secure Super Bowl in the history of the Super Bowl.” The game, which will take place February 5 at Lucas Oil Stadium in Indianapolis, will be secured by an unprecedented number of measures including dozens of newly-installed night-vision cameras, mobile gamma-ray scanners and a $18 million fusion center staffed with officials from various federal agencies and the military.
Documents
Anti-Counterfeiting Trade Agreement (ACTA) Final Version May 2011
The most recent version of the Anti-Counterfeiting Trade Agreement released by the European Commission in May 2011.
Headline
Occupy Oakland Move-In Day Photos January 2012
Cary Bass – http://www.flickr.com/photos/bastique/ Glenn Halog – http://www.flickr.com/photos/ghalog/ Steve Rhodes – http://www.flickr.com/photos/ari/
Department of Homeland Security, Federal Bureau of Investigation, Intelligence Fusion Centers, U.S. Secret Service
(U//FOUO) DHS-FBI-USSS 2012 State of the Union Address Joint Threat Assessment
We have no specific or credible information indicating a threat to the US Capitol or the National Capital Region (NCR) to coincide with the 2012 State of the Union address. We assess, however, that al-Qa‘ida and its affiliates and allies remain committed to attacking the Homeland and, as of February 2010, al-Qa‘ida identified the NCR and the State of the Union address itself as important targets, presumably for attacks. Moreover, homegrown violent extremists (HVEs) as well as lone offenders could view the event as an attractive target, offering the means to inflict casualties and garner extensive media coverage. Detecting homeland plots involving HVEs and lone offenders continues to challenge law enforcement and intelligence agencies due to the operational independence of the perpetrators, which can reduce or eliminate preoperational indicators.
U.S. Army
(U//FOUO) U.S. Army Female Suicide Bombers Report
U.S. Army TRADOC Intelligence Support Activity (TRISA) Female Suicide Bombers report from January 2011.
Afghanistan, U.S. Army
(U//FOUO) Afghanistan Human Terrain Team AF-24 Quarterly Report Summer 2011
Local governance in rural Afghanistan is not simple. Older customary local assemblies operate alongside GIRoA officials, Community Development Councils (CDC’s), and insurgent groups. Although we speak of insurgent governments as “shadow governments,” they rarely exist in the shadows for those over whom they wield power. In villages where insurgents continue to exercise control, the insurgents and not GIRoA perform traditional governmental functions; they levy taxes, resolve disputes (they are, in many villages the only law in town), and maintain local defense forces. Western Powers have invested their hope and their treasure in inventing a new form of local control: Community District Councils that come out of the National Solidarity Program (NSP). Managed by the Ministry of Rural Rehabilitation and Development (MRRD) with funds from NGO’s and from the World Bank, these organizations set priorities for the expenditure of donor money and oversee contracts. Although they offer an alternative to the indiscriminate funding of the past that encouraged favoritism and corruption, these organizations have little authority except when it comes to the stewardship of outside money. As those development funds begin to dry up, will CDC’s vanish? Can they be further empowered?
Headline
World Economic Forum Davos 2012 Photos
Joint Chiefs of Staff
(U//FOUO) Joint Publication 3-15.1 Counter-Improvised Explosive Device Operations
This publication provides joint doctrine for planning and executing counter-improvised explosive device (C-IED) operations. It outlines responsibilities, provides command and control considerations, discusses organizational options, details the C-IED process and attack the network methodology, and introduces models for coordinating with C-IED supporting organizations.
United States
Mitt Romney’s Tax Returns 2010-2011
Tax forms for the various holdings of Willard “Mitt” Romney and his wife Ann for the years 2010-2011 as released by the Romney campaign.
U.S. Army
U.S. Army FM 3-13 Inform and Influence Activities Draft Manual
All assets and capabilities at a commander’s disposal have the capacity to inform and influence selected audiences to varying degrees. While specific assets termed as “information-related capabilities” are information-centric in mission and purpose, others are standard capabilities that inform and influence officers use for planning to support commanders’ information strategy and mission objectives. The primary information-related capabilities that support inform and influence activities typically include, but are not limited to, public affairs, military information support operations, combat camera, Soldier and leader engagement, civil affairs, cyber electromagnetic activities, counterintelligence, operations security, military deception, and others so designated by a commander. In addition to the primary information-related capabilities, there are operational capabilities not solely designed to inform or influence that commanders can designate to assist in achieving mission objectives, such as maneuver forces, engineers, and medical units. Success depends on commanders and staffs effectively employing all available operational assets to best shape the information environment.
U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Intelligence Joint Operational Environment Briefing
U.S. Marine Corps Intelligence Activity (MCIA) “Joint Operational Environment” briefing from 2011.