(U//LES) DHS Hotel Vulnerabilities and Terrorist Indicators Reports

Terrorists are most likely to choose vehicle bombs if their goal is to cause maximum casualties. This method has been used to attack hotels in the United States (U.S.) and around the world. Hotels that are likely to be most vulnerable are those located in downtown areas of large cities, those hosting a controversial group or special event, those where U.S. or foreign dignitaries are guests, and those with a worldwide reputation and connections to a culture that is seen by some groups as corrupt (e.g., casino hotels).

Photo of Passport for Osama bin Laden’s Wife Appears to Be Fake

A photo of Osama bin Laden’s wife’s passport that was released by Pakistani Television channel GEO TV appears to be fake in numerous respects. The finger pointing up to supposedly hold open the passport is surrounded by a number of angular white areas indicating that is was poorly cropped and taken from another photograph. The tip of the finger concludes in a notable point because of this poor cropping. Also, the photo of the women that is supposed to be bin Laden’s wife is noticeably an overlay from a separate photograph as it falls outside the margins of the space where the passport photo should be and is surrounded by a white “halo” that is visible over the colored background of the passport.

(U//FOUO) Washington D.C. Fusion Center White Powder Letters Warning

A series of “white powder letters” have been received this afternoon at several District of Columbia schools. First responders are responding to the locations and taking appropriate action. Three of the locations have already been cleared. The letters are identical to white powder letters received by District schools in October 2010 and are believed to contain a harmless white power.

Al-Qaeda Statement on Death of Osama bin Laden

Al-Qaeda statement calls the day ” a historic day of the days of the great Islamic umma (nation) and in a noble stand of one of its great men and heroes across its blessed age and on the path taken by the will of all the mighty predecessors and those who will follow them, the Sheikh, the Mujahid & the Commander, the pious migrant fighter, Abu Abdullah Osama bin Muhammad bin Laden, may God have mercy on him was killed in a place where truth shines and where sincerity for good deeds and the call for truthfulness exist. Bin Laden was killed so he can follow the mighty caravan of the umma (the nation) with the great leaders, the loyal soldiers, and the honest knights who refused to abandon their faith for the mundane lives and to hand over the command to those who will be humiliate them and be humiliated and that’s why they confronted the weaponry with weaponry, force with force and accepted to challenge the arrogant masses that came out to fight with their killing machines, equipments, aircrafts and forces boastfully so they can be seen as men, and still this didn’t weaken their resolve and didn’t drain their strength, but instead he stood up for them face to face, a mighty mountain, a proud mountain and he was still in the midst of the battle that many got used to and his eyes were used to its sceneries but after that, he was yet to be excused and delivered his message and then he was shot bullets of betrayal and blasphemy delivering his soul to its maker while repeating: ‘Who sacrifice the blessed soul for his Lord to fight off the falsehood CANNOT ever be blamed’.”

(U//LES) New Mexico Investigative Support Center Dual SIM Cell Phone Warning

A recent narcotics investigation led to the arrest of two subjects after they were found to be in possession of sixty (60) pounds of marijuana. During the investigation Agents observed the male subject repeatedly holding a wristwatch to his ear and later found the item to be a cellular phone. A Cellebrite extraction was conducted on this phone which was found to have two SIM cards. Dual SIM cards enable the user to combine different numbers, plans or network carriers. This particular cell phone had one SIM card from A T & T, and the other one from Telcel, New Mexico’s largest mobile phone carrier. An internet search revealed you can purchase these wristwatch cell phones starting at $50.00. There were no markings to identify the brand or carrier of this phone. Law Enforcement is advised to be on the look out for these communication devices when you are in contact with subjects of criminal investigations.

(U//LES) DHS Hydroelectric Dam Vulnerabilities and Terrorist Indicators Reports

Hydropower, including pumped storage, constitutes about 14% of the electrical generating capacity of the United States (U.S.). Hydropower is the primary source of renewable energy in the U.S. Total U.S. hydroelectric capacity is 103.8 gigawatts (GW), including pumped storage projects. The federal government owns 38.2 GW at 165 sites (excluding pumped storage). Another 40 GW of non-federal, licensed conventional hydroelectric capacity (excluding pumped storage) exists at 2,162 sites in the U.S. (National Hydropower Association). The distribution of hydropower generating capacity by ownership is illustrated in Figure 1. The 10 largest hydroelectric facilities in the country are listed in Table 1 (U.S. Society on Dams).

(U//LES) DHS Underwater Cable Landing Station Vulnerabilities and Terrorist Indicators Reports

Underwater cables carry telecommunications traffic (voice and data) under bodies of water (e.g., lakes and seas). These cables carry about 95% of all intercontinental telecommunications traffic. International banking and finance transactions are highly dependent on underwater (also known as submarine) communications cables. Some military communications traffic is carried via underwater cables. Most underwater communications cables in service are fiber-optic cables. New systems are almost always equipped with fiber-optic cables (rather than older technology coaxial cables). Underwater cable systems have expanded in recent years due to increased demand, changes in technology, and reduction in costs. This paper focuses on the gateway point to underwater cable systems, the cable landing station, including the fiber run from the station to shore where the fiber enters the water. Additional detail on the underwater portion of fiber cabling can be found in Characteristics and Common Vulnerabilities, Infrastructure Category: Underwater Cables (Draft, December 15, 2003).

Osama bin Laden Death Revelry Photos

thisisbossi – http://www.flickr.com/photos/thisisbossi/ Kelly Gardiner – http://www.flickr.com/photos/ennuiislife/ theqspeaks – http://www.flickr.com/photos/theqspeaks/ Josh Pesavento – http://www.flickr.com/photos/pezz/ Ricky Justus – http://www.flickr.com/photos/rickyjustus/ Liz Elkind – http://www.flickr.com/photos/lemon5/ markn3tel – http://www.flickr.com/photos/n3tel/ This Secret Lullaby – http://www.flickr.com/photos/burn_down_love/

(U//FOUO) DHS Possible Implications of the Death of Osama bin Laden

The Intelligence Community (IC) assesses the death of al-Qa‘ida leader Usama Bin Ladin could result in retaliatory attacks in the Homeland and against US and Western interests overseas. Attacks might originate with al-Qa‘ida Core elements in the tribal areas of Pakistan, with one of their affiliates overseas, and/or with individuals in the homeland sympathetic to the cause but lacking a formal group association. We have no indications of advanced al-Qa‘ida Core plotting efforts in the Homeland, but the case of now-detained al-Qa‘ida operative Najibullah Zazi—who, along with two associates, planned to attack the New York City subway in 2009 using homemade explosives—demonstrates that unidentified operatives could advance plotting in the homeland.

Guantanamo Detainee Matrix of Threat Indicators for Enemy Combatants

JTF-GTMO primarily uses three types of indicators to assess a detainee: 1) the detainee himself provides acknowledgement of a fact; 2) another detainee, document, government, etc. provides an identification of the detainee; and 3) analysis of the detainee’s timeline, activities, and associates in context with other known events and individuals. A fourth method may be available for a few select detainees in their SCI addendum, where special intelligence provides more specific information about a detainee.

(U//LES) DHS Milk Processing Facility Vulnerabilities and Terrorist Indicators Reports

Successful contamination of fluid milk can have serious public health consequences, since the product moves through the distribution and consumption stages very quickly. The shelf life of fluid milk is short compared to the shelf life of other food products; fluid milk is bought and used by consumers in short time periods. This leads to the potential for a rapid spread of any contaminated product. Fluid milk is consumed by all segments of the population from infants to the elderly. Health impacts from contamination could reach a wide range of people, including those with limited ability to recover from an induced illness. Some milk products such as cheese and ice cream have longer shelf lives and more limited consumption patterns than does fluid milk. Health impacts from the contamination of these products would be confined to a smaller group. Moreover, the longer times between production and consumption allow for response actions (e.g., product recall) to be implemented more effectively.

Alabama, Virginia Tornado Destruction Photos

Virginia Department of Transportation – http://www.flickr.com/photos/vadot/ Virginia Department of Emergency Management – http://www.flickr.com/photos/vaemergency/ DigitalGlobe – http://www.flickr.com/photos/digitalglobe-imagery/ Tim and Renda – http://www.flickr.com/photos/timandrenda/ MGShelton – http://www.flickr.com/photos/melindashelton/ LakeMartinVoice – http://www.flickr.com/photos/lakemartinvoice/ GAiN USA – http://www.flickr.com/photos/gainusa/

(U//LES) DHS Electric Power Substations Terrorist Indicators Report

To consider terrorist threat indicators in relationship to electric power substations, it is useful to understand the basic structure of the industry and what general types of facilities might be attractive targets for terrorist attack. Electric power substations are attractive terrorist targets because the loss of electric power has both direct and indirect impacts. Direct impacts include, for example, interruption of home and commercial building heating or cooling, damage to electronic data and equipment, the inability to operate life-support systems in hospitals and homes, and damage to the electric grid. Without electric power, other critical infrastructures, such as transportation, water supply systems, telecommunications, and banking and finance, cannot function. Indirect impacts may also include fatalities, injuries, and expenses related to failures in these interdependent infrastructures.

(U//LES) DHS Liquefied Natural Gas Terminal Vulnerabilities and Terrorist Indicators Reports

LNG is typically created in a three-step process. First, gaseous-form natural gas, extracted from the ground in neighboring oil reservoirs, is “frozen” into a liquid state through a complex cryogenic process (called liquefaction). The LNG boiling point is -260°F. In a liquid state, the volume of the gas is greatly reduced; it would take 600 ships carrying natural gas to equal the cargo contained on just one LNG tanker. Thus, it is practical and economical to import natural gas from overseas. The density of LNG is 26.5 pounds per cubic foot, or less than half that of water. LNG is odorless, colorless, non-corrosive, and nontoxic.

Cecil Rhodes “Confession of Faith”

It often strikes a man to inquire what is the chief good in life; to one the thought comes that it is a happy marriage, to another great wealth, and as each seizes on his idea, for that he more or less works for the rest of his existence. To myself thinking over the same question the wish came to render myself useful to my country. I then asked myself how could I and after reviewing the various methods I have felt that at the present day we are actually limiting our children and perhaps bringing into the world half the human beings we might owing to the lack of country for them to inhabit that if we had retained America there would at this moment be millions more of English living. I contend that we are the finest race in the world and that the more of the world we inhabit the better it is for the human race. Just fancy those parts that are at present inhabited by the most despicable specimens of human beings what an alteration there would be if they were brought under Anglo-Saxon influence, look again at the extra employment a new country added to our dominions gives. I contend that every acre added to our territory means in the future birth to some more of the English race who otherwise would not be brought into existence. Added to this the absorption of the greater portion of the world under our rule simply means the end of all wars, at this moment had we not lost America I believe we could have stopped the Russian-Turkish war by merely refusing money and supplies. Having these ideas what scheme could we think of to forward this object. I look into history and I read the story of the Jesuits I see what they were able to do in a bad cause and I might say under bad leaders.

(U//LES) DHS Agricultural Storage Facility Vulnerabilities and Terrorist Indicators Reports

Traditionally, food in America is produced through a series of processes commonly referred to as the “farm to table” continuum. This process is comprised of multiple components, including production, distribution, processing, transportation, wholesaling, exporting/importing, retail sales, and consumption. Each component of the “farm to table” continuum is achieved in a variety of ways specific to the particular end product being produced. At multiple stages of these processes, raw agricultural products, farm input supplies, and consumer-ready foods are stored in large facilities. These agricultural storage facilities include facilities storing raw agricultural products (wheat, corn, apples, etc.) prior to processing; farm input supplies (fertilizers, chemicals, etc.), live animals (cattle, swine, chickens, etc.), or processed products ready for distribution and consumption (cheese, cereals, packaged products, etc.). In this regard, there is not a “typical” agricultural storage facility. Rather, a variety of facilities specific to the storage requirements of a given product or component serve the “farm to table” continuum.

(U//LES) DHS Wastewater Treatment Facility Vulnerabilities and Terrorist Indicators Reports

Wastewater is water that has been used. It includes substances such as human waste, food scraps, oils, soaps, and chemicals. Wastewater is derived from residential, commercial, and industrial activities. In homes, wastewater is produced from sinks, showers, bathtubs, toilets, washing machines, and dishwashers. Commercial and industrial activities also produce wastewater that must be treated prior to release to the environment. In addition to home and business production, wastewater can also be generated by storm runoff (referred to as inflow) and interception of ground water (infiltration). Because of potentially harmful substances that wash off roads, parking lots, and rooftops, this water must also be treated.

(U//LES) DHS Railroad Bridges Vulnerabilities and Terrorist Indicators Reports

The national economy is based on timely rail deliveries, especially in light of industry’s current practice of just-in-time stocking arrangements. Railroad bridges can be critical chokepoints for high-volume rail lines moving freight from geographic areas of supply to other areas of demand. Furthermore, critical rail bridges are vital assets of the Strategic Rail Corridor Network (STRACNET), a 38,800-mile interconnected network of rail corridors. The STRACNET supports the deployment of military forces across the U.S. to strategically located ports of embarkation.

DHS Critical Infrastructure Vulnerability and Terrorist Activity Indicator Reports

Over the next two weeks, Public Intelligence will be publishing several dozen reports from the Department of Homeland Security’s Protective Security Division concerning vulnerabilities and the detection of terrorist activity at critical infrastructure locations. This information was inadvertently disseminated by a non-profit organization that is concerned with domestic preparedness. Due to flaws in their website’s construction, a members area for sharing documentation was openly accessible to anyone and had been largely indexed in Google’s search results. The documents range in date from 2003-2004 and provide early background on critical infrastructure security activities, including known vulnerabilities that often have not been fixed and tenuous listings of so-called “suspicious activity” indicators. The documents also provide background on a number of “critical infrastructure” categories about which there has previously been a lack of publicly-available information. Some of these categories include railroad yards, wastewater treatment facilities, undersea cable landings and milk processing plants. For easier browsing, reports will be added to the list below as they are published.

(U//LES) DHS Banking Repositories Vulnerabilities and Terrorist Indicators Reports

One of the key roles of the government is to maintain the stability of the nation’s financial system and to address and contain systematic risk that may arise in the financial markets. The financial repositories play an important role in market stability. Several agencies of the government (U.S. Treasury, U.S. Mint, Federal Reserve Board, U.S. Secret Service, FBI) are involved in the supply, distribution, storage, and security of U.S. currency, coins, and other market transactions and clearing transactions.