FOUO Department of Veterans Affairs Monthly Data Breach Report April 2010.
DHS and DOJ officials have announced a new partnership to provide leadership for enhanced development of the Global Justice XML Data Model as a base for the deployment of the National Information Exchange Model (NIEM). NIEM will provide enhanced capabilities for organizations to share data across federal, state, local and tribal lines. This paper gives an overview of the National Information Exchange Model (NIEM). It outlines the background, concepts, objectives and the development strategy for implementing NIEM.
Over the past few days, there has been an increase in computers infected with Fake spyware and anti-virus malware. These infestations produce a popup stating that your machine is infected with viruses and offer a way to remove them. The object of this software is to trick you into believing you have viruses that need to be removed. A scan will launch after you “click” anywhere on the message and will request payment for removal of the “viruses”.
(U) Many students of insurgency and counterinsurgency attest to the importance of popular support to each side’s quest to achieve its objectives. Key aspects of popular support, including type (passive or active) and scope (limited or significant), are inarguably important in analyzing an insurgency. However, focusing solely or immediately on these aspects risks glossing over insurgent efforts to set conditions necessary to mobilize such support in the first place. Most notably, these conditions include the generation of compliance and the establishment and institutionalization of control.
(U//FOUO) Rudimentary improvised explosive devices (IEDs) using pressure cookers to contain the initiator, switch, and explosive charge (typically ammonium nitrate or RDX) frequently have been used in Afghanistan, India, Nepal, and Pakistan. Pressure cookers are common in these countries, and their presence probably would not seem out of place or suspicious to passersby or authorities. Because they are less common in the United States, the presence of a pressure cooker in an unusual location such as a building lobby or busy street corner should be treated as suspicious.
Photos taken from Flickr.
Alameda County Johannes Mesherle Manslaughter Verdict, July 8, 2010.
(U) Recent Civilian Casualties Have Damaged ISAF. Stories of civilian casualties in Uruzgan and Helmand in February 2010 had a clear and widespread negative impact on Kandahar residents’ attitudes toward international forces. Though the casualties occurred in other provinces, the effects felt by patrolling ISAF troops in Kandahar City included having rocks thrown at them by residents and, in a couple of cases, being spit upon. The negative feelings were not limited to Afghan civilians. Afghan National Police officials in Kandahar City repeatedly brought up the civilian casualties in the Uruzgan air strike with their American police mentors. For more on this subject, see p. 13.
(U//FOUO) Murghab District is a significant poppy cultivation and opiate trafficking region, largely due to its poor, agriculture-based economy and the presence of Taliban forces encouraging cultivation.
ISAF Joint Command District Assessments, April 10, 2008.
See also: https://publicintelligence.net/queen-elizabeth-ii-is-queen-of-sixteen-nations/ “Queen Elizabeth is the Head of State of 16 of the UN’s 192 Member States and head of the Commonwealth of 54 countries. She last addressed the General Assembly in 1957 at the age of 31, four…
Islamic Republic of Afghanistan National Police Strategy, January 2010.
This guide presents reference material associated with planning and executing programs and operations for protecting Air Force personnel and assets against the threat of vehicle bombs – it is designed for use by a variety of key players, ranging from the Airman at the base gate to the Installation Commander. As with all sound force protection efforts, this guide tackles the threat class using a multi-dimensional approach incorporating threat detection and loss mitigation.
Similar to the Red Book and Sand Book, the SWEAT Book is the Soldier’s reference for Infrastructure Reconnaissance. While the Red and Sand Books focus on different regions, the SWEAT Book focuses on the subject regardless of the part of the world the Soldier may be located. The SWEAT Book is the continuation of the hard work of many organizations to include the National Training Center (the Sidewinders), countless MTOE units, the U.S. Army Engineer School, the Engineer Research and Development Center – (CERL), the U.S. Military Academy, etc. The efforts of all those involved has led to the continued progress towards solving this gap in our capabilities. Future work to be expected includes continued feedback from units supporting missions in OEF/OIF, and U.S.M.A.’s research on an infrastructure assessment methodology. The SWEAT Book will be updated accordingly.
(U//FOUO) This bulletin provides information on a growing trend involving the use of an herb-based product similar to marijuana known as “Spice”, or “K2”. The product is being used to get high and it is legal to purchase.
Washington National Guard Olympic Coordination Center Brief, March 2010.
Global-scale identity management concerns identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and software applications when accessing critical information technology (IT) systems from anywhere. The term global-scale is intended to emphasize the pervasive nature of identities and implies the existence of identities in federated systems that may be beyond the control of any single organization. This does not imply universal access or a single identity for all purposes, which would be inherently dangerous. In this context, global-scale identity management encompasses the establishment of identities, management of credentials, oversight and accountability, scalable revocation, establishment and enforcement of relevant policies, and resolution of potential conflicts. To whatever extent it can be automated, it must be administratively manageable and psychologically acceptable to users. It must, of course, also be embedded in trustworthy systems and be integrally related to authentication mechanisms and authorization systems, such as access controls. It also necessarily involves the trustworthy binding of identities and credentials. It is much broader than just identifying known individuals. It must scale to enormous numbers of users, computer systems, hardware platforms and components, computer programs and processes, and other entities.
(U//FOUO) Drinking water systems, especially treatment, distribution, and chemical storage facilities, may be targets for physical destruction, intentional contamination (possibly with chemical, biological or radiological materials), or cyber attack because the infrastructure is highly visible, less hardened, and more accessible than some other critical infrastructure. Terrorists have shown interest in biological agents that could be used for water contamination and, prior to 2003, planned surveillance of U.S. dams, reservoirs, and water supply systems to assess their potential as targets. Even a small-scale or thwarted attack could disrupt or deny service to businesses, households, and emergency responders or inspire public fear.
Afghanistan National Development Strategy Reconstruction Framework, August – December 2009.
The majority of the 20 Afghan provinces that were poppy-free in 2009 will remain so this year. Yet, three provinces (Baghlan, Faryab and Sari Pul, all in the north) risk showing the beginning of a trend reversal, with a minimal increase in cultivation in the districts with higher insecurity. Five other provinces (Kunar, Nangarhar, Kabul, Laghman and Badakhshan), not poppy-free so far, are also expected to have negligible amounts of poppies.
Final and Draft Versions of G8 Muskoka Declaration from May 26 – June 26, 2010.
A recent “Privacy Impact Assessment” from the Department of Homeland Security lists Public Intelligence among the websites actively monitored by the DHS National Operations Center (NOC) for “situational awareness”.
Verizon Law Enforcement Legal Compliance Guide, August 3, 2006.
This handbook has been created to assist law enforcement agencies in their understanding of processes and procedures implemented by Sprint for the compliance of legal demands. The handbook will include contact information, billing information, service of legal demands on Sprint, types of legal demands required and miscellaneous general information for your future reference.