This video was released in late September 2010 by As-Sahab Media and features U.S.-born Adam Gadahn speaking about Pakistani flood relief. At approximately four minutes into the video, Gadahn references the leak of Afghan war documents by WikiLeaks.
South Korean police unveiled a special security unit Monday to safeguard world leaders at November’s G20 summit, citing the threat of terrorism, North Korean disruption and massive street protests. Police have been on high alert as the country prepares to host US President Barack Obama and other Group of 20 leaders at the November 11-12 gathering in southern Seoul. National Police Agency chief Jo Hyun-Oh, at a ceremony to launch the unit, said there are reports of possible North Korean attempts to disrupt the event, and of plans for “massive protests” by local and foreign activists.
A senior German official played down warnings of a potential terrorist attack in Europe, as Pakistani intelligence officials told reporters a U.S. missile strike in northwest Pakistan reportedly killed several suspected German militants. U.S. and German officials said they couldn’t confirm reports of the deaths. Earlier on Monday, German Interior Minister Thomas de Maizière said that despite a U.S. travel alert issued this weekend, German police and intelligence services have no “concrete evidence” that a terror attack is imminent.
This Concept of Operations (CONOPS) provides California law enforcement and other agencies ensuring the security of our state, a primer on the State Terrorism Threat Assessment System (STTAS). This includes an overview of the California Joint Regional Information Exchange System (CAL JRIES), the state’s principal, real-time information sharing communication platform. Homeland security stakeholders will substantively influence the ongoing evolution of this CONOPS as enhancement cycles inevitably refine California’s response to terrorist and other homeland security threats.
A photo from Guatemala have also been included, as this has recently become an operating center for Mexican drug cartels.
Mexico Drug Cartel Carnage Photos
It was an odd call for compassion from a terrorist who has proudly claimed responsibility for mass murder and who Western intelligence agencies say is still active in plotting terrorist attacks. But two new audio recordings from Osama bin Laden released on Friday and Saturday, urging help for victims of floods he said were produced by climate change, were only the latest of his wide-ranging, idiosyncratic commentaries on current events. “We are in need of a big change in the method of relief work because the number of victims is great due to climate changes in modern times,” Mr. bin Laden said, in the first of the messages posted to jihadist Web sites. He recalled his own experience with farming in Sudan, called for creating a “unique relief agency,” and described watching a father in Pakistan holding his two young children above chest-high flood water, according to a translation by the private SITE Intelligence Group in Washington.
Two videos released by As-Sahab in the beginning of October 2010 with an individual claiming to be Osama bin Laden discussing Pakistani aid relief and climate change.
This case-study deals with a strategic political strike against the State of Israel that was planned without interruption since February 2009 and materialized on May 31, 2010. Known as the Gaza Flotilla, this effort exceeded the expectations of its organizers in causing tangible and significant damage to Israel. Planning of the Gaza Flotilla was carried out over the internet and in public conferences by non-governmental organizations (NGOs) primarily operating from major cities of countries friendly to Israel, including London, Dublin or San Francisco. In the broader context, the Gaza Flotilla was just the tip of the iceberg. It is one incident out of many in a campaign entitled ‘Lifeline to Gaza’ designed to break the ‘siege’ of Gaza. The campaign itself is one of several being waged against Israel. Others include the Boycott, Divestment, Sanctions (BDS) Movement, the ‘lawfare’ strategy, and the Durban conferences.
“Doing nothing about climate change is still a fairly common affliction, even in this day and age. What to do with those people, who are together threatening everybody’s existence on this planet? Clearly we don’t really think they should be blown up, that’s just a joke for the mini-movie, but maybe a little amputating would be a good place to start?” jokes 10:10 founder and Age of Stupid film maker Franny Armstrong.
The Stuxnet worm attacking computers in Iran includes a reference to the Book of Esther, the Old Testament story in which the Jews pre-empt a Persian plot to destroy them, and is a possible clue of Israeli involvement, The New York Times reported on Thursday. A file inside the Stuxnet code is named “Myrtus,” an allusion to the Hebrew word for Esther, and is a possible Israeli calling card or, perhaps, a “red herring” designed to throw investigators off the track, the Times said. According to security software experts and analysts, Stuxnet may have been designed to target Iran’s nuclear facilities and suspicions have fallen on Israel and the United States.
FOUO FBI Civil Aviation Security Program Brief, April 15, 2010.
The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.
This document presents the results of the Functional Needs Analysis/Functional Solutions Analysis (FNA/FSA) for the functional area of chemical, biological, radiological, and nuclear defense (CBRND). The FNA/FSA are structured in accordance with the Chairman of the Joint Chief of Staff Instruction (CJCSI) 3170.01D, Joint Capabilities Integration and Development System (JCIDS), and its companion manual, CJCSM 3170.01A, Operation of the Joint Capabilities Integration and Development System.
Financial markets tumbled as protests erupted across Europe at the human cost of painful cuts as new EU rules to prevent national governments bowing to pressure over unpopular cuts were tabled in Brussels. The European Commission, concerned that some eurozone governments are wavering in the face of mass protests yesterday (WEDS) moved to introduce huge fines if national governments failed bring their public spending within levels set by the EU. Spain was gripped by a general strike, in Greece doctors and rail workers walked out and the Irish parliament was blocked with a cement truck to protest at the high cost of bank bailouts at a time of deep cuts to public spending. Brussels was paralysed by 100,000 trade union demonstrators from 24 countries, including Britain. As protests mounted, the European Commission proposed new measures threatening euro zone countries, such as Spain and Ireland, with multi-billion fines if they did not hold firm on budget cuts aimed to stop a Greek-style debt crisis tearing the European single currency apart.
The National Cybersecurity and Communications Integration Center (NCCIC) and US-CERT are aware of malicious e-mails received on September 9, 2010, by public and private sector stakeholders. Organizations should warn users to avoid opening suspicious e-mails and monitor activity to the following URL:
(U//LES) Gang infiltration of law enforcement, government, and correctional agencies poses a serious security threat due to the access they have to restricted areas vulnerable to sabotage, sensitive information pertaining to investigations, and access to personal information or protected persons, whom they may view as potential targets for violence. Gang members serving in law enforcement agencies and correctional facilities compromise security, criminal investigations and operations, and agency integrity. Compromised law enforcement officers and correctional staff assist gang members in committing their illicit activities, disrupt legitimate law enforcement efforts to investigate such activities, thereby protecting members from discovery and apprehension. Gang members, gang associates, and their family members most commonly infiltrate law enforcement through non-sworn civilian positions. Police dispatchers and records clerks have access to confidential information than officers do and are not always subjected to in-depth background checks prior to employment. However, a number of gang members and former gang members have served as sworn law enforcement and correctional officers.
Based on the areas in Mexico controlled by the Gulf, Zetas, and Sinaloa cartels; the locations of U.S.-sourced firearm recoveries in Mexico; and the U.S. locations where firearms recovered in Mexico are most often acquired, the Houston and Phoenix Field Divisions will be primarily responsible for investigating trafficking schemes associated with these cartels. However, this strategy is not intended to limit the initiative of any ATF field division and in fact recognizes the increasingly important role played by non-Southwest border field divisions in combating firearms and explosives trafficking to Mexico. As a result, all ATF field divisions are expected to initiate investigations on cartels and/or their surrogates operating in their geographic areas of responsibility; however, investigations pertaining to the Gulf, Zetas, and Sinaloa cartels must be deconflicted and closely coordinated with the Houston and Phoenix Field Divisions.
The U.S. government has launched a full-scale simulated cyberattack to gauge how the country might fare in the real thing. Sponsored by the Department of Homeland Security, Cyber Storm III kicked off yesterday for a three-day series of simulated events designed to exploit holes in the nation’s cybersecurity system. Specifically, the exercise will “inject” more than 1,500 different types of threats to examine the ability of the people involved to prepare for cyberattacks, make the correct decisions to respond to them, and share sensitive information with the right parties.
Global governance—the collective management of common problems at the international level—is at a critical juncture. Although global governance institutions have racked up many successes since their development after the Second World War, the growing number of issues on the international agenda, and their complexity, is outpacing the ability of international organizations and national governments to cope.
US Financial Crimes Enforcement Network to Track International Electronic Funds Transfers Over $1,000
The Financial Crimes Enforcement Network (FinCEN) today announced that it has submitted for publication in the Federal Register a notice of proposed rulemaking (NPRM) that would require certain depository institutions and money services businesses (MSBs) to affirmatively provide records to FinCEN of certain cross-border electronic transmittals of funds (CBETF). Current regulations already require that these financial institutions maintain and make available, but not affirmatively report, essentially the same CBETF information. FinCEN issued this proposal to meet the requirements of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). Section 6302 of IRTPA directed the Secretary of the Treasury to study the feasibility of “requiring such financial institutions as the Secretary determines to be appropriate to report to the Financial Crimes Enforcement Network certain cross-border electronic transmittals of funds, if the Secretary determines that reporting of such transmittals is reasonably necessary to conduct the efforts of the Secretary against money laundering and terrorist financing.”
US Financial Crimes Enforcement Network Cross-Border Electronic Transmittals of Funds Reporting System Proposals
FinCEN, a bureau of the Department of the Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and as required by 31 U.S.C. § 5318(n), is proposing to issue regulations that would require certain banks and money transmitters to report to FinCEN transmittal orders associated with certain cross-border electronic transmittals of funds (CBETFs). FinCEN is also proposing to require an annual filing with FinCEN by all banks of a list of taxpayer identification numbers of accountholders who transmitted or received a CBETF.
The South East Minnesota Narcotics and Gang Task Force is requesting information on Outlaw Motorcycle Gang (OMG) activity that may have an impact on this year’s Fall Flood Run. The Flood Run (www.floodrun.org) is a charitable motorcycle run that takes place both in the spring and fall along the St. Croix River and attracts thousands of riders, the majority of which are law-abiding. However, information has been received that this year’s Flood Run on September 18, 2010, is expected to attract an increased number of Hells Angels and Outlaws gang members, which are rival clubs. Both clubs are known to be involved in criminal activities such as assault, narcotics, money laundering, prostitution and thefts and both are also considered to be “at war” with each other.
Pakistan’s Prime Minister Yousuf Raza Gilani said one of his defence ministers had resigned Sunday in a controversy over remarks the minister had made about the country’s military. In comments reported by Pakistani media, Defence Production Minister Abdul Qayum Jatoi had implied Saturday that the army was responsible for the deaths of civilians and politicians including former prime minister Benazir Bhutto. Gilani said had summoned Jatoi to a meeting on Saturday evening to explain the remarks.
This roadmap will be the vehicle for prioritizing, aligning, and synchronizing Service JBMC2 architectural and acquisition efforts. Where policy and other acquisition initiatives are defined to drive JBMC2 developments and related activities, the specific means of application to JBMC2 will be via updates to this roadmap and decisions made by the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and U.S. Joint Forces Command (USJFCOM) to ensure overall harmonization across affected efforts and programs. This roadmap provides a strategy with three major parts for integrating current and planned JBMC2 capabilities.