Pakistan’s powerful intelligence services were heavily involved in preparations for the Mumbai terrorist attacks of November 2008, according to classified Indian government documents obtained by the Guardian. A 109-page report into the interrogation of key suspect David Headley, a Pakistani-American militant arrested last year and detained in the US, makes detailed claims of ISI support for the bombings. Under questioning, Headley described dozens of meetings between officers of the main Pakistani military intelligence service, the ISI, and senior militants from the Lashkar-e-Taiba (LeT) group responsible for the Mumbai attacks.
The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.
These photos were taken by Tom Wills and depict the events occurring around the “Smash EDO demonstration” in Brighton, UK on October 13, 2010.
The Obama administration has concluded that Chinese firms are helping Iran to improve its missile technology and develop nuclear weapons, and has asked China to stop such activity, a senior U.S. official said. During a visit to Beijing last month, a delegation led by Robert J. Einhorn, the State Department’s special adviser for nonproliferation and arms control, handed a “significant list” of companies and banks to their Chinese counterparts, according to the senior U.S. official, who spoke on the condition of anonymity to discuss a sensitive issue in U.S.-Chinese relations. The official said the Obama administration thinks that the companies are violating U.N. sanctions, but that China did not authorize their activities.
(U//FOUO) Texas-Mexico Border Security Carnage Update, July 2010.
The information found on the website “WIKILEAKS” is classified information that was transmitted to that public domain site illegally. Per reference (a) and the enclosures, “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.” Despite the circumstances surrounding WIKILEAKS, we must continue to protect similar or identical information commensurate with the level of classification assigned per reference (b), until the information is assessed by the appropriate Original Classification Authority (DCA).
In its role as Energy SSA, DOE has worked closely with dozens of government and industry security partners to prepare this 2007 Energy SSP. Much of that work was conducted through the Sector Coordinating Councils (SCC) for electricity and for oil and natural gas, as well as through the Energy Government Coordinating Council (GCC). The electricity SCC represents more than 95 percent of the electric industry and the oil and natural gas SCC represents more than 98 percent of its industry. The GCC, co—chaired by DHS and DOE, represents all levels of government—Federal, State, local, and tribal-that are concerned with the Energy Sector.
French oil workers expanded a strike yesterday over government plans to raise the retirement age, while European discontent over belt-tightening measures flared up in Portugal, Italy, and Greece. All of France’s oil refineries were on strike after two more plants voted to join the protest yesterday. The government deployed police to force the reopening of several fuel depots that had been blocked, raising concerns of possible gas shortages. French students clashed with police and labor leaders planned more demonstrations today and Tuesday.
The overall objective of the this task was to architect and implement a capability that will enable automated parsing, normalization, extraction, aggregation, filtering and then detection of attack patterns based on log and log like data in near real time depending on local network settings. We call this the Audit Data Extraction Utility (ADEU).
The TU40 User Guide describes the fixed-format inquiry (FFI) and fixed-format response (FFR) that are used in TU Release 4.0 (TU40). The intended audience for this guide consists of the programmers who are moving from an earlier format or who maintain systems that currently use TU40 to conduct electronic transactions with the TransUnion consumer database.
Trans Union Credit Report Training Guide, July 2000.
Customs and Border Protection Colombian US Army Imposter Briefing, 2010.
Momentum toward peace negotiations in Afghanistan appeared to grow Wednesday as a senior NATO official said the military alliance had “facilitated” contacts between senior Taliban members and the “highest levels of the Afghan government.” The official said NATO forces in Afghanistan were granting safe passage to Taliban leaders traveling to Kabul to meet with Afghan President Hamid Karzai’s government. “It would be extremely difficult for a senior Taliban member to get to Kabul without being killed or captured if ISAF were not witting, and ISAF is witting,” the official told reporters. ISAF is an acronym for the International Security Assistance Force, a coalition of troops from NATO members and other allies in Afghanistan. The official spoke in Brussels, where coalition members were being briefed on the war.
(U//LES) Gang members and criminals nationwide are targeting law enforcement officials, military, government vehicles, and residences in search of weapons, equipment, police badges, body armor, and uniforms.a These incidents suggest that some gangs are becoming more brazen, tactical, and willing to engage law enforcement and rival gang members in potentially lethal encounters. The National Gang Intelligence Center assesses that these thefts could also allow gang members and criminals to impersonate law enforcement officers to gain better access to their targets.
The purpose of this ―battle book is to provide the FEMA Director with background information and recommended checklist actions on scenarios that may require a significant response operation under the National Response Plan. This document is intended to serve as a ―one stop reference that includes information on the agency’s emergency teams and resources.
Barclays, UBS, HSBC, Royal Bank of Scotland Involved in Money Laundering for Corrupt Nigerian Politicians
Barclays, HSBC, NatWest, Royal Bank of Scotland and UBS – have been linked to money laundering scam over which some corrupt Nigerian politicians were indicted. A report entitled ‘International Thief Thief’ from Global Witness, a Non-Governmental Organisation (NGO) that exposes the corrupt exploitation of natural resources and international trade systems, drives campaigns to end impunity, resource-linked conflict, and human rights and environmental abuses, accused the banks of fueling corruption in the world’s most-populous black nation. In a 40-page report published yesterday in www.globalwitness.org, Global Witness said that the five banks had taken millions of pounds between 1999 and 2005 from two former governors accused of corruption (Diepreye Alamieyeseigha of Bayelsa State and Joshua Dariye of Plateau State), but had failed sufficiently to investigate the customers or the source of their funds. Barclays, HSBC and UBS are all members of the Wolfsberg Group, an international body set up in 2000 to try to improve global anti-money laundering procedures. The report said the banks might not have broken the law, but had helped to fuel corruption in Nigeria.
Daytime exterior shots in this series can be as old as August 2010. However, many of the photos are from the recent Arirang Mass Games in Pyongyang in October 2010. For background on the Arirang Mass Games, see the…
The following is the second issue of “Inspire” magazine reportedly produced by Al-Qaeda in the Arabian Peninsula’s media organization Al-Malahem. For proper background, you should read about how the first issue began its life as a garbled book of ASCII cupcake recipes before later being released in full. As with the previous issue, the authenticity of this document should be deeply scrutinized.
The inquest into the deaths of 52 people killed in the July 7 attacks in London continues today. The proceedings, which are being held at the capital’s Royal Courts of Justice, are expected to last up to five months. On Monday, audio recordings from London Underground’s control room in the immediate aftermath of the bombings were played. Hugo Keith QC, counsel to the inquests, said the calls showed the scale of the confusion and the reluctance to accept a terrorist attack had occurred.
In early 2008, President Bush signed National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23) formalizing the Comprehensive National Cybersecurity Initiative (CNCI). This initiative created a series of classified programs with a total budget of approximately $30 billion. Many of these programs remain secret and the their activities are largely unknown to the public. Forbes reported in April 2008 that “Bush’s cyber initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware.”
The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”
The U.N. Loves Celebrities
The World Bank Loves Celebrities
In the context of rapidly increasing inter-dependence across national economies and shifting economic weight of different regions, the crisis has been a wake-up call for putting in place a global financial and monetary system that reduces the frequency and severity of crisis, underpinned by greater multilateralism in policymaking. Global cooperation and coordination on a wide set of issues, ranging from crisis prevention to regulatory and prudential reform and to provision of financial support, is critical for responding to the challenges presented by financial fragilities, external imbalances, weak fiscal positions and rising debt levels, and volatile capital flows.
Simply stated, the LEIS Service is the “pipe” used to connect state and local law enforcement with DHS law enforcement.
Heavy US reliance on private security in Afghanistan has helped to line the pockets of the Taliban, a US Senate report says. The study by the Senate Armed Services Committee says this is because contractors often fail to vet local recruits and end up hiring warlords. The report demands “immediate and aggressive steps” to improve the vetting and oversight process. Some 26,000 private security personnel, mostly Afghans, operate in Afghanistan.