Human Terrain System Afghan Saffron Report

Saffron, referred to by some as “red gold,” has been in demand for centuries. The Latin name for the plant which bears the delicate spice is Crocus sativus L. Saffron growing has been promoted in Afghanistan in recent years in response to a call from the Afghan government to investigate economically viable licit alternatives to poppy. Due to the significant labor costs inherent to saffron production, saffron is the world’s most expensive spice. Not only are saffron profits competitive with opium, in relation to other licit crops, but saffron needs little water during growth, requires minimal refinement, and has a low volume and weight, making it easily transportable.

Human Terrain System Report: Salafist and Wahhabist Influence in Afghanistan

Afghanistan is in many ways an unlikely home for radical Islamic ideologies. Afghan religious life until the 1950s was, and in many places still is, traditional, conservative, rural, and mystical. Just as Afghanistan was politically and ethnically highly fragmented, religious life has also varied tremendously depending on region, ethno-linguistic group, and degree of urbanization.

Al-Qaeda Magazine is Cupcake Recipe Book

Recently reports of an English-language “al-Qaeda magazine” were dealt with in mostly uncritical terms by the majority of news outlets. Wired’s Danger Room blog described how the new magazine was an attempt “to move politically frustrated Muslim youth in the West down the road of violent extremism” by filling that “inexplicably vacant media space between O: The Oprah Magazine, Popular Mechanics and the al-Qaida book Knights Under The Prophet’s Banner”. FOXNews quotes Brookings Institution fellow Bruce Reidel as saying that the magazine is “clearly intended for the aspiring jihadist in the U.S. or U.K. who may be the next Fort Hood murderer or Times Square bomber”. The Daily Beast quotes U.S. government officials as saying that the “U.S. government is aware of this new propaganda vehicle by al Qaeda in Yemen and Anwar Awlaki” and that “AQAP and Awlaki are clearly trying to incite terrorist activity overseas, and to recruit new extremists. The packaging of this magazine may be slick, but the contents are as vile as the authors.”

(U//FOUO) DHS Independence Day 2010 Awareness Note

(U//FOUO) The Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produces Infrastructure Protection Notes to provide information on risks impacting the critical infrastructure community including terrorist threats, natural hazards, and other events. This IP Note is a joint publication of the DHS Office of Intelligence and Analysis (I&A) Homeland Counterterrorism Division and the Office of Infrastructure Protection (IP), and is designed to
promote security awareness and to identify actions that the critical infrastructure community can take to mitigate risks to the Nation’s critical infrastructure. As an update to the 26 May 2010 IP Note: Preparing for an Evolving Terrorist Threat, this IP Note serves as a reminder for the critical infrastructure community to remain vigilant during the 4 July 2010 Independence Day holiday.

DHS National Information Exchange Model (NIEM) Overview

DHS and DOJ officials have announced a new partnership to provide leadership for enhanced development of the Global Justice XML Data Model as a base for the deployment of the National Information Exchange Model (NIEM). NIEM will provide enhanced capabilities for organizations to share data across federal, state, local and tribal lines. This paper gives an overview of the National Information Exchange Model (NIEM). It outlines the background, concepts, objectives and the development strategy for implementing NIEM.

(U//FOUO) Louisiana Fusion Center Fake Anti-Virus Malware Warning

Over the past few days, there has been an increase in computers infected with Fake spyware and anti-virus malware. These infestations produce a popup stating that your machine is infected with viruses and offer a way to remove them. The object of this software is to trick you into believing you have viruses that need to be removed. A scan will launch after you “click” anywhere on the message and will request payment for removal of the “viruses”.

U.S. Army Mechanisms of Afghan Insurgent Control and Local Governance

(U) Many students of insurgency and counterinsurgency attest to the importance of popular support to each side’s quest to achieve its objectives. Key aspects of popular support, including type (passive or active) and scope (limited or significant), are inarguably important in analyzing an insurgency. However, focusing solely or immediately on these aspects risks glossing over insurgent efforts to set conditions necessary to mobilize such support in the first place. Most notably, these conditions include the generation of compliance and the establishment and institutionalization of control.

(U//FOUO) DHS Warning on Pressure Cooker IEDs

(U//FOUO) Rudimentary improvised explosive devices (IEDs) using pressure cookers to contain the initiator, switch, and explosive charge (typically ammonium nitrate or RDX) frequently have been used in Afghanistan, India, Nepal, and Pakistan. Pressure cookers are common in these countries, and their presence probably would not seem out of place or suspicious to passersby or authorities. Because they are less common in the United States, the presence of a pressure cooker in an unusual location such as a building lobby or busy street corner should be treated as suspicious.

(U//FOUO) Stability Operations Information Center (SOIC) Kandahar Analysis

(U) Recent Civilian Casualties Have Damaged ISAF. Stories of civilian casualties in Uruzgan and Helmand in February 2010 had a clear and widespread negative impact on Kandahar residents’ attitudes toward international forces. Though the casualties occurred in other provinces, the effects felt by patrolling ISAF troops in Kandahar City included having rocks thrown at them by residents and, in a couple of cases, being spit upon. The negative feelings were not limited to Afghan civilians. Afghan National Police officials in Kandahar City repeatedly brought up the civilian casualties in the Uruzgan air strike with their American police mentors. For more on this subject, see p. 13.

Queen Elizabeth II Global Monarch Photos

See also: https://publicintelligence.net/queen-elizabeth-ii-is-queen-of-sixteen-nations/ “Queen Elizabeth is the Head of State of 16 of the UN’s 192 Member States and head of the Commonwealth of 54 countries. She last addressed the General Assembly in 1957 at the age of 31, four…

(U//FOUO) U.S. Air Force Vehicle Bomb Mitigation Guide

This guide presents reference material associated with planning and executing programs and operations for protecting Air Force personnel and assets against the threat of vehicle bombs – it is designed for use by a variety of key players, ranging from the Airman at the base gate to the Installation Commander. As with all sound force protection efforts, this guide tackles the threat class using a multi-dimensional approach incorporating threat detection and loss mitigation.

(U//FOUO) U.S. Army SWEAT/Infrastructure Reconnaissance Book

Similar to the Red Book and Sand Book, the SWEAT Book is the Soldier’s reference for Infrastructure Reconnaissance. While the Red and Sand Books focus on different regions, the SWEAT Book focuses on the subject regardless of the part of the world the Soldier may be located. The SWEAT Book is the continuation of the hard work of many organizations to include the National Training Center (the Sidewinders), countless MTOE units, the U.S. Army Engineer School, the Engineer Research and Development Center – (CERL), the U.S. Military Academy, etc. The efforts of all those involved has led to the continued progress towards solving this gap in our capabilities. Future work to be expected includes continued feedback from units supporting missions in OEF/OIF, and U.S.M.A.’s research on an infrastructure assessment methodology. The SWEAT Book will be updated accordingly.

DHS Cybersecurity Research Roadmap

Global-scale identity management concerns identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and software applications when accessing critical information technology (IT) systems from anywhere. The term global-scale is intended to emphasize the pervasive nature of identities and implies the existence of identities in federated systems that may be beyond the control of any single organization. This does not imply universal access or a single identity for all purposes, which would be inherently dangerous. In this context, global-scale identity management encompasses the establishment of identities, management of credentials, oversight and accountability, scalable revocation, establishment and enforcement of relevant policies, and resolution of potential conflicts. To whatever extent it can be automated, it must be administratively manageable and psychologically acceptable to users. It must, of course, also be embedded in trustworthy systems and be integrally related to authentication mechanisms and authorization systems, such as access controls. It also necessarily involves the trustworthy binding of identities and credentials. It is much broader than just identifying known individuals. It must scale to enormous numbers of users, computer systems, hardware platforms and components, computer programs and processes, and other entities.

(U//FOUO) DHS Attacks on Drinking Water Systems

(U//FOUO) Drinking water systems, especially treatment, distribution, and chemical storage facilities, may be targets for physical destruction, intentional contamination (possibly with chemical, biological or radiological materials), or cyber attack because the infrastructure is highly visible, less hardened, and more accessible than some other critical infrastructure. Terrorists have shown interest in biological agents that could be used for water contamination and, prior to 2003, planned surveillance of U.S. dams, reservoirs, and water supply systems to assess their potential as targets. Even a small-scale or thwarted attack could disrupt or deny service to businesses, households, and emergency responders or inspire public fear.