The TU40 User Guide describes the fixed-format inquiry (FFI) and fixed-format response (FFR) that are used in TU Release 4.0 (TU40). The intended audience for this guide consists of the programmers who are moving from an earlier format or who maintain systems that currently use TU40 to conduct electronic transactions with the TransUnion consumer database.
Corporate
Trans Union Credit Report Training Guide
Trans Union Credit Report Training Guide, July 2000.
Customs and Border Protection
Customs and Border Protection Colombian US Army Imposter Briefing
Customs and Border Protection Colombian US Army Imposter Briefing, 2010.
Department of Justice
(U//FOUO//LES) NGIC Gangs Targeting Law Enforcement for Weapons Theft
(U//LES) Gang members and criminals nationwide are targeting law enforcement officials, military, government vehicles, and residences in search of weapons, equipment, police badges, body armor, and uniforms.a These incidents suggest that some gangs are becoming more brazen, tactical, and willing to engage law enforcement and rival gang members in potentially lethal encounters. The National Gang Intelligence Center assesses that these thefts could also allow gang members and criminals to impersonate law enforcement officers to gain better access to their targets.
FEMA
FEMA Director Battle Book
The purpose of this ―battle book is to provide the FEMA Director with background information and recommended checklist actions on scenarios that may require a significant response operation under the National Response Plan. This document is intended to serve as a ―one stop reference that includes information on the agency’s emergency teams and resources.
Headline
North Korea and the “Strangest Show on Earth”
Daytime exterior shots in this series can be as old as August 2010. However, many of the photos are from the recent Arirang Mass Games in Pyongyang in October 2010. For background on the Arirang Mass Games, see the Guardian’s…
Department of Homeland Security
(U//FOUO) DHS Project 12 Report: Critical Infrastructure Public-Private Partnerships
The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”
Headline
IMF/World Bank Annual Meeting 2010 Photos
See also: The U.N. Loves Celebrities The World Bank Loves Celebrities
International Monetary Fund, World Bank
IMF/World Bank “Future of Global Financial and Monetary System” Seminar
In the context of rapidly increasing inter-dependence across national economies and shifting economic weight of different regions, the crisis has been a wake-up call for putting in place a global financial and monetary system that reduces the frequency and severity of crisis, underpinned by greater multilateralism in policymaking. Global cooperation and coordination on a wide set of issues, ranging from crisis prevention to regulatory and prudential reform and to provision of financial support, is critical for responding to the challenges presented by financial fragilities, external imbalances, weak fiscal positions and rising debt levels, and volatile capital flows.
Department of Homeland Security
(U//FOUO//LES) DHS Law Enforcement Information Sharing (LEIS) Service
Simply stated, the LEIS Service is the “pipe” used to connect state and local law enforcement with DHS law enforcement.
Afghanistan, United States
Senate Report on Private Security Contractor Oversight in Afghanistan
In 2009, the Senate Armed Services Committee initiated an inquiry into private security contractors operating in Afghanistan. In the course of the inquiry, the Committee reviewed hundreds of thousands of pages of documents from the Departments of Defense and State, the U.S. Agency for International Development, and private security contractors. Committee staff conducted more than 30 interviews of military and contractor personnel and solicited written answers from several others. This report is a product of that inquiry.
Department of Homeland Security
DHS Retail Sector Suspicious Activity Reporting Video
DHS video designed to raise the level of awareness for retail and shopping center employees by highlighting the indicators of suspicious activity, this video provides information to help employees identify and report suspicious activities and threats in a timely manner.
U.S. Army
(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology
This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.
Headline
United Kingdom and the Holy See Historical Photos
Photos via UK in Holy See.
Corporate
Confidential Facebook Law Enforcement Subpoena Guides 2007-2010
Four versions of the confidential law enforcement guide to requesting information from Facebook.
Joint Chiefs of Staff
CJCS Defense Support of Civil Authorities (DSCA) Exord
THE PURPOSE OF THIS EXORD IS TO DELEGATE LIMITED APPROVAL AUTHORITY TO SUPPORTED COMBATANT COMMANDERS, WHO HAVE DSCA RESPONSIBILITIES, FOR ROUTINE PA REQUESTS FOR ASSISTANCE (RFA), INCLUDING THE TYPES OF RFA HISTORICALLY SUBMITTED BY PA, TO PROVIDE A RAPID AND FLEXIBLE DOD RESPONSE TO FEDERAL PRIMARY AGENCIES FOR POTENTIAL OR ACTUAL EMERGENCIES AND OR DISASTERS WITHIN THE UNITED STATES, ITS TERRITORIES, POSSESSIONS, AND PROTECTORATES.
Department of Defense
DoD Defense Support to Civil Authorities Handbook
The most legally sensitive function in DSCA is Military Law Enforcement. Consequently, to prevent violations of the law, all military personnel should be educated on MLE. The main legal obstacle to the use of the military for law enforcement is the Posse Comitatus Act (PCA), discussed briefly in Section 2.3.1 of this chapter. (For more detail on PCA, see Annex A.) The PCA affects National Guard (either in State Active Duty (SAD) or Title 32) and federal forces (Title 10) differently. Thus, it is very important to understand the status of military personnel prior to mission assignment.
U.S. Marine Corps
(U//FOUO) Insurgent Tactics in Southern Afghanistan 2005-2008
This short book provides an up-to-date introduction to the tactics employed by insurgents in southern Afghanistan during the years 2005-2008. It includes vignettes and maps on 19 different tactically significant engagements. The book covers three types of attacks: ambushes, attacks on fixed positions, and defensive engagements. The intended audience is Marines and soldiers going into theatre.
Documents
Adam Gadahn September 2010 “Pakistan Floods” Video
This video was released in late September 2010 by As-Sahab Media and features U.S.-born Adam Gadahn speaking about Pakistani flood relief. At approximately four minutes into the video, Gadahn references the leak of Afghan war documents by WikiLeaks.
California
California State Terrorism Threat Assessment System (STTAS) Concept of Operations
This Concept of Operations (CONOPS) provides California law enforcement and other agencies ensuring the security of our state, a primer on the State Terrorism Threat Assessment System (STTAS). This includes an overview of the California Joint Regional Information Exchange System (CAL JRIES), the state’s principal, real-time information sharing communication platform. Homeland security stakeholders will substantively influence the ongoing evolution of this CONOPS as enhancement cycles inevitably refine California’s response to terrorist and other homeland security threats.
Headline
More Mexican Drug War Photos
A photo from Guatemala have also been included, as this has recently become an operating center for Mexican drug cartels. See also: Mexico Drug Cartel Carnage Photos
Documents
Osama Bin Laden October 2010 “Pakistan Floods” Videos
Two videos released by As-Sahab in the beginning of October 2010 with an individual claiming to be Osama bin Laden discussing Pakistani aid relief and climate change.
Israel
Reut Institute Report on Gaza Flotilla and Israel’s “Political Firewall”
This case-study deals with a strategic political strike against the State of Israel that was planned without interruption since February 2009 and materialized on May 31, 2010. Known as the Gaza Flotilla, this effort exceeded the expectations of its organizers in causing tangible and significant damage to Israel. Planning of the Gaza Flotilla was carried out over the internet and in public conferences by non-governmental organizations (NGOs) primarily operating from major cities of countries friendly to Israel, including London, Dublin or San Francisco. In the broader context, the Gaza Flotilla was just the tip of the iceberg. It is one incident out of many in a campaign entitled ‘Lifeline to Gaza’ designed to break the ‘siege’ of Gaza. The campaign itself is one of several being waged against Israel. Others include the Boycott, Divestment, Sanctions (BDS) Movement, the ‘lawfare’ strategy, and the Durban conferences.
Federal Bureau of Investigation
(U//FOUO) FBI Civil Aviation Security Program Brief
FOUO FBI Civil Aviation Security Program Brief, April 15, 2010.
Corporate, Department of Defense
DoD Biometrics HIIDE Device User Guide
The HIIDE includes two separate cameras for imaging an individual’s irises and face, and a sensor pad for scanning fingerprints. These three sensors capture the minute details of a subject’s iris, fingerprint and face, as digital photographs, or “scans.” The HIIDE™ translates the photographic data into a binary code and links that code to biographic data about the individual, such as name and a personal identification number. The HIIDE then processes the code and biographic data and builds a portfolio for the individual that is stored in a database. Once an individual has had a record created, or has been “enrolled,” that individual is part of the HIIDE database. One can “recognize,” or confirm that individual’s identity in the future by comparing a live scan of the subjects: iris, fingerprints and/or face to the biometrics contained in the database.