Tag Archive for Department of Homeland Security

(U//FOUO) DHS Warning: Terrorists Making Explosives With Commercial Products

Recent plots and attacks in the Homeland and overseas demonstrate a continuing terrorist focus on acquiring commercially available materials and components that can be used in constructing improvised explosive devices (IEDs). Heightened public and state and local official awareness, as well as tightened legal controls, have made it more difficult to purchase certain products that contain explosive precursors in bulk quantities or concentrated forms. Operatives are now more likely to use surreptitious, though legal, methods—such as multiple purchases in smaller quantities—to acquire sufficient amounts to create explosives.

Urban Area Security Initiative Effectiveness Report August 2011

Created in 2003 in the wake of the September 11, 2001 terrorist attacks against the United States by al-Qaeda, the Urban Area Security Initiative (UASI) is the only federal homeland security grant program that requires regional governance, strategic planning and investing involving all disciplines – law enforcement, fire service, public health and medical, public works, critical infrastructure owners and operators, and emergency management – in order to acquire the necessary plans, equipment, training and exercises to prevent, protect against, respond to and recover from threats and acts of terrorism and other major hazards. From FY 2003 to FY 2011, approximately $6.5 billion has been appropriated for this program.

(U//FOUO) DHS Terrorist Backpressure Contamination of Water Systems

Backpressure, the reverse flow of contaminated water into a potable water distribution system, has the potential to affect the public health of a community by using residential, commercial, or industrial connections in water distribution systems as a pathway for contamination. A water contamination incident using an effective contaminant and delivery method would cause immediate public health effects, require costly cleanup, and cause lasting economic and psychological impact. The amount of toxicity depends on many factors, including the type of contaminant, dilution and solubility of the contaminant, and the proximity of the consumer to the point of entry.

(U//FOUO) DHS Bulletin: Anonymous Hacktivist Threat to Industrial Control Systems (ICS)

The loosely organized hacking collective known as Anonymous has recently expressed an interest in targeting industrial control systems (ICS). This product characterizes Anonymous’ capabilities and intent in this area, based on expert input from DHS’s Control Systems Security Program/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in coordination with the other NCCIC components.

(U//FOUO) DHS Bulletin: “Anonymous” and Associated Hacker Groups Deploying New Cyber Attack Tools

The hacker collective known as ‘Anonymous’ has successfully attacked a wide range of public and private sector entities since 2003 with relatively crude tools. Historically, they rely on tools such as the Low Orbit Ion Cannon (LOIC) or Botnets to deny access to websites, or hijack or deface web pages and post quasi-political statements, or perform other malicious activity. Since many of these older tools made it relatively easy for law enforcement and other government forces to identify the source of an attack and then arrest the perpetrator, Anonymous members may have recognized a need to have more advanced tools that offered a lesser degree of exposure. They recently claimed to have developed and possibly employed several new cyber attack tools for use in their self-proclaimed ‘internet civil disobedience’ campaigns. The NCCIC, coordinating with several of its partners, believes there are at least four new tools being shared among and employed by Anonymous members: #RefRef, Apache Killer, Anonware, and Universal Rapid Gamma Emitter (URGE).

GAO Report: DHS Data Mining Systems Do Not Ensure Protection of Privacy

As part of a systematic evaluation framework, agency policies should ensure organizational competence, evaluations of a system’s effectiveness and privacy protections, executive review, and appropriate transparency throughout the system’s life cycle. While DHS and three of its component agencies—U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, and the U.S. Citizenship and Immigration Services—have established policies that address most of these key policy elements, the policies are not comprehensive. For example, DHS policies do not fully ensure executive review and transparency, and the component agencies’ policies do not sufficiently require evaluating system effectiveness. DHS’s Chief Information Officer reported that the agency is planning to improve its executive review process by conducting more intensive reviews of IT investments, including the data-mining systems reviewed in this report. Until such reforms are in place, DHS and its component agencies may not be able to ensure that critical data mining systems used in support of counterterrorism are both effective and that they protect personal privacy.

(U//FOUO) DHS HUJI Claims Responsibility for India High Court Bombing

According to multiple media reports, on 7 September an explosion occurred inside the reception area of the Delhi High Court in New Delhi, India at approximately 10:00am local time. The blast killed at least 11 people and injured some 76 others. Indian authorities reported to the press that the explosives were inside a briefcase left in a reception area in between the security gates of the High Court. India’s National Security Guard Director indicated that the device contained ammonium nitrate, which was also used in the most recent bomb against the court complex on 25 May. Harakat-ul-Jihad al-Islami (HUJI) claimed responsibility for the blast in an e-mail message and demanded that India repeal the death sentence of Afzal Guru, who was convicted of attacking the Indian Parliament building in 2001 and is awaiting execution.

One Step Closer to Fusion Center Transparency

The recent ten-year anniversary of the September 11 attacks brought a deluge of news regarding the transformation of the United States in the wake of the most devastating terrorist attacks in the country’s history. Many reports focused on debating the efficacy, or lack thereof, of policies implemented over the decade since the attacks occurred. One set of particularly revealing reports from the Center for Investigative Journalism discussed suspicious activity reporting at the Mall of America and the transformation of Homeland Security following September 11. Some publications discussed the waste inherent in the Department of Homeland Security (DHS) and its various grant programs. In addition to these critical evaluations of security policy, a number of public relations pieces from the national network of fusion centers appeared in local publications around the country. A local television station in Michigan covered the state’s local fusion center, having “unprecedented access” to walk around inside without cameras. Another piece from Tennessee discussed the Tennessee Bureau of Investigation’s fusion center, ending with appeals for viewers to report suspicious activity and “say something” if they “see something”. Articles from other states including Arkansas and Alabama, sometimes written by Homeland Security officials, emphasized the important work of their local fusion centers and the continued need for funding and support.

(U//FOUO) DHS-FBI Potential Al-Qaeda Threat to New York City and Washington, DC During 9/11 Anniversary Period

We assess that al-Qa‘ida has likely maintained an interest since at least February 2010 in conducting large attacks in the Homeland timed to coincide with symbolic dates, to include the 10-year anniversary of the 9/11 terrorist attacks. We also remain concerned that the May 2011 death of Usama bin Ladin (UBL), coupled with the subsequent removal of several key al-Qa’ida figures, could further contribute to al-Qa’ida’s desire to stage an attack on a symbolic date—such as the 10-year anniversary of 9/11—as a way to avenge UBL’s death and reassert the group’s relevance, although operational readiness likely remains the primary driving factor behind the timing of al-Qa’ida attacks.

(U//FOUO) DHS-FBI Al-Qaeda and the Threat to General Aviation

Al-Qa‘ida and its affiliates have maintained an interest in obtaining aviation training, particularly on small aircraft, and in recruiting Western individuals for training in Europe or the United States, although we do not have current, credible information or intelligence of an imminent attack being planned against aviation by al-Qa‘ida or its affiliates.

GAO Department of Homeland Security Ten Years After 9/11 Progress Review

Since it began operations in 2003, DHS has implemented key homeland security operations and achieved important goals and milestones in many areas to create and strengthen a foundation to reach its potential. As it continues to mature, however, more work remains for DHS to address gaps and weaknesses in its current operational and implementation efforts, and to strengthen the efficiency and effectiveness of those efforts to achieve its full potential. DHS’s accomplishments include developing strategic and operational plans; deploying workforces; and establishing new, or expanding existing, offices and programs.

(U//FOUO) DHS-FBI Al-Qaeda Interest in Targeting Trains on September 11, 2011

As of February 2010, al-Qa‘ida was allegedly contemplating conducting an operation against trains at an unspecified location in the United States on the tenth anniversary of 11 September 2001. As one option, al-Qa‘ida was looking at the possibility of tipping a train by tampering with the rails so that the train would fall off the track at either a valley or a bridge. Al-Qa‘ida noted that an attack from tilting the train would only succeed one time because the tilting would be spotted. Al-Qa‘ida also noted that newer train cars each have their own braking system, and that movement in a specific direction would derail it, but would not cause it to fall off the track.

DHS Cybersecurity Bulletin: Physical Events Provide Phishing/Social Engineering Opportunities

Malicious users seeking to exploit interest related to physical events such as earthquakes and hurricanes will likely use subject lines and attachment titles related to the incidents in phishing e-mails. Network administrators and general users should be aware of these attempts and avoid opening messages with attachments and/or subject lines related to physical events.

(U//FOUO) DHS-FBI Ten-Year Anniversary of 9/11 Attacks Warning

This Joint Intelligence Bulletin (JIB) highlights potential terrorist threats related to the 10-year anniversary of the 11 September 2001 (9/11) attacks. This JIB provides perspective on the threat to the Homeland and US interests overseas from al-Qa‘ida, al-Qa‘ida affiliates and allies, and al-Qa‘ida-inspired homegrown violent extremists (HVEs). FBI and DHS are providing this information to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, as well as first responders and private sector security officials, in effectively deterring, preventing, or disrupting terrorist attacks against the United States. Unless otherwise noted, this JIB uses the FBI’s definitions of terms, which may differ from the definitions used by DHS.