Tag Archive for Department of Homeland Security

(U//FOUO) DHS Snapshot: Yemen Explosive Packages on Cargo Aircraft

(U) As of 29 October, packages on cargo aircraft containing explosive materials were intercepted in the United Kingdom (UK) and Dubai, United Arab Emirates (UAE). The packages were shipped from Yemen, with the United States listed as the final destination. On the evening of 28 October,security officials at East Midlands Airport in Lockington, UK identified a suspicious package containing a modified printer-toner cartridge that was later confirmed to contain explosives.

(U//FOUO) DHS Report: Small Unit Tactics in Terrorist Attacks

The DHS/Office for Bombing Prevention TRIPwire team is providing this Information Product to private sector owners and operators and law enforcement to alert them to small unit tactics used by terrorists throughout the world. This report is derived from a variety of open sources and government reports. At this time, there is no credible or specific information that terrorists are planning operations against public buildings in the United States, but it is important for Federal, State, and Local authorities, and private sector owners and operators to be aware of potential terrorist tactics.

(U//FOUO) DoE-DHS Energy Sector Critical Infrastructure Protection Plan

In its role as Energy SSA, DOE has worked closely with dozens of government and industry security partners to prepare this 2007 Energy SSP. Much of that work was conducted through the Sector Coordinating Councils (SCC) for electricity and for oil and natural gas, as well as through the Energy Government Coordinating Council (GCC). The electricity SCC represents more than 95 percent of the electric industry and the oil and natural gas SCC represents more than 98 percent of its industry. The GCC, co—chaired by DHS and DOE, represents all levels of government—Federal, State, local, and tribal-that are concerned with the Energy Sector.

(U//FOUO) DHS Project 12 Report: Critical Infrastructure Public-Private Partnerships

The United States relies on critical infrastructure and key resources (CIKR) for government operations and the health and safety of its economy and its citizens. The President issued National Security Presidential Directive 54 (NSPD-54)/Homeland Security Presidential Directive 23 (HSPD-23), which formalized the Comprehensive National Cybersecurity Initiative (CNCI). NSPD-54/HSPD-23 directs the Secretary of Homeland Security, in consultation with the heads of other Sector-Specific Agencies, to submit a report detailing the policy and resource requirements for improving the protection of privately owned U.S. critical infrastructure networks. The report is required to detail how the u.S. Government can partner with the private sector to leverage investment in intrusion protection capabilities and technology, increase awareness about the extent and severity of cyber threats facing critical infrastructure, enhance real-time cyber situational awareness, and encourage intrusion protection for critical information technology infrastructure.”

(U//FOUO) DHS, NCTC, FBI Homegrown Extremist Threat Reporting Brochure

The attempted bombing in Times Square on 1 May 2010 highlights the need to identify Homegrown Violent Extremists before they carry out a terrorist act. The ability of the bomber to operate under the radar demonstrates the difficulties associated with identifying terrorist activity and reinforces the need for law enforcement, at all levels, to be vigilant and identify individuals who are planning violence or other illegal activities in support of terrorism.

Janet Napolitano Speech to the Council on Foreign Relations on “Refocusing” Homeland Security

So if 9/11 happened in a Web 1.0 world, terrorists are certainly in a Web 2.0 world now. And many of the technological tools that expedite communication today were in their infancy or didn’t even exist in 2001. So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries. And the threats we face are by their very nature asymmetrical. Terrorism more often has become privatized violence—does not rely on links, links to an army or to a sovereign state. We often hear that this is what our globalized era looks like, but what is most salient about today’s environment is that it is also networked. And in a networked world, information true and false moves everywhere all the time. And in that networked world, everyone who is part of the network, meaning all of us, can enjoy the tremendous benefits, but also must be ready and willing to learn about and help address the vulnerabilities that come with these benefits. So the team we put on the field needs to be bigger, better networked and better trained. What are the implications for this network world for the Department of Homeland Security? It means that we must continue to take an all-hazards approach to preparedness, meaning we prepare for natural disasters as well as terrorist attacks. We need to comprehend and anticipate an expanding range of threats.

Janet Napolitano Speech to New York First Responders on “Rebuilding” Homeland Security

At the heart of this are fusion centers. Starting with just one in 2006, there are now 72 fusion centers nationwide, serving as focal points for information-sharing among federal, state, local, tribal, and territorial partners. By the end of this year, all 72 fusion centers should be able to analyze information and spot trends in order to effectively share timely intelligence – with local law enforcement, and with DHS, so the information can also be used by others within the Intelligence Community. To support this vision: we’re prioritizing fusion centers in our FY2011 grants, and looking for ways to support them through additional technology and personnel, including the deployment of highly-trained experts in critical infrastructure; we’re deploying experienced DHS analysts to every one of these centers – 64 at last count – and we won’t stop until we have them in every one; and we’re linking them together, and with DHS headquarters, through the classified Homeland Security Data Network.

Nevada State Homeland Security Strategy 2010

The purpose of the Nevada State Homeland Security Strategy (SHSS) is to identify and address statewide priorities to achieve and sustain a strengthened ability to prevent, detect, deter, mitigate against, prepare for, respond to and recover from any natural, manmade and/or technological emergency or disaster up to and including any act of terrorism. The State, through implementation of this strategy, is seeking outcomes that will ensure a safe and secure Nevada through enhanced capabilities in intelligence, surveillance, rapid first response and recovery, the protection of critical infrastructure, and to promote public education and awareness.

(U//FOUO) TSA Transportation Suspicious Incident Report (TSIR) August 2010

(U//FOUO) The vast majority of suspicious incidents are not terrorism related. Incident reporting continues to reveal most involve members of the traveling public who do not have intent to cause harm. Intoxicated passengers, people traveling without proper identification or with propaganda materials, and persons with mental health needs are generally not considered suspicious and are generally not included in the weekly summary. However, some incidents are more serious and are reported for situational awareness. Incidents involving notable drug or weapons concealment, possible surveillance, laser targeting of aircraft, possible insider collusion, exploitable gaps in security, and some unusual behaviors at transportation venues are discussed as they may involve technologies or tactics which may lend insight to future terrorist tradecraft.

(U//FOUO) DHS “Red Cell” Report: Thinking Beyond Mass Transit For Next Homeland Attack

A Homeland strike soon after the London attacks is conceivable but unlikely, and if and when it comes, it could just as well be on other “soft targets” as on mass transit. These were the conclusions of 18 leading academic terrorism experts, former senior National Security Council and DHS officials, mass transit security specialists, and other nongovernmental experts and creative thinkers polled by the DHS Analytic Red Cell immediately after the July 7 attacks.

Florida Multi-Year Training & Exercise Plan 2011-2013

The purpose of the Multi-Year Training and Exercise Plan (MYTEP) is to provide a follow-on companion document to Florida‟s Domestic Security Strategic Plan. It is a living document that will be updated and refined annually. The MYTEP provides a roadmap for Florida to follow in accomplishing the priorities and goals described in the Florida‟s Domestic Security Strategic Plan. Each State Priority is linked to a corresponding National Priority, and, if applicable, an Improvement Plan (IP) action. The priority is further linked to the associated target capabilities that would facilitate accomplishment of the priority and the training and exercises that will help the jurisdiction obtain those capabilities and achieve that priority.

Terrorism Liaison Officer (TLO) Program

The Terrorism Liaison Officer (TLO) is designed to be a nationally interconnected program of designated law enforcement officers, firefighters, military, and other first responders that attend an approved and accredited course of instruction. This shared learning experience prepares the TLOs to fill a specific role within their organization as a link or “liaison.” The TLO program was initiated in California via the Commission on Peace Officer Standards and Training (POST) around 2005-2006 by a Anthony Lukin. According to several proposals for the program, Fusion Centers in California “utilize the Terrorism Liaison Officer (TLO) Program to foster communication and collaboration amongst the fire service; law enforcement; the federal homeland security and intelligence communities and public safety stakeholders. The TLOs serve as the conduit through which homeland security and crime-related information flows from the field to the Fusion Center for assessment and analysis. The network also serves as the vehicle to carry actionable intelligence from the Fusion Center to field personnel. This information flow provides for increased safety and security for fire department personnel as well as the communities served.”

DHS Computer-Aided Dispatch Interoperability Project

The Department of Homeland Security’s Office for Interoperability and Compatibility (OIC) launched the Computer‐Aided Dispatch (CAD) Interoperability Project (CADIP) in May 2007. CAD systems, which dispatch emergency services and assist 9‐1‐1 operators and dispatchers in handling and prioritizing requests for resources, serve as a major component in responding to critical incidents. CADIP addresses an issue that today’s emergency response agencies may face: CAD systems that are not linked across jurisdictions and, as a result, have difficultly responding to multi‐jurisdictional emergencies.

(U//FOUO) DHS-FBI Obama Inauguration Threats Warning

(U//FOUO) DHS and the FBI are concerned about the threat individuals affiliated with al-Shabaab—a radical Islamic extremist group active in Somalia—may pose to the Homeland, including locations and events of political significance, such as the upcoming Presidential Inauguration. DHS and FBI continue to monitor all reporting to establish the credibility of this threat; however, information concerning the threat is limited.

Fusion Center “Privacy and Civil Rights Framework” Enhancement

Over the past three years, federal, state, and local officials have worked tirelessly to ensure that robust privacy, civil rights, and civil liberties protections are integrated into fusion center policies and business processes. These efforts have included developing Baseline Capabilities and model privacy policy templates and providing training and subject-matter expertise to fusion centers.

(U//FOUO) DHS-Lawrence Livermore Unconventional Biological Laboratory Guide

(U//FOUO) Many innocuous reasons exist for the possession of some types of biological agents and associated laboratory equipment. For example, hobby, educational, or artistic uses such as home brewing or pilot-scale biotechnology research may include the same or similar equipment used in the malicious production of pathogens (see Figure). In some instances, however, the presence of a biological laboratory at an unconventional site could be an indicator of possible intent or capability to conduct bioterrorism.

(U//FOUO) DHS IED/VBIED Construction and Tactics Overview

(U//FOUO) The Intelligence Community currently has no specific, credible intelligence indicating that domestic or international terrorist organizations intend to use Improvised Explosive Devices (IEDs) or Vehicle-Borne Improvised Explosive Devices (VBIEDs) against targets within the Homeland. However, both foreign and domestic terrorist groups continue to use IEDs/VBIEDs as a frequently employed method of attack, and in particular, the frequency of lethal IED incidents overseas is cause for continuing concern.

(U//FOUO) DHS Triacetone Triperoxide (TATP) Homemade Explosive Warning

(U//FOUO) Terrorists could use the explosive Triacetone Triperoxide (TATP), also referred to as acetone peroxide, in an attack against the United States. In December 2001, British shoe-bomber Richard Reid tried to detonate an explosive device with TATP as the initiator while aboard a flight from Paris to Miami. TATP can be made from hydrogen peroxide, acetone, and sulfuric acid. These ingredients are commonly available from drug stores, hardware stores, and car batteries. TATP is extremely sensitive to impact, friction, static/sparks, and heat, and may react violently to drug field testing.