A bulletin to local businesses from the City of London Police warning of possible extremist/terrorist threats arising from the Occupy London protests.
(U//FOUO) National Counterterrorism Center Mobilizing Homegrown Violent Extremists (HVEs) Behavioral Indicators
A US Government interagency study of homegrown violent extremists (HVEs) revealed four major mobilizing patterns shared by a majority of HVE cases between 2008 and 2010, providing officials with an emerging picture of distinct behaviors often associated with an individual mobilizing for violence. These four patterns—links to known extremists, ideological commitment to extremism, international travel, and pursuit of weapons and associated training—repeatedly appeared in the case studies, reinforcing initial assessments of potential trends. Awareness of the patterns can help combat the recent rise in these cases while providing a data-driven tool for assessing potential changes in the HVE threat to the Homeland.
This Joint Intelligence Bulletin (JIB) updates a DHS-FBI joint analytic product of the same title dated 3 September 2010 and is intended to provide warning and perspective regarding the scope of the potential terrorist threats to the United States, specifically towards US persons. This product is provided to support the activities of DHS and FBI and to help federal, state, and local government counterterrorism and law enforcement officials deter, prevent, preempt, or respond to terrorist attacks directed against the United States.
Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.
Insiders often possess detailed operational and system-security knowledge, as well as authorized physical and systems access to utilities. Insiders can be employees, contractors, service providers, or anyone with legitimate access to utility systems. They often are self-motivated, know system security measures, and raise no alarms due to their authorized systems access. With knowledge of and access to a utility’s network, malicious actors could seize control of utility systems or corrupt information sent to plant operators, causing damage to plant systems and equipment. Systems and networks used by utilities are potential targets for a variety of malicious cyber actors. Threat actors who target these systems may be intent on damaging equipment and facilities, disrupting services, stealing proprietary information, or other malicious activities. The greater the individual’s knowledge and authorized systems access, the greater risk the individual poses. Furthermore, any individual with access to a plant’s systems could unwittingly or inadvertently introduce malware into a system through portable media or by falling victim to socially engineered e-mails.
The DBT Report is a stand-alone threat analysis to be used with the Physical Security Criteria for Federal Facilities: An ISC Standard. The document establishes a profile of the type, composition, and capabilities of adversaries, and it is also designed to correlate with the countermeasures in the compendium of standards and to be easily updated as needed. The DBT is an estimate of the threats that face Federal facilities across a range of undesirable events and based on the best intelligence information, Intelligence Community (IC) reports and assessments, and crime statistics available to the working group at the time of publication. Users of the DBT must consider that undiscovered plots may exist, adversaries are always searching for new methods and tactics to overcome security measures, and the lone-wolf adversary remains largely unpredictable.
The National Socialist Movement (NSM) USPER is the most active neo-Nazi group operating in the United States. It has grown from a small organization with a limited following confined to the mid-western United States to the preeminent National Socialist group in the nation. Despite having recently suffered a defection of several regional leaders, NSM remains an influential force within white supremacist circles and the only major racist group that eschews all attempts to distance its methods and objectives from those of the Third Reich. NSM has a reputation for conducting numerous public rallies that have triggered a violent response, including a riot in Toledo, Ohio, in October 2005.
The Vigilance Project is a comprehensive, analytic report that examines major terrorism cases that have taken place against the Homeland since September 11, 2001. The report serves as a historical compilation of acts or attempted acts of terrorism against the United States, or its interests, and as a tool to identify trends and commonalities among the cases and the subjects involved. It is recognized that the threat environment is dynamic and potential threats are not limited to the findings contained in this report. As the title suggests, it is the duty of every citizen to remain vigilant in the face of terrorism. The findings of this report allow readers to gain an understanding of terrorism participants, their tactics and procedures, and become aware of similarities among the cases, in order to draw useful conclusions. The ultimate goal of the Vigilance Project is to provide useful information to law enforcement partners to support their role in preventing the next attack.
As the President said in his State of the Union address, in the face of violent extremism, “we are responding with the strength of our communities.” A vast majority of people in every American community resoundingly reject violence, and this certainly includes the violent, al-Qaeda-style ideology that claims to launch attacks in the name of their widely rejected version of Islam. We must use these facts as a tool against the threat of homegrown violent extremism. In conjunction with these communities and with the Department of Justice and the Program Manager for the Information Sharing Environment, we have published guidance on best practices for community partnerships, which has been distributed to local law enforcement across the country. DHS also holds regular regional meetings – which include state and local law enforcement, state and local governments, and community organizations – in Chicago, Detroit, Los Angeles, and Minneapolis. These regional meetings have enabled participants to provide and receive feedback on successful community-oriented policing and other programs aimed at preventing violence.
Domestic Improvised Explosive Device (IED) Threat Overview from July 2008.
Several restricted documents produced by the Central Florida Intelligence Exchange (CFIX) and obtained by Public Intelligence indicate that a variety of protests and political events are monitored by the regional fusion center for potential threats and violent activity. These events span the political spectrum from a summit hosted by Ron Paul’s Campaign for Liberty to anti-war protests conducted by Code Pink and Veterans for Peace. While the documents make no mention of specific threats arising from the events, they do indicate that the fusion center monitors political action in a variety of forms and sometimes requests law enforcement officers to report on constitutionally-protected activities.
This archive file contains 137 bulletins that were produced by the Institute of Terrorism Research and Response, an American-Israeli company under contract to the Pennsylvania Department of Homeland Security, from October 2009-Setember 2010. We believe this represents the complete collection of reports produced by the company for the State of Pennsylvania.
Al-Qaeda and allied groups continue to pose a threat to the United States. Although it is less severe than the catastrophic proportions of a 9/11-like attack, the threat today is more complex and more diverse than at any time over the past nine years. Al-Qaeda or its allies continue to have the capacity to kill dozens, or even hundreds, of Americans in a single attack. A key shift in the past couple of years is the increasingly prominent role in planning and operations that U.S. citizens and residents have played in the leadership of al-Qaeda and aligned groups, and the higher numbers of Americans attaching themselves to these groups. Another development is the increasing diversification of the types of U.S.-based jihadist militants, and the groups with which those militants have affiliated. Indeed, these jihadists do not fit any particular ethnic, economic, educational, or social profile.
THE FBI ASSESSES THAT MULTIPLE ONGOING CONTROVERSIES IMPACTING US MUSLIM COMMUNITIES MAY SERVE TO POLARIZE PUBLIC OPINION AND FUEL ISLAMIC EXTREMIST RHETORIC, BOTH IN THE SHORT- AND LONG-TERM. THE FBI CURRENTLY HAS NO SPECIFIC CREDIBLE INFORMATION THAT INTERNATIONAL TERRORIST ORGANIZATIONS ARE PLANNING ACTION AGAINST THE UNITED STATES BECAUSE OF THESE EVENTS, ALTHOUGH THE POTENTIAL IMPACT OF THESE CONTROVERSIES NECESSITATES CONTINUED VIGILANCE FROM STATE, LOCAL, TRIBAL, AND PRIVATE SECURITY ENTITIES. MULTIPLE CONTROVERSIES GENERATING HEATED RHETORIC OVER THE PAST FEW WEEKS, OPEN SOURCE REPORTING HAS DRAWN ATTENTION TO SEVERAL CONTROVERSIAL EVENTS IMPACTING MUSLIM COMMUNITIES IN THE UNITED STATES. WHILE EACH BEGAN AS A SEEMINGLY LOCAL DISPUTE, ALL ARE NOW RAISING NATIONAL-LEVEL QUESTIONS REGARDING CONSTITUTIONALLY PROTECTED FREEDOMS AND ISLAMS ROLE IN AMERICA. THE PLANNED BURNING OF QURANS BY A NONDENOMINATIONAL CHURCH IN GAINESVILLE, FLORIDA IN RECOGNITION OF THE NINTH ANNIVERSARY OF 11 SEPTEMBER CONTINUES TO ATTRACT ATTENTION. THE CHURCHS LEADER HAS STATED HE DOES NOT THINK THIS EVENT IF IT OCCURS WILL PRECIPITATE VIOLENCE AGAINST HIM OR HIS FOLLOWERS, DESPITE NUMEROUS DEATH THREATS, WARNINGS FROM OTHERS IN THE LOCAL COMMUNITY, INTERNATIONAL MUSLIM COMMUNITY PROTESTS, AND PROTESTS FROM FOREIGN GOVERNMENTS.
A recent guide from the Department of Justice detailing terms and concepts used by “extremist” groups lists “constitutionalists” and “survivalists” . The 120-page, “Law Enforcement Sensitive” guide to “Investigating Terrorism and Criminal Extremism” describes itself as “a glossary designed primarily as a tool for criminal justice professionals to enhance their understanding of words relating to extremist terminology, phrases, activities, symbols, organizations, and selected names that they may encounter while conducting criminal investigations or prosecutions of members of extremist organizations.” Constitutionalist, which is defined as an “adherent or advocate of constitutionalism or of an existing constitution” by Random House’s 2010 Dictionary, is described in the report as a “generic term for members of the ‘patriot’ movement”. Survivalists are described in the document as fearing a “coming collapse of civilization” and are trying to prepare themselves for this collapse. Such individuals are said to have “typically stockpiled food, water, and weapons, especially the latter, and instructed themselves on topics ranging from first aid to childbirth to edible plants”.
NYPD Radicalization in the West: The Homegrown Threat from August 13, 2007.
(U//FOUO) According to recent FBI reporting, an identified sovereign citizen extremist group is advocating a plan to remove state governors from office. This organization authored a “Restore America Plan” that consists of a multi-step process beginning with notices issued to state governors demanding they vacate their positions within three days. As of 31 March, over 30 governors have received such notices. The plan calls for the removal of any governor who fails to comply. DHS has no specific information that this removal refers to a specific plan to use violence; however, law enforcement should be aware that this could be interpreted as a justification for violence or other criminal actions. According to the group’s plan, other steps involve establishing bogus courts, calling of “de jure” grand juries, and issuing so-called “legal orders” to gain control of the state. The plan notes that this call to action depends on the participation of identified sovereign citizens or other unidentified violent antigovernment extremists whose cooperation is not assured.
According to information obtained via the Southern Poverty Law Center (SPLC), the number of hate groups operating with the United States has risen and continues to rise. In 2006, law enforcement intelligence and SPLC information counted 844 organizations in 2007; this number has risen to 888, an increase of approximately 4.7 percent. This number may seem small; however, during an 8-year time period, this has translated into a 48-percent jump in the number of groups since 2000, when there were 602 hate groups operating in the United States, according to research by the intelligence project of the SPLC. Much of the expansion has been driven by hate groups’ exploitation of the issue of illegal immigration, which most Americans see as a pressing concern. This overview addresses the issue of American and Canadian extremism in Canada and in those States that fall along the American-Canadian border.
(U//FOUO) On March 22, 2010, President Obama signed the healthcare reform bill into law. This bill was fervently contested in both the House and the Senate by Republican and Democratic parties. While this bill was being debated in the government, many groups and organizations became very vocal in their support or opposition to it. It has undoubtedly become one of the most controversial topics in years, and many citizens feel passionately about their stance on this topic. Therefore, numerous demonstrations, counter-demonstrations and rallies, have taken place as a result.
According to the U.S. Department of Homeland Security, an Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.
(U//FOUO) This Strategic Sector Assessment is one in a series that provides an overall assessment of the potential terrorist threats to critical infrastructure and key resources, and provides decision makers with the broad, analytically-based threat information necessary to inform investment priorities and program design.
Information from several recent planned or thwarted terrorist plots shows the importance of the use of insiders to gain access to targets and collect preoperational information. Al-Qa‘ida planner Dhiren Barot, whom UK authorities arrested in 2006, had tasked a member of his group to secure employment at a hotel in the United Kingdom to learn how to deactivate fire and security systems.
This assessment examines the potential threat to homeland security from cyber attacks conducted by leftwing extremists, a threat that DHS/I&A believes likely will grow over the next decade. It focuses on the more prominent leftwing groups within the animal rights, environmental, and anarchist extremist movements that promote or have conducted criminal or terrorist activities (see Appendix). This assessment is intended to alert DHS policymakers, state and local officials, and intelligence analysts monitoring the subject so they can better focus their collection requirements and analysis.
Rightwing extremist paranoia of foreign regimes could escalate or be magnified in the event of an economic crisis or military confrontation, harkening back to the “New World Order” conspiracy theories of the 1990s. The dissolution of Communist countries in Eastern Europe and the end of the Soviet Union in the 1990s led some rightwing extremists to believe that a “New World Order” would bring about a world government that would usurp the sovereignty of the United States and its Constitution, thus infringing upon their liberty. The dynamics in 2009 are somewhat similar, as other countries, including China, India, and Russia, as well as some smaller, oil-producing states, are experiencing a rise in economic power and influence.
This product is one in a series of reference aids designed to provide operational and intelligence advice and assistance to other elements of DHS, as well as state, local, and regional fusions centers. DHS/I&A intends this background information to assist federal, state, local, and tribal homeland security and law enforcement officials in conducting analytic activities. This product provides definitions for key terms and phrases that often appear in DHS analysis that addresses the nature and scope of the threat that domestic, non-Islamic extremism poses to the United States. Definitions were derived from a variety of open source materials and unclassified information, then further developed during facilitated workshops with DHS intelligence analysts knowledgeable about domestic, non-Islamic extremism in the United States.