Terrorists may use small aircraft flyovers to conduct preoperational activities such as reconnaissance or rehearsals for planned attacks. When suspicious flyovers occur, law enforcement and first responders should report the key attributes of the flight and the aircraft for timely identification (time of day, location and direction of flight, facility overflown, aircraft size, markings, color scheme, tail number, number of windows, placement of wings or rotor, number of engines, and weather) to the Federal Aviation Administration (FAA) through a local Air Traffic Control facility or office, a local Flight Standards District Office, or directly to the FAA’s Domestic Events Network at 202 493 5107, and the Transportation Security Administration. The FAA is often best able to distinguish between legitimate air traffic and suspicious flight operations that warrant further investigation.
(U//FOUO) FBI Counterfeit and Substandard Lithium Batteries Pose Serious Health Risks to Law Enforcement
The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.
Cold packs, packaged and sold commercially, contain chemicals—usually 30 to 85 grams of ammonium nitrate or urea—that, when extracted in sufficient quantity, can be used as precursors for improvised explosives. The chemicals are packaged in prill form, and can be used directly or ground into powder when being used in homemade explosive production. Five hundred packs would yield 30 to 90 pounds of precursor material for use in an improvised explosive device (IED).
The Department of Homeland Security and Federal Bureau of Investigation are warning business owners and emergency personnel around the country to be on the look out for terrorists and criminals asking too many questions. In a bulletin from earlier this year, DHS and FBI warned that terrorists and criminals often exhibit the highly suspicious behavior of asking “pertinent, intrusive or probing questions” about security and operations at sensitive facilities. According to the document, terrorists or criminals “may attempt to identify critical infrastructure vulnerabilities by eliciting information pertaining to operational and security procedures from security personnel, facility employees or their associates” and that this type of questioning by individuals “with no apparent need for the information” can provide an “early warning of a potential attack.”
Terrorist or criminals may attempt to identify critical infrastructure vulnerabilities by eliciting information pertaining to operational and security procedures from security personnel, facility employees, and their associates. Persistent, intrusive or probing questions about security, operations or other sensitive aspects of a facility by individuals with no apparent need for the information could provide early warning of a potential attack.
An early April 2012 suicide bombing of a theater in Somalia and a violent extremist communication advocating attacks on US theaters highlight terrorists’ continued interest in attacking such venues. Although we have no specific or credible information indicating that terrorists plan to attack theaters in the United States, terrorists may seek to emulate overseas attacks on theaters here in the United States because they have the potential to inflict mass casualties and cause local economic damage.
The National Gang Intelligence Center (NGIC) and the FBI’s Crimes Against Children Unit (CACU) assesses with medium confidence that gang activity is expanding towards juvenile prostitution primarily for its steady financial rewards and perceived low risk of law enforcement interaction. Historically, prison, street and outlaw motorcycle gangs profit from drug distribution and have recently become involved in non-traditional criminal activity such as mortgage fraud and identity theft. Some gangs appear to be diversifying their income by reducing or eliminating drug trafficking activities in favor of juvenile prostitution.
Though the United States has been engaged in a Global War on Terror for more than a decade, the U.S. Government surprisingly does not have a standardized definition of terrorism that is agreed upon by all agencies. The State Department, Federal Bureau of Investigation and a number of other government agencies all utilize differing definitions of what constitutes an act of terrorism. This lack of agreement has allowed individual agencies to present vastly different and, in some cases, far more inclusive definitions of terrorist acts enabling the use of expanded law enforcement and investigative procedures that might not be applicable in other agencies. In fact, some agencies have presented a definition of terrorism so expansive as to include a number of activities that are not traditionally associated with terrorism or terrorist organizations.
Al-Qaida in the Arabian Peninsula (AQAP) has released issue 9 of its English-language “Inspire” Magazine. There is a portion of the magazine dedicated to attacking the United States by starting wildfires. The article instructs the audience to look for two necessary factors for a successful wildfire, which are dryness and high winds to help spread the fire. Specific fire conditions that are likely to spread fire quickly are Pinewood, crownfires (where the trees and branches are close together), and steep slope fires (fire spreads faster going up a slope).
Sovereign citizens believe the government is operating outside of its jurisdiction and generally do not recognize federal, state, or local laws, policies, or governmental regulations. They subscribe to a number of conspiracy theories, including a prevalent theory which states the United States Government (USG) became bankrupt and began using citizens as collateral in trade agreements with foreign governments. They believe secret bank accounts exist at the United States (US) Department of the Treasury. These accounts can be accessed using Internal Revenue Service (IRS), Universal Commercial Code (UCC), and fraudulent financial documents.
As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization. The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.
FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement
This is the Federal Bureau Investigation (FBI) Laboratory Broad Agency Announcement (BAA) BAA-202200 for the High Value Detainee Interrogation Group (HIG) under the Federal Acquisition Regulation (FAR) 6.102(d)(2)(i) to provide for the competitive selection of research proposals for behavioral science research to advance the science and practice of intelligence interviewing and interrogation. This is an unrestricted solicitation. The NAICS Code for this acquisition is 541720 and small business size standard is $19 million.
The purpose of this assessment is to explore the expansion and influence of US-based gangs abroad and their illicit operations and associations with foreign criminal organizations. For the purpose of this assessment, the term “gang” encompasses both street gangs and outlaw motorcycle gangs. In addition to FBI and open source reporting, the following law enforcement agencies from the United States, Canada, Central America, the Netherlands, and United Kingdom were surveyed to obtain data for the assessment.
Rather than combating natural disasters or a nuclear detonation in a major U.S. city, this year’s National Level Exercise will focus on cyber threats to critical infrastructure and the “real world” implications for government and law enforcement of large-scale cyber attacks. National Level Exercise 2012 (NLE 2012) is scheduled to take place in June and will involve emergency response personnel from at least thirteen states, four countries, nearly every major governmental department as well as a number of private companies, non-governmental organizations, institutions of higher education and local fusion centers. The exercise will span four FEMA regions and will include scenarios affecting the National Capital Region.
The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.
This Joint Intelligence Bulletin is intended to increase awareness and provide understanding of the nature of potentially emergent threats in response to the alleged killing of civilians by a US soldier in Afghanistan and the burning of Korans and other religious documents on a military base. This Information is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial counterterrorism and law enforcement officials and the private sector to prevent or respond to terrorist attacks against the United States.
What information from its most recent gang threat assessment does the FBI want to keep only for the eyes of law enforcement? Thanks to the publication of the full “law enforcement sensitive” version of the assessment on the website of the California Gang Investigator’s Association, we now know the answer to that question. The full version of the document contains approximately twenty additional pages of information regarding gang threats across the U.S. including details on the incredible proliferation of Mexican drug trafficking organizations. Most of the content derived from non-public reporting sources, such as FBI field reports, concerns specific incidents that are described more generally in the public version of the document. There are also some rather startling statistics omitted from the public version. For example, the fact that 36% of law enforcement report that gangs in their jurisdiction have ties to Mexican criminal gangs and drug trafficking organizations is omitted from the public version of the report.
Gang members armed with high-powered weapons and knowledge and expertise acquired from employment in law enforcement, corrections, or the military will likely pose an increasing nationwide threat, as they employ these tactics and weapons against law enforcement officials, rival gang members, and civilians. Associates, friends, and family members of gangs will continue to play a pivotal role in the infiltration and acquisition of sensitive information.
The release of a toxic industrial chemical (TIC) by a terrorist group or lone actor represents a significant threat. TICs are readily available in large quantities, routinely shipped by commercial carriers, and often stored in bulk containers. Most TICs are generally less toxic than chemical warfare (CW) agents, but a large volume of TICs can be equally dangerous. The release of a TIC in a populated area is capable of generating numerous casualties and deaths; the toxic effects would be more dangerous if release occurred in an enclosed space.
(U//FOUO) DHS Mass Transit and Passenger Railroad Systems Terrorist Attack Preparedness Info Regarding a Realistic Threat
Terrorist attack tactics used against mass transit and passenger railroad systems abroad provide insights that can assist law enforcement officers in securing these critical infrastructure assets. The chart below highlights common tactics noted in attempted or successful use of explosive or incendiary devices against mass transit or passenger railroad systems in attacks conducted between March 2004 and November 2009. The information about these attacks provides insights into device type, selection, and construction and can help law enforcement identify patterns and develop protective measures. Analysis shows terrorists have timed attacks during periods of peak ridership; used multiple, coordinated, drop-and-leave devices in identical or similar baggage; and placed devices inside rail cars to cause casualties among passengers.
The purpose of this assessment is to alert law enforcement and homeland security officials about recent suspicious activity involving school buses and the licenses to drive them.
Terrorists overseas have suggested conducting vehicle ramming attacks—using modified or unmodified vehicles—against crowds, buildings, and other vehicles. Such attacks could be used to target locations where large numbers of people congregate, including sporting events, entertainment venues, or shopping centers. Vehicle ramming offers terrorists with limited access to explosives or weapons an opportunity to conduct a Homeland attack with minimal prior training or experience.
This Joint Intelligence Bulletin is intended to provide information on the 7 January 2012 arrest by the FBI Tampa Joint Terrorism Task Force (JTTF), as part of a planned law enforcement action, of Florida-based Sami OsmakacUSPER. Osmakac is charged with attempted use of weapons of mass destruction. This information is provided to support the activities of FBI and DHS and to assist federal, state, local, tribal, and territorial, counterterrorism and law enforcement officials to prevent or respond to terrorist attacks against the United States.
A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called “Communities Against Terrorism”, lists the use of “anonymizers, portals, or other means to shield IP address” as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using “software to hide encrypted data in digital photos” or other media. In fact, the flyer recommends that anyone “overly concerned about privacy” or attempting to “shield the screen from view of others” should be considered suspicious and potentially engaged in terrorist activities.
A collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The fliers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country. We have compiled this collection from a number of online sources.