Tag Archive for For Official Use Only

(U//FOUO) DHS Utility-Sector Employee Insider Threats Warning

Insiders often possess detailed operational and system-security knowledge, as well as authorized physical and systems access to utilities. Insiders can be employees, contractors, service providers, or anyone with legitimate access to utility systems. They often are self-motivated, know system security measures, and raise no alarms due to their authorized systems access. With knowledge of and access to a utility’s network, malicious actors could seize control of utility systems or corrupt information sent to plant operators, causing damage to plant systems and equipment. Systems and networks used by utilities are potential targets for a variety of malicious cyber actors. Threat actors who target these systems may be intent on damaging equipment and facilities, disrupting services, stealing proprietary information, or other malicious activities. The greater the individual’s knowledge and authorized systems access, the greater risk the individual poses. Furthermore, any individual with access to a plant’s systems could unwittingly or inadvertently introduce malware into a system through portable media or by falling victim to socially engineered e-mails.

(U//FOUO) DHS U.S. Lodging Industry Protective Measures Guide

Preventing terrorism, enhancing security, and ensuring resilience to disasters are core missions of the U.S. Department of Homeland Security (DHS). Accomplishing these missions necessitates building and fostering a collaborative environment in which the private sector and Federal, State, local, tribal, and territorial governments can better protect critical infrastructure and key resources (CIKR). The U.S. Lodging Industry is designated as CIKR because it is essential to the Nation’s economic vitality and way of life. It is critical to the Department’s vision of ensuring a homeland that is safe, secure, and resilient against terrorism and other hazards. As such, DHS developed the Protective Measures Guide for the U.S. Lodging Industry in collaboration with the American Hotel & Lodging Association to provide options for hotels to consider when implementing protective measures. The guide provides an overview of threat, vulnerability, and protective measures designed to assist hotel owners and operators in planning and managing security at their facilities. It provides suggestions for successful planning, organizing, coordinating, communicating, operating, and training activities that contribute to a safe environment for guests and employees. In addition, when contemplating appropriate protective measures to implement, owners and operators should consider their own knowledge of the property‘s operations and vulnerabilities, as well as the general surroundings and its place within the community. When implementing appropriate protective measures, owners and operators should make use of additional resources, from local law enforcement and emergency management agencies to the security resources listed in the appendices of this guide.

(U//FOUO) New York Office of Homeland Security “Crime-Terror Nexus” Report

As authorities have clamped down on traditional financing pipelines, such as charitable front groups, and as terrorist networks have grown increasingly decentralized, terrorists have turned to criminal activities to finance their operations locally. Throughout the world, Al Qaeda, Hamas, and Hezbollah operatives have involved themselves in an array of criminal enterprises, including counterfeiting, drug dealing, cigarette smuggling, credit card fraud, auto theft, kidnapping, extortion, and artifact trafficking. Although criminality is outlawed under Islamic law, the Al Qaeda manual advises that “necessity permits the forbidden.” Reflecting this theory, when Jemaah Islamiyah (JI) operatives questioned whether hacking into foreigners’ bank accounts was acceptable in Islam, JI leader Abu Bakr Bashir reportedly responded, “[if] you can take their blood; then why not take their property?” “Terrorist groups are particularly interested in raising funds through crime because as Lieutenant Colonel David LaRivee, Associate Professor of Economics at the United States Air Force Academy, stated, “many of the agencies responsible for enforcement in these areas do not traditionally focus on counterterrorism nor do they have strong ties with counterterrorist agencies. This means that many indictable criminal activities that support terrorism are overlooked because they seem insignificant when evaluated locally, but are in fact very significant when considered from a broader perspective.” In order to disrupt these financing efforts, “local law enforcement officials will be key,” as the FBI assessed in a May 25, 2005 Intelligence Bulletin.

(U//FOUO) Massachusetts Commonwealth Fusion Center Hotels/Lodging Industry Warning

As Al-Qa‘ida and other terrorist groups continue to seek innovative ways to conduct attacks and circumvent security procedures, there is concern that the holiday season provides attractive opportunities for terrorists to target the Homeland. This bulletin focuses on lodging facilities that serve large numbers of business and leisure travelers and provide venues for a variety of holiday events.

(U//FOUO) San Diego Fusion Center: Hotels are Potential Bomb Labs

Hotels, motels, and other lodging facilities have been used by extremist individuals and groups as locations to manufacture improvised explosive devices (IEDs) in close proximity to their intended targets. Hotels, specifically rooms with kitchens or kitchenettes, allow these groups or individuals to greatly reduce the potential for a premature detonation. Given the short distance to the intended target the risk of premature detonation during transportation is minimized.

(U//FOUO) CBP Killing or Capturing Cartel Leaders Has No Effect on Drug Trafficking

CBP BorderStat drug seizure information was used to evaluate seizure statistics in relation to the arrest or death of key DTO personnel. The drug seizure data was collected from January 2009 through January 2010. This data was analyzed to determine if the arrest or death of key personnel had a direct impact on the flow of U.S.-bound drugs. This research indicates that there is no perceptible pattern that correlates either a decrease or increase in drug seizures due to the removal of key DTO personnel.

(U//FOUO) U.S. Forces Afghanistan DCGS-A Problems Mean “Lives Lost” Memo

Intelligence analysts in theater do not have the tools required to fully analyze the tremendous amounts of information currently available in theater. The impact of this shortfall is felt in almost every activity that intelligence supports. Analysts cannot provide their commanders a full understanding of the operational environment. Without the full understanding of the enemy and human terrain, our operations are not as successful as they could be. This shortfall translates into operational opportunities missed and lives lost.

(U//FOUO) DHS LulzSec Bulletin: Hacktivist Groups Target U.S. and Foreign Networks

The National Cybersecurity and Communications Integration Center (NCCIC), through coordination with its partners and monitoring of multiple sources, is tracking reports that members of the hacktivist collectives ‘LulzSec’ and ‘Anonymous’ have combined their efforts and continue to perpetrate cyber attacks targeting U.S. and foreign networks. LulzSec Members have posted statements on the internet claiming the attacks, referred to as ‘Operation AntiSecurity’ (AntiSec), are ‘designed to demonstrate the weakness of general internet security’ and have allowed them to collect massive amounts of data. LulzSec is purported to be a group of former Anonymous members who typically use widely available and crude tools to hijack or deface web pages as a political statement. They also routinely post information regarding planned and ongoing activities on publicly available Internet Relay Chat (IRC) sessions and social networking sites like Twitter. Recent attacks by LulzSec and Anonymous have proven simple Tactics, Techniques and Procedures (TTPs) are often successful, even against entities who have invested a significant amount of time and capital into designing and securing their information networks.

(U//FOUO) LulzSec Release: Arizona Police Say Hezbollah is in Mexico

Literally meaning “Party of God”, Hezbollah began as a militia in 1982 in response to the Israeli invasion of Lebanon. The Shi’a Islamist organization has since grown into a worldwide political and paramilitary network with seats in the Lebanese government, numerous social services programs, long-standing ties with the Syrian and Iranian governments, and an annual income estimated to be anywhere between $200-$400 million. Hezbollah’s main goal is to cast out any form of Israeli rule and/or occupation. Due to the U.S.’ political and financial support of Israel, Hezbollah regards our nation as a viable target. While there is no immediate or confirmed threat to the Tucson area, recent events and the current middleeastern political arena merit a renewed awareness of the group’s capabilities and presence throughout the Western Hemisphere.

(U//FOUO) DHS Interagency Security Committee Threats to Federal Facilities Assessment

The DBT Report is a stand-alone threat analysis to be used with the Physical Security Criteria for Federal Facilities: An ISC Standard. The document establishes a profile of the type, composition, and capabilities of adversaries, and it is also designed to correlate with the countermeasures in the compendium of standards and to be easily updated as needed. The DBT is an estimate of the threats that face Federal facilities across a range of undesirable events and based on the best intelligence information, Intelligence Community (IC) reports and assessments, and crime statistics available to the working group at the time of publication. Users of the DBT must consider that undiscovered plots may exist, adversaries are always searching for new methods and tactics to overcome security measures, and the lone-wolf adversary remains largely unpredictable.

(U//FOUO/LES) LulzSec Release: California STAC Gang Infiltration of Law Enforcement Agencies

Infiltration of any law enforcement agency by a gang member can have severe ramifications for the agency involved, its employees, the public it serves, and its allied agencies. Gangs employ various tactics to include infiltrating an agency directly or indirectly, to achieve their objective; to counter this threat, law enforcement must remain cognizant of and employ mitigation strategies. Gangs’ motivations for infiltrating agencies vary; thus law enforcement must remain cognizant of suspicious employee behavior, identify possible motivations for infiltration, and employ mitigation strategies to counter infiltration threats.

(U//FOUO) LulzSec Release: U.S. Air Force Bath Salts Report

Unregulated psychoactive substances marketed as “bath salts” are among the latest in a series of legal synthetic drugs that are being offered as alternatives to illegal drugs. Produced as legal substitutes for ecstasy, cocaine and amphetamines, salts are powerful stimulant drugs designed to avoid legal prosecution and are commonly available on the internet and specialty head shops. They can be made up of a variety of unregulated chemical substances and are being sold under a variety of names or brands. Open sources indicate that “bath salts” are becoming increasingly popular due to the perception that they pose seemingly safer alternative to illegal methods of getting “high” and can easily be obtained over the Internet. Concerns regarding the safety of these drugs have prompted many European countries to take measures to stop the imports and selling of these products within their borders. Recent seizures nationwide suggest these powdered salts are making inroads in the US, thus becoming narcotics of potential concern.

(U//FOUO/LES) LulzSec Release: FBI Los Zetas Expanding into Southeast, Midwest U.S.

Intelligence reporting indicates that Los Zetas has expanded its criminal activities including extortion, kidnapping, and drug trafficking, into the Midwest and Southeast United States, and may be collaborating with a newly identified drug trafficking organization (DTO) to expand its role in the illicit drug trade in the Southeast. Los Zetas activities in the United States to date have largely been limited to the US/Mexico border area. The group’s expansion further into the United States could lead to increased smuggling, drug trafficking, and violent crime in the Southeast region, including East Tennessee and Georgia.

(U//FOUO) LulzSec Release: DHS National Socialist Movement Reference Aid

The National Socialist Movement (NSM) USPER is the most active neo-Nazi group operating in the United States. It has grown from a small organization with a limited following confined to the mid-western United States to the preeminent National Socialist group in the nation. Despite having recently suffered a defection of several regional leaders, NSM remains an influential force within white supremacist circles and the only major racist group that eschews all attempts to distance its methods and objectives from those of the Third Reich. NSM has a reputation for conducting numerous public rallies that have triggered a violent response, including a riot in Toledo, Ohio, in October 2005.

(U//FOUO/LES) LulzSec Release: San Diego Cross-Border Kidnapping Threat Assessment

The San Diego Law Enforcement Center (SD-LECC) convened an analytical task force in Spring 2010 to address the question: “What does cross-border kidnapping in San Diego look like?” Intelligence Analysts from Chula Vista Police Department, San Diego Sheriff’s Department, the Federal Bureau of Investigation, and the Department of Homeland Security’s Office of Intelligence and Analysis analyzed statistical, investigative and open source intelligence from local law enforcement agencies, FBI, DHS, ICE, CBP, DEA and the U.S. Department of State Bureau of Consular Affairs to prepare this assessment. There is strong evidence—based on intelligence gathered from traditional and alternative sources, such as banks, hospitals, citizen interviews, wiretaps and private consulting firms—that kidnappings in the San Diego area are widely underreported. Consequently, this assessment offers a strategic baseline only; there is insufficient data to support a definitive study of cross-border kidnapping tactics and techniques. This assessment is intended to support law enforcement executives and practitioners in their efforts to collect additional information and combat this problem.

(U//FOUO) LulzSec Release: DHS Sinaloa Drug Cartel Reference Guide

The powerful confederation of Mexican DTOs known as the Sinaloa cartel controls the majority of Mexico’s marijuana and methamphetamine production and distribution, as well as cocaine trafficking from South and Central American producers into the United States across the U.S. southwest border. The Sinaloa cartel conducts business with powerful U.S. gangs that largely control local drug distribution. As one of the most powerful cartels operating in Mexico, it has expanded operations throughout western Mexico and attempted to take control of new plazas from weaker organizations.* Arrests of high-level members have not fractured the cartel or caused infighting—as was the case with several of its rivals—likely because of the cartel’s stable revenue sources, decentralized structure, family-based culture, and geographic breadth, which all contribute to its preeminence.

(U//FOUO) LulzSec Release: MIAC Anarchist Movement Report

There are many different ideologies that an anarchist may follow. Although there may be a number of differences, they all contain the same central belief. Anarchism is the idea that government (the state) is unnecessary and harmful. Anarchy is society without government. Anarchists are people who desire to live in a society without ru-lers as their ancestors once did. The main belief is that the community in which they live be dependant only upon itself. People who believe in government (such as liberals, conservatives, socialists and fascists) are known as “statists”. Anarchism opposes all forms of hierarchical control.

(U//FOUO/LES) LulzSec Release: DHS Mexico Sonora-Based Threats to U.S. Border Security

This Homeland Security Assessment examines threats to U.S. border security emanating from the Mexican state of Sonora, which borders Arizona and a small section of New Mexico. It discusses drug and alien smuggling, border violence, and Mexican federal, state, and local government capabilities to confront organized crime. This is the fifth of six planned assessments on current threats to homeland security arising in Mexican states along the U.S. border. It is intended primarily for working-level analysts and operators engaging in homeland security-related activities and concerned with pertinent developments in Sonora and nearby U.S. territory.