Tag Archive for For Official Use Only

(U//FOUO) U.S. Government Shutdown DoD Contingency Plan April 2011

This document provides guidance for identifying those missions and functions of the Department of Defense that may continue to be carried out in the absence of available appropriations. The information provided in this document is not exhaustive, but rather illustrative, and is intended primarily to assist in the identification of those activities that may be continued notwithstanding the absence of available funding authority in the applicable appropriations ( excepted activities). Activities that are determined not to be excepted, and which cannot be performed by utilizing military personnel in place of furloughed civilian personnel, will be suspended when appropriated funds expire. The Secretary of Defense may, at any time, determine that additional activities shall be treated as excepted.

(U//FOUO) U.S. Army Interagency Teaming to Counter Irregular Threats Handbook

If you have picked up this handbook, or had it handed to you, you are likely an interagency team leader or team member or a military commander or civilian leader with the responsibility for setting up an interagency team. If this is your first exposure to working with the interagency, it can be a daunting prospect. This handbook is intended to provide you with a basic understanding of the interagency environment as well as insights and best practices that your team can put to use to counter irregular threats in the field or at operational level.

(U//FOUO) DHS Dams Sector Security Awareness Handbook

The Nation has more than 100,000 dams. Of this number, approximately 82,000 are listed in the National Inventory of Dams (NID), which generally includes dams greater than 25 feet in height or reservoirs having more than 50 acre-feet in storage capacity. In the NID, the downstream hazard potential (e.g., the amount of risk or damage a dam can pose because of failure or negligent operation) is classified as high, significant, or low. In the current NID database, approximately 12,000 dams are classified as high hazard potential from a dam safety perspective. However, only a very small percentage of high-hazard dams represent a potential for causing mass casualties.

(U//FOUO) U.S. Army Human Terrain Team Commander’s Guide

Human terrain teams (HTTs) consist of five to nine personnel deployed by the HTS to support field commanders. HTTs fill the socio-cultural knowledge gap in the commander’s operational environment and interpret events in his AO. The team, individuals with social science and operational backgrounds, deploys with military units to bring knowledge about the local population into a coherent analytic framework. The teams also assist in building relationships with the local community in order to provide advice and opportunities to commanders and staffs in the field.

(U//FOUO) DHS-FBI Terrorist Exploitation of Postal and Commercial Shipping Companies

Terrorists remain interested in exploiting postal and commercial shipping companies to conduct or support attacks in the United States. Publicity surrounding the more than 40,000 incidents involving unknown or suspicious substances related to the U.S. Mail since 2001 likely reinforces violent extremists’ belief that the postal sector is a useful mechanism for conducting an attack, as it demonstrates that mail containing potentially harmful substances can be delivered without arousing suspicion or being discovered until the recipient opens the letter or package.

(U//FOUO) DHS Strategy for Improving Improvised Nuclear Device Attack Response

The mission of the Department of Homeland Security (DHS) includes acting as a focal point regarding natural and manmade crises and emergency planning. In support of the Department’s mission, the primary mission of the Federal Emergency Management Agency (FEMA) is to reduce the loss of life and property and protect the Nation from all hazards, including natural disasters, acts of terrorism, and other man-made disasters, by leading and supporting the Nation in a risk-based, comprehensive emergency management system of preparedness, protection, response, recovery, and mitigation. Consistent with these missions, the Nuclear/Radiological Incident Annex to the National Response Framework (June 2008) sets forth DHS as the coordinating agency for all deliberate attacks involving nuclear/radiological materials, including radiological dispersal devices (RDDs) and improvised nuclear devices (INDs).

(U//FOUO) FBI Terrorist Training and Recruitment of CONUS Subjects: Lackawanna, Portland, and Northern Virginia

This assessment addresses the central role of terrorist training in three significant post-9/11 continental United States (CONUS) terrorism investigations: Lackawanna, Portland, and Northern Virginia. This assessment does not address other individuals who may have sought training independently, nor does it address groups of individuals who sought training in regions outside of South or Central Asia.

(U//FOUO) TSA Liquid and Natural Gas Pipeline Threat Assessment 2011

The Transportation Security Administration’s (TSA’s) mission includes enhancing the security preparedness of U.S. hazardous liquid and natural gas pipeline systems. This TSA Office of Intelligence (TSA-OI) threat assessment primarily addresses the potential for attacks against the pipeline industry in the Homeland and assesses the tactics, techniques, and procedures (TTPs) used in attacks against pipelines and related infrastructure overseas for their potential use by terrorists in the Homeland.

(U//FOUO) TSA Pipeline Security Smart Practices Report

U.S. hazardous liquids and natural gas pipelines are critical to the nation’s commerce and economy and, as a consequence, they can be attractive targets for terrorists. Before September 11, 2001, safety concerns took precedence over physical and operational security concerns for a majority of pipeline operators. Security matters were mainly limited to prevention of minor theft and vandalism. The terrorist attacks of 9/11 forced a thorough reconsideration of security, especially with respect to critical infrastructure and key resources. Pipeline operators have responded by seeking effective ways to incorporate security practices and programs into overall business operations.

New York Office of Homeland Security Post 9-11 Terrorist Training Infrastructure Report

Until shortly after 9/11, when the U.S. military launched an invasion intended to destroy Al Qaeda’s infrastructure and sanctuary, the vast majority of the terror network’s training camps were located in Afghanistan. According to the 9/11 Commission, between 1996 and 2001, a total of 10,000 to 20,000 individuals trained for jihad at camps such as Al-Farooq, Khalden, and Derunta. Other sources, such as former Senator Bob Graham, cite an estimate from the CIA’s Counterterrorism Center that, in fact, between 70,000 and 120,000 passed through Al Qaeda’s Afghan camps. A significant number of those attendees were Western citizens. For example, open sources report that in January 2002, British military intelligence discovered the names of 1,200 British citizens who trained with Al Qaeda in Afghanistan. U.S citizens, such as Jose Padilla, John Walker Lindh, and the Lackawanna Six, also traveled to Afghanistan for training.

(U//FOUO) Washington D.C. Fusion Center: The Perils of Social Networking

In a the New York State court, a NYPD officer was questioned by the defense attorney regarding statements he had posted on his Facebook webpage that portrayed him as a rogue cop. At the conclusion of his testimony, what should have been a slam-dunk “ex-con with a gun” case, resulted in an acquittal for the defendant because of the reasonable doubt created by the officer’s own postings on Facebook and MySpace. In other words, his own website statements were used to impeach him. Convictions rest on the credibility of the officer(s). The defense strategy was to show the jury that what the officer writes about himself on social network websites is how he “really” conducts police work. The suspect in this case claimed that the officer used excessive force on him and broke three ribs. The suspect went on to allege that when the police officer realized that he would have to explain the broken ribs, he “planted” a stolen 9mm Beretta on the suspect and charged him with the offense.

(U//FOUO) DHS-FBI 2010 Holiday Terrorism Warning

(U//FOUO) THIS JOINT INTELLIGENCE BULLETIN PROVIDES LAW ENFORCEMENT AND PUBLIC AND PRIVATE SECTOR SAFETY OFFICIALS WITH AN EVALUATION OF POTENTIAL TERRORIST THREATS DURING THE 2010 U.S. HOLIDAY SEASON, EXTENDING FROM THE PRE-CHRISTMAS PERIOD THROUGH NEW YEAR’S DAY. THIS INFORMATION IS PROVIDED TO SUPPORT THE ACTIVITIES OF DHS AND FBI AND TO HELP FEDERAL, STATE, AND LOCAL GOVERNMENT COUNTERTERRORISM AND LAW ENFORCEMENT OFFICIALS DETER, PREVENT, PREEMPT, OR RESPOND TO TERRORIST ATTACKS AGAINST THE UNITED STATES.

(U//FOUO) U.S. State Department Social Media Landscape: Spain

The social media landscape in Spain is relatively mature since reading blogs and engaging on social networks is now a regular part of daily life for many people, particularly teenagers and young professional people. As in most other European countries, social media participation is higher in large cities, especially Madrid which is seen as the center of the technology and Web 2.0 industry in Spain (64.3% of households have Internet access). Social networking is the most popular social activity in Spain. Until recently the local platform Tuenti had the highest membership although the global platform Facebook has now usurped that with 100,000 more members (5.7 million total) and levels of traffic to rival Google.

(U//FOUO) USMC Wireless Local Area Networks (WLANs) Information Assurance Directive

Marine Corps Order (MCO) 5239.1 formally establishes the Marine Corps Information Assurance Program (MCIAP) and defines the responsibilities for protecting the Marine Corps information infrastructure as well as delineating Department of Defense (DoD) directives, instructions, and guidance governing DoD Information Assurance (IA). United States Marine Corps (USMC) IA Enterprise Directive 014 Wireless Local Area Networks (WLANs) outlines the security configuration and implementation standards for WLANs within the Marine Corps Enterprise Network (MCEN) boundary security framework.

(U//FOUO/LES) North Carolina Fusion Center Jared Lee Loughner Not Connected to White Supremacists Report

On January 8, 2011 shortly after 10:00 AM in Tucson, Arizona, a gunman opened fire during U.S. Representative Gabrielle Giffords’ constituent meeting outside a Safeway Grocery store. Rep. Giffords was shot in the head. While Giffords has reportedly survived the attack, twelve people were injured and six were killed. The gunman was later identified as Jared Lee Loughner, 22 years of age. Subsequent media reports have described Loughner as espousing anti-government rhetoric and possibly affiliated with groups such as New Century Foundation/American Renaissance (although Law Enforcement have not located any information to indicate this affiliation). New Century Foundation (NCF), started by Virginia resident Jared Taylor, is a 501 (c)(3) organization founded in 1994 to “study immigration and race relations so as to better understand the consequences of America’s increasing diversity.” (www.nc-f.org) NCF is primarily known for American Renaissance (AmRen), a journal and companion website that broadcasts racist and anti-illegal immigration ideologies.