Tag Archive for For Official Use Only

(U//FOUO) Washington D.C. Fusion Center Bulletin: Nationwide Fuel Theft Trend

Incidents involving the theft of fuel (gasoline, diesel, kerosene, ethanol, etc.) from fuel storage tanks have been reported across the United States. Fuel theft has significant health and safety implications, including risk for spills, fires, and explosions. Fuel thieves typically do not adhere to security standards or practices, and may inadvertently expose fuel to a hot engine, lit cigarette, or ignition source. First responders and other maintenance personnel also may be exposed to fuels through skin contact or inhalation routes during recovery and/or cleanup operations, which can result in potential health effects.

(U//FOUO) U.S. Army Tactical Combat Casualty Care Handbook August 2013

Tactical Combat Casualty Care (TCCC) is the pre-hospital care rendered to a casualty in a tactical, combat environment. The principles of TCCC are fundamentally different from those of traditional civilian trauma care, which is practiced by most medical providers and medics. These differences are based on both the unique patterns and types of wounds that are suffered in combat and the tactical environment medical personnel face in combat. Unique combat wounds and tactical environments make it difficult to determine which intervention to perform at what time. Besides addressing a casualty’s medical condition, responding medical personnel must also address the tactical situation faced while providing casualty care in combat. A medically correct intervention performed at the wrong time may lead to further casualties. Stated another way, “good medicine may be bad tactics,” which can get the rescuer and casualty killed. To successfully navigate these issues, medical providers must have skills and training focused on combat trauma care, as opposed to civilian trauma care.

(U//FOUO) Colorado Information Analysis Center Bulletin: Vulnerabilities in Knox-Box Key Entry Systems

The Knox-Box® rapid entry system is an access control system utilized by public safety agencies. This system allows facilities to securely store entry keys or cards on site for first responders. First responders utilize a master key that unlocks all Knox boxes within their jurisdiction. Currently there are over 3.5 million Knox-Box rapid entry systems in use nationwide and over 11,500 fire departments in North America that use the Knox-Box rapid entry system. In one Colorado fire district there are over 4,000 Knox-Box systems in use within the local, state, and federal government which includes; energy, water, postal, emergency services, defense, transportation, and communication sectors. Unauthorized access to the system would allow individuals to bypass physical security measures at the site. The unauthorized individuals would also be able to duplicate keys, or remove entry keys or cards which would delay first responders.

(U//FOUO) Colorado Information Analysis Center Bulletin: Marijuana Infused Edibles

The State of Colorado legalized medical marijuana in 2012 and recreational marijuana in 2014. There has been an increased amount of marijuana infused products sold to the public. The products range from fruit chewz, gummiez, cupcakes, truffles, rice krispy treats, butter, and banana bread. It is extremely difficult to differentiate between marijuana infused products and non-infused products if the original packaging is not with the product.

(U//FOUO) DHS Violent Extremist Profile: Walter Bond

Walter Bond’s path to animal rights extremism was driven by witnessing what he perceived as animal abuse and by frustration stemming from his perception that lawful, nonviolent actions appeared to have little impact on advancing the goals of the animal rights movement.* Prior to becoming violent to advance animal rights, Bond showed a tendency to use violence to advance other beliefs, such as protesting illicit drug sales by committing arson against a drug trafficker’s home and protesting against religion by burning a pentagram symbol inside a church.

(U//FOUO) U.S. Army Commander’s Guide to Biometrics in Afghanistan

Biometrics capabilities on the tactical battlefield enable a wide variety of defensive and offensive operations. Biometrics help ensure enemy personnel, criminals, and other undesirable elements are not allowed access to our facilities, hired to provide services, or awarded contracts. Biometrics is used to vet members of the Afghan government and military with whom our forces interact. Unfortunately, biometrics capabilities we put in the hands of Soldiers, Marines, Sailors, and Airmen — and that we ask unit commanders to employ — are relatively recent additions to the list of capabilities our military employs on the battlefield today.

(U//FOUO) DHS-FBI-NCTC Bulletin: Fake Help Desk Scams an Ongoing Problem

Law enforcement continues to see reporting of malicious cyber actors using fake help desk scams, also known as technical support scams. These scams, if successful, seek to compromise and take control of computer systems. Malicious cyber actors send users an e-mail or they make cold calls, purportedly representing a help desk from a legitimate software or hardware vendor. The malicious cyber actors try to trick users into believing that their computer is malfunctioning—often by having them look at a system log that typically shows scores of harmless or low-level errors—then convincing them to download software or let the “technician” remotely access the personal computer to “repair” it.

(U//FOUO) Marine Corps Intelligence Activity Chinese Military Culture Field Guide

China’s Military Culture Field Guide is designed to provide deploying military personnel an overview of China’s military cultural terrain. In this field guide, China’s military cultural history has been synopsized to capture the more significant aspects of China’s military cultural environment, with emphasis on factors having the greatest potential to impact operations. The field guide presents background information to show China’s military mind-set through its history, values, and internal dynamics. It also contains practical sections on lifestyle, customs, and habits. For those seeking more extensive information, MCIA produces a series of cultural intelligence studies on China’s military that explores the dynamics of China’s military culture at a deeper level.

(U//FOUO) New Jersey Fusion Center Bulletin: Suspicious Activity Regarding the Electrical Grid in New Jersey

In the past year, the NJ Suspicious Activity Reporting System (NJ SARS) has received multiple reports of intrusions at electrical grid facilities in New Jersey. The NJ ROIC currently has no indication of any specific threats associated with these incidents, but provides this information for situational awareness and requests information on any similar, previously unreported incidents in New Jersey.

(U//FOUO) FBI Counterintelligence Vulnerability Assessment for Corporate America

To prevent foreign entities from achieving their goals, a Counterintelligence Program (CIP) proactively searches for and uses information from multiple sources. An effective CIP draws information from security programs and other internal systems, as well as from the U.S. Intelligence Community (USIC). Once this information is assembled, an effective CIP develops a coherent picture and crafts a strategy to prevent the foreign entity from successfully achieving its goals and minimizes the damage already done. An effective CIP conducts active analysis of available information, requires annual CI education for all employees, and provides a system for immediate referral of behavior with CI implications.

(U//FOUO) DoD Strategy for Defense Critical Infrastructure

The United States currently faces a dynamic, flexible, and very pragmatic adversary. Due to the unconventional nature of the terrorist threat and the asymmetrical tactics demonstrated both at home and abroad by our enemies, we can no longer expect the protection formerly provided by the oceans bordering our coasts to serve as an effective deterrent to attack. The attacks of September 11, 2001, and other events demonstrated that an act of terrorism can cause worldwide infrastructure asset disruption. In the past decade, hurricanes or other violent storms have also revealed that our infrastructure assets are at risk from destruction, degradation, or disruption by natural events. Given scarce resources, this Strategy’s objectives must be balanced against other priorities outlined in the National Defense Strategy.

(U//FOUO) DHS Infrastructure Protection Report: Higher Education Institutions

The higher education community in the United States consists of more than 11,000 higher education institutions that collectively serve more than 17 million students, employ more than 3.4 million faculty and staff, and have combined budgets approaching $360 billion. Higher education institutions range in size from small institutions with fewer than 100 students to large universities with tens of thousands of students and faculty occupying campuses the size of a small town or city. Institution grounds are generally open-access, with varying levels of security within the campus.

(U//FOUO) DHS-FBI-NCTC Bulletin: Building Security Measures May Hinder Emergency Response Efforts

Facility security measures, such as interior control points or exterior barriers, may require first responders to adjust normal protocols and procedures to operate rapidly during emergencies. The timeline below is an overview of attacks and plots against US-based facilities with varying levels of security. The diversity of tactics and targets used underscores the need for interagency exercises and training that incorporates multiple scenarios to account for building security measures likely to be encountered.

(U//FOUO) DHS-FBI-NCTC Bulletin: Extortion Schemes Use Telephony-Based Denial-of-Service Attacks

Since at least January 2012, criminals are using telephony-based denial-of-service (TDoS) combined with extortion scams to phone an employee’s office and demand the employee repay an alleged loan. If the victim does not comply, the criminals initiate TDoS attacks against the employer’s phone numbers. TDoS uses automated calling programs—similar to those used by telemarketers—to prevent victims from making or receiving calls.

(U//FOUO) U.S. Army Unified Exploitation Concept of Operations 2012-2018

This CONOPS describes an overarching concept of operations for the 2012-2018 timeframe that provides a framework for “Unified Exploitation (UE)” operations and the basis to develop supporting capabilities. It establishes linkages to other Army concepts and describes how UE enables decisive action in support of unified land operations. This CONOPS describes the operational context and how commanders integrate supporting UE capabilities through Mission Command to produce an operational advantage. This CONOPS addresses the central military problem: the Army lacks a systematic approach to effectively integrate multiple organizations, disciplines, functions, and processes that support exploitation through their application of tactical, technical, and scientific capabilities. The absence of an organized exploitation framework to develop facts, actionable information or intelligence from collected enemy information, materials, or people, results in a knowledge void. This lack of knowledge may compromise our ability to execute commander directed, follow-on actions and represents tactical and perhaps even strategic opportunities lost.